WO2013023566A1 - 一种mtc服务器权限验证控制方法、系统及装置 - Google Patents

一种mtc服务器权限验证控制方法、系统及装置 Download PDF

Info

Publication number
WO2013023566A1
WO2013023566A1 PCT/CN2012/080044 CN2012080044W WO2013023566A1 WO 2013023566 A1 WO2013023566 A1 WO 2013023566A1 CN 2012080044 W CN2012080044 W CN 2012080044W WO 2013023566 A1 WO2013023566 A1 WO 2013023566A1
Authority
WO
WIPO (PCT)
Prior art keywords
mtc
identifier
server
verification
mtc terminal
Prior art date
Application number
PCT/CN2012/080044
Other languages
English (en)
French (fr)
Inventor
田野
徐晖
Original Assignee
电信科学技术研究院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 电信科学技术研究院 filed Critical 电信科学技术研究院
Publication of WO2013023566A1 publication Critical patent/WO2013023566A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Definitions

  • the present invention relates to communication technologies, and in particular, to an MTC server authority verification control method, system and device. Background technique
  • the Machine Type Communication Server can issue commands to the 3GPP network. Trigger, control, management, and maintenance operations on the M2M terminal to implement specific MTC service application functions.
  • the 3GPP organization has proposed the MTC communication architecture shown in Figure 1. In terms of functional level, it mainly consists of MTC Server, 3GPP mobile communication network and MTC Device (MTC Device).
  • MTC Device MTC Device
  • the 3GPP mobile communication network provides a network connection to the MTC terminal and connects to the MTC Server.
  • MTC Server provides a unified service management control platform for MTC terminals, and supports various MTC applications.
  • the MTC-Inter working fimction (MTC-IWF) entity is a 3GPP network edge node that shields the details of the 3GPP network topology.
  • the entity exchanges control signaling with the MTC Server through the newly defined MTCsp interface, and invokes the specific functions provided by the 3GPP network by relaying or converting the signaling protocol on the MTCsp interface to provide transparent operation control services for the MTC Server.
  • the MTC Server can send control signaling to the 3GPP network to request triggering, control, management, and maintenance operations on the terminal to implement MTC service features.
  • the MTC Server can send a trigger request to the MTC-IWF entity through the MTCsp interface, requesting the network to initiate a trigger to the target terminal to establish communication with the MTC Server;
  • the MTC terminal such as the switch control capability, the MTC Server can send a control request to the MTC-IWF, requesting the network to control the target terminal to require it to perform a switching operation, and the like.
  • the inventor of the present invention has found that in the MTC device triggering feature, for the trigger request sent by the MTC Server, the 3GPP network first needs to authenticate the identity of the MTC Server to determine whether it is a legitimate service providing device. However, on this basis, the network does not further determine whether the MTC Server has the operational authority to trigger the request to the target terminal. If the triggering operation of the MTC Server exceeds the authorized permission range, Continue to allow it to trigger, which may pose a security issue. Specifically, for example, the MTC Server 1 has the authority to perform a trigger control operation on the MTC terminals A, B, and C. However, in some abnormal situation (malicious or non-malicious), the MTC Server 1 requests the 3GPP network to trigger the MTC terminal D. This is an unauthorized operation that can raise security issues. Summary of the invention
  • the embodiment of the invention provides an MTC server authority verification control method, system and device, so as to implement authority verification on the MTC server.
  • An MTC server authority verification control method includes:
  • the operation requested by the MTC server is executed after the verification is passed.
  • An MTC server authority verification control method includes:
  • a receiver device-type communication interaction function entity MTC-IWF sends an identifier of the machine-type communication MTC server, an identifier of the MTC terminal, and an authentication request message of the operation type;
  • the authority verification result is returned to the MTC-IWF.
  • An MTC server authority verification control device includes:
  • a receiving unit configured to receive, by the MTC server, an operation request for the MTC terminal, and a determining unit, configured to determine an identifier of the MTC server, an identifier of the MTC terminal, and an operation type according to the operation request;
  • a verification unit configured to perform authority verification on the MTC server according to the identifier of the MTC server, the identifier of the MTC terminal, and the operation type;
  • An execution unit configured to perform an operation requested by the MTC server after the verification is passed.
  • An MTC server authority verification control device includes:
  • the verification request receiving unit is configured to be used by the receiver-type communication interaction function entity MTC-IWF to carry the identifier of the machine-type communication MTC server, the identifier of the MTC terminal, and the verification request message of the operation type;
  • the MTC server performs permission verification;
  • a result feedback unit configured to return a permission verification result to the MTC-IWF.
  • An MTC server authority verification control system includes:
  • Machine type communication interaction function entity MTC-IWF for receiver class communication MTC server sends pairs
  • An operation request of the MTC terminal determining an identifier of the MTC server, the MTC terminal according to the operation request And the operation type; sending a subscription information request carrying the MTC terminal identifier, and receiving the returned subscription information of the MTC terminal; and requesting the sending operation according to the identifier and operation type of the MTC server in the subscription information
  • the MTC server performs the rights verification; after the verification is passed, the operation requested by the MTC server is performed; the home location register/home subscriber server HLR/HSS is configured to receive the subscription information request sent by the MTC-IWF, and according to the The MTC terminal identifier returns the subscription information of the MTC terminal to the MTC-IWF.
  • An MTC server authority verification control system includes:
  • a machine type communication interaction function entity MTC-IWF configured to receive an operation request for the MTC terminal by the receiver class communication MTC server; determining an identifier of the MTC server, an identifier of the MTC terminal, and an operation type according to the operation request Transmitting an identifier of the MTC server, an identifier of the MTC terminal, and an authentication request message of the operation type, and receiving a permission verification result; performing an operation requested by the MTC server after the verification is passed;
  • An authentication, authorization, and accounting AAA server configured to receive, by the MTC-IWF, an identifier that carries the MTC server, an identifier of the MTC terminal, and an authentication request message of the operation type; performing rights verification on the MTC server; The authority verification result is returned to the MTC-IWF.
  • An embodiment of the present invention provides an MTC server authority verification control method, system, and apparatus, so that after receiving an operation request of the MTC Server, the 3GPP network performs rights verification on the MTC Server according to the MTC Server identifier, the MTC terminal identifier, and the operation type. And after the verification is passed, the operation requested by the MTC Server is executed, thereby realizing the verification of the authority of the MTC server.
  • FIG. 1 is a schematic structural diagram of an MTC network in the prior art
  • FIG. 2 is a flowchart of a method for controlling authority verification of an MTC server according to an embodiment of the present invention
  • FIG. 3 is a flowchart of a method for verifying authority verification of an MTC server corresponding to the first embodiment of the present invention.
  • FIG. 4 is a flowchart of a method for verifying authority verification of an MTC server corresponding to the second embodiment of the present invention.
  • FIG. 6 is a flowchart of a method for verifying authority verification of an MTC server according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of an MTC server authority verification control apparatus according to an embodiment of the present invention
  • FIG. 8 is a second schematic structural diagram of an MTC server authority verification control apparatus according to an embodiment of the present invention
  • FIG. 9 is an MTC provided by an embodiment of the present invention
  • One of the schematic diagrams of the server authority verification control system structure
  • FIG. 10 is a second schematic structural diagram of the MTC server authority verification control system according to an embodiment of the present invention.
  • Embodiments of the present invention provide a method, system, and apparatus for MTC server authority verification control, such that a 3GPP network After receiving the operation request of the MTC Server, the network performs the authority verification on the MTC Server according to the MTC Server identifier, the identifier of the MTC terminal, and the operation type, and performs the operation requested by the MTC Server after the verification is passed, thereby realizing the authority verification of the MTC server. .
  • the 3GPP network entity In the process of operating the M2M terminal by the MTC Server, in order to ensure the security of the communication, the 3GPP network entity needs to verify the legality of the command sent by the MTC Server, determine whether the MTC Server has the right to initiate operation control on the specific terminal, and only accept the authorization. MTC Server request.
  • the MTC server authority verification control method includes:
  • Step S201 Receive an operation request sent by the MTC server to the MTC terminal.
  • Step S202 Determine an identifier of the MTC server, an identifier of the MTC terminal, and an operation type according to the operation request.
  • Step S203 Perform rights verification on the MTC server according to the identifier of the MTC server, the identifier of the MTC terminal, and the operation type.
  • Step S204 Perform an operation requested by the MTC server after the verification is passed.
  • the execution body of the above method may be an MTC-IWF in a 3GPP network.
  • the MTC-IWF in the 3GPP network After receiving the operation request, the MTC-IWF in the 3GPP network performs rights verification on the MTC server according to the identifier of the MTC server, the identifier of the MTC terminal, and the operation type, and performs the operation requested by the MTC server only when the verification is passed.
  • the security of the communication is ensured, and the MTC server that does not have the operation authority is prevented from issuing an operation request to the MTC terminal.
  • the MTC-IWF may further return a rejection message and a rejection reason to the MTC server.
  • the reason value may be returned according to the agreement, and the MTC server may determine the reason value after receiving the cause value. The verification failed and the reason for the rejection is determined based on the cause value.
  • the identifier of the MTC server and the identifier of the MTC terminal determined in step S202 may be specifically read from the operation request.
  • the MTC terminal Before the MTC-IWF performs the rights verification on the MTC server according to the identifier of the MTC server, the identifier of the MTC terminal, and the operation type, if the identifier of the MTC terminal carried in the operation request is an identifier that is not recognized by the 3GPP network, the MTC terminal may The identity is converted to an identity identifiable by the 3GPP network to facilitate further identification of the identity of the MTC terminal. Generally, the Qualified Domain Name (FQDN), the Uniform Resource Name (URN), and the Session Initiation Protocol Uniform Resource Identity (SIP URI) are not recognized by the 3GPP network.
  • the International Mobile Subscriber Identity (IMSI), the Mobile Subscriber ISDN (MSISDN), and the Globally Unique Temporary Identity (GUTI) can be identified by the 3GPP network.
  • the type of operation in step S202 may be expressed in an explicit manner by a dedicated information element (IE) in the operation request, or may be expressed in an implicit manner by the type of the operation request.
  • IE dedicated information element
  • the MTC Server when the MTC Server needs to trigger the MTC device, it sends a trigger request message to the MTC-IWF, which carries The terminal identifier and the MTC Server identifier. At this time, the type of the operation request is implicit. If the MTC server needs to trigger the MTC device, it sends an operation request to the MTC-IWF, which is the display identifier when the terminal identifier and the MTC server identifier and the operation type are carried. In this example, the operation type is triggered.
  • the MTC-IWF which is the display identifier when the terminal identifier and the MTC server identifier and the operation type are carried. In this example, the operation type is triggered.
  • step S203 performing the rights verification on the MTC server according to the identifier of the MTC server, the identifier of the MTC terminal, and the operation type may be performed by the MTC-IWF, or may be requested by the MTC-IWF to perform other servers, and the following specific embodiments are adopted. Be explained.
  • the MTC-IWF directly verifies the authority of the MTC server according to the identity of the MTC server, the identifier of the MTC terminal, and the operation type through the subscription information stored by the MTC-IWF.
  • step S203 performing the rights verification on the MTC server according to the identifier of the MTC server, the identifier of the MTC terminal, and the operation type, specifically: obtaining the subscription information of the MTC terminal according to the MTC terminal identifier; according to the identifier of the MTC server in the subscription information
  • the operation type performs permission verification on the MTC server that sends the operation request.
  • the MTC server rights verification control method includes:
  • Step S301 The MTC-IWF receives an operation request sent by the MTC server to the MTC terminal.
  • Step S302 After receiving the operation request, the MTC-IWF processes the operation request. Determining the identity of the MTC server, the identifier of the MTC terminal, and the operation type according to the operation request. When the MTC Server uses the identifier that the 3GPP network cannot identify as the MTC terminal identifier, the MTC-IWF maps it to the identifier available inside the 3GPP network.
  • Step S303 Perform rights verification on the MTC server according to the identifier of the MTC server, the identifier of the MTC terminal, and the operation type.
  • the MTC-IWF is based on the subscription information of the locally maintained MTC terminal, the MTC server authorization information, and the trigger request message.
  • the MTC Server ID, the MTC terminal ID, and the operation type can be used to verify the MTC Server operation authority.
  • Step S304 if the verification is passed, the operation of the MTC server is performed;
  • Step S305 If the verification fails, the operation request of the MTC server is rejected, and the original value is sent to the MTC server.
  • HLR/HSS Home Location Register/Home Subscriber Server
  • the HLR/HSS records the name/identification/address of the authorized MTC Server in the saved MTC device subscription information, and authorizes the MTC Server to perform operations on the terminal.
  • the MTC-IWF Upon receiving the operation request sent by the MTC server, the MTC-IWF initiates a terminal subscription information acquisition process to the HLR/HSS according to the MTC terminal identifier carried in the operation request, and requests to acquire the subscription information of the terminal. Then, using the subscription information, the MTC-IWF judges to initiate according to the name/identification/address information of the MTC Server carried in the operation request. Whether the requested MTC Server is legally authorized, and determines whether the MTC Server has the right to initiate the requested operation on the target MTC device according to the type of operation carried in the operation request.
  • the MTC-IWF continues the subsequent processing, and initiates the operation within the 3GPP network according to the request of the MTC Server; otherwise, returns the reject instruction message, rejects the request of the MTC Server, and returns the reason value.
  • step S203 performing the rights verification on the MTC server according to the identifier of the MTC server, the identifier of the MTC terminal, and the operation type, specifically: obtaining the subscription information of the MTC terminal according to the MTC terminal identifier; according to the identifier of the MTC server in the subscription information
  • the operation type performs permission verification on the MTC server that sends the operation request.
  • the obtaining the subscription information of the MTC terminal according to the MTC terminal identifier includes: sending a subscription information request carrying the MTC terminal identifier to the HLR/HSS, and receiving the subscription information of the MTC terminal returned by the HLR/HSS.
  • the MTC server authority verification control method includes:
  • Step S401 The MTC-IWF receives an operation request sent by the MTC server to the MTC terminal.
  • Step S402 After receiving the operation request, the MTC-IWF processes the operation request. Determining the identity of the MTC server, the identifier of the MTC terminal, and the operation type according to the operation request. When the MTC Server uses the identifier that the 3GPP network cannot identify as the MTC terminal identifier, the MTC-IWF maps it to the identifier available inside the 3GPP network.
  • Step S403 The MTC-IWF sends a subscription information request to the HLR/HSS, requesting to obtain the subscription information of the target terminal, where the subscription information request carries the MTC terminal identifier that is available in the 3GPP network.
  • Step S404 The HLR/HSS performs the subscription information response, and returns the subscription information of the MTC terminal to the MTC-IWF.
  • Step S405 The MTC-IWF performs the MTC Server operation authority according to the subscription information and the MTC Server identifier and operation type provided in the operation request. Verification
  • Step S406 If the verification is passed, the operation of the MTC server is performed;
  • Step S407 If the verification fails, the operation request of the MTC server is rejected, and the cause value is sent to the MTC server.
  • An interface is added between Server, AAA Server) for transmitting authentication request information.
  • the HLR/HSS records the name/identification/address of the authorized MTC Server in the saved MTC device subscription information, and authorizes the MTC Server to perform operations on the terminal.
  • the AAA Server is a server for performing rights authentication connected to the HLR/HSS in the 3GPP network.
  • the AAA Server performs the authority-authentication of the MTC Server.
  • the MTC-IWF when receiving the operation request sent by the MTC server, the MTC-IWF generates an authentication request message according to the MTC terminal identifier, the MTC Server name/identification/address, the operation type, and the like carried in the operation request. And send it to the AAA Server, requesting the AAA Server to check the validity of the MTC Server permission. Certificate.
  • the AAA Server first initiates a terminal subscription information acquisition process to the HLR/HSS according to the MTC terminal identifier provided in the verification request message, and requests to acquire the subscription information of the terminal. Then, according to the subscription information obtained by the response and the name/identification/address information of the MTC server carried in the verification request message, the AAA Server determines whether the MTC Server that initiated the request is legally authorized, and determines the type according to the operation type carried in the verification request message. Whether the MTC Server has the right to initiate the requested operation on the target MTC device. Finally, the AAA Server returns the verification result to the MTC-IWF by verifying the reply message.
  • the MTC-IWF determines the subsequent actions. If the verification result is verified by permission,
  • the MTC-IWF continues the subsequent processing and initiates operations within the 3GPP network according to the request of the MTC Server; otherwise, it returns a reject command message, rejects the MTC Server request, and returns the cause value.
  • the MTC server authority verification control method includes:
  • Step S501 The MTC-IWF receives an operation request sent by the MTC server to the MTC terminal.
  • Step S502 After receiving the operation request, the MTC-IWF processes the operation request. Determining the identity of the MTC server, the identifier of the MTC terminal, and the operation type according to the operation request. When the MTC Server uses the identifier that the 3GPP network cannot identify as the MTC terminal identifier, the MTC-IWF maps it to the identifier available inside the 3GPP network.
  • Step S503 The MTC-IWF generates an authentication request message, and sends the verification request message to the AAA server, where the verification request message includes an MTC terminal identifier, an MTC Server identifier, and a request operation type that are available in the 3GPP network.
  • Step S504 The AAA Server sends a subscription information request to the HLR/HSS by using the MTC terminal identifier provided in the verification request message, and requests to acquire the subscription information of the target terminal.
  • Step S505 The HLR/HSS performs the subscription information response, and returns the subscription information of the MTC terminal to the AAA Server.
  • Step S506 The AAA Server verifies the operation authority of the MTC Server according to the subscription information and the MTC Server identifier provided in the verification request message. ;
  • Step S507 the AAA Server returns the verification result to the MTC-IWF by verifying the response message
  • Step S508 if the verification is passed, the operation of the MTC server is performed;
  • Step S509 If the verification fails, the operation request of the MTC server is rejected, and the original value is sent to the MTC server.
  • the MTC server authority verification control method provided by the embodiment of the present invention includes:
  • Step S601 Receive an identifier of the MTC server that is sent by the MTC-IWF, an identifier of the MTC terminal, and an authentication request message of the operation type.
  • Step S602 After performing the authority verification on the MTC server, return the authority verification result to the MTC-IWF.
  • the AAA server performs the rights verification on the MTC server, which specifically includes: Obtaining subscription information of the MTC terminal according to the MTC terminal identifier;
  • the MTC server that sends the operation request is authenticated according to the identifier and operation type of the MTC server in the subscription information.
  • obtaining the subscription information of the MTC terminal according to the MTC terminal identifier includes:
  • the HLR/HSS sends a subscription information request carrying the MTC terminal identifier, and receives the subscription information of the MTC terminal returned by the HLR/HSS.
  • the embodiment of the present invention further provides an MTC server authority verification control device, which may be specifically an MTC-IWF. As shown in FIG. 7, the device includes:
  • the receiving unit 701 is configured to receive an operation request sent by the MTC server to the MTC terminal.
  • the determining unit 702 is configured to determine an identifier of the MTC server, an identifier of the MTC terminal, and an operation type according to the operation request;
  • the verification unit 703 is configured to perform authority verification on the MTC server according to the identifier of the MTC server, the identifier of the MTC terminal, and the operation type.
  • the executing unit 704 is configured to perform an operation of the MTC server after the verification is passed.
  • the MTC-IWF can further return a rejection message to the MTC server and reject the reason.
  • the device further includes:
  • the reject unit is used to return a reject message to the MTC server and the reason for the rejection when the verification fails.
  • the verification unit 703 is specifically configured to:
  • the MTC server that sends the operation request is authenticated according to the identifier and operation type of the MTC server in the subscription information.
  • the verification unit 703 is specifically configured to:
  • the verification of the identifier of the MTC server, the identifier of the MTC terminal, and the operation type is sent to the AAA server.
  • the verification unit 703 is specifically configured to:
  • the MTC server that sends the operation request is authenticated according to the identifier and operation type of the MTC server in the subscription information.
  • the MTC terminal Before the MTC-IWF performs the rights verification on the MTC server according to the identifier of the MTC server, the identifier of the MTC terminal, and the operation type, if the identifier of the MTC terminal carried in the operation request is an identifier that is not recognized by the 3GPP network, the MTC terminal may The identity is converted to an identity identifiable by the 3GPP network to facilitate further identification of the identity of the MTC terminal.
  • the verification unit 703 is further configured to: When the identifier of the MTC terminal carried in the operation request is an identifier that is not recognized by the 3GPP network, the identifier of the MTC terminal is converted into a 3GPP network before the authority verification is performed on the MTC server according to the identifier of the MTC server, the identifier of the MTC terminal, and the operation type. A identifiable identifier.
  • the embodiment of the present invention further provides an MTC server authority verification control device, which may be specifically an AAA server. As shown in FIG. 8, the device includes:
  • the verification request receiving unit 801 is configured to receive an identifier of the MTC server, an identifier of the MTC terminal, and an authentication request message sent by the MTC-IWF;
  • a rights verification unit 802 configured to perform rights verification on the MTC server
  • the result feedback unit 803 is configured to return a permission verification result to the MTC-IWF.
  • the authority verification unit 802 is specifically configured to:
  • the MTC server corresponding to the identifier of the MTC server carried in the verification request message is authenticated according to the identifier and operation type of the MTC server in the subscription information.
  • the authority verification unit 802 is specifically used to:
  • the MTC server of the MTC server corresponding to the identifier of the MTC server carried in the verification request message is authenticated according to the identifier and operation type of the MTC server in the subscription information.
  • the embodiment of the present invention further provides an MTC server authority verification control system, as shown in FIG. 9, including:
  • the MTC-IWF 901 is configured to receive an operation request for the MTC terminal sent by the receiver-type communication MTC server; determine an identifier of the MTC server, an identifier of the MTC terminal, and an operation type according to the operation request; send a subscription information request carrying the MTC terminal identifier, and receive The subscription information of the returned MTC terminal; performing rights verification on the MTC server that sends the operation request according to the identifier and operation type of the MTC server in the subscription information; performing the operation requested by the MTC server after the verification is passed;
  • the HLR/HSS 902 is configured to receive the subscription information request sent by the MTC-IWF 901, and return the subscription information of the MTC terminal to the MTC-IWF 901 according to the MTC terminal identifier.
  • the MTC-IWF901 can further return a rejection message to the MTC server and the reason for the rejection.
  • the MTC-IWF901 is also used to:
  • the rejection message is returned to the MTC server and the reason for the rejection.
  • the MTC-IWF performs the rights verification on the MTC server according to the identifier of the MTC server, the identifier of the MTC terminal, and the operation type, if the identifier of the MTC terminal carried in the operation request is found to be unrecognizable by the 3GPP network, When the identifier is used, the identifier of the MTC terminal may be converted into an identifier that can be recognized by the 3GPP network, so as to further identify the identifier of the MTC terminal.
  • MTC-IWF901 is also used to:
  • the identifier of the MTC terminal carried in the operation request is an identifier that is not recognized by the 3GPP network
  • the identifier of the MTC terminal is converted into an identifier that can be recognized by the 3GPP network before the subscription information request carrying the MTC terminal identifier is sent.
  • the embodiment of the present invention further provides an MTC server authority verification control system, as shown in FIG. 10, including:
  • the MTC-IWF1001 is used for the operation request sent by the receiver-type communication MTC server; determining the identifier of the MTC server, the identifier of the MTC terminal, and the operation type according to the operation request; transmitting the identifier of the MTC server, the identifier of the MTC terminal, and the verification of the operation type. Requesting a message, and receiving a permission verification result; performing an operation request requested by the MTC server after the verification is passed;
  • the AAA server 1002 is configured to receive an identifier of the MTC server that is sent by the MTC-IWF, an identifier of the MTC terminal, and an authentication request of the operation type; perform rights verification on the MTC server; and return a permission verification result to the MTC-IWF.
  • the AAA server 1002 performs rights verification on the MTC server, and specifically includes:
  • the MTC server that sends the operation request is authenticated according to the identifier and operation type of the MTC server in the subscription information.
  • the AAA server 1002 can obtain the subscription information of the MTC terminal from the HLR/HSS.
  • the system further includes:
  • the HLR/HSS is configured to receive the subscription information request sent by the AAA server 1002, and return the subscription information of the MTC terminal to the AAA server 1002 according to the MTC terminal identifier.
  • the AAA server 1002 obtains the subscription information of the MTC terminal according to the MTC terminal identifier, and specifically includes: sending a subscription information request carrying the MTC terminal identifier to the HLR/HSS, and receiving the subscription information of the MTC terminal returned by the HLR/HSS.
  • An embodiment of the present invention provides an MTC server authority verification control method, system, and apparatus, so that after receiving an operation request of the MTC Server, the 3GPP network performs rights verification on the MTC Server according to the MTC Server identifier, the MTC terminal identifier, and the operation type. And after the verification is passed, the operation requested by the MTC Server is executed, thereby realizing the verification of the authority of the MTC server.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the present invention is in the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) in which computer usable program code is embodied.
  • the present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (system), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG.
  • These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Abstract

本申请公开了一种MTC服务器权限验证控制方法、系统及装置,涉及通信技术,本申请实施例中,3GPP网络在接收到MTC Server的操作请求后,根据MTC Server标识、MTC终端的标识以及操作类型对MTC Server进行权限验证,并在验证通过后执行该MTC Server请求的操作,从而实现对MTC服务器权限验证。

Description

一种 MTC服务器权限验证控制方法、 系统及装置 本申请要求在 2011年 08月 12 日提交中国专利局、 申请号为 201110231136.X、 发明 名称为 "一种 MTC服务器权限验证控制方法、 系统及装置"的中国专利申请的优先权, 其 全部内容通过引用结合在本申请中。 技术领域
本发明涉及通信技术, 尤其涉及一种 MTC服务器权限验证控制方法、 系统及装置。 背景技术
在第三代合作项目 (3rd Generation Partnership Project, 3GPP ) 网络的机器与机器 ( Machine to Machine, M2M )通信过程中,机器类通信服务器( Machine Type Communication Server, MTC Server )可以向 3GPP网络发出指令以对 M2M终端进行触发、 控制、 管理、 维护等操作, 从而实现特定 MTC业务应用功能。
为了支持 M2M通信, 目前 3GPP组织提出了如图 1所示的 MTC通信体系架构。从功 能层次方面讲, 它主要由 MTC Server, 3 GPP移动通信网络以及 MTC终端( MTC Device ) 三部分组成。
3GPP移动通信网络为 MTC终端提供网络连接, 连接至 MTC Server。 MTC Server向 下为 MTC终端提供统一的业务管理控制平台, 向上支持各种 MTC应用。
MTC交互工作功能(MTC-Inter working fimction, MTC-IWF )实体是 3GPP网络边缘 节点,对外屏蔽了 3GPP网络拓朴的细节。该实体通过新定义的 MTCsp接口与 MTC Server 进行控制信令交互,通过中继或转换 MTCsp接口上的信令协议来调用 3GPP网络提供的特 定功能, 为 MTC Server提供透明的操作控制服务。
通过 MTCsp控制信令接口, MTC Server可以向 3GPP网络发送控制信令, 请求对终 端进行触发、 控制、 管理、 维护等操作, 从而实现 MTC业务特性。 例如, 对于 MTC终端 触发( MTC device triggering )特性, MTC Server可以通过 MTCsp接口向 MTC-IWF实体 发送触发请求, 请求网络对目标终端发起触发, 使其与 MTC Server建立通信; 对于具有 某种执行能力的 MTC终端, 如开关控制能力, MTC Server可以向 MTC-IWF发送控制请 求, 请求网络对目标终端进行控制以要求其进行开关操作 , 等等。
但是, 本发明的发明人发现, 在 MTC device triggering特性中, 对于 MTC Server发送 的触发请求, 3GPP网络首先需要对 MTC Server的身份进行认证, 判断它是否是一个合法 的服务提供设备。 但是, 在此基础上, 网络并没有进一步判断 MTC Server是否对目标终 端具有触发请求的操作权限。 如果 MTC Server的触发操作超出所授权的权限范围, 如果 继续允许其进行触发操作, 则可能带来安全性问题。 具体来讲, 例如 MTC Server 1具有对 MTC终端 A, B, C进行触发控制操作的权限。 然而, 在某种异常情况下 (恶意或者非恶 意), MTC Server 1请求 3GPP网络对 MTC终端 D进行触发。 这是一种越权操作行为, 可 能引发安全性问题。 发明内容
本发明实施例提供一种 MTC服务器权限验证控制方法、 系统及装置, 以实现对 MTC 服务器的权限验证。
一种 MTC服务器权限验证控制方法, 包括:
接收机器类通信 MTC服务器发送的对 MTC终端的操作请求;
根据所述操作请求确定所述 MTC服务器的标识、所述 MTC终端的标识以及操作类型; 根据所述 MTC服务器的标识、 所述 MTC终端的标识以及所述操作类型对所述 MTC 服务器进行权限验证;
在验证通过后执行所述 MTC服务器请求的操作。
一种 MTC服务器权限验证控制方法, 包括:
接收机器类通信交互工作功能实体 MTC-IWF发送的携带所述机器类通信 MTC服务 器的标识、 所述 MTC终端的标识以及所述操作类型的验证请求消息;
对所述 MTC服务器进行权限验证后 , 向所述 MTC-IWF返回权限验证结果。
一种 MTC服务器权限验证控制装置, 包括:
接收单元, 用于接收机器类通信 MTC服务器发送的对 MTC终端的操作请求; 确定单元, 用于根据所述操作请求确定所述 MTC服务器的标识、所述 MTC终端的标 识以及操作类型;
验证单元, 用于根据所述 MTC服务器的标识、 所述 MTC终端的标识以及所述操作类 型对所述 MTC服务器进行权限验证;
执行单元, 用于在验证通过后执行所述 MTC服务器请求的操作。
一种 MTC服务器权限验证控制装置, 包括:
验证请求接收单元, 用于接收机器类通信交互工作功能实体 MTC-IWF发送的携带所 述机器类通信 MTC服务器的标识、 MTC终端的标识以及操作类型的验证请求消息; 权限验证单元, 用于对所述 MTC服务器进行权限验证;
结果反馈单元, 用于向所述 MTC-IWF返回权限验证结果。
一种 MTC服务器权限验证控制系统, 包括:
机器类通信交互工作功能实体 MTC-IWF,用于接收机器类通信 MTC服务器发送的对
MTC终端的操作请求; 根据所述操作请求确定所述 MTC服务器的标识、 所述 MTC终端 的标识以及操作类型; 发送携带所述 MTC终端标识的签约信息请求, 并接收返回的所述 MTC终端的签约信息; 根据所述签约信息中的 MTC服务器的标识和操作类型对所述发送 操作请求的 MTC服务器进行权限验证; 在验证通过后执行所述 MTC服务器请求的操作; 归属位置登记器 /归属用户服务器 HLR/HSS ,用于接收所述 MTC-IWF发送的签约信息 请求, 并根据所述 MTC终端标识向所述 MTC-IWF返回所述 MTC终端的签约信息。
一种 MTC服务器权限验证控制系统, 包括:
机器类通信交互工作功能实体 MTC-IWF,用于接收机器类通信 MTC服务器发送的对 MTC终端的操作请求; 根据所述操作请求确定所述 MTC服务器的标识、 所述 MTC终端 的标识以及操作类型; 发送携带所述 MTC服务器的标识、所述 MTC终端的标识以及所述 操作类型的验证请求消息, 并接收权限验证结果; 在验证通过后执行所述 MTC服务器请 求的操作;
认证、 授权和计费 AAA服务器, 用于接收 MTC-IWF发送的携带所述 MTC服务器的 标识、所述 MTC终端的标识以及所述操作类型的验证请求消息; 对所述 MTC服务器进行 权限验证; 向所述 MTC-IWF返回权限验证结果。
本发明实施例提供一种 MTC服务器权限验证控制方法、 系统及装置, 使得 3GPP网 络在接收到 MTC Server的操作请求后,根据 MTC Server标识、 MTC终端的标识以及操作 类型对 MTC Server进行权限验证, 并在验证通过后执行该 MTC Server请求的操作 , 从而 实现对 MTC服务器权限验证。 附图说明
图 1为现有技术中 MTC网络结构示意图;
图 2为本发明实施例提供的 MTC服务器权限验证控制方法流程图之一;
图 3为本发明实施例中对应于实施例一的 MTC服务器权限验证控制方法流程图 图 4为本发明实施例中对应于实施例二的 MTC服务器权限验证控制方法流程图 图 5为本发明实施例中对应于实施例三的 MTC服务器权限验证控制方法流程图 图 6为本发明实施例提供的 MTC服务器权限验证控制方法流程图之二;
图 7为本发明实施例提供的 MTC服务器权限验证控制装置结构示意图之一; 图 8为本发明实施例提供的 MTC服务器权限验证控制装置结构示意图之二; 图 9为本发明实施例提供的 MTC服务器权限验证控制系统结构示意图之一; 图 10为本发明实施例提供的 MTC服务器权限验证控制系统结构示意图之二。 具体实施方式
本发明实施例提供一种 MTC服务器权限验证控制方法、 系统及装置, 使得 3GPP网 络在接收到 MTC Server的操作请求后,根据 MTC Server标识、 MTC终端的标识以及操作 类型对 MTC Server进行权限验证, 并在验证通过后执行该 MTC Server请求的操作 , 从而 实现对 MTC服务器权限验证。
在 MTC Server对 M2M终端进行操作的过程中, 为了保证通信的安全, 3 GPP网络实 体需要验证 MTC Server所发送指令的合法性, 判断该 MTC Server是否有权对特定终端发 起操作控制, 仅接受授权 MTC Server的请求。
如图 2所示, 本发明实施例提供的 MTC服务器权限验证控制方法包括:
步骤 S201、 接收 MTC服务器发送的对 MTC终端的操作请求;
步骤 S202、 根据操作请求确定 MTC服务器的标识、 MTC终端的标识以及操作类型; 步骤 S203、根据 MTC服务器的标识、 MTC终端的标识以及操作类型对 MTC服务器 进行权限验证;
步骤 S204、 在验证通过后执行 MTC服务器请求的操作。
上述方法的执行主体可以是 3GPP网络中的 MTC-IWF。由于 3GPP网络中的 MTC-IWF 在接收到操作请求后, 根据 MTC服务器的标识、 MTC终端的标识以及操作类型对 MTC 服务器进行了权限验证, 并仅在验证通过时执行该 MTC服务器请求的操作, 进而保证了 通信的安全性, 避免了不具有操作权限的 MTC服务器对 MTC终端发出操作请求。
在验证没有通过时, MTC-IWF还可以进一步向 MTC服务器返回拒绝消息以及拒绝原 因, 在返回拒绝消息以及拒绝原因时, 可以根据约定仅返回原因值, MTC服务器接收到原 因值后, 即可确定验证未通过, 并根据原因值确定拒绝原因。
步骤 S202中确定的 MTC服务器的标识和 MTC终端的标识, 具体可以是从操作请求 中读取到的。
MTC-IWF在根据 MTC服务器的标识、 MTC终端的标识以及操作类型对 MTC服务 器进行权限验证前, 若发现操作请求中携带的 MTC终端的标识为 3GPP网络不能识别的 标识时, 可以将 MTC终端的标识转换为 3GPP网络能够识别的标识, 以便于进一步识别 该 MTC终端的标识。 通常情况下, 全域名 (Fully Qualified Domain Name, FQDN ), 统一 资源名 (Uniform Resource Name, URN ), 会话初始协议统一资源标识( Session Initiation Protocol Uniform Resource Identity, SIP URI )等标识是 3GPP网络不能识别的, 国际移动 用户标识 ( International Mobile Subscriber Identity, IMSI ), 移动用户 ISDN ( Mobile Subscriber ISDN, MSISDN ),全球唯一临时标识( Globally Unique Temporary Identity, GUTI ) 等标识 3GPP网络能够识别。
步骤 S202中的操作类型可以在操作请求中通过专用的信息单元( Information Element, IE )以显式的方式来表示, 也可以通过操作请求的类型以隐式的方法来表示。 例如: MTC Server在需要对 MTC device发起触发时, 向 MTC-IWF发送的是触发请求消息, 其中携带 终端标识和 MTC Server标识, 此时, 操作请求的类型即为隐式表示。 若 MTC Server在需 要对 MTC device发起触发时,向 MTC-IWF发送的是操作请求,其中携带终端标识和 MTC Server标识以及操作类型时, 即为显示标识, 此例中, 操作类型为触发。
在步骤 S203中,根据 MTC服务器的标识、 MTC终端的标识以及操作类型对 MTC服 务器进行权限验证可以由 MTC-IWF执行, 也可以由 MTC-IWF请求其它服务器执行, 下 面通过几个具体的实施例进行说明。
实施例一、
MTC-IWF通过自身存储的签约信息直接根据 MTC服务器的标识、 MTC终端的标识 以及操作类型对 MTC服务器进行权限验证。
此时,步骤 S203中,根据 MTC服务器的标识、 MTC终端的标识以及操作类型对 MTC 服务器进行权限验证, 具体包括: 根据 MTC终端标识获得 MTC终端的签约信息; 根据签 约信息中的 MTC服务器的标识、 操作类型对发送操作请求的 MTC服务器进行权限验证。
具体的, 如图 3所示, MTC服务器权限验证控制方法包括:
步骤 S301、 MTC-IWF接收 MTC服务器发送的对 MTC终端的操作请求;
步骤 S302、 在接收到操作请求后, MTC-IWF对该操作请求进行处理。 根据操作请求 确定 MTC服务器的标识、 MTC终端的标识以及操作类型, 当 MTC Server使用 3 GPP网络 所不能识别的标识作为 MTC终端标识时, MTC-IWF将其映射为 3GPP网络内部可用的标 识;
步骤 S303、根据 MTC服务器的标识、 MTC终端的标识以及操作类型对 MTC服务器 进行权限验证, 此时, MTC-IWF才艮据本地维护的 MTC终端的签约信息、 MTC 服务器授权信息以及触发请求消息中提供的 MTC Server标识、 MTC终端的 标识、 操作类型即可对 MTC Server操作权限进行验证;
步骤 S304、 若验证通过, 则执行 MTC服务器的操作;
步骤 S305、 若验证未通过, 则拒绝 MTC服务器的操作请求, 向 MTC服务器发送原 因值。
实施例二、
在 MTC-IWF 和归属位置登记器 /归属用户服务器 (Home Location Register/Home Subscriber Server, HLR/HSS )之间建立接口, 用于传输验证请求信息。 HLR/HSS在保存 的 MTC device签约信息中记录授权 MTC Server的名称 /标识 /地址, 以及授权允许该 MTC Server对终端所进行的操作。
在接收到 MTC Server发送的操作请求时, MTC-IWF根据操作请求中携带的 MTC终 端标识向 HLR/HSS发起终端签约信息获取过程, 请求获取终端的签约信息。 之后, 利用 签约信息, MTC-IWF根据操作请求中携带的 MTC Server的名称 /标识 /地址信息判断发起 请求的 MTC Server是否经过合法授权, 并根据操作请求中携带的操作类型判断该 MTC Server是否有权对目标 MTC device发起所请求的操作。 如果操作请求通过权限验证, MTC-IWF则继续后续处理, 按照 MTC Server的请求在 3GPP网络内部发起操作; 否则, 返回拒绝指令消息, 拒绝 MTC Server的请求, 并返回原因值。
此时,步骤 S203中,根据 MTC服务器的标识、 MTC终端的标识以及操作类型对 MTC 服务器进行权限验证, 具体包括: 根据 MTC终端标识获得 MTC终端的签约信息; 根据签 约信息中的 MTC服务器的标识、 操作类型对发送操作请求的 MTC服务器进行权限验证。 其中, 根据 MTC终端标识获得 MTC终端的签约信息, 具体包括: 向 HLR/HSS发送携带 MTC终端标识的签约信息请求, 并接收 HLR/HSS返回的 MTC终端的签约信息。
具体的, 如图 4所示, MTC服务器权限验证控制方法包括:
步骤 S401、 MTC-IWF接收 MTC服务器发送的对 MTC终端的操作请求;
步骤 S402、 在接收到操作请求后, MTC-IWF对该操作请求进行处理。 根据操作请求 确定 MTC服务器的标识、 MTC终端的标识以及操作类型, 当 MTC Server使用 3 GPP网络 所不能识别的标识作为 MTC终端标识时, MTC-IWF将其映射为 3GPP网络内部可用的标 识;
步骤 S403、 MTC-IWF向 HLR/HSS发送签约信息请求, 请求获取目标终端的签约信 息, 签约信息请求中携带 3GPP网络内部可用的 MTC终端标识;
步骤 S404、 HLR/HSS进行签约信息应答,将 MTC终端的签约信息返回给 MTC-IWF; 步骤 S405、 MTC-IWF根据签约信息以及操作请求中提供的 MTC Server标识、操作类 型对 MTC Server操作权限进行验证;
步骤 S406、 若验证通过, 则执行 MTC服务器的操作;
步骤 S407、 若验证未通过, 则拒绝 MTC服务器的操作请求, 向 MTC服务器发送原 因值。
实施例三、
在 MTC-IWF和认证、授权和计费月艮务器 ( Authentication, Authorization and Accounting
Server, AAA Server )之间增加接口,用于传输验证请求信息。 HLR/HSS在保存的 MTC device 签约信息中记录授权 MTC Server的名称 /标识 /地址, 以及授权允许该 MTC Server对终端 所进行的操作。
AAA Server是在 3 GPP网络中与 HLR/HSS连接的用于进行权限认证的服务器, 在该 实施例中, 由 AAA Server执行 MTC Server的权限-验证。
在该实施例中, MTC-IWF在接收到 MTC Server发送的操作请求时, MTC-IWF根据 操作请求中携带的 MTC终端标识, MTC Server名称 /标识 /地址, 操作类型等信息生成验 证请求消息, 并发送给 AAA Server, 请求 AAA Server对 MTC Server权限的合法性进行验 证。
AAA Server根据验证请求消息中提供的 MTC终端标识首先向 HLR/HSS发起终端签 约信息获取过程, 请求获取终端的签约信息。 之后, 根据响应得到的签约信息以及验证请 求消息中携带的 MTC Server的名称 /标识 /地址信息, AAA Server判断发起请求的 MTC Server是否经过合法授权,并根据验证请求消息中携带的操作类型判断该 MTC Server是否 有权对目标 MTC device发起所请求的操作。 最后, AAA Server通过验证应答消息将验证 结果返回给 MTC-IWF。
根据返回的验证结果, MTC-IWF 决定后续操作。 如果验证结果为通过权限验证,
MTC-IWF则继续后续处理, 按照 MTC Server的请求在 3GPP网络内部发起操作; 否则, 返回拒绝指令消息, 拒绝 MTC Server的请求, 并返回原因值。
具体的, 如图 5所示, MTC服务器权限验证控制方法包括:
步骤 S501、 MTC-IWF接收 MTC服务器发送的对 MTC终端的操作请求;
步骤 S502、 在接收到操作请求后, MTC-IWF对该操作请求进行处理。 根据操作请求 确定 MTC服务器的标识、 MTC终端的标识以及操作类型, 当 MTC Server使用 3 GPP网络 所不能识别的标识作为 MTC终端标识时, MTC-IWF将其映射为 3GPP网络内部可用的标 识;
步骤 S503、 MTC-IWF生成验证请求消息, 并向 AAA Server发送, 该验证请求消息中 包括 3GPP网络内部可用的 MTC终端标识、 MTC Server标识以及请求操作类型;
步骤 S504、 AAA Server使用验证请求消息中提供的 MTC终端标识向 HLR/HSS发送 签约信息请求, 请求获取目标终端的签约信息;
步骤 S505、HLR/HSS进行签约信息应答,将 MTC终端的签约信息返回给 AAA Server; 步骤 S506、 AAA Server根据签约信息以及验证请求消息中提供的 MTC Server标识, 操作类型对 MTC Server操作权限进行验证;
步骤 S507、 AAA Server通过验证应答消息将验证结果返回给 MTC-IWF;
步骤 S508、 若验证通过, 则执行 MTC服务器的操作;
步骤 S509、 若验证未通过, 则拒绝 MTC服务器的操作请求, 向 MTC服务器发送原 因值。
针对 AAA服务器, 如图 6所示, 本发明实施例提供的 MTC服务器权限验证控制方法 包括:
步骤 S601、接收 MTC-IWF发送的携带 MTC服务器的标识、 MTC终端的标识以及操 作类型的验证请求消息;
步骤 S602、 对 MTC服务器进行权限验证后 , 向 MTC-IWF返回权限验证结果。
其中, AAA服务器对 MTC服务器进行权限验证, 具体包括: 根据 MTC终端标识获得 MTC终端的签约信息;
根据签约信息中的 MTC服务器的标识、操作类型对发送操作请求的 MTC服务器进行 权限验证。
同样的, 根据 MTC终端标识获得 MTC终端的签约信息, 具体包括:
向 HLR/HSS发送携带 MTC终端标识的签约信息请求,并接收 HLR/HSS返回的 MTC 终端的签约信息。
本发明实施例还相应提供一种 MTC 服务器权限验证控制装置, 该装置可以具体为 MTC-IWF, 如图 7所示, 该装置包括:
接收单元 701 , 用于接收 MTC服务器发送的对 MTC终端的操作请求;
确定单元 702, 用于根据操作请求确定 MTC服务器的标识、 MTC终端的标识以及操 作类型;
验证单元 703 , 用于根据 MTC服务器的标识、 MTC终端的标识以及操作类型对 MTC 服务器进行权限验证;
执行单元 704, 用于在验证通过后执行 MTC服务器的操作。
在验证没有通过时, MTC-IWF还可以进一步向 MTC服务器返回拒绝消息以及拒绝原 因, 此时, 该装置中还包括:
拒绝单元, 用于在验证没有通过时, 向 MTC服务器返回拒绝消息以及拒绝原因。 其中, 对应于实施例一和实施例二, -验证单元 703具体用于:
根据 MTC终端标识获得 MTC终端的签约信息;
根据签约信息中的 MTC服务器的标识、操作类型对发送操作请求的 MTC服务器进行 权限验证。
对应于实施例三, 验证单元 703具体用于:
向 AAA服务器发送携带 MTC服务器的标识、 MTC终端的标识以及操作类型的验证 对应于实施例二, 验证单元 703具体用于:
向 HLR/HSS发送携带 MTC终端标识的签约信息请求,并接收 HLR/HSS返回的 MTC 终端的签约信息;
根据签约信息中的 MTC服务器的标识、操作类型对发送操作请求的 MTC服务器进行 权限验证。
MTC-IWF在根据 MTC服务器的标识、 MTC终端的标识以及操作类型对 MTC服务 器进行权限验证前, 若发现操作请求中携带的 MTC终端的标识为 3GPP网络不能识别的 标识时, 可以将 MTC终端的标识转换为 3GPP网络能够识别的标识, 以便于进一步识别 该 MTC终端的标识。 此时, 验证单元 703还用于: 当操作请求中携带的 MTC终端的标识为 3GPP网络不能识别的标识时, 在根据 MTC 服务器的标识、 MTC终端的标识以及操作类型对 MTC服务器进行权限验证前, 将 MTC 终端的标识转换为 3GPP网络能够识别的标识。
本发明实施例还相应提供一种 MTC 服务器权限验证控制装置, 该装置可以具体为 AAA服务器, 如图 8所示, 该装置中包括:
验证请求接收单元 801 , 用于接收 MTC-IWF发送的携带 MTC服务器的标识、 MTC 终端的标识以及操作类型的验证请求消息;
权限验证单元 802, 用于对 MTC服务器进行权限验证;
结果反馈单元 803 , 用于向 MTC-IWF返回权限验证结果。
其中, 权限验证单元 802具体用于:
根据 MTC终端标识获得 MTC终端的签约信息;
根据签约信息中的 MTC服务器的标识、操作类型对验证请求消息中携带的 MTC服务 器的标识所对应的 MTC服务器进行权限验证。
同样的, 当需要从 HLR/HSS获得 MTC终端的签约信息时, 权限验证单元 802具体用 于:
向 HLR/HSS发送携带 MTC终端标识的签约信息请求,并接收 HLR/HSS返回的 MTC 终端的签约信息;
根据签约信息中的 MTC服务器的标识、操作类型对验证请求消息中携带的 MTC服务 器的标识所对应的 MTC服务器的 MTC服务器进行权限验证。
对应于实施例二, 本发明实施例还提供一种 MTC服务器权限验证控制系统, 如图 9 所示, 包括:
MTC-IWF901 , 用于接收机器类通信 MTC服务器发送的对 MTC终端的操作请求; 根 据操作请求确定 MTC服务器的标识、 MTC终端的标识以及操作类型; 发送携带 MTC终 端标识的签约信息请求, 并接收返回的 MTC终端的签约信息; 根据签约信息中的 MTC服 务器的标识、 操作类型对发送操作请求的 MTC服务器进行权限验证; 在验证通过后执行 MTC服务器请求的操作;
HLR/HSS902, 用于接收 MTC-IWF901发送的签约信息请求, 并根据 MTC终端标识 向 MTC-IWF901返回 MTC终端的签约信息。
在验证没有通过时, MTC-IWF901还可以进一步向 MTC服务器返回拒绝消息以及拒 绝原因, 此时, MTC-IWF901还用于:
在验证没有通过时, 向 MTC服务器返回拒绝消息以及拒绝原因。
MTC-IWF在根据 MTC服务器的标识、 MTC终端的标识以及操作类型对 MTC服务 器进行权限验证前, 若发现操作请求中携带的 MTC终端的标识为 3GPP网络不能识别的 标识时, 可以将 MTC终端的标识转换为 3GPP网络能够识别的标识, 以便于进一步识别 该 MTC终端的标识。 此时, MTC-IWF901还用于:
当操作请求中携带的 MTC终端的标识为 3GPP网络不能识别的标识时, 在发送携带 MTC终端标识的签约信息请求前,将 MTC终端的标识转换为 3GPP网络能够识别的标识。
对应于实施例三, 本发明实施例还提供一种 MTC服务器权限验证控制系统, 如图 10 所示, 包括:
MTC-IWF1001 , 用于接收机器类通信 MTC服务器发送的操作请求; 根据操作请求确 定 MTC服务器的标识、 MTC终端的标识以及操作类型; 发送携带 MTC服务器的标识、 MTC终端的标识以及操作类型的验证请求消息, 并接收权限验证结果;在验证通过后执行 所述 MTC服务器请求的操作请求;
AAA服务器 1002, 用于接收 MTC-IWF发送的携带 MTC服务器的标识、 MTC终端 的标识以及操作类型的验证请求; 对 MTC服务器进行权限验证; 向 MTC-IWF返回权限 验证结果。
AAA服务器 1002对 MTC服务器进行权限验证, 具体包括:
根据 MTC终端标识获得 MTC终端的签约信息;
根据签约信息中的 MTC服务器的标识、操作类型对发送操作请求的 MTC服务器进行 权限验证。
进一步, AAA服务器 1002可以从 HLR/HSS中获取 MTC终端的签约信息, 此时, 系 统中还包括:
HLR/HSS, 用于接收 AAA服务器 1002发送的签约信息请求, 并根据 MTC终端标识 向 AAA服务器 1002返回 MTC终端的签约信息;
AAA服务器 1002根据 MTC终端标识获得 MTC终端的签约信息, 具体包括: 向 HLR/HSS发送携带 MTC终端标识的签约信息请求,并接收 HLR/HSS返回的 MTC 终端的签约信息。
本发明实施例提供一种 MTC服务器权限验证控制方法、 系统及装置, 使得 3GPP网 络在接收到 MTC Server的操作请求后,根据 MTC Server标识、 MTC终端的标识以及操作 类型对 MTC Server进行权限验证, 并在验证通过后执行该 MTC Server请求的操作 , 从而 实现对 MTC服务器权限验证。
本领域内的技术人员应明白, 本发明的实施例可提供为方法、 系统、 或计算机程序产 品。 因此, 本发明可釆用完全硬件实施例、 完全软件实施例、 或结合软件和硬件方面的实 施例的形式。 而且, 本发明可釆用在一个或多个其中包含有计算机可用程序代码的计算机 可用存储介盾 (包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形 式。 本发明是参照根据本发明实施例的方法、 设备(系统)、 和计算机程序产品的流程图 和 /或方框图来描述的。 应理解可由计算机程序指令实现流程图和 /或方框图中的每一流 程和 /或方框、 以及流程图和 /或方框图中的流程和 /或方框的结合。 可提供这些计算机 程序指令到通用计算机、 专用计算机、 嵌入式处理机或其他可编程数据处理设备的处理器 以产生一个机器, 使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用 于实现在流程图一个流程或多个流程和 /或方框图一个方框或多个方框中指定的功能的 装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方 式工作的计算机可读存储器中, 使得存储在该计算机可读存储器中的指令产生包括指令装 置的制造品, 该指令装置实现在流程图一个流程或多个流程和 /或方框图一个方框或多个 方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上, 使得在计算机 或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理, 从而在计算机或其他 可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和 /或方框图一个 方框或多个方框中指定的功能的步骤。
显然, 本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和 范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内, 则本发明也意图包含这些改动和变型在内。

Claims

权 利 要 求
1、 一种机器类通信 MTC服务器权限验证控制方法, 其特征在于, 包括:
接收 MTC服务器发送的对 MTC终端的操作请求;
根据所述操作请求确定所述 MTC服务器的标识、所述 MTC终端的标识以及操作类型; 根据所述 MTC服务器的标识、 所述 MTC终端的标识以及所述操作类型对所述 MTC 服务器进行权限验证;
在权限验证通过后执行所述 MTC服务器请求的操作。
2、 如权利要求 1所述的方法, 其特征在于, 还包括:
在权限验证没有通过时, 向所述 MTC服务器返回拒绝消息以及拒绝原因。
3、 如权利要求 1所述的方法, 其特征在于, 所述根据所述 MTC服务器的标识、 所 述 MTC终端的标识以及所述操作类型对 MTC服务器进行权限验证, 具体包括:
根据所述 MTC终端标识获得所述 MTC终端的签约信息;
根据所述签约信息中的 MTC服务器的标识和操作类型对发送所述操作请求的 MTC服 务器进行权限验证。
4、 如权利要求 1所述的方法, 其特征在于, 所述根据所述 MTC服务器的标识、 所述
MTC终端的标识以及所述操作类型对所述 MTC服务器进行权限验证, 具体包括:
向认证、 授权和计费 AAA服务器发送携带所述 MTC服务器的标识、 所述 MTC终端 的标识以及所述操作类型的验证请求消息,并接收所述 AAA服务器对所述 MTC服务器进 行权限验证后返回的权限验证结果。
5、 如权利要求 3 所述的方法, 其特征在于, 所述根据所述 MTC终端标识获得所述
MTC终端的签约信息, 具体包括:
向归属位置登记器 /归属用户服务器 HLR/HSS发送携带所述 MTC终端标识的签约信 息请求, 并接收所述 HLR/HSS返回的所述 MTC终端的签约信息。
6、 如权利要求 1所述的方法, 其特征在于, 在所述根据所述 MTC服务器的标识、 所述 MTC终端的标识以及所述操作类型对所述 MTC服务器进行权限验证前, 还包括: 当所述操作请求中携带的 MTC终端的标识为第三代合作项目 3GPP网络不能识别的 标识时, 将所述 MTC终端的标识转换为 3GPP网络能够识别的标识。
7、 一种机器类通信 MTC服务器权限验证控制方法, 其特征在于, 包括:
接收机器类通信交互工作功能实体 MTC-IWF发送的携带所述 MTC服务器的标识、 MTC终端的标识以及操作类型的验证请求消息;
对所述 MTC服务器进行权卩艮险证后, 向所述 MTC-IWF返回权限验证结果。
8、 如权利要求 7所述的方法, 其特征在于, 所述对所述 MTC服务器进行权限验证, 具体包括:
根据所述 MTC终端标识获得所述 MTC终端的签约信息;
根据所述签约信息中的 MTC服务器的标识、 操作类型对所述验证请求消息中携带的 MTC服务器的标识所对应的 MTC服务器进行权限验证。
9、 如权利要求 8 所述的方法, 其特征在于, 所述根据所述 MTC终端标识获得所述
MTC终端的签约信息, 具体包括:
向归属位置登记器 /归属用户服务器 HLR/HSS发送携带所述 MTC终端标识的签约信 息请求, 并接收所述 HLR/HSS返回的所述 MTC终端的签约信息。
10、 一种机器类通信 MTC服务器权限验证控制装置, 其特征在于, 包括: 接收单元, 用于接收 MTC服务器发送的对 MTC终端的操作请求;
确定单元, 用于根据所述操作请求确定所述 MTC服务器的标识、所述 MTC终端的标 识以及操作类型;
验证单元, 用于根据所述 MTC服务器的标识、 所述 MTC终端的标识以及所述操作类 型对 MTC服务器进行权限验证;
执行单元, 用于在权限验证通过后执行所述 MTC服务器请求的操作。
11、 如权利要求 10所述的装置, 其特征在于, 还包括:
拒绝单元, 用于在权限验证没有通过时, 向所述 MTC服务器返回拒绝消息以及拒绝 原因。
12、 如权利要求 10所述的装置, 其特征在于, 所述验证单元具体用于:
根据所述 MTC终端标识获得所述 MTC终端的签约信息;
根据所述签约信息中的 MTC服务器的标识和操作类型对发送所述操作请求的 MTC服 务器进行权限验证。
13、 如权利要求 10所述的装置, 其特征在于, 所述验证单元具体用于:
向认证、 授权和计费 AAA服务器发送携带所述 MTC服务器的标识、 所述 MTC终端 的标识以及所述操作类型的验证请求消息,并接收所述 AAA服务器对所述 MTC服务器进 行权限验证后返回的权限验证结果。
14、 如权利要求 12 所述的装置, 其特征在于, 所述验证单元具体用于: 按照如下方 法根据所述 MTC终端标识获得所述 MTC终端的签约信息:
向归属位置登记器 /归属用户服务器 HLR/HSS发送携带所述 MTC终端标识的签约信 息请求, 并接收所述 HLR/HSS返回的所述 MTC终端的签约信息。
15、 如权利要求 10所述的装置, 其特征在于, 所述验证单元还用于:
当所述操作请求中携带的 MTC终端的标识为第三代合作项目 3GPP网络不能识别的 标识时,在所述根据所述 MTC服务器的标识、 所述 MTC终端的标识以及所述操作类型对 所述 MTC服务器进行权限验证前,将所述 MTC终端的标识转换为 3GPP网络能够识别的 标识。
16、 一种机器类通信 MTC服务器权限验证控制装置, 其特征在于, 包括: 验证请求接收单元, 用于接收机器类通信交互工作功能实体 MTC-IWF发送的携带所 述 MTC服务器的标识、 MTC终端的标识以及操作类型的验证请求消息;
权限验证单元, 用于对所述 MTC服务器进行权限验证;
结果反馈单元, 用于向所述 MTC-IWF返回权限验证结果。
17、 如权利要求 16所述的装置, 其特征在于, 所述权限验证单元具体用于: 根据所述 MTC终端标识获得所述 MTC终端的签约信息;
根据所述签约信息中的 MTC服务器的标识和操作类型对所述验证请求消息中携带的
MTC服务器的标识所对应的 MTC服务器进行权限验证。
18、 如权利要求 17 所述的装置, 其特征在于, 所述权限验证单元具体用于: 按照如 下方法根据所述 MTC终端标识获得所述 MTC终端的签约信息:
向归属位置登记器 /归属用户服务器 HLR/HSS发送携带所述 MTC终端标识的签约信 息请求, 并接收所述 HLR/HSS返回的所述 MTC终端的签约信息。
19、 一种机器类通信 MTC服务器权限验证控制系统, 其特征在于, 包括: 机器类通信交互工作功能实体 MTC-IWF, 用于接收 MTC服务器发送的对 MTC终端 的操作请求; 根据所述操作请求确定所述 MTC服务器的标识、所述 MTC终端的标识以及 操作类型; 发送携带所述 MTC终端标识的签约信息请求, 并接收返回的所述 MTC终端的 签约信息; 根据所述签约信息中的 MTC服务器的标识和操作类型对所述发送操作请求的 MTC服务器进行权限验证; 在验证通过后执行所述 MTC服务器请求的操作;
归属位置登记器 /归属用户服务器 HLR/HSS,用于接收所述 MTC-IWF发送的签约信息 请求, 并根据所述 MTC终端标识向所述 MTC-IWF返回所述 MTC终端的签约信息。
20、 如权利要求 19所述的系统, 其特征在于, 所述 MTC-IWF还用于:
在验证没有通过时, 向所述 MTC服务器返回拒绝消息以及拒绝原因。
21、 如权利要求 19所述的系统, 其特征在于, 所述 MTC-IWF还用于:
当所述操作请求中携带的 MTC终端的标识为第三代合作项目 3GPP网络不能识别的 标识时,在发送携带所述 MTC终端标识的签约信息请求前, 将所述 MTC终端的标识转换 为 3GPP网络能够识别的标识。
22、 一种机器类通信 MTC服务器权限验证控制系统, 其特征在于, 包括: 机器类通信交互工作功能实体 MTC-IWF, 用于接收 MTC服务器发送的对 MTC终端 的操作请求; 根据所述操作请求确定所述 MTC服务器的标识、所述 MTC终端的标识以及 操作类型; 发送携带所述 MTC服务器的标识、 所述 MTC终端的标识以及所述操作类型的 验证请求消息, 并接收权限验证结果; 在验证通过后执行所述 MTC服务器请求的操作; 认证、 授权和计费 AAA服务器, 用于接收 MTC-IWF发送的携带所述 MTC服务器的 标识、所述 MTC终端的标识以及所述操作类型的验证请求消息; 对所述 MTC服务器进行 权限验证; 向所述 MTC-IWF返回权限验证结果。
23、 如权利要求 22所述的系统, 其特征在于, 所述 AAA服务器对 MTC服务器进行 权限验证, 具体包括:
根据所述 MTC终端标识获得所述 MTC终端的签约信息;
根据所述签约信息中的 MTC服务器的标识、操作类型对所述发送操作请求的 MTC服 务器进行权限验证。
24、 如权利要求 23所述的系统, 其特征在于, 还包括:
归属位置登记器 /归属用户服务器 HLR/HSS,用于接收所述 AAA服务器发送的签约信 息请求, 并根据所述 MTC终端标识向所述 AAA服务器返回所述 MTC终端的签约信息; 所述 AAA服务器根据所述 MTC终端标识获得所述 MTC终端的签约信息,具体包括: 向所述 HLR/HSS发送携带所述 MTC终端标识的签约信息请求,并接收所述 HLR/HSS 返回的所述 MTC终端的签约信息。
PCT/CN2012/080044 2011-08-12 2012-08-13 一种mtc服务器权限验证控制方法、系统及装置 WO2013023566A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110231136XA CN102263793A (zh) 2011-08-12 2011-08-12 一种mtc服务器权限验证控制方法、系统及装置
CN201110231136.X 2011-08-12

Publications (1)

Publication Number Publication Date
WO2013023566A1 true WO2013023566A1 (zh) 2013-02-21

Family

ID=45010247

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/080044 WO2013023566A1 (zh) 2011-08-12 2012-08-13 一种mtc服务器权限验证控制方法、系统及装置

Country Status (2)

Country Link
CN (1) CN102263793A (zh)
WO (1) WO2013023566A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102263793A (zh) * 2011-08-12 2011-11-30 电信科学技术研究院 一种mtc服务器权限验证控制方法、系统及装置
CN103152729B (zh) * 2011-12-07 2018-05-22 中兴通讯股份有限公司 一种mtc设备的连接控制方法及系统
CN103188616B (zh) * 2011-12-31 2017-10-27 中兴通讯股份有限公司 一种终端组的管理方法和系统
CN103220642B (zh) * 2012-01-19 2016-03-09 华为技术有限公司 一种短消息的安全处理方法和装置
CN103227991A (zh) * 2012-01-29 2013-07-31 中兴通讯股份有限公司 Mtc设备的触发方法、装置及系统
CN108111994B (zh) * 2012-04-20 2021-06-04 华为技术有限公司 Mtc设备通信方法及设备、系统
CN103581895B (zh) * 2012-08-03 2019-09-24 中兴通讯股份有限公司 基于mtc设备组的触发方法及系统
CN103975643B (zh) * 2012-11-30 2018-05-11 华为技术有限公司 认证方法和装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902756A (zh) * 2009-05-27 2010-12-01 中兴通讯股份有限公司 M2m业务平台及其工作方法
CN102137105A (zh) * 2011-03-11 2011-07-27 华为技术有限公司 机器通信的私密性保护方法、系统和机器通信业务管理实体及相关设备
CN102263793A (zh) * 2011-08-12 2011-11-30 电信科学技术研究院 一种mtc服务器权限验证控制方法、系统及装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045690A (zh) * 2009-10-09 2011-05-04 中兴通讯股份有限公司 获取物联网设备签约信息的方法及物联网服务器

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902756A (zh) * 2009-05-27 2010-12-01 中兴通讯股份有限公司 M2m业务平台及其工作方法
CN102137105A (zh) * 2011-03-11 2011-07-27 华为技术有限公司 机器通信的私密性保护方法、系统和机器通信业务管理实体及相关设备
CN102263793A (zh) * 2011-08-12 2011-11-30 电信科学技术研究院 一种mtc服务器权限验证控制方法、系统及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PANASONIC: "Selection of trigger delivery mechanism", 3GPP SA WG2 MEETING #86 S2-113305, 11 July 2011 (2011-07-11), NAANTALI, FINLAND, pages 1 - 5 *

Also Published As

Publication number Publication date
CN102263793A (zh) 2011-11-30

Similar Documents

Publication Publication Date Title
US11431695B2 (en) Authorization method and network element
WO2013023566A1 (zh) 一种mtc服务器权限验证控制方法、系统及装置
CN108512862B (zh) 基于无证书标识认证技术的物联网终端安全认证管控平台
JP6033291B2 (ja) サービスアクセス認証方法およびシステム
KR101536489B1 (ko) 로밍 네트워크 내의 액세스 단말 아이덴티티의 인증
JP6655616B2 (ja) 移動端末間の通信の確立
EP2852118B1 (en) Method for an enhanced authentication and/or an enhanced identification of a secure element located in a communication device, especially a user equipment
WO2011127810A1 (zh) 对通信设备进行认证的方法和装置
EP3180934B1 (en) Methods and nodes for mapping subscription to service user identity
WO2013113162A1 (en) Group based bootstrapping in machine type communication
DK2924944T3 (en) Presence authentication
WO2015061977A1 (en) User authentication
US9571480B1 (en) Authentication methods and apparatus
WO2019056971A1 (zh) 一种鉴权方法及设备
WO2013185709A1 (zh) 一种呼叫认证方法、设备和系统
CN102694779A (zh) 组合认证系统及认证方法
EP2961208A1 (en) Method for accessing a service and corresponding application server, device and system
CN106487776B (zh) 一种保护机器类通信设备的方法、网络实体及系统
US20160149914A1 (en) User Consent for Generic Bootstrapping Architecture
CN107995587B (zh) 认证方法、认证平台以及认证系统和服务商平台
WO2017022643A1 (ja) 通信システム、通信装置、通信方法及びプログラム
WO2018137239A1 (zh) 一种鉴权方法、鉴权服务器和核心网设备
WO2023236925A1 (zh) 一种认证方法和通信装置
WO2018171486A1 (zh) 移动终端位置更新的方法及装置
WO2013113185A1 (zh) 业务签约信息处理方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12824389

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12824389

Country of ref document: EP

Kind code of ref document: A1