WO2014048236A1 - 终端的注册方法及装置 - Google Patents

终端的注册方法及装置 Download PDF

Info

Publication number
WO2014048236A1
WO2014048236A1 PCT/CN2013/083022 CN2013083022W WO2014048236A1 WO 2014048236 A1 WO2014048236 A1 WO 2014048236A1 CN 2013083022 W CN2013083022 W CN 2013083022W WO 2014048236 A1 WO2014048236 A1 WO 2014048236A1
Authority
WO
WIPO (PCT)
Prior art keywords
gateway
terminal peripheral
application
terminal
registration
Prior art date
Application number
PCT/CN2013/083022
Other languages
English (en)
French (fr)
Inventor
吴昊
谢芳
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to US14/431,548 priority Critical patent/US9479477B2/en
Priority to EP13842210.0A priority patent/EP2903321A4/en
Publication of WO2014048236A1 publication Critical patent/WO2014048236A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity

Definitions

  • the present invention relates to the field of communications, and in particular to a method and an apparatus for registering a terminal.
  • BACKGROUND OF THE INVENTION Machine-to-Machine (M2M) communication network extends the communication field and communication field of existing information communication networks, and acquires intelligence and communication capabilities in various possible objects to acquire the physical world. Information, and based on the analysis and processing of this information to enhance and enhance the intelligence, interactivity and automation of existing ICT services.
  • the M2M communication network has multiple network forms, and may be an independent physical network constructed separately, or a logical network built on an existing public communication network and various government-enterprise private networks.
  • the M2M communication network can be divided into three layers in terms of logical functions: the perceptual extension layer, the network/service layer, and the application layer.
  • Perceptual extension layer It mainly realizes the collection, automatic identification and intelligent control of physical world information. The various things in the physical world are not capable of communication. Intelligent nodes such as sensors, actuators, smart devices, and radio frequency identification (RFID) readers collect information in the physical world and exchange information through the communication module and the network layer. The main components it contains are terminal peripheral devices, M2M gateways.
  • Network/service layer The network/service layer supports the transmission, routing and control of the information of the sensing layer, and provides support for the communication of people and things, things and things in the Internet of Things.
  • the network forms specifically included in the network layer are: communication network, Internet, industry network, and so on.
  • the main components it contains are the M2M platform.
  • Application layer The application layer contains various specific IoT applications, ranging from public services to industry services.
  • Industry services can be public services for the public, or industry-specific services that meet specific application needs within the industry.
  • public services are basic services provided to the general public, such as smart homes and mobile payments.
  • Industry-specific services are usually tailor-made for the industry's own needs, for the industry's internal services, such as smart grid, intelligent transportation, intelligent environment, etc.; some of the industry services can also be provided to the public, such as intelligent transportation, known as industry public services.
  • the main components it contains are M2M application servers.
  • Terminal peripherals refer to a single device such as an environment-aware sensor that can send the perceived information to the M2M service platform or M2M application through the M2M gateway, and can also receive the M2M application or the M2M service platform. Downward control over it.
  • M2M Gateway Terminal peripherals cannot communicate directly with the communication network because of their processing capabilities, storage capabilities, and power limitations. They need to access the communication network through the M2M gateway.
  • the M2M gateway can perform protocol conversion between the M2M-aware extension layer and the upper layer network.
  • the M2M gateway can also receive control information from the M2M application or the M2M service platform to manage the terminal peripherals.
  • the M2M platform provides some common capabilities and support to M2M applications and provides an open interface for applications to access and use network resources and capabilities. By shielding the underlying specific network implementation from a specific M2M application, the complexity of the development and deployment of the upper IoT application can be simplified and reduced.
  • the terminal peripheral device must be used normally after the registration is successful, and the M2M gateway in the related art is registered.
  • the process plays a relay role, that is, the M2M gateway forwards the registration request sent by the terminal peripheral to the M2M platform or the M2M application server, but since there is no corresponding measure for verifying the terminal registration request locally,
  • the existing M2M network has problems such as low security and privacy. In view of the above problems in the related art, an effective solution has not yet been proposed.
  • a method for registering a terminal including: after receiving a registration request of a terminal peripheral, the gateway performs authentication and authentication on the terminal peripheral; after the authentication is passed, the gateway sends a pair to the machine.
  • the machine M2M service platform or the M2M application initiates a remote registration request, where the remote registration request is used to request the M2M service platform or the M2M application to register the terminal peripheral to the M2M service platform or the M2M application.
  • the method Before initiating a remote registration request to the M2M service platform or the M2M application, the method includes: the gateway obtaining indication information, where the indication information is used to indicate whether the terminal peripheral supports remote management, and, in the case of supporting remote management, to the M2M service platform or The M2M application initiates a remote registration request.
  • the obtaining the indication information by the gateway includes: the gateway obtaining the indication information from the registration request.
  • the obtaining the indication information by the gateway includes: the gateway obtaining the indication information from the subscription information.
  • the method further includes: the gateway acquiring device description information or/and application description information of the terminal peripheral.
  • the gateway obtains the device description information and/or the application description information of the terminal peripheral, and the method includes: the gateway sends a request message to the terminal peripheral, where the request message is used to request the device description information and/or the application description information; Device description information and/or application description information sent according to the request message.
  • the gateway further includes: the gateway allocates an address or identifier to the terminal peripheral, and saves the terminal peripheral information:
  • the terminal peripheral information includes the following information: terminal peripheral identifier or terminal peripheral address, terminal peripheral status.
  • the method further includes: the gateway sending a registration confirmation message to the terminal peripheral, where the registration confirmation message includes: indication information that the terminal peripheral registration is successful, and the gateway The address or identifier assigned to the terminal peripheral. If the gateway fails to authenticate the terminal peripheral authentication, the gateway sends a registration confirmation message to the terminal peripheral, and the registration confirmation message indicates that the terminal peripheral local registration fails.
  • the method further includes: after receiving the registration failure message, the gateway resends the remote registration request within a predetermined time.
  • a registration device for a terminal which is located in a gateway, and includes: an authentication module, configured to perform authentication and authentication on a terminal peripheral after receiving a registration request of the terminal peripheral;
  • the sending module is configured to initiate a remote registration request to the machine-to-machine M2M service platform or the M2M application after the authentication and authentication is passed, where the remote registration request is used to request the M2M service platform or the M2M application to register the terminal peripheral to the M2M service. Platform or M2M application.
  • the device further includes: an obtaining module, configured to obtain indication information, wherein the indication information is used to indicate whether the terminal peripheral supports remote management, and initiates a remote registration request to the M2M service platform or the M2M application if remote management is supported.
  • an obtaining module configured to obtain indication information, wherein the indication information is used to indicate whether the terminal peripheral supports remote management, and initiates a remote registration request to the M2M service platform or the M2M application if remote management is supported.
  • the technical problems such as security and privacy are not high in network communication, so that the registration of the terminal is verified locally, thereby improving the security and privacy of the M2M network communication.
  • FIG. 1 is a flowchart of a method for registering a terminal according to Embodiment 1 of the present invention
  • FIG. 2 is a block diagram showing a structure of a device for registering a terminal according to Embodiment 1 of the present invention
  • FIG. 3 is a block diagram of a device according to Embodiment 1 of the present invention. Another structural block diagram of the registration device of the terminal;
  • FIG. 1 is a flowchart of a method for registering a terminal according to Embodiment 1 of the present invention
  • FIG. 2 is a block diagram showing a structure of a device for registering a terminal according to Embodiment 1 of the present invention
  • FIG. 3 is a block diagram of a device according to Embodiment 1 of the present invention
  • Another structural block diagram of the registration device of the terminal FIG.
  • FIG. 1 is a flowchart of a method of registering a terminal according to Embodiment 1 of the present invention. As shown in FIG.
  • the method includes: Step S102: After receiving the registration request of the terminal peripheral, the gateway performs authentication and authentication on the terminal peripheral device; Step S104, after the authentication and authentication is passed, the gateway sends the machine to the machine to the machine M2M.
  • the service platform or the M2M application initiates a remote registration request, where the remote registration request is used to request the M2M service platform or the M2M application to register the terminal peripheral to the M2M service platform or the M2M application.
  • step S102 may be represented as the following process: the terminal sends a registration request message to the gateway; the gateway authenticates and authenticates the terminal; accordingly, step S104 may be expressed as the following implementation form: in authentication and authentication After passing, the gateway allocates an address or identifier to the terminal peripheral, sets the status of the terminal peripheral to "local registration successful", and saves the information of the terminal peripheral; the gateway sends a registration confirmation message to the terminal, instructing it to complete the local registration. .
  • the gateway Before initiating a remote registration request to the M2M network, in order to prevent the terminal that does not support remote management in the M2M network from being verified, thereby wasting operating resources, the gateway needs to obtain indication information, where the indication information is used to indicate whether the terminal peripheral supports remote management.
  • the gateway obtains the indication information in multiple manners.
  • the indication information may be obtained from the registration request, and the indication information may be obtained from the locally saved subscription information, but the method is not limited to the foregoing two methods.
  • the gateway needs to obtain device description information and/or application description information of the terminal peripheral.
  • the gateway can obtain the device description information and the application description information of the terminal peripheral device in multiple manners, for example, locally pre-configured, or obtained by: the gateway sending a request message to the terminal peripheral, where the request message For requesting device description information and/or application description information; the gateway receives device description information and/or application description information sent by the terminal peripheral according to the request message. After the authentication and authentication is passed, the gateway allocates an address or identifier to the terminal peripheral, and saves the terminal peripheral information.
  • the terminal peripheral information may include but is not limited to the following information: terminal peripheral identifier or terminal peripheral address, terminal status .
  • the gateway after the gateway allocates an address or identifier to the terminal peripheral, and saves the information of the terminal peripheral, the gateway sends a registration confirmation message to the terminal peripheral, where the registration confirmation message includes: the terminal peripheral registration is successful. Instructing information, and an address or identifier assigned by the gateway to the terminal peripheral.
  • the gateway if the gateway fails to authenticate the terminal peripheral authentication, the gateway sends a registration confirmation message to the terminal peripheral, where the registration confirmation message indicates that the terminal peripheral local registration fails.
  • step S104 that is, after the gateway initiates a remote registration request to the M2M service platform or the M2M application, the gateway may resend the remote registration request within a predetermined time period if receiving the registration failure message.
  • the gateway stops transmitting the remote registration request when the number of times the gateway receives the registration failure message reaches a predetermined number of times.
  • a device for registering a terminal is provided, and the device is located in the gateway, and is configured to implement the foregoing embodiment and a preferred embodiment. The description has been omitted, and the following is related to the device.
  • the module is explained. As used below, the term "module" may implement a combination of software and/or hardware of a predetermined function. Although the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and conceivable.
  • the device includes an authentication module 20, which is connected to the sending module 22, and is configured to perform authentication authentication on the terminal peripheral after receiving the registration request of the terminal peripheral; the sending module 22 is set to After the authentication is passed, the remote registration request is initiated to the M2M service platform or the M2M application, where the remote registration request is used to request the M2M service platform or the M2M application to register the terminal peripheral to the M2M service platform or the M2M application.
  • the local verification process of the terminal registration process can also be implemented, thereby improving the security and privacy in the registration process.
  • the foregoing method embodiment is similar.
  • the foregoing apparatus may further include: an obtaining module 24, connected to the sending module 22, configured to acquire indication information, where the indication information is used to indicate whether the terminal peripheral supports Remote management and, in the case of remote management support, initiate a remote registration request to the M2M service platform or M2M application.
  • Embodiment 2 The main design idea of this embodiment is that the terminal peripheral must be registered in the local gateway before it can be put into normal use. That is, the terminal peripherals need to register with the M2M gateway in the unregistered state to use the M2M service.
  • the process of the M2M network registration of the terminal peripheral device can be referred to FIG. 4. As shown in FIG.
  • Step S402 The terminal peripheral device sends a registration request message to the gateway, where the registration request message includes the identifier of the terminal. And the key, or / and support the remote management indication;
  • Step S404 the gateway reads the key information in the registration request information, and authenticates and authenticates the terminal peripheral by verifying whether the key is legal by the local security algorithm;
  • Step S406 after the authentication and the authentication are passed, the gateway allocates the device information as shown in Table 1 to the terminal peripheral: an address or an identifier, and sets the state of the terminal peripheral to "local registration successful", and saves the terminal outside Information, information including the identity or address of the terminal, device status.
  • Table 1 Equipment Information
  • Step S408 the gateway sends a registration confirmation message to the terminal peripheral, instructing it to complete the local registration, and includes the identifier or address assigned by the gateway; it should be noted that (not shown in the figure), if the authentication and authentication fail, the gateway sends the registration. Confirming the information to the terminal peripheral, indicating that the local registration fails; Step S410, the gateway sends the request information (ie, the application information request) to the terminal peripheral, requesting the device and the application description parameter; the device description parameter refers to the physical description parameter of the terminal peripheral. , which device is the terminal peripheral, such as "television", and the manufacturer of the television.
  • the application description parameter refers to the application that the terminal peripheral can execute, and the corresponding parameters of the application.
  • the TV can execute the IPTV application, and can also execute the remote diagnosis application.
  • Step S412 after receiving the request information, the terminal peripheral device sends the device and the application description parameter to the gateway by using the application information.
  • the gateway saves the application information: device description information (parameter) and application description information [parameters]; : Application Description Information
  • Step S416 If the registration request message of the terminal peripheral indicates that remote management is supported, or the subscription information saved locally by the gateway indicates that remote management is supported, the gateway sends a remote registration request to the M2M service capability platform or the M2M application server:
  • the M2M service capability platform is a network element for managing gateways, terminals, and M2M applications on the network side.
  • the M2M application server is a network element for providing M2M applications. Step S418, the M2M service capability platform or the M2M application server verifies the remote registration request, and the gateway receives the registration success confirmation message sent by the M2M service capability platform or the M2M application server (that is, the M2M service capability platform or the M2M application server authentication authentication is passed).
  • the status of the terminal peripheral is set to "local registration successful and remote registration successful” or "remote registration successful”, and send a registration confirmation message to the terminal peripheral, instructing it to complete the remote registration; For example, if the gateway receives the registration failure confirmation message sent by the network side, the gateway initiates the remote registration request to the network side again after the preset waiting time; if the number of received registration failure confirmation messages reaches the preset maximum number of attempts , then stop initiating the remote registration request to the network side. The gateway sets the status of the terminal peripheral to "local registration successful and remote registration failed" or keeps the status set to "local registration successful".
  • a software is also provided, the software is used to perform the above The technical solution described in the embodiment and the preferred embodiment.
  • a storage medium is further provided, where the software is stored, including but not limited to: an optical disk, a floppy disk, a hard disk, Rewritable memory, etc.
  • the various modules or steps of the present invention described above can be implemented by a general purpose computing device, which can be centralized on a single computing device, or distributed across multiple
  • they may be implemented by program means executable by the computing means, such that they may be stored in the storage means by the computing means and, in some cases, may be
  • the steps shown or described are performed differently than here, or they are separately made into An integrated circuit module, or a plurality of modules or steps thereof, are implemented as a single integrated circuit module.
  • the present invention is not limited to any particular combination of hardware and software.
  • the above is only a preferred embodiment of the present invention, It is not intended to limit the invention, and various modifications and changes can be made by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. within the spirit and principles of the present invention are It should be included in the scope of protection of the present invention.
  • INDUSTRIAL APPLICABILITY The above technical solution provided by the present invention can be applied to a terminal registration process, and after the gateway first authenticates the terminal peripheral (ie, registers at the gateway), and then requests the M2M service platform or the M2M application.
  • the technical means of registration solves the technical problems such as security and privacy in the related art in the M2M network communication, thereby realizing the verification of the registration of the terminal locally, thereby improving the security and privacy of the M2M network communication. Sex.

Abstract

本发明提供了一种终端的注册方法及装置,其中,上述方法包括:网关在接收到终端外设的注册请求后,对终端外设进行鉴权认证;鉴权认证通过后,网关向机器对机器M2M业务平台或M2M应用发起远程注册请求,其中,远程注册请求用于向M2M业务平台或M2M应用请求将终端外设注册到M2M业务平台或M2M应用。基于本发明提供的上述技术方案,解决了相关技术中,M2M网络通信中存在的安全性和私密性不高等技术问题,从而实现了在本地对终端的注册进行验证,进而提高了M2M网络通信的安全性和私密性。

Description

终端的注册方法及装置 技术领域 本发明涉及通信领域, 具体而言, 涉及一种终端的注册方法及装置。 背景技术 机器对机器 ( Machine-To-Machine, 简称为 M2M)通信网络延伸现有信息通信网 络的通信范畴、 通信领域, 通过在各种可能的物体中嵌入智能和通信能力, 获取来自 物理世界的信息, 并基于对这些信息的分析和处理来增强和提升现有信息通信网络业 务的智能性、 交互性和自动化程度。
M2M通信网络具有多种网络形态,可以是单独构建的独立物理网络,也可以是构 建在现有公众通信网和各种政企专网之上的逻辑网络。
M2M 通信网络在逻辑功能上可以划分为三层, 即: 感知延伸层、 网络 /业务层和 应用层。 感知延伸层: 主要实现物理世界信息的釆集、 自动识别和智能控制。 物理世界中 的各种物本身不具备通信能力。传感器、执行器、智能装置、射频识别(Radio Frenquency Identification, 简称为 RFID) 读写器等智能节点采集物理世界的信息, 并通过通信模 块和网络层进行信息交互。 其包含的主要部件有终端外设设备, M2M网关。 网络 /业务层:网络 /业务层支撑感知层信息的传递、路由和控制,为物联网人与物、 物与物通信提供支撑。 结合物联网分类, 网络层面具体包含的网络形态有: 通信网、 互联网、 行业网等。 其包含的主要部件有 M2M平台。 应用层: 应用层包含各种具体物联网应用, 既有公众服务, 也有行业服务, 行业 服务可以是面向公众的行业公众服务, 也可以是满足行业内部特定应用需求的行业专 用服务。 其中公众服务是面向公众普遍需求提供的基础服务, 如智能家居、 移动支付 等。 行业专用服务通常是面向行业自身特有的需要, 面向行业内部提供的服务, 如智 能电网、 智能交通、 智能环境等; 其中部分行业服务也可以面向公众提供, 如智能交 通, 称为行业公众服务。 其包含的主要部件有 M2M应用服务器。 终端外设: 终端外设指的是具有环境感知功能的传感器等单个设备, 它能将感知 到的信息通过 M2M网关发送给 M2M业务平台或 M2M应用, 同时还可以接收 M2M 应用或 M2M业务平台的对其的下行控制。
M2M网关: 终端外设由于其具有处理能力、存储能力以及电源受限等特点, 不能 直接与通信网络进行通信, 需要通过 M2M 网关接入通信网络。 M2M 网关可以进行 M2M感知延伸层与上层网络之间的协议转换。 M2M网关除了能够汇聚和转发终端外 设采集到的数据信息外,还可以接收 M2M应用或 M2M业务平台的控制信息,对终端 外设进行管理。
M2M平台向 M2M应用提供一些共性的能力和支撑, 并提供开放的接口, 使应用 可以接入和使用网络资源和能力。 通过向具体 M2M应用屏蔽底层具体网络实现, 可 以简化和降低上层物联网应用开发和部署的复杂度 然而, 终端外设设备必须在注册成功后方能正常使用, 并且, 相关技术中的 M2M 网关在注册过程中起到一个中继作用, 即 M2M网关将终端外设发送过来的注册请求 转发到 M2M平台或 M2M应用服务器,但是, 由于在本地并没有相应地对终端注册请 求进行验证的措施, 因此, 现有的 M2M网络存在安全性和私密性不高等问题。 针对相关技术中的上述问题, 目前尚未提出有效的解决方案。 发明内容 针对相关技术中, M2M网络通信中存在的安全性和私密性不高等技术问题,本发 明实施例提供了一种终端的注册方法及装置, 以至少解决上述问题。 根据本发明的一个实施例, 提供了一种终端的注册方法, 包括: 网关在接收到终 端外设的注册请求后, 对终端外设进行鉴权认证; 鉴权认证通过后, 网关向机器对机 器 M2M业务平台或 M2M应用发起远程注册请求, 其中, 远程注册请求用于向 M2M 业务平台或 M2M应用请求将终端外设注册到 M2M业务平台或 M2M应用。 在向 M2M业务平台或 M2M应用发起远程注册请求之前,包括: 网关获取指示信 息, 其中, 指示信息用于指示终端外设是否支持远程管理, 并且, 在支持远程管理的 情况下向 M2M业务平台或 M2M应用发起远程注册请求。 上述网关获取指示信息, 包括: 网关从注册请求中获取指示信息。 上述网关获取指示信息, 包括: 网关从签约信息中获取指示信息。 在鉴权认证通过后, 还包括: 网关获取终端外设的设备描述信息或 /和应用描述信 息。 网关获取终端外设的设备描述信息和 /或应用描述信息, 包括: 网关向终端外设发 送请求消息, 其中, 该请求消息用于请求设备描述信息和 /或应用描述信息; 网关接收 终端外设根据请求消息发送的设备描述信息和 /或应用描述信息。 在鉴权认证通过后, 还包括: 网关为终端外设分配地址或标识, 并保存终端外设 信息: 终端外设信息包括以下信息: 终端外设标识或终端外设地址, 终端外设状态。 在网关为终端外设分配地址或标识, 并保存终端外设的信息之后, 还包括: 网关 发送注册确认消息给终端外设,注册确认消息中包括: 终端外设注册成功的指示信息, 和网关为终端外设分配的地址或标识。 如果网关对终端外设鉴权认证失败, 则网关发送注册确认消息给终端外设, 注册 确认消息中指示终端外设本地注册失败。 网关向 M2M业务平台或 M2M应用发起远程注册请求之后,还包括: 网关接收到 注册失败消息后, 在预定时间内重新发送远程注册请求。 上述方法还包括: 在网关接收到注册失败消息的次数达到预定次数时, 网关停止 发送远程注册请求。 根据本发明的另一个实施例, 提供了一种终端的注册装置, 位于网关中, 包括: 鉴权模块, 设置为在接收到终端外设的注册请求后, 对终端外设进行鉴权认证; 发送 模块, 设置为在鉴权认证通过后, 向机器对机器 M2M业务平台或 M2M应用发起远程 注册请求,其中,远程注册请求用于向 M2M业务平台或 M2M应用请求将终端外设注 册到 M2M业务平台或 M2M应用。 上述装置还包括: 获取模块, 设置为获取指示信息, 其中, 指示信息用于指示终 端外设是否支持远程管理, 并且, 在支持远程管理的情况下向 M2M业务平台或 M2M 应用发起远程注册请求。 通过本发明实施例, 采用在网关先对终端外设进行鉴权认证(即在网关进行注册) 后,再向 M2M业务平台或 M2M应用请求注册的技术手段,解决了相关技术中, M2M 网络通信中存在的安全性和私密性不高等技术问题, 从而实现了在本地对终端的注册 进行验证, 进而提高了 M2M网络通信的安全性和私密性。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图 中- 图 1为根据本发明实施例 1的终端的注册方法的流程图; 图 2为根据本发明实施例 1的终端的注册装置的结构框图; 图 3为根据本发明实施例 1的终端的注册装置的另一结构框图; 图 4为根据本发明实施例 2的终端进行 M2M网络注册的流程示意图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在不冲突的 情况下, 本申请中的实施例及实施例中的特征可以相互组合。 考虑到相关技术中, M2M网络通信中存在的安全性和私密性不高等技术问题, 以 下结合实施例提供了相关的解决方案, 现详细说明。 实施例 1 图 1为根据本发明实施例 1的终端的注册方法的流程图。 如图 1所示, 该方法包 括: 步骤 S102, 网关在接收到终端外设的注册请求后, 对终端外设进行鉴权认证; 歩骤 S104, 鉴权认证通过后, 网关向机器对机器 M2M业务平台或 M2M应用发 起远程注册请求,其中,远程注册请求用于向 M2M业务平台或 M2M应用请求将终端 外设注册到 M2M业务平台或 M2M应用。 通过上述处理步骤, 由于在网关侧对终端的注册请求进行了鉴权认证, 并在鉴权 认证通过后再发起对 M2M网络的注册请求, 因此, 增加了本地对终端注册过程的验 证, 进而提高了注册过程中的安全性和私密性。 在本实施例中, 步骤 S102可以表现为以下处理过程: 终端发送注册请求消息给网 关; 网关对该终端进行鉴权和认证; 相应地, 步骤 S104可以表现为以下实现形式: 在鉴权和认证通过后, 网关为该终 端外设分配地址或标识, 设置该终端外设的状态为"本地注册成功", 并保存该终端外 设的信息; 网关发送注册确认消息给终端, 指示其完成本地注册。 在向 M2M网络发起远程注册请求之前,为了防止对 M2M网络中不支持远程管理 的终端进行验证, 从而浪费运行资源, 网关需要获取指示信息, 其中, 指示信息用于 指示终端外设是否支持远程管理, 并且, 在支持远程管理的情况下向 M2M业务平台 或 M2M应用发起远程注册请求。 在本实施例中, 上述网关获取指示信息的方式有多种, 例如可以从注册请求中获 取指示信息, 还可以从本地保存的签约信息中获取指示信息, 但并不限于上述两种方 式。 在鉴权认证通过后, 网关需要获取终端外设的设备描述信息和 /或应用描述信息。 本实施例中, 网关可以通过多种方式获取终端外设的设备描述信息和应用描述信 息, 例如在本地预先配置, 或者通过以下方式获取: 网关向终端外设发送请求消息, 其中, 该请求消息用于请求设备描述信息和 /或应用描述信息; 网关接收终端外设根据 请求消息发送的设备描述信息和 /或应用描述信息。 在鉴权认证通过后, 网关为终端外设分配地址或标识, 并保存终端外设信息, 其 中, 终端外设信息可以包括但不限于以下信息: 终端外设标识或终端外设地址, 终端 状态。 本实施例中, 在网关为终端外设分配地址或标识, 并保存终端外设的信息之后, 网关发送注册确认消息给终端外设, 该注册确认消息中包括: 所述终端外设注册成功 的指示信息, 和所述网关为所述终端外设分配的地址或标识。 相应地, 如果网关对终端外设鉴权认证失败, 则网关发送注册确认消息给终端外 设, 该注册确认消息中指示终端外设本地注册失败。 在步骤 S104之后,即网关向 M2M业务平台或 M2M应用发起远程注册请求之后, 网关如果接收到注册失败消息, 可以在预定时间周期内重新发送远程注册请求。 为了防止网关无休止地发送远程注册请求, 在网关接收到注册失败消息的次数达 到预定次数时, 网关停止发送远程注册请求。 在本实施例中还提供了一种终端的注册装置, 该装置位于网关中, 设置为实现上 述实施例及优选实施方式, 已经进行过说明的不再赘述, 下面对该装置中涉及到的模 块进行说明。如以下所使用的,术语"模块"可以实现预定功能的软件和 /或硬件的组合。 尽管以下实施例所描述的装置较佳地以软件来实现, 但是硬件, 或者软件和硬件的组 合的实现也是可能并被构想的。 图 2为根据本发明实施例 1的终端的注册装置的结构 框图。 如图 2所示, 该装置包括- 鉴权模块 20, 连接至发送模块 22, 设置为在接收到终端外设的注册请求后, 对终 端外设进行鉴权认证; 发送模块 22, 设置为在鉴权认证通过后, 向 M2M业务平台或 M2M应用发起远 程注册请求,其中,远程注册请求用于向 M2M业务平台或 M2M应用请求将所述终端 外设注册到 M2M业务平台或 M2M应用。 通过上述处理模块实现的功能, 同样可以实现本地对终端注册过程的验证, 进而 提高注册过程中的安全性和私密性。 优选地, 上述方法实施例类似, 如图 3所示, 上述装置还可以包括: 获取模块 24, 与发送模块 22连接, 设置为获取指示信息, 其中, 该指示信息用于指示终端外设是否 支持远程管理,并且,在支持远程管理的情况下向 M2M业务平台或 M2M应用发起远 程注册请求。 实施例 2 本实施例的主要设计思路在于, 终端外设必须在本地的网关注册成功后方能投入 正常使用。即终端外设在未注册状态下,需要向 M2M网关注册,才能使用 M2M业务。 本实施例中, 终端外设进行 M2M网络注册的流程可以参见图 4, 如图 4所示, 该 流程包括: 步骤 S402, 终端外设发送注册请求消息给网关, 注册请求消息中包含终端的标识 和密钥, 或 /和支持远程管理指示; 步骤 S404, 网关读取注册请求信息中的密钥信息, 通过本地安全算法验证密钥是 否合法来对该终端外设进行鉴权和认证; 步骤 S406,在鉴权和认证通过后,网关为该终端外设分配如表 1所示的设备信息: 地址或标识, 设置该终端外设的状态为"本地注册成功", 并保存该终端外设的信息, 信息包括终端的标识或地址, 设备状态。 表 1 : 设备信息
Figure imgf000009_0001
步骤 S408, 网关发送注册确认消息给终端外设, 指示其完成本地注册, 并包含网 关分配的标识或地址; 需要说明的是, (图中未示出)如果鉴权和认证失败, 网关发送注册确认信息给终 端外设, 指示其本地注册失败; 步骤 S410, 网关向终端外设发送请求信息 (即应用信息请求), 请求设备和应用 描述参数; 设备描述参数是指终端外设的物理描述参数, 表述该终端外设是一台什么 设备, 比如"电视机", 以及该电视机的生产厂商等。 应用描述参数是指该终端外设能 执行的应用, 以及应用对应的参数, 比如电视机可以执行 IPTV应用, 还可以执行远 程诊断应用。 步骤 S412, 终端外设接收到请求信息后, 通过应用信息响应发送设备和应用描述 参数给网关; 歩骤 S414, 网关保存应用信息: 设备描述信息 (参数)和应用描述信息 〔参数); 表 2: 应用描述信息
Figure imgf000009_0002
网关中包含上述信息, 但不限于只有这些信息。 如果鉴权和认证失败, 网关发送注册确认信息给终端外设, 指示其本地注册失败; 步骤 S416, 如果终端外设的注册请求消息中指示支持远程管理, 或者网关本地保 存的签约信息指示支持远程管理, 网关则发送远程注册请求给 M2M业务能力平台或 M2M应用服务器:
M2M业务能力平台是网络侧用于管理网关, 终端和 M2M应用的网元; M2M应用服务器是用于提供 M2M应用的网元。 步骤 S418, M2M业务能力平台或 M2M应用服务器对远程注册请求进行验证, 网关如果接收到 M2M业务能力平台或 M2M应用服务器发送的注册成功确认消息(即 M2M业务能力平台或 M2M应用服务器鉴权认证通过), 则在本地信息中将终端外设 的状态设置为 "本地注册成功和远程注册成功"或"远程注册成功", 并发送注册确认消 息给终端外设, 指示其完成远程注册; 在本实施例中, 网关如果接收到网络侧发送的注册失败确认消息, 则在预设的等 待时间后再次发起远程注册请求给网络侧; 网关如果接收到的注册失败确认信息次数 达到预设的最大尝试次数, 则停止发起远程注册请求给网络侧。 网关将终端外设的状 态设置为"本地注册成功和远程注册失败"或保持状态设置为"本地注册成功''。 在另外一个实施例中, 还提供了一种软件, 该软件用于执行上述实施例及优选实 施方式中描述的技术方案。 在另外一个实施例中, 还提供了一种存储介质, 该存储介质中存储有上述软件, 该存储介质包括但不限于: 光盘、 软盘、 硬盘、 可擦写存储器等。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而, 可以 将它们存储在存储装置中由计算装置来执行, 并且在某些情况下, 可以以不同于此处 的顺序执行所示出或描述的步骤, 或者将它们分别制作成各个集成电路模块, 或者将 它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明不限制于任 何特定的硬件和软件结合。 以上仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技术人 员来说, 本发明可以有各种更改和变化。 凡在本发明的精祌和原则之内, 所作的任何 修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。 工业实用性 本发明提供的上述技术方案, 可以应用于终端的注册过程中, 采用在网关先对终 端外设进行鉴权认证(即在网关进行注册)后, 再向 M2M业务平台或 M2M应用请求 注册的技术手段,解决了相关技术中, M2M网络通信中存在的安全性和私密性不高等 技术问题, 从而实现了在本地对终端的注册进行验证, 进而提高了 M2M网络通信的 安全性和私密性。

Claims

权 利 要 求 书
1. 一种终端的注册方法, 包括:
网关在接收到终端外设的注册请求后, 对终端外设进行鉴权认证; 鉴权认证通过后, 所述网关向机器对机器 M2M业务平台或 M2M应用发 起远程注册请求, 其中, 所述远程注册请求用于向所述 M2M业务平台或 M2M 应用请求将所述终端外设注册到所述 M2M业务平台或 M2M应用。
2. 根据权利要求 1所述的方法, 其中, 在向所述 M2M业务平台或 M2M应用发 起远程注册请求之前, 包括:
所述网关获取指示信息, 其中, 所述指示信息用于指示所述终端外设是否 支持远程管理, 并且, 在支持远程管理的情况下向所述 M2M业务平台或 M2M 应用发起远程注册请求。
3. 根据权利要求 2所述的方法, 其中, 所述网关获取指示信息, 包括:
所述网关从所述注册请求中获取所述指示信息。
4. 根据权利要求 2所述的方法, 其中, 所述网关获取指示信息, 包括- 所述网关从签约信息中获取指示信息。
5. 根据权利要求 1所述的方法, 其中, 在所述鉴权认证通过后, 还包括:
所述网关获取所述终端外设的设备描述信息或 /和应用描述信息。
6. 根据权利要求 5所述的方法, 其中, 所述网关获取所述终端外设的设备描述信 息和 /或应用描述信息, 包括:
所述网关向所述终端外设发送请求消息, 其中, 该请求消息用于请求所述 设备描述信息和 /或应用描述信息;
所述网关接收所述终端外设根据所述请求消息发送的所述设备描述信息和 /或应用描述信息。
7. 根据权利要求 1所述的方法, 其中, 在所述鉴权认证通过后, 还包括- 所述网关为所述终端外设分配地址或标识, 并保存所述终端外设信息;
8. 根据权利要求 7所述的方法, 其中, 所述终端外设信息包括以下信息:
终端外设标识或终端外设地址, 终端外设状态。
9. 根据权利要求 7所述的方法, 其中, 在所述网关为所述终端外设分配地址或标 识, 并保存所述终端外设的信息之后, 还包括:
所述网关发送注册确认消息给所述终端外设, 所述注册确认消息中包括: 所述终端外设注册成功的指示信息, 和所述网关为所述终端外设分配的地址或 标识。
10. 根据权利要求 1所述的方法, 其中,
如果所述网关对所述终端外设鉴权认证失败, 则所述网关发送注册确认消 息给所述终端外设, 所述注册确认消息中指示所述终端外设本地注册失败。
11. 根据权利要求 1至 10任一项所述的方法, 其中, 所述网关向所述 M2M业务平 台或 M2M应用发起远程注册请求之后, 还包括:
所述网关接收到注册失败消息后, 在预定时间内重新发送所述远程注册请 求。
12. 根据权利要求 11所述的方法, 其中, 还包括- 在所述网关接收到注册失败消息的次数达到预定次数时, 所述网关停止发 送所述远程注册请求。
13. 一种终端的注册装置, 位于网关中, 包括- 鉴权模块, 设置为在接收到终端外设的注册请求后, 对终端外设进行鉴权 认证;
发送模块,设置为在鉴权认证通过后,向机器对机器 M2M业务平台或 M2M 应用发起远程注册请求, 其中, 所述远程注册请求用于向所述 M2M业务平台 或 M2M应用请求将所述终端外设注册到所述 M2M业务平台或 M2M应用。
14. 根据权利要求 13所述的装置, 其中, 还包括:
获取模块, 设置为获取指示信息, 其中, 所述指示信息用于指示所述终端 外设是否支持远程管理, 并且, 在支持远程管理的情况下向所述 M2M业务平 台或 M2M应用发起远程注册请求。
PCT/CN2013/083022 2012-09-26 2013-09-05 终端的注册方法及装置 WO2014048236A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US14/431,548 US9479477B2 (en) 2012-09-26 2013-09-05 Method and apparatus for registering terminal
EP13842210.0A EP2903321A4 (en) 2012-09-26 2013-09-05 METHOD AND DEVICE FOR REGISTERING A FINISHING DEVICE

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210363654.1 2012-09-26
CN201210363654.1A CN103685210B (zh) 2012-09-26 2012-09-26 终端的注册方法及装置

Publications (1)

Publication Number Publication Date
WO2014048236A1 true WO2014048236A1 (zh) 2014-04-03

Family

ID=50321536

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/083022 WO2014048236A1 (zh) 2012-09-26 2013-09-05 终端的注册方法及装置

Country Status (4)

Country Link
US (1) US9479477B2 (zh)
EP (1) EP2903321A4 (zh)
CN (1) CN103685210B (zh)
WO (1) WO2014048236A1 (zh)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2529838A (en) * 2014-09-03 2016-03-09 Advanced Risc Mach Ltd Bootstrap Mechanism For Endpoint Devices
US10185829B2 (en) 2015-08-03 2019-01-22 Arm Ltd Bootstrapping without transferring private key
US10554731B2 (en) 2015-08-03 2020-02-04 Arm Ltd Server initiated remote device registration
CN112333219A (zh) * 2019-07-19 2021-02-05 广州汽车集团股份有限公司 一种汽车网络通信系统
US11438230B2 (en) 2019-02-01 2022-09-06 Arm Ip Limited Template-based registration of devices
US11475134B2 (en) 2019-04-10 2022-10-18 Arm Limited Bootstrapping a device

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618312B (zh) * 2013-11-04 2019-03-29 中兴通讯股份有限公司 一种m2m应用的远程注册方法、装置和系统
US20150381737A1 (en) * 2014-06-30 2015-12-31 Davra Networks Limited Gateway device and a gateway system for an internet-of-things environment
CN105323228B (zh) * 2014-07-30 2019-11-05 中兴通讯股份有限公司 更新资源通告的方法、本地公共业务实体及系统
US10106106B2 (en) * 2014-09-19 2018-10-23 Ford Global Technologies, Llc Automated driving solution gateway
CN104243297A (zh) * 2014-10-16 2014-12-24 成都思迈科技发展有限责任公司 一种多业务以太网网关系统
WO2016076641A1 (en) 2014-11-14 2016-05-19 Samsung Electronics Co., Ltd. Method and apparatus for registering a device for use
CN106034281B (zh) * 2015-03-17 2018-08-14 中兴通讯股份有限公司 一种基于m2m网关的末梢网络建立方法、装置和系统
WO2017098309A1 (en) * 2015-12-10 2017-06-15 Telefonaktiebolaget Lm Ericsson (Publ) Group management in an m2m network using temporary identifiers
CN110034984B (zh) * 2016-03-29 2021-09-07 华为技术有限公司 一种接入方法、设备及系统
CN107306394A (zh) * 2016-04-21 2017-10-31 上海中兴软件有限责任公司 一种蜂窝物联网终端信息的获取方法及装置、系统
WO2018004637A1 (en) 2016-07-01 2018-01-04 Intel Corporation Group management in reconfigurable machine-to-machine systems
CN108111465B (zh) * 2016-11-24 2021-08-31 华为技术有限公司 一种用于管理用户设备的方法和装置
CN106790569B (zh) * 2016-12-27 2019-12-13 安徽微慧公用通卡运营管理有限公司 一种基于物联网平台的终端设备即插即用的实现方法
CN108667778A (zh) * 2017-03-31 2018-10-16 中移物联网有限公司 一种物联网设备绑定方法、终端和物联网设备
CN107276861A (zh) * 2017-06-30 2017-10-20 广州创想健康信息科技有限公司 提供蓝牙外设远程接入的方法、服务器、网关和系统
CN107579882A (zh) * 2017-08-14 2018-01-12 苏州众天力信息科技有限公司 一种智能家居设备加退网关的通信防干扰方法
CN109756450B (zh) * 2017-11-03 2021-06-15 华为技术有限公司 一种物联网通信的方法、装置、系统和存储介质
GB2582736B (en) * 2019-02-01 2022-02-16 Arm Ip Ltd Template-based registration
CN112583616B (zh) * 2019-09-29 2022-08-26 海信电子科技(武汉)有限公司 一种物联网设备、物联网平台及其接入物联网平台的方法
CN115277026A (zh) * 2022-09-26 2022-11-01 国网浙江余姚市供电有限公司 一种基于区块链的物联网网关控制方法及装置、介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102026188A (zh) * 2010-12-09 2011-04-20 中国联合网络通信集团有限公司 鉴权方法、设备及系统
CN102215560A (zh) * 2010-04-08 2011-10-12 中兴通讯股份有限公司 一种对m2m终端实现管理的方法及系统
CN102238000A (zh) * 2010-04-21 2011-11-09 华为技术有限公司 加密通信方法、装置及系统
CN102687547A (zh) * 2009-12-28 2012-09-19 交互数字专利控股公司 机器对机器网关体系结构

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7239636B2 (en) * 2001-07-23 2007-07-03 Broadcom Corporation Multiple virtual channels for use in network devices
US7024177B2 (en) * 2002-03-14 2006-04-04 Openwave Systems Inc. Method and apparatus for authenticating users of mobile devices
US7114180B1 (en) * 2002-07-16 2006-09-26 F5 Networks, Inc. Method and system for authenticating and authorizing requestors interacting with content servers
EP1764972B1 (en) * 2005-09-20 2017-07-19 Accenture Global Services Limited Authentication and authorization architecture for an access gateway
CN100463544C (zh) * 2005-11-18 2009-02-18 中兴通讯股份有限公司 一种短消息业务系统及其实现短消息过滤的方法
CN101102189B (zh) * 2006-07-05 2011-06-22 华为技术有限公司 一种实现多种媒体接入的网关系统和方法
US8929360B2 (en) * 2006-12-07 2015-01-06 Cisco Technology, Inc. Systems, methods, media, and means for hiding network topology
US8578459B2 (en) * 2007-01-31 2013-11-05 At&T Intellectual Property I, L.P. Methods and apparatus to control network access from a user device
CN101471778A (zh) * 2007-12-27 2009-07-01 华为技术有限公司 网络信息获取方法及通讯系统以及相关设备
JP2009182863A (ja) * 2008-01-31 2009-08-13 Hitachi Ltd 認証情報登録システム
US8924552B2 (en) * 2008-05-12 2014-12-30 Telefonaktiebolaget L M Ericsson (Publ) Remote and local compound device capabilities synchronization method and system
WO2010102236A2 (en) * 2009-03-05 2010-09-10 Interdigital Patent Holdings, Inc. Secure remote subscription management
EP3367711B1 (en) * 2010-03-01 2020-05-13 Interdigital Patent Holdings, Inc. Machine-to-machine gateway architecture and functionality
EP3032849B1 (en) * 2010-03-09 2020-05-06 Iot Holdings, Inc. Method and apparatus for supporting machine-to-machine communications
CN102196436B (zh) * 2010-03-11 2014-12-17 华为技术有限公司 安全认证方法、装置及系统
CN102223231B (zh) * 2010-04-16 2016-03-30 中兴通讯股份有限公司 M2m终端认证系统及认证方法
US8942191B2 (en) * 2010-05-03 2015-01-27 Mformation Software Technologies Llc Providing dynamic group subscriptions for M2M device communication
US9426222B2 (en) * 2011-02-11 2016-08-23 Interdigital Patent Holdings, Inc. Systems, methods and apparatus for managing machine-to-machine (M2M) entities
KR101923047B1 (ko) * 2011-04-15 2018-11-28 삼성전자주식회사 머신-대-머신 서비스를 제공하는 방법 및 장치
US8989091B2 (en) * 2011-07-15 2015-03-24 Telefonaktiebolaget L M Ericsson (Publ) Dynamic enablement of M2M services over 3GPP access networks
US8782195B2 (en) * 2012-03-14 2014-07-15 Telefonaktiebolaget L M Ericsson (Publ) Group operations in machine-to-machine networks using a shared identifier
US9113283B2 (en) * 2012-04-03 2015-08-18 Telefonaktiebolaget L M Ericsson (Publ) Systems and methods for event notification framework in a machine-to-machine (M2M) context
US20140003339A1 (en) * 2012-07-02 2014-01-02 Puneet Jain Machine-to-machine (m2m) device and methods for 3gpp and etsi m2m interworking
CN103685353A (zh) * 2012-09-05 2014-03-26 中兴通讯股份有限公司 网关管理终端的方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102687547A (zh) * 2009-12-28 2012-09-19 交互数字专利控股公司 机器对机器网关体系结构
CN102215560A (zh) * 2010-04-08 2011-10-12 中兴通讯股份有限公司 一种对m2m终端实现管理的方法及系统
CN102238000A (zh) * 2010-04-21 2011-11-09 华为技术有限公司 加密通信方法、装置及系统
CN102026188A (zh) * 2010-12-09 2011-04-20 中国联合网络通信集团有限公司 鉴权方法、设备及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2903321A4 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2529838A (en) * 2014-09-03 2016-03-09 Advanced Risc Mach Ltd Bootstrap Mechanism For Endpoint Devices
US10321311B2 (en) 2014-09-03 2019-06-11 Arm Limited Bootstrap mechanism for endpoint devices
GB2529838B (en) * 2014-09-03 2021-06-30 Advanced Risc Mach Ltd Bootstrap Mechanism For Endpoint Devices
US11082421B2 (en) 2014-09-03 2021-08-03 Arm Limited Bootstrap mechanism for endpoint devices
US10185829B2 (en) 2015-08-03 2019-01-22 Arm Ltd Bootstrapping without transferring private key
US10554731B2 (en) 2015-08-03 2020-02-04 Arm Ltd Server initiated remote device registration
US10885198B2 (en) 2015-08-03 2021-01-05 Arm Ltd Bootstrapping without transferring private key
US10951429B2 (en) 2015-08-03 2021-03-16 Arm Ltd Server initiated remote device registration
US11438230B2 (en) 2019-02-01 2022-09-06 Arm Ip Limited Template-based registration of devices
US11475134B2 (en) 2019-04-10 2022-10-18 Arm Limited Bootstrapping a device
CN112333219A (zh) * 2019-07-19 2021-02-05 广州汽车集团股份有限公司 一种汽车网络通信系统
CN112333219B (zh) * 2019-07-19 2023-07-28 广州汽车集团股份有限公司 一种汽车网络通信系统

Also Published As

Publication number Publication date
EP2903321A1 (en) 2015-08-05
CN103685210A (zh) 2014-03-26
US9479477B2 (en) 2016-10-25
EP2903321A4 (en) 2015-10-14
US20150229605A1 (en) 2015-08-13
CN103685210B (zh) 2018-02-13

Similar Documents

Publication Publication Date Title
WO2014048236A1 (zh) 终端的注册方法及装置
KR102478442B1 (ko) Pdu 유형 설정 방법, ue 정책 설정 방법 및 관련 엔티티
CN111865598B (zh) 网络功能服务的身份校验方法及相关装置
CN110383790B (zh) 无需会话连续性的网络服务连续性
JP7179836B2 (ja) 通信ネットワークにおける自動サービス登録
RU2589860C2 (ru) Архитектура и функциональные возможности межмашинного шлюза
EP3596909B1 (en) Distributed transaction management in a network service layer
EP2982084B1 (en) Method and apparatus for routing proximity-based service message in wireless communication system
US8880688B2 (en) Apparatus and method for providing profile of terminal in communication system
US11096051B2 (en) Connection establishment method, device, and system
JP6800994B2 (ja) 通信ネットワークを介してデータを中継するシステム及び方法
WO2016155298A1 (zh) 一种中继ue接入控制方法及装置
US10904743B2 (en) Methods for automatic bootstrapping of a device
US11422786B2 (en) Method for interoperating between bundle download process and eSIM profile download process by SSP terminal
US20160157091A1 (en) Terminal Peripheral Control Method, M2M Gateway, and Communications System
US9417887B2 (en) Method and apparatus for bootstrapping gateway in device management system
WO2014036902A1 (zh) 网关管理终端的方法及装置
WO2013189398A2 (zh) 应用数据推送方法、装置及系统
WO2014067313A1 (zh) 终端外设的注销方法和装置
WO2011017921A1 (zh) 一种访问拜访地服务提供商的系统及方法
EP3955542A1 (en) Enhancements for secure updating in communication networks
WO2022067831A1 (zh) 一种建立安全通信方法及装置
WO2016205673A1 (en) Enhanced address registration in constrained networks
CN113455025A (zh) Ssp终端在捆绑包下载过程和esim配置文件下载过程之间进行互操作的方法
WO2023202412A1 (zh) 一种通信方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13842210

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 14431548

Country of ref document: US

Ref document number: 2013842210

Country of ref document: EP