WO2019014928A1 - 一种控制可操控设备接入网络的方法及装置 - Google Patents

一种控制可操控设备接入网络的方法及装置 Download PDF

Info

Publication number
WO2019014928A1
WO2019014928A1 PCT/CN2017/093884 CN2017093884W WO2019014928A1 WO 2019014928 A1 WO2019014928 A1 WO 2019014928A1 CN 2017093884 W CN2017093884 W CN 2017093884W WO 2019014928 A1 WO2019014928 A1 WO 2019014928A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
network
steerable device
verification result
notification message
Prior art date
Application number
PCT/CN2017/093884
Other languages
English (en)
French (fr)
Inventor
洪伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN201780000679.6A priority Critical patent/CN109548411B/zh
Priority to PCT/CN2017/093884 priority patent/WO2019014928A1/zh
Publication of WO2019014928A1 publication Critical patent/WO2019014928A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/18Management of setup rejection or failure

Definitions

  • the present disclosure relates to the field of communications technologies, and in particular, to a method and apparatus for controlling a steerable device to access a network.
  • steerable device technology With the rapid development of steerable device technology, cost reduction, and improved functionality, the use of steerable devices is becoming more common. For example, the UAV's current applications in aerial photography, agriculture, plant protection and many other fields have greatly expanded the use of steerable devices. Various countries are actively expanding industry applications and developing steerable device technologies.
  • embodiments of the present disclosure provide a method and apparatus for controlling a steerable device to access a network.
  • a method of controlling a steerable device accessing a network comprising:
  • the target steerable device is a steerable device that initiates a network attach request
  • the obtaining the identification information of the target steerable device includes:
  • the receiving target operably controls the identification information of the target steerable device transparently transmitted by the base station.
  • the responding to the network attach request according to the verification result includes:
  • the network attach request is rejected.
  • the accepting the network attach request includes:
  • the rejecting the network attach request includes:
  • a steerable device to access a network the method being used to authenticate a server, the method comprising:
  • the target steerable device is a steerable device that initiates a network attach request
  • the verification result is returned to the core network.
  • the verifying the validity of the identifier information, and obtaining the verification result includes:
  • the legal identification information list it is found whether there is identification information of the target steerable device, and the legal identification information list includes identification information corresponding to all steerable devices that have been registered;
  • the identification information of the target steerable device exists in the legal identification information list, it is determined that the verification result is valid for verification, otherwise the verification result is determined to be invalid.
  • a method for controlling a steerable device to access a network comprising:
  • a target notification message carries a verification result of the identifier information of the target steerable device, where the target steerable device is a steerable device that initiates a network attachment request;
  • the performing the operation corresponding to the verification result on the stewards device according to the target notification message includes:
  • the first notification message is that the verification result carried is a verification notification message
  • the target notification message is the third notification message
  • the network connection is refused to be established with the target steerable device, and the third notification message is the notification message that the verification result is invalid.
  • the establishing a network connection with the target steerable device includes:
  • the denying establishing a network connection with the target steerable device includes:
  • an apparatus for controlling a steerable device to access a network the device being for a core network, the device comprising:
  • An obtaining module configured to acquire identification information of a target steerable device, where the target steerable device is a steerable device that initiates a network attach request;
  • the first sending module is configured to send the identifier information to the authentication server, so that the authentication server verifies the legality of the identifier information, and obtains a verification result;
  • a first receiving module configured to receive the verification result returned by the authentication server
  • the first execution module is configured to respond to the network attach request according to the verification result.
  • the obtaining module includes:
  • the receiving submodule is configured to receive identification information of the target stewards device transparently transmitted by the target steerable device through the base station.
  • the first execution module includes:
  • a first execution submodule configured to accept the network attach request if the verification result is valid for verification
  • the second execution submodule is configured to reject the network attach request if the verification result is that the verification is illegal.
  • the first execution submodule includes:
  • the first sending unit is configured to send a first notification message carrying the verification result to the base station, so that the base station establishes a network connection with the target steerable device according to the first notification message.
  • the second execution submodule includes:
  • a second sending unit configured to send a second notification message for rejecting the network attach request to the target stewards device
  • the third sending unit is configured to send a third notification message carrying the verification result to the base station, so that the base station refuses to establish a network connection with the target steerable device according to the third notification message.
  • an apparatus for controlling a steerable device to access a network the apparatus for authenticating a server, the apparatus comprising:
  • a second receiving module configured to receive identification information of a target steerable device sent by the core network, where the target steerable device is a steerable device that initiates a network attach request;
  • the verification module is configured to verify the legality of the identification information and obtain a verification result
  • the second sending module is configured to return the verification result to the core network.
  • the verification module includes:
  • the search sub-module is configured to: in the legal identification information list, the identifier information of the target steerable device is found, where the legal identification information list includes the identification information corresponding to all the tradable devices that have been registered;
  • the determining sub-module is configured to determine that the verification result is valid if the identification information of the target steerable device exists in the legal identification information list, otherwise the verification result is determined to be invalid.
  • an apparatus for controlling a steerable device to access a network the device being for a base station, the device comprising:
  • the third receiving module is configured to receive a target notification message sent by the core network, where the target notification message carries a verification result of the identification information of the target steerable device, and the target steerable device is a controllable device that initiates the network attachment request device;
  • the second execution module is configured to perform an operation corresponding to the verification result on the stewards device according to the target notification message.
  • the second execution module includes:
  • a third execution sub-module configured to establish a network connection with the target steerable device if the target notification message is a first notification message, where the first notification message is carried Notification message;
  • a fourth execution sub-module configured to: if the target notification message is a third notification message, refuse to establish a network connection with the target steerable device, where the third notification message is carried as the verification result is not verified Legal notification message.
  • the third execution submodule includes:
  • the first execution unit is configured to establish a signaling bearer and a data bearer for the target stewards.
  • the fourth execution submodule includes:
  • a second execution unit configured to disconnect a network connection that has been established with the target steerable device.
  • a computer readable storage medium storing a computer program for performing the control operability device access network of the first aspect described above method.
  • a computer readable storage medium storing a computer program for performing the control operability device access network of the second aspect described above method.
  • a computer readable storage medium storing a computer program for performing control of a steerable device accessing a network according to the above third aspect method.
  • an apparatus for controlling a steerable device to access a network including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the target steerable device is a steerable device that initiates a network attach request
  • an apparatus for controlling a steerable device to access a network comprising:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the target steerable device is a steerable device that initiates a network attach request
  • the verification result is returned to the core network.
  • an apparatus for controlling a steerable device to access a network comprising:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • a target notification message carries a verification result of the identifier information of the target steerable device, where the target steerable device is a steerable device that initiates a network attachment request;
  • the core network may send the identifier information to the authentication server.
  • the validity of the identification information is verified by the authentication server, and the verification result is obtained.
  • the core network responds to the network attach request according to the verification result returned by the authentication server.
  • the identification information of the target steerable device may be transparently transmitted to the core network by the base station, and after obtaining the identification information, the core network sends the identification information to the authentication server for verification of legality. High availability ensures that the core network can obtain identification information for the target steerable device.
  • the core network after receiving the verification result returned by the authentication server, the core network If the verification result is valid, the network attachment request sent by the target steerable device may be accepted. If the verification result is invalid, the network attachment request may be rejected.
  • the cellular network can be served as a legal steerable device to prevent the illegal steerable device from accessing the cellular network.
  • the core network may send a first notification message carrying the verification result to the base station, and the base station establishes a network connection with the target steerable device according to the first notification message.
  • the purpose of providing services for tangible devices with legal qualifications by the cellular network is realized.
  • the core network may send a second notification message for rejecting the network attach request to the target steerable device when the network connection request is denied, to prevent the illegal steerable device from accessing the cellular network.
  • the core network may further send a third notification message carrying the verification result to the base station. The base station may refuse to establish a network connection with the target steerable device according to the third notification message, thereby preventing an illegal steerable device from accessing the cellular network.
  • the authentication server may verify the validity of the identifier information, and return the obtained verification result to the core network.
  • the core network may accept a network attach request of the target steerable device when the verification result is valid, or the core network may also reject the target steerable device when the verification result is invalid. Network attach request.
  • the base station may receive the target notification message sent by the core network, where the target notification message carries the verification result of the identifier information of the target steerable device that initiates the network attach request. Further, the base station may perform an operation corresponding to the verification result on the stewards device according to the target notification information. The purpose of providing services to a steerable device by a cellular network is achieved.
  • FIG. 1 is a schematic diagram of a scenario for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 2 is a flow chart of a method for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 3 is a flow chart showing another method of controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 4 is a flow chart showing another method of controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 5 is a flowchart of another method for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 6 is a flowchart of another method for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 7 is a block diagram of a device for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 8 is a block diagram of another apparatus for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 9 is a block diagram of another apparatus for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 10 is a block diagram of another apparatus for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 11 is a block diagram of another apparatus for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 12 is a block diagram of another apparatus for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 13 is a block diagram of another apparatus for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 14 is a block diagram of another apparatus for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 15 is a block diagram of another apparatus for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 16 is a block diagram of another apparatus for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 17 is a block diagram of another apparatus for controlling a steerable device to access a network, according to an exemplary embodiment.
  • FIG. 18 is a schematic structural diagram of an apparatus for controlling a steerable device to access a network according to an exemplary embodiment.
  • FIG. 19 is a schematic structural diagram of another apparatus for controlling a steerable device to access a network according to an exemplary embodiment of the present disclosure.
  • FIG. 20 is a schematic structural diagram of another apparatus for controlling a steerable device to access a network according to an exemplary embodiment of the present disclosure.
  • first, second, third, etc. may be used in the present disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • first information may also be referred to as second information without departing from the scope of the present disclosure.
  • second information may also be referred to as first information.
  • word "if” as used herein may be interpreted as "when” or "when” or "in response to determination.”
  • the target steerable device 100 that initiates the network attach request may transparently transmit its own identification information to the core network 300 through the base station 200.
  • the core network 300 After receiving the identification information, the core network 300 sends the identification information to the authentication server 400, and the authentication server 400 verifies the validity of the identification information, thereby obtaining a verification result.
  • the authentication server 400 returns the verification result to the core network 300, and the core network 300 can respond to the network attachment request according to the verification result.
  • FIG. 2 is a flowchart of a method for controlling a steerable device to access a network according to an exemplary embodiment. Used in the core network, including the following steps:
  • step 101 acquiring identification information of a target steerable device, where the target steerable device is a steerable device that initiates a network attach request;
  • step 102 the identifier information is sent to the authentication server, so that the authentication server verifies the legality of the identifier information, and obtains a verification result;
  • step 103 receiving the verification result returned by the authentication server
  • step 104 the network attach request is responded to according to the verification result.
  • the core network may send the identifier information to the authentication server.
  • the validity of the identification information is verified by the authentication server, and the verification result is obtained.
  • the core network responds to the network attach request according to the verification result returned by the authentication server.
  • the identification information of the steerable device may be information for identifying the target stewards device, for example, may be a globally unique identification number or registration number assigned by the authentication server for the steerable device, and the like. Information can be pre-written into the steerable device by the manufacturer.
  • the identity information of the target device can be transparently transmitted to the core network through the base station, and the core network directly receives the information transparently transmitted by the base station, so that the identifier information is parsed according to the related technology. Just fine.
  • the core network may send the identifier information to the authentication server, and the authentication server verifies the validity of the identifier information to obtain a verification result.
  • the authentication server may pre-store a legal identification information list, where the legal identification information list includes identification information corresponding to all tradable devices that have been registered. If the authentication server finds the identification information of the target steerable device in the legal identification information list, it is determined that the verification result is valid for verification, otherwise the verification result is determined to be invalid.
  • the core network can directly receive the verification result returned by the authentication server.
  • the core network may respond to the network attach request initiated by the target steerable device according to the verification result.
  • the core network accepts the network attach request if the verification result is valid. At this time, the core network may send a first notification message carrying the verification result to the base station, and after determining, by the base station, the target steerable device is a legal steerable device according to the verification result in the first notification message, The target steerable device establishes a network connection.
  • the core network may send a second notification message for rejecting the network attachment request to the target steerable device, and after the target steerable device receives, The user is notified according to the second notification message to perform registration and the like in order to obtain legal qualifications.
  • the core network may further send a third notification message carrying the current verification result to the base station, and the base station determines, after the target steerable device does not belong to the legal steerable device, according to the verification result in the third notification message, Network connections to target steerable devices can be denied.
  • the core network may send the identifier information to the authentication server after obtaining the identifier information of the target steerable device that initiates the network attach request, and the authentication server verifies the legality of the identifier information.
  • the core network accepts or rejects the network attach request according to the verification result returned by the authentication server.
  • the cellular network provides services for legitimate steerable devices to prevent illegal steerable devices from accessing the cellular network.
  • FIG. 3 is a flow chart of another method for controlling a steerable device to access a network according to an exemplary embodiment.
  • step 201 the identifier information of the target steerable device sent by the core network is received, where the target steerable device is a steerable device that initiates a network attach request;
  • step 202 the legality of the identification information is verified, and a verification result is obtained;
  • step 203 the verification result is returned to the core network.
  • the authentication server may verify the validity of the identifier information, and return the obtained verification result to the core network.
  • the core network may accept a network attach request of the target steerable device when the verification result is valid, or the core network may also reject the target steerable device when the verification result is invalid. Network attach request.
  • the core network After the identifier information of the target steerable device is obtained, the core network sends the identifier information to the authentication server, and the authentication server directly receives the identifier information.
  • FIG. 4 is a flowchart of another method for controlling a steerable device to access a network according to the embodiment shown in FIG. 3.
  • Step 202 may include the following steps:
  • step 202-1 in the legal identification information list, it is found whether there is identification information of the target steerable device, and the legal identification information list includes identification information corresponding to all steerable devices that have been registered;
  • the authentication server may identify the identification information corresponding to all the tradable devices that have been registered.
  • a list of legal identification information is stored on the authentication server. After receiving the identifier information of the target steerable device sent by the core network, the identifier information of the target steerable device may be searched for in the legal identifier information list.
  • step 202-2 if the identification information of the target steerable device exists in the legal identification information list, it is determined that the verification result is verification legal, otherwise the verification result is determined to be invalid.
  • the authentication server finds the identification information of the target steerable device in the legal identification information list, it may be determined that the target steerable device has been registered, belongs to a legal steerable device, and will be verified. The result is determined to be valid for verification.
  • the authentication server does not find the identification information of the target steerable device in the legal identification information list, it may be determined that the target steerable device does not belong to a legal steerable device, and the verification result is determined to be invalid.
  • the authentication server may store the identification information corresponding to all the tradable devices that have been registered as the legal identification information list on the authentication server, and after receiving the identification information of the target steerable device sent by the core network. And determining, in the legal identification information list, whether the identification information of the target steerable device exists. If yes, the verification result may be determined to be valid. Otherwise, the verification result is determined to be invalid.
  • the validity of the identification information of the target steerable device can be verified by the authentication server, thereby ensuring that the cellular network can subsequently provide services for the legal steerable device.
  • the authentication server may further store identification information of some known illegal steerable devices, if the identification information of the target steerable device matches one of the stored illegible operability device identification information. If the verification result is directly determined to be invalid, the verification result may be determined to be valid.
  • FIG. 5 is a flowchart of a method for controlling a steerable device to access a network according to an exemplary embodiment. For the base station, the following steps are included:
  • step 301 the target notification message sent by the core network is received, where the target notification message carries the verification result of the identification information of the target steerable device, and the target steerable device is a steerable device that initiates the network attachment request;
  • step 302 an operation corresponding to the verification result is performed on the stewards device according to the target notification message.
  • the base station may receive a target notification message sent by the core network, where the target notification message is received.
  • the verification result of the identification information of the target steerable device that initiates the network attachment request is carried.
  • the base station may perform an operation corresponding to the verification result on the stewards device according to the target notification information. The purpose of providing services to a steerable device by a cellular network is achieved.
  • the core network After the identification information of the target steerable device is obtained, the core network sends the identifier information to the authentication server, and the authentication server verifies the validity of the identifier information, and obtains the verification result. After obtaining the verification result returned by the authentication server, the core network sends a target notification message carrying the verification result to the base station.
  • the base station may receive the target notification message through an interface between the base station and the core network.
  • the base station may perform an operation corresponding to the verification result on the stewards device according to the target notification message.
  • the base station may determine the target according to the first notification message, if the target notification message is a first notification message, and the first notification message is a notification message that is performed by the first notification message.
  • a steerable device is a legally steerable device. At this time, the base station can establish a signaling bearer and a data bearer with the target steerable device, thereby establishing a network connection with the target stewards device, and providing network services for the target stewards device.
  • the base station may determine, according to the third notification message.
  • the target steerable device does not belong to a legitimate steerable device.
  • the base station may refuse to establish a network connection with the target steerable device. If the base station has established a network connection with the target steerable device, the network connection may be disconnected to prevent an illegal steerable device from accessing the cellular network.
  • FIG. 6 is a flowchart of a method for controlling a steerable device to access a network according to an exemplary embodiment. include:
  • step 401 the core network receives the identification information of the target stewards device transparently transmitted by the target steerable device through the base station.
  • the target steerable device is a steerable device that initiates a network attach request.
  • step 402 the core network sends the identification information to the authentication server.
  • step 403 the authentication server searches the legal identification information list for the presence or absence of the identification information of the target steerable device.
  • the legal identification information list includes identification information corresponding to all tradable devices that have been registered.
  • step 404 if the identification information of the target steerable device exists in the legal identification information list, the authentication server determines that the verification result is valid for verification, otherwise determines that the verification result is that the verification is illegal.
  • step 405 the authentication server sends the verification result to the core network.
  • step 406 when the verification result is valid, the core network sends a first notification message carrying the verification result to the base station.
  • step 407 when receiving the first notification message, the base station establishes a signaling bearer and a data bearer for the target stewards.
  • step 408 when the verification result is that the verification is illegal, the core network sends a second notification message for rejecting the network attach request to the target stewards device.
  • step 409 when the verification result is that the verification is invalid, the core network sends a third notification message carrying the verification result to the base station.
  • step 410 the base station disconnects the network connection that has been established with the target steerable device upon receiving the third notification message.
  • the core network may send a first notification message or a third notification message carrying the verification result to the
  • the base station is configured to establish a network connection or disconnect the established network connection for the target steerable device, so that the cellular network provides services for the legal steerable device to prevent the illegal steerable device from accessing the cellular network.
  • the present disclosure also provides an application function implementation apparatus and an embodiment of a corresponding terminal.
  • FIG. 7 is a block diagram of a device for controlling a steerable device to access a network according to an exemplary embodiment, where the device is used in a core network, and the device includes:
  • the obtaining module 510 is configured to acquire identification information of the target steerable device, where the target steerable device is a steerable device that initiates a network attach request;
  • the first sending module 520 is configured to send the identifier information to the authentication server, so that the authentication server verifies the validity of the identifier information, and obtains a verification result;
  • the first receiving module 530 is configured to receive the verification result returned by the authentication server
  • the first execution module 540 is configured to respond to the network attach request according to the verification result.
  • FIG. 8 is a block diagram of another apparatus for controlling a steerable device to access a network according to the embodiment shown in FIG. 7.
  • the obtaining module 510 includes:
  • the receiving submodule 511 is configured to receive identification information of the target stewards device transparently transmitted by the target steerable device through the base station.
  • FIG. 9 is a block diagram of another apparatus for controlling a steerable device to access a network according to the embodiment shown in FIG. 7.
  • the first execution module 540 includes:
  • the first execution submodule 541 is configured to accept the network attach request if the verification result is valid for verification;
  • the second execution sub-module 542 is configured to reject the network attach request if the verification result is that the verification is illegal.
  • FIG. 10 is a block diagram of another apparatus for controlling a steerable device to access a network according to the embodiment shown in FIG. 9.
  • the first execution submodule 541 includes:
  • the first sending unit 5411 is configured to send a first notification message carrying the verification result to the base station, so that the base station establishes a network connection with the target steerable device according to the first notification message.
  • FIG. 11 is a block diagram of another apparatus for controlling a steerable device to access a network according to the embodiment shown in FIG. 9.
  • the second execution submodule 542 includes:
  • the second sending unit 5421 is configured to send a second notification message for rejecting the network attach request to the target stewards device;
  • the third sending unit 5422 is configured to send a third notification message carrying the verification result to the base station, so that the base station refuses to establish a network connection with the target steerable device according to the third notification message.
  • a block diagram of a device for controlling a steerable device accessing a network, the device for authenticating a server includes:
  • the second receiving module 610 is configured to receive identification information of the target steerable device sent by the core network, where the target steerable device is a steerable device that initiates a network attach request;
  • the verification module 620 is configured to verify the validity of the identification information and obtain a verification result.
  • the second sending module 630 is configured to return the verification result to the core network.
  • Figure 13 is another control steerable device shown on the basis of the embodiment shown in Figure 12
  • a device block diagram of the access network, the verification module 620 includes:
  • the search sub-module 621 is configured to: in the legal identification information list, search for the identifier information of the target steerable device, where the legal identifier information list includes the identifier information corresponding to all the tradable devices that have been registered;
  • the determining sub-module 622 is configured to determine that the verification result is valid if the identification information of the target steerable device exists in the legal identification information list, otherwise the verification result is determined to be invalid.
  • FIG. 14 is a block diagram of a device for controlling a steerable device to access a network according to an exemplary embodiment, where the device is used in a base station, and the device includes:
  • the third receiving module 710 is configured to receive a target notification message sent by the core network, where the target notification message carries a verification result of the identifier information of the target steerable device, where the target steerable device is capable of initiating a network attach request.
  • the second execution module 720 is configured to perform an operation corresponding to the verification result on the stewards device according to the target notification message.
  • FIG. 15 is a block diagram of another apparatus for controlling a steerable device to access a network according to the embodiment shown in FIG. 14.
  • the second execution module 720 includes:
  • the third execution sub-module 721 is configured to establish a network connection with the target steerable device if the target notification message is the first notification message, where the first notification message is carried Notification message;
  • the fourth execution sub-module 722 is configured to: if the target notification message is a third notification message, refuse to establish a network connection with the target steerable device, where the third notification message is the verification result carried as verification Invalid notification message.
  • FIG. 16 is a block diagram of another apparatus for controlling a steerable device to access a network according to the embodiment shown in FIG. 15.
  • the third execution sub-module 721 includes:
  • the first execution unit 7211 is configured to establish a signaling bearer and a data bearer for the target stewards.
  • FIG. 17 is a block diagram of another apparatus for controlling a steerable device to access a network according to the embodiment shown in FIG. 15.
  • the fourth execution sub-module 722 includes:
  • the second execution unit 7221 is configured to disconnect the network connection that has been established with the target steerable device.
  • the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
  • the device embodiments described above are merely illustrative, wherein the units described above as separate components may or may not be physically separate, and the components displayed as units may be Or it may not be a physical unit, that is, it may be located in one place, or it may be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the objectives of the present disclosure. Those of ordinary skill in the art can understand and implement without any creative effort.
  • the present disclosure also provides a computer readable storage medium storing a computer program for performing the above-described control steerable device access network for any of the core networks Methods.
  • the present disclosure also provides a computer readable storage medium storing a computer program for executing any of the above-described control steerable device access networks for authenticating a server Methods.
  • the present disclosure also provides a computer readable storage medium storing a computer program for performing any of the above-described control steerable devices for a base station to access a network method.
  • the present disclosure also provides an apparatus for controlling a steerable device to access a network, where the apparatus is used in a core network, including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the target steerable device is a steerable device that initiates a network attach request
  • FIG. 18 is a schematic structural diagram of an apparatus 1800 for controlling a steerable device to access a network according to an exemplary embodiment.
  • Device 1800 can be provided as a core network.
  • apparatus 1800 includes a processing component 1822, a wireless transmit/receive component 1824, an antenna component 1826, and a signal processing portion specific to the wireless interface.
  • Processing component 1822 can further include one or more processors.
  • One of the processing components 1822 can be configured to:
  • the target steerable device is a steerable device that initiates a network attach request
  • the present disclosure also provides an apparatus for controlling a steerable device to access a network, the apparatus for authenticating a server, including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the target steerable device is a steerable device that initiates a network attach request
  • the verification result is returned to the core network.
  • FIG. 19 is a schematic structural diagram of an apparatus 1900 for controlling a steerable device to access a network according to an exemplary embodiment.
  • device 1900 can be provided as an authentication server.
  • apparatus 1900 includes a processing component 1922 that further includes one or more processors, and memory resources represented by memory 1932 for storing instructions executable by processing component 1922, such as an application.
  • An application stored in memory 1932 can include one or more modules each corresponding to a set of instructions.
  • processing component 1922 is configured to execute instructions to perform the above-described method of controlling a steerable device to access a network.
  • Apparatus 1900 can also include a power supply component 1926 configured to perform power management of apparatus 1900, a wired or wireless network interface 1950 configured to connect apparatus 1900 to the network, and an input/output (I/O) interface 1958.
  • Device 1900 can operate based on an operating system stored in memory 1932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
  • the present disclosure further provides an apparatus for controlling a steerable device to access a network, where the apparatus is used for a base station, including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • a target notification message carries a verification result of the identifier information of the target steerable device, where the target steerable device is a steerable device that initiates a network attachment request;
  • FIG. 20 is a schematic structural diagram of an apparatus 2000 for controlling a steerable device to access a network according to an exemplary embodiment.
  • Apparatus 2000 can be provided as a base station.
  • apparatus 2000 includes a processing component 2022, a wireless transmit/receive component 2024, an antenna component 2026, and a signal processing portion specific to the wireless interface.
  • Processing component 2022 can further include one or more processors.
  • One of the processing components 2022 can be configured to:
  • a target notification message carries a verification result of the identifier information of the target steerable device, where the target steerable device is a steerable device that initiates a network attachment request;

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开提供一种控制可操控设备接入网络的方法及装置,其中,所述方法包括:获取目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;将所述标识信息发送给认证服务器,以使所述认证服务器对所述标识信息的合法性进行验证,获得验证结果;接收所述认证服务器返回的所述验证结果;根据所述验证结果,响应所述网络附着请求。本公开可以控制合法的可操控设备接入蜂窝网络,使得蜂窝网络可以为可操控设备提供服务。

Description

一种控制可操控设备接入网络的方法及装置 技术领域
本公开涉及通信技术领域,尤其涉及一种控制可操控设备接入网络的方法及装置。
背景技术
随着可操控设备技术的快速发展、成本的降低以及功能的完善,可操控设备的应用越来越普遍。例如无人机目前在航拍、农业、植保等等多个领域的应用,大大的拓展了可操控设备本身的用途,各个国家都在积极扩展行业应用与发展可操控设备技术。
但是,在新一代通信系统中,还没有通过蜂窝网络控制可操控设备的方案。
发明内容
为克服相关技术中存在的问题,本公开实施例提供一种控制可操控设备接入网络的方法及装置。
根据本公开实施例的第一方面,提供一种控制可操控设备接入网络的方法,所述方法用于核心网,所述方法包括:
获取目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
将所述标识信息发送给认证服务器,以使所述认证服务器对所述标识信息的合法性进行验证,获得验证结果;
接收所述认证服务器返回的所述验证结果;
根据所述验证结果,响应所述网络附着请求。
可选地,所述获取目标可操控设备的标识信息,包括:
接收目标可操控设备通过基站透传的所述目标可操控设备的标识信息。
可选地,所述根据所述验证结果,响应所述网络附着请求,包括:
如果所述验证结果为验证合法,则接受所述网络附着请求;
如果所述验证结果为验证不合法,则拒绝所述网络附着请求。
可选地,所述接受所述网络附着请求,包括:
发送携带所述验证结果的第一通知消息到基站,以使所述基站根据所述第一通知消息,与所述目标可操控设备建立网络连接。
可选地,所述拒绝所述网络附着请求,包括:
发送用于拒绝所述网络附着请求的第二通知消息到所述目标可操控设备;
发送携带所述验证结果的第三通知消息到基站,以使所述基站根据所述第三通知消息,拒绝与所述目标可操控设备建立网络连接。
根据本公开实施例的第二方面,提供一种控制可操控设备接入网络的方法,所述方法用于认证服务器,所述方法包括:
接收核心网发送的目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
对所述标识信息的合法性进行验证,获得验证结果;
将所述验证结果返回给所述核心网。
可选地,所述对所述标识信息的合法性进行验证,获得验证结果,包括:
在合法标识信息列表中,查找是否存在所述目标可操控设备的标识信息,所述合法标识信息列表包括所有已进行登记的可操控设备所对应的标识信息;
如果所述合法标识信息列表中存在所述目标可操控设备的标识信息,则确定所述验证结果为验证合法,否则确定所述验证结果为验证不合法。
根据本公开实施例的第三方面,提供一种控制可操控设备接入网络的方法,所述方法用于基站,所述方法包括:
接收核心网发送的目标通知消息,所述目标通知消息中携带对目标可操控设备的标识信息的验证结果,所述目标可操控设备是发起网络附着请求的可操控设备;
根据所述目标通知消息,对所述可操控设备执行与所述验证结果对应的操作。
可选地,所述根据所述目标通知消息,对所述可操控设备执行与所述验证结果对应的操作,包括:
如果所述目标通知消息为第一通知消息,则与所述目标可操控设备建立网络连 接,所述第一通知消息是携带的所述验证结果为验证合法的通知消息;
如果所述目标通知消息为第三通知消息,则拒绝与所述目标可操控设备建立网络连接,所述第三通知消息是携带的所述验证结果为验证不合法的通知消息。
可选地,所述与所述目标可操控设备建立网络连接,包括:
为所述目标可操控设备建立信令承载和数据承载。
可选地,所述拒绝与所述目标可操控设备建立网络连接,包括:
断开已经与所述目标可操控设备建立的网络连接。
根据本公开实施例的第四方面,提供一种控制可操控设备接入网络的装置,所述装置用于核心网,所述装置包括:
获取模块,被配置为获取目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
第一发送模块,被配置为将所述标识信息发送给认证服务器,以使所述认证服务器对所述标识信息的合法性进行验证,获得验证结果;
第一接收模块,被配置为接收所述认证服务器返回的所述验证结果;
第一执行模块,被配置为根据所述验证结果,响应所述网络附着请求。
可选地,所述获取模块包括:
接收子模块,被配置为接收目标可操控设备通过基站透传的所述目标可操控设备的标识信息。
可选地,所述第一执行模块包括:
第一执行子模块,被配置为如果所述验证结果为验证合法,则接受所述网络附着请求;
第二执行子模块,被配置为如果所述验证结果为验证不合法,则拒绝所述网络附着请求。
可选地,所述第一执行子模块包括:
第一发送单元,被配置为发送携带所述验证结果的第一通知消息到基站,以使所述基站根据所述第一通知消息,与所述目标可操控设备建立网络连接。
可选地,所述第二执行子模块包括:
第二发送单元,被配置为发送用于拒绝所述网络附着请求的第二通知消息到所述目标可操控设备;
第三发送单元,被配置为发送携带所述验证结果的第三通知消息到基站,以使所述基站根据所述第三通知消息,拒绝与所述目标可操控设备建立网络连接。
根据本公开实施例的第五方面,提供一种控制可操控设备接入网络的装置,所述装置用于认证服务器,所述装置包括:
第二接收模块,被配置为接收核心网发送的目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
验证模块,被配置为对所述标识信息的合法性进行验证,获得验证结果;
第二发送模块,被配置为将所述验证结果返回给所述核心网。
可选地,所述验证模块包括:
查找子模块,被配置为在合法标识信息列表中,查找是否存在所述目标可操控设备的标识信息,所述合法标识信息列表包括所有已进行登记的可操控设备所对应的标识信息;
确定子模块,被配置为如果所述合法标识信息列表中存在所述目标可操控设备的标识信息,则确定所述验证结果为验证合法,否则确定所述验证结果为验证不合法。
根据本公开实施例的第六方面,提供一种控制可操控设备接入网络的装置,所述装置用于基站,所述装置包括:
第三接收模块,被配置为接收核心网发送的目标通知消息,所述目标通知消息中携带对目标可操控设备的标识信息的验证结果,所述目标可操控设备是发起网络附着请求的可操控设备;
第二执行模块,被配置为根据所述目标通知消息,对所述可操控设备执行与所述验证结果对应的操作。
可选地,所述第二执行模块包括:
第三执行子模块,被配置为如果所述目标通知消息为第一通知消息,则与所述目标可操控设备建立网络连接,所述第一通知消息是携带的所述验证结果为验证合法 的通知消息;
第四执行子模块,被配置为如果所述目标通知消息为第三通知消息,则拒绝与所述目标可操控设备建立网络连接,所述第三通知消息是携带的所述验证结果为验证不合法的通知消息。
可选地,所述第三执行子模块包括:
第一执行单元,被配置为为所述目标可操控设备建立信令承载和数据承载。
可选地,所述第四执行子模块包括:
第二执行单元,被配置为断开已经与所述目标可操控设备建立的网络连接。
根据本公开实施例的第七方面,提供一种计算机可读存储介质,所述存储介质存储有计算机程序,所述计算机程序用于执行上述第一方面所述的控制可操控设备接入网络的方法。
根据本公开实施例的第八方面,提供一种计算机可读存储介质,所述存储介质存储有计算机程序,所述计算机程序用于执行上述第二方面所述的控制可操控设备接入网络的方法。
根据本公开实施例的第九方面,提供一种计算机可读存储介质,所述存储介质存储有计算机程序,所述计算机程序用于执行上述第三方面所述的控制可操控设备接入网络的方法。
根据本公开实施例的第十方面,提供一种控制可操控设备接入网络的装置,所述装置用于核心网,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
获取目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
将所述标识信息发送给认证服务器,以使所述认证服务器对所述标识信息的合法性进行验证,获得验证结果;
接收所述认证服务器返回的所述验证结果;
根据所述验证结果,响应所述网络附着请求。
根据本公开实施例的第十一方面,提供一种控制可操控设备接入网络的装置,所述装置用于认证服务器,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收核心网发送的目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
对所述标识信息的合法性进行验证,获得验证结果;
将所述验证结果返回给所述核心网。
根据本公开实施例的第十二方面,提供一种控制可操控设备接入网络的装置,所述装置用于基站,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收核心网发送的目标通知消息,所述目标通知消息中携带对目标可操控设备的标识信息的验证结果,所述目标可操控设备是发起网络附着请求的可操控设备;
根据所述目标通知消息,对所述可操控设备执行与所述验证结果对应的操作。
本公开的实施例提供的技术方案可以包括以下有益效果:
本公开实施例中,核心网在获取到发起网络附着请求的目标可操控设备的标识信息之后,可以将所述标识信息发送给认证服务器。由所述认证服务器对所述标识信息的合法性进行验证,获得验证结果。核心网根据认证服务器返回的验证结果,响应所述网络附着请求。通过上述过程,实现了由蜂窝网络为可操控设备提供服务的目的。
本公开实施例中,可以由基站将目标可操控设备的标识信息通过透传给核心网,核心网在获取到所述标识信息后,将所述标识信息发送给认证服务器进行合法性的验证。可用性高,确保核心网可以获取到目标可操控设备的标识信息。
本公开实施例中,核心网在接收到认证服务器返回的验证结果后,如果所述验 证结果为验证合法,则可以接受目标可操控设备发请的网络附着请求,如果验证结果为验证不合法,则可以拒绝所述网络附着请求。通过上述过程,可以由蜂窝网络为合法的可操控设备提供服务,避免不合法的可操控设备接入蜂窝网络。
本公开实施例中,核心网在确定接受网络附着请求时,可以发送携带验证结果的第一通知消息到基站,由基站根据所述第一通知消息,与目标可操控设备建立网络连接。实现了由蜂窝网络为具备合法资质的可操控设备提供服务的目的。
本公开实施例中,核心网在确定拒绝网络附着请求时,可以发送用于拒绝所述网络附着请求的第二通知消息到所述目标可操控设备,避免不合法的可操控设备接入蜂窝网络。另外,所述核心网还可以发送携带所述验证结果的第三通知消息到基站。基站可以根据所述第三通知消息,拒绝与所述目标可操控设备建立网络连接,避免了不合法的可操控设备接入蜂窝网络。
本公开实施例中,认证服务器在接收到核心网发送的目标可操控设备的标识信息之后,可以对所述标识信息的合法性进行验证,并将获得的验证结果返回给所述核心网。所述核心网可以在所述验证结果为验证合法时,接受目标可操控设备的网络附着请求,或者所述核心网还可以在所述验证结果为验证不合法时,拒绝所述目标可操控设备的网络附着请求。通过上述过程,可以由认证服务器对目标可操控设备的标识信息的合法性进行验证,从而确保蜂窝网络可以为合法的可操控设备提供服务。
本公开实施例中,基站可以接收核心网发送的目标通知消息,所述目标通知消息中携带了对发起网络附着请求的目标可操控设备的标识信息的验证结果。进一步地,所述基站可以根据所述目标通知信息,对所述可操控设备执行与所述验证结果对应的操作。实现了由蜂窝网络为可操控设备提供服务的目的。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。
图1是根据一示例性实施例示出的一种控制可操控设备接入网络的场景示意图。
图2是根据一示例性实施例示出的一种控制可操控设备接入网络的方法流程图。
图3是根据一示例性实施例示出的另一种控制可操控设备接入网络的方法流程图。
图4是根据一示例性实施例示出的另一种控制可操控设备接入网络的方法流程图。
图5是根据一示例性实施例示出的另一种控制可操控设备接入网络的方法流程图。
图6是根据一示例性实施例示出的另一种控制可操控设备接入网络的方法流程图。
图7是根据一示例性实施例示出的一种控制可操控设备接入网络的装置框图。
图8是根据一示例性实施例示出的另一种控制可操控设备接入网络的装置框图。
图9是根据一示例性实施例示出的另一种控制可操控设备接入网络的装置框图。
图10是根据一示例性实施例示出的另一种控制可操控设备接入网络的装置框图。
图11是根据一示例性实施例示出的另一种控制可操控设备接入网络的装置框图。
图12是根据一示例性实施例示出的另一种控制可操控设备接入网络的装置框图。
图13是根据一示例性实施例示出的另一种控制可操控设备接入网络的装置框图。
图14是根据一示例性实施例示出的另一种控制可操控设备接入网络的装置框图。
图15是根据一示例性实施例示出的另一种控制可操控设备接入网络的装置框图。
图16是根据一示例性实施例示出的另一种控制可操控设备接入网络的装置框图。
图17是根据一示例性实施例示出的另一种控制可操控设备接入网络的装置框图。
图18本公开根据一示例性实施例示出的一种用于控制可操控设备接入网络的装置的一结构示意图。
图19是本公开根据一示例性实施例示出的另一种用于控制可操控设备接入网络的装置的一结构示意图。
图20是本公开根据一示例性实施例示出的另一种用于控制可操控设备接入网络的装置的一结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一些方面相一致的装置和方法的例子。
在本公开使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开。在本公开和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
本公开实施例提供的控制可操控设备接入网络的场景如图1所示,发起网络附着请求的目标可操控设备100可以将自身的标识信息通过基站200透传给核心网300。核心网300接收到所述标识信息后,将所述标识信息发送给认证服务器400,由认证服务器400对所述标识信息的合法性进行验证,从而获得验证结果。认证服务器400将所述验证结果返回给所述核心网300,所述核心网300可以根据所述验证结果,来响应所述网络附着请求。
本公开实施例提供了一种控制可操控设备接入网络的方法,参照图2所示,图2是根据一示例性实施例示出的一种控制可操控设备接入网络的方法流程图,可以用于核心网,包括以下步骤:
在步骤101中,获取目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
在步骤102中,将所述标识信息发送给认证服务器,以使所述认证服务器对所述标识信息的合法性进行验证,获得验证结果;
在步骤103中,接收所述认证服务器返回的所述验证结果;
在步骤104中,根据所述验证结果,响应所述网络附着请求。
上述实施例中,核心网在获取到发起网络附着请求的目标可操控设备的标识信息之后,可以将所述标识信息发送给认证服务器。由所述认证服务器对所述标识信息的合法性进行验证,获得验证结果。核心网根据认证服务器返回的验证结果,响应所述网络附着请求。通过上述过程,实现了由蜂窝网络为可操控设备提供服务的目的。
针对上述步骤101,可操控设备的标识信息可以是用于标识所述目标可操控设备的信息,例如可以是由认证服务器为可操控设备分配的全球唯一的识别号码或登记号码等,所述标识信息可以由制造厂商预先写入可操控设备中。
本步骤中,目标可操控设备发起网络附着请求时,可以将自身的标识信息通过基站透传给核心网,所述核心网直接接收基站透传的信息,从而按照相关技术解析出所述标识信息即可。
针对上述步骤102,核心网在获得了所述标识信息之后,可以将所述标识信息发送给认证服务器,由认证服务器对所述标识信息的合法性进行验证,获得验证结果。
可选地,所述认证服务器可以预先存储合法标识信息列表,所述合法标识信息列表包括所有已进行登记的可操控设备所对应的标识信息。所述认证服务器如果在所述合法标识信息列表中查找到所述目标可操控设备的标识信息,则确定验证结果为验证合法,否则确定验证结果为验证不合法。
针对上述步骤103,核心网可以直接接收认证服务器返回的验证结果。
针对上述步骤104,核心网在接收到所述验证结果之后,可以根据所述验证结果,来响应所述目标可操控设备发起的所述网络附着请求。
其中,如果所述验证结果为验证合法,则所述核心网接受所述网络附着请求。此时,核心网可以发送携带所述验证结果的第一通知消息到基站,由基站根据所述第一通知消息中的验证结果,确定所述目标可操控设备是合法的可操控设备之后,与所述目标可操控设备建立网络连接。
如果所述验证结果为验证不合法,则所述核心网可以发送用于拒绝所述网络附着请求的第二通知消息到所述目标可操控设备,所述目标可操控设备接收后,就可以 根据所述第二通知消息通知用户进行注册等操作,以便获得合法资质。
另外,核心网还可以发送携带当前验证结果的第三通知消息到基站,所述基站根据所述第三通知消息中的验证结果,确定所述目标可操控设备不属于合法的可操控设备之后,可以拒绝与目标可操控设备建立网络连接。
上述实施例中,核心网可以在获取到发起网络附着请求的目标可操控设备的标识信息之后,将所述标识信息发送给认证服务器,由所述认证服务器对所述标识信息的合法性进行验证,核心网会根据认证服务器返回的验证结果来接受或拒绝所述网络附着请求。从而由蜂窝网络为合法的可操控设备提供服务,避免不合法的可操控设备接入蜂窝网络。
本公开实施例还提供了另一种控制可操控设备接入网络的方法,参照图3所示,图3是根据一示例性实施例示出的另一种控制可操控设备接入网络的方法流程图,可以用于认证服务器,包括以下步骤:
在步骤201中,接收核心网发送的目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
在步骤202中,对所述标识信息的合法性进行验证,获得验证结果;
在步骤203中,将所述验证结果返回给所述核心网。
上述实施例中,认证服务器在接收到核心网发送的目标可操控设备的标识信息之后,可以对所述标识信息的合法性进行验证,并将获得的验证结果返回给所述核心网。所述核心网可以在所述验证结果为验证合法时,接受目标可操控设备的网络附着请求,或者所述核心网还可以在所述验证结果为验证不合法时,拒绝所述目标可操控设备的网络附着请求。通过上述过程,可以由认证服务器对目标可操控设备的标识信息的合法性进行验证,从而确保蜂窝网络可以为合法的可操控设备提供服务。
针对上述步骤201,核心网会在获取到目标可操控设备的标识信息之后,将所述标识信息发送给认证服务器,所述认证服务器直接接收即可。
针对步骤202,可选地,参照图4所示,图4是根据图3所示实施例示出的另一种控制可操控设备接入网络的方法流程图,步骤202可以包括以下步骤:
在步骤202-1中,在合法标识信息列表中,查找是否存在所述目标可操控设备的标识信息,所述合法标识信息列表包括所有已进行登记的可操控设备所对应的标识信息;
本步骤中,认证服务器可以将所有已进行登记的可操控设备所对应的标识信息 作为合法标识信息列表存储在所述认证服务器上。在接收到核心网发送的目标可操控设备的标识信息之后,可以在所述合法标识信息列表中查找是否存在所述目标可操控设备的标识信息。
在步骤202-2中,如果所述合法标识信息列表中存在所述目标可操控设备的标识信息,则确定所述验证结果为验证合法,否则确定所述验证结果为验证不合法。
本步骤中,如果认证服务器在所述合法标识信息列表中查找到所述目标可操控设备的标识信息,则可以确定所述目标可操控设备已经进行过登记,属于合法的可操控设备,将验证结果确定为验证合法。
如果认证服务器在所述合法标识信息列表中查找不到所述目标可操控设备的标识信息,则可以确定所述目标可操控设备不属于合法的可操控设备,将验证结果确定为验证不合法。
上述实施例中,认证服务器可以将所有已进行登记的可操控设备所对应的标识信息作为合法标识信息列表存储在所述认证服务器上,在接收到核心网发送的目标可操控设备的标识信息之后,在所述合法标识信息列表中查找是否存在所述目标可操控设备的标识信息,如果存在,则可以将验证结果确定为验证合法,否则将所述验证结果确定为验证不合法。通过上述过程,可以由认证服务器对目标可操控设备的标识信息的合法性进行验证,从而确保蜂窝网络后续可以为合法的可操控设备提供服务。
当然,本公开实施例中,认证服务器还可以存储一些已知的非法的可操控设备的标识信息,如果目标可操控设备的标识信息与已存储的非法的可操控设备的标识信息中的一个匹配,则直接确定所述验证结果为验证不合法,否则可以确定验证结果为验证合法。
本公开实施例提供了一种控制可操控设备接入网络的方法,参照图5所示,图5是根据一示例性实施例示出的一种控制可操控设备接入网络的方法流程图,可以用于基站,包括以下步骤:
在步骤301中,接收核心网发送的目标通知消息,所述目标通知消息中携带对目标可操控设备的标识信息的验证结果,所述目标可操控设备是发起网络附着请求的可操控设备;
在步骤302中,根据所述目标通知消息,对所述可操控设备执行与所述验证结果对应的操作。
上述实施例中,基站可以接收核心网发送的目标通知消息,所述目标通知消息 中携带了对发起网络附着请求的目标可操控设备的标识信息的验证结果。进一步地,所述基站可以根据所述目标通知信息,对所述可操控设备执行与所述验证结果对应的操作。实现了由蜂窝网络为可操控设备提供服务的目的。
针对上述步骤301,核心网在获取到目标可操控设备的标识信息之后,将所述标识信息发送给认证服务器,由认证服务器对所述标识信息的合法性进行验证,获得验证结果。所述核心网会在获取到认证服务器返回的验证结果之后,发送携带所述验证结果的目标通知消息到基站。所述基站可以通过基站与核心网之间的接口接收所述目标通知消息。
针对上述步骤302,基站可以根据所述目标通知消息,对所述可操控设备执行与所述验证结果对应的操作。
其中,如果所述目标通知消息是第一通知消息,所述第一通知消息是携带的所述验证结果为验证合法的通知消息,则所述基站可以根据所述第一通知消息确定所述目标可操控设备属于合法的可操控设备。此时,基站可以与目标可操控设备建立信令承载和数据承载,从而与所述目标可操控设备建立网络连接,为所述目标可操控设备提供网络服务。
如果基站接收到的所述目标通知消息为第三通知消息,所述第三通知消息是携带的所述验证结果为验证不合法的通知消息,则所述基站可以根据所述第三通知消息确定所述目标可操控设备不属于合法的可操控设备。此时,所述基站可以拒绝与所述目标可操控设备建立网络连接。如果基站已经与所述目标可操控设备建立了网络连接,则可以断开所述网络连接,避免不合法的可操控设备接入蜂窝网络。
本公开实施例提供了一种控制可操控设备接入网络的方法,参照图6所示,图6是根据一示例性实施例示出的一种控制可操控设备接入网络的方法流程图,可以包括:
在步骤401中,核心网接收目标可操控设备通过基站透传的所述目标可操控设备的标识信息。
其中,所述目标可操控设备是发起网络附着请求的可操控设备。
在步骤402中,核心网发送所述标识信息到认证服务器。
在步骤403中,认证服务器在合法标识信息列表中,查找是否存在所述目标可操控设备的标识信息。
其中,所述合法标识信息列表包括所有已进行登记的可操控设备所对应的标识信息。
在步骤404中,如果所述合法标识信息列表中存在所述目标可操控设备的标识信息,则认证服务器确定所述验证结果为验证合法,否则确定所述验证结果为验证不合法。
在步骤405中,认证服务器发送所述验证结果到所述核心网。
在步骤406中,在所述验证结果为验证合法时,所述核心网发送携带所述验证结果的第一通知消息到基站。
在步骤407中,所述基站在接收到所述第一通知消息时,为所述目标可操控设备建立信令承载和数据承载。
在步骤408中,在所述验证结果为验证不合法时,所述核心网发送用于拒绝所述网络附着请求的第二通知消息到所述目标可操控设备。
在步骤409中,在所述验证结果为验证不合法时,所述核心网发送携带所述验证结果的第三通知消息到基站。
在步骤410中,基站在接收到所述第三通知消息时,断开已经与所述目标可操控设备建立的网络连接。
上述实施例中,核心网在接收到认证服务器返回的对目标可操控设备的标识信息的合法性的验证结果之后,可以发送携带所述验证结果的第一通知消息或第三通知消息到所述基站,由所述基站为所述目标可操控设备建立网络连接或断开已建立的网络连接,从而由蜂窝网络为合法的可操控设备提供服务,避免不合法的可操控设备接入蜂窝网络。
对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本公开并不受所描述的动作顺序的限制,因为依据本公开,某些步骤可以采用其他顺序或者同时进行。
其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于可选实施例,所涉及的动作和模块并不一定是本公开所必须的。
与前述应用功能实现方法实施例相对应,本公开还提供了应用功能实现装置及相应的终端的实施例。
参照图7根据一示例性实施例示出的一种控制可操控设备接入网络的装置框图,所述装置用于核心网,所述装置包括:
获取模块510,被配置为获取目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
第一发送模块520,被配置为将所述标识信息发送给认证服务器,以使所述认证服务器对所述标识信息的合法性进行验证,获得验证结果;
第一接收模块530,被配置为接收所述认证服务器返回的所述验证结果;
第一执行模块540,被配置为根据所述验证结果,响应所述网络附着请求。
参照图8,图8是根据图7所示实施例的基础上示出的另一种控制可操控设备接入网络的装置框图,所述获取模块510包括:
接收子模块511,被配置为接收目标可操控设备通过基站透传的所述目标可操控设备的标识信息。
参照图9,图9是根据图7所示实施例的基础上示出的另一种控制可操控设备接入网络的装置框图,所述第一执行模块540包括:
第一执行子模块541,被配置为如果所述验证结果为验证合法,则接受所述网络附着请求;
第二执行子模块542,被配置为如果所述验证结果为验证不合法,则拒绝所述网络附着请求。
参照图10,图10是根据图9所示实施例的基础上示出的另一种控制可操控设备接入网络的装置框图,所述第一执行子模块541包括:
第一发送单元5411,被配置为发送携带所述验证结果的第一通知消息到基站,以使所述基站根据所述第一通知消息,与所述目标可操控设备建立网络连接。
参照图11,图11是根据图9所示实施例的基础上示出的另一种控制可操控设备接入网络的装置框图,所述第二执行子模块542包括:
第二发送单元5421,被配置为发送用于拒绝所述网络附着请求的第二通知消息到所述目标可操控设备;
第三发送单元5422,被配置为发送携带所述验证结果的第三通知消息到基站,以使所述基站根据所述第三通知消息,拒绝与所述目标可操控设备建立网络连接。
参照图12根据一示例性实施例示出的一种控制可操控设备接入网络的装置框图,所述装置用于认证服务器,所述装置包括:
第二接收模块610,被配置为接收核心网发送的目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
验证模块620,被配置为对所述标识信息的合法性进行验证,获得验证结果;
第二发送模块630,被配置为将所述验证结果返回给所述核心网。
参照图13,图13是根据图12所示实施例的基础上示出的另一种控制可操控设 备接入网络的装置框图,所述验证模块620包括:
查找子模块621,被配置为在合法标识信息列表中,查找是否存在所述目标可操控设备的标识信息,所述合法标识信息列表包括所有已进行登记的可操控设备所对应的标识信息;
确定子模块622,被配置为如果所述合法标识信息列表中存在所述目标可操控设备的标识信息,则确定所述验证结果为验证合法,否则确定所述验证结果为验证不合法。
参照图14根据一示例性实施例示出的一种控制可操控设备接入网络的装置框图,所述装置用于基站,所述装置包括:
第三接收模块710,被配置为接收核心网发送的目标通知消息,所述目标通知消息中携带对目标可操控设备的标识信息的验证结果,所述目标可操控设备是发起网络附着请求的可操控设备;
第二执行模块720,被配置为根据所述目标通知消息,对所述可操控设备执行与所述验证结果对应的操作。
参照图15,图15是根据图14所示实施例的基础上示出的另一种控制可操控设备接入网络的装置框图,所述第二执行模块720包括:
第三执行子模块721,被配置为如果所述目标通知消息为第一通知消息,则与所述目标可操控设备建立网络连接,所述第一通知消息是携带的所述验证结果为验证合法的通知消息;
第四执行子模块722,被配置为如果所述目标通知消息为第三通知消息,则拒绝与所述目标可操控设备建立网络连接,所述第三通知消息是携带的所述验证结果为验证不合法的通知消息。
参照图16,图16是根据图15所示实施例的基础上示出的另一种控制可操控设备接入网络的装置框图,所述第三执行子模块721包括:
第一执行单元7211,被配置为为所述目标可操控设备建立信令承载和数据承载。
参照图17,图17是根据图15所示实施例的基础上示出的另一种控制可操控设备接入网络的装置框图,所述第四执行子模块722包括:
第二执行单元7221,被配置为断开已经与所述目标可操控设备建立的网络连接。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中上述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是 或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本公开方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
相应地,本公开还提供了一种计算机可读存储介质,所述存储介质存储有计算机程序,所述计算机程序用于执行上述用于核心网的任一所述的控制可操控设备接入网络的方法。
相应地,本公开还提供了一种计算机可读存储介质,所述存储介质存储有计算机程序,所述计算机程序用于执行上述用于认证服务器的任一所述的控制可操控设备接入网络的方法。
相应地,本公开还提供了一种计算机可读存储介质,所述存储介质存储有计算机程序,所述计算机程序用于执行上述用于基站的任一所述的控制可操控设备接入网络的方法。
相应地,本公开还提供了一种控制可操控设备接入网络的装置,所述装置用于核心网,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
获取目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
将所述标识信息发送给认证服务器,以使所述认证服务器对所述标识信息的合法性进行验证,获得验证结果;
接收所述认证服务器返回的所述验证结果;
根据所述验证结果,响应所述网络附着请求。
如图18所示,图18是根据一示例性实施例示出的一种控制可操控设备接入网络的装置1800的一结构示意图。装置1800可以被提供为核心网。参照图18,装置1800包括处理组件1822、无线发射/接收组件1824、天线组件1826、以及无线接口特有的信号处理部分,处理组件1822可进一步包括一个或多个处理器。
处理组件1822中的其中一个处理器可以被配置为:
获取目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
将所述标识信息发送给认证服务器,以使所述认证服务器对所述标识信息的合法性进行验证,获得验证结果;
接收所述认证服务器返回的所述验证结果;
根据所述验证结果,响应所述网络附着请求。
相应地,本公开还提供了一种控制可操控设备接入网络的装置,所述装置用于认证服务器,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收核心网发送的目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
对所述标识信息的合法性进行验证,获得验证结果;
将所述验证结果返回给所述核心网。
如图19所示,图19是根据一示例性实施例示出的一种控制可操控设备接入网络的装置1900的一结构示意图。例如,装置1900可以被提供为认证服务器。参照图19,装置1900包括处理组件1922,其进一步包括一个或多个处理器,以及由存储器1932所代表的存储器资源,用于存储可由处理组件1922的执行的指令,例如应用程序。存储器1932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件1922被配置为执行指令,以执行上述控制可操控设备接入网络的方法。
装置1900还可以包括一个电源组件1926被配置为执行装置1900的电源管理,一个有线或无线网络接口1950被配置为将装置1900连接到网络,和一个输入输出(I/O)接口1958。装置1900可以操作基于存储在存储器1932的操作系统,例如Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。
相应地,本公开还提供了一种控制可操控设备接入网络的装置,所述装置用于基站,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收核心网发送的目标通知消息,所述目标通知消息中携带对目标可操控设备的标识信息的验证结果,所述目标可操控设备是发起网络附着请求的可操控设备;
根据所述目标通知消息,对所述可操控设备执行与所述验证结果对应的操作。
如图20所示,图20是根据一示例性实施例示出的一种控制可操控设备接入网络的装置2000的一结构示意图。装置2000可以被提供为基站。参照图20,装置2000包括处理组件2022、无线发射/接收组件2024、天线组件2026、以及无线接口特有的信号处理部分,处理组件2022可进一步包括一个或多个处理器。
处理组件2022中的其中一个处理器可以被配置为:
接收核心网发送的目标通知消息,所述目标通知消息中携带对目标可操控设备的标识信息的验证结果,所述目标可操控设备是发起网络附着请求的可操控设备;
根据所述目标通知消息,对所述可操控设备执行与所述验证结果对应的操作。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本公开的其它实施方案。本公开旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或者惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。

Claims (28)

  1. 一种控制可操控设备接入网络的方法,其特征在于,所述方法用于核心网,所述方法包括:
    获取目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
    将所述标识信息发送给认证服务器,以使所述认证服务器对所述标识信息的合法性进行验证,获得验证结果;
    接收所述认证服务器返回的所述验证结果;
    根据所述验证结果,响应所述网络附着请求。
  2. 根据权利要求1所述的方法,其特征在于,所述获取目标可操控设备的标识信息,包括:
    接收目标可操控设备通过基站透传的所述目标可操控设备的标识信息。
  3. 根据权利要求1所述的方法,其特征在于,所述根据所述验证结果,响应所述网络附着请求,包括:
    如果所述验证结果为验证合法,则接受所述网络附着请求;
    如果所述验证结果为验证不合法,则拒绝所述网络附着请求。
  4. 根据权利要求3所述的方法,其特征在于,所述接受所述网络附着请求,包括:
    发送携带所述验证结果的第一通知消息到基站,以使所述基站根据所述第一通知消息,与所述目标可操控设备建立网络连接。
  5. 根据权利要求3所述的方法,其特征在于,所述拒绝所述网络附着请求,包括:
    发送用于拒绝所述网络附着请求的第二通知消息到所述目标可操控设备;
    发送携带所述验证结果的第三通知消息到基站,以使所述基站根据所述第三通知消息,拒绝与所述目标可操控设备建立网络连接。
  6. 一种控制可操控设备接入网络的方法,其特征在于,所述方法用于认证服务器,所述方法包括:
    接收核心网发送的目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
    对所述标识信息的合法性进行验证,获得验证结果;
    将所述验证结果返回给所述核心网。
  7. 根据权利要求6所述的方法,其特征在于,所述对所述标识信息的合法性进行验证,获得验证结果,包括:
    在合法标识信息列表中,查找是否存在所述目标可操控设备的标识信息,所述合法标识信息列表包括所有已进行登记的可操控设备所对应的标识信息;
    如果所述合法标识信息列表中存在所述目标可操控设备的标识信息,则确定所述验证结果为验证合法,否则确定所述验证结果为验证不合法。
  8. 一种控制可操控设备接入网络的方法,其特征在于,所述方法用于基站,所述方法包括:
    接收核心网发送的目标通知消息,所述目标通知消息中携带对目标可操控设备的标识信息的验证结果,所述目标可操控设备是发起网络附着请求的可操控设备;
    根据所述目标通知消息,对所述可操控设备执行与所述验证结果对应的操作。
  9. 根据权利要求8所述的方法,其特征在于,所述根据所述目标通知消息,对所述可操控设备执行与所述验证结果对应的操作,包括:
    如果所述目标通知消息为第一通知消息,则与所述目标可操控设备建立网络连接,所述第一通知消息是携带的所述验证结果为验证合法的通知消息;
    如果所述目标通知消息为第三通知消息,则拒绝与所述目标可操控设备建立网络连接,所述第三通知消息是携带的所述验证结果为验证不合法的通知消息。
  10. 根据权利要求9所述的方法,其特征在于,所述与所述目标可操控设备建立网络连接,包括:
    为所述目标可操控设备建立信令承载和数据承载。
  11. 根据权利要求9所述的方法,其特征在于,所述拒绝与所述目标可操控设备建立网络连接,包括:
    断开已经与所述目标可操控设备建立的网络连接。
  12. 一种控制可操控设备接入网络的装置,其特征在于,所述装置用于核心网,所述装置包括:
    获取模块,被配置为获取目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
    第一发送模块,被配置为将所述标识信息发送给认证服务器,以使所述认证服务器对所述标识信息的合法性进行验证,获得验证结果;
    第一接收模块,被配置为接收所述认证服务器返回的所述验证结果;
    第一执行模块,被配置为根据所述验证结果,响应所述网络附着请求。
  13. 根据权利要求12所述的装置,其特征在于,所述获取模块包括:
    接收子模块,被配置为接收目标可操控设备通过基站透传的所述目标可操控设备 的标识信息。
  14. 根据权利要求12所述的装置,其特征在于,所述第一执行模块包括:
    第一执行子模块,被配置为如果所述验证结果为验证合法,则接受所述网络附着请求;
    第二执行子模块,被配置为如果所述验证结果为验证不合法,则拒绝所述网络附着请求。
  15. 根据权利要求14所述的装置,其特征在于,所述第一执行子模块包括:
    第一发送单元,被配置为发送携带所述验证结果的第一通知消息到基站,以使所述基站根据所述第一通知消息,与所述目标可操控设备建立网络连接。
  16. 根据权利要求14所述的装置,其特征在于,所述第二执行子模块包括:
    第二发送单元,被配置为发送用于拒绝所述网络附着请求的第二通知消息到所述目标可操控设备;
    第三发送单元,被配置为发送携带所述验证结果的第三通知消息到基站,以使所述基站根据所述第三通知消息,拒绝与所述目标可操控设备建立网络连接。
  17. 一种控制可操控设备接入网络的装置,其特征在于,所述装置用于认证服务器,所述装置包括:
    第二接收模块,被配置为接收核心网发送的目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
    验证模块,被配置为对所述标识信息的合法性进行验证,获得验证结果;
    第二发送模块,被配置为将所述验证结果返回给所述核心网。
  18. 根据权利要求17所述的装置,其特征在于,所述验证模块包括:
    查找子模块,被配置为在合法标识信息列表中,查找是否存在所述目标可操控设备的标识信息,所述合法标识信息列表包括所有已进行登记的可操控设备所对应的标识信息;
    确定子模块,被配置为如果所述合法标识信息列表中存在所述目标可操控设备的标识信息,则确定所述验证结果为验证合法,否则确定所述验证结果为验证不合法。
  19. 一种控制可操控设备接入网络的装置,其特征在于,所述装置用于基站,所述装置包括:
    第三接收模块,被配置为接收核心网发送的目标通知消息,所述目标通知消息中携带对目标可操控设备的标识信息的验证结果,所述目标可操控设备是发起网络附着请求的可操控设备;
    第二执行模块,被配置为根据所述目标通知消息,对所述可操控设备执行与所述验证结果对应的操作。
  20. 根据权利要求19所述的装置,其特征在于,所述第二执行模块包括:
    第三执行子模块,被配置为如果所述目标通知消息为第一通知消息,则与所述目标可操控设备建立网络连接,所述第一通知消息是携带的所述验证结果为验证合法的通知消息;
    第四执行子模块,被配置为如果所述目标通知消息为第三通知消息,则拒绝与所述目标可操控设备建立网络连接,所述第三通知消息是携带的所述验证结果为验证不合法的通知消息。
  21. 根据权利要求20所述的装置,其特征在于,所述第三执行子模块包括:
    第一执行单元,被配置为为所述目标可操控设备建立信令承载和数据承载。
  22. 根据权利要求20所述的装置,其特征在于,所述第四执行子模块包括:
    第二执行单元,被配置为断开已经与所述目标可操控设备建立的网络连接。
  23. 一种计算机可读存储介质,其特征在于,所述存储介质存储有计算机程序,所述计算机程序用于执行上述权利要求1-5任一所述的控制可操控设备接入网络的方法。
  24. 一种计算机可读存储介质,其特征在于,所述存储介质存储有计算机程序,所述计算机程序用于执行上述权利要求6或7所述的控制可操控设备接入网络的方法。
  25. 一种计算机可读存储介质,其特征在于,所述存储介质存储有计算机程序,所述计算机程序用于执行上述权利要求8-11任一所述的控制可操控设备接入网络的方法。
  26. 一种控制可操控设备接入网络的装置,其特征在于,所述装置用于核心网,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    获取目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
    将所述标识信息发送给认证服务器,以使所述认证服务器对所述标识信息的合法性进行验证,获得验证结果;
    接收所述认证服务器返回的所述验证结果;
    根据所述验证结果,响应所述网络附着请求。
  27. 一种控制可操控设备接入网络的装置,其特征在于,所述装置用于认证服务器,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    接收核心网发送的目标可操控设备的标识信息,所述目标可操控设备是发起网络附着请求的可操控设备;
    对所述标识信息的合法性进行验证,获得验证结果;
    将所述验证结果返回给所述核心网。
  28. 一种控制可操控设备接入网络的装置,其特征在于,所述装置用于基站,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    接收核心网发送的目标通知消息,所述目标通知消息中携带对目标可操控设备的标识信息的验证结果,所述目标可操控设备是发起网络附着请求的可操控设备;
    根据所述目标通知消息,对所述可操控设备执行与所述验证结果对应的操作。
PCT/CN2017/093884 2017-07-21 2017-07-21 一种控制可操控设备接入网络的方法及装置 WO2019014928A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201780000679.6A CN109548411B (zh) 2017-07-21 2017-07-21 一种控制可操控设备接入网络的方法及装置
PCT/CN2017/093884 WO2019014928A1 (zh) 2017-07-21 2017-07-21 一种控制可操控设备接入网络的方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/093884 WO2019014928A1 (zh) 2017-07-21 2017-07-21 一种控制可操控设备接入网络的方法及装置

Publications (1)

Publication Number Publication Date
WO2019014928A1 true WO2019014928A1 (zh) 2019-01-24

Family

ID=65014927

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/093884 WO2019014928A1 (zh) 2017-07-21 2017-07-21 一种控制可操控设备接入网络的方法及装置

Country Status (2)

Country Link
CN (1) CN109548411B (zh)
WO (1) WO2019014928A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11272371B2 (en) * 2019-04-18 2022-03-08 Huawei Technologies Co., Ltd. Method and apparatus for unmanned aerial vehicle authentication
CN110611682A (zh) * 2019-09-27 2019-12-24 深信服科技股份有限公司 一种网络访问系统及网络接入方法和相关设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1848994A (zh) * 2005-04-11 2006-10-18 华为技术有限公司 一种实现微波接入全球互操作系统鉴权的方法
CN104936180A (zh) * 2015-06-26 2015-09-23 陈昊 一种针对无人机和地面站提供鉴权服务的鉴权系统及方法
CN105515773A (zh) * 2014-09-26 2016-04-20 杭州华为数字技术有限公司 便携式设备、用户设备和数据交互方法
CN105636042A (zh) * 2016-01-25 2016-06-01 北京佰才邦技术有限公司 移动通信设备的控制方法和装置及系统
US9646502B1 (en) * 2015-02-27 2017-05-09 Amazon Technologies, Inc. Universal unmanned aerial vehicle identification system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9144082B2 (en) * 2012-06-13 2015-09-22 All Purpose Networks LLC Locating and tracking user equipment in the RF beam areas of an LTE wireless system employing agile beam forming techniques
US20160087957A1 (en) * 2013-04-26 2016-03-24 Interdigital Patent Holdings, Inc. Multi-factor authentication to achieve required authentication assurance level
CN104901940A (zh) * 2015-01-13 2015-09-09 易兴旺 一种基于cpk标识认证的802.1x网络接入方法
US9813392B2 (en) * 2015-03-06 2017-11-07 Qualcomm Incorporated Apparatus and method for providing a public key for authenticating an integrated circuit
US10225859B2 (en) * 2015-05-14 2019-03-05 Qualcomm Incorporated Techniques for uplink transmission management
US9692598B2 (en) * 2015-08-07 2017-06-27 Terry L. Davis Multi-use long string authentication keys
CN105491025A (zh) * 2015-11-25 2016-04-13 西安电子科技大学 基于属性认证的无人机访问控制方法
US10149168B2 (en) * 2015-12-16 2018-12-04 Qualcomm Incorporated Secured paging

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1848994A (zh) * 2005-04-11 2006-10-18 华为技术有限公司 一种实现微波接入全球互操作系统鉴权的方法
CN105515773A (zh) * 2014-09-26 2016-04-20 杭州华为数字技术有限公司 便携式设备、用户设备和数据交互方法
US9646502B1 (en) * 2015-02-27 2017-05-09 Amazon Technologies, Inc. Universal unmanned aerial vehicle identification system
CN104936180A (zh) * 2015-06-26 2015-09-23 陈昊 一种针对无人机和地面站提供鉴权服务的鉴权系统及方法
CN105636042A (zh) * 2016-01-25 2016-06-01 北京佰才邦技术有限公司 移动通信设备的控制方法和装置及系统

Also Published As

Publication number Publication date
CN109548411B (zh) 2023-06-16
CN109548411A (zh) 2019-03-29

Similar Documents

Publication Publication Date Title
EP3151628B1 (en) Method, device and system for accessing a wireless network
US11849315B2 (en) Wireless communications
US11096051B2 (en) Connection establishment method, device, and system
WO2022016669A1 (zh) 蓝牙配网方法、设备及存储介质
US11233817B2 (en) Methods and apparatus for end device discovering another end device
US9544762B2 (en) Method and system for configuring a device for use over a communication network
US20160315773A1 (en) Method and apparatus for providing information
EP3610626B1 (en) Methods for automatic bootstrapping of a device
CN105430711B (zh) 信息的传输方法、装置和设备
US20210105337A1 (en) Profile information sharing
US10375753B2 (en) Method and device for associating user with group
KR20160131066A (ko) 시커 디바이스와 목표 디바이스 간의 접속을 설정하는 방법 및 시스템
US20220400118A1 (en) Connecting internet of thing (iot) devices to a wireless network
WO2019014928A1 (zh) 一种控制可操控设备接入网络的方法及装置
US10187796B2 (en) Authentication and association method and system
WO2021068171A1 (zh) 用于共享服务端的方法、客户端和云平台
CN114025349A (zh) 网络服务方法、装置、系统和存储介质
US10122705B2 (en) Intelligent terminal equipment and information transmission method and system using the same
WO2024017195A1 (zh) Pin管理方法、装置、第一终端和第一设备
WO2022151830A1 (en) Ue id exposure
WO2023083174A1 (zh) 签约更新的方法、装置、网元及介质
WO2015131668A1 (zh) 业务的执行处理、执行方法及装置
CN115474256A (zh) 接入本地业务网络的方法、装置和系统
EP3793233A1 (en) Network access authentication processing method and device
CN116405937A (zh) 组网方法、网关设备、智能设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17918456

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17918456

Country of ref document: EP

Kind code of ref document: A1