WO2019028746A1 - 无人机接入方法及装置 - Google Patents

无人机接入方法及装置 Download PDF

Info

Publication number
WO2019028746A1
WO2019028746A1 PCT/CN2017/096854 CN2017096854W WO2019028746A1 WO 2019028746 A1 WO2019028746 A1 WO 2019028746A1 CN 2017096854 W CN2017096854 W CN 2017096854W WO 2019028746 A1 WO2019028746 A1 WO 2019028746A1
Authority
WO
WIPO (PCT)
Prior art keywords
drone
access
imei
identity
mme
Prior art date
Application number
PCT/CN2017/096854
Other languages
English (en)
French (fr)
Inventor
洪伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2017/096854 priority Critical patent/WO2019028746A1/zh
Priority to CN201780001097.XA priority patent/CN109451817B/zh
Priority to US16/633,848 priority patent/US11197147B2/en
Priority to EP17920914.3A priority patent/EP3668126A4/en
Publication of WO2019028746A1 publication Critical patent/WO2019028746A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/04Registration at HLR or HSS [Home Subscriber Server]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/18502Airborne stations
    • H04B7/18506Communications with or from aircraft, i.e. aeronautical mobile service

Definitions

  • the present disclosure relates to the field of communications, and in particular, to a method and apparatus for accessing a drone.
  • the drone is referred to as the Unmanned Aerial Vehicle (UAV), which is a non-manned aerial vehicle operated by radio remote control equipment and its own program control device.
  • UAV Unmanned Aerial Vehicle
  • the cellular network needs to provide a service for the drone that satisfies the demand.
  • the existing cellular network does not have a technical solution for controlling the drone. If any type of drone is allowed to access the cellular network, it will cause great interference to the cellular network.
  • embodiments of the present disclosure provide a method and an apparatus for accessing a drone.
  • a drone access method the method being used for a mobility management entity MME, the method comprising:
  • a first access response message is sent to the drone to indicate acceptance of the access.
  • the acquiring the IMEI of the drone includes:
  • the identity request message is used to indicate that the drone provides its own IMEI
  • the access request message carries the IMEI of the drone; and the acquiring the IMEI of the drone includes:
  • the authenticating the unmanned aerial vehicle according to the IMEI of the drone to obtain an identity verification result includes:
  • the method further includes:
  • the verification result is a verification failure, determining to reject the access of the drone
  • a second access response message indicating the denial of access is sent to the drone.
  • a drone access method for a drone the device type of the drone being defined as a drone, and having an international mobile device Identifying the IMEI, the method includes:
  • the method further includes:
  • the access request message carries an IMEI of the drone.
  • the method further includes:
  • a drone access method is provided, the method being used for a device identification registrar EIR, the method comprising:
  • a drone access device the device being used for a mobility management entity MME, the device comprising:
  • An acquiring module configured to acquire an international mobile device identifier IMEI of the drone when receiving an access request message sent by the drone;
  • An identity verification module configured to perform identity verification on the unmanned aerial vehicle according to an IMEI of the drone to obtain an identity verification result
  • a first determining module configured to determine to accept access by the drone if the authentication result is successful verification
  • the first sending module is configured to send, to the drone, a first access response message indicating that the access is accepted.
  • the obtaining module includes:
  • a first sending submodule configured to send an identity request message to the drone, the identity request message being used to indicate that the drone provides its own IMEI;
  • the receiving submodule is configured to receive an identity response message sent by the drone, where the identity response message carries an IMEI of the drone.
  • the access request message carries an IMEI of the drone;
  • the obtaining module includes:
  • a read submodule configured to read an IMEI of the drone from the access request message.
  • the identity verification module includes:
  • the second sending sub-module is configured to send an identity check request message to the device identifier registrar EIR, where the identity check request message carries the IMEI of the drone;
  • the first verification submodule is configured to: if the first identity check response message sent by the EIR for indicating that the IMEI of the drone has been registered is received, determining that the identity verification result is that the verification is successful;
  • the second verification submodule is configured to determine that the identity verification result is a verification failure if the second identity check response message sent by the EIR for indicating that the IMEI of the drone is not registered is received.
  • the device further includes:
  • a second determining module configured to determine to reject the access of the drone if the authentication result is a verification failure
  • a second sending module configured to send, to the drone, a second access response message indicating that the access is denied.
  • a drone access device for a drone the device type of the drone being defined as a drone, and having an international mobile device Identifying the IMEI, the device includes:
  • a first sending module configured to send an access request message to the mobility management entity MME;
  • the first determining module is configured to: when receiving the first access response message sent by the MME to indicate acceptance of the access, determine that the MME accepts access by the drone.
  • the device further includes:
  • a receiving module configured to receive an identity request message sent by the MME, where the identity request message is used to indicate that the drone provides its own IMEI;
  • the second sending module is configured to send an identity response message to the MME, where the identity response message carries an IMEI of the drone.
  • the access request message carries an IMEI of the drone.
  • the device further includes:
  • a second determining module configured to: if receiving the second access response message sent by the MME to indicate that the access is denied, determining that the MME rejects the access of the drone.
  • a drone access device the device being used for a device identification registrar EIR, the device comprising:
  • the receiving module is configured to receive an identity check request message sent by the mobility management entity MME, where the identity check request message carries an IMEI of the drone requesting access;
  • a determining module configured to determine whether the IMEI of the drone is registered
  • a first sending module configured to send, to the MME, a first identity check response message indicating that the IMEI of the drone has been registered, if it is determined that the IMEI of the drone has been registered;
  • the second sending module is configured to send, to the MME, a second identity check response message indicating that the IMEI of the drone is not registered, if it is determined that the IMEI of the drone is not registered.
  • a non-transitory computer readable storage medium having stored thereon a computer program for performing the drone access method of the first aspect described above.
  • a non-transitory computer readable storage medium having stored thereon a computer program for performing the drone access method of the second aspect described above.
  • a ninth aspect of the embodiments of the present disclosure there is provided a non-transitory computer readable storage medium having stored thereon a computer program for performing the drone access method of the above third aspect.
  • a drone access device the device being used for a mobility management entity MME, the device comprising:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • a first access response message is sent to the drone to indicate acceptance of the access.
  • a drone access device for a drone, the device type of the drone being defined as a drone, and having an international mobile
  • the device identifies the IMEI, and the device includes:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • a drone access device the device being used for a device identification registrar EIR, the device comprising:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the MME may obtain the access request message sent by the drone. Taking the IMEI of the drone, authenticating the drone according to the IMEI of the drone, and obtaining the identity verification result, if the verification result is successful, determining to accept the access of the drone; to the drone Sending a first access response message for indicating access, which prevents the unauthenticated unmanned aircraft from accessing the cellular network, thereby reducing interference to the cellular network and improving the reliability of the drone access. Sex.
  • the MME may also send an identity request message to the drone, and receive an identity response message sent by the drone, where the identity response message carries the IMEI of the drone, which can be provided by the drone.
  • the IMEI authenticates the drone, increasing the efficiency of drone authentication.
  • the MME can also obtain the IMEI of the drone by reading the IMEI of the drone from the access request message, so that the IMEI of the drone can be quickly obtained, and the identity of the drone can be obtained by the IMEI provided by the drone. Verification, which increases the efficiency of drone authentication.
  • the MME may also send an identity check request message to the EIR, where the identity check request message carries the IMEI of the drone, so that the EIR can detect the identity of the drone according to the IMEI of the drone. If the IMEI of the drone has been registered, it indicates that the authentication result is successful, and then accepts the access of the drone; if the IMEI of the drone is not registered, it indicates that the authentication result is a verification failure, and then the drone is rejected. Access, thus enabling only registered drones to qualify for access to cellular access, thus avoiding the situation where any type of drone can access the cellular network, reducing the access of the drone Interference to cellular networks.
  • the MME can also accept the access of the drone when the drone passes the identity verification; if the identity verification is not passed, the access of the drone is rejected, so that the identity verification can be incompatible UAVs with access conditions are excluded, thereby reducing the interference that the UAV's access will cause to the cellular network.
  • the UAV may send an access request message to the MME, and if it receives the first access response message sent by the MME to indicate acceptance of the access, determine that the MME accepts the access of the UAV. Thereby, the MME controls the access of the drone, and the security of the drone access is improved.
  • the UAV can also provide the IMEI of the UAV according to the requirements of the MME, which can facilitate the MME to perform identity verification on the UAV according to the IMEI provided by the UAV, thereby improving the UAV identity verification. s efficiency.
  • the drone can also provide the IMEI of the drone by actively providing the MME to the MME, which can facilitate the MME to perform identity verification on the UAV according to the IMEI provided by the drone, thereby improving the unmanned fuselage. The efficiency of verification.
  • the UAV can also send an access request message to the MME, and if it receives the first access response message sent by the MME to indicate acceptance of the access, determine that the MME accepts the access of the UAV. If the second access response message sent by the MME for indicating the denial of access is received, determining that the MME rejects the access of the drone, thereby implementing the control of the MME accessing the drone, and the access condition is not met.
  • the drone is excluded, which reduces the interference that the drone's access will cause to the cellular network.
  • the EIR can complete the identity check of the drone by determining whether the IMEI of the drone is registered. If the IMEI of the drone has been registered, it indicates that the authentication result is a verification failure, so that the MME Accepting the access of the drone; if the IMEI of the drone is not registered, it indicates that the authentication result is a verification failure, so that the MME rejects the access of the drone, thereby realizing that only the registered drone has access.
  • the qualification of the cellular network avoids the situation where any type of drone can access the cellular network, reducing the interference that the drone's access will cause to the cellular network.
  • FIG. 1 is a flowchart of a drone access method according to an exemplary embodiment
  • FIG. 2 is a flow chart showing another method of accessing a drone according to an exemplary embodiment
  • FIG. 3 is a flowchart of a drone access method according to an exemplary embodiment
  • FIG. 4 is a flowchart of another drone access method according to an exemplary embodiment
  • FIG. 5 is a flowchart of another drone access method according to an exemplary embodiment
  • FIG. 6 is a flowchart of a drone access method according to an exemplary embodiment
  • FIG. 7 is an information interaction diagram of a drone access method according to an exemplary embodiment
  • FIG. 8 is a block diagram of a drone access device according to an exemplary embodiment
  • FIG. 9 is a block diagram of another drone access device, according to an exemplary embodiment.
  • FIG. 10 is a block diagram of another drone access device according to an exemplary embodiment
  • FIG. 11 is a block diagram of another drone access device, according to an exemplary embodiment.
  • FIG. 12 is a block diagram of another drone access device according to an exemplary embodiment
  • FIG. 13 is a block diagram of a drone access device according to an exemplary embodiment
  • FIG. 14 is a block diagram of another drone access device according to an exemplary embodiment
  • FIG. 15 is a block diagram of another drone access device according to an exemplary embodiment
  • 16 is a block diagram of a drone access device, according to an exemplary embodiment
  • FIG. 17 is a schematic structural diagram of an unmanned aerial vehicle access device according to an exemplary embodiment
  • FIG. 18 is a schematic structural diagram of an unmanned aircraft access device according to an exemplary embodiment.
  • the terms first, second, third, etc. may be used in the present disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • the indication information may also be referred to as second information without departing from the scope of the present disclosure.
  • the second information may also be referred to as indication information.
  • the word "if” as used herein may be interpreted as "when” or "when” or "in response to determination.”
  • FIG. 1 is a flowchart of a UAV access method, which may be used for a Mobility Management Entity (MME), according to an exemplary embodiment.
  • the drone access method includes the following steps 110-140:
  • step 110 upon receiving the access request message sent by the drone, the International Mobile Equipment Identity (IMEI) of the drone is obtained.
  • IMEI International Mobile Equipment Identity
  • the drone is a cellular network drone, that is, the drone can accept the service provided by the cellular network.
  • a new device type for the UAV is defined in the Global System for Mobile Communications Alliance (GSMA), and a corresponding type allocation code (TAC) is assigned to the device type of the UAV.
  • TAC type allocation code
  • IMEI form allocation code
  • the access request message needs to be sent to the MME first, so that the MME can verify the identity of the UAV.
  • the base station can transparently transmit the access request message to the MME.
  • the MME after the MME receives the access request message sent by the UAV, there are many methods for obtaining the IMEI of the UAV, for example, requiring the UAV to report its own IMEI.
  • step 120 the UAV is authenticated according to the IMEI of the drone, and an authentication result is obtained.
  • the MME performs a method for authenticating the UAV according to the IMEI of the UAV, for example, checking whether the IMEI reported by the UAV is registered in the system, and if registered, the UAV is allowed. Access; if not registered, the access of the drone is rejected.
  • step 130 if the authentication result is that the verification is successful, it is determined to accept the access of the drone.
  • step 140 a first access response message indicating acceptance of the access is sent to the drone.
  • the MME accepting the access of the drone indicates that the drone can access the cellular network. Moreover, when the MME sends a first access response message indicating that the access is received to the drone, the first access response message may be transparently transmitted to the drone by the base station.
  • the IMEI of the drone when receiving the access request message sent by the drone, the IMEI of the drone is obtained, and the UAV is authenticated according to the IMEI of the drone, and the identity verification result is obtained, if the identity
  • the verification result is that when the verification is successful, it is determined that the access of the drone is accepted, and the first access response message for indicating the acceptance of the access is sent to the drone, thereby preventing the drone that is not authenticated from being accessed.
  • the cellular network reduces interference to the cellular network and improves the reliability of the drone access.
  • the IMEI of the drone is obtained in the above step 110, and the following acquirer may be used.
  • the identity response message carries the IMEI of the drone, so that the IMEI pair provided by the drone can be The drone is authenticated, which increases the efficiency of drone authentication.
  • the access request message carries the IMEI of the drone, and when acquiring the IMEI of the drone, the IMEI of the drone can be directly read from the access request message.
  • the IMEI of the drone can be quickly obtained, and the UAV can be authenticated by the IMEI provided by the drone, thereby Improve the efficiency of drone authentication.
  • the identity verification result is obtained by performing identity verification on the UAV according to the IMEI of the drone, and the following authentication methods may be adopted:
  • the identity check request message carries the IMEI of the drone, so that the EIR can detect the identity of the drone according to the IMEI of the drone, if no one The IMEI of the machine has been registered, indicating that the authentication result is successful, and then accepts the access of the drone; if the IMEI of the drone is not registered, it indicates that the authentication result is a verification failure, and then the access of the drone is rejected. Therefore, it is realized that only registered drones have the right to access cellular access, thus avoiding the situation that any type of drone can access the cellular network, and reducing the access of the drone will be to the cellular Interference caused by the network.
  • the UAV access method may further include the following steps:
  • a second access response message indicating the denial of access is sent to the drone.
  • the drone is authenticated, it is allowed to access; if it is not authenticated, it is denied access, so that the unmanned aircraft that does not meet the access condition can be excluded by the authentication. This reduces the interference that the UAV's access will cause to the cellular network.
  • FIG. 2 is a flowchart of another method for accessing a drone according to an exemplary embodiment.
  • the method for accessing the drone may be used for an MME and based on the method shown in FIG. 1.
  • the drone access method includes the following steps 210-270:
  • step 210 upon receiving the access request message sent by the drone, an identity request message is sent to the drone, and the identity request message is used to instruct the drone to provide its own IMEI.
  • step 220 an identity response message sent by the drone is received, and the identity response message carries the IMEI of the drone.
  • step 230 an identity check request message is sent to the EIR, and the identity check request message carries the IMEI of the drone.
  • step 240 after receiving the first identity check response message sent by the EIR to indicate that the IMEI of the drone has been registered, it is determined that the identity verification result is that the verification is successful.
  • step 250 it is determined that the access of the drone is accepted, and a first access response message for indicating acceptance of the access is sent to the drone, and the process ends.
  • step 260 after receiving the second identity check response message sent by the EIR to indicate that the IMEI of the drone has not been registered, it is determined that the identity verification result is a verification failure.
  • step 270 it is determined that the access of the drone is denied, and a second access response message indicating the denial of access is sent to the drone.
  • the UAV is authenticated by its own IMEI provided by the drone, and if the drone passes the identity verification, it is allowed to access; if it is not authenticated, it is denied access, so By means of authentication, the unmanned aircraft that does not meet the access conditions can be excluded, thereby reducing the interference that the drone's access will cause to the cellular network.
  • FIG. 3 is a flowchart of a drone access method, which can be used for a drone, and the device type of the drone is defined as a drone, according to an exemplary embodiment. And the drone has an IMEI. As shown in FIG. 3, the drone access method includes the following steps 310-320:
  • step 310 an access request message is sent to the MME.
  • the UAV is a cellular network drone.
  • the UAV needs to access the cellular network, it needs to send an access request message to the MME first, so that the MME can verify the identity of the UAV.
  • the base station can transparently transmit the access request message to the MME.
  • step 320 if the first access response message sent by the MME for indicating acceptance of the access is received, it is determined that the MME accepts the access of the drone.
  • the drone receives the first access response message, and the drone can access the cellular network through identity verification.
  • the drone access method further includes:
  • the IMEI of the UAV is provided according to the requirements of the MME, which can facilitate the MME to perform identity verification on the UAV according to the IMEI provided by the UAV, thereby improving the efficiency of the UAV identity verification.
  • the access request message sent by the UAV to the MME carries the IMEI of the UAV.
  • the IMEI of the UAV is provided to the MME actively, which can facilitate the MME to perform identity verification on the UAV according to the IMEI provided by the UAV, thereby improving the efficiency of the UAV identity verification.
  • the drone access method further includes:
  • the UAV access method includes the following steps 410-450:
  • step 410 an access request message is sent to the MME
  • step 420 receiving an identity request message sent by the MME, the identity request message is used to indicate that the drone provides its own IMEI;
  • step 430 an identity response message is sent to the MME, and the identity response message carries the IMEI of the drone.
  • step 440 if the first access response message sent by the MME for indicating acceptance of the access is received, it is determined that the MME accepts the access of the drone.
  • step 450 if the second access response message sent by the MME for indicating the denial of access is received, it is determined that the MME rejects the access of the drone.
  • the IMEI of the drone is provided according to the requirements of the MME, which can facilitate the MME to authenticate the UAV according to the IMEI provided by the UAV, and if the UAV passes the identity verification, it is allowed to access. If it is not authenticated, it is denied access, so that the unmanned aircraft that does not meet the access conditions can be excluded by the authentication, thereby reducing the interference that the drone access will cause to the cellular network.
  • FIG. 5 is a flowchart of another drone access method according to an exemplary embodiment, the drone access method may be used for a drone, and the device type of the drone is defined as an unmanned And the drone has an IMEI and builds on the method shown in FIG. As shown in FIG. 5, the UAV access method includes the following steps 510-530:
  • step 510 an access request message is sent to the MME, where the access request message carries the drone IMEI.
  • step 520 if the first access response message sent by the MME indicating the acceptance of the access is received, it is determined that the MME accepts the access of the drone.
  • step 530 if the second access response message sent by the MME for indicating the denial of access is received, it is determined that the MME rejects the access of the drone.
  • the IMEI of the UAV is provided to the MME actively, which can facilitate the MME to perform identity verification on the UAV according to the IMEI provided by the UAV, and if the UAV passes the identity verification, it is allowed to access. If it is not authenticated, it is denied access, so that the unmanned aircraft that does not meet the access conditions can be excluded by the authentication, thereby reducing the interference that the drone access will cause to the cellular network.
  • FIG. 6 is a flowchart of a drone access method, which may be used for EIR, according to an exemplary embodiment. As shown in FIG. 6, the UAV access method includes the following steps 610-640:
  • step 610 an identity check request message sent by the MME is received, where the identity check request message carries the IMEI of the drone that requests access.
  • the EIR can complete the identity check function of the drone.
  • step 620 it is determined whether the IMEI of the drone is registered
  • step 630 if it is determined that the IMEI of the drone has been registered, sending a first identity check response message indicating that the IMEI of the drone has been registered to the MME;
  • step 640 if it is determined that the IMEI of the drone has not been registered, a second identity check response message indicating that the IMEI of the drone has not been registered is sent to the MME.
  • the identity check of the drone is completed by judging whether the IMEI of the drone has been registered. If the IMEI of the drone has been registered, it indicates that the authentication result is a verification failure, so that the MME accepts no. Human-machine access; if the IMEI of the drone is not registered, it indicates that the authentication result is a verification failure, so that the MME rejects the access of the drone, thereby realizing that only the registered drone has access to the cellular network. Qualification, this avoids the situation where any type of drone can access the cellular network, reducing the interference that the drone's access will cause to the cellular network.
  • FIG. 7 is an information interaction diagram of a drone access method according to an exemplary embodiment. As shown in FIG. 7, the information interaction diagram includes a drone, a base station, an MME, and an EIR:
  • the drone transmits an access request message (Attach Request) to the base station, and the base station transparently transmits the access request message to the MME.
  • An access request message (Attach Request)
  • the MME sends an identity request message (Identity Request) to the base station, and the base station transparently transmits the identity request message to the drone.
  • Identity Request is used to indicate that the human machine provides its own IMEI.
  • the drone transmits an identity response message (Identity Response) to the base station, and the base station transparently transmits the identity response message to the MME.
  • the identity response message carries the IMEI of the drone.
  • the MME sends an Identity Check Request message (ME Identity Check Request) to the EIR.
  • the identity check request message carries the IMEI of the drone.
  • the EIR sends an identity check response message (ME Identity Check Ack) to the MME.
  • the identity check response message may be a first identity check response message indicating that the IMEI of the drone has been registered, and may also be a second identity check response message indicating that the IMEI of the drone has not been registered.
  • the MME sends an access response message (Attach Response) to the base station, and the base station transparently transmits the access response message to the drone.
  • the access response message may be a first access response message indicating that the access is accepted, or may be a second access response message indicating that the access is denied.
  • the present disclosure also provides an embodiment of the drone access device.
  • FIG. 8 is a block diagram of an unmanned aircraft access device that can be used for an MME and for performing the drone access method shown in FIG. 1 according to an exemplary embodiment.
  • the UAV access device may include:
  • the obtaining module 81 is configured to acquire an IMEI of the drone when receiving an access request message sent by the drone;
  • the authentication module 82 is configured to perform identity verification on the UAV according to the IMEI of the drone to obtain an identity verification result.
  • the first determining module 83 is configured to: if the verification result is that the verification is successful, determine to accept the access of the drone;
  • the first sending module 84 is configured to: if the authentication result is that the verification is successful, determine to accept the access of the drone, and send a first access to the drone to indicate acceptance of the access Response message.
  • the unclaimed person is obtained when receiving the access request message sent by the drone
  • the IMEI of the machine authenticates the drone according to the IMEI of the drone, and obtains the authentication result. If the authentication result is successful, it determines to accept the access of the drone and sends it to the drone for use.
  • the first access response message indicating access is accepted, which can prevent the unmanned mobile phone without authentication from accessing the cellular network, thereby reducing interference to the cellular network and improving the reliability of the drone access.
  • FIG. 9 is a block diagram of another drone access device that can be used for an MME and is based on the device shown in FIG. 8 according to an exemplary embodiment.
  • the obtaining module 81 may include:
  • the first sending sub-module 91 is configured to send an identity request message to the drone, where the identity request message is used to indicate that the drone provides its own IMEI;
  • the receiving sub-module 92 is configured to receive an identity response message sent by the drone, where the identity response message carries an IMEI of the drone.
  • the identity response message carries the IMEI of the drone, so that the IMEI pair provided by the drone can be The drone is authenticated, which increases the efficiency of drone authentication.
  • FIG. 10 is a block diagram of another UAV access device, which may be used in an MME and built on the device shown in FIG. 8, according to an exemplary embodiment, the connection The IMEI of the drone is carried in the incoming request message.
  • the obtaining module 81 may include:
  • the read sub-module 101 is configured to read the IMEI of the drone from the access request message.
  • the IMEI of the drone can be quickly obtained, and the UAV can be authenticated by the IMEI provided by the drone, thereby Improve the efficiency of drone authentication.
  • the authentication module 82 can include:
  • the second sending sub-module 111 is configured to send an identity check request message to the EIR, where the identity check request message carries the IMEI of the drone;
  • the first verification sub-module 112 is configured to: if the first identity check response message sent by the EIR for indicating that the IMEI of the drone has been registered is received, determining that the identity verification result is that the verification is successful;
  • the second verification sub-module 113 is configured to determine that the identity verification result is a verification failure if the second identity check response message sent by the EIR for indicating that the IMEI of the drone is not registered is received.
  • the identity check request message carries the IMEI of the drone, so that the EIR can detect the identity of the drone according to the IMEI of the drone, if no one The IMEI of the machine has been registered, indicating that the authentication result is successful, and then accepts the access of the drone; if the IMEI of the drone is not registered, it indicates that the authentication result is a verification failure, and then the access of the drone is rejected. Therefore, it is realized that only registered drones have the right to access cellular access, thus avoiding the situation that any type of drone can access the cellular network, and reducing the access of the drone will be to the cellular Interference caused by the network.
  • FIG. 12 is a block diagram of another UAV access device, which may be used in an MME and built on the device shown in FIG. 8 or FIG. 11 according to an exemplary embodiment, As shown in FIG. 12, the UAV access device may further include:
  • the second determining module 121 is configured to determine to reject the access of the drone if the identity verification result is a verification failure
  • the second sending module 122 is configured to send, to the drone, a second access response message indicating that the access is denied.
  • the drone is authenticated, it is allowed to access; if it is not authenticated, it is denied access, so that the unmanned aircraft that does not meet the access condition can be excluded by the authentication. This reduces the interference that the UAV's access will cause to the cellular network.
  • FIG. 13 is a block diagram of a drone access device that can be used for a drone, the device type of the drone is defined as a drone, according to an exemplary embodiment. And the drone has an IMEI and is used to perform the drone access method shown in FIG. As shown in FIG. 13, the UAV access device may include:
  • the first sending module 131 is configured to send an access request message to the MME.
  • the first determining module 132 is configured to: when receiving the first access response message sent by the MME to indicate acceptance of the access, determine that the MME accepts access by the drone.
  • the UAV access device may further include:
  • the receiving module 141 is configured to receive an identity request message sent by the MME, where the identity request message is used to indicate that the drone provides its own IMEI;
  • the second sending module 142 is configured to send an identity response message to the MME, where the identity response message carries an IMEI of the drone.
  • the IMEI of the UAV is provided according to the requirements of the MME, which can facilitate the MME to perform identity verification on the UAV according to the IMEI provided by the UAV, thereby improving the efficiency of the UAV identity verification.
  • the access request message carries the IMEI of the drone.
  • the IMEI of the UAV is provided to the MME actively, which can facilitate the MME to perform identity verification on the UAV according to the IMEI provided by the UAV, thereby improving the efficiency of the UAV identity verification.
  • the UAV access device may further include:
  • the second determining module 151 is configured to: if receiving the second access response message sent by the MME to indicate that the access is denied, determine that the MME rejects the access of the drone.
  • the UAV access device may include:
  • the receiving module 161 is configured to receive an identity check request message sent by the MME, where the identity check request message carries an IMEI of the drone requesting access;
  • the determining module 162 is configured to determine whether the IMEI of the drone is registered
  • the first sending module 163 is configured to send, to the MME, a first identity check response message indicating that the IMEI of the drone has been registered, if it is determined that the IMEI of the drone has been registered;
  • the second sending module 164 is configured to send, to the MME, a second identity check response message indicating that the IMEI of the drone is not registered, if it is determined that the IMEI of the drone is not registered.
  • the identity check of the drone is completed by judging whether the IMEI of the drone has been registered. If the IMEI of the drone has been registered, it indicates that the authentication result is a verification failure, so that the MME accepts no. Human-machine access; if the IMEI of the drone is not registered, it indicates that the authentication result is a verification failure, so that the MME rejects the access of the drone, thereby realizing that only the registered drone has access to the cellular network. Qualification, this avoids the situation where any type of drone can access the cellular network, reducing the interference that the drone's access will cause to the cellular network.
  • the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
  • the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, ie may be located in one Places, or they can be distributed to multiple network elements. Some or all of the modules may be selected according to actual needs to achieve the objectives of the present disclosure. Those of ordinary skill in the art can understand and implement without any creative effort.
  • the present disclosure also provides a non-transitory computer readable storage medium having stored thereon a computer program, wherein the computer program is configured to perform any of the above-described FIGS. 1 to 3 UAV access method.
  • the present disclosure also provides a non-transitory computer readable storage medium having stored thereon a computer program, wherein the computer program is configured to perform any of the above-described FIGS. 4-6 UAV access method.
  • the present disclosure also provides a non-transitory computer readable storage medium having stored thereon a computer program, wherein the computer program is configured to perform the drone access described in FIG. 7 above. method.
  • the present disclosure also provides a drone access device, the device is used for an MME, and the device includes:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • a first access response message is sent to the drone to indicate acceptance of the access.
  • FIG. 17 is a schematic structural diagram of an unmanned aerial vehicle access device according to an exemplary embodiment. As shown in FIG. 17, a drone access device 1700, which may be provided as an MME, according to an exemplary embodiment.
  • apparatus 1700 can include one or more of the following components: processing component 1701, memory 1702, power component 1703, multimedia component 1704, audio component 1705, input/output (I/O) interface 1706, sensor component 1707, And a communication component 1708.
  • Processing component 1701 typically controls the overall operation of device 1700, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • Processing component 1701 may include one or more processors 1709 to execute instructions to perform all or part of the steps of the above described methods.
  • processing component 1701 can include one or more modules to facilitate interaction between component 1701 and other components.
  • the processing component 1701 can include a multimedia module to facilitate interaction between the multimedia component 1704 and the processing component 1701.
  • Memory 1702 is configured to store various types of data to support operation at device 1700. Examples of such data include instructions for any application or method operating on device 1700, contact data, phone book data, messages, pictures, videos, and the like.
  • the memory 1702 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only Memory (EEPROM), Erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Disk or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only Memory
  • EPROM Erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Disk Disk or Optical Disk.
  • Power component 1703 provides power to various components of device 1700.
  • Power component 1703 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 1700.
  • Multimedia component 1704 includes a screen between the device 1700 and a user that provides an output interface.
  • the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
  • the multimedia component 1704 includes a front camera and/or a rear camera. When the device 1700 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
  • the audio component 1705 is configured to output and/or input an audio signal.
  • the audio component 1705 includes a microphone (MIC) that is configured to receive an external audio signal when the device 1700 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
  • the received audio signal may be further stored in memory 1702 or transmitted via communication component 1708.
  • the audio component 1705 also includes a speaker for outputting an audio signal.
  • the I/O interface 1706 provides an interface between the processing component 1701 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
  • Sensor assembly 1707 includes one or more sensors for providing state assessment of various aspects to device 1700.
  • sensor assembly 1707 can detect an open/closed state of device 1700, a relative positioning of components, such as the display and keypad of device 1700, and sensor component 1707 can also detect a change in position of a component of device 1700 or device 1700. The presence or absence of user contact with device 1700, device 1700 orientation or acceleration/deceleration and temperature change of device 1700.
  • Sensor assembly 1707 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 1707 can also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 1707 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 1708 is configured to facilitate wired or wireless communication between device 1700 and other devices.
  • the device 1700 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
  • communication component 1708 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
  • the communication component 1708 also includes a near field communication (NFC) module to facilitate short range communication.
  • NFC near field communication
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • apparatus 1700 can be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation for performing the above methods.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A gate array
  • controller microcontroller, microprocessor or other electronic component implementation for performing the above methods.
  • non-transitory computer readable storage medium comprising instructions, such as a memory 1702 comprising instructions executable by processor 1709 of apparatus 1700 to perform the above method.
  • the non-transitory computer readable storage medium can be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
  • the apparatus 1700 when the instructions in the storage medium are executed by the processor, the apparatus 1700 is enabled to perform any of the drone access methods described above.
  • the present disclosure also provides a drone access device for a drone, the device type of the drone is defined as a drone, and the drone has an IMEI
  • the device includes:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the present disclosure also provides a drone access device for EIR, the device comprising:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • FIG. 18 is a schematic structural diagram of an unmanned aircraft access device according to an exemplary embodiment. As shown in FIG. 18, a drone access device 1800 is shown, which may be provided as an EIR, in accordance with an exemplary embodiment.
  • apparatus 1800 can include one or more of the following components: processing component 1801, memory 1802, power component 1803, multimedia component 1804, audio component 1805, input/output (I/O) interface 1806, sensor component 1807, And a communication component 1808.
  • Processing component 1801 typically controls the overall operation of device 1800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • Processing component 1801 may include one or more processors 1809 to execute instructions to perform all or part of the steps of the above described methods.
  • processing component 1801 can include one or more modules to facilitate interaction between component 1801 and other components.
  • the processing component 1801 can include a multimedia module to facilitate interaction between the multimedia component 1804 and the processing component 1801.
  • Memory 1802 is configured to store various types of data to support operation at device 1800. Examples of such data include instructions for any application or method operating on device 1800, contact data, phone book data, messages, pictures, videos, and the like.
  • the memory 1802 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only Memory (EEPROM), Erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Disk or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only Memory
  • EPROM Erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Disk Disk or Optical Disk.
  • Power component 1803 provides power to various components of device 1800.
  • Power component 1803 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 1800.
  • the multimedia component 1804 includes a screen between the device 1800 and the user that provides an output interface.
  • the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
  • the multimedia component 1804 includes a front camera and/or a rear camera. When the device 1800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
  • the audio component 1805 is configured to output and/or input audio signals.
  • audio component 1805 includes a microphone (MIC) that is configured to receive an external audio signal when device 1800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
  • the received audio signal may be further stored in memory 1802 or transmitted via communication component 1808.
  • audio component 1805 also includes a speaker for outputting an audio signal.
  • the I/O interface 1806 provides an interface between the processing component 1801 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
  • Sensor assembly 1807 includes one or more sensors for providing status assessment of various aspects to device 1800.
  • sensor assembly 1807 can detect an open/closed state of device 1800, relative positioning of components, such as the display and keypad of device 1800, and sensor component 1807 can also detect a change in position of one component of device 1800 or device 1800. The presence or absence of contact by the user with the device 1800, the orientation or acceleration/deceleration of the device 1800 and the temperature change of the device 1800.
  • Sensor assembly 1807 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 1807 can also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 1807 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 1808 is configured to facilitate wired or wireless communication between device 1800 and other devices.
  • the device 1800 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
  • communication component 1808 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
  • the communication component 1808 also includes a near field communication (NFC) module to facilitate short range communication.
  • NFC near field communication
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • device 1800 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation for performing the above methods.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A gate array
  • controller microcontroller, microprocessor or other electronic component implementation for performing the above methods.
  • non-transitory computer readable storage medium comprising instructions, such as a memory 1802 comprising instructions executable by processor 1809 of apparatus 1800 to perform the above method.
  • the non-transitory computer readable storage medium can be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
  • the apparatus 1800 when the instructions in the storage medium are executed by the processor, the apparatus 1800 is enabled to perform any of the drone access methods described above.

Abstract

本公开提供一种无人机接入方法及装置,该方法用于MME,所述方法包括:在接收到无人机发送的接入请求消息时,获取所述无人机的国际移动设备标识IMEI;根据所述无人机的IMEI对所述无人机进行身份验证,得到身份验证结果;若所述身份验证结果为验证成功时,确定接受所述无人机的接入;向所述无人机发送用于指示接受接入的第一接入响应消息。因此,本公开可以防止没有通过身份验证的无人机接入蜂窝网络,从而减少了对蜂窝网络造成的干扰,提高了无人机接入的可靠性。

Description

无人机接入方法及装置 技术领域
本公开涉及通信领域,尤其涉及一种无人机接入方法及装置。
背景技术
无人驾驶飞机简称为无人机(Unmanned Aerial Vehicle,UAV),该无人机是利用无线电遥控设备和自备的程序控制装置操纵的不载人飞行器。
随着无人机技术的不断发展,无人机也得到了广泛应用。相关技术中,为了进一步拓展无人机的应用范围,蜂窝网络需要为无人机提供满足需求的服务。但是,现有的蜂窝网络还没有控制无人机的技术方案,若任何类型的无人机都允许接入蜂窝网络,将会对蜂窝网络造成很大的干扰。
发明内容
为克服相关技术中存在的问题,本公开实施例提供一种无人机接入方法及装置。
根据本公开实施例的第一方面,提供一种无人机接入方法,所述方法用于移动管理实体MME,所述方法包括:
在接收到无人机发送的接入请求消息时,获取所述无人机的国际移动设备标识IMEI;
根据所述无人机的IMEI对所述无人机进行身份验证,得到身份验证结果;
若所述身份验证结果为验证成功时,确定接受所述无人机的接入;
向所述无人机发送用于指示接受接入的第一接入响应消息。
可选地,所述获取所述无人机的IMEI,包括:
向所述无人机发送身份请求消息,所述身份请求消息用于指示所述无人机提供自身的IMEI;
接收所述无人机发送的身份响应消息,所述身份响应消息中携带有所述无人机的IMEI。
可选地,所述接入请求消息中携带有所述无人机的IMEI;所述获取所述无人机的IMEI,包括:
从所述接入请求消息中读取所述无人机的IMEI。
可选地,所述根据所述无人机的IMEI对所述无人机进行身份验证,得到身份验证结果,包括:
向设备标识注册器EIR发送身份检查请求消息,所述身份检查请求消息中携带有所述无人机的IMEI;
若接收到所述EIR发送的用于指示所述无人机的IMEI已经注册过的第一身份检查应答消息,则确定所述身份验证结果为验证成功;
若接收到所述EIR发送的用于指示所述无人机的IMEI没有注册过的第二身份检查应答消息,则确定所述身份验证结果为验证失败。
可选地,所述方法还包括:
若所述身份验证结果为验证失败时,确定拒绝所述无人机的接入;
向所述无人机发送用于指示拒绝接入的第二接入响应消息。
根据本公开实施例的第二方面,提供一种无人机接入方法,所述方法用于无人机,所述无人机的设备类型被定义为无人机,且有一个国际移动设备标识IMEI,所述方法包括:
向移动管理实体MME发送接入请求消息;
若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入。
可选地,所述方法还包括:
接收所述MME发送的身份请求消息,所述身份请求消息用于指示所述无人机提供自身的IMEI;
向所述MME发送身份响应消息,所述身份响应消息携带有所述无人机的IMEI。
可选地,所述接入请求消息中携带有所述无人机的IMEI。
可选地,所述方法还包括:
若接收到所述MME发送的用于指示拒绝接入的第二接入响应消息,确定所述MME拒绝所述无人机的接入。
根据本公开实施例的第三方面,提供一种无人机接入方法,所述方法用于设备标识注册器EIR,所述方法包括:
接收移动管理实体MME发送的身份检查请求消息,所述身份检查请求消息中携带有请求接入的无人机的IMEI;
判断所述无人机的IMEI是否被注册过;
若确定所述无人机的IMEI已经注册过,则向所述MME发送用于指示所述无人机的IMEI已经注册过的第一身份检查应答消息;
若确定所述无人机的IMEI没有注册过,则向所述MME发送用于指示所述无人机的IMEI没有注册过的第二身份检查应答消息。
根据本公开实施例的第四方面,提供一种无人机接入装置,所述装置用于移动管理实体MME,所述装置包括:
获取模块,被配置为在接收到无人机发送的接入请求消息时,获取所述无人机的国际移动设备标识IMEI;
身份验证模块,被配置为根据所述无人机的IMEI对所述无人机进行身份验证,得到身份验证结果;
第一确定模块,被配置为若所述身份验证结果为验证成功时,确定接受所述无人机的接入;
第一发送模块,被配置为向所述无人机发送用于指示接受接入的第一接入响应消息。
可选地,所述获取模块包括:
第一发送子模块,被配置为向所述无人机发送身份请求消息,所述身份请求消息用于指示所述无人机提供自身的IMEI;
接收子模块,被配置为接收所述无人机发送的身份响应消息,所述身份响应消息中携带有所述无人机的IMEI。
可选地,所述接入请求消息中携带有所述无人机的IMEI;所述获取模块包括:
读取子模块,被配置为从所述接入请求消息中读取所述无人机的IMEI。
可选地,所述身份验证模块包括:
第二发送子模块,被配置为向设备标识注册器EIR发送身份检查请求消息,所述身份检查请求消息中携带有所述无人机的IMEI;
第一验证子模块,被配置为若接收到所述EIR发送的用于指示所述无人机的IMEI已经注册过的第一身份检查应答消息,则确定所述身份验证结果为验证成功;
第二验证子模块,被配置为若接收到所述EIR发送的用于指示所述无人机的IMEI没有注册过的第二身份检查应答消息,则确定所述身份验证结果为验证失败。
可选地,所述装置还包括:
第二确定模块,被配置为若所述身份验证结果为验证失败时,确定拒绝所述无人机的接入;
第二发送模块,被配置为向所述无人机发送用于指示拒绝接入的第二接入响应消息。
根据本公开实施例的第五方面,提供一种无人机接入装置,所述装置用于无人机,所述无人机的设备类型被定义为无人机,且有一个国际移动设备标识IMEI,所述装置包括:
第一发送模块,被配置为向移动管理实体MME发送接入请求消息;
第一确定模块,被配置为若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入。
可选地,所述装置还包括:
接收模块,被配置为接收所述MME发送的身份请求消息,所述身份请求消息用于指示所述无人机提供自身的IMEI;
第二发送模块,被配置为向所述MME发送身份响应消息,所述身份响应消息携带有所述无人机的IMEI。
可选地,所述接入请求消息中携带有所述无人机的IMEI。
可选地,所述装置还包括:
第二确定模块,被配置为若接收到所述MME发送的用于指示拒绝接入的第二接入响应消息,确定所述MME拒绝所述无人机的接入。
根据本公开实施例的第六方面,提供一种无人机接入装置,所述装置用于设备标识注册器EIR,所述装置包括:
接收模块,被配置为接收移动管理实体MME发送的身份检查请求消息,所述身份检查请求消息中携带有请求接入的无人机的IMEI;
判断模块,被配置为判断所述无人机的IMEI是否被注册过;
第一发送模块,被配置为若确定所述无人机的IMEI已经注册过,则向所述MME发送用于指示所述无人机的IMEI已经注册过的第一身份检查应答消息;
第二发送模块,被配置为若确定所述无人机的IMEI没有注册过,则向所述MME发送用于指示所述无人机的IMEI没有注册过的第二身份检查应答消息。
根据本公开实施例的第七方面,提供一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述第一方面的无人机接入方法。
根据本公开实施例的第八方面,提供一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述第二方面的无人机接入方法。
根据本公开实施例的第九方面,提供一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述第三方面的无人机接入方法。
根据本公开实施例的第十方面,提供一种无人机接入装置,所述装置用于移动管理实体MME,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
在接收到无人机发送的接入请求消息时,获取所述无人机的国际移动设备标识IMEI;
根据所述无人机的IMEI对所述无人机进行身份验证,得到身份验证结果;
若所述身份验证结果为验证成功时,确定接受所述无人机的接入;
向所述无人机发送用于指示接受接入的第一接入响应消息。
根据本公开实施例的第十一方面,提供一种无人机接入装置,所述装置用于无人机,所述无人机的设备类型被定义为无人机,且有一个国际移动设备标识IMEI,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
向移动管理实体MME发送接入请求消息;
若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入。
根据本公开实施例的第十二方面,提供一种无人机接入装置,所述装置用于设备标识注册器EIR,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收移动管理实体MME发送的身份检查请求消息,所述身份检查请求消息中携带有请求接入的无人机的IMEI;
判断所述无人机的IMEI是否被注册过;
若确定所述无人机的IMEI已经注册过,则向所述MME发送用于指示所述无人机的IMEI已经注册过的第一身份检查应答消息;
若确定所述无人机的IMEI没有注册过,则向所述MME发送用于指示所述无人机的IMEI没有注册过的第二身份检查应答消息。
本公开的实施例提供的技术方案可以包括以下有益效果:
本公开实施例中,MME可以通过在接收到无人机发送的接入请求消息时,获 取该无人机的IMEI,根据无人机的IMEI对无人机进行身份验证,得到身份验证结果,若身份验证结果为验证成功时,确定接受无人机的接入;向该无人机发送用于指示接受接入的第一接入响应消息,这样可以防止没有通过身份验证的无人机接入蜂窝网络,从而减少了对蜂窝网络造成的干扰,提高了无人机接入的可靠性。
本公开实施例中,MME还可以通过向无人机发送身份请求消息,并接收无人机发送的身份响应消息,该身份响应消息中携带有无人机的IMEI,这样可以通过无人机提供的IMEI对该无人机进行身份验证,从而提高了无人机身份验证的效率。
本公开实施例中,MME还可以通过从接入请求消息中读取无人机的IMEI,这样可以快速获取无人机的IMEI,并可以通过无人机提供的IMEI对该无人机进行身份验证,从而提高了无人机身份验证的效率。
本公开实施例中,MME还可以通过向EIR发送身份检查请求消息,该身份检查请求消息中携带有无人机的IMEI,这样便于EIR根据无人机的IMEI对无人机的身份进行检测,若无人机的IMEI已经注册过,表明身份验证结果为验证成功,进而接受无人机的接入;若无人机的IMEI没有注册过,表明身份验证结果为验证失败,进而拒绝无人机的接入,从而实现了只有注册过的无人机才具有接入蜂窝访问的资格,这样避免了任何类型的无人机都能接入蜂窝网络的情形,减少了无人机的接入将会对蜂窝网络造成的干扰。
本公开实施例中,MME还可以在无人机通过身份验证时,接受无人机的接入;在没有通过身份验证时,则拒绝无人机的接入,这样通过身份验证可以将不符合接入条件的无人机排除在外,从而降低了无人机的接入将会对蜂窝网络造成的干扰。
本公开实施例中,无人机可以通过向MME发送接入请求消息,若接收到MME发送的用于指示接受接入的第一接入响应消息时,确定MME接受无人机的接入,从而实现了MME对无人机接入的控制,提高了无人机接入的安全性。
本公开实施例中,无人机还可以根据MME的要求提供无人机的IMEI,这样可以便于MME根据无人机提供的IMEI对该无人机进行身份验证,从而提高了无人机身份验证的效率。
本公开实施例中,无人机还可以通过主动向MME提供无人机的IMEI,这样可以便于MME根据无人机提供的IMEI对该无人机进行身份验证,从而提高了无人机身 份验证的效率。
本公开实施例中,无人机还可以通过向MME发送接入请求消息,若接收到MME发送的用于指示接受接入的第一接入响应消息时,确定MME接受无人机的接入;若接收到MME发送的用于指示拒绝接入的第二接入响应消息,确定MME拒绝无人机的接入,从而实现了MME对无人机接入的控制,将不符合接入条件的无人机排除在外,从而降低了无人机的接入将会对蜂窝网络造成的干扰。
本公开实施例中,EIR可以通过判断无人机的IMEI是否被注册过,来完成对无人机的身份检查,若无人机的IMEI已经注册过,表明身份验证结果为验证失败,使得MME接受无人机的接入;若无人机的IMEI没有注册过,表明身份验证结果为验证失败,使得MME拒绝无人机的接入,从而实现了只有注册过的无人机才具有接入蜂窝网络的资格,这样避免了任何类型的无人机都能接入蜂窝网络的情形,减少了无人机的接入将会对蜂窝网络造成的干扰。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。
图1是根据一示例性实施例示出的一种无人机接入方法的流程图;
图2是根据一示例性实施例示出的另一种无人机接入方法的流程图;
图3是根据一示例性实施例示出的一种无人机接入方法的流程图;
图4是根据一示例性实施例示出的另一种无人机接入方法的流程图;
图5是根据一示例性实施例示出的另一种无人机接入方法的流程图;
图6是根据一示例性实施例示出的一种无人机接入方法的流程图;
图7是根据一示例性实施例示出的一种无人机接入方法的信息交互图;
图8是根据一示例性实施例示出的一种无人机接入装置的框图;
图9是根据一示例性实施例示出的另一种无人机接入装置的框图;
图10是根据一示例性实施例示出的另一种无人机接入装置的框图;
图11是根据一示例性实施例示出的另一种无人机接入装置的框图;
图12是根据一示例性实施例示出的另一种无人机接入装置的框图;
图13是根据一示例性实施例示出的一种无人机接入装置的框图;
图14是根据一示例性实施例示出的另一种无人机接入装置的框图;
图15是根据一示例性实施例示出的另一种无人机接入装置的框图;
图16是根据一示例性实施例示出的一种无人机接入装置的框图;
图17是根据一示例性实施例示出的一种无人机接入装置的结构示意图;
图18是根据一示例性实施例示出的一种无人机接入装置的结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一些方面相一致的装置和方法的例子。
在本公开使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开。在本公开和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开范围的情况下,指示信息也可以被称为第二信息,类似地,第二信息也可以被称为指示信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
图1是根据一示例性实施例示出的一种无人机接入方法的流程图,该无人机接入方法可以用于移动管理实体(Mobility Management Entity,MME)。如图1所示,该无人机接入方法包括以下步骤110-140:
在步骤110中,在接收到无人机发送的接入请求消息时,获取该无人机的国际移动设备标识(International Mobile Equipment Identity,IMEI)。
本公开实施例中,无人机是蜂窝网络无人机,即该无人机能够接受蜂窝网络(Cellular network)提供的服务。并且,在全球移动通信系统联盟(Global System for Mobile Communications Alliance,GSMA)中定义关于UAV的新的设备类型(device type),针对UAV的device type分配相应的类型分配码(Type Allocation Code,TAC),并形成IMEI。每一个蜂窝网络无人机都要分配一个前述生成的IMEI。
本公开实施例中,当无人机需要接入蜂窝网络时,需要先向MME发送接入请求消息,目的是让MME对无人机身份进行验证。其中,无人机向MME发送接入请求消息时,可以通过基站将接入请求消息透传至MME。
本公开实施例中,MME接收到无人机发送的接入请求消息后,获取该无人机的IMEI的方法有很多,比如:要求无人机上报自身的IMEI。
在步骤120中,根据无人机的IMEI对无人机进行身份验证,得到身份验证结果。
本公开实施例中,MME根据无人机的IMEI对无人机进行身份验证的方法也很多,比如:检查无人机上报的IMEI是否在系统中注册过,若注册过,则允许无人机的接入;若没有注册过,则拒绝无人机的接入。
在步骤130中,若身份验证结果为验证成功时,确定接受无人机的接入。
在步骤140中,向该无人机发送用于指示接受接入的第一接入响应消息。
本公开实施例中,MME接受无人机的接入表明无人机可以接入蜂窝网络。并且,MME向无人机发送用于指示接受接入的第一接入响应消息时,也可以通过基站将第一接入响应消息透传至无人机。
由上述实施例可见,通过在接收到无人机发送的接入请求消息时,获取该无人机的IMEI,根据无人机的IMEI对无人机进行身份验证,得到身份验证结果,若身份验证结果为验证成功时,确定接受无人机的接入,并向该无人机发送用于指示接受接入的第一接入响应消息,这样可以防止没有通过身份验证的无人机接入蜂窝网络,从而减少了对蜂窝网络造成的干扰,提高了无人机接入的可靠性。
在一实施例中,上述步骤110中获取该无人机的IMEI,可以采用以下获取方 式:
(1)向无人机发送身份请求消息,该身份请求消息用于指示无人机提供自身的IMEI;
(2)接收无人机发送的身份响应消息,该身份响应消息中携带有无人机的IMEI。
由上述实施例可见,通过向无人机发送身份请求消息,并接收无人机发送的身份响应消息,该身份响应消息中携带有无人机的IMEI,这样可以通过无人机提供的IMEI对该无人机进行身份验证,从而提高了无人机身份验证的效率。
在一实施例中,上述步骤110中,接入请求消息中携带有无人机的IMEI,在获取该无人机的IMEI时,可以直接从接入请求消息中读取无人机的IMEI。
由上述实施例可见,通过从接入请求消息中读取无人机的IMEI,这样可以快速获取无人机的IMEI,并可以通过无人机提供的IMEI对该无人机进行身份验证,从而提高了无人机身份验证的效率。
在一实施例中,上述步骤120中,在根据所述无人机的IMEI对所述无人机进行身份验证,得到身份验证结果,可以采用以下身份验证方式:
(1)向设备标识注册器(Equipment Identity Register,EIR)发送身份检查请求消息,该身份检查请求消息中携带有无人机的IMEI;
(2)若接收到EIR发送的用于指示无人机的IMEI已经注册过的第一身份检查应答消息,则确定身份验证结果为验证成功;
(3)若接收到EIR发送的用于指示无人机的IMEI没有注册过的第二身份检查应答消息,则确定身份验证结果为验证失败。
由上述实施例可见,通过向EIR发送身份检查请求消息,该身份检查请求消息中携带有无人机的IMEI,这样便于EIR根据无人机的IMEI对无人机的身份进行检测,若无人机的IMEI已经注册过,表明身份验证结果为验证成功,进而接受无人机的接入;若无人机的IMEI没有注册过,表明身份验证结果为验证失败,进而拒绝无人机的接入,从而实现了只有注册过的无人机才具有接入蜂窝访问的资格,这样避免了任何类型的无人机都能接入蜂窝网络的情形,减少了无人机的接入将会对蜂窝网络造成的干扰。
在一实施例中,执行步骤120之后,该无人机接入方法还可以包括以下步骤:
若身份验证结果为验证失败时,确定拒绝无人机的接入;
向无人机发送用于指示拒绝接入的第二接入响应消息。
由上述实施例可见,若无人机通过身份验证,则被允许接入;若没有通过身份验证,则被拒绝接入,这样通过身份验证可以将不符合接入条件的无人机排除在外,从而降低了无人机的接入将会对蜂窝网络造成的干扰。
图2是根据一示例性实施例示出的另一种无人机接入方法的流程图,该无人机接入方法可以用于MME,并建立在图1所示方法的基础上。如图1所示,该无人机接入方法包括以下步骤210-270:
在步骤210中,在接收到无人机发送的接入请求消息时,向该无人机发送身份请求消息,身份请求消息用于指示无人机提供自身的IMEI。
在步骤220中,接收无人机发送的身份响应消息,该身份响应消息中携带有无人机的IMEI。
在步骤230中,向EIR发送身份检查请求消息,身份检查请求消息中携带有无人机的IMEI。
在步骤240中,接收到EIR发送的用于指示无人机的IMEI已经注册过的第一身份检查应答消息,则确定身份验证结果为验证成功。
在步骤250中,确定接受无人机的接入,并向该无人机发送用于指示接受接入的第一接入响应消息,流程结束。
在步骤260中,接收到EIR发送的用于指示无人机的IMEI没有注册过的第二身份检查应答消息,则确定身份验证结果为验证失败。
在步骤270中,确定拒绝无人机的接入,并向无人机发送用于指示拒绝接入的第二接入响应消息。
由上述实施例可见,通过无人机提供的自身的IMEI对无人机进行身份验证,若无人机通过身份验证,则被允许接入;若没有通过身份验证,则被拒绝接入,这样通过身份验证可以将不符合接入条件的无人机排除在外,从而降低了无人机的接入将会对蜂窝网络造成的干扰。
图3是根据一示例性实施例示出的一种无人机接入方法的流程图,该无人机接入方法可以用于无人机,该无人机的设备类型被定义为无人机,且所述无人机有一个IMEI。如图3所示,该无人机接入方法包括以下步骤310-320:
在步骤310中,向MME发送接入请求消息。
本公开实施例中,无人机是蜂窝网络无人机,当无人机需要接入蜂窝网络时,需要先向MME发送接入请求消息,目的是让MME对无人机身份进行验证。其中,无人机向MME发送接入请求消息时,可以通过基站将接入请求消息透传至MME。
在步骤320中,若接收到MME发送的用于指示接受接入的第一接入响应消息时,确定MME接受无人机的接入。
本公开实施例中,无人机接收到第一接入响应消息,无人机通过身份验证,可以接入蜂窝网络了。
由上述实施例可见,通过向MME发送接入请求消息,若接收到MME发送的用于指示接受接入的第一接入响应消息时,确定MME接受无人机的接入,从而实现了MME对无人机接入的控制,提高了无人机接入的安全性。
在一实施例中,执行步骤310之后,该无人机接入方法还包括:
(1)接收MME发送的身份请求消息,身份请求消息用于指示无人机提供自身的IMEI;
(2)向MME发送身份响应消息,身份响应消息携带有无人机的IMEI。
由上述实施例可见,根据MME的要求提供无人机的IMEI,这样可以便于MME根据无人机提供的IMEI对该无人机进行身份验证,从而提高了无人机身份验证的效率。
在一实施例中,上述步骤310中,无人机向MME发送的接入请求消息中携带有该无人机的IMEI。
由上述实施例可见,通过主动向MME提供无人机的IMEI,这样可以便于MME根据无人机提供的IMEI对该无人机进行身份验证,从而提高了无人机身份验证的效率。
在一实施例中,执行步骤310之后,该无人机接入方法还包括:
若接收到MME发送的用于指示拒绝接入的第二接入响应消息,确定MME拒绝无人机的接入。
由上述实施例可见,通过向MME发送接入请求消息,若接收到MME发送的用于指示接受接入的第一接入响应消息时,确定MME接受无人机的接入;若接收到MME发送的用于指示拒绝接入的第二接入响应消息,确定MME拒绝无人机的接入,从而实现了MME对无人机接入的控制,将不符合接入条件的无人机排除在外,从而降低了无人机的接入将会对蜂窝网络造成的干扰。
图4是根据一示例性实施例示出的另一种无人机接入方法的流程图,该无人机接入方法可以用于无人机,该无人机的设备类型被定义为无人机,且所述无人机有一个IMEI,并建立图3所示方法的基础上。如图4所示,该无人机接入方法包括以下步骤410-450:
在步骤410中,向MME发送接入请求消息;
在步骤420中,接收MME发送的身份请求消息,身份请求消息用于指示无人机提供自身的IMEI;
在步骤430中,向MME发送身份响应消息,身份响应消息携带有无人机的IMEI。
在步骤440中,若接收到MME发送的用于指示接受接入的第一接入响应消息时,确定MME接受无人机的接入。
在步骤450中,若接收到MME发送的用于指示拒绝接入的第二接入响应消息,确定MME拒绝无人机的接入。
由上述实施例可见,根据MME的要求提供无人机的IMEI,这样可以便于MME根据无人机提供的IMEI对该无人机进行身份验证,若无人机通过身份验证,则被允许接入;若没有通过身份验证,则被拒绝接入,这样通过身份验证可以将不符合接入条件的无人机排除在外,从而降低了无人机的接入将会对蜂窝网络造成的干扰。
图5是根据一示例性实施例示出的另一种无人机接入方法的流程图,该无人机接入方法可以用于无人机,该无人机的设备类型被定义为无人机,且所述无人机有一个IMEI,并建立图3所示方法的基础上。如图5所示,该无人机接入方法包括以下步骤510-530:
在步骤510中,向MME发送接入请求消息,接入请求消息中携带有无人机的 IMEI。
在步骤520中,若接收到MME发送的用于指示接受接入的第一接入响应消息时,确定MME接受无人机的接入。
在步骤530中,若接收到MME发送的用于指示拒绝接入的第二接入响应消息,确定MME拒绝所述无人机的接入。
由上述实施例可见,通过主动向MME提供无人机的IMEI,这样可以便于MME根据无人机提供的IMEI对该无人机进行身份验证,若无人机通过身份验证,则被允许接入;若没有通过身份验证,则被拒绝接入,这样通过身份验证可以将不符合接入条件的无人机排除在外,从而降低了无人机的接入将会对蜂窝网络造成的干扰。
图6是根据一示例性实施例示出的一种无人机接入方法的流程图,该无人机接入方法可以用于EIR。如图6所示,该无人机接入方法包括以下步骤610-640:
在步骤610中,接收MME发送的身份检查请求消息,身份检查请求消息中携带有请求接入的无人机的IMEI。
本公开实施例中,EIR可以完成对无人机的身份检查功能。
在步骤620中,判断无人机的IMEI是否被注册过;
在步骤630中,若确定无人机的IMEI已经注册过,则向MME发送用于指示无人机的IMEI已经注册过的第一身份检查应答消息;
在步骤640中,若确定无人机的IMEI没有注册过,则向MME发送用于指示无人机的IMEI没有注册过的第二身份检查应答消息。
由上述实施例可见,通过判断无人机的IMEI是否被注册过,来完成对无人机的身份检查,若无人机的IMEI已经注册过,表明身份验证结果为验证失败,使得MME接受无人机的接入;若无人机的IMEI没有注册过,表明身份验证结果为验证失败,使得MME拒绝无人机的接入,从而实现了只有注册过的无人机才具有接入蜂窝网络的资格,这样避免了任何类型的无人机都能接入蜂窝网络的情形,减少了无人机的接入将会对蜂窝网络造成的干扰。
图7是根据一示例性实施例示出的一种无人机接入方法的信息交互图。如图7所示,该信息交互图中包括无人机、基站、MME和EIR:
(1)无人机向基站发送接入请求消息(Attach Request),基站将接入请求消息透传至MME。
(2)MME向基站发送身份请求消息(Identity Request),基站将身份请求消息透传至无人机。其中,身份请求消息用于指示人机提供自身的IMEI。
(3)无人机向基站发送身份响应消息(Identity Response),基站将身份响应消息透传至MME。其中,身份响应消息中携带有无人机的IMEI。
(4)MME向EIR发送身份检查请求消息(ME Identity Check Request)。其中,身份检查请求消息中携带有无人机的IMEI。
(5)EIR向MME发送身份检查应答消息(ME Identity Check Ack)。其中,身份检查应答消息可能是用于指示无人机的IMEI已经注册过的第一身份检查应答消息,还可能是用于指示无人机的IMEI没有注册过的第二身份检查应答消息。
(6)MME向基站发送接入响应消息(Attach Response),基站将接入响应消息透传至无人机。其中,接入响应消息可能是用于指示接受接入的第一接入响应消息,也可能是用于指示拒绝接入的第二接入响应消息。
与前述无人机接入方法实施例相对应,本公开还提供无人机接入装置的实施例。
图8是根据一示例性实施例示出的一种无人机接入装置的框图,该无人机接入装置可以用于MME,并用于执行图1所示的无人机接入方法。如图8所示,该无人机接入装置可以包括:
获取模块81,被配置为在接收到无人机发送的接入请求消息时,获取所述无人机的IMEI;
身份验证模块82,被配置为根据所述无人机的IMEI对所述无人机进行身份验证,得到身份验证结果;
第一确定模块83,被配置为若所述身份验证结果为验证成功时,确定接受所述无人机的接入;
第一发送模块84,被配置为若所述身份验证结果为验证成功时,确定接受所述无人机的接入,并向所述无人机发送用于指示接受接入的第一接入响应消息。
由上述实施例可见,通过在接收到无人机发送的接入请求消息时,获取该无人 机的IMEI,根据无人机的IMEI对无人机进行身份验证,得到身份验证结果,若身份验证结果为验证成功时,确定接受无人机的接入,并向该无人机发送用于指示接受接入的第一接入响应消息,这样可以防止没有通过身份验证的无人机接入蜂窝网络,从而减少了对蜂窝网络造成的干扰,提高了无人机接入的可靠性。
图9是根据一示例性实施例示出的另一种无人机接入装置的框图,该无人机接入装置可以用于MME,并建立在图8所示装置的基础上。如图9所示,所述获取模块81可以包括:
第一发送子模块91,被配置为向所述无人机发送身份请求消息,所述身份请求消息用于指示所述无人机提供自身的IMEI;
接收子模块92,被配置为接收所述无人机发送的身份响应消息,所述身份响应消息中携带有所述无人机的IMEI。
由上述实施例可见,通过向无人机发送身份请求消息,并接收无人机发送的身份响应消息,该身份响应消息中携带有无人机的IMEI,这样可以通过无人机提供的IMEI对该无人机进行身份验证,从而提高了无人机身份验证的效率。
图10是根据一示例性实施例示出的另一种无人机接入装置的框图,该无人机接入装置可以用于MME,并建立在图8所示装置的基础上,所述接入请求消息中携带有所述无人机的IMEI。如图10所示,所述获取模块81可以包括:
读取子模块101,被配置为从所述接入请求消息中读取所述无人机的IMEI。
由上述实施例可见,通过从接入请求消息中读取无人机的IMEI,这样可以快速获取无人机的IMEI,并可以通过无人机提供的IMEI对该无人机进行身份验证,从而提高了无人机身份验证的效率。
图11是根据一示例性实施例示出的另一种无人机接入装置的框图,该无人机接入装置可以用于MME,并建立在图8所示装置的基础上,如图11所示,所述身份验证模块82可以包括:
第二发送子模块111,被配置为向EIR发送身份检查请求消息,所述身份检查请求消息中携带有所述无人机的IMEI;
第一验证子模块112,被配置为若接收到所述EIR发送的用于指示所述无人机的IMEI已经注册过的第一身份检查应答消息,则确定所述身份验证结果为验证成功;
第二验证子模块113,被配置为若接收到所述EIR发送的用于指示所述无人机的IMEI没有注册过的第二身份检查应答消息,则确定所述身份验证结果为验证失败。
由上述实施例可见,通过向EIR发送身份检查请求消息,该身份检查请求消息中携带有无人机的IMEI,这样便于EIR根据无人机的IMEI对无人机的身份进行检测,若无人机的IMEI已经注册过,表明身份验证结果为验证成功,进而接受无人机的接入;若无人机的IMEI没有注册过,表明身份验证结果为验证失败,进而拒绝无人机的接入,从而实现了只有注册过的无人机才具有接入蜂窝访问的资格,这样避免了任何类型的无人机都能接入蜂窝网络的情形,减少了无人机的接入将会对蜂窝网络造成的干扰。
图12是根据一示例性实施例示出的另一种无人机接入装置的框图,该无人机接入装置可以用于MME,并建立在图8或图11所示装置的基础上,如图12所示,所述无人机接入装置还可以包括:
第二确定模块121,被配置为若所述身份验证结果为验证失败时,确定拒绝所述无人机的接入;
第二发送模块122,被配置为向所述无人机发送用于指示拒绝接入的第二接入响应消息。
由上述实施例可见,若无人机通过身份验证,则被允许接入;若没有通过身份验证,则被拒绝接入,这样通过身份验证可以将不符合接入条件的无人机排除在外,从而降低了无人机的接入将会对蜂窝网络造成的干扰。
图13是根据一示例性实施例示出的一种无人机接入装置的框图,该无人机接入装置可以用于无人机,所述无人机的设备类型被定义为无人机,且所述无人机有一个IMEI,并用于执行图5所示的无人机接入方法。如图13所示,该无人机接入装置可以包括:
第一发送模块131,被配置为向MME发送接入请求消息;
第一确定模块132,被配置为若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入。
由上述实施例可见,通过向MME发送接入请求消息,若接收到MME发送的用于指示接受接入的第一接入响应消息时,确定MME接受无人机的接入,从而实现 了MME对无人机接入的控制,提高了无人机接入的安全性。
图14是根据一示例性实施例示出的另一种无人机接入装置的框图,该无人机接入装置可以用于无人机,所述无人机的设备类型被定义为无人机,且所述无人机有一个IMEI,并建立在图13所示装置的基础上。如图14所示,该无人机接入装置还可以包括:
接收模块141,被配置为接收所述MME发送的身份请求消息,所述身份请求消息用于指示所述无人机提供自身的IMEI;
第二发送模块142,被配置为向所述MME发送身份响应消息,所述身份响应消息携带有所述无人机的IMEI。
由上述实施例可见,根据MME的要求提供无人机的IMEI,这样可以便于MME根据无人机提供的IMEI对该无人机进行身份验证,从而提高了无人机身份验证的效率。
在一实施例中,建立在图13所示装置的基础上,所述接入请求消息中携带有所述无人机的IMEI。
由上述实施例可见,通过主动向MME提供无人机的IMEI,这样可以便于MME根据无人机提供的IMEI对该无人机进行身份验证,从而提高了无人机身份验证的效率。
图15是根据一示例性实施例示出的另一种无人机接入装置的框图,该无人机接入装置可以用于无人机,所述无人机的设备类型被定义为无人机,且所述无人机有一个IMEI,并建立图13所示装置的基础上。如图15所示,该无人机接入装置还可以包括:
第二确定模块151,被配置为若接收到所述MME发送的用于指示拒绝接入的第二接入响应消息,确定所述MME拒绝所述无人机的接入。
由上述实施例可见,通过向MME发送接入请求消息,若接收到MME发送的用于指示接受接入的第一接入响应消息时,确定MME接受无人机的接入;若接收到MME发送的用于指示拒绝接入的第二接入响应消息,确定MME拒绝无人机的接入,从而实现了MME对无人机接入的控制,将不符合接入条件的无人机排除在外,从而降低了无人机的接入将会对蜂窝网络造成的干扰。
图16是根据一示例性实施例示出的一种无人机接入装置的框图,该无人机接入装置可以EIR,并用于执行图7所示的无人机接入方法。如图16所示,该无人机接入装置可以包括:
接收模块161,被配置为接收MME发送的身份检查请求消息,所述身份检查请求消息中携带有请求接入的无人机的IMEI;
判断模块162,被配置为判断所述无人机的IMEI是否被注册过;
第一发送模块163,被配置为若确定所述无人机的IMEI已经注册过,则向所述MME发送用于指示所述无人机的IMEI已经注册过的第一身份检查应答消息;
第二发送模块164,被配置为若确定所述无人机的IMEI没有注册过,则向所述MME发送用于指示所述无人机的IMEI没有注册过的第二身份检查应答消息。
由上述实施例可见,通过判断无人机的IMEI是否被注册过,来完成对无人机的身份检查,若无人机的IMEI已经注册过,表明身份验证结果为验证失败,使得MME接受无人机的接入;若无人机的IMEI没有注册过,表明身份验证结果为验证失败,使得MME拒绝无人机的接入,从而实现了只有注册过的无人机才具有接入蜂窝网络的资格,这样避免了任何类型的无人机都能接入蜂窝网络的情形,减少了无人机的接入将会对蜂窝网络造成的干扰。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中上述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本公开方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
相应地,本公开还提供了一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,其特征在于,所述计算机程序用于执行上述图1至图3任一所述的无人机接入方法。
相应地,本公开还提供了一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,其特征在于,所述计算机程序用于执行上述图4至图6任一所述的无人机接入方法。
相应地,本公开还提供了一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,其特征在于,所述计算机程序用于执行上述图7所述的无人机接入方法。
相应地,本公开还提供了一种无人机接入装置,所述装置用于MME,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
在接收到无人机发送的接入请求消息时,获取所述无人机的IMEI;
根据所述无人机的IMEI对所述无人机进行身份验证,得到身份验证结果;
若所述身份验证结果为验证成功时,确定接受所述无人机的接入;
向所述无人机发送用于指示接受接入的第一接入响应消息。
图17是根据一示例性实施例示出的一种无人机接入装置的结构示意图。如图17所示,根据一示例性实施例示出的一种无人机接入装置1700,该装置1700可以被提供为一MME。
参照图17,装置1700可以包括以下一个或多个组件:处理组件1701,存储器1702,电源组件1703,多媒体组件1704,音频组件1705,输入/输出(I/O)的接口1706,传感器组件1707,以及通信组件1708。
处理组件1701通常控制装置1700的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件1701可以包括一个或多个处理器1709来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件1701可以包括一个或多个模块,便于处理组件1701和其它组件之间的交互。例如,处理组件1701可以包括多媒体模块,以方便多媒体组件1704和处理组件1701之间的交互。
存储器1702被配置为存储各种类型的数据以支持在装置1700的操作。这些数据的示例包括用于在装置1700上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器1702可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读 存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件1703为装置1700的各种组件提供电力。电源组件1703可以包括电源管理系统,一个或多个电源,及其它与为装置1700生成、管理和分配电力相关联的组件。
多媒体组件1704包括在所述装置1700和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件1704包括一个前置摄像头和/或后置摄像头。当装置1700处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件1705被配置为输出和/或输入音频信号。例如,音频组件1705包括一个麦克风(MIC),当装置1700处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1702或经由通信组件1708发送。在一些实施例中,音频组件1705还包括一个扬声器,用于输出音频信号。
I/O接口1706为处理组件1701和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件1707包括一个或多个传感器,用于为装置1700提供各个方面的状态评估。例如,传感器组件1707可以检测到装置1700的打开/关闭状态,组件的相对定位,例如所述组件为装置1700的显示器和小键盘,传感器组件1707还可以检测装置1700或装置1700一个组件的位置改变,用户与装置1700接触的存在或不存在,装置1700方位或加速/减速和装置1700的温度变化。传感器组件1707可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件1707还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一 些实施例中,该传感器组件1707还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件1708被配置为便于装置1700和其它设备之间有线或无线方式的通信。装置1700可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件1708经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件1708还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其它技术来实现。
在示例性实施例中,装置1700可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其它电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器1702,上述指令可由装置1700的处理器1709执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
其中,当所述存储介质中的指令由所述处理器执行时,使得装置1700能够执行上述任一所述无人机接入方法。
相应地,本公开还提供了一种无人机接入装置,所述装置用于无人机,所述无人机的设备类型被定义为无人机,且所述无人机有一个IMEI,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
向MME发送接入请求消息;
若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入。
相应地,本公开还提供了一种无人机接入装置,所述装置用于EIR,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收MME发送的身份检查请求消息,所述身份检查请求消息中携带有请求接入的无人机的IMEI;
判断所述无人机的IMEI是否被注册过;
若确定所述无人机的IMEI已经注册过,则向所述MME发送用于指示所述无人机的IMEI已经注册过的第一身份检查应答消息;
若确定所述无人机的IMEI没有注册过,则向所述MME发送用于指示所述无人机的IMEI没有注册过的第二身份检查应答消息。
图18是根据一示例性实施例示出的一种无人机接入装置的结构示意图。如图18所示,根据一示例性实施例示出的一种无人机接入装置1800,该装置1800可以被提供为一EIR。
参照图18,装置1800可以包括以下一个或多个组件:处理组件1801,存储器1802,电源组件1803,多媒体组件1804,音频组件1805,输入/输出(I/O)的接口1806,传感器组件1807,以及通信组件1808。
处理组件1801通常控制装置1800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件1801可以包括一个或多个处理器1809来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件1801可以包括一个或多个模块,便于处理组件1801和其它组件之间的交互。例如,处理组件1801可以包括多媒体模块,以方便多媒体组件1804和处理组件1801之间的交互。
存储器1802被配置为存储各种类型的数据以支持在装置1800的操作。这些数据的示例包括用于在装置1800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器1802可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读 存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件1803为装置1800的各种组件提供电力。电源组件1803可以包括电源管理系统,一个或多个电源,及其它与为装置1800生成、管理和分配电力相关联的组件。
多媒体组件1804包括在所述装置1800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件1804包括一个前置摄像头和/或后置摄像头。当装置1800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件1805被配置为输出和/或输入音频信号。例如,音频组件1805包括一个麦克风(MIC),当装置1800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1802或经由通信组件1808发送。在一些实施例中,音频组件1805还包括一个扬声器,用于输出音频信号。
I/O接口1806为处理组件1801和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件1807包括一个或多个传感器,用于为装置1800提供各个方面的状态评估。例如,传感器组件1807可以检测到装置1800的打开/关闭状态,组件的相对定位,例如所述组件为装置1800的显示器和小键盘,传感器组件1807还可以检测装置1800或装置1800一个组件的位置改变,用户与装置1800接触的存在或不存在,装置1800方位或加速/减速和装置1800的温度变化。传感器组件1807可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件1807还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一 些实施例中,该传感器组件1807还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件1808被配置为便于装置1800和其它设备之间有线或无线方式的通信。装置1800可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件1808经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件1808还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其它技术来实现。
在示例性实施例中,装置1800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其它电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器1802,上述指令可由装置1800的处理器1809执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
其中,当所述存储介质中的指令由所述处理器执行时,使得装置1800能够执行上述任一所述无人机接入方法。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。

Claims (26)

  1. 一种无人机接入方法,其特征在于,所述方法用于移动管理实体MME,所述方法包括:
    在接收到无人机发送的接入请求消息时,获取所述无人机的国际移动设备标识IMEI;
    根据所述无人机的IMEI对所述无人机进行身份验证,得到身份验证结果;
    若所述身份验证结果为验证成功时,确定接受所述无人机的接入;
    向所述无人机发送用于指示接受接入的第一接入响应消息。
  2. 根据权利要求1所述的方法,其特征在于,所述获取所述无人机的IMEI,包括:
    向所述无人机发送身份请求消息,所述身份请求消息用于指示所述无人机提供自身的IMEI;
    接收所述无人机发送的身份响应消息,所述身份响应消息中携带有所述无人机的IMEI。
  3. 根据权利要求1所述的方法,其特征在于,所述接入请求消息中携带有所述无人机的IMEI;所述获取所述无人机的IMEI,包括:
    从所述接入请求消息中读取所述无人机的IMEI。
  4. 根据权利要求1所述的方法,其特征在于,所述根据所述无人机的IMEI对所述无人机进行身份验证,得到身份验证结果,包括:
    向设备标识注册器EIR发送身份检查请求消息,所述身份检查请求消息中携带有所述无人机的IMEI;
    若接收到所述EIR发送的用于指示所述无人机的IMEI已经注册过的第一身份检查应答消息,则确定所述身份验证结果为验证成功;
    若接收到所述EIR发送的用于指示所述无人机的IMEI没有注册过的第二身份检查应答消息,则确定所述身份验证结果为验证失败。
  5. 根据权利要求1或4所述的方法,其特征在于,所述方法还包括:
    若所述身份验证结果为验证失败时,确定拒绝所述无人机的接入;
    向所述无人机发送用于指示拒绝接入的第二接入响应消息。
  6. 一种无人机接入方法,其特征在于,所述方法用于无人机,所述无人机的设备类型被定义为无人机,且所述无人机有一个国际移动设备标识IMEI,所述方法包括:
    向移动管理实体MME发送接入请求消息;
    若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入。
  7. 根据权利要求6所述的方法,其特征在于,所述方法还包括:
    接收所述MME发送的身份请求消息,所述身份请求消息用于指示所述无人机提供自身的IMEI;
    向所述MME发送身份响应消息,所述身份响应消息携带有所述无人机的IMEI。
  8. 根据权利要求6所述的方法,其特征在于,所述接入请求消息中携带有所述无人机的IMEI。
  9. 根据权利要求6所述的方法,其特征在于,所述方法还包括:
    若接收到所述MME发送的用于指示拒绝接入的第二接入响应消息,确定所述MME拒绝所述无人机的接入。
  10. 一种无人机接入方法,其特征在于,所述方法用于设备标识注册器EIR,所述方法包括:
    接收移动管理实体MME发送的身份检查请求消息,所述身份检查请求消息中携带有请求接入的无人机的IMEI;
    判断所述无人机的IMEI是否被注册过;
    若确定所述无人机的IMEI已经注册过,则向所述MME发送用于指示所述无人机的IMEI已经注册过的第一身份检查应答消息;
    若确定所述无人机的IMEI没有注册过,则向所述MME发送用于指示所述无人机的IMEI没有注册过的第二身份检查应答消息。
  11. 一种无人机接入装置,其特征在于,所述装置用于移动管理实体MME,所述装置包括:
    获取模块,被配置为在接收到无人机发送的接入请求消息时,获取所述无人机的国际移动设备标识IMEI;
    身份验证模块,被配置为根据所述无人机的IMEI对所述无人机进行身份验证,得到身份验证结果;
    第一确定模块,被配置为若所述身份验证结果为验证成功时,确定接受所述无人机的接入;
    第一发送模块,被配置为向所述无人机发送用于指示接受接入的第一接入响应消 息。
  12. 根据权利要求11所述的装置,其特征在于,所述获取模块包括:
    第一发送子模块,被配置为向所述无人机发送身份请求消息,所述身份请求消息用于指示所述无人机提供自身的IMEI;
    接收子模块,被配置为接收所述无人机发送的身份响应消息,所述身份响应消息中携带有所述无人机的IMEI。
  13. 根据权利要求11所述的装置,其特征在于,所述接入请求消息中携带有所述无人机的IMEI;所述获取模块包括:
    读取子模块,被配置为从所述接入请求消息中读取所述无人机的IMEI。
  14. 根据权利要求11所述的装置,其特征在于,所述身份验证模块包括:
    第二发送子模块,被配置为向设备标识注册器EIR发送身份检查请求消息,所述身份检查请求消息中携带有所述无人机的IMEI;
    第一验证子模块,被配置为若接收到所述EIR发送的用于指示所述无人机的IMEI已经注册过的第一身份检查应答消息,则确定所述身份验证结果为验证成功;
    第二验证子模块,被配置为若接收到所述EIR发送的用于指示所述无人机的IMEI没有注册过的第二身份检查应答消息,则确定所述身份验证结果为验证失败。
  15. 根据权利要求11或14所述的装置,其特征在于,所述装置还包括:
    第二确定模块,被配置为若所述身份验证结果为验证失败时,确定拒绝所述无人机的接入;
    第二发送模块,被配置为向所述无人机发送用于指示拒绝接入的第二接入响应消息。
  16. 一种无人机接入装置,其特征在于,所述装置用于无人机,所述无人机的设备类型被定义为无人机,且有一个国际移动设备标识IMEI,所述装置包括:
    第一发送模块,被配置为向移动管理实体MME发送接入请求消息;
    第一确定模块,被配置为若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入。
  17. 根据权利要求16所述的装置,其特征在于,所述装置还包括:
    接收模块,被配置为接收所述MME发送的身份请求消息,所述身份请求消息用于指示所述无人机提供自身的IMEI;
    第二发送模块,被配置为向所述MME发送身份响应消息,所述身份响应消息携 带有所述无人机的IMEI。
  18. 根据权利要求16所述的装置,其特征在于,所述接入请求消息中携带有所述无人机的IMEI。
  19. 根据权利要求16所述的装置,其特征在于,所述装置还包括:
    第二确定模块,被配置为若接收到所述MME发送的用于指示拒绝接入的第二接入响应消息,确定所述MME拒绝所述无人机的接入。
  20. 一种无人机接入装置,其特征在于,所述装置用于设备标识注册器EIR,所述装置包括:
    接收模块,被配置为接收移动管理实体MME发送的身份检查请求消息,所述身份检查请求消息中携带有请求接入的无人机的IMEI;
    判断模块,被配置为判断所述无人机的IMEI是否被注册过;
    第一发送模块,被配置为若确定所述无人机的IMEI已经注册过,则向所述MME发送用于指示所述无人机的IMEI已经注册过的第一身份检查应答消息;
    第二发送模块,被配置为若确定所述无人机的IMEI没有注册过,则向所述MME发送用于指示所述无人机的IMEI没有注册过的第二身份检查应答消息。
  21. 一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,其特征在于,所述计算机程序用于执行上述权利要求1-5任一所述的无人机接入方法。
  22. 一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,其特征在于,所述计算机程序用于执行上述权利要求6-9任一所述的无人机接入方法。
  23. 一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,其特征在于,所述计算机程序用于执行上述权利要求10所述的无人机接入方法。
  24. 一种无人机接入装置,其特征在于,所述装置用于移动管理实体MME,所述装置包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    在接收到无人机发送的接入请求消息时,获取所述无人机的国际移动设备标识IMEI;
    根据所述无人机的IMEI对所述无人机进行身份验证,得到身份验证结果;
    若所述身份验证结果为验证成功时,确定接受所述无人机的接入;
    向所述无人机发送用于指示接受接入的第一接入响应消息。
  25. 一种无人机接入装置,其特征在于,所述装置用于无人机,所述无人机的设备类型被定义为无人机,且有一个国际移动设备标识IMEI,所述装置包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    向移动管理实体MME发送接入请求消息;
    若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入。
  26. 一种无人机接入装置,其特征在于,所述装置用于设备标识注册器EIR,所述装置包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    接收移动管理实体MME发送的身份检查请求消息,所述身份检查请求消息中携带有请求接入的无人机的IMEI;
    判断所述无人机的IMEI是否被注册过;
    若确定所述无人机的IMEI已经注册过,则向所述MME发送用于指示所述无人机的IMEI已经注册过的第一身份检查应答消息;
    若确定所述无人机的IMEI没有注册过,则向所述MME发送用于指示所述无人机的IMEI没有注册过的第二身份检查应答消息。
PCT/CN2017/096854 2017-08-10 2017-08-10 无人机接入方法及装置 WO2019028746A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PCT/CN2017/096854 WO2019028746A1 (zh) 2017-08-10 2017-08-10 无人机接入方法及装置
CN201780001097.XA CN109451817B (zh) 2017-08-10 2017-08-10 无人机接入方法及装置
US16/633,848 US11197147B2 (en) 2017-08-10 2017-08-10 Unmanned aerial vehicle access method and device
EP17920914.3A EP3668126A4 (en) 2017-08-10 2017-08-10 PILOTLESS AIR VEHICLE ACCESS PROCESS AND DEVICE

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/096854 WO2019028746A1 (zh) 2017-08-10 2017-08-10 无人机接入方法及装置

Publications (1)

Publication Number Publication Date
WO2019028746A1 true WO2019028746A1 (zh) 2019-02-14

Family

ID=65273187

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/096854 WO2019028746A1 (zh) 2017-08-10 2017-08-10 无人机接入方法及装置

Country Status (4)

Country Link
US (1) US11197147B2 (zh)
EP (1) EP3668126A4 (zh)
CN (1) CN109451817B (zh)
WO (1) WO2019028746A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021087696A1 (zh) * 2019-11-04 2021-05-14 华为技术有限公司 身份认证方法及通信装置

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111247576A (zh) * 2017-08-11 2020-06-05 联想(北京)有限公司 订阅信息配置
EP3671694A4 (en) * 2017-09-06 2020-09-09 Beijing Xiaomi Mobile Software Co., Ltd. PILOTLESS AIR VEHICLE ACCESS PROCESS AND DEVICE
CN109982363A (zh) * 2017-12-28 2019-07-05 株式会社Ntt都科摩 无线通信方法及相应的通信设备
EP3806510B1 (en) * 2018-06-14 2024-01-31 Beijing Xiaomi Mobile Software Co., Ltd. Information transmission method, device and system, and storage medium
CN110191463B (zh) * 2019-05-14 2022-03-25 惠州Tcl移动通信有限公司 一种gsm网络的快速接入方法及相关设备
WO2021226931A1 (en) * 2020-05-14 2021-11-18 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for communication services
CN115868187A (zh) 2020-07-24 2023-03-28 Oppo广东移动通信有限公司 通信装置和通信方法
CN116761171A (zh) * 2020-12-14 2023-09-15 Oppo广东移动通信有限公司 目标信息获取方法、发送方法、装置、设备及存储介质
CN114679268B (zh) * 2022-03-29 2023-07-21 湖北工业大学 无人机间相互认证与密钥协商的方法、可存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102905266A (zh) * 2012-10-11 2013-01-30 大唐移动通信设备有限公司 一种实现移动设备附着的方法及装置
CN104950907A (zh) * 2015-06-26 2015-09-30 广州快飞计算机科技有限公司 无人机的监控方法、装置及系统
CN104980210A (zh) * 2015-06-26 2015-10-14 陈昊 一种可配合鉴权通信机制的无人机与地面站及鉴权方法
US20160103579A1 (en) * 2014-10-10 2016-04-14 Thales Tactile interface for the flight management system of an aircraft
CN105554687A (zh) * 2015-12-14 2016-05-04 小米科技有限责任公司 智能设备的联网工作方法、装置及智能设备
CN106296871A (zh) * 2016-08-02 2017-01-04 北京招通致晟科技有限公司 无人机监管方法及系统
CN106507276A (zh) * 2016-10-31 2017-03-15 中国联合网络通信集团有限公司 无人机、无人机的标识方法及无人机管理系统

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100401822C (zh) 2006-08-25 2008-07-09 华为技术有限公司 移动终端防盗用的保护方法与系统
CN101500214B (zh) * 2008-02-03 2011-07-20 大唐移动通信设备有限公司 一种支持紧急呼叫服务的通信方法、系统及装置
KR101472749B1 (ko) * 2008-09-25 2014-12-16 삼성전자주식회사 Home eNB에서 단말의 수락제어 방법 및 장치.
US10115277B2 (en) * 2014-07-29 2018-10-30 GeoFrenzy, Inc. Systems and methods for geofence security
US20180218619A1 (en) * 2015-07-17 2018-08-02 Relmatech Limited An aircraft controlled by a secure integrated airspace management system
US20180253092A1 (en) * 2015-09-09 2018-09-06 Tecteco Security Systems, S.L. Secure control of unmanned vehicles
CN105225540A (zh) 2015-10-21 2016-01-06 杨珊珊 无人飞行器的飞行区域监控装置及其监控方法
US9940842B2 (en) * 2015-11-02 2018-04-10 At&T Intellectual Property I, L.P. Intelligent drone traffic management via radio access network
WO2017078776A1 (en) * 2015-11-06 2017-05-11 Intel IP Corporation User plane resource allocation
US9948380B1 (en) * 2016-03-30 2018-04-17 X Development Llc Network capacity management
US10887927B2 (en) * 2016-05-16 2021-01-05 Telefonaktiebolaget Lm Ericsson (Publ) Evolved packet system (EPS) bearer identity based active flag extension for cellular internet of things (CIoT) devices
US10446043B2 (en) * 2016-07-28 2019-10-15 At&T Mobility Ii Llc Radio frequency-based obstacle avoidance
US9826415B1 (en) * 2016-12-01 2017-11-21 T-Mobile Usa, Inc. Tactical rescue wireless base station
CN108616861B (zh) 2017-01-03 2021-01-15 中国移动通信有限公司研究院 一种空中写卡方法及装置
US10389432B2 (en) * 2017-06-22 2019-08-20 At&T Intellectual Property I, L.P. Maintaining network connectivity of aerial devices during unmanned flight
US10755586B2 (en) * 2017-07-17 2020-08-25 Verizon Patent And Licensing Inc. Providing automatic dependent surveillance-broadcast data for unmanned aerial vehicles
US10405373B2 (en) * 2017-08-03 2019-09-03 Nec Corporation Distributed core architecture for implementing wireless communication networks
US11115113B2 (en) * 2017-09-14 2021-09-07 Telefonaktiebolaget Lm Ericsson (Publ) Technique for selecting a UAV application server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102905266A (zh) * 2012-10-11 2013-01-30 大唐移动通信设备有限公司 一种实现移动设备附着的方法及装置
US20160103579A1 (en) * 2014-10-10 2016-04-14 Thales Tactile interface for the flight management system of an aircraft
CN104950907A (zh) * 2015-06-26 2015-09-30 广州快飞计算机科技有限公司 无人机的监控方法、装置及系统
CN104980210A (zh) * 2015-06-26 2015-10-14 陈昊 一种可配合鉴权通信机制的无人机与地面站及鉴权方法
CN105554687A (zh) * 2015-12-14 2016-05-04 小米科技有限责任公司 智能设备的联网工作方法、装置及智能设备
CN106296871A (zh) * 2016-08-02 2017-01-04 北京招通致晟科技有限公司 无人机监管方法及系统
CN106507276A (zh) * 2016-10-31 2017-03-15 中国联合网络通信集团有限公司 无人机、无人机的标识方法及无人机管理系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3668126A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021087696A1 (zh) * 2019-11-04 2021-05-14 华为技术有限公司 身份认证方法及通信装置

Also Published As

Publication number Publication date
CN109451817B (zh) 2022-05-13
EP3668126A1 (en) 2020-06-17
US11197147B2 (en) 2021-12-07
US20200221280A1 (en) 2020-07-09
EP3668126A4 (en) 2021-01-20
CN109451817A (zh) 2019-03-08

Similar Documents

Publication Publication Date Title
WO2019028746A1 (zh) 无人机接入方法及装置
WO2016155306A1 (zh) 网络接入方法及装置
US11212856B2 (en) Unmanned aerial vehicle access method and device
WO2017092417A1 (zh) 基于智能终端设备的网络接入的方法和装置
US9769667B2 (en) Methods for controlling smart device
US10608988B2 (en) Method and apparatus for bluetooth-based identity recognition
WO2016183992A1 (zh) 对账户与设备的控制关系进行管理的方法、装置和系统
US10102505B2 (en) Server-implemented method, terminal-implemented method and device for acquiring business card information
KR102044113B1 (ko) 스마트 카메라에 액세스하는 방법 및 장치
RU2644511C2 (ru) Способ и устройство для отображения интерфейса настройки маршрутизатора
US20170105237A1 (en) Methods and apparatuses for network connection
WO2017071074A1 (zh) 建立连接的方法及装置
WO2016155231A1 (zh) 网络接入方法及装置
WO2019148317A1 (zh) 无人机服务的支持方法及装置
JP6321193B2 (ja) 設備制御方法及び装置
US20180146420A1 (en) Method and apparatus for establishing network connection
US11805562B2 (en) User device pairing method and apparatus
WO2019019164A1 (zh) 无人机管理方法及装置、通信连接建立方法及装置
WO2019024053A1 (zh) 无人机控制方法及装置、无人机和遥控设备
WO2019218366A1 (zh) 前导码和调度请求的发送方法及装置
CN107612888B (zh) 企业用户空间创建方法及装置
WO2019153197A1 (zh) 无人机指示方法及装置
US9674768B2 (en) Method and device for accessing wireless network
CN109005680B (zh) 实现物联网设备引导的方法、装置、设备及基站
CN105407518B (zh) 设备联网方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17920914

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2017920914

Country of ref document: EP

Effective date: 20200310