WO2019047066A1 - 无人机接入方法及装置 - Google Patents
无人机接入方法及装置 Download PDFInfo
- Publication number
- WO2019047066A1 WO2019047066A1 PCT/CN2017/100731 CN2017100731W WO2019047066A1 WO 2019047066 A1 WO2019047066 A1 WO 2019047066A1 CN 2017100731 W CN2017100731 W CN 2017100731W WO 2019047066 A1 WO2019047066 A1 WO 2019047066A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- drone
- access
- verification
- request message
- mme
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 94
- 238000012795 verification Methods 0.000 claims abstract description 283
- 230000004044 response Effects 0.000 claims abstract description 154
- 238000012545 processing Methods 0.000 claims description 26
- 238000004590 computer program Methods 0.000 claims description 16
- 230000001413 cellular effect Effects 0.000 abstract description 20
- 238000010586 diagram Methods 0.000 description 31
- 238000007726 management method Methods 0.000 description 17
- 238000004891 communication Methods 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 7
- 230000003993 interaction Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0004—Transmission of traffic-related information to or from an aircraft
- G08G5/0013—Transmission of traffic-related information to or from an aircraft with a ground station
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/185—Space-based or airborne stations; Stations for satellite systems
- H04B7/18502—Airborne stations
- H04B7/18506—Communications with or from aircraft, i.e. aeronautical mobile service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/71—Hardware identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0268—Traffic management, e.g. flow control or congestion control using specific QoS parameters for wireless networks, e.g. QoS class identifier [QCI] or guaranteed bit rate [GBR]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
- H04W28/24—Negotiating SLA [Service Level Agreement]; Negotiating QoS [Quality of Service]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/04—Registration at HLR or HSS [Home Subscriber Server]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B64—AIRCRAFT; AVIATION; COSMONAUTICS
- B64U—UNMANNED AERIAL VEHICLES [UAV]; EQUIPMENT THEREFOR
- B64U2201/00—UAVs characterised by their flight controls
- B64U2201/20—Remote controls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/654—International mobile subscriber identity [IMSI] numbers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/06—Airborne or Satellite Networks
Definitions
- the present disclosure relates to the field of communications technologies, and in particular, to a drone access method and apparatus.
- the drone is referred to as the Unmanned Aerial Vehicle (UAV), which is a non-manned aerial vehicle operated by radio remote control equipment and its own program control device.
- UAV Unmanned Aerial Vehicle
- the cellular network needs to provide a service for the drone that satisfies the demand.
- the existing cellular network does not have a technical solution for controlling the drone. If any user's drone is allowed to access the cellular network, it will cause great interference to the cellular network.
- embodiments of the present disclosure provide a method and an apparatus for accessing a drone.
- a drone access method the method being used for a mobility management entity MME, the method comprising:
- the verification result is that the verification is successful, accepting the access of the drone, and transmitting a first access response message for indicating acceptance of the access to the drone;
- the access of the drone is rejected, and a second access response message indicating the denial of access is sent to the drone.
- the verification, according to the access request message, the verification of the identity of the user using the UAV and the device identity of the UAV includes:
- At least one of the first verification and the second verification is a verification failure, determining that the verification result is a verification failure.
- the acquiring the IMSI of the drone includes:
- the user identity request message is used to indicate that the drone provides its own IMSI; and receiving a user identity response message sent by the drone, The user identity response message carries the IMSI of the drone.
- the first verification of the identity of the user using the drone according to the IMSI of the drone includes:
- a first location update reply message which is used to indicate the quality of service QoS configuration information of the UAV, and the first location update reply message carries the UAV Determining, by the QoS configuration information, that the first verification is that the verification is successful;
- the acquiring the IMEI of the drone includes:
- the device identity request message is used to indicate that the drone provides its own IMEI; and receiving a device identity response message sent by the drone, Place The device identity response message carries the IMEI of the drone.
- the second verification of the device identity of the drone according to the IMEI of the drone includes:
- the device identity check response message carries a query result obtained by the MME querying a corresponding registration record according to the IMEI of the drone;
- If the result of the query is to query the registration record of the drone, determining that the second verification is successful verification;
- the result of the query is that the registration record of the drone is not queried, it is determined that the second verification is a verification failure.
- a drone access method for a drone having an International Mobile Subscriber Identity (IMSI) and an International Mobile Equipment Identity IMEI includes:
- the method further includes:
- the method further includes:
- the access request message carries an IMSI of the drone, and/or an IMEI of the drone.
- a drone access method for a home subscriber server HSS the HSS being configured to assist a mobility management entity MME to complete a user identity for using a drone Verification, the method includes:
- a second location update reply message for indicating that the QoS configuration information of the drone is not queried is sent to the MME.
- a drone access method for a device identification registrar EIR for assisting a mobility management entity MME in completing a device identity of a drone Verification includes:
- a drone access device the device being used for a mobility management entity MME, the device comprising:
- a receiving module configured to receive an access request message sent by the drone
- a verification module configured to verify, according to the access request message, a user identity of the UAV and a device identity of the UAV, to obtain a verification result
- a first processing module configured to accept access by the UAV if the verification result is successful, and send a first access response message indicating that the access is accepted to the UAV;
- the second processing module is configured to reject the access of the drone if the verification result is a verification failure, and send a second access response message indicating the denial of access to the drone.
- the verification module comprises:
- a first obtaining submodule configured to acquire an international mobile subscriber identity IMSI of the drone
- a first verification submodule configured to perform a first verification on a user identity of the UAV based on an IMSI of the UAV;
- a second obtaining submodule configured to acquire an international mobile device identifier IMEI of the drone
- a second verification submodule configured to perform second verification on a device identity of the drone according to an IMEI of the drone
- a first determining submodule configured to: if the first verification and the second verification are both successful verification, the verification result is that the verification is successful;
- a second determining submodule configured to: if at least one of the first verification and the second verification is a verification failure, the verification result is a verification failure.
- the first obtaining submodule comprises:
- the first determining submodule is configured to determine whether the access request message carries the IMSI of the drone;
- the first processing submodule is configured to: if the judgment result of the first determining submodule is yes, read the IMSI of the drone from the access request message;
- a second processing submodule configured to send a user identity request message to the drone if the determination result of the first determining submodule is no, the user identity request message is used to indicate the drone Providing its own IMSI; and receiving a user identity response message sent by the drone, the user identity response message carrying the IMSI of the drone.
- the first verification submodule comprises:
- the first sending submodule is configured to send a location update request message to the home subscriber server HSS, where the location update request message carries the IMSI of the drone;
- a first verification success submodule configured to receive a first location update reply message sent by the HSS to indicate quality of service QoS configuration information that is queried to the drone, and the first location update reply The message carries the QoS configuration information of the drone, and determines that the first verification is successful verification;
- a first verification failure submodule configured to determine that the first verification is verification if receiving a second location update reply message sent by the HSS to indicate that the QoS configuration information of the UAV is not queried failure.
- the second obtaining submodule comprises:
- a second determining submodule configured to determine whether the access request message carries an IMEI of the drone
- the third processing sub-module is configured to: if the determination result of the second determining sub-module is yes, read the IMEI of the drone from the access request message;
- a fourth processing submodule configured to send a device identity request message to the drone if the determination result of the second determining submodule is no, the device identity request message is used to indicate the drone Providing its own IMEI; and receiving a device identity response message sent by the drone, where the device identity response message carries the IMEI of the drone.
- the second verification submodule comprises:
- the second sending sub-module is configured to send a device identity check request message to the device identifier registrar EIR, where the device identity check request message carries the IMEI of the drone;
- a receiving submodule configured to receive a device identity check response message sent by the EIR, where the device identity check response message carries a query result obtained by the MME querying a corresponding registration record according to an IMEI of the drone ;
- a second verification success sub-module configured to determine that the second verification is successful if the query result is a registration record of the unmanned machine
- the second verification failure sub-module is configured to determine that the second verification is a verification failure if the query result is that the registration record of the drone is not queried.
- a drone access device for a drone having an International Mobile Subscriber Identity (IMSI) and an International Mobile Equipment Identity IMEI The device includes:
- a first sending module configured to send an access request message to the mobility management entity MME;
- a first determining module configured to: when receiving the first access response message sent by the MME to indicate acceptance of access, determining that the MME accepts access by the drone;
- a second determining module configured to: if receiving the second access response message sent by the MME to indicate that the access is denied, determining that the MME rejects the access of the drone.
- the apparatus further includes:
- the first receiving module is configured to receive a user identity request message sent by the MME, where the user identity request message is used to indicate that the drone provides its own IMSI;
- the second sending module is configured to send a user identity response message to the MME, where the user identity response message carries the IMSI of the drone.
- the apparatus further includes:
- a second receiving module configured to receive a device identity request message sent by the MME, where the device identity request message is used to indicate that the drone provides its own IMEI;
- the third sending module is configured to send a device identity response message to the MME, where the device identity response message carries an IMEI of the drone.
- the access request message carries an IMSI of the drone, and/or an IMEI of the drone.
- a drone access device for a home subscriber server HSS, the HSS for assisting a mobility management entity MME in completing a user identity for using a drone Verification, the device includes:
- the receiving module is configured to receive a location update request message sent by the MME, where the location update request message carries an international mobile subscriber identity IMSI of the drone requesting access;
- the query module is configured to query the UAV-specific quality of service QoS configuration information according to the IMSI of the drone;
- a first sending module configured to send, to the MME, a first location update reply message for instructing to query QoS configuration information of the drone if the QoS configuration information of the drone is queried, and
- the first location update reply message carries the QoS configuration information of the drone;
- a second sending module configured to send, to the MME, a second location update reply message indicating that the QoS configuration information of the drone is not queried, if the QoS configuration information of the drone is not queried .
- a drone access device for a device identification registrar EIR for assisting a mobility management entity MME in completing a device identity of a drone Verify that the device comprises:
- a receiving module configured to receive a device identity check request message sent by the mobility management entity MME, where the device identity check request message carries an international mobile device identifier IMEI of the drone requesting access;
- the query module is configured to query the corresponding registration record according to the IMEI of the drone to obtain a query result
- the sending module is configured to send, to the MME, a device identity check response message carrying the query result.
- a non-transitory computer readable storage medium having stored thereon a computer program for executing the drone provided by the first aspect above Access method.
- a non-transitory computer readable storage medium having stored thereon a computer program for performing the drone access method provided by the second aspect above .
- a non-transitory computer readable storage medium having stored thereon a computer program for performing the drone access provided by the above third aspect method.
- a non-transitory computer readable storage medium having stored thereon a computer program for performing the drone access provided by the fourth aspect above method.
- a drone access device the device being used for a mobility management entity MME, the device comprising:
- a memory for storing processor executable instructions
- processor is configured to:
- the verification result is that the verification is successful, accepting the access of the drone, and transmitting a first access response message for indicating acceptance of the access to the drone;
- the access of the drone is rejected, and a second access response message indicating the denial of access is sent to the drone.
- a drone access device for a drone having an international mobile subscriber identity IMSI and an international mobile equipment identity IMEI the device includes:
- a memory for storing processor executable instructions
- processor is configured to:
- a drone access device for a home subscriber server HSS, the HSS for assisting a mobility management entity MME in completing a user using a drone Verification of identity, the device includes:
- a memory for storing processor executable instructions
- processor is configured to:
- a second location update reply message for indicating that the QoS configuration information of the drone is not queried is sent to the MME.
- a drone access device for a device identification registrar EIR for assisting a mobility management entity MME in completing device identity to a drone Verification, the device includes:
- a memory for storing processor executable instructions
- processor is configured to:
- the MME may verify the user identity of the UAV and the device identity of the UAV according to the access request message by receiving the access request message sent by the UAV, and obtain the verification result.
- the result is that the verification succeeds, the access of the drone is accepted, and the first access response message for indicating the access is sent to the drone; if the verification result is the verification failure, the access of the drone is rejected.
- transmitting a second access response message for indicating the denial of access to the drone thereby preventing the unmanned virtual machine from failing to access the cellular network, thereby reducing interference to the cellular network and improving the drone connection.
- the reliability of the input facilitates the provision of exclusive services for the successful verification of the drone, which improves the working efficiency of the drone.
- the UAV may send an access request message to the MME, and if it receives the first access response message sent by the MME to indicate acceptance of the access, determine that the MME accepts the access of the UAV; If the second access response message sent by the MME for indicating the denial of access is received, determining that the MME rejects the access of the drone, thereby implementing the control of the MME accessing the drone, and improving the access of the drone Security.
- the HSS may receive a location update request message sent by the MME, where the location The update request message carries the IMSI of the drone that requests access, and if the QoS configuration information of the drone is queried, the first location update reply message for instructing to query the QoS configuration information of the drone is sent to the MME, And the first location update reply message carries the QoS configuration information of the UAV. If the QoS configuration information of the UAV is not queried, the MME sends a second QoS configuration information indicating that the UAV is not queried. The location update reply message, thereby implementing the HSS assisting the MME to complete the verification of the identity of the user using the drone, and improving the reliability of the drone access.
- the EIR may receive the device identity check request message sent by the MME, where the device identity check request message carries the IMEI of the drone that requests access, and the IMEI of the drone machine queries the corresponding registration record. The query result is obtained, and the device identity check response message carrying the query result is sent to the MME, so that the EIR assists the MME to complete the verification of the device identity of the drone, and improves the reliability of the drone access.
- FIG. 1 is a flowchart of a drone access method according to an exemplary embodiment
- FIG. 2 is a flow chart showing another method of accessing a drone according to an exemplary embodiment
- FIG. 3 is a flowchart of a drone access method according to an exemplary embodiment
- FIG. 4 is a flowchart of a drone access method according to an exemplary embodiment
- FIG. 5 is a flowchart of a drone access method according to an exemplary embodiment
- FIG. 6 is an information interaction diagram of a drone access method according to an exemplary embodiment
- FIG. 7 is a block diagram of a drone access device according to an exemplary embodiment
- FIG. 8 is a block diagram of another drone access device according to an exemplary embodiment
- FIG. 9 is a block diagram of another drone access device, according to an exemplary embodiment.
- FIG. 10 is a block diagram of another drone access device according to an exemplary embodiment
- FIG. 11 is a block diagram of another drone access device, according to an exemplary embodiment.
- FIG. 12 is a block diagram of another drone access device according to an exemplary embodiment
- FIG. 13 is a block diagram of a drone access device according to an exemplary embodiment
- FIG. 14 is a block diagram of another drone access device according to an exemplary embodiment
- FIG. 15 is a block diagram of another drone access device according to an exemplary embodiment
- 16 is a block diagram of a drone access device, according to an exemplary embodiment
- FIG. 17 is a block diagram of a drone access device according to an exemplary embodiment
- FIG. 18 is a schematic structural diagram of an unmanned aerial vehicle access device according to an exemplary embodiment
- FIG. 19 is a schematic structural diagram of an unmanned aerial vehicle access device according to an exemplary embodiment
- FIG. 20 is a schematic structural diagram of a drone access device according to an exemplary embodiment.
- FIG. 1 is a flowchart of a UAV access method, which may be used for a Mobility Management Entity (MME), according to an exemplary embodiment.
- the drone access method includes the following steps 110-140:
- step 110 an access request message sent by the drone is received.
- the drone is a cellular network drone, that is, the drone can accept the service provided by the cellular network.
- the drone needs to access the cellular network, it needs to send an access request message to the MME first, so that the MME can verify the identity of the user using the drone and the identity of the device of the drone.
- the base station can transparently transmit the access request message to the MME.
- step 120 the identity of the user using the drone and the device identity of the drone are verified according to the access request message, and the verification result is obtained.
- the MME there are many methods for the MME to verify the identity of the user using the drone, for example, according to the IMSI (International Mobile Subscriber Identification Number) of the drone. Mobile User ID) for verification.
- the IMSI International Mobile Subscriber Identification Number
- the IMSI is a sign that distinguishes the UAV user and is stored in the SIM card, which can be used to distinguish the effective information of the UAV user.
- the MME authenticates the device of the drone, for example, according to the IMEI (International Mobile Equipment Identity) of the drone.
- IMEI International Mobile Equipment Identity
- GSMA Global System for Mobile Communications Alliance
- TAC type allocation code
- IMEI International Mobile Equipment Identity
- Each cellular network drone is assigned a previously generated IMEI.
- step 130 if the verification result is that the verification is successful, the access of the drone is accepted, and a first access response message for indicating acceptance of the access is sent to the drone.
- the MME accepting the access of the drone indicates that the drone can access the cellular network. Moreover, when the MME sends a first access response message indicating that the access is received to the drone, the first access response message may be transparently transmitted to the drone by the base station.
- step 140 if the verification result is a verification failure, the access of the drone is rejected, and a second access response message indicating the denial of access is sent to the drone.
- the MME rejecting the access of the drone indicates that the drone cannot access the cellular network. Moreover, when the MME sends a second access response message indicating that the access is denied to the drone, the second access response message may be transparently transmitted to the drone by the base station.
- the user identity of the UAV and the device identity of the UAV are verified according to the access request message, and the verification result is obtained, and if the verification result is If the verification is successful, the access of the drone is accepted, and the first access response message for indicating the access is sent to the drone; if the verification result is the verification failure, the access of the drone is rejected, and The drone transmits a second access response message for indicating the denial of access, which prevents the unmanned virtual machine from failing to access the cellular network, thereby reducing interference to the cellular network and improving the access of the drone. Reliability makes it easy to provide exclusive services for successful unmanned drones, improving the efficiency of drones.
- FIG. 2 is a flowchart of another method for accessing a drone according to an exemplary embodiment.
- the method for accessing the drone may be used for an MME and based on the method shown in FIG. 1.
- the MME obtains the verification result according to the access request message to the user identity of the UAV and the device identity of the UAV, the following steps 210-270 may be included.
- step 210 the IMSI of the drone is obtained.
- step 220 a first verification of the identity of the user using the drone is performed based on the IMSI of the drone.
- step 230 the IMEI of the drone is obtained.
- step 240 a second verification of the device identity of the drone is performed based on the IMEI of the drone.
- the step 210 and the step 230 are not performed.
- the step 210 may be performed first, and then the step 230 is performed.
- Step 230 may be performed first, and then step 210 is performed.
- Step 210 and step 230 may be performed simultaneously. .
- step 250 it is determined whether both the first verification and the second verification are successful. If yes, step 260 is performed; if not, step 270 is performed.
- step 260 it is determined that the verification result is that the verification is successful, and the process ends.
- step 270 it is determined that the verification result is a verification failure, and the process ends.
- the IMSI of the drone is obtained, and the first identity of the user using the drone is obtained according to the IMSI of the drone, and the IMEI of the drone is obtained, and according to the IMEI of the drone
- the device identity of the drone is subjected to the second verification.
- the first verification and the second verification are both successful verification, it is determined that the final verification result is the verification success. Otherwise, the verification fails, thereby ensuring the user who uses the drone.
- the identity and the device identity of the drone are both legal to allow access to the drone, thereby reducing the interference caused by the illegal drone to the cellular network, and by increasing the access of the drone. Verification standards can better provide network services for drones.
- the IMSI of the UAV when the UAV sends an access request message to the MME, the IMSI of the UAV may be added to the access request information, or the IMSI of the UAV may not be added to the access request information.
- the following acquisition methods when acquiring the IMSI of the drone, the following acquisition methods can be adopted:
- Determining whether the access request message carries the IMSI of the drone if yes, reading the IMSI of the drone from the access request message; if not, sending a user identity request message to the drone,
- the user identity request message is used to indicate that the drone provides its own IMSI; and receives the user identity response message sent by the drone, and the user identity response message carries the IMSI of the drone.
- the IMSI of the UAV can be directly read from the access request message, and the UAV can be actively requested to provide its own IMSI, so that the MME can perform user identity verification through the IMSI provided by the UAV. Improve the efficiency of user authentication.
- the HSS Home Subscriber Server
- Verification the specific verification process includes:
- a location update request message is sent to the HSS, the location update request message carrying the IMSI of the drone.
- the HSS after receiving the location update request message, the HSS queries the QoS (Quality of Service) configuration information of the drone according to the IMSI of the drone, and if the QoS of the drone is queried.
- the configuration information is sent to the MME to send a first location update reply message for querying the QoS configuration information of the drone, and the first location update reply message carries the QoS configuration information of the drone;
- the QoS configuration information of the drone is sent to the MME a second location update reply message indicating that the QoS configuration information of the drone is not queried.
- the first location update reply message carries the QoS configuration information of the drone, and the second location update reply message does not have the QoS configuration information of the drone.
- the location update request message carries the IMSI of the drone by receiving the location update request message to the HSS, and receives the first location of the QoS configuration information sent by the HSS for indicating the query to the drone.
- Update the reply message, and the first location update reply message carries the QoS configuration information of the drone, and then determines that the first verification is successful verification; if the QoS configuration information sent by the HSS is sent to indicate that the unmanned aircraft is not queried is received
- the second location update reply message determines that the first verification is a verification failure, thereby implementing verification of the identity of the user using the drone through the MME, thereby improving the efficiency of the user identity verification.
- the IMEI of the UAV when the UAV sends an access request message to the MME, the IMEI of the UAV may be added to the access request information, or the IMEI of the UAV may not be added to the access request information.
- the following acquisition methods when acquiring the IMEI of the drone, the following acquisition methods can be adopted:
- Determining whether the access request message carries the IMEI of the drone if yes, reading the IMEI of the drone from the access request message; if not, transmitting the device identity request message to the drone, the device identity request message use Instructing the drone to provide its own IMEI; and receiving the device identity response message sent by the drone, the device identity response message carrying the IMEI of the drone.
- the IMEI of the UAV can be directly read from the access request message, and the UFI can be actively requested to provide its own IMEI, so that the MME can perform device identity verification by using the IMEI provided by the UAV. Improve the efficiency of device authentication.
- the EIR Equipment Identity Register
- the device identity check request message is sent to the EIR, and the device identity check request message carries the IMEI of the drone, and receives the device identity check response message sent by the EIR, where the device identity check response message carries
- the MME obtains the query result obtained by querying the corresponding registration record by the IMEI of the drone. If the query result is the registration record of the unmanned aerial vehicle, the second verification is determined to be successful; if the query result is no query to the drone The registration record determines that the second verification is a verification failure, thereby realizing the verification of the device identity of the drone through EIR, thereby improving the efficiency of device authentication.
- FIG. 3 is a flow chart showing a method of accessing a drone according to an exemplary embodiment, the drone access method may be used for an unmanned aerial vehicle having an IMSI, and an IMEI. As shown in FIG. 3, the UAV access method includes the following steps 310-330:
- step 310 an access request message is sent to the MME.
- step 320 if the first access response message sent by the MME for indicating acceptance of the access is received, it is determined that the MME accepts the access of the drone.
- step 330 if a second access response message sent by the MME for indicating denial of access is received, It is determined that the MME rejects the access of the drone.
- the drone access method may further include:
- the user identity request message is used to instruct the drone to provide its own IMSI.
- the user identity request message is used to indicate that the drone provides its own IMSI, and sends a user identity response message to the MME, where the user identity response message carries the drone.
- the IMSI is convenient for the MME to use the IMSI provided by the drone for user identity verification, thereby improving the efficiency of the UAV user identity verification.
- the drone access method may further include:
- the device identity request message is used to instruct the drone to provide its own IMEI.
- (4-2) Sending a device identity response message to the MME, the device identity response message carrying the IMEI of the drone.
- the device identity request message is used to indicate that the drone provides its own IMEI, and sends a device identity response message to the MME, where the device identity response message carries the drone.
- the IMEI is so convenient for the MME to use the IMEI provided by the drone for device authentication, thereby improving the efficiency of the UAV device authentication.
- the access request message sent by the drone carries the IMSI of the drone, and/or the IMEI of the drone.
- the IMSI carrying the UAV and/or the IMEI of the UAV are carried in the access request message, so that the MME can directly read from the access request message for performing the UAV.
- Legally verified IMSI, and / or IMEI thereby increasing the efficiency of drone access.
- FIG. 4 is a flowchart of a UAV access method, which is used for assisting an MME to complete a user identity for using a drone, according to an exemplary embodiment. Verification. As shown in FIG. 4, the drone access method includes the following steps 410-440:
- step 410 a location update request message sent by the MME is received, where the location update request message carries the IMSI of the drone requesting access.
- step 420 the UAV-specific QoS configuration information is queried according to the IMSI of the drone.
- step 430 if the QoS configuration information of the drone is queried, the first location update reply message for instructing to query the QoS configuration information of the drone is sent to the MME, and the first location update reply message carries The QoS configuration information of the drone.
- step 440 if the QoS configuration information of the drone is not queried, a second location update reply message indicating that the QoS configuration information of the drone is not queried is sent to the MME.
- the location update request message carries the IMSI of the unmanned mobile station requesting access, and if the QoS configuration information of the drone is queried, it is sent to the MME for Instructing to query the first location update response message of the QoS configuration information of the drone, and the first location update reply message carries the QoS configuration information of the drone, and if the QoS configuration information of the drone is not queried,
- the MME sends a second location update reply message indicating that the QoS configuration information of the drone is not queried, thereby implementing the HSS assisting the MME to complete the verification of the identity of the user using the drone, and improving the access of the drone. reliability.
- FIG. 5 is a flowchart of a method for accessing a drone according to an exemplary embodiment.
- the method for accessing a drone may be used for EIR, which is used to assist an MME in completing device identity of a drone. verification.
- the UAV access method includes the following steps 410-330:
- step 510 the device identity check request message sent by the MME is received, where the device identity check request message carries the IMEI of the drone requesting access.
- step 520 the corresponding registration record is queried according to the IMEI of the drone, and the query result is obtained.
- the query result may include querying the registration record of the drone or not registering the registration record of the drone.
- step 530 a device identity check response message carrying the query result is sent to the MME.
- the device identity check request message carries the IMEI of the drone requesting access, according to the IMEI of the drone. Recording, obtaining the query result, sending the device identity check response message carrying the query result to the MME, thereby implementing the EIR assisting the MME to complete the verification of the device identity of the drone, and improving the reliability of the drone access.
- FIG. 6 is an information interaction diagram of a drone access method according to an exemplary embodiment. As shown in Figure 7, the information interaction diagram includes the drone, base station, MME, HSS, and EIR:
- the drone transmits an access request message (Attach Request) to the base station, and the base station transparently transmits the access request message to the MME.
- the access request message carries the IMSI of the drone.
- the MME sends a Location Update Request message (Update Location Request) to the HSS, and the Location Update Request message carries the IMSI of the UAV.
- the location update reply message may be a first location update reply message for indicating the QoS configuration information of the unmanned aerial vehicle, and the first location update reply message carries the QoS configuration information of the drone; A second location update reply message indicating that QoS configuration information for the drone is not queried.
- the MME sends a Device Identity Request message to the base station, and the base station transparently transmits the device identity request message to the drone.
- the device identity request message is used to indicate that the human machine provides its own IMEI.
- the UAV sends a Device Identity Response message to the base station, and the base station transparently transmits the device identity response message to the MME.
- the device identity response message carries the IMEI of the drone.
- the MME sends a device identity check request message (ME Device Identity Check Request) to the EIR.
- the identity check request message carries the IMEI of the drone.
- the EIR sends a device identity check response message (ME Device Identity Check Ack) to the MME.
- the identity check response message may be a first identity check response message indicating that the IMEI of the drone has been registered, and may also be a second identity check response message indicating that the IMEI of the drone has not been registered.
- the MME sends an access response message (Attach Response) to the base station, and the base station transparently transmits the access response message to the drone.
- the access response message may be a first access response message indicating that the access is accepted, or may be a second access response message indicating that the access is denied.
- the present disclosure also provides an embodiment of the drone access device.
- FIG. 7 is a block diagram of a drone access device that can be used for an MME and for performing the drone access method shown in FIG. 1 according to an exemplary embodiment.
- the UAV access device may include:
- the receiving module 71 is configured to receive an access request message sent by the drone;
- the verification module 72 is configured to perform verification on the identity of the user using the drone and the device identity of the drone according to the access request message, to obtain a verification result;
- the first processing module 73 is configured to accept the access of the drone if the verification result is successful, and send a first access response message indicating that the access is accepted to the drone ;
- the second processing module 74 is configured to reject the access of the drone if the verification result is a verification failure, and send a second access response message indicating that the access is denied to the drone .
- the user identity of the UAV and the device identity of the UAV are verified according to the access request message, and the verification result is obtained, and if the verification result is If the verification is successful, the access of the drone is accepted, and the first access response message for indicating the access is sent to the drone; if the verification result is the verification failure, the access of the drone is rejected, and The drone transmits a second access response message for indicating the denial of access, which prevents the unmanned virtual machine from failing to access the cellular network, thereby reducing interference to the cellular network and improving the access of the drone. Reliability makes it easy to provide exclusive services for successful unmanned drones, improving the efficiency of drones.
- FIG. 8 is a block diagram of another UAV access device, which may be used for an MME and based on the device shown in FIG. 7, according to an exemplary embodiment.
- the verification module 72 can include:
- the first obtaining sub-module 81 is configured to acquire an IMSI of the drone
- the first verification submodule 82 is configured to perform first verification on the identity of the user using the drone according to the IMSI of the drone;
- a second obtaining submodule 83 configured to acquire an IMEI of the drone
- the second verification sub-module 84 is configured to perform second verification on the device identity of the drone according to the IMEI of the drone;
- the first determining sub-module 85 is configured to: if the first verification and the second verification are both successful verification, the verification result is that the verification is successful;
- the second determining sub-module 86 is configured to: if at least one of the first verification and the second verification is a verification failure, the verification result is a verification failure.
- the IMSI of the drone is obtained, and the first identity of the user using the drone is obtained according to the IMSI of the drone, and the IMEI of the drone is obtained, and according to the IMEI of the drone
- the device identity of the drone is subjected to the second verification.
- the first verification and the second verification are both successful verification, it is determined that the final verification result is the verification success. Otherwise, the verification fails, thereby ensuring the user who uses the drone.
- the identity and the device identity of the drone are both legal to allow access to the drone, thereby reducing the interference caused by the illegal drone to the cellular network, and by increasing the access of the drone. Verification standards can better provide network services for drones.
- FIG. 9 is a block diagram of another drone access device that can be used for an MME and is based on the device shown in FIG. 8 according to an exemplary embodiment.
- the first obtaining submodule 81 may include:
- the first determining sub-module 91 is configured to determine whether the access request message carries the IMSI of the drone;
- the first processing sub-module 92 is configured to read the IMSI of the drone from the access request message if the determination result of the first determining sub-module 91 is YES;
- the second processing sub-module 93 is configured to send a user identity request message to the drone if the determination result of the first determining sub-module 91 is no, the user identity request message is used to indicate the none
- the human machine provides its own IMSI; and receives the user identity response message sent by the drone, and the user identity response message carries the IMSI of the drone.
- the IMSI of the UAV can be directly read from the access request message, and the UAV can be actively requested to provide its own IMSI, so that the MME can perform user identity verification through the IMSI provided by the UAV. Improve the efficiency of user authentication.
- FIG. 10 is a block diagram of another UAV access device, which may be used for an MME, and is based on the apparatus shown in FIG. 8 or FIG. 9, according to an exemplary embodiment.
- the first verification submodule 82 may include:
- the first sending sub-module 101 is configured to send a location update request message to the HSS, where the location update request message carries the IMSI of the drone;
- the first verification success sub-module 102 is configured to receive the indication sent by the HSS to indicate the query Determining, by the first location update response message, that the first location update response message carries the QoS configuration information of the UAV, determining that the first verification is successful verification;
- the first verification failure sub-module 103 is configured to: if the second location update reply message sent by the HSS for indicating that the QoS configuration information of the drone is not queried is received, determining that the first verification is verification failed.
- the location update request message is sent to the HSS by the HSS, and the location update request message carries the IMSI of the drone, and receives the first QoS configuration information sent by the HSS for indicating the query to the drone.
- the location update reply message, and the first location update reply message carries the QoS configuration information of the drone, and then determines that the first verification is successful verification; if the QoS configuration sent by the HSS is sent to indicate that the unmanned aircraft is not queried
- the second location update reply message of the information determines that the first verification is a verification failure, thereby implementing verification of the identity of the user using the drone through the MME, thereby improving the efficiency of the user identity verification.
- FIG. 11 is a block diagram of another UAV access device, which may be used for an MME, and is based on the device shown in FIG. 8, according to an exemplary embodiment.
- the second obtaining submodule 83 may include:
- the second determining sub-module 111 is configured to determine whether the access request message carries the IMEI of the drone;
- the third processing sub-module 112 is configured to read the IMEI of the drone from the access request message if the determination result of the second determining sub-module 111 is YES;
- the fourth processing sub-module 113 is configured to send a device identity request message to the drone if the determination result of the second determining sub-module 111 is no, the device identity request message is used to indicate the none
- the human machine provides its own IMEI; and receives the device identity response message sent by the drone, and the device identity response message carries the IMEI of the drone.
- the IMEI of the UAV can be directly read from the access request message, and the UFI can be actively requested to provide its own IMEI, so that the MME can perform device identity verification by using the IMEI provided by the UAV. Improve the efficiency of device authentication.
- FIG. 12 is a block diagram of another drone access device, which may be used for an MME and based on the device shown in FIG. 8 or FIG. 11, according to an exemplary embodiment.
- the second verification submodule 84 may include:
- the second sending sub-module 121 is configured to send a device identity check request message to the EIR, where the device identity check request message carries the IMEI of the drone;
- the receiving sub-module 122 is configured to receive the device identity check response message sent by the EIR, where the device identity check response message carries the query that is obtained after the MME queries the corresponding registration record according to the IMEI of the drone result;
- the second verification success sub-module 123 is configured to determine that the second verification is successful if the query result is a registration record of the unmanned machine;
- the second verification failure sub-module 124 is configured to determine that the second verification is a verification failure if the query result is that the registration record of the drone is not queried.
- the device identity check request message is sent to the EIR, and the device identity check request message carries the IMEI of the drone, and receives the device identity check response message sent by the EIR, where the device identity check response message carries
- the MME obtains the query result obtained by querying the corresponding registration record by the IMEI of the drone. If the query result is the registration record of the unmanned aerial vehicle, the second verification is determined to be successful; if the query result is no query to the drone The registration record determines that the second verification is a verification failure, thereby realizing the verification of the device identity of the drone through EIR, thereby improving the efficiency of device authentication.
- the UAV access device may include:
- the first sending module 131 is configured to send an access request message to the MME.
- the first determining module 132 is configured to: when receiving the first access response message that is sent by the MME to indicate that the access is received, determine that the MME accepts access by the UAV;
- the second determining module 133 is configured to: if receiving the second access response message that is sent by the MME to indicate that the access is denied, determine that the MME rejects the access of the drone.
- FIG. 14 is a block diagram of another drone access device according to an exemplary embodiment, the drone The access device can be used for the drone and is based on the device shown in FIG. As shown in FIG. 14, the UAV access device may further include:
- the first receiving module 141 is configured to receive a user identity request message sent by the MME, where the user identity request message is used to indicate that the drone provides its own IMSI;
- the second sending module 142 is configured to send a user identity response message to the MME, where the user identity response message carries the IMSI of the drone.
- the user identity request message is used to indicate that the drone provides its own IMSI, and sends a user identity response message to the MME, where the user identity response message carries the drone.
- the IMSI is convenient for the MME to use the IMSI provided by the drone for user identity verification, thereby improving the efficiency of the UAV user identity verification.
- the UAV access device may further include:
- the second receiving module 151 is configured to receive a device identity request message sent by the MME, where the device identity request message is used to indicate that the drone provides its own IMEI.
- the third sending module 152 is configured to send a device identity response message to the MME, where the device identity response message carries an IMEI of the drone.
- the device identity request message is used to indicate that the drone provides its own IMEI, and sends a device identity response message to the MME, where the device identity response message carries the drone.
- the IMEI is so convenient for the MME to use the IMEI provided by the drone for device authentication, thereby improving the efficiency of the UAV device authentication.
- the access request message carries an IMSI of the drone, and/or an IMEI of the drone.
- the IMSI carrying the UAV and/or the IMEI of the UAV are carried in the access request message, so that the MME can directly read from the access request message for performing the UAV.
- the legally verified information IMSI, and / or IMEI thereby improving the efficiency of drone access.
- the UAV access device may include:
- the receiving module 161 is configured to receive a location update request message sent by the MME, where the location update request message carries an IMSI of the drone that requests access;
- the query module 162 is configured to query, according to the IMSI of the drone, the QoS configuration information specific to the drone;
- the first sending module 163 is configured to: if the QoS configuration information of the UAV is queried, send a first location update reply message for instructing to query the QoS configuration information of the UAV to the MME, And the first location update reply message carries the QoS configuration information of the drone;
- the second sending module 164 is configured to send, to the MME, a second location update reply indicating that the QoS configuration information of the drone is not queried, if the QoS configuration information of the drone is not queried. Message.
- the location update request message carries the IMSI of the unmanned mobile station requesting access, and if the QoS configuration information of the drone is queried, it is sent to the MME for Instructing to query the first location update response message of the QoS configuration information of the drone, and the first location update reply message carries the QoS configuration information of the drone, and if the QoS configuration information of the drone is not queried,
- the MME sends a second location update reply message indicating that the QoS configuration information of the drone is not queried, thereby implementing the HSS assisting the MME to complete the verification of the identity of the user using the drone, and improving the access of the drone. reliability.
- the UAV access device may include:
- the receiving module 171 is configured to receive a device identity check request message sent by the MME, where the device identity check request message carries an IMEI of the drone requesting access;
- the querying module 172 is configured to query the corresponding registration record according to the IMEI of the drone to obtain a query result;
- the sending module 173 is configured to send, to the MME, a device identity check response message carrying the query result.
- the device body is received by receiving a device identity check request message sent by the MME.
- the IMEI of the UAV that requests access is carried in the check request message, and the IMEI of the UAV queries the corresponding registration record to obtain the query result, and sends a device identity check response message carrying the query result to the MME, thereby realizing EIR assists the MME in verifying the identity of the UAV's device and improving the reliability of UAV access.
- the relevant parts of the method embodiment can be referred to.
- the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, ie may be located in one Places, or they can be distributed to multiple network elements. Some or all of the modules may be selected according to actual needs to achieve the objectives of the present disclosure. Those of ordinary skill in the art can understand and implement without any creative effort.
- the present disclosure also provides a non-transitory computer readable storage medium having stored thereon a computer program for performing the drone access method described above with respect to FIG. 1 or FIG.
- the present disclosure also provides a non-transitory computer readable storage medium having stored thereon a computer program for performing the drone access method described above with respect to FIG.
- the present disclosure also provides a non-transitory computer readable storage medium having stored thereon a computer program for performing the drone access method described above with respect to FIG.
- the present disclosure also provides a non-transitory computer readable storage medium having stored thereon a computer program for performing the drone access method described above with respect to FIG.
- the present disclosure also provides a drone access device, the device is used in an MME, and the device includes:
- a memory for storing processor executable instructions
- processor is configured to:
- the verification result is that the verification is successful, accepting the access of the drone, and transmitting a first access response message for indicating acceptance of the access to the drone;
- the access of the drone is rejected and sent to the drone A second access response message indicating the denial of access.
- FIG. 18 is a schematic structural diagram of an unmanned aircraft access device according to an exemplary embodiment. As shown in FIG. 18, a drone access device 1800, which may be provided as an MME, according to an exemplary embodiment.
- apparatus 1800 can include one or more of the following components: processing component 1801, memory 1802, power component 1803, multimedia component 1804, audio component 1805, input/output (I/O) interface 1806, sensor component 1807, And a communication component 1808.
- Processing component 1801 typically controls the overall operation of device 1800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
- Processing component 1801 may include one or more processors 1809 to execute instructions to perform all or part of the steps of the above described methods.
- processing component 1801 can include one or more modules to facilitate interaction between component 1801 and other components.
- the processing component 1801 can include a multimedia module to facilitate interaction between the multimedia component 1804 and the processing component 1801.
- Memory 1802 is configured to store various types of data to support operation at device 1800. Examples of such data include instructions for any application or method operating on device 1800, contact data, phone book data, messages, pictures, videos, and the like.
- the memory 1802 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable. Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Disk or Optical Disk.
- SRAM static random access memory
- EEPROM electrically erasable programmable read only memory
- EPROM Electrically erasable programmable read only Memory
- PROM Programmable Read Only Memory
- ROM Read Only Memory
- Magnetic Memory Flash Memory
- Disk Disk or Optical Disk.
- Power component 1803 provides power to various components of device 1800.
- Power component 1803 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 1800.
- the multimedia component 1804 includes a screen between the device 1800 and the user that provides an output interface.
- the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
- the multimedia component 1804 includes a front camera and/or a rear camera. When the device 1800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed light Learn lens systems or have focal length and optical zoom capabilities.
- the audio component 1805 is configured to output and/or input audio signals.
- audio component 1805 includes a microphone (MIC) that is configured to receive an external audio signal when device 1800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
- the received audio signal may be further stored in memory 1802 or transmitted via communication component 1808.
- audio component 1805 also includes a speaker for outputting an audio signal.
- the I/O interface 1806 provides an interface between the processing component 1801 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
- Sensor assembly 1807 includes one or more sensors for providing status assessment of various aspects to device 1800.
- sensor assembly 1807 can detect an open/closed state of device 1800, relative positioning of components, such as the display and keypad of device 1800, and sensor component 1807 can also detect a change in position of one component of device 1800 or device 1800. The presence or absence of contact by the user with the device 1800, the orientation or acceleration/deceleration of the device 1800 and the temperature change of the device 1800.
- Sensor assembly 1807 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
- Sensor assembly 1807 can also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
- the sensor assembly 1807 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
- Communication component 1808 is configured to facilitate wired or wireless communication between device 1800 and other devices.
- the device 1800 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
- communication component 1808 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
- the communication component 1808 also includes a near field communication (NFC) module to facilitate short range communication.
- NFC near field communication
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- device 1800 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation for performing the above methods.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGA field programmable A gate array
- controller microcontroller, microprocessor or other electronic component implementation for performing the above methods.
- non-transitory computer readable storage medium comprising instructions, such as a memory 1802 comprising instructions executable by processor 1809 of apparatus 1800 to perform the above method.
- the non-transitory computer readable storage medium can be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
- the apparatus 1800 when the instructions in the storage medium are executed by the processor, the apparatus 1800 is enabled to perform any of the drone access methods described above.
- the present disclosure also provides a drone access device for a drone, the drone having an IMSI, and an IMEI, the device comprising:
- a memory for storing processor executable instructions
- processor is configured to:
- the present disclosure also provides a UAV access device for an HSS for assisting an MME in completing verification of a user identity using a drone, the device comprising:
- a memory for storing processor executable instructions
- processor is configured to:
- a second location update reply message for indicating that the QoS configuration information of the drone is not queried is sent to the MME.
- FIG. 19 is a schematic structural diagram of an unmanned aircraft access device according to an exemplary embodiment.
- a drone access device 1900 which may be provided as an HSS, is shown in accordance with an exemplary embodiment.
- the device 1900 includes components similar to those of FIG. 18, and details are not repeated herein.
- the present disclosure also provides a UAV access device for EIR, the EIR is used to assist the MME in completing verification of the device identity of the UAV, and the device includes:
- a memory for storing processor executable instructions
- processor is configured to:
- FIG. 20 is a schematic structural diagram of a drone access device according to an exemplary embodiment.
- a drone access device 2000 which may be provided as an EIR, according to an exemplary embodiment.
- the device 2000 includes components similar to those of FIG. 18, and details are not repeated herein.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Aviation & Aerospace Engineering (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Astronomy & Astrophysics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
一种无人机接入方法及装置,用于MME,该方法包括:接收无人机发送的接入请求消息;根据所述接入请求消息对使用所述无人机的用户身份、以及所述无人机的设备身份进行验证,得到验证结果;若所述验证结果为验证成功,则接受所述无人机的接入,并向所述无人机发送用于指示接受接入的第一接入响应消息;若所述验证结果为验证失败,则拒绝所述无人机的接入,并向所述无人机发送用于指示拒绝接入的第二接入响应消息。因此,可以防止验证失败的无人机接入蜂窝网络,从而减少了对蜂窝网络造成的干扰,提高了无人机接入的可靠性,便于为验证成功的无人机提供专属服务,提高了无人机的工作效率。
Description
本公开涉及通信技术领域,尤其涉及一种无人机接入方法及装置。
无人驾驶飞机简称为无人机(Unmanned Aerial Vehicle,UAV),该无人机是利用无线电遥控设备和自备的程序控制装置操纵的不载人飞行器。
随着无人机技术的不断发展,无人机也得到了广泛应用。相关技术中,为了进一步拓展无人机的应用范围,蜂窝网络需要为无人机提供满足需求的服务。但是,现有的蜂窝网络还没有控制无人机的技术方案,若任何用户的无人机都允许接入蜂窝网络,将会对蜂窝网络造成很大的干扰。
发明内容
为克服相关技术中存在的问题,本公开实施例提供一种无人机接入方法及装置。
根据本公开实施例的第一方面,提供一种无人机接入方法,所述方法用于移动管理实体MME,所述方法包括:
接收无人机发送的接入请求消息;
根据所述接入请求消息对使用所述无人机的用户身份、以及所述无人机的设备身份进行验证,得到验证结果;
若所述验证结果为验证成功,则接受所述无人机的接入,并向所述无人机发送用于指示接受接入的第一接入响应消息;
若所述验证结果为验证失败,则拒绝所述无人机的接入,并向所述无人机发送用于指示拒绝接入的第二接入响应消息。
在一实施例中,所述根据所述接入请求消息对使用所述无人机的用户身份、以及所述无人机的设备身份的验证,得到验证结果,包括:
获取所述无人机的国际移动用户识别码IMSI;
根据所述无人机的IMSI对使用所述无人机的用户身份进行第一验证;
获取所述无人机的国际移动设备标识IMEI;
根据所述无人机的IMEI对所述无人机的设备身份进行第二验证;
若所述第一验证和所述第二验证均为验证成功,则确定所述验证结果为验证成功;
若所述第一验证和所述第二验证中至少一个为验证失败,则确定所述验证结果为验证失败。
在一实施例中,所述获取所述无人机的IMSI,包括:
判断所述接入请求消息是否携带有所述无人机的IMSI;
若是,则从所述接入请求消息中读取所述无人机的IMSI;
若否,则向所述无人机发送用户身份请求消息,所述用户身份请求消息用于指示所述无人机提供自身的IMSI;以及,接收所述无人机发送的用户身份响应消息,所述用户身份响应消息中携带有所述无人机的IMSI。
在一实施例中,所述根据所述无人机的IMSI对使用所述无人机的用户身份进行第一验证,包括:
向归属签约用户服务器HSS发送位置更新请求消息,所述位置更新请求消息携带有所述无人机的IMSI;
若接收到所述HSS发送的用于指示查询到所述无人机的服务质量QoS配置信息的第一位置更新回复消息,且所述第一位置更新回复消息中携带有所述无人机的QoS配置信息,则确定所述第一验证为验证成功;
若接收到所述HSS发送的用于指示没有查询到所述无人机的QoS配置信息的第二位置更新回复消息,则确定所述第一验证为验证失败。
在一实施例中,所述获取所述无人机的IMEI,包括:
判断所述接入请求消息是否携带有所述无人机的IMEI;
若是,则从所述接入请求消息中读取所述无人机的IMEI;
若否,则向所述无人机发送设备身份请求消息,所述设备身份请求消息用于指示所述无人机提供自身的IMEI;以及,接收所述无人机发送的设备身份响应消息,所
述设备身份响应消息中携带有所述无人机的IMEI。
在一实施例中,所述根据所述无人机的IMEI对所述无人机的设备身份进行第二验证,包括:
向设备标识注册器EIR发送设备身份检查请求消息,所述设备身份检查请求消息中携带有所述无人机的IMEI;
接收所述EIR发送的设备身份检查应答消息,所述设备身份检查应答消息中携带有所述MME根据所述无人机的IMEI查询对应的注册记录后得到的查询结果;
若所述查询结果为查询到所述无人机的注册记录,则确定所述第二验证为验证成功;
若所述查询结果为没有查询到所述无人机的注册记录,则确定所述第二验证为验证失败。
根据本公开实施例的第二方面,提供一种无人机接入方法,所述方法用于无人机,所述无人机有一个国际移动用户识别码IMSI、和一个国际移动设备标识IMEI,所述方法包括:
向移动管理实体MME发送接入请求消息;
若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入;
若接收到所述MME发送的用于指示拒绝接入的第二接入响应消息,确定所述MME拒绝所述无人机的接入。
在一实施例中,所述方法还包括:
接收所述MME发送的用户身份请求消息,所述用户身份请求消息用于指示所述无人机提供自身的IMSI;
向所述MME发送用户身份响应消息,所述用户身份响应消息携带有所述无人机的IMSI。
在一实施例中,所述方法还包括:
接收所述MME发送的设备身份请求消息,所述设备身份请求消息用于指示所述无人机提供自身的IMEI;
向所述MME发送设备身份响应消息,所述设备身份响应消息携带有所述无人机的IMEI。
在一实施例中,所述接入请求消息中携带有所述无人机的IMSI、和/或所述无人机的IMEI。
根据本公开实施例的第三方面,提供一种无人机接入方法,所述方法用于归属签约用户服务器HSS,所述HSS用于协助移动管理实体MME完成对使用无人机的用户身份的验证,所述方法包括:
接收所述MME发送的位置更新请求消息,所述位置更新请求消息携带有请求接入的无人机的国际移动用户识别码IMSI;
根据所述无人机的IMSI查询该无人机专属的服务质量QoS配置信息;
若查询到所述无人机的QoS配置信息,则向所述MME发送用于指示查询到所述无人机的QoS配置信息的第一位置更新回复消息,且所述第一位置更新回复消息中携带有所述无人机的QoS配置信息;
若没有查询到所述无人机的QoS配置信息,则向所述MME发送用于指示没有查询到所述无人机的QoS配置信息的第二位置更新回复消息。
根据本公开实施例的第四方面,提供一种无人机接入方法,所述方法用于设备标识注册器EIR,所述EIR用于协助移动管理实体MME完成对无人机的设备身份的验证,所述方法包括:
接收所述MME发送的设备身份检查请求消息,所述设备身份检查请求消息中携带有请求接入的无人机的国际移动设备标识IMEI;
根据所述无人机的IMEI查询对应的注册记录,得到查询结果;
向所述MME发送携带有所述查询结果的设备身份检查应答消息。
根据本公开实施例的第五方面,提供一种无人机接入装置,所述装置用于移动管理实体MME,所述装置包括:
接收模块,被配置为接收无人机发送的接入请求消息;
验证模块,被配置为根据所述接入请求消息对使用所述无人机的用户身份、以及所述无人机的设备身份进行验证,得到验证结果;
第一处理模块,被配置为若所述验证结果为验证成功,则接受所述无人机的接入,并向所述无人机发送用于指示接受接入的第一接入响应消息;
第二处理模块,被配置为若所述验证结果为验证失败,则拒绝所述无人机的接入,并向所述无人机发送用于指示拒绝接入的第二接入响应消息。
在一实施例中,所述验证模块包括:
第一获取子模块,被配置为获取所述无人机的国际移动用户识别码IMSI;
第一验证子模块,被配置为根据所述无人机的IMSI对使用所述无人机的用户身份进行第一验证;
第二获取子模块,被配置为获取所述无人机的国际移动设备标识IMEI;
第二验证子模块,被配置为根据所述无人机的IMEI对所述无人机的设备身份进行第二验证;
第一确定子模块,被配置为若所述第一验证和所述第二验证均为验证成功,则所述验证结果为验证成功;
第二确定子模块,被配置为若所述第一验证和所述第二验证中至少一个为验证失败,则所述验证结果为验证失败。
在一实施例中,所述第一获取子模块包括:
第一判断子模块,被配置为判断所述接入请求消息是否携带有所述无人机的IMSI;
第一处理子模块,被配置为若所述第一判断子模块的判断结果为是,则从所述接入请求消息中读取所述无人机的IMSI;
第二处理子模块,被配置为若所述第一判断子模块的判断结果为否,则向所述无人机发送用户身份请求消息,所述用户身份请求消息用于指示所述无人机提供自身的IMSI;以及,接收所述无人机发送的用户身份响应消息,所述用户身份响应消息中携带有所述无人机的IMSI。
在一实施例中,所述第一验证子模块包括:
第一发送子模块,被配置为向归属签约用户服务器HSS发送位置更新请求消息,所述位置更新请求消息携带有所述无人机的IMSI;
第一验证成功子模块,被配置为若接收到所述HSS发送的用于指示查询到所述无人机的服务质量QoS配置信息的第一位置更新回复消息,且所述第一位置更新回复消息中携带有所述无人机的QoS配置信息,则确定所述第一验证为验证成功;
第一验证失败子模块,被配置为若接收到所述HSS发送的用于指示没有查询到所述无人机的QoS配置信息的第二位置更新回复消息,则确定所述第一验证为验证失败。
在一实施例中,所述第二获取子模块包括:
第二判断子模块,被配置为判断所述接入请求消息是否携带有所述无人机的IMEI;
第三处理子模块,被配置为若所述第二判断子模块的判断结果为是,则从所述接入请求消息中读取所述无人机的IMEI;
第四处理子模块,被配置为若所述第二判断子模块的判断结果为否,则向所述无人机发送设备身份请求消息,所述设备身份请求消息用于指示所述无人机提供自身的IMEI;以及,接收所述无人机发送的设备身份响应消息,所述设备身份响应消息中携带有所述无人机的IMEI。
在一实施例中,所述第二验证子模块包括:
第二发送子模块,被配置为向设备标识注册器EIR发送设备身份检查请求消息,所述设备身份检查请求消息中携带有所述无人机的IMEI;
接收子模块,被配置为接收所述EIR发送的设备身份检查应答消息,所述设备身份检查应答消息中携带有所述MME根据所述无人机的IMEI查询对应的注册记录后得到的查询结果;
第二验证成功子模块,被配置为若所述查询结果为查询到所述无人机的注册记录,则确定所述第二验证为验证成功;
第二验证失败子模块,被配置为若所述查询结果为没有查询到所述无人机的注册记录,则确定所述第二验证为验证失败。
根据本公开实施例的第六方面,提供一种无人机接入装置,所述装置用于无人机,所述无人机有一个国际移动用户识别码IMSI、和一个国际移动设备标识IMEI,所述装置包括:
第一发送模块,被配置为向移动管理实体MME发送接入请求消息;
第一确定模块,被配置为若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入;
第二确定模块,被配置为若接收到所述MME发送的用于指示拒绝接入的第二接入响应消息,确定所述MME拒绝所述无人机的接入。
在一实施例中,所述装置还包括:
第一接收模块,被配置为接收所述MME发送的用户身份请求消息,所述用户身份请求消息用于指示所述无人机提供自身的IMSI;
第二发送模块,被配置为向所述MME发送用户身份响应消息,所述用户身份响应消息携带有所述无人机的IMSI。
在一实施例中,所述装置还包括:
第二接收模块,被配置为接收所述MME发送的设备身份请求消息,所述设备身份请求消息用于指示所述无人机提供自身的IMEI;
第三发送模块,被配置为向所述MME发送设备身份响应消息,所述设备身份响应消息携带有所述无人机的IMEI。
在一实施例中,所述接入请求消息中携带有所述无人机的IMSI、和/或所述无人机的IMEI。
根据本公开实施例的第七方面,提供一种无人机接入装置,所述装置用于归属签约用户服务器HSS,所述HSS用于协助移动管理实体MME完成对使用无人机的用户身份的验证,所述装置包括:
接收模块,被配置为接收所述MME发送的位置更新请求消息,所述位置更新请求消息携带有请求接入的无人机的国际移动用户识别码IMSI;
查询模块,被配置为根据所述无人机的IMSI查询该无人机专属的服务质量QoS配置信息;
第一发送模块,被配置为若查询到所述无人机的QoS配置信息,则向所述MME发送用于指示查询到所述无人机的QoS配置信息的第一位置更新回复消息,且所述第一位置更新回复消息中携带有所述无人机的QoS配置信息;
第二发送模块,被配置为若没有查询到所述无人机的QoS配置信息,则向所述MME发送用于指示没有查询到所述无人机的QoS配置信息的第二位置更新回复消息。
根据本公开实施例的第八方面,提供一种无人机接入装置,所述装置用于设备标识注册器EIR,所述EIR用于协助移动管理实体MME完成对无人机的设备身份的验证,所述装置包括:
接收模块,被配置为接收移动管理实体MME发送的设备身份检查请求消息,所述设备身份检查请求消息中携带有请求接入的无人机的国际移动设备标识IMEI;
查询模块,被配置为根据所述无人机的IMEI查询对应的注册记录,得到查询结果;
发送模块,被配置为向所述MME发送携带有所述查询结果的设备身份检查应答消息。
根据本公开实施例的第九方面,提供一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述第一方面提供的所述的无人机接入方法。
根据本公开实施例的第十方面,提供一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述第二方面提供的无人机接入方法。
根据本公开实施例的第十一方面,提供一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述第三方面提供的无人机接入方法。
根据本公开实施例的第十二方面,提供一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述第四方面提供的无人机接入方法。
根据本公开实施例的第十三方面,提供一种无人机接入装置,所述装置用于移动管理实体MME,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收无人机发送的接入请求消息;
根据所述接入请求消息对使用所述无人机的用户身份、以及所述无人机的设备身份进行验证,得到验证结果;
若所述验证结果为验证成功,则接受所述无人机的接入,并向所述无人机发送用于指示接受接入的第一接入响应消息;
若所述验证结果为验证失败,则拒绝所述无人机的接入,并向所述无人机发送用于指示拒绝接入的第二接入响应消息。
根据本公开实施例的第十四方面,提供一种无人机接入装置,所述装置用于无人机,所述无人机有一个国际移动用户识别码IMSI、和一个国际移动设备标识IMEI,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
向移动管理实体MME发送接入请求消息;
若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入;
若接收到所述MME发送的用于指示拒绝接入的第二接入响应消息,确定所述MME拒绝所述无人机的接入。
根据本公开实施例的第十五方面,提供一种无人机接入装置,所述装置用于归属签约用户服务器HSS,所述HSS用于协助移动管理实体MME完成对使用无人机的用户身份的验证,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收所述MME发送的位置更新请求消息,所述位置更新请求消息携带有请求接入的无人机的国际移动用户识别码IMSI;
根据所述无人机的IMSI查询该无人机专属的服务质量QoS配置信息;
若查询到所述无人机的QoS配置信息,则向所述MME发送用于指示查询到所述无人机的QoS配置信息的第一位置更新回复消息,且所述第一位置更新回复消息中携带有所述无人机的QoS配置信息;
若没有查询到所述无人机的QoS配置信息,则向所述MME发送用于指示没有查询到所述无人机的QoS配置信息的第二位置更新回复消息。
根据本公开实施例的第十六方面,提供一种无人机接入装置,所述装置用于设备标识注册器EIR,所述EIR用于协助移动管理实体MME完成对无人机的设备身份的验证,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收移动管理实体MME发送的设备身份检查请求消息,所述设备身份检查请求消息中携带有请求接入的无人机的国际移动设备标识IMEI;
根据所述无人机的IMEI查询对应的注册记录,得到查询结果;
向所述MME发送携带有所述查询结果的设备身份检查应答消息。
本公开的实施例提供的技术方案可以包括以下有益效果:
本公开实施例中,MME可以通过接收无人机发送的接入请求消息,根据接入请求消息对使用无人机的用户身份、以及无人机的设备身份进行验证,得到验证结果,若验证结果为验证成功,则接受无人机的接入,并向无人机发送用于指示接受接入的第一接入响应消息;若验证结果为验证失败,则拒绝无人机的接入,并向无人机发送用于指示拒绝接入的第二接入响应消息,这样可以防止验证失败的无人机接入蜂窝网络,从而减少了对蜂窝网络造成的干扰,提高了无人机接入的可靠性,便于为验证成功的无人机提供专属服务,提高了无人机的工作效率。
本公开实施例中,无人机可以通过向MME发送接入请求消息,若接收到MME发送的用于指示接受接入的第一接入响应消息时,确定MME接受无人机的接入;若接收到MME发送的用于指示拒绝接入的第二接入响应消息,确定MME拒绝无人机的接入,从而实现了MME对无人机接入的控制,提高了无人机接入的安全性。
本公开实施例中,HSS可以通过接收MME发送的位置更新请求消息,该位置
更新请求消息携带有请求接入的无人机的IMSI,若查询到无人机的QoS配置信息,则向MME发送用于指示查询到无人机的QoS配置信息的第一位置更新回复消息,且第一位置更新回复消息中携带有无人机的QoS配置信息,若没有查询到无人机的QoS配置信息,则向MME发送用于指示没有查询到无人机的QoS配置信息的第二位置更新回复消息,从而实现了HSS协助MME来完成对使用无人机的用户身份的验证,提高了无人机接入的可靠性。
本公开实施例中,EIR可以通过接收MME发送的设备身份检查请求消息,该设备身份检查请求消息中携带有请求接入的无人机的IMEI,据无人机的IMEI查询对应的注册记录,得到查询结果,向MME发送携带有查询结果的设备身份检查应答消息,从而实现了EIR协助MME来完成对无人机的设备身份的验证,提高了无人机接入的可靠性。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。
图1是根据一示例性实施例示出的一种无人机接入方法的流程图;
图2是根据一示例性实施例示出的另一种无人机接入方法的流程图;
图3是根据一示例性实施例示出的一种无人机接入方法的流程图;
图4是根据一示例性实施例示出的一种无人机接入方法的流程图;
图5是根据一示例性实施例示出的一种无人机接入方法的流程图;
图6是根据一示例性实施例示出的一种无人机接入方法的信息交互图;
图7是根据一示例性实施例示出的一种无人机接入装置的框图;
图8是根据一示例性实施例示出的另一种无人机接入装置的框图;
图9是根据一示例性实施例示出的另一种无人机接入装置的框图;
图10是根据一示例性实施例示出的另一种无人机接入装置的框图;
图11是根据一示例性实施例示出的另一种无人机接入装置的框图;
图12是根据一示例性实施例示出的另一种无人机接入装置的框图;
图13是根据一示例性实施例示出的一种无人机接入装置的框图;
图14是根据一示例性实施例示出的另一种无人机接入装置的框图;
图15是根据一示例性实施例示出的另一种无人机接入装置的框图;
图16是根据一示例性实施例示出的一种无人机接入装置的框图;
图17是根据一示例性实施例示出的一种无人机接入装置的框图;
图18是根据一示例性实施例示出的一种无人机接入装置的结构示意图;
图19是根据一示例性实施例示出的一种无人机接入装置的结构示意图;
图20是根据一示例性实施例示出的一种无人机接入装置的结构示意图。
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一些方面相一致的装置和方法的例子。
图1是根据一示例性实施例示出的一种无人机接入方法的流程图,该无人机接入方法可以用于移动管理实体(Mobility Management Entity,MME)。如图1所示,该无人机接入方法包括以下步骤110-140:
在步骤110中,接收无人机发送的接入请求消息。
本公开实施例中,无人机是蜂窝网络无人机,即该无人机能够接受蜂窝网络(Cellular network)提供的服务。当无人机需要接入蜂窝网络时,需要先向MME发送接入请求消息,目的是让MME对使用无人机的用户身份、以及无人机的设备身份进行验证。其中,无人机向MME发送接入请求消息时,可以通过基站将接入请求消息透传至MME。
在步骤120中,根据接入请求消息对使用无人机的用户身份、以及无人机的设备身份进行验证,得到验证结果。
本公开实施例中,MME对使用无人机的用户身份进行验证的方法有很多,比如,根据无人机的IMSI(International Mobile Subscriber Identification Number,国际移
动用户识别码)进行验证。其中,IMSI是区别无人机用户的标志,储存在SIM卡中,可用于区别无人机用户的有效信息。
MME对无人机的设备身份验证的方法也有很多,比如:根据无人机的IMEI(International Mobile Equipment Identity,国际移动设备标识)进行验证。其中,在全球移动通信系统联盟(Global System for Mobile Communications Alliance,GSMA)中定义关于UAV的新的设备类型(device type),针对UAV的device type分配相应的类型分配码(Type Allocation Code,TAC),并形成IMEI。每一个蜂窝网络无人机都要分配一个前述生成的IMEI。
在步骤130中,若验证结果为验证成功,则接受无人机的接入,并向无人机发送用于指示接受接入的第一接入响应消息。
本公开实施例中,MME接受无人机的接入表明无人机可以接入蜂窝网络。并且,MME向无人机发送用于指示接受接入的第一接入响应消息时,也可以通过基站将第一接入响应消息透传至无人机。
在步骤140中,若验证结果为验证失败,则拒绝无人机的接入,并向无人机发送用于指示拒绝接入的第二接入响应消息。
本公开实施例中,MME拒绝无人机的接入表明无人机不可以接入蜂窝网络。并且,MME向无人机发送用于指示拒绝接入的第二接入响应消息时,也可以通过基站将第二接入响应消息透传至无人机。
由上述实施例可见,通过接收无人机发送的接入请求消息,根据接入请求消息对使用无人机的用户身份、以及无人机的设备身份进行验证,得到验证结果,若验证结果为验证成功,则接受无人机的接入,并向无人机发送用于指示接受接入的第一接入响应消息;若验证结果为验证失败,则拒绝无人机的接入,并向无人机发送用于指示拒绝接入的第二接入响应消息,这样可以防止验证失败的无人机接入蜂窝网络,从而减少了对蜂窝网络造成的干扰,提高了无人机接入的可靠性,便于为验证成功的无人机提供专属服务,提高了无人机的工作效率。
图2是根据一示例性实施例示出的另一种无人机接入方法的流程图,该无人机接入方法可以用于MME,并建立在图1所示方法的基础上。如图2所示,在MME根据所述接入请求消息对使用所述无人机的用户身份、以及所述无人机的设备身份的验证,得到验证结果时,可以包括以下步骤210-270
在步骤210中,获取无人机的IMSI。
在步骤220中,根据无人机的IMSI对使用无人机的用户身份进行第一验证。
在步骤230中,获取无人机的IMEI。
在步骤240中,根据无人机的IMEI对无人机的设备身份进行第二验证。
本公开实施例中,步骤210和步骤230并没有执行的先后顺序,可以先执行步骤210,再执行步骤230;也可以先执行步骤230,再执行步骤210;还可以同时执行步骤210和步骤230。
在步骤250中,判断第一验证和第二验证是否均为验证成功,若是,则执行步骤260;若否,则执行步骤270。
在步骤260中,确定验证结果为验证成功,流程结束。
在步骤270中,确定验证结果为验证失败,流程结束。
由上述实施例可见,通过获取无人机的IMSI,并根据无人机的IMSI对使用无人机的用户身份进行第一验证,以及获取无人机的IMEI,并根据无人机的IMEI对无人机的设备身份进行第二验证,当第一验证和第二验证均为验证成功时,才确定最后的验证结果为验证成功,否则,为验证失败,这样保证了使用无人机的用户身份、和无人机的设备身份均为合法的情形下才允许该无人机的接入,从而减少了不合法的无人机对蜂窝网络造成的干扰,并通过提高无人机接入的验证标准可以更好地为无人机提供网络服务。
在一实施例中,无人机向MME发送接入请求消息时,可能将无人机的IMSI添加到了该接入请求信息中,也可能没有将无人机的IMSI添加到了该接入请求信息中,所以上述步骤210中在获取无人机的IMSI时,可以采用以下获取方式:
判断所述接入请求消息是否携带有所述无人机的IMSI;若是,则从接入请求消息中读取无人机的IMSI;若否,则向无人机发送用户身份请求消息,该用户身份请求消息用于指示无人机提供自身的IMSI;以及,接收无人机发送的用户身份响应消息,该用户身份响应消息中携带有无人机的IMSI。
由上述实施例可见,可以从接入请求消息中直接读取无人机的IMSI,还可以主动要求无人机提供自身的IMSI,这样便于MME通过无人机提供的IMSI进行用户身份验证,从而提高了用户身份验证的效率。
在一实施例中,上述步骤220中,在根据所述无人机的IMSI对使用所述无人机的用户身份进行第一验证时,可以通过HSS(Home Subscriber Server,归属签约用户服务器)进行验证,具体验证过程包括:
(1-1)向HSS发送位置更新请求消息,该位置更新请求消息携带有无人机的IMSI。
本公开实施例中,HSS接收到位置更新请求消息后,会根据无人机的IMSI查询该无人机专属的QoS(Quality of Service,服务质量)配置信息,若查询到该无人机的QoS配置信息,将会向MME发送用于指示查询到无人机的QoS配置信息的第一位置更新回复消息,且第一位置更新回复消息中携带有无人机的QoS配置信息;若没有查询到无人机的QoS配置信息,则向MME发送用于指示没有查询到无人机的QoS配置信息的第二位置更新回复消息。
其中,第一位置更新回复消息携带有无人机的QoS配置信息,第二位置更新回复消息中没有无人机的QoS配置信息。
(1-2)若接收到HSS发送的用于指示查询到无人机的QoS配置信息的第一位置更新回复消息,且第一位置更新回复消息中携带有无人机的QoS配置信息,则确定第一验证为验证成功。
(1-3)若接收到HSS发送的用于指示没有查询到无人机的QoS配置信息的第二位置更新回复消息,则确定第一验证为验证失败。
由上述实施例可见,通过向HSS发送位置更新请求消息,该位置更新请求消息携带有无人机的IMSI,若接收到HSS发送的用于指示查询到无人机的QoS配置信息的第一位置更新回复消息,且第一位置更新回复消息中携带有无人机的QoS配置信息,则确定第一验证为验证成功;若接收到HSS发送的用于指示没有查询到无人机的QoS配置信息的第二位置更新回复消息,则确定第一验证为验证失败,从而实现了通过MME来完成对使用无人机的用户身份的验证,进而提高了用户身份验证的效率。
在一实施例中,无人机向MME发送接入请求消息时,可能将无人机的IMEI添加到了该接入请求信息中,也可能没有将无人机的IMEI添加到了该接入请求信息中,所以上述步骤210中在获取无人机的IMEI时,可以采用以下获取方式:
判断接入请求消息是否携带有无人机的IMEI;若是,则从接入请求消息中读取无人机的IMEI;若否,则向无人机发送设备身份请求消息,该设备身份请求消息用
于指示无人机提供自身的IMEI;以及,接收无人机发送的设备身份响应消息,该设备身份响应消息中携带有无人机的IMEI。
由上述实施例可见,可以从接入请求消息中直接读取无人机的IMEI,还可以主动要求无人机提供自身的IMEI,这样便于MME通过无人机提供的IMEI进行设备身份验证,从而提高了设备身份验证的效率。
在一实施例中,上述步骤220中,在根据无人机的IMEI对无人机的设备身份进行第二验证时,可以通过EIR(Equipment Identity Register,设备标识注册器)进行验证,具体验证过程包括:
(2-1)向EIR发送设备身份检查请求消息,该设备身份检查请求消息中携带有无人机的IMEI。
(2-2)接收EIR发送的设备身份检查应答消息,该设备身份检查应答消息中携带有MME根据无人机的IMEI查询对应的注册记录后得到的查询结果。
(2-3)若查询结果为查询到无人机的注册记录,则确定第二验证为验证成功。
(2-4)若查询结果为没有查询到无人机的注册记录,则确定第二验证为验证失败。
由上述实施例可见,通过向EIR发送设备身份检查请求消息,该设备身份检查请求消息中携带有无人机的IMEI,收EIR发送的设备身份检查应答消息,该设备身份检查应答消息中携带有MME根据无人机的IMEI查询对应的注册记录后得到的查询结果,若查询结果为查询到无人机的注册记录,则确定第二验证为验证成功;若查询结果为没有查询到无人机的注册记录,则确定第二验证为验证失败,从而实现了通过EIR来完成对无人机的设备身份的验证,进而提高了设备身份验证的效率。
图3是根据一示例性实施例示出的一种无人机接入方法的流程图,该无人机接入方法可以用于无人机,该无人机有一个IMSI、和一个IMEI。如图3所示,该无人机接入方法包括以下步骤310-330:
在步骤310中,向MME发送接入请求消息。
在步骤320中,若接收到MME发送的用于指示接受接入的第一接入响应消息时,确定MME接受无人机的接入。
在步骤330中,若接收到MME发送的用于指示拒绝接入的第二接入响应消息,
确定MME拒绝无人机的接入。
由上述实施例可见,通过向MME发送接入请求消息,若接收到MME发送的用于指示接受接入的第一接入响应消息时,确定MME接受无人机的接入;若接收到MME发送的用于指示拒绝接入的第二接入响应消息,确定MME拒绝无人机的接入,从而实现了MME对无人机接入的控制,提高了无人机接入的安全性。
在一实施例中,在图3所示装置的基础上,该无人机接入方法还可以包括:
(3-1)接收MME发送的用户身份请求消息,该用户身份请求消息用于指示无人机提供自身的IMSI。
(3-2)向MME发送用户身份响应消息,该用户身份响应消息携带有无人机的IMSI。
由上述实施例可见,通过接收MME发送的用户身份请求消息,该用户身份请求消息用于指示无人机提供自身的IMSI,向MME发送用户身份响应消息,该用户身份响应消息携带有无人机的IMSI,这样便于MME利用无人机提供的IMSI进行用户身份验证,从而提高了无人机用户身份验证的效率。
在一实施例中,在图3所示装置的基础上,该无人机接入方法还可以包括:
(4-1)接收MME发送的设备身份请求消息,该设备身份请求消息用于指示无人机提供自身的IMEI。
(4-2)向MME发送设备身份响应消息,该设备身份响应消息携带有无人机的IMEI。
由上述实施例可见,通过接收MME发送的设备身份请求消息,该设备身份请求消息用于指示无人机提供自身的IMEI,向MME发送设备身份响应消息,该设备身份响应消息携带有无人机的IMEI,这样便于MME利用无人机提供的IMEI进行设备身份验证,从而提高了无人机设备身份验证的效率。
在一实施例中,在图3所示装置的基础上,无人机发送的接入请求消息中携带有该无人机的IMSI、和/或该无人机的IMEI。
由上述实施例可见,通过在接入请求消息中携带有该无人机的IMSI、和/或该无人机的IMEI,这样便于MME直接从接入请求消息中读取用于进行无人机合法验证的IMSI、和/或IMEI,进而提高了无人机接入的效率。
图4是根据一示例性实施例示出的一种无人机接入方法的流程图,该无人机接入方法可以用于HSS,该HSS用于协助MME完成对使用无人机的用户身份的验证。如图4所示,该无人机接入方法包括以下步骤410-440:
在步骤410中,接收MME发送的位置更新请求消息,该位置更新请求消息携带有请求接入的无人机的IMSI。
在步骤420中,根据无人机的IMSI查询该无人机专属的QoS配置信息。
在步骤430中,若查询到无人机的QoS配置信息,则向MME发送用于指示查询到无人机的QoS配置信息的第一位置更新回复消息,且第一位置更新回复消息中携带有无人机的QoS配置信息。
在步骤440中,若没有查询到无人机的QoS配置信息,则向MME发送用于指示没有查询到无人机的QoS配置信息的第二位置更新回复消息。
由上述实施例可见,通过接收MME发送的位置更新请求消息,该位置更新请求消息携带有请求接入的无人机的IMSI,若查询到无人机的QoS配置信息,则向MME发送用于指示查询到无人机的QoS配置信息的第一位置更新回复消息,且第一位置更新回复消息中携带有无人机的QoS配置信息,若没有查询到无人机的QoS配置信息,则向MME发送用于指示没有查询到无人机的QoS配置信息的第二位置更新回复消息,从而实现了HSS协助MME来完成对使用无人机的用户身份的验证,提高了无人机接入的可靠性。
图5是根据一示例性实施例示出的一种无人机接入方法的流程图,该无人机接入方法可以用于EIR,该EIR用于协助MME完成对无人机的设备身份的验证。如图5所示,该无人机接入方法包括以下步骤410-330:
在步骤510中,接收MME发送的设备身份检查请求消息,该设备身份检查请求消息中携带有请求接入的无人机的IMEI。
在步骤520中,根据无人机的IMEI查询对应的注册记录,得到查询结果。其中,查询结果可以包括查询到无人机的注册记录、或没有查询到无人机的注册记录。
在步骤530中,向MME发送携带有查询结果的设备身份检查应答消息。
由上述实施例可见,通过接收MME发送的设备身份检查请求消息,该设备身份检查请求消息中携带有请求接入的无人机的IMEI,据无人机的IMEI查询对应的注
册记录,得到查询结果,向MME发送携带有查询结果的设备身份检查应答消息,从而实现了EIR协助MME来完成对无人机的设备身份的验证,提高了无人机接入的可靠性。
图6是根据一示例性实施例示出的一种无人机接入方法的信息交互图。如图7所示,该信息交互图中包括无人机、基站、MME、HSS和EIR:
(1)无人机向基站发送接入请求消息(Attach Request),基站将接入请求消息透传至MME。其中,该接入请求消息携带有无人机的IMSI。
(2)MME向HSS发送位置更新请求消息(Update Location Request),该位置更新请求消息携带有无人机的IMSI。
(3)HSS向MME发送的位置更新回复消息(Update Location Answer)。其中,位置更新回复消息可能是用于指示查询到无人机的QoS配置信息的第一位置更新回复消息,且该第一位置更新回复消息中携带有无人机的QoS配置信息;还可能是用于指示没有查询到无人机的QoS配置信息的第二位置更新回复消息。
(4)MME向基站发送设备身份请求消息(Device Identity Request),基站将设备身份请求消息透传至无人机。其中,设备身份请求消息用于指示人机提供自身的IMEI。
(5)无人机向基站发送设备身份响应消息(Device Identity Response),基站将设备身份响应消息透传至MME。其中,设备身份响应消息中携带有无人机的IMEI。
(6)MME向EIR发送设备身份检查请求消息(ME Device Identity Check Request)。其中,身份检查请求消息中携带有无人机的IMEI。
(7)EIR向MME发送设备身份检查应答消息(ME Device Identity Check Ack)。其中,身份检查应答消息可能是用于指示无人机的IMEI已经注册过的第一身份检查应答消息,还可能是用于指示无人机的IMEI没有注册过的第二身份检查应答消息。
(8)MME向基站发送接入响应消息(Attach Response),基站将接入响应消息透传至无人机。其中,接入响应消息可能是用于指示接受接入的第一接入响应消息,也可能是用于指示拒绝接入的第二接入响应消息。
与前述无人机接入方法实施例相对应,本公开还提供无人机接入装置的实施例。
图7是根据一示例性实施例示出的一种无人机接入装置的框图,该无人机接入装置可以用于MME,并用于执行图1所示的无人机接入方法。如图7所示,该无人机接入装置可以包括:
接收模块71,被配置为接收无人机发送的接入请求消息;
验证模块72,被配置为根据所述接入请求消息对使用所述无人机的用户身份、以及所述无人机的设备身份进行验证,得到验证结果;
第一处理模块73,被配置为若所述验证结果为验证成功,则接受所述无人机的接入,并向所述无人机发送用于指示接受接入的第一接入响应消息;
第二处理模块74,被配置为若所述验证结果为验证失败,则拒绝所述无人机的接入,并向所述无人机发送用于指示拒绝接入的第二接入响应消息。
由上述实施例可见,通过接收无人机发送的接入请求消息,根据接入请求消息对使用无人机的用户身份、以及无人机的设备身份进行验证,得到验证结果,若验证结果为验证成功,则接受无人机的接入,并向无人机发送用于指示接受接入的第一接入响应消息;若验证结果为验证失败,则拒绝无人机的接入,并向无人机发送用于指示拒绝接入的第二接入响应消息,这样可以防止验证失败的无人机接入蜂窝网络,从而减少了对蜂窝网络造成的干扰,提高了无人机接入的可靠性,便于为验证成功的无人机提供专属服务,提高了无人机的工作效率。
图8是根据一示例性实施例示出的另一种无人机接入装置的框图,该无人机接入装置可以用于MME,并建立在图7所示装置的基础上。如图8所示,所述验证模块72可以包括:
第一获取子模块81,被配置为获取所述无人机的IMSI;
第一验证子模块82,被配置为根据所述无人机的IMSI对使用所述无人机的用户身份进行第一验证;
第二获取子模块83,被配置为获取所述无人机的IMEI;
第二验证子模块84,被配置为根据所述无人机的IMEI对所述无人机的设备身份进行第二验证;
第一确定子模块85,被配置为若所述第一验证和所述第二验证均为验证成功,则所述验证结果为验证成功;
第二确定子模块86,被配置为若所述第一验证和所述第二验证中至少一个为验证失败,则所述验证结果为验证失败。
由上述实施例可见,通过获取无人机的IMSI,并根据无人机的IMSI对使用无人机的用户身份进行第一验证,以及获取无人机的IMEI,并根据无人机的IMEI对无人机的设备身份进行第二验证,当第一验证和第二验证均为验证成功时,才确定最后的验证结果为验证成功,否则,为验证失败,这样保证了使用无人机的用户身份、和无人机的设备身份均为合法的情形下才允许该无人机的接入,从而减少了不合法的无人机对蜂窝网络造成的干扰,并通过提高无人机接入的验证标准可以更好地为无人机提供网络服务。
图9是根据一示例性实施例示出的另一种无人机接入装置的框图,该无人机接入装置可以用于MME,并建立在图8所示装置的基础上。如图9所示,所述第一获取子模块81可以包括:
第一判断子模块91,被配置为判断所述接入请求消息是否携带有所述无人机的IMSI;
第一处理子模块92,被配置为若所述第一判断子模块91的判断结果为是,则从所述接入请求消息中读取所述无人机的IMSI;
第二处理子模块93,被配置为若所述第一判断子模块91的判断结果为否,则向所述无人机发送用户身份请求消息,所述用户身份请求消息用于指示所述无人机提供自身的IMSI;以及,接收所述无人机发送的用户身份响应消息,所述用户身份响应消息中携带有所述无人机的IMSI。
由上述实施例可见,可以从接入请求消息中直接读取无人机的IMSI,还可以主动要求无人机提供自身的IMSI,这样便于MME通过无人机提供的IMSI进行用户身份验证,从而提高了用户身份验证的效率。
图10是根据一示例性实施例示出的另一种无人机接入装置的框图,该无人机接入装置可以用于MME,并建立在图8或图9所示装置的基础上。如图10所示,所述第一验证子模块82可以包括:
第一发送子模块101,被配置为向HSS发送位置更新请求消息,所述位置更新请求消息携带有所述无人机的IMSI;
第一验证成功子模块102,被配置为若接收到所述HSS发送的用于指示查询到
所述无人机的QoS配置信息的第一位置更新回复消息,且所述第一位置更新回复消息中携带有所述无人机的QoS配置信息,则确定所述第一验证为验证成功;
第一验证失败子模块103,被配置为若接收到所述HSS发送的用于指示没有查询到所述无人机的QoS配置信息的第二位置更新回复消息,则确定所述第一验证为验证失败。
由上述实施例可见,通过HSS向HSS发送位置更新请求消息,该位置更新请求消息携带有无人机的IMSI,若接收到HSS发送的用于指示查询到无人机的QoS配置信息的第一位置更新回复消息,且第一位置更新回复消息中携带有无人机的QoS配置信息,则确定第一验证为验证成功;若接收到HSS发送的用于指示没有查询到无人机的QoS配置信息的第二位置更新回复消息,则确定第一验证为验证失败,从而实现了通过MME来完成对使用无人机的用户身份的验证,进而提高了用户身份验证的效率。
图11是根据一示例性实施例示出的另一种无人机接入装置的框图,该无人机接入装置可以用于MME,并建立在图8所示装置的基础上。如图11所示,所述第二获取子模块83可以包括:
第二判断子模块111,被配置为判断所述接入请求消息是否携带有所述无人机的IMEI;
第三处理子模块112,被配置为若所述第二判断子模块111的判断结果为是,则从所述接入请求消息中读取所述无人机的IMEI;
第四处理子模块113,被配置为若所述第二判断子模块111的判断结果为否,则向所述无人机发送设备身份请求消息,所述设备身份请求消息用于指示所述无人机提供自身的IMEI;以及,接收所述无人机发送的设备身份响应消息,所述设备身份响应消息中携带有所述无人机的IMEI。
由上述实施例可见,可以从接入请求消息中直接读取无人机的IMEI,还可以主动要求无人机提供自身的IMEI,这样便于MME通过无人机提供的IMEI进行设备身份验证,从而提高了设备身份验证的效率。
图12是根据一示例性实施例示出的另一种无人机接入装置的框图,该无人机接入装置可以用于MME,并建立在图8或图11所示装置的基础上。如图12所示,所述第二验证子模块84可以包括:
第二发送子模块121,被配置为向EIR发送设备身份检查请求消息,所述设备身份检查请求消息中携带有所述无人机的IMEI;
接收子模块122,被配置为接收所述EIR发送的设备身份检查应答消息,所述设备身份检查应答消息中携带有所述MME根据所述无人机的IMEI查询对应的注册记录后得到的查询结果;
第二验证成功子模块123,被配置为若所述查询结果为查询到所述无人机的注册记录,则确定所述第二验证为验证成功;
第二验证失败子模块124,被配置为若所述查询结果为没有查询到所述无人机的注册记录,则确定所述第二验证为验证失败。
由上述实施例可见,通过向EIR发送设备身份检查请求消息,该设备身份检查请求消息中携带有无人机的IMEI,收EIR发送的设备身份检查应答消息,该设备身份检查应答消息中携带有MME根据无人机的IMEI查询对应的注册记录后得到的查询结果,若查询结果为查询到无人机的注册记录,则确定第二验证为验证成功;若查询结果为没有查询到无人机的注册记录,则确定第二验证为验证失败,从而实现了通过EIR来完成对无人机的设备身份的验证,进而提高了设备身份验证的效率。
图13是根据一示例性实施例示出的一种无人机接入装置的框图,该无人机接入装置可以用于无人机,该无人机有一个IMSI、和一个IMEI,并用于执行图3所示的无人机接入方法。如图13所示,该无人机接入装置可以包括:
第一发送模块131,被配置为向MME发送接入请求消息;
第一确定模块132,被配置为若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入;
第二确定模块133,被配置为若接收到所述MME发送的用于指示拒绝接入的第二接入响应消息,确定所述MME拒绝所述无人机的接入。
由上述实施例可见,通过向MME发送接入请求消息,若接收到MME发送的用于指示接受接入的第一接入响应消息时,确定MME接受无人机的接入;若接收到MME发送的用于指示拒绝接入的第二接入响应消息,确定MME拒绝无人机的接入,从而实现了MME对无人机接入的控制,提高了无人机接入的安全性。
图14是根据一示例性实施例示出的另一种无人机接入装置的框图,该无人机
接入装置可以用于无人机,并建立在图13所示装置的基础上。如图14所示,该无人机接入装置还可以包括:
第一接收模块141,被配置为接收所述MME发送的用户身份请求消息,所述用户身份请求消息用于指示所述无人机提供自身的IMSI;
第二发送模块142,被配置为向所述MME发送用户身份响应消息,所述用户身份响应消息携带有所述无人机的IMSI。
由上述实施例可见,通过接收MME发送的用户身份请求消息,该用户身份请求消息用于指示无人机提供自身的IMSI,向MME发送用户身份响应消息,该用户身份响应消息携带有无人机的IMSI,这样便于MME利用无人机提供的IMSI进行用户身份验证,从而提高了无人机用户身份验证的效率。
图15是根据一示例性实施例示出的另一种无人机接入装置的框图,该无人机接入装置可以用于无人机,并建立在图13所示装置的基础上。如图15所示,该无人机接入装置还可以包括:
第二接收模块151,被配置为接收所述MME发送的设备身份请求消息,所述设备身份请求消息用于指示所述无人机提供自身的IMEI;
第三发送模块152,被配置为向所述MME发送设备身份响应消息,所述设备身份响应消息携带有所述无人机的IMEI。
由上述实施例可见,通过接收MME发送的设备身份请求消息,该设备身份请求消息用于指示无人机提供自身的IMEI,向MME发送设备身份响应消息,该设备身份响应消息携带有无人机的IMEI,这样便于MME利用无人机提供的IMEI进行设备身份验证,从而提高了无人机设备身份验证的效率。
在一实施例中,在图13所示装置的基础上,所述接入请求消息中携带有所述无人机的IMSI、和/或所述无人机的IMEI。
由上述实施例可见,通过在接入请求消息中携带有该无人机的IMSI、和/或该无人机的IMEI,这样便于MME直接从接入请求消息中读取用于进行无人机合法验证的信息IMSI、和/或IMEI,进而提高了无人机接入的效率。
图16是根据一示例性实施例示出的一种无人机接入装置的框图,该无人机接入装置可以用于HSS,该HSS用于协助MME完成对使用无人机的用户身份的验证,
并用于执行图4所示的无人机接入方法。如图16所示,该无人机接入装置可以包括:
接收模块161,被配置为接收所述MME发送的位置更新请求消息,所述位置更新请求消息携带有请求接入的无人机的IMSI;
查询模块162,被配置为根据所述无人机的IMSI查询该无人机专属的QoS配置信息;
第一发送模块163,被配置为若查询到所述无人机的QoS配置信息,则向所述MME发送用于指示查询到所述无人机的QoS配置信息的第一位置更新回复消息,且所述第一位置更新回复消息中携带有所述无人机的QoS配置信息;
第二发送模块164,被配置为若没有查询到所述无人机的QoS配置信息,则向所述MME发送用于指示没有查询到所述无人机的QoS配置信息的第二位置更新回复消息。
由上述实施例可见,通过接收MME发送的位置更新请求消息,该位置更新请求消息携带有请求接入的无人机的IMSI,若查询到无人机的QoS配置信息,则向MME发送用于指示查询到无人机的QoS配置信息的第一位置更新回复消息,且第一位置更新回复消息中携带有无人机的QoS配置信息,若没有查询到无人机的QoS配置信息,则向MME发送用于指示没有查询到无人机的QoS配置信息的第二位置更新回复消息,从而实现了HSS协助MME来完成对使用无人机的用户身份的验证,提高了无人机接入的可靠性。
图17是根据一示例性实施例示出的一种无人机接入装置的框图,该无人机接入装置可以用于EIR,该EIR用于协助MME完成对无人机的设备身份的验证,并用于执行图5所示的无人机接入方法。如图17所示,该无人机接入装置可以包括:
接收模块171,被配置为接收MME发送的设备身份检查请求消息,所述设备身份检查请求消息中携带有请求接入的无人机的IMEI;
查询模块172,被配置为根据所述无人机的IMEI查询对应的注册记录,得到查询结果;
发送模块173,被配置为向所述MME发送携带有所述查询结果的设备身份检查应答消息。
由上述实施例可见,通过接收MME发送的设备身份检查请求消息,该设备身
份检查请求消息中携带有请求接入的无人机的IMEI,据无人机的IMEI查询对应的注册记录,得到查询结果,向MME发送携带有查询结果的设备身份检查应答消息,从而实现了EIR协助MME来完成对无人机的设备身份的验证,提高了无人机接入的可靠性。
对于上述装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中上述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本公开方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
本公开还提供了一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述图1或图2所述的无人机接入方法。
本公开还提供了一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述图3所述的无人机接入方法。
本公开还提供了一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述图4所述的无人机接入方法。
本公开还提供了一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,所述计算机程序用于执行上述图5所述的无人机接入方法。
本公开还提供了一种无人机接入装置,所述装置用于MME,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收无人机发送的接入请求消息;
根据所述接入请求消息对使用所述无人机的用户身份、以及所述无人机的设备身份进行验证,得到验证结果;
若所述验证结果为验证成功,则接受所述无人机的接入,并向所述无人机发送用于指示接受接入的第一接入响应消息;
若所述验证结果为验证失败,则拒绝所述无人机的接入,并向所述无人机发送
用于指示拒绝接入的第二接入响应消息。
图18是根据一示例性实施例示出的一种无人机接入装置的结构示意图。如图18所示,根据一示例性实施例示出的一种无人机接入装置1800,该装置1800可以被提供为一MME。
参照图18,装置1800可以包括以下一个或多个组件:处理组件1801,存储器1802,电源组件1803,多媒体组件1804,音频组件1805,输入/输出(I/O)的接口1806,传感器组件1807,以及通信组件1808。
处理组件1801通常控制装置1800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件1801可以包括一个或多个处理器1809来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件1801可以包括一个或多个模块,便于处理组件1801和其它组件之间的交互。例如,处理组件1801可以包括多媒体模块,以方便多媒体组件1804和处理组件1801之间的交互。
存储器1802被配置为存储各种类型的数据以支持在装置1800的操作。这些数据的示例包括用于在装置1800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器1802可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件1803为装置1800的各种组件提供电力。电源组件1803可以包括电源管理系统,一个或多个电源,及其它与为装置1800生成、管理和分配电力相关联的组件。
多媒体组件1804包括在所述装置1800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件1804包括一个前置摄像头和/或后置摄像头。当装置1800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光
学透镜系统或具有焦距和光学变焦能力。
音频组件1805被配置为输出和/或输入音频信号。例如,音频组件1805包括一个麦克风(MIC),当装置1800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1802或经由通信组件1808发送。在一些实施例中,音频组件1805还包括一个扬声器,用于输出音频信号。
I/O接口1806为处理组件1801和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件1807包括一个或多个传感器,用于为装置1800提供各个方面的状态评估。例如,传感器组件1807可以检测到装置1800的打开/关闭状态,组件的相对定位,例如所述组件为装置1800的显示器和小键盘,传感器组件1807还可以检测装置1800或装置1800一个组件的位置改变,用户与装置1800接触的存在或不存在,装置1800方位或加速/减速和装置1800的温度变化。传感器组件1807可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件1807还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件1807还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件1808被配置为便于装置1800和其它设备之间有线或无线方式的通信。装置1800可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件1808经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件1808还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其它技术来实现。
在示例性实施例中,装置1800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其它电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器1802,上述指令可由装置1800的处理器1809执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
其中,当所述存储介质中的指令由所述处理器执行时,使得装置1800能够执行上述任一所述无人机接入方法。
本公开还提供了一种无人机接入装置,所述装置用于无人机,所述无人机有一个IMSI、和一个IMEI,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
向MME发送接入请求消息;
若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入;
若接收到所述MME发送的用于指示拒绝接入的第二接入响应消息,确定所述MME拒绝所述无人机的接入。
本公开还提供了一种无人机接入装置,所述装置用于HSS,所述HSS用于协助MME完成对使用无人机的用户身份的验证,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收所述MME发送的位置更新请求消息,所述位置更新请求消息携带有请求接入的无人机的IMSI;
根据所述无人机的IMSI查询该无人机专属的QoS配置信息;
若查询到所述无人机的QoS配置信息,则向所述MME发送用于指示查询到所述无人机的QoS配置信息的第一位置更新回复消息,且所述第一位置更新回复消息中携带有所述无人机的QoS配置信息;
若没有查询到所述无人机的QoS配置信息,则向所述MME发送用于指示没有查询到所述无人机的QoS配置信息的第二位置更新回复消息。
图19是根据一示例性实施例示出的一种无人机接入装置的结构示意图。如图19所示,根据一示例性实施例示出的一种无人机接入装置1900,该装置1900可以被提供为一HSS。并且,该装置1900包括的组件与图18相似,在这里不再重复赘述。
本公开还提供了一种无人机接入装置,所述装置用于EIR,所述EIR用于协助MME完成对无人机的设备身份的验证,所述装置包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
接收MME发送的设备身份检查请求消息,所述设备身份检查请求消息中携带有请求接入的无人机的IMEI;
根据所述无人机的IMEI查询对应的注册记录,得到查询结果;
向所述MME发送携带有所述查询结果的设备身份检查应答消息。
图20是根据一示例性实施例示出的一种无人机接入装置的结构示意图。如图20所示,根据一示例性实施例示出的一种无人机接入装置2000,该装置2000可以被提供为一EIR。并且,该装置2000包括的组件与图18相似,在这里不再重复赘述。
本领域技术人员在考虑说明书及实践这里公开的公开后,将容易想到本公开的其它实施方案。本申请旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。
Claims (32)
- 一种无人机接入方法,其特征在于,所述方法用于移动管理实体MME,所述方法包括:接收无人机发送的接入请求消息;根据所述接入请求消息对使用所述无人机的用户身份、以及所述无人机的设备身份进行验证,得到验证结果;若所述验证结果为验证成功,则接受所述无人机的接入,并向所述无人机发送用于指示接受接入的第一接入响应消息;若所述验证结果为验证失败,则拒绝所述无人机的接入,并向所述无人机发送用于指示拒绝接入的第二接入响应消息。
- 根据权利要求1所述的方法,其特征在于,所述根据所述接入请求消息对使用所述无人机的用户身份、以及所述无人机的设备身份的验证,得到验证结果,包括:获取所述无人机的国际移动用户识别码IMSI;根据所述无人机的IMSI对使用所述无人机的用户身份进行第一验证;获取所述无人机的国际移动设备标识IMEI;根据所述无人机的IMEI对所述无人机的设备身份进行第二验证;若所述第一验证和所述第二验证均为验证成功,则确定所述验证结果为验证成功;若所述第一验证和所述第二验证中至少一个为验证失败,则确定所述验证结果为验证失败。
- 根据权利要求2所述的方法,其特征在于,所述获取所述无人机的IMSI,包括:判断所述接入请求消息是否携带有所述无人机的IMSI;若是,则从所述接入请求消息中读取所述无人机的IMSI;若否,则向所述无人机发送用户身份请求消息,所述用户身份请求消息用于指示所述无人机提供自身的IMSI;以及,接收所述无人机发送的用户身份响应消息,所述用户身份响应消息中携带有所述无人机的IMSI。
- 根据权利要求2或3所述的方法,其特征在于,所述根据所述无人机的IMSI对使用所述无人机的用户身份进行第一验证,包括:向归属签约用户服务器HSS发送位置更新请求消息,所述位置更新请求消息携带有所述无人机的IMSI;若接收到所述HSS发送的用于指示查询到所述无人机的服务质量QoS配置信息的 第一位置更新回复消息,且所述第一位置更新回复消息中携带有所述无人机的QoS配置信息,则确定所述第一验证为验证成功;若接收到所述HSS发送的用于指示没有查询到所述无人机的QoS配置信息的第二位置更新回复消息,则确定所述第一验证为验证失败。
- 根据权利要求2所述的方法,其特征在于,所述获取所述无人机的IMEI,包括:判断所述接入请求消息是否携带有所述无人机的IMEI;若是,则从所述接入请求消息中读取所述无人机的IMEI;若否,则向所述无人机发送设备身份请求消息,所述设备身份请求消息用于指示所述无人机提供自身的IMEI;以及,接收所述无人机发送的设备身份响应消息,所述设备身份响应消息中携带有所述无人机的IMEI。
- 根据权利要求2或5所述的方法,其特征在于,所述根据所述无人机的IMEI对所述无人机的设备身份进行第二验证,包括:向设备标识注册器EIR发送设备身份检查请求消息,所述设备身份检查请求消息中携带有所述无人机的IMEI;接收所述EIR发送的设备身份检查应答消息,所述设备身份检查应答消息中携带有所述MME根据所述无人机的IMEI查询对应的注册记录后得到的查询结果;若所述查询结果为查询到所述无人机的注册记录,则确定所述第二验证为验证成功;若所述查询结果为没有查询到所述无人机的注册记录,则确定所述第二验证为验证失败。
- 一种无人机接入方法,其特征在于,所述方法用于无人机,所述无人机有一个国际移动用户识别码IMSI、和一个国际移动设备标识IMEI,所述方法包括:向移动管理实体MME发送接入请求消息;若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入;若接收到所述MME发送的用于指示拒绝接入的第二接入响应消息,确定所述MME拒绝所述无人机的接入。
- 根据权利要求7所述的方法,其特征在于,所述方法还包括:接收所述MME发送的用户身份请求消息,所述用户身份请求消息用于指示所述无人机提供自身的IMSI;向所述MME发送用户身份响应消息,所述用户身份响应消息携带有所述无人机的IMSI。
- 根据权利要求7所述的方法,其特征在于,所述方法还包括:接收所述MME发送的设备身份请求消息,所述设备身份请求消息用于指示所述无人机提供自身的IMEI;向所述MME发送设备身份响应消息,所述设备身份响应消息携带有所述无人机的IMEI。
- 根据权利要求7所述的方法,其特征在于,所述接入请求消息中携带有所述无人机的IMSI、和/或所述无人机的IMEI。
- 一种无人机接入方法,其特征在于,所述方法用于归属签约用户服务器HSS,所述HSS用于协助移动管理实体MME完成对使用无人机的用户身份的验证,所述方法包括:接收所述MME发送的位置更新请求消息,所述位置更新请求消息携带有请求接入的无人机的国际移动用户识别码IMSI;根据所述无人机的IMSI查询该无人机专属的服务质量QoS配置信息;若查询到所述无人机的QoS配置信息,则向所述MME发送用于指示查询到所述无人机的QoS配置信息的第一位置更新回复消息,且所述第一位置更新回复消息中携带有所述无人机的QoS配置信息;若没有查询到所述无人机的QoS配置信息,则向所述MME发送用于指示没有查询到所述无人机的QoS配置信息的第二位置更新回复消息。
- 一种无人机接入方法,其特征在于,所述方法用于设备标识注册器EIR,所述EIR用于协助移动管理实体MME完成对无人机的设备身份的验证,所述方法包括:接收所述MME发送的设备身份检查请求消息,所述设备身份检查请求消息中携带有请求接入的无人机的国际移动设备标识IMEI;根据所述无人机的IMEI查询对应的注册记录,得到查询结果;向所述MME发送携带有所述查询结果的设备身份检查应答消息。
- 一种无人机接入装置,其特征在于,所述装置用于移动管理实体MME,所述装置包括:接收模块,被配置为接收无人机发送的接入请求消息;验证模块,被配置为根据所述接入请求消息对使用所述无人机的用户身份、以及所述无人机的设备身份进行验证,得到验证结果;第一处理模块,被配置为若所述验证结果为验证成功,则接受所述无人机的接入,并向所述无人机发送用于指示接受接入的第一接入响应消息;第二处理模块,被配置为若所述验证结果为验证失败,则拒绝所述无人机的接入,并向所述无人机发送用于指示拒绝接入的第二接入响应消息。
- 根据权利要求13所述的装置,其特征在于,所述验证模块包括:第一获取子模块,被配置为获取所述无人机的国际移动用户识别码IMSI;第一验证子模块,被配置为根据所述无人机的IMSI对使用所述无人机的用户身份进行第一验证;第二获取子模块,被配置为获取所述无人机的国际移动设备标识IMEI;第二验证子模块,被配置为根据所述无人机的IMEI对所述无人机的设备身份进行第二验证;第一确定子模块,被配置为若所述第一验证和所述第二验证均为验证成功,则所述验证结果为验证成功;第二确定子模块,被配置为若所述第一验证和所述第二验证中至少一个为验证失败,则所述验证结果为验证失败。
- 根据权利要求14所述的装置,其特征在于,所述第一获取子模块包括:第一判断子模块,被配置为判断所述接入请求消息是否携带有所述无人机的IMSI;第一处理子模块,被配置为若所述第一判断子模块的判断结果为是,则从所述接入请求消息中读取所述无人机的IMSI;第二处理子模块,被配置为若所述第一判断子模块的判断结果为否,则向所述无人机发送用户身份请求消息,所述用户身份请求消息用于指示所述无人机提供自身的IMSI;以及,接收所述无人机发送的用户身份响应消息,所述用户身份响应消息中携带有所述无人机的IMSI。
- 根据权利要求14或15所述的装置,其特征在于,所述第一验证子模块包括:第一发送子模块,被配置为向归属签约用户服务器HSS发送位置更新请求消息,所述位置更新请求消息携带有所述无人机的IMSI;第一验证成功子模块,被配置为若接收到所述HSS发送的用于指示查询到所述无人机的服务质量QoS配置信息的第一位置更新回复消息,且所述第一位置更新回复消息中携带有所述无人机的QoS配置信息,则确定所述第一验证为验证成功;第一验证失败子模块,被配置为若接收到所述HSS发送的用于指示没有查询到所 述无人机的QoS配置信息的第二位置更新回复消息,则确定所述第一验证为验证失败。
- 根据权利要求14所述的装置,其特征在于,所述第二获取子模块包括:第二判断子模块,被配置为判断所述接入请求消息是否携带有所述无人机的IMEI;第三处理子模块,被配置为若所述第二判断子模块的判断结果为是,则从所述接入请求消息中读取所述无人机的IMEI;第四处理子模块,被配置为若所述第二判断子模块的判断结果为否,则向所述无人机发送设备身份请求消息,所述设备身份请求消息用于指示所述无人机提供自身的IMEI;以及,接收所述无人机发送的设备身份响应消息,所述设备身份响应消息中携带有所述无人机的IMEI。
- 根据权利要求14或17所述的装置,其特征在于,所述第二验证子模块包括:第二发送子模块,被配置为向设备标识注册器EIR发送设备身份检查请求消息,所述设备身份检查请求消息中携带有所述无人机的IMEI;接收子模块,被配置为接收所述EIR发送的设备身份检查应答消息,所述设备身份检查应答消息中携带有所述MME根据所述无人机的IMEI查询对应的注册记录后得到的查询结果;第二验证成功子模块,被配置为若所述查询结果为查询到所述无人机的注册记录,则确定所述第二验证为验证成功;第二验证失败子模块,被配置为若所述查询结果为没有查询到所述无人机的注册记录,则确定所述第二验证为验证失败。
- 一种无人机接入装置,其特征在于,所述装置用于无人机,所述无人机有一个国际移动用户识别码IMSI、和一个国际移动设备标识IMEI,所述装置包括:第一发送模块,被配置为向移动管理实体MME发送接入请求消息;第一确定模块,被配置为若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入;第二确定模块,被配置为若接收到所述MME发送的用于指示拒绝接入的第二接入响应消息,确定所述MME拒绝所述无人机的接入。
- 根据权利要求19所述的装置,其特征在于,所述装置还包括:第一接收模块,被配置为接收所述MME发送的用户身份请求消息,所述用户身份请求消息用于指示所述无人机提供自身的IMSI;第二发送模块,被配置为向所述MME发送用户身份响应消息,所述用户身份响 应消息携带有所述无人机的IMSI。
- 根据权利要求19所述的装置,其特征在于,所述装置还包括:第二接收模块,被配置为接收所述MME发送的设备身份请求消息,所述设备身份请求消息用于指示所述无人机提供自身的IMEI;第三发送模块,被配置为向所述MME发送设备身份响应消息,所述设备身份响应消息携带有所述无人机的IMEI。
- 根据权利要求19所述的装置,其特征在于,所述接入请求消息中携带有所述无人机的IMSI、和/或所述无人机的IMEI。
- 一种无人机接入装置,其特征在于,所述装置用于归属签约用户服务器HSS,所述HSS用于协助移动管理实体MME完成对使用无人机的用户身份的验证,所述装置包括:接收模块,被配置为接收所述MME发送的位置更新请求消息,所述位置更新请求消息携带有请求接入的无人机的国际移动用户识别码IMSI;查询模块,被配置为根据所述无人机的IMSI查询该无人机专属的服务质量QoS配置信息;第一发送模块,被配置为若查询到所述无人机的QoS配置信息,则向所述MME发送用于指示查询到所述无人机的QoS配置信息的第一位置更新回复消息,且所述第一位置更新回复消息中携带有所述无人机的QoS配置信息;第二发送模块,被配置为若没有查询到所述无人机的QoS配置信息,则向所述MME发送用于指示没有查询到所述无人机的QoS配置信息的第二位置更新回复消息。
- 一种无人机接入装置,其特征在于,所述装置用于设备标识注册器EIR,所述EIR用于协助移动管理实体MME完成对无人机的设备身份的验证,所述装置包括:接收模块,被配置为接收移动管理实体MME发送的设备身份检查请求消息,所述设备身份检查请求消息中携带有请求接入的无人机的国际移动设备标识IMEI;查询模块,被配置为根据所述无人机的IMEI查询对应的注册记录,得到查询结果;;发送模块,被配置为向所述MME发送携带有所述查询结果的设备身份检查应答消息。
- 一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,其特征在于,所述计算机程序用于执行上述权利要求1-6任一所述的无人机接入方法。
- 一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,其特 征在于,所述计算机程序用于执行上述权利要求7-10任一所述的无人机接入方法。
- 一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,其特征在于,所述计算机程序用于执行上述权利要求11任一所述的无人机接入方法。
- 一种非临时计算机可读存储介质,所述存储介质上存储有计算机程序,其特征在于,所述计算机程序用于执行上述权利要求12任一所述的无人机接入方法。
- 一种无人机接入装置,其特征在于,所述装置用于移动管理实体MME,所述装置包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为:接收无人机发送的接入请求消息;根据所述接入请求消息对使用所述无人机的用户身份、以及所述无人机的设备身份进行验证,得到验证结果;若所述验证结果为验证成功,则接受所述无人机的接入,并向所述无人机发送用于指示接受接入的第一接入响应消息;若所述验证结果为验证失败,则拒绝所述无人机的接入,并向所述无人机发送用于指示拒绝接入的第二接入响应消息。
- 一种无人机接入装置,其特征在于,所述装置用于无人机,所述无人机有一个国际移动用户识别码IMSI、和一个国际移动设备标识IMEI,所述装置包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为:向移动管理实体MME发送接入请求消息;若接收到所述MME发送的用于指示接受接入的第一接入响应消息时,确定所述MME接受所述无人机的接入;若接收到所述MME发送的用于指示拒绝接入的第二接入响应消息,确定所述MME拒绝所述无人机的接入。
- 一种无人机接入装置,其特征在于,所述装置用于归属签约用户服务器HSS,所述HSS用于协助移动管理实体MME完成对使用无人机的用户身份的验证,所述装置包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为:接收所述MME发送的位置更新请求消息,所述位置更新请求消息携带有请求接入的无人机的国际移动用户识别码IMSI;根据所述无人机的IMSI查询该无人机专属的服务质量QoS配置信息;若查询到所述无人机的QoS配置信息,则向所述MME发送用于指示查询到所述无人机的QoS配置信息的第一位置更新回复消息,且所述第一位置更新回复消息中携带有所述无人机的QoS配置信息;若没有查询到所述无人机的QoS配置信息,则向所述MME发送用于指示没有查询到所述无人机的QoS配置信息的第二位置更新回复消息。
- 一种无人机接入装置,其特征在于,所述装置用于设备标识注册器EIR,所述EIR用于协助移动管理实体MME完成对无人机的设备身份的验证,所述装置包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为:接收移动管理实体MME发送的设备身份检查请求消息,所述设备身份检查请求消息中携带有请求接入的无人机的国际移动设备标识IMEI;根据所述无人机的IMEI查询对应的注册记录,得到查询结果;向所述MME发送携带有所述查询结果的设备身份检查应答消息。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201780001551.1A CN109757129B (zh) | 2017-09-06 | 2017-09-06 | 无人机接入方法及装置 |
PCT/CN2017/100731 WO2019047066A1 (zh) | 2017-09-06 | 2017-09-06 | 无人机接入方法及装置 |
CN202210788157.XA CN115243260A (zh) | 2017-09-06 | 2017-09-06 | 无人机接入方法及装置 |
EP17924007.2A EP3671694A4 (en) | 2017-09-06 | 2017-09-06 | PILOTLESS AIR VEHICLE ACCESS PROCESS AND DEVICE |
US16/809,155 US11212856B2 (en) | 2017-09-06 | 2020-03-04 | Unmanned aerial vehicle access method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/100731 WO2019047066A1 (zh) | 2017-09-06 | 2017-09-06 | 无人机接入方法及装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/809,155 Continuation US11212856B2 (en) | 2017-09-06 | 2020-03-04 | Unmanned aerial vehicle access method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019047066A1 true WO2019047066A1 (zh) | 2019-03-14 |
Family
ID=65633445
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/100731 WO2019047066A1 (zh) | 2017-09-06 | 2017-09-06 | 无人机接入方法及装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US11212856B2 (zh) |
EP (1) | EP3671694A4 (zh) |
CN (2) | CN109757129B (zh) |
WO (1) | WO2019047066A1 (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020211855A1 (zh) * | 2019-04-18 | 2020-10-22 | 华为技术有限公司 | 无人机的鉴权方法及装置 |
WO2021087696A1 (zh) * | 2019-11-04 | 2021-05-14 | 华为技术有限公司 | 身份认证方法及通信装置 |
WO2021201943A3 (en) * | 2020-01-06 | 2021-11-11 | Qualcomm Incorporated | Techniques for identifying aerial vehicles in mobile networks |
WO2022016520A1 (en) * | 2020-07-24 | 2022-01-27 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Apparatus and method of communication |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6634423B2 (ja) * | 2017-09-26 | 2020-01-22 | Kddi株式会社 | 運行管理方法及び運行管理装置 |
CN108781363B (zh) | 2018-06-14 | 2022-09-30 | 北京小米移动软件有限公司 | 信息传输方法、装置、系统及存储介质 |
CN112533139B (zh) * | 2019-09-18 | 2022-06-10 | 华为技术有限公司 | 一种无人机系统的飞行授权方法、装置及系统 |
CN115136222A (zh) * | 2020-02-24 | 2022-09-30 | 高通股份有限公司 | 用于无人驾驶交通工具授权以在蜂窝网络上运行的机制 |
US11172019B1 (en) * | 2020-08-28 | 2021-11-09 | Tencent America LLC | Systems and methods for unmanned aerial system communication |
CN116158102A (zh) * | 2020-12-14 | 2023-05-23 | Oppo广东移动通信有限公司 | 目标信息获取方法、发送方法、装置、设备及存储介质 |
US11722210B2 (en) * | 2021-01-12 | 2023-08-08 | Tencent America LLC | Unmanned aerial system communication |
US11611937B1 (en) * | 2021-01-19 | 2023-03-21 | T-Mobile Innovations Llc | Network-assisted charging prioritization for cellular unmanned aerial vehicles |
US20220345321A1 (en) * | 2021-04-27 | 2022-10-27 | Qualcomm Incorporated | Managing An Unmanned Aerial Vehicle Identity |
CN118212811A (zh) * | 2022-12-15 | 2024-06-18 | 中兴通讯股份有限公司 | 无人机的控制方法、终端及系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008105591A (ja) * | 2006-10-26 | 2008-05-08 | Hiroboo Kk | 自律制御無人飛行体の飛行管理方法 |
US20100161155A1 (en) * | 2007-01-02 | 2010-06-24 | Janick Simeray | Automatic flight control helicopter |
CN105225540A (zh) * | 2015-10-21 | 2016-01-06 | 杨珊珊 | 无人飞行器的飞行区域监控装置及其监控方法 |
CN106507276A (zh) * | 2016-10-31 | 2017-03-15 | 中国联合网络通信集团有限公司 | 无人机、无人机的标识方法及无人机管理系统 |
CN106716961A (zh) * | 2014-09-23 | 2017-05-24 | 高通股份有限公司 | 用于安全无连接上行链路小型数据传输的方法和装置 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101662415B (zh) * | 2008-08-29 | 2012-11-07 | 华为技术有限公司 | 一种策略控制方法及通讯系统以及相关设备 |
CN101730035A (zh) * | 2009-03-19 | 2010-06-09 | 中兴通讯股份有限公司 | 用户设备附着的处理方法、移动性管理实体以及用户设备 |
CN102026303A (zh) * | 2009-09-21 | 2011-04-20 | 中兴通讯股份有限公司 | 一种实现家用基站上QoS控制的方法和系统 |
CN103563449B (zh) * | 2011-12-22 | 2017-09-29 | 华为技术有限公司 | 接入方法及移动管理设备、用户设备 |
CN102905266B (zh) * | 2012-10-11 | 2015-05-20 | 大唐移动通信设备有限公司 | 一种实现移动设备附着的方法及装置 |
CN104754542B (zh) * | 2013-12-25 | 2018-10-02 | 华为软件技术有限公司 | 自动开户方法和装置 |
US10115277B2 (en) * | 2014-07-29 | 2018-10-30 | GeoFrenzy, Inc. | Systems and methods for geofence security |
US20180218619A1 (en) * | 2015-07-17 | 2018-08-02 | Relmatech Limited | An aircraft controlled by a secure integrated airspace management system |
US20180253092A1 (en) * | 2015-09-09 | 2018-09-06 | Tecteco Security Systems, S.L. | Secure control of unmanned vehicles |
CN106658478B (zh) * | 2015-10-29 | 2019-06-25 | 中国移动通信集团公司 | 一种业务数据的传输方法、装置、控制设备及通信系统 |
US9942721B2 (en) * | 2016-07-11 | 2018-04-10 | At&T Intellectual Property I, L.P. | Aerial profiling of communication networks |
EP3668126A4 (en) * | 2017-08-10 | 2021-01-20 | Beijing Xiaomi Mobile Software Co., Ltd. | PILOTLESS AIR VEHICLE ACCESS PROCESS AND DEVICE |
-
2017
- 2017-09-06 WO PCT/CN2017/100731 patent/WO2019047066A1/zh unknown
- 2017-09-06 CN CN201780001551.1A patent/CN109757129B/zh active Active
- 2017-09-06 CN CN202210788157.XA patent/CN115243260A/zh active Pending
- 2017-09-06 EP EP17924007.2A patent/EP3671694A4/en active Pending
-
2020
- 2020-03-04 US US16/809,155 patent/US11212856B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008105591A (ja) * | 2006-10-26 | 2008-05-08 | Hiroboo Kk | 自律制御無人飛行体の飛行管理方法 |
US20100161155A1 (en) * | 2007-01-02 | 2010-06-24 | Janick Simeray | Automatic flight control helicopter |
CN106716961A (zh) * | 2014-09-23 | 2017-05-24 | 高通股份有限公司 | 用于安全无连接上行链路小型数据传输的方法和装置 |
CN105225540A (zh) * | 2015-10-21 | 2016-01-06 | 杨珊珊 | 无人飞行器的飞行区域监控装置及其监控方法 |
CN106507276A (zh) * | 2016-10-31 | 2017-03-15 | 中国联合网络通信集团有限公司 | 无人机、无人机的标识方法及无人机管理系统 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3671694A4 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020211855A1 (zh) * | 2019-04-18 | 2020-10-22 | 华为技术有限公司 | 无人机的鉴权方法及装置 |
CN113711288A (zh) * | 2019-04-18 | 2021-11-26 | 华为技术有限公司 | 无人机的鉴权方法及装置 |
US11272371B2 (en) | 2019-04-18 | 2022-03-08 | Huawei Technologies Co., Ltd. | Method and apparatus for unmanned aerial vehicle authentication |
CN113711288B (zh) * | 2019-04-18 | 2023-08-22 | 华为技术有限公司 | 无人机的鉴权方法及装置 |
US11800364B2 (en) | 2019-04-18 | 2023-10-24 | Huawei Technologies Co., Ltd. | Unmanned aerial vehicle authentication method and apparatus |
WO2021087696A1 (zh) * | 2019-11-04 | 2021-05-14 | 华为技术有限公司 | 身份认证方法及通信装置 |
WO2021201943A3 (en) * | 2020-01-06 | 2021-11-11 | Qualcomm Incorporated | Techniques for identifying aerial vehicles in mobile networks |
WO2022016520A1 (en) * | 2020-07-24 | 2022-01-27 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Apparatus and method of communication |
Also Published As
Publication number | Publication date |
---|---|
US11212856B2 (en) | 2021-12-28 |
CN109757129A (zh) | 2019-05-14 |
EP3671694A1 (en) | 2020-06-24 |
CN115243260A (zh) | 2022-10-25 |
US20200205211A1 (en) | 2020-06-25 |
CN109757129B (zh) | 2022-07-22 |
EP3671694A4 (en) | 2020-09-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019047066A1 (zh) | 无人机接入方法及装置 | |
WO2016155306A1 (zh) | 网络接入方法及装置 | |
US20170163626A1 (en) | Method and device for network access of a smart terminal device | |
KR101793443B1 (ko) | 스마트 기기의 관리 계정 설정 방법, 장치, 프로그램 및 저장매체 | |
CN109451817B (zh) | 无人机接入方法及装置 | |
US10608988B2 (en) | Method and apparatus for bluetooth-based identity recognition | |
CN106209800B (zh) | 设备权限共享方法和装置 | |
EP2975821A1 (en) | Network connection method and apparatus | |
US20170094522A1 (en) | Methods for controlling smart device | |
RU2644511C2 (ru) | Способ и устройство для отображения интерфейса настройки маршрутизатора | |
WO2017156960A1 (zh) | 访问智能摄像头的方法及装置 | |
WO2017071074A1 (zh) | 建立连接的方法及装置 | |
WO2016127669A1 (zh) | 终端设备接入无线网络的方法及装置 | |
WO2016155231A1 (zh) | 网络接入方法及装置 | |
WO2019148317A1 (zh) | 无人机服务的支持方法及装置 | |
US20180146420A1 (en) | Method and apparatus for establishing network connection | |
JP2017503289A (ja) | 端末検証方法、装置、プログラム、及び記録媒体 | |
CN109792786A (zh) | 用户设备配对的方法及装置 | |
WO2019019164A1 (zh) | 无人机管理方法及装置、通信连接建立方法及装置 | |
JP2018502342A (ja) | 設備制御方法及び装置 | |
WO2019153197A1 (zh) | 无人机指示方法及装置 | |
WO2020227925A1 (zh) | 网络注册方法、装置、系统及存储介质 | |
US9674768B2 (en) | Method and device for accessing wireless network | |
CN107070816B (zh) | 应用的识别方法、装置和移动终端 | |
CN107734072B (zh) | 推送信息的处理方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17924007 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2017924007 Country of ref document: EP Effective date: 20200320 |