WO2021063399A1 - 物联网设备的身份标识认证方法、相关装置及系统 - Google Patents

物联网设备的身份标识认证方法、相关装置及系统 Download PDF

Info

Publication number
WO2021063399A1
WO2021063399A1 PCT/CN2020/119452 CN2020119452W WO2021063399A1 WO 2021063399 A1 WO2021063399 A1 WO 2021063399A1 CN 2020119452 W CN2020119452 W CN 2020119452W WO 2021063399 A1 WO2021063399 A1 WO 2021063399A1
Authority
WO
WIPO (PCT)
Prior art keywords
identity
network unit
information acquisition
internet
network
Prior art date
Application number
PCT/CN2020/119452
Other languages
English (en)
French (fr)
Inventor
李刚
朱浩仁
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021063399A1 publication Critical patent/WO2021063399A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent

Definitions

  • This application relates to the field of communication technology, and in particular to an identity authentication method, related devices and systems for Internet of Things equipment.
  • UAV unmanned aerial vehicle
  • 3GPP 22.125 “The 3GPP (3rd Generation Partnership Project, 3rd Generation Partnership Project) system should enable UAS to provide unmanned aircraft traffic management (Unmanned Aircraft System Traffic Management, based on the different certification and authorization levels applied to UAS).
  • UTM sends different unmanned aircraft system (Unmanned Aircraft System, UAS) data", and pointed out that "according to regional regulations, different authentication and authorization levels can be: initial network access physical equipment authentication and authentication, UAS owner Identity authentication and authorization; UAV flight plan application and authorization; additional UTM operation service authentication and authorization, such as flight monitoring, collision avoidance services, etc.”.
  • the authentication and management of the identity of the drone involves pre-use and when it is used. Before use, it is mainly to complete the filing and registration of the drone’s identity information, and when it is used, it is mainly to complete the authentication and authentication of the relevant identity of the drone.
  • the production record management unit of the drone is the Ministry of Industry and Information Technology, and the relevant departments of the Ministry of Industry and Information Technology complete the authentication and certification of the production equipment information;
  • the pre-flight operation management unit of the UAV is the Civil Aviation Administration, which completes the authentication and certification of the drone owner and operator;
  • the operation service unit in the use of the UAV is the UAV cloud system, so it needs to be
  • the machine cloud system completes the authentication and certification of the drone.
  • the drone cloud system also needs to cooperate with the Civil Aviation Administration to complete the re-certification of the flight plan, the user, and the flight mission; at the same time, the drone is connected
  • the mobile operator's network also needs to perform access authentication and authentication once, which results in a lower convenience when authenticating drones.
  • the embodiments of the present application provide an identity authentication method, related devices, and communication systems for Internet of Things equipment.
  • a unified network unit can be used to authenticate drones, thereby improving the convenience of drone authentication and reducing the Attack risk at the application layer.
  • the present invention can also be applied to the authentication and authorization of other Internet of Things devices.
  • an embodiment of the present application provides an identity authentication method for an Internet of Things device, and the method includes:
  • the first network unit receives a registration request sent by the Internet of Things device, where the registration request includes a first identity
  • the first network unit determines whether the device type obtained according to the first identity identifier is a preset device type, and if so, the first network unit sends a first identity information acquisition request to the second network unit, and The Internet of Things device sends a second identity information acquisition request;
  • the first network unit receives a first identity information acquisition response sent by the second network unit, where the first identity information acquisition response carries a second identity identifier, and the first network unit receives the first identity information acquisition response sent by the Internet of Things device A second identity information acquisition response, where the second identity information acquisition response carries a third identity identifier;
  • the first network unit authenticates the third identity according to the second identity, and obtains an authentication result.
  • the first network unit after receiving the registration request sent by the Internet of Things device, the first network unit obtains the device type according to the first identity, and if the device type is the preset device type, obtains the second identity from the second network unit Identification, the third identity is obtained from the Internet of Things device, the third identity is authenticated through the second identity, and the authentication result is obtained.
  • the drone when the drone is authenticated, it needs to pass through multiple related networks
  • the unit authenticates the identity of the Internet of Things devices, and can use a unified network unit to authenticate the UAV, thereby improving the efficiency of the UAV's identity authentication.
  • the authentication result includes:
  • the second identity and the third identity are completely the same;
  • the second identity identifier and the third identity identifier are partly the same;
  • the second identity identifier and the third identity identifier are completely different.
  • the method further includes:
  • the first network unit sends a device access notification or an access alarm to the third network unit according to the authentication result.
  • the first network unit after the first network unit obtains the authentication result, it sends a device access notification or access alarm to the third network unit according to the authentication result, and can notify the third network unit of the result of identity authentication of the IoT device.
  • the network unit can make corresponding operations based on the access notification or access alarm, thereby improving the comprehensiveness of the UAV identity management.
  • the third network unit includes a network opening function.
  • the first identity includes a global mobile user subscription identity
  • the second identity and the third identity include physical identity, access Identification and/or extended information.
  • the first network unit obtains the device type from the second network unit.
  • the device type is obtained from the second network unit, and the device type can be obtained from a trusted third-party device, thereby improving the security and reliability of obtaining the device type.
  • the first network unit may be a mobility management function, a unified data management or drone control function; the second network unit may be a unified data management.
  • the second identity acquisition request includes an indication of the device type and identity information reported by the Internet of Things device.
  • an embodiment of the present application provides an identity authentication method for an Internet of Things device, and the method includes:
  • the Internet of Things device receives a second identity information acquisition request sent by the first network unit, and if the second identity information acquisition request carries an indication of the device type and identity information reported by the Internet of Things device, the Internet of Things device passes And report the third identity by sending the second identity information acquisition response to the first network unit.
  • the third identity identifier includes a physical identifier, a device access identifier, and/or extended information.
  • an embodiment of the present application provides a network device, and the device includes:
  • a transceiver unit configured to receive a registration request sent by an Internet of Things device, where the registration request includes a first identity
  • the processing unit is configured to determine whether the device type obtained according to the first identity identifier is a preset device type, and if so, the first network unit sends a first identity information acquisition request to the second network unit, and to the object The networked device sends the second identity information acquisition request;
  • the transceiving unit is configured to receive a first identity information acquisition response sent by the second network unit, where the first identity information acquisition response carries a second identity identifier, and the first network unit receives a transmission from the Internet of Things device A second identity information acquisition response of the second identity information, where the second identity information acquisition response carries a third identity identifier;
  • the processing unit is configured to authenticate the third identity according to the second identity to obtain an authentication result.
  • the authentication result includes:
  • the second identity and the third identity are completely the same;
  • the second identity identifier and the third identity identifier are partly the same;
  • the second identity identifier and the third identity identifier are completely different.
  • the transceiver unit is further configured to:
  • the third network unit includes a network opening function.
  • the first identity includes a global mobile user subscription identity
  • the second identity and the third identity include physical identity, access Identification and/or extended information.
  • the network device obtains the device type from the second network unit.
  • the network device includes: a mobility management function, a unified data management, or a drone control function; the second network unit includes a unified data management.
  • the third identity acquisition request includes an instruction to request the IoT device to report the device type and identity information.
  • an embodiment of the present application provides an Internet of Things device, and the device includes:
  • a sending unit configured to send a registration request to the first network unit, where the registration request includes the first identity
  • the receiving unit is configured to receive a second identity information acquisition request sent by the first network unit, and if the second identity information acquisition request carries an instruction requesting the Internet of Things device to report device type and identity information, the The Internet of Things device reports the third identity by sending the second identity information acquisition response to the first network unit.
  • the third identity identifier includes a physical identifier, a device access identifier, and/or extended information.
  • an embodiment of the present application provides a communication system, which includes the network device described in the third aspect and the Internet of Things device described in the fourth aspect.
  • an embodiment of the present application provides a computer-readable storage medium that stores a computer program.
  • the computer program includes program instructions that, when executed by a processor, cause the The processor executes all or part of the methods shown in the first and second aspects.
  • FIG. 1 provides a schematic diagram of the architecture of a 5G system according to an embodiment of the application
  • FIG. 2A provides an interactive schematic diagram of an identity authentication method of an Internet of Things device according to an embodiment of this application
  • FIG. 2B provides an interactive schematic diagram of another identity authentication method for Internet of Things devices according to an embodiment of this application
  • FIG. 2C provides a schematic diagram of a transmission format of identity information of an Internet of Things device according to an embodiment of this application;
  • FIG. 3 is an interactive schematic diagram of another method for authenticating an identity of an Internet of Things device according to an embodiment of this application
  • FIG. 4 is an interactive schematic diagram of another method for authenticating an identity of an Internet of Things device according to an embodiment of this application.
  • FIG. 5 is an interactive schematic diagram of another method for authenticating an identity of an Internet of Things device according to an embodiment of this application.
  • FIG. 6 is an interactive schematic diagram of another method for authenticating an identity of an Internet of Things device according to an embodiment of this application.
  • FIG. 7 is an interactive schematic diagram of another identity authentication method for Internet of Things devices according to an embodiment of this application.
  • FIG. 8 is a schematic block diagram of a network device provided in an embodiment of this application.
  • FIG. 9 is a schematic block diagram of a communication device provided in an embodiment of this application.
  • FIG. 10 is a schematic block diagram of an Internet of Things device provided in an embodiment of this application.
  • FIG. 11 is a schematic block diagram of another communication device provided in an embodiment of this application.
  • the embodiment of this application aims to solve the problem that in the existing solution, when the drone is authenticated, it is necessary to authenticate the drone through multiple different departments.
  • the drone cloud system performs authentication of the user of the drone. And authentication, etc., lead to the problem of low convenience in UAV authentication.
  • a unified network unit can be used to authenticate UAVs, thereby improving the efficiency of UAV authentication.
  • GSM Global System for Mobile Communications, global mobile communication system
  • CDMA Code Division Multiple Access, code division multiple access
  • UDM Unified Data Management, unified data management
  • AMF Access and Mobility Management Function, mobile management function
  • SMF Session Management Function, session management function
  • UCF UAS Control Function, drone control function unit
  • NEF Network Exposure Function, network opening function
  • IMSI International Mobile Subscriber Identity, global mobile subscriber identity
  • LTE Long Term Evolution , Long-term evolution
  • UAV Unmanned Aerial Vehicle, unmanned aircraft/drone
  • UAS Unmanned Aircraft System, unmanned aircraft system.
  • the Internet of Things (IoT) devices involved in the embodiments of the present application.
  • the Internet of Things devices can be drones, drone controllers, and other Internet of Things terminal devices that need to be connected to the mobile network.
  • the Internet of Things devices can also be robots, Internet of Vehicles devices, and so on.
  • FIG. 1 provides a schematic diagram of the architecture of a 5G system according to an embodiment of the present application.
  • the 5G system includes: Internet of Things equipment, mobile management network element AMF, unified data management network element UDM, network open function network element NEF, and drone control function unit UCF.
  • the first network unit may be AMF , UDM or UCF
  • the second network unit can be UDM
  • the IoT device sends a registration request to the first network unit through interface N1 or interface N2
  • the registration request carries the first identity
  • the first identity can be a global mobile user subscription
  • the first network unit obtains the second identity from the second network unit and obtains the third identity from the Internet of Things device.
  • the first network unit compares the third identity with the second identity.
  • the identity is authenticated, and the authentication result is obtained. Therefore, compared with the existing scheme, when authenticating drones, it is necessary to authenticate the Internet of Things devices through multiple related network units.
  • a unified network unit can be used to authenticate the drones, thereby improving the The efficiency of drones for identity authentication and reduces the risk of attacks on the application layer.
  • FIG. 2A is an interactive schematic diagram of an identity authentication method for an Internet of Things device according to an embodiment of the present application.
  • the identity authentication method includes steps S201-S207, which are specifically as follows:
  • S201 The Internet of Things device sends a registration request, and the registration request carries a first identity.
  • the registration request carries the first identity of the Internet of Things device, and the first identity is an identity that can uniquely identify the Internet of Things device.
  • the first network unit After receiving the registration request, the first network unit determines whether the device type obtained according to the first identity identifier is a preset device type.
  • the preset device type is a device type pre-configured for the Internet of Things device, and the device type corresponds to the Internet of Things device.
  • the first network unit sends a first identity information acquisition request to the second network unit, and the first identity information acquisition request carries the first identity identifier.
  • the first identity information acquisition request is used to request to acquire the second identity identifier from the second network unit.
  • the second network unit After receiving the first identity information acquisition request, the second network unit obtains the second identity in its own memory according to the first identity.
  • the first network unit After receiving the first identity information acquisition response, the first network unit stores the second identity identifier carried in the first identity information acquisition response.
  • the first network unit sends a second identity information acquisition request to the Internet of Things device, where the second identity information acquisition request carries an indication requesting to report the device type and identity information.
  • the second identity information acquisition request may carry the specified device type and carry an indication requesting the IoT device to report the device type and identity information.
  • the Internet of Things device sends a second identity information acquisition response to the first network unit according to the second identity information acquisition request, and the second identity information acquisition response carries the third identity identifier.
  • the Internet of Things device After the Internet of Things device receives the second identity information acquisition request, when it determines that the specified device type carried in the second identity information is the device configuration device type of the Internet of Things device, it will report the device type and identity identification information according to the instructions of the request for the Internet of Things device to report the device type and identity information. Sending a second identity information acquisition response to the first network unit to report the third identity.
  • the first network unit authenticates the third identity according to the second identity, and obtains an authentication result.
  • the first network unit When the first network unit authenticates the third identity according to the second identity, it can directly compare the second identity with the third identity to obtain the authentication result.
  • the first network unit after receiving the registration request sent by the Internet of Things device, the first network unit obtains the device type according to the first identity, and if the device type is the preset device type, obtains the second identity from the second network unit , Obtain the third identity from the Internet of Things device, authenticate the third identity through the second identity, and get the authentication result.
  • the identity authentication of the Internet of Things devices can use a unified network unit to authenticate the identity of the drone, thereby improving the efficiency of the identity authentication of the drone.
  • the second identity can be directly obtained from its own memory without sending the corresponding identity Information acquisition request.
  • FIG. 2B is an interactive schematic diagram of another method for authentication of an Internet of Things device according to an embodiment of the present application.
  • the first network unit is UDM and the Internet of Things device is UAV as an example for description.
  • the identity authentication method includes steps S211-S215, which are specifically as follows:
  • the drone sends a registration request, and the registration request carries the first identity.
  • the drone sends a registration request to AMF through the access network.
  • the registration request includes the first identity.
  • the AMF extracts the first identity and sends a drone registration request to UDM.
  • the machine registration request carries the first identity.
  • the access network transparently transmits the registration request.
  • the access network can all be understood as transparent transmission of messages.
  • the first identity identifier may be a global mobile user subscription identifier IMSI, or may be another identifier that can uniquely identify the identity information of the drone on the network side.
  • the UDM After receiving the registration request, the UDM determines that the device type obtained according to the first identity is the preset device type, then obtains the second identity.
  • the UDM can obtain the second identity directly from its own memory according to the first identity.
  • the second identity identifier includes a physical identifier, an access identifier, and/or extended information.
  • the preset device types include drones and so on.
  • the UDM sends a second identity information acquisition request to the drone, and the second identity information acquisition request carries an indication requesting to report the device type and identity information.
  • UDM forwards the second identity information acquisition request to the drone by the AMF.
  • the message format of the second identity information acquisition request sent by the UDM to the AMF and the second identity information acquisition request sent by the AMF to the drone may be different.
  • the second identity information acquisition request sent by the UDM to the AMF may be a device access request (Device Acquisition Request)
  • the second identity information acquisition request forwarded by the AMF to the drone may be an identity request (Identity Request).
  • the second identity information acquisition request may carry the specified device type and carry an indication requesting the IoT device to report the device type and identity information.
  • the second identity information acquisition request includes an instruction to request the drone to report the device type and identity information.
  • the drone sends a second identity information acquisition response to the UDM according to the second identity information acquisition request, and the second identity information acquisition response carries the third identity identifier.
  • the drone After the drone receives the second identity information acquisition request, it first judges the specified device type carried in the second identity information. If the device type is the configuration device type of the Internet of Things device (drone), it will be based on the second The instruction to report the identity information carried in the identity information, obtain the third identity of the drone, after obtaining the third identity, send the second identity information acquisition response to UDM, and report through the second identity information acquisition response The third identity identifier; if the device type is not the configuration device type of the IoT device, send a second identity information acquisition failure response to the UDM.
  • the Internet of Things device here is a drone, and the device type configured for the Internet of Things device is a drone.
  • the third identity identifier includes a physical identifier, an access identifier, and/or extended information.
  • the drone When the drone can send the second identity information acquisition response to the UDM, it can forward the second identity acquisition response to the UDM through the AMF.
  • the AMF forwards the second identity acquisition response to UDM.
  • a standardized UAV identity information transmission format can be used, and the standardized UAV identity information transmission format is formulated by 3GPP.
  • the second identity information acquisition response sent by the drone to the AMF may be a 3GPP 24.301 protocol IDENTITY RESPONSE message.
  • IDENTITY RESPONSE message a device physical identification field and a device access identification field are added.
  • other methods can also be used to transmit the third identity identifier, which is only an example for illustration, and no specific limitation is made.
  • the UDM authenticates the third identity according to the second identity, and obtains an authentication result.
  • the UDM When the UDM authenticates the third identity according to the second identity, it can directly compare the second identity with the third identity to obtain the authentication result.
  • the UDM after receiving the registration request sent by the Internet of Things device, the UDM obtains the device type according to the first identity. If the device type is the preset device type, it obtains the second identity from its own memory and obtains the second identity from the device. The networked device obtains the third identity, authenticates the third identity through the second identity, and obtains the authentication result. Compared with the existing scheme, when the drone is authenticated, multiple related network units are required to connect to the Internet of Things. The device performs identity authentication, and can use a unified network unit (UDM) to authenticate the drone, thereby improving the efficiency of identity authentication for the drone.
  • UDM unified network unit
  • the authentication result can be:
  • the second identity and the third identity are exactly the same;
  • the second identity is the same as the third identity
  • the second identity is completely different from the third identity.
  • the above authentication result can directly reflect the relationship between the second identity identifier and the third identity identifier, and the authentication relationship can be determined more conveniently.
  • the identity request when the second identity information acquisition request sent by AMF to the drone may be an identity request (Identity Request), the identity request may be a 3GPP protocol IDENTITY REQUEST message, in which the message is added The device type field and the device identification index field, and the device type field is used to identify the device type.
  • FIG. 2C provides a schematic diagram of a transmission format of identity information of an Internet of Things device according to an embodiment of the present application.
  • CC Country Code, mobile network country code (China, 086);
  • IoT device type such as UAV, Robot, Car,...;
  • SN Subscriber Number, contract serial number, including product model authorization and product serial number;
  • CT Communication Type, communication type, enumeration value: NONE, Cellular-network, WIFI,...;
  • CIC Communication Identification Code, communication equipment identification code, such as IMEI, MAC_ADRR,...;
  • Extended reservation such as: operator identification (IMSI), flight controller identification, manufacturer serial number, key;
  • TS (optional): Timestamp, time stamp, format: YYYYMMDD.
  • preconditions can also be set to write the relevant identity information of the IoT device before the IoT device is used.
  • the backup of the relevant network unit can refer to the existing backup plan.
  • the precondition setting mainly involves the following contents:
  • the User Identity Register message is a registration message between UDM and NEF.
  • FIG. 3 is an interactive schematic diagram of another method for authenticating an identity of an Internet of Things device according to an embodiment of the present application. As shown in Fig. 3, steps S301-S307 are included, which are specifically as follows:
  • the drone sends a registration request, and the registration request carries the first identity.
  • the UDM After receiving the registration request, the UDM determines that the device type obtained according to the first identity is the preset device type, then obtains the second identity.
  • the UDM sends a second identity information acquisition request to the drone, and the second identity information acquisition request carries an indication requesting to report the device type and identity information.
  • the drone sends a second identity information acquisition response to the UDM according to the second identity information acquisition request, and the second identity information acquisition response carries the third identity identifier.
  • the UDM authenticates the third identity according to the second identity, and obtains an authentication result.
  • the UDM sends a device access notification or access alarm to the third network unit.
  • the third network unit includes NEF.
  • the third network unit is NEF as an example for description.
  • UDM sends a device access notification or access alarm to NEF according to the authentication result, which can be specifically: when the authentication result is that the second identity and the third identity are exactly the same, UDM sends a device access notification to NEF; when the authentication result is The second identity and the third identity are partly the same, and the second identity and the third identity are completely different, and the UDM sends a device access alarm to the NEF.
  • the access notification and the access alarm can be preset text messages, voice messages, etc.
  • the third network unit sends a device access notification or access alarm to the UAV cloud or related departments.
  • NEF After NEF receives the device access notification or access alarm, it sends the device access notification or access alarm to the UAV cloud.
  • the UAV cloud is used to authenticate and authenticate users who are usually used to use UAVs.
  • the relevant departments include, for example, the government and other departments. Specifically, they may be, for example, the Ministry of Industry and Information Technology, the Civil Aviation Administration of China, etc.
  • FIG. 4 is an interactive schematic diagram of another method for authenticating an identity of an Internet of Things device according to an embodiment of the present application.
  • the first network unit is UCF and the Internet of Things device is UAV as an example for description.
  • the identity authentication method includes steps S401-S407, which are specifically as follows:
  • the drone sends a registration request, and the registration request carries the first identity.
  • the drone When the drone sends a registration request, it can send a registration request to UCF through the access network and AMF. After the AMF receives the registration request sent by the drone, it can also send the registration request to the UDM.
  • the AMF After the specific manner of sending the registration request, reference may be made to the specific manner of step S211 described above, which will not be repeated here.
  • the UCF After receiving the registration request, the UCF judges whether the device type obtained according to the first identity identifier is a preset device type.
  • the UCF sends a first identity information acquisition request to the UDM, and the first identity acquisition request carries the first identity identifier.
  • the UDM After the UDM receives the first identity information acquisition request, it obtains the second identity according to the first identity in its own memory.
  • the UCF After receiving the first identity information acquisition response, the UCF stores the second identity identifier carried in the first identity information acquisition response.
  • the UCF sends a second identity information acquisition request to the drone, and the second identity information acquisition request carries an indication requesting to report the device type and identity information.
  • S406 The drone sends a second identity information acquisition response to the UCF according to the second identity information acquisition request, and the second identity information acquisition response carries the third identity identifier.
  • the UCF authenticates the third identity according to the second identity, and obtains an authentication result.
  • steps S403, S404 and steps S405, S406 have no order of execution.
  • step S402 please refer to the specific implementation of the aforementioned step S212, and the specific implementation of the steps S405-S407 can refer to the specific implementation of the aforementioned steps S213-S215. I won't repeat them here.
  • UCF after receiving the registration request sent by the drone, UCF obtains the device type according to the first identity. If the device type is the preset device type, it obtains the second identity from UDM and the Internet of Things device The third identity, the third identity is authenticated through the second identity, and the authentication result is obtained.
  • a unified network unit UDM can be used to authenticate the drone, thereby improving the efficiency of the drone.
  • the UCF may also send a device access notification or access alarm to the third network unit.
  • FIG. 5 is an interactive schematic diagram of another method for authenticating an identity of an Internet of Things device according to an embodiment of the present application. As shown in Figure 5, steps S501-S509 are included, which are specifically as follows:
  • the drone sends a registration request, and the registration request carries a first identity.
  • the drone When the drone sends a registration request, it can send a registration request to UCF through the access network and AMF. After the AMF receives the registration request sent by the drone, it can also send the registration request to the UDM.
  • the AMF After the specific manner of sending the registration request, reference may be made to the specific manner of step S211 described above, which is not repeated here.
  • the UCF judges whether the device type obtained according to the first identity identifier is a preset device type.
  • the UCF sends a first identity information acquisition request to the UDM, and the first identity information acquisition request carries the first identity identifier.
  • the UDM After the UDM receives the first identity information acquisition request, it obtains the second identity according to the first identity in its own memory.
  • the UCF After receiving the first identity information acquisition response, the UCF stores the second identity identifier carried in the first identity information acquisition response.
  • the UCF sends a second identity information acquisition request to the drone, and the second identity information acquisition request carries an indication requesting to report the device type and identity information.
  • the drone sends a second identity information acquisition response to the UCF according to the second identity information acquisition request, and the second identity information acquisition response carries the third identity identifier.
  • the UCF authenticates the third identity according to the second identity, and obtains an authentication result.
  • the UCF sends a device access notification or access alarm to the third network element.
  • the third network unit includes NEF.
  • the third network unit is NEF as an example for description.
  • UCF sends a device access notification or access alarm to NEF according to the authentication result, which can be specifically as follows: when the authentication result is that the second identity and the third identity are exactly the same, UCF sends a device access notification to NEF; when the authentication result is The second identity and the third identity are partly the same, and the second identity and the third identity are completely different, and the UCF sends a device access alarm to the NEF.
  • the access notification and the access alarm can be preset text messages, voice messages, etc.
  • the third network unit sends a device access notification or access alarm to the UAV cloud or related departments.
  • NEF After NEF receives the device access notification or access alarm, it sends the device access notification or access alarm to the UAV cloud.
  • FIG. 6 is an interactive schematic diagram of another method for authenticating an identity of an Internet of Things device according to an embodiment of the present application.
  • the first network unit is an AMF and the Internet of Things device is a drone as an example for description.
  • the identity authentication method includes steps S601-S607, and the specific implementation can refer to steps S401- The implementation of S407 will not be repeated here.
  • the AMF may also send a device access notification or access alarm to the third network unit.
  • FIG. 7 is an interactive schematic diagram of another method for authenticating an identity of an Internet of Things device according to an embodiment of the present application. As shown in FIG. 7, steps S701-S709 are included. For specific implementation manners, reference may be made to the implementation manners of steps S501-S509, which will not be repeated here.
  • FIG. 8 is a schematic block diagram of a network device 800 provided by an embodiment of the application.
  • the network device 800 includes: a transceiver unit 810 and a processing unit 820, wherein,
  • the transceiver unit 810 is configured to receive a registration request sent by the Internet of Things device, where the registration request includes the first identity;
  • the processing unit 820 is configured to determine whether the device type acquired according to the first identity identifier is a preset device type, and if so, the first network unit sends a first identity information acquisition request to the second network unit, and sends a second identity information acquisition request to the Internet of Things device.
  • Identity information acquisition request ;
  • the transceiver unit 810 is configured to receive a first identity information acquisition response sent by a second network unit, where the first identity information acquisition response carries a second identity identifier, and the first network unit receives the second identity information acquisition response sent by the Internet of Things device. 2.
  • the identity information acquisition response carries a third identity;
  • the processing unit 820 is configured to authenticate the third identity according to the second identity, and obtain an authentication result.
  • the authentication result includes:
  • the second identity and the third identity are exactly the same;
  • the second identity is the same as the third identity
  • the second identity is completely different from the third identity.
  • the transceiver unit 810 is further configured to:
  • the third network unit includes a network opening function.
  • the first identity includes a global mobile user subscription identity
  • the second identity and the third identity include a physical identity, an access identity, and/or extended information.
  • the network device obtains the device type from the second network unit.
  • the network device includes: a mobile management function, a unified data management, or a drone control function; the second network unit includes a unified data management.
  • the third identity acquisition request includes an indication requesting the IoT device to report the device type and identity information.
  • an embodiment of the present application further provides a communication device 900.
  • the communication device 900 includes a processor 910, a memory 920, and a transceiver 930.
  • the memory 920 stores instructions or programs
  • the processor 910 is configured to execute Instructions or programs stored in the memory 920.
  • the processor 910 is configured to perform the operations performed by the processing unit 820 in the foregoing embodiment
  • the transceiver 930 is configured to perform the operations performed by the transceiver unit 810 in the foregoing embodiment.
  • the network device 800 or the communication device 900 may correspond to the network device in the communication system of the embodiment of the present application, and the operations and/or functions of each module in the network device 800 or the communication device 900 are respectively In order to implement the corresponding procedures of the methods in FIGS. 2A to 7, for the sake of brevity, details are not described herein again.
  • FIG. 10 is a schematic block diagram of an Internet of Things device 1000 provided by an embodiment of the application.
  • the Internet of Things device 1000 includes: a sending unit 1010 and a receiving unit 1020, where,
  • the sending unit 1010 is configured to send a registration request to the first network unit, where the registration request includes the first identity;
  • the receiving unit 1020 is configured to receive the second identity information acquisition request sent by the first network unit. If the second identity information acquisition request carries an instruction to request the IoT device to report the device type and identity information, the IoT device passes the request to the first network unit. The network unit reports the third identity by sending the second identity information acquisition response.
  • the third identity identifier includes a physical identifier, a device access identifier, and/or extended information.
  • an embodiment of the present application further provides a communication device 1100.
  • the communication device 1100 includes a processor 1110, a memory 1120, and a transceiver 1130.
  • the memory 1120 stores instructions or programs, and the processor 1110 is used to execute Instructions or programs stored in the memory 1120.
  • the processor 1110 is used to perform the operations performed by the receiving unit 1020 in the foregoing embodiment
  • the transceiver 1130 is used to perform the operations performed by the sending unit 1010 and the receiving unit 1020 in the foregoing embodiment .
  • the Internet of Things device 1000 or the communication device 1100 may correspond to the Internet of Things device in the communication method of the embodiment of the present application, and the operation of each module in the Internet of Things device 1000 or the communication device 1100 is /Or the function is to realize the corresponding process of each method in FIG. 2A to FIG. 7 respectively, for the sake of brevity, it will not be repeated here.
  • the embodiment of the present application also provides a computer-readable storage medium on which a computer program is stored.
  • the program When the program is executed by a processor, it can realize the communication device-related information in the method for authenticating the identity of the Internet of Things device provided in the above method embodiment. Process.
  • the embodiment of the present application also provides a communication device, and the communication device may be a terminal device or a circuit.
  • the communication device may be used to perform the actions performed by the Internet of Things terminal in the foregoing method embodiments.
  • a computer-readable storage medium is provided, and an instruction is stored thereon.
  • the instruction is executed, the method on the IoT device side in the foregoing method embodiment is executed.
  • a computer program product containing instructions is provided, and when the instructions are executed, the method on the IoT terminal side in the foregoing method embodiment is executed.
  • a computer-readable storage medium is provided, and an instruction is stored thereon.
  • the instruction is executed, the method on the network device side in the foregoing method embodiment is executed.
  • a computer program product containing instructions is provided, and when the instructions are executed, the method on the network device side in the foregoing method embodiment is executed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种物联网设备的身份标识认证方法、相关装置及通信系统,其中,该方法包括:第一网络单元接收物联网设备发送的注册请求;第一网络单元判断根据第一身份标识获取的设备类型是否为预设设备类型,若是则第一网络单元发送第一身份信息获取请求,以及发送第二身份信息获取请求;第一网络单元接收第二网络单元发送的第一身份信息获取响应,第一身份信息获取响应携带第二身份标识,第一网络单元接收物联网设备发送的第二身份信息获取响应,第二身份信息获取响应携带第三身份标识;第一网络单元根据第二身份标识对第三身份标识进行认证,得到认证结果。通过统一的网络单元对无人机认证,提升了认证时的便捷性。

Description

物联网设备的身份标识认证方法、相关装置及系统
本申请要求于2019年09月30日提交中国专利局、申请号为201910961587.5、申请名称为“物联网设备的身份标识认证方法、相关装置及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种物联网设备的身份标识认证方法、相关装置及系统。
背景技术
目前无人机(Unmanned Aerial Vehicle,UAV)的身份标识的发放和管理主要由各国的生产制造部门和民航部门自定义,如国内的工信部和民航局。3GPP 22.125中提到,“3GPP(第三代合作伙伴计划,3rd Generation Partnership Project)系统应使UAS能够基于应用于UAS的不同认证和授权级别向无人驾驶航空器交通管理(Unmanned Aircraft System Traffic Management,UTM)发送不同的无人驾驶航空器系统(Unmanned Aircraft System,UAS)数据”,并指出“根据区域规定,不同的认证和授权级别可以是:初始网络接入物理设备认证和鉴权,UAS拥有者身份认证和鉴权;无人机飞行计划申请与授权;附加UTM运行服务认证和授权,如飞行监控,防撞服务等”。
无人机的身份标识的认证与管理涉及使用前和使用时,使用前主要是完成无人机身份标识信息的备案与登记,使用时主要时完成无人机相关身份标识的鉴权和认证。
无人机的身份标识管理时,由不同的单位完成对应的认证和鉴权,例如,无人机的生产备案管理单位是工信部,由工信部相关部门完成生产设备信息鉴权和认证;无人机的飞行前运营管理单位是民航局,由民航局完成无人机拥有者与运营人的鉴权和认证;无人机的使用中的运营服务单位是无人机云系统,因此需要由无人机云系统完成无人机的鉴权和认证,某些场景无人机云系统还要配合民航局完成对飞行计划、使用人、飞行任务等再次进行认证;与此同时,无人机接入移动运营商网络时候还要进行一次接入鉴权和认证,因此,导致了对无人机进行认证时的便捷性较低。
发明内容
本申请实施例提供一种物联网设备的身份标识认证方法、相关装置及通信系统,可以采用统一的网络单元对无人机进行认证,从而提升了无人机认证的便捷性,并且降低了对应用层的攻击风险。同时本发明也可以应用到其他物联网设备的认证与授权。
第一方面,本申请实施例提供一种物联网设备的身份标识认证方法,所述方法包括:
第一网络单元接收物联网设备发送的注册请求,所述注册请求包括第一身份标识;
所述第一网络单元判断根据所述第一身份标识获取的设备类型是否为预设设备类型,若是则所述第一网络单元向第二网络单元发送第一身份信息获取请求,以及向所述物联网设备发送第二身份信息获取请求;
所述第一网络单元接收所述第二网络单元发送的第一身份信息获取响应,所述第一身份信息获取响应携带第二身份标识,所述第一网络单元接收所述物联网设备发送的第二身份信息获取响应,所述第二身份信息获取响应携带第三身份标识;
所述第一网络单元根据所述第二身份标识对所述第三身份标识进行认证,得到认证结果。
上述实施例中,第一网络单元在接收到物联网设备发送的注册请求后,根据第一身份标识获取设备类型,若该设备类型为预设设备类型,则从第二网络单元获取第二身份标识、从物联网设备获取第三身份标识,通过第二身份标识对第三身份标识进行认证,得到认证结果,相对于现有方案中,对无人机进行认证时,需要通过多个相关网络单元对物联网设备进行身份认证,能够采用统一的网络单元对无人机进行身份认证,从而提升了对无人机进行身份认证时的效率。
结合第一方面,在第一方面的一种可能的实现方式中,所述认证结果包括:
所述第二身份标识和第三身份标识完全相同;
所述第二身份标识和第三身份标识部分相同;
所述第二身份标识和第三身份标识完全不同。
结合第一方面,在第一方面的一种可能的实现方式中,所述方法还包括:
所述第一网络单元根据所述认证结果向第三网络单元发送设备接入通知或接入告警。
本示例中,第一网络单元在获得认证结果后,根据认证结果向第三网络单元发送设备接入通知或接入告警,能够通知第三网络单元对物联网设备进行身份认证的结果,第三网络单元可以基于该接入通知或接入告警而做出相应的操作,从而提升了对无人机身份管理时的全面性。
可选的,所述第三网络单元包括网络开放功能。
结合第一方面,在第一方面的一种可能的实现方式中,所述第一身份标识包括全球移动用户签约标识,所述第二身份标识和所述第三身份标识包括物理标识、接入标识和/或扩展信息。
可选的,所述第一网络单元从所述第二网络单元获取所述设备类型。
本示例中,从第二网络单元中获取设备类型,可以从可信的第三方设备中获取到设备类型,从而提升了设备类型获取时的安全性和可靠性。
结合第一方面,在第一方面的一种可能的实现方式中,所述第一网络单元可为移动管理功能、统一数据管理或无人机控制功能;所述第二网络单元可为统一数据管理。
结合第一方面,在第一方面的一种可能的实现方式中,所述第二身份获取请求包括物联网设备上报设备类型和身份标识信息指示。
第二方面,本申请实施例提供一种物联网设备的身份标识认证方法,所述方法包括:
物联网设备向第一网络单元发送的注册请求,所述注册请求包括第一身份标识;
物联网设备接收所述第一网络单元发送的第二身份信息获取请求,若所述第二身份信息获取请求携带所述物联网设备上报设备类型和身份标识信息指示,则所述物联网设备通过向所述第一网络单元发送第二身份信息获取响应的方式上报第三身份标识。
结合第二方面,在第二方面的一种可能的实现方式中,所述第三身份标识包括物理标 识、设备接入标识和/或扩展信息。
第三方面,本申请实施例提供一种网络装置,所述设备包括:
收发单元,用于接收物联网设备发送的注册请求,所述注册请求包括第一身份标识;
处理单元,用于判断根据所述第一身份标识获取的设备类型是否为预设设备类型,若是则所述第一网络单元向第二网络单元发送第一身份信息获取请求,以及向所述物联网设备发送第二身份信息获取请求;
所述收发单元,用于接收所述第二网络单元发送的第一身份信息获取响应,所述第一身份信息获取响应携带第二身份标识,所述第一网络单元接收所述物联网设备发送的第二身份信息获取响应,所述第二身份信息获取响应携带第三身份标识;
所述处理单元,用于根据所述第二身份标识对所述第三身份标识进行认证,得到认证结果。
结合第三方面,在第三方面的一种可能的实现方式中,所述认证结果包括:
所述第二身份标识和第三身份标识完全相同;
所述第二身份标识和第三身份标识部分相同;
所述第二身份标识和第三身份标识完全不同。
结合第三方面,在第三方面的一种可能的实现方式中,所述收发单元还用于:
根据所述认证结果向第三网络单元发送设备接入通知或接入告警。
可选的,所述第三网络单元包括网络开放功能。
结合第三方面,在第三方面的一种可能的实现方式中,所述第一身份标识包括全球移动用户签约标识,所述第二身份标识和所述第三身份标识包括物理标识、接入标识和/或扩展信息。
可选的,所述网络装置从所述第二网络单元获取所述设备类型。
结合第三方面,在第三方面的一种可能的实现方式中,所述网络装置包括:移动管理功能、统一数据管理或无人机控制功能;所述第二网络单元包括统一数据管理。
结合第三方面,在第三方面的一种可能的实现方式中,所述第三身份获取请求包括请求物联网设备上报设备类型和身份标识信息的指示。
第四方面,本申请实施例提供一种物联网设备,所述设备包括:
发送单元,用于向第一网络单元发送的注册请求,所述注册请求包括第一身份标识;
接收单元,用于接收所述第一网络单元发送的第二身份信息获取请求,若所述第二身份信息获取请求携带请求所述物联网设备上报设备类型和身份标识信息的指示,则所述物联网设备通过向所述第一网络单元发送第二身份信息获取响应的方式上报第三身份标识。
结合第四方面,在第四方面的一种可能的实现方式中,所述第三身份标识包括物理标识、设备接入标识和/或扩展信息。
第五方面,本申请实施例提供一种通信系统,该通信系统包括上述第三方面所述的网络装置和上述第四方面所述的物联网设备。
第六方面,本申请实施例提供一种计算可读机存储介质,该计算机可读存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时使所述处 理器执行如第一方面和第二方面所示的全部或者部分方法。
本申请的这些方面或其他方面在以下实施例的描述中会更加简明易懂。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请实施例提供了一种5G系统的架构示意图;
图2A为本申请实施例提供了一种物联网设备的身份标识认证方法的交互示意图;
图2B为本申请实施例提供了另一种物联网设备的身份标识认证方法的交互示意图;
图2C为本申请实施例提供了一种物联网设备身份标识信息传输格式的示意图;
图3为本申请实施例提供了另一种物联网设备的身份标识认证方法的交互示意图;
图4为本申请实施例提供了另一种物联网设备的身份标识认证方法的交互示意图;
图5为本申请实施例提供了另一种物联网设备的身份标识认证方法的交互示意图;
图6为本申请实施例提供了另一种物联网设备的身份标识认证方法的交互示意图;
图7为本申请实施例提供了另一种物联网设备的身份标识认证方法的交互示意图;
图8为本申请实施例提供了一种的网络装置的示意性框图;
图9为本申请实施例提供了一种通信装置的示意性框图;
图10为本申请实施例提供了一种物联网设备的示意性框图;
图11为本申请实施例提供了另一种通信装置的示意性框图。
具体实施方式
下面结合附图对本申请的实施例进行描述。
本申请实施例旨在解决现有方案中,对无人机进行认证时,需要通过多个不同的部门进行无人机的认证,例如无人机云系统对无人机执行使用人的鉴权和认证等,导致无人机认证时的便捷性较低的问题,本方案中,能够采用统一的网络单元对无人机进行身份认证,从而提升了对无人机进行身份认证时的效率。
下面首先对本申请中使用到的术语进行解释说明。
本申请实施例中将会使用到如下缩略语:GSM、CDMA、UDM、AMF、SMF、NEF、IMSI、LTE、UAV、UAS。其中,GSM:Global System for Mobile Communications,全球移动通信系统;CDMA:Code Division Multiple Access,码分多址;UDM:Unified Data Management,统一数据管理;AMF:Access and Mobility Management Function,移动管理功能;SMF:Session Management Function,会话管理功能;UCF:UAS Control Function,无人机控制功能单元;NEF:Network Exposure Function,网络开放功能;IMSI:International Mobile Subscriber Identity,全球移动用户签约标识;LTE:Long Term Evolution,长期演进;UAV:Unmanned Aerial Vehicle,无人驾驶航空器/无人机;UAS:Unmanned Aircraft System, 无人驾驶航空器系统。
本申请实施例中涉及的物联网(internet of things,IoT)设备。物联网设备可以是无人机、无人机控制器、等其他需要接入移动网络的物联网终端设备。物联网设备还可以是机器人、车联网设备等。
为了更好的理解本申请实施例提供的物联网设备的身份标识认证方法,下面首先对应用物联网设备的身份标识认证方法的5G系统进行简要介绍。请参阅图1,图1为本申请实施例提供了一种5G系统的架构示意图。如图1所示,该5G系统包括:物联网设备、移动管理网元AMF、统一数据管理网元UDM、网络开放功能网元NEF和无人机控制功能单元UCF,第一网络单元可以是AMF、UDM或UCF,第二网络单元可以是UDM,物联网设备通过接口N1或接口N2向第一网络单元发送注册请求,该注册请求携带第一身份标识,第一身份标识可以是全球移动用户签约标识等,第一网络单元接收到注册请求后,从第二网络单元处获取第二身份标识以及从该物联网设备处获取第三身份标识,第一网络单元根据该第二身份标识对第三身份标识进行认证,得到认证结果。因此,相对于现有方案中,对无人机进行认证时,需要通过多个相关网络单元对物联网设备进行身份认证,能够采用统一的网络单元对无人机进行身份认证,从而提升了对无人机进行身份认证时的效率,并且降低了对应用层的攻击风险。
请参阅图2A,图2A为本申请实施例提供了一种物联网设备的身份标识认证方法的交互示意图。如图2A所示,身份认证方法包括步骤S201-S207,具体如下:
S201、物联网设备发送注册请求,注册请求携带第一身份标识。
物联网设备发送注册请求时,注册请求中携带物联网设备的第一身份标识,第一身份标识为可以唯一标识物联网设备的标识。
S202、第一网络单元收到注册请求后,判断根据第一身份标识获取的设备类型是否为预设设备类型。
预设设备类型为预先为物联网设备配置的设备类型,该设备类型与物联网设备相对应。
S203、若根据第一身份标识获取的设备类型为预设设备类型,第一网络单元向第二网络单元发送第一身份信息获取请求,第一身份信息获取请求携带第一身份标识。
第一身份信息获取请求用于请求从第二网络单元处获取第二身份标识。
S204、第二网络单元向第一网络单元发送的第一身份信息获取响应,第一身份信息获取响应携带第二身份标识。
第二网络单元收到第一身份信息获取请求后,根据第一身份标识在自身的内存获得第二身份标识。
第一网络单元收到第一身份信息获取响应后,存储第一身份信息获取响应携带的第二身份标识。
S205、第一网络单元向物联网设备发送第二身份信息获取请求,第二身份信息获取请求携带请求上报设备类型和身份标识信息的指示。
第二身份信息获取请求中可以携带指定设备类型和携带请求物联网设备上报设备类型和身份标识信息的指示。
S206、物联网设备根据第二身份信息获取请求,向第一网络单元发送第二身份信息获 取响应,第二身份信息获取响应携带第三身份标识。
物联网设备收到第二身份信息获取请求后,在判断出第二身份信息中携带的指定设备类型为该物联网设备配置设备类型时,根据请求物联网设备上报设备类型和身份标识信息的指示,向第一网络单元发送第二身份信息获取响应以上报第三身份标识。
S207、第一网络单元根据第二身份标识对第三身份标识进行认证,得到认证结果。
第一网络单元根据第二身份标识对第三身份标识进行认证时,可以直接将第二身份标识与第三身份标识进行比对,从而得到认证结果。
本示例中,第一网络单元在接收到物联网设备发送的注册请求后,根据第一身份标识获取设备类型,若该设备类型为预设设备类型,则从第二网络单元获取第二身份标识、从物联网设备获取第三身份标识,通过第二身份标识对第三身份标识进行认证,得到认证结果,相对于现有方案中,对无人机进行认证时,需要通过多个相关网络单元对物联网设备进行身份认证,能够采用统一的网络单元对无人机进行身份认证,从而提升了对无人机进行身份认证时的效率。
需要说明的是,若第一网络单元为UDM时,第一网络单元和第二网络单元为同一个网络单元,则可以直接从自身的内存中获取到第二身份标识,而无需发送对应的身份信息获取请求。
请参阅图2B,图2B为本申请实施例提供了另一种物联网设备的身份标识认证方法的交互示意图。本实施例中,以第一网络单元为UDM、物联网设备为无人机为例进行说明,如图2B所示,身份标识认证方法包括步骤S211-S215,具体如下:
S211、无人机发送注册请求,注册请求携带第一身份标识。
其中,无人机通过接入网向AMF发送注册请求,该注册请求包括第一身份标识,AMF收到注册请求后,提取第一身份标识,并向UDM发送无人机注册请求,该无人机注册请求中携带第一身份标识。无人机通过接入网发送注册请求时,接入网透传该注册请求。本申请实施例中接入网均可以理解为对消息进行透传。
第一身份标识可以为全球移动用户签约标识IMSI,也可以是其它可以在网络侧唯一标识无人机身份信息的标识。
S212、UDM收到注册请求后,若判断出根据第一身份标识获取的设备类型为预设设备类型,则获取第二身份标识。
其中,UDM可以从直接从自身的内存中根据第一身份标识获取到第二身份标识。第二身份标识包括物理标识、接入标识和/或扩展信息。
预设设备类型包括无人机等。
S213、UDM向无人机发送第二身份信息获取请求,第二身份信息获取请求携带请求上报设备类型和身份标识信息的指示。
其中,UDM由AMF转发第二身份信息获取请求给无人机。在进行第二身份信息获取请求转发时,UDM向AMF发送的第二身份信息获取请求和AMF向无人机发送的第二身份信息获取请求的消息制式可以不同。例如,UDM向AMF发送的第二身份信息获取请求可以为设备接入请求(Device Acquire Request),AMF向无人机转发的第二身份信息获取请求可以为身份请求(Identity Request)。
第二身份信息获取请求中可以携带指定设备类型和携带请求物联网设备上报设备类型和身份标识信息的指示。
第二身份信息获取请求包括请求无人机上报设备类型和身份标识信息的指示。
S214、无人机根据第二身份信息获取请求,向UDM发送第二身份信息获取响应,第二身份信息获取响应携带第三身份标识。
无人机在接收到第二身份信息获取请求后,先判断该第二身份信息中携带的指定的设备类型,若设备类型是该物联网设备(无人机)配置设备类型,则根据第二身份信息中携带的上报身份标识信息的指示,获取无人机的第三身份标识,在获取到第三身份标识后,向UDM发送第二身份信息获取响应,通过第二身份信息获取响应来上报第三身份标识;若设备类型不是该物联网设备配置设备类型,则向UDM发送第二身份信息获取失败响应。此处的物联网设备为无人机,则该物联网设备配置的设备类型为无人机。
第三身份标识包括物理标识、接入标识和/或扩展信息。
无人机可以向UDM发送第二身份信息获取响应时,可以通过AMF转发第二身份获取响应给UDM。AMF转发第二身份获取响应给UDM,具体可以使用标准化的无人机身份标识信息传输格式,该标准化的无人机身份标识信息传输格式由3GPP制定。例如,无人机向AMF发送的第二身份信息获取响应可以为3GPP 24.301协议IDENTITY RESPONSE消息,在该IDENTITY RESPONSE消息中,新增了设备物理标识字段和设备接入标识字段等。当然还可以采用其他的方式进行第三身份标识的传输,此处仅为举例说明,不作具体限定。
S215、UDM根据第二身份标识对第三身份标识进行认证,得到认证结果。
UDM根据第二身份标识对第三身份标识进行认证时,可以直接将第二身份标识与第三身份标识进行比对,从而得到认证结果。
本示例中,UDM在接收到物联网设备发送的注册请求后,根据第一身份标识获取设备类型,若该设备类型为预设设备类型,则从自身的内存中获取第二身份标识、从物联网设备获取第三身份标识,通过第二身份标识对第三身份标识进行认证,得到认证结果,相对于现有方案中,对无人机进行认证时,需要通过多个相关网络单元对物联网设备进行身份认证,能够采用统一的网络单元(UDM)对无人机进行身份认证,从而提升了对无人机进行身份认证时的效率。
在一个可能的实施例中,认证结果可以为:
第二身份标识和第三身份标识完全相同;
第二身份标识和第三身份标识部分相同;
第二身份标识和第三身份标识完全不同。
本示例中,上述认证结果可以直接反映出第二身份标识和第三身份标识之间的关系,可以更加便捷的确定出认证关系。
在一个可能的实施例中,AMF向无人机发送的第二身份信息获取请求可以为身份请求(Identity Request)时,身份请求可以为3GPP协议IDENTITY REQUEST消息,其中,在该消息中新增了设备类型字段和设备标识索引字段,设备类型字段用于标识设备类型。
本申请实施例中所涉及的任一消息传输时,均可以采用相关的加解密技术,以提升数据传输时的安全性。
在一个可能的实施例中,请参阅图2C,图2C为本申请实施例提供了一种物联网设备的身份标识信息传输格式的示意图。如图2C所示,其中,CC:Country Code,移动网络国家码(China,086);
DT:Device Type,物联网设备类型,例如UAV,Robot,Car,…;
SN:Subscriber Number,签约序列号,包含产品型号授权,产品序列号;
CT:Communication Type,通信类型,枚举值:NONE,Cellular-network,WIFI,…;
CIC:Communication Identification Code,通信设备标识编码,例如IMEI,MAC_ADRR,…;
Reserved(可选):扩展保留,例如:运营人标识(IMSI),飞控标识,厂家序列号,密钥;
TS(可选):Timestamp,时间戳,格式:YYYYMMDD。
在一个可能的实施例中,还可以设置前置条件,在物联网设备使用前写入物联网设备的相关身份信息,其在相关的网络单元的备份可以参见现有的备份方案,本方案的前置条件设置主要涉及如下内容:
(1)定义NEF和无人机云、国家无人机管控平台之间用户消息接口。
(2)新增User Identity Register消息,并向UDM配置Device physical identity和Device access identity无人机身份标识信息,具体格式由各国自定义。该User Identity Register消息为UDM与NEF之间的注册消息。
(3)同时在UDM中配置IMSI对应的Device Type=预设设备类型。预设设备类型用以标识无人机、机器人等。例如,Device Type=UAV。
在一个可能的实施例中,UDM在获得认证结果后,还可以向第三网络单元发送设备接入通知或接入告警。具体可以参见图3,图3为本申请实施例提供了另一种物联网设备的身份标识认证方法的交互示意图。如图3所示,包括步骤S301-S307,具体如下:
S301、无人机发送注册请求,注册请求携带第一身份标识。
S302、UDM收到注册请求后,若判断出根据第一身份标识获取的设备类型为预设设备类型,则获取第二身份标识。
S303、UDM向无人机发送第二身份信息获取请求,第二身份信息获取请求携带请求上报设备类型和身份标识信息的指示。
S304、无人机根据第二身份信息获取请求,向UDM发送第二身份信息获取响应,第二身份信息获取响应携带第三身份标识。
S305、UDM根据第二身份标识对第三身份标识进行认证,得到认证结果。
S306、UDM向第三网络单元发送设备接入通知或接入告警。
其中,第三网络单元包括NEF,此处以第三网络单元为NEF为例进行说明。
UDM根据认证结果向NEF发送设备接入通知或接入告警,具体可以为:当认证结果为第二身份标识和第三身份标识完全相同时,UDM向NEF发送设备接入通知;当认证结果为第二身份标识和第三身份标识部分相同、第二身份标识和第三身份标识完全不同,UDM向NEF发送设备接入告警。接入通知、接入告警可以是预设的文本信息、语音信息等。
S307、第三网络单元向无人机云或相关部门发送设备接入通知或接入告警。
NEF收到设备接入通知或接入告警后,向无人机云发送设备接入通知或接入告警。
无人机云用于对通常用于对无人机使用时的使用人的鉴权和认证,相关部门例如包括政府等部门,具体例如可以是,工信部、民航局等。
上述步骤S301-S305可以参照前述步骤S211-S215的具体实施方式,此处不再赘述。
本示例中,在获得认证结果后,可以向无人机云或相关部门发送接入通知或接入告警,能够及时的告知无人机云或相关部门,相关部门收到该接入通知或接入告警后,可以执行相应的动作,从而提升了相关部门对无人机进行管理时的便捷性和效率。
请参阅图4,图4为本申请实施例提供了另一种物联网设备的身份标识认证方法的交互示意图。本实施例中,以第一网络单元为UCF、物联网设备为无人机为例进行说明,如图4所示,身份标识认证方法包括步骤S401-S407,具体如下:
S401、无人机发送注册请求,注册请求携带第一身份标识。
无人机发送注册请求时,可以通过接入网、AMF向UCF发送注册请求。在AMF收到无人机发送的注册请求后,还可以向UDM发送注册请求。具体的注册请求发送方式可以参照前述步骤S211的具体方式,此处不再赘述。
S402、UCF收到注册请求后,判断根据第一身份标识获取的设备类型是否为预设设备类型。
S403、若根据第一身份标识获取的设备类型为预设设备类型,UCF向UDM发送第一身份信息获取请求,第一身份获取请求中携带第一身份标识。
S404、UDM向UCF发送的第一身份信息获取响应,第一身份信息获取响应携带第二身份标识。
UDM收到第一身份信息获取请求后,在自身的内存在根据第一身份标识获得第二身份标识。
UCF收到第一身份信息获取响应后,存储第一身份信息获取响应携带的第二身份标识。
S405、UCF向无人机发送第二身份信息获取请求,第二身份信息获取请求携带请求上报设备类型和身份标识信息的指示。
S406、无人机根据第二身份信息获取请求,向UCF发送第二身份信息获取响应,第二身份信息获取响应携带第三身份标识。
S407、UCF根据第二身份标识对第三身份标识进行认证,得到认证结果。
上述步骤S403、S404与步骤S405、S406无执行上的先后顺序,上述步骤S402可参见前述步骤S212的具体实施方式,步骤S405-S407的具体实施方式可以参见前述步骤S213-S215的具体实施方式,此处不再赘述。
本示例中,UCF在接收到无人机发送的注册请求后,根据第一身份标识获取设备类型,若该设备类型为预设设备类型,则从UDM获取第二身份标识、从物联网设备获取第三身份标识,通过第二身份标识对第三身份标识进行认证,得到认证结果,相对于现有方案中,对无人机进行认证时,需要通过多个相关网络单元对物联网设备进行身份认证,能够采用统一的网络单元(UDM)对无人机进行身份认证,从而提升了对无人机进行身份认证时的效率。
在一个可能的实施例中,UCF在获得认证结果后,还可以向第三网络单元发送设备接 入通知或接入告警。具体可以参见图5,图5为本申请实施例提供了另一种物联网设备的身份标识认证方法的交互示意图。如图5所示,包括步骤S501-S509,具体如下:
S501、无人机发送注册请求,注册请求携带第一身份标识。
无人机发送注册请求时,可以通过接入网、AMF向UCF发送注册请求。在AMF收到无人机发送的注册请求后,还可以向UDM发送注册请求。具体的注册请求发送方式可以参照前述步骤S211的具体方式,此处不再赘述。
S502、UCF收到注册请求后,判断根据第一身份标识获取的设备类型是否为预设设备类型。
S503、若根据第一身份标识获取的设备类型为预设设备类型,UCF向UDM发送第一身份信息获取请求,第一身份信息获取请求中携带第一标识身份标识。
S504、UDM向UCF发送的第一身份信息获取响应,第一身份信息获取响应携带第二身份标识。
UDM收到第一身份信息获取请求后,在自身的内存在根据第一身份标识获得第二身份标识。
UCF收到第一身份信息获取响应后,存储第一身份信息获取响应携带的第二身份标识。
S505、UCF向无人机发送第二身份信息获取请求,第二身份信息获取请求携带请求上报设备类型和身份标识信息的指示。
S506、无人机根据第二身份信息获取请求,向UCF发送第二身份信息获取响应,第二身份信息获取响应携带第三身份标识。
S507、UCF根据第二身份标识对第三身份标识进行认证,得到认证结果。
S508、UCF向第三网络单元发送设备接入通知或接入告警。
其中,第三网络单元包括NEF,此处以第三网络单元为NEF为例进行说明。
UCF根据认证结果向NEF发送设备接入通知或接入告警,具体可以为:当认证结果为第二身份标识和第三身份标识完全相同时,UCF向NEF发送设备接入通知;当认证结果为第二身份标识和第三身份标识部分相同、第二身份标识和第三身份标识完全不同,UCF向NEF发送设备接入告警。接入通知、接入告警可以是预设的文本信息、语音信息等。
S509、第三网络单元向无人机云或相关部门发送设备接入通知或接入告警。
NEF收到设备接入通知或接入告警后,向无人机云发送设备接入通知或接入告警。
上述步骤S501-507的具体实施方式参见前述步骤S401-S407的具体实施方式,此处不再赘述。
本示例中,在获得认证结果后,可以向无人机云或相关部门发送接入通知或接入告警,能够及时的告知无人机云或相关部门,相关部门收到该接入通知或接入告警后,可以执行相应的动作,从而提升了相关部门对无人机进行管理时的便捷性和效率。
请参阅图6,图6为本申请实施例提供了另一种物联网设备的身份标识认证方法的交互示意图。本实施例中,以第一网络单元为AMF、物联网设备为无人机为例进行说明,如图6所示,身份标识认证方法包括步骤S601-S607,其具体实施方式可以参照步骤S401-S407的实施方式,此处不再赘述。
在一个可能的实施例中,AMF在获得认证结果后,还可以向第三网络单元发送设备接 入通知或接入告警。具体可以参见图7,图7为本申请实施例提供了另一种物联网设备的身份标识认证方法的交互示意图。如图7所示,包括步骤S701-S709,其具体实施方式可以参照步骤S501-S509的实施方式,此处不再赘述。
上文描述了本申请实施例提供的物联网设备的身份标识认证方法,下文将描述本申请实施例提供的网络装置。
图8为本申请实施例提供的网络装置800的示意性框图,网络装置800包括:收发单元810和处理单元820,其中,
收发单元810,用于接收物联网设备发送的注册请求,注册请求包括第一身份标识;
处理单元820,用于判断根据第一身份标识获取的设备类型是否为预设设备类型,若是则第一网络单元向第二网络单元发送第一身份信息获取请求,以及向物联网设备发送第二身份信息获取请求;
收发单元810,用于接收第二网络单元发送的第一身份信息获取响应,第一身份信息获取响应携带第二身份标识,第一网络单元接收物联网设备发送的第二身份信息获取响应,第二身份信息获取响应携带第三身份标识;
处理单元820,用于根据第二身份标识对第三身份标识进行认证,得到认证结果。
可选地,作为一个实施例,认证结果包括:
第二身份标识和第三身份标识完全相同;
第二身份标识和第三身份标识部分相同;
第二身份标识和第三身份标识完全不同。
可选地,作为一个实施例,收发单元810还用于:
根据认证结果向第三网络单元发送设备接入通知或接入告警。
可选的,第三网络单元包括网络开放功能。
可选地,作为一个实施例,第一身份标识包括全球移动用户签约标识,第二身份标识和第三身份标识包括物理标识、接入标识和/或扩展信息。
可选的,网络装置从第二网络单元获取设备类型。
可选地,作为一个实施例,网络装置包括:移动管理功能、统一数据管理或无人机控制功能;第二网络单元包括统一数据管理。
可选地,作为一个实施例,第三身份获取请求包括请求物联网设备上报设备类型和身份标识信息的指示。
如图9所示,本申请实施例还提供一种通信装置900,该通信装置900包括处理器910,存储器920与收发器930,其中,存储器920中存储指令或程序,处理器910用于执行存储器920中存储的指令或程序。存储器920中存储的指令或程序被执行时,该处理器910用于执行上述实施例中处理单元820执行的操作,收发器930用于执行上述实施例中收发单元810执行的操作。
应理解,根据本申请实施例的网络装置800或通信装置900可对应于本申请实施例的通信系统中的网络装置,并且网络装置800或通信装置900中的各个模块的操作和/或功能分别为了实现图2A至图7中的各个方法的相应流程,为了简洁,在此不再赘述。
图10为本申请实施例提供的物联网设备1000的示意性框图,物联网设备1000包括: 发送单元1010和接收单元1020,其中,
发送单元1010,用于向第一网络单元发送的注册请求,注册请求包括第一身份标识;
接收单元1020,用于接收第一网络单元发送的第二身份信息获取请求,若第二身份信息获取请求携带请求物联网设备上报设备类型和身份标识信息的指示,则物联网设备通过向第一网络单元发送第二身份信息获取响应的方式上报第三身份标识。
可选地,作为一个实施例,第三身份标识包括物理标识、设备接入标识和/或扩展信息。
如图11所示,本申请实施例还提供一种通信装置1100,该通信装置1100包括处理器1110,存储器1120与收发器1130,其中,存储器1120中存储指令或程序,处理器1110用于执行存储器1120中存储的指令或程序。存储器1120中存储的指令或程序被执行时,该处理器1110用于执行上述实施例中接收单元1020执行的操作,收发器1130用于执行上述实施例中发送单元1010和接收单元1020执行的操作。
应理解,根据本申请实施例的物联网设备1000或通信装置1100可对应于本申请实施例的通信方法中的物联网设备,并且物联网设备1000或通信装置备1100中的各个模块的操作和/或功能分别为了实现图2A至图7中的各个方法的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时可以实现上述方法实施例提供的物联网设备的身份标识认证方法中与通信装置相关的流程。
本申请实施例还提供一种通信装置,该通信装置可以是终端设备也可以是电路。该通信装置可以用于执行上述方法实施例中由物联网终端所执行的动作。
作为本实施例的另一种形式,提供一种计算机可读存储介质,其上存储有指令,该指令被执行时执行上述方法实施例中物联网设备侧的方法。
作为本实施例的另一种形式,提供一种包含指令的计算机程序产品,该指令被执行时执行上述方法实施例中物联网终端侧的方法。
作为本实施例的另一种形式,提供一种计算机可读存储介质,其上存储有指令,该指令被执行时执行上述方法实施例中网络装置侧的方法。
作为本实施例的另一种形式,提供一种包含指令的计算机程序产品,该指令被执行时执行上述方法实施例中网络装置侧的方法。
以上对本申请实施例进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的一般技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上上述,本说明书内容不应理解为对本申请的限制。

Claims (19)

  1. 一种物联网设备的身份标识认证方法,其特征在于,所述方法包括:
    第一网络单元接收物联网设备发送的注册请求,所述注册请求包括第一身份标识;
    所述第一网络单元判断根据所述第一身份标识获取的设备类型是否为预设设备类型,若是则所述第一网络单元向第二网络单元发送第一身份信息获取请求,以及向所述物联网设备发送第二身份信息获取请求;
    所述第一网络单元接收所述第二网络单元发送的第一身份信息获取响应,所述第一身份信息获取响应携带第二身份标识,所述第一网络单元接收所述物联网设备发送的第二身份信息获取响应,所述第二身份信息获取响应携带第三身份标识;
    所述第一网络单元根据所述第二身份标识对所述第三身份标识进行认证,得到认证结果。
  2. 根据权利要求1所述的方法,其特征在于,所述认证结果包括:
    所述第二身份标识和第三身份标识完全相同;
    所述第二身份标识和第三身份标识部分相同;
    所述第二身份标识和第三身份标识完全不同。
  3. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:
    所述第一网络单元根据所述认证结果向第三网络单元发送设备接入通知或接入告警。
  4. 根据权利要求3所述的方法,其特征在于,所述第三网络单元包括网络开放功能。
  5. 根据权利要求1至4任一项所述的方法,其特征在于,所述第一身份标识包括全球移动用户签约标识,所述第二身份标识和所述第三身份标识包括物理标识、接入标识和/或扩展信息。
  6. 根据权利要求5所述的方法,其特征在于,所述第一网络单元从所述第二网络单元获取所述设备类型。
  7. 根据权利要求1至6任一项所述的方法,其特征在于,所述第一网络单元包括:移动管理功能、统一数据管理或无人机控制功能;所述第二网络单元包括统一数据管理。
  8. 根据权利要求1至7任一项所述的方法,其特征在于,所述第二身份获取请求包括请求所述物联网设备上报设备类型和身份标识信息的指示。
  9. 一种网络装置,其特征在于,所述装置包括:
    收发单元,用于接收物联网设备发送的注册请求,所述注册请求包括第一身份标识;
    处理单元,用于判断根据所述第一身份标识获取的设备类型是否为预设设备类型,若是则所述第一网络单元向第二网络单元发送第一身份信息获取请求,以及向所述物联网设备发送第二身份信息获取请求;
    所述收发单元,用于接收所述第二网络单元发送的第一身份信息获取响应,所述第一身份信息获取响应携带第二身份标识,所述第一网络单元接收所述物联网设备发送的第二身份信息获取响应,所述第二身份信息获取响应携带第三身份标识;
    所述处理单元,用于根据所述第二身份标识对所述第三身份标识进行认证,得到认证结果。
  10. 根据权利要求9所述的网络装置,其特征在于,所述认证结果包括:
    所述第二身份标识和第三身份标识完全相同;
    所述第二身份标识和第三身份标识部分相同;
    所述第二身份标识和第三身份标识完全不同。
  11. 根据权利要求9或10所述的网络装置,其特征在于,所述收发单元还用于:
    根据所述认证结果向第三网络单元发送设备接入通知或接入告警。
  12. 根据权利要求11所述的网络装置,其特征在于,所述第三网络单元包括网络开放功能。
  13. 根据权利要求9至12任一项所述的网络装置,其特征在于,所述第一身份标识包括全球移动用户签约标识,所述第二身份标识和所述第三身份标识包括物理标识、接入标识和/或扩展信息。
  14. 根据权利要求13所述的网络装置,其特征在于,所述网络装置从所述第二网络单元获取所述设备类型。
  15. 根据权利要求9至14任一项所述的网络装置,其特征在于,所述网络装置包括:移动管理功能、统一数据管理或无人机控制功能;所述第二网络单元包括统一数据管理。
  16. 根据权利要求9至15任一项所述的网络装置,其特征在于,所述第三身份获取请求包括请求物联网设备上报设备类型和身份标识信息的指示。
  17. 一种物联网设备,其特征在于,所述设备包括:
    发送单元,用于向第一网络单元发送的注册请求,所述注册请求包括第一身份标识;
    接收单元,用于接收所述第一网络单元发送的第二身份信息获取请求,若所述第二身份信息获取请求携带请求所述物联网设备上报设备类型和身份标识信息的指示,则所述物联网设备通过向所述第一网络单元发送第二身份信息获取响应的方式上报第三身份标识。
  18. 根据权利要求17所述的物联网设备,其特征在于,所述第三身份标识包括物理标识、设备接入标识和/或扩展信息。
  19. 一种通信系统,其特征在于,所述通信系统包括如权利要求9至16任一项所述的网络装置、如权利要求17或18所述的物联网设备。
PCT/CN2020/119452 2019-09-30 2020-09-30 物联网设备的身份标识认证方法、相关装置及系统 WO2021063399A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910961587.5 2019-09-30
CN201910961587.5A CN112584344B (zh) 2019-09-30 2019-09-30 无人机的身份标识认证方法、相关装置及系统

Publications (1)

Publication Number Publication Date
WO2021063399A1 true WO2021063399A1 (zh) 2021-04-08

Family

ID=75116986

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/119452 WO2021063399A1 (zh) 2019-09-30 2020-09-30 物联网设备的身份标识认证方法、相关装置及系统

Country Status (2)

Country Link
CN (1) CN112584344B (zh)
WO (1) WO2021063399A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105025014A (zh) * 2015-06-18 2015-11-04 顺丰科技有限公司 无人机启用方法、系统及装置
CN107408352A (zh) * 2015-03-31 2017-11-28 深圳市大疆创新科技有限公司 用于地理围栏装置通信的系统和方法
CN108632231A (zh) * 2017-03-24 2018-10-09 中移(杭州)信息技术有限公司 一种物联网设备、物联网认证平台、认证方法及系统
US20180319494A1 (en) * 2017-05-03 2018-11-08 Kamran Aflatoon Unmanned aerial roadside assist system
CN109511115A (zh) * 2017-09-14 2019-03-22 华为技术有限公司 一种授权方法和网元

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016154949A1 (en) * 2015-03-31 2016-10-06 SZ DJI Technology Co., Ltd. Authentication systems and methods for generating flight regulations
CN105005316B (zh) * 2015-07-27 2019-04-12 顺丰科技有限公司 无人机管控方法及无人机管理平台
HRP20231656T1 (hr) * 2016-04-14 2024-03-15 Rhombus Systems Group, Inc. Sustav za provjeru cjelovitosti bespilotnih letjelica
JP2018032201A (ja) * 2016-08-24 2018-03-01 株式会社ソーラーポート 参照対象情報管理システム及び参照対象情報管理方法
CN108702356A (zh) * 2017-05-19 2018-10-23 深圳市大疆创新科技有限公司 身份验证方法、设备、机器可读存储介质以及系统
CN108989020B (zh) * 2018-07-20 2021-04-13 山东大学 一种无人机自组网防御女巫攻击方法及系统
CN109756261B (zh) * 2019-02-03 2022-03-11 飞牛智能科技(南京)有限公司 基于移动运营商网络的无人机身份标识告警与通知方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107408352A (zh) * 2015-03-31 2017-11-28 深圳市大疆创新科技有限公司 用于地理围栏装置通信的系统和方法
CN105025014A (zh) * 2015-06-18 2015-11-04 顺丰科技有限公司 无人机启用方法、系统及装置
CN108632231A (zh) * 2017-03-24 2018-10-09 中移(杭州)信息技术有限公司 一种物联网设备、物联网认证平台、认证方法及系统
US20180319494A1 (en) * 2017-05-03 2018-11-08 Kamran Aflatoon Unmanned aerial roadside assist system
CN109511115A (zh) * 2017-09-14 2019-03-22 华为技术有限公司 一种授权方法和网元

Also Published As

Publication number Publication date
CN112584344B (zh) 2022-06-14
CN112584344A (zh) 2021-03-30

Similar Documents

Publication Publication Date Title
EP3836577B1 (en) Session management method and device for user groups
US20220277657A1 (en) Methods and Apparatus for Enhancing Unmanned Aerial Vehicle Management Using a Wireless Network
EP3968685A1 (en) Network slice management method and related device
US20210400489A1 (en) 3gpp private lans
CN111818516B (zh) 认证方法、装置及设备
KR102217144B1 (ko) 신뢰성 있는 교통 기관에 의해 이전에 인가된 모바일 통신 네트워크에 대한 사용자 장비의 인가
CN111867142B (zh) 一种建立通信承载的方法、设备及系统
EP3952213A1 (en) Communication method, apparatus, and system
WO2021132093A1 (ja) Amfノード及びその方法
EP3848771B1 (en) Aircraft control method and apparatus
US20230008429A1 (en) Drone telemetry system
US11930472B2 (en) Target information acquisition method and terminal device
WO2022084148A1 (en) Registration procedure for an unmanned aerial vehicle ue / unmanned aerial vehicle controller ue
AU2020246484B2 (en) Terminal management and control method, apparatus, and system
WO2021063399A1 (zh) 物联网设备的身份标识认证方法、相关装置及系统
WO2021159415A1 (zh) 通信方法、装置及系统
WO2022013601A1 (en) Provisioning drone flight in 5g networks
WO2023065826A1 (zh) 一种通信方法及通信装置
US20240224352A1 (en) Mobility edge network systems and methods
US20240214365A1 (en) Communication method and apparatus
EP4369759A1 (en) Data transmission protection method, device and system
WO2023226956A1 (zh) 一种网络设备和通信系统
US10356581B2 (en) Login processing method and device of machine-to-machine/man communication terminal equipment
CN116349345A (zh) 一种非公共网络签约信息更新方法及装置
CN115988473A (zh) 一种通信方法、通信装置及通信系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20873034

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20873034

Country of ref document: EP

Kind code of ref document: A1