WO2024017195A1 - Pin管理方法、装置、第一终端和第一设备 - Google Patents

Pin管理方法、装置、第一终端和第一设备 Download PDF

Info

Publication number
WO2024017195A1
WO2024017195A1 PCT/CN2023/107711 CN2023107711W WO2024017195A1 WO 2024017195 A1 WO2024017195 A1 WO 2024017195A1 CN 2023107711 W CN2023107711 W CN 2023107711W WO 2024017195 A1 WO2024017195 A1 WO 2024017195A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
pin
information
identifier
administrator
Prior art date
Application number
PCT/CN2023/107711
Other languages
English (en)
French (fr)
Inventor
吕华章
谢振华
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2024017195A1 publication Critical patent/WO2024017195A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery

Definitions

  • the present application belongs to the field of communication technology, and specifically relates to a PIN management method, device, first terminal and first device.
  • PEMC PIN element with management capability
  • Embodiments of the present application provide a PIN management method, device, first terminal and first device, which can configure at least two PEMCs for one PIN, so that at least two PEMCs can be used to manage PINs, which improves the flexibility of managing PINs.
  • a PIN management method which method includes:
  • the first terminal sends first information to the first device, where the first information includes a PIN identifier and identification information of at least one second terminal;
  • the first information is used to request that the at least one second terminal be configured as an administrator of the PIN corresponding to the PIN identifier.
  • a PIN management device applied to the first terminal, and the device includes:
  • a first sending module configured to send first information to the first device, where the first information includes a PIN identifier and identification information of at least one second terminal;
  • the first information is used to request that the at least one second terminal be configured as an administrator of the PIN corresponding to the PIN identifier.
  • a PIN management method which method includes:
  • the first device obtains first information from the first terminal, where the first information includes a PIN identifier and identification information of at least one second terminal, where the first information is used to request that the at least one A second terminal is configured to become the administrator of the PIN corresponding to the PIN identifier;
  • the first device determines, based on the first information, whether to configure the at least one second terminal to be an administrator of the PIN corresponding to the PIN identifier.
  • a PIN management device applied to the first device, and the device includes:
  • An acquisition module configured to acquire first information from a first terminal, where the first information includes a PIN identifier and identification information of at least one second terminal, where the first information is used to request that the The at least one second terminal is configured to become the administrator of the PIN corresponding to the PIN identifier;
  • the second determination module is configured to determine, according to the first information, whether to configure the at least one second terminal to be the administrator of the PIN corresponding to the PIN identifier.
  • a first terminal in a fifth aspect, includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the program or instructions are executed by the processor.
  • a first terminal including a processor and a communication interface, wherein the communication interface is used to send first information to the first device, wherein the first information includes a PIN identifier, and at least Identification information of a second terminal; wherein the first information is used to request that the at least one second terminal be configured as an administrator of the PIN corresponding to the PIN identifier.
  • a first device in a seventh aspect, includes a processor and a memory.
  • the memory stores programs or instructions executable on the processor. The programs or instructions are executed by the processor.
  • a first device including a processor and a communication interface, wherein the communication interface is used to obtain first information from a first terminal, wherein the first information includes a PIN identifier, and Identification information of at least one second terminal, wherein the first information is used to request that the at least one second terminal be configured as an administrator of the PIN corresponding to the PIN identifier; the processor is used to request according to the The first information determines whether the at least one second terminal is configured as an administrator of the PIN corresponding to the PIN identifier.
  • a ninth aspect provides a communication system, including: a first terminal and a first device.
  • the first terminal can be used to perform the steps of the PIN management method as described in the first aspect.
  • the first device can be used to perform The steps of the PIN management method as described in the third aspect.
  • a readable storage medium is provided. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method are implemented as described in the first aspect. The steps of the method described in the third aspect.
  • a chip in an eleventh aspect, includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the method described in the first aspect. method, or implement a method as described in the third aspect.
  • a computer program/program product is provided, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement as described in the first aspect
  • the first terminal sends first information to the first device, where the first information includes a PIN identifier and identification information of at least one second terminal; where the first information is Requesting to configure the at least one second terminal as an administrator of the PIN corresponding to the PIN identifier.
  • the first terminal can add an administrator of the PIN, thereby enabling the management of a PIN.
  • Employees are no longer limited to one administrator, and multiple administrators are used to manage the same PIN, which can improve the flexibility of PIN management.
  • Figure 1 is a schematic structural diagram of a communication system to which embodiments of the present application can be applied;
  • Figure 2 is a flow chart of a PIN management method provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram of the architecture of PIN in the embodiment of the present application.
  • FIG. 4 is a flow chart of another PIN management method provided by an embodiment of the present application.
  • Figure 5 is one of the flow charts for adding a PIN administrator in the embodiment of this application.
  • Figure 6 is the second flow chart of adding a PIN administrator in the embodiment of this application.
  • Figure 7 is a schematic structural diagram of a PIN management device provided by an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of another PIN management device provided by an embodiment of the present application.
  • Figure 9 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • Figure 10 is a schematic diagram of the hardware structure of a terminal provided by an embodiment of the present application.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and that "first" and “second” are distinguished objects It is usually one type, and the number of objects is not limited.
  • the first object can be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the related objects are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced, LTE-A Long Term Evolution
  • LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • NR New Radio
  • FIG. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable.
  • the wireless communication system includes a terminal 11 and a network side device 12.
  • the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer), or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a palmtop computer, a netbook, or a super mobile personal computer.
  • Tablet Personal Computer Tablet Personal Computer
  • laptop computer laptop computer
  • PDA Personal Digital Assistant
  • PDA Personal Digital Assistant
  • UMPC ultra-mobile personal computer
  • UMPC mobile Internet device
  • MID mobile Internet Device
  • AR augmented reality
  • VR virtual reality
  • robots wearable devices
  • WUE Vehicle User Equipment
  • PUE Pedestrian User Equipment
  • smart home home equipment with wireless communication functions, such as refrigerators, TVs, washing machines or furniture, etc.
  • game consoles personal computers (personal computer, PC), teller machine or self-service machine and other terminal-side devices.
  • Wearable devices include: smart watches, smart bracelets, smart headphones, smart glasses, smart jewelry (smart bracelets, smart bracelets, smart rings, smart necklaces, smart anklets) bracelets, smart anklets, etc.), smart wristbands, smart clothing, etc.
  • the network side device 12 may include an access network device or a core network device, where the access network device may also be called a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or a wireless access network unit.
  • Access network equipment may include a base station, a Wireless Local Area Network (WLAN) access point or a WiFi node, etc.
  • WLAN Wireless Local Area Network
  • the base station may be called a Node B, an Evolved Node B (eNB), an access point, a base transceiver station ( Base Transceiver Station (BTS), radio base station, radio transceiver, basic Service set (Basic Service Set, BSS), extended service set (Extended Service Set, ESS), home B-node, home evolved B-node, transmitting and receiving point (Transmitting Receiving Point, TRP) or any other suitable one in the field terminology, as long as the same technical effect is achieved, the base station is not limited to specific technical terms. It should be noted that in the embodiment of this application, only the base station in the NR system is used as an example for introduction, and the specific type of the base station is not limited.
  • the PIN management method provided by the embodiment of the present application can be executed by the first terminal.
  • the PIN management method executed by the first terminal may include the following steps:
  • Step 201 The first terminal sends first information to the first device, where the first information includes a PIN identifier and identification information of at least one second terminal;
  • the first information may have at least one of the following functions:
  • the second terminal is configured to become the administrator of the PIN corresponding to the PIN identifier.
  • the PIN identifier is used to identify the PIN.
  • the PIN identifier may include at least one of identification information such as PIN Identity (PIN ID), PIN name, and PIN description information.
  • PIN is a network based on and derived from a large number of consumer IoT devices.
  • These devices can be either wearable devices (that is, devices on the human body, such as cameras, headphones, watches, headphones, health monitors, etc.) or IoT devices in the home (such as smart lights, cameras, thermostats, door sensors, etc.) , voice assistant, speaker, refrigerator, washing machine, etc.). Users mainly use these personal IoT devices at home or around their bodies to create personal IoT networks.
  • PIN is generally used in homes, offices and other scenarios. IoT devices deployed in these scenarios can be interconnected, communicate with each other, and obtain services, so they are called personal IoT. At the same time, the IoT devices in the PIN can use a certain mechanism and implementation method to access the communication network (such as the 5G System (5G System, 5GS)) through the device with the gateway function in the PIN, access other servers in the network or complete services .
  • 5G System 5G System
  • the enabling layer which can be considered as an application layer design, located on top of the operating system (Operating System, OS) , such as: client or application software (Application, APP); or the enabler can also be a capability of the operating system OS, which provides services as part of the operating system; or the enabler can also be considered a chip capability , located on the modem chip module.
  • OS operating System
  • Application Application
  • APP application software
  • the enabler can also be a capability of the operating system OS, which provides services as part of the operating system
  • the enabler can also be considered a chip capability , located on the modem chip module.
  • the PIN framework in the embodiment of the present application usually includes the following PIN network element (PIN element, PINE):
  • PIN Element with Management Capability (PEMC) with management function: Yes Manage the entire PIN, for example, add a PINE to the PIN managed by PEMC;
  • PEGC PIN network element with gateway capability
  • PEMC or PEGC mentioned above can also be completed by the PIN application client (PIN client) on PEMC or the PIN client on PEGC.
  • PIN client PIN application client
  • PIN server Used to authorize the creation of a PIN, or authorize updates to the PIN, such as modifying the name of the PIN or adding new members to the PIN.
  • PEMC triggers a PIN establishment request, and then the PIN server verifies the establishment request.
  • the PIN server can also be used for PINE requests to find a PIN, or to find the PEMC corresponding to a PIN, etc.
  • PIN Management Function PIN MF
  • the enabling layer shown in the figure can be regarded as a client of PEMC, such as PIN client or PEMC client.
  • the above-mentioned first terminal may be a terminal corresponding to the existing administrator of the PIN.
  • the administrator may be the homeowner.
  • the first terminal may be the homeowner.
  • the above-mentioned first device may be a PIN network element or a PIN server (server) with management functions.
  • the first device is a PIN server as an example.
  • the first terminal is the administrator of the PIN corresponding to the PIN identifier.
  • the first device receives the first information sent by the first terminal, and the first information includes at least one second terminal. , the at least one second terminal will request to apply to become the administrator of the PIN corresponding to the PIN identifier.
  • the first device can configure the second terminal to be the administrator of the PIN corresponding to the PIN identifier, or the first device can also configure the second terminal to be the administrator of the PIN corresponding to the PIN identifier.
  • the second terminal performs identity verification, and configures the second terminal that has passed the identity verification as the administrator of the PIN corresponding to the PIN identifier.
  • the process of the first device authenticating the second terminal may be to match the identification information of the second terminal with the trusted member list. If the identification information of the second terminal is found in the trusted member list, then It can be determined that the second terminal has passed the identity verification.
  • the above-mentioned trusted member list may include the trusted member information of the PIN corresponding to the PIN identifier, or the trusted member list may include information of the administrator who has completed the registration. For example, when the second terminal registers as an administrator of the PIN corresponding to the PIN identifier, the trusted member list contains the identification information of the second terminal.
  • a group of second terminals can respectively use their respective terminal identities (User Permanent Identifier (SUbscription Permanent Identifier, SUPI), Generic Public Subscription Identifier (GPSI), etc.) or PIN client ID, PIN
  • the client ID is registered to the first device, and the first device can then set these second terminals as trusted members of a certain PIN.
  • the first terminal requests to be set as the administrator of the PIN for at least one second terminal, the first device needs to verify the trusted identities of these second terminals.
  • the list of trusted identities may also be stored in a Unified Data Repository (UDR), and the first device carries at least one second terminal identifier to verify the trusted identities in the UDR.
  • UDR Unified Data Repository
  • the trusted members of the first PIN and the second PIN stored in the UDR are as shown in Table 1 below:
  • the PIN identifier of the first PIN is Local.ABC.PIN
  • the PIN identifier of the second PIN is AAA.PIN
  • the trusted members of the PIN corresponding to Local.ABC.PIN include terminal 1, Terminal 2 and Terminal 3
  • the trusted members of the PIN corresponding to AAA.PIN include Terminal 1, Terminal 3 and Terminal 5.
  • trusted members, administrator identities, and PIN administrators mentioned in the embodiments of this application all refer to the trusted members and administrator identities of the PIN corresponding to the PIN identifier carried in the first information. and PIN administrators. Trusted members of other PINs, administrator identities, and PIN administrators are not considered in this application.
  • the trusted members in the first member list mentioned in the following embodiments of this application may specifically be the trusted members in the trusted member list corresponding to the PIN identifier carried in the first information, Or, the first member list specifically refers to the trusted member list corresponding to the PIN identifier carried in the first information; similarly, the members with administrator status in the second member list mentioned in the embodiment of this application, Specifically, it may be a member of the administrator identity list who has an administrator identity with a PIN corresponding to the PIN identifier carried in the first information, or the second member list specifically refers to a member with an administrator identity that corresponds to the PIN carried in the first information. A list of members of the administrator identity of the PIN corresponding to the identifier.
  • the existing PEMC i.e., the first terminal
  • the existing PEMC stores the PIN identifier of the PIN in advance
  • a new PEMC i.e., the second terminal
  • the existing PEMC The first information can be sent to the PIN server (i.e., the first device) to carry the PIN identifier and the identification information of the new PEMC that needs to be added in the first information.
  • the first device can decide whether to add the second terminal to the PIN server. Configure as the administrator of the PIN corresponding to the PIN identifier.
  • the identification information of the at least one second terminal includes at least one of the following:
  • the device identification of the at least one second terminal for example: the identification information of the at least one second terminal includes the Generic Public Subscription Identifier (GPSI) of each PEMC that needs to be added; or other identifiers of the terminal , for example, the PIN client identifier (PIN client ID) installed on the terminal.
  • GPSI Generic Public Subscription Identifier
  • PIN client ID PIN client identifier
  • At least one device group identifier is used to indicate a trusted member group in which the at least one second terminal is located, and the terminals in the trusted member group are terminals with trusted identities, for example: the at least The identification information of a second terminal includes a trust member group ID, and the PEMC to be added is located in the trust member group identified by the trust member group ID.
  • the terminals of all employees in an office form a trusted member group, and then the terminals of these employees are regarded as trusted members of the company PIN.
  • the advantage of setting up trusted member groups is that terminals can be classified into different trusted member groups instead of putting all terminals in one Large group of trusted members for easy management. Members in different trusted member groups can be authorized to become administrators with different PINs, thereby enabling differentiated management of members in different trusted member groups.
  • the first device can distinguish each second terminal according to the device identification of the at least one second terminal, so that each second terminal can be identified and/or verified based on the device identification. to determine whether to configure each second terminal as a PEMC.
  • the first device can distinguish the device group in which the at least one second terminal is located based on the device group identifier of the at least one second terminal, so that the group can be identified based on the device group identifier. All second terminals in the device group are identified and/or verified to determine whether to configure all second terminals in the device group as PEMC.
  • the first information is carried in a PIN creation request message or a PIN update request message.
  • a PIN create request message or a PIN update request message in related technologies can be used to transmit the above first information, that is, when the PIN is created or the PIN is updated, the identifier of at least one second terminal can be carried to Request to set them up as PIN administrator.
  • the PIN management method also includes:
  • the first terminal receives a first response from the first device, wherein the first response includes a configuration result of an administrator of the PIN of the at least one second terminal, and the configuration result indicates that the third terminal configured to become the administrator of the PIN corresponding to the PIN identification, and/or the configuration result indicates that the fourth terminal is not configured to become the administrator of the PIN corresponding to the PIN identification, and the third terminal includes the All or part of at least one second terminal, or the fourth terminal includes all or part of the at least one second terminal;
  • the first terminal respectively determines whether the at least one second terminal is the administrator of the PIN corresponding to the PIN identification according to the first response.
  • the above-mentioned first response may be a response to the first information, or a response to a PIN create request message or a PIN update request message carrying the first information.
  • the configuration result in the first response may indicate which part of the at least one second terminal is configured by the first device as the administrator of the PIN, for example: the configuration information includes the determined portion of the at least one second terminal.
  • the identification information of the administrator who will be configured as the target PIN, or which part of the at least one second terminal is not configured as the administrator of the PIN for example: the configuration information includes the at least one second terminal It is determined that the identification information of the administrator will not be configured as the target PIN, or the configuration of which part of the at least one second terminal is configured as the administrator of the PIN and the other part is not configured as the administrator of the PIN As a result, for example, the configuration information includes the first identification information of the administrator in the at least one second terminal who is determined to be configured as the target PIN, and the second terminal corresponding to the first identification information is configured as the target PIN.
  • Instruction information of the administrator, and the configuration information also includes the second identification information of the administrator in the at least one second terminal who is determined not to be configured as the target PIN, and the second identification information does not correspond to these second identification information. Instruction information for the second terminal to be configured as an administrator of the target PIN.
  • the first terminal may also receive the configuration result of the administrator of the PIN of at least one second terminal from the first device, and determine accordingly which second terminals are configured to become administrators of the PIN and which ones are some second ending
  • the client is not configured to be a PIN administrator. For example: if some second terminals are configured as administrators of PIN, the first device gives the second terminal identification of this part and instructs these second terminals to be configured as administrators; if some second terminals are not configured as administrators, If configured as an administrator with a PIN, the first device gives this part of the second terminal identification and indicates that these second terminals are not configured as administrators.
  • the above-mentioned first response may also include the reason why the second terminal is not configured as an administrator of PIN, for example: the identity verification (such as : The terminal is not qualified to become an administrator), or the number of administrators with a PIN has reached the upper limit, etc.
  • the reason can be output on the first terminal.
  • the first terminal can output the reason, for example: displaying the text content and/or icon of the reason through the display screen, or outputting the reason through the speaker. audio.
  • the method further includes:
  • the first terminal outputs indication information, where the indication information is used to indicate the reason why the fourth terminal cannot be configured as a PIN administrator corresponding to the PIN identifier.
  • the at least one second terminal when the first terminal requests the first device to configure at least one second terminal as a PIN administrator corresponding to the PIN identifier, the at least one second terminal that has not been successfully configured as the PIN
  • the fourth terminal of the PIN administrator corresponding to the identifier may output indication information on the first terminal to indicate the reason why the fourth terminal failed to be configured as the PIN administrator corresponding to the PIN identifier.
  • the instruction information indicates that the reason why the fourth terminal is not configured as the PIN administrator corresponding to the PIN identifier is because the fourth terminal does not belong to the trusted member list.
  • the user can first register the fourth terminal as a trusted member to add the identification information of the fourth terminal to the trusted member list, and then use the first terminal to send the fourth terminal to the first device.
  • Relevant first information that is, the first information may include a PIN identifier or identification information of a fourth terminal, so that the first device adds the fourth terminal as a PIN administrator corresponding to the PIN identifier based on the first information. .
  • the target configuration information of the PIN corresponding to the PIN identifier can be sent to the second terminal, so that the second terminal can participate in the PIN Management of PINs corresponding to identifiers.
  • the method further includes:
  • the first terminal sends target configuration information to the third terminal, where the target configuration information includes at least one of the following:
  • the configuration information of the PIN corresponding to the above-mentioned PIN identifier can include the basic configuration of the PIN, such as the PIN ID, the name of the PIN, the services that the PIN can provide (such as printing services, smart screens, projection, etc.), the Member information (for example, all PINE IDs in the PIN, PINE's Internet Protocol (IP) address, etc.), PEGC ID or PEGC IP address in the PIN, etc. Since the second terminal becomes the PIN administrator, the related PIN configuration must also be updated to this administrator.
  • IP Internet Protocol
  • the first terminal sends the above target configuration information to the newly added PEMC, which can reduce the complexity of the newly added PEMC in obtaining the above target configuration information.
  • the above target configuration information can also be sent to the above newly added PEMC through a PINE with a gateway function or a wireless communication function in the PIN, which is not specifically limited here.
  • the first terminal sends first information to the first device, where the first information includes a PIN identifier and identification information of at least one second terminal; where the first information is Requesting to configure the at least one second terminal as an administrator of the PIN corresponding to the PIN identifier.
  • the first terminal can add an administrator of the PIN, thereby enabling the management of a PIN.
  • Employees are no longer limited to one administrator, and multiple administrators are used to manage the same PIN, which can improve the flexibility of PIN management.
  • FIG. 4 Another PIN management method provided by the embodiment of the present application corresponds to the PIN management method provided by the method embodiment shown in Figure 2, wherein the PIN management method provided by the method embodiment shown in Figure 2
  • the execution subject is the first terminal
  • the execution subject of the PIN management method provided by the method embodiment shown in Figure 4 is the first device.
  • the process of the PIN management method executed by the first device in the embodiment of the present application can be referred to Figure 2
  • the process of the PIN management method performed by the first terminal in the illustrated method embodiment is shown.
  • the PIN management method executed by the first device may include the following steps:
  • Step 401 The first device obtains first information from the first terminal, where the first information includes a PIN identifier and identification information of at least one second terminal, where the first information is used to request that the The at least one second terminal is configured to be an administrator of the PIN corresponding to the PIN identifier.
  • Step 402 The first device determines, based on the first information, whether to configure the at least one second terminal to be the administrator of the PIN corresponding to the PIN identifier.
  • first information, first terminal, second terminal, first device and PIN are the same as those of the first information, first terminal, second terminal and first device in the method embodiment as shown in Figure 2 , PIN and have the same function and will not be repeated here.
  • the first device can determine whether to configure the at least one second terminal to be the administrator of the PIN corresponding to the PIN identifier based on the first information from the first terminal, thereby being able to configure a PIN.
  • Multiple administrators enable multiple administrators to jointly manage one PIN, improving the flexibility of PIN management.
  • the first terminal is the administrator of the PIN corresponding to the PIN identifier.
  • the identification information of the at least one second terminal includes at least one of the following:
  • At least one device group identifier is used to indicate a trusted member group in which the at least one second terminal belongs, and the terminals in the trusted member group are terminals with trusted identities.
  • the first information is carried in a PIN creation request message or a PIN update request message.
  • the above-mentioned first information includes at least one second terminal, and the at least one second terminal will request to apply to become the administrator of the PIN corresponding to the PIN identifier.
  • the first device may directly include the first information.
  • the second terminal is configured to become the administrator of the PIN corresponding to the PIN identifier, or the second terminal included in the first information is verified, and the second terminal that passes the verification is configured to be the administrator of the PIN corresponding to the PIN identifier.
  • the administrator of the PIN may not configure the second terminal that has not passed the verification to be the administrator of the PIN corresponding to the PIN identifier.
  • the first device determines whether to configure the at least one second terminal as an administrator of the PIN corresponding to the PIN identifier based on the first information, including:
  • the first device performs identity verification on the at least one second terminal based on the first information
  • the first device determines to configure the third terminal to be the administrator of the PIN corresponding to the PIN identifier, and/or, when the fourth terminal fails to pass the authentication In the case of the above identity verification, the first device determines not to configure the fourth terminal as the administrator of the PIN corresponding to the PIN identifier, wherein the at least one second terminal includes the third terminal and /or the fourth terminal.
  • the above-mentioned identity verification of the at least one second terminal may be to verify whether the at least one second terminal is a trusted terminal, and/or to verify whether the at least one second terminal has a PIN identifier corresponding to PIN management permissions, etc.
  • the one among the at least one second terminal that has passed the identity verification is a third terminal
  • the one among the at least one second terminal that has not passed the identity verification is a fourth terminal.
  • the third terminal can be configured as a PEMC only when the third terminal among the at least one second terminal passes the identity verification, and when the fourth terminal among the at least one second terminal does not pass the identity verification, Therefore, the fourth terminal is not configured as PEMC, which reduces the probability of configuring an untrusted terminal as PEMC and improves the security performance of the PIN.
  • the first device authenticates the at least one second terminal according to the first information, including:
  • the first device searches for the identification information of the at least one second terminal in a pre-stored first member list and/or second member list;
  • the first device determines to configure the third terminal to be the administrator of the PIN corresponding to the PIN identifier, and/or, when the fourth terminal does not If the identity verification is passed, the first device determines not to configure the fourth terminal as the administrator of the PIN corresponding to the PIN identifier, including:
  • the first device determines that the third terminal passes the identity verification, and/or, When the identification information of the fourth terminal is not found in the first member list and/or the second member list, the first device determines that the fourth terminal The client failed the authentication;
  • the first member list includes identification information of trusted members
  • the second member list includes identification information of members with administrator status.
  • the above-mentioned first member list includes identification information of trusted members. In this way, if the identification information of the third terminal is found in the first member list, it can be determined that the third terminal belongs to a trusted member, which reduces the risk of The complexity of verification of trusted members.
  • the above-mentioned second member list includes identification information of members with administrator status. In this way, if the identification information of the third terminal is found in the second member list, it can be determined that the third terminal has registered as the administrator status of PIN. , reducing the complexity of authentication for endpoints with administrator status.
  • the above-mentioned first member list and/or second member list may be stored in the first device in advance, but may also be stored in other network-side devices in the communication network, such as: assuming that the A device is a PIN server and the above-mentioned first member list and/or second member list is stored in a unified data format repository (Unified Data Repository, UDR) or a unified data management entity (Unified Data Management, UDM).
  • UDR Unified Data Repository
  • UDM Unified Data Management
  • the PIN management method provided by the embodiment of this application also includes: The method further includes:
  • the first device searches for the identification information of the at least one second terminal according to the PIN identifier in a pre-stored third member list, where the third member list includes the PIN identifier that has been configured.
  • the first device filters out terminals other than the fifth terminal from the at least one second terminal, wherein the Terminals other than the fifth terminal among the at least one second terminal include the third terminal and/or the fourth terminal.
  • the third member list stores the terminal identification of the administrator that has been configured as the PIN corresponding to the PIN identifier carried in the first information, which may be the terminal of the administrator that will be configured as the target PIN within the historical time period.
  • the identities are all stored in a third member list.
  • the third member list stores the corresponding relationship between the identifier of the target PIN and terminal 1 and terminal 2 respectively
  • the first terminal or terminal 2 sends the first information to the first device
  • a terminal sends a PIN update request. If this request (including PIN ID) carries the identification information of terminal 1 and terminal 3 and requests to configure both terminals as administrators, the first device will appear in the third member list.
  • the PIN management method also includes:
  • the first device stores the identification information of the terminal configured as the administrator of the PIN corresponding to the PIN identifier in the third member list in association with the PIN identifier.
  • the above third member list may be stored in the first device, or may be stored in other devices in the communication network, such as UDR, etc., which is not specifically limited here.
  • the first device may update the above third member list each time it is determined to configure a certain terminal as the administrator of the PIN corresponding to the PIN identifier, so that the updated third member list
  • the list includes an association relationship between the PIN identifier and all administrators of the target PIN (that is, the PIN corresponding to the PIN identifier). In this way, the first device can synchronously update the administrator's terminal that has been configured as the target PIN.
  • the first terminal when the first terminal sends the first information to the first device for the first time, it carries the identification information of terminal 1 and terminal 2. Assume that the first device determines to configure both terminal 1 and terminal 2 as target PINs based on the first information ( That is, the administrator identity of the PIN corresponding to the above PIN identifier will be stored in the third member list in association with the PIN identifiers of Terminal 1 and Terminal 2 respectively.
  • the method further includes:
  • the first device sends a first response to the first terminal, wherein the first response includes a configuration result of an administrator of the PIN of the at least one second terminal, and the configuration result indicates that the third terminal is configured Become the administrator of the PIN corresponding to the PIN identification, and/or the configuration result indicates that the fourth terminal is not configured to become the administrator of the PIN corresponding to the PIN identification, and the third terminal includes the at least All or part of a second terminal, or the fourth terminal includes all or part of the at least one second terminal.
  • the configuration result of the PIN administrator of at least one second terminal may indicate which second terminals are configured to become PIN administrators, and/or indicate which second terminals are not configured to become PIN administrators.
  • the reason why these second terminals are not configured to be the administrator of the PIN can also be indicated in the configuration result of the administrator of the PIN of the at least one second terminal, for example :
  • the fourth terminal does not belong to a trusted member and/or the fourth terminal does not have the administrator identity for the above PIN, etc.
  • the function of the first terminal in obtaining the first response is the same as that in the method embodiment shown in Figure 2, which will not be described again here.
  • the method further includes:
  • the first device sends target configuration information to at least one of the first terminal and the third terminal, where the target configuration information includes at least one of the following:
  • the function of the first terminal sending the above target configuration information to the third terminal is similar to that in the method embodiment shown in Figure 2.
  • the differences include that in the embodiment of the present application, the first device can send the above target configuration information to the third terminal.
  • the terminal sends the above target configuration information, or the first device first sends the above target configuration information to the first terminal, and then the first terminal forwards the target configuration information to the third terminal.
  • the third terminal can obtain the target configuration.
  • the PIN management function is implemented based on the target configuration information, which will not be described again here.
  • the PIN management method may include the following steps:
  • Step 1 PEMC sends a PIN create request message to the first device.
  • the PIN create request message carries the identification information of the target PIN and the identification information of additional PEMCs.
  • the identification information of additional PEMCs is the terminal that wishes to request the identification information. Configure to become the administrator of this PIN.
  • Step 2 The PIN server verifies whether these additional PEMCs are trusted members.
  • the PIN server can, after receiving the additional PEMC GPSI (or PIN client ID), work with the UDR (or other network side devices in 5GS) to check whether the PEMC determined based on the additional PEMC GPSI is included in the trusted member. If the PEMC corresponding to the additional PEMC GPSI is included in the trusted member, it is determined that the additional PEMC passes the verification.
  • additional PEMC GPSI or PIN client ID
  • UDR or other network side devices in 5GS
  • Step 3 The PIN server sends a PIN create response message to PEMC.
  • the additional PEMC will also obtain the administrator identity of the target PIN. If the trusted member verification fails, the reasons related to the verification failure can be displayed on the PEMC display screen.
  • the identification information of additional PEMCs may be the ID of each additional PEMC, such as GPSI.
  • the identification information of additional PEMCs can be the group identification of all additional PEMCs, such as trust member group ID.
  • the PIN server can indicate the GPSI or PIN client ID of these PEMCs to indicate that they have become PIN administrators; for those who have failed, they can indicate their identifiers or not. Instructions, that is, throw away the PEMC that passed, and naturally what remains is the PEMC that failed.
  • the PIN management method may include the following steps:
  • Step 1 Query PIN list information and/or PIN information.
  • additional PEMC can be registered as the administrator of the target PIN, so that the PIN list information and/or PIN information queried in this step can include additional PEMC.
  • Step 2 PEMC-triggered PIN update request message.
  • the PIN update request message carries additional PEMC identification information and target PIN identification information, such as: PIN ID, PIN name, PIN description information, PIN service information, and time information. wait.
  • Step 3 The PIN server queries trusted members.
  • the PIN server when the PIN server receives additional PEMC GPSIs, the PIN server first determines whether there is a newly added PEMC in the PIN list information and/or PIN information. If so, the PIN server works with the UDR to check whether the newly added PEMC is included. Among the trusted members of PEMC identified by PEMC GPSIs, the identification of other PEMCs that are not added by new requests (that is, the PEMC corresponding to the fifth terminal in the PIN's existing administrator identity list) will be ignored and not processed.
  • Step 4 The PIN server sends a PIN update response message to PEMC.
  • the execution subject may be a PIN management device.
  • a PIN management device performing a PIN management method is used as an example to illustrate the PIN management device provided by the embodiment of the present application.
  • a PIN management device provided by an embodiment of the present application can be a device in the first terminal. As shown in Figure 7, the PIN management device 700 can include the following modules:
  • the first sending module 701 is configured to send first information to the first device, where the first information includes a PIN identifier and identification information of at least one second terminal;
  • the first information is used to request that the at least one second terminal be configured as an administrator of the PIN corresponding to the PIN identifier.
  • the first terminal is the administrator of the PIN corresponding to the PIN identifier.
  • the identification information of the at least one second terminal includes at least one of the following:
  • At least one device group identifier is used to indicate a trusted member group in which the at least one second terminal belongs, and the terminals in the trusted member group are terminals with trusted identities.
  • the first information is carried in a PIN creation request message or a PIN update request message.
  • the PIN management device 700 also includes:
  • a first receiving module configured to receive a first response from the first device, wherein the first response includes a configuration result of an administrator of the PIN of the at least one second terminal, and the configuration result indicates that the first
  • the third terminal is configured to be the administrator of the PIN corresponding to the PIN identification, and/or the configuration result indicates that the fourth terminal is not configured to be the administrator of the PIN corresponding to the PIN identification, and the third terminal includes All or part of the at least one second terminal, or the fourth terminal includes all or part of the at least one second terminal;
  • the first determination module is configured to respectively determine whether the at least one second terminal is the administrator of the PIN corresponding to the PIN identification according to the first response.
  • the PIN management device 700 further includes:
  • the first terminal sends target configuration information to the third terminal, where the target configuration information includes at least one of the following:
  • the PIN management device 700 further includes:
  • An output module is configured to output indication information, where the indication information is used to indicate the reason why the fourth terminal cannot be configured as a PIN administrator corresponding to the PIN identifier.
  • the PIN management device 700 provided by the embodiment of the present application can implement each process of the method embodiment shown in Figure 2 and can achieve the same beneficial effects. To avoid duplication, the details will not be described again.
  • PIN management device 800 can be a device in the first device. As shown in Figure 8, the PIN management device 800 can include the following modules:
  • Obtaining module 801 is used to obtain first information from a first terminal, where the first information includes a PIN identifier and identification information of at least one second terminal, where the first information is used to request that the The at least one second terminal is configured to become the administrator of the PIN corresponding to the PIN identifier;
  • the second determination module 802 is configured to determine, according to the first information, whether to configure the at least one second terminal to be the administrator of the PIN corresponding to the PIN identifier.
  • the first terminal is the administrator of the PIN corresponding to the PIN identifier.
  • the identification information of the at least one second terminal includes at least one of the following:
  • At least one device group identifier is used to indicate a trusted member group in which the at least one second terminal belongs, and the terminals in the trusted member group are terminals with trusted identities.
  • the first information is carried in a PIN creation request message or a PIN update request message.
  • the second determination module 802 includes:
  • a verification unit configured to perform identity verification on the at least one second terminal according to the first information
  • a determining unit configured to determine, when the third terminal passes the identity verification, to configure the third terminal to be the administrator of the PIN corresponding to the PIN identifier, and/or, when the fourth terminal fails to pass all authentication procedures. In the case of the above identity verification, it is determined not to configure the fourth terminal as an administrator of the PIN corresponding to the PIN identifier, wherein the at least one second terminal includes the third terminal and/or the third terminal.
  • the verification unit is specifically used to perform verification in a pre-stored first member list and/or second member list, Search the identification information of the at least one second terminal, wherein the first member list includes identification information of trusted members, and the second member list includes identification information of members with administrator status;
  • the determining unit is specifically configured to determine, when the identification information of the third terminal is found in the first member list and/or the second member list, that the third terminal passes the the identity verification, and/or, in the case where the identification information of the fourth terminal is not found in the first member list and/or the second member list, the first device determines that the fourth terminal has not Pass said identity verification.
  • the PIN management device 800 also includes:
  • a search module configured to search for the identification information of the at least one second terminal according to the PIN identifier in a pre-stored third member list, where the third member list includes the PIN identifier that has been configured The identification information of the administrator’s terminal corresponding to the PIN;
  • a screening module configured to screen out terminals other than the fifth terminal in the at least one second terminal when the identification information of the fifth terminal is found in the third member list, wherein the Terminals other than the fifth terminal among the at least one second terminal include the third terminal and/or the fourth terminal.
  • the PIN management device 800 also includes:
  • a storage module configured to store the identification information of the terminal configured as an administrator of the PIN corresponding to the PIN identifier in a third member list in association with the PIN identifier.
  • the PIN management device 800 also includes:
  • a third sending module configured to send a first response to the first terminal, wherein the first response includes a configuration result of the administrator of the PIN of the at least one second terminal, and the configuration result indicates that the third
  • the terminal is configured to be the administrator of the PIN corresponding to the PIN identification, and/or the configuration result indicates that the fourth terminal is not configured to be the administrator of the PIN corresponding to the PIN identification, and the third terminal includes all All or part of the at least one second terminal, or the fourth terminal includes all or part of the at least one second terminal.
  • the PIN management device 800 further includes:
  • a fourth sending module configured to send target configuration information to at least one of the first terminal and the third terminal, where the target configuration information includes at least one of the following:
  • the PIN management device 800 provided by the embodiment of the present application can implement each process of the method embodiment shown in Figure 4 and can achieve the same beneficial effects. To avoid duplication, the details will not be described again.
  • the PIN management device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or a terminal other devices than the terminal.
  • terminals may include but are not limited to the types of terminals 11 listed above, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
  • the PIN management device provided by the embodiment of the present application can implement each process implemented by the method embodiment shown in Figure 2 or Figure 4, and achieve the same technical effect. To avoid duplication, the details will not be described here.
  • this embodiment of the present application also provides an electronic device 900, including a processor 901 and a memory 902.
  • the memory 902 stores programs or instructions that can be run on the processor 901, for example.
  • the electronic device 900 serves as the first terminal
  • the program or instruction is executed by the processor 901
  • each step of the method embodiment shown in Figure 2 is implemented, and the same technical effect can be achieved.
  • the electronic device 900 serves as the first device
  • the program or instruction is executed by the processor 901
  • each step of the method embodiment shown in Figure 4 is implemented, and the same technical effect can be achieved. To avoid duplication, the details will not be described here.
  • An embodiment of the present application also provides a first terminal, including a processor and a communication interface, the communication interface being used to send first information to the first device, where the first information includes a PIN identifier and at least a first Identification information of two terminals; wherein the first information is used to request that the at least one second terminal be configured as an administrator of the PIN corresponding to the PIN identifier.
  • the first terminal embodiment corresponds to the above-mentioned method embodiment on the first terminal side.
  • Each implementation process and implementation manner of the above-mentioned method embodiment can be applied to the first terminal embodiment and can achieve the same technical effect.
  • FIG. 10 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
  • the terminal 1000 includes but is not limited to: a radio frequency unit 1001, a network module 1002, an audio output unit 1003, an input unit 1004, a sensor 1005, a display unit 1006, a user input unit 1007, an interface unit 1008, a memory 1009, a processor 1010, etc. At least some parts.
  • the terminal 1000 may also include a power supply (such as a battery) that supplies power to various components.
  • the power supply may be logically connected to the processor 1010 through a power management system, thereby managing charging, discharging, and power consumption through the power management system. Management and other functions.
  • the terminal structure shown in FIG. 10 does not constitute a limitation on the terminal.
  • the terminal may include more or fewer components than shown in the figure, or some components may be combined or arranged differently, which will not be described again here.
  • the input unit 1004 may include a graphics processing unit (Graphics Processing Unit, GPU) 10041 and a microphone 10042.
  • the graphics processor 10041 is responsible for the image capture device (GPU) in the video capture mode or the image capture mode. Process the image data of still pictures or videos obtained by cameras (such as cameras).
  • the display unit 1006 may include a display panel 10061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 1007 includes at least one of a touch panel 10071 and other input devices 10072 .
  • Touch panel 10071 also known as touch screen.
  • the touch panel 10071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 10072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
  • the radio frequency unit 1001 after receiving the downlink data from the network side device, the radio frequency unit 1001 can transmit it to the processing unit.
  • the processor 1010 performs processing; in addition, the radio frequency unit 1001 can send uplink data to the network side device.
  • the radio frequency unit 1001 includes, but is not limited to, an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, etc.
  • Memory 1009 may be used to store software programs or instructions as well as various data.
  • the memory 1009 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.) etc.
  • memory 1009 may include volatile memory or nonvolatile memory, or memory 1009 may include both volatile and nonvolatile memory.
  • non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory.
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
  • RAM Random Access Memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory Synchronous DRAM, SDRAM
  • Double data rate synchronous dynamic random access memory Double Data Rate SDRAM, DDRSDRAM
  • enhanced SDRAM synchronous dynamic random access memory
  • Synch link DRAM synchronous link dynamic random access memory
  • SLDRAM direct memory bus random access memory
  • Direct Rambus RAM Direct Rambus RAM
  • the processor 1010 may include one or more processing units; optionally, the processor 1010 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 1010.
  • the radio frequency unit 1001 or the network module 1002 is used to send first information to the first device, where the first information includes a PIN identifier and identification information of at least one second terminal;
  • the first information is used to request that the at least one second terminal be configured as an administrator of the PIN corresponding to the PIN identifier.
  • the terminal is the administrator of the PIN corresponding to the PIN identifier.
  • the identification information of the at least one second terminal includes at least one of the following:
  • At least one device group identifier is used to indicate a trusted member group in which the at least one second terminal belongs, and the terminals in the trusted member group are terminals with trusted identities.
  • the first information is carried in a PIN creation request message or a PIN update request message.
  • the radio frequency unit 1001 or the network module 1002 is also configured to receive a first response from the first device, wherein the first response includes the administrator's configuration result of the PIN of the at least one second terminal.
  • the configuration result indicates that the third terminal is configured as the administrator of the PIN corresponding to the PIN identification, and/or the configuration result indicates that the fourth terminal is not configured as the administrator of the PIN corresponding to the PIN identification.
  • the third terminal includes all or part of the at least one second terminal, or the fourth terminal includes all of the at least one second terminal. part or part;
  • the processor 1010 is configured to respectively determine whether the at least one second terminal is the administrator of the PIN corresponding to the PIN identification according to the first response.
  • the radio frequency unit 1001 or the network module 1002 is also configured to send the target to the third terminal.
  • Configuration information includes at least one of the following:
  • the configuration result indicates that the fourth terminal is not configured as the PIN administrator corresponding to the PIN identifier
  • at least one of the audio output unit 1003 and the display unit 1006 is also configured to output the indication.
  • the indication information is used to indicate the reason why the fourth terminal cannot be configured as a PIN administrator corresponding to the PIN identifier.
  • the above-mentioned terminal 1000 can implement the process of implementing each model in the PIN management device 700 as shown in Figure 7, and can achieve the same technical effect. To avoid duplication, the details will not be described here.
  • An embodiment of the present application also provides a first device, including a processor and a communication interface, wherein the communication interface is used to obtain first information from the first terminal, where the first information includes a PIN identifier, and Identification information of at least one second terminal, wherein the first information is used to request that the at least one second terminal be configured as an administrator of the PIN corresponding to the PIN identifier; the processor is used to request according to the The first information determines whether the at least one second terminal is configured as an administrator of the PIN corresponding to the PIN identifier.
  • This first equipment embodiment corresponds to the method embodiment shown in Figure 4.
  • Each implementation process and implementation method of the method embodiment shown in Figure 4 can be applied to this first equipment embodiment, and can achieve the same technical effect. .
  • Embodiments of the present application also provide a readable storage medium.
  • Programs or instructions are stored on the readable storage medium.
  • the program or instructions are executed by a processor, each process of the method embodiment shown in Figure 2 or Figure 4 is implemented. , and can achieve the same technical effect, so to avoid repetition, they will not be described again here.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium includes computer readable storage media, such as computer read-only memory ROM, random access memory RAM, magnetic disk or optical disk, etc.
  • An embodiment of the present application further provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions.
  • the implementation is as shown in Figure 2 or Figure 4. Each process of the method embodiment is shown, and the same technical effect can be achieved. To avoid repetition, the details will not be described here.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
  • Embodiments of the present application further provide a computer program/program product, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement Figure 2 or Figure 4
  • the computer program/program product is executed by at least one processor to implement Figure 2 or Figure 4
  • An embodiment of the present application also provides a communication system, including: a first terminal and a first device.
  • the first terminal can be used to perform the steps of the PIN management method as shown in Figure 2.
  • the first device can be used to perform the steps of the PIN management method as shown in Figure 2.
  • Figure 4 shows the steps of the PIN management method.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to the existing technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk , CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of this application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种PIN管理方法、装置、第一终端和第一设备,属于通信技术领域,本申请实施例的PIN管理方法包括:第一终端向第一设备发送第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息;其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。

Description

PIN管理方法、装置、第一终端和第一设备
相关申请的交叉引用
本申请主张在2022年7月20日在中国提交的中国专利申请No.202210863475.8的优先权,其全部内容通过引用包含于此。
技术领域
本申请属于通信技术领域,具体涉及一种PIN管理方法、装置、第一终端和第一设备。
背景技术
对于一个个人物联网网络(Personal Internet of Things Network,PIN)来说,具有管理功能的PIN网元(PIN element with management capability,PEMC),如终端,能够对PIN进行管理,在相关技术中,可能存在作为PEMC的终端,因关机、欠费等原因而无法对PIN进行管理的问题。
发明内容
本申请实施例提供一种PIN管理方法、装置、第一终端和第一设备,能够为一个PIN配置至少两个PEMC,从而能够使用至少两个PEMC来管理PIN,提升了管理PIN的灵活性。
第一方面,提供了一种PIN管理方法,该方法包括:
第一终端向第一设备发送第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息;
其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
第二方面,提供了一种PIN管理装置,应用于第一终端,该装置包括:
第一发送模块,用于向第一设备发送第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息;
其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
第三方面,提供了一种PIN管理方法,该方法包括:
第一设备获取来自第一终端的第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息,其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员;
所述第一设备根据所述第一信息确定是否将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
第四方面,提供了一种PIN管理装置,应用于第一设备,该装置包括:
获取模块,用于获取来自第一终端的第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息,其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员;
第二确定模块,用于根据所述第一信息确定是否将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
第五方面,提供了一种第一终端,该第一终端包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。
第六方面,提供了一种第一终端,包括处理器及通信接口,其中,所述通信接口用于向第一设备发送第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息;其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
第七方面,提供了一种第一设备,该第一设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第三方面所述的方法的步骤。
第八方面,提供了一种第一设备,包括处理器及通信接口,其中,所述通信接口用于获取来自第一终端的第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息,其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员;所述处理器用于根据所述第一信息确定是否将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
第九方面,提供了一种通信系统,包括:第一终端及第一设备,所述第一终端可用于执行如第一方面所述的PIN管理方法的步骤,所述第一设备可用于执行如第三方面所述的PIN管理方法的步骤。
第十方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤,或者实现如第三方面所述的方法的步骤。
第十一方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法,或实现如第三方面所述的方法。
第十二方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现如第一方面所述的PIN管理方法的步骤,或者以实现如第三方面所述的PIN管理方法的步骤。
在本申请实施例中,第一终端向第一设备发送第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息;其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。第一终端通过向第一设备发送请求信息,以请求将至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员,可以实现对PIN的管理员进行添加,从而使一个PIN的管理员不再局限于一个管理员,且采用多个管理员对同一个PIN进行管理,能够提升管理PIN的灵活性。
附图说明
图1是本申请实施例能够应用的一种通信系统的结构示意图;
图2是本申请实施例提供的一种PIN管理方法的流程图;
图3是本申请实施例中的PIN的架构示意图;
图4是本申请实施例提供的另一种PIN管理方法的流程图;
图5是本申请实施例中新增PIN管理员的流程图之一;
图6是本申请实施例中新增PIN管理员的流程图之二;
图7是本申请实施例提供的一种PIN管理装置的结构示意图;
图8是本申请实施例提供的另一种PIN管理装置的结构示意图;
图9是本申请实施例提供的一种电子设备的结构示意图;
图10是本申请实施例提供的一种终端的硬件结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,如第6代(6th Generation,6G)通信系统。
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11和网络侧设备12。其中,终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴式设备(Wearable Device)、车载设备(Vehicle User Equipment,VUE)、行人终端(Pedestrian User Equipment,PUE)、智能家居(具有无线通信功能的家居设备,如冰箱、电视、洗衣机或者家具等)、游戏机、个人计算机(personal computer,PC)、柜员机或者自助机等终端侧设备,可穿戴式设备包括:智能手表、智能手环、智能耳机、智能眼镜、智能首饰(智能手镯、智能手链、智能戒指、智能项链、智能脚镯、智能脚链等)、智能腕带、智能服装等。需要说明的是,在本申请实施例并不限定终端11的具体类型。网络侧设备12可以包括接入网设备或核心网设备,其中,接入网设备也可以称为无线接入网设备、无线接入网(Radio Access Network,RAN)、无线接入网功能或无线接入网单元。接入网设备可以包括基站、无线局域网(Wireless Local Area Network,WLAN)接入点或WiFi节点等,基站可被称为节点B、演进节点B(eNB)、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本 服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、家用B节点、家用演进型B节点、发送接收点(Transmitting Receiving Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例进行介绍,并不限定基站的具体类型。
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的PIN管理方法、PIN管理装置、终端和网络侧设备进行详细地说明。
请参阅图2,本申请实施例提供的PIN管理方法,可以由第一终端执行。如图2所示,该第一终端执行的PIN管理方法可以包括以下步骤:
步骤201、第一终端向第一设备发送第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息;
其中,所述第一信息可以具有以下作用中的至少一项:
1)用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员;
2)用于确定是否将所述至少一个第二终端配置成为所述PIN标识符对应的PIN管理员;
3)用于供第一设备确定是否将所述至少一个第二终端配置成为所述PIN标识符对应的PIN管理员,这样,所述第一设备可以基于第一信息确定是否将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
其中,PIN标识符用于标识PIN,例如:PIN标识符可以包括PIN身份标识码(PIN Identity,PIN ID)、PIN名称、PIN描述信息等标识信息中的至少一项。
在相关技术中,PIN是基于大量增加的消费者物联网设备,并由这些物联网设备,所组成和衍生的一种网络。这些设备既可以是可穿戴设备(即人身上的设备,如摄像头、耳机、手表、耳机、健康监测器等),也可以是家中的物联网设备(如智能灯、摄像头、恒温器、门传感器、语音助手、扬声器、冰箱、洗衣机等)。用户主要在家中或身体周围使用这些个人物联网设备来创建个人物联网网络。
通常来说,PIN一般用于家庭,办公室等场景。部署在这些场景内的物联网设备,可以实现互联,相互通信、获取服务,因而叫做个人物联网。同时,PIN中的物联网设备,可以通过某种机制和实现方式,经过PIN中具有网关功能的设备,访问通信网络(如5G系统(5G System,5GS)),访问网络的其他服务器或者完成业务。
如图3所示,相关技术中的PIN框架中的全部使能网元(enabler)都叫使能层,其可以认为是一种应用层的设计,位于操作系统(Operating System,OS)之上,如:客户端或者应用软件(Application,APP);或者,该enabler也可以是操作系统OS的一种能力,作为操作系统的一部分,提供服务;或者,该enabler也可以认为是一种芯片能力,位于调制解调器(modem)芯片模组上。
如图3所示,本申请实施例中的PIN框架通常包括以下PIN网元(PIN element,PINE):
具有管理功能的PIN网元(PIN Element with Management Capability,PEMC):可以 管理整个PIN,比如,将一个PINE加入到PEMC所管理的PIN;
具有网关功能的PIN网元(PIN element with Gateway capability,PEGC):负责路由PINE的流量到目的地,比如,一个PINE要跟PIN内的其他PINE通信,那么可以通过PEGC进行路由;
以上所述PEMC或PEGC的功能,还可以是PEMC上的PIN应用客户端(PIN client)或者PEGC上的PIN client完成。
PIN服务器(server):用于授权建立一个PIN,或者授权对PIN进行更新,比如,修改PIN的名称或给PIN增添新的成员。通常是PEMC触发PIN建立请求,然后由PIN server验证通过这个建立请求。同时,PIN server还可以用于PINE请求查找一个PIN,或者查找一个PIN对应的PEMC等等。PIN server的另一个名称可以叫PIN管理功能(PIN Management Function,PIN MF)实体。
图中所示的使能层,比如PEMC使能层,都可以视为PEMC的一个客户端,比如,PIN client或者PEMC client。
其中,上述第一终端可以是PIN现有的管理员对应的终端,例如:对于某一房间内的设备构成的PIN,其管理员可以是房主,此时,第一终端可以是该房主的手机、手表、AR、VR等终端设备,或者与房主的身份标识信息关联的终端。
其中,上述第一设备可以是具有管理功能的PIN网元或PIN服务器(server)等,为了便于说明,本申请的以下实施例中,以第一设备为PIN server为例进行举例说明。
可选地,所述第一终端为所述PIN标识符对应的PIN的管理员,例如:第一设备接收到第一终端发送的第一信息,所述第一信息中包括至少一个第二终端,所述至少一个第二终端将请求申请成为PIN标识符对应的PIN的管理员,第一设备可以将第二终端配置为PIN标识符对应的PIN的管理员,或者,第一设备还可以对第二终端进行身份验证,并将通过身份验证的第二终端配置为PIN标识符对应的PIN的管理员。
其中,第一设备对第二终端进行身份验证的过程可以是,将第二终端的标识信息与可信成员列表进行匹配,若在可信成员列表中查找到该第二终端的标识信息,则可以确定该第二终端通过身份验证,在实施中,上述可信成员列表可以包括PIN标识符对应的PIN的可信成员信息,或者,该可信成员列表可以包括已完成注册的管理员的信息,例如:在第二终端进行了PIN标识符对应的PIN的管理员注册的情况下,可信成员列表中具有该第二终端的标识信息。比如说,一组第二终端可以分别使用其各自的终端标识(用户永久标识符(SUbscription Permanent Identifier,SUPI),通用公共用户标识(Generic Public Subscription Identifier,GPSI)等)或PIN客户端ID,PIN client ID注册到第一设备,然后,第一设备可以将这些第二终端设置为某个PIN的可信成员。当第一终端请求为至少一个第二终端设置成为该PIN的管理员的时候,第一设备需要对这些第二终端的可信身份进行验证。所述可信身份的列表,也可以是保存在统一数据格式存储库(Unified Data Repository,UDR)里,由第一设备携带至少一个第二终端标识符,去UDR里验证可信身份。
例如:UDR里存储的第一PIN和第二PIN的可信成员如下表1所示:
如上表1中,第一个PIN的PIN标识符为Local.ABC.PIN,第二个PIN的PIN标识符为AAA.PIN,且Local.ABC.PIN对应的PIN的可信成员包括终端1、终端2和终端3;AAA.PIN对应的PIN的可信成员包括终端1、终端3和终端5。
需要说明的是,本申请实施例中提到的可信成员、管理员身份以及PIN管理员等都是指所述第一信息中携带的PIN标识符对应的PIN的可信成员、管理员身份以及PIN管理员,而其他PIN的可信成员、管理员身份以及PIN管理员不在本申请的考虑范围内。
也就是说,本申请的以下实施例中提到的第一成员列表中的可信成员,具体可以是可信成员列表中与所述第一信息中携带的PIN标识符对应的可信成员,或者,第一成员列表具体指与所述第一信息中携带的PIN标识符对应的可信成员列表;同理,本申请实施例中提到的第二成员列表中具有管理员身份的成员,具体可以是管理员身份列表中具有与所述第一信息中携带的PIN标识符对应的PIN的管理员身份的成员,或者,第二成员列表具体指具有与所述第一信息中携带的PIN标识符对应的PIN的管理员身份的成员列表。
本实施方式中,某一PIN现有的PEMC(即第一终端)预先存储有该PIN的PIN标识符,并在需要给该PIN添加新的PEMC(即第二终端)时,现有的PEMC可以向PIN server(即第一设备)发送第一信息,以在该第一信息中携带该PIN标识符以及需要添加的新的PEMC的标识信息,这样,第一设备可以决定是否将第二终端配置为所述PIN标识符对应的PIN的管理员。
作为一种可选的实施方式,所述至少一个第二终端的标识信息包括以下至少一项:
所述至少一个第二终端的设备标识,例如:所述至少一个第二终端的标识信息包括每一个需要添加的PEMC的通用公共用户标识(Generic Public Subscription Identifier,GPSI);或者终端的其他标识符,比如,终端上安装的PIN客户端标识符(PIN client ID)。
至少一个设备组标识,所述设备组标识用于指示所述至少一个第二终端所在的可信成员组,所述可信成员组中的终端为具有可信身份的终端,例如:所述至少一个第二终端的标识信息包括信任成员组ID(trust member group ID),上述需要添加的PEMC位于该trust member group ID所标识的trust member group内。比如,一个办公室内的所有员工的终端,构成一个可信成员组,然后,这些员工的终端都视为,公司PIN的可信成员。设置可信成员组的好处,是可以把终端归类到不同的可信成员组,而不用把所有终端全部都放到一个 大的可信成员组,以方便管理。不同的可信成员组里的成员,可以被授权成为不同PIN的管理员,从而能够对不同可信成员组里的成员进行差异化管理。
在一种可能的实现方式中,第一设备能够根据上述至少一个第二终端的设备标识来区分每一个第二终端,从而可以基于该设备标识来对每一个第二终端进行识别和/或验证,以确定是否将各个第二终端配置成为PEMC。
在一种可能的实现方式中,第一设备能够根据上述至少一个第二终端的设备组标识,来区分所述至少一个第二终端所在的设备组,从而可以基于该设备组标识来对该组内的全部第二终端进行识别和/或验证,以确定是否将该设备组内的全部第二终端配置成为PEMC。
作为一种可选的实施方式,所述第一信息携带于PIN创建请求消息或PIN更新请求消息中。
本实施方式,可以利用相关技术中的PIN create请求消息或PIN update请求消息来传输上述第一信息,即,可以在PIN创建或者PIN更新的时候,将至少一个第二终端的标识符携带,以请求设置他们成为PIN管理员。
作为一种可选的实施方式,所述PIN管理方法还包括:
所述第一终端接收来自所述第一设备的第一响应,其中,所述第一响应包括所述至少一个第二终端的PIN的管理员的配置结果,所述配置结果指示将第三终端配置成为所述PIN标识所对应的PIN的管理员,和/或,所述配置结果指示未将第四终端配置成为所述PIN标识所对应的PIN的管理员,所述第三终端包括所述至少一个第二终端的全部或者部分,或者,所述第四终端包括所述至少一个第二终端的全部或者部分;
所述第一终端根据第一响应,分别确定所述至少一个第二终端是否为所述PIN标识所对应的PIN的管理员。
其中,上述第一响应可以是对第一信息的响应,或者,对携带第一信息的PIN create请求消息或PIN update请求消息的响应。该第一响应中的配置结果可以指示所述第一设备将所述至少一个第二终端中的哪一部分配置为PIN的管理员,如:所述配置信息包括所述至少一个第二终端中确定了会被配置成目标PIN的管理员的标识信息,或者,将所述至少一个第二终端中的哪一部分未配置为PIN的管理员,如:所述配置信息包括所述至少一个第二终端中确定了不会被配置成目标PIN的管理员的标识信息,或者,将所述至少一个第二终端中的哪一部分配置为PIN的管理员,且另一部分未配置为PIN的管理员的配置结果,如:所述配置信息包括所述至少一个第二终端中确定了会被配置成目标PIN的管理员的第一标识信息,以及将这些第一标识信息对应的第二终端配置成目标PIN的管理员的指示信息,且所述配置信息还包括所述至少一个第二终端中确定了不会被配置成目标PIN的管理员的第二标识信息,以及不将这些第二标识信息对应的第二终端配置成目标PIN的管理员的指示信息。
本实施方式中,第一终端还可以接收来自所述第一设备对至少一个第二终端的PIN的管理员的配置结果,并据此确定哪一些第二终端配置成为PIN的管理员了,哪一些第二终 端没有配置成为PIN的管理员。例如:如果有一部分第二终端被配置为PIN的管理员,则第一设备给出这一部分的第二终端标识,并指示这些第二终端被配置成管理员;如果有一部分第二终端没有被配置为PIN的管理员,则第一设备给出这一部分的第二终端标识,并指示这些第二终端没有被配置成管理员。
其中,对于上述至少一个第二终端中的且没有配置成为PIN的管理员,上述第一响应还可以包括没有将该第二终端配置成为PIN的管理员的原因,例如:没有通过身份验证(如:该终端不具备成为管理员的资格)、或者PIN的管理员数量达到上限等。此时,可以在第一终端上输出该原因,其中,第一终端输出该原因的方式有多种,例如:通过显示屏显示该原因的文字内容和/或图标,或者,通过扬声器输出该原因的音频。
作为一种可选的实施方式,在所述配置结果指示未将第四终端配置成为所述PIN标识符对应的PIN管理员的情况下,所述方法还包括:
所述第一终端输出指示信息,所述指示信息用于指示所述第四终端未能被配置成为所述PIN标识符对应的PIN管理员的原因。
本实施方式中,第一终端在向第一设备请求将至少一个第二终端配置成PIN标识符对应的PIN管理员的情况下,对于该至少一个第二终端中的没有成功配置成为所述PIN标识符对应的PIN管理员的第四终端,可以在第一终端上输出指示信息,以指示所述第四终端未能被配置成为所述PIN标识符对应的PIN管理员的原因。这样,用户可以根据该指示信息进行相应的调整,例如:指示信息指示第四终端之所以没有被配置成为所述PIN标识符对应的PIN管理员,是因为该第四终端不属于可信成员列表,此时,用户可以先对第四终端进行可信成员相关的注册,以在可信成员列表中添加该第四终端的标识信息,然后再利用第一终端向第一设备发送该第四终端相关的第一信息(即第一信息可以包括PIN标识符可第四终端的标识信息),以使第一设备根据该第一信息将第四终端添加为所述PIN标识符对应的PIN管理员。
此外,对于已成功配置为所述PIN标识符对应的PIN管理员的第二终端,可以向该第二终端发送所述PIN标识符对应的PIN的目标配置信息,以使第二终端能够参与PIN标识符对应的PIN的管理。
作为一种可选的实施方式,在所述配置结果指示将第三终端配置成为所述PIN标识所对应的PIN的管理员的情况下,所述方法还包括:
所述第一终端向所述第三终端发送目标配置信息,所述目标配置信息包括以下至少一项:
所述PIN标识符;
所述PIN标识符对应的PIN的描述信息;
所述PIN标识符对应的PIN中的用户成员信息;
所述PIN标识符对应的PIN的配置信息;
所述PIN标识符对应的PIN提供的服务信息。
其中,上述PIN标识符对应的PIN的配置信息,可以包括这个PIN的基本配置,比如PIN ID,PIN的名称,PIN能提供的服务(比如打印服务,智慧屏,投影等等),PIN中的成员信息(比如,PIN里所有PINE ID,PINE的网络协议(Internet Protocol,IP)地址等等),PIN里的PEGC ID或者PEGC IP地址等等。由于第二终端成为了PIN的管理员,那么相关的PIN的配置也必须更新到这个管理员这里。
本实施方式中,由第一终端向新添加的PEMC发送上述目标配置信息,可以降低新添加的PEMC获取上述目标配置信息的复杂程度。
当然,在具体实施中,还可以通过PIN中具有网关功能或具有无线通信功能的PINE向上述新添加的PEMC发送上述目标配置信息,在此不作具体限定。
在本申请实施例中,第一终端向第一设备发送第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息;其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。第一终端通过向第一设备发送请求信息,以请求将至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员,可以实现对PIN的管理员进行添加,从而使一个PIN的管理员不再局限于一个管理员,且采用多个管理员对同一个PIN进行管理,能够提升管理PIN的灵活性。
请参阅图4,本申请实施例提供的另一种PIN管理方法,与如图2所示方法实施例提供的PIN管理方法相对应,其中,如图2所示方法实施例提供的PIN管理方法的执行主体是第一终端,而如图4所示方法实施例提供的PIN管理方法的执行主体是第一设备,本申请实施例中第一设备执行的PIN管理方法的过程可以参考如图2所示方法实施例中的第一终端执行的PIN管理方法的过程。
如图4所示,该第一设备执行的PIN管理方法可以包括以下步骤:
步骤401、第一设备获取来自第一终端的第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息,其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
步骤402、所述第一设备根据所述第一信息确定是否将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
其中,上述第一信息、第一终端、第二终端、第一设备、PIN的含义和作用与如图2所示方法实施例中的第一信息、第一终端、第二终端、第一设备、PIN的和作用相同,在此不再赘述。
本申请实施例中,第一设备能够根据来自第一终端的第一信息,确定是否将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员,从而能够给一个PIN配置多个管理员,以使多个管理员共同实现对一个PIN的管理,提升了管理PIN的灵活性。
作为一种可选的实施方式,所述第一终端为所述PIN标识符对应的PIN的管理员。
作为一种可选的实施方式,所述至少一个第二终端的标识信息包括以下至少一项:
所述至少一个第二终端的设备标识;
至少一个设备组标识,所述设备组标识用于指示所述至少一个第二终端所在的可信成员组,所述可信成员组中的终端为具有可信身份的终端。
作为一种可选的实施方式,所述第一信息携带于PIN创建请求消息或PIN更新请求消息中。
上述第一信息中包括至少一个第二终端,所述至少一个第二终端将请求申请成为PIN标识符对应的PIN的管理员,上述步骤402中,第一设备可以直接将该第一信息中包括的第二终端配置成为所述PIN标识符对应的PIN的管理员,或者,对该第一信息中包括的第二终端进行验证,并将通过验证的第二终端配置成为所述PIN标识符对应的PIN的管理员,对于没有通过验证的第二终端,可以不将其配置成所述PIN标识符对应的PIN的管理员。
作为一种可选的实施方式,所述第一设备根据所述第一信息确定是否将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员,包括:
所述第一设备根据所述第一信息对所述至少一个第二终端进行身份验证;
在第三终端通过所述身份验证的情况下,所述第一设备确定将所述第三终端配置成为所述PIN标识符对应的PIN的管理员,和/或,在第四终端未通过所述身份验证的情况下,所述第一设备确定不将所述第四终端配置成为所述PIN标识符对应的PIN的管理员,其中,所述至少一个第二终端包括所述第三终端和/或所述第四终端。
其中,上述对所述至少一个第二终端进行身份验证,可以是验证所述至少一个第二终端是否为可信的终端,和/或,验证所述至少一个第二终端是否具有PIN标识符对应的PIN的管理权限等。本申请实施例中,将所述至少一个第二终端中的且通过身份验证的为第三终端,将所述至少一个第二终端中的且未通过身份验证的为第四终端。
这样,可以在所述至少一个第二终端中的第三终端通过身份验证时,才将该第三终端配置成为PEMC,在所述至少一个第二终端中的第四终端没有通过身份验证时,便不将该第四终端配置成为PEMC,能够降低将不可信的终端配置成PEMC的概率,提升了PIN的安全性能。
可选地,所述第一设备根据所述第一信息对所述至少一个第二终端进行身份验证,包括:
所述第一设备在预先存储的第一成员列表和/或第二成员列表中,查找所述至少一个第二终端的标识信息;
所述在第三终端通过所述身份验证的情况下,所述第一设备确定将所述第三终端配置成为所述PIN标识符对应的PIN的管理员,和/或,在第四终端未通过所述身份验证的情况下,所述第一设备确定不将所述第四终端配置成为所述PIN标识符对应的PIN的管理员,包括:
在所述第一成员列表和/或第二成员列表中查找到所述第三终端的标识信息的情况下,所述第一设备确定所述第三终端通过所述身份验证,和/或,在所述第一成员列表和/或第二成员列表中未查找到所述第四终端的标识信息的情况下,所述第一设备确定所述第四终 端未通过所述身份验证;
其中,所述第一成员列表包括可信成员的标识信息,所述第二成员列表包括具有管理员身份的成员的标识信息。
在实施中,上述第一成员列表包括可信成员的标识信息,这样,若在第一成员列表中查找到第三终端的标识信息,则可以确定该第三终端属于可信成员,降低了对可信成员的验证复杂程度。
上述第二成员列表包括具有管理员身份的成员的标识信息,这样,若在第二成员列表中查找到第三终端的标识信息,则可以确定该第三终端已经注册成为了PIN的管理员身份,降低了对具有管理员身份的终端的验证复杂程度。
值得提出的是,在实施中,上述第一成员列表和/或第二成员列表可以预先存储在所述第一设备,但是,也可能存储在通信网络中的其他网络侧设备,如:假设第一设备是PIN server上述第一成员列表和/或第二成员列表存储在统一数据格式存储库(Unified Data Repository,UDR)或统一数据管理实体(Unified Data Management,UDM)。此时,上述第一设备可以通过通信网络中的其他网络侧设备,共同实现在第一成员列表和/或第二成员列表中查找所述至少一个第二终端的标识信息,在此不作具体限定。
作为一种可选的实施方式,本申请实施例提供的PIN管理方法还包括:所述方法还包括:
所述第一设备在预先存储的第三成员列表中,根据所述PIN标识符,查找所述至少一个第二终端的标识信息,其中,所述第三成员列表包括已经配置成为所述PIN标识符对应的PIN的管理员的终端的标识信息;
在所述第三成员列表中查找到第五终端的标识信息的情况下,所述第一设备筛选出所述至少一个第二终端中除了所述第五终端之外的终端,其中,所述至少一个第二终端中除了所述第五终端之外的终端包括所述第三终端和/或所述第四终端。
其中,上述第三成员列表存储有已经配置成为所述第一信息中携带的PIN标识符对应的PIN的管理员的终端标识,可以是将在历史时间段内配置成为目标PIN的管理员的终端标识全部存储在第三成员列表中。
例如:假设第三成员列表存储了目标PIN的标识符分别与终端1和终端2之间的对应关系,则在第一终端(或终端2)向第一设备发送第一信息时,比如,第一终端发送一个PIN更新请求,这个请求里(包含PIN ID),若携带终端1和终端3的标识信息,请求把这两个终端都配置成管理员,则第一设备会现在第三成员列表中查找该终端1和终端3的标识信息,且基于在第三成员列表中查找到与PIN标识符关联的终端1的标识信息,这说明终端1已经配置成这个PIN的管理员,则不会对终端1进行身份验证以及后续的配置PIN管理员相关的操作,而仅对终端3进行身份验证,以为终端1已经无需再配置成为管理员了。若终端3通过身份验证,则确定将终端3配置成为目标PIN的管理员;若终端3未通过身份验证,则确定不将终端3配置成为目标PIN的管理员。
这样,对于已经配置成为目标PIN的管理员身份的第五终端,可以避免对其进行重复的身份验证和管理员身份配置。
作为一种可选的实施方式,所述PIN管理方法还包括:
所述第一设备将配置成为所述PIN标识符对应的PIN的管理员的终端的标识信息与所述PIN标识符关联存储在第三成员列表中。
其中,上述第三成员列表可以存储在第一设备,也可能存储在通信网络中的其他设备,例如:UDR等,在此不作具体限定。
在实施中,第一设备可以在每次确定将某一终端配置成为所述PIN标识符对应的PIN的管理员的情况下,对上述第三成员列表进行更新,以使更新后的第三成员列表包括所述PIN标识符与目标PIN(即所述PIN标识符对应的PIN)的全部管理员之间的关联关系。这样,可以第一设备可以同步更新已经配置成为目标PIN的管理员的终端。
例如:第一终端第一次向第一设备发送第一信息时,携带终端1和终端2的标识信息,假设第一设备基于第一信息,确定将终端1和终端2都配置成为目标PIN(即上述PIN标识符对应的PIN)的管理员身份,则会在第三成员列表中将终端1和终端2分别与PIN标识符关联存储。
作为一种可选的实施方式,在所述第一设备根据所述第一信息对所述至少一个第二终端进行身份验证之后,所述方法还包括:
所述第一设备向所述第一终端发送第一响应,其中,所述第一响应包括所述至少一个第二终端的PIN的管理员的配置结果,所述配置结果指示将第三终端配置成为所述PIN标识所对应的PIN的管理员,和/或,所述配置结果指示未将第四终端配置成为所述PIN标识所对应的PIN的管理员,所述第三终端包括所述至少一个第二终端的全部或者部分,或者,所述第四终端包括所述至少一个第二终端的全部或者部分。
在实施中,上述至少一个第二终端的PIN的管理员的配置结果,可以指示哪一些第二终端配置成为PIN的管理员,和/或,指示哪一些第二终端没有配置成为PIN的管理员。
此外,对于没有配置成为PIN的管理员的第二终端,还可以在述至少一个第二终端的PIN的管理员的配置结果中指示未将这些第二终端配置成为PIN的管理员的原因,例如:第四终端不属于可信成员和/或第四终端不具有对上述PIN的管理员身份等。
本实施方式与如图2所示方法实施例中,第一终端获取第一响应的作用相同,在此不再赘述。
作为一种可选的实施方式,在所述第一响应指示所述第三终端通过所述身份验证的情况下,所述方法还包括:
所述第一设备向所述第一终端和所述第三终端中的至少一个发送目标配置信息,所述目标配置信息包括以下至少一项:
所述PIN标识符;
所述PIN标识符对应的PIN的描述信息;
所述PIN标识符对应的PIN中的用户成员信息;
所述PIN标识符对应的PIN的配置信息;
所述PIN标识符对应的PIN提供的服务信息。
本实施方式,与如图2所示方法实施例中,第一终端向第三终端发送上述目标配置信息的作用相似,不同之处包括,本申请实施例中,可以由第一设备向第三终端发送上述目标配置信息,或者,由第一设备先向第一终端发送上述目标配置信息,然后由第一终端将该目标配置信息转发给第三终端,这样,第三终端能够在获取目标配置信息后,根据该目标配置信息实现对PIN的管理功能,在此不再赘述。
为了便于说明本申请实施例提供的PIN管理方法,以如下应用场景为例,对本申请实施例提供的PIN管理方法进行举例说明:
场景一
如图5所示,假设第一终端为目标PIN的PEMC,第一设备为目标PIN的PIN server,第二终端为新增(additional)PEMCs。则本申请实施例提供的PIN管理方法可以包括以下步骤:
步骤1、PEMC向第一设备发送PIN create请求消息,该PIN create请求消息中携带目标PIN的标识信息和additional PEMCs的标识信息,其中,Additional PEMCs的标识信息就是希望请求将该标识信息对应的终端配置成为这个PIN的管理员。
步骤2、PIN server验证这些additional PEMCs是否属于可信成员。
其中,PIN server可以在收到additional PEMC GPSI(或者PIN client ID)的情况下,与UDR(或者5GS中的其他网络侧设备)一起检查根据additional PEMC GPSI确定的PEMC是否包含在可信成员中,如果additional PEMC GPSI对应的PEMC包含在可信成员中,则确定该additional PEMC通过验证。
步骤3、PIN server向PEMC发送PIN create响应消息。
其中,如果可信成员验证通过,则additional PEMC也将获得目标PIN的管理员身份,如果可信成员验证失败,则可以在PEMC的显示屏上显示验证失败相关的原因。
本实施例中,additional PEMCs的标识信息可以是每一个additional PEMC的ID,如GPSI。或者,additional PEMCs的标识信息可以是全部additional PEMC的组标识,如trust member group ID。
如果部分additional PEMC通过验证,成为管理员,则PIN server可以指示这些PEMC的GPSI或者PIN client ID,以说明其成为PIN的管理员;而对于未通过的,可以指示他们的标识符,也可以不指示,即,抛除通过的PEMC,自然剩下的就是未通过的PEMC。
场景二
如图6所示,假设第一终端为目标PIN的PEMC,第一设备为目标PIN的PIN server,第二终端为新增(additional)PEMCs,且可信成员列表存储在UDR中。则本申请实施例提供的PIN管理方法可以包括以下步骤:
步骤1、进行PIN列表信息和/或PIN信息查询。
在本步骤之前,additional PEMC可以注册成目标PIN的管理员身份,从而在本步骤中查询得到的PIN列表信息和/或PIN信息中可以包括additional PEMC。
步骤2、PEMC触发的PIN更新请求消息,该PIN更新请求消息携带了additional PEMC的标识信息,以及目标PIN的标识信息,例如:PIN ID、PIN名称、PIN描述信息、PIN服务信息,以及时间信息等。
步骤3、PIN server查询可信成员。
本步骤中,PIN server在接收到additional PEMC GPSIs时,PIN server先判断PIN列表信息和/或PIN信息中是否有新添加的PEMC,如果有,则PIN server与UDR一起检查新添加的PEMC是否包含在由PEMC GPSIs标识的PEMC的信任成员中,其他那些非新请求添加的PEMC(即PIN现有的管理员身份列表中的第五终端对应的PEMC),其标识会被忽略不处理。
步骤4、PIN server向PEMC发送PIN更新响应消息。
本申请实施例提供的PIN管理方法,执行主体可以为PIN管理装置。本申请实施例中以PIN管理装置执行PIN管理方法为例,说明本申请实施例提供的PIN管理装置。
请参阅图7,本申请实施例提供的一种PIN管理装置,可以是第一终端内的装置,如图7所示,该PIN管理装置700可以包括以下模块:
第一发送模块701,用于向第一设备发送第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息;
其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
可选地,所述第一终端为所述PIN标识符对应的PIN的管理员。
可选地,所述至少一个第二终端的标识信息包括以下至少一项:
所述至少一个第二终端的设备标识;
至少一个设备组标识,所述设备组标识用于指示所述至少一个第二终端所在的可信成员组,所述可信成员组中的终端为具有可信身份的终端。
可选地,所述第一信息携带于PIN创建请求消息或PIN更新请求消息中。
可选地,PIN管理装置700还包括:
第一接收模块,用于接收来自所述第一设备的第一响应,其中,所述第一响应包括所述至少一个第二终端的PIN的管理员的配置结果,所述配置结果指示将第三终端配置成为所述PIN标识所对应的PIN的管理员,和/或,所述配置结果指示未将第四终端配置成为所述PIN标识所对应的PIN的管理员,所述第三终端包括所述至少一个第二终端的全部或者部分,或者,所述第四终端包括所述至少一个第二终端的全部或者部分;
第一确定模块,用于根据第一响应,分别确定所述至少一个第二终端是否为所述PIN标识所对应的PIN的管理员。
可选地,在所述配置结果指示将第三终端配置成为所述PIN标识所对应的PIN的管理员的情况下,PIN管理装置700还包括:
所述第一终端向所述第三终端发送目标配置信息,所述目标配置信息包括以下至少一项:
所述PIN标识符;
所述PIN标识符对应的PIN的描述信息;
所述PIN标识符对应的PIN中的用户成员信息;
所述PIN标识符对应的PIN的配置信息;
所述PIN标识符对应的PIN提供的服务信息。
可选地,在所述配置结果指示未将第四终端配置成为所述PIN标识符对应的PIN管理员的情况下,PIN管理装置700还包括:
输出模块,用于输出指示信息,所述指示信息用于指示所述第四终端未能被配置成为所述PIN标识符对应的PIN管理员的原因。
本申请实施例提供的PIN管理装置700,能够实现如图2所示方法实施例的各个过程,且能够取得相同的有益效果,为避免重复,在此不再赘述。
请参阅图8,本申请实施例提供的另一种PIN管理装置,可以是第一设备内的装置,如图8所示,该PIN管理装置800可以包括以下模块:
获取模块801,用于获取来自第一终端的第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息,其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员;
第二确定模块802,用于根据所述第一信息确定是否将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
可选地,所述第一终端为所述PIN标识符对应的PIN的管理员。
可选地,所述至少一个第二终端的标识信息包括以下至少一项:
所述至少一个第二终端的设备标识;
至少一个设备组标识,所述设备组标识用于指示所述至少一个第二终端所在的可信成员组,所述可信成员组中的终端为具有可信身份的终端。
可选地,所述第一信息携带于PIN创建请求消息或PIN更新请求消息中。
可选地,第二确定模块802,包括:
验证单元,用于根据所述第一信息对所述至少一个第二终端进行身份验证;
确定单元,用于在第三终端通过所述身份验证的情况下,确定将所述第三终端配置成为所述PIN标识符对应的PIN的管理员,和/或,在第四终端未通过所述身份验证的情况下,确定不将所述第四终端配置成为所述PIN标识符对应的PIN的管理员,其中,所述至少一个第二终端包括所述第三终端和/或所述第四终端。
可选地,所述验证单元,具体用于在预先存储的第一成员列表和/或第二成员列表中, 查找所述至少一个第二终端的标识信息,其中,所述第一成员列表包括可信成员的标识信息,所述第二成员列表包括具有管理员身份的成员的标识信息;
所述确定单元,具体用于在所述第一成员列表和/或第二成员列表中查找到所述第三终端的标识信息的情况下,所述第一设备确定所述第三终端通过所述身份验证,和/或,在所述第一成员列表和/或第二成员列表中未查找到所述第四终端的标识信息的情况下,所述第一设备确定所述第四终端未通过所述身份验证。
可选地,PIN管理装置800还包括:
查找模块,用于在预先存储的第三成员列表中,根据所述PIN标识符,查找所述至少一个第二终端的标识信息,其中,所述第三成员列表包括已经配置成为所述PIN标识符对应的PIN的管理员的终端的标识信息;
筛选模块,用于在所述第三成员列表中查找到第五终端的标识信息的情况下,筛选出所述至少一个第二终端中除了所述第五终端之外的终端,其中,所述至少一个第二终端中除了所述第五终端之外的终端包括所述第三终端和/或所述第四终端。
可选地,PIN管理装置800还包括:
存储模块,用于将配置成为所述PIN标识符对应的PIN的管理员的终端的标识信息与所述PIN标识符关联存储在第三成员列表中。
可选地,PIN管理装置800还包括:
第三发送模块,用于向所述第一终端发送第一响应,其中,所述第一响应包括所述至少一个第二终端的PIN的管理员的配置结果,所述配置结果指示将第三终端配置成为所述PIN标识所对应的PIN的管理员,和/或,所述配置结果指示未将第四终端配置成为所述PIN标识所对应的PIN的管理员,所述第三终端包括所述至少一个第二终端的全部或者部分,或者,所述第四终端包括所述至少一个第二终端的全部或者部分。
可选地,在所述第一响应指示所述第三终端通过所述身份验证的情况下,PIN管理装置800还包括:
第四发送模块,用于向所述第一终端和所述第三终端中的至少一个发送目标配置信息,所述目标配置信息包括以下至少一项:
所述PIN标识符;
所述PIN标识符对应的PIN的描述信息;
所述PIN标识符对应的PIN中的用户成员信息;
所述PIN标识符对应的PIN的配置信息;
所述PIN标识符对应的PIN提供的服务信息。
本申请实施例提供的PIN管理装置800,能够实现如图4所示方法实施例的各个过程,且能够取得相同的有益效果,为避免重复,在此不再赘述。
本申请实施例中的PIN管理装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终 端之外的其他设备。示例性的,终端可以包括但不限于上述所列举的终端11的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。
本申请实施例提供的PIN管理装置能够实现图2或图4所示方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
可选的,如图9所示,本申请实施例还提供一种电子设备900,包括处理器901和存储器902,存储器902上存储有可在所述处理器901上运行的程序或指令,例如,该电子设备900作为第一终端时,该程序或指令被处理器901执行时实现如图2所示方法实施例的各个步骤,且能达到相同的技术效果。该电子设备900作为第一设备时,该程序或指令被处理器901执行时实现如图4所示方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种第一终端,包括处理器和通信接口,所述通信接口用于向第一设备发送第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息;其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
该第一终端实施例与上述第一终端侧的方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该第一终端实施例中,且能达到相同的技术效果。具体地,图10为实现本申请实施例的一种终端的硬件结构示意图。
该终端1000包括但不限于:射频单元1001、网络模块1002、音频输出单元1003、输入单元1004、传感器1005、显示单元1006、用户输入单元1007、接口单元1008、存储器1009以及处理器1010等中的至少部分部件。
本领域技术人员可以理解,终端1000还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器1010逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图10中示出的终端结构并不构成对终端的限定,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
应理解的是,本申请实施例中,输入单元1004可以包括图形处理单元(Graphics Processing Unit,GPU)10041和麦克风10042,图形处理器10041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元1006可包括显示面板10061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板10061。用户输入单元1007包括触控面板10071以及其他输入设备10072中的至少一种。触控面板10071,也称为触摸屏。触控面板10071可包括触摸检测装置和触摸控制器两个部分。其他输入设备10072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
本申请实施例中,射频单元1001接收来自网络侧设备的下行数据后,可以传输给处 理器1010进行处理;另外,射频单元1001可以向网络侧设备发送上行数据。通常,射频单元1001包括但不限于天线、放大器、收发信机、耦合器、低噪声放大器、双工器等。
存储器1009可用于存储软件程序或指令以及各种数据。存储器1009可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器1009可以包括易失性存储器或非易失性存储器,或者,存储器1009可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器1009包括但不限于这些和任意其它适合类型的存储器。
处理器1010可包括一个或多个处理单元;可选的,处理器1010集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器1010中。
其中,射频单元1001或网络模块1002,用于向第一设备发送第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息;
其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
可选地,所述终端为所述PIN标识符对应的PIN的管理员。
可选地,所述至少一个第二终端的标识信息包括以下至少一项:
所述至少一个第二终端的设备标识;
至少一个设备组标识,所述设备组标识用于指示所述至少一个第二终端所在的可信成员组,所述可信成员组中的终端为具有可信身份的终端。
可选地,所述第一信息携带于PIN创建请求消息或PIN更新请求消息中。
可选地,射频单元1001或网络模块1002,还用于接收来自所述第一设备的第一响应,其中,所述第一响应包括所述至少一个第二终端的PIN的管理员的配置结果,所述配置结果指示将第三终端配置成为所述PIN标识所对应的PIN的管理员,和/或,所述配置结果指示未将第四终端配置成为所述PIN标识所对应的PIN的管理员,所述第三终端包括所述至少一个第二终端的全部或者部分,或者,所述第四终端包括所述至少一个第二终端的全 部或者部分;
处理器1010,用于根据第一响应,分别确定所述至少一个第二终端是否为所述PIN标识所对应的PIN的管理员。
可选地,在所述配置结果指示将第三终端配置成为所述PIN标识所对应的PIN的管理员的情况下,射频单元1001或网络模块1002,还用于向所述第三终端发送目标配置信息,所述目标配置信息包括以下至少一项:
所述PIN标识符;
所述PIN标识符对应的PIN的描述信息;
所述PIN标识符对应的PIN中的用户成员信息;
所述PIN标识符对应的PIN的配置信息;
所述PIN标识符对应的PIN提供的服务信息。
可选地,在所述配置结果指示未将第四终端配置成为所述PIN标识符对应的PIN管理员的情况下,音频输出单元1003和显示单元1006中的至少一项,还用于输出指示信息,所述指示信息用于指示所述第四终端未能被配置成为所述PIN标识符对应的PIN管理员的原因。
上述终端1000能够实现如图7所示PIN管理装置700中各个模型实现的过程,且能达到相同的技术效果,为避免重复,在此不再赘述。
本申请实施例还提供一种第一设备,包括处理器及通信接口,其中,所述通信接口用于获取来自第一终端的第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息,其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员;所述处理器用于根据所述第一信息确定是否将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
该第一设备实施例与如图4所示方法实施例对应,图4所示方法实施例的各个实施过程和实现方式均可适用于该第一设备实施例中,且能达到相同的技术效果。
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现如图2或图4所示方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如图2或图4所示方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
本申请实施例另提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现如图2或图4所示方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供了一种通信系统,包括:第一终端及第一设备,所述第一终端可用于执行如图2所示PIN管理方法的步骤,所述第一设备可用于执行如图4所示的PIN管理方法的步骤。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (31)

  1. 一种个人物联网网络PIN管理方法,包括:
    第一终端向第一设备发送第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息;
    其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
  2. 根据权利要求1所述的方法,其中,所述第一终端为所述PIN标识符对应的PIN的管理员。
  3. 根据权利要求1所述的方法,其中,所述至少一个第二终端的标识信息包括以下至少一项:
    所述至少一个第二终端的设备标识;
    至少一个设备组标识,所述设备组标识用于指示所述至少一个第二终端所在的可信成员组,所述可信成员组中的终端为具有可信身份的终端。
  4. 根据权利要求1所述的方法,其中,所述第一信息携带于PIN创建请求消息或PIN更新请求消息中。
  5. 根据权利要求1至4中任一项所述的方法,其中,所述方法还包括:
    所述第一终端接收来自所述第一设备的第一响应,其中,所述第一响应包括所述至少一个第二终端的PIN的管理员的配置结果,所述配置结果指示将第三终端配置成为所述PIN标识所对应的PIN的管理员,和/或,所述配置结果指示未将第四终端配置成为所述PIN标识所对应的PIN的管理员,所述第三终端包括所述至少一个第二终端的全部或者部分,或者,所述第四终端包括所述至少一个第二终端的全部或者部分;
    所述第一终端根据第一响应,分别确定所述至少一个第二终端是否为所述PIN标识所对应的PIN的管理员。
  6. 根据权利要求5所述的方法,其中,在所述配置结果指示将第三终端配置成为所述PIN标识所对应的PIN的管理员的情况下,所述方法还包括:
    所述第一终端向所述第三终端发送目标配置信息,所述目标配置信息包括以下至少一项:
    所述PIN标识符;
    所述PIN标识符对应的PIN的描述信息;
    所述PIN标识符对应的PIN中的用户成员信息;
    所述PIN标识符对应的PIN的配置信息;
    所述PIN标识符对应的PIN提供的服务信息。
  7. 根据权利要求5所述的方法,其中,在所述配置结果指示未将第四终端配置成为所述PIN标识符对应的PIN管理员的情况下,所述方法还包括:
    所述第一终端输出指示信息,所述指示信息用于指示所述第四终端未能被配置成为所述PIN标识符对应的PIN管理员的原因。
  8. 一种个人物联网网络PIN管理方法,包括:
    第一设备获取来自第一终端的第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息,其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员;
    所述第一设备根据所述第一信息确定是否将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
  9. 根据权利要求8所述的方法,其中,所述第一终端为所述PIN标识符对应的PIN的管理员。
  10. 根据权利要求8所述的方法,其中,所述至少一个第二终端的标识信息包括以下至少一项:
    所述至少一个第二终端的设备标识;
    至少一个设备组标识,所述设备组标识用于指示所述至少一个第二终端所在的可信成员组,所述可信成员组中的终端为具有可信身份的终端。
  11. 根据权利要求8所述的方法,其中,所述第一信息携带于PIN创建请求消息或PIN更新请求消息中。
  12. 根据权利要求8至11中任一项所述的方法,其中,所述第一设备根据所述第一信息确定是否将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员,包括:
    所述第一设备根据所述第一信息对所述至少一个第二终端进行身份验证;
    在第三终端通过所述身份验证的情况下,所述第一设备确定将所述第三终端配置成为所述PIN标识符对应的PIN的管理员,和/或,在第四终端未通过所述身份验证的情况下,所述第一设备确定不将所述第四终端配置成为所述PIN标识符对应的PIN的管理员,其中,所述至少一个第二终端包括所述第三终端和/或所述第四终端。
  13. 根据权利要求12所述的方法,其中,所述第一设备根据所述第一信息对所述至少一个第二终端进行身份验证,包括:
    所述第一设备在预先存储的第一成员列表和/或第二成员列表中,查找所述至少一个第二终端的标识信息;
    所述在第三终端通过所述身份验证的情况下,所述第一设备确定将所述第三终端配置成为所述PIN标识符对应的PIN的管理员,和/或,在第四终端未通过所述身份验证的情况下,所述第一设备确定不将所述第四终端配置成为所述PIN标识符对应的PIN的管理员,包括:
    在所述第一成员列表和/或第二成员列表中查找到所述第三终端的标识信息的情况下,所述第一设备确定所述第三终端通过所述身份验证,和/或,在所述第一成员列表和/或第二成员列表中未查找到所述第四终端的标识信息的情况下,所述第一设备确定所述第四终 端未通过所述身份验证;
    其中,所述第一成员列表包括可信成员的标识信息,所述第二成员列表包括具有管理员身份的成员的标识信息。
  14. 根据权利要求13所述的方法,其中,所述方法还包括:
    所述第一设备在预先存储的第三成员列表中,根据所述PIN标识符,查找所述至少一个第二终端的标识信息,其中,所述第三成员列表包括已经配置成为所述PIN标识符对应的PIN的管理员的终端的标识信息;
    在所述第三成员列表中查找到第五终端的标识信息的情况下,所述第一设备筛选出所述至少一个第二终端中除了所述第五终端之外的终端,其中,所述至少一个第二终端中除了所述第五终端之外的终端包括所述第三终端和/或所述第四终端。
  15. 根据权利要求8至14中任一项所述的方法,其中,所述方法还包括:
    所述第一设备将配置成为所述PIN标识符对应的PIN的管理员的终端的标识信息与所述PIN标识符关联存储在第三成员列表中。
  16. 根据权利要求12所述的方法,其中,在所述第一设备根据所述第一信息对所述至少一个第二终端进行身份验证之后,所述方法还包括:
    所述第一设备向所述第一终端发送第一响应,其中,所述第一响应包括所述至少一个第二终端的PIN的管理员的配置结果,所述配置结果指示将第三终端配置成为所述PIN标识所对应的PIN的管理员,和/或,所述配置结果指示未将第四终端配置成为所述PIN标识所对应的PIN的管理员,所述第三终端包括所述至少一个第二终端的全部或者部分,或者,所述第四终端包括所述至少一个第二终端的全部或者部分。
  17. 根据权利要求16所述的方法,其中,在所述第一响应指示所述第三终端通过所述身份验证的情况下,所述方法还包括:
    所述第一设备向所述第一终端和所述第三终端中的至少一个发送目标配置信息,所述目标配置信息包括以下至少一项:
    所述PIN标识符;
    所述PIN标识符对应的PIN的描述信息;
    所述PIN标识符对应的PIN中的用户成员信息;
    所述PIN标识符对应的PIN提供的服务信息。
  18. 一种个人物联网网络PIN管理装置,应用于第一终端,所述装置包括:
    第一发送模块,用于向第一设备发送第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息;
    其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
  19. 根据权利要求18所述的装置,其中,还包括:
    第一接收模块,用于接收来自所述第一设备的第一响应,其中,所述第一响应包括所 述至少一个第二终端的PIN的管理员的配置结果,所述配置结果指示将第三终端配置成为所述PIN标识所对应的PIN的管理员,和/或,所述配置结果指示未将第四终端配置成为所述PIN标识所对应的PIN的管理员,所述第三终端包括所述至少一个第二终端的全部或者部分,或者,所述第四终端包括所述至少一个第二终端的全部或者部分;
    第一确定模块,用于根据第一响应,分别确定所述至少一个第二终端是否为所述PIN标识所对应的PIN的管理员。
  20. 根据权利要求19所述的装置,其中,在所述配置结果指示将第三终端配置成为所述PIN标识所对应的PIN的管理员的情况下,所述装置还包括:
    第二发送模块,用于向所述第三终端发送目标配置信息,所述目标配置信息包括以下至少一项:
    所述PIN标识符;
    所述PIN标识符对应的PIN的描述信息;
    所述PIN标识符对应的PIN中的用户成员信息;
    所述PIN标识符对应的PIN的配置信息;
    所述PIN标识符对应的PIN提供的服务信息。
  21. 根据权利要求19所述的装置,其中,在所述配置结果指示未将第四终端配置成为所述PIN标识符对应的PIN管理员的情况下,所述装置还包括:
    输出模块,用于输出指示信息,所述指示信息用于指示所述第四终端未能被配置成为所述PIN标识符对应的PIN管理员的原因。
  22. 一种个人物联网网络PIN管理装置,应用于第一设备,所述装置包括:
    获取模块,用于获取来自第一终端的第一信息,其中,所述第一信息包括PIN标识符,以及至少一个第二终端的标识信息,其中,所述第一信息,用于请求将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员;
    第二确定模块,用于根据所述第一信息确定是否将所述至少一个第二终端配置成为所述PIN标识符对应的PIN的管理员。
  23. 根据权利要求22所述的装置,其中,所述第二确定模块,包括:
    验证单元,用于根据所述第一信息对所述至少一个第二终端进行身份验证;
    确定单元,用于在第三终端通过所述身份验证的情况下,确定将所述第三终端配置成为所述PIN标识符对应的PIN的管理员,和/或,在第四终端未通过所述身份验证的情况下,确定不将所述第四终端配置成为所述PIN标识符对应的PIN的管理员,其中,所述至少一个第二终端包括所述第三终端和/或所述第四终端。
  24. 根据权利要求23所述的装置,其中,所述验证单元,具体用于:
    在预先存储的第一成员列表和/或第二成员列表中,查找所述至少一个第二终端的标识信息;
    所述确定单元,具体用于:
    在所述第一成员列表和/或第二成员列表中查找到所述第三终端的标识信息的情况下,所述第一设备确定所述第三终端通过所述身份验证,和/或,在所述第一成员列表和/或第二成员列表中未查找到所述第四终端的标识信息的情况下,所述第一设备确定所述第四终端未通过所述身份验证;
    其中,所述第一成员列表包括可信成员的标识信息,所述第二成员列表包括具有管理员身份的成员的标识信息。
  25. 根据权利要求24所述的装置,其中,还包括:
    查找模块,用于在预先存储的第三成员列表中,根据所述PIN标识符,查找所述至少一个第二终端的标识信息,其中,所述第三成员列表包括已经配置成为所述PIN标识符对应的PIN的管理员的终端的标识信息;
    筛选模块,用于在所述第三成员列表中查找到第五终端的标识信息的情况下,筛选出所述至少一个第二终端中除了所述第五终端之外的终端,其中,所述至少一个第二终端中除了所述第五终端之外的终端包括所述第三终端和/或所述第四终端。
  26. 根据权利要求22至25中任一项所述的装置,其中,还包括:
    存储模块,用于将配置成为所述PIN标识符对应的PIN的管理员的终端的标识信息与所述PIN标识符关联存储在第三成员列表中。
  27. 根据权利要求23所述的装置,其中,还包括:
    第三发送模块,用于向所述第一终端发送第一响应,其中,所述第一响应包括所述至少一个第二终端的PIN的管理员的配置结果,所述配置结果指示将第三终端配置成为所述PIN标识所对应的PIN的管理员,和/或,所述配置结果指示未将第四终端配置成为所述PIN标识所对应的PIN的管理员,所述第三终端包括所述至少一个第二终端的全部或者部分,或者,所述第四终端包括所述至少一个第二终端的全部或者部分。
  28. 根据权利要求27所述的装置,其中,在所述第一响应指示所述第三终端通过所述身份验证的情况下,所述装置还包括:
    第四发送模块,用于向所述第一终端和所述第三终端中的至少一个发送目标配置信息,所述目标配置信息包括以下至少一项:
    所述PIN标识符;
    所述PIN标识符对应的PIN的描述信息;
    所述PIN标识符对应的PIN中的用户成员信息;
    所述PIN标识符对应的PIN提供的服务信息。
  29. 一种第一终端,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至7中任一项所述的个人物联网网络PIN管理方法的步骤。
  30. 一种第一设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求8至17中任一项所述 的个人物联网网络PIN管理方法的步骤。
  31. 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1至7中任一项所述的个人物联网网络PIN管理确定方法,或者实现如权利要求8至17中任一项所述的个人物联网网络PIN管理方法的步骤。
PCT/CN2023/107711 2022-07-20 2023-07-17 Pin管理方法、装置、第一终端和第一设备 WO2024017195A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210863475.8 2022-07-20
CN202210863475.8A CN117478332A (zh) 2022-07-20 2022-07-20 Pin管理方法、装置、第一终端和第一设备

Publications (1)

Publication Number Publication Date
WO2024017195A1 true WO2024017195A1 (zh) 2024-01-25

Family

ID=89617121

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/107711 WO2024017195A1 (zh) 2022-07-20 2023-07-17 Pin管理方法、装置、第一终端和第一设备

Country Status (2)

Country Link
CN (1) CN117478332A (zh)
WO (1) WO2024017195A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113133129A (zh) * 2019-12-30 2021-07-16 华为技术有限公司 一种业务处理的方法、装置和系统
CN113194197A (zh) * 2021-04-27 2021-07-30 深圳传音控股股份有限公司 交互方法、终端及存储介质
CN113475162A (zh) * 2019-07-05 2021-10-01 Oppo广东移动通信有限公司 一种移动性管理方法及装置、终端

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113475162A (zh) * 2019-07-05 2021-10-01 Oppo广东移动通信有限公司 一种移动性管理方法及装置、终端
CN113133129A (zh) * 2019-12-30 2021-07-16 华为技术有限公司 一种业务处理的方法、装置和系统
CN113194197A (zh) * 2021-04-27 2021-07-30 深圳传音控股股份有限公司 交互方法、终端及存储介质

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
VIVO: "KI#3, Sol#8: Update to clarify PINMF is NF", 3GPP DRAFT; S2-2204143, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. e-meeting; 20220516 - 20220520, 6 May 2022 (2022-05-06), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052159646 *
VIVO: "Mega editorial modification on TR 23.700-88 v0.2.0", 3GPP DRAFT; S2-2205225, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. e-meeting; 20220516 - 20220520, 23 May 2022 (2022-05-23), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052160697 *

Also Published As

Publication number Publication date
CN117478332A (zh) 2024-01-30

Similar Documents

Publication Publication Date Title
US10484347B2 (en) Method and apparatus for supporting secure chat
US11770702B2 (en) Session establishment method and means and communication system
US20220247814A1 (en) Edge computing for internet of things security with blockchain authentication
WO2021043062A1 (zh) 一种跨网络唤醒的方法以及相关设备
WO2023143411A1 (zh) 设备鉴权方法、装置及通信设备
WO2023093609A1 (zh) 物联网设备的会话建立方法及装置
WO2024017195A1 (zh) Pin管理方法、装置、第一终端和第一设备
WO2024022161A1 (zh) Pin设备的注册方法、装置及通信设备
WO2024022210A1 (zh) Pegc的注册方法、装置及通信设备
WO2023143554A1 (zh) Pin的组建方法及设备
WO2023143423A1 (zh) 信息获取与存储、上报方法、装置、终端及网络功能
WO2024017191A1 (zh) 交互方法、装置、设备及存储介质
WO2024125358A1 (zh) 算力处理方法及通信设备
WO2023143416A1 (zh) 信息处理方法、终端及网络功能
WO2023185724A1 (zh) 定位处理方法、装置、终端及网络侧设备
WO2023143418A1 (zh) 设备鉴权方法、装置、终端及网络功能
WO2022247703A1 (zh) 服务器地址的处理方法及装置
WO2024032499A1 (zh) Dns查询方法及通信设备
WO2024037515A1 (zh) 消息发送方法、通信设备及存储介质
WO2023143453A1 (zh) 直连空口配置方法、终端及网络侧设备
WO2024017167A1 (zh) 规则处理方法、通信设备及网络侧设备
WO2024061091A1 (zh) 一种网络通信的方法、装置、网络侧设备、终端及介质
WO2023213305A1 (zh) Edi获取、路由重配置、ecs地址配置信息的获取、dns处理方法、装置及设备
WO2023179595A1 (zh) 非3gpp设备的会话通道建立方法、装置及设备
WO2024061256A1 (zh) 转发规则配置方法、装置、终端及网络侧设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23842258

Country of ref document: EP

Kind code of ref document: A1