CN102196464A - Method, device and system for controlling safe use of machine-to-machine (M2M) terminal - Google Patents

Method, device and system for controlling safe use of machine-to-machine (M2M) terminal Download PDF

Info

Publication number
CN102196464A
CN102196464A CN2010101249314A CN201010124931A CN102196464A CN 102196464 A CN102196464 A CN 102196464A CN 2010101249314 A CN2010101249314 A CN 2010101249314A CN 201010124931 A CN201010124931 A CN 201010124931A CN 102196464 A CN102196464 A CN 102196464A
Authority
CN
China
Prior art keywords
terminal
positional information
network side
position information
base station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010101249314A
Other languages
Chinese (zh)
Inventor
王学寰
李莉
樊光辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN2010101249314A priority Critical patent/CN102196464A/en
Priority to PCT/CN2011/071474 priority patent/WO2011110074A1/en
Publication of CN102196464A publication Critical patent/CN102196464A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor

Abstract

The embodiment of the invention provides a method, a device and a system for controlling the safe use of a machine-to-machine (M2M) terminal. The method comprises the following steps of: acquiring the current location information of the M2M terminal; and if the location information is inconsistent with legal location information, transmitting a notification message to a network side. In the method, the device and the system for controlling the safe use of the M2M terminal, the M2M terminal acquires own current location information, compares the location information with the legal location information, detects own illegal service condition if the location information is inconsistent with the legal location information, and transmits the notification message to the network side to notify the network side that the M2M terminal is under the illegal service condition, so the safe use of the M2M terminal is realized.

Description

The methods, devices and systems that control M2M terminal security uses
Technical field
The embodiment of the invention relates to communication technical field, relates in particular to the methods, devices and systems that a kind of M2M of control terminal security uses.
Background technology
(Machine to Machine is designated hereinafter simply as: M2M) technology organically combines radio communication and information technology to machine, can be widely used in fields such as automatic data acquisition, security monitoring, automatic vending, item tracking to machine.M2M can exist following three kinds of mode: M2M, machine to mobile phone (as user's telemonitoring) and mobile phone to machine (as user's Long-distance Control).The M2M technology utilizes existing communication network and access technology to realize above communication mode, available communication network and access technology comprise global system for mobile communications (Global System for Mobile communications, abbreviate as: GSM), GPRS (General Packet Radio Service, abbreviate as: GPRS), universal mobile telecommunications system (Universal Mobile Telecommunications System, abbreviate as: UMTS), System Architecture Evolution (System Architecture Evolution, abbreviate as: SAE), worldwide interoperability for microwave inserts (Worldwide Interoperability for Microwave Access, abbreviate as: WiMAX) etc., closely interconnection technique comprises 802.11b/g, bluetooth (BlueTooth), purple honeybee (Zigbee), radio RF recognition technology (Radio Frequency Identification, abbreviate as: RFID) and ultra broadband (Ultra Wideband abbreviates as: UWB) technology.
Existing Human To Human (Human to Human; be called for short: H2H) in the communication system; subscriber terminal equipment is generally carried by the user or under the state that has the people to guard; in a single day terminal equipment is lost or is stolen; the user can know immediately; and do respective handling and prevent further loss; as informing network operator immediately; operator is after the legal signatory identity of checking user; can shut down or limit operations such as use to terminal according to user's requirement, to prevent loss or stolen terminal equipment is abused.
Yet different with existing H2H communication system, the M2M terminal generally no longer includes human intervention or guard under the normal operating conditions of installing after starting.For example, field data collection terminal, security monitoring terminal etc.When M2M lost terminal or stolen, be moved to unauthorized area when using, owing to be difficult to find or need to be found for a long time, carry out malicious act so may be utilized, for example, the data of the M2M terminal that is maliciously tampered collection or utilize the M2M terminal to carry out illegal egoistic communication bring loss for M2M user.The method that needs to provide a kind of effective control M2M terminal security to use thus so that when the M2M lost terminal or stolen after can in time be found.
Summary of the invention
The methods, devices and systems that the embodiment of the invention provides a kind of M2M of control terminal security to use so that the M2M lost terminal or stolen after can in time be found, realize the safe handling of M2M terminal.
The method that the embodiment of the invention provides a kind of M2M of control terminal security to use comprises:
Obtain described M2M terminal present located positional information;
If described positional information and legal position information are not inconsistent, then send a notification message to network side.
The method that the embodiment of the invention provides a kind of M2M of control terminal security to use comprises:
Receive the notification message that described M2M terminal sends;
According to described notification message, limit the use of described M2M terminal and/or notify described M2M terminal exiting network or close.
The embodiment of the invention provides a kind of M2M terminal, comprising:
Acquisition module is used to obtain described M2M terminal present located positional information;
Sending module is used for then sending a notification message to network side if described positional information and legal position information are not inconsistent.
The device that the embodiment of the invention provides a kind of M2M of control terminal security to use comprises:
Receiver module is used to receive the notification message that described M2M terminal sends;
Executive Module is used for according to described notification message, limits the use of described M2M terminal and/or notifies described M2M terminal exiting network or close.
The system that the embodiment of the invention provides a kind of M2M of control terminal security to use comprises the device that arbitrary M2M terminal that the embodiment of the invention provides and arbitrary control M2M terminal security use.
The methods, devices and systems that the control M2M terminal security of the embodiment of the invention uses, the M2M terminal is by obtaining self present located positional information, and this positional information compared with legal position information, if this positional information and legal position information are not inconsistent, then this M2M terminal detects and self is in illegal user mode, and send a notification message to network side, be in the state of illegal use so that inform this M2M terminal of network side, realized the safe handling of M2M terminal.
Description of drawings
In order to be illustrated more clearly in the technical scheme of the embodiment of the invention, the accompanying drawing of required use is done an introduction simply in will describing embodiment below, apparently, accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 controls the flow chart of the method embodiment one of M2M terminal security use for the present invention;
Fig. 2 controls the flow chart of the method embodiment two of M2M terminal security use for the present invention;
Fig. 3 controls the flow chart of the method embodiment three of M2M terminal security use for the present invention;
Fig. 4 is the schematic diagram of M2M terminal embodiment one of the present invention;
Fig. 5 is the schematic diagram of M2M terminal embodiment two of the present invention;
Fig. 6 controls the schematic diagram of the device embodiment one of M2M terminal security use for the present invention;
Fig. 7 controls the schematic diagram of the device embodiment two of M2M terminal security use for the present invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer, below in conjunction with the accompanying drawing in the embodiment of the invention, technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
Fig. 1 controls the flow chart of the method embodiment one that the M2M terminal security uses for the present invention, and as shown in Figure 1, this method comprises:
Step 101, obtain M2M terminal present located positional information.
The M2M terminal is obtained self present located positional information; Wherein, the mode of obtaining can be periodically to obtain, and also can be that event-triggered is obtained.This positional information can be: M2M terminal present located base station (Base Station, be designated hereinafter simply as: (Paging Group is designated hereinafter simply as: PG sign PG) or the GPS information of the current present position of M2M terminal for the signal strength signal intensity of the signal of BS sign BS), the BS sign of M2M terminal present located BS and this BS emission, the paging group at M2M terminal present located BS place; Wherein, the BS sign for example is BS ID, and the PG sign for example is PG ID.
Step 102, if positional information and legal position information are not inconsistent, then send a notification message to network side.
The legal position information that pre-configured this M2M terminal legal authorization is used on the M2M terminal.After the M2M terminal gets access to self present located positional information, this positional information and legal position information are compared, if this positional information and this legal position information are not inconsistent, for example: this positional information and this legal position information is inequality or this positional information is not included in the scope that legal position information comprised, then the M2M terminal judges comes from and is in illegal user mode, and sends a notification message to network side.This notification message can be to be used to represent that this M2M terminal is in the indication information of illegal user mode, also can be this M2M terminal present located positional information, can also be above-mentioned indication information and positional information.When this notification message is positional information, the legal position information that the legal authorization of the pre-configured M2M terminal of network side is used, this positional information and legal position information that network side will receive compare, can know that this positional information and this legal position information are not inconsistent, know that thus this M2M terminal is in illegal user mode.
In the present embodiment, the M2M terminal is by obtaining self present located positional information, and this positional information compared with legal position information, if this positional information and legal position information are not inconsistent, then this M2M terminal detects and self is in illegal user mode, and send a notification message to network side, be in the state of illegal use so that inform this M2M terminal of network side, realized the safe handling of M2M terminal.
Fig. 2 controls the flow chart of the method embodiment two that the M2M terminal security uses for the present invention, and as shown in Figure 2, this method comprises:
The notification message that step 201, reception M2M terminal send.
Come from the M2M terminal judges and to be in after illegal user mode, send a notification message to network side.Network side receives the notification message that the M2M terminal sends.Wherein, network side can be that (Gateway is designated hereinafter simply as gateway: GW), also can be BS and GW.
Step 202, according to notification message, the use of restriction M2M terminal and/or notice M2M terminal exiting network or close.
Network side can know that according to notification message the M2M terminal is in the state of illegal use.This notification message can be to be used to represent that this M2M terminal is in the indication information of illegal user mode, also can be this M2M terminal present located positional information, can also be above-mentioned indication information and positional information.When this notification message is positional information, the legal position information that the legal authorization of the pre-configured M2M terminal of network side is used, this positional information and legal position information that network side will receive compare, can know that this positional information and this legal position information are not inconsistent, know that thus this M2M terminal is in illegal user mode; When this notification message was indication information or indication information and positional information, network side directly just can know that according to this indication information this M2M terminal is in illegal user mode.
Know this M2M terminal when network side and be in illegal user mode, then limit the use of this M2M terminal and/or notify this M2M terminal exiting network or close by GW.When network side was BS and GW, BS sent to GW with the illegal information of using of this M2M terminal, so that GW limits the use of this M2M terminal and/or notifies this M2M terminal exiting network or close.
In the present embodiment, when the M2M terminal was in illegal user mode, network side received the notification message that the M2M terminal sends, and according to this notification message, limit the use of this M2M terminal and/or notify this M2M terminal exiting network or close, realized the safe handling of M2M terminal.
Fig. 3 controls the flow chart of the method embodiment three that the M2M terminal security uses for the present invention, and on the basis of method embodiment one and method embodiment two, as shown in Figure 3, this method comprises:
Step 301, by the pre-configured mode or the transmission means configuration legal position information of eating dishes without rice or wine.
The legal position information that the M2M terminal has self specific legal authorization to use, can by pre-configured mode with this legal position information configuration on the M2M terminal, also can use (Over-the-Air the abbreviates OTA as) transmission means of eating dishes without rice or wine that this legal position information is sent on the M2M terminal.Wherein, this legal position information can be signal strength signal intensity, PG ID or the GPS information of the signal of BS ID, BS ID and this BS emission.
Step 302, obtain M2M terminal present located positional information.
The M2M terminal can periodically be obtained self present located positional information by the default time cycle; Also can make the M2M terminal obtain self present located positional information by the mode of Event triggered.Wherein, the Event triggered mode can include but not limited to: when occur improperly restarting, by the situation that M2M terminal abnormals such as system reset, the sudden change of received signal intensity use, trigger the M2M terminal and obtain himself present located positional information.Concrete, obtain positional information and can comprise in following several mode any one:
Mode one, M2M terminal are obtained the BS sign of self present located BS.The M2M terminal receives broadcast and/or the unicast messages of place BS, from this broadcast or unicast messages, gets access to the BS ID of this BS.
Mode two, M2M terminal are obtained the signal strength signal intensity of the signal of the BS sign of self present located BS and this BS emission.The M2M terminal receives broadcast and/or the unicast messages of place BS, from this broadcast or unicast messages, gets access to the BS ID of this BS, and detects the signal strength signal intensity of the signal of this BS emission by signal receiving device.A certain M2M terminal may be authorized to use in a part of overlay area of certain BS, and at this moment, the signal strength signal intensity of signal that can be by BS ID and BS emission is determined this authorized region.
Mode three, M2M terminal are obtained the PG sign of the PG at self present located BS place.Broadcast and/or unicast messages that the M2M terminal receives place BS from this broadcast or unicast messages, obtain the PG ID of the PG at present located BS place.
Mode four, M2M terminal are obtained the GPS information of self current present position.The M2M terminal can by self the GPS measurement mechanism or shift position service (Location Based Service abbreviates as: the GPS information of LBS) orienting self present position.
Step 303, M2M terminal compare positional information and the legal position information that gets access to; If this positional information does not conform to legal position information, then execution in step 304; If this positional information is consistent with legal position information, represent that then this M2M terminal is in normal operating conditions, this M2M terminal can operate as normal.
Step 304, M2M terminal send a notification message to network side.
When the M2M terminal detects himself positional information and legal position information when not being inconsistent, the M2M terminal will send a notification message to network side, and is concrete, sends a notification message to comprise in following several mode any one:
Mode one, M2M terminal send self present located positional information to network side, know that this positional information and legal position information are not inconsistent so that network side compares by this positional information and legal position information, and limit the use of this M2M terminal thus and/or notify this M2M terminal exiting network or close.
Mode two, M2M terminal send self present located positional information and are used to represent the illegal Indication message that uses of M2M terminal to network side, so that network side limits the use of this M2M terminal according to this Indication message and/or notify this M2M terminal exiting network or close, and this M2M location information of terminals is sent to server.
Mode three, M2M terminal send to network side and are used to represent the illegal indication information that uses of M2M terminal, so that network side limits the use of this M2M terminal according to this Indication message and/or notifies this M2M terminal exiting network or close.
Step 305, network side receive the notification message that the M2M terminal sends.
Network side (for example GW or BS and GW) receives the notification message that the M2M terminal sends.
Step 306, network side be according to notification message, the use and/or the notice M2M terminal exiting network of restriction M2M terminal or close.
Notification message can comprise: M2M terminal present located positional information, this positional information and being used to represented illegal Indication message or this Indication message that uses of M2M terminal.
Corresponding with step 304, step 306 specifically can comprise any one in following several mode:
Mode one, when notification message includes only positional information, network side is by comparing positional information and legal position information, know that positional information and legal position information are not inconsistent, be not inconsistent the use of restriction M2M terminal and/or notice M2M terminal exiting network or close then according to positional information and legal position information.
Wherein, under this mode, need be in the legal position information of the pre-configured M2M terminal of network side; This positional information can comprise: the signal strength signal intensity of the BS sign of M2M terminal present located BS, the BS sign of M2M terminal present located BS and BS emission, the PG sign of the PG at M2M terminal present located BS place or the GPS information of the current present position of M2M terminal.
Mode two, when notification message comprises positional information and Indication message, network side limits the use and/or the notice M2M terminal exiting network of M2M terminal according to Indication message or closes, and network side also sends to the M2M server with M2M terminal present located positional information, to inform this M2M terminal present located position of M2M server.
Mode three, when notification message includes only Indication message, network side is according to the use and/or the notice M2M terminal exiting network of this Indication message restriction M2M terminal or close.
At network side notice M2M terminal exiting network or after closing, M2M terminal exiting network or close.
Need to prove that if network side is when being BS and GW, then BS is after knowing that the M2M terminal is in illegal user mode, the information that the M2M terminal is in illegal user mode sends to GW, make GW restriction M2M terminal use and/or notice M2M terminal exiting network or close.
Further, in another execution mode of the embodiment of the invention, step 306 can be replaced by following steps a, and does not limit the sequencing of this step a and step 305, and this step a is:
The M2M terminal is after network side sends a notification message, and the M2M terminal just limits the use of self, and perhaps the M2M terminal makes and self moves back net or close.
When using step a replacement step 306, the notification message that the M2M terminal sends to network side in the above-mentioned steps 304 can be used to inform that this M2M terminal of network side is current is in illegal user mode, and network side does not need to limit according to this notification message the use of M2M terminal, does not need to notify the M2M terminal exiting network or close yet.Wherein this notification message can comprise: M2M terminal present located positional information, M2M terminal present located positional information and the indication information that is used to represent the illegal Indication message that uses of M2M terminal or is used to represent the illegal use of M2M terminal.
In the present embodiment, the M2M terminal is by obtaining self present located positional information, and this positional information compared with legal position information, if this positional information and legal position information are not inconsistent, then this M2M terminal detects and self is in illegal user mode, and send a notification message to network side, be in the state of illegal use so that inform this M2M terminal of network side, realized the safe handling of M2M terminal.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be finished by the relevant hardware of program command, aforesaid program can be stored in the computer read/write memory medium, this program is carried out the step that comprises said method embodiment when carrying out; Aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
Fig. 4 is the schematic diagram of M2M terminal embodiment one of the present invention, and as shown in Figure 4, this terminal comprises: acquisition module 41 and sending module 43.
Acquisition module 41 is used to obtain M2M terminal present located positional information.Sending module 43 is used for then sending a notification message to network side if positional information and legal position information are not inconsistent.
Acquisition module 41 obtains M2M terminal present located positional information, when the positional information that sending module 43 gets access at acquisition module 41 does not conform to legal position information, send a notification message to network side, to inform the current state that is in illegal use of this M2M terminal of network side.
The operation principle of each module in the present embodiment and workflow do not repeat them here referring to the description among the said method embodiment.
In the present embodiment, the M2M terminal is obtained self present located positional information by acquisition module, and this positional information compared with legal position information, if this positional information and legal position information are not inconsistent, then this M2M terminal detects and self is in illegal user mode, and send a notification message to network side by sending module, be in the state of illegal use so that inform this M2M terminal of network side, realized the safe handling of M2M terminal.
Fig. 5 is the schematic diagram of M2M terminal embodiment two of the present invention, and on basis embodiment illustrated in fig. 4, as shown in Figure 5, this terminal also comprises: configuration module 45 and control module 47.
Acquisition module 41 specifically can comprise: first acquiring unit 411, second acquisition unit 413, the 3rd acquiring unit 415 or the 4th acquiring unit 417.
Sending module 43 specifically can comprise: first transmitting element 431, second transmitting element 433 or the 3rd transmitting element 435.
First acquiring unit 411 is used to obtain the Base Station Identification of M2M terminal present located base station.Second acquisition unit 413 is used to obtain the Base Station Identification of M2M terminal present located base station and the signal strength signal intensity of base station.The 3rd acquiring unit 415 is used to obtain the paging group sign of the paging group at place, M2M terminal present located base station.The 4th acquiring unit 417 is used to obtain the GPS information of the current present position of M2M terminal.
First transmitting element 431 is used for if positional information and legal position information are not inconsistent, then send M2M terminal present located positional information to network side, so that comparing by positional information and legal position information, network side knows that positional information and legal position information are not inconsistent, and the use of restriction M2M terminal and/or notice terminal exiting network or close.Second transmitting element 433 is used for if positional information and legal position information are not inconsistent, then send M2M terminal present located positional information and be used to represent the illegal Indication message that uses of M2M terminal to network side, so that network side is according to the use and/or the notice M2M terminal exiting network of Indication message restriction M2M terminal or close, and positional information is sent to server.The 3rd transmitting element 435 is used for if positional information and legal position information are not inconsistent, then send the indication information that is used to represent the illegal use of M2M terminal, so that network side limits the use and/or the notice terminal exiting network of M2M terminal according to Indication message or closes to network side.
Configuration module 45 is used for by the pre-configured mode or the transmission means configuration legal position information of eating dishes without rice or wine.
Control module 47 is used to limit the use of M2M terminal, perhaps makes the M2M terminal exiting network or closes.
Each module in the present embodiment and the operation principle of unit and workflow do not repeat them here referring to the description among the said method embodiment.
In the present embodiment, the M2M terminal is obtained self present located positional information by acquisition module, and this positional information compared with legal position information, if this positional information and legal position information are not inconsistent, then this M2M terminal detects and self is in illegal user mode, and send a notification message to network side by sending module, be in the state of illegal use so that inform this M2M terminal of network side, realized the safe handling of M2M terminal.
Fig. 6 controls the schematic diagram of the device embodiment one that the M2M terminal security uses for the present invention, and as shown in Figure 6, this device comprises: receiver module 61 and Executive Module 63.
Receiver module 61 is used to receive the notification message that the M2M terminal sends.Executive Module 63 is used for according to notification message, the use of restriction M2M terminal and/or notice M2M terminal exiting network or close.
The operation principle of each module in the present embodiment and workflow do not repeat them here referring to the description among the said method embodiment; Wherein, the device that the control M2M terminal security that provides in the present embodiment uses is equivalent to the network side among the said method embodiment; Receiver module can be positioned at BS, also can be positioned at GW; Executive Module is positioned at GW.
In the present embodiment, when the M2M terminal is in illegal user mode, the device that control M2M terminal security uses receives the notification message that the M2M terminal sends, and according to this notification message, limit the use of this M2M terminal and/or notify this M2M terminal exiting network or close, realized the safe handling of M2M terminal.
Fig. 7 controls the schematic diagram of the device embodiment two of M2M terminal security use for the present invention, on basis embodiment illustrated in fig. 6, as shown in Figure 7, this Executive Module 63 specifically can comprise: first performance element 631, second performance element 633 or the 3rd performance element 635.
First performance element 631 is used for according to the use and/or the notice terminal exiting network of Indication message restriction M2M terminal or closes, and positional information is sent to server.Second performance element 633 is used for by positional information and legal position information are compared, know that positional information and legal position information are not inconsistent, be not inconsistent the use and/or the notice M2M terminal exiting network of restriction M2M terminal or close according to positional information and legal position information.The 3rd performance element 635 is used for according to the use and/or the notice M2M terminal exiting network of Indication message restriction M2M terminal or closes.
Wherein, notification message comprises: M2M terminal present located positional information, positional information and being used to represented illegal Indication message or the Indication message that uses of terminal.
Each module in the present embodiment and the operation principle of unit and workflow do not repeat them here referring to the description among the said method embodiment.
In the present embodiment, when the M2M terminal is in illegal user mode, the device that control M2M terminal security uses receives the notification message that the M2M terminal sends, and according to this notification message, limit the use of this M2M terminal and/or notify this M2M terminal exiting network or close, realized the safe handling of M2M terminal.
The system that the embodiment of the invention also provides a kind of M2M of control terminal security to use, this system comprise the device that arbitrary M2M terminal that the embodiment of the invention provides and arbitrary control M2M terminal security use.
The operation principle of each module in the present embodiment and workflow do not repeat them here referring to the description among the said method embodiment.
In the present embodiment, the M2M terminal is by obtaining self present located positional information, and this positional information compared with legal position information, if this positional information and legal position information are not inconsistent, then this M2M terminal detects and self is in illegal user mode, and send a notification message to network side, be in the state of illegal use so that inform this M2M terminal of network side, realized the safe handling of M2M terminal.
It should be noted that at last: above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (16)

1. control the method that the M2M terminal security uses for one kind, it is characterized in that, comprising:
Obtain described M2M terminal present located positional information;
If described positional information and legal position information are not inconsistent, then send a notification message to network side.
2. the method that control according to claim 1 M2M terminal security uses is characterized in that, describedly obtains described M2M terminal present located positional information and comprises:
Obtain the Base Station Identification of described M2M terminal present located base station; Perhaps
Obtain the Base Station Identification of described M2M terminal present located base station and the signal strength signal intensity of described base station; Perhaps
Obtain the paging group sign of the paging group at place, described M2M terminal present located base station; Perhaps
Obtain the GPS information of the current present position of described M2M terminal.
3. the method that control M2M terminal security according to claim 1 uses is characterized in that, also comprises:
Dispose described legal position information by the pre-configured mode or the transmission means of eating dishes without rice or wine.
4. the method that control according to claim 1 M2M terminal security uses is characterized in that, describedly also comprises after network side sends a notification message:
Limit the use of described M2M terminal, perhaps make described M2M terminal exiting network or close.
5. according to the method for the arbitrary described control M2M terminal security of claim 1-3 use, it is characterized in that described sending a notification message to network side comprises:
Send described M2M terminal present located positional information to network side, know that described positional information and described legal position information are not inconsistent so that described network side compares by described positional information and described legal position information, and limit the use of described M2M terminal and/or notify described M2M terminal exiting network or close; Perhaps
Send described M2M terminal present located positional information and be used to represent the illegal Indication message that uses of described M2M terminal to network side, so that described network side limits the use of described M2M terminal according to described Indication message and/or notify described M2M terminal exiting network or close, and described positional information is sent to server; Perhaps
Send to network side and to be used to represent the illegal indication information that uses of described M2M terminal, so that described network side limits the use of described M2M terminal according to described Indication message and/or notifies described M2M terminal exiting network or close.
6. control the method that the M2M terminal security uses for one kind, it is characterized in that, comprising:
Receive the notification message that described M2M terminal sends;
According to described notification message, limit the use of described M2M terminal and/or notify described M2M terminal exiting network or close.
7. the method that control according to claim 6 M2M terminal security uses is characterized in that described notification message comprises: described M2M terminal present located positional information and/or be used to represent the illegal Indication message that uses of described M2M terminal; Described according to described notification message, limit the use of described M2M terminal and/or notify described M2M terminal exiting network or close and comprise:
Limit the use of described M2M terminal and/or notify described M2M terminal exiting network or close according to described Indication message, and described positional information is sent to server; Perhaps
By described positional information and described legal position information are compared, know that described positional information and described legal position information are not inconsistent, be not inconsistent the use of the described M2M terminal of restriction and/or notify described M2M terminal exiting network or close according to described positional information and described legal position information; Perhaps
Limit the use of described M2M terminal and/or notify described M2M terminal exiting network or close according to described Indication message.
8. according to the method for claim 6 or 7 described control M2M terminal securities uses, it is characterized in that, also comprise:
The legal position information of pre-configured described M2M terminal; Described positional information comprises: the paging group sign of the paging group at the Base Station Identification of the Base Station Identification of described M2M terminal present located base station, described M2M terminal present located base station and the signal strength signal intensity of described base station, place, described M2M terminal present located base station or the GPS information of the current present position of described M2M terminal.
9. a M2M terminal is characterized in that, comprising:
Acquisition module is used to obtain described M2M terminal present located positional information;
Sending module is used for then sending a notification message to network side if described positional information and legal position information are not inconsistent.
10. M2M terminal according to claim 9 is characterized in that, described acquisition module comprises:
First acquiring unit is used to obtain the Base Station Identification of described M2M terminal present located base station; Perhaps
Second acquisition unit is used to obtain the Base Station Identification of described M2M terminal present located base station and the signal strength signal intensity of described base station; Perhaps
The 3rd acquiring unit is used to obtain the paging group sign of the paging group at place, described M2M terminal present located base station; Perhaps
The 4th acquiring unit is used to obtain the GPS information of the current present position of described M2M terminal.
11. M2M terminal according to claim 9 is characterized in that, also comprises:
Configuration module is used for disposing described legal position information by the pre-configured mode or the transmission means of eating dishes without rice or wine.
12. M2M terminal according to claim 9 is characterized in that, also comprises:
Control module is used to limit the use of described M2M terminal, perhaps makes described M2M terminal exiting network or closes.
13., it is characterized in that described sending module comprises according to the arbitrary described M2M terminal of claim 9-11:
First transmitting element, be used for if described positional information and described legal position information are not inconsistent, then send described M2M terminal present located positional information to network side, know that described positional information and described legal position information are not inconsistent so that described network side compares by described positional information and described legal position information, and limit the use of described M2M terminal and/or notify described M2M terminal exiting network or close; Perhaps
Second transmitting element, be used for if described positional information and described legal position information are not inconsistent, then send described M2M terminal present located positional information and be used to represent the illegal Indication message that uses of described M2M terminal to network side, so that described network side limits the use of described M2M terminal according to described Indication message and/or notify described M2M terminal exiting network or close, and described positional information is sent to server; Perhaps
The 3rd transmitting element, be used for if described positional information and described legal position information are not inconsistent, then send and be used to represent the illegal indication information that uses of described M2M terminal, so that described network side limits the use of described M2M terminal according to described Indication message and/or notifies described M2M terminal exiting network or close to network side.
14. control the device that the M2M terminal security uses for one kind, it is characterized in that, comprising:
Receiver module is used to receive the notification message that described M2M terminal sends;
Executive Module is used for according to described notification message, limits the use of described M2M terminal and/or notifies described M2M terminal exiting network or close.
15. the device that control according to claim 14 M2M terminal security uses is characterized in that described notification message comprises: described M2M terminal present located positional information and/or be used to represent the illegal Indication message that uses of described M2M terminal; Described Executive Module comprises:
First performance element is used for limiting the use of described M2M terminal and/or notifying described M2M terminal exiting network or close according to described Indication message, and described positional information is sent to server; Perhaps
Second performance element, be used for by described positional information and described legal position information are compared, know that described positional information and described legal position information are not inconsistent, be not inconsistent the use of the described M2M terminal of restriction and/or notify described M2M terminal exiting network or close according to described positional information and described legal position information; Perhaps
The 3rd performance element is used for limiting the use of described M2M terminal and/or notifying described M2M terminal exiting network or close according to described Indication message.
16. control the system that the M2M terminal security uses for one kind, comprise as arbitrary described M2M terminal of claim 9-13 and as the device of claim 14 or 15 described control M2M terminal securities uses.
CN2010101249314A 2010-03-12 2010-03-12 Method, device and system for controlling safe use of machine-to-machine (M2M) terminal Pending CN102196464A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2010101249314A CN102196464A (en) 2010-03-12 2010-03-12 Method, device and system for controlling safe use of machine-to-machine (M2M) terminal
PCT/CN2011/071474 WO2011110074A1 (en) 2010-03-12 2011-03-03 Method, device and system for controlling safe use of m2m terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101249314A CN102196464A (en) 2010-03-12 2010-03-12 Method, device and system for controlling safe use of machine-to-machine (M2M) terminal

Publications (1)

Publication Number Publication Date
CN102196464A true CN102196464A (en) 2011-09-21

Family

ID=44562877

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101249314A Pending CN102196464A (en) 2010-03-12 2010-03-12 Method, device and system for controlling safe use of machine-to-machine (M2M) terminal

Country Status (2)

Country Link
CN (1) CN102196464A (en)
WO (1) WO2011110074A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105828285A (en) * 2015-01-27 2016-08-03 中兴通讯股份有限公司 Machine-type communication (MTC) terminal location monitoring and managing method, device and system
CN106941687A (en) * 2016-01-05 2017-07-11 中兴通讯股份有限公司 A kind of monitoring method, MTC device, terminal and the network entity of MTC device position
CN107925881A (en) * 2015-09-01 2018-04-17 Nec平台株式会社 Wireless telecom equipment, wireless communication system, appraisal procedure and the non-transitory computer-readable medium having program stored therein
CN109218617A (en) * 2018-09-30 2019-01-15 中央电视台 A kind of long-range control method, broadcast level picture pick-up device and Cloud Server

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002127873A (en) * 2000-10-27 2002-05-09 Auto Network Gijutsu Kenkyusho:Kk Checking system for automobile burglary prevention
CN1829365A (en) * 2006-03-28 2006-09-06 江苏移动通信有限责任公司 User recognition module and method capable of realizing mobile terminal area locking
CN101233543A (en) * 2005-08-02 2008-07-30 格利尼联合有限公司 Interoperable system and method for managing geolocatable multiple services

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100716403B1 (en) * 2005-10-01 2007-05-11 주식회사 케이티프리텔 Alert service method for specific location informaion of mobile terminal and managing apparatus and mobile terminal for the same
CN101155212A (en) * 2006-09-30 2008-04-02 中兴通讯股份有限公司 Method for limiting use of mobile terminal
US8285300B2 (en) * 2007-02-28 2012-10-09 At&T Intellectual Property I, Lp Methods and systems for location-based management of wireless devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002127873A (en) * 2000-10-27 2002-05-09 Auto Network Gijutsu Kenkyusho:Kk Checking system for automobile burglary prevention
CN101233543A (en) * 2005-08-02 2008-07-30 格利尼联合有限公司 Interoperable system and method for managing geolocatable multiple services
CN1829365A (en) * 2006-03-28 2006-09-06 江苏移动通信有限责任公司 User recognition module and method capable of realizing mobile terminal area locking

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105828285A (en) * 2015-01-27 2016-08-03 中兴通讯股份有限公司 Machine-type communication (MTC) terminal location monitoring and managing method, device and system
CN107925881A (en) * 2015-09-01 2018-04-17 Nec平台株式会社 Wireless telecom equipment, wireless communication system, appraisal procedure and the non-transitory computer-readable medium having program stored therein
CN106941687A (en) * 2016-01-05 2017-07-11 中兴通讯股份有限公司 A kind of monitoring method, MTC device, terminal and the network entity of MTC device position
CN109218617A (en) * 2018-09-30 2019-01-15 中央电视台 A kind of long-range control method, broadcast level picture pick-up device and Cloud Server

Also Published As

Publication number Publication date
WO2011110074A1 (en) 2011-09-15

Similar Documents

Publication Publication Date Title
US8639290B2 (en) UICC control over devices used to obtain service
US7181252B2 (en) System and method for performing security functions of a mobile station
CN107316465B (en) Vehicle owner contact method and system based on vehicle electronic identification
CN101091404B (en) Alert service method for specific location information of mobile terminal and managing apparatus and mobile terminal for the same
AU750203B2 (en) Subscriber system with user station with removable data store
CN104081803A (en) Mobile communication device tracing
US10187826B2 (en) Subscription fall-back in a radio communication network
CN102833813A (en) Method, terminal and network equipment for distributing data to wireless local area network
WO2006113043A1 (en) Method and system for operating a wireless device with a radio frequency identification tag
CN102026241A (en) Business detection method, core network equipment and detection equipment
US9418257B2 (en) Offline mode for tag transmission reports
US9271148B2 (en) Authentication in a wireless telecommunications network
US10609649B2 (en) Method and device for reducing power consumption of terminal, and smart card
CN103702377A (en) Network switch method and equipment
US8866584B2 (en) Control device, control system, control method and storage medium
CN102448026A (en) Method and device for initiating one-to-many communication process in communication system via network
CN102196464A (en) Method, device and system for controlling safe use of machine-to-machine (M2M) terminal
EP1481564B1 (en) Method, system, radio device, computer program and sim-card for alarm path monitoring
CN101232677A (en) Method and apparatus for start-up logging of mobile terminal
CN102469430A (en) Method of handling emergent bearer service
CN102158848A (en) Access control method, network entity and access control system
CN113609473B (en) Wind control method for retrieving passwords, terminal equipment and server
CN102647691B (en) The sending method of note, Apparatus and system
CN109039783B (en) Alarm method and device
CN102137356A (en) Method for detecting copying of SIM card, and method, device and system for monitoring short message

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110921