CN102196464A - Method, device and system for controlling safe use of machine-to-machine (M2M) terminal - Google Patents
Method, device and system for controlling safe use of machine-to-machine (M2M) terminal Download PDFInfo
- Publication number
- CN102196464A CN102196464A CN2010101249314A CN201010124931A CN102196464A CN 102196464 A CN102196464 A CN 102196464A CN 2010101249314 A CN2010101249314 A CN 2010101249314A CN 201010124931 A CN201010124931 A CN 201010124931A CN 102196464 A CN102196464 A CN 102196464A
- Authority
- CN
- China
- Prior art keywords
- terminal
- positional information
- network side
- position information
- base station
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
Abstract
The embodiment of the invention provides a method, a device and a system for controlling the safe use of a machine-to-machine (M2M) terminal. The method comprises the following steps of: acquiring the current location information of the M2M terminal; and if the location information is inconsistent with legal location information, transmitting a notification message to a network side. In the method, the device and the system for controlling the safe use of the M2M terminal, the M2M terminal acquires own current location information, compares the location information with the legal location information, detects own illegal service condition if the location information is inconsistent with the legal location information, and transmits the notification message to the network side to notify the network side that the M2M terminal is under the illegal service condition, so the safe use of the M2M terminal is realized.
Description
Technical field
The embodiment of the invention relates to communication technical field, relates in particular to the methods, devices and systems that a kind of M2M of control terminal security uses.
Background technology
(Machine to Machine is designated hereinafter simply as: M2M) technology organically combines radio communication and information technology to machine, can be widely used in fields such as automatic data acquisition, security monitoring, automatic vending, item tracking to machine.M2M can exist following three kinds of mode: M2M, machine to mobile phone (as user's telemonitoring) and mobile phone to machine (as user's Long-distance Control).The M2M technology utilizes existing communication network and access technology to realize above communication mode, available communication network and access technology comprise global system for mobile communications (Global System for Mobile communications, abbreviate as: GSM), GPRS (General Packet Radio Service, abbreviate as: GPRS), universal mobile telecommunications system (Universal Mobile Telecommunications System, abbreviate as: UMTS), System Architecture Evolution (System Architecture Evolution, abbreviate as: SAE), worldwide interoperability for microwave inserts (Worldwide Interoperability for Microwave Access, abbreviate as: WiMAX) etc., closely interconnection technique comprises 802.11b/g, bluetooth (BlueTooth), purple honeybee (Zigbee), radio RF recognition technology (Radio Frequency Identification, abbreviate as: RFID) and ultra broadband (Ultra Wideband abbreviates as: UWB) technology.
Existing Human To Human (Human to Human; be called for short: H2H) in the communication system; subscriber terminal equipment is generally carried by the user or under the state that has the people to guard; in a single day terminal equipment is lost or is stolen; the user can know immediately; and do respective handling and prevent further loss; as informing network operator immediately; operator is after the legal signatory identity of checking user; can shut down or limit operations such as use to terminal according to user's requirement, to prevent loss or stolen terminal equipment is abused.
Yet different with existing H2H communication system, the M2M terminal generally no longer includes human intervention or guard under the normal operating conditions of installing after starting.For example, field data collection terminal, security monitoring terminal etc.When M2M lost terminal or stolen, be moved to unauthorized area when using, owing to be difficult to find or need to be found for a long time, carry out malicious act so may be utilized, for example, the data of the M2M terminal that is maliciously tampered collection or utilize the M2M terminal to carry out illegal egoistic communication bring loss for M2M user.The method that needs to provide a kind of effective control M2M terminal security to use thus so that when the M2M lost terminal or stolen after can in time be found.
Summary of the invention
The methods, devices and systems that the embodiment of the invention provides a kind of M2M of control terminal security to use so that the M2M lost terminal or stolen after can in time be found, realize the safe handling of M2M terminal.
The method that the embodiment of the invention provides a kind of M2M of control terminal security to use comprises:
Obtain described M2M terminal present located positional information;
If described positional information and legal position information are not inconsistent, then send a notification message to network side.
The method that the embodiment of the invention provides a kind of M2M of control terminal security to use comprises:
Receive the notification message that described M2M terminal sends;
According to described notification message, limit the use of described M2M terminal and/or notify described M2M terminal exiting network or close.
The embodiment of the invention provides a kind of M2M terminal, comprising:
Acquisition module is used to obtain described M2M terminal present located positional information;
Sending module is used for then sending a notification message to network side if described positional information and legal position information are not inconsistent.
The device that the embodiment of the invention provides a kind of M2M of control terminal security to use comprises:
Receiver module is used to receive the notification message that described M2M terminal sends;
Executive Module is used for according to described notification message, limits the use of described M2M terminal and/or notifies described M2M terminal exiting network or close.
The system that the embodiment of the invention provides a kind of M2M of control terminal security to use comprises the device that arbitrary M2M terminal that the embodiment of the invention provides and arbitrary control M2M terminal security use.
The methods, devices and systems that the control M2M terminal security of the embodiment of the invention uses, the M2M terminal is by obtaining self present located positional information, and this positional information compared with legal position information, if this positional information and legal position information are not inconsistent, then this M2M terminal detects and self is in illegal user mode, and send a notification message to network side, be in the state of illegal use so that inform this M2M terminal of network side, realized the safe handling of M2M terminal.
Description of drawings
In order to be illustrated more clearly in the technical scheme of the embodiment of the invention, the accompanying drawing of required use is done an introduction simply in will describing embodiment below, apparently, accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 controls the flow chart of the method embodiment one of M2M terminal security use for the present invention;
Fig. 2 controls the flow chart of the method embodiment two of M2M terminal security use for the present invention;
Fig. 3 controls the flow chart of the method embodiment three of M2M terminal security use for the present invention;
Fig. 4 is the schematic diagram of M2M terminal embodiment one of the present invention;
Fig. 5 is the schematic diagram of M2M terminal embodiment two of the present invention;
Fig. 6 controls the schematic diagram of the device embodiment one of M2M terminal security use for the present invention;
Fig. 7 controls the schematic diagram of the device embodiment two of M2M terminal security use for the present invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer, below in conjunction with the accompanying drawing in the embodiment of the invention, technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
Fig. 1 controls the flow chart of the method embodiment one that the M2M terminal security uses for the present invention, and as shown in Figure 1, this method comprises:
The M2M terminal is obtained self present located positional information; Wherein, the mode of obtaining can be periodically to obtain, and also can be that event-triggered is obtained.This positional information can be: M2M terminal present located base station (Base Station, be designated hereinafter simply as: (Paging Group is designated hereinafter simply as: PG sign PG) or the GPS information of the current present position of M2M terminal for the signal strength signal intensity of the signal of BS sign BS), the BS sign of M2M terminal present located BS and this BS emission, the paging group at M2M terminal present located BS place; Wherein, the BS sign for example is BS ID, and the PG sign for example is PG ID.
The legal position information that pre-configured this M2M terminal legal authorization is used on the M2M terminal.After the M2M terminal gets access to self present located positional information, this positional information and legal position information are compared, if this positional information and this legal position information are not inconsistent, for example: this positional information and this legal position information is inequality or this positional information is not included in the scope that legal position information comprised, then the M2M terminal judges comes from and is in illegal user mode, and sends a notification message to network side.This notification message can be to be used to represent that this M2M terminal is in the indication information of illegal user mode, also can be this M2M terminal present located positional information, can also be above-mentioned indication information and positional information.When this notification message is positional information, the legal position information that the legal authorization of the pre-configured M2M terminal of network side is used, this positional information and legal position information that network side will receive compare, can know that this positional information and this legal position information are not inconsistent, know that thus this M2M terminal is in illegal user mode.
In the present embodiment, the M2M terminal is by obtaining self present located positional information, and this positional information compared with legal position information, if this positional information and legal position information are not inconsistent, then this M2M terminal detects and self is in illegal user mode, and send a notification message to network side, be in the state of illegal use so that inform this M2M terminal of network side, realized the safe handling of M2M terminal.
Fig. 2 controls the flow chart of the method embodiment two that the M2M terminal security uses for the present invention, and as shown in Figure 2, this method comprises:
The notification message that step 201, reception M2M terminal send.
Come from the M2M terminal judges and to be in after illegal user mode, send a notification message to network side.Network side receives the notification message that the M2M terminal sends.Wherein, network side can be that (Gateway is designated hereinafter simply as gateway: GW), also can be BS and GW.
Network side can know that according to notification message the M2M terminal is in the state of illegal use.This notification message can be to be used to represent that this M2M terminal is in the indication information of illegal user mode, also can be this M2M terminal present located positional information, can also be above-mentioned indication information and positional information.When this notification message is positional information, the legal position information that the legal authorization of the pre-configured M2M terminal of network side is used, this positional information and legal position information that network side will receive compare, can know that this positional information and this legal position information are not inconsistent, know that thus this M2M terminal is in illegal user mode; When this notification message was indication information or indication information and positional information, network side directly just can know that according to this indication information this M2M terminal is in illegal user mode.
Know this M2M terminal when network side and be in illegal user mode, then limit the use of this M2M terminal and/or notify this M2M terminal exiting network or close by GW.When network side was BS and GW, BS sent to GW with the illegal information of using of this M2M terminal, so that GW limits the use of this M2M terminal and/or notifies this M2M terminal exiting network or close.
In the present embodiment, when the M2M terminal was in illegal user mode, network side received the notification message that the M2M terminal sends, and according to this notification message, limit the use of this M2M terminal and/or notify this M2M terminal exiting network or close, realized the safe handling of M2M terminal.
Fig. 3 controls the flow chart of the method embodiment three that the M2M terminal security uses for the present invention, and on the basis of method embodiment one and method embodiment two, as shown in Figure 3, this method comprises:
The legal position information that the M2M terminal has self specific legal authorization to use, can by pre-configured mode with this legal position information configuration on the M2M terminal, also can use (Over-the-Air the abbreviates OTA as) transmission means of eating dishes without rice or wine that this legal position information is sent on the M2M terminal.Wherein, this legal position information can be signal strength signal intensity, PG ID or the GPS information of the signal of BS ID, BS ID and this BS emission.
The M2M terminal can periodically be obtained self present located positional information by the default time cycle; Also can make the M2M terminal obtain self present located positional information by the mode of Event triggered.Wherein, the Event triggered mode can include but not limited to: when occur improperly restarting, by the situation that M2M terminal abnormals such as system reset, the sudden change of received signal intensity use, trigger the M2M terminal and obtain himself present located positional information.Concrete, obtain positional information and can comprise in following several mode any one:
Mode one, M2M terminal are obtained the BS sign of self present located BS.The M2M terminal receives broadcast and/or the unicast messages of place BS, from this broadcast or unicast messages, gets access to the BS ID of this BS.
Mode two, M2M terminal are obtained the signal strength signal intensity of the signal of the BS sign of self present located BS and this BS emission.The M2M terminal receives broadcast and/or the unicast messages of place BS, from this broadcast or unicast messages, gets access to the BS ID of this BS, and detects the signal strength signal intensity of the signal of this BS emission by signal receiving device.A certain M2M terminal may be authorized to use in a part of overlay area of certain BS, and at this moment, the signal strength signal intensity of signal that can be by BS ID and BS emission is determined this authorized region.
Mode three, M2M terminal are obtained the PG sign of the PG at self present located BS place.Broadcast and/or unicast messages that the M2M terminal receives place BS from this broadcast or unicast messages, obtain the PG ID of the PG at present located BS place.
Mode four, M2M terminal are obtained the GPS information of self current present position.The M2M terminal can by self the GPS measurement mechanism or shift position service (Location Based Service abbreviates as: the GPS information of LBS) orienting self present position.
When the M2M terminal detects himself positional information and legal position information when not being inconsistent, the M2M terminal will send a notification message to network side, and is concrete, sends a notification message to comprise in following several mode any one:
Mode one, M2M terminal send self present located positional information to network side, know that this positional information and legal position information are not inconsistent so that network side compares by this positional information and legal position information, and limit the use of this M2M terminal thus and/or notify this M2M terminal exiting network or close.
Mode two, M2M terminal send self present located positional information and are used to represent the illegal Indication message that uses of M2M terminal to network side, so that network side limits the use of this M2M terminal according to this Indication message and/or notify this M2M terminal exiting network or close, and this M2M location information of terminals is sent to server.
Mode three, M2M terminal send to network side and are used to represent the illegal indication information that uses of M2M terminal, so that network side limits the use of this M2M terminal according to this Indication message and/or notifies this M2M terminal exiting network or close.
Network side (for example GW or BS and GW) receives the notification message that the M2M terminal sends.
Notification message can comprise: M2M terminal present located positional information, this positional information and being used to represented illegal Indication message or this Indication message that uses of M2M terminal.
Corresponding with step 304, step 306 specifically can comprise any one in following several mode:
Mode one, when notification message includes only positional information, network side is by comparing positional information and legal position information, know that positional information and legal position information are not inconsistent, be not inconsistent the use of restriction M2M terminal and/or notice M2M terminal exiting network or close then according to positional information and legal position information.
Wherein, under this mode, need be in the legal position information of the pre-configured M2M terminal of network side; This positional information can comprise: the signal strength signal intensity of the BS sign of M2M terminal present located BS, the BS sign of M2M terminal present located BS and BS emission, the PG sign of the PG at M2M terminal present located BS place or the GPS information of the current present position of M2M terminal.
Mode two, when notification message comprises positional information and Indication message, network side limits the use and/or the notice M2M terminal exiting network of M2M terminal according to Indication message or closes, and network side also sends to the M2M server with M2M terminal present located positional information, to inform this M2M terminal present located position of M2M server.
Mode three, when notification message includes only Indication message, network side is according to the use and/or the notice M2M terminal exiting network of this Indication message restriction M2M terminal or close.
At network side notice M2M terminal exiting network or after closing, M2M terminal exiting network or close.
Need to prove that if network side is when being BS and GW, then BS is after knowing that the M2M terminal is in illegal user mode, the information that the M2M terminal is in illegal user mode sends to GW, make GW restriction M2M terminal use and/or notice M2M terminal exiting network or close.
Further, in another execution mode of the embodiment of the invention, step 306 can be replaced by following steps a, and does not limit the sequencing of this step a and step 305, and this step a is:
The M2M terminal is after network side sends a notification message, and the M2M terminal just limits the use of self, and perhaps the M2M terminal makes and self moves back net or close.
When using step a replacement step 306, the notification message that the M2M terminal sends to network side in the above-mentioned steps 304 can be used to inform that this M2M terminal of network side is current is in illegal user mode, and network side does not need to limit according to this notification message the use of M2M terminal, does not need to notify the M2M terminal exiting network or close yet.Wherein this notification message can comprise: M2M terminal present located positional information, M2M terminal present located positional information and the indication information that is used to represent the illegal Indication message that uses of M2M terminal or is used to represent the illegal use of M2M terminal.
In the present embodiment, the M2M terminal is by obtaining self present located positional information, and this positional information compared with legal position information, if this positional information and legal position information are not inconsistent, then this M2M terminal detects and self is in illegal user mode, and send a notification message to network side, be in the state of illegal use so that inform this M2M terminal of network side, realized the safe handling of M2M terminal.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be finished by the relevant hardware of program command, aforesaid program can be stored in the computer read/write memory medium, this program is carried out the step that comprises said method embodiment when carrying out; Aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
Fig. 4 is the schematic diagram of M2M terminal embodiment one of the present invention, and as shown in Figure 4, this terminal comprises: acquisition module 41 and sending module 43.
Acquisition module 41 is used to obtain M2M terminal present located positional information.Sending module 43 is used for then sending a notification message to network side if positional information and legal position information are not inconsistent.
Acquisition module 41 obtains M2M terminal present located positional information, when the positional information that sending module 43 gets access at acquisition module 41 does not conform to legal position information, send a notification message to network side, to inform the current state that is in illegal use of this M2M terminal of network side.
The operation principle of each module in the present embodiment and workflow do not repeat them here referring to the description among the said method embodiment.
In the present embodiment, the M2M terminal is obtained self present located positional information by acquisition module, and this positional information compared with legal position information, if this positional information and legal position information are not inconsistent, then this M2M terminal detects and self is in illegal user mode, and send a notification message to network side by sending module, be in the state of illegal use so that inform this M2M terminal of network side, realized the safe handling of M2M terminal.
Fig. 5 is the schematic diagram of M2M terminal embodiment two of the present invention, and on basis embodiment illustrated in fig. 4, as shown in Figure 5, this terminal also comprises: configuration module 45 and control module 47.
Acquisition module 41 specifically can comprise: first acquiring unit 411, second acquisition unit 413, the 3rd acquiring unit 415 or the 4th acquiring unit 417.
Sending module 43 specifically can comprise: first transmitting element 431, second transmitting element 433 or the 3rd transmitting element 435.
First acquiring unit 411 is used to obtain the Base Station Identification of M2M terminal present located base station.Second acquisition unit 413 is used to obtain the Base Station Identification of M2M terminal present located base station and the signal strength signal intensity of base station.The 3rd acquiring unit 415 is used to obtain the paging group sign of the paging group at place, M2M terminal present located base station.The 4th acquiring unit 417 is used to obtain the GPS information of the current present position of M2M terminal.
First transmitting element 431 is used for if positional information and legal position information are not inconsistent, then send M2M terminal present located positional information to network side, so that comparing by positional information and legal position information, network side knows that positional information and legal position information are not inconsistent, and the use of restriction M2M terminal and/or notice terminal exiting network or close.Second transmitting element 433 is used for if positional information and legal position information are not inconsistent, then send M2M terminal present located positional information and be used to represent the illegal Indication message that uses of M2M terminal to network side, so that network side is according to the use and/or the notice M2M terminal exiting network of Indication message restriction M2M terminal or close, and positional information is sent to server.The 3rd transmitting element 435 is used for if positional information and legal position information are not inconsistent, then send the indication information that is used to represent the illegal use of M2M terminal, so that network side limits the use and/or the notice terminal exiting network of M2M terminal according to Indication message or closes to network side.
Configuration module 45 is used for by the pre-configured mode or the transmission means configuration legal position information of eating dishes without rice or wine.
Control module 47 is used to limit the use of M2M terminal, perhaps makes the M2M terminal exiting network or closes.
Each module in the present embodiment and the operation principle of unit and workflow do not repeat them here referring to the description among the said method embodiment.
In the present embodiment, the M2M terminal is obtained self present located positional information by acquisition module, and this positional information compared with legal position information, if this positional information and legal position information are not inconsistent, then this M2M terminal detects and self is in illegal user mode, and send a notification message to network side by sending module, be in the state of illegal use so that inform this M2M terminal of network side, realized the safe handling of M2M terminal.
Fig. 6 controls the schematic diagram of the device embodiment one that the M2M terminal security uses for the present invention, and as shown in Figure 6, this device comprises: receiver module 61 and Executive Module 63.
The operation principle of each module in the present embodiment and workflow do not repeat them here referring to the description among the said method embodiment; Wherein, the device that the control M2M terminal security that provides in the present embodiment uses is equivalent to the network side among the said method embodiment; Receiver module can be positioned at BS, also can be positioned at GW; Executive Module is positioned at GW.
In the present embodiment, when the M2M terminal is in illegal user mode, the device that control M2M terminal security uses receives the notification message that the M2M terminal sends, and according to this notification message, limit the use of this M2M terminal and/or notify this M2M terminal exiting network or close, realized the safe handling of M2M terminal.
Fig. 7 controls the schematic diagram of the device embodiment two of M2M terminal security use for the present invention, on basis embodiment illustrated in fig. 6, as shown in Figure 7, this Executive Module 63 specifically can comprise: first performance element 631, second performance element 633 or the 3rd performance element 635.
Wherein, notification message comprises: M2M terminal present located positional information, positional information and being used to represented illegal Indication message or the Indication message that uses of terminal.
Each module in the present embodiment and the operation principle of unit and workflow do not repeat them here referring to the description among the said method embodiment.
In the present embodiment, when the M2M terminal is in illegal user mode, the device that control M2M terminal security uses receives the notification message that the M2M terminal sends, and according to this notification message, limit the use of this M2M terminal and/or notify this M2M terminal exiting network or close, realized the safe handling of M2M terminal.
The system that the embodiment of the invention also provides a kind of M2M of control terminal security to use, this system comprise the device that arbitrary M2M terminal that the embodiment of the invention provides and arbitrary control M2M terminal security use.
The operation principle of each module in the present embodiment and workflow do not repeat them here referring to the description among the said method embodiment.
In the present embodiment, the M2M terminal is by obtaining self present located positional information, and this positional information compared with legal position information, if this positional information and legal position information are not inconsistent, then this M2M terminal detects and self is in illegal user mode, and send a notification message to network side, be in the state of illegal use so that inform this M2M terminal of network side, realized the safe handling of M2M terminal.
It should be noted that at last: above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the spirit and scope of various embodiments of the present invention technical scheme.
Claims (16)
1. control the method that the M2M terminal security uses for one kind, it is characterized in that, comprising:
Obtain described M2M terminal present located positional information;
If described positional information and legal position information are not inconsistent, then send a notification message to network side.
2. the method that control according to claim 1 M2M terminal security uses is characterized in that, describedly obtains described M2M terminal present located positional information and comprises:
Obtain the Base Station Identification of described M2M terminal present located base station; Perhaps
Obtain the Base Station Identification of described M2M terminal present located base station and the signal strength signal intensity of described base station; Perhaps
Obtain the paging group sign of the paging group at place, described M2M terminal present located base station; Perhaps
Obtain the GPS information of the current present position of described M2M terminal.
3. the method that control M2M terminal security according to claim 1 uses is characterized in that, also comprises:
Dispose described legal position information by the pre-configured mode or the transmission means of eating dishes without rice or wine.
4. the method that control according to claim 1 M2M terminal security uses is characterized in that, describedly also comprises after network side sends a notification message:
Limit the use of described M2M terminal, perhaps make described M2M terminal exiting network or close.
5. according to the method for the arbitrary described control M2M terminal security of claim 1-3 use, it is characterized in that described sending a notification message to network side comprises:
Send described M2M terminal present located positional information to network side, know that described positional information and described legal position information are not inconsistent so that described network side compares by described positional information and described legal position information, and limit the use of described M2M terminal and/or notify described M2M terminal exiting network or close; Perhaps
Send described M2M terminal present located positional information and be used to represent the illegal Indication message that uses of described M2M terminal to network side, so that described network side limits the use of described M2M terminal according to described Indication message and/or notify described M2M terminal exiting network or close, and described positional information is sent to server; Perhaps
Send to network side and to be used to represent the illegal indication information that uses of described M2M terminal, so that described network side limits the use of described M2M terminal according to described Indication message and/or notifies described M2M terminal exiting network or close.
6. control the method that the M2M terminal security uses for one kind, it is characterized in that, comprising:
Receive the notification message that described M2M terminal sends;
According to described notification message, limit the use of described M2M terminal and/or notify described M2M terminal exiting network or close.
7. the method that control according to claim 6 M2M terminal security uses is characterized in that described notification message comprises: described M2M terminal present located positional information and/or be used to represent the illegal Indication message that uses of described M2M terminal; Described according to described notification message, limit the use of described M2M terminal and/or notify described M2M terminal exiting network or close and comprise:
Limit the use of described M2M terminal and/or notify described M2M terminal exiting network or close according to described Indication message, and described positional information is sent to server; Perhaps
By described positional information and described legal position information are compared, know that described positional information and described legal position information are not inconsistent, be not inconsistent the use of the described M2M terminal of restriction and/or notify described M2M terminal exiting network or close according to described positional information and described legal position information; Perhaps
Limit the use of described M2M terminal and/or notify described M2M terminal exiting network or close according to described Indication message.
8. according to the method for claim 6 or 7 described control M2M terminal securities uses, it is characterized in that, also comprise:
The legal position information of pre-configured described M2M terminal; Described positional information comprises: the paging group sign of the paging group at the Base Station Identification of the Base Station Identification of described M2M terminal present located base station, described M2M terminal present located base station and the signal strength signal intensity of described base station, place, described M2M terminal present located base station or the GPS information of the current present position of described M2M terminal.
9. a M2M terminal is characterized in that, comprising:
Acquisition module is used to obtain described M2M terminal present located positional information;
Sending module is used for then sending a notification message to network side if described positional information and legal position information are not inconsistent.
10. M2M terminal according to claim 9 is characterized in that, described acquisition module comprises:
First acquiring unit is used to obtain the Base Station Identification of described M2M terminal present located base station; Perhaps
Second acquisition unit is used to obtain the Base Station Identification of described M2M terminal present located base station and the signal strength signal intensity of described base station; Perhaps
The 3rd acquiring unit is used to obtain the paging group sign of the paging group at place, described M2M terminal present located base station; Perhaps
The 4th acquiring unit is used to obtain the GPS information of the current present position of described M2M terminal.
11. M2M terminal according to claim 9 is characterized in that, also comprises:
Configuration module is used for disposing described legal position information by the pre-configured mode or the transmission means of eating dishes without rice or wine.
12. M2M terminal according to claim 9 is characterized in that, also comprises:
Control module is used to limit the use of described M2M terminal, perhaps makes described M2M terminal exiting network or closes.
13., it is characterized in that described sending module comprises according to the arbitrary described M2M terminal of claim 9-11:
First transmitting element, be used for if described positional information and described legal position information are not inconsistent, then send described M2M terminal present located positional information to network side, know that described positional information and described legal position information are not inconsistent so that described network side compares by described positional information and described legal position information, and limit the use of described M2M terminal and/or notify described M2M terminal exiting network or close; Perhaps
Second transmitting element, be used for if described positional information and described legal position information are not inconsistent, then send described M2M terminal present located positional information and be used to represent the illegal Indication message that uses of described M2M terminal to network side, so that described network side limits the use of described M2M terminal according to described Indication message and/or notify described M2M terminal exiting network or close, and described positional information is sent to server; Perhaps
The 3rd transmitting element, be used for if described positional information and described legal position information are not inconsistent, then send and be used to represent the illegal indication information that uses of described M2M terminal, so that described network side limits the use of described M2M terminal according to described Indication message and/or notifies described M2M terminal exiting network or close to network side.
14. control the device that the M2M terminal security uses for one kind, it is characterized in that, comprising:
Receiver module is used to receive the notification message that described M2M terminal sends;
Executive Module is used for according to described notification message, limits the use of described M2M terminal and/or notifies described M2M terminal exiting network or close.
15. the device that control according to claim 14 M2M terminal security uses is characterized in that described notification message comprises: described M2M terminal present located positional information and/or be used to represent the illegal Indication message that uses of described M2M terminal; Described Executive Module comprises:
First performance element is used for limiting the use of described M2M terminal and/or notifying described M2M terminal exiting network or close according to described Indication message, and described positional information is sent to server; Perhaps
Second performance element, be used for by described positional information and described legal position information are compared, know that described positional information and described legal position information are not inconsistent, be not inconsistent the use of the described M2M terminal of restriction and/or notify described M2M terminal exiting network or close according to described positional information and described legal position information; Perhaps
The 3rd performance element is used for limiting the use of described M2M terminal and/or notifying described M2M terminal exiting network or close according to described Indication message.
16. control the system that the M2M terminal security uses for one kind, comprise as arbitrary described M2M terminal of claim 9-13 and as the device of claim 14 or 15 described control M2M terminal securities uses.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010101249314A CN102196464A (en) | 2010-03-12 | 2010-03-12 | Method, device and system for controlling safe use of machine-to-machine (M2M) terminal |
PCT/CN2011/071474 WO2011110074A1 (en) | 2010-03-12 | 2011-03-03 | Method, device and system for controlling safe use of m2m terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010101249314A CN102196464A (en) | 2010-03-12 | 2010-03-12 | Method, device and system for controlling safe use of machine-to-machine (M2M) terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102196464A true CN102196464A (en) | 2011-09-21 |
Family
ID=44562877
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010101249314A Pending CN102196464A (en) | 2010-03-12 | 2010-03-12 | Method, device and system for controlling safe use of machine-to-machine (M2M) terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102196464A (en) |
WO (1) | WO2011110074A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105828285A (en) * | 2015-01-27 | 2016-08-03 | 中兴通讯股份有限公司 | Machine-type communication (MTC) terminal location monitoring and managing method, device and system |
CN106941687A (en) * | 2016-01-05 | 2017-07-11 | 中兴通讯股份有限公司 | A kind of monitoring method, MTC device, terminal and the network entity of MTC device position |
CN107925881A (en) * | 2015-09-01 | 2018-04-17 | Nec平台株式会社 | Wireless telecom equipment, wireless communication system, appraisal procedure and the non-transitory computer-readable medium having program stored therein |
CN109218617A (en) * | 2018-09-30 | 2019-01-15 | 中央电视台 | A kind of long-range control method, broadcast level picture pick-up device and Cloud Server |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002127873A (en) * | 2000-10-27 | 2002-05-09 | Auto Network Gijutsu Kenkyusho:Kk | Checking system for automobile burglary prevention |
CN1829365A (en) * | 2006-03-28 | 2006-09-06 | 江苏移动通信有限责任公司 | User recognition module and method capable of realizing mobile terminal area locking |
CN101233543A (en) * | 2005-08-02 | 2008-07-30 | 格利尼联合有限公司 | Interoperable system and method for managing geolocatable multiple services |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100716403B1 (en) * | 2005-10-01 | 2007-05-11 | 주식회사 케이티프리텔 | Alert service method for specific location informaion of mobile terminal and managing apparatus and mobile terminal for the same |
CN101155212A (en) * | 2006-09-30 | 2008-04-02 | 中兴通讯股份有限公司 | Method for limiting use of mobile terminal |
US8285300B2 (en) * | 2007-02-28 | 2012-10-09 | At&T Intellectual Property I, Lp | Methods and systems for location-based management of wireless devices |
-
2010
- 2010-03-12 CN CN2010101249314A patent/CN102196464A/en active Pending
-
2011
- 2011-03-03 WO PCT/CN2011/071474 patent/WO2011110074A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002127873A (en) * | 2000-10-27 | 2002-05-09 | Auto Network Gijutsu Kenkyusho:Kk | Checking system for automobile burglary prevention |
CN101233543A (en) * | 2005-08-02 | 2008-07-30 | 格利尼联合有限公司 | Interoperable system and method for managing geolocatable multiple services |
CN1829365A (en) * | 2006-03-28 | 2006-09-06 | 江苏移动通信有限责任公司 | User recognition module and method capable of realizing mobile terminal area locking |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105828285A (en) * | 2015-01-27 | 2016-08-03 | 中兴通讯股份有限公司 | Machine-type communication (MTC) terminal location monitoring and managing method, device and system |
CN107925881A (en) * | 2015-09-01 | 2018-04-17 | Nec平台株式会社 | Wireless telecom equipment, wireless communication system, appraisal procedure and the non-transitory computer-readable medium having program stored therein |
CN106941687A (en) * | 2016-01-05 | 2017-07-11 | 中兴通讯股份有限公司 | A kind of monitoring method, MTC device, terminal and the network entity of MTC device position |
CN109218617A (en) * | 2018-09-30 | 2019-01-15 | 中央电视台 | A kind of long-range control method, broadcast level picture pick-up device and Cloud Server |
Also Published As
Publication number | Publication date |
---|---|
WO2011110074A1 (en) | 2011-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8639290B2 (en) | UICC control over devices used to obtain service | |
US7181252B2 (en) | System and method for performing security functions of a mobile station | |
CN107316465B (en) | Vehicle owner contact method and system based on vehicle electronic identification | |
CN101091404B (en) | Alert service method for specific location information of mobile terminal and managing apparatus and mobile terminal for the same | |
AU750203B2 (en) | Subscriber system with user station with removable data store | |
CN104081803A (en) | Mobile communication device tracing | |
US10187826B2 (en) | Subscription fall-back in a radio communication network | |
CN102833813A (en) | Method, terminal and network equipment for distributing data to wireless local area network | |
WO2006113043A1 (en) | Method and system for operating a wireless device with a radio frequency identification tag | |
CN102026241A (en) | Business detection method, core network equipment and detection equipment | |
US9418257B2 (en) | Offline mode for tag transmission reports | |
US9271148B2 (en) | Authentication in a wireless telecommunications network | |
US10609649B2 (en) | Method and device for reducing power consumption of terminal, and smart card | |
CN103702377A (en) | Network switch method and equipment | |
US8866584B2 (en) | Control device, control system, control method and storage medium | |
CN102448026A (en) | Method and device for initiating one-to-many communication process in communication system via network | |
CN102196464A (en) | Method, device and system for controlling safe use of machine-to-machine (M2M) terminal | |
EP1481564B1 (en) | Method, system, radio device, computer program and sim-card for alarm path monitoring | |
CN101232677A (en) | Method and apparatus for start-up logging of mobile terminal | |
CN102469430A (en) | Method of handling emergent bearer service | |
CN102158848A (en) | Access control method, network entity and access control system | |
CN113609473B (en) | Wind control method for retrieving passwords, terminal equipment and server | |
CN102647691B (en) | The sending method of note, Apparatus and system | |
CN109039783B (en) | Alarm method and device | |
CN102137356A (en) | Method for detecting copying of SIM card, and method, device and system for monitoring short message |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20110921 |