WO2010034257A1 - 一种终端配置和管理方法及终端装置 - Google Patents

一种终端配置和管理方法及终端装置 Download PDF

Info

Publication number
WO2010034257A1
WO2010034257A1 PCT/CN2009/074247 CN2009074247W WO2010034257A1 WO 2010034257 A1 WO2010034257 A1 WO 2010034257A1 CN 2009074247 W CN2009074247 W CN 2009074247W WO 2010034257 A1 WO2010034257 A1 WO 2010034257A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
terminal
configuration
authentication
information
Prior art date
Application number
PCT/CN2009/074247
Other languages
English (en)
French (fr)
Inventor
柴晓前
田林一
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to ES09815626T priority Critical patent/ES2435574T3/es
Priority to KR1020117008768A priority patent/KR101243073B1/ko
Priority to EP09815626.8A priority patent/EP2326047B1/en
Publication of WO2010034257A1 publication Critical patent/WO2010034257A1/zh
Priority to US13/073,616 priority patent/US20110173685A1/en
Priority to US13/253,751 priority patent/US8438616B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/084Configuration by using pre-existing information, e.g. using templates or copying from other elements
    • H04L41/0846Configuration by using pre-existing information, e.g. using templates or copying from other elements based on copy from other elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/085Retrieval of network configuration; Tracking network configuration history
    • H04L41/0853Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
    • H04L41/0856Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information by backing up or archiving configuration information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/18Protocol analysers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a terminal configuration and management method and a terminal device. Background technique
  • OMA Open Mobile Alliance
  • DM Device Management
  • the application data model--management objects such as: FUMO (Firmware Update Management Object) and software component management object (SCOMO, Software Component Management) are developed based on the DM protocol. Object) and so on.
  • End devices that support OMA DM functionality must have a DM client (software) responsible for OMA DM protocol parsing, session management, and session security.
  • Devices that support OMA DM functionality must also contain a data structure, the device management tree, which organizes all available management objects in the device. All nodes in the device management tree have unique uniform resource identifiers (URIs). , Unified Resource Identity) to locate.
  • URIs uniform resource identifiers
  • OMA DM is managed through two processes. First, Bootstrap configures a device from an unmanaged state to a manageable state. It mainly configures the server account and can also configure connection parameters and other information. Second, the management process is completed. Subsequent management.
  • the terminal cannot determine whether the configuration is suitable for the terminal during the configuration process, and the terminal cannot perform the configuration effectively.
  • the terminal needs to negotiate or try to determine which version of the protocol to use to initiate.
  • the session is more complicated.
  • the terminal may have multiple authentication information, it is difficult for the server and the terminal to determine that the same authentication information is used for the session trigger message, which increases the difficulty of triggering the message by the terminal authentication session.
  • the terminal can only authenticate and process a single parameter configuration message, making the efficiency very low, and the load on the channel and server is large. Summary of the invention
  • the terminal configuration and management method and the terminal device provided by the embodiments of the present invention can be configured according to the correct protocol version, thereby improving the operation efficiency.
  • the configuration file includes server account information and session protocol version information supported or selected by the server account corresponding server;
  • the server account information in the obtained configuration file is configured on the device management tree of the terminal;
  • the terminal is managed and subsequently configured based on the configured server account and the management session established by the server.
  • a management session between the terminal and the server is established based on the session trigger message, and the terminal is managed and subsequently configured in the session.
  • Configuring a device management server account where the device management server account includes a device management server identifier and authentication information;
  • the configuration carries the device management server identifier, the protocol version used, and the device management server identity authentication information, where the configuration message is used for configuration parameters or management;
  • the authentication is passed, determining, by the device management server, the access control authority of the device management server to the target management node on the terminal device management tree, and performing the management carried in the configuration message based on the access control authority command.
  • a configuration file obtaining unit configured to obtain a configuration file, where the configuration file includes session protocol version information supported by the server account and the corresponding server, and/or identifier and authentication information of the device management server;
  • a server account determining unit configured to extract the session protocol version information, and determine, according to the session protocol version information and a protocol version supported by the terminal, whether the server account is suitable for the terminal;
  • the configuration unit configures the server account to the device management tree of the terminal.
  • a configuration file obtaining unit configured to obtain a configuration file, where the configuration file includes a server account and authentication information;
  • a configuration unit configured to configure the server account to a device management tree of the terminal
  • the triggering message authentication unit triggers the received session by using the authentication information corresponding to the authentication type or the authentication name or the authentication type carried in the trigger message according to the identifier and the authentication information of the device management server obtained by the configuration file acquiring unit.
  • the message is authenticated, and the authentication information is included in the server account.
  • the embodiment of the invention further provides a terminal configuration and management system, including:
  • the device management server generates a configuration message based on the device management protocol, where the configuration message carries the identifier and authentication information of the device management server;
  • the device management client authenticates the device management server according to the device management server identifier and the authentication type carried in the configuration message, and determines, according to the identifier of the device management server, the target management of the device management server to the terminal device management tree. Node access control permission, and base And executing, by the access control authority, a management command carried in the configuration message.
  • the terminal can identify the protocol version corresponding to the configuration file by using the protocol version information supported by the corresponding server or corresponding to the configuration file in the configuration file, so that the terminal It can be judged whether the package is suitable for the terminal for proper configuration.
  • the terminal can determine the protocol to be used for communication with the server by carrying the protocol version information supported by the corresponding server or corresponding to the configuration package, thereby reducing the traffic volume caused by different protocol versions. problem.
  • FIG. 1 is a schematic flowchart of a terminal configuration process according to an embodiment of the present invention.
  • FIG. 2 is a schematic flowchart of a terminal configuration process according to an embodiment of the present invention.
  • FIG. 3 is a schematic flowchart of a terminal configuration according to another embodiment of the present invention.
  • FIG. 4 is a schematic flowchart of a terminal configuration process by using a broadcast mode according to an embodiment of the present invention
  • FIG. 5 is a schematic structural diagram of a terminal provided in an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a parameter configuration system provided in an embodiment of the present invention. detailed description
  • a method for configuring and managing a terminal is provided in the embodiment of the present invention, which is described below in conjunction with the embodiments.
  • a device management tree (DMT) of a terminal is an interface between a device management server (hereinafter referred to as a server) and a terminal.
  • a device management server hereinafter referred to as a server
  • a terminal In order to establish a management session between the server and the terminal, and complete the application layer authentication, a device needs to be migrated from an unmanaged state to a manageable state before subsequent management.
  • the process In OMA DM, the process is called initial configuration (Bootstrap). , mainly completes the configuration of the server account information to the terminal.
  • a terminal configuration and management method includes: S01, acquiring a configuration file, where the configuration file carries server account information and session protocol version information supported or selected by a server account corresponding server. ;
  • the configuration file is obtained first before being acquired.
  • the address may be a request address, and the request message for obtaining a configuration file is sent to the request address, where the request message further carries the identifier of the terminal, the service subscriber information, the subscriber identity verification code, the device information, and the supported.
  • the server selects a configuration file according to the carried information and delivers the configuration file to the terminal.
  • the configuration file contains session protocol version information supported by the corresponding server
  • the configuration method is as follows: A location is determined on the management tree DMT, and the determined server account information is mapped to a DMAcc (Device Management Account Management Object) management object instance at the location.
  • DMAcc Device Management Account Management Object
  • the acquired configuration file includes the session protocol version information supported by the corresponding server, extracting the session protocol version information, and determining, according to the session protocol version information, whether the server account is suitable for the terminal, and the account is suitable for the terminal.
  • the account is configured, wherein the session protocol version information is mapped to a value or a field of a leaf node of the DMAcc management object instance.
  • the terminal can establish a management session with the server.
  • This management session can be triggered by a terminal or server. If the session is triggered by the server, the configured account information must include the authentication information used by the session trigger message, and the session trigger message is authenticated by using the authentication information.
  • an authentication type needs to be scheduled, or is triggered. The message carries the authentication type or the authentication name, or an authentication type determination rule is determined, and the authentication type is determined according to the rule, and the terminal authenticates the trigger message according to the authentication type.
  • the terminal can determine the version of the session protocol suitable for the terminal and the server according to the session protocol version information mapped to the DMAcc on the DMT and the version of the protocol supported by the terminal, and according to the session protocol version. Initiate a session request message.
  • the protocol version corresponding to the configuration file can be identified, so that the terminal can determine the protocol that should be used for communication with the server, so as to perform correct configuration. Reduced traffic due to different protocol versions Increase the problem.
  • S11 Obtain a configuration file, where the configuration file carries one or more server account information, and carries the session protocol version information supported or preferably used by the server corresponding to each account information. Further, the session protocol version information is carried in the corresponding server account information, and the session protocol version information is one or more protocol version values.
  • the obtaining method includes: the terminal device reads the configuration file built in the SIM/USIM card, or the terminal device obtains the configuration file from the external entity through the local interface (such as Bluetooth, infrared, USB, etc.), or the network side pushes the configuration through the Push mode.
  • the file is sent to the terminal device, or the terminal device requests the configuration file through the PULL mode to the network side.
  • the terminal obtains the address of the configuration file.
  • the address information may be stored in the SIM/USIM card by the SIM/USIM card issuing mechanism in advance (not limited to the mode), and the secure encrypted information may be obtained while obtaining the address, and the security encrypted information is used for subsequent terminal reception.
  • the configuration file is used for content integrity and confidentiality verification, and the server certificate can be used;
  • the terminal obtains the configuration file according to the address, which is specifically:
  • the terminal directly downloads the configuration file, and the download method can be completed by using HTTP.
  • URL Uniform Resource Locator
  • the terminal sends a request message for obtaining the configuration file to the request address, and the request message may be an HTTP message.
  • the request message may carry one or more of the following information: identifier of the terminal (such as IMEI, ESN, etc.), service subscriber information (such as user public identity), subscriber identity verification code (network side assigned to The subscriber, the information identifying the identity, such as the user's request through the public identity, the network side sends the authentication code to the terminal through other means such as SMS, and the device information (such as device type, operating system version, firmware version, etc.) ), supported DM version, etc.
  • identifier of the terminal such as IMEI, ESN, etc.
  • service subscriber information such as user public identity
  • subscriber identity verification code network side assigned to The subscriber, the information identifying the identity, such as the user's request through the public identity, the network side sends the authentication code to the terminal through other means such as SMS, and the device information (such as device type, operating system version, firmware version,
  • the server After receiving the request message, the server identifies the identity of the terminal according to the information it carries and selects a configuration file suitable for the terminal.
  • the configuration file is organized in a Client Provisioning Profile format or organized in a Management Object Profile format.
  • the terminal After the integrity and confidentiality of the configuration file is processed, the terminal is sent to the terminal.
  • the server identifies the identity of the terminal by the subscriber identity code and the service subscriber information; the server selects a configuration file suitable for the terminal according to the identity of the terminal, the device information, the service subscriber information, or the supported DM version.
  • the PULL method can directly update the corresponding configuration file on the server after the upgrade or the configuration information is incorrect, and the configuration file sent to the terminal is always the latest, thereby reducing the configuration profile of the server beforehand to the terminal. Then, the account information is incorrect or the server is upgraded to notify the terminal and re-issue the new configuration file.
  • Determining whether the protocol version supported by the terminal corresponds to the extracted session protocol version (if both versions support multiple versions, it is determined whether there is an intersection of the supported version sets), and if not, it is determined that the account is not suitable for the terminal, if If there are other account information, continue to search for a suitable server account. Otherwise, the configuration process is aborted. If yes, it is determined that the server account corresponding to the element is a server account suitable for the terminal. If the same server in the same configuration file has multiple server accounts for the terminal, select the server account with the highest protocol version for configuration.
  • the configuring step may include:
  • the terminal determines the session protocol version suitable for the terminal and the server according to the session protocol version information mapped to the DM Acc on the DMT and the protocol version supported by the terminal, and The session protocol version initiates a session request message.
  • the step of determining a session protocol version suitable for the terminal and the server may be: determining an intersection of a protocol version set supported by the terminal and a session protocol version set on the DMAcc, and if the intersection only includes one protocol version, determining to initiate a session with the protocol version. If the intersection contains multiple protocol versions, select the highest version to initiate the session.
  • the server responds with the same protocol version and interacts with it later. If the server wants to use another version of the protocol for the session, it can also negotiate in subsequent sessions.
  • the method for carrying the session protocol version information supported or preferably used by the server in the server account information provided by the embodiment of the present invention enables the terminal to determine whether the server is suitable for the terminal before configuring the server account to the terminal. Avoid configuring a server account that is not suitable for the terminal, and reduce the cost of subsequent processing.
  • the protocol version supported by the server can also enable the terminal to determine a suitable session protocol version before initiating the session, which reduces subsequent session protocol version negotiation. The price.
  • a management session between the server and the terminal can be established.
  • the initiation of the management session can be triggered by the terminal or by the server. If the terminal actively triggers, the terminal directly connects to the server and sends a request message request session.
  • the request message can be implemented based on protocols such as HTTP, WSP, OBEX, and SIP; if the server triggers, the method is usually adopted because the server is difficult to directly connect to the terminal.
  • the server sends a session trigger message to the terminal by using a short message (SMS), a wireless application protocol push (WAP Push), or a SIP Push, and the trigger message carries the server identity authentication information, the server identifier, and the session.
  • SMS short message
  • WAP Push wireless application protocol push
  • SIP Push SIP Push
  • the information such as the identifier, the session initiator, and the like, the terminal initiates a session request according to the trigger message and establishes a management session by the server.
  • the configured server account information there may be multiple authentication information, which corresponds to different authentication types, such as: syncml:auth-basic, syncml:auth-md5, etc., the terminal uses one of them to generate authentication information.
  • the authentication type used may be the preferred authentication type specified in the configured account. If the preferred authentication type is not specified in the configured server account, the authentication type negotiated by the last session may be used, and the server considers the authentication adopted by the terminal. If the type is not appropriate, you can send a Challenge to the terminal to specify a new authentication type.
  • the session trigger messages sent by the server include digest and trigger (trigger message), where digest is the MD5 digest.
  • digest is the MD5 digest.
  • the terminal may have multiple authentication information, and the server and the terminal do not have a negotiation mechanism, it is difficult for the server and the terminal to use the password and nonce processing trigger message of the same authentication information when docking, which increases the difficulty of the terminal processing, and at the same time,
  • the trigger message in order to prevent the replay attack, a random number must be used, so it is necessary to maintain an authentication information with a nonce for the trigger message.
  • Method 1 Pre-specify (including standardized) a certain authentication information (corresponding to a certain authentication type) for triggering a message, the authentication information must have a password and a random number, and may have no user name, and may use syncml:auth- The authentication information corresponding to the md5 or syncml:auth-MAC authentication type. If the terminal and the server support the trigger message to trigger the management session, the authentication information must exist in the account information of the server configured by the terminal, that is, the server on the DMT. The App Auth node of the DM Acc instance corresponding to the account must have the AAuthType value as the authentication information of the authentication type.
  • the server Based on the predetermined authentication information, the server generates a trigger message and sends the message to the terminal through the other channel of the non-device management session.
  • the terminal extracts the server identifier in the trigger message, and then reads the DMAcc management object corresponding to the server identifier configured on the DMT.
  • the password and the random number of the determined authentication information in the example use the server identifier, the password, and the random number to generate the MD5 digest authentication to verify the validity and integrity of the trigger message (the generation algorithm is the same as the foregoing DIGEST generation algorithm), and pass the authentication.
  • the authentication information is generated by using the preferred authentication type in the server account information in the session request, and if there is no preferred authentication type in the account information, the last time is used.
  • the session type successfully used by the session is authenticated.
  • Method 2 Extend the trigger message format, and add an authentication type or an authentication name field, where the authentication type field value corresponds to an AAuthType node value under the AppAuth node on the DMAcc management object, and the authentication name field value corresponds to the AAuthName node value under the AppAuth node on the DMAcc management object. .
  • This field can be extended in the trigger header (trigger-hdr) or the message body (trigger-body). Because the authentication type value is long, it can be encoded.
  • the field extended by the trigger message only carries the code. Carry the authentication type value directly.
  • the server The trigger message sent to the terminal carries the authentication type or authentication name used by the terminal. In order to support the extension, the authentication type or the authentication name corresponding to the authentication message must be present in the server account information configured by the terminal.
  • the terminal After receiving the trigger message sent by the server through the other channel of the non-device management session, the terminal extracts the server identifier and the authentication type or the authentication name information in the trigger message, and then reads the information according to the authentication type or the authentication name field carried in the trigger message.
  • the password and the random number corresponding to the authentication information of the authentication type or the authentication name in the DMAcc management object instance corresponding to the server identifier configured on the DMT, and the MD5 digest authentication is used to verify the validity of the trigger message by using the server identifier, the password, and the random number.
  • the generation algorithm is the same as the aforementioned DIGEST generation algorithm, and the authentication name may be used instead of the server identifier in the aforementioned DIGEST generation algorithm, and other elements in the algorithm are unchanged
  • the application layer authentication uses the preferred authentication type in the server account information to generate the authentication information in the session request. If there is no preferred authentication type in the account information, the session type successfully used in the last session is used for authentication.
  • Method 3 It does not limit which type of authentication information is specifically used by the server and the terminal, but the server account information configured by the terminal must include at least one authentication type with a nonce, and at the same time, a predetermined rule (including standardized) is specified in advance.
  • the terminal and the server select an authentication type for the session trigger message according to the determining rule. Since both the server and the terminal know the type of authentication included in the server account information, the rule is determined based on the type of the authentication, that is, the same authentication type can be selected.
  • the authentication type determination rule may be: Sorting the authentication types including nonce (such as prioritization), and sorting by this.
  • the server determines a suitable authentication type generation trigger message from the authentication type of the server account information configured to the terminal, and delivers the message through the other channel of the non-device management session. For example, if the rule is "sequence select syncml:auth-md5, syncml:auth-MAC", the shell 'J server account must contain one of the above two types of authentication, the server uses to determine: If the server account information contains If the authentication type is syncml:auth-md5, the authentication type is determined as the session trigger message authentication type. Otherwise, syncml:auth-MAC is determined as the session trigger message authentication type.
  • the terminal extracts the server identifier in the trigger message, and then extracts from the DMT based on the same determination rule.
  • the generation algorithm is the same as the aforementioned DIGEST generation algorithm).
  • a session request is initiated to the server. If the application layer authentication is required, the authentication information is generated by using the preferred authentication type in the server account information in the session request. If there is no preferred authentication type in the account information, Authenticate using the type of session that was successfully used in the last session.
  • Method 4 It does not limit which type of authentication information is used by the server and the terminal, but the server account information configured by the terminal must include at least one authentication type with nonce.
  • the server selects one of the authentication types of the nonce to generate the trigger message, and delivers the trigger message to the terminal through other channels of the non-device management session.
  • the terminal extracts the server identifier in the trigger message, and then reads the password and the random number of an authentication type including the nonce in the DMAcc management object instance corresponding to the server identifier configured on the DMT, and generates the server identifier, the password, and the random number.
  • the MD5 digest authenticates the validity and integrity of the trigger message (the generation algorithm is the same as the DIGEST generation algorithm described above). If the authentication fails, another authentication type containing the nonce is selected to re-authenticate the trigger message until the authentication passes or attempts to complete all the nonce-containing messages. Type of certification. After the authentication is passed, a session request is initiated to the server. If the application layer authentication is required, the authentication information is generated by using the preferred authentication type in the server account information in the session request. If there is no preferred authentication type in the account information, Authenticate using the type of session that was successfully used in the last session.
  • the session protocol version information supported or preferably used by the server may be carried in the configured server account information, or may not be carried.
  • This method can also be used in the processing of trigger messages after the server account configuration of OMA DS (Data Synchronization).
  • the trigger message processing method can be used to process the trigger message by using the same authentication information when the server and the terminal are connected, thereby reducing the difficulty of the terminal processing, and ensuring that the client and the server supporting the trigger message can always select a random number.
  • the authentication information enables the replay attack mechanism that triggers the message to function.
  • a terminal configuration method provided in the third embodiment is used for implementing batch allocation based on a configuration account.
  • Set and management as shown in Figure 3, includes:
  • Configure a device management server account on the terminal where the device management server account includes an identifier of the server and authentication information of a server that is the same for all terminals;
  • a configuration message (for configuration parameter or management) generated by using the DM protocol from a broadcast channel, where the message header carries a server identifier, a protocol version used, and server identity authentication information that is consistent for all terminals.
  • the server identifier corresponding to the server has the right to execute the management command in the configuration message under the node of the terminal device management tree, and the management command carried in the configuration message is executed in the basic path.
  • connection parameters For the server, some configuration tasks or management tasks do not need to distinguish between terminals.
  • the configuration of connection parameters is the same for all terminal parameters.
  • the configuration of these connection parameters can be performed simultaneously by multiple terminals, and the interaction requirements are not strong.
  • Such tasks, in order to reduce channel occupancy and server load, can be performed using broadcast/multicast.
  • the configuration method based on the broadcast mode is similar to the fourth embodiment shown in FIG. 4 (the multicast mode is similar, and the other batch management tasks are similarly issued).
  • S41 Configure, on the terminal DMT, an account of a device management server used for management of the broadcast channel, where the device management server is responsible for generating a DM message (that is, a configuration message based on the DM protocol) configured for the broadcast channel.
  • the account includes the identifier of the server and the authentication information of the server. The authentication information is the same for all terminals.
  • the certificate of the device management server can be used to complete one-way authentication (that is, the terminal authentication device management server).
  • the account may also include a report address of the management message delivered by the broadcast channel or a report of the server, which is used by the terminal to report the processing result of the DM message received through the broadcast channel.
  • the configuration of the device management server account can be completed as follows: S41a) After the initial configuration process is completed, the account information is carried in the initial configuration file acquired by the terminal, and is mapped to the terminal DMT in the configuration process.
  • the configured server After the configuration is complete, the configured server generates a DM protocol-based configuration message for broadcasting, where the configuration message carries the server identifier, the protocol version used, the server identity authentication information, the DM management command, the target configuration value, and the like.
  • the server identifier is carried in the ⁇ 80111 ⁇ >/ ⁇ 1 ⁇ &11 ⁇ > element of the message header, and the identifier is used by the terminal to authenticate the server, and is also used by the terminal to determine the server to the target management node on the DMT.
  • Access control permission that is, ACL, Access Control List, access control list
  • the target configuration value can be a management object (composed of one or more management nodes).
  • the specific method for carrying the configuration value of the configuration message is:
  • the object is serialized, and a serial path is assigned to the serialized management object.
  • the relative path corresponds to a management object identified as urn:oma:mo:oma-dm-inbox: 1.0 on the terminal DMT, the virtual path indicating the terminal Determining a meaningful base path (ie, a base path on the DMT) according to its own DMT condition, and executing the DM management command on the configuration value based on the base path and its ACL.
  • the DM management commands here are Add or Replace commands.
  • the following is a message example:
  • the server sends the generated configuration message and the type of the message (DM message type: application/vnd.syncml.dm+xml) to the broadcast service application entity (BSA, BCAST Service Application) or the broadcast service distribution adaptation module (BSD) /A, BCAST Service Distribution/Adaptation) or Broadcast Distribution System Service Distribution/Adaptation (BDS SD/A).
  • BSA broadcast service application entity
  • BSD broadcast service distribution adaptation module
  • BDS SD/A Broadcast Distribution System Service Distribution/Adaptation
  • BSA or BSD/A or BDS SD/A module After the content encryption process is performed on the 543, BSA or BSD/A or BDS SD/A module, the configuration message and its type are sent to the broadcast client through the broadcast network;
  • the broadcast client After receiving the configuration message, the broadcast client performs content decryption processing, and then determines a required forwarding client according to the configuration message type, and forwards the client to the DM client.
  • the DM client processes the configuration message.
  • the specific processing method is as follows:
  • the terminal knows that the terminal needs to determine a basic path on the DMT according to the . /Inbox in the configuration message, and then determines a suitable base path on the DMT, the basic path must satisfy: the DM server has the underlying path And the method for determining whether the DM server has the right to execute the management command in the configuration message in the basic path is: performing the server identifier carried by the configuration message, and carrying the configuration message
  • the management command and the ACL (Access Control List) of the DMT management node corresponding to the determined basic path are determined. If the ACL includes the management command item and the server identifier is included in the entry, the permission is specified.
  • the execution process is specifically: in the configuration message, if the management command carried is Add, Adding the serialized management object (for configuring new) under the determined base path of the DMT, if there is a management node under the complete path, determining whether it is the same parameter, if yes, the Add operation fails, if not, then The root node of the management object is to be renamed, and the management object is added after the name is changed. If the management command carried is Replace, the serialized management object carried in the configuration message is used to update the existing management object under the base path determined by the DMT (update the existing parameter value), if there is no under the basic path If the node is managed, the Replace operation fails.
  • the step of activating the parameters of the configuration is also included.
  • the client After executing the management command in the configuration message (success or failure), the client obtains the report address or the report server identifier included in the configured server account, and if it is the report address, generates an HTTP message or other corresponding The message is sent to the reporting address. If the server identifier is reported, the terminal establishes a DM management session with the server corresponding to the server identifier, and reports the execution result in the DM management session.
  • the reported execution result includes: no permission, version incompatibility, Successful execution, etc.
  • the DM mechanism can be effectively used to eliminate the configuration requirements of the terminal, which can ensure security (server identity authentication and access authority control), and can also meet the management of different device management tree DMT structures.
  • Object positioning and configuration result reporting enable DM-based high-volume parameter configuration to be completed safely and efficiently, improving operational efficiency and reducing channel occupancy and server stress.
  • an embodiment of the present invention provides a terminal 500, including:
  • the configuration file obtaining unit 510 is configured to obtain a configuration file, where the obtaining unit includes a PULL unit that obtains a configuration file by using a PULL method, and the PULL unit sends an acquisition request carrying the terminal information to the acquiring server when acquiring the configuration file.
  • the configuration file may also carry server account information, where the server account information includes session protocol version information supported by the server;
  • the server account determining unit 520 is configured to extract the session protocol version information, and determine, according to the session protocol version information and a protocol version supported by the terminal, whether the server account is suitable for the terminal;
  • the configuration unit 530 when determining that the server account is suitable for the terminal, configures the determined server account information to the device management tree DMT of the terminal.
  • the processing unit 540 establishes a tube between the terminal and the server based on the configured server account.
  • the session is managed, and the terminal is subsequently configured and managed in the session.
  • the session version determining unit 550 when initiating the management session, determines a session protocol version suitable for the terminal and the server according to the session protocol version information mapped to the DMAcc on the device management tree DMT and the protocol version supported by the terminal; 540 initiates a session request message according to the session protocol version.
  • the trigger message authentication unit 560 can authenticate the trigger message by using a predetermined authentication type or carrying an authentication type or an authentication name in the trigger message or an authentication type determined according to a predetermined rule, the authentication type or the authentication name.
  • the corresponding authentication information is included in the configured account information.
  • the terminal can identify the protocol version corresponding to the packet by carrying the protocol version information supported by the corresponding server or the corresponding protocol in the configuration packet, so that the terminal can Determine if the package is suitable for the terminal for proper configuration.
  • the terminal can determine the protocol to be used for communication with the server by carrying the protocol version information supported by the corresponding server or corresponding to the configuration package, thereby reducing the traffic volume caused by different protocol versions. problem.
  • an embodiment of the present invention provides a batch configuration system, including:
  • the device management DM server generates a DM protocol-based configuration message that is sent by the broadcast channel, where the configuration message carries the identifier and authentication information of the device management server.
  • the broadcast service application entity BSA or the broadcast service distribution adaptation module BSD/A or the broadcast distribution network service distribution adaptation module BDS SD/A connection sends the configuration message, and the delivery channel is a broadcast channel;
  • the broadcast client accepts the message delivered by the broadcast channel, identifies the message according to the type of the message, and forwards the message to the DM client;
  • the device management DM client completes the identity authentication of the DM server that generates the configuration message according to the server identifier and the authentication type carried in the configuration message, and determines the target management of the device management server to the terminal device management tree according to the identifier of the device management server.
  • the access control permission of the node, and determining an appropriate basic path on the DMT based on the access control authority, the determined path must be satisfied: the carried server identifier corresponding to the server having the management command executed in the configuration message under the node Permissions, and execute the management commands carried in the configuration message in the base path.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Communication Control (AREA)

Description

一种终端配置和管理方法及终端装置 本申请要求于 2008 年 09 月 28 日提交中国专利局、 申请号为 200810169526.7、 发明名称为"一种终端配置和管理方法及终端装置"的中国 专利申请的优先权, 其全部内容通过引用结合在本申请中。 技术领域
本发明涉及通信技术领域, 具体涉及终端配置和管理方法及终端装置。 背景技术
随着移动通信业务的增多, 移动终端的复杂度也在不断增加, 对移动终 端进行空中(OTA, Over The Air )管理和配置需求越来越强烈, 为了能够安 全地对移动终端进行 OTA方式的管理, 开放移动联盟( OMA, Open Mobile Alliance )开发了设备管理(DM, Device Management )协议, 主要是提供了 一套管理服务器和被管理终端间基于会话的通信机制,包括:管理会话机制、 管理会话安全、 管理会话中管理消息格式及约束、 数据模型——管理对象 ( MO, Management Object )。 为了实现对终端的具体管理功能, 在 DM协 议的基础上开发了应用数据模型——管理对象, 如: 固件升级管理对象 ( FUMO , Firmware Update Management Object )、 软件组件管理对象 ( SCOMO, Software Component Management Object )等。
支持 OMA DM功能的终端设备必须有一个 DM客户端(软件 ),负责 OMA DM协议解析、 会话管理及会话安全。 支持 OMA DM功能的设备还必须包含 一个数据结构——设备管理树,设备管理树将设备中所有可用的管理对象组 织在一起, 在设备管理树中的所有节点都有唯一的统一资源标识 (URI , Unified Resource Identity )来定位。
OMA DM通过两个过程完成管理, 一是初始配置 (Bootstrap ), 将一个 设备从不可管理状态配置到可管理状态, 主要配置服务器的账号, 也可以配 置连接参数等信息; 二是管理过程, 完成后续的管理。
在实现本发明的过程中, 发明人发现现有技术至少存在技术缺陷: 现有 技术中终端在配置过程中无法判断该配置是否适合该终端, 终端不能有效的 进行配置。 同时, 终端需要进行协商或尝试以确定使用哪个版本的协议发起 会话, 使得会话更为复杂; 另外, 在后续管理过程中, 终端可能存在多个认 证信息时, 服务器和终端很难确定对会话触发消息使用同一认证信息, 增加 了终端认证会话触发消息的难度; 另外, 终端只能认证和处理单个参数配置 消息, 使得效率非常低, 而且信道和服务器的负荷较大。 发明内容
本发明实施例提供的终端配置和管理方法及终端装置, 可按照正确的协 议版本进行配置, 从而提高了操作的效率。
本发明实施例提供的一种终端配置和管理方法, 包括:
获取配置文件, 该配置文件包含服务器帐号信息以及服务器账号对应服 务器所支持或选定的会话协议版本信息;
提取所述会话协议版本信息, 并根据所述会话协议版本信息判断所述服 务器账号是否适合所述终端;
若所述服务器账号适合所述终端, 则将所获取的配置文件中的服务器账 号信息配置到终端的设备管理树上;
基于所配置服务器帐号与所述服务器建立管理会话对终端进行管理和 后续配置。
本发明实施例提供的另一种终端配置和管理方法, 包括:
在终端的设备管理树上配置服务器的帐号信息, 所述服务器账号信息包 含一个或多个认证信息;
接收所述服务器下发的携带服务器身份认证信息和服务器标识的会话 触发消息;
使用所述服务器标识对应的所述设备管理树上的服务器账号信息所包 含的认证信息生成 MD5摘要认证所述会话触发消息;
在认证通过后,基于所述会话触发消息建立所述终端和所述服务器之间 的管理会话, 并在所述会话中对所述终端进行管理和后续配置。
本发明实施例提供的又一种终端配置和管理方法, 包括:
配置设备管理服务器账号,所述设备管理服务器账号中包括设备管理服 务器标识和认证信息;
接收所述设备管理服务器基于设备管理协议生成的配置消息,所述配置 消息中携带设备管理服务器标识、所使用协议版本和设备管理服务器身份认 证信息, 所述配置消息用于配置参数或管理;
根据所述设备管理服务器标识从所述设备管理服务器账号中提取所述 认证信息, 并使用所述认证信息认证所述配置消息;
若认证通过, 则根据所述设备管理服务器的标识确定所述设备管理服务 器对终端设备管理树上目标管理节点的访问控制权限, 并基于所述访问控制 权限执行所述配置消息中所携带的管理命令。
本发明实施例提供的一种终端, 包括:
配置文件获取单元, 用于获取配置文件, 该配置文件包含服务器帐号和 对应服务器所支持的会话协议版本信息和 /或设备管理服务器的标识和认证 信息;
服务器帐号确定单元, 用于提取所述会话协议版本信息, 基于所述会话 协议版本信息与终端所支持的协议版本确定所述服务器帐号是否适合所述 终端;
配置单元, 将所述服务器账号配置到终端的设备管理树上。
本发明实施例提供的另一种终端, 包括:
配置文件获取单元, 用于获取配置文件, 该配置文件包含服务器帐号和 认证信息;
配置单元, 将所述服务器账号配置到终端的设备管理树上;
触发消息认证单元,根据所述配置文件获取单元获得的设备管理服务器 的标识和认证信息,使用在触发消息中携带的认证类型或认证名称或认证类 型的标识对应的认证信息, 对接收的会话触发消息进行认证, 所述认证信息 包含在所述服务器账号中。
本发明实施例还提供一种终端配置和管理***, 包括:
设备管理服务器, 生成基于设备管理协议的配置消息, 所述配置消息中 携带设备管理服务器的标识和认证信息;
设备管理客户端,根据所述配置消息中携带的设备管理服务器标识和认 证类型认证所述设备管理服务器, 并根据所述设备管理服务器的标识确定所 述设备管理服务器对终端设备管理树上目标管理节点的访问控制权限, 并基 于所述访问控制权限执行所述配置消息中所携带的管理命令。
综上所述, 本发明实施例提供的技术方案中, 终端在进行初始配置时, 通过配置文件中携带对应服务器所支持或对应的协议版本信息, 可以识别该 配置文件对应的协议版本, 使得终端可以判断该包是否适合本终端, 以进行 正确的配置。 当终端能够支持多个协议版本时, 终端通过配置包中携带对应 服务器所支持或对应的协议版本信息可以确定和服务器通信所应使用的协 议, 减少了因协议版本不同导致的通信量加大的问题。
另外, 通过批量的参数配置方法, 使得可以有效的完成大批量通用管理 操作的安全下发, 如参数配置, 提高了操作的效率, 降低了信道占用以及服 务器的负荷。 附图说明
图 1为本发明实施例中的终端配置流程示意图;
图 2为本发明实施例中的终端配置流程示意图;
图 3为本发明另一实施例提供的终端配置流程示意图;
图 4为本发明实施例采用广播方式的终端配置流程示意图;
图 5为本发明实施例中提供的终端结构示意图;
图 6为本发明实施例中提供的参数配置***结构示意图。 具体实施方式
本发明实施例中提供一种终端配置和管理的方法, 下面结合实施例进行 说明。
在 OMA DM中, 终端的设备管理树( DMT, Device Management Tree )是 设备管理服务器(以下称为服务器 )和终端间的接口。 为了能够在服务器和 终端间建立管理会话, 以及完成应用层认证, 在进行后续管理之前, 需要将 一个设备从不可管理状态迁移到可管理状态,在 OMA DM中该过程称为初始 配置(Bootstrap ) , 主要完成将服务器账号信息配置到终端。
参照图 1 , 本发明实施例一提供的一种终端配置和管理方法, 包括: S01 , 获取配置文件, 该配置文件携带有服务器帐号信息以及服务器账 号对应服务器所支持或选定的会话协议版本信息;
具体地, 可以通过 PULL (拉)方式获取, 在获取之前首先获取配置文 件的地址, 后 ^据该地址获取配置文件。 其中, 所述地址可以为请求地址, 则向该请求地址发送获取配置文件的请求消息, 该请求消息中还携带有终端 的标识、 业务订阅者信息、 订阅者身份验证码、 设备信息、 所支持 DM版本 等信息中的一个或多个, 服务器根据所携带信息选择配置文件并下发给终 端。
该配置文件包含对应服务器所支持的会话协议版本信息;
502, 将所获取的配置文件中的服务器账号信息配置到终端的设备管理 树 DMT上。
配置方法为: 在管理树 DMT上确定一个位置, 将所确定的服务器账号 信息映射为该位置上的一个 DMAcc ( Device Management Account Management Object, 设备管理账号管理对象)管理对象实例。
若所获取配置文件中包含对应服务器所支持的会话协议版本信息, 则提 取所述会话协议版本信息, 并根据所述会话协议版本信息判断该服务器账号 是否适合该终端, 并在该账号适合该终端时配置该账号, 其中, 所述会话协 议版本信息映射为 DMAcc管理对象实例的叶子节点的值或字段。
503 , 基于所配置服务器帐号与所述服务器建立管理会话对终端进行管 理和后续配置。
在完成配置之后, 终端即可以和服务器建立管理会话。 该管理会话可以 由终端或服务器触发。 若会话是由服务器触发, 则在所配置的账号信息中必 须包含会话触发消息使用的认证信息,使用该认证信息对该会话触发消息进 行认证, 为了完成认证, 需预定一个认证类型, 或在触发消息中携带认证类 型或认证名称,或预定一个认证类型确定规则,并根据该规则确定认证类型, 终端根据该认证类型对触发消息进行认证。
在配置完成后, 终端在发起管理会话时, 可以根据映射到 DMT 上的 DMAcc 上的会话协议版本信息和终端所支持的协议版本, 确定适合终端和 服务器的会话协议版本, 并依该会话协议版本发起会话请求消息。
本实施例中, 通过配置文件中携带对应服务器所支持或对应的协议版本 信息, 可以识别该配置文件对应的协议版本, 使得终端可确定和服务器通信 所应使用的协议, 以进行正确的配置, 减少了因协议版本不同导致的通信量 加大的问题。
参照图 2, 本发明实施例二所描述配置和管理方法如下:
S11,获取配置文件, 所述配置文件携带一个或多个服务器账号信息, 同 时携带每个账号信息对应服务器所支持或优选使用的会话协议版本信息。 进 一步地, 该会话协议版本信息携带在对应的服务器账号信息中, 该会话协议 版本信息为一个或多个协议版本值。
获取方法包括: 终端设备读取内置在 SIM/USIM卡中的配置文件, 或者 终端设备通过其本地接口 (如蓝牙、 红外、 USB等)从外部实体获取配置文 件, 或者网络侧通过 Push方式推送配置文件到终端设备, 或者终端设备向网 络侧通过 PULL方式请求配置文件。
其中, 通过 PULL方式请求的具体方法如下:
1 )终端获取配置文件的地址。该地址信息可以预先由 SIM/USIM发卡机 构存储在 SIM/USIM卡中 (并不限定于该方式) , 在获取该地址的同时还可 以获取安全加密信息, 安全加密信息用于后续终端对所接收配置文件进行內 容的完整性和保密性验证, 可以采用服务器的证书;
2 )终端根据该地址获取配置文件, 具体为:
若该地址是配置文件的统一资源定位 ( URL , Universal Resource Locator ) , 则终端直接下载该配置文件, 下载的方法可以使用 HTTP完成。
若该地址是一个请求地址(即服务器的访问地址,通过该访问地址向该 服务器请求以获取配置文件), 则终端向该请求地址发送获取配置文件的请 求消息, 该请求消息可以是 HTTP消息, 在该请求消息中可以携带有下述信 息中的一个或多个: 终端的标识(如 IMEI、 ESN等) 、 业务订阅者信息(如 用户公有标识) 、 订阅者身份验证码(网络侧分配给该订阅者, 以标识其身 份的信息, 如用户通过公有标识请求后, 网络侧通过 SMS等其它途径下发到 终端的身份验证码)、设备信息(如设备类型、操作***版本、 固件版本等)、 所支持 DM版本等。 服务器接收到该请求消息后, 根据其携带的信息识别终 端身份和选择适合该终端的配置文件, 该配置文件以客户端配置 (Client Provisioning Profile )格式组织或者以管理对象( Management Object Profile ) 格式组织, 在对该配置文件进行完整性和保密性处理之后, 下发给终端。 在上述方法中,服务器通过订阅者身份识别码及业务订阅者信息识别终 端身份; 服务器根据终端的标识、 设备信息、 业务订阅者信息或所支持 DM 版本等选择适合该终端的配置文件。 该 PULL方法, 可以使得服务器在升级后或发现配置信息有误后直接更 新服务器上相应的配置文件, 下发给终端的配置文件始终是当时最新的, 从 而减小了服务器事前配置配置文件到终端, 而后发现账号信息有误或进行服 务器升级后通知终端并重新下发新配置文件的代价。
512,提取该配置文件中所携带的该服务器所支持或优选使用的会话协议 版本信息。
513,基于所提取的会话协议版本信息和终端本身所支持的协议版本, 判 断该服务器账号是否适合该终端, 并在适合时配置该服务器账号信息。
进一步地, 判断该服务器账号是否适合该终端的步骤如下:
确定终端所支持的协议版本和该提取的会话协议版本是否对应(若双方 都支持多个版本, 则判断所支持版本集是否存在交集) , 若不对应, 则确定 该账号不适合该终端, 若有其它账号信息则继续寻找适合的服务器账号, 否 则配置过程中止, 若对应, 则确定该元素对应的服务器账号为适合该终端的 服务器账号。 若同一配置文件中同一服务器有多个适合该终端的服务器账 号, 则选择支持协议版本最高的服务器账号进行配置。
具体地, 配置步骤可以包括:
在 DMT上确定一个位置,将配置文件中的该账号信息映射为该位置上的 一个 DMAcc管理对象实例,该账号信息中携带的一个或多个协议版本值映射 为 DMAcc管理对象实例的一个或多个叶子节点的值或值的一个字段,若有其 它相关管理对象(如连接参数管理对象), 则同时也映射到 DMT上, 上述映 射的管理对象节点的 Get、 Replace, Delete权限授予该服务器账号对应的服务 哭
514,在配置成功后, 在需要建立管理会话时, 终端根据映射到 DMT上的 DM Acc上的会话协议版本信息和终端所支持的协议版本 ,确定适合终端和服 务器的会话协议版本, 并依该会话协议版本发起会话请求消息。 其中确定适合终端和服务器的会话协议版本的步骤可以为: 确定终端所 支持的协议版本集和 DMAcc上的会话协议版本集的交集,若交集仅包含一个 协议版本, 则确定以该协议版本发起会话, 若交集包含多个协议版本, 则选 取最高版本发起会话。 服务器使用同样的协议版本进行应答, 并在后续使用 该协议进行交互, 若服务器希望使用另外一版本的协议进行会话, 也可以在 后续会话中进行协商。
通过采用本发明实施例提供的在服务器账号信息中携带服务器所支持 或优选使用的会话协议版本信息的方法, 可使得终端可以在配置服务器账号 到终端之前, 事先判断该服务器是否适合该终端, 从而避免配置一个不适合 该终端的服务器账号, 降低后续处理的代价, 同时, 通过该服务器所支持的 协议版本也可以使得终端发起会话前确定一个合适的会话协议版本, 减少了 后续进行会话协议版本协商的代价。
在配置完服务器的账号信息后, 即可以建立服务器和终端间的管理会 话。 该管理会话的发起可以由终端主动触发, 也可以由服务器触发。 如果终 端主动触发, 则终端直接连接服务器并发送请求消息请求会话, 该请求消息 可以基于 HTTP、 WSP、 OBEX, SIP等协议实现; 如果服务器触发, 则由于 服务器很难直接连接终端, 通常采用的方法是服务器通过短消息 ( SMS )、 无线应用协议推送(WAP Push ), 会话发起协议推送(SIP Push )等方式向 终端下发发送会话触发消息, 该触发消息携带服务器身份认证信息、 服务器 标识、 会话标识、 会话发起方等信息, 终端根据该触发消息发起会话请求和 服务器建立管理会话。 在所配置的服务器账号信息中, 可能会存在多个认证 信息, 其对应不同的认证类型, 认证类型如: syncml:auth-basic、 syncml:auth-md5等,终端采用其中一种生成认证信息,所采用的认证类型可 以是在所配置账号中指定的优选认证类型, 若所配置服务器账号中未指定优 选认证类型, 则可以使用上次会话所协商的认证类型, 服务器若认为终端所 采用的认证类型不合适则可以向终端发送 Challenge (挑战)指定新的认证类 型。
服务器发送的会话触发消息包括 digest (摘要)和 trigger (触发消息), 其中 digest为 MD5摘要, 生成方法为: Digest = H(B64 (H(server- identifier :pas sword)): nonce: B64 (H(trigger))) 其中, H为 MD5 Hash哈希函数, server-identifier为服务器标识, nonce 为防重放攻击随机数, B64为 Base64编码函数, password为认证密码。
由于终端可能会存在多个认证信息, 而服务器和终端没有协商机制, 使 得服务器和终端在对接时很难使用相同认证信息的 password和 nonce处理触 发消息, 增加了终端处理的难度, 同时, 由于在触发消息中为了防止重放攻 击必须使用随机数, 所以需要为触发消息维护一个具有 nonce的认证信息。 在配置参数后可采用如下方法进行触发消息的处理:
方法一、 预先指定(包括标准化的)一个确定的用于触发消息的认证信 息 (对应某一认证类型), 该认证信息必须具有密码和随机数, 可以不具有 用户名, 可以使用 syncml:auth-md5或 syncml:auth-MAC认证类型对应的认 证信息, 若终端和服务器支持触发消息以触发管理会话, 则该认证信息必须 存在于终端所配置的该服务器的账号信息中, 即在 DMT上该服务器账号对 应的 DM Acc实例的 App Auth节点下必须具有 AAuthType值为该认证类型的 认证信息。
基于该预定的认证信息,服务器生成触发消息并通过非设备管理会话的 其它通道下发到终端, 终端提取触发消息中的服务器标识, 后读取 DMT上 所配置的该服务器标识对应的 DMAcc管理对象实例中的该确定的认证信息 的密码和随机数, 使用该服务器标识、 密码和随机数生成 MD5摘要认证该 触发消息的合法性和完整性(生成算法同前述 DIGEST生成算法), 并在认 证通过后向该服务器发起会话请求, 若需要使用应用层认证, 则在该会话请 求中使用该服务器账号信息中的优选认证类型生成认证信息, 若在其账号信 息中无优选认证类型, 则使用上次会话成功使用的会话类型进行认证。
方法二、 扩展触发消息格式, 增加认证类型或认证名称字段, 该认证类 型字段值对应 DMAcc管理对象上 AppAuth节点下的 AAuthType节点值,该 认证名称字段值对应 DMAcc管理对象上 AppAuth节点下 AAuthName节点 值。 该字段可以扩展在触发消息的消息头 ( trigger-hdr ) 或消息体 ( trigger-body ), 由于认证类型值较长, 可以为其进行编码, 触发消息所扩 展的字段仅携带该编码, 也可以直接携带认证类型值。 基于此扩展, 服务器 在下发给终端的触发消息中携带其所使用的认证类型或认证名称。 为了支撑 该扩展,在终端所配置的该服务器账号信息中必须存在触发消息所使用的认 证类型或认证名称对应认证信息。
基于该触发消息携带的认证类型或认证名称字段, 终端在接收到服务器 通过非设备管理会话的其它通道发送的触发消息后,提取触发消息中的服务 器标识和认证类型或认证名称信息, 后读取 DMT上所配置的该服务器标识 对应的 DMAcc管理对象实例中的该认证类型或认证名称对应认证信息的密 码和随机数, 使用该服务器标识、 密码和随机数生成 MD5摘要认证该触发 消息的合法性和完整性(生成算法同前述 DIGEST生成算法, 也可以使用认 证名称代替前述 DIGEST生成算法中的服务器标识,算法中其它元素不变), 并在认证通过后向该服务器发起会话请求, 若需要使用应用层认证, 则在该 会话请求中使用该服务器账号信息中的优选认证类型生成认证信息, 若在其 账号信息中无优选认证类型, 则使用上次会话成功使用的会话类型进行认 证。
方法三、 不限定服务器和终端具体使用哪种类型的认证信息, 但在终端 所配置的服务器账号信息中, 必须至少包含一个具有 nonce的认证类型, 同 时, 预先指定(包括标准化的)一个确定规则, 终端和服务器根据该确定规 则为会话触发消息选择认证类型。 由于服务器和终端均知道服务器账号信息 中包含的认证类型, 所以基于该认证类型确定规则, 即可以实现两者选择相 同的认证类型。 该认证类型确定规则可以是: 将包含 nonce的认证类型排序 (如以优先级排序), 按此排序选择。
基于该预定的确定规则,服务器从配置到该终端的该服务器账号信息的 认证类型中确定一个合适的认证类型生成触发消息, 并通过非设备管理会话 的其它通道将其下发。 例如, 若确定规则为 "顺序选择 syncml:auth-md5 , syncml:auth-MAC", 贝' J服务器账号中必须包含上述两种认证类型中一种, 服 务器使用时判断: 若服务器账号信息中包含认证类型为 syncml:auth-md5 的 认证信息, 则确定该认证类型为会话触发消息认证类型, 否则确定 syncml:auth-MAC为会话触发消息认证类型。
终端提取触发消息中的服务器标识, 后基于同一确定规则从 DMT上所 配置的该服务器标识对应的 DMAcc管理对象实例中确定认证类型, 并读取 该认证类型的密码和随机数, 使用该服务器标识、 密码和随机数生成 MD5 摘要认证该触发消息的合法性和完整性(生成算法同前述 DIGEST 生成算 法)。 在认证通过后向该服务器发起会话请求, 若需要使用应用层认证, 则 在该会话请求中使用该服务器账号信息中的优选认证类型生成认证信息, 若 在其账号信息中无优选认证类型, 则使用上次会话成功使用的会话类型进行 认证。
方法四、 不限定服务器和终端使用哪种类型的认证信息, 但在终端所配 置的服务器账号信息中, 必须至少包含一个具有 nonce的认证类型。
基于该非限定的认证信息, 服务器选择其中一种包含 nonce的认证类型 生成触发消息, 并通过非设备管理会话的其它通道下发到终端。
终端提取触发消息中的服务器标识, 后读取 DMT上所配置的该服务器 标识对应的 DMAcc管理对象实例中包含 nonce的某一认证类型的密码和随 机数, 使用该服务器标识、 密码和随机数生成 MD5摘要认证该触发消息的 合法性和完整性(生成算法同前述 DIGEST生成算法), 若认证失败则选择 另一包含 nonce的认证类型重新认证该触发消息, 直到认证通过或尝试完所 有包含 nonce的认证类型。 在认证通过后向该服务器发起会话请求, 若需要 使用应用层认证, 则在该会话请求中使用该服务器账号信息中的优选认证类 型生成认证信息, 若在其账号信息中无优选认证类型, 则使用上次会话成功 使用的会话类型进行认证。
该触发消息的处理的方法中,在所配置的服务器账号信息中可以携带服 务器所支持或优选使用的会话协议版本信息, 也可以不携带。 该方法也可以 用于 OMA DS ( Data Synchronization ) 的服务器账号配置后的触发消息的处 理中。
通过该触发消息处理方法, 可以使得服务器和终端在对接时使用相同认 证信息处理触发消息, 降低了终端处理的难度, 同时, 可以保证在支持触发 消息的客户端和服务器, 始终可以选择具有随机数的认证信息, 使触发消息 的重放攻击机制能够发挥作用。
本实施例三提供的一种终端配置方法, 用于实现基于配置账号的批量配 置和管理, 如图 3所示, 包括:
531 , 在终端上配置设备管理服务器账号, 该设备管理服务器账号中包 括服务器的标识和对所有终端均相同的服务器的认证信息;
532, 从广播通道接收使用 DM协议生成的配置消息 (用于配置参数或 管理), 该配置消息的消息头中携带服务器标识、 所使用协议版本和对所有 终端均一致的服务器身份认证信息;
533 , 判断终端是否支持该配置消息所使用协议版本, 若支持则根据所 述服务器标识和服务器身份认证信息认证该配置消息;
534, 若认证通过, 则根据配置消息中的管理对象的虚拟路径信息 (即 在终端设备管理树上的虚拟路径信息)确定基础路径(即在终端设备管理树 上的基础路径), 所确定的路径必须满足: 所携带的服务器标识对应服务器 拥有在终端设备管理树的该节点下执行该配置消息中管理命令的权限, 并在 该基础路径下执行配置消息中所携带的管理命令。
对于服务器而言, 有些配置任务或管理任务是无需区分终端的, 如连接 参数的配置, 对所有终端参数值均相同, 这些连接参数的配置可以多个终端 同时进行, 而且交互需求不强, 对于这类任务, 为了减少信道占用和服务器 负荷, 可以使用广播 /组播方式进行。
下面结合图 4所示实施例四详述基于广播方式的配置方法(组播方式类 似, 其它批量管理任务的下发类似)。
S41 , 在终端 DMT上配置用于广播通道实现管理的设备管理服务器的账 号, 该设备管理服务器负责生成用于广播通道进行配置的 DM消息 (即基于 DM协议的配置消息) 。 该账号中包括服务器的标识、 服务器的认证信息, 该认证信息对所有终端均相同, 可以使用该设备管理服务器的证书完成单向 认证(即终端认证设备管理服务器)。 该账号中还可以包括广播通道下发的 管理消息的上报地址或上报服务器标识, 用于终端上报通过广播通道接收的 DM消息的处理结果。该设备管理服务器账号的配置可以通过如下方式完成: S41a )在初始配置过程中完成, 则其账号信息携带在终端获取的初始配 置文件中, 并在配置过程中映射到终端 DMT上。
S41b )通过其它 DM服务器和终端建立 DM会话, 在该会话中向 DMT添 加该服务器的账号。
S42, 配置完成后, 所配置服务器生成用于广播的基于 DM协议的配置消 息, 该配置消息携带该服务器标识、 所使用协议版本、 该服务器身份认证信 息、 DM管理命令、 目标配置值等。 其中, 服务器标识携带在消息头的 <80111^>/<1^^&11^>元素中,该标识用于终端对该服务器进行认证, 同时还 用于终端判断该服务器对 DMT上目标管理节点的访问控制权限(即 ACL, Access Control List, 访问控制列表) ; 目标配置值可以为一个管理对象(由 一个或多个管理节点组成) , 该配置消息携带目标配置值的具体方法为: 将 该管理对象进行序列化, 为序列化的管理对象赋予一个虚拟路径. /Inbox, 该 相对路径对应终端 DMT上标识为 urn:oma:mo:oma-dm-inbox: 1.0的管理对象, 该虚拟路径指示终端根据自身的 DMT情况确定一个具有实际意义的基础路 径(即在 DMT上的基础路径), 并基于该基础路径和其 ACL对该配置值执行 所述 DM管理命令。 这里的 DM管理命令为 Add或 Replace命令。如下为一消息 实例:
<SyncML xmlns='SYNCML:SYNCMLl .2'>
<SyncHdr>
<VerDTD> 1.2</VerDTD>
<VerProto>DM/l .2</VerProto>
<TargetxLocURI>IMEI:493005100592800</LocURIx/Target>
<Source>
<LocURI>http:〃 www.syncml.org/mgmt-serveix/LocURI>
<LocName><!- 服务器标识, 用于终端识别服务器以进行认证, 同时用于判断 ACL权限 ></LocName>
</Source>
<Cred>
<Meta><Type xmlns="syncml:metinf"><!— 认证类型 ~></Type> <Format xmlns='syncml:metinf >< !~ 认证信息格式
~></Formatx/Meta>
<Data><!~ 认证信息值 ~></Data>
Figure imgf000016_0001
</SyncML>
该服务器将生成的配置消息和该消息的类型 (DM消息类型为: application/vnd.syncml.dm+xml )发送给广播业务应用实体 (BSA, BCAST Service Application ) 或广播业务分发适配模块 (BSD/A , BCAST Service Distribution/Adaptation )或广播分发网络业务分发适配模块 ( BDS SD/A, Broadcast Distribution System Service Distribution/ Adaptation ) 。
543 , BSA或 BSD/A或 BDS SD/A模块进行内容加密处理后, 将该配置消 息和其类型通过广播网络发送到广播客户端;
544, 广播客户端接收配置消息后, 对其进行内容解密处理, 之后根据 该配置消息类型确定所需转发客户端, 并将其转发给 DM客户端;
DM客户端对配置消息进行处理, 具体处理方法如下:
S44 a )判断终端是否支持该配置消息所使用协议版本,若支持则继续下 步;
S44 b )提取消息中的服务器标识和认证类型,后使用终端所配置的该服 务器标识对应账号中的该认证类型的认证信息认证该配置消息, 具体为: 终 端根据该服务器标识和该认证类型从终端 DMT上提取其对应 DM Acc管理对 象上的认证信息, 并使用该认证信息生成认证数据与该配置消息所携带的服 务器身份认证信息进行比较, 若相同则通过认证, 否则认证失败。 认证通过 后继续下步;
S44 c )终端根据配置消息中的. /Inbox获知需要终端确定一个在 DMT上 的基础路径, 则在 DMT上确定一个合适的基础路径, 该基础路径必须满足: 该 DM服务器具有在该基础路径下执行该配置消息中管理命令的权限, 判断 该 DM服务器是否拥有在该基础路径下执行该配置消息中管理命令的权限的 方法是: 根据该配置消息所携带的服务器标识、 该配置消息所携带的管理命 令以及所确定基础路径对应的 DMT管理节点的 ACL ( Access Control List, 访 问控制列表)进行确定, 若该 ACL包含该管理命令项且该项中包含该服务器 标识, 则说明具有权限。
S44 d )在该基础路径下执行该配置消息中的管理命令。
该执行过程具体为: 该配置消息中, 如果所携带的管理命令为 Add, 则 在 DMT的所确定的基础路径下增加该序列化的管理对象(用以配置新 ) , 如 果该完整路径下已有管理节点, 则判断是否是同一参数, 若是则 Add操作失 败, 若不是则对欲配管理对象根节点更名, 并在更名后在添加该管理对象。 如果所携带的管理命令为 Replace,则用配置消息所携带的序列化的管理对象 更新 DMT所确定的基础路径下已有的管理对象(对已有参数值进行更新) , 如果该基础路径下无管理节点, 则 Replace操作失败。
进行上述配置之后, 还包括激活该配置的参数的步骤。
S45 , (可选的)在执行配置消息中的管理命令后 (成功或失败) , 客 户端获取所配置服务器账号包含的上报地址或上报服务器标识, 若为上报地 址, 则生成 HTTP消息或其它对应消息发送到所述上报地址, 若为上报服务 器标识, 则终端和该服务器标识对应服务器建立 DM管理会话, 并在 DM管理 会话中上报执行结果, 所上报执行结果包括: 无权限、 版本不兼容、 执行成 功等。
在该配置过程中, 对于无需区分终端的配置需求, 可以有效的使用 DM 机制完成, 既可以保证安全性(服务器身份的认证和访问权限的控制), 还 可以满足不同设备管理树 DMT结构的管理对象定位、 配置结果上报, 使得 基于 DM的大批量参数配置得以安全高效的完成, 提高了操作的效率, 降低 了信道占用以及服务器的压力。
参照图 5 , 本发明实施例提供一种终端 500, 包括:
配置文件获取单元 510,用于获取配置文件,该获取单元包括通过 PULL 方式获取配置文件的 PULL单元, 该 PULL单元在获取配置文件时向获取服 务器发送携带终端信息的获取请求。该配置文件还可以携带有服务器帐号信 息, 该服务器帐号信息包含对应服务器所支持的会话协议版本信息;
服务器帐号确定单元 520, 用于提取所述会话协议版本信息, 基于所述 会话协议版本信息与终端所支持的协议版本确定该服务器帐号是否适合该 终端;
配置单元 530, 在确定该服务器账号适合该终端时, 将所确定的服务器 帐号信息配置到终端的设备管理树 DMT上。
处理单元 540, 基于所配置服务器帐号建立终端和所述服务器之间的管 理会话, 并在所述会话中对终端进行后续配置和管理。
会话版本确定单元 550 , 在发起管理会话时, 根据映射到设备管理树 DMT上的 DMAcc上的会话协议版本信息和终端所支持的协议版本,确定适 合终端和服务器的会话协议版本; 所述处理单元 540根据该会话协议版本发 起会话请求消息。
触发消息认证单元 560, 该触发消息认证单元可以使用预先确定的认证 类型或在触发消息中携带认证类型或认证名称或根据预定规则确定的认证 类型对触发消息进行认证, 所述认证类型或认证名称对应的认证信息包含在 所配置的账号信息中。
综上所述, 本发明实施例提供的技术方案中, 终端在进行初始配置时, 通过配置包中携带对应服务器所支持或对应的协议版本信息,可以识别该包 对应的协议版本, 使得终端可以判断该包是否适合本终端, 以进行正确的配 置。 当终端能够支持多个协议版本时, 终端通过配置包中携带对应服务器所 支持或对应的协议版本信息可以确定和服务器通信所应使用的协议, 减少了 因协议版本不同导致的通信量加大的问题。
参照图 6, 本发明实施例提供一种批量配置***, 包括:
设备管理 DM服务器,生成用于广播通道进行下发的基于 DM协议的配 置消息, 所述配置消息中携带设备管理服务器的标识和认证信息。 其和广播 业务应用实体 BSA或广播业务分发适配模块 BSD/A或广播分发网络业务分 发适配模块 BDS SD/A连接以下发该配置消息, 下发通道为广播通道;
广播客户端,接受广播通道下发的消息,根据该消息的类型识别该消息, 并转发给 DM客户端;
设备管理 DM客户端,根据配置消息中携带的服务器标识和认证类型完 成生成该配置消息的 DM服务器身份认证,根据所述设备管理服务器的标识 确定所述设备管理服务器对终端设备管理树上目标管理节点的访问控制权 限, 并基于所述访问控制权限在 DMT上确定一个合适的基础路径, 所确定 的路径必须满足: 所携带的服务器标识对应服务器拥有在该节点下执行该配 置消息中管理命令的权限, 并在该基础路径下执行配置消息中所携带的管理 命令。 通过批量的配置方法,使得可以有效的完成大批量通用管理操作的安全 下发,如参数配置,提高了操作的效率, 降低了信道占用以及服务器的负荷。
显然, 本领域的技术人员应该明白, 上述的本发明的各单元或各步骤可 以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布 在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执行的程 序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来执行, 或 者将它们分别制作成各个集成电路模块,或者将它们中的多个单元或步骤制 作成单个集成电路模块来实现。 这样, 本发明不限制于任何特定的硬件和软 件结合。 非对其限制; 尽管参照前述实施例对本发明实施例进行了详细的说明, 本领 域的普通技术人员应当理解: 其依然可以对前述各实施例所记载的技术方案 进行修改, 或者对其中部分技术特征进行等同替换; 而这些修改或者替换, 并不使相应技术方案的本质脱离本发明实施例各实施例技术方案的精神和 范围。

Claims

权 利 要 求
1、 一种终端配置和管理方法, 其特征在于, 包括:
获取配置文件, 该配置文件包含服务器帐号信息以及服务器账号对应服 务器所支持或选定的会话协议版本信息;
提取所述会话协议版本信息, 并根据所述会话协议版本信息判断所述服 务器账号是否适合所述终端;
若所述服务器账号适合所述终端, 则将所获取的配置文件中的服务器账 号信息配置到终端的设备管理树上;
基于所配置服务器帐号与所述服务器建立管理会话对终端进行管理和 后续配置。
2、 如权利要求 1所述的方法, 其特征在于, 所述获取配置文件, 具体 包括:
获取配置文件的地址;
向所述地址发送获取配置文件的请求消息, 所述请求消息中携带有下述 信息至少之一: 终端的标识、 业务订阅者信息、 订阅者身份验证码、 设备信 息、 所支持设备管理协议版本;
根据所述请求消息所携带信息选择配置文件并下发给终端。
3、 如权利要求 1所述的终端配置方法, 其特征在于, 所述对终端进行 管理和后续配置具体包括:
基于所述服务器帐号信息包括的所述会话协议版本信息建立所述终端 和所述服务器之间的管理会话, 并在所述会话中对所述终端进行管理和后续 配置。
4、 一种终端配置和管理方法, 其特征在于, 包括:
在终端的设备管理树上配置服务器的帐号信息, 所述服务器账号信息包 含一个或多个认证信息;
接收所述服务器下发的携带服务器身份认证信息和服务器标识的会话 触发消息;
使用所述服务器标识对应的所述设备管理树上的服务器账号信息所包 含的认证信息生成 MD5摘要认证所述会话触发消息; 在认证通过后,基于所述会话触发消息建立所述终端和所述服务器之间 的管理会话, 并在所述会话中对所述终端进行管理和后续配置。
5、 如权利要求 4所述的方法, 其特征在于, 所述使用所述服务器标识 对应的所述设备管理树上的服务器账号信息所包含的认证信息生成 MD5摘 要认证所述会话触发消息具体包括:
所述会话触发消息携带认证类型或认证名称或认证类型的编码,使用所 述服务器标识对应的所述设备管理树上的服务器账号信息所包含的所述认 证类型或认证名称或认证类型的编码对应的认证信息认证所述会话触发消 息; 或,
在所述设备管理树上配置的所述服务器标识所对应的服务器账号信息 中, 逐一获取认证信息认证所述会话触发消息。
6、 如权利要求 4所述的方法, 其特征在于,
所述认证信息包含认证类型、 密码和随机数。
7、 一种终端配置和管理方法, 其特征在于, 包括:
配置设备管理服务器账号,所述设备管理服务器账号中包括设备管理服 务器标识和认证信息;
接收所述设备管理服务器基于设备管理协议生成的配置消息,所述配置 消息中携带设备管理服务器标识、所使用协议版本和设备管理服务器身份认 证信息, 所述配置消息用于配置参数或管理;
根据所述设备管理服务器标识从所述设备管理服务器账号中提取所述 认证信息, 并使用所述认证信息认证所述配置消息;
若认证通过, 则根据所述设备管理服务器的标识确定所述设备管理服务 器对终端设备管理树上目标管理节点的访问控制权限, 并基于所述访问控制 权限执行所述配置消息中所携带的管理命令。
8、 如权利要求 7所述的方法, 其特征在于, 所述配置消息是通过广播 通道接收。
9、 如权利要求 7所述的方法, 其特征在于, 还包括:
根据所述配置消息携带的所使用协议版本信息判断终端是否支持所述 配置消息, 若支持, 则认证所述配置消息。
10、 如权利要求 7所述的方法, 其特征在于, 所述认证信息用于单向认 证所述服务器。
11、 一种终端, 其特征在于, 包括:
配置文件获取单元, 用于获取配置文件, 该配置文件包含服务器帐号和 对应服务器所支持的会话协议版本信息和 /或设备管理服务器的标识和认证 信息;
服务器帐号确定单元, 用于提取所述会话协议版本信息, 基于所述会话 协议版本信息与终端所支持的协议版本确定所述服务器帐号是否适合所述 终端;
配置单元, 将所述服务器账号配置到终端的设备管理树上。
12、 如权利要求 11所述的终端, 其特征在于, 还包括:
处理单元,基于所述服务器帐号及所述会话协议版本信息建立所述终端 和所述服务器之间的管理会话, 并在所述管理会话中对所述终端进行管理和 后续配置。
13、 一种终端, 其特征在于, 包括:
配置文件获取单元, 用于获取配置文件, 该配置文件包含服务器帐号和 认证信息;
配置单元, 将所述服务器账号配置到终端的设备管理树上;
触发消息认证单元,根据所述配置文件获取单元获得的设备管理服务器 的标识和认证信息,使用在触发消息中携带的认证类型或认证名称或认证类 型的标识对应的认证信息, 对接收的会话触发消息进行认证, 所述认证信息 包含在所述服务器账号中。
14、 一种终端配置和管理***, 其特征在于, 包括:
设备管理服务器, 生成基于设备管理协议的配置消息, 所述配置消息中 携带设备管理服务器的标识和认证信息;
设备管理客户端,根据所述配置消息中携带的设备管理服务器标识和认 证类型认证所述设备管理服务器, 并根据所述设备管理服务器的标识确定所 述设备管理服务器对终端设备管理树上目标管理节点的访问控制权限, 并基 于所述访问控制权限执行所述配置消息中所携带的管理命令。
15、 如权利要求 14所述***, 其特征在于, 还包括:
广播客户端, 接受广播通道下发的配置消息, 根据配置消息类型识别消 息, 并转发给设备管理客户端。
PCT/CN2009/074247 2008-09-28 2009-09-27 一种终端配置和管理方法及终端装置 WO2010034257A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
ES09815626T ES2435574T3 (es) 2008-09-28 2009-09-27 Método para configurar y gestionar terminales y dispositivo terminal
KR1020117008768A KR101243073B1 (ko) 2008-09-28 2009-09-27 단말기 구성 및 관리를 위한 방법 및 단말기 장치
EP09815626.8A EP2326047B1 (en) 2008-09-28 2009-09-27 Method and system for terminal configuration and management
US13/073,616 US20110173685A1 (en) 2008-09-28 2011-03-28 Method for terminal configuration and management and terminal device
US13/253,751 US8438616B2 (en) 2008-09-28 2011-10-05 Method for terminal configuration and management and terminal device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2008101695267A CN101686458B (zh) 2008-09-28 2008-09-28 一种终端配置和管理方法及终端装置
CN200810169526.7 2008-09-28

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/073,616 Continuation US20110173685A1 (en) 2008-09-28 2011-03-28 Method for terminal configuration and management and terminal device

Publications (1)

Publication Number Publication Date
WO2010034257A1 true WO2010034257A1 (zh) 2010-04-01

Family

ID=42049363

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/074247 WO2010034257A1 (zh) 2008-09-28 2009-09-27 一种终端配置和管理方法及终端装置

Country Status (8)

Country Link
US (2) US20110173685A1 (zh)
EP (2) EP2326047B1 (zh)
KR (1) KR101243073B1 (zh)
CN (1) CN101686458B (zh)
DK (1) DK2640005T3 (zh)
ES (1) ES2435574T3 (zh)
HU (1) HUE026413T2 (zh)
WO (1) WO2010034257A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110221869A (zh) * 2019-06-10 2019-09-10 北京百度网讯科技有限公司 用于配置数据中心运行环境的方法及装置
CN113157346A (zh) * 2021-05-17 2021-07-23 网宿科技股份有限公司 一种功能项的配置值的配置方法、装置、设备及介质

Families Citing this family (76)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007027958A1 (en) * 2005-08-29 2007-03-08 Junaid Islam ARCHITECTURE FOR MOBILE IPv6 APPLICATIONS OVER IPv4
US8244814B1 (en) * 2008-03-31 2012-08-14 Symantec Corporation Methods and systems for managing email configuration
CN101778486B (zh) * 2008-11-27 2012-09-05 华为终端有限公司 设备管理服务器、客户端及目标操作对象定位方法
FR2947644B1 (fr) * 2009-07-01 2011-11-18 Bull Sas Procede de demarrage d'un dispositif informatique dans un reseau, serveur et reseau de dispositifs informatiques pour sa mise en oeuvre
US8756661B2 (en) * 2009-08-24 2014-06-17 Ufp Identity, Inc. Dynamic user authentication for access to online services
CN102215118B (zh) * 2010-04-01 2013-08-28 华为技术有限公司 实现设备管理业务的方法、装置及***
CN101888529A (zh) * 2010-06-28 2010-11-17 中兴通讯股份有限公司 基于交互式电视的多媒体终端信息机的管理方法及***
CN101951595A (zh) * 2010-08-23 2011-01-19 中兴通讯股份有限公司 空口引导设置处理方法及***
CN102592315B (zh) * 2011-01-12 2015-04-08 赞奇科技发展有限公司 基于gpu云集群的3d渲染平台
EP2591590B1 (en) * 2011-02-28 2014-04-30 Unify GmbH & Co. KG System, apparatus and mechanism for dynamic assignment of survivability services to mobile devices
CN102231678A (zh) * 2011-06-27 2011-11-02 华为终端有限公司 设备管理的方法、装置和***
US9274812B2 (en) 2011-10-06 2016-03-01 Hand Held Products, Inc. Method of configuring mobile computing device
US8666383B1 (en) 2011-12-23 2014-03-04 Sprint Communications Company L.P. Automated branding of generic applications
JPWO2013168375A1 (ja) * 2012-05-07 2016-01-07 日本電気株式会社 セキュリティ設計装置及びセキュリティ設計方法
US10455071B2 (en) 2012-05-09 2019-10-22 Sprint Communications Company L.P. Self-identification of brand and branded firmware installation in a generic electronic device
EP2866379B1 (en) 2012-06-22 2018-11-14 LG Electronics Inc. Method and device for enabling or disabling server in wireless communication system
US9258176B2 (en) * 2012-07-06 2016-02-09 Samsung Electronics Co., Ltd Device management method, server and system and mobile equipment
KR101700197B1 (ko) 2012-08-22 2017-01-26 엘지전자 주식회사 장치 관리를 위한 노드의 주소 표현 방법 및 이를 위한 장치
US9198027B2 (en) 2012-09-18 2015-11-24 Sprint Communications Company L.P. Generic mobile devices customization framework
US9094822B2 (en) 2012-10-18 2015-07-28 Futurewei Technologies, Inc. Seamless telephone login
WO2014069898A1 (ko) 2012-10-30 2014-05-08 엘지전자 주식회사 무선 통신 시스템에서 특정 리소스에 대한 접근 권한을 인증하기 위한 방법 및 장치
KR101906449B1 (ko) * 2012-12-10 2018-10-10 삼성전자주식회사 홈 네트워크 시스템에서 홈 디바이스 및 외부 서버간의 접속 제어 방법 및 장치
US9819548B2 (en) * 2013-01-25 2017-11-14 Cisco Technology, Inc. Shared information distribution in a computer network
US9549009B1 (en) 2013-02-08 2017-01-17 Sprint Communications Company L.P. Electronic fixed brand labeling
KR101969829B1 (ko) * 2013-02-20 2019-04-17 주식회사 엘지유플러스 이동 단말기로 어플리케이션을 제공하기 위한 시스템 및 제공 방법
US9204286B1 (en) 2013-03-15 2015-12-01 Sprint Communications Company L.P. System and method of branding and labeling a mobile device
US9280483B1 (en) 2013-05-22 2016-03-08 Sprint Communications Company L.P. Rebranding a portable electronic device while maintaining user data
US9532211B1 (en) 2013-08-15 2016-12-27 Sprint Communications Company L.P. Directing server connection based on location identifier
US9161209B1 (en) 2013-08-21 2015-10-13 Sprint Communications Company L.P. Multi-step mobile device initiation with intermediate partial reset
CN104426695B (zh) * 2013-08-28 2018-09-04 北京神州泰岳软件股份有限公司 一种异构类型设备账号管理方法及***
CN104426868A (zh) * 2013-08-28 2015-03-18 腾讯科技(深圳)有限公司 请求的处理方法和处理装置
CN104581695A (zh) * 2013-10-22 2015-04-29 中兴通讯股份有限公司 移动终端配置方法和***
US10506398B2 (en) 2013-10-23 2019-12-10 Sprint Communications Company Lp. Implementation of remotely hosted branding content and customizations
US9743271B2 (en) 2013-10-23 2017-08-22 Sprint Communications Company L.P. Delivery of branding content and customizations to a mobile communication device
US9301081B1 (en) 2013-11-06 2016-03-29 Sprint Communications Company L.P. Delivery of oversized branding elements for customization
US9363622B1 (en) 2013-11-08 2016-06-07 Sprint Communications Company L.P. Separation of client identification composition from customization payload to original equipment manufacturer layer
US9392395B1 (en) 2014-01-16 2016-07-12 Sprint Communications Company L.P. Background delivery of device configuration and branding
US9420496B1 (en) 2014-01-24 2016-08-16 Sprint Communications Company L.P. Activation sequence using permission based connection to network
US9603009B1 (en) 2014-01-24 2017-03-21 Sprint Communications Company L.P. System and method of branding a device independent of device activation
US9681251B1 (en) * 2014-03-31 2017-06-13 Sprint Communications Company L.P. Customization for preloaded applications
US9836594B2 (en) 2014-05-19 2017-12-05 Bank Of America Corporation Service channel authentication token
US9426641B1 (en) 2014-06-05 2016-08-23 Sprint Communications Company L.P. Multiple carrier partition dynamic access on a mobile device
EP3163796B1 (en) * 2014-07-23 2019-04-03 Huawei Technologies Co., Ltd. Terminal upgrade method and related device
CN104134033B (zh) * 2014-07-29 2017-11-07 广州金山网络科技有限公司 一种识别用户设备的方法以及装置
CN104159205B (zh) * 2014-08-05 2018-03-30 北京奇虎科技有限公司 一种生成功能菜单的方法和一种终端
KR102422372B1 (ko) * 2014-08-29 2022-07-19 삼성전자 주식회사 생체 정보와 상황 정보를 이용한 인증 방법 및 장치
US9307400B1 (en) 2014-09-02 2016-04-05 Sprint Communications Company L.P. System and method of efficient mobile device network brand customization
CN105634773A (zh) * 2014-10-31 2016-06-01 中兴通讯股份有限公司 一种传输配置信息的方法、移动终端及设备管理服务器
US9992326B1 (en) 2014-10-31 2018-06-05 Sprint Communications Company L.P. Out of the box experience (OOBE) country choice using Wi-Fi layer transmission
CN104410644A (zh) * 2014-12-15 2015-03-11 北京国双科技有限公司 数据配置方法及装置
CN104657177A (zh) * 2015-02-12 2015-05-27 北京深思数盾科技有限公司 程序自动更新方法
US9357378B1 (en) 2015-03-04 2016-05-31 Sprint Communications Company L.P. Subscriber identity module (SIM) card initiation of custom application launcher installation on a mobile communication device
US9398462B1 (en) 2015-03-04 2016-07-19 Sprint Communications Company L.P. Network access tiered based on application launcher installation
CN105335193A (zh) * 2015-10-29 2016-02-17 杭州佳谷数控技术有限公司 一种内衣机控制***的升级实现方法
US9699406B1 (en) 2016-04-14 2017-07-04 Alexander Mackenzie & Pranger Methods and systems for multi-pane video communications
US10827149B2 (en) 2016-04-14 2020-11-03 Popio Ip Holdings, Llc Methods and systems for utilizing multi-pane video communications in connection with check depositing
US10511805B2 (en) 2016-04-14 2019-12-17 Popio Ip Holdings, Llc Methods and systems for multi-pane video communications to execute user workflows
USD845972S1 (en) 2016-04-14 2019-04-16 Popio Ip Holdings, Llc Display screen with graphical user interface
US11523087B2 (en) 2016-04-14 2022-12-06 Popio Mobile Video Cloud, Llc Methods and systems for utilizing multi-pane video communications in connection with notarizing digital documents
US10218939B2 (en) 2016-04-14 2019-02-26 Popio Ip Holdings, Llc Methods and systems for employing virtual support representatives in connection with mutli-pane video communications
US10218938B2 (en) * 2016-04-14 2019-02-26 Popio Ip Holdings, Llc Methods and systems for multi-pane video communications with photo-based signature verification
CN106059785A (zh) * 2016-05-04 2016-10-26 上海斐讯数据通信技术有限公司 一种配置无线设备方法及无线设备
US10778650B2 (en) * 2016-08-17 2020-09-15 Dell Products L.P. Systems and methods for management domain attestation service
US9913132B1 (en) 2016-09-14 2018-03-06 Sprint Communications Company L.P. System and method of mobile phone customization based on universal manifest
US10021240B1 (en) 2016-09-16 2018-07-10 Sprint Communications Company L.P. System and method of mobile phone customization based on universal manifest with feature override
JP2018063969A (ja) * 2016-10-11 2018-04-19 株式会社村田製作所 積層セラミックコンデンサ
CN106603273A (zh) * 2016-11-16 2017-04-26 北京粉笔蓝天科技有限公司 一种客户端管理方法及***
CN106936835B (zh) * 2017-03-21 2020-04-14 厦门中控智慧信息技术有限公司 设备接入的方法及***
US10306433B1 (en) 2017-05-01 2019-05-28 Sprint Communications Company L.P. Mobile phone differentiated user set-up
CN110248261B (zh) * 2018-03-09 2021-09-17 ***通信集团广东有限公司 调度处理的方法、装置和传输处理的方法
CN110505177B (zh) * 2018-05-16 2023-06-30 杭州海康威视数字技术股份有限公司 一种信息收集***、终端设备及远程主机
CN110300109B (zh) * 2019-06-28 2022-08-09 合肥高维数据技术有限公司 一种服务端对客户端的管理方法
CN111181836B (zh) * 2019-10-25 2023-03-24 腾讯科技(深圳)有限公司 一种消息推送方法及装置
CN113067848B (zh) * 2021-02-05 2023-09-26 厦门亿联网络技术股份有限公司 一种通话记录同步方法、***及电子设备
CN113518121B (zh) * 2021-06-11 2023-12-26 新华三信息技术有限公司 一种批量操作方法以及装置
US11991525B2 (en) 2021-12-02 2024-05-21 T-Mobile Usa, Inc. Wireless device access and subsidy control

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1968427A (zh) * 2005-11-18 2007-05-23 中兴通讯股份有限公司 一种把传统智能网业务运行于软交换网络的方法
US20070127663A1 (en) * 2005-11-14 2007-06-07 Samsung Electronics Co., Ltd. Method and system for providing service menu in communication system
CN101010907A (zh) * 2004-08-31 2007-08-01 松下电器产业株式会社 组播或广播服务的确定性反馈控制
CN101106570A (zh) * 2007-08-27 2008-01-16 中兴通讯股份有限公司 初始过滤规则下载和处理方法

Family Cites Families (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5404528A (en) * 1993-01-19 1995-04-04 Canon Information Systems, Inc. Scripting system
US6389464B1 (en) * 1997-06-27 2002-05-14 Cornet Technology, Inc. Device management system for managing standards-compliant and non-compliant network elements using standard management protocols and a universal site server which is configurable from remote locations via internet browser technology
US20020112047A1 (en) * 2000-12-05 2002-08-15 Rakesh Kushwaha System and method for wireless data terminal management using general packet radio service network
JP2002189801A (ja) * 2000-12-21 2002-07-05 Sony Corp サービス提供システム、管理サーバ、サービスプロバイダ、端末装置、記録媒体発行装置、サービス提供方法、記録媒体
US7082460B2 (en) * 2002-04-19 2006-07-25 Axeda Corporation Configuring a network gateway
US8447963B2 (en) * 2002-06-12 2013-05-21 Bladelogic Inc. Method and system for simplifying distributed server management
US7321929B2 (en) * 2003-08-01 2008-01-22 Network Appliance, Inc. Programmable remote device management system for locally or remotely controlling and/or configuring a communication network switch
US8694620B2 (en) * 2003-09-08 2014-04-08 Microsoft Corporation System and method for an OMA DM extension to manage mobile device configuration settings
US20050079869A1 (en) * 2003-10-13 2005-04-14 Nortel Networks Limited Mobile node authentication
US8219664B2 (en) * 2004-01-30 2012-07-10 Nokia Corporation Defining nodes in device management system
CN100349408C (zh) * 2004-02-12 2007-11-14 华为技术有限公司 实现网管***和网元设备配置数据实时同步的方法
KR101043336B1 (ko) * 2004-03-29 2011-06-22 삼성전자주식회사 디바이스와 휴대형 저장장치간의 디지털 권리객체에 관한정보의 획득 및 제거를 위한 방법 및 장치
US20060031449A1 (en) * 2004-07-01 2006-02-09 Mika Hallamaa Selection of management method
KR100641238B1 (ko) * 2004-07-09 2006-11-02 엘지전자 주식회사 장치 관리 시스템 및 그 시스템에서의 장치관리 명령스케줄링 방법
US20060143179A1 (en) * 2004-12-29 2006-06-29 Motorola, Inc. Apparatus and method for managing security policy information using a device management tree
CN100489827C (zh) * 2004-12-30 2009-05-20 诺基亚公司 利用访问控制信息使用具有多个配置的设备中的配置的方法、***和设备
EP1705872B1 (en) * 2005-03-21 2008-12-24 Hewlett-Packard Development Company, L.P. Mobile device client and system supporting remote terminal management
CN100479575C (zh) * 2005-06-30 2009-04-15 华为技术有限公司 在设备管理中实现预定操作的方法及装置
US20070049265A1 (en) * 2005-08-30 2007-03-01 Kaimal Biju R Apparatus and method for local device management
CN100361456C (zh) * 2005-10-13 2008-01-09 华为技术有限公司 终端设备的管理方法及其终端设备
US20070093243A1 (en) * 2005-10-25 2007-04-26 Vivek Kapadekar Device management system
CN100407656C (zh) * 2005-12-09 2008-07-30 华为技术有限公司 对终端设备进行管理的方法和***
KR20070108432A (ko) * 2006-01-23 2007-11-12 엘지전자 주식회사 장치관리 스케줄링 방법
EP2025095A2 (en) * 2006-06-08 2009-02-18 Hewlett-Packard Development Company, L.P. Device management in a network
TW200801513A (en) 2006-06-29 2008-01-01 Fermiscan Australia Pty Ltd Improved process
CN101114933A (zh) * 2006-07-26 2008-01-30 华为技术有限公司 对能力管理对象维护、对能力管理的方法、***及终端
CN101123785B (zh) * 2006-08-11 2013-01-23 华为技术有限公司 一种通信***中管理终端的方法和***
WO2008022195A1 (en) * 2006-08-15 2008-02-21 Hewlett-Packard Development Company, L.P. Device management system for mobile devices that supports multiple-point transport
WO2008048905A2 (en) * 2006-10-16 2008-04-24 Hewlett-Packard Development Company, L.P. Diagnostic agent in device that retrieves key performance indicators
KR20080043213A (ko) * 2006-11-13 2008-05-16 엘지전자 주식회사 장치관리 메시지를 브로드캐스트 채널로 안전하게 보내는방법, 그 서버 및 단말
US8159960B2 (en) * 2006-12-18 2012-04-17 Verizon Patent And Licensing Inc. Content processing device monitoring
CN100484037C (zh) * 2007-03-14 2009-04-29 华为技术有限公司 设备跟踪***、装置及方法
US8139509B2 (en) * 2007-08-08 2012-03-20 Innopath Software, Inc. Installation and management of mobile device [{S]} configuration
US20090077215A1 (en) * 2007-09-14 2009-03-19 Madhavi Jayanthi Using a managing device to configure and locally manage multiple managed devices
US7774821B2 (en) * 2007-09-17 2010-08-10 At&T Intellectual Property I, L.P. System and method of installing a network device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101010907A (zh) * 2004-08-31 2007-08-01 松下电器产业株式会社 组播或广播服务的确定性反馈控制
US20070127663A1 (en) * 2005-11-14 2007-06-07 Samsung Electronics Co., Ltd. Method and system for providing service menu in communication system
CN1968427A (zh) * 2005-11-18 2007-05-23 中兴通讯股份有限公司 一种把传统智能网业务运行于软交换网络的方法
CN101106570A (zh) * 2007-08-27 2008-01-16 中兴通讯股份有限公司 初始过滤规则下载和处理方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2326047A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110221869A (zh) * 2019-06-10 2019-09-10 北京百度网讯科技有限公司 用于配置数据中心运行环境的方法及装置
CN110221869B (zh) * 2019-06-10 2022-10-18 北京百度网讯科技有限公司 用于配置数据中心运行环境的方法及装置
CN113157346A (zh) * 2021-05-17 2021-07-23 网宿科技股份有限公司 一种功能项的配置值的配置方法、装置、设备及介质

Also Published As

Publication number Publication date
CN101686458A (zh) 2010-03-31
US20120030741A1 (en) 2012-02-02
CN101686458B (zh) 2013-06-12
DK2640005T3 (en) 2015-11-16
EP2640005A3 (en) 2014-01-08
HUE026413T2 (en) 2016-05-30
US20110173685A1 (en) 2011-07-14
EP2326047A4 (en) 2012-03-07
KR101243073B1 (ko) 2013-03-13
US8438616B2 (en) 2013-05-07
KR20110069105A (ko) 2011-06-22
ES2435574T3 (es) 2013-12-20
EP2640005B1 (en) 2015-08-12
EP2326047A1 (en) 2011-05-25
EP2326047B1 (en) 2013-08-21
EP2640005A2 (en) 2013-09-18

Similar Documents

Publication Publication Date Title
WO2010034257A1 (zh) 一种终端配置和管理方法及终端装置
DK2030413T3 (en) Method and system for configuring user equipment
RU2414086C2 (ru) Аутентификация приложения
JP6086987B2 (ja) ホットスポットネットワークにおける未知のデバイスに対する制限付き証明書登録
US8438391B2 (en) Credential generation management servers and method for communications devices and device management servers
WO2022068219A1 (zh) 虚拟专有拨号网络接入方法、网络侧***、***和存储介质
WO2018129754A1 (zh) 一种eUICC配置文件管理方法及相关装置
WO2007003103A1 (en) A method for sharing data and a method for recovering the backup data
US20090113522A1 (en) Method for Translating an Authentication Protocol
JP7043497B2 (ja) eSIMプロファイルを設置及び管理する方法及び装置
EP4142319A1 (en) Method and apparatus for transferring network access information between terminals in mobile communication system
WO2012130048A1 (zh) 设备管理***中对网关进行初始化的方法及装置
WO2010124571A1 (zh) 节点信息获取方法、客户端、服务器
CN116325843A (zh) 一种建立安全通信方法及装置
WO2013166909A1 (zh) Eap认证触发方法及***、接入网设备、终端设备
CN109981420B (zh) 一种智能设备配网方法和智能设备
CN115843447A (zh) 用户装备对边缘数据网络的接入的网络认证
CN112997447A (zh) 用于无线设备的基于时间戳的接入处理
WO2009097801A1 (zh) 版本协商方法及终端、服务器

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09815626

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2009815626

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20117008768

Country of ref document: KR

Kind code of ref document: A