M2M transmission control method, device and system

A technology of transmission control and corresponding relationship, applied in security devices, electrical components, wireless communication, etc., can solve the problems of weak M2M terminal, unfavorable service promotion, large data transmission volume, etc., to achieve the effect of improving security

Inactive Publication Date: 2011-04-20
CHINA MOBILE COMM GRP CO LTD
View PDF4 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] For the digital certificate or digital signature method based on the CA certification center, a public key certificate certification authority and a digital certificate attribute authority are required. Not only the processing process is complicated, but also the data transmission volume is large, which is not suitable for those with weak processing capabilities. M2M terminals; for general wireless application services, the cost of obtaining support from these institutions is relatively high, which is not conducive to the promotion of services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • M2M transmission control method, device and system
  • M2M transmission control method, device and system
  • M2M transmission control method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] figure 2 It is a flow chart of Embodiment 1 of the M2M transmission control method of the present invention, as shown in figure 2 As shown, this embodiment includes:

[0038]Step 202, the M2M terminal sends a login request including the access password, IMEI code, IMSI code and terminal serial number to the M2M platform, wherein the access password is preset in the M2M terminal or sent to the M2M terminal by the M2M platform, Login request message format:

[0039] Packet header + content body + MD5 (packet header + content body + Timestamp + IMEI + IMSI + uplink access password);

[0040] Step 204, the M2M platform receives the login request, and authenticates the M2M terminal according to the stored correspondence between the IMEI code, IMSI code, and terminal serial number,

[0041] The M2M platform also uses a security authentication algorithm based on the header and content body of the received login request message, the time stamp generated by the M2M platform...

Embodiment 2

[0051] image 3 It is a flow chart of Embodiment 2 of the M2M transmission control method of the present invention. For an M2M terminal that supports data communication encryption and enables an encryption function, it can apply for a session key from the M2M platform during its login process for data encryption after login. like image 3 As shown, this embodiment includes:

[0052] Step 302, the M2M terminal sends a login request including access password, IMEI code, IMSI code and terminal serial number to the M2M platform, and the login request also includes information related to the basic key in the M2M terminal, and information about requesting a session key,

[0053] Login request message format:

[0054] Message header + content body (including the digest value of the basic key-related information) + MD5 (message header + content body (including the digest value of the basic key-related information) + Timestamp+IMEI+IMSI+uplink access password);

[0055] Step 304, ...

Embodiment 5

[0086] Image 6 It is a flow chart of Embodiment 5 of the M2M transmission control method of the present invention. During the interaction between the M2M terminal and the M2M platform, both parties can initiate the change of the access password or basic key, such as Image 6 As shown, this embodiment includes:

[0087]Step 602, the M2M terminal sends a change request including the IMEI code, IMSI code, terminal serial number and access password to apply for the access key and / or the basic key to the M2M platform;

[0088] Step 604: After receiving the change request, the M2M platform authenticates the M2M terminal according to the change request;

[0089] Step 606, the M2M platform judges whether to send the new access key and / or basic key to the M2M terminal in plaintext or ciphertext,

[0090] Step 608, if it is sent in plain text, the M2M platform returns a request change acceptance response to the M2M terminal, requiring it to enter the SMS communication mode and wait ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a model-to-model (M2M) transmission control method, an M2M transmission control device and an M2M transmission control system. The M2M transmission control method comprises that: B1, an M2M terminal transmits a login request carrying an access password, an international mobile equipment identity (IMEI) code, an international mobile subscriber identity (IMSI) code and a terminal serial number to an M2M platform; B2, the M2M platform receives the login request and authenticates the M2M terminal according to the correspondence among the IMEI code, the IMSI code and the terminal serial number; and B3, after the authentication is accomplished successfully, the M2M platform transmits login confirmation information to the M2M terminal. When the M2M transmission control method, the M2M transmission control device and the M2M transmission control system, which are disclosed by the invention, are used, through the authentication of the IMEI code, the IMSI code and the terminal serial number, namely the bonded authentication of a machine terminal, a communication module and or an SIM card, the access safety of the M2M terminal is improved, so that the illegal use of the machine terminal or SIM card after the M2M terminal is lost and malicious damage caused by other people to background systems for production, monitoring and the like can be avoided.

Description

technical field [0001] The present invention relates to an M2M data service, in particular to an M2M transmission control method, device and system. Background technique [0002] M2M (machine-to-machine) is a networked application and service centered on machine intelligence interaction. By embedding wireless communication modules inside the machine and using wireless communication as access means, it provides customers with comprehensive information solutions to meet customers' information needs in monitoring, command and dispatch, data collection and measurement. [0003] In the field of M2M communication, the service carried by the M2M terminal is relatively simple, and its processor is generally based on a single-chip microcomputer, and the processing capability is not so powerful. In addition, the M2M terminal is usually in an unattended state, and once lost, it may cause the machine terminal or the Subscriber Identity Model (SIM) card to be illegally used for services...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/0431H04W12/71H04W12/72
Inventor 王红梅刘玮刘越肖青杨剑于蓉蓉赵立君
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products