Device trigger message processing method, bearer network element, m2m node and system
A technology for triggering messages and processing methods, which is applied in the field of communications and can solve problems such as low communication reliability and management disorder.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0136] Such as figure 1 As shown, this embodiment provides a device trigger message processing method, the method including:
[0137] Step S110: receiving the device trigger authorization request sent by the CSE and including the identity of the CSE;
[0138] Step S120: sending a device trigger authorization permission to the CSE according to the device trigger authorization request;
[0139] Step S130: receiving the device operation request instruction set and sent by the CSE including device operation attribute value pairs;
[0140] Step S140: Perform authorization verification on the CSE according to the device operation request instruction, and obtain the internal identification and routing information of the triggering device;
[0141] Step S150: Send a trigger request message to the trigger device according to the internal identifier and routing information.
[0142] In this embodiment, the executor who implements the steps S110 to S150 can be a network element of the...
Embodiment 2
[0211] Such as image 3 As shown, this embodiment provides a device trigger message processing method, the method including:
[0212] Step S210: sending a device trigger authorization request including the CSE ID;
[0213] Step S220: receiving the device trigger authorization permission fed back by the network element of the bearer network according to the authorization trigger request;
[0214] Step S230: setting device operation attribute value pairs;
[0215] Step S240: Send a device operation request instruction including the device operation attribute-value pair to a network element of the bearer network.
[0216] The method for processing a device trigger message described in this embodiment corresponds to the method for processing a device trigger message described in Embodiment 1, and is described from the perspective of operations performed by the CSE.
[0217] In a specific execution process, the CSE usually sends the device trigger authorization request after rec...
Embodiment 3
[0255] Such as Figure 4 As shown, this embodiment provides a device trigger message processing method, the method including:
[0256] Step S310: the CSE sends a device trigger authorization request to the bearer network element;
[0257] Step S320: the bearer network element receives the device trigger authorization request;
[0258] Step S330: the bearer network element sends a device trigger authorization permission to the CSE according to the device trigger authorization request;
[0259] Step S340: the CSE sets the device operation attribute value pair, and sends a device operation request instruction including the device operation attribute value pair to the network element of the bearer network;
[0260] Step S350: the bearer network element receives the device operation request instruction;
[0261] Step S360: The network element of the bearer network performs authorization verification on the CSE according to the device operation request instruction, and obtains th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


