Abstract:
The present invention relates to a gateway changing method performed by a machine-to-machine (M2M) gateway which communicates with at least one M2M device having a constrained capability in an M2M system that includes a first layer and a second layer, and the a device therefor, the method comprising the steps of: receiving a trigger signal for indicating a gateway change through a first layer of the M2M gateway; and transmitting, to an M2M server, a first notification for indicating the gateway change through the first layer of the M2M gateway, wherein the M2M device having the constrained capability is a device that does not have the first layer, data generated in the second layer of the M2M device having the constrained capability is managed or stored in a data structure of a tree structure by the first layer of the M2M gateway, and the data structure that includes the data is retrieved by the M2M server after the notification has been transmitted to the M2M server.
Abstract:
Provided is a method for processing a specific object instance associated with a server due to a server account deletion in a wireless communication system, according to one embodiment of the present invention, wherein the method is performed by a terminal and comprises the steps of: receiving from a first server an action command for deleting an account of a specific server; deleting the specific object instance and an access control object instance associated with same when the specific object instance is an object instance accessible only to the specific server, and deleting access authorization information of the specific server from the access control object instance associated with the specific object instance when the specific object instance is an object instance accessible by a plurality of servers including the specific server; and changing the server having the largest sum of values granted to an access authorization of each of the plurality of servers, with the exception of the specific server as the access control owner, when the specific server is the only access control owner of the access control object instance.
Abstract:
The present invention relates to a method for resolving, for device management, a uniform resource identifier (URI) indicating a particular node and an apparatus therefor, the method comprising the steps of: finding one or more MO instances in accordance with a management object identifier (MOID) and MO instance information comprised in the URI; and finding the particular node within the one or more MO instances by means of a path, comprised in the URI, from the MO instance root node to the particular node, wherein if the MO instance information comprises a management object instance identifier (MIID), then the step for finding one or more MO instances comprises finding a unique MO instance having the MOID and MIID, and, if an MO instance having the MOID and MIID does not exist or exists in multiples, then returning an error.
Abstract:
A method for changing schedule information in a wireless communication system according to an embodiment of the present invention is performed by a first M2M device and may comprise the steps of: receiving, from a second M2M device, a request for registering schedule information on a particular application; checking whether the schedule information on the particular application is included in schedule information of the first M2M device; if the schedule information on the particular application is not included in the schedule information on the first M2M device, checking whether a policy related to the schedule information of the first M2M device exists; if the policy exists, determining whether the states of the first M2M device and the second M2M device satisfy the policy; and if the states of the first M2M device and the second M2M device satisfy the policy, updating the schedule information of the first M2M device.
Abstract:
Suggested is a method for processing a request message in a wireless communication system according to one example of the present invention. The method comprises the steps of: receiving, by a fist M2M entity, a request message relating to an operation for a specific resource from a second M2M entity; determining whether or not the first M2M entity has the specific resource; and if the first M2M entity does not have the specific resource, determining whether or not an integrity code is included in the request message, and if the integrity code is included in the request message, delivering the request message to a third M2M entity, or the method may comprise the steps of: if the first M2M entity has the specific resource, determining whether or not the first M2M entity has a registration relation with the second M2M entity; and if the first M2M entity has no registration relation with the second M2M entity, performing verification on the integrity code included in the request message.
Abstract:
A method for allocating a user-specific application identifier in a wireless communication system, according to one embodiment of the present invention, is carried out by an M2M apparatus and may comprises the steps of: receiving user information from a user; transmitting, to a peer M2M device, a request message including a user-specific token and an application identifier based on the user information, to allocate the user-specific application identifier; and receiving, from the peer M2M device, a reply message including the user-specific token and the user-specific application identifier which has been allocated based on the application identifier.
Abstract:
Disclosed is a method for notifying an attribute of an original resource of one entity to another entity in a wireless communication system according to one embodiment of the present invention. The method may comprise the steps of: receiving an update request for an ‘announcedAttribute’ attribute comprising a list of pre-notified attributes included in the original resource, for notifying a specific attribute of the original resource, wherein each attribute in the original resource is set to one of a mandatory announced (MA) type that should be notified mandatorily, an optional announced (OA) type that is optionally notified according to the contents of the specific attribute in the original resource, and a not announced (NA) type that is not notified; determining whether the specific attribute is the OA type; and notifying the specific attribute to all notified resources of the original resource if the specific attribute is the OA type.
Abstract:
The present invention relates to a method for authorizing a specific operation of a specific resource in a wireless communication system, and comprises receiving, from a requesting M2M device, a request for a specific operation of a specific resource, the operation request including an identifier of the requesting M2M device and the identifier being associated with an M2M service subscription resource derived using a credential of the requesting M2M device; searching the M2M service subscription resource using the identifier, and determining whether the requesting M2M device is authorized for a type of the specific resource using the M2M service subscription resource.
Abstract:
A method for processing a request for MO data using a cache validator (CV) allocated to an MO instance according to an embodiment of the present invention, comprises the steps of: receiving uniform resource identifier (URI) information to identify the MO data of requesting certain MO data of the MO instance from a server; determining whether the URI information includes a first CV; transmitting the requested certain MO data to the server when the URI information does not include the first CV; and transmitting a second CV for the MO instance when the URI information indicates a root node of the MO instance, wherein the MO instance has a tree structure consisting of at least one node; the MO data comprises the name, value and structure of a node included in the MO instance, and the method is performed by a terminal.
Abstract:
A method for location based access control in a wireless communication system is disclosed. The method comprises receiving, from an originating device, a request for access to a specific resource associated with location constraints, the location constraints being related to circular description or country description, checking whether location information of the originating device is present, acquiring the location information of the originating device according to type of the location constraints when the location information of the originating device is not present, and performing access control based on the acquired location information.