Abstract:
Disclosed is a method for notifying an attribute of an original resource of one entity to another entity in a wireless communication system according to one embodiment of the present invention. The method may comprise the steps of: receiving an update request for an ‘announcedAttribute’ attribute comprising a list of pre-notified attributes included in the original resource, for notifying a specific attribute of the original resource, wherein each attribute in the original resource is set to one of a mandatory announced (MA) type that should be notified mandatorily, an optional announced (OA) type that is optionally notified according to the contents of the specific attribute in the original resource, and a not announced (NA) type that is not notified; determining whether the specific attribute is the OA type; and notifying the specific attribute to all notified resources of the original resource if the specific attribute is the OA type.
Abstract:
The present invention relates to a method for authorizing a specific operation of a specific resource in a wireless communication system, and comprises receiving, from a requesting M2M device, a request for a specific operation of a specific resource, the operation request including an identifier of the requesting M2M device and the identifier being associated with an M2M service subscription resource derived using a credential of the requesting M2M device; searching the M2M service subscription resource using the identifier, and determining whether the requesting M2M device is authorized for a type of the specific resource using the M2M service subscription resource.
Abstract:
A method for location based access control in a wireless communication system is disclosed. The method comprises receiving, from an originating device, a request for access to a specific resource associated with location constraints, the location constraints being related to circular description or country description, checking whether location information of the originating device is present, acquiring the location information of the originating device according to type of the location constraints when the location information of the originating device is not present, and performing access control based on the acquired location information.