CN107710829A - Neighbouring method, system, server and the user equipment found - Google Patents

Neighbouring method, system, server and the user equipment found Download PDF

Info

Publication number
CN107710829A
CN107710829A CN201480037614.5A CN201480037614A CN107710829A CN 107710829 A CN107710829 A CN 107710829A CN 201480037614 A CN201480037614 A CN 201480037614A CN 107710829 A CN107710829 A CN 107710829A
Authority
CN
China
Prior art keywords
user equipment
target user
server
code
request message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201480037614.5A
Other languages
Chinese (zh)
Inventor
邓强
张万强
杨艳梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN107710829A publication Critical patent/CN107710829A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Abstract

The invention discloses a kind of neighbouring method, system, server and user equipment found, method includes:Search user equipment and obtain targeted customer's application layer mark;Search user equipment and send the first request message to server, wherein the first request message identifies including targeted customer's application layer;Search the coding that user equipment the reception server returns simultaneously to be monitored, wherein it is to be searched according to target UE temporary mark after target UE temporary mark to be encoded to server by targeted customer's application layer identity map.The scheme proposed according to embodiments of the present invention, the quantity of coding can be greatly reduced during neighbouring find, save resource.

Description

Method, system, server and user equipment for proximity discovery
[ technical field ] A method for producing a semiconductor device
The present invention relates to the field of communications, and in particular, to a method, a system, a server, and a user equipment for proximity discovery.
[ background of the invention ]
Proximity Service (ProSe) mainly studies discovery and communication of a Proximity User Equipment (UE). In The third Generation partnership project (3 GPP) Release 13 (Release 13, R13), The discovery restricted (discovereddiscovery) was mainly studied, i.e., The discoverer needed The discoveree's permission to discover. The method mainly comprises three steps of broadcasting request (Announcerequest), monitoring request (Monitorrequest) and matching request (Match request). In the prior art, in the broadcast request process, a target user equipment (announcing ue) acquires an application layer user identifier (ProSe App ID) from a proximity service Function entity (ProSe Function), then requests a code corresponding to the application layer user identifier from the ProSe Function, and broadcasts at an air interface after acquiring the code. In the process of monitoring the request, the user equipment (monitor ue) sends the application layer user identifier and the target user application layer identifier, that is, the application layer user identifier to be monitored, to the ProSe Function for permission check, and receives the code corresponding to the application layer user identifier and the application layer user mask (ProSe AppMask) returned by the ProSe Function after passing, that is, monitors the code corresponding to the application layer user identifier at the air interface. In the matching request process, after the Monitor UE monitors the code matched with the application layer user mask, the ProSe Function request is sent to analyze the code, and the ProSe Function returns the application layer user identifier and related information corresponding to the code to the Monitor UE. Wherein the short-distance service function entity maintains the mapping relation between the user identification and the code of the application layer. Taking restaurant discovery as an example, a restaurant owner is AnnounceUE, broadcasts the existence of a restaurant, one application corresponds to one code, i.e. if the restaurant can provide dining and accommodation, the restaurant owner needs to broadcast the corresponding two codes. The interested user, namely MonitorUE, searches the needed application in the self-friendly relationship network to obtain the code corresponding to the application, and then analyzes the code to find the existence of the restaurant.
One typical application of the discovery restriction is "find friends", that is, only the relationships of friends can be discovered, where "friends" are generally maintained by a third-party application (App), such as QQ, MSN friends, and for the third-party application, these "friends" are valuable resources and need to be protected. However, in the prior art, during the monitoring request, the monitorer ue sends its own application layer user identifier and target user application layer identifier to the ProSe Function, which exposes network identifiers such as IMSI (International mobile subscriber identity number) to the third party App and also exposes the user identifier of the third party App to the network. Secondly, in the prior art, a plurality of apps often exist on one UE, and if one Code (Code) is allocated to each App as in the open discovery, the number of codes is huge, and air interface resources are wasted.
[ summary of the invention ]
In view of this, embodiments of the present invention provide a method, a system, a server and a user equipment for proximity discovery, which can greatly reduce the number of codes and save resources.
A first aspect provides a lookup user device, comprising: the identification acquisition module is used for acquiring the application layer identification of the target user; the system comprises a sending module, a receiving module and a sending module, wherein the sending module is used for sending a first request message to a server, and the first request message comprises a target user application layer identifier; and the receiving module is used for receiving and monitoring codes corresponding to the target user equipment returned by the server, wherein the codes are searched by the server according to the temporary identifier of the target user equipment after the server maps the application layer identifier of the target user to the temporary identifier of the target user equipment.
With reference to the first aspect, in a first possible implementation manner, the sending module is further configured to: sending a second request message to the first proximity service functional entity, wherein the second request message comprises a user signing identifier which is searched; the receiving module is further configured to: and receiving an application list which is returned by the first short-distance service functional entity and allowed to be monitored after the first short-distance service functional entity performs subscription check according to the searched user subscription identification.
With reference to the first possible implementation manner of the first aspect, in a second possible implementation manner, the second request message further includes an application list.
With reference to the first aspect, in a third possible implementation manner, the receiving module is further configured to: and the receiving server returns the effective time of the code.
With reference to the first aspect, in a fourth possible implementation manner, the sending module is further configured to: sending a fourth request message to the first proximity service functional entity, wherein the fourth request message comprises a coded network identifier, and confirming whether monitoring is allowed to be carried out in the network or not through the first proximity service functional entity according to the network identifier; the sending module is further configured to: if the user equipment is searched for permission to monitor in the network, sending a fifth request message to the server, wherein the fifth request message comprises the application layer identification and the code of the target user; the receiving module is further configured to: and receiving a target user application layer identifier returned by the server, wherein the target user application layer identifier is obtained and analyzed by the server according to the code.
A second aspect provides a target user equipment comprising: the identification acquisition module is used for acquiring a temporary identification of the target user equipment; the sending module is used for sending a third request message to the second short-distance service functional entity to perform subscription authorization, wherein the third request message comprises a target user subscription identifier; the receiving module is used for receiving codes returned by the second near field service functional entity; and the broadcasting module is used for acquiring the wireless resource for broadcasting, broadcasting the code and registering the target user application layer identifier and the target user equipment temporary identifier to the server.
With reference to the second aspect, in a first possible implementation manner, the receiving module is further configured to: and receiving the effective time of the code returned by the second near service function entity and the list of the applications allowed to use the code.
A third aspect provides a second proximity service function entity, including: the receiving module is used for receiving a target user equipment temporary identifier sent by the server, wherein the target user equipment temporary identifier is sent to the server by searching user equipment through a first request message; the processing module is used for searching a corresponding code according to the temporary identifier of the target user equipment; and the sending module is used for returning the codes to the searching user equipment through the server.
With reference to the third aspect, in a first possible implementation manner, the receiving module is further configured to: receiving a third request message sent by the user equipment, wherein the third request message comprises a user signing identifier; the processing module is further configured to: and carrying out subscription authorization according to the subscription identifier of the search user, and returning the code to the search user equipment.
With reference to the third aspect, in a second possible implementation manner, the processing module is further configured to: the validity time of the code and the list of applications allowed to use the code are returned to the seeking user device.
With reference to the third aspect, in a third possible implementation manner, the receiving module is further configured to: receiving a code sent by a server, wherein the code is monitored by a user equipment and sent to the server; the sending module is further configured to: and resolving the code into a temporary identifier of the target user equipment and returning the temporary identifier to the searching user equipment through the server.
A fourth aspect provides a server comprising: the receiving module is used for receiving a first request message sent by searching user equipment, wherein the first request message comprises a target user application layer identifier; the mapping module is used for mapping the target user application layer identifier into a target user equipment temporary identifier; and the searching module is used for searching the code corresponding to the target user equipment according to the temporary identifier of the target user equipment and returning to the searching user equipment so as to facilitate the searching user equipment to monitor.
With reference to the fourth aspect, in a first possible implementation manner, the first request message further includes a search user application layer identifier, and the mapping module is further configured to: checking whether the user application layer identification is allowed to be searched to find the target user application layer identification; if the request message is allowed, the target user application layer identification is mapped to the target user equipment temporary identification, and if the request message is not allowed, the first request message is rejected.
With reference to the fourth aspect, in a second possible implementation manner, the search module is configured to: addressing a second near field service functional entity according to the temporary identifier of the target user equipment and requesting the second near field service functional entity to search codes; the receiving module is further configured to: and receiving the codes returned by the second near field service function entity.
With reference to the fourth aspect, in a third possible implementation manner, the receiving module is further configured to: and receiving the target user application layer identification and the target user equipment temporary identification which are registered by the target user equipment.
With reference to the fourth aspect, in a fourth possible implementation manner, the server further includes a temporary identifier obtaining module, and the receiving module is further configured to: receiving a fifth request message sent by the searching user equipment, wherein the fifth request message comprises a code; the temporary identifier acquisition module is used for acquiring a temporary identifier of the target user equipment according to the code; the mapping module is further to: and mapping the temporary identifier of the target user equipment into the application layer identifier of the target user and returning to the user equipment for searching.
With reference to the fourth possible implementation manner of the fourth aspect, in a fifth possible implementation manner, the temporary identifier obtaining module is configured to: sending the code to a second proximity service functional entity to analyze the code into a temporary identifier of the target user equipment; and receiving the temporary identifier of the target user equipment returned by the second short-distance service functional entity.
With reference to the fourth possible implementation manner of the fourth aspect, in a sixth possible implementation manner, the mapping module is further configured to: checking whether the user application layer identification is allowed to be searched to find the target user application layer identification; if so, returning the target user application layer identification to the searching user equipment, and if not, rejecting the fifth request message.
A fifth aspect provides a method of proximity discovery, comprising: searching user equipment to obtain a target user application layer identifier; searching user equipment and sending a first request message to a server, wherein the first request message comprises a searching user application layer identifier and a target user application layer identifier; and searching the codes corresponding to the target user equipment returned by the server and monitored by the user equipment, wherein the codes are searched by the server according to the temporary identifier of the target user equipment after the application layer identifier of the target user is mapped to the temporary identifier of the target user equipment.
With reference to the fifth aspect, in a first possible implementation manner, before the searching for the user equipment to send the first request message to the server, the method further includes: the searching user equipment sends a second request message to the first proximity service functional entity, wherein the second request message comprises a searching user signing identifier; and the searching user equipment receives an application list which is returned by the first short-distance service functional entity and allowed to be monitored after signing check is carried out according to the signing identification of the searching user.
With reference to the first possible implementation manner of the fifth aspect, in a second possible implementation manner, the second request message further includes an application list.
With reference to the fifth aspect, in a third possible implementation manner, the searching for a code corresponding to a target user equipment returned by the user equipment receiving server further includes: and searching the effective time of the user equipment receiving the code returned by the server.
With reference to the fifth aspect, in a fourth possible implementation manner, the method further includes: searching user equipment to send a fourth request message to the first proximity service functional entity, wherein the fourth request message comprises a coded network identifier, and confirming whether monitoring is allowed to be carried out in the network or not through the first proximity service functional entity according to the network identifier; if the searching user equipment allows monitoring in the network, sending a fifth request message to the server, wherein the fifth request message comprises a target user application layer identifier and a code; and searching the target user application layer identification returned by the user equipment receiving server, wherein the target user application layer identification is obtained and analyzed by the server according to the code.
A sixth aspect provides a method of proximity discovery, comprising: the target user equipment acquires a temporary identifier of the target user equipment; the target user equipment sends a third request message to the second short-distance service functional entity to carry out subscription authorization, wherein the third request message comprises a target user subscription identifier; the target user equipment receives the code returned by the second short-distance service functional entity; and the target user equipment acquires the radio resource for broadcasting, broadcasts the code and registers the target user application layer identification and the target user equipment temporary identification to the server.
With reference to the sixth aspect, in a first possible implementation manner, the receiving, by the target user equipment, the code returned by the second proximity service function entity further includes: and the target user equipment receives the coded effective time returned by the second proximity service function entity and the application list allowing to use the codes.
A seventh aspect provides a method of proximity discovery, comprising: the second short-distance service functional entity receives a target user equipment temporary identifier sent by the server, wherein the target user equipment temporary identifier is sent to the server by searching user equipment through a first request message; the second near field service functional entity searches a corresponding code according to the temporary identifier of the target user equipment; the second near-field service function entity returns the code to the searching user equipment through the server.
With reference to the seventh aspect, in a first possible implementation manner, the method further includes: the second short-distance service functional entity receives a third request message sent by the searching user equipment, wherein the third request message comprises a searching user signing mark; and the second short-distance service functional entity performs subscription authorization according to the subscription identifier of the search user and returns a code to the search user equipment.
With reference to the seventh aspect, in a second possible implementation manner, returning the code to the search user equipment further includes: the validity time of the code and the list of applications allowed to use the code are returned to the seeking user device.
With reference to the seventh aspect, in a third possible implementation manner, the method further includes: the second near field service functional entity receives the code sent by the server, wherein the code is monitored by the searching user equipment and sent to the server; and the second short-distance service functional entity analyzes the codes into a temporary identifier of the target user equipment and returns the temporary identifier to the searching user equipment through the server.
An eighth aspect provides a method of proximity discovery, comprising: the method comprises the steps that a server receives a first request message sent by a search user device, wherein the first request message comprises a target user application layer identifier; the server maps the target user application layer identifier into a target user equipment temporary identifier; and the server searches the code corresponding to the target user equipment according to the temporary identifier of the target user equipment and returns to the search user equipment so as to facilitate the search user equipment to monitor.
With reference to the eighth aspect, in a first possible implementation manner, the first request message further includes a search user application layer identifier, and before the server maps the target user application layer identifier to the temporary identifier of the target user equipment, the method further includes: the server checks whether to allow searching the user application layer identification to find the target user application layer identification; if the request message is allowed, the server maps the target user application layer identification to the target user equipment temporary identification, and if the request message is not allowed, the server rejects the first request message.
With reference to the eighth aspect, in a second possible implementation manner, the searching, by the server, for the code corresponding to the target user equipment according to the temporary identifier of the target user equipment includes: the server addresses the second short-distance service functional entity according to the temporary identifier of the target user equipment and requests the second short-distance service functional entity to search codes; and the server receives the codes returned by the second near field service functional entity.
With reference to the eighth aspect, in a third possible implementation manner, before the server receives the first request message sent by the search user equipment, the method further includes: and the server receives the target user application layer identification and the target user equipment temporary identification which are registered by the target user equipment.
With reference to the eighth aspect, in a fourth possible implementation manner, the method further includes: the server receives a fifth request message sent by the searching user equipment, wherein the fifth request message comprises codes; the server acquires a temporary identifier of the target user equipment according to the code; and the server maps the temporary identifier of the target user equipment into the application layer identifier of the target user and returns to the search user equipment.
With reference to the fourth possible implementation manner of the eighth aspect, in a fifth possible implementation manner, the acquiring, by the server, the target ue temporary identifier according to the code includes: the server sends the codes to a second short-distance service functional entity to analyze the codes into temporary identifiers of the target user equipment; and the server receives the temporary identification of the target user equipment returned by the second short-distance service functional entity.
With reference to the fourth possible implementation manner of the eighth aspect, in a sixth possible implementation manner, before the server returns the target user application layer identifier to the search user equipment, the method further includes: the server checks whether to allow searching the user application layer identification to find the target user application layer identification; if so, the server returns the target user application layer identification to the seeking user equipment, and if not, the server rejects the fifth request message.
The method comprises the steps of obtaining a target user application layer identification by searching user equipment, sending a first request message to a server, wherein the first request message comprises the target user application layer identification, receiving a code corresponding to the target user equipment returned by the server by the searching user equipment, and monitoring, wherein the code is searched by the server according to the target user equipment temporary identification after the target user application layer identification is mapped to the target user equipment temporary identification, corresponds to the target user equipment and does not correspond to a single application any more, the number of codes can be greatly reduced, and resources are saved.
[ description of the drawings ]
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings required to be used in the description of the embodiments or the prior art will be briefly introduced below, and the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
Fig. 1 is a schematic configuration diagram of a proximity discovery system according to a first embodiment of the present invention;
FIG. 2 is a diagram illustrating a method for broadcasting a request according to a first embodiment of the present invention;
FIG. 3 is a diagram illustrating a method for snooping requests according to a first embodiment of the present invention;
FIG. 4 is a diagram illustrating a method for matching requests according to a first embodiment of the present invention;
FIG. 5 is a diagram illustrating a method for broadcasting a request according to a second embodiment of the present invention;
FIG. 6 is a diagram illustrating a method for snooping requests according to a second embodiment of the present invention;
FIG. 7 is a diagram illustrating a method for matching requests according to a second embodiment of the present invention;
fig. 8 is a schematic structural diagram of a searching user equipment according to a first embodiment of the present invention;
fig. 9 is a schematic structural diagram of a searching user equipment according to a second embodiment of the present invention;
fig. 10 is a schematic structural diagram of a target user equipment according to a first embodiment of the present invention;
fig. 11 is a schematic structural diagram of a target user equipment according to a second embodiment of the present invention;
FIG. 12 is a schematic structural diagram of a second proximity service functional entity according to the first embodiment of the present invention;
FIG. 13 is a structural diagram of a second proximity service functional entity according to a second embodiment of the present invention;
fig. 14 is a schematic structural diagram of a server according to the first embodiment of the present invention;
fig. 15 is a schematic configuration diagram of a server according to a second embodiment of the present invention;
fig. 16 is a schematic structural diagram of a server according to a third embodiment of the present invention;
fig. 17 is a flowchart illustrating a method of proximity discovery according to a first embodiment of the present invention;
fig. 18 is a flowchart illustrating a method of proximity discovery according to a second embodiment of the present invention;
fig. 19 is a flowchart illustrating a method of proximity discovery according to a third embodiment of the present invention;
fig. 20 is a flowchart illustrating a method of proximity discovery according to a fourth embodiment of the present invention.
[ detailed description ] embodiments
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic structural diagram of a proximity discovery system according to a first embodiment of the present invention. As shown in fig. 1, a system 10 for proximity discovery includes: the user device 11, the server 12 and the target user device 13 are looked up. The searching user equipment 11 obtains the application layer identification of the target user through the network. The seeking user equipment 11 sends a first request message to the server 12, wherein the first request message comprises a seeking user application layer identity and a target user application layer identity. The server 12 maps the target user application layer identifier to a target user equipment temporary identifier and searches for a code corresponding to the target user equipment 13 according to the target user equipment temporary identifier. The searching user equipment 11 receives the code returned by the server 12 and listens. The search user and the target user are in friendly relation, and the search user application layer identifier and the target user application layer identifier can be information of a mailbox, a QQ, a MSN and the like of the corresponding user. The server is an application server on the network. It can be seen that the codes in the embodiments of the present invention correspond to the target user equipment, and may correspond to a plurality of applications, which greatly reduces the number of codes and saves resources compared to the prior art in which one application corresponds to one code.
In the embodiment of the present invention, the proximity discovery system 10 further includes a first proximity service function entity 14, an HSS (home subscriber Server) 15, and a second proximity service function entity 16. The seeking user device 11 further sends a second request message to the first proximity services functional entity 15 before sending the first request message to the server 12, wherein the second request message comprises the seeking user subscription identity. The first proximity service functional entity 15 performs subscription check according to the subscription identifier of the search user and returns a list of applications allowed to perform monitoring to the search user equipment 11. After receiving the first request message sent by the search user equipment 11, the server 12 performs permission check on the search user equipment 11 according to the search user application layer identifier, and checks whether the search user application layer identifier is permitted to find the target user application layer identifier; if the request message is allowed, the target user application layer identification is mapped to the target user equipment temporary identification, and if the request message is not allowed, the first request message is rejected. When mapping the target user application layer identifier to the target user equipment temporary identifier, the server 12 addresses the second proximity service functional entity 16 according to the target user equipment temporary identifier and requests the second proximity service functional entity 16 to search for codes. The second proximity service functional entity 16 searches for the code according to the target user equipment temporary identifier sent by the server 12, and returns the code, the mask code and the valid time of the code to the server 12. The second near service function entity searches the code through the temporary identifier of the target user equipment, and the identifier of the application layer of the searched user and the identifier of the application layer of the target user cannot be obtained in the whole process, so that the exposure of friendly relation between the searched user equipment and the target user equipment is avoided, and the exposure of the identifier of the application layer of a third party user to a network is also avoided.
The target user device 13 needs to broadcast its code on the network before the seeking user device 11 seeks its code on the network through the server 12 and listens. Specifically, the target user equipment 13 acquires the target user equipment temporary identifier through the network, and registers the target user application layer identifier and the target user equipment temporary identifier in the server 12. The target user equipment 13 sends a third request message to the second proximity service function entity 16, where the third request message includes the target user subscription identity, i.e. IMSI. The second short-distance service functional entity 16 performs subscription authorization on the target user equipment 13 through the HSS15 according to the target user subscription identity. If the scenario is a non-roaming scenario, the second proximity service function entity 16 directly returns the encoding, the mask and the valid time of the encoding of the target user equipment to the target user equipment 13. If the roaming scenario is the case, the second proximity service functional entity 16 sends the target user application layer identifier to the first proximity service functional entity 15. The first proximity service functional entity 15 performs subscription authorization and returns the code and the valid time of the code to the second proximity service functional entity 16. The second proximity service function entity 16 returns the code, the mask code and the valid time of the code of the target user equipment to the target user equipment 13. The target user equipment 13 acquires the radio resource for broadcasting and broadcasts the code of the target user equipment, and registers the target user application layer identification and the target user equipment temporary identification to the server 12.
When the searching user equipment 11 listens, the searching user equipment 11 sends a fourth request message to the first proximity service function entity 15, where the fourth request message includes the network identifier of the listen code. The first proximity service functional entity 15 confirms whether the searching user equipment 11 allows listening in the network according to the network identification and returns confirmation information. If the seeking user equipment 11 allows listening in the network, the seeking user equipment 11 sends a fifth request message to the server 12, wherein the fifth request message comprises the target user application layer identification and the encoding. The server 12 obtains the temporary identifier of the target user equipment according to the code and returns to the user equipment 11. Before returning the target user application layer identity to the seeking user device 11, the server 12 checks whether the seeking user application layer identity is allowed to find the target user application layer identity; if allowed, the target user application layer identification is returned to the seeking user device 11, and if not, the fifth request message is rejected. If the relation between the code and the temporary identifier of the target ue is stored in the server 12, the code is directly parsed into the corresponding temporary identifier of the target ue. If the relationship between the code and the temporary identifier of the target user equipment is not stored in the server 12 and the roaming scenario is adopted, the server 12 sends the code to the second proximity service functional entity 16, and the second proximity service functional entity 16 resolves the code into the temporary identifier of the target user equipment and returns the temporary identifier of the target user equipment to the server 12. If the relationship between the code and the temporary identifier of the target user equipment is not stored in the server 12 and the non-roaming scenario is detected, the server 12 sends the code to the first proximity service functional entity 15, and the first proximity service functional entity 15 resolves the code into the temporary identifier of the target user equipment and returns the temporary identifier of the target user equipment to the server 12. The non-roaming scenario indicates that the search user equipment 11 and the target user equipment 13 are both non-roaming, and at this time, the first proximity service functional entity and the second proximity service functional entity are the same proximity service functional entity. The roaming scenario indicates that the search user equipment 11 or the target user equipment 13 is roaming, and at this time, the first proximity service functional entity and the second proximity service functional entity are different proximity service functional entities, the first proximity service functional entity is located in a home network of the search user equipment, and the second proximity service functional entity is located in a home network of the target user equipment.
In a more specific embodiment, the target user device 13 broadcasts its code on the network, i.e. after the network has authorized the target user device 13 and assigned the code, it is only possible for the seeking user device 11 to seek its code and listen on the network via the server 12. As shown in fig. 2, the method for the target user equipment 13 to obtain its code and perform a broadcast request on the network respectively refer to fig. 2 and fig. 3, where fig. 2 is a non-roaming scenario, that is, the searching user equipment 11 and the target user equipment 13 are both non-roaming, and at this time, the first proximity service functional entity 14 and the second proximity service functional entity 16 are implemented by the same proximity service functional entity, the method includes:
in step 101, the target user equipment 13 acquires the target user equipment temporary identifier through the network. The target UE Temporary identifier may be allocated by the second short-range service function entity 16, and the target UE Temporary identifier includes PLMN (public land Mobile Network) information, and may be allocated by an MME (Mobility management entity), such as a GUTI (global Unique Temporary UE identity), where the GUTI includes PLMN information. And the target user equipment 13 also registers the target user application layer identity and the target user equipment temporary identity to the server 12 in order to find the user equipment 11 to listen.
In step 102, the target user equipment 13 sends a third request message to the second proximity service function entity 16 to request the corresponding code of the target user equipment 13. Wherein the third request message includes the target subscriber subscription identity, i.e. IMSI. The third request message may also include a list of applications that need to use the code. The coding may be configured by the network operator for the user equipment, and the coding may be different for different user equipments.
In step 103, the HSS15 performs broadcast authorization. The second short range service functional entity 16 performs a subscription check on the target user equipment 13 through the HSS15 to determine whether the target user equipment 13 is allowed to perform broadcasting.
In step 104, the second proximity service function entity 16 returns the code, the application list, and the valid time of the target user equipment 13 to the target user equipment 13. If the second proximity service function entity 16 allows the target user equipment 13 to broadcast, the encoding of the target user equipment 13, the list of applications allowed to use the encoding, and the valid time of the encoding are returned to the target user equipment 13.
In step 105, the target user equipment 13 starts broadcasting. The target user equipment 13 acquires the radio resources broadcasted by the user and starts the broadcast.
In step 106, the target user device 13 registers the target user application layer identity and the target user device temporary identity with the server 12. The temporary identifier of the target ue may be the identifier in step 1, or may be an MSISDN (mobile subscriber International ISDN/PSTN number, mobile subscriber ISDN/PSTN identity, ISDN: integrated service Digital Network, integrated services Digital Network, PSTN: Public Switched Telephone Network). The MSISDN includes PLMN information.
Fig. 3 shows a roaming scenario, that is, finding the ue 11 or the target ue 13 as roaming includes:
in step 111, the target user equipment 13 acquires the temporary identifier of the target user equipment through the roaming PLMN. And the target user equipment 13 also registers the target user application layer identity and the target user equipment temporary identity to the server 12 in order to find the user equipment 11 to listen.
In step 112, the target user equipment 13 sends a third request message to the second proximity service function entity 16 to request the corresponding code of the target user equipment 13. The third request message includes the target subscriber subscription identity, i.e. IMSI, and may also include a list of applications that need to use the code.
In step 113, the HSS15 performs broadcast authorization. The second short range service functional entity 16 performs a subscription check on the target user equipment 13 through the HSS15 to determine whether the target user equipment 13 is allowed to perform broadcasting.
In step 114, the second proximity services functional entity 16 sends the target user application layer identification to the first proximity services functional entity 14. Specifically, the second proximity service functional entity 16 sends the IMSI to the first proximity service functional entity 14, and the first proximity service functional entity 14 performs authorization to allocate the code and the valid time of the code. The first proximity services functional entity 14 is located in the roaming PLMN of the target user equipment.
In step 115, the first proximity service functional entity 14 returns the encoding and valid time of the target user equipment 13 to the second proximity service functional entity 16.
The steps 116-118 are the same as the steps 104-106 in fig. 2, and will not be described herein.
As can be seen from fig. 2 and fig. 3, after the target user equipment 13 performs broadcast authorization, the network allocates codes corresponding to the target user equipment 13 through the second proximity service functional entity 16 or the first proximity service functional entity 14, instead of allocating codes to each application, so that the number of codes can be greatly reduced, and resources are also saved.
After the target user equipment 13 broadcasts its code on the network, the seeking user equipment 11 may request to seek the code of the target user equipment 13 for listening. As shown in particular in fig. 4 and 5. Fig. 4 is a non-roaming scenario, which includes:
in step 200, the searching user equipment 11 obtains the application layer identifier of the target user through the network. Wherein the seeking user device 11 interacts with the server 12 over the network to obtain the target user application layer identification. The target user application layer identification can be information of a target user such as a mailbox, a QQ and a MSN.
In step 201, the lookup user device 11 sends a second request message to the first proximity service function entity 14. The second request message includes a search for a subscription identifier of the user, such as the IMSI of the user equipment 11, and may also carry the requested application list.
In step 202, the HSS15 performs a listening authorization. The first proximity services functional entity 14 checks, by the HSS15 subscription, whether the seeking user equipment 11 is allowed to listen and return a response.
In step 203, the first proximity service function entity 14 returns a list of applications allowed to listen to the seeking user device 11.
In step 204, the seeking user equipment 11 sends a first request message to the server 12. Wherein the first request message comprises a look-up user application layer identification and a target user application layer identification.
In step 205 the server 12 checks whether the lookup user application layer identification is allowed to find the target user application layer identification. If allowed, the server 12 maps the target user application layer identity to a target user equipment temporary identity, and if not, the server 12 rejects the first request message.
In step 206, the server 12 sends the target user equipment temporary identification to the first proximity services functional entity 14. Specifically, the first proximity service functional entity 14 in the PLMN is searched according to the PLMN information in the temporary identifier of the target user equipment to request the corresponding code of the target user equipment 13.
In step 207, the first proximity service functional entity 14 returns the code, the mask and the validity time of the code to the server 12.
In step 208, the server 12 returns the code, mask and the validity time of the code to the seeking user device 11.
In step 209, the seeking user equipment 11 starts listening. I.e. the seeking user equipment 11 acquires radio resources and starts listening.
Wherein fig. 5 is a roaming scenario, step 210-:
in step 216, the server 12 sends the target user equipment temporary identification to the second proximity services functional entity 16. I.e. the server 12 obtains the code to the second near field service functional entity 16.
In step 217, the second proximity service function entity 16 returns the code, the mask and the validity time of the code to the server 12.
Step 218-219 is the same as step 208-209 in fig. 4, and will not be described herein. As can be seen from fig. 4 and 5, the search user equipment 11 sends the first request to the server 12, and the server 12 searches the code according to the temporary identifier of the target user equipment by using the first proximity service functional entity 14 or the second proximity service functional entity 16, and in the whole process, the first proximity service functional entity 14 or the second proximity service functional entity 16 does not obtain the identifier of the search user application layer and the identifier of the target user application layer, thereby avoiding exposure of the friendship between the search user equipment 11 and the target user equipment 13, and also avoiding exposure of the identifier of the third party user application layer to the network.
In the embodiment of the present invention, when the search user equipment 11 performs monitoring, the mapping relationship between the target user application layer identifier and the target user equipment temporary identifier may be maintained through interaction with the search user equipment 11. As shown in particular in fig. 6 and 7. Fig. 6 shows a non-roaming scenario, which includes:
in step 301, the look-up user equipment 11 sends a fourth request message to the first proximity service function entity 14. Wherein the fourth request message comprises the overheard coded network identification, i.e. the look-up user equipment 11 provides the overheard coded PLMN network identification to the first proximity services functional entity 14 in the PLMN.
In step 302, the first proximity service function entity 14 confirms whether the seeking user equipment 11 allows listening in the network. The first proximity service functional entity 14 checks whether the user equipment 11 can listen in the PLMN according to the network identifier and returns a confirmation message.
In step 303, the first proximity service function entity 14 returns an acknowledgement message to the seeking user device 11.
In step 304, the seeking user device 11 sends a fifth request message to the server 12. Wherein the fifth request message includes the target user application layer identification and the encoding.
In step 305, the server 12 sends a code to the first proximity service function entity 14 to obtain the temporary identification of the target user equipment.
In step 306, the first proximity service function entity 14 resolves the code into a target user equipment temporary identity.
In step 307, the first proximity services functional entity 14 returns the target user equipment temporary identity to the server 12.
In the embodiment of the present invention, if the relationship between the code and the target user equipment temporary identifier is stored in the server 12, the code is directly parsed into the corresponding target user equipment temporary identifier, without parsing the code into the target user equipment temporary identifier through the first proximity service functional entity 14, that is, without performing step 306 and step 307.
In step 308, the server 12 maps the target user device temporary identification to a target user application layer identification. While the server 12 also performs permission checking. If it is allowed, step 9 is performed, and if it is not allowed, the server 12 rejects the fifth request message.
In step 309, the server 12 returns the target user application layer identification to the seeking user device 11. While the server 12 also returns the encoded validity time to the seeking user device 11.
Wherein fig. 7 is a roaming scenario, and the steps 311 and 314 are the same as the steps 301 and 304 in fig. 6, and the difference from fig. 6 is:
in step 315, the server 12 sends the code to the second proximity service function entity 16 to obtain the temporary identifier of the target user equipment.
In step 316, the second proximity service function entity 16 resolves the code into a target user equipment temporary identity.
In step 317, the second proximity services functional entity 16 returns the target user equipment temporary identity to the server 12.
Steps 318 through 319 are the same as steps 308 through 309 in fig. 4, and are not described herein again.
In the embodiment of the present invention, if the relationship between the code and the target user equipment temporary identifier is stored in the server 12, the code is directly parsed into the corresponding target user equipment temporary identifier, without parsing the code into the target user equipment temporary identifier through the first proximity service functional entity 13, that is, without performing step 316 and step 317.
In the embodiment of the present invention, if the scenario is a non-roaming scenario, the first proximity service functional entity 14 and the second proximity service functional entity 16 are the same proximity service functional entity, and if the scenario is a roaming scenario, the first proximity service functional entity 14 and the second proximity service functional entity 16 are different proximity service functional entities, where the first proximity service functional entity 14 is located in a home network of the search user equipment 11, and the second proximity service functional entity 16 is located in a home network of the target user equipment 13.
In the embodiment of the present invention, the temporary target user identifier is used, which also avoids the exposure of the friendship between the user equipment 11 and the target user equipment 13, and also avoids the exposure of the third-party user application layer identifier to the network.
Fig. 8 is a schematic structural diagram of a searching user equipment according to a first embodiment of the present invention. As shown in fig. 8, the search user equipment 11 includes: an identity acquisition module 111, a sending module 112 and a receiving module 113. The identifier obtaining module 111 is configured to obtain a target user application layer identifier; the sending module 112 is configured to send a first request message to the server, where the first request message includes a target user application layer identifier; the receiving module 113 is configured to receive a code corresponding to the target user equipment returned by the server and monitor the code, where the code is searched by the server according to the temporary identifier of the target user equipment after mapping the application layer identifier of the target user to the temporary identifier of the target user equipment. Meanwhile, the receiving module 113 also receives the effective time of the server return code. The first request message further includes a search user application layer identifier, the sending module 112 is further configured to send a second request message to the first proximity service function entity before sending the first request message to the server, where the second request message includes the search user subscription identifier, and the receiving module is further configured to: and receiving an application list which is returned by the first short-distance service functional entity and allowed to be monitored after the first short-distance service functional entity performs subscription check according to the searched user subscription identification. The second request message may further include an application list, all applications in the application list use the above codes, and the codes correspond to the target user equipment, so that compared with a case where one application corresponds to one code in the prior art, the number of codes is greatly reduced, and resources are saved.
In the embodiment of the invention, after mapping the application layer identifier of the target user to the temporary identifier of the target user equipment, the server requests the second short-distance service functional entity in the roaming PLMN to search the code, and the second short-distance service functional entity returns the code, the mask code and the effective time of the code to the server. In the embodiment of the present invention, the search user equipment 11 obtains the code from the second proximity service functional entity through the server, that is, the second proximity service functional entity searches the code through the temporary identifier of the target user equipment, and the search user application layer identifier and the target user application layer identifier are not obtained in the whole process, so that the exposure of the friendly relationship between the search user equipment 11 and the target user equipment is avoided, and the exposure of the third party user application layer identifier to the network is also avoided.
In the embodiment of the present invention, if the scenario is a non-roaming scenario, the first proximity service functional entity and the second proximity service functional entity are the same proximity service functional entity, and if the scenario is a roaming scenario, the first proximity service functional entity and the second proximity service functional entity are different proximity service functional entities, where the first proximity service functional entity is located in a home network of the search user equipment 11, and the second proximity service functional entity is located in a home network of the target user equipment.
In the embodiment of the present invention, when searching for the user equipment 11 to monitor, the mapping relationship between the target user application layer identifier and the target user equipment temporary identifier may be maintained through interaction with the server. Specifically, the sending module 112 sends a fourth request message to the first proximity service functional entity, where the fourth request message includes the encoded network identifier, and the first proximity service functional entity determines, according to the network identifier, whether the user equipment 11 is allowed to monitor in the network; and if the searching user equipment allows monitoring in the network, sending a fifth request message to the server, wherein the fifth request message comprises the application layer identification and the code of the target user. The receiving module 113 is further configured to: and receiving a target user application layer identifier returned by the server, wherein the target user application layer identifier is obtained and analyzed by the server according to the code. In the embodiment of the invention, if the relation between the code and the temporary identifier of the target user equipment is stored in the server, the code is directly analyzed into the corresponding temporary identifier of the target user equipment. And if the relation between the codes and the temporary identification of the target user equipment is not stored in the server, the server sends the codes to the second short-distance service functional entity, and the second short-distance service functional entity analyzes the codes into the temporary identification of the target user equipment and returns the temporary identification of the target user equipment to the server.
Fig. 9 is a schematic structural diagram of a searching user equipment according to a second embodiment of the present invention. As shown in fig. 9, the search user equipment 21 includes: a receiver 211, a processor 212, a transmitter 213, a memory 214, and a data bus 215. The receiver 211, the processor 212, the transmitter 213, and the memory 214 are connected via a data bus 215 to communicate with each other.
In an embodiment of the present invention, the processor 212 obtains the application layer identifier of the target user through a network. The transmitter 213 sends a first request message to the server, wherein the first request message comprises the look-up user application layer identity and the target user application layer identity. The receiver 211 receives and monitors a code corresponding to the target ue returned by the server, where the code is searched by the server according to the temporary identifier of the target ue after mapping the application layer identifier of the target ue to the temporary identifier of the target ue. Meanwhile, the receiver 211 also receives the effective time for the server to return the code. The memory 214 is used for storing the lookup user application layer identification, the target user application layer identification, and the code. The transmitter 213, before transmitting the first request message to the server, is further configured to transmit a second request message to the first proximity service functional entity, where the second request message includes a search user subscription identity; the receiving module is further configured to: and receiving an application list which is returned by the first short-distance service functional entity and allowed to be monitored after the first short-distance service functional entity performs subscription check according to the searched user subscription identification. The second request message may further include an application list, all applications in the application list use the above codes, and the codes correspond to the target user equipment, so that compared with a case where one application corresponds to one code in the prior art, the number of codes is greatly reduced, and resources are saved.
In the embodiment of the invention, after mapping the application layer identifier of the target user to the temporary identifier of the target user equipment, the server requests the second short-distance service functional entity in the roaming PLMN to search the code, and the second short-distance service functional entity returns the code, the mask code and the effective time of the code to the server. In the embodiment of the present invention, the search user equipment 21 obtains the code from the second proximity service functional entity through the server, that is, the second proximity service functional entity searches the code through the temporary identifier of the target user equipment, and the search user application layer identifier and the target user application layer identifier are not obtained in the whole process, so that the exposure of the friendly relationship between the search user equipment 21 and the target user equipment is avoided, and the exposure of the third party user application layer identifier to the network is also avoided.
In the embodiment of the present invention, if the scenario is a non-roaming scenario, the first proximity service functional entity and the second proximity service functional entity are the same proximity service functional entity, and if the scenario is a roaming scenario, the first proximity service functional entity and the second proximity service functional entity are different proximity service functional entities, where the first proximity service functional entity is located in a home network of the search user equipment 21, and the second proximity service functional entity is located in a home network of the target user equipment.
In the embodiment of the present invention, when searching for the user equipment 21 to monitor, the mapping relationship between the target user application layer identifier and the target user equipment temporary identifier may be maintained through interaction with the server. Specifically, the transmitter 213 transmits a fourth request message to the first proximity service functional entity, where the fourth request message includes the encoded network identifier, and the first proximity service functional entity determines whether the search user equipment 21 is allowed to perform monitoring in the network according to the network identifier; if the user equipment is searched for permission to monitor in the network, sending a fifth request message to the server, wherein the fifth request message comprises the application layer identification and the code of the target user; the receiver 211 is also configured to: and receiving a target user application layer identifier returned by the server, wherein the target user application layer identifier is obtained and analyzed by the server according to the code. In the embodiment of the invention, if the relation between the code and the temporary identifier of the target user equipment is stored in the server, the code is directly analyzed into the corresponding temporary identifier of the target user equipment. And if the relation between the codes and the temporary identification of the target user equipment is not stored in the server, the server sends the codes to the second short-distance service functional entity, and the second short-distance service functional entity analyzes the codes into the temporary identification of the target user equipment and returns the temporary identification of the target user equipment to the server.
Fig. 10 is a schematic structural diagram of a target user equipment according to a first embodiment of the present invention. As shown in fig. 10, the target user equipment 13 includes: an identity acquisition module 131, a transmission module 132, a reception module 133, and a broadcast module 134. The identifier obtaining module 131 is configured to obtain a temporary identifier of a target user equipment. The sending module 132 is configured to send a third request message to the second proximity service functional entity for subscription authorization, where the third request message includes a target user subscription identifier, such as an IMSI. The receiving module 133 is configured to receive the code corresponding to the target user equipment returned by the second proximity service function entity. The broadcast module 134 is configured to acquire a radio resource for broadcasting and broadcast a code, and register the target user application layer identifier and the target user equipment temporary identifier with the server. The receiving module 133 also simultaneously receives the valid time of the code returned by the second proximity service function entity and the list of applications allowed to use the code. In the embodiment of the present invention, the target user equipment 13 may have a plurality of applications, and the codes correspond to the target user equipment 13, which greatly reduces the number of codes and saves resources compared with the prior art in which one application corresponds to one code.
In the embodiment of the present invention, the target ue 13 needs to broadcast its code on the network, that is, after the network authorizes the target ue 13 and allocates the code, the searching ue may search its code on the network through the server and perform monitoring. Similarly, the searching user equipment broadcasts the code on the network, that is, after the network authorizes the searching user equipment and distributes the code, other user equipment can also search the code on the network through the server and monitor. The target user device and the seeking user device are thus integrated into one user device.
Fig. 11 is a schematic structural diagram of a target user equipment according to a second embodiment of the present invention. As shown in fig. 11, the target user equipment 23 includes: a receiver 231, a processor 232, a transmitter 233, a memory 234, and a data bus 235. The receiver 231, processor 232, transmitter 233, and memory 234 are coupled for communication with each other via a data bus 235.
In this embodiment of the present invention, the processor 232 obtains the temporary identifier of the target ue. The transmitter 233 transmits a third request message to the second proximity service function entity for subscription authorization, where the third request message includes a target subscriber subscription identity, such as an IMSI. The receiver 231 receives the code corresponding to the target user equipment returned by the second proximity service function entity. The processor 232 acquires radio resources for broadcasting and broadcasts codes, and registers the target user application layer identification and the target user equipment temporary identification to the server. The receiver 233 also simultaneously receives the coded valid time returned by the second proximity service function entity and the list of applications allowed to use the code. The memory 234 is used for storing a target user subscription identification, a code corresponding to a target user device, a valid time of the code, and a list of applications allowed to use the code. In the embodiment of the present invention, the target user equipment 23 may have a plurality of applications, and the codes correspond to the target user equipment 23, which greatly reduces the number of codes and saves resources compared with the prior art in which one application corresponds to one code.
In the embodiment of the present invention, the target ue 23 needs to broadcast its code on the network, that is, after the network authorizes the target ue 23 and allocates the code, the searching ue may search its code on the network through the server and perform monitoring. Similarly, the searching user equipment broadcasts the code on the network, that is, after the network authorizes the searching user equipment and distributes the code, other user equipment can also search the code on the network through the server and monitor. The target user device and the seeking user device are thus integrated into one user device.
Fig. 12 is a schematic structural diagram of a second proximity service functional entity according to the first embodiment of the present invention. As shown in fig. 12, the second proximity service functional entity 16 includes: a receiving module 161, a processing module 162, and a transmitting module 163. The receiving module 161 is configured to receive a target user equipment temporary identifier sent by a server, where the target user equipment temporary identifier is sent to the server by a first request message for a user equipment to be searched. The processing module 162 is configured to search for a corresponding code according to the temporary identifier of the target ue. The sending module 163 is used to return the code to the seeking user equipment through the server for listening. In the above process, the second proximity service functional entity 16 searches for the code through the temporary identifier of the target user equipment, and the identifier of the application layer of the search user and the identifier of the application layer of the target user are not always obtained, so that exposure of the friendly relationship between the search user equipment and the target user equipment is avoided, and exposure of the identifier of the application layer of the third party user to the network is also avoided. And the code is corresponding to the target user equipment and can correspond to a plurality of applications, and compared with the prior art that one application corresponds to one code, the code quantity is greatly reduced, and the resource is saved.
In this embodiment of the present invention, if the scenario is a non-roaming scenario, that is, the seeking user equipment and the target user equipment are both non-roaming, before the receiving module 161 receives the temporary identifier of the target user equipment sent by the server, the receiving module 161 further receives a second request message sent by the seeking user equipment, where the second request message includes a seeking user subscription identifier. The second request message may also include a list of applications. The processing module 162 returns an application list allowing monitoring to be performed to the searching user equipment after performing subscription check according to the searching user subscription identifier. And if the user equipment is in a roaming scene, namely the searching user equipment or the target user equipment is in roaming, the first proximity service functional entity receives a second request message sent by the searching user equipment. And the first proximity service functional entity returns an application list allowing monitoring to be carried out to the searching user equipment after carrying out subscription check according to the signing identification of the searching user.
In the embodiment of the present invention, the target ue needs to broadcast its code on the network, that is, after the network authorizes the target ue and allocates the code, the searching ue may search its code on the network through the server and perform monitoring. And in the process that the target user equipment encodes it for broadcasting on the network, the receiving module 161 is further configured to: and receiving a third request message sent by the user equipment, wherein the third request message comprises the subscription identifier of the user, such as IMSI. The processing module 162 is further configured to: and carrying out subscription authorization according to the subscription identifier of the search user, and returning the code to the search user equipment. The processing module 162 returns the code to the seeking user device along with the validity time of the code and the list of applications allowed to use the code. Specifically, the processing module 162 performs subscription check on the searching user equipment through the HSS, determines whether to allow the target user equipment to perform broadcasting, and returns the code, the valid time of the code, and the application list allowing use of the code to the searching user equipment after obtaining the broadcasting authorization. If the roaming scenario is the roaming scenario, the processing module 162 sends the target user application layer identifier, i.e. IMSI, to the first proximity service functional entity after performing subscription authorization according to the search user subscription identifier, receives the code of the target user equipment and the valid time of the code returned by the first proximity service functional entity, and then returns the code, the valid time of the code, and the application list allowing the code to be used to the search user equipment.
In the embodiment of the invention, when the user equipment is searched for monitoring, the mapping relation between the application layer identifier of the target user and the temporary identifier of the target user equipment can be maintained through interaction with the server. In this process, the receiving module 161 is further configured to: and receiving the code sent by the server, wherein the code is monitored by the user equipment and sent to the server. The sending module 163 is further configured to: and resolving the code into a temporary identifier of the target user equipment and returning the temporary identifier to the searching user equipment through the server. If the scenario is a non-roaming scenario, before the receiving module 161 receives the code sent by the server, the receiving module 161 further receives a fourth request message sent by the searching user equipment to confirm whether the searching user equipment allows monitoring in the network, where the fourth request message includes a network identifier of the monitored code; the processing module 162 returns confirmation information to the user equipment after confirmation. And if the roaming scene is the roaming scene, the first proximity service functional entity receives a fourth request message sent by the searching user equipment to confirm whether the searching user equipment is allowed to monitor in the network, and returns confirmation information to the searching user equipment after the first proximity service functional entity confirms. At this time, the first proximity service functional entity is located in the home network of the search user equipment, and the second proximity service functional entity is located in the home network of the target user equipment.
Fig. 13 is a schematic structural diagram of a second proximity service functional entity according to a second embodiment of the present invention. The second proximity service function entity 26 includes: a receiver 261, a processor 262, a transmitter 263, a memory 264, and a data bus 265. The receiver 261, processor 262, transmitter 263, memory 264 are connected by a data bus 265 for communication with each other.
In this embodiment of the present invention, the receiver 261 receives a target ue temporary identifier sent by the server, where the target ue temporary identifier is sent to the server by the search ue through the first request message. The processor 262 looks up the corresponding code according to the temporary identification of the target user equipment. The sender 263 returns the code through the server to the seeking user device to listen. In the above process, the second proximity service functional entity 26 searches for the code through the temporary identifier of the target user equipment, and the identifier of the application layer of the search user and the identifier of the application layer of the target user are not always obtained, so that the exposure of the friendly relationship between the search user equipment and the target user equipment is avoided, and the exposure of the identifier of the application layer of the third party user to the network is also avoided. And the code is corresponding to the target user equipment and can correspond to a plurality of applications, and compared with the prior art that one application corresponds to one code, the code quantity is greatly reduced, and the resource is saved.
In this embodiment of the present invention, if the scenario is a non-roaming scenario, that is, the seeking user equipment and the target user equipment are both non-roaming, before the receiver 261 receives the temporary identifier of the target user equipment sent by the server, the receiving order 261 further receives a second request message sent by the seeking user equipment, where the second request message includes a seeking user subscription identifier. The second request message may also include a list of applications. The processor 262 returns a list of applications allowed to listen to the seeking user equipment after performing a subscription check according to the seeking user subscription identity. And if the user equipment is in a roaming scene, namely the searching user equipment or the target user equipment is in roaming, the first proximity service functional entity also receives a second request message sent by the searching user equipment, wherein the second request message comprises a searching user subscription identifier. The second request message may also include a list of applications. And the first proximity service functional entity returns an application list allowing monitoring to be carried out to the searching user equipment after carrying out subscription check according to the signing identification of the searching user.
In the embodiment of the present invention, the target ue needs to broadcast its code on the network, that is, after the network authorizes the target ue and allocates the code, the searching ue may search its code on the network through the server and perform monitoring. While the target ue broadcasts its code on the network, the receiver 261 receives a third request message sent by the seeking ue, where the third request message includes the seeking subscriber subscription identity, such as IMSI. The processor 262 performs subscription authorization according to the user subscription identifier and returns a code to the user device. The processor 262 returns the code to the seeking user device along with the validity time of the code and the list of applications allowed to use the code. Specifically, the processor 62 performs subscription check on the seeking user equipment through the HSS, determines whether the target user equipment is allowed to perform broadcasting, and returns the code, the valid time of the code, and the application list allowing use of the code to the seeking user equipment after obtaining the broadcasting authorization. If the roaming scenario is the case, after performing subscription authorization according to the search user subscription identifier, the processor 262 sends the target user application layer identifier, that is, the IMSI, to the first proximity service functional entity, receives the code of the target user equipment and the valid time of the code, which are returned by the first proximity service functional entity, and then returns the code, the valid time of the code, and the application list allowing use of the code to the search user equipment.
In the embodiment of the invention, when the user equipment is searched for monitoring, the mapping relation between the application layer identifier of the target user and the temporary identifier of the target user equipment can be maintained through interaction with the server. In this process, the receiver 261 receives the code sent by the server, wherein the code is listened to by the seeking user equipment and sent to the server. The sender 263 resolves the code into a target user device temporary identity and returns to the seeking user device through the server. If the scenario is a non-roaming scenario, before the receiver 261 receives the code sent by the server, the receiver 261 further receives a fourth request message sent by the ue to confirm whether the ue is allowed to listen in the network, where the fourth request message includes a network identifier of the monitored code; the processor 262 returns an acknowledgement to the seeking user device after the acknowledgement. If the scene is a non-roaming scene, the searching user equipment sends a fourth request message to the first proximity service function entity to confirm whether the searching user equipment is allowed to monitor in the network, and the first proximity service function entity returns confirmation information to the searching user equipment after confirming.
In the embodiment of the invention, if the roaming scenario is adopted, the first proximity service functional entity is located in the home network of the search user equipment, and the second proximity service functional entity is located in the home network of the target user equipment.
Fig. 14 is a schematic structural diagram of a server according to the first embodiment of the present invention. As shown in fig. 14, the server 12 includes: a receiving module 121, a mapping module 122, and a lookup module 123. A receiving module 121, configured to receive a first request message sent by a search user equipment, where the first request message includes a target user application layer identifier; the mapping module 122 is configured to map the target user application layer identifier to a target user equipment temporary identifier; the searching module 123 is configured to search for the code corresponding to the target ue according to the temporary identifier of the target ue, and return to the searching ue so as to facilitate the searching ue to monitor.
In this embodiment of the present invention, the first request message further includes a search user application layer identifier, and before the receiving module 121 receives the first request message sent by the search user equipment, the search user equipment obtains the target user application layer identifier through the network, and performs monitoring authorization through the first proximity service functional entity to obtain an application list that is allowed to be monitored. The applications in the application list all use the above codes, i.e. the codes correspond to the target user equipment, which greatly reduces the number of codes and saves resources compared with the prior art in which one application corresponds to one code. When mapping the target user application layer identifier to the target user equipment temporary identifier, the mapping module 122 checks whether to allow the user application layer identifier to be searched to find the target user application layer identifier; if the request message is allowed, the target user application layer identification is mapped to the target user equipment temporary identification, and if the request message is not allowed, the first request message is rejected.
In an embodiment of the present invention, the searching module 123 is configured to: and addressing the second short-distance service functional entity according to the temporary identifier of the target user equipment and requesting the second short-distance service functional entity to search for codes. The receiving module 121 is further configured to: and receiving the codes returned by the second near field service function entity. The second proximity service functional entity searches for the code according to the temporary identifier of the target user equipment sent by the server 12, and returns the code, the mask code and the valid time of the code to the server 12. The lookup module 123, before returning the target user application layer identification to the lookup user device, is further configured to: checking whether the user application layer identification is allowed to be searched to find the target user application layer identification; if so, returning the target user application layer identification to the searching user equipment, and if not, rejecting the fifth request message. It can be seen that in the embodiment of the present invention, the second proximity service functional entity searches for the code through the temporary identifier of the target user equipment, and the search user application layer identifier and the target user application layer identifier are not obtained in the whole process, so that exposure of friendly relationship between the search user equipment and the target user equipment is avoided, and exposure of the third party user application layer identifier to the network is also avoided.
In the embodiment of the present invention, the target ue needs to broadcast its code on the network, that is, after the network authorizes the target ue and allocates the code, the searching ue may search its code on the network through the server 12 and monitor it. Before the receiving module 121 receives the first request message sent by the seeking user equipment, the target user equipment needs to complete acquiring its code on the network and perform broadcasting. The method specifically comprises the following steps: the target user equipment acquires a temporary identifier of the target user equipment through a network; the target user equipment sends a third request message to the second short-distance service functional entity for signing authorization and receives a returned code of the target user equipment, wherein the third request message comprises a signing identifier of the target user, namely IMSI; the target user equipment acquires radio resources for broadcasting and broadcasts the code of the target user equipment, and registers the target user application layer identifier and the target user equipment temporary identifier to the server 12. If the roaming scenario is the roaming scenario, the step of sending, by the target user equipment, a third request message to the second proximity service functional entity for subscription check, and receiving a returned code includes: the target user equipment sends a third request message to the second short-distance service functional entity; the second short-distance service functional entity sends the target user application layer identification to the first short-distance service functional entity for signing authorization and returning a code; and the target user equipment receives the codes returned by the second short-distance service functional entity through the first short-distance service functional entity. The receiving module 121 receives the target user application layer identifier and the target user device temporary identifier registered by the target user device.
In the embodiment of the present invention, if the scenario is a non-roaming scenario, that is, the search user equipment and the target user equipment are both non-roaming, the first proximity service functional entity and the second proximity service functional entity are the same proximity service functional entity, and if the scenario is a roaming scenario, that is, the search user equipment or the target user equipment is roaming, the first proximity service functional entity and the second proximity service functional entity are different proximity service functional entities, where the first proximity service functional entity is located in a home network of the search user equipment, and the second proximity service functional entity is located in a home network of the target user equipment.
In the embodiment of the invention, when the search user equipment monitors, the mapping relation between the target user application layer identifier and the target user equipment temporary identifier can be maintained through interaction with the search user equipment. Therefore, as shown in fig. 15, the server 12 further includes a temporary identity obtaining module 124. Specifically, the receiving module 121 receives a fifth request message sent by the search user equipment, where the fifth request message includes a search user application layer identifier and a code; the temporary identifier obtaining module 124 is configured to obtain a temporary identifier of the target user equipment according to the code; the mapping module 122 is further configured to: and mapping the temporary identifier of the target user equipment into the application layer identifier of the target user and returning to the user equipment for searching. Before the receiving module 121 receives the fifth request message sent by the searching user equipment, the first proximity service functional entity performs matching authorization on the searching user equipment, and confirms that the searching user equipment is allowed to listen in the network. In the embodiment of the present invention, if the relationship between the code and the target ue temporary identifier is stored in the server 12, the code is directly analyzed to be the corresponding target ue temporary identifier. If the relationship between the code and the temporary identifier of the target user equipment is not stored in the server 12 and the roaming scenario is adopted, the temporary identifier obtaining module 124 sends the code to the second proximity service functional entity to analyze the code into the temporary identifier of the target user equipment; and receiving the temporary identifier of the target user equipment returned by the second short-distance service functional entity. If the relationship between the code and the temporary identifier of the target user equipment is not stored in the server 12 and the non-roaming scenario is detected, the temporary identifier obtaining module 124 sends the code to the first proximity service functional entity to analyze the code into the temporary identifier of the target user equipment; and receiving the temporary identifier of the target user equipment returned by the first proximity service functional entity. Before returning the target user application layer identifier to the search user equipment, the mapping module also checks whether the search user application layer identifier is allowed to find the target user application layer identifier; if so, returning the target user application layer identification to the searching user equipment, and if not, rejecting the fifth request message.
Fig. 16 is a schematic structural diagram of a server according to a third embodiment of the present invention. As shown in fig. 16, the server 22 includes: receiver 221, processor 222, transmitter 223, memory 224, and data bus 225. The receiver 221, processor 222, transmitter 223, memory 224 are connected for communication with each other by a data bus 225.
In the embodiment of the present invention, the receiver 221 receives a first request message sent by the lookup user equipment, where the first request message includes the application layer identifier of the target user. The processor 222 maps the target user application layer identifier to a target user equipment temporary identifier; and searching for the code corresponding to the target user equipment according to the temporary identifier of the target user equipment and returning to the search user equipment so as to facilitate the search user equipment to monitor. The first request message further includes a search user application layer identifier, and before the receiver 221 receives the first request message sent by the search user device, the search user device obtains the target user application layer identifier through the network, and obtains an application list allowed to be monitored through the monitoring authorization by the first proximity service functional entity. The applications in the application list all use the above codes, i.e. the codes correspond to the target user equipment, which greatly reduces the number of codes and saves resources compared with the prior art in which one application corresponds to one code. The processor 222, when mapping the target user application layer identifier to the target user equipment temporary identifier, checks whether to allow the user application layer identifier to be searched to find the target user application layer identifier; if the request message is allowed, the target user application layer identification is mapped to the target user equipment temporary identification, and if the request message is not allowed, the first request message is rejected.
In this embodiment of the present invention, the processor 222 further addresses the second proximity service functional entity according to the temporary identifier of the target user equipment and requests the second proximity service functional entity to search for the code. The receiver 221 receives the code returned by the second near field service function entity. The second proximity service functional entity searches for the code according to the temporary identifier of the target user equipment sent by the server 22, and returns the code, the mask code and the valid time of the code to the server 22. The processor 222, before returning the target user application layer identification to the seeking user device, is further configured to: checking whether the user application layer identification is allowed to be searched to find the target user application layer identification; if so, returning the target user application layer identification to the searching user equipment, and if not, rejecting the fifth request message. It can be seen that in the embodiment of the present invention, the second proximity service functional entity searches for the code through the temporary identifier of the target user equipment, and the search user application layer identifier and the target user application layer identifier are not obtained in the whole process, so that exposure of friendly relationship between the search user equipment and the target user equipment is avoided, and exposure of the third party user application layer identifier to the network is also avoided.
In the embodiment of the present invention, the target ue needs to broadcast its code on the network, that is, after the network authorizes the target ue and allocates the code, the searching ue may search its code on the network through the server 22 and perform monitoring. Before the receiver 221 receives the first request message sent by the seeking user equipment, the target user equipment needs to complete acquiring its code on the network and broadcast it. The method specifically comprises the following steps: the target user equipment acquires the temporary identifier of the target user equipment through the network, and registers the application layer identifier of the target user and the temporary identifier of the target user equipment to the server 22; the target user equipment sends a third request message to the second short-distance service functional entity for signing authorization and receives a returned code of the target user equipment, wherein the third request message comprises a signing identifier of the target user, namely IMSI; the target user equipment acquires radio resources for broadcasting and broadcasts the code of the target user equipment. If the roaming scenario is the roaming scenario, the step of sending, by the target user equipment, a third request message to the second proximity service functional entity for subscription check, and receiving a returned code includes: the target user equipment sends a third request message to the second short-distance service functional entity; the second short-distance service functional entity sends the target user application layer identification to the first short-distance service functional entity for signing authorization and returning a code; and the target user equipment receives the codes returned by the second short-distance service functional entity through the first short-distance service functional entity. The receiver 221 receives the target user application layer identity and the target user equipment temporary identity registered by the target user equipment.
In the embodiment of the present invention, if the scenario is a non-roaming scenario, that is, the search user equipment and the target user equipment are both non-roaming, the first proximity service functional entity and the second proximity service functional entity are the same proximity service functional entity, and if the scenario is a roaming scenario, that is, the search user equipment or the target user equipment is roaming, the first proximity service functional entity and the second proximity service functional entity are different proximity service functional entities, where the first proximity service functional entity is located in a home network of the search user equipment, and the second proximity service functional entity is located in a home network of the target user equipment.
In the embodiment of the invention, when the search user equipment monitors, the mapping relation between the target user application layer identifier and the target user equipment temporary identifier can be maintained through interaction with the search user equipment. In particular, the receiver 221 receives a fifth request message sent by the seeking user equipment, wherein the fifth request message comprises seeking user application layer identification and encoding. The processor 222 obtains the temporary identifier of the target ue according to the code; and mapping the temporary identifier of the target user equipment into the application layer identifier of the target user and returning to the search user equipment. Before the receiver 221 receives the fifth request message sent by the searching user equipment, the first proximity service functional entity performs matching authorization on the searching user equipment, and confirms that the searching user equipment is allowed to listen in the network. In the embodiment of the present invention, if the relationship between the code and the target ue temporary identifier is stored in the server 22, the code is directly parsed into the corresponding target ue temporary identifier. If the relationship between the code and the temporary identifier of the target user equipment is not stored in the server 12 and the roaming scenario is adopted, the processor 222 sends the code to the second proximity service functional entity to resolve the code into the temporary identifier of the target user equipment; and receiving the temporary identifier of the target user equipment returned by the second short-distance service functional entity. If the relationship between the code and the temporary identifier of the target user equipment is not stored in the server 12 and the non-roaming scenario is detected, the processor 222 sends the code to the first proximity service functional entity to resolve the code into the temporary identifier of the target user equipment; and receiving the temporary identifier of the target user equipment returned by the first proximity service functional entity. The processor 222 further checks whether the target user application layer id is allowed to be found before returning the target user application layer id to the seeking user device; if so, returning the target user application layer identification to the searching user equipment, and if not, rejecting the fifth request message.
Fig. 17 is a flowchart illustrating a method of proximity discovery according to the first embodiment. As shown in fig. 17, the method of proximity discovery includes:
s10: and searching the application layer identification of the target user obtained by the user equipment.
Specifically, the search user equipment interacts with the server through the network to obtain the application layer identifier of the target user.
S11: and the searching user equipment sends a first request message to the server, wherein the first request message is the target user application layer identification.
The first request message further comprises a search user application layer identifier, before the search user equipment sends the first request message to the server, monitoring authorization check is required to be carried out, and the search user equipment can send the first request message to the server only under the condition that monitoring is allowed. The listening authorization check specifically comprises: and the searching user equipment sends a second request message to the first proximity service functional entity so that the first proximity service functional entity performs subscription check and returns an application list allowing monitoring, wherein the second request message comprises a searching user subscription identification. The second request message also comprises an application list, the applications in the application list all use the codes, and the codes correspond to the target user equipment, so that compared with the prior art that one application corresponds to one code, the number of codes is greatly reduced, and resources are saved.
In S11, after mapping the target user application layer identifier to the temporary identifier of the target user equipment, the server requests the second proximity service functional entity in the roaming PLMN to search for the code, and the second proximity service functional entity returns the code, the mask code, and the valid time of the code to the server. In the embodiment of the invention, the searching user equipment obtains the code from the second short-distance service functional entity through the server, namely the second short-distance service functional entity searches the code through the temporary identifier of the target user equipment, and the identifier of the application layer of the searching user and the identifier of the application layer of the target user cannot be obtained in the whole process, so that the exposure of the friendly relationship between the searching user equipment and the target user equipment is avoided, and the exposure of the identifier of the application layer of a third party user to a network is also avoided.
In the embodiment of the present invention, if the scenario is a non-roaming scenario, that is, the search user equipment and the target user equipment are both non-roaming, the first proximity service functional entity and the second proximity service functional entity are the same proximity service functional entity, and if the scenario is a roaming scenario, that is, the search user equipment or the target user equipment is roaming, the first proximity service functional entity and the second proximity service functional entity are different proximity service functional entities, where the first proximity service functional entity is located in a home network of the search user equipment, and the second proximity service functional entity is located in a home network of the target user equipment.
S12: and searching the codes corresponding to the target user equipment returned by the server and monitored by the user equipment, wherein the codes are searched by the server according to the temporary identifier of the target user equipment after the application layer identifier of the target user is mapped to the temporary identifier of the target user equipment.
In S12, the searching user device receives the code returned by the server and also receives the valid time of the code returned by the server and the mask of the target user device.
In the embodiment of the invention, when the user equipment is searched for monitoring, the mapping relation between the application layer identifier of the target user and the temporary identifier of the target user equipment can be maintained through interaction with the server. The method specifically comprises the following steps: and the searching user equipment sends a fourth request message to the first proximity service functional entity, wherein the fourth request message comprises the coded network identifier, and the first proximity service functional entity confirms whether monitoring in the network is allowed or not according to the network identifier. And the first proximity service function entity returns a confirmation message to the searching user equipment when the searching user equipment monitors in the PLMN. And if the search user equipment allows monitoring in the network, sending a fifth request message to the server so that the server acquires the temporary identifier of the target user equipment according to the code, analyzes the temporary identifier into the application layer identifier of the target user and returns the application layer identifier of the target user to the search user equipment, wherein the fifth request message comprises the application layer identifier and the code of the target user. In the embodiment of the invention, if the relation between the code and the temporary identifier of the target user equipment is stored in the server, the code is directly analyzed into the corresponding temporary identifier of the target user equipment. And if the relation between the codes and the temporary identification of the target user equipment is not stored in the server, the server sends the codes to the second short-distance service functional entity, and the second short-distance service functional entity analyzes the codes into the temporary identification of the target user equipment and returns the temporary identification of the target user equipment to the server.
Fig. 18 is a flowchart illustrating a method of proximity discovery according to a second embodiment of the present invention. As shown in fig. 18, the method of proximity discovery includes:
s20: and the target user equipment acquires the temporary identifier of the target user equipment.
In S20, the target user equipment attaches to the network and acquires the target user equipment temporary identity. The temporary target ue identity may be allocated by the MME, such as GUTI, which includes PLMN information. Or may be assigned by a second proximity services functionality, which includes PLMN information.
S21: and the target user equipment sends a third request message to the second short-distance service functional entity for signing authorization, wherein the third request message comprises a signing identifier of the target user. Preferably, the target subscriber subscription identity is IMSI.
S22: and the target user equipment receives the code corresponding to the target user equipment returned by the second short-distance service functional entity.
The third request message may also carry a list of coded applications requested for use. In S22, the target user equipment also receives the encoded valid time returned by the second proximity service function entity and the list of applications allowed to use the encoding at the same time. In the embodiment of the invention, the target user equipment can have a plurality of applications, and the codes correspond to the target user equipment, so that compared with the prior art that one application corresponds to one code, the number of codes is greatly reduced, and resources are saved.
S23: and the target user equipment acquires the radio resource for broadcasting, broadcasts the code and registers the target user application layer identification and the target user equipment temporary identification to the server.
In the embodiment of the present invention, the target ue needs to broadcast its code on the network, that is, after the network authorizes the target ue and allocates the code, the searching ue may search its code on the network through the server and perform monitoring.
Fig. 19 is a flowchart illustrating a method of proximity discovery according to a third embodiment of the present invention. As shown in fig. 19, the method of proximity discovery includes:
s30: and the second short-distance service functional entity receives a target user equipment temporary identifier sent by the server, wherein the target user equipment temporary identifier is sent to the server by the search user equipment through the first request message.
In the embodiment of the present invention, if the scenario is a non-roaming scenario, that is, both the search user equipment and the target user equipment are non-roaming, before the second proximity service functional entity receives the temporary identifier of the target user equipment sent by the server, the second proximity service functional entity also receives a second request message sent by the search user equipment, where the second request message includes a search user subscription identifier. The second request message may also include a list of applications. And the second short-distance service functional entity returns an application list allowing monitoring to be carried out to the searching user equipment after carrying out subscription check according to the signing identification of the searching user. And if the user equipment is in a roaming scene, namely the searching user equipment or the target user equipment is in roaming, the first proximity service functional entity receives a second request message sent by the searching user equipment. And the first proximity service functional entity returns an application list allowing monitoring to be carried out to the searching user equipment after carrying out subscription check according to the signing identification of the searching user. At this time, the first proximity service functional entity is located in the home network of the search user equipment, and the second proximity service functional entity is located in the home network of the target user equipment.
S31: and the second short-distance service functional entity searches the corresponding code according to the temporary identifier of the target user equipment.
S32: the second near-field service function entity returns the code to the searching user equipment through the server for monitoring. And the second near service function entity simultaneously returns the effective time of the code to the searching user equipment through the server.
In the embodiment of the invention, the second proximity service functional entity searches the code through the temporary identifier of the target user equipment, and the identifier of the application layer of the searched user and the identifier of the application layer of the target user cannot be obtained all the time, so that the exposure of friendly relation between the searched user equipment and the target user equipment is avoided, and the exposure of the identifier of the application layer of a third party user to a network is also avoided. And the code is corresponding to the target user equipment and can correspond to a plurality of applications, and compared with the prior art that one application corresponds to one code, the code quantity is greatly reduced, and the resource is saved.
In the embodiment of the present invention, the target ue needs to broadcast its code on the network, that is, after the network authorizes the target ue and allocates the code, the searching ue may search its code on the network through the server and perform monitoring. And in the process that the target user equipment broadcasts the code on the network, the second short-distance service functional entity also receives a third request message sent by the searching user equipment, wherein the third request message comprises the searching user subscription identity, such as IMSI. And the second short-distance service functional entity performs subscription authorization according to the subscription identifier of the search user and returns a code to the search user equipment. The validity time of the code and the list of applications allowed to use the code are also returned at the same time as the code is returned to the seeking user device. Specifically, the second proximity service functional entity performs subscription check on the search user equipment through the HSS, determines whether to allow the target user equipment to perform broadcasting, and returns a code, a valid time of the code, and an application list allowing use of the code to the search user equipment after obtaining the broadcasting authorization. If the roaming scenario is the case, after the second proximity service functional entity performs subscription authorization according to the search user subscription identifier, the second proximity service functional entity sends a target user application layer identifier, namely IMSI, to the first proximity service functional entity, receives the code of the target user equipment and the effective time of the code returned by the first proximity service functional entity, and then returns the code, the effective time of the code and an application list allowing the code to be used to the search user equipment.
In the embodiment of the invention, when the user equipment is searched for monitoring, the mapping relation between the application layer identifier of the target user and the temporary identifier of the target user equipment can be maintained through interaction with the server. In the process, the second proximity service functional entity receives the code sent by the server, wherein the code is monitored by the search user equipment and sent to the server. And the second short-distance service functional entity analyzes the codes into a temporary identifier of the target user equipment and returns the temporary identifier to the searching user equipment through the server. If the scene is a non-roaming scene, before the second proximity service functional entity receives the code sent by the server, a fourth request message sent by the searching user equipment is also received to confirm whether the searching user equipment is allowed to monitor in the network, wherein the fourth request message comprises a network identifier for monitoring the code; and after the second short-distance service functional entity confirms, returning confirmation information to the searching user equipment. And if the roaming scene is the roaming scene, the first proximity service functional entity receives a fourth request message sent by the searching user equipment to confirm whether the searching user equipment is allowed to monitor in the network, and returns confirmation information to the searching user equipment after the first proximity service functional entity confirms. At this time, the first proximity service functional entity is located in the home network of the search user equipment, and the second proximity service functional entity is located in the home network of the target user equipment.
Fig. 20 is a flowchart illustrating a method of proximity discovery according to a fourth embodiment. As shown in fig. 20, the method of proximity discovery includes:
s40: the server receives a first request message sent by the search user equipment, wherein the first request message comprises a target user application layer identification.
Wherein the first request message further comprises a lookup user application layer identification. Before the server receives a first request message sent by the search user equipment, the search user equipment acquires the application layer identification of a target user through a network, and acquires an application list allowing monitoring through monitoring authorization of a first proximity service functional entity.
S41: and the server maps the target user application layer identifier into a target user equipment temporary identifier.
Specifically, the server checks whether to allow searching the user application layer identification to find the target user application layer identification; if the request message is allowed, the server maps the target user application layer identification to the target user equipment temporary identification, and if the request message is not allowed, the server rejects the first request message.
S42: and the server searches the code corresponding to the target user equipment according to the temporary identifier of the target user equipment and returns to the search user equipment so as to facilitate the search user equipment to monitor. In the embodiment of the invention, the applications in the application list all use the codes, namely the codes correspond to the target user equipment, and compared with the prior art that one application corresponds to one code, the number of the codes is greatly reduced, and the resources are saved.
In S42, the server addresses the second proximity service functional entity according to the temporary identifier of the target user equipment and requests the second proximity service functional entity to search for a code; and receiving the code returned by the second near field service function entity. And the second short-distance service functional entity searches for the code according to the temporary identifier of the target user equipment sent by the server and returns the code, the mask code and the effective time of the code to the server. It can be seen that in the embodiment of the present invention, the second proximity service functional entity searches for the code through the temporary identifier of the target user equipment, and the search user application layer identifier and the target user application layer identifier are not obtained in the whole process, so that exposure of friendly relationship between the search user equipment and the target user equipment is avoided, and exposure of the third party user application layer identifier to the network is also avoided. Before returning the target user application layer identifier to the search user equipment, the server checks whether the search user application layer identifier is allowed to find the target user application layer identifier, if the search user application layer identifier is allowed to find the target user application layer identifier, the server returns the target user application layer identifier to the search user equipment, and if the search user application layer identifier is not allowed, the server rejects the fifth request message.
In the embodiment of the invention, when the search user equipment monitors, the mapping relation between the target user application layer identifier and the target user equipment temporary identifier can be maintained through interaction with the search user equipment. The method specifically comprises the following steps: the server receives a fifth request message sent by the user equipment, wherein the fifth request message comprises a target user application layer identifier and a code; and the server acquires the temporary identifier of the target user equipment according to the code, maps the temporary identifier of the target user equipment into the application layer identifier of the target user and returns to the search user equipment. Before the server receives the fifth request message sent by the searching user equipment, the first proximity service functional entity performs matching authorization on the searching user equipment and confirms that the searching user equipment is allowed to monitor in the network. In the embodiment of the invention, if the relation between the code and the temporary identifier of the target user equipment is stored in the server, the code is directly analyzed into the corresponding temporary identifier of the target user equipment. And if the relation between the code and the temporary identifier of the target user equipment is not stored in the server, the server sends the code to the second short-distance service functional entity, the second short-distance service functional entity analyzes the code into the temporary identifier of the target user equipment, and the server receives the temporary identifier of the target user equipment returned by the second short-distance service functional entity. Before returning the target user application layer identifier to the searching user equipment, the server also checks whether the searching user application layer identifier is allowed to find the target user application layer identifier; if so, the server returns the target user application layer identification to the seeking user equipment, and if not, the server rejects the fifth request message.
In the embodiment of the present invention, the target ue needs to broadcast its code on the network, that is, after the network authorizes the target ue and allocates the code, the searching ue may search its code on the network through the server and perform monitoring. Before 40, the target user equipment needs to finish acquiring its code on the network and broadcasting it. The method specifically comprises the following steps: the target user equipment acquires a target user equipment temporary identifier through a network and registers the target user application layer identifier and the target user equipment temporary identifier to a server; the target user equipment sends a third request message to the second short-distance service functional entity for signing authorization and receives a returned code of the target user equipment, wherein the third request message comprises a signing identifier of the target user, namely IMSI; the target user equipment acquires radio resources for broadcasting and broadcasts the code of the target user equipment. If the roaming scenario is the roaming scenario, the step of sending, by the target user equipment, a third request message to the second proximity service functional entity for subscription check, and receiving a returned code includes: the target user equipment sends a third request message to the second short-distance service functional entity; the second short-distance service functional entity sends the target user application layer identification to the first short-distance service functional entity for signing authorization and returning a code; and the target user equipment receives the codes returned by the second short-distance service functional entity through the first short-distance service functional entity. And the server receives the target user application layer identification and the target user equipment temporary identification which are registered by the target user equipment.
In the embodiment of the present invention, if the scenario is a non-roaming scenario, that is, the search user equipment and the target user equipment are both non-roaming, the first proximity service functional entity and the second proximity service functional entity are the same proximity service functional entity, and if the scenario is a roaming scenario, that is, the search user equipment or the target user equipment is roaming, the first proximity service functional entity and the second proximity service functional entity are different proximity service functional entities, where the first proximity service functional entity is located in a home network of the search user equipment, and the second proximity service functional entity is located in a home network of the target user equipment.
In summary, the present invention obtains the target user application layer identifier by searching the user equipment, sends the first request message to the server, receives the code returned by the server, and performs monitoring, where the first request message includes the target user application layer identifier, and the code is searched by the server according to the target user equipment temporary identifier after mapping the target user application layer identifier to the target user equipment temporary identifier, so that the number of codes can be greatly reduced, and resources are saved.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (36)

  1. A lookup user device, the lookup user device comprising:
    the identification acquisition module is used for acquiring the application layer identification of the target user;
    a sending module, configured to send a first request message to a server, where the first request message includes the target user application layer identifier;
    and the receiving module is used for receiving and monitoring a code corresponding to the target user equipment returned by the server, wherein the code is searched by the server according to the temporary identifier of the target user equipment after the application layer identifier of the target user is mapped to the temporary identifier of the target user equipment.
  2. Lookup user device as claimed in claim 1,
    the sending module is further configured to: sending a second request message to the first proximity service functional entity, wherein the second request message comprises a user signing identifier which is searched;
    the receiving module is further configured to: and receiving an application list which is returned by the first short-distance service functional entity and allowed to be monitored after the first short-distance service functional entity performs subscription check according to the search user subscription identification.
  3. The lookup user device as claimed in claim 2 wherein said second request message further comprises said list of applications.
  4. The lookup user device as claimed in claim 1 wherein said receiving module is further configured to:
    and receiving the effective time of the server for returning the code.
  5. Lookup user device as claimed in claim 1,
    the sending module is further configured to: sending a fourth request message to a first proximity service functional entity, wherein the fourth request message comprises the monitored coded network identifier, and the first proximity service functional entity confirms whether the search user equipment is allowed to monitor in the network according to the network identifier;
    the sending module is further configured to: if the searching user equipment allows monitoring in the network, sending a fifth request message to the server, wherein the fifth request message comprises the target user application layer identification and the code;
    the receiving module is further configured to: and receiving the target user application layer identification returned by the server, wherein the target user application layer identification is obtained and analyzed by the server according to the code.
  6. A target user device, the target user device comprising:
    the identification acquisition module is used for acquiring a temporary identification of the target user equipment;
    a sending module, configured to send a third request message to a second proximity service functional entity for subscription authorization, where the third request message includes a target user subscription identifier;
    the receiving module is used for receiving the codes returned by the second near field service functional entity;
    and the broadcasting module is used for acquiring the wireless resource for broadcasting, broadcasting the code and registering the target user application layer identifier and the target user equipment temporary identifier to the server.
  7. The target user equipment of claim 6, wherein the receiving module is further configured to: and receiving the effective time of the code returned by the second near service function entity and the list of applications allowed to use the code.
  8. A second proximity services functional entity, wherein the second proximity services functional entity comprises:
    the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a target user equipment temporary identifier sent by a server, and the target user equipment temporary identifier is sent to the server by searching user equipment through a first request message;
    the processing module is used for searching a corresponding code according to the temporary identifier of the target user equipment;
    and the sending module is used for returning the codes to the searching user equipment through the server.
  9. The second proximity services functional entity according to claim 8,
    the receiving module is further configured to: receiving a third request message sent by the user equipment, wherein the third request message comprises a user subscription searching identifier;
    the processing module is further configured to: and performing subscription authorization according to the subscription identifier of the search user, and returning the code to the search user equipment.
  10. The second near field service function entity of claim 9, wherein the processing module is further configured to: returning the validity time of the code and the list of applications allowed to use the code to the seeking user equipment.
  11. The second proximity services functional entity according to claim 8,
    the receiving module is further configured to: receiving the code sent by the server, wherein the code is monitored by the search user equipment and sent to the server;
    the sending module is further configured to: and resolving the code into the temporary identifier of the target user equipment and returning the temporary identifier of the target user equipment to the search user equipment through the server.
  12. A server, characterized in that the server comprises:
    the system comprises a receiving module, a searching module and a sending module, wherein the receiving module is used for receiving a first request message sent by searching user equipment, and the first request message comprises a target user application layer identifier;
    the mapping module is used for mapping the target user application layer identifier into a target user equipment temporary identifier;
    and the searching module is used for searching the code corresponding to the target user equipment according to the temporary identifier of the target user equipment and returning the code to the searching user equipment so as to facilitate the monitoring of the searching user equipment.
  13. The server of claim 12, wherein the first request message further comprises a lookup user application layer identification, and wherein the mapping module is further configured to:
    checking whether the search user application layer identification is allowed to find the target user application layer identification;
    and if the temporary identifier is not allowed, rejecting the first request message.
  14. The server of claim 12, wherein the lookup module is configured to:
    addressing a second near field service functional entity according to the temporary identifier of the target user equipment and requesting the second near field service functional entity to search the code;
    the receiving module is further configured to: and receiving the code returned by the second near field service functional entity.
  15. The server according to claim 12,
    the receiving module is further configured to: and receiving the target user application layer identification and the target user equipment temporary identification registered by the target user equipment.
  16. The server according to claim 12, wherein the server further comprises a temporary identity obtaining module,
    the receiving module is further configured to: receiving a fifth request message sent by the searching user equipment, wherein the fifth request message comprises the code;
    the temporary identifier obtaining module is used for obtaining the temporary identifier of the target user equipment according to the code;
    the mapping module is further to: and mapping the temporary identifier of the target user equipment into the application layer identifier of the target user and returning to the search user equipment.
  17. The server according to claim 16, wherein the temporary identity obtaining module is configured to:
    sending the code to a second proximity service functional entity to analyze the code into the temporary identifier of the target user equipment;
    and receiving the temporary identifier of the target user equipment returned by the second short-distance service functional entity.
  18. The server of claim 16, wherein the mapping module is further configured to:
    checking whether the search user application layer identification is allowed to find the target user application layer identification;
    and if the request message is allowed, returning the target user application layer identification to the searching user equipment, and if the request message is not allowed, rejecting the fifth request message.
  19. A method of proximity discovery, the method comprising:
    searching user equipment to obtain a target user application layer identifier;
    the searching user equipment sends a first request message to a server, wherein the first request message comprises the target user application layer identification;
    and the searching user equipment receives and monitors a code corresponding to the target user equipment returned by the server, wherein the code is searched by the server according to the temporary identifier of the target user equipment after the target user application layer identifier is mapped to the temporary identifier of the target user equipment.
  20. The method of claim 19, wherein before the step of sending the first request message to the server, the step of searching further comprises:
    the searching user equipment sends a second request message to a first proximity service functional entity, wherein the second request message comprises a searching user signing identifier;
    and the searching user equipment receives an application list which is returned by the first short-distance service functional entity according to the signing check of the searching user and is allowed to monitor.
  21. The method of claim 20, wherein the second request message further comprises the application list.
  22. The method of claim 19, wherein the searching user device receives the code corresponding to the target user device returned by the server, further comprising:
    and the searching user equipment receives the effective time of the code returned by the server.
  23. The method of claim 19, further comprising:
    the searching user equipment sends a fourth request message to a first proximity service functional entity, wherein the fourth request message comprises the monitored coded network identification, and whether monitoring in a network is allowed or not is confirmed by the first proximity service functional entity according to the network identification;
    if the search user equipment allows monitoring in the network, sending a fifth request message to the server, wherein the fifth request message comprises the target user application layer identification and the code;
    and the searching user equipment receives the target user application layer identification returned by the server, wherein the target user application layer identification is obtained and analyzed by the server according to the code.
  24. A method of proximity discovery, the method comprising:
    the target user equipment acquires a temporary identifier of the target user equipment;
    the target user equipment sends a third request message to a second short-distance service functional entity for signing authorization, wherein the third request message comprises a target user signing identifier;
    the target user equipment receives the code returned by the second short-distance service functional entity;
    and the target user equipment acquires the radio resource for broadcasting, broadcasts the code and registers the target user application layer identification and the target user equipment temporary identification to the server.
  25. The method of claim 24, wherein the target user equipment receives the code returned by the second near service function entity, further comprising: and the target user equipment receives the effective time of the code returned by the second proximity service function entity and the list of applications allowed to use the code.
  26. A method of proximity discovery, the method comprising:
    a second short-distance service functional entity receives a target user equipment temporary identifier sent by a server, wherein the target user equipment temporary identifier is sent to the server by searching user equipment through a first request message;
    the second short-distance service functional entity searches a corresponding code according to the temporary identification of the target user equipment;
    and the second near-field service functional entity returns the code to the searching user equipment through the server.
  27. The method of claim 26, further comprising:
    the second proximity service functional entity receives a third request message sent by the search user equipment, wherein the third request message comprises a search user subscription identifier;
    and the second short-distance service functional entity performs subscription authorization according to the subscription identifier of the search user and returns the code to the search user equipment.
  28. The method of claim 27, wherein returning the code to the seeking user device further comprises: returning the validity time of the code and the list of applications allowed to use the code to the seeking user equipment.
  29. The method of claim 26, further comprising:
    the second near field service functional entity receives the code sent by the server, wherein the code is monitored by the searching user equipment and sent to the server;
    and the second short-distance service functional entity analyzes the code into the temporary identifier of the target user equipment and returns the temporary identifier of the target user equipment to the searching user equipment through the server.
  30. A method of proximity discovery, the method comprising:
    the method comprises the steps that a server receives a first request message sent by a search user device, wherein the first request message comprises a target user application layer identifier;
    the server maps the target user application layer identifier to a target user equipment temporary identifier;
    and the server searches the code corresponding to the target user equipment according to the temporary identifier of the target user equipment and returns the code to the search user equipment so as to facilitate the monitoring of the search user equipment.
  31. The method of claim 30, wherein the first request message further comprises a lookup user application layer id, and wherein before the server maps the target user application layer id to the target user device temporary id, the method further comprises:
    the server checks whether the search user application layer identification is allowed to find the target user application layer identification;
    if the request message is allowed, the server maps the target user application layer identification to the target user equipment temporary identification, and if the request message is not allowed, the server rejects the first request message.
  32. The method of claim 30, wherein the server searches for the code corresponding to the target ue according to the temporary identifier of the target ue, comprising:
    the server addresses a second short-distance service functional entity according to the target user equipment temporary identifier and requests the second short-distance service functional entity to search the code;
    and the server receives the codes returned by the second near field service functional entity.
  33. The method of claim 30, wherein before the server receives the first request message sent by the search user equipment, the method further comprises:
    and the server receives the target user application layer identification and the target user equipment temporary identification which are registered by the target user equipment.
  34. The method of claim 30, further comprising:
    the server receives a fifth request message sent by the searching user equipment, wherein the fifth request message comprises the code;
    the server acquires the temporary identifier of the target user equipment according to the code;
    and the server maps the temporary identifier of the target user equipment into the application layer identifier of the target user and returns the identifier of the target user equipment to the search user equipment.
  35. The method of claim 34, wherein the server obtains the temporary identifier of the target ue according to the code, comprising:
    the server sends the code to a second short-distance service functional entity to analyze the code into the temporary identifier of the target user equipment;
    and the server receives the temporary identifier of the target user equipment returned by the second short-distance service functional entity.
  36. The method of claim 34, wherein prior to the server returning the target user application layer identification to the seeking user device, the method further comprises:
    the server checks whether the search user application layer identification is allowed to find the target user application layer identification;
    if the request message is allowed, the server returns the target user application layer identification to the search user equipment, and if the request message is not allowed, the server rejects the fifth request message.
CN201480037614.5A 2014-12-24 2014-12-24 Neighbouring method, system, server and the user equipment found Pending CN107710829A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2014/094782 WO2016101167A1 (en) 2014-12-24 2014-12-24 Proximity discovery method and system, server and user equipment

Publications (1)

Publication Number Publication Date
CN107710829A true CN107710829A (en) 2018-02-16

Family

ID=56148904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201480037614.5A Pending CN107710829A (en) 2014-12-24 2014-12-24 Neighbouring method, system, server and the user equipment found

Country Status (2)

Country Link
CN (1) CN107710829A (en)
WO (1) WO2016101167A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140073300A1 (en) * 2012-09-10 2014-03-13 Genband Us Llc Managing Telecommunication Services using Proximity-based Technologies
CN103731902A (en) * 2012-10-12 2014-04-16 中兴通讯股份有限公司 Method and device for inquiring direct connection communication target terminal information
US20140141777A1 (en) * 2012-11-16 2014-05-22 Innovative Sonic Corporation Method and apparatus of improving proximity service discovery in a wireless communication system
CN104038919A (en) * 2013-03-08 2014-09-10 电信科学技术研究院 Proximity communication establishment method, apparatus and system
CN104105050A (en) * 2013-04-01 2014-10-15 电信科学技术研究院 Adjacent communication service realizing method and device
US20140341132A1 (en) * 2013-05-16 2014-11-20 Samsung Electronics Co., Ltd. Scheme for discovery in a communication network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140073300A1 (en) * 2012-09-10 2014-03-13 Genband Us Llc Managing Telecommunication Services using Proximity-based Technologies
CN103731902A (en) * 2012-10-12 2014-04-16 中兴通讯股份有限公司 Method and device for inquiring direct connection communication target terminal information
US20140141777A1 (en) * 2012-11-16 2014-05-22 Innovative Sonic Corporation Method and apparatus of improving proximity service discovery in a wireless communication system
CN104038919A (en) * 2013-03-08 2014-09-10 电信科学技术研究院 Proximity communication establishment method, apparatus and system
CN104105050A (en) * 2013-04-01 2014-10-15 电信科学技术研究院 Adjacent communication service realizing method and device
US20140341132A1 (en) * 2013-05-16 2014-11-20 Samsung Electronics Co., Ltd. Scheme for discovery in a communication network

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
3GPP: "Proximity-based services (Prose), stage 2, release 12", 《3GPP TS23.303 V12.2.0》 *
HUAWEI, HISILICON: "S2-142500,Discussion on Identities Usage on Restricted Direct Discovery", 《3GPP TSG SA WG2 MEETING #104》 *
QUALCOMM INCORPORATED, HUAWEI, HISILICON ETC: "S2-143312,Identifiers for ProSe Restricted Discovery", 《3GPP TSG SA WG2 MEETING #105》 *

Also Published As

Publication number Publication date
WO2016101167A1 (en) 2016-06-30

Similar Documents

Publication Publication Date Title
WO2018143774A1 (en) Registration management method for terminal accessing 5g network on non-3gpp access
WO2018199672A1 (en) Network slice-available area information acquisition method
WO2018199649A1 (en) Method and apparatus for registration type addition for service negotiation
EP3566509A1 (en) Registration management method for terminal accessing 5g network on non-3gpp access
WO2017026760A1 (en) Terminal and communication method of the same
WO2016024695A1 (en) Method and apparatus for profile download of group devices
WO2017030399A1 (en) Ue access method and apparatus
WO2015005651A1 (en) Lawful interception method and apparatus of d2d communication-capable terminal
WO2021049782A1 (en) Method and apparatus for providing policy of user equipment in wireless communication system
WO2021091232A1 (en) Device and method for providing information of application server in mobile communication system
WO2021091307A1 (en) Apparatus and method for establishing mbs service session for mbs service provision in wireless communication system
WO2015137787A1 (en) Method for supporting ue access control
WO2017007193A1 (en) Method of and apparatus for network access in wireless communication system supporting isolated e-utran operation for public safety
WO2022146014A1 (en) Method and system of enabling akma service in roaming scenario
WO2012074337A2 (en) Apparatus and method for transceiving multicast traffic in a wireless access system supporting machine-to-machine communication
EP3574693A1 (en) Method and apparatus for registration type addition for service negotiation
WO2014027740A1 (en) Method and apparatus for group-based messaging in mobile communication network
WO2011155733A2 (en) Communication method between a device and another device
WO2021194163A1 (en) Upf service-based packet delay status event exposure service method and device
WO2011155762A2 (en) Method for communicating with other devices, and communication device
WO2021167277A1 (en) Device and method for providing service according to wireless communication network type in edge computing system
WO2011155734A2 (en) Method and communication device for communicating with other devices
WO2014098405A1 (en) Methods, systems and devices for small cell communications
WO2015037909A1 (en) Method and apparatus for providing push service in communication system
WO2018194202A1 (en) V2x communication device and data communication method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180216