CN111988772A - Terminal discovery method and equipment - Google Patents

Terminal discovery method and equipment Download PDF

Info

Publication number
CN111988772A
CN111988772A CN201910436240.9A CN201910436240A CN111988772A CN 111988772 A CN111988772 A CN 111988772A CN 201910436240 A CN201910436240 A CN 201910436240A CN 111988772 A CN111988772 A CN 111988772A
Authority
CN
China
Prior art keywords
terminal
resource pool
discovery
network device
communication connection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910436240.9A
Other languages
Chinese (zh)
Inventor
张雪菲
宫梵昱
许晓东
孙紫微
林威龙
陶小峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201910436240.9A priority Critical patent/CN111988772A/en
Publication of CN111988772A publication Critical patent/CN111988772A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/21Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/53Allocation or scheduling criteria for wireless resources based on regulatory allocation policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/56Allocation or scheduling criteria for wireless resources based on priority criteria
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a terminal discovery method and equipment, comprising the following steps: the method comprises the steps that network equipment receives first resource pool information from a first terminal, the network equipment acquires a second terminal which can be connected with the first terminal according to a priority list of the first terminal, the priority list is used for indicating at least one third terminal identifier which historically establishes communication connection with the first terminal and the number of times of the historical establishment of communication connection between each third terminal and the first terminal, the second terminal is any one of the at least one third terminal, and the signal intensity of the second terminal is larger than or equal to the lowest signal intensity threshold value of the first resource pool; the network equipment broadcasts the resource pool configuration information to the first terminal and the second terminal, and the resource pool configuration information is used for configuring the first terminal and the second terminal to use the target resource pool to execute the terminal discovery process, so that the resources occupied by the terminal due to the execution of the terminal discovery are reduced, and the discovery efficiency is improved.

Description

Terminal discovery method and equipment
Technical Field
The present application relates to communications technologies, and in particular, to a method and a device for discovering a terminal.
Background
The Device-to-Device (D2D) assisted relay technology combines the relay technology with the D2D technology, so that one of the two devices connected through the D2D is connected to the network Device as a relay Device for the other Device, and the other Device is connected to the network Device. In this scenario, a device accessing a network device through a relay device may be referred to as a remote device.
At present, terminal discovery needs to be performed between the relay device and the remote device in order to discover each other. Then, a D2D connection is established between the relay device and the remote device to enable the remote device to access the network device. When terminal discovery is performed between the relay device and the remote device, one device serves as a discovery device, and the other device serves as a discovery device. For example, when the relay device is the discovery device, the remote device is the discovered device, or when the relay device is the discovered device, the remote device is the discovery device.
In the prior art, since the discovery terminal does not determine the resource pool used by the discovered terminal, the discovery device broadcasts the discovery message on a plurality of resource pools capable of transmitting the discovery message, which results in that the existing device discovery method occupies more resources and has lower discovery efficiency.
Disclosure of Invention
The application provides a terminal discovery method and device, which are used for solving the problems that in the prior art, because discovery information needs to be broadcast on a plurality of resource pools by discovery equipment, the existing terminal discovery method occupies more resources and the discovery efficiency is low.
A first aspect of the present application provides a terminal discovery method, including:
The method comprises the steps that network equipment receives first resource pool information from a first terminal, wherein the first resource pool information is used for indicating a first resource pool used by the first terminal for expecting to execute a terminal discovery process;
the network equipment acquires a second terminal capable of establishing connection with the first terminal according to a priority list of the first terminal, wherein the priority list is used for indicating an identifier of at least one third terminal which has historically established communication connection with the first terminal, and the number of times of the historical establishment of communication connection between each third terminal and the first terminal, the second terminal is any one of the at least one third terminal, and the signal intensity of the second terminal is greater than or equal to the lowest signal intensity threshold of the first resource pool;
the network device broadcasts resource pool configuration information to the first terminal and the second terminal, wherein the resource pool configuration information is used for configuring the first terminal and the second terminal to execute the terminal discovery process by using a target resource pool, the target resource pool is a resource pool with smaller bandwidth in the first resource pool and the second resource pool, and the second resource pool is a resource pool which is expected to be used by the second terminal to execute the terminal discovery process.
Optionally, the acquiring, by the network device, a second terminal capable of establishing a connection with the first terminal according to the priority list of the first terminal includes:
A. the network equipment judges whether the ith third terminal can establish communication connection with the first terminal currently; if yes, executing B, and if not, executing D; the i is an integer greater than or equal to 1, the i is a priority sequence of a third terminal in the priority list, and the priority sequence is related to the number of times of historical communication connection establishment between the third terminal and the first terminal;
B. if the ith third terminal can establish communication connection with the first terminal in history, the network device judges that the signal intensity of the ith third terminal is greater than or equal to the lowest signal intensity threshold of the first resource pool; if yes, executing C, otherwise, executing D;
C. the network device takes the ith third terminal as the second terminal;
D. and the network equipment adds 1 to the i and returns to execute the A.
Optionally, before the network device obtains, according to the priority list of the first terminal, a second terminal capable of establishing a connection with the first terminal, the method further includes:
The network equipment receives a trust relationship list from core network equipment, wherein the trust relationship list is used for indicating the identifier and the historical connection times of a terminal which historically establishes communication connection with the first terminal;
and the network equipment acquires the priority list of the first terminal according to the trust relationship list.
A second aspect of the present application provides a terminal discovery method, including:
the core network equipment acquires a trust relationship list, wherein the trust relationship list is used for indicating the identifier and the historical connection times of a terminal which historically establishes communication connection with the first terminal;
and the core network equipment sends the trust relationship list to network equipment.
A third aspect of the present application provides a terminal discovery method, including:
a first terminal sends first resource pool information to network equipment, wherein the first resource pool information is used for indicating a first resource pool where a resource used by the first terminal and expected to be executed by the terminal is located;
the first terminal receives resource pool configuration information broadcasted by the network equipment, wherein the resource pool configuration information is used for configuring the first terminal to execute a terminal discovery process by using resources in the first resource pool;
And the first terminal executes a terminal discovery process by using the resources in the first resource pool.
A fourth aspect of the present application provides a network device, comprising:
a first receiving module, configured to receive first resource pool information from a first terminal, where the first resource pool information is used to indicate a first resource pool where a resource used by the first terminal to expect to perform terminal discovery is located;
a first obtaining module, configured to obtain, according to a priority list of the first terminal, a second terminal that can establish a connection with the first terminal, where the priority list is used to indicate an identifier of at least one third terminal that has historically established a communication connection with the first terminal, and a number of times that each third terminal has historically established a communication connection with the first terminal, where the second terminal is any one of the at least one third terminal, and a signal strength of the second terminal is greater than or equal to a minimum signal strength threshold of the first resource pool;
a broadcasting module, configured to broadcast resource pool configuration information to the first terminal and the second terminal, where the resource pool configuration information is used to configure the first terminal and the second terminal to execute the terminal discovery procedure using a target resource pool, where the target resource pool is a resource pool with a smaller bandwidth in the first resource pool and the second resource pool, and the second resource pool is a resource pool that the second terminal expects to execute the terminal discovery procedure.
Optionally, the first obtaining module is specifically configured to:
A. judging whether the ith third terminal can establish communication connection with the first terminal currently; if yes, executing B, and if not, executing D; the i is an integer greater than or equal to 1, the i is a priority sequence of a third terminal in the priority list, and the priority sequence is related to the number of times of historical communication connection establishment between the third terminal and the first terminal;
B. if the ith third terminal can establish communication connection with the first terminal in history, judging that the signal intensity of the ith third terminal is greater than or equal to the lowest signal intensity threshold of the first resource pool; if yes, executing C, otherwise, executing D;
C. taking the ith third terminal as the second terminal;
D. and adding 1 to i, and returning to execute the A.
Optionally, the network device further includes:
a second receiving module, configured to receive a trust relationship list from a core network device before the obtaining module obtains, according to the priority list of the first terminal, a second terminal capable of establishing a connection with the first terminal, where the trust relationship list is used to indicate an identifier and a historical connection frequency of a terminal that has historically established a communication connection with the first terminal;
And the second acquisition module is used for acquiring the priority list of the first terminal according to the trust relationship list.
A fifth aspect of the present application provides a core network device, where the core network device includes:
the acquisition module is used for acquiring a trust relationship list, and the trust relationship list is used for indicating the identifier and the historical connection times of a terminal which historically establishes communication connection with the first terminal;
and the sending module is used for sending the trust relationship list to network equipment.
A sixth aspect of the present application provides a terminal, which is a first terminal, the first terminal including:
a sending module, configured to send first resource pool information to a network device, where the first resource pool information is used to indicate a first resource pool where a resource used by a first terminal to expect to execute terminal discovery is located;
a receiving module, configured to receive resource pool configuration information broadcasted by the network device, where the resource pool configuration information is used to configure the first terminal and the second terminal to execute the terminal discovery procedure using a target resource pool, where the target resource pool is a resource pool with a smaller bandwidth in the first resource pool and the second resource pool, the second resource pool is a resource pool that the second terminal desires to execute the terminal discovery procedure, and the second terminal is a terminal capable of establishing a connection with the first terminal;
And the execution module is used for executing the terminal discovery process with the second terminal by using the resources in the target resource pool.
A seventh aspect of the present application provides a network device, including: at least one processor and memory;
the memory stores computer-executable instructions; the at least one processor executes computer-executable instructions stored by the memory to perform the method of any of the first aspects.
An eighth aspect of the present application provides a core network device, including: at least one processor and memory;
the memory stores computer-executable instructions; the at least one processor executes computer-executable instructions stored by the memory to perform the method of any of the second aspects.
The ninth aspect of the present application provides a terminal, the terminal is a first terminal, the first terminal includes: at least one processor and memory; optionally, the first terminal may further comprise a transmitter and/or a receiver, the transmitter and/or the receiver being coupled to the processor, the processor being configured to control a transmitting action of the transmitter, and/or a receiving action of the receiver;
The memory stores computer-executable instructions; the at least one processor executes computer-executable instructions stored by the memory to perform the method of any of the third aspects.
A tenth aspect of the present application provides a computer readable storage medium having stored therein program instructions, which when executed by a processor, implement the method of any one of the first to third aspects.
According to the terminal discovery method and the device, before the first terminal executes the discovery process, the network device can screen out the second terminal capable of establishing communication connection with the first terminal for the first terminal based on the first resource pool information reported by the first terminal and the priority list of the first terminal stored at the network device side, and match the same resource pools for the two terminals for terminal discovery based on the resource pools expected to be used by the two terminals, so that the resource pools used by the terminal to execute the terminal discovery can be reduced. In addition, two terminals perform terminal discovery on the same resource pool, so that the discovery efficiency can be improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic diagram of a communication system related to a terminal discovery method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a terminal discovery method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another terminal discovery method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another terminal discovery method provided in the embodiment of the present application;
fig. 5 is a schematic structural diagram of a network device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a core network device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a terminal according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device provided in the present application.
With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
Fig. 1 is a schematic diagram of a communication system related to a terminal discovery method according to an embodiment of the present application. As shown in fig. 1, the communication system may include: core network equipment, a terminal A and a terminal B. Wherein, the terminal B is located in the coverage area of the network equipment.
And the core network equipment is used for performing D2D authorization for the terminal A and the terminal B. Optionally, the core network device may also provide a trust relationship list for the network device. For example, the core network device may be a network node (MME), or a proximity service Function Entity (ProSe Function).
The Network device may be, for example, a Base Transceiver Station (BTS) in a GSM system or a CDMA system, a Base Station (NodeB, NB) in a WCDMA system, an evolved Node B (eNB or eNodeB) in an LTE system, or a Network device in a relay Station, an access point, a vehicle-mounted device, a wearable device, a Network-side device in a future 5G Network, or a Network device in a future evolved Public Land Mobile Network (PLMN), etc.
The Terminal a and the Terminal B may be Radio Access Network (RAN) capable terminals, for example, the terminals may be Mobile Stations (MS), Mobile terminals (Mobile Terminal), handsets (handset), portable devices (portable equipment), Mobile phones (or "cellular" phones), computers with wireless communication functions, and the like, and the terminals may also be portable, pocket, handheld, computer-embedded or vehicle-mounted Mobile devices or apparatuses, which is not limited in this application.
In the present application, terminal a may establish a D2D connection with terminal B located within the coverage of the network device, so that terminal a accesses the network device through terminal B. Therefore, terminal a may be referred to as a Remote User Equipment (Remote UE), and terminal B may be referred to as a Relay UE.
The establishment of the D2D connection between the terminal a and the terminal B includes the following procedures:
1. the core network equipment authorizes the terminal A and the terminal B to authorize the terminal B to provide relay service, and the authorized terminal A can access the network equipment through the terminal B. Namely, the authorized terminal a is a remote terminal, and the authorized terminal B is a relay terminal.
2. Terminal a (i.e., a remote terminal) performs terminal discovery with terminal B (i.e., a relay terminal).
3. Terminal a (i.e., the remote terminal) establishes a D2D connection with terminal B (i.e., the relay terminal).
The following description will first describe a process of terminal discovery between a terminal a (i.e., a remote terminal) and a terminal B (i.e., a relay terminal):
when terminal a (i.e., a remote terminal) performs terminal discovery with terminal B (i.e., a relay terminal), one device serves as a discovery device, and the other device serves as a discovery device. For example, when the terminal B (i.e., the relay terminal) is the discovery device, the terminal a (i.e., the remote terminal) is the discovery device, or when the terminal B (i.e., the relay terminal) is the discovery device, the terminal a (i.e., the remote terminal) is the discovery device.
The terminal a (i.e. the remote terminal) and the terminal B (i.e. the relay terminal) may perform terminal discovery in a direct discovery manner. The direct discovery is divided into two modes:
first mode (also referred to as Model a mode): model A mode is a single signaling discovery, also known as "I am in this" mode. In the Model a mode, the terminal B (i.e., the relay terminal) is a discovered terminal, and the terminal a (i.e., the remote terminal) is a discovered terminal. A discovery terminal (which may also be called an Announcing UE) broadcasts a discovery message to surrounding terminals to allow the surrounding terminals to discover themselves. The discovered terminal (also referred to as Monitoring UE) monitors the discovery message, and after Monitoring the discovery message broadcast by the discovered terminal, the discovered terminal may determine whether to perform D2D connection with the discovered terminal according to the discovery message.
Second mode (may also be referred to as Model B mode): model B mode is dual signaling discovery, also known as "who is there" mode. In the Model B mode, the terminal B (i.e., the relay terminal) is a discovered terminal (may also be referred to as discovery UE), and the terminal a (i.e., the far-end terminal) is a discovered terminal (may also be referred to as discovery UE). The discovery UE broadcasts a discovery message to allow surrounding terminals to discover the discovery UE; after the discovery message is received by the discovery UE, if the discovery UE can be connected with the discovery UE at the moment, the discovery message of the discovery UE is replied, so that the discovery between the discovery UE and the discovery UE is guaranteed.
Currently, a network device configures a plurality of resource pools for terminal discovery for Remote UEs and Relay UEs in a dynamic or semi-static manner. Specifically, the network device may broadcast the resource pool configuration information to the Remote UE and the Relay UE through a System Information Block (SIB). The resource pool configuration information is used for configuring a plurality of resource pools used by the Remote UE and the Relay UE when executing a terminal discovery procedure, and each resource pool comprises at least one resource capable of sending a discovery message. The multiple resource pools may also be referred to as receive resource pools (discRxPool). The Relay UE and the Remote UE will record the discrxport information after receiving the information. It should be understood that the resource pool referred to in the present application may be a frequency domain resource pool, and may include at least one frequency band in a frequency domain, and the size of the frequency band may be determined according to the configuration of the communication system.
In either the Model a mode or the Model B mode, when performing the terminal discovery procedure, since the discovery terminal does not determine the resource pool used by the discovered terminal, the discovery device broadcasts the discovery message on a plurality of resource pools capable of transmitting the discovery message, which results in that the conventional device discovery method occupies more resources and has lower discovery efficiency.
The application provides a terminal discovery method and device, and aims to solve the technical problems in the prior art.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 2 is a flowchart illustrating a terminal discovery method according to an embodiment of the present application. As shown in fig. 2, the steps of this embodiment include:
s201, the first terminal sends first resource pool information to the network equipment.
Wherein the first resource pool information is used to indicate a first resource pool used by the first terminal to expect to perform a terminal discovery procedure. The first resource pool may be one of a plurality of resource pools that the network device dynamically or statically configures for the first terminal. Optionally, the first resource pool information may indicate the first resource pool by carrying a first resource pool identifier, where the identifier may be an index or a number of the first resource pool.
Alternatively, the first resource pool may be a resource pool determined by the first terminal according to its own bandwidth capability. Taking the first terminal as a bandwidth-limited device as an example, assuming that the supported bandwidth of the first terminal is 1.4MHz, the first resource pool may be a resource pool whose bandwidth is less than or equal to 1.4 MHz.
Optionally, when the first terminal is a Remote UE, the first resource pool information reported by the first terminal to the network device is a resource pool that the first terminal wants to monitor the discovery message; when the first terminal is Relay UE, the first terminal sets the reported first resource pool information to the network as a resource pool that the first terminal expects to send a discovery message.
Optionally, the first terminal may send the first resource pool information to the network device through the measurement report. That is, the first resource pool information may be carried in a measurement report and sent to the network device. Optionally, the first terminal may further send the first resource pool information to the network device through side link user equipment information (SidelinkUEInformation).
Optionally, the first terminal may periodically send the first resource pool information to the network device. The reporting period can be reported according to the subframe unit of the existing signal, and can also be set to a certain period for reporting according to the stipulation of a user.
S202, the network equipment acquires a second terminal capable of establishing connection with the first terminal according to the priority list of the first terminal.
The priority list is used for indicating an identifier of at least one third terminal which has historically established communication connection with the first terminal, and the number of times that each third terminal has historically established communication connection with the first terminal, and the second terminal is any one of the at least one third terminal. And the signal strength of the second terminal is greater than or equal to the lowest signal strength threshold of the first resource pool.
Illustratively, the priority list of the first terminal may be as shown in table 1 below:
TABLE 1
Figure BDA0002070605990000091
It should be understood that, when the first terminal is a relay terminal, the third terminal may be a remote terminal, and the history of the number of times of establishing the communication connection may refer to the number of times of accessing the network device by the third terminal through the first terminal. When the first terminal is a remote terminal, the third terminal may be a relay terminal, and the number of times of historically establishing the communication connection may be the number of times of historically providing the relay service for the first terminal by the third terminal.
When the number of times that the first terminal establishes communication connection with a certain third terminal is larger, the probability that the first terminal establishes communication connection with the third terminal subsequently is higher. Therefore, the network device may screen out the second terminals capable of establishing a connection with the first terminal based on the number of times that each third terminal has historically established a communication connection with the first terminal in the priority list of the first terminal. The second terminal may be a third terminal having a signal strength greater than or equal to a lowest signal strength threshold of the first resource pool. Optionally, if there are multiple third terminals whose signal strengths are greater than or equal to the lowest signal strength threshold of the first resource pool, the second terminal is a third terminal that has the largest number of times of establishing a communication connection with the first terminal in history among the multiple third terminals.
The Signal Strength may be a Received Signal Strength Indicator (RSSI), a Reference Signal Receiving Power (RSRP), or the like.
Optionally, the priority list of the first terminal may be preset in the network device, or the identifier of a third terminal that establishes a communication connection with the first terminal and the connection frequency between the third terminal and the first terminal, which are obtained by statistics when the network device accesses the network device historically. Alternatively, the priority list of the first terminal may be obtained by the network device according to a trust relationship list from the core network device. Or the first terminal reports the information to the network equipment together with the first resource pool information. Or the first terminal reports the information to the network equipment through other modes.
S203, the network equipment broadcasts resource pool configuration information to the first terminal and the second terminal.
The resource pool configuration information is used to configure the first terminal and the second terminal to execute the terminal discovery procedure using a target resource pool, where the target resource pool is a resource pool with a smaller bandwidth in the first resource pool and the second resource pool, and the second resource pool is a resource pool that the second terminal expects to execute the terminal discovery procedure.
Optionally, the network device may carry the target resource pool information in a System Information Block (SIB), and broadcast the target resource pool information to the first terminal and the second terminal. For how the target resource pool information indicates the target resource pool, reference may be made to the foregoing description on how the first resource pool information indicates the first resource pool, which is not described in detail herein. In addition, which SIB is specifically used may be determined according to communication requirements of the first terminal and the second terminal, so that the first terminal and the second terminal can receive the resource pool information more quickly. For example, the SIB may be SIB 19.
And after the first terminal and the second terminal receive the SIB, the first terminal and the second terminal execute a discovery process by using the resources in the target resource pool carried in the SIB. Taking the first terminal as a discovery terminal and the second terminal as a discovered terminal as an example, the first terminal may broadcast the discovery message on the resource of the target resource pool, and the second terminal may listen to the discovery message on the target resource pool. Compared with the prior art, the discovery terminal needs to broadcast the discovery message on the plurality of resource pools, and the discovery terminal in the application does not need to broadcast the discovery message on the plurality of resource pools, so that the resource occupied by executing terminal discovery can be reduced. In addition, since the two terminals perform discovery on the same resource pool, the discovery efficiency can be improved as compared with performing discovery on a plurality of resource pools.
Fig. 3 is a flowchart illustrating another terminal discovery method according to an embodiment of the present application. As shown in fig. 3, further, on the basis of the foregoing embodiment, the foregoing step S202 may include:
s301, the network equipment judges whether the ith third terminal can establish communication connection with the first terminal currently; if yes, go to step S302, otherwise go to step S304.
Wherein i is an integer greater than or equal to 1, i is a priority order of the third terminal in the priority list, and the priority order is related to the number of times that the third terminal establishes communication connection with the first terminal historically. Optionally, the higher the priority is, the more times of historical establishment of communication connection between the third terminal and the first terminal is described, and the lower the priority is, the less times of historical establishment of communication connection between the third terminal and the first terminal is described.
Optionally, when the first terminal is Relay UE, the third terminal is Relay UE, at this time, it is determined whether the ith Relay UE is authorized by the core network and can access the network device through the Relay UE serving as the first terminal at this time, if the Relay UE is authorized to access the network device through the first terminal, the third terminal is considered to be connectable with the first terminal, and if the Relay UE is not authorized, the third terminal is considered not to be connectable with the first terminal.
Optionally, when the first terminal is a Remote UE, the third terminal is a Relay UE, and at this time, it is determined whether the ith Relay UE is authorized by the core network device to provide the Relay service, if the ith Relay UE is authorized, the third terminal is considered to be connectable to the first terminal, and if the ith Relay UE is not authorized, the third terminal is considered not to be connectable to the first terminal.
S302, the network device determines that the signal strength of the ith third terminal is greater than or equal to the lowest signal strength threshold of the first resource pool, if so, then S303 is executed, and if not, then S304 is executed.
The minimum signal strength threshold of the first resource pool may be determined according to a setting of the communication system.
If the ith third terminal can be connected with the first terminal, the network device determines whether the signal strength of the ith third terminal is greater than or equal to the lowest signal strength threshold of the first resource pool. The third terminal may successfully establish a connection with the first terminal only if the signal strength of the ith third terminal is greater than the lowest signal strength threshold of the first resource pool. See prior art for how the network device acquires the signal strength of the ith third terminal.
S303, taking the ith third terminal as the second terminal.
And if the ith third terminal can be connected with the first terminal, and the signal strength is greater than or equal to the lowest signal strength threshold value of the first resource pool, taking the third terminal as a second terminal which can be connected with the first terminal, and not continuously judging the third terminal in the first terminal priority list.
After the execution of S303, the flow ends.
S304, adding 1 to i, and returning to execute the step S301.
And if the current ith third terminal cannot be connected with the first terminal at the same time and the signal strength is greater than or equal to the lowest signal strength threshold value of the first resource pool, judging that the third terminal cannot be connected with the first terminal at the moment. At this time, the value of i is increased by 1, and the next third terminal in the priority list of the first terminal is determined.
Optionally, if the priority represented in the priority list of the first terminal is higher, the higher the priority is, the lower the number of times that the third terminal has historically established communication connection with the first terminal is, and the lower the priority is, the higher the number of times that the third terminal has historically established communication connection with the first terminal is. The above step S304 may be replaced with: and subtracting 1 from i, and returning to execute the step S301.
Fig. 4 is a flowchart illustrating a further terminal discovery method according to an embodiment of the present application. As shown in fig. 4, this embodiment relates to how a network device obtains a priority list of a first terminal according to a trust relationship list provided by a core network device. As shown in fig. 4, the method may further include:
s401, the core network equipment acquires a trust relationship list.
The trust relationship list is used for indicating the identifier of the terminal which historically establishes communication connection with the first terminal and the historical connection times.
In the prior art, in a terminal discovery process, a core network device is required to authorize a terminal. In this authorization process, a Trust Relationship (Trust Relationship) between the Relay UE and the Remote UE may be established by the core network device. After the Trust Relationship establishment is completed, the Trust Relationship between the Relay UE and the Remote UE will be stored in the Context of the Relay UE (Relay-UE Context) in the form of a Trust Relationship List (Trust Relationship List). This trust relationship list only contains the identity of the Remote UE that has established a communication connection with the Relay UE.
For each connection between the relay terminal and the remote terminal, the core network authorizes the relay terminal and the remote terminal. For the relay terminal and the remote terminal which are successfully connected, a corresponding trust relationship list is generated every time of connection.
The core network device may identify the Remote terminal according to the identity of the Remote UE, that is, the identity of the Remote terminal. Optionally, the identifier of the remote terminal may be a name of the remote terminal device, or an identification number of the remote terminal device.
For example, the existing trust relationship list may be as shown in table 2 below:
TABLE 2
Figure BDA0002070605990000131
Referring to table 2, the existing trust relationship list includes an identifier of a relay terminal, identifiers of a plurality of remote terminals that have established communication connections with the relay terminal, and an international mobile subscriber identity IMSI of each remote terminal. The identification of the relay terminal is used for indicating the identity information of the relay terminal so as to enable the core network equipment, the network equipment and the remote terminal to identify the relay terminal. The identifier may be any identifier other than the IMSI of the UE, for example, the identifier of the relay terminal may be a terminal name, a unique identification number of the terminal, or the like. The relay terminal and the like can identify each remote terminal by the identification of the plurality of remote terminals. The core network device and the network device identify the identifier of the Remote terminal through the IMSI N, and meanwhile, the IMSI N can also indicate that a trust relationship exists between the Remote UE N and the Relay UE.
For example, in a trust relationship list established by using a mobile phone as Relay UE, an eRelay-UE ID of the mobile phone is "my mobile phone", a Remote UE1 is a bracelet, an identifier 1 of a Remote terminal of the bracelet is "my bracelet", and a trust relationship between the bracelet and the mobile phone is represented by IMSI 1; remote UE2 is a digital camera, and the Remote terminal identifier 2 of the digital camera is "my camera", and the trust relationship between the digital camera and the mobile phone is represented by IMSI 2. Then, the core network device and the network device may know that the trust relationship exists between the bracelet and the mobile phone according to the IMSI 1 on the trust relationship list, and the mobile phone may discover the bracelet according to the information of the remote terminal identifier 1 "my bracelet".
For example, the improved trust relationship list of the present embodiment may be as shown in the following table 3:
TABLE 3
Figure BDA0002070605990000141
Optionally, if the identifier of the remote terminal is not an IMSI, the trust relationship list may further include an IMSI.
It should be appreciated that the list of trust relationships may be updated as new trust relationships are generated. For example, the Relay UE1 has established trust relationships with the Relay UE1, the Relay UE2, the Relay UE3, and the Relay UE4, then on the trust relationship list of the Relay UE1, there are four trust relationships of the Relay UE1 with the Relay UE1, the Relay UE2, the Relay UE3, and the Relay UE 4. After the trust relationship between the Relay UE1 and the Remote UE5 is established, the core network device adds the trust relationship between the Relay UE1 and the Remote UE5 to the trust relationship list of the Relay UE 1. Thus, the trust relationship list of the Relay UE may indicate all the trust relationships that the Relay UE has established.
S402, the core network equipment sends the trust relationship list to the network equipment.
Specifically, the core network device may send the trust relationship list to the network device through a new message, or may send the trust relationship list to the network device by multiplexing the existing message, which is not limited herein.
Accordingly, the network device receives the list of trust relationships.
S403, the network device obtains the priority list of the first terminal according to the trust relationship list.
Because the above trust relationship list represents the relationship of the Remote UE that has established communication connection with the Relay UE, when the first terminal is the Remote UE, the network device needs to obtain the trust relationship list of the first terminal based on all the trust relationship lists including the Remote UE.
If the first terminal is a Remote UE, the trust relationship list of the first terminal may be as shown in the following table 4:
TABLE 4
Figure BDA0002070605990000151
Then, based on the trust relationship list, a priority list of the first terminal is obtained.
Illustratively, the list of trust relationships of the first terminal may be as shown in table 5 below:
TABLE 5
Figure BDA0002070605990000152
When the first terminal is Relay UE, the network device may directly use the trust relationship list of the Relay UE as its own priority list, or may directly obtain the priority list of the first terminal based on the trust relationship list.
If the first terminal is a Relay UE, the priority list of the first terminal may be as shown in the following table 5:
TABLE 6
Figure BDA0002070605990000153
Optionally, the priority lists shown in table 5 and table 6 may be sorted from high to low according to the historical connection times, or sorted from low to high.
The core network device may obtain the improved trust relationship list in a process of establishing the D2D connection between the Remote UE and the relay UE, specifically:
step 1, the Remote UE completes the discovery process with the Relay UE through the discovery process.
And step 2, the Remote UE sends a connection request (containing the Remote UE ID) to the Relay UE on the side link, wherein the Remote UE ID is the unique ID of the Remote UE in the discovery process.
And step 3, the Relay UE sends a message for requesting the known information to the Remote UE, wherein the message carries the ID of the Relay UE, and the ID of the Relay UE is IMSI code.
And 4, if the Relay UE determines to provide the Relay service for the Relay UE, the Relay UE sends a trust relationship establishment request signaling to the core network equipment, wherein the signaling can carry the ID of the Relay UE and the ID of the Relay UE.
And step 5, the core network equipment searches for a Remote-UE context and an IMSI according to the Remote UE ID and the Relay UE ID carried in the trust relationship establishment request signaling, and judges whether the Relay UE is authorized to provide the Relay service and whether the Remote UE is authorized to access the network equipment, namely the wireless network, through the Relay UE. If both the Relay UE and the Remote UE have completed authorization, the core network device establishes a Trust Relationship (Trust Relationship) for the Relay UE and the Remote UE, and sends a Trust Relationship establishment response to the Relay UE. And if the trust relationship is not authorized to be established, sending the establishment failure information to the Relay UE.
And 6, updating the core network equipment and generating an improved trust relationship list. For the description of the improved trust relationship list, reference may be made to the foregoing embodiments, and details are not described here.
According to the terminal discovery method, before the first terminal executes the discovery process, the network device can screen out the second terminal capable of establishing communication connection with the first terminal for the first terminal based on the first resource pool information reported by the first terminal and the priority list of the first terminal stored at the network device side, and match the same resource pools for the two terminals for terminal discovery based on the resource pools expected to be used by the two terminals for terminal discovery, so that the resource pools used by the terminal for terminal discovery can be reduced. In addition, two terminals perform terminal discovery on the same resource pool, so that the discovery efficiency can be improved.
Fig. 5 is a schematic structural diagram of a network device according to an embodiment of the present application. As shown in fig. 5, the network device of the present embodiment includes:
a first receiving module 51, configured to receive first resource pool information from a first terminal, where the first resource pool information is used to indicate a first resource pool where a resource used by the first terminal for expecting to perform terminal discovery is located;
A first obtaining module 52, configured to obtain, according to a priority list of the first terminal, a second terminal capable of establishing a connection with the first terminal, where the priority list is used to indicate an identifier of at least one third terminal that has historically established a communication connection with the first terminal, and a number of times that each third terminal has historically established a communication connection with the first terminal, where the second terminal is any one of the at least one third terminal, and a signal strength of the second terminal is greater than or equal to a minimum signal strength threshold of the first resource pool;
a broadcasting module 53, configured to broadcast resource pool configuration information to the first terminal and the second terminal, where the resource pool configuration information is used to configure the first terminal and the second terminal to execute the terminal discovery procedure using a target resource pool, where the target resource pool is a resource pool with a smaller bandwidth in the first resource pool and the second resource pool, and the second resource pool is a resource pool that the second terminal expects to execute the terminal discovery procedure.
In a possible implementation, the first obtaining module 52 is specifically configured to:
A. judging whether the ith third terminal can establish communication connection with the first terminal currently; if yes, executing B, and if not, executing D; the i is an integer greater than or equal to 1, the i is a priority sequence of a third terminal in the priority list, and the priority sequence is related to the number of times of historical communication connection establishment between the third terminal and the first terminal;
B. If the ith third terminal can establish communication connection with the first terminal in history, judging that the signal intensity of the ith third terminal is greater than or equal to the lowest signal intensity threshold of the first resource pool; if yes, executing C, otherwise, executing D;
C. taking the ith third terminal as the second terminal;
D. and adding 1 to i, and returning to execute the A.
In one possible implementation, the network device further includes:
a second receiving module 54, configured to receive a trust relationship list from a core network device before the first obtaining module 52 obtains, according to the priority list of the first terminal, a second terminal capable of establishing a connection with the first terminal, where the trust relationship list is used to indicate an identifier of a terminal that has historically established a communication connection with the first terminal and a historical connection frequency;
a second obtaining module 55, configured to obtain the priority list of the first terminal according to the trust relationship list.
The network device provided in this embodiment may be used to implement the methods in fig. 1 to fig. 4, which is not described herein again.
Fig. 6 is a schematic structural diagram of a core network device according to an embodiment of the present application. As shown in fig. 6, the core network device includes:
An obtaining module 61, configured to obtain a trust relationship list, where the trust relationship list is used to indicate an identifier and a historical connection number of a terminal that historically establishes a communication connection with the first terminal;
a sending module 62, configured to send the trust relationship list to a network device.
The core network device provided in this embodiment is used to implement the methods in fig. 1 to fig. 4, which is not described herein again.
Fig. 7 is a schematic structural diagram of a terminal according to an embodiment of the present application. As shown in fig. 7, the terminal includes:
a sending module 71, configured to send first resource pool information to a network device, where the first resource pool information is used to indicate a first resource pool where a resource used by a first terminal to expect to execute terminal discovery is located;
a receiving module 72, configured to receive resource pool configuration information broadcasted by the network device, where the resource pool configuration information is used to configure the first terminal and the second terminal to execute the terminal discovery procedure by using a target resource pool, where the target resource pool is a resource pool with a smaller bandwidth in the first resource pool and the second resource pool, the second resource pool is a resource pool that the second terminal desires to execute the terminal discovery procedure, and the second terminal is a terminal capable of establishing a connection with the first terminal;
And an executing module 73, configured to execute a terminal discovery procedure with the second terminal using the resources in the target resource pool.
The first terminal provided in this embodiment is used to implement the methods in fig. 1 to fig. 4, which is not described herein again.
Fig. 8 is a schematic structural diagram of an electronic device provided in the present application. As shown in fig. 8, the electronic device may include: a processor 81 and a memory 82. Wherein the content of the first and second substances,
and a memory 82 for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory 82 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The processor 81 is configured to execute the computer execution instructions stored in the memory 82 to implement the terminal discovery method in the foregoing embodiments, which is similar in implementation principle and technical effect and is not described herein again.
The processor 81 may be a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement embodiments of the present invention.
Alternatively, in a specific implementation, if the communication interface, the memory 82 and the processor 81 are implemented independently, the communication interface, the memory 82 and the processor 81 may be connected to each other through a bus and perform communication with each other. The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The buses may be divided into address buses, data buses, control buses, etc., but do not represent only one bus or one type of bus.
Optionally, in a specific implementation, if the communication interface, the memory 82 and the processor 81 are integrated on a chip, the communication interface, the memory 82 and the processor 81 may complete the same communication through an internal interface.
Optionally, the electronic device may be the network device, or the electronic device may be the core network device, or the electronic device may be the first terminal, or the electronic device may be the second terminal, which is not described in detail herein.
The present invention also provides a computer-readable storage medium, which may include: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. Specifically, the computer-readable storage medium stores therein program instructions for the method in the above-described embodiment.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A method for discovering a terminal, the method comprising:
the method comprises the steps that network equipment receives first resource pool information from a first terminal, wherein the first resource pool information is used for indicating a first resource pool used by the first terminal for expecting to execute a terminal discovery process;
the network equipment acquires a second terminal capable of establishing connection with the first terminal according to a priority list of the first terminal, wherein the priority list is used for indicating an identifier of at least one third terminal which has historically established communication connection with the first terminal, and the number of times of the historical establishment of communication connection between each third terminal and the first terminal, the second terminal is any one of the at least one third terminal, and the signal intensity of the second terminal is greater than or equal to the lowest signal intensity threshold of the first resource pool;
the network device broadcasts resource pool configuration information to the first terminal and the second terminal, wherein the resource pool configuration information is used for configuring the first terminal and the second terminal to execute the terminal discovery process by using a target resource pool, the target resource pool is a resource pool with smaller bandwidth in the first resource pool and the second resource pool, and the second resource pool is a resource pool which is expected to be used by the second terminal to execute the terminal discovery process.
2. The method according to claim 1, wherein the network device obtaining, according to the priority list of the first terminal, a second terminal capable of establishing a connection with the first terminal comprises:
A. the network equipment judges whether the ith third terminal can establish communication connection with the first terminal currently; if yes, executing B, and if not, executing D; the i is an integer greater than or equal to 1, the i is a priority sequence of a third terminal in the priority list, and the priority sequence is related to the number of times of historical communication connection establishment between the third terminal and the first terminal;
B. if the ith third terminal can establish communication connection with the first terminal in history, the network device judges that the signal intensity of the ith third terminal is greater than or equal to the lowest signal intensity threshold of the first resource pool; if yes, executing C, otherwise, executing D;
C. the network device takes the ith third terminal as the second terminal;
D. and the network equipment adds 1 to the i and returns to execute the A.
3. The method according to claim 1, wherein before the network device obtains the second terminal capable of establishing the connection with the first terminal according to the priority list of the first terminal, the method further comprises:
The network equipment receives a trust relationship list from core network equipment, wherein the trust relationship list is used for indicating the identifier and the historical connection times of a terminal which historically establishes communication connection with the first terminal;
and the network equipment acquires the priority list of the first terminal according to the trust relationship list.
4. A method for discovering a terminal, the method comprising:
the method comprises the steps that core network equipment obtains a trust relationship list, wherein the trust relationship list is used for indicating the identifier of a terminal which historically establishes communication connection with a first terminal and historical connection times;
and the core network equipment sends the trust relationship list to network equipment.
5. A method for discovering a terminal, the method comprising:
a first terminal sends first resource pool information to network equipment, wherein the first resource pool information is used for indicating a first resource pool where a resource used by the first terminal and expected to be executed by the terminal is located;
the first terminal receives resource pool configuration information broadcasted by the network device, wherein the resource pool configuration information is used for configuring the first terminal and a second terminal to execute the terminal discovery process by using a target resource pool, the target resource pool is a resource pool with smaller bandwidth in the first resource pool and the second resource pool, the second resource pool is a resource pool which is expected to be used by the second terminal to execute the terminal discovery process, and the second terminal is a terminal capable of establishing connection with the first terminal;
And the first terminal uses the resources in the target resource pool to execute a terminal discovery process with the second terminal.
6. A network device, characterized in that the network device comprises:
a first receiving module, configured to receive first resource pool information from a first terminal, where the first resource pool information is used to indicate a first resource pool where a resource used by the first terminal to expect to perform terminal discovery is located;
a first obtaining module, configured to obtain, according to a priority list of the first terminal, a second terminal that can establish a connection with the first terminal, where the priority list is used to indicate an identifier of at least one third terminal that has historically established a communication connection with the first terminal, and a number of times that each third terminal has historically established a communication connection with the first terminal, where the second terminal is any one of the at least one third terminal, and a signal strength of the second terminal is greater than or equal to a minimum signal strength threshold of the first resource pool;
a broadcasting module, configured to broadcast resource pool configuration information to the first terminal and the second terminal, where the resource pool configuration information is used to configure the first terminal and the second terminal to execute the terminal discovery procedure using a target resource pool, where the target resource pool is a resource pool with a smaller bandwidth in the first resource pool and the second resource pool, and the second resource pool is a resource pool that the second terminal expects to execute the terminal discovery procedure.
7. The device of claim 6, wherein the first obtaining module is specifically configured to:
A. judging whether the ith third terminal can establish communication connection with the first terminal currently; if yes, executing B, and if not, executing D; the i is an integer greater than or equal to 1, the i is a priority sequence of a third terminal in the priority list, and the priority sequence is related to the number of times of historical communication connection establishment between the third terminal and the first terminal;
B. if the ith third terminal can establish communication connection with the first terminal in history, judging that the signal intensity of the ith third terminal is greater than or equal to the lowest signal intensity threshold of the first resource pool; if yes, executing C, otherwise, executing D;
C. taking the ith third terminal as the second terminal;
D. and adding 1 to i, and returning to execute the A.
8. The device of claim 6, wherein the network device further comprises:
a second receiving module, configured to receive a trust relationship list from a core network device before the obtaining module obtains, according to the priority list of the first terminal, a second terminal capable of establishing a connection with the first terminal, where the trust relationship list is used to indicate an identifier and a historical connection frequency of a terminal that has historically established a communication connection with the first terminal;
And the second acquisition module is used for acquiring the priority list of the first terminal according to the trust relationship list.
9. A core network device, characterized in that the core network device comprises:
the system comprises an acquisition module, a first terminal and a second terminal, wherein the acquisition module is used for acquiring a trust relationship list which is used for indicating the identifier and the historical connection times of the terminals which establish communication connection with the first terminal historically;
and the sending module is used for sending the trust relationship list to network equipment.
10. A terminal, characterized in that the terminal is a first terminal, the first terminal comprising:
a sending module, configured to send first resource pool information to a network device, where the first resource pool information is used to indicate a first resource pool where a resource used by a first terminal to expect to execute terminal discovery is located;
a receiving module, configured to receive resource pool configuration information broadcasted by the network device, where the resource pool configuration information is used to configure the first terminal and the second terminal to execute the terminal discovery procedure using a target resource pool, where the target resource pool is a resource pool with a smaller bandwidth in the first resource pool and the second resource pool, the second resource pool is a resource pool that the second terminal desires to execute the terminal discovery procedure, and the second terminal is a terminal capable of establishing a connection with the first terminal;
And the execution module is used for executing the terminal discovery process with the second terminal by using the resources in the target resource pool.
CN201910436240.9A 2019-05-23 2019-05-23 Terminal discovery method and equipment Pending CN111988772A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910436240.9A CN111988772A (en) 2019-05-23 2019-05-23 Terminal discovery method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910436240.9A CN111988772A (en) 2019-05-23 2019-05-23 Terminal discovery method and equipment

Publications (1)

Publication Number Publication Date
CN111988772A true CN111988772A (en) 2020-11-24

Family

ID=73437222

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910436240.9A Pending CN111988772A (en) 2019-05-23 2019-05-23 Terminal discovery method and equipment

Country Status (1)

Country Link
CN (1) CN111988772A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022236612A1 (en) * 2021-05-10 2022-11-17 Lenovo (Beijing) Limited Method and apparatus for system information acquisition

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103686691A (en) * 2012-09-18 2014-03-26 电信科学技术研究院 Method and equipment signal and configuration information transmission and terminal discovery
CN104918330A (en) * 2014-03-14 2015-09-16 电信科学技术研究院 D2D sending resource pool selection method and D2D sending UE
CN105246027A (en) * 2015-09-25 2016-01-13 宇龙计算机通信科技(深圳)有限公司 D2D relay resource configuration method, device and system
CN105722249A (en) * 2016-01-29 2016-06-29 宇龙计算机通信科技(深圳)有限公司 Connection switching method and device and terminal
CN106063352A (en) * 2014-03-20 2016-10-26 Lg 电子株式会社 Method for transmitting and receiving signal in wireless communication system and device therefor
CN106688295A (en) * 2014-08-07 2017-05-17 Lg 电子株式会社 Method for transmitting and receiving data in wireless communication system, and device for same
CN106797534A (en) * 2014-10-14 2017-05-31 Lg电子株式会社 The device of the user equipment in wireless communication system is to device (D2D) operating method and the user equipment using the method
CN106793090A (en) * 2016-07-29 2017-05-31 北京展讯高科通信技术有限公司 The system of selection of D2D direct communication resources and system
CN106793154A (en) * 2016-07-29 2017-05-31 北京展讯高科通信技术有限公司 D2D directly has found system of selection and the system of resource
US20170195995A1 (en) * 2014-09-23 2017-07-06 Fujitsu Limited Device-to device (d2d) synchronization message signaling
CN107371193A (en) * 2016-05-13 2017-11-21 中兴通讯股份有限公司 A kind of bandwidth limited devices and its communication means
WO2019028699A1 (en) * 2017-08-09 2019-02-14 华为技术有限公司 Signal transmission method and related device
CN109391925A (en) * 2017-08-10 2019-02-26 索尼公司 Electronic equipment and wireless communications method in wireless communication system

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103686691A (en) * 2012-09-18 2014-03-26 电信科学技术研究院 Method and equipment signal and configuration information transmission and terminal discovery
CN104918330A (en) * 2014-03-14 2015-09-16 电信科学技术研究院 D2D sending resource pool selection method and D2D sending UE
CN106063352A (en) * 2014-03-20 2016-10-26 Lg 电子株式会社 Method for transmitting and receiving signal in wireless communication system and device therefor
CN106688295A (en) * 2014-08-07 2017-05-17 Lg 电子株式会社 Method for transmitting and receiving data in wireless communication system, and device for same
US20170195995A1 (en) * 2014-09-23 2017-07-06 Fujitsu Limited Device-to device (d2d) synchronization message signaling
CN106797534A (en) * 2014-10-14 2017-05-31 Lg电子株式会社 The device of the user equipment in wireless communication system is to device (D2D) operating method and the user equipment using the method
CN105246027A (en) * 2015-09-25 2016-01-13 宇龙计算机通信科技(深圳)有限公司 D2D relay resource configuration method, device and system
CN105722249A (en) * 2016-01-29 2016-06-29 宇龙计算机通信科技(深圳)有限公司 Connection switching method and device and terminal
CN107371193A (en) * 2016-05-13 2017-11-21 中兴通讯股份有限公司 A kind of bandwidth limited devices and its communication means
CN106793090A (en) * 2016-07-29 2017-05-31 北京展讯高科通信技术有限公司 The system of selection of D2D direct communication resources and system
CN106793154A (en) * 2016-07-29 2017-05-31 北京展讯高科通信技术有限公司 D2D directly has found system of selection and the system of resource
WO2019028699A1 (en) * 2017-08-09 2019-02-14 华为技术有限公司 Signal transmission method and related device
CN109391925A (en) * 2017-08-10 2019-02-26 索尼公司 Electronic equipment and wireless communications method in wireless communication system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022236612A1 (en) * 2021-05-10 2022-11-17 Lenovo (Beijing) Limited Method and apparatus for system information acquisition

Similar Documents

Publication Publication Date Title
CN113853824B (en) Communication method and device
EP3358777B1 (en) Method, base station, terminal and system for transmitting system information
CN109923912B (en) Method and device for transmitting paging message
CN106063334B (en) Method and apparatus for updating ANDSF policy in wireless communication system
WO2013088398A1 (en) Device to Device Communication
JP2016503620A (en) Method and apparatus for enabling D2D communication between user devices
CN113726496B (en) Method and equipment for transmitting SSB (secure subscriber identity Module) on unlicensed frequency band
EP3637866B1 (en) Paging method, terminal device, and network device
WO2023130471A1 (en) Cell access method and apparatus, and device and readable storage medium
CN112640347B (en) Wireless communication method, terminal equipment and network equipment
WO2021020190A1 (en) Method and apparatus for updating multi-usim ue radio capability over same or different operators
TW201804840A (en) Method and device for transmitting information
CN105122663A (en) UE-based interference cancellation by assisting signaling via D2D
EP3567927B1 (en) Access method, and terminal
CN114916037A (en) Communication method and device
CN113692033B (en) Information transmission method and equipment
CN111988772A (en) Terminal discovery method and equipment
CN116709449A (en) Communication method and device
CN112437455B (en) Method and equipment for determining cell parameters
WO2021210601A1 (en) Ip-based system supporting multi-usims
WO2021186934A1 (en) Systems and methods for supporting multi-usim user equipment
CN112469107B (en) Communication method and device
WO2021065748A1 (en) Method and apparatus for performing handover of a multi-usim radio-capable ue over same or different systems
CN115942431A (en) Relay communication method, communication device and communication system
EP3089501B1 (en) Method, apparatus and system for establishing cooperative communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201124