WO2014056359A1 - Method for direct communication between wireless terminals and wireless terminal thereof - Google Patents

Method for direct communication between wireless terminals and wireless terminal thereof Download PDF

Info

Publication number
WO2014056359A1
WO2014056359A1 PCT/CN2013/082354 CN2013082354W WO2014056359A1 WO 2014056359 A1 WO2014056359 A1 WO 2014056359A1 CN 2013082354 W CN2013082354 W CN 2013082354W WO 2014056359 A1 WO2014056359 A1 WO 2014056359A1
Authority
WO
WIPO (PCT)
Prior art keywords
service request
base station
wireless terminal
wireless
class
Prior art date
Application number
PCT/CN2013/082354
Other languages
French (fr)
Chinese (zh)
Inventor
朱昀
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2014056359A1 publication Critical patent/WO2014056359A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Definitions

  • the present invention relates to the field of wireless communication technologies, and in particular, to a method for directly communicating between wireless terminals and a wireless terminal.
  • Direct communication between wireless terminals is a very interesting communication method. Unlike traditional wireless communication, when direct communication technology is used, the wireless signal of the transmitting end (wireless terminal) directly reaches the receiving end (another wireless terminal). There is no need to route through the core network. At present, there are at least two application prospects for direct communication between wireless terminals:
  • Direct communication between wireless terminals in the future may also have broader prospects, and will not be described here.
  • the emergence of direct communication technology has also caused problems for operators, because traditional wireless communication is carried out under the control of operators, and operators charge communication fees to obtain revenue.
  • the core network routes the service request to the corresponding gateway unit (for example, routing the multimedia message service to the multimedia message center, and routing the web browsing service to the wireless application protocol (WLAN) gateway, etc.),
  • the gateway is responsible for authenticating and calculating traffic for the service request of the terminal, and then sending the data to the billing center for calculation and generating a bill for billing.
  • operators cannot control the occurrence and conduct of services, which means that they do not charge fees.
  • the embodiments of the present invention provide a method for directly communicating between wireless terminals and a wireless terminal, so as to solve the problem that the existing wireless terminals cannot directly charge by using direct communication.
  • An embodiment of the present invention provides a method for direct communication between wireless terminals, where the method includes: sending, by the sending end, the encrypted direct service request to the receiving end directly or through the base station;
  • the receiving end receives the key sent by the base station, and uses the key to decrypt the received direct service request.
  • the sending end sends the encrypted direct service request to the receiving end directly or through the base station, including:
  • Receiving, by the receiving end, a key sent by the base station, and using the key to decrypt the received direct service request including:
  • the receiving end receives the communication key sent by the base station, and decrypts the received direct service request using the communication key.
  • the sending end sends the encrypted direct service request to the receiving end directly or through the base station, including:
  • Receiving, by the receiving end, a key sent by the base station, and using the key to decrypt the received direct service request including:
  • the receiving end receives the decryption key sent by the base station, and decrypts the received direct service request using the decryption key.
  • the transmitting end is a class A or class B wireless terminal
  • the receiving end is a class A or class C wireless terminal.
  • the class A terminal is a wireless terminal capable of receiving data of other wireless terminals and receiving data by other wireless terminals; the class B terminal is only capable of receiving data by other wireless terminals. Wireless terminal; the class C terminal is a wireless terminal that can only receive data of other wireless terminals.
  • An embodiment of the present invention further provides a wireless terminal, where the wireless terminal includes:
  • the sending and sending module is configured to: when the wireless terminal is the sending end, send the encrypted through service request to the receiving end directly or through the base station;
  • the receiving processing module is configured to: when the wireless terminal functions as a receiving end, receive a key sent by the base station, and use the key to decrypt the received direct service request.
  • the processing and sending module is configured to: receive a communication key sent by the base station, encrypt the direct service request by using the communication key, and send the encrypted direct service request to the receiving end;
  • the receiving processing module is configured to: receive the communication key sent by the base station, and use the communication key to decrypt the received direct service request.
  • the processing and sending module is configured to: send a direct service request to the base station, the base station determines to accept the direct service request according to the type of the sending end, and selects a key to encrypt the service request. And sending the encrypted direct service request to the receiving end; the receiving processing module is configured to: receive a decryption key sent by the base station, and use the decryption key to receive the received through service request Decrypt.
  • the transmitting end is a class A or class B wireless terminal
  • the receiving end is a class A or class C wireless terminal.
  • the class A terminal is a wireless terminal capable of receiving data of other wireless terminals and receiving data by other wireless terminals;
  • the class B terminal is a wireless terminal that can only receive data by other wireless terminals;
  • a class C terminal is a wireless terminal that can only receive data of other wireless terminals.
  • FIG. 1 is a schematic diagram of Embodiment 1 of signal transceiving for direct communication between wireless terminals according to the present invention
  • 2 is a schematic diagram of a second embodiment of a method for directly transmitting and receiving signals between wireless terminals according to the present invention
  • FIG. 3 is a flowchart of an embodiment of a method for directly communicating between wireless terminals in the first embodiment of the present invention
  • FIG. 4 is a flow chart showing an embodiment of a method for directly communicating between wireless terminals in the second embodiment shown in FIG. 2;
  • FIG. 5 is a schematic structural diagram of an embodiment of a wireless terminal according to the present invention.
  • the embodiment of the present invention provides a method for direct communication between wireless terminals, the method includes: Step 101: The sending end sends the encrypted direct service request to the receiving end directly or through the base station; Step 102: The receiving end sends the base station to send Key, and use the key to decrypt the received direct service request.
  • This embodiment includes the case where the two wireless terminals as shown in Fig. 1 communicate directly without the assistance of any network unit, and also includes the case where the two wireless terminals communicate directly through the local base station as shown in Fig. 2. But in either case, its characteristics are not required to be transmitted through the core network. This is also the biggest feature of direct communication between wireless terminals. Corresponding specific embodiments are described below in terms of implementations of the two direct communications described above, respectively.
  • FIG. 3 it is a flowchart of an embodiment of a method for directly performing communication between wireless terminals in Embodiment 1 of the present invention.
  • the method includes:
  • Step 201 The operator sends a key for direct communication to each wireless terminal in the cell through the existing wireless network.
  • the operator transmits the key only to the wireless terminal that allows direct communication service through the base station. Specifically, the operator divides the wireless terminal into four categories: A, B, C, and D:
  • the operator assigns a separate key to the wireless terminal and will Sending a key to the wireless terminal and other wireless terminals in the cell;
  • the operator assigns a separate key to the wireless terminal, and sends the key to the wireless terminal, but does not send the key of the other wireless terminal in the cell to the wireless terminal;
  • the operator does not assign a separate key to the terminal, but sends a key of another wireless terminal in the cell to the wireless terminal;
  • the operator does not assign a key to the terminal and does not send any keys to it.
  • the four types of wireless terminals that operators divide are usually determined according to the type of the package to which the end user belongs. For example, some users who do not purchase the direct service package are assigned to the D class, and some package users who can only enjoy some direct services are classified. Class B, or Class C, the package users who enjoy all the services are Class A users.
  • the operator usually sends the above key to the wireless terminal through the base station, usually placing the wireless terminal in a connected state (RRC-connected), and then transmitting the key to the wireless terminal through dedicated signaling;
  • Step 202 The wireless terminal X initiates a direct service request, and encrypts the request sent by the key previously allocated to the wireless terminal.
  • the wireless terminal X is a transmitting end, and the wireless terminal X can only be the aforementioned Class A or Class B wireless terminal;
  • Step 203 The wireless terminal Y listens for a direct service request from another wireless terminal in the cell, and decrypts the received direct service request according to a key known by the user.
  • the wireless terminal Y is a receiving end, and the wireless terminal Y can only be the aforementioned class A or class C terminal.
  • the wireless terminal can receive data of other wireless terminals, and other wireless terminals can also receive the wireless terminal.
  • the data since its key is known by all terminals in the network, the wireless terminal can receive data of other wireless terminals, and other wireless terminals can also receive the wireless terminal. The data;
  • the operator can control the direct service implementation of the wireless terminal by using the key assigned to the wireless terminal.
  • FIG. 4 it is a flowchart of a method for directly performing communication between wireless terminals in the second embodiment of the present invention.
  • the present embodiment corresponds to the scenario shown in FIG. 2, and the wireless communication of the through communication in the scenario is shown in FIG.
  • the difference between the terminal and the wireless communication terminal in the first embodiment is that: the data transmission between the terminals needs to be relayed by the local base station.
  • the key can be placed in the local base station and the local base station performs the encryption operation according to the different types of the wireless terminal.
  • the specific steps are as follows:
  • Step 301 The radio base station sends a key corresponding to the received data to each wireless terminal according to the type of the wireless terminal. Similar to the first embodiment, the types of the wireless terminal include the following four types:
  • the wireless terminal can receive data of other wireless terminals, and other wireless terminals can also receive data of the wireless terminal;
  • the wireless terminal can be found by other wireless terminals, but the wireless terminal cannot discover other wireless terminals;
  • the wireless terminal can discover other wireless terminals, but other wireless terminals cannot discover the wireless terminal;
  • the wireless terminal cannot discover other wireless terminals, and other wireless terminals cannot discover the wireless terminal;
  • the radio base station only transmits the key of the decrypted data to the terminals of the class A and the class C, that is, for the class A and class C wireless terminals, the radio base station will decrypt the data sent by other wireless terminals in the cell.
  • the key is sent to the wireless terminal;
  • the wireless base station does not send any key to it; step 302, the wireless terminal X initiates a direct service request, and the service request is sent to the wireless base station; the wireless terminal X is a transmitting end;
  • Step 303 The radio base station determines whether to accept the foregoing service request according to the type of the wireless terminal, and selects a key to encrypt the service data.
  • the wireless base station accepts the direct service request initiated by it; for Class C and Class D wireless terminals, the wireless base station does not accept the direct service request initiated by it; for Class A and Class B wireless terminals, the wireless base station Pre-configure a separate key for encrypting data, encrypt the data sent by the key, and send the encrypted data to the entire cell;
  • Step 304 The wireless terminal X continuously sends the direct service data, and the wireless base station encrypts the data and sends the data to the entire cell.
  • the wireless terminal Y listens for the straight-through service data from other wireless terminals in the cell, and decrypts the received data according to the key known by itself.
  • the wireless terminal Y is a receiving end. According to the description of step S301, only the class A and class C wireless terminals have the keys of other wireless terminals in the cell, so only the class A and class C wireless terminals can decrypt the received data.
  • data can also be transmitted, and the data transmitted by the terminal can be decrypted by other wireless terminals in the cell after being encrypted by the wireless base station.
  • the base station transmits a key for the wireless terminal, which provides a possibility for the operator to control the direct communication service between the terminals, and promotes the development of the technology.
  • the method is also very simple and feasible, and can be implemented.
  • FIG. 5 it is a schematic structural diagram of an embodiment of a wireless terminal according to the present invention.
  • the wireless terminal includes a processing sending module 51 and a receiving processing module 52, where:
  • the receiving processing module is configured to: when the wireless terminal is used as the receiving end, receive a key sent by the base station, and use the key to decrypt the received direct service request.
  • the processing and sending module is specifically configured to: receive a communication key sent by the base station, encrypt the direct service request by using the communication key, and send the encrypted direct service request to the receiving end;
  • the receiving processing module is specifically configured to: receive the communication key sent by the base station, and decrypt the received direct service request by using the communication key. This case corresponds to the method embodiment described in Fig. 3.
  • the processing sending module is specifically configured to: send a direct service request to the base station, the base station determines to accept the direct service request according to the type of the sending end, and selects a key to perform the service request. Encrypting, and then sending the encrypted pass-through service request to the receiving end; the receiving processing module is specifically configured to: receive a decryption key sent by the base station, and use the decryption key pair to receive the pass-through The business request is decrypted. This case corresponds to the method embodiment described in Fig. 4.
  • the sending end is a class A or class B wireless terminal
  • the receiving end is a class A or class C wireless terminal.
  • the class A terminal is a wireless terminal capable of receiving data of other wireless terminals and receiving data by other wireless terminals
  • the class B terminal is a wireless terminal that can only receive data by other wireless terminals
  • the class C terminal A wireless terminal that can only receive data from other wireless terminals.
  • the above wireless terminal can directly communicate with another wireless terminal under the control of the network side.
  • the beneficial effects of the embodiments of the present invention are obvious.
  • the method is also very simple and feasible. Operator terminals that conform to existing wireless protocols can be reused and existing wireless networks can be utilized to the maximum extent, and operators do not need to increase the cost of network reconstruction.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method for direct communication between wireless terminals and the wireless terminal thereof, the method for direct communication between wireless terminals including that: a transmission end transmits an encrypted request of direct communication services to a reception end directly or through a base station; said reception end receives a cryptographic key transmitted by the base station, and uses said cryptographic key to decrypt the received request of direct communication services. The embodiments of the present invention transmit cryptographic keys to wireless terminals through a base station, provide the possibility of controlling the direct communication services between terminals for operators, and promote the technical progress. Secondly, the solutions of the embodiments of the present invention are quite simple and feasible, and can reuse the user terminals which meet the present wireless protocols and furthest utilize the present wireless networks during implementation, while operators do not need to increase a lot of cost for network reconstruction.

Description

无线终端间直接通信的方法及无线终端  Method for directly communicating between wireless terminals and wireless terminal
技术领域 Technical field
本发明涉及无线通信技术领域, 尤其涉及一种无线终端间直接通信的方 法及无线终端。  The present invention relates to the field of wireless communication technologies, and in particular, to a method for directly communicating between wireless terminals and a wireless terminal.
背景技术 Background technique
无线终端之间的直接通信是一种非常有趣的通信方式, 不同于传统的无 线通信, 釆用直接通信技术时, 发送端 (无线终端) 的无线信号直接到达接 收端 (另一个无线终端) , 而不需要经过核心网络的路由。 目前看来, 无线 终端之间的直接通信至少有下面两种应用前景:  Direct communication between wireless terminals is a very interesting communication method. Unlike traditional wireless communication, when direct communication technology is used, the wireless signal of the transmitting end (wireless terminal) directly reaches the receiving end (another wireless terminal). There is no need to route through the core network. At present, there are at least two application prospects for direct communication between wireless terminals:
1 )用于公共安全领域, 比如发生地震、 海嘯等自然灾害时, 来自无线基 站的覆盖没有了, 这时如果无线终端与无线终端之间能直接进行通信, 意味 着就可以挽救更多宝贵的生命。  1) In the field of public safety, such as natural disasters such as earthquakes and tsunamis, the coverage from the wireless base station is gone. If the wireless terminal can communicate directly with the wireless terminal, it means more valuable. life.
2 )用于商业领域, 随着传统网络中的数据流量呈指数增长, 核心网络已 经不堪负荷, 如果能允许无线终端间直接通信就能大大分流原本在网络中间 的数据流量, 使得网络的整体容量提高。  2) For the commercial field, as the data traffic in the traditional network grows exponentially, the core network is already unbearable. If the direct communication between the wireless terminals can be allowed, the data traffic originally in the middle of the network can be greatly diverted, so that the overall capacity of the network improve.
未来无线终端间的直接通信还可能有更广阔的前景,这里就不再赘述了。 但是直接通信技术的出现也给运营商出了难题, 因为传统无线通信都是 在运营商的控制下进行的, 同时运营商收取通信费用来获取收益。 相关技术 实现中, 无线终端发起业务请求后, 核心网络将该业务请求路由给相应的网 关单元(比如把彩信业务路由到彩信中心, 网页浏览业务路由到无线应用协 议( WAP )网关等等),网关负责对该终端的业务请求进行鉴权和计算流量, 然后把数据发送到计费中心计算并产生话费账单。 而对于直接通信技术, 运 营商无法控制业务的发生和进行, 意味着收取不到费用。 如此一来, 运营商 就会对这项技术产生抵触情绪, 阻碍它的市场化。 发明内容 本发明实施例提供了一种无线终端间直接通信的方法及无线终端, 以解 决现有无线终端间釆用直接通信而引起的无法计费等问题。 Direct communication between wireless terminals in the future may also have broader prospects, and will not be described here. However, the emergence of direct communication technology has also caused problems for operators, because traditional wireless communication is carried out under the control of operators, and operators charge communication fees to obtain revenue. In the related art implementation, after the wireless terminal initiates the service request, the core network routes the service request to the corresponding gateway unit (for example, routing the multimedia message service to the multimedia message center, and routing the web browsing service to the wireless application protocol (WLAN) gateway, etc.), The gateway is responsible for authenticating and calculating traffic for the service request of the terminal, and then sending the data to the billing center for calculation and generating a bill for billing. For direct communication technology, operators cannot control the occurrence and conduct of services, which means that they do not charge fees. As a result, operators will be resistant to this technology and hinder its marketization. Summary of the invention The embodiments of the present invention provide a method for directly communicating between wireless terminals and a wireless terminal, so as to solve the problem that the existing wireless terminals cannot directly charge by using direct communication.
本发明实施例提供了一种无线终端间直接通信的方法, 该方法包括: 发送端直接或通过基站向接收端发送加密后的直通业务请求;  An embodiment of the present invention provides a method for direct communication between wireless terminals, where the method includes: sending, by the sending end, the encrypted direct service request to the receiving end directly or through the base station;
所述接收端接收基站发送的密钥, 并使用所述密钥对接收到的直通业务 请求进行解密。  The receiving end receives the key sent by the base station, and uses the key to decrypt the received direct service request.
优选地, 所述发送端直接或通过基站向接收端发送加密后的直通业务请 求, 包括:  Preferably, the sending end sends the encrypted direct service request to the receiving end directly or through the base station, including:
所述发送端接收基站发送的通信密钥, 使用所述通信密钥对直通业务请 求进行加密, 并向所述接收端发送所述加密后的直通业务请求;  Receiving, by the sending end, a communication key sent by the base station, encrypting the direct service request by using the communication key, and sending the encrypted direct service request to the receiving end;
所述接收端接收基站发送的密钥, 并使用所述密钥对接收到的直通业务 请求进行解密, 包括:  Receiving, by the receiving end, a key sent by the base station, and using the key to decrypt the received direct service request, including:
所述接收端接收所述基站发送的所述通信密钥, 并使用所述通信密钥对 接收到的直通业务请求进行解密。  The receiving end receives the communication key sent by the base station, and decrypts the received direct service request using the communication key.
优选地, 所述发送端直接或通过基站向接收端发送加密后的直通业务请 求, 包括:  Preferably, the sending end sends the encrypted direct service request to the receiving end directly or through the base station, including:
所述发送端向所述基站发送直通业务请求, 所述基站根据所述发送端的 类型确定接受所述直通业务请求,并选择一个密钥对所述业务请求进行加密, 然后向所述接收端发送所述加密后的直通业务请求;  Sending, by the sending end, a direct service request to the base station, the base station determining to accept the direct service request according to the type of the sending end, and selecting a key to encrypt the service request, and then sending the service request to the receiving end The encrypted pass-through service request;
所述接收端接收基站发送的密钥, 并使用所述密钥对接收到的直通业务 请求进行解密, 包括:  Receiving, by the receiving end, a key sent by the base station, and using the key to decrypt the received direct service request, including:
所述接收端接收所述基站发送的解密密钥, 并使用所述解密密钥对接收 到的直通业务请求进行解密。  The receiving end receives the decryption key sent by the base station, and decrypts the received direct service request using the decryption key.
优选地, 所述发送端为 A类或 B类无线终端, 所述接收端为 A类或 C 类无线终端。  Preferably, the transmitting end is a class A or class B wireless terminal, and the receiving end is a class A or class C wireless terminal.
优选地, 所述 A类终端为既能接收其它无线终端的数据, 又能被其它无 线终端接收数据的无线终端; 所述 B类终端为只能被其它无线终端接收数据 的无线终端; 所述 C类终端为只能接收其它无线终端的数据的无线终端。 本发明实施例还提供了一种无线终端, 该无线终端包括: Preferably, the class A terminal is a wireless terminal capable of receiving data of other wireless terminals and receiving data by other wireless terminals; the class B terminal is only capable of receiving data by other wireless terminals. Wireless terminal; the class C terminal is a wireless terminal that can only receive data of other wireless terminals. An embodiment of the present invention further provides a wireless terminal, where the wireless terminal includes:
处理发送模块, 设置为: 该无线终端为发送端时, 直接或通过基站向接 收端发送加密后的直通业务请求; 以及  The sending and sending module is configured to: when the wireless terminal is the sending end, send the encrypted through service request to the receiving end directly or through the base station;
接收处理模块, 设置为: 该无线终端作为接收端时, 接收基站发送的密 钥, 并使用所述密钥对接收到的直通业务请求进行解密。  The receiving processing module is configured to: when the wireless terminal functions as a receiving end, receive a key sent by the base station, and use the key to decrypt the received direct service request.
优选地, 所述处理发送模块, 设置为: 接收基站发送的通信密钥, 使用 所述通信密钥对直通业务请求进行加密, 并向所述接收端发送所述加密后的 直通业务请求;  Preferably, the processing and sending module is configured to: receive a communication key sent by the base station, encrypt the direct service request by using the communication key, and send the encrypted direct service request to the receiving end;
所述接收处理模块, 设置为: 接收所述基站发送的所述通信密钥, 并使 用所述通信密钥对接收到的直通业务请求进行解密。  The receiving processing module is configured to: receive the communication key sent by the base station, and use the communication key to decrypt the received direct service request.
优选地, 所述处理发送模块, 设置为: 向所述基站发送直通业务请求, 所述基站根据所述发送端的类型确定接受所述直通业务请求, 并选择一个密 钥对所述业务请求进行加密, 然后向所述接收端发送所述加密后的直通业务 请求; 所述接收处理模块, 设置为: 接收所述基站发送的解密密钥, 并使用 所述解密密钥对接收到的直通业务请求进行解密。  Preferably, the processing and sending module is configured to: send a direct service request to the base station, the base station determines to accept the direct service request according to the type of the sending end, and selects a key to encrypt the service request. And sending the encrypted direct service request to the receiving end; the receiving processing module is configured to: receive a decryption key sent by the base station, and use the decryption key to receive the received through service request Decrypt.
优选地, 所述发送端为 A类或 B类无线终端, 所述接收端为 A类或 C 类无线终端。  Preferably, the transmitting end is a class A or class B wireless terminal, and the receiving end is a class A or class C wireless terminal.
优选地, 所述 A类终端为既能接收其它无线终端的数据, 又能被其它无 线终端接收数据的无线终端; 所述 B类终端为只能被其它无线终端接收数据 的无线终端; 所述 C类终端为只能接收其它无线终端的数据的无线终端。  Preferably, the class A terminal is a wireless terminal capable of receiving data of other wireless terminals and receiving data by other wireless terminals; the class B terminal is a wireless terminal that can only receive data by other wireless terminals; A class C terminal is a wireless terminal that can only receive data of other wireless terminals.
釆用本发明实施例的有益效果是显而易见的, 首先它为运营商控制终端 间直接通信业务的进行提供了可能性, 推动了技术的发展; 其次, 该方法也 非常简单、 可行, 在实现时可以重用符合现有无线协议的用户终端和最大限 度地利用现有无线网络, 运营商也不需要增加很多网络重建成本。 附图概述  The beneficial effects of the embodiments of the present invention are obvious. First, it provides a possibility for the operator to control the direct communication service between the terminals, and promotes the development of the technology. Secondly, the method is also very simple and feasible. Operator terminals that conform to existing wireless protocols can be reused and existing wireless networks can be utilized to the maximum extent, and operators do not need to increase the cost of network reconstruction. BRIEF abstract
图 1是本发明无线终端间直接通信的信号收发实施例一的示意图; 图 2是本发明无线终端间直接通信的信号收发实施例二的示意图; 图 3是本发明图 1所示实施例一中的无线终端间直接进行通信的方法实 施例的流程图; 1 is a schematic diagram of Embodiment 1 of signal transceiving for direct communication between wireless terminals according to the present invention; 2 is a schematic diagram of a second embodiment of a method for directly transmitting and receiving signals between wireless terminals according to the present invention; FIG. 3 is a flowchart of an embodiment of a method for directly communicating between wireless terminals in the first embodiment of the present invention;
图 4是本发明图 2所示实施例二中的无线终端间直接进行通信的方法实 施例的流程图;  4 is a flow chart showing an embodiment of a method for directly communicating between wireless terminals in the second embodiment shown in FIG. 2;
图 5是本发明无线终端实施例的结构示意图。  FIG. 5 is a schematic structural diagram of an embodiment of a wireless terminal according to the present invention.
本发明的较佳实施方式 Preferred embodiment of the invention
下文中将结合附图对本发明的实施例进行详细说明。 需要说明的是, 在 不冲突的情况下, 本申请中的实施例及实施例中的特征可以相互任意组合。  Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that, in the case of no conflict, the features in the embodiments and the embodiments in the present application may be arbitrarily combined with each other.
本发明实施例提供了一种无线终端间直接通信的方法, 该方法包括: 步骤 101、发送端直接或通过基站向接收端发送加密后的直通业务请求; 步骤 102、 所述接收端接收基站发送的密钥, 并使用所述密钥对接收到 的直通业务请求进行解密。 该实施例包括如图 1所示的两个无线终端间不需要任何网络单元的协助 而直接通信的情况,也包括如图 2 所示两个无线终端间通过本地基站而直接 通信的情况。 但无论是哪种方式, 其特点都是不需要经过核心网络的传输。 这也是无线终端间直接通信的最大特点。 下面分别根据上述两种直接通信的 实现方式来描述相对应的具体实施例。  The embodiment of the present invention provides a method for direct communication between wireless terminals, the method includes: Step 101: The sending end sends the encrypted direct service request to the receiving end directly or through the base station; Step 102: The receiving end sends the base station to send Key, and use the key to decrypt the received direct service request. This embodiment includes the case where the two wireless terminals as shown in Fig. 1 communicate directly without the assistance of any network unit, and also includes the case where the two wireless terminals communicate directly through the local base station as shown in Fig. 2. But in either case, its characteristics are not required to be transmitted through the core network. This is also the biggest feature of direct communication between wireless terminals. Corresponding specific embodiments are described below in terms of implementations of the two direct communications described above, respectively.
实施例一  Embodiment 1
如图 3所示, 是本发明图 1所示实施例一中的无线终端间直接进行通信 的方法实施例的流程图, 该方法包括:  As shown in FIG. 3, it is a flowchart of an embodiment of a method for directly performing communication between wireless terminals in Embodiment 1 of the present invention. The method includes:
步骤 201、 运营商通过现有的无线网络向小区内的各个无线终端发送用 于直接通信的密钥;  Step 201: The operator sends a key for direct communication to each wireless terminal in the cell through the existing wireless network.
运营商通过基站仅向允许使用直接通信业务的无线终端发送密钥, 具体 地, 运营商将无线终端分成 A,B,C,D四类:  The operator transmits the key only to the wireless terminal that allows direct communication service through the base station. Specifically, the operator divides the wireless terminal into four categories: A, B, C, and D:
对于 A类无线终端, 运营商向该无线终端分配一个单独的密钥, 并将该 密钥发送给该无线终端以及小区内的其它无线终端; For a Class A wireless terminal, the operator assigns a separate key to the wireless terminal and will Sending a key to the wireless terminal and other wireless terminals in the cell;
对于 B类无线终端, 运营商向该无线终端分配一个单独的密钥, 并将该 密钥发送给该无线终端, 但不将小区内其它无线终端的密钥发送给该无线终 端;  For a class B wireless terminal, the operator assigns a separate key to the wireless terminal, and sends the key to the wireless terminal, but does not send the key of the other wireless terminal in the cell to the wireless terminal;
对于 C类无线终端, 运营商不为该终端分配单独的密钥, 但将小区内其 它无线终端的密钥发送给该无线终端;  For a class C wireless terminal, the operator does not assign a separate key to the terminal, but sends a key of another wireless terminal in the cell to the wireless terminal;
对于 D类无线终端, 运营商既不为该终端分配密钥, 也不向其发送任何 密钥。  For a Class D wireless terminal, the operator does not assign a key to the terminal and does not send any keys to it.
由于 D类终端没有任何密钥, 因此该类终端不能实现终端间直接通信业 务。  Since Class D terminals do not have any keys, such terminals cannot implement direct communication between terminals.
运营商划分四类无线终端通常是根据终端用户所属的套餐类型来决定的, 例如, 一些没有购买直通业务套餐的用户就被分到 D类, 一些只能享受部分 直通业务的套餐用户被划分到 B类, 或者 C类, 享受全部业务的套餐用户为 A类用户。  The four types of wireless terminals that operators divide are usually determined according to the type of the package to which the end user belongs. For example, some users who do not purchase the direct service package are assigned to the D class, and some package users who can only enjoy some direct services are classified. Class B, or Class C, the package users who enjoy all the services are Class A users.
工程实现中, 运营商通常是通过基站来将上述密钥发送给无线终端, 通 常是将无线终端置于连接状态 ( RRC— connected ) , 然后通过专用信令来发 送密钥至无线终端;  In engineering implementation, the operator usually sends the above key to the wireless terminal through the base station, usually placing the wireless terminal in a connected state (RRC-connected), and then transmitting the key to the wireless terminal through dedicated signaling;
步骤 202、 无线终端 X发起直通业务请求, 并以先前分配给该无线终端 的密钥对发送的请求进行加密;  Step 202: The wireless terminal X initiates a direct service request, and encrypts the request sent by the key previously allocated to the wireless terminal.
该无线终端 X为发送端, 该无线终端 X只能是前述的 A类或者 B类无 线终端;  The wireless terminal X is a transmitting end, and the wireless terminal X can only be the aforementioned Class A or Class B wireless terminal;
步骤 203、 无线终端 Y侦听小区内来自其它无线终端的直通业务请求, 并按照自身所知的密钥对接收到的直通业务请求进行解密。  Step 203: The wireless terminal Y listens for a direct service request from another wireless terminal in the cell, and decrypts the received direct service request according to a key known by the user.
该无线终端 Y为接收端, 该无线终端 Y只能是前述的 A类或者 C类终 端。  The wireless terminal Y is a receiving end, and the wireless terminal Y can only be the aforementioned class A or class C terminal.
根据前述不同的类型无线终端所有的密钥组合, 可以有下述可能: According to all the key combinations of the different types of wireless terminals mentioned above, the following possibilities are possible:
1 )对于 A类终端, 由于其密钥是被网络中所有终端所知的, 该无线终 端可以接收其它无线终端的数据, 同时其它无线终端也可以接收该无线终端 的数据; 1) For a class A terminal, since its key is known by all terminals in the network, the wireless terminal can receive data of other wireless terminals, and other wireless terminals can also receive the wireless terminal. The data;
2 )对于 B类终端, 它只知道分配给自己的密钥, 该无线终端可以被其 它无线终端所发现, 但该无线终端无法发现其它无线终端;  2) For a class B terminal, it only knows the key assigned to itself, the wireless terminal can be discovered by other wireless terminals, but the wireless terminal cannot discover other wireless terminals;
3 )对于 C类终端, 它本身没有被分配密钥, 但它知道小区内其它无线 终端的密钥, 因此该无线终端可以发现其它无线终端, 但其它无线终端无法 发现该无线终端。  3) For a class C terminal, it does not have a key assigned by itself, but it knows the keys of other wireless terminals in the cell, so the wireless terminal can discover other wireless terminals, but other wireless terminals cannot discover the wireless terminal.
综上所述, 运营商利用分配给无线终端的密钥可以控制该无线终端的直 通业务实现。  In summary, the operator can control the direct service implementation of the wireless terminal by using the key assigned to the wireless terminal.
实施例二 Embodiment 2
如图 4所示, 是本发明图 2所示实施例二中的无线终端间直接进行通信 的方法实施例的流程图, 本实施例对应图 2所示的场景, 该场景中直通通信 的无线终端和实施例一中的直通通信的无线终端相比, 不同点是: 终端间传 输数据需要经过本地基站的中继。 密钥可以放置在本地基站内, 并由本地基 站根据无线终端的不同类型来进行加密操作。 具体的步骤如下:  As shown in FIG. 4, it is a flowchart of a method for directly performing communication between wireless terminals in the second embodiment of the present invention. The present embodiment corresponds to the scenario shown in FIG. 2, and the wireless communication of the through communication in the scenario is shown in FIG. The difference between the terminal and the wireless communication terminal in the first embodiment is that: the data transmission between the terminals needs to be relayed by the local base station. The key can be placed in the local base station and the local base station performs the encryption operation according to the different types of the wireless terminal. The specific steps are as follows:
步骤 301、 无线基站根据无线终端的类型将对应的接收数据的密钥发送 给各个无线终端, 与实施例一类似, 无线终端的类型包括下列四种:  Step 301: The radio base station sends a key corresponding to the received data to each wireless terminal according to the type of the wireless terminal. Similar to the first embodiment, the types of the wireless terminal include the following four types:
1 )对于 A类终端, 该无线终端可以接收其它无线终端的数据, 同时其 它无线终端也可以接收该无线终端的数据;  1) For a class A terminal, the wireless terminal can receive data of other wireless terminals, and other wireless terminals can also receive data of the wireless terminal;
2 )对于 B类终端, 该无线终端可以被其它无线终端所发现, 但该无线 终端无法发现其它无线终端;  2) For a class B terminal, the wireless terminal can be found by other wireless terminals, but the wireless terminal cannot discover other wireless terminals;
3 )对于 C类终端, 该无线终端可以发现其它无线终端, 但其它无线终 端无法发现该无线终端;  3) For a class C terminal, the wireless terminal can discover other wireless terminals, but other wireless terminals cannot discover the wireless terminal;
4 )对于 D类终端, 该无线终端既不能发现其它无线终端, 其它无线终 端也无法发现该无线终端;  4) For a class D terminal, the wireless terminal cannot discover other wireless terminals, and other wireless terminals cannot discover the wireless terminal;
与实施例一不同的是,无线基站仅将解密数据的密钥发送给 A类和 C类 的终端, 即对于 A类和 C类无线终端, 无线基站将解密小区内的其它无线终 端所发送数据的密钥发送给该无线终端; 对于 B类和 D类无线终端, 无线基站不向其发送任何密钥; 步骤 302、无线终端 X发起直通业务请求,该业务请求发送至无线基站; 该无线终端 X为发送端; Different from the first embodiment, the radio base station only transmits the key of the decrypted data to the terminals of the class A and the class C, that is, for the class A and class C wireless terminals, the radio base station will decrypt the data sent by other wireless terminals in the cell. The key is sent to the wireless terminal; For the class B and class D wireless terminals, the wireless base station does not send any key to it; step 302, the wireless terminal X initiates a direct service request, and the service request is sent to the wireless base station; the wireless terminal X is a transmitting end;
步骤 303、 无线基站根据无线终端的类型决定是否接受前述业务请求, 并选择一个密钥对业务数据进行加密;  Step 303: The radio base station determines whether to accept the foregoing service request according to the type of the wireless terminal, and selects a key to encrypt the service data.
对于 A类和 B类无线终端, 无线基站接受其发起的直通业务请求; 对于 C类和 D类无线终端, 无线基站不接受其发起的直通业务请求; 对于 A类和 B类无线终端,无线基站预先为其配置一个单独的加密数据 的密钥, 并用该密钥对其发送的数据进行加密, 并将加密后的数据发送到整 个小区;  For Class A and Class B wireless terminals, the wireless base station accepts the direct service request initiated by it; for Class C and Class D wireless terminals, the wireless base station does not accept the direct service request initiated by it; for Class A and Class B wireless terminals, the wireless base station Pre-configure a separate key for encrypting data, encrypt the data sent by the key, and send the encrypted data to the entire cell;
步骤 304、 无线终端 X持续发送直通业务数据, 无线基站将数据加密后 发送至整个小区。  Step 304: The wireless terminal X continuously sends the direct service data, and the wireless base station encrypts the data and sends the data to the entire cell.
同时, 无线终端 Y侦听小区内来自其它无线终端的直通业务数据, 并按 照自身所知的密钥对接收到的数据进行解密。  At the same time, the wireless terminal Y listens for the straight-through service data from other wireless terminals in the cell, and decrypts the received data according to the key known by itself.
该无线终端 Y为接收端, 按照步骤 S301的描述, 只有 A类和 C类无线 终端才有小区内其它无线终端的密钥,因此只有 A类和 C类无线终端能够解 密所接收的数据。  The wireless terminal Y is a receiving end. According to the description of step S301, only the class A and class C wireless terminals have the keys of other wireless terminals in the cell, so only the class A and class C wireless terminals can decrypt the received data.
并且对于 A类终端还可以发送数据,其所发送的数据经过无线基站加密 后可以被小区内其它无线终端所解密。  Moreover, for the class A terminal, data can also be transmitted, and the data transmitted by the terminal can be decrypted by other wireless terminals in the cell after being encrypted by the wireless base station.
上述实施例中, 通过基站为无线终端发送密钥, 为运营商控制终端间直 接通信业务的进行提供了可能性, 推动了技术的发展; 其次, 该方法也非常 简单、 可行, 在实现时可以重用符合现有无线协议的用户终端和最大限度地 利用现有无线网络, 运营商也不需要增加很多网络重建成本。  In the above embodiment, the base station transmits a key for the wireless terminal, which provides a possibility for the operator to control the direct communication service between the terminals, and promotes the development of the technology. Secondly, the method is also very simple and feasible, and can be implemented. By reusing user terminals that conform to existing wireless protocols and maximizing the use of existing wireless networks, operators do not need to increase the cost of network re-establishment.
如图 5所示, 是本发明无线终端实施例的结构示意图, 该无线终端包括 处理发送模块 51和接收处理模块 52 , 其中: As shown in FIG. 5, it is a schematic structural diagram of an embodiment of a wireless terminal according to the present invention. The wireless terminal includes a processing sending module 51 and a receiving processing module 52, where:
处理发送模块, 用于该无线终端为发送端时, 直接或通过基站向接收端 发送加密后的直通业务请求; Processing a sending module, when the wireless terminal is a transmitting end, directly or through a base station to a receiving end Sending an encrypted direct service request;
接收处理模块, 用于该无线终端作为接收端时, 接收基站发送的密钥, 并使用所述密钥对接收到的直通业务请求进行解密。  The receiving processing module is configured to: when the wireless terminal is used as the receiving end, receive a key sent by the base station, and use the key to decrypt the received direct service request.
其中, 所述处理发送模块, 具体用于: 接收基站发送的通信密钥, 使用 所述通信密钥对直通业务请求进行加密, 并向所述接收端发送所述加密后的 直通业务请求; 所述接收处理模块, 具体用于: 接收所述基站发送的所述通 信密钥, 并使用所述通信密钥对接收到的直通业务请求进行解密。 该种情况 与图 3描述的方法实施例相对应。  The processing and sending module is specifically configured to: receive a communication key sent by the base station, encrypt the direct service request by using the communication key, and send the encrypted direct service request to the receiving end; The receiving processing module is specifically configured to: receive the communication key sent by the base station, and decrypt the received direct service request by using the communication key. This case corresponds to the method embodiment described in Fig. 3.
同样地,所述处理发送模块,具体用于:向所述基站发送直通业务请求, 所述基站根据所述发送端的类型确定接受所述直通业务请求, 并选择一个密 钥对所述业务请求进行加密, 然后向所述接收端发送所述加密后的直通业务 请求; 所述接收处理模块, 具体用于: 接收所述基站发送的解密密钥, 并使 用所述解密密钥对接收到的直通业务请求进行解密。 该种情况与图 4描述的 方法实施例相对应。  Similarly, the processing sending module is specifically configured to: send a direct service request to the base station, the base station determines to accept the direct service request according to the type of the sending end, and selects a key to perform the service request. Encrypting, and then sending the encrypted pass-through service request to the receiving end; the receiving processing module is specifically configured to: receive a decryption key sent by the base station, and use the decryption key pair to receive the pass-through The business request is decrypted. This case corresponds to the method embodiment described in Fig. 4.
其中, 所述发送端为 A类或 B类无线终端, 所述接收端为 A类或 C类 无线终端。 所述 A类终端为既能接收其它无线终端的数据, 又能被其它无线 终端接收数据的无线终端; 所述 B类终端为只能被其它无线终端接收数据的 无线终端; 所述 C类终端为只能接收其它无线终端的数据的无线终端。  The sending end is a class A or class B wireless terminal, and the receiving end is a class A or class C wireless terminal. The class A terminal is a wireless terminal capable of receiving data of other wireless terminals and receiving data by other wireless terminals; the class B terminal is a wireless terminal that can only receive data by other wireless terminals; the class C terminal A wireless terminal that can only receive data from other wireless terminals.
上述无线终端, 可以在网络侧的控制下与另一无线终端直接通信。  The above wireless terminal can directly communicate with another wireless terminal under the control of the network side.
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序 来指令相关硬件完成, 上述程序可以存储于计算机可读存储介质中, 如只读 存储器、 磁盘或光盘等。 可选地, 上述实施例的全部或部分步骤也可以使用 一个或多个集成电路来实现。 相应地, 上述实施例中的各模块 /单元可以釆用 硬件的形式实现, 也可以釆用软件功能模块的形式实现。 本发明不限制于任 何特定形式的硬件和软件的结合。 One of ordinary skill in the art will appreciate that all or a portion of the above steps may be accomplished by a program that instructs the associated hardware to be stored in a computer readable storage medium, such as a read only memory, a magnetic disk, or an optical disk. Alternatively, all or part of the steps of the above embodiments may also be implemented using one or more integrated circuits. Correspondingly, each module/unit in the above embodiment may be implemented in the form of hardware or in the form of a software function module. The invention is not limited to any specific form of combination of hardware and software.
以上实施例仅用以说明本发明的技术方案而非限制, 仅仅参照较佳实施 例对本发明进行了详细说明。 本领域的普通技术人员应当理解, 可以对本发 明的技术方案进行修改或者等同替换, 而不脱离本发明技术方案的精神和范 围, 均应涵盖在本发明的权利要求范围当中。 The above embodiments are only intended to illustrate the technical solutions of the present invention and are not to be construed as limiting the invention. Those of ordinary skill in the art will appreciate that the present invention can be used The modifications and equivalents of the technical solutions of the present invention are intended to be included within the scope of the appended claims.
工业实用性 Industrial applicability
釆用本发明实施例的有益效果是显而易见的, 首先它为运营商控制终端 间直接通信业务的进行提供了可能性, 推动了技术的发展; 其次, 该方法也 非常简单、 可行, 在实现时可以重用符合现有无线协议的用户终端和最大限 度地利用现有无线网络, 运营商也不需要增加很多网络重建成本。  The beneficial effects of the embodiments of the present invention are obvious. First, it provides a possibility for the operator to control the direct communication service between the terminals, and promotes the development of the technology. Secondly, the method is also very simple and feasible. Operator terminals that conform to existing wireless protocols can be reused and existing wireless networks can be utilized to the maximum extent, and operators do not need to increase the cost of network reconstruction.

Claims

权 利 要 求 书 claims
1、 一种无线终端间直接通信的方法, 该方法包括: 1. A method for direct communication between wireless terminals, the method includes:
发送端直接或通过基站向接收端发送加密后的直通业务请求; The sending end sends the encrypted direct service request to the receiving end directly or through the base station;
所述接收端接收基站发送的密钥, 并使用所述密钥对接收到的直通业务 请求进行解密。 The receiving end receives the key sent by the base station, and uses the key to decrypt the received direct service request.
2、 根据权利要求 1所述的方法, 其中, 2. The method according to claim 1, wherein,
所述发送端直接或通过基站向接收端发送加密后的直通业务请求,包括: 所述发送端接收基站发送的通信密钥, 使用所述通信密钥对直通业务请 求进行加密, 并向所述接收端发送所述加密后的直通业务请求; The sending end sends an encrypted pass-through service request to the receiving end directly or through a base station, including: the sending end receives a communication key sent by the base station, uses the communication key to encrypt the pass-through service request, and sends the pass-through service request to the receiving end. The receiving end sends the encrypted direct service request;
所述接收端接收基站发送的密钥, 并使用所述密钥对接收到的直通业务 请求进行解密, 包括: The receiving end receives the key sent by the base station and uses the key to decrypt the received direct service request, including:
所述接收端接收所述基站发送的所述通信密钥, 并使用所述通信密钥对 接收到的直通业务请求进行解密。 The receiving end receives the communication key sent by the base station, and uses the communication key to decrypt the received direct service request.
3、 根据权利要求 1所述的方法, 其中, 3. The method according to claim 1, wherein,
所述发送端直接或通过基站向接收端发送加密后的直通业务请求,包括: 所述发送端向所述基站发送直通业务请求, 所述基站根据所述发送端的 类型确定接受所述直通业务请求,并选择一个密钥对所述业务请求进行加密, 然后向所述接收端发送所述加密后的直通业务请求; The sending end sends an encrypted direct service request to the receiving end directly or through a base station, including: the sending end sends a direct service request to the base station, and the base station determines to accept the direct service request according to the type of the sending end , and select a key to encrypt the service request, and then send the encrypted pass-through service request to the receiving end;
所述接收端接收基站发送的密钥, 并使用所述密钥对接收到的直通业务 请求进行解密, 包括: The receiving end receives the key sent by the base station and uses the key to decrypt the received direct service request, including:
所述接收端接收所述基站发送的解密密钥, 并使用所述解密密钥对接收 到的直通业务请求进行解密。 The receiving end receives the decryption key sent by the base station, and uses the decryption key to decrypt the received direct service request.
4、 根据权利要求 2或 3所述的方法, 其中, 4. The method according to claim 2 or 3, wherein,
所述发送端为 A类或 B类无线终端, 所述接收端为 A类或 C类无线终 端。 The sending end is a Class A or Class B wireless terminal, and the receiving end is a Class A or Class C wireless terminal.
5、 根据权利要求 4所述的方法, 其中, 5. The method according to claim 4, wherein,
所述 A类终端为既能接收其它无线终端的数据,又能被其它无线终端接 收数据的无线终端; The type A terminal can not only receive data from other wireless terminals, but also be connected by other wireless terminals. Wireless terminal for receiving data;
所述 B类终端为只能被其它无线终端接收数据的无线终端; The Class B terminal is a wireless terminal that can only receive data from other wireless terminals;
所述 C类终端为只能接收其它无线终端的数据的无线终端。 The Class C terminal is a wireless terminal that can only receive data from other wireless terminals.
6、 一种无线终端, 该无线终端包括: 6. A wireless terminal, the wireless terminal includes:
处理发送模块, 设置为: 该无线终端为发送端时, 直接或通过基站向接 收端发送加密后的直通业务请求; 以及 The processing sending module is set to: When the wireless terminal is the sending end, it sends the encrypted pass-through service request to the receiving end directly or through the base station; and
接收处理模块, 设置为: 该无线终端作为接收端时, 接收基站发送的密 钥, 并使用所述密钥对接收到的直通业务请求进行解密。 The reception processing module is configured to: when the wireless terminal serves as the receiving end, receive the key sent by the base station, and use the key to decrypt the received pass-through service request.
7、 根据权利要求 6所述的无线终端, 其中, 7. The wireless terminal according to claim 6, wherein,
所述处理发送模块, 设置为: The processing and sending module is set to:
接收基站发送的通信密钥 ,使用所述通信密钥对直通业务请求进行加密, 并向所述接收端发送所述加密后的直通业务请求; Receive the communication key sent by the base station, use the communication key to encrypt the direct service request, and send the encrypted direct service request to the receiving end;
所述接收处理模块, 设置为: The reception processing module is set to:
接收所述基站发送的所述通信密钥, 并使用所述通信密钥对接收到的直 通业务请求进行解密。 Receive the communication key sent by the base station, and use the communication key to decrypt the received direct service request.
8、 根据权利要求 6所述的无线终端, 其中, 8. The wireless terminal according to claim 6, wherein,
所述处理发送模块, 设置为: 向所述基站发送直通业务请求, 所述基站 根据所述发送端的类型确定接受所述直通业务请求, 并选择一个密钥对所述 业务请求进行加密, 然后向所述接收端发送所述加密后的直通业务请求; 所述接收处理模块, 设置为: 接收所述基站发送的解密密钥, 并使用所 述解密密钥对接收到的直通业务请求进行解密。 The processing and sending module is configured to: send a direct service request to the base station, the base station determines to accept the direct service request according to the type of the sending end, and selects a key to encrypt the service request, and then sends the request to the base station. The receiving end sends the encrypted pass-through service request; the reception processing module is configured to: receive the decryption key sent by the base station, and use the decryption key to decrypt the received pass-through service request.
9、 根据权利要求 6或 7所述的无线终端, 其中, 9. The wireless terminal according to claim 6 or 7, wherein,
所述发送端为 A类或 B类无线终端, 所述接收端为 A类或 C类无线终 端。 The sending end is a Class A or Class B wireless terminal, and the receiving end is a Class A or Class C wireless terminal.
10、 根据权利要求 9所述的无线终端, 其中, 10. The wireless terminal according to claim 9, wherein,
所述 A类终端为既能接收其它无线终端的数据, 又能被其它无线终端接 收数据的无线终端; The Class A terminal is a wireless terminal that can not only receive data from other wireless terminals, but also be able to receive data from other wireless terminals;
所述 B类终端为只能被其它无线终端接收数据的无线终端; The Class B terminal is a wireless terminal that can only receive data from other wireless terminals;
所述 C类终端为只能接收其它无线终端的数据的无线终端。 The Class C terminal is a wireless terminal that can only receive data from other wireless terminals.
PCT/CN2013/082354 2012-10-09 2013-08-27 Method for direct communication between wireless terminals and wireless terminal thereof WO2014056359A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210379824.5 2012-10-09
CN201210379824.5A CN103716786B (en) 2012-10-09 2012-10-09 The method and wireless terminal of direct communication between wireless terminal

Publications (1)

Publication Number Publication Date
WO2014056359A1 true WO2014056359A1 (en) 2014-04-17

Family

ID=50409258

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/082354 WO2014056359A1 (en) 2012-10-09 2013-08-27 Method for direct communication between wireless terminals and wireless terminal thereof

Country Status (2)

Country Link
CN (1) CN103716786B (en)
WO (1) WO2014056359A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090325625A1 (en) * 2008-06-03 2009-12-31 Nokia Corporation Method, apparatus and computer program for power control to mitigate interference
CN101835098A (en) * 2010-03-26 2010-09-15 清华大学 Dense user area-orientated wireless network reconstructed communication method
CN102172090A (en) * 2011-04-28 2011-08-31 华为技术有限公司 Method and device for communication between terminals

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090325625A1 (en) * 2008-06-03 2009-12-31 Nokia Corporation Method, apparatus and computer program for power control to mitigate interference
CN101835098A (en) * 2010-03-26 2010-09-15 清华大学 Dense user area-orientated wireless network reconstructed communication method
CN102172090A (en) * 2011-04-28 2011-08-31 华为技术有限公司 Method and device for communication between terminals

Also Published As

Publication number Publication date
CN103716786B (en) 2019-03-12
CN103716786A (en) 2014-04-09

Similar Documents

Publication Publication Date Title
JP5597676B2 (en) Key material exchange
KR101648158B1 (en) Wireless communication using concurrent re-authentication and connection setup
CN101478753B (en) Security management method and system for IMS network access by WAPI terminal
TWI420921B (en) Fast authentication between heterogeneous wireless networks
US11109206B2 (en) Security method and system for supporting discovery and communication between proximity based service terminals in mobile communication system environment
CN102056157B (en) Method, system and device for determining keys and ciphertexts
CN104618901A (en) Method for processing NAS information in WTRU and WTRU
CA2650050A1 (en) Method and system for providing cellular assisted secure communications of a plurality of ad hoc devices
US8661244B2 (en) Method and apparatus for establishing secured link between devices
WO2012083828A1 (en) Method, base station and system for implementing local routing
WO2015164999A1 (en) Virtual card downloading method, terminal and intermediate device
JP4357339B2 (en) Wireless communication system, access point, and wireless communication method
CN112994873A (en) Certificate application method and equipment
CN116746182A (en) Secure communication method and apparatus
WO2014172836A1 (en) Method and apparatus for accessing network, and network system
WO2022027476A1 (en) Key management method and communication apparatus
CN103634744A (en) Cluster group call end-to-end encryption realization method
CN103200191B (en) Communicator and wireless communications method
WO2014056359A1 (en) Method for direct communication between wireless terminals and wireless terminal thereof
JP4953078B2 (en) Wireless LAN terminal and communication method thereof
CN116746179A (en) WLAN multilink TDLS key derivation
US20230308868A1 (en) Method, devices and system for performing key management
WO2023197576A1 (en) Relay transmission method, switching method, apparatus, and user equipment
CN116963054B (en) WLAN multilink TDLS key derivation
GB2476088A (en) Wireless communication system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13845323

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13845323

Country of ref document: EP

Kind code of ref document: A1