CN103595750A - Method, terminal and network side for peer-to-pear communication - Google Patents

Method, terminal and network side for peer-to-pear communication Download PDF

Info

Publication number
CN103595750A
CN103595750A CN201210294608.0A CN201210294608A CN103595750A CN 103595750 A CN103595750 A CN 103595750A CN 201210294608 A CN201210294608 A CN 201210294608A CN 103595750 A CN103595750 A CN 103595750A
Authority
CN
China
Prior art keywords
information
terminal
message
found
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210294608.0A
Other languages
Chinese (zh)
Inventor
杨国瑞
黄开缔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201210294608.0A priority Critical patent/CN103595750A/en
Priority to PCT/CN2013/074941 priority patent/WO2014026489A1/en
Publication of CN103595750A publication Critical patent/CN103595750A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed are a method, a terminal, and a network side for peer-to-peer communication. The method used for the peer-to-peer communication comprises: sending a first message to the network side, so as to instruct the network side to send a second message according to the first message; and receiving the second message sent by the network side, discovering a target terminal and/or target characteristic information according to the second message, and/or performing security communication. According to the foregoing method provided by the present invention, the network side assists a first terminal in discovering the target terminal or the target characteristic information, or assists the first terminal in performing the security communication, so as to realize the purposes of energy conservation and security of communication.

Description

Method, terminal and network side for end to end communication
Technical field
The present invention relates to end-to-end field, particularly relate to a kind of method for end to end communication, terminal and network side.
Background technology
In WLAN (wireless local area network), D2D(Device to Device, end-to-end) terminal is by access point AP(Access Point, access point) situation under, can realize mutual discovery and communicate by letter between end-to-end with contiguous.Wherein, end-to-endly in order to allow contiguous end-to-end discovery oneself, need to periodically send beacon message or other broadcasts, contiguous is end-to-end by receiving and resolve described information, and then obtains end-to-end identity or other information.
Refer to Fig. 1, Fig. 1 is for finding the schematic block diagram of end-to-end system in prior art.In prior art for finding that end-to-end system 10 comprises a NAN terminal 11 and the 2nd NAN terminal 12, the one NAN terminal 11 periodically sends beacon message or other broadcasts, the 2nd NAN terminal 12 is by receiving and resolve described information, to obtain identity or other information of a NAN terminal 11.But, in prior art, the one NAN terminal 11 sends beacon message or other broadcasts have blindness, a NAN terminal 11 periodically sends described message in the situation that periphery NAN terminal not being identified, when the 2nd NAN terminal 12 does not exist, the one NAN terminal 11 still periodically sends beacon message or other broadcasts, causes a NAN terminal 11 to consume unnecessary energy, is unfavorable for realizing energy-conservation object.In addition, the equal unencryption protection of beacon message described in prior art or other broadcast, therefore for finding that end-to-end system 10 can not meet user for the requirement of secret.
Summary of the invention
The technical problem that the present invention mainly solves is to provide a kind of method for end to end communication, terminal and network side, by network side, assist first terminal to find target terminal or target signature information, or auxiliary first terminal carries out secure communication, to realize communication energy-saving and safe object.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is: a kind of method for end to end communication is provided, and it comprises: to network side, send the first message, with indication network lateral root, according to the first message, send the second message; Receive the second message that network side sends, and find target terminal and/or target signature information according to the second message, and/or carry out secure communication.
For solving the problems of the technologies described above, another technical solution used in the present invention is: a kind of method for end to end communication is provided, and it comprises: receive the first message sending from first terminal; According to the auxiliary first terminal of the first message, find target terminal and/or target signature information, and/or auxiliary first terminal carries out secure communication, and send the second message to first terminal.
For solving the problems of the technologies described above, another technical solution used in the present invention is: a kind of terminal for end to end communication is provided, terminal comprises first terminal, wherein, first terminal sends the first message to network side, the second message sending according to the first message with indication network lateral root, and first terminal receives the second message, and find target terminal and/or target signature information according to the second message, and/or carry out secure communication.
For solving the problems of the technologies described above, another technical solution used in the present invention is: a kind of network side for end to end communication is provided, network side receives the first message sending from first terminal, according to the auxiliary first terminal of the first message, find target terminal and/or target signature information, and/or auxiliary first terminal carries out secure communication, and send the second message to first terminal.
The invention has the beneficial effects as follows: in the present invention, by network side, assist first terminal to find target terminal or target signature information, or auxiliary first terminal carries out secure communication, to realize communication energy-saving and safe object.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing of required use during embodiment is described is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.Wherein:
Fig. 1 is for finding the schematic block diagram of end-to-end system in prior art;
Fig. 2 is the flow chart of the method for end to end communication of first embodiment of the invention;
Fig. 3 is the structural representation of the system for end to end communication of first embodiment of the invention;
Fig. 4 is the structural representation of the system for end to end communication of second embodiment of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making the every other embodiment obtaining under performing creative labour prerequisite, belong to the scope of protection of the invention.
Consult Fig. 2, Fig. 2 is the flow chart of the method for end to end communication of first embodiment of the invention.The method for end to end communication that the present embodiment discloses comprises the following steps:
Step 201: first terminal sends the first message to network side;
Step 202: network side receives the first message, find target terminal and/or target signature information, and/or auxiliary first terminal carries out secure communication according to the auxiliary first terminal of the first message;
Step 203: network side sends the second message to first terminal;
Step 204: first terminal receives the second message, and find target terminal and/or target signature information according to the second message, and/or carry out secure communication.
In the present embodiment, first terminal can be NAN(Neighbor Awareness Network, contiguous sensing network) terminal, P2P(Peer to Peer, equity) terminal or other relate to the terminal of D2D communications applications.
Wherein, network side can be WLAN (wireless local area network) (Wireless Local Area Networks, WLAN), wireless cellular network, wireless wide-area or other wireless networks.In the present embodiment, network side is preferably cellular network, cellular network comprises: GSM(Global System For Mobile Communication, global system for mobile communications) network, CDMA(Code Division Multiple Access, code division multiple access) network, 3GPP(The3rd Generation Partnership Project, third generation partner program) network and other cellular networks well known in the art.Wherein, cellular network is preferably 3GPP, and 3GPP is seamlessly transitted to 3G network by 2G network for realizing.
In the present embodiment, the auxiliary first terminal of network side is found target terminal and/or target signature information, and/or auxiliary first terminal carries out secure communication, network side comprises eNB(Evolved NodeB, evolved base station), MME(Mobility Management Entity), HLR(Home Location Register, attaching position register) or the network element of new definition.Wherein, network side preferably includes eNB.
Be different from the situation of prior art, the method for end to end communication that the present embodiment discloses assists first terminal to find that target terminal or target signature information or auxiliary first terminal carry out secure communication by network side, first terminal is found target terminal or target signature information or carries out secure communication according to the second message, realizing communication energy-saving and safe object.
The present invention further provides the method for end to end communication of the second embodiment, the method for end to end communication of the present embodiment is elaborated on the basis of the first embodiment.
In step 201, first terminal sends the first message.Before first terminal sends the first message, first terminal is by random flow process access network side, first terminal and network side are set up RRC(Radio Resource Control, and Radio Resource is controlled) connect, between first terminal and network side, further carry out authentication identification.In other embodiments, those of ordinary skills can also be encrypted the first message, for example, RRC message or the NAS(Non Access Stratum of the first message for encrypting, Non-Access Stratum) message, RRC message or NAS message comprise Location Area Update Request(band of position update request) message, Attach Complete(has connected) message, RAU Complete(Route Area Update Complete, Routing Area Update completes) message, TAU Complete(Tracking Area Update Complete, tracing section updating completes) message or NAS SMP(Service Management Point, service management point) message of the 3GPP message such as message or new definition.
In the present embodiment, the first message comprises at least one in identity identifier information, the first assistance requests information, the second assistance requests information or the 3rd assistance requests information of first terminal.Wherein, the identity of the identity identifier message identification first terminal of first terminal, the identity identifier information of first terminal can be MAC(Medium Access Control, media access control) address, IMSI(International Mobile Subscriber Identification Number, international mobile subscriber identity), P-TMSI(Packet Temperate Mobile Subscription Identity, grouping temporary mobile subscriber identity), TMSI(Temporary Mobile Subscriber Identity, interim identification code), GUTI(Globally Unique Temporary Identifier, the interim identification code in the whole world), S-TMI(System Architecture Evolution-Temporary Mobile SubscriberIdentity, the interim identification code of System Architecture Evolution) or RNTI(Radio Network Temporary Identity, wireless network is identified temporarily) or other identity informations.
The first assistance requests information comprises at least one in the identity identifier information of the target terminal that primary importance information, expectation are found or the identifier information of the target signature information that expectation is found.Wherein, the position of target terminal or the position that target signature information is found in first terminal expectation are found in the current location of primary importance message identification first terminal, first terminal expectation, and primary importance information is preferably cell id.The identity identifier message identification first terminal of the target terminal that expectation is found is desirably in the identity identifier of the target terminal of the position of primary importance message identification finding, the identity identifier of the target terminal that expectation is found can be MAC Address, IMSI, P-TMSI, TMSI, GUTI, S-TMI, RNTI or other (as telephone number) identity informations.The identifier message identification first terminal of the target signature information that expectation is found is desirably in the target signature information identifier of the position discovery of primary importance message identification, target signature information refers to other D2D terminals of description of first terminal expectation discovery or the characteristic information of other wireless device, wherein, characteristic information can be the information on services that other D2D terminals or other wireless devices provide, for example, printer service information, show the information on services such as information on services or fax services information, characteristic information also can be the social information that other D2D terminals or other wireless devices provide, for example, game hobby information, purchase by group social informations such as convening information.
The second assistance requests information comprises second place information, and expects the identity identifier information of found target terminal or do not expect at least one in the identity identifier information of found non-target terminal.
Wherein, the current location of second place message identification first terminal, first terminal are expected the position that the position of being found by target terminal or the target signature information that first terminal provided are found by target terminal, and second place information is preferably cell id.
Expect that the identity identifier message identification first terminal of found target terminal is desirably in the identity identifier of the found target terminal in position of second place message identification, the identity identifier information of expecting found target terminal presents with the form of the first white list.
Do not expect that the identity identifier message identification first terminal of found non-target terminal is not desirably in the identification identifier of the found non-target terminal in position of second place message identification, do not expect that the identity identifier information of found non-target terminal presents with the first blacklist form.
Further, the second assistance requests information comprises the identifier information of the characteristic information that second place information and first terminal provide, and the identity identifier information of the found target terminal of characteristic information that provides of expectation first terminal or do not expect at least one in the identity identifier information of the found non-target terminal of characteristic information that first terminal provides.
Wherein, the identifier of the characteristic information that the expectation that the identifier message identification first terminal of the characteristic information that first terminal provides provides in the position of second place message identification is found by other target terminals, characteristic information refers to that first terminal expects the information of found description first terminal feature, characteristic information can first terminal provide such as printer service information, show that the information on services such as information on services or fax services information, characteristic information also can be first terminal and provide such as game hobby information, purchase by group social informations such as convening information.
The characteristic information that the identity identifier message identification first terminal of the found target terminal of characteristic information that expectation first terminal provides provides is expected the identity identifier of found target terminal in the position of second place message identification, the identity identifier information of the found target terminal of characteristic information that expectation first terminal provides presents with the form of the second white list.
Do not expect that the characteristic information that the identity identifier message identification first terminal of the found non-target terminal of characteristic information that first terminal provides provides do not expect the identity identifier of found non-target terminal in the position of second place message identification, the identity identifier information of not expecting the found non-target terminal of characteristic information that first terminal provides presents with the form of the second blacklist.
The 3rd assistance requests information is used for asking the auxiliary first terminal of network side and target terminal to carry out secure communication, and the 3rd assistance requests information comprises that security parameter distributes indication information, and/or the identity identifier information of target terminal.
Security parameter distributes indication information to be used to indicate the security parameter that network side distributes first terminal and target terminal, security parameter can be seriatim with target terminal in the 3rd assistance requests information carry out corresponding, also can be corresponding with the auxiliary target terminal of finding of network side one by one.
The identity identifier of the target terminal of secure communication is carried out with it in the identity identifier information indication first terminal expectation of target terminal, with the form of the 3rd white list, presents.When the identity identifier information of target terminal is under special circumstances or while being a particular value, the expectation of indication first terminal is carried out secure communication with the auxiliary target terminal of finding of network side, for example the 3rd white list does not exist, or the 3rd white list is that the identity identifier of the target terminal in empty or the 3rd white list is particular value, and the identity identifier of target terminal can be but be not limited to be complete 1 or 0.
In step 202, network side receives the first message, and the step of assisting first terminal discovery target terminal or target signature information or auxiliary first terminal to carry out secure communication according to the first message comprises: network side is searched target terminal or target signature information in this locality according to the first message.Wherein, network side is searched target terminal or target signature information and is comprised multiple implementation method in this locality according to the first message, for example information bank retrieval, the methods such as list match.In the present embodiment, network side is preferably searched target terminal or target signature information according to the first message in this locality by list match.
Network side is set up according to the first message or is upgraded the first auxiliary discovery list or second and assist discovery list; Or, network side mates the 4th auxiliary discovery list of the first auxiliary discovery list and network side storing, or the 3rd auxiliary discovery list of the second auxiliary discovery list and network side storing is mated, and find target terminal or target signature information according to matching result.
At network side, according to the first message, set up or upgrade in the first auxiliary discovery list or the second auxiliary discovery list, network side receives after the first message of first terminal transmission, if network side stores first, do not assist discovery list or second to assist discovery list, network side is set up the first auxiliary discovery list or according to the second assistance requests information of the first message, sets up second and assist discovery list according to the first assistance requests information of the first message.If network side has been stored the first auxiliary discovery list or the second auxiliary discovery list, network side is found list or assists and find list according to the second assistance requests information updating second of the first message according to the first assistance requests information updating first of the first message is auxiliary.
The first auxiliary discovery list comprises identity identifier information and the primary importance information of first terminal, and the identity identifier information of target terminal found of expectation or at least one in the identifier information of the target signature information that expectation is found, wherein, first auxiliary find that the information of list is consistent with the form of the first assistance requests information in the first message.
Second auxiliary finds that list comprises identity identifier information and the second place information of first terminal, and expects the identity identifier information of found target terminal or do not expect at least one in the identity identifier information of found non-target terminal.
Or, second auxiliary finds that list comprises identifier information and the second place information of the characteristic information that first terminal provides, and the identity identifier information of the found target terminal of characteristic information that provides of expectation first terminal or do not expect at least one in the identity identifier information of the found non-target terminal of characteristic information that first terminal provides.
In the present embodiment, the 3rd auxiliary discovery list and the 4th auxiliary discovery list are that the second terminal is in the information of network side storing.The 3rd auxiliary discovery list comprises identity identifier information and the 3rd positional information of the second terminal.The 4th auxiliary finds that list comprises identity identifier information and the 4th positional information of the second terminal, and expects the identity identifier information of found target terminal or do not expect at least one in the identity identifier information of found non-target terminal.Or the 4th auxiliary finds that list comprises identifier information and the 4th positional information of the characteristic information that the second terminal provides, and expect the identity identifier information of the found target terminal of characteristic information that the second terminal provides or do not expect at least one in the identity identifier information of the found non-target terminal of characteristic information that the second terminal provides.Wherein, the 3rd positional information identifies the current location of the second terminal, the position that target terminal is found in the second terminal expectation or the position that the second terminal expects to find target signature information.The position that the target signature information expectation that the 4th positional information identifies position that the current location of the second terminal or the expectation of the second terminal found by target terminal or the second terminal to be provided is found by target terminal.Wherein, the second terminal can be NAN terminal, P2P terminal or other relate to the terminal of D2D communications applications, can be also access point AP(Access Point, access point) or other communication equipment such as advertisement website.
In network side mates the first auxiliary the 4th auxiliary discovery list of finding that list stores with network side, network side judges whether the primary importance information of the first auxiliary discovery list and the 4th positional information of the 4th auxiliary discovery list mate, if primary importance information is mated with the 4th positional information, the second terminal is the target terminal of first terminal.
And/or, network side judges whether the identity identifier information of the identity identifier information of the target terminal that the expectation of the first auxiliary discovery list is found and the second terminal of the 4th auxiliary discovery list mates, if the first auxiliary identity identifier information of target terminal of expectation discovery and identity identifier information matches of the second terminal of the 4th auxiliary discovery list of finding list, the second terminal is the target terminal of first terminal.
And/or, network side judges whether the identity identifier information of first terminal of the first auxiliary discovery list and the identity identifier information of the found target terminal of expectation of the 4th auxiliary discovery list mate, or whether mate with the identity identifier information of not expecting found non-target terminal of the 4th auxiliary discovery list, if the identity identifier information of the first terminal of the first auxiliary discovery list and the 4th is assisted the identity identifier information matches of the found target terminal of expectation of finding list or is assisted the identity identifier information of not expecting found non-target terminal of finding list not mate with the 4th, the second terminal is the target terminal of first terminal.
In network side mates the first auxiliary the 4th auxiliary discovery list of finding that list stores with network side, network side judges whether the primary importance information of the first auxiliary discovery list and the 4th positional information of the 4th auxiliary discovery list mate, if the 4th positional information of the primary importance information of the first auxiliary discovery list and the 4th auxiliary discovery list is mated, the characteristic information that the second terminal provides is the target signature information of first terminal.
And/or, network side judges whether the identifier information of the characteristic information that the identifier information of the target signature information that the expectation of the first auxiliary discovery list is found and the second terminal of the 4th auxiliary discovery list provide mates, if the first auxiliary identifier information of target signature information of expectation discovery and identifier information matches of the characteristic information that the second terminal of the 4th auxiliary discovery list provides of finding list, the characteristic information that the second terminal provides is the target signature information of first terminal.
And/or, network side judge first auxiliary find the identity identifier information of first terminal of list and whether the identity identifier information of the found target terminal of characteristic information that expectation second terminal of the 4th auxiliary discovery list provides mates or, whether mate with the identity identifier information of not expecting the found non-target terminal of characteristic information that the second terminal provides of the 4th auxiliary discovery list, if the first auxiliary identity identifier information of first terminal of list and identity identifier information matches of the found target terminal of characteristic information that expectation second terminal of the 4th auxiliary discovery list provides found, or do not mate with the identity identifier information of not expecting the found non-target terminal of characteristic information that the second terminal provides of the 4th auxiliary discovery list, the characteristic information that the second terminal provides is the target signature information of first terminal.
In the 3rd auxiliary discovery list of the second auxiliary discovery list of first terminal and network side storing is mated, network side judges that the second auxiliary second place information and the 3rd of finding list assists the 3rd positional information of list to mate and whether mate, if second place information is mated with the 3rd positional information, the second terminal is the target terminal of first terminal.
And/or, network side judges whether the identity identifier information of the found target terminal of expectation of the second auxiliary discovery list and the identity identifier information of the second terminal of the 3rd auxiliary discovery list mate, if the second auxiliary identity identifier information and the 3rd auxiliary identity identifier information matches of finding the second terminal of list of finding the found target terminal of expectation of list, the second terminal is the target terminal of first terminal.
And/or, network side judges whether the identity identifier information of the identity identifier information of the found target terminal of characteristic information that the described first terminal of expectation of the second auxiliary discovery list provides and the second terminal of the 3rd auxiliary discovery list mates, if the identity identifier information of the found target terminal of characteristic information that the described first terminal of expectation of the second auxiliary discovery list provides and the 3rd auxiliary identity identifier information matches of finding the second terminal of list, the second terminal is the target terminal of first terminal.
In other embodiments, those skilled in the art can adopt the method for data base querying to search target terminal completely, and the identity identifier information of the target terminal that network side is found by the expectation of the first assistance requests information of the first message is searched target terminal at 3GPP network element (such as MME or HLR etc.).
In the present embodiment, network side is by mating first terminal to confirm with the second terminal whether the second terminal is the target terminal of first terminal with upper type, in this case or in the situation that first terminal has been found that target terminal, network side carries out secure communication according to the auxiliary first terminal of the first message and target terminal.Wherein, network side distributes indication information by the security parameter corresponding with target terminal, is first terminal and target terminal distribution security parameter.In other embodiments, network side can, by the link configuration parametric distribution indication information corresponding with target terminal, be first terminal and target terminal distribute links configuration parameter.
The method of salary distribution of security parameter can have multiple implementation, it can be by directly random generation of network side, also can according to the attribute information of first terminal and target terminal, be produced by network side, for example, security parameter is calculated and is drawn according to the identity identifier information of first terminal and target terminal by network side, or described security parameter calculated and draw according to shared key information between first terminal or target terminal and network side by network side, its implementation is not limit.
In step 203, network side sends the second message to first terminal, and when the second message comprises security information, network side sends the second message by cipher mode to first terminal, and cipher mode preferably can be consistent with the cipher mode of the first message.
In the present embodiment, the second message comprises the first auxiliary discovery information, and the first auxiliary discovery information comprises at least one in the ability information of different network module indication information, different network module working channel indication information or different network module.Wherein, different network module refers to the wireless network different from current network, and for example, current network is cellular network, and different network can be other wireless networks such as bluetooth, WIFI or ZigBee, and in the present embodiment, different network is preferably WIFI network.Different network module indication information indication first terminal is opened different network module or closes different network module, closing different network module is to instigate different network module not worked, its implementation comprises lower electricity or enters Doze state etc. that other make the idle mode of different network module, preferably, closing different network module is to instigate different network module to enter Doze state; Open different network module and be and instigate the work of different network module, its implementation to comprise to power on or enter Awake state etc. other make the mode of different network module work, preferably, opening different network module is to instigate different network module to enter Awake state.Different network module working channel indication information indication first terminal is opened the working channel information after different network module.Different network module working channel indication information is the channel information of the different network module work of network side indication or recommendation, and different network module working channel indication information can be the set of single definite channel or optional channel.The ability information of different network module comprises the different network module ability of target terminal, the network transmission speed of supporting such as the different network module of target terminal or the network encryption algorithm of support etc.The ability information of different network module also comprises the ability information that network side indication or the different network module of recommending need adopt.The ability information of different network module further comprises that network side is the parameter information that first terminal and target terminal distribute.
In the present embodiment, the second message also comprises the first auxiliary object information of finding, first auxiliaryly finds that object information comprises the identity identifier information of the target terminal of having found or the identifier information of the target signature information found.The identity identifier information of the target terminal of having found is the identity identifier information of the target terminal found of first terminal expectation that network side has been found to, and the identifier information of the target signature information of having found is the identifier information such as target signature information that first terminal expectation that network side has been found to is found.
In the present embodiment, the second message also comprises the second auxiliary object information of finding, the second auxiliary discovery object information comprises the identity identifier information of the identity identifier information of found target terminal or the found target terminal of characteristic information that first terminal provides.The identity identifier information of found target terminal is the identity identifier that first terminal that network side has been found to is expected found target terminal, hopes characteristic information that first terminal that the identity identifier information of the found target terminal of characteristic information that first terminal provides has been found to for network side provides expect the identity identifier information of found target terminal.
In the present embodiment, the second message also comprises the 3rd auxiliary object information of finding, the 3rd secondary outcome information comprises the identity identifier information of target terminal and the security parameter of network side distribution of secure communication.The security parameter information that network side distributes is the parameter that target terminal that first terminal is corresponding with it carries out secure communication, concrete, security parameter can be the first terminal of network side distribution and the link No. of its corresponding target terminal or the parameter that generates described link No..Security parameter can be also the first terminal that distributes of network side and the parameter of key information or the generation key information of its corresponding target terminal, and key information can be session key or for the root key of session key generation.Security parameter can also be the random parameter of the target terminal that the first terminal that distributes of network side is corresponding with it, and to be target terminal that described receiving terminal is corresponding with it authenticate or random number during session key agreement at different network random parameter.The identity identifier information of the target terminal of secure communication is the identity identifier information that first terminal expectation network side distributes the corresponding target terminal of security parameter, and its identifier form is consistent with the form of the identity identifier of first terminal;
In step 204, first terminal receives the second message, and finds target terminal and/or target signature information according to the second message, and/or carries out secure communication.
Wherein, if the different network module indication information of the second message indication first terminal is closed different network module, or the identifier information of the identity identifier information of the first auxiliary target terminal of having found of finding object information or the target signature information found does not exist, or second auxiliary find that the identity identifier letter of found target terminal of object information or the identity identifier information of the found target terminal of characteristic information that first terminal provides do not exist, first terminal is closed different network module or different network module is closed in maintenance.
If the different network module indication information of the second message indication first terminal is opened different network module, or different network module working channel indication information occurs, or the identifier information of the identity identifier information of the first auxiliary target terminal of having found of finding object information or the target signature information found exists, or the identity identifier information existence of the identity identifier letter of the found target terminal of the second auxiliary discovery object information or the found target terminal of characteristic information that first terminal provides, first terminal is opened different network module or is held open different network module.
At first terminal, open different network module or be held open in different network module, first terminal is found target terminal or target signature information by different network module; Or the characteristic information that first terminal is found by target terminal by different network module or first terminal provides is found by target terminal.
Wherein, the message that first terminal comprises target terminal or target signature information by the scanning of different network module; Or first terminal is by the different network module message that scanning comprises target terminal or target signature information on the channel of different network module working channel indication information sign.The message that comprises target terminal or target signature information if scan, first terminal is found target terminal or target signature information.
First terminal sends the message comprise the characteristic information that first terminal or first terminal provide by different network module; Or first terminal sends the message that comprises the characteristic information that first terminal or first terminal provide on the channel of different network module working channel indication information sign by different network module.
In step 204, first terminal carries out secure communication according to the 3rd secondary outcome information to the end to end communication of first terminal and target terminal.
Concrete, first terminal obtains the link No. of first terminal and target terminal according to the security parameter information of the 3rd secondary outcome information, wherein, the mode of obtaining link No. can be directly to obtain according to security parameter, can be to calculate and obtain according to security parameter, its mode not be limit yet.
Link No. is for substituting the transmitting terminal of communication information and the identification information of receiving terminal between first terminal and target terminal, for example, in the message of communicating by letter with target terminal at first terminal, the transmission address of the mac frame head of message is set to link No. indicated value, and receiver address is set to the link No. of first terminal and target terminal.Wherein, the message that first terminal is communicated by letter with target terminal is the other forms of message such as beacon message or authentication message in different network.
When there is the link No. information of network side distribution in the 3rd secondary outcome information, if the transmitting terminal that first terminal is mac frame, in the mac frame head sending, carry link No. and indication field, wherein, in the Address of mac frame head 2 fields, there is indication field, to indicate this mac frame head to carry link No., in the Address of mac frame head 1 field, there is the link No. that network side distributes.Wherein, MAC can be the other forms of mac frames such as beacon frame or authentication frame.As shown in table 1, the frame structure of mac frame.
Figure BDA00002027949700131
Table 1
Wherein, Payload is mac frame frame, the particular content that it comprises mac frame.
If the receiving terminal that first terminal is mac frame, obtains link No. according to the indication field in mac frame, and according to the identity of the transmitting terminal of link No. identification mac frame.
First terminal can also obtain according to the security parameter information of the 3rd secondary outcome information the key information of first terminal and target terminal, wherein, the mode of obtaining key information can be directly to obtain according to described security parameter, can be also to calculate and obtain according to security parameter, and its mode is not limit.Key information comprises session key or for the root key of session key generation.The content of session key for encrypting or decipher communication information between first terminal and target terminal.Content between first terminal and target terminal in communication information comprises characteristic information or the challenge text message for authenticating.
In more detail, if the transmitting terminal that first terminal is message is encrypted the Payload information in the mac frame of message according to the session key obtaining.If first terminal is the receiving terminal for message, according to the session key obtaining, the Payload information of encrypting in the mac frame of message is decrypted, obtain Payload information wherein.
In the present embodiment, the Payload in mac frame is preferably the challenge text of authentication message or a series of information elements in beacon message.
In addition, first terminal can also obtain according to the security parameter information of the 3rd secondary outcome information the random parameter of the target terminal that first terminal that network side distributes is corresponding with it, and to be target terminal that first terminal is corresponding with it authenticate or random number during session key agreement at different network random parameter.
Be different from the situation of prior art, the method for end to end communication that the present embodiment discloses assists first terminal to find that target terminal or target signature information or auxiliary first terminal carry out secure communication by network side, first terminal is found target terminal or target signature information or carries out secure communication according to the second message, realizing communication energy-saving and safe object.
Referring to Fig. 3, Fig. 3 is the structural representation of the system for end to end communication of first embodiment of the invention.As shown in Figure 3, the system 30 for end to end communication of the present embodiment comprises: for the terminal 31 of end to end communication and for the network side 32 of end to end communication.
Wherein, the terminal 31 of end to end communication comprises first terminal 311, and first terminal 311 sends the first message to network side 32.Network side 32 receives the first message, find target terminal and/or target signature information, and/or auxiliary first terminal 311 carries out secure communication according to the auxiliary first terminal 311 of the first message.First terminal 311 receives the second message that network side 32 sends, and finds target terminal and/or target signature information according to the second message, and/or carries out secure communication.
In the present embodiment, first terminal 311 can be NAN terminal, P2P terminal or other relate to the terminal of D2D communications applications.
Wherein, network side 32 can be WLAN (wireless local area network), wireless cellular network, wireless wide-area or other wireless networks.In the present embodiment, network side 32 is preferably cellular network, and cellular network comprises: GSM network, cdma network, 3GPP network and other cellular networks well known in the art.Wherein, cellular network is preferably 3GPP, and 3GPP is seamlessly transitted to 3G network by 2G network for realizing.
In the present embodiment, network side 32 comprises the network element of eNB, MME, HLR or new definition.Wherein, network side 32 preferably includes eNB.
Be different from the situation of prior art, the system 30 for end to end communication that the present embodiment discloses finds that by the auxiliary first terminal 311 of network side 32 target terminal or target signature information or auxiliary first terminal 311 carry out secure communication, first terminal 311 is found target terminal or target signature information or carries out secure communication according to the second message, realizing communication energy-saving and safe object.
The present invention further provides the system for end to end communication of the second embodiment, the system for end to end communication of the present embodiment is elaborated on the basis of the first embodiment.
As shown in Figure 4, the system for end to end communication of the present embodiment also comprises the second terminal 312, and first terminal 311 comprises different network module 313.
Wherein, first terminal 311 sends the first message.At first terminal 311, send before the first message, first terminal 311 is by random flow process access network side 32, and first terminal 311 is set up RRC with network side 32 and is connected, and further carries out authentication identification between first terminal 311 and network side 32.In other embodiments, those of ordinary skills can also be encrypted the first message, for example, RRC message or the NAS message of the first message for encrypting, RRC message or NAS message comprise the message of the 3GPP message such as Location Area Update Request message, Attach Complete message, RAU Complete message, TAU Complete message or NAS SMP message or new definition.
In the present embodiment, the first message comprises at least one in identity identifier information, the first assistance requests information, the second assistance requests information or the 3rd assistance requests information of first terminal 311.Wherein, the identity of the identity identifier message identification first terminal 311 of first terminal 311, the identity identifier information of first terminal 311 can be MAC Address, IMSI, P-TMSI, TMSI, GUTI, S-TMI or RNTI or other identity informations.
The first assistance requests information comprises at least one in the identity identifier information of the target terminal that primary importance information, expectation are found or the identifier information of the target signature information that expectation is found.Wherein, the position of target terminal or the position that target signature information is found in first terminal 311 expectations are found in the current location of primary importance message identification first terminal 311, first terminal 311 expectations, and primary importance information is preferably cell id.The identity identifier message identification first terminal 311 of the target terminal that expectation is found is desirably in the identity identifier of the target terminal of the position of primary importance message identification finding, the identity identifier of the target terminal that expectation is found can be MAC Address, IMSI, P-TMSI, TMSI, GUTI, S-TMI, RNTI or other (as telephone number) identity informations.The identifier message identification first terminal 311 of the target signature information that expectation is found is desirably in the target signature information identifier of the position discovery of primary importance message identification, target signature information refers to other D2D terminals of description of first terminal 311 expectation discoveries or the characteristic information of other wireless device, characteristic information can be the information on services that other D2D terminals or other wireless devices provide, for example, printer service information, show the information on services such as information on services or fax services information, characteristic information also can be the social information that other D2D terminals or other wireless devices provide, for example, game hobby information, purchase by group social informations such as convening information.
The second assistance requests information comprises second place information, and expects the identity identifier information of found target terminal or do not expect at least one in the identity identifier information of found non-target terminal.
Wherein, the position that the target signature information that the position that the current location of second place message identification first terminal 311, first terminal 311 expectations are found by target terminal or first terminal 311 are provided is found by target terminal, second place information is preferably cell id.
Expect that the identity identifier message identification first terminal 311 of found target terminal is desirably in the identity identifier of the found target terminal in position of second place message identification, the identity identifier information of expecting found target terminal presents with the form of the first white list.
Do not expect that the identity identifier message identification first terminal 311 of found non-target terminal is not desirably in the identification identifier of the found non-target terminal in position of second place message identification, do not expect that the identity identifier information of found non-target terminal presents with the first blacklist form.
Further, the second assistance requests information comprises the identifier information of the characteristic information that second place information and first terminal 311 provide, and the identity identifier information of the found target terminal of characteristic information that provides of expectation first terminal 311 or do not expect at least one in the identity identifier information of the found non-target terminal of characteristic information that first terminal 311 provides.
Wherein, the identifier of the characteristic information that the expectation that the identifier message identification first terminal 311 of the characteristic information that first terminal 311 provides provides in the position of second place message identification is found by other target terminals, characteristic information refers to the information of found description first terminal 311 features of first terminal 311 expectation, characteristic information can first terminal 311 provide such as printer service information, show the information on services such as information on services or fax services information, characteristic information also can be first terminal 311 and provides such as game hobby information, purchase by group social informations such as convening information.
The characteristic information that the identity identifier message identification first terminal 311 of the found target terminal of characteristic information that expectation first terminal 311 provides provides is expected the identity identifier of found target terminal in the position of second place message identification, the identity identifier information of the found target terminal of characteristic information that expectation first terminal 311 provides presents with the form of the second white list.
Do not expect that the characteristic information that the identity identifier message identification first terminal 311 of the found non-target terminal of characteristic information that first terminal 311 provides provides do not expect the identity identifier of found non-target terminal in the position of second place message identification, the identity identifier information of not expecting the found non-target terminal of characteristic information that first terminal 311 provides presents with the form of the second blacklist.
The 3rd assistance requests information is used for asking the auxiliary first terminal 311 of network side 32 and target terminal to carry out secure communication, and the 3rd assistance requests information comprises that security parameter distributes indication information, and/or the identity identifier information of target terminal.
Security parameter distributes indication information to be used to indicate the security parameter that network side 32 distributes first terminal 311 and target terminal, security parameter can be seriatim with target terminal in the 3rd assistance requests information carry out corresponding, also can be corresponding with the auxiliary target terminal of finding of network side 32 one by one.
The identity identifier of the target terminal of secure communication is carried out with it in identity identifier information indication first terminal 311 expectations of target terminal, with the form of the 3rd white list, presents.When the identity identifier information of target terminal is under special circumstances or while being a particular value, 311 expectations of indication first terminal are carried out secure communication with the auxiliary target terminal of finding of network side 32, for example the 3rd white list does not exist, or the 3rd white list is that the identity identifier of the target terminal in empty or the 3rd white list is particular value, and the identity identifier of target terminal can be but be not limited to be complete 1 or 0.
In the present embodiment, network side 32 is searched target terminal or target signature information in this locality according to the first message.Wherein, network side 32 is searched target terminal or target signature information and is comprised multiple implementation method in this locality according to the first message, for example information bank retrieval, the methods such as list match.In the present embodiment, network side 32 is preferably searched target terminal or target signature information according to the first message in this locality by list match.
Network side 32 is set up according to the first message or is upgraded the first auxiliary discovery list or second and assist discovery list; Or, network side 32 mates the first auxiliary the 4th auxiliary discovery list of finding that list and network side 32 are stored, or the second auxiliary the 3rd auxiliary discovery list of finding that list and network side 32 are stored is mated, and find target terminal or target signature information according to matching result.
At network side 32, according to the first message, set up or upgrade in the first auxiliary discovery list or the second auxiliary discovery list, network side 32 receives after the first message of first terminal 311 transmissions, if network side 32 stores first, do not assist discovery list or second to assist discovery list, network side 32 is set up the first auxiliary discovery list or according to the second assistance requests information of the first message, sets up second and assist discovery list according to the first assistance requests information of the first message.If network side 32 has been stored the first auxiliary discovery list or the second auxiliary discovery list, network side 32 is found list or assists and find list according to the second assistance requests information updating second of the first message according to the first assistance requests information updating first of the first message is auxiliary.
The first auxiliary discovery list comprises identity identifier information and the primary importance information of first terminal 311, and the identity identifier information of target terminal found of expectation or at least one in the identifier information of the target signature information that expectation is found, wherein, first auxiliary find that the information of list is consistent with the form of the first assistance requests information in the first message.
Second auxiliary finds that list comprises identity identifier information and the second place information of first terminal 311, and expects the identity identifier information of found target terminal or do not expect at least one in the identity identifier information of found non-target terminal.
Or, second auxiliary finds that list comprises identifier information and the second place information of the characteristic information that first terminal 311 provides, and the identity identifier information of the found target terminal of characteristic information that provides of expectation first terminal 311 or do not expect at least one in the identity identifier information of the found non-target terminal of characteristic information that first terminal 311 provides.
In the present embodiment, the 3rd auxiliary discovery list and the 4th auxiliary discovery list are that the second terminal 312 is at network side 32 canned datas.The 3rd auxiliary discovery list comprises identity identifier information and the 3rd positional information of the second terminal 312.The 4th auxiliary finds that list comprises identity identifier information and the 4th positional information of the second terminal 312, and expects the identity identifier information of found target terminal or do not expect at least one in the identity identifier information of found non-target terminal.Or the 4th auxiliary finds that list comprises identifier information and the 4th positional information of the characteristic information that the second terminal 312 provides, and expect the identity identifier information of the found target terminal of characteristic information that the second terminal 312 provides or do not expect at least one in the identity identifier information of the found non-target terminal of characteristic information that the second terminal 312 provides.Wherein, the 3rd positional information identifies the current location of the second terminal 312, the position of target signature informations is found in the position of the second terminal 312 expectation discovery target terminals or the second terminal 312 expectations.The position that the target signature information expectation that the 4th positional information identifies the current location of the second terminal 312 or position that the expectation of the second terminal 312 is found by target terminal or the second terminal 312 to be provided is found by target terminal.Wherein, the second terminal 312 can be NAN terminal, P2P terminal or other relate to the terminal of D2D communications applications, can be also other communication equipments such as access point AP or advertisement website.
In network side 32 mates the first auxiliary the 4th auxiliary discovery list of finding that list stores with network side 32, network side 32 judges whether the primary importance information of the first auxiliary discovery list and the 4th positional information of the 4th auxiliary discovery list mate, if primary importance information is mated with the 4th positional information, the second terminal 312 is target terminals of first terminal 311.
And/or, network side 32 judges whether the identity identifier information of the identity identifier information of the target terminal that the expectation of the first auxiliary discovery list is found and the second terminal 312 of the 4th auxiliary discovery list mates, if the first auxiliary identity identifier information of target terminal of expectation discovery and identity identifier information matches of the second terminal 312 of the 4th auxiliary discovery list of finding list, the second terminal 312 is target terminals of first terminal 311.
And/or, network side 32 judges whether the identity identifier information of first terminal 311 of the first auxiliary discovery list and the identity identifier information of the found target terminal of expectation of the 4th auxiliary discovery list mate, or whether mate with the identity identifier information of not expecting found non-target terminal of the 4th auxiliary discovery list, if the identity identifier information of the first terminal 311 of the first auxiliary discovery list and the 4th is assisted the identity identifier information matches of the found target terminal of expectation of finding list or is assisted the identity identifier information of not expecting found non-target terminal of finding list not mate with the 4th, the second terminal 312 is target terminals of first terminal 311.
In network side 32 mates the first auxiliary the 4th auxiliary discovery list of finding that list stores with network side 32, network side 32 judges whether the primary importance information of the first auxiliary discovery list and the 4th positional information of the 4th auxiliary discovery list mate, if the 4th positional information of the primary importance information of the first auxiliary discovery list and the 4th auxiliary discovery list is mated, the characteristic information that the second terminal 312 provides is the target signature information of first terminal 311.
And/or, network side 32 judges whether the identifier information of the characteristic information that the identifier information of the target signature information that the expectation of the first auxiliary discovery list is found and the second terminal 312 of the 4th auxiliary discovery list provide mates, if the first auxiliary identifier information of target signature information of expectation discovery and identifier information matches of the characteristic information that the second terminal 312 of the 4th auxiliary discovery list provides of finding list, the characteristic information that the second terminal 312 provides is the target signature information of first terminal 311.
And/or, network side 32 judge first auxiliary find the identity identifier information of first terminal 311 of list and whether the identity identifier information of the found target terminal of characteristic information that expectation second terminal 312 of the 4th auxiliary discovery list provides mates or, whether mate with the identity identifier information of not expecting the found non-target terminal of characteristic information that the second terminal 312 provides of the 4th auxiliary discovery list, if the first auxiliary identity identifier information of first terminal 311 of list and identity identifier information matches of the found target terminal of characteristic information that expectation second terminal 312 of the 4th auxiliary discovery list provides found, or do not mate with the identity identifier information of not expecting the found non-target terminal of characteristic information that the second terminal 312 provides of the 4th auxiliary discovery list, the characteristic information that the second terminal 312 provides is the target signature information of first terminal 311.
In the second auxiliary the 3rd auxiliary discovery list of finding that list and network side 32 are stored of first terminal 311 is mated, network side 32 judges that the second auxiliary second place information and the 3rd of finding list assists the 3rd positional information of list to mate and whether mate, if second place information is mated with the 3rd positional information, the second terminal 312 is target terminals of first terminal 311.
And/or, network side 32 judges whether the identity identifier information of the found target terminal of expectation of the second auxiliary discovery list and the identity identifier information of the second terminal 312 of the 3rd auxiliary discovery list mate, if the second auxiliary identity identifier information and the 3rd auxiliary identity identifier information matches of finding the second terminal 312 of list of finding the found target terminal of expectation of list, the second terminal 312 is target terminals of first terminal 311.
And/or, network side 32 judges whether the identity identifier information of the identity identifier information of the found target terminal of characteristic information that the described first terminal 311 of expectation of the second auxiliary discovery list provides and the second terminal 312 of the 3rd auxiliary discovery list mates, if the identity identifier information of the found target terminal of characteristic information that the described first terminal 311 of expectation of the second auxiliary discovery list provides and the 3rd auxiliary identity identifier information matches of finding the second terminal 312 of list, the second terminal 312 is target terminals of first terminal 311.
In other embodiments, those skilled in the art can adopt the method for data base querying to search target terminal completely, and the identity identifier information of the target terminal that network side 32 is found by the expectation of the first assistance requests information of the first message is searched target terminal at 3GPP network element (such as MME or HLR etc.).
In the present embodiment, network side 32 is by mating to confirm first terminal 311 and the second terminal 312 whether the second terminal 312 is target terminals of first terminal 311 with upper type, in this case or in the situation that first terminal 311 has been found that target terminal, network side 32 carries out secure communication according to the auxiliary first terminal 311 of the first message and target terminal.Wherein, network side 32 distributes indication information by the security parameter corresponding with target terminal, is first terminal 311 and target terminal distribution security parameter.In other embodiments, network side 32 can, by the link configuration parametric distribution indication information corresponding with target terminal, be first terminal 311 and target terminal distribute links configuration parameter.
The method of salary distribution of security parameter can have multiple implementation, it can be by directly random generation of network side 32, also can according to the attribute information of first terminal 311 and target terminal, be produced by network side 32, for example, security parameter is calculated and is drawn according to the identity identifier information of first terminal 311 and target terminal by network side 32, or described security parameter calculated and draw according to shared key information between first terminal 311 or target terminal and network side 32 by network side 32, its implementation is not limit.
Network side 32 sends the second message to first terminal 311, and when the second message comprises security information, network side 32 sends the second message by cipher mode to first terminal 311, and cipher mode preferably can be consistent with the cipher mode of the first message.
In the present embodiment, the second message comprises the first auxiliary discovery information, and the first auxiliary discovery information comprises at least one in the ability information of different network module indication information, different network module working channel indication information or different network module.Wherein, different network module 313 refers to the wireless network different from current network, and for example, current network is cellular network, and different network can be other wireless networks such as bluetooth, WIFI or ZigBee, and in the present embodiment, different network is preferably WIFI network.Different network module 313 indication information indication first terminals 311 are opened different network module 313 or close different network module 313, closing different network module 313 is to instigate different network module 313 not worked, its implementation comprises lower electricity or enters Doze state etc. that other make the idle mode of different network module 313, preferably, closing different network module 313 is to instigate different network module 313 to enter Doze state; Opening different network module 313 is to instigate 313 work of different network module, its implementation comprises and powers on or enter Awake state etc. other make modes of different network module 313 work, preferably, opening different network module 313 is to instigate different network module 313 to enter Awake state.The working channel information that different network module 313 working channel indication information indication first terminals 311 are opened after different network module 313.Different network module working channel indication information is the channel information of the different network module work of network side 32 indications or recommendation, and different network module working channel indication information can be the set of single definite channel or optional channel.The ability information of different network module comprises the different network module ability of target terminal, the network transmission speed of supporting such as the different network module of target terminal or the network encryption algorithm of support etc.The ability information of different network module also comprises the ability information that network side 32 indications or the different network module of recommending need adopt.The ability information of different network module further comprises that network side 32 is for the parameter information of first terminal 311 and target terminal distribution.
In the present embodiment, the second message also comprises the first auxiliary object information of finding, first auxiliaryly finds that object information comprises the identity identifier information of the target terminal of having found or the identifier information of the target signature information found.The identity identifier information of the target terminal of having found is the identity identifier information of the target terminal found of first terminal 311 expectation that network side 32 has been found to, and the identifier information of the target signature information of having found is the identifier information such as target signature information that first terminal 311 expectations that network side 32 has been found to are found.
In the present embodiment, the second message also comprises the second auxiliary object information of finding, the second auxiliary discovery object information comprises the identity identifier information of the identity identifier information of found target terminal or the found target terminal of characteristic information that first terminal 311 provides.The identity identifier information of found target terminal is the identity identifier of the found target terminal of first terminal 311 expectation that has been found to of network side 32, and the characteristic information that the first terminal that the identity identifier information of the found target terminal of the characteristic information that first terminal 311 provides has been found to for network side 32 provides is expected the identity identifier information of found target terminal.
In the present embodiment, the second message also comprises the 3rd auxiliary object information of finding, the 3rd secondary outcome information comprises the identity identifier information of target terminal and the security parameter of network side 32 distribution of secure communication.The security parameter information that network side 32 distributes is the parameter that target terminal that first terminal 311 is corresponding with it carries out secure communication, concrete, security parameter can be network side 32 first terminals 311 of distribution and the link No. of its corresponding target terminal or the parameter that generates described link No..Security parameter can be also the first terminals 311 that distribute of network side 32 and the parameter of key information or the generation key information of its corresponding target terminal, and key information can be session key or for the root key of session key generation.Security parameter can also be the random parameter of the target terminal that the first terminal 311 that distributes of network side 32 is corresponding with it, and to be target terminal that described receiving terminal is corresponding with it authenticate or random number during session key agreement at different network random parameter.The identity identifier information of the target terminal of secure communication is the identity identifier information that first terminal 311 expectation network sides 32 distribute the corresponding target terminal of security parameter, and its identifier form is consistent with the form of the identity identifier of first terminal 311;
First terminal 311 receives the second message, and finds target terminal and/or target signature information according to the second message, and/or carries out secure communication.Wherein, if the different network module indication information of the second message indication first terminal 311 is closed different network module 313, or the identifier information of the identity identifier information of the first auxiliary target terminal of having found of finding object information or the target signature information found does not exist, or the identity identifier of the found target terminal of the second auxiliary discovery object information is believed or the identity identifier information of the found target terminal of characteristic information that first terminal 311 provides does not exist, first terminal 311 is closed different network module 313 or is kept closing different network module 313.
If the different network module indication information of the second message indication first terminal 311 is opened different network module 313, or different network module working channel indication information occurs, or the identifier information of the identity identifier information of the first auxiliary target terminal of having found of finding object information or the target signature information found exists, or the identity identifier information existence of the identity identifier letter of the found target terminal of the second auxiliary discovery object information or the found target terminal of characteristic information that first terminal 311 provides, first terminal 311 is opened different network module 313 or is held open different network module 313.
At first terminal 311, open different network module 313 or be held open in different network module 313, first terminal 311 is found target terminal or target signature information by different network module 313; Or the characteristic information that first terminal 311 is found by target terminal by different network module 313 or first terminal 311 provides is found by target terminal.
Wherein, the message that first terminal 311 comprises target terminal or target signature information by 313 scannings of different network module; Or first terminal 311 is by different network module 313 message that scanning comprises target terminal or target signature information on the channel of different network module 313 working channel indication information signs.The message that comprises target terminal or target signature information if scan, first terminal 311 is found target terminal or target signature information.
First terminal 311 sends the message that comprises the characteristic information that first terminal 311 or first terminal 311 provide by different network module 313; Or first terminal 311 sends the message that comprises the characteristic information that first terminal 311 or first terminal 311 provide on the channel of different network module 313 working channel indication informations signs by different network module 313.
First terminal 311 carries out secure communication according to the 3rd secondary outcome information to first terminal 311 and the end to end communication of target terminal.Concrete, first terminal 311 obtains the link No. of first terminal 311 and target terminal according to the security parameter information of the 3rd secondary outcome information, wherein, the mode of obtaining link No. can be directly to obtain according to security parameter, can be to calculate and obtain according to security parameter, its mode not be limit yet.
Link No. is for substituting the transmitting terminal of communication information and the identification information of receiving terminal between first terminal 311 and target terminal, for example, in the message of communicating by letter with target terminal at first terminal 311, the transmission address of the mac frame head of message is set to link No. indicated value, and receiver address is set to the link No. of first terminal 311 and target terminal.Wherein, the message that first terminal 311 is communicated by letter with target terminal is the other forms of message such as beacon message or authentication message in different network.
When there is the link No. information of network side 32 distribution in the 3rd secondary outcome information, if the transmitting terminal that first terminal 311 is mac frame, in the mac frame head sending, carry link No. and indication field, wherein, in the Address2 of mac frame head field, there is indication field, to indicate this mac frame head to carry link No., in the Address1 of mac frame head field, there is the link No. that network side 32 distributes.Wherein, MAC can be the other forms of mac frames such as beacon frame or authentication frame.As shown in table 1, the frame structure of mac frame.
If the receiving terminal that first terminal 311 is mac frame, obtains link No. according to the indication field in mac frame, and according to the identity of the transmitting terminal of link No. identification mac frame.
First terminal 311 can also obtain according to the security parameter information of the 3rd secondary outcome information the key information of first terminal 311 and target terminal, wherein, the mode of obtaining key information can be directly to obtain according to described security parameter, can be to calculate and obtain according to security parameter, its mode not be limit yet.Key information comprises session key or for the root key of session key generation.The content of session key for encrypting or decipher communication information between first terminal 311 and target terminal.Content between first terminal 311 and target terminal in communication information comprises characteristic information or the challenge text message for authenticating.
In more detail, if the transmitting terminal that first terminal 311 is message is encrypted the Payload information in the mac frame of message according to the session key obtaining.If first terminal 311 is the receiving terminals for message, according to the session key obtaining, the Payload information of encrypting in the mac frame of message is decrypted, obtain Payload information wherein.
In the present embodiment, the Payload in mac frame is preferably the challenge text of authentication message or a series of information elements in beacon message.
In addition, first terminal 311 can also obtain according to the security parameter information of the 3rd secondary outcome information the random parameter of the target terminal that first terminal 311 that network side 32 distributes is corresponding with it, and to be target terminal that first terminal 311 is corresponding with it authenticate or random number during session key agreement at different network random parameter.
Be different from the situation of prior art, in the present invention, by network side, assist first terminal to find target terminal or target signature information, or auxiliary first terminal carries out secure communication, to realize communication energy-saving and safe object.
The foregoing is only embodiments of the invention; not thereby limit the scope of the claims of the present invention; every equivalent structure or conversion of equivalent flow process that utilizes specification of the present invention and accompanying drawing content to do; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (66)

1. for a method for end to end communication, it is characterized in that, described method comprises:
To network side, send the first message, to indicate described network side to send the second message according to described the first message;
Receive described the second message that described network side sends, and find described target terminal and/or target signature information according to described the second message, and/or carry out secure communication.
2. method according to claim 1, is characterized in that, described the first message comprises at least one in identity identifier information, the first assistance requests information, the second assistance requests information or the 3rd assistance requests information of first terminal.
3. method according to claim 2, is characterized in that, described the first assistance requests information comprises at least one in the identity identifier information of the target terminal that primary importance information, expectation are found or the identifier information of the target signature information that expectation is found.
4. method according to claim 2, it is characterized in that, described the second assistance requests information comprises second place information, and expects the identity identifier information of found target terminal or do not expect at least one in the identity identifier information of found non-target terminal.
5. method according to claim 2, it is characterized in that, described the second assistance requests information comprises the identifier information of the characteristic information that second place information and described first terminal provide, and expects the identity identifier information of the found target terminal of characteristic information that described first terminal provides or do not expect at least one in the identity identifier information of the found non-target terminal of characteristic information that described first terminal provides.
6. method according to claim 2, is characterized in that, described the 3rd assistance requests information comprises that security parameter distributes the identity identifier information of indication information and/or described target terminal.
7. method according to claim 1, it is characterized in that, described the second message comprises the first auxiliary discovery information, and the described first auxiliary discovery information comprises at least one in the ability information of different network module indication information, different network module working channel indication information or different network module.
8. method according to claim 8, it is characterized in that, described the second message comprises the first auxiliary object information of finding, described first auxiliaryly finds that object information comprises the identity identifier information of the target terminal of having found or the identifier information of the target signature information found.
9. method according to claim 9, it is characterized in that, described the second message comprises the second auxiliary object information of finding, the described second auxiliary discovery object information comprises the identity identifier information of the identity identifier information of found target terminal or the found target terminal of characteristic information that first terminal provides.
10. method according to claim 10, it is characterized in that, described the second message comprises the 3rd auxiliary object information of finding, described the 3rd secondary outcome information comprises the identity identifier information of target terminal and the security parameter of described network side distribution of secure communication.
11. methods according to claim 11, is characterized in that, receive described the second message that described network side sends, and find described target terminal and/or target signature information according to described the second message, and/or the step of carrying out secure communication comprises:
If the different network module indication information of described the second message indication first terminal is closed described different network module, or the identifier information of the identity identifier information of the described first auxiliary target terminal of having found of finding object information or the target signature information found does not exist, or the identity identifier of the found target terminal of the described second auxiliary discovery object information is believed or the identity identifier information of the found target terminal of characteristic information that first terminal provides does not exist, described first terminal is closed described different network module or described different network module is closed in maintenance.
12. methods according to claim 11, is characterized in that, receive described the second message that described network side sends, and find described target terminal and/or target signature information according to described the second message, and/or the step of carrying out secure communication comprises:
If the different network module indication information of described the second message indication first terminal is opened described different network module, or described different network module working channel indication information occurs, or the identifier information of the identity identifier information of the described first auxiliary target terminal of having found of finding object information or the target signature information found exists, or the identity identifier information existence of the identity identifier letter of the found target terminal of the described second auxiliary discovery object information or the found target terminal of characteristic information that first terminal provides, described first terminal is opened described different network module or is held open described different network module.
13. methods according to claim 13, is characterized in that, the step that described first terminal is opened described different network module or is held open described different network module comprises:
By described different network module, find described target terminal or described target signature information;
Or by described target terminal, found by the characteristic information that described target terminal is found or described first terminal provides by first terminal described in described different network module.
14. methods according to claim 14, is characterized in that, described by described different network module, find that the step of described target terminal or described target signature information comprises:
The message that scanning comprises described target terminal or described target signature information;
Or the message that scanning comprises described target terminal or described target signature information on the channel of described different network module working channel indication information sign.
15. methods according to claim 14, is characterized in that, by described different network module, described first terminal found by described target terminal, or the step that the characteristic information that provides of described first terminal is found by described target signature information comprises:
The message that transmission comprises the characteristic information that described first terminal or described first terminal provide;
Or, on the channel of described different network module working channel indication information sign, send the message that comprises the characteristic information that described first terminal or described first terminal provide.
16. methods according to claim 11, is characterized in that, receive described the second message that described network side sends, and find described target terminal and/or target signature information according to described the second message, and/or the step of carrying out secure communication comprises:
According to the security parameter of described the 3rd secondary outcome information, obtain the link No. of described first terminal and described target terminal, wherein, described link No. is for replacing the transmitting terminal of communication information and the identification information of receiving terminal between described first terminal and described target terminal.
17. methods according to claim 11, is characterized in that, receive described the second message that described network side sends, and find described target terminal and/or target signature information according to described the second message, and/or the step of carrying out secure communication comprises:
According to the security parameter of described the 3rd secondary outcome information, obtain the key information of described first terminal and described target terminal, described key information comprises session key or for generating the root key of described session key, wherein, the content of described session key for encrypting or decipher communication information between described first terminal and described target terminal.
18. methods according to claim 1, is characterized in that, described the first message or the second message send with cipher mode.
19. 1 kinds of methods for end to end communication, is characterized in that, described method comprises:
The first message that reception sends from first terminal;
According to the auxiliary described first terminal of described the first message, find target terminal and/or target signature information, and/or assist described first terminal to carry out secure communication, and send the second message to described first terminal.
20. methods according to claim 19, it is characterized in that, according to the auxiliary described first terminal of described the first message, find target terminal and/or target signature information, and/or auxiliary described first terminal carries out secure communication, and comprises to the step that described first terminal sends the second message:
According to described the first message, in this locality, search described target terminal or described target signature information.
21. methods according to claim 19, is characterized in that, described the first message comprises at least one in identity identifier information, the first assistance requests information, the second assistance requests information or the 3rd assistance requests information of first terminal.
22. methods according to claim 21, it is characterized in that, described the first assistance requests information comprises at least one in the identity identifier information of the target terminal that primary importance information, expectation are found or the identifier information of the target signature information that expectation is found.
23. methods according to claim 21, it is characterized in that, described the second assistance requests information comprises second place information, and expects the identity identifier information of found target terminal or do not expect at least one in the identity identifier information of found non-target terminal.
24. methods according to claim 21, it is characterized in that, described the second assistance requests information comprises the identifier information of the characteristic information that second place information and described first terminal provide, and expects the identity identifier information of the found target terminal of characteristic information that described first terminal provides or do not expect at least one in the identity identifier information of the found non-target terminal of characteristic information that described first terminal provides.
25. methods according to claim 21, is characterized in that, described the 3rd assistance requests information comprises that security parameter distributes the identity identifier information of indication information and/or described target terminal.
26. methods according to claim 25, it is characterized in that, according to the auxiliary described first terminal of described the first message, find target terminal and/or target signature information, and/or auxiliary described first terminal carries out secure communication, and comprises to the step that described first terminal sends the second message:
According to the security parameter of first terminal described in described the 3rd assistance requests information distribution and described target terminal.
27. methods according to claim 19, it is characterized in that, described the second message comprises the first auxiliary discovery information, and the described first auxiliary discovery information comprises at least one in the ability information of different network module indication information, different network module working channel indication information or different network module.
28. methods according to claim 27, it is characterized in that, described the second message comprises the first auxiliary object information of finding, described first auxiliaryly finds that object information comprises the identity identifier information of the target terminal of having found or the identifier information of the target signature information found.
29. methods according to claim 28, it is characterized in that, described the second message comprises the second auxiliary object information of finding, the described second auxiliary discovery object information comprises the identity identifier information of the identity identifier information of found target terminal or the found target terminal of characteristic information that described first terminal provides.
30. methods according to claim 29, it is characterized in that, described the second message comprises the 3rd auxiliary object information of finding, described the 3rd secondary outcome information comprises the identity identifier information of target terminal and the security parameter of described network side distribution of secure communication.
31. methods according to claim 30, it is characterized in that, according to the auxiliary described first terminal of described the first message, find target terminal and/or target signature information, and/or auxiliary described first terminal carries out secure communication, and comprises to the step that described first terminal sends the second message:
If the different network module indication information of described the second message indication first terminal is closed described different network module, or the identifier information of the identity identifier information of the described first auxiliary target terminal of having found of finding object information or the target signature information found does not exist, or the identity identifier of the found target terminal of the described second auxiliary discovery object information is believed or the identity identifier information of the found target terminal of characteristic information that described first terminal provides does not exist, described first terminal is closed described different network module or described different network module is closed in maintenance.
32. methods according to claim 30, it is characterized in that, according to the auxiliary described first terminal of described the first message, find target terminal and/or target signature information, and/or auxiliary described first terminal carries out secure communication, and comprises to the step that described first terminal sends the second message:
If the different network module indication information of described the second message indicates described first terminal to open described different network module, or described different network module working channel indication information occurs, or the identifier information of the identity identifier information of the described first auxiliary target terminal of having found of finding object information or the target signature information found exists, or the identity identifier information existence of the identity identifier letter of the found target terminal of the described second auxiliary discovery object information or the found target terminal of characteristic information that first terminal provides, described first terminal is opened described different network module or is held open described different network module.
33. methods according to claim 19, is characterized in that, described the first message or the second message send with cipher mode.
34. 1 kinds of terminals for end to end communication, it is characterized in that, described terminal comprises first terminal, wherein, described first terminal sends the first message to network side, and with second message of indicating described network side to send according to described the first message, described first terminal receives described the second message, and find described target terminal and/or target signature information according to described the second message, and/or carry out secure communication.
35. terminals according to claim 34, is characterized in that, described the first message comprises at least one in identity identifier information, the first assistance requests information, the second assistance requests information or the 3rd assistance requests information of first terminal.
36. terminals according to claim 35, it is characterized in that, described the first assistance requests information comprises at least one in the identity identifier information of the target terminal that primary importance information, expectation are found or the identifier information of the target signature information that expectation is found.
37. terminals according to claim 35, it is characterized in that, described the second assistance requests information comprises second place information, and expects the identity identifier information of found target terminal or do not expect at least one in the identity identifier information of found non-target terminal.
38. terminals according to claim 35, it is characterized in that, described the second assistance requests information comprises the identifier information of the characteristic information that second place information and described first terminal provide, and expects the identity identifier information of the found target terminal of characteristic information that described first terminal provides or do not expect at least one in the identity identifier information of the found non-target terminal of characteristic information that described first terminal provides.
39. terminals according to claim 35, is characterized in that, described the 3rd assistance requests information comprises that security parameter distributes the identity identifier information of indication information and/or described target terminal.
40. terminals according to claim 34, it is characterized in that, described the second message comprises the first auxiliary discovery information, and the described first auxiliary discovery information comprises at least one in the ability information of different network module indication information, different network module working channel indication information or different network module.
41. according to the terminal described in claim 40, it is characterized in that, described the second message comprises the first auxiliary object information of finding, described first auxiliaryly finds that object information comprises the identity identifier information of the target terminal of having found or the identifier information of the target signature information found.
42. according to the terminal described in claim 41, it is characterized in that, described the second message comprises the second auxiliary object information of finding, the described second auxiliary discovery object information comprises the identity identifier information of the identity identifier information of found target terminal or the found target terminal of characteristic information that first terminal provides.
43. according to the terminal described in claim 42, it is characterized in that, described the second message comprises the 3rd auxiliary object information of finding, described the 3rd secondary outcome information comprises the identity identifier information of target terminal and the security parameter of described network side distribution of secure communication.
44. according to the terminal described in claim 43, it is characterized in that, if the different network module indication information of described the second message indicates described first terminal to close described different network module, or the identifier information of the identity identifier information of the described first auxiliary target terminal of having found of finding object information or the target signature information found does not exist, or the identity identifier of the found target terminal of the described second auxiliary discovery object information is believed or the identity identifier information of the found target terminal of characteristic information that first terminal provides does not exist, described first terminal is closed described different network module or described different network module is closed in maintenance.
45. according to the terminal described in claim 43, it is characterized in that, if the different network module indication information of described the second message indication first terminal is opened described different network module, or described different network module working channel indication information occurs, or the identifier information of the identity identifier information of the described first auxiliary target terminal of having found of finding object information or the target signature information found exists, or the identity identifier information existence of the identity identifier letter of the found target terminal of the described second auxiliary discovery object information or the found target terminal of characteristic information that first terminal provides, described first terminal is opened described different network module or is held open described different network module.
46. according to the terminal described in claim 45, it is characterized in that, described first terminal is opened described different network module or is held open described different network module and comprises:
Described first terminal is found identity identifier letter or the described target signature information of described target terminal by described different network module;
Or described first terminal is found by described target terminal by the characteristic information that described target terminal is found or described first terminal provides by described different network module.
47. according to the terminal described in claim 45, it is characterized in that, the message that described first terminal scanning comprises described target terminal or described target signature information; Or the described first terminal message that scanning comprises described target terminal or described target signature information on the channel of described different network module working channel indication information sign.
48. according to the terminal described in claim 45, it is characterized in that, described first terminal sends the message that comprises the characteristic information that described first terminal or described first terminal provide; Or described first terminal sends the message that comprises the characteristic information that described first terminal or described first terminal provide on the channel of described different network module working channel indication information sign.
49. according to the terminal described in claim 43, it is characterized in that, described first terminal obtains the link No. of described first terminal and described target terminal according to the security parameter of described the 3rd secondary outcome information, wherein, described link No. is for replacing the transmitting terminal of communication information and the identification information of receiving terminal between described first terminal and described target terminal.
50. according to the terminal described in claim 43, it is characterized in that, described first terminal obtains the key information of described first terminal and described target terminal according to the security parameter of described the 3rd secondary outcome information, described key information comprises session key or for generating the root key of described session key, wherein, the content of described session key for encrypting or decipher communication information between described first terminal and described target terminal.
51. terminals according to claim 34, is characterized in that, described the first message or the second message send with cipher mode.
52. 1 kinds of network sides for end to end communication, it is characterized in that, described network side receives the first message sending from first terminal, according to the auxiliary described first terminal of described the first message, find target terminal and/or target signature information, and/or assist described first terminal to carry out secure communication, and send the second message to described first terminal.
53. according to the network side described in claim 52, it is characterized in that, described network side is searched described target terminal or described target signature information according to described the first message in this locality.
54. according to the network side described in claim 52, it is characterized in that, described the first message comprises at least one in identity identifier information, the first assistance requests information, the second assistance requests letter or the 3rd assistance requests information breath of first terminal.
55. according to the network side described in claim 54, it is characterized in that, described the first assistance requests information comprises at least one in the identity identifier information of the target terminal that primary importance information, expectation are found or the identifier information of the target signature information that expectation is found.
56. according to the network side described in claim 54, it is characterized in that, described the second assistance requests information comprises second place information, and expects the identity identifier information of found target terminal or do not expect at least one in the identity identifier information of found non-target terminal.
57. according to the network side described in claim 54, it is characterized in that, described the second assistance requests information comprises the identifier information of the characteristic information that second place information and described first terminal provide, and expects the identity identifier information of the found target terminal of characteristic information that described first terminal provides or do not expect at least one in the identity identifier information of the found non-target terminal of characteristic information that described first terminal provides.
58. according to the network side described in claim 54, it is characterized in that, described the 3rd assistance requests information comprises that security parameter distributes the identity identifier information of indication information and/or described target terminal.
59. according to the network side described in claim 68, it is characterized in that, described network side is according to the security parameter of first terminal described in described the 3rd assistance requests information distribution and described target terminal.
60. according to the network side described in claim 52, it is characterized in that, described the second message comprises the first auxiliary discovery information, and the described first auxiliary discovery information comprises at least one in the ability information of different network module indication information, different network module working channel indication information or different network module.
61. according to the network side described in claim 60, it is characterized in that, described the second message comprises the first auxiliary object information of finding, described first auxiliaryly finds that object information comprises the identity identifier information of the target terminal of having found or the identifier information of the target signature information found.
62. according to the network side described in claim 61, it is characterized in that, described the second message comprises the second auxiliary object information of finding, the described second auxiliary discovery object information comprises the identity identifier information of the identity identifier information of found target terminal or the found target terminal of characteristic information that described first terminal provides.
63. according to the network side described in claim 62, it is characterized in that, described the second message comprises the 3rd auxiliary object information of finding, described the 3rd secondary outcome information comprises the identity identifier information of target terminal and the security parameter of described network side distribution of secure communication.
64. according to the network side described in claim 63, it is characterized in that, if the different network module indication information of described the second message indication first terminal is closed described different network module, or the identifier information of the identity identifier information of the described first auxiliary target terminal of having found of finding object information or the target signature information found does not exist, or the identity identifier of the found target terminal of the described second auxiliary discovery object information is believed or the identity identifier information of the found target terminal of characteristic information that first terminal provides does not exist, described first terminal is closed described different network module or described different network module is closed in maintenance.
65. according to the network side described in claim 63, it is characterized in that, if the different network module indication information of described the second message indication first terminal is opened described different network module, or described different network module working channel indication information occurs, or the identifier information of the identity identifier information of the described first auxiliary target terminal of having found of finding object information or the target signature information found exists, or the identity identifier information existence of the identity identifier letter of the found target terminal of the described second auxiliary discovery object information or the found target terminal of characteristic information that first terminal provides, described first terminal is opened described different network module or is held open described different network module.
66. according to the network side described in claim 52, it is characterized in that, described the first message or the second message send with cipher mode.
CN201210294608.0A 2012-08-17 2012-08-17 Method, terminal and network side for peer-to-pear communication Pending CN103595750A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210294608.0A CN103595750A (en) 2012-08-17 2012-08-17 Method, terminal and network side for peer-to-pear communication
PCT/CN2013/074941 WO2014026489A1 (en) 2012-08-17 2013-04-28 Method, terminal and network side for peer-to-pear communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210294608.0A CN103595750A (en) 2012-08-17 2012-08-17 Method, terminal and network side for peer-to-pear communication

Publications (1)

Publication Number Publication Date
CN103595750A true CN103595750A (en) 2014-02-19

Family

ID=50085732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210294608.0A Pending CN103595750A (en) 2012-08-17 2012-08-17 Method, terminal and network side for peer-to-pear communication

Country Status (2)

Country Link
CN (1) CN103595750A (en)
WO (1) WO2014026489A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104135377A (en) * 2014-07-29 2014-11-05 深圳市金立通信设备有限公司 A network apparatus, transmission apparatus and information sharing system
CN106068010A (en) * 2015-04-20 2016-11-02 苹果公司 Neighbours' perception networking channel sequence
CN106230973A (en) * 2016-08-30 2016-12-14 南京邮电大学 A kind of file sharing method based on social networks
WO2017080426A1 (en) * 2015-11-12 2017-05-18 华为技术有限公司 Data link establishment method and apparatus
CN106713253A (en) * 2015-11-18 2017-05-24 中兴通讯股份有限公司 Method and device for sending and receiving information in peripheral sensing network
CN106797377A (en) * 2014-09-05 2017-05-31 高通股份有限公司 The infrastructure access in networking data path is perceived via neighbours
WO2018072152A1 (en) * 2016-10-19 2018-04-26 中兴通讯股份有限公司 Secure communication method, apparatus, and system
CN110011791A (en) * 2019-02-18 2019-07-12 西安电子科技大学 Electronics authority secure flows shifting method and system, electronics voucher system based on D2D
US10887933B2 (en) 2016-03-28 2021-01-05 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Device-to-device communication method, terminal device, and network device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1705261A (en) * 2004-05-28 2005-12-07 华为技术有限公司 End-to-end encrypting communication system and method
WO2011130623A2 (en) * 2010-04-15 2011-10-20 Qualcomm Incorporated Network-assisted peer discovery

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101909281B (en) * 2010-07-15 2013-12-25 优视科技有限公司 Mobile terminal-based user social contact method, device and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1705261A (en) * 2004-05-28 2005-12-07 华为技术有限公司 End-to-end encrypting communication system and method
WO2011130623A2 (en) * 2010-04-15 2011-10-20 Qualcomm Incorporated Network-assisted peer discovery

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104135377A (en) * 2014-07-29 2014-11-05 深圳市金立通信设备有限公司 A network apparatus, transmission apparatus and information sharing system
CN106797377A (en) * 2014-09-05 2017-05-31 高通股份有限公司 The infrastructure access in networking data path is perceived via neighbours
CN106068010A (en) * 2015-04-20 2016-11-02 苹果公司 Neighbours' perception networking channel sequence
US10904928B2 (en) 2015-11-12 2021-01-26 Huawei Technologies Co., Ltd. Data link establishment method and apparatus
WO2017080426A1 (en) * 2015-11-12 2017-05-18 华为技术有限公司 Data link establishment method and apparatus
CN106713253A (en) * 2015-11-18 2017-05-24 中兴通讯股份有限公司 Method and device for sending and receiving information in peripheral sensing network
US10887933B2 (en) 2016-03-28 2021-01-05 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Device-to-device communication method, terminal device, and network device
TWI730073B (en) * 2016-03-28 2021-06-11 大陸商Oppo廣東移動通信有限公司 D2d communication method, terminal equipment, and network equipment
CN106230973B (en) * 2016-08-30 2019-05-21 南京邮电大学 A kind of file sharing method based on social networks
CN106230973A (en) * 2016-08-30 2016-12-14 南京邮电大学 A kind of file sharing method based on social networks
WO2018072152A1 (en) * 2016-10-19 2018-04-26 中兴通讯股份有限公司 Secure communication method, apparatus, and system
CN110011791A (en) * 2019-02-18 2019-07-12 西安电子科技大学 Electronics authority secure flows shifting method and system, electronics voucher system based on D2D
CN110011791B (en) * 2019-02-18 2021-07-09 西安电子科技大学 D2D-based electronic credential secure circulation method and system and electronic credential system

Also Published As

Publication number Publication date
WO2014026489A1 (en) 2014-02-20

Similar Documents

Publication Publication Date Title
US11856621B2 (en) Station and method for receiving a frame comprising a configuration change counter corresponding to another access point
CN103595750A (en) Method, terminal and network side for peer-to-pear communication
US10349321B2 (en) Extended service set transitions in wireless networks
CN108990038B (en) Operator-assisted device-to-device (D2D) discovery
US20160135041A1 (en) Wi-fi privacy in a wireless station using media access control address randomization
CN101399767B (en) Method, system and apparatus for security capability negotiation during terminal moving
EP2903322B1 (en) Security management method and apparatus for group communication in mobile communication system
CN103609154B (en) A kind of WLAN access authentication method, equipment and system
CN103179558A (en) Method and system for cluster system implementing group calling encryption
CN102469458A (en) Group authentication method and group authentication system in M2M communication
CN105532028A (en) Systems and methods for fast initial link setup security optimizations for psk and sae security modes
CN102469455A (en) Method and system for managing machine type communication (MTC) equipment based on generic bootstrapping architecture (GBA) in grouping manner
CN102316450A (en) Group-based M2M (machine-to-machine) communication authentication method and equipment
EP3133873B1 (en) Method and apparatus for receiving d2d discovery information
WO2014161155A1 (en) Methods and apparatus for securing device-to-device communications
CN112584379A (en) Direct connection communication security key negotiation method based on 5G D2D technology
CN109922514A (en) Communication means and communication device, access point apparatus and site apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140219

RJ01 Rejection of invention patent application after publication