CN112235772A - Method for realizing terminal hiding function based on 5G D2D technology - Google Patents

Method for realizing terminal hiding function based on 5G D2D technology Download PDF

Info

Publication number
CN112235772A
CN112235772A CN202011149164.2A CN202011149164A CN112235772A CN 112235772 A CN112235772 A CN 112235772A CN 202011149164 A CN202011149164 A CN 202011149164A CN 112235772 A CN112235772 A CN 112235772A
Authority
CN
China
Prior art keywords
terminal
password
target
discovery signal
hidden
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011149164.2A
Other languages
Chinese (zh)
Inventor
张子敬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN CHINO-E COMMUNICATION CO LTD
Original Assignee
SHENZHEN CHINO-E COMMUNICATION CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN CHINO-E COMMUNICATION CO LTD filed Critical SHENZHEN CHINO-E COMMUNICATION CO LTD
Priority to CN202011149164.2A priority Critical patent/CN112235772A/en
Publication of CN112235772A publication Critical patent/CN112235772A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a method for realizing a terminal hiding function based on a 5G D2D technology, which comprises the following steps: s10, setting a target D2D terminal as a hidden terminal, and setting a password key; s20, the target D2D terminal encrypts and transmits the discovery signal by using a password key; s30, the slave D2D terminal inputs a password, if the password is correct, the discovery signal of the target terminal is detected and analyzed, the discovery signal is responded, and if the password is incorrect, the operation is finished; and S40, the target D2D terminal receives the response information of the slave D2D terminal and starts mutual direct connection communication. The target D2D terminal is hidden by setting a password, the target D2D terminal encrypts the discovery signal of the D2D by using the password, and the slave D2D terminal which does not use the password for decryption cannot detect the discovery signal of the target D2D terminal, so that the access and the request of a strange D2D terminal are prevented, and the security risk and the interference are reduced.

Description

Method for realizing terminal hiding function based on 5G D2D technology
Technical Field
The invention belongs to the technical field of 5G communication, and particularly relates to a method for realizing a terminal hiding function based on a 5G D2D technology.
Background
5G D2D (Device-to-Device) terminal direct technology means that a nearby terminal can perform data transmission by direct communication in a short distance without forwarding through a base station. Due to the advantages of short distance and direct connection, the D2D technology can improve the use efficiency of wireless resources and expand the network coverage, so a great deal of research is obtained in the construction of 5G, the D2D technology can be applied to more scenes in the future, and the user experience is improved.
The 5G D2D communication technology is essentially an end-to-end communication technology of a terminal, and in the 5G D2D technology, the terminal scans each frequency band to discover a nearby D2D terminal, even if the D2D terminals find each other to complete direct communication, security of the communication terminal needs to be considered, and if the terminal is a malicious terminal, a large security risk exists.
In summary, there is a need for a solution to the above-mentioned problems, in which the password is set to hide the target D2D terminal, the target D2D terminal encrypts the discovery signal of D2D using the password, and the slave D2D terminal that does not decrypt using the password cannot detect the discovery signal of the target D2D terminal, thereby overcoming the above-mentioned problems.
Disclosure of Invention
In view of the shortcomings of the prior art, the present invention aims to provide a method for implementing a terminal hiding function based on the 5G D2D technology, and aims to solve the problem that the D2D terminals in the prior art can complete direct communication when finding each other, and have a large security risk.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method for realizing a terminal hiding function based on a 5G D2D technology is characterized by comprising the following steps:
s10, setting a target D2D terminal as a hidden terminal, and setting a password key;
s20, the target D2D terminal encrypts and transmits the discovery signal by using a password key;
s30, the slave D2D terminal inputs a password, if the password is correct, the discovery signal of the target terminal is detected and analyzed, the discovery signal is responded, and if the password is incorrect, the operation is finished;
and S40, the target D2D terminal receives the response information of the slave D2D terminal and starts mutual direct connection communication.
Preferably, before step S10, the method further includes that the 5G gbb performs common configuration on D2D discovery, and informs all other terminals supporting the D2D discovery function in the cell of relevant configuration information through system broadcast information.
Preferably, the setting of the target D2D terminal as the hidden terminal in the step S10 is to set the hidden function of the open target D2D terminal through the UI interface entry.
Compared with the prior art, the invention has the beneficial effects that:
the invention provides a method for realizing a terminal hiding function based on a 5G D2D technology, which comprises the following steps: s10, setting a target D2D terminal as a hidden terminal, and setting a password key; s20, the target D2D terminal encrypts and transmits the discovery signal by using a password key; s30, the slave D2D terminal inputs a password, if the password is correct, the discovery signal of the target terminal is detected and analyzed, the discovery signal is responded, and if the password is incorrect, the operation is finished; and S40, the target D2D terminal receives the response information of the slave D2D terminal and starts mutual direct connection communication. The target D2D terminal is hidden by setting a password, the target D2D terminal encrypts the discovery signal of the D2D by using the password, and the slave D2D terminal which does not use the password for decryption cannot detect the discovery signal of the target D2D terminal, so that the access and the request of a strange D2D terminal are prevented, and the security risk and the interference are reduced.
Drawings
FIG. 1 is a flow chart of a preferred embodiment of the present invention;
FIG. 2 is a diagram of the model effect of the preferred embodiment of the present invention;
FIG. 3 is a flowchart illustrating the effect of the process according to the preferred embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and effects of the present invention clearer and clearer, the present invention is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1-3, the method for implementing a terminal hiding function based on the 5G D2D technology provided by the invention comprises the following steps:
s10, setting a target D2D terminal as a hidden terminal, and setting a password key;
s20, the target D2D terminal encrypts and transmits the discovery signal by using a password key;
s30, the slave D2D terminal inputs a password, if the password is correct, the discovery signal of the target terminal is detected and analyzed, the discovery signal is responded, and if the password is incorrect, the operation is finished;
and S40, the target D2D terminal receives the response information of the slave D2D terminal and starts mutual direct connection communication.
Specifically, as shown in fig. 2, 5G UE1 is a hidden D2D terminal, a hidden password is set by a user, UE1 encrypts a discovery signal of D2D by using the hidden password, UE2 and UE3 perform blind detection on nearby discovery signals, the discovery signal resolved to UE1 cannot be detected without a password or by inputting an incorrect password, and the discovery signal resolved to UE1 can be detected only by inputting a correct password, so that the UE2 can correctly resolve the discovery signal of UE1 due to inputting a correct password, and thus UE2 finds UE 1; on the other hand, since the UE3 cannot analyze the discovery signal from the UE1 because of no password or an incorrect password input, the presence of the UE1 cannot be known, and the purpose of hiding the UE1 is achieved.
In some embodiments, before step S10, the method further includes that the 5G gbb performs common configuration on D2D discovery, and informs all other terminals supporting D2D discovery function in the cell of relevant configuration information through system broadcast information.
Specifically, in the discovery process of the 5G D2D terminal, the gNB needs to reserve a part of resources for D2D discovery and is dedicated to transmitting and detecting the D2D discovery signal, and needs to perform common configuration on D2D discovery through the base station, and notify all other terminals supporting the D2D discovery function in the cell of relevant configuration information through a system broadcast message. The discovered D2D terminal randomly or purposefully selects time frequency resources according to the cell public configuration information to transmit discovery signals; the discovery end device performs blind detection in the D2D discovery signal resource pool according to the cell configuration information, and completes the discovery process of D2D in this process.
In some embodiments, the setting of the target D2D terminal as the hidden terminal in the step S10 is to open the hidden function of the target D2D terminal through the UI interface entry setting.
Specifically, a user can set a hidden function of an open target D2D terminal through a UI interface entry, and set a hidden password, after the function setting is successful, the hidden D2D terminal encrypts and transmits a Discovery signal of the D2D terminal by using the password, that is, the D2D Discovery Sequence Message is encrypted by using the hidden password, and a terminal which does not know the password cannot analyze the Message, that is, cannot recognize the Discovery signal. For a user who knows the hidden password to input the hidden password, the Discovery signal of the hidden D2D terminal is parsed, for example, UE2, and after the parsing is successful, a Response message D2D Discovery Response needs to be replied to the hidden D2D terminal. From there, hidden D2D terminals are discovered by UE 2. D2D secure communication for encrypting and decrypting data using the hidden password is subsequently continued. When the hidden password of the hidden D2D terminal is changed, the terminal communicating with the old password cannot sense the hidden D2D terminal any more, and needs to input a new password before being identified again.
In summary, the working principle of the invention is as follows:
the invention provides a method for realizing a terminal hiding function based on a 5G D2D technology, which comprises the following steps: s10, setting a target D2D terminal as a hidden terminal, and setting a password key; s20, the target D2D terminal encrypts and transmits the discovery signal by using a password key; s30, the slave D2D terminal inputs a password, if the password is correct, the discovery signal of the target terminal is detected and analyzed, the discovery signal is responded, and if the password is incorrect, the operation is finished; and S40, the target D2D terminal receives the response information of the slave D2D terminal and starts mutual direct connection communication. The target D2D terminal is hidden by setting a password, the target D2D terminal encrypts the discovery signal of the D2D by using the password, and the slave D2D terminal which does not use the password for decryption cannot detect the discovery signal of the target D2D terminal, so that the access and the request of a strange D2D terminal are prevented, and the security risk and the interference are reduced.
It should be understood that equivalents and modifications of the technical solution and inventive concept thereof may occur to those skilled in the art, and all such modifications and alterations should fall within the scope of the appended claims.

Claims (3)

1. A method for realizing a terminal hiding function based on a 5G D2D technology is characterized by comprising the following steps:
s10, setting a target D2D terminal as a hidden terminal, and setting a password key;
s20, the target D2D terminal encrypts and transmits the discovery signal by using a password key;
s30, the slave D2D terminal inputs a password, if the password is correct, the discovery signal of the target terminal is detected and analyzed, the discovery signal is responded, and if the password is incorrect, the operation is finished;
and S40, the target D2D terminal receives the response information of the slave D2D terminal and starts mutual direct connection communication.
2. The method of claim 1, further comprising a step of configuring D2D discovery by 5G gbb in common before step S10, and informing all other terminals supporting D2D discovery function in the cell of relevant configuration information through system broadcast information, based on 5G D2D technology.
3. The method for implementing the terminal hiding function based on the 5G D2D technology of claim 1, wherein the step of setting the target D2D terminal as the hidden terminal in S10 is to set the hidden function of the open target D2D terminal through a UI interface entry.
CN202011149164.2A 2020-10-23 2020-10-23 Method for realizing terminal hiding function based on 5G D2D technology Pending CN112235772A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011149164.2A CN112235772A (en) 2020-10-23 2020-10-23 Method for realizing terminal hiding function based on 5G D2D technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011149164.2A CN112235772A (en) 2020-10-23 2020-10-23 Method for realizing terminal hiding function based on 5G D2D technology

Publications (1)

Publication Number Publication Date
CN112235772A true CN112235772A (en) 2021-01-15

Family

ID=74110604

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011149164.2A Pending CN112235772A (en) 2020-10-23 2020-10-23 Method for realizing terminal hiding function based on 5G D2D technology

Country Status (1)

Country Link
CN (1) CN112235772A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013118096A1 (en) * 2012-02-10 2013-08-15 Renesas Mobile Corporation Method, apparatus and computer program for facilitating secure d2d discovery information
US20150009858A1 (en) * 2013-07-08 2015-01-08 Electronics And Telecommunications Research Institute Discovery method and apparatus in device-to-device direct communication
US20160165426A1 (en) * 2013-07-09 2016-06-09 Kyocera Corporation Mobile communication system, user terminals and network devices
US20160294519A1 (en) * 2013-11-01 2016-10-06 Lg Electronics Inc. Method for transmitting discovery message in wireless communication system and device therefor

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013118096A1 (en) * 2012-02-10 2013-08-15 Renesas Mobile Corporation Method, apparatus and computer program for facilitating secure d2d discovery information
US20150009858A1 (en) * 2013-07-08 2015-01-08 Electronics And Telecommunications Research Institute Discovery method and apparatus in device-to-device direct communication
US20160165426A1 (en) * 2013-07-09 2016-06-09 Kyocera Corporation Mobile communication system, user terminals and network devices
US20160294519A1 (en) * 2013-11-01 2016-10-06 Lg Electronics Inc. Method for transmitting discovery message in wireless communication system and device therefor

Similar Documents

Publication Publication Date Title
EP3484196B1 (en) Method and apparatus for registering wireless device in wireless communication system
EP3272179B1 (en) Methods, apparatuses and system for configuring connection between devices in communication system
CN110139271B (en) Method, system and device for configuring intelligent household equipment to access network in batch
US20180365404A1 (en) Proximity unlock and lock operations for electronic devices
US9907097B2 (en) Wireless communication device, wireless communication system, program and wireless communication method
CN108632056B (en) Intelligent equipment network configuration method and system
CN105682093A (en) Wireless network access method and access device, and client
KR101504447B1 (en) Systems and methods for implementing ad hoc wireless networking
US10999275B2 (en) Method for configuring access for a limited user interface (UI) device
JP5282448B2 (en) Wireless communication system, wireless communication apparatus and disconnection processing method thereof
WO2018126801A1 (en) Data sending method and apparatus, and data receiving method and apparatus
US20210258877A1 (en) Communication apparatus and communication method for low power event monitoring
US20140337633A1 (en) System and Method for Indicating a Service Set Identifier
CN111901091B (en) Method and apparatus for wireless communication
RU2016136978A (en) PREVENTION OF REPEAT ATTACK AT DETECTION OF COMMUNICATION DEVICE-DEVICE LONG-TERM DEVELOPMENT
US20110182207A1 (en) Wireless communication device, program, wireless communication method, and wireless communication system
US10681749B2 (en) Method and apparatus for WLAN device pairing
WO2023280194A1 (en) Network connection management method and apparatus, readable medium, program product, and electronic device
US20180048632A1 (en) Precursory client configuration for network access
JP2017523741A (en) Information providing method, apparatus, program, and recording medium
US20180095500A1 (en) Tap-to-dock
WO2024083235A1 (en) Network configuration method based on wi-fi sensing, embedded chip system, and medium
JPWO2011158377A1 (en) Wireless communication method, wireless communication apparatus, and wireless communication system
JP4494121B2 (en) Wireless LAN connection system, wireless LAN connection method, and access point
JP2007184762A (en) Communication method of wireless communication system, and wireless communication device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210115