CN112512023A - Communication method, device and system - Google Patents

Communication method, device and system Download PDF

Info

Publication number
CN112512023A
CN112512023A CN202011400579.2A CN202011400579A CN112512023A CN 112512023 A CN112512023 A CN 112512023A CN 202011400579 A CN202011400579 A CN 202011400579A CN 112512023 A CN112512023 A CN 112512023A
Authority
CN
China
Prior art keywords
terminal
communication
access network
data
communication method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011400579.2A
Other languages
Chinese (zh)
Inventor
朱晓雨
丁海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202011400579.2A priority Critical patent/CN112512023A/en
Publication of CN112512023A publication Critical patent/CN112512023A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0231Traffic management, e.g. flow control or congestion control based on communication conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a communication method, a communication device and a communication system, relates to the technical field of communication, improves the communication efficiency, realizes communication between terminal equipment in a D2D mode under a cellular communication technology, and relieves the processing pressure of access network equipment. The method comprises the following steps: receiving a first request sent by a first terminal, wherein the first request is used for requesting to communicate with a second terminal; determining that the first terminal and the second terminal satisfy the D2D communication condition; and sending a first response to the first terminal, wherein the first response is used for instructing the first terminal to communicate with the second terminal by the D2D mode.

Description

Communication method, device and system
Technical Field
Embodiments of the present application relate to the field of communications technologies, and in particular, to a communication method, apparatus, and system.
Background
With the development of communication technology, the number of terminals accessed by a base station may be huge, wherein, in the traditional cellular communication technology taking the base station as a center, a main user of the base station manages and forwards data of a plurality of accessed terminals. In this case, the number of terminals to be managed by the base station is huge, and the number of data to be transferred is also huge, which results in a large processing pressure on the base station.
To alleviate the processing pressure of the base station, device-to-device (D2D) communication may be supplemented by conventional base station-centric cellular communication techniques. When the terminal communicates by the D2D method, the terminal does not need the base station to transmit, so the processing pressure of the base station is reduced.
However, at present there is no: under cellular communication technology, how to implement a method for communication between terminal devices by means of D2D.
Disclosure of Invention
The application provides a communication method, a communication device and a communication system, which realize communication between terminal equipment in a D2D mode under a cellular communication technology, improve the communication efficiency and reduce the processing pressure of access network equipment.
In a first aspect, the present application provides a communication method, which may be applied to an access network device, and the communication method may include: receiving a first request sent by a first terminal, wherein the first request is used for requesting to communicate with a second terminal; determining that the first terminal and the second terminal satisfy the D2D communication condition; and sending a first response to the first terminal, wherein the first response is used for instructing the first terminal to communicate with the second terminal by the D2D mode.
By the communication method provided by the application, when the first terminal needs to communicate with the second terminal, the first request is sent to the access network device, and when the access network device determines that the first terminal and the second terminal meet the D2D communication condition, the first terminal and the second terminal are indicated to communicate in a D2D mode. Namely, the direct communication between the first terminal and the second terminal in a D2D mode is realized through the control of the access network equipment under the cellular communication technology; when the terminals communicate in the D2D mode, the access network equipment is not required to forward data, so that the transmission rate is improved, the transmission delay is shortened, and the transmission power consumption is reduced, thereby improving the communication efficiency and reducing the processing pressure of the access network equipment.
With reference to the first aspect, in a possible implementation manner, the D2D communication condition may include: the sector to which the first terminal belongs is the same as the sector to which the second terminal belongs, and the communication between the first terminal and the second terminal is normal; or the sector to which the first terminal belongs and the sector to which the second terminal belongs are adjacent sectors managed by the access network equipment, and the communication between the first terminal and the second terminal is normal. In the possible implementation manner, the application range of the communication method can be increased according to the flexible configuration of the D2D communication condition.
With reference to the first aspect or one of the foregoing possible implementation manners, in another possible implementation manner, the communication method may further include: acquiring a public key of a first terminal and a public key of a second terminal; sending the public key of the second terminal to the first terminal so that the first terminal communicates with the second terminal according to the public key of the second terminal; sending the public key of the first terminal to the second terminal; so that the second terminal communicates with the first terminal according to the public key of the first terminal. In this possible implementation manner, the access network device sends the public key of the opposite end to the terminal, so that the terminal can encrypt data with the public key of the opposite end when communicating in the D2D manner, thereby improving the security of communication.
With reference to the first aspect or any one of the foregoing possible implementation manners, in another possible implementation manner, the communication method may further include: obtaining an authorization code of a first terminal and an authorization code of a second terminal; sending an authorization code of the first terminal to the first terminal so that the first terminal communicates with the second terminal according to the authorization code of the first terminal; and sending the authorization code of the second terminal to the second terminal so that the second terminal communicates with the first terminal according to the authorization code of the second terminal. In this possible implementation manner, the access network device sends its own authorization code to the terminal, so that the terminal can encrypt data with its own authorization code when communicating in the D2D manner, thereby improving the security of communication.
With reference to the first aspect or any one of the foregoing possible implementation manners, in another possible implementation manner, the communication method may further include: acquiring at least one part of data of communication between a first terminal and a second terminal; determining that at least a portion of the data includes critical data; the critical data includes one or more of: illegal keywords, illegal speech, illegal videos, malicious keywords, malicious speech, and malicious videos; and sending a second response, wherein the second response is used for indicating that the communication between the first terminal and the second terminal is terminated. In this possible implementation manner, the access network device may obtain part or all of data during terminal communication, and when the data during communication is determined to include the critical data, may instruct the terminal to terminate its D2D communication; thereby further improving the security of the communication.
In a second aspect, the present application provides another communication method, which may be applied to a first terminal, and which may include: sending a first request to the access network equipment, wherein the first request is used for requesting to communicate with a second terminal; receiving a first response sent by the access network equipment, wherein the first response is used for indicating that the access network equipment communicates with the second terminal in a device-to-device D2D mode; and communicating with the second terminal by means of the D2D.
By the communication method provided by the application, when the first terminal needs to communicate with the second terminal, the first request is sent to the access network device, and when the access network device determines that the first terminal and the second terminal meet the D2D communication condition, the first terminal and the second terminal are indicated to communicate in a D2D mode. Namely, the direct communication between the first terminal and the second terminal in a D2D mode is realized through the control of the access network equipment under the cellular communication technology; when the terminals communicate in the D2D mode, the access network equipment is not required to forward data, so that the transmission rate is improved, the transmission delay is shortened, and the transmission power consumption is reduced, thereby improving the communication efficiency and reducing the processing pressure of the access network equipment.
With reference to the second aspect, in a possible implementation manner, the communication method may further include: receiving a public key of a second terminal sent by access network equipment; communicating with the second terminal by means of D2D, may include: and sending the data to be sent of the first terminal encrypted by the public key of the second terminal to the second terminal in a D2D mode. In this possible implementation manner, when the terminal communicates in the D2D manner, the public key of the opposite end may be used to encrypt data, so that the security of communication is improved.
With reference to the second aspect or one of the foregoing possible implementation manners, in another possible implementation manner, the communication method may further include: receiving an authorization code of a first terminal sent by access network equipment; communicating with the second terminal by means of D2D, may include: and sending the data to be sent of the first terminal and the data spliced by the authorization code of the first terminal to the second terminal in a D2D mode. In the possible implementation manner, when the terminal communicates in the D2D manner, the terminal can encrypt data by using its own authorization code, thereby improving the security of communication.
With reference to the second aspect or any one of the foregoing possible implementation manners, in another possible implementation manner, the communication method may further include: acquiring at least one part of data of communication between a first terminal and a second terminal; at least a portion of the data is transmitted to the access network device. In this possible implementation manner, the terminal sends part or all of the data in the communication process to the access network device, so that the access network device can determine whether the communicated data includes critical data, and when the communicated data includes critical data, instruct the terminal to terminate its D2D communication; thereby further improving the security of the communication.
In a third aspect, the present application further provides a communication apparatus, where the communication apparatus may be an access network device in the first aspect or any one of the possible implementation manners of the first aspect, or the communication apparatus may be deployed in the access network device. The communication apparatus may include a receiving unit, a determining unit, and a transmitting unit. Wherein:
the receiving unit is used for receiving a first request sent by a first terminal, and the first request is used for requesting to communicate with a second terminal.
And a determining unit, configured to determine that the first terminal and the second terminal satisfy the D2D communication condition.
And the sending unit is used for sending a first response to the first terminal, and the first response is used for indicating the first terminal to communicate with the second terminal in a D2D mode.
It should be noted that, the communication apparatus provided in the third aspect is configured to execute the communication method provided in any possible implementation manner of the first aspect or the first aspect, and specific implementation of the first aspect may refer to the specific implementation of the first aspect, and is not described herein again.
In a fourth aspect, the present application further provides another communication device, which may be a terminal in any one of the above-mentioned second aspect or possible implementation manners of the second aspect, or may be deployed in the terminal. The communication device may include a transmitting unit, a receiving unit, and a communication unit. Wherein:
a sending unit, configured to send a first request to the access network device, where the first request is used to request communication with the second terminal.
And a receiving unit, configured to receive a first response sent by the access network device, where the first response is used to instruct to communicate with the second terminal by using a D2D method.
And the communication unit is used for communicating with the second terminal by the D2D mode.
It should be noted that, the communication apparatus provided in the fourth aspect is configured to execute the communication method provided in any possible implementation manner of the second aspect or the second aspect, and specific implementation may refer to a specific implementation manner of the second aspect, and is not described herein again.
In a fifth aspect, the present application provides an access network device, which may include a processor, configured to implement the communication method described in the first aspect. The device may further comprise a memory coupled to the processor, and the processor may implement the communication method described in the first aspect or any of the possible implementations of the first aspect when executing the instructions stored in the memory. The device may also include a communication interface for the communication means to communicate with other devices, which may be, for example, a transceiver, circuit, bus, module, or other type of communication interface. In one possible implementation, the apparatus may include:
a memory may be used to store instructions.
The processor can be used for receiving a first request sent by a first terminal through the communication interface, wherein the first request is used for requesting to communicate with a second terminal; and sending a first response to the first terminal, wherein the first response is used for instructing the first terminal to communicate with the second terminal by the D2D mode.
The processor may be further configured to determine that the first terminal and the second terminal satisfy the D2D communication condition.
In the present application, the instructions in the memory may be stored in advance, or may be downloaded from the internet and stored when the communication device is used. The coupling in the embodiments of the present application is an indirect coupling or connection between devices, units or modules, which may be in an electrical, mechanical or other form, and is used for information interaction between the devices, units or modules.
In a sixth aspect, the present application provides a terminal (also referred to as a terminal device), which may include a processor, configured to implement the communication method described in the second aspect. The device may further comprise a memory coupled to the processor, and the processor may implement the communication method described in the second aspect or any of the possible implementations of the second aspect when executing the instructions stored in the memory. The device may also include a communication interface for the communication means to communicate with other devices, which may be, for example, a transceiver, circuit, bus, module, or other type of communication interface. In one possible implementation, the apparatus may include:
a memory may be used to store instructions.
A processor operable to send a first request to an access network device over a communication interface, the first request requesting communication with a second terminal; receiving a first response sent by the access network equipment, wherein the first response is used for indicating that the access network equipment communicates with the second terminal in a device-to-device D2D mode; and communicating with the second terminal by means of the D2D.
In the present application, the instructions in the memory may be stored in advance, or may be downloaded from the internet and stored when the communication device is used. The coupling in the embodiments of the present application is an indirect coupling or connection between devices, units or modules, which may be in an electrical, mechanical or other form, and is used for information interaction between the devices, units or modules.
In a seventh aspect, a communication system is provided, where the system may include a first communication apparatus and a second communication apparatus, and the first communication apparatus may be the communication apparatus in the third aspect or any possible implementation manner of the third aspect; the second communication device may be the communication device of the fourth aspect or any possible implementation manner of the fourth aspect.
In an eighth aspect, a communication system is provided, where the system may include an access network device and a terminal, and the access network device may be a device in any possible implementation manner of the fifth aspect or the fifth aspect; the terminal may be the device of any one of the possible implementations of the sixth aspect or the sixth aspect.
In a ninth aspect, an embodiment of the present application further provides a computer-readable storage medium, which includes instructions, when executed on a computer, for causing the computer to perform the communication method according to any one of the above aspects or any one of the possible implementation manners.
In a tenth aspect, an embodiment of the present application further provides a computer program product, which when run on a computer, causes the computer to execute the communication method according to any one of the above aspects or any one of the possible implementations.
In an eleventh aspect, an embodiment of the present application provides a chip system, where the chip system includes a processor and may further include a memory, and is configured to implement the functions performed by the access network device in the foregoing method. The chip system may be formed by a chip, and may also include a chip and other discrete devices.
The solutions provided in the third aspect to the eleventh aspect are used to implement the communication method provided in the first aspect or the second aspect, and therefore, the same beneficial effects as those of the first aspect or the second aspect can be achieved, and details are not repeated here.
It should be noted that, on the premise of not contradicting the scheme, various possible implementation manners of any one of the above aspects may be combined.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a network architecture according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a communication device according to an embodiment of the present application;
fig. 3 is a flowchart illustrating a communication method according to an embodiment of the present application;
fig. 4 is a flowchart illustrating another communication method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of another communication device provided in an embodiment of the present application;
fig. 6 is a schematic structural diagram of another communication device provided in an embodiment of the present application;
fig. 7 is a schematic structural diagram of an access network device according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of another communication device provided in an embodiment of the present application;
fig. 9 is a schematic structural diagram of another communication device provided in an embodiment of the present application;
fig. 10 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the embodiments of the present application, for convenience of clearly describing the technical solutions of the embodiments of the present application, terms such as "first" and "second" are used to distinguish the same items or similar items with substantially the same functions and actions. Those skilled in the art will appreciate that the terms "first," "second," etc. do not denote any order or quantity, nor do the terms "first," "second," etc. denote any order or importance. The technical features described in the first and second descriptions have no sequence or magnitude order.
In the embodiments of the present application, words such as "exemplary" or "for example" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present relevant concepts in a concrete fashion for ease of understanding.
In the description of the present application, a "/" indicates a relationship in which the objects associated before and after are an "or", for example, a/B may indicate a or B; in the present application, "and/or" is only an association relationship describing an associated object, and means that there may be three relationships, for example, a and/or B, and may mean: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. Also, in the description of the present application, "a plurality" means two or more than two unless otherwise specified. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple.
In the embodiments of the present application, at least one may also be described as one or more, and a plurality may be two, three, four or more, which is not limited in the present application.
Because the prior art cannot solve the problem of how to implement the method specifically under the cellular communication technology, the terminal devices communicate with each other by means of D2D.
The application provides a communication method, a communication device and a communication system, when a first terminal needs to communicate with a second terminal, a first request is sent to an access network device, and when the access network device determines that the first terminal and the second terminal meet a D2D communication condition, the first terminal and the second terminal are indicated to communicate in a D2D mode. Namely, the direct communication between the first terminal and the second terminal in a D2D mode is realized through the control of the access network equipment under the cellular communication technology; when the terminals communicate in the D2D mode, the access network equipment is not required to forward data, so that the transmission rate is improved, the transmission delay is shortened, and the transmission power consumption is reduced, thereby improving the communication efficiency and reducing the processing pressure of the access network equipment.
In order to facilitate understanding of the implementation process of the scheme in the embodiment of the present application, a network architecture in the embodiment of the present application is first described. The migration method of the edge device in the embodiment of the present application may be applied to the following network architecture.
It should be noted that the network architecture and the scenario are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided by the embodiment of the present application, and as a person having ordinary skill in the art knows that along with the evolution of the network architecture and the appearance of a new service scenario, the technical solution provided by the embodiment of the present application is also applicable to similar architectures and scenarios.
As shown in fig. 1, a schematic structural diagram of a network architecture is provided. As shown in fig. 1, the communication system 10 may include a plurality of terminals 101, an access network device 102. Wherein, the terminals 101 can communicate with each other; the access network device 102 may communicate with the terminal 101.
The terminal 101 may also be referred to as a User Equipment (UE) or a terminal (terminal) device. A terminal 101 operable to communicate with an access network device 102; the terminal 101 can also be used for communication among the terminals 101; for example, one terminal 101 may communicate with another terminal 101 by way of D2D. Among other things, the terminal 101 may include, but is not limited to, a mobile phone (mobile phone), a tablet computer (tablet computer), a laptop computer (laptop computer), a wearable device (such as a smart watch, a smart band, a smart helmet, smart glasses), and other devices with wireless access capability.
The access network device 102 is responsible for controlling and managing traffic, and analyzing and processing reported data. For example, the access network device 102 may be a base station, a broadband network service gateway (BNG), an aggregation switch, a non-3 GPP access device, and the like. The base stations may include various forms of base stations, such as: macro base stations, micro base stations (also referred to as small stations), relay stations, access points, and the like, which are not specifically limited in this embodiment of the present application. The device for the terminal to access the core network is collectively referred to as an access network device in the text, and will not be described again. For example, the access network device may be an evolved universal terrestrial radio access network (E-UTRAN) device in a 4G network, a next generation radio access network (NG-RAN) device in a 5G network, and so on.
The embodiments of the present application will be described in detail with reference to the accompanying drawings.
In one aspect, an embodiment of the present application provides a communication apparatus 20, configured to perform the communication method provided in the present application. The communication device 20 may be the terminal 101 or the access network device 102 shown in fig. 1; alternatively, the communication device 20 may be deployed in the terminal 101 or the access network apparatus 102 shown in fig. 1.
Fig. 2 is a schematic diagram of a communication device 20 according to an embodiment of the present disclosure, and as shown in fig. 2, the communication device 20 may include at least one processor 21, a memory 22, a communication interface 23, and a communication bus 24. The following describes each component of the communication device 20 in detail with reference to fig. 2:
the processor 21 may be a single processor or may be a general term for a plurality of processing elements. For example, the processor 21 is a Central Processing Unit (CPU), and may be an Application Specific Integrated Circuit (ASIC), or one or more integrated circuits configured to implement the embodiments of the present application, such as: one or more microprocessors (digital signal processors, DSPs), or one or more Field Programmable Gate Arrays (FPGAs).
The processor 21 may perform various functions of the function alias control server by running or executing software programs stored in the memory 22 and calling data stored in the memory 22. In particular implementations, processor 21 may include one or more CPUs such as CPU0 and CPU1 shown in fig. 2 as one example.
In particular implementations, the communication device 20 may include a plurality of processors, such as the processor 21 and the processor 25 shown in fig. 2, as one example. Each of these processors may be a single-Core Processor (CPU) or a multi-Core Processor (CPU). A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The memory 22 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that can store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disk read-only memory (CD-ROM) or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 22 may be self-contained and coupled to the processor 21 via a communication bus 24. The memory 22 may also be integrated with the processor 21. The memory 22 is used for storing software programs for executing the scheme of the application, and is controlled by the processor 21 to execute.
The communication interface 23 is any device, such as a transceiver, for communicating with other devices or communication networks, such as ethernet, Radio Access Network (RAN), Wireless Local Area Networks (WLAN), etc. The communication interface 23 may include a receiving unit as well as a transmitting unit.
The communication bus 24 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 2, but it is not intended that there be only one bus or one type of bus.
It is noted that the components shown in fig. 2 do not constitute a limitation of the communication device, which may comprise more or less components than shown, or some components in combination, or a different arrangement of components than those shown in fig. 2.
In one possible implementation, the processor 21 performs the following functions by running or executing software programs and/or modules stored in the memory 22 and calling up data stored in the memory 22:
receiving a first request sent by a first terminal, wherein the first request is used for requesting to communicate with a second terminal; determining that the first terminal and the second terminal satisfy the D2D communication condition; and sending a first response to the first terminal, wherein the first response is used for instructing the first terminal to communicate with the second terminal by the D2D mode.
In another possible implementation, the processor 21 performs the following functions by running or executing software programs and/or modules stored in the memory 22 and calling up data stored in the memory 22:
sending a first request to the access network equipment, wherein the first request is used for requesting to communicate with a second terminal; receiving a first response sent by the access network equipment, wherein the first response is used for indicating that the access network equipment communicates with the second terminal in a device-to-device D2D mode; and communicating with the second terminal by means of the D2D.
On the other hand, the embodiment of the present application provides a communication method, which is applied to an interaction process between a terminal and an access network device, and is used for implementing D2D communication between terminals under the control of the access network device. The communication method provided in the embodiment of the present application will be described by taking an example where a first terminal initiates a request and an access network device controls the first terminal to communicate with a second terminal in a D2D manner.
The first terminal is any terminal managed by the access network equipment, and the second terminal is a receiving end for sending data by the first terminal.
Fig. 3 is a flowchart of a communication method provided in an embodiment of the present application, and as shown in fig. 3, the method may include:
s301, the first terminal sends a first request to the access network equipment.
Wherein the first request is for requesting communication with the second terminal.
Specifically, S301 may be implemented as: the first terminal sends a first request to the access network device through the control channel for requesting communication with the second terminal.
Illustratively, the first terminal sends a first request to the access network device through the control channel, where the first request may include an Internet Protocol (IP) address of the first terminal, a port number of the first terminal, an IP address of the second terminal, and a port number of the second terminal. The first request is used for requesting the access network equipment to communicate with the second terminal; after the access network device receives the first request, the communication between the first terminal and the second terminal is realized according to the port number of the first terminal under the IP address of the first terminal and the port number of the second terminal under the IP address of the second terminal.
S302, the access network equipment receives a first request sent by a first terminal.
The first request received by the access network device is the first request sent by the first terminal in S301.
Illustratively, S302 may be implemented as: the access network equipment receives a first request sent by a first terminal, and acquires the IP address of the first terminal, the port number of the first terminal, the IP address of a second terminal and the port number of the second terminal in the first request.
And S303, the access network equipment determines that the first terminal and the second terminal meet the D2D communication condition.
Among them, the D2D communication conditions may include: the sector to which the first terminal belongs is the same as the sector to which the second terminal belongs; the communication between the first terminal and the second terminal is normal; or the sector to which the first terminal belongs and the sector to which the second terminal belongs are adjacent sectors managed by the access network equipment; and the communication between the first terminal and the second terminal is normal.
Specifically, the implementation of S303 may include, but is not limited to, the following steps 1 to 2.
Step 1, the access network equipment judges whether the sector to which the first terminal belongs and the sector to which the second terminal belongs belong to the same or adjacent sectors managed by the access network equipment.
The access network device manages a plurality of sectors, each sector corresponding to a location area. The access network equipment detects the position of a first terminal and the position of a second terminal, takes the sector where the position of the first terminal is located as the sector where the first terminal belongs, and takes the sector where the position of the second terminal is located as the sector where the second terminal belongs. Then, whether the sector to which the first terminal belongs and the sector to which the second terminal belongs belong to the same or adjacent sectors managed by the access network device is judged.
And 2, the access network equipment detects whether the communication between the first terminal and the second terminal is normal.
Specifically, the access network equipment sends a communication test instruction to the first terminal and the second terminal respectively through the control channel, the first terminal sends test data to the second terminal after receiving the communication test instruction, and the second terminal sends a response of normal communication to the access network equipment if successfully receiving the test data; and the second terminal sends test data to the first terminal after receiving the communication test instruction, and the first terminal sends a response of normal communication to the access network equipment if successfully receiving the test data.
If the access network equipment receives a response that the communication sent by the first terminal and the second terminal is normal, the communication between the first terminal and the second terminal is considered to be normal; otherwise, the communication between the first terminal and the second terminal is considered to be abnormal.
Therefore, if the access network device determines that the sector to which the first terminal belongs and the sector to which the second terminal belongs belong to the same or adjacent sectors managed by the access network device, and detects that the communication between the first terminal and the second terminal is normal, the first terminal and the second terminal are considered to satisfy the D2D communication condition. Otherwise, the first terminal and the second terminal are considered not to satisfy the D2D communication condition.
S304, the access network equipment sends a first response to the first terminal.
Wherein the first response is used for instructing the first terminal to communicate with the second terminal by means of D2D.
Specifically, the access network device sends a first response to the first terminal through the control channel. To instruct the first terminal to communicate with the second terminal by means of D2D.
S305, the first terminal receives a first response sent by the access network equipment.
The first response received by the first terminal is the first response sent by the access network device in S304.
S306, the first terminal communicates with the second terminal in a D2D mode.
Specifically, the implementation of S306 may include, but is not limited to, the following modes 1 to 4.
In the mode 1, the first terminal adopts unencrypted data to communicate with the second terminal through a mode D2D.
Specifically, a first terminal sends unencrypted data to be sent of the first terminal to a second terminal through a traffic channel, and the second terminal receives the data to be sent of the first terminal; the second terminal sends the unencrypted data to be sent of the second terminal to the first terminal through the traffic channel, and the first terminal receives the data to be sent of the second terminal sent by the second terminal.
In the mode 2, the first terminal communicates with the second terminal through a D2D mode according to the public key of the terminal.
Specifically, the implementation of the mode 2 may include, but is not limited to, the following steps a to D.
Step A, the access network equipment acquires a public key of the first terminal and a public key of the second terminal.
In a possible implementation manner, the access network device sends a public key request instruction to the first terminal and the second terminal through the control channel, respectively, for requesting the public keys of the first terminal and the second terminal. And after receiving the public key request instruction, the first terminal and the second terminal respectively send respective public keys to the access network equipment. The access network equipment receives a public key of the first terminal sent by the first terminal and a public key of the second terminal sent by the second terminal.
In another possible implementation manner, the access network device sends a public key request instruction to the first terminal and the second terminal through the control channel, respectively, for requesting the public keys of the first terminal and the second terminal; and the public key request instruction comprises a public key of the access network equipment. And after receiving the public key request instruction sent by the access network equipment, the first terminal and the second terminal respectively send the public keys of the first terminal and the second terminal to the access network equipment after being encrypted by the public key of the access network equipment. The access network equipment receives an encrypted public key of the first terminal sent by the first terminal, decrypts the encrypted public key by using a private key of the access network equipment, and obtains the public key of the first terminal; and the access network equipment receives the encrypted public key of the second terminal sent by the second terminal, decrypts the public key by using the private key of the access network equipment, and acquires the public key of the second terminal.
Alternatively, the access network device may store the public key of the first terminal and the public key of the second terminal.
And step B, the access network equipment sends the public key of the first terminal to the second terminal and sends the public key of the second terminal to the first terminal.
In a possible implementation manner, the access network device sends the unencrypted public key of the first terminal to the second terminal, and sends the unencrypted public key of the second terminal to the first terminal.
In another possible implementation manner, the access network device sends the public key of the first terminal encrypted by the private key of the access network device to the second terminal, and sends the public key of the second terminal encrypted by the private key of the access network device to the first terminal.
And step C, the first terminal acquires the public key of the second terminal, and the second terminal acquires the public key of the first terminal.
For one possible implementation manner of step B, step C may include: a first terminal receives an unencrypted public key of a second terminal sent by access network equipment; and the second terminal receives the unencrypted public key of the first terminal sent by the access network equipment.
For another possible implementation manner of step B, step C may include: the first terminal receives the encrypted public key of the second terminal sent by the access network equipment, and then the public key of the access network equipment is used for decryption to obtain the public key of the second terminal; and the second terminal receives the encrypted public key of the first terminal sent by the access network equipment, and then decrypts the encrypted public key by using the public key of the access network equipment to obtain the public key of the first terminal.
D, the first terminal sends the data to be sent of the first terminal encrypted by the public key of the second terminal to the second terminal through a service channel; and the second terminal receives the encrypted data to be sent of the first terminal, and then decrypts the encrypted data to be sent by using the private key of the second terminal to obtain the data content sent by the first terminal. The second terminal sends data to be sent of the second terminal encrypted by the public key of the first terminal to the first terminal through a service channel; the first terminal receives the encrypted data to be sent by the second terminal, and then decrypts the encrypted data to be sent by using the private key of the first terminal to obtain the data content sent by the second terminal.
And in the mode 3, the first terminal communicates with the second terminal in a D2D mode according to the authorization code of the terminal.
Specifically, the access network device sends an authorization code of the first terminal and an authorization code of the second terminal to the first terminal, and sends an authorization code of the second terminal and an authorization code of the first terminal to the second terminal. After receiving the own authorization code, the first terminal splices the data to be sent of the first terminal with the authorization code of the first terminal, and then sends the spliced data to be sent of the first terminal to the second terminal through a traffic channel; and the second terminal receives the spliced data to be sent of the first terminal, and extracts the data except the authorization code of the first terminal in the received data as the data sent by the first terminal. After receiving the own authorization code, the second terminal splices the data to be sent of the second terminal with the authorization code of the second terminal, and then sends the spliced data to be sent of the second terminal to the first terminal through a traffic channel; and the first terminal receives the spliced data to be sent of the second terminal, and extracts the data except the authorization code of the second terminal in the received data as the data sent by the second terminal.
The authorization code of the first terminal and the authorization code of the second terminal may be randomly generated or generated according to a certain fixed algorithm, and the method for obtaining the authorization code is not uniquely defined in the embodiment of the present application.
The specific splicing method can be configured according to actual requirements, and this is not limited in the embodiment of the present application. For example, the authorization code may be concatenated before the data to be transmitted; or, the authorization code is spliced after the data to be transmitted, or the authorization code is spliced at a fixed position of the data to be transmitted.
It should be noted that the authorization code may be a fixed value or a dynamically adjusted value. For example, a terminal may correspond to an authorization code; or, one terminal in one D2D communication corresponds to one authorization code, that is, the authorization code may be dynamically adjusted according to different D2D communications; or one terminal in one period corresponds to one authorization code, that is, the authorization code of the terminal can be periodically adjusted.
And 4, the first terminal communicates the data with the second terminal in a D2D mode according to the public key of the terminal and the authorization code of the terminal.
First, a first terminal obtains a public key of a second terminal, an authorization code of the first terminal and an authorization code of the second terminal, and the second terminal obtains the public key of the first terminal, the authorization code of the first terminal and the authorization code of the second terminal. For a specific obtaining process, reference may be made to the mode 2 and the mode 3, which are not described herein again.
Then, the first terminal splices the data to be sent of the first terminal with the authorization code of the first terminal, encrypts the spliced data by using the public key of the second terminal, and sends the spliced and encrypted data to be sent of the first terminal to the second terminal through the service channel. The second terminal receives the data, decrypts the data by using a private key of the second terminal, and extracts the data except the authorization code of the first terminal from the data as the data sent by the first terminal. The second terminal splices the data to be sent of the second terminal with the authorization code of the second terminal, encrypts the spliced data by using the public key of the first terminal, and sends the spliced and encrypted data to be sent of the second terminal to the first terminal through the service channel. The first terminal receives the data, decrypts the data by using a private key of the first terminal, and extracts the data except the authorization code of the second terminal from the data as the data sent by the second terminal.
It should be noted that, if the D2D communication condition is not satisfied by the first terminal and the second terminal, the access network device may send a third instruction to the first terminal to instruct the first terminal to communicate with the second terminal in a forwarding manner through the access network device.
By the communication method provided by the application, when the first terminal needs to communicate with the second terminal, the first request is sent to the access network device, and when the access network device determines that the first terminal and the second terminal meet the D2D communication condition, the first terminal and the second terminal are indicated to communicate in a D2D mode. Namely, the direct communication between the first terminal and the second terminal in a D2D mode is realized through the control of the access network equipment under the cellular communication technology; when the terminals communicate in the D2D mode, the access network equipment is not required to forward data, so that the transmission rate is improved, the transmission delay is shortened, and the transmission power consumption is reduced, thereby improving the communication efficiency and reducing the processing pressure of the access network equipment.
Further, the communication method provided by the embodiment of the application can also monitor data during terminal communication. When the communication data includes illegal data or malicious data, the access network device control terminal terminates the communication in the D2D mode.
As shown in fig. 4, the monitoring and control process may include, but is not limited to, the following S307 to S312.
S307, the first terminal acquires at least a part of data of the communication between the first terminal and the second terminal.
Wherein the at least a portion of the data may be some or all of the data communicated by the first terminal and the second terminal via D2D.
In one possible implementation, S307 may be implemented as: the first terminal periodically acquires part or all of data communicated by the first terminal and the second terminal through the D2D mode as the at least part of data.
The duration of the obtaining period may be configured according to actual requirements, which is not specifically limited in the embodiments of the present application.
In yet another possible implementation manner, S307 may be implemented as: and when the sampling condition is met, the first terminal acquires partial data communicated by the first terminal and the second terminal through the D2D mode as the at least partial data.
The specific content of the sampling condition may be configured according to actual requirements, which is not specifically limited in the embodiments of the present application.
Exemplary sampling conditions may include: every 100 bytes of text sent; alternatively, 10 pictures per transmission.
S308, the first terminal sends the at least part of data to the access network device.
For example, the first terminal may periodically transmit the at least a portion of the data to the access network device via an idle traffic channel.
It will be appreciated that the at least a portion of the data may be acquired and transmitted by the second terminal; or, the at least a portion of the data is acquired and transmitted by the first terminal and the second terminal simultaneously. The embodiments of the present application are not limited to this.
S309, the access network equipment acquires at least a part of data of the communication between the first terminal and the second terminal.
The at least a portion of data acquired by the access network device may be the at least a portion of data sent by the first terminal to the access network device in S308.
It is to be understood that the at least one part of data acquired by the access network device may also be the at least one part of data sent by the second terminal to the access network device; alternatively, the at least one part of data acquired by the access network device may also be a union of the at least one part of data sent by the first terminal to the access network device and the at least one part of data sent by the second terminal to the access network device.
Optionally, the access network device may store the at least a portion of the data.
S310, the access network device determines that the at least a portion of data includes critical data.
Wherein. The critical data may include one or more of: illegal keywords, illegal speech, illegal videos, malicious keywords, malicious speech, and malicious videos.
Specifically, the access network device performs keyword detection, or key voice matching, or key video detection on the at least one part of data to determine whether the at least one part of data includes key data, and if the at least one part of data includes key data, performs the following S311; and if the at least part of data does not comprise the key data, continuing to monitor the communication between the first terminal and the second terminal until the communication is finished.
And S311, the access network equipment sends a second response.
Wherein the second response is used for indicating that the communication between the first terminal and the second terminal is terminated.
In one possible implementation manner, S311 may be implemented as: the access network device sends a second response to the first terminal over the control channel to instruct the first terminal to terminate communication with the second terminal over D2D.
In another possible implementation manner, S311 may be implemented as: the access network device sends a second response to the second terminal over the control channel to instruct the second terminal to terminate communication with the first terminal by way of D2D.
In yet another possible implementation manner, S311 may be implemented as: the access network equipment respectively sends second responses to the first terminal and the second terminal through the control channel so as to indicate that the first terminal terminates the communication with the second terminal in a D2D mode; and instructing the second terminal to terminate communication with the first terminal by means of D2D.
And S312, the first terminal receives the second response.
Specifically, the first terminal receives a second response sent by the access network device, and terminates the communication with the first terminal in the D2D manner according to an indication of the second response.
It is understood that, corresponding to different implementations in S311, the second terminal may also receive the second response, and after the second terminal receives the second response, the second terminal may also terminate the communication with the first terminal by means of D2D according to an indication of the second response.
It should be noted that at least a part of the data may also be reported to the cloud processing platform or other content understanding platform, the cloud processing platform or other content understanding platform monitors the communication, and when the communication includes illegal data or malicious data, the control terminal terminates the communication between the first terminal and the second terminal by the D2D method.
The above-mentioned scheme provided by the embodiment of the present invention is introduced mainly from the point of interaction between the access network device and the terminal device in the communication system. It is understood that each communication device, for example, an access network device, a terminal device, etc., contains a hardware structure and/or a software module for performing each function in order to realize the functions. Those of skill in the art will readily appreciate that the present invention can be implemented in hardware or a combination of hardware and computer software, with the exemplary elements and algorithm steps described in connection with the embodiments disclosed herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiment of the present invention, the communication device and the like may be divided into functional modules according to the above method examples, for example, each functional module may be divided according to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, the division of the modules in the embodiment of the present invention is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
In the case of dividing each functional module according to each function, fig. 5 illustrates a communication apparatus 50 provided in this embodiment of the present application, which is used for implementing the function of the access network device in the foregoing embodiment. The communication device 50 may be an access network device; alternatively, the communication device 50 may be deployed in an access network device. As shown in fig. 5, the communication device 50 may include: a receiving unit 501, a determining unit 502 and a transmitting unit 503.
The receiving unit 501 is configured to receive a first request sent by a first terminal; the first request is used for requesting to communicate with the second terminal; for example, in conjunction with fig. 3 or fig. 4, the receiving unit 501 is configured to perform S302. The determining unit 502 is configured to determine that the first terminal and the second terminal satisfy the D2D communication condition, and to determine that at least a part of the data includes critical data; for example, in conjunction with fig. 3 or fig. 4, the determination unit 502 is configured to perform S303 in fig. 3 or fig. 4, and S310 in fig. 4. The sending unit 503 is configured to send a first response to the first terminal, where the first response is used to instruct the first terminal to communicate with the second terminal through the D2D; the sending unit 503 may be further configured to send a second response, where the second response is used to instruct to terminate the communication between the first terminal and the second terminal; the sending unit 503 may be further configured to send the public key of the second terminal to the first terminal, so that the first terminal communicates with the second terminal according to the public key of the second terminal; sending the public key of the first terminal to the second terminal; enabling the second terminal to communicate with the first terminal according to the public key of the first terminal; the sending unit 503 may also be configured to send an authorization code of the first terminal to the first terminal, so that the first terminal communicates with the second terminal according to the authorization code of the first terminal; and sending the authorization code of the second terminal to the second terminal so that the second terminal communicates with the first terminal according to the authorization code of the second terminal. For example, in conjunction with fig. 3 or fig. 4, the sending unit 503 is configured to execute S304 in fig. 3 or fig. 4, S306 in fig. 3 or fig. 4, and S311 in fig. 4. All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
Further, as shown in fig. 6, the communication device 50 may further include: an acquisition unit 504. The obtaining unit 504 is configured to obtain a public key of a first terminal and a public key of a second terminal; the obtaining unit 504 may be further configured to obtain an authorization code of the first terminal and an authorization code of the second terminal; the obtaining unit 504 may be further configured to obtain at least a portion of data of a communication between the first terminal and the second terminal; for example, in conjunction with fig. 3 or fig. 4, the obtaining unit 504 is configured to execute the relevant steps in S306 in fig. 3 and fig. 4, and S309 in fig. 4. All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
In the case of using an integrated unit, as shown in fig. 7, an access network device 70 provided in the embodiment of the present application is used to implement the functions of the access network device in the above-described method. The access network device 70 includes at least one processing module 701, which is used to implement the functions of the access network device in the embodiment of the present application. For example, the processing module 701 may be configured to execute S303 in fig. 3, which specifically refers to the detailed description in the method example, and is not described herein again.
The access network apparatus 70 may also include at least one memory module 702 for storing program instructions and/or data. The memory module 702 is coupled to the processing module 701. The coupling in the embodiments of the present application is an indirect coupling or a communication connection between devices, units or modules, and may be an electrical, mechanical or other form for information interaction between the devices, units or modules. The processing module 701 may cooperate with the memory module 702. Processing module 701 may execute program instructions stored in storage module 702. At least one of the at least one memory module may be included in the processing module.
The access network device 70 may also include a communication module 703 for communicating with other devices over a transmission medium for determining that the access network device 70 may communicate with other devices. The communication module 703 is used for the device to communicate with other devices. For example, the processor 701 may perform the processes S302 and S304 in fig. 3 or fig. 4 by using the communication module 703.
In actual implementation, the determining unit 502 and the obtaining unit 504 may be implemented by the processor 21 shown in fig. 2 calling the program code in the memory 22. The receiving unit 501 and the sending unit 503 may be implemented by the processor 21 shown in fig. 2 through the communication interface 23, and specific implementation processes may refer to descriptions of the communication method part shown in fig. 3 or fig. 4, which are not described herein again.
As described above, the communication device 50 or the access network device 70 provided in the embodiments of the present application may be used to implement the functions of the access network device in the methods implemented in the embodiments of the present application, and for convenience of description, only the portions related to the embodiments of the present application are shown, and details of the specific technology are not disclosed, please refer to the embodiments of the present application.
In the case of adopting each functional module divided corresponding to each function, as shown in fig. 8, a communication device 80 provided in the embodiment of the present application is used for implementing the functions of the terminal device in the above-described embodiment. The communication device 80 may be a terminal device; alternatively, the communication device 80 may be disposed in a terminal apparatus. As shown in fig. 8, the communication device 80 may include: a transmitting unit 801, a receiving unit 802, and a communication unit 803.
The sending unit 801 may be configured to send a first request to the access network device, where the first request is used to request communication with a second terminal; the sending unit 801 may further be configured to send at least a portion of the data to the access network device; for example, in conjunction with fig. 3 or fig. 4, the sending unit 801 is configured to execute S301 in fig. 3 or fig. 4, and S307 in fig. 4; the receiving unit 802 is configured to receive a first response sent by the access network device, where the first response is used to instruct to communicate with the second terminal by using a D2D manner; the receiving unit 802 may also be configured to receive an authorization code of the first terminal sent by the access network device; the receiving unit 802 may be further configured to receive a public key of the second terminal sent by the access network device; for example, in conjunction with fig. 3 or fig. 4, the receiving unit 802 is configured to perform S305 in fig. 3 or fig. 4, and S312 in fig. 4; the communication unit 803 is configured to execute S306 in fig. 3 or fig. 4. The communication unit 803 may be configured to communicate with a second terminal by means of D2D; the communication unit 803 may specifically be configured to send, to the second terminal, data to be sent of the first terminal encrypted by using the public key of the second terminal in a D2D manner; the communication unit 803 may further be specifically configured to send, to the second terminal, data obtained by splicing the data to be sent of the first terminal and the authorization code of the first terminal in a D2D manner; for example, in conjunction with fig. 3 or fig. 4, the communication unit 803 is configured to execute S306 in fig. 3 or fig. 4. All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
Further, as shown in fig. 9, the communication device 80 may further include: an acquisition unit 804. The obtaining unit 804 may be configured to obtain at least a portion of data of a communication between the first terminal and the second terminal; for example, in conjunction with fig. 4, the obtaining unit 804 is configured to execute S307 in fig. 4. All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
In the case of using an integrated unit, as shown in fig. 10, a terminal device 100 provided in the embodiment of the present application is used to implement the functions of the terminal device in the above-described embodiment. The terminal device 100 may include at least one processing module 1001 for implementing the functions of the terminal device in the embodiment of the present application, which is specifically referred to the detailed description in the method example, and is not described herein again.
Terminal device 100 may also include at least one memory module 1002 for storing program instructions and/or data. The storage module 1002 is coupled with the processing module 1001. The coupling in the embodiments of the present application is an indirect coupling or a communication connection between devices, units or modules, and may be an electrical, mechanical or other form for information interaction between the devices, units or modules. The processing module 1001 may cooperate with the storage module 1002. The processing module 1001 may execute program instructions stored in the storage module 1002. At least one of the at least one memory module may be included in the processing module.
The terminal device 100 may further include a communication module 1003 for communicating with other devices via a transmission medium, thereby determining that the terminal device 100 may communicate with other devices. The communication module 1003 is used for the device to communicate with other devices. Illustratively, the processing module 1001 performs S305 and S306 in the process of fig. 3 or fig. 4 using the communication module 1003.
In practical implementation, the sending unit 801, the receiving unit 802, and the communication unit 803 may be implemented by the processor 21 shown in fig. 2 calling the program code in the memory 22 and through the communication interface 23, and specific implementation procedures may refer to the description of the communication method portion shown in fig. 3 or fig. 4, and are not described herein again.
As described above, the communication apparatus 80 or the terminal device 100 provided in the embodiments of the present application can be used to implement the functions of the terminal device in the embodiments of the present application, and for convenience of description, only the portions related to the embodiments of the present application are shown, and specific technical details are not disclosed, please refer to the embodiments of the present application.
Other embodiments of the present application provide a communication system, which may include a first communication device and a second communication device, where the first communication device may implement the function of the access network device in the foregoing embodiments, and the second communication device may implement the function of the terminal device. For example, the first communication device may be an access network device described in this embodiment, and the second communication device may be a terminal device described in this embodiment.
Other embodiments of the present application provide a chip system, where the chip system includes a processor and may further include a memory, and is configured to implement the functions of the access network device in the embodiments shown in fig. 3 or fig. 4. The chip system may be formed by a chip, and may also include a chip and other discrete devices.
Other embodiments of the present application provide a chip system, where the chip system includes a processor and may further include a memory, and is configured to implement the functions of the terminal device in the embodiments shown in fig. 3 or fig. 4. The chip system may be formed by a chip, and may also include a chip and other discrete devices.
Further embodiments of the present application also provide a computer-readable storage medium, which may include a computer program, which, when run on a computer, causes the computer to perform the steps of the embodiments of fig. 3 or fig. 4 described above.
Further embodiments of the present application also provide a computer program product comprising a computer program which, when run on a computer, causes the computer to perform the steps of the embodiments of fig. 3 or fig. 4 described above.
Through the above description of the embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the modules or units is only one logical functional division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another device, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may be one physical unit or a plurality of physical units, that is, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (14)

1. A communication method is applied to an access network device, and comprises the following steps:
receiving a first request sent by a first terminal, wherein the first request is used for requesting to communicate with a second terminal;
determining that the first terminal and the second terminal satisfy a device-to-device D2D communication condition;
and sending a first response to the first terminal, wherein the first response is used for instructing the first terminal to communicate with the second terminal in a D2D mode.
2. The communication method according to claim 1, wherein the D2D communication conditions include:
the sector to which the first terminal belongs is the same as the sector to which the second terminal belongs, and the communication between the first terminal and the second terminal is normal;
or,
the sector to which the first terminal belongs and the sector to which the second terminal belongs are adjacent sectors managed by the access network equipment, and the communication between the first terminal and the second terminal is normal.
3. The communication method according to claim 1 or 2, characterized in that the communication method further comprises:
acquiring a public key of the first terminal and a public key of the second terminal;
sending the public key of the second terminal to the first terminal so that the first terminal communicates with the second terminal according to the public key of the second terminal;
sending the public key of the first terminal to the second terminal; so that the second terminal communicates with the first terminal according to the public key of the first terminal.
4. The communication method according to claim 1 or 2, characterized in that the communication method further comprises:
obtaining an authorization code of the first terminal and an authorization code of the second terminal;
sending an authorization code of the first terminal to the first terminal so that the first terminal communicates with the second terminal according to the authorization code of the first terminal;
and sending the authorization code of the second terminal to the second terminal so that the second terminal communicates with the first terminal according to the authorization code of the second terminal.
5. The communication method according to claim 1 or 2, characterized in that the communication method further comprises:
acquiring at least a part of data of the communication between the first terminal and the second terminal;
determining that the at least a portion of the data includes critical data; the critical data includes one or more of: illegal keywords, illegal speech, illegal videos, malicious keywords, malicious speech, and malicious videos;
and sending a second response, wherein the second response is used for indicating that the communication between the first terminal and the second terminal is terminated.
6. A communication method, applied to a first terminal, the communication method comprising:
sending a first request to access network equipment, wherein the first request is used for requesting to communicate with a second terminal;
receiving a first response sent by the access network equipment, wherein the first response is used for indicating that the second terminal is communicated with by a device-to-device D2D mode;
and communicating with the second terminal by the D2D mode.
7. The communication method according to claim 6, further comprising:
receiving a public key of the second terminal sent by the access network equipment;
the communication with the second terminal by the D2D mode comprises:
and sending the data to be sent of the first terminal, which is encrypted by the public key of the second terminal, to the second terminal in the D2D mode.
8. The communication method according to claim 6, further comprising:
receiving an authorization code of the first terminal sent by the access network equipment;
the communication with the second terminal by the D2D mode comprises:
and sending the data to be sent of the first terminal and the data spliced by the authorization code of the first terminal to the second terminal in the D2D mode.
9. The communication method according to any one of claims 6 to 8, characterized in that the communication method further comprises:
acquiring at least a part of data of the communication between the first terminal and the second terminal;
transmitting the at least a portion of the data to the access network device.
10. A communications apparatus, the communications apparatus deployed in an access network device, the communications apparatus comprising:
the terminal comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving a first request sent by a first terminal, and the first request is used for requesting to communicate with a second terminal;
a determination unit configured to determine that the first terminal and the second terminal satisfy a device-to-device D2D communication condition;
a sending unit, configured to send a first response to the first terminal, where the first response is used to instruct the first terminal to communicate with the second terminal in a D2D manner.
11. A communication apparatus, the communication apparatus being deployed in a first terminal, the communication apparatus comprising:
a sending unit, configured to send a first request to an access network device, where the first request is used to request communication with a second terminal;
a receiving unit, configured to receive a first response sent by the access network device, where the first response is used to instruct to communicate with the second terminal in a device-to-device D2D manner;
a communication unit, configured to communicate with the second terminal by using the D2D method.
12. An access network device comprising a processor that executes computer-executable instructions to cause the access network device to perform the communication method of any one of claims 1-5 when the access network device is operating.
13. A terminal comprising a processor that executes computer-executable instructions to cause the terminal to perform the communication method of any one of claims 6-9 when the terminal is run.
14. A data transmission system, characterized in that the system comprises an access network device and a terminal; wherein the access network device is configured to perform the communication method according to any one of the preceding claims 1 to 5; the terminal, configured to perform the communication method according to any one of claims 6 to 9.
CN202011400579.2A 2020-12-04 2020-12-04 Communication method, device and system Pending CN112512023A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011400579.2A CN112512023A (en) 2020-12-04 2020-12-04 Communication method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011400579.2A CN112512023A (en) 2020-12-04 2020-12-04 Communication method, device and system

Publications (1)

Publication Number Publication Date
CN112512023A true CN112512023A (en) 2021-03-16

Family

ID=74969656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011400579.2A Pending CN112512023A (en) 2020-12-04 2020-12-04 Communication method, device and system

Country Status (1)

Country Link
CN (1) CN112512023A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984699A (en) * 2012-12-03 2013-03-20 中国联合网络通信集团有限公司 D2D (device-to-device) communication data processing method, equipment and system
CN103747507A (en) * 2014-01-28 2014-04-23 宇龙计算机通信科技(深圳)有限公司 Selecting method, selecting device, terminal and base station for communication mode
CN104349303A (en) * 2013-08-05 2015-02-11 中兴通讯股份有限公司 Device-to-device (D2D) connection management method, devices and base station
CN105122886A (en) * 2013-03-08 2015-12-02 诺基亚技术有限公司 Method and apparatus for handover of device-to-device communications
CN108566686A (en) * 2018-03-29 2018-09-21 维沃移动通信有限公司 A kind of methods, devices and systems that D2D connections are established
CN108924892A (en) * 2017-04-07 2018-11-30 华为技术有限公司 A kind of D2D communication means and device
CN109275197A (en) * 2018-09-26 2019-01-25 Oppo(重庆)智能科技有限公司 A kind of communication connection method for building up and base station, terminal, storage medium
CN110366181A (en) * 2019-07-29 2019-10-22 努比亚技术有限公司 Data transmission method, system and computer readable storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984699A (en) * 2012-12-03 2013-03-20 中国联合网络通信集团有限公司 D2D (device-to-device) communication data processing method, equipment and system
CN105122886A (en) * 2013-03-08 2015-12-02 诺基亚技术有限公司 Method and apparatus for handover of device-to-device communications
CN104349303A (en) * 2013-08-05 2015-02-11 中兴通讯股份有限公司 Device-to-device (D2D) connection management method, devices and base station
CN103747507A (en) * 2014-01-28 2014-04-23 宇龙计算机通信科技(深圳)有限公司 Selecting method, selecting device, terminal and base station for communication mode
CN108924892A (en) * 2017-04-07 2018-11-30 华为技术有限公司 A kind of D2D communication means and device
CN108566686A (en) * 2018-03-29 2018-09-21 维沃移动通信有限公司 A kind of methods, devices and systems that D2D connections are established
CN109275197A (en) * 2018-09-26 2019-01-25 Oppo(重庆)智能科技有限公司 A kind of communication connection method for building up and base station, terminal, storage medium
CN110366181A (en) * 2019-07-29 2019-10-22 努比亚技术有限公司 Data transmission method, system and computer readable storage medium

Similar Documents

Publication Publication Date Title
KR101697414B1 (en) Shared network access via a peer-to-peer link
US10623943B1 (en) Subscriber identification module (SIM) task scheduler for dual SIM devices using citizens broadband radio service network
US11864263B2 (en) Wireless connection establishing methods and wireless connection establishing apparatuses
CN109088799B (en) Client access method, device, terminal and storage medium
US20140214261A1 (en) Remotely monitoring vehicle information using Wi-Fi Direct
WO2018170798A1 (en) Session migration method and device
WO2017166221A1 (en) Radio access control method, device and system
CN110519750B (en) Message processing method, device and system
CN112997528B (en) Network switching method and related equipment
CN112351431A (en) Method and device for determining safety protection mode
CN110730212A (en) Data processing method and device
EP3729856A1 (en) Opportunistic and efficient spectrum sharing between priority access and general access users
EP3585106A1 (en) Method and apparatus for processing service set identifier, and terminal
CN113556340B (en) Portable VPN terminal, data processing method and storage medium
US20170201506A1 (en) Communication Method, Apparatus, and System
CN112512023A (en) Communication method, device and system
CN111741463B (en) Communication connection method, related equipment and storage medium
CN108990039B (en) Data transmission method and related device
CN109743754B (en) Communication method, communication device, electronic equipment and computer-readable storage medium
CN115277037A (en) Communication method, network device, and computer-readable storage medium
RU2752247C1 (en) Method and apparatus for information transmission by means of a terminal and computer data storage medium
CN118101350B (en) Wearable device for monitoring vital signs and control method
CN116561810B (en) Storage management big data processing method and device based on hybrid cloud platform
US20230309191A1 (en) Emergency call method and apparatus, storage medium, and terminal
WO2016184183A1 (en) Wireless communication base station, data transmission and reception method, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210316