CN113396600A - Information verification method, device, equipment and storage medium - Google Patents

Information verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN113396600A
CN113396600A CN201980091289.3A CN201980091289A CN113396600A CN 113396600 A CN113396600 A CN 113396600A CN 201980091289 A CN201980091289 A CN 201980091289A CN 113396600 A CN113396600 A CN 113396600A
Authority
CN
China
Prior art keywords
information
application
verification
network element
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201980091289.3A
Other languages
Chinese (zh)
Other versions
CN113396600B (en
Inventor
刘建华
杨皓睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN113396600A publication Critical patent/CN113396600A/en
Application granted granted Critical
Publication of CN113396600B publication Critical patent/CN113396600B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides an information verification method, an information verification device, information verification equipment and a storage medium, and relates to the technical field of communication. The method comprises the following steps: sending an information verification request to a network function network element, wherein the information verification request carries first application information of a first application needing to be verified, and determining whether to execute a message event of a discovery message of the first application according to a verification result received from the network function network element, wherein the network function network element is a fifth generation 5G core network element, so that the information verification in a 5G system is realized.

Description

Information verification method, device, equipment and storage medium Technical Field
The present application relates to the field of communications technologies, and in particular, to an information verification method, apparatus, device, and storage medium.
Background
With the rapid development of 5G (Fifth Generation) communication technology, direct connection communication services of D2D (Device to Device) gradually get attention, and direct connection communication services of D2D mainly aim at some applications with high requirements on service quality such as speed and time delay.
In establishing D2D for an application, a terminal device may discover other terminal devices that are nearby and using the same application by sending discovery messages or listening to discovery messages. Before this, it is necessary to verify whether the application is able to trigger a message event related to a discovery message, including sending the discovery message or listening to the discovery message. Currently, in non-5G systems, it is generally necessary to verify, by the ProSe function network element, whether the application allows triggering of the message event related to the discovery message.
However, in the 5G communication system, the ProSe function network element is replaced by a part of network elements in the communication network architecture, and therefore, a method is needed to solve the problem of verification for discovery messages in the 5G system.
Disclosure of Invention
The embodiment of the application provides an information verification method, an information verification device, information verification equipment and a storage medium, which can be used for solving the problem of verification of discovery messages in a 5G system. The technical scheme is as follows:
in one aspect, an information verification method is provided, which is applied to a terminal device, and includes:
sending an information verification request to a network function network element, wherein the information verification request carries first application information of a first application needing to be verified; and determining whether to execute a message event of the discovery message for the first application according to a verification result received from the network function network element, wherein the network function network element is a fifth generation 5G core network element.
On the other hand, an information verification method is provided, which is applied to a network function network element, where the network function network element is a 5G core network element, and the method includes:
receiving an information verification request, wherein the information verification request carries first application information of a first application needing to be verified; and sending a verification result of the first application information to a terminal device, wherein the verification result is used for indicating whether the first application can trigger a message event of a discovery message.
In another aspect, an information verification method is provided, which is applied to a terminal device, and the method includes:
verifying the first application to be verified based on the application verification information; determining whether to execute a message event of a discovery message for the first application according to a verification result; the application verification information is sent by the network function network element in advance, and the network function network element is a 5G core network element.
On the other hand, an information verification method is provided, which is applied to a network function network element, where the network function network element is a 5G core network element, and the method includes:
sending application verification information to a terminal device, wherein the application verification information is used for the terminal device to determine whether to execute a message event of a discovery message of a first application based on first application information verification of the first application needing verification.
In another aspect, an information verification apparatus is provided, which is applied to a terminal device, and includes:
the first sending module is used for sending an information verification request to a network function network element, wherein the information verification request carries first application information of a first application needing to be verified; a determining module, configured to determine whether to execute a message event of the discovery message for the first application according to a verification result received from the network function network element, where the network function network element is a fifth-generation 5G core network element.
On the other hand, an information verification apparatus is provided, which is applied to a network functional network element, where the network functional network element is a 5G core network element, and the apparatus includes:
the receiving module is used for receiving an information verification request, wherein the information verification request carries first application information of a first application needing to be verified; a second sending module, configured to send a verification result of the first application information to a terminal device, where the verification result is used to indicate whether the first application can trigger a message event of a discovery message.
In another aspect, an information verification apparatus is provided, which is applied to a terminal device, and includes:
the verification module is used for verifying the first application to be verified based on the application verification information; an execution module, configured to determine whether to execute a message event of a discovery message for the first application according to a verification result; the application verification information is sent by the network function network element in advance, and the network function network element is a 5G core network element.
On the other hand, an information verification apparatus is provided, which is applied to a network functional network element, where the network functional network element is a 5G core network element, and the apparatus includes:
the third sending module is configured to send application verification information to the terminal device, where the application verification information is used for the terminal device to determine whether to execute a message event of a discovery message for a first application based on first application information verification of the first application that needs to be verified.
In another aspect, a terminal device is provided, which includes a processor and a memory, where the memory stores at least one instruction for execution by the processor to implement the steps of any one of the methods in the terminal device side in the present application.
In another aspect, a network functional network element is provided, which includes a processor and a memory, where the memory stores at least one instruction for execution by the processor to implement the steps of any of the methods at the network functional network element side in the present application.
In another aspect, a computer-readable storage medium is provided, on which instructions are stored, which when executed by a processor implement the steps of any of the methods in the present application on the side of a terminal device.
In another aspect, a computer-readable storage medium is provided, on which instructions are stored, which when executed by a processor implement the steps of any of the methods in the present application on the side of a terminal device.
The beneficial effects brought by the technical scheme provided by the embodiment of the application at least comprise:
the terminal equipment sends the first application information of the first application needing to be verified to a network function network element, the network function network element verifies whether the first application can trigger the message event of the discovery message or not, and feeds back the verification result to the terminal equipment, and the terminal equipment determines whether to execute the message event of the discovery message of the first application or not according to the fed-back verification result, so that the information verification in the 5G system is realized.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic diagram of a services network architecture provided by an exemplary embodiment of the present application;
FIG. 2 is a flow chart of a method of information verification provided by an exemplary embodiment of the present application;
fig. 3 is a schematic diagram of an internal structure of a terminal device according to an exemplary embodiment of the present application;
fig. 4 is a schematic diagram of an internal structure of a terminal device according to another exemplary embodiment of the present application;
FIG. 5 is a flow chart of a method of information verification provided by another exemplary embodiment of the present application;
FIG. 6 is a schematic structural diagram of an information verification device according to an exemplary embodiment of the present application;
fig. 7 is a schematic structural diagram of an information verification apparatus according to another exemplary embodiment of the present application;
fig. 8 is a schematic structural diagram of an information verification apparatus according to another exemplary embodiment of the present application;
fig. 9 is a schematic structural diagram of an information verification apparatus according to another exemplary embodiment of the present application;
fig. 10 is a schematic structural diagram of an apparatus provided in another exemplary embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Before describing the information verification method provided by the embodiment of the present application in detail, the implementation environment related to the embodiment of the present application is briefly described.
The information verification method provided by the embodiment of the application is applied to a service-oriented communication network architecture, and the interface protocol defined in the service-oriented communication network architecture provides more possibility for third-party service development. Referring to fig. 1, fig. 1 is a schematic diagram illustrating a communication network architecture that may be applied to a car networking service using D2D technology, according to an exemplary embodiment.
The communication Network architecture may include, but is not limited to, PCF (Policy Control Function) Network elements, UDM (User Data Manager) Network elements, AMF (Access and Mobility Management Function) Network elements, AF (Application Function) Network elements, NEF (Network Exposure Function) Network elements, SMF (Session Management Function) Network elements, NG-RAN (New Generation-Radio Access Network, Radio Access Network), and UE (User Equipment).
In the communication network architecture, the AMF may directly communicate with the PCF and the SMF, respectively, the AMF may directly communicate with the UE, the PCF may directly communicate with the UDM, the UDM may directly communicate with the AF, and the UDM may be provided with a UDR (Unified Data storage). The NG-RAN is respectively connected with the UE through a Uu interface, and the plurality of UEs are connected through a PC5 interface. Two adjacent UEs can perform direct communication through a PC5 interface, and each UE is provided with a D2D direct layer. Each UE may have installed therein at least one application capable of triggering a message event of a discovery message, which in some embodiments may be referred to as a V2X application.
It should be noted that, the above description is only given by taking the communication Network architecture as an example, in another embodiment, the communication Network architecture may further include other Network elements, for example, a UPF (User Plane Function) Network element, an NRF (Network Function Repository Function) Network element, and the like, which is not limited in this embodiment of the present application.
In this embodiment, the AMF may be referred to as a mobility management network element, the policy control function network element and the session management function network element may be collectively referred to as a network function network element, and further, the network function network element is a 5G core network element, and the AF may be referred to as an application server.
After the communication network architecture related to the embodiments of the present application is described, the information verification method provided by the embodiments of the present application will be described in detail with reference to the accompanying drawings.
Referring to fig. 2, fig. 2 is a flowchart illustrating an information verification method according to an exemplary embodiment, where the information verification method may be applied to the communication network architecture shown in fig. 1, and the method may include the following implementation steps:
step 201: the terminal equipment sends an information verification request to the network function network element, wherein the information verification request carries first application information of a first application needing to be verified.
The first Application information may be used to uniquely identify the first Application, and may be, for example, identified by an OS (Operating System) ID (Identification) and an APP (Application) ID; alternatively, the first application information may also be a predefined character string, and the like, which is not limited in this embodiment of the application.
As an example, when a certain service related to a first application needs to establish direct communication, a terminal device needs to be able to discover other terminal devices nearby in which the first application is installed, and for this purpose, a discovery message may be sent or a discovery message may be listened to. Before sending or listening, it is also necessary to verify whether the first application is capable of triggering a message event related to a discovery message, the message event including sending the discovery message or listening to the discovery message, i.e. whether the first application is capable of triggering a terminal device to send the discovery message or listen to the discovery message. As an example, the terminal device may send an information verification request carrying information of the first application that needs to be verified to the network function network element.
In a possible implementation manner, a specific implementation of sending, by the terminal device, the information verification request to the network function network element may include: and the terminal equipment packages the information verification request into a first transparent container, adds the first transparent container into a non-access stratum (NAS) message, sends the NAS message to a mobility management network element, and forwards the first transparent container to the network function network element by the mobility management network element.
Since a communication connection is established between the terminal device and a mobility management network element (AMF) on the network side, and the mobility management network element is connected to a network functional network element, in order to send the information verification request to the network functional network element, the terminal device may send the information verification request to an NAS (Non Access Stratum), the NAS layer encapsulates the verification request message into a first transparent container, encapsulates the first transparent container into an NAS message, and sends the NAS message to the mobility management network element. The mobility management network element receives the first transparent container without analyzing, and can directly forward the first transparent container to the network function network element.
It should be noted that, since the terminal device encapsulates the information verification request into the first transparent container and then adds the first transparent container to the NAS message, the mobility management network element may not need to decode the content in the first transparent container, thereby reducing the operation burden of the mobility management network element.
As another example, the terminal device encapsulates the information verification request into an NAS message and sends the NAS message to the mobility management network element, and the mobility management network element parses the information verification request from the NAS message and forwards the information verification request to the network function network element.
In this implementation manner, the terminal device transmits the information verification request to the NAS layer, and the NAS layer directly encapsulates the information verification request into an NAS message and then sends the NAS message to the mobility management network element.
It is worth mentioning that, in this implementation manner, since the terminal device is not required to perform the operation of encapsulating the information verification request into the first transparent container, but is directly encapsulated into the NAS message, the power consumption of the terminal device can be reduced.
As an example, the information verification request may further include group information, where the group information is used to indicate a group in which the first application is located; and/or, the information verification request may further include terminal device information of the terminal device; and/or the information verification request may also include user information.
Wherein the group identification can be used to uniquely identify a group. As an example, for the same application, if sessions of the same direct communication service are established among a plurality of terminal devices for the application, the plurality of terminal devices may be considered to belong to the same group, for example, to be grouped in a game. The terminal devices in the same group may be from the same PLMN (Public Land Mobile Network) or from different PLMNs. For example, a group includes 5 terminal devices, 3 of which may be terminal devices in PLMN1, 2 of which may be terminal devices in PLMN2, 3 of which PLMN1 may communicate directly on the PC5 interface using D2D technology, and 3 of which PLMN1 may also communicate with 2 of which PLMN2 uses a network. In some embodiments, in addition to requiring authentication of the first application, the group in which the first application resides may be authenticated to determine whether the group allows for message events that trigger discovery messages, and thus, the information authentication request may also include group information.
The terminal device information is used to uniquely identify the terminal device, and may be, for example, a GPSI (general Public subscriber Identifier). In some embodiments, a part of specific terminal devices may be limited to be capable of triggering a message event of a discovery message, so that the terminal device installed with the first application may be verified while verifying the first application, that is, the terminal device information may be carried in the information verification request to check whether the terminal device where the first application is located is capable of triggering a message event of a discovery message.
The user information may be used to uniquely identify a user in an application, and for example, the user information may be a user account. In some embodiments, the user account logged in to the first application may also be verified, that is, whether the user information allows a message event triggering a discovery message may be verified, and thus, the information verification request may carry the user information.
The information verification request is used to instruct the network functional network element to perform verification based on the first application information and the application verification information, and the specific implementation is as follows.
Step 202: the network function network element receives the information verification request.
Step 203: the network functional network element obtains application authentication information.
Wherein the application authentication information includes second application information of a second application capable of triggering a message event of the discovery message.
The second application is an application authorized to trigger a message event of the discovery message, and in the application authentication information, the authorized second application may include one or more applications, that is, the application authentication information includes at least one piece of second application information.
As an example, the application verification information further includes group information of a group in which the second application information is located, wherein each second application information is associated with at least one group information or each group information is associated with at least one second application information; and/or the application verification information further comprises terminal device information of a terminal device used for installing the second application; and/or the application authentication information further comprises user information for logging in the second application.
As described above, in addition to the first application may be authenticated, it may be necessary to authenticate at least one of group information, terminal device information, and user information related to the first application, and correspondingly, the application authentication information may include at least one of group information, terminal device information, and user information related to an authorized second application.
The association relationship between the second application information and the group information may include two types, one type is that the second application information is associated with at least one group information, that is, each group in at least one group related to the second application allows to trigger a message event of the discovery message; another is that a certain group of information is associated with at least one second application information, i.e. each of the at least one second application within the certain group is allowed to trigger a message event of the discovery message.
As an example, the specific implementation of the network function network element obtaining the application verification information may include: and the network functional network element acquires the application verification information from the local.
The network functional network element may locally store the application authentication information, and the locally stored application authentication information may be pulled from the user data management network element in advance.
As an example, the specific implementation of the network function network element obtaining the application verification information may further include: the network function network element obtains the application verification information from the user data management network element, and the application verification information in the user data management network element is sent by the application server in advance.
When the application authentication information is not locally stored in the network functional network element, the application authentication information may be pulled from the user data management network element. As an example, when the network function network element is a session management function network element, the session management function network element pulls the application authentication information from the user data management network element through the policy control function network element, that is, the policy control function network element needs to forward the application authentication information pulled from the user data management network element to the session management function network element at this time.
The origin of the application authentication information in the user data managing network element is briefly described here. In some embodiments, the application server may send application authentication information that can be applied to the discovery process on the PC5 to the user data management network element, and further, the application server may send the application authentication information to the NEF, which sends the NEF to the user data management network element. The user data management network element receives and stores the application authentication information sent from the application server, and further, the user data management network element can also store the application authentication information into the UDR.
Step 204: the network function network element performs authentication based on the first application information and the application authentication information.
Since the application authentication information includes second application information of a second application capable of triggering a message event of a discovery message, the network functional network element may detect, during the authentication process, whether the second application information in the application authentication information includes the first application information, if so, the authentication is passed, i.e., it indicates that the first application is capable of triggering the message event of the discovery message, and if not, the authentication is failed, i.e., it indicates that the first application is not capable of triggering the message event of the discovery message.
Further, when the information verification request further includes a group identifier, the group identifier needs to be verified, that is, whether the group identifier in the information verification request is included in the application verification information is queried, and if the group identifier is included, the verification is passed, and if the group identifier is not included, the verification is not passed.
Further, when the information verification request further includes a terminal device identifier, the terminal device identifier also needs to be verified, that is, whether the terminal device identifier in the information verification request is included in the application verification information is queried, if so, the verification is passed, and if not, the verification is not passed.
Further, when the information verification request further includes a user identifier, the user identifier also needs to be verified, that is, whether the application verification information includes the user identifier in the information verification request is queried, and if the application verification information includes the user identifier in the information verification request, the verification is passed, and if the application verification information does not include the user identifier, the verification is not passed.
That is, the application authentication information may correspond to the information to be authenticated carried in the information authentication request, and when the application authentication information further includes the group identifier, it indicates that it is necessary to verify whether the first application can perform the discovery process on the PC5 interface, and also to verify whether the group corresponding to the group identifier allows the discovery process on the PC5 interface. Similarly, when the application authentication information includes the terminal device identification, it is described that it is necessary to verify not only whether the first application can perform the discovery process on the PC5 interface but also whether the terminal device on which the first application is installed can perform the discovery process on the PC5 interface, and so on.
Step 205: sending a verification result of the first application information to the terminal equipment, wherein the verification result is used for indicating whether the first application can trigger a message event of a discovery message
And after the verification is finished, the network functional network element sends the verification result to the terminal equipment. Wherein the verification result may include a verification success message indicating that the first application is capable of performing the discovery process on the PC5 interface or a verification failure message indicating that the first application is not capable of performing the discovery process on the PC5 interface. Further, when the verification result includes the verification success message, the verification result may further include an application code, and the application code may be used by the terminal device for a secure transmission mechanism in a subsequent direct communication process. Further, when the verification result includes the verification failure message, the verification result further includes a failure reason, for example, the failure reason may include that the application is not allowed, the group is not allowed, or the terminal device is not allowed.
As an example, the specific implementation that the network function network element sends the verification result of the first application information to the terminal device may include the following two possible implementation manners:
the first implementation mode comprises the following steps: and the network functional network element encapsulates the verification result into a second transparent container and sends the second transparent container to the mobility management network element, and the mobility management network element encapsulates the second transparent container into the NAS message and forwards the NAS message to the terminal equipment.
That is, in this implementation manner, the network function network element may perform an encapsulation operation on the verification result, that is, encapsulate the verification result into the second transparent container, and then send the second transparent container to the mobility management network element. After receiving the second transparent container, the mobility management network element may send the second transparent container to the NAS layer, and encapsulate the second transparent container in an NAS message by using the NAS layer, and send the NAS message to the terminal device. As an example, the mobility management network element may send the second transparent container to the terminal device via a UE configuration update message.
The second implementation mode comprises the following steps: the network function network element sends the verification result to a mobility management network element, and the mobility management network element encapsulates the verification result into an NAS message and forwards the NAS message to the terminal equipment.
In this implementation, the network functional network element does not process the verification result, but directly sends the verification result to the mobility management network element, and the mobility management network element encapsulates the verification result into an NAS message and forwards the NAS message to the terminal device. As an example, after receiving the verification result, the mobility management network element may send the verification result to the NAS layer, and encapsulate the verification result into an NAS message by the NAS layer and forward the NAS message to the terminal device. Illustratively, the mobility management network element may send the verification result to the terminal device through a UE configuration update message.
Step 206: the terminal device determines whether to execute a message event of a discovery message for the first application according to a verification result received from the network function network element.
And the terminal equipment receives a verification result fed back by the network function network element, wherein the verification result is used for indicating whether the first application can trigger a message event of a discovery message. As described above, since the network functional network element may send the verification result to the terminal device in different manners, correspondingly, the terminal device obtains the verification result in different manners, which may specifically include:
in the first case: in the first case of step 201, the terminal device receives the NAS message through the NAS layer, reads the second transparent container from the NAS message, and interprets the second transparent container to obtain the verification result.
In the second case: for the second case in step 202, the terminal device receives the NAS message through the NAS layer, and parses the NAS message, so as to obtain the verification result.
As an example, the terminal device may further receive the verification result through the D2D direct connection layer, and further, may feed back the verification result to the application layer.
The terminal device decides whether to execute the message event related to the discovery message according to the message included in the verification result, and it is understood that the message event related to the discovery message is executed when the verification result includes a verification success message, and the message event related to the discovery message is not executed when the verification result does not include the verification success message.
Next, for the case that the verification is successful, the operations performed by the terminal device are described as follows:
before introducing the operation executed by the terminal device, the layers included inside the terminal device and the inter-layer relationship are simply introduced. Referring to fig. 3, the terminal device may include an application layer, a D2D direct connection layer, and an access layer, where the inter-layer relationship among the application layer, the D2D direct connection layer, and the access layer is as shown in fig. 3, where the access layer may directly transfer information with the application layer, that is, forwarding by the D2D direct connection layer is not required.
As an example, when the message event includes sending a discovery message, if the verification result includes a verification success message, the terminal device constructs a discovery message through the D2D direct connection layer, and passes the discovery message to the access layer; the terminal device adds the first application information as additional information of the discovery message through the access layer, and sends the added discovery message.
That is, when sending the discovery message, if it is determined that the first application can trigger sending the discovery message through verification, the terminal device builds the discovery message through the D2D direct connection layer, and then sends the discovery message to the access layer of the terminal device, and indicates that the message type is the discovery message. After receiving the discovery message, the access layer of the terminal device sets the first application information as additional information of the discovery message, for example, the first application information and the discovery message may be packaged, and then the access layer sends the packaged data to the terminal device on the receiving side. The first application information packaged by the access stratum of the terminal device may be preconfigured or sent by the application layer.
As an example, the message event includes an interception discovery message, and if the verification result includes a verification success message, the terminal device receives, through the access layer, the discovery message added with additional information, and detects whether first application information in the additional information is application information of an application that needs to be intercepted. When the terminal device determines that the first application information is the application information of the application needing monitoring through the access layer, the first application information is transferred to the application layer or transferred to the application layer through the D2D direct connection layer.
Corresponding to the sending end, when the terminal device is used as the terminal device of the receiving side, after being authorized to monitor the discovery message, the terminal device sends the discovery message through the access layer. When receiving the discovery message, the access layer obtains additional information of the discovery message, that is, obtains the first application information, and the access layer may determine whether the first application information is the application information of the application that needs to be monitored according to the preconfigured application detection information. If so, the access layer may send the first application information directly to the access layer, or the access layer may send the first application information to the D2D direct connection layer, and the D2D direct connection layer forwards the first application information to the application layer.
The preconfigured application detection information may be from an application layer, a D2D direct connection layer, or may also be from a network side. The specific implementation from the network side may refer to that the network functional network element configures the application detection information for the terminal device, where the application detection information may be the same as the application verification information, or may be a subset of the application verification information. Further, the network function network element may pull the application detection information from a user data management network element.
Of course, the above is only described by taking the example that the additional information includes the first application information, in another embodiment, the additional information may further include group information, and the like, in this case, the application detection information in the terminal device at the receiving side further includes group information of a group that needs to be monitored, and the like, at this time, it is further necessary to determine whether the group information in the additional information is the group information of the group that needs to be monitored, and after determining that the group information is the group information of the group that needs to be monitored, it is further necessary to feed back the group information to the application layer, and detailed description thereof is not repeated here.
As an example, if the message event includes sending a discovery message, if the verification result includes a verification success message, the terminal device constructs a discovery message through a D2D direct connection layer and then transfers the discovery message to an access layer, where the discovery message includes the first application information, and the terminal device sends the discovery message through the access layer.
If the message event includes sending a discovery message, the terminal device is a terminal device on the sending side. After determining that the authentication is passed, the terminal device may add the first application information to the discovery message when constructing the discovery message through the D2D direct connection layer, and then send the discovery message including the first application information through the access layer. Further, when the discovery message is constructed, in addition to the construction based on the first application information, the construction may be performed based on at least one of a group identifier, a terminal device identifier, and a user identifier.
As an example, if the message event includes a monitoring discovery message, if the verification result includes a verification success message, the terminal device receives the discovery message through the access layer, transmits the discovery message to the D2D direct connection layer, parses the discovery message through the D2D direct connection layer, and transmits the first application information to the application layer when it is determined that the first application information obtained after parsing is application information of an application that needs monitoring.
That is, as shown in fig. 4, if the terminal device is a terminal device of a receiving end, after the discovery message is monitored by the authorization, the access layer receives the discovery message. Upon receiving the discovery message, the discovery message is passed to the D2D direct layer, and the D2D direct layer parses the discovery message to parse out the first application information in the discovery message. Thereafter, the D2D direct connection layer detects whether the first application information in the discovery message is application information of an application that needs to be monitored, and as described above, the D2D direct connection layer may determine whether the first application information is application information of an application that needs to be monitored according to preconfigured application detection information. When the terminal device determines that the first application information in the discovery message is the application information of the application needing monitoring through the D2D direct connection layer, the first application information is transferred to the application layer, so that the terminal device realizes a discovery process.
Further, the terminal device receives a discovery message through the access layer, detects whether first application information in the discovery message is application information of an application that needs to be monitored, and when the terminal device determines that the first application information is the application information of the application that needs to be monitored through the access layer, transfers the first application information to the D2D direct connection layer, and the terminal device transfers the first application information to the application layer through the D2D direct connection layer.
That is, if the terminal device is a terminal device that receives information, after monitoring the discovery message is authorized, the discovery message is received through the access layer, and then whether the first application information in the discovery message is application information of an application that needs to be monitored or not can be detected through the access layer. Similarly, the access stratum may determine whether the first application is application information of an application that needs to be monitored according to the preconfigured application detection information. Wherein the preconfigured information may be from an application layer, a direct connection layer, or from a network side. When the access layer determines that the first application is an application needing monitoring, the first application information is transferred to a D2D direct connection layer and transferred to an application layer by the D2D direct connection layer, or the access layer directly transfers the first application information to the application layer.
Further, the verification result includes configuration information of a timer, and the configuration information is used for indicating that the verification result is valid all the time in the running time period of the timer.
The configuration information may include a timing duration of the timer. That is to say, after the end of the verification, the network function network element may configure a timer for the terminal device, as an example, the network function network element may determine whether to configure the timer according to a local policy, and further, the network function network element may configure the timer according to the auxiliary information of the application server, that is, the auxiliary information may include configuration information of the timer. During the timer running time period, the terminal device may always use the verification result, for example, a message event of a discovery message triggered multiple times by the same application or group does not need to be verified. Once the timer expires, the terminal device needs to reinitiate the authentication procedure.
As an example, the starting time of the timer includes at least one of:
(1) the time when the configuration information of the timer is received.
That is, the terminal device starts the timer upon receiving the configuration information, and the running time length of the timer is the timing time length in the configuration information. It is understood that, since the configuration information of the timer is included in the verification result, it can also be understood that the terminal device starts the timer when receiving the verification result.
(2) The time at which the restart timer command is received.
The restart timer command may be indicated by the network side, that is, in some cases, the terminal device may be required to restart the timer due to factors such as a change of the verification result, and the network side may issue a restart timer instruction at this time, and accordingly, the terminal device starts the timer.
(3) Time of receiving the updated verification result.
When the verification result changes, indicating that the current verification result has failed, in this case, the timer may be started, which is equivalent to performing timing anew.
It should be noted that, the above is only described by taking an example of configuring a timer by a network function network element, and in another embodiment, the timer may also be configured for the terminal device by a user data management network element according to a local policy or auxiliary information of an application server, which is not limited in this embodiment of the present application.
In the embodiment of the application, the terminal device sends the first application information of the first application needing to be verified to the network function network element, the network function network element verifies whether the first application can trigger the message event of the discovery message, and feeds back the verification result to the terminal device, and the terminal device determines whether to execute the message event of the discovery message of the first application according to the fed-back verification result, so that the information verification in the 5G system is realized.
In another embodiment, the terminal device may further perform authentication on the first application by using preconfigured application authentication information, and then details the implementation manner. Referring to fig. 5, fig. 5 is a flowchart illustrating an information verification method according to another embodiment, which may be applied to the communication network architecture shown in fig. 1, and the method may include the following implementation steps:
step 501: and the network function network element sends application verification information to the terminal equipment.
The application verification information comprises second application information of a second application capable of triggering a message event of the discovery message, and the message event is used for verifying whether the first application can trigger the discovery message or not by the terminal equipment based on the first application information of the first application needing verification, wherein the message event comprises sending the discovery message and monitoring the discovery message.
Wherein the second application information of the second application may be used to uniquely identify the second application, and may be exemplarily identified by an OS ID and an APP ID; alternatively, the second application information may also be a predefined character string, etc., which is not limited in this embodiment of the application,
the second application is an application authorized to trigger a message event of the discovery message, and in the application authentication information, the authorized second application may include one or more, that is, the application authentication information includes at least one second application information.
As an example, the application verification information further includes group information of a group in which the second application information is located, wherein each second application information is associated with at least one group information or each group information is associated with at least one second application information; and/or the application verification information further comprises terminal device information of a terminal device used for installing the second application; and/or the application authentication information further comprises user information for logging in the second application.
The association relationship between the second application information and the group information may include two types, one type is that the second application information is associated with at least one group information, that is, each group in at least one group related to the second application allows to trigger a message event of the discovery message; another is that a certain group of information is associated with at least one second application information, i.e. each of the at least one second application within the certain group is allowed to trigger a message event of the discovery message.
As an example, the network function network element encapsulates the application authentication information into a third transparent container and sends the third transparent container to the mobility management network element, and the mobility management network element adds the third transparent container to the NAS message and forwards the NAS message to the terminal device.
That is, in this implementation manner, the network function network element may perform an encapsulation operation on the application verification information, that is, encapsulate the application verification information into the third transparent container, and then send the third transparent container to the mobility management network element. After receiving the third transparent container, the mobility management network element may send the third transparent container to the NAS layer, and encapsulate the third transparent container in an NAS message by using the NAS layer, and send the NAS message to the terminal device.
As an example, the network function network element sends the application authentication information to the mobility management network element, and the application authentication information is encapsulated in an NAS message by the mobility management network element and then forwarded to the terminal device.
In this implementation, the network functional network element does not process the application authentication information, but directly sends the application authentication information to the mobility management network element, and the mobility management network element encapsulates the application authentication information into an NAS message and forwards the NAS message to the terminal device. As an example, after receiving the verification result, the mobility management network element may send the application verification information to the NAS layer, and encapsulate the application verification information into an NAS message by the NAS layer and forward the NAS message to the terminal device.
Further, when the terminal device is in a connected state with the mobility management network element, the mobility management network element may send the application verification information to the terminal device through a UE configuration update message.
Further, when the terminal device and the mobility management network element are in an unconnected state, that is, the terminal device is in an idle state, the mobility management network element may send the application verification information to the terminal device in the following manner: and receiving a service request or a registration request sent by the terminal equipment, wherein the service request or the registration request carries the capability information of the terminal equipment for executing the message event of the discovery message. If it is determined based on the capability information that the terminal device has the capability of executing the message event of the discovery message, the application authentication information is sent to the terminal device via a service response or a registration response, and if it is determined based on the capability information that the terminal device does not have the capability of executing the message event of the discovery message, a rejection message may be sent to the terminal device, which may carry a rejection reason.
Further, if the network function network element does not provide the application authentication information to the terminal device, it may be expressed as any one of the following cases: all applications can trigger a message event of a discovery message, or all applications cannot trigger a message event of a discovery message, or historical application verification information configured at the time closest to the current time is determined as application verification information, that is, the historical application verification information configured at the last time is adopted.
Further, for the network functional network element, before sending the application authentication information to the terminal device, the application authentication information needs to be acquired, and the specific implementation of the acquisition may include:
in the first case: and the network functional network element acquires the application verification information from the local.
The network functional network element may locally store the application authentication information, and the locally stored application authentication information may be pulled from the user data management network element in advance.
In the second case: the network function network element obtains the application verification information from the user data management network element, and the application verification information in the user data management network element is sent by the application server in advance.
When the application authentication information is not locally stored in the network functional network element, the application authentication information may be pulled from the user data management network element. As an example, when the network function network element is a session management function network element, the session management function network element pulls the application authentication information from the user data management network element through the policy control function network element, that is, the policy control function network element needs to forward the application authentication information pulled from the user data management network element to the session management function network element at this time. Further, if the user data managing network element does not have application authentication information, the application authentication information may not be provided.
The origin of the application authentication information in the user data managing network element is briefly described here. In some embodiments, the application server may send application authentication information that can be applied to the discovery process on the PC5 to the user data management network element, and further, the application server may send the application authentication information to the NEF, which sends the NEF to the user data management network element. The user data management network element receives and stores the application authentication information sent from the application server, and further, the user data management network element can also store the application authentication information into the UDR.
Step 502: the terminal device receives and stores the application authentication information.
As an example, the specific implementation of the terminal device receiving the application verification information may include: and the terminal equipment receives a UE configuration updating message sent by the mobility management network element, wherein the UE configuration updating message carries application verification information.
As an example, the specific implementation of the terminal device receiving the application verification information may further include: the terminal equipment sends a service request or a registration request to the mobility management network element, the service request or the registration request carries capability information of the terminal equipment for executing a message event of a discovery message, the terminal equipment receives a service response or a registration response sent by the mobility management network element, the service response or the registration response carries application verification information, and the application verification information is sent by the mobility management network element after the mobility management network element determines that the terminal equipment has the capability of executing the message event of the discovery message based on the capability information.
Further, for the terminal device, when the terminal device does not receive the application verification information, it is determined that all applications can trigger a message event of the discovery message; or, when the terminal device does not receive the application verification information sent by the network function network element, determining that all applications cannot trigger a message event of a discovery message; or, determining the preconfigured authentication information as application authentication information; or, determining the historical application verification information configured at the time closest to the current time as the application verification information, that is, determining the historical application verification information configured at the last time as the application verification information.
It should be noted that, the above describes a process of configuring application authentication information for a terminal device by a network function network element, and based on the above implementation, when the terminal device authenticates first application information that needs to be authenticated, the terminal device may perform authentication according to the application authentication information that is configured in advance.
Step 503: and the terminal equipment verifies the first application to be verified based on the application verification information.
When the first application needs to be verified, the terminal device may acquire application verification information and first application information of the first application that needs to be verified.
As an example, when a certain service related to the first application is activated at the application layer or there is a specific group set up in the first application, the first application needs to be verified. As an example, the application layer of the terminal device may send the first application information of the first application to the D2D direct layer.
Step 504: and the terminal equipment determines whether to execute the message event of the discovery message aiming at the first application according to the verification result.
That is, the terminal device verifies whether the first application can trigger the message event of the discovery message based on the first application information and the application verification information.
As an example, the terminal device may be authenticated through the D2D direct connection layer. Illustratively, the D2D direct layer of the terminal device verifies whether the first application information is authorized to trigger a message event of the discovery message based on the application verification information. Further, the D2D direct layer of the terminal device verifies, based on the application verification information, whether the first application information and the group identification are authorized to trigger message events of the discovery message. Further, the D2D direct layer of the terminal device verifies the first application information and the group identification and whether the terminal device is authorized to trigger a message event of the discovery message based on the application verification information. Further, the D2D direct layer of the terminal device verifies the first application information and whether the terminal device is authorized to trigger a message event of a discovery message based on the application verification information, and so on.
The terminal equipment determines whether to execute the message event related to the discovery message according to the verification result, and can understand that when the verification is passed, the message event related to the discovery message is executed, and when the verification is not passed, the message event related to the discovery message is not executed.
In addition, for the operation performed by the terminal device in the case that the verification is successful, refer to step 203 in the embodiment of fig. 2, which is not repeated herein.
In this embodiment of the present application, when the terminal device needs to verify the first application, the application verification information preconfigured by the network function network element may be obtained, and since the application verification information includes the second application information of the second application that can trigger the message event of the discovery message, the terminal device may verify whether the first application can trigger the message event of the discovery message based on the first application information and the application verification information, thereby implementing information verification in the 5G system.
Referring to fig. 6, fig. 6 is a schematic structural diagram illustrating an information verification apparatus according to an exemplary embodiment, where the apparatus may include:
a first sending module 610, configured to send an information verification request to a network functional network element, where the information verification request carries first application information of a first application that needs to be verified;
a determining module 620, configured to determine whether to execute a message event of the discovery message for the first application according to a verification result received from the network function network element, where the network function network element is a fifth generation 5G core network element.
In one possible implementation manner of the present application, the message event includes sending a discovery message or listening for a discovery message.
In a possible implementation manner of the present application, the first sending module 610 is configured to: and encapsulating the information verification request into a first transparent container, adding the first transparent container into a non-access stratum (NAS) message, sending the NAS message to a mobility management network element, and forwarding the first transparent container to the network function network element by the mobility management network element.
In a possible implementation manner of the present application, the first sending module 610 is configured to: and encapsulating the information verification request into an NAS message and sending the NAS message to a mobility management network element, and analyzing the information verification request from the NAS message by the mobility management network element and then forwarding the information verification request to the network function network element.
In a possible implementation manner of the present application, the information verification request includes group information, where the group information is used to indicate a group in which the first application is located; and/or the information verification request comprises terminal equipment information of the terminal equipment; and/or the information verification request comprises user information.
In a possible implementation manner of the present application, the application verification information includes group information of a group in which the second application information is located, where each piece of the second application information is associated with at least one piece of group information or each piece of the group information is associated with at least one piece of second application information, and the second application information refers to application information of the second application that can trigger a message event of the discovery message; and/or the application verification information comprises terminal equipment information of terminal equipment used for installing the second application; and/or the application authentication information comprises user information for logging in the second application.
In a possible implementation manner of the present application, the verification result includes configuration information of a timer, where the configuration information is used to indicate that the verification result is always valid within an operation time period of the timer.
In a possible implementation manner of the present application, the starting time of the timer includes at least one of the following:
the time when the configuration information of the timer is received; or, the time when the restart timer command is received; or the time when the updated verification result is received.
In one possible implementation manner of this application, the terminal device includes a D2D direct connection layer and an access layer, and when the message event includes sending a discovery message, the determining module 620 is further configured to: if the verification result comprises a verification success message, constructing a discovery message through the D2D direct connection layer, and transmitting the discovery message to the access layer; and adding the first application information as the additional information of the discovery message through the access layer, and sending the added discovery message.
In one possible implementation manner of this application, the terminal device includes an application layer, a D2D direct connection layer, and an access layer, the message event includes a listening discovery message, and the determining module 620 is further configured to: receiving a discovery message added with additional information through the access layer, and detecting whether first application information in the additional information is application information of an application needing monitoring; when the first application information is determined to be the application information of the application needing monitoring through the access layer, the first application information is transferred to the application layer or transferred to the application layer through the D2D direct connection layer.
In a possible implementation manner of the present application, the terminal device includes an application layer, a D2D direct connection layer, and an access layer; the message event comprises a snoop discovery message, and the determining module 620 is further configured to: receiving a discovery message through the access layer, and transmitting the discovery message to the D2D direct connection layer, where the discovery message includes the first application information; parsing the discovery message through the D2D direct connection layer; and when the D2D direct connection layer determines that the analyzed first application information is the application information of the application needing monitoring, transmitting the first application information to the application layer.
In a possible implementation manner of the present application, the network function network element is a policy control function network element or a session management function network element.
In the embodiment of the application, the terminal device sends the first application information of the first application needing to be verified to the network function network element, the network function network element verifies whether the first application can trigger the message event of the discovery message, and feeds back the verification result to the terminal device, and the terminal device determines whether to execute the message event of the discovery message of the first application according to the fed-back verification result, so that the information verification in the 5G system is realized.
Referring to fig. 7, fig. 7 is a schematic structural diagram illustrating an information verification apparatus according to another exemplary embodiment, where the apparatus may include:
a receiving module 710, configured to receive an information verification request, where the information verification request carries first application information of a first application that needs to be verified;
a second sending module 720, configured to send a verification result of the first application information to a terminal device, where the verification result is used to indicate whether the first application can trigger a message event of a discovery message.
In one possible implementation manner of the present application, the message event includes sending a discovery message or listening for a discovery message.
In a possible implementation manner of the present application, the second sending module 720 is further configured to:
acquiring application verification information;
performing verification based on the first application information and the application verification information.
In a possible implementation manner of the present application, the second sending module 720 is further configured to:
acquiring the application verification information from the local; alternatively, the first and second electrodes may be,
and acquiring the application verification information from the user data management network element, wherein the application verification information in the user data management network element is sent by the application server in advance.
In a possible implementation manner of the present application, the second sending module 720 is configured to:
and packaging the verification result into a second transparent container, sending the second transparent container to a mobility management network element, packaging the second transparent container into an NAS message by the mobility management network element, and then forwarding the NAS message to the terminal equipment.
In a possible implementation manner of the present application, the second sending module 720 is configured to:
and sending the verification result to a mobility management network element, and encapsulating the verification result into an NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
In a possible implementation manner of the present application, the network function network element is a policy control function network element or a session management function network element.
In a possible implementation manner of the present application, the application verification information includes group information of a group in which the second application information is located, where each piece of the second application information is associated with at least one piece of group information or each piece of the group information is associated with at least one piece of second application information, and the second application information refers to application information of the second application that can trigger a message event of the discovery message; and/or the application verification information comprises terminal equipment information of terminal equipment used for installing the second application; and/or the application authentication information comprises user information for logging in the second application.
In the embodiment of the application, the terminal device sends the first application information of the first application needing to be verified to the network function network element, the network function network element verifies whether the first application can trigger the message event of the discovery message, and feeds back the verification result to the terminal device, and the terminal device determines whether to execute the message event of the discovery message of the first application according to the fed-back verification result, so that the information verification in the 5G system is realized.
Referring to fig. 8, fig. 8 is a schematic structural diagram illustrating an information verification apparatus according to another exemplary embodiment, where the apparatus may include:
a verification module 810, configured to verify a first application to be verified based on the application verification information;
an executing module 820, configured to determine whether to execute a message event of a discovery message for the first application according to a verification result;
the application verification information is sent by the network function network element in advance, and the network function network element is a 5G core network element.
In one possible implementation manner of the present application, the message event includes sending a discovery message or listening for a discovery message.
In a possible implementation manner of the present application, the executing module 820 is further configured to: and receiving a UE configuration updating message sent by a mobility management network element, wherein the UE configuration updating message carries the application verification information.
In a possible implementation manner of the present application, the executing module 820 is further configured to: sending a service request or a registration request to a mobility management network element, wherein the service request or the registration request carries the capability information of the terminal equipment executing the message event of the discovery message; and receiving a service response or a registration response sent by the mobility management network element, wherein the service response or the registration response carries the application verification information, and the application verification information is sent by the mobility management network element after the mobility management network element determines that the terminal equipment has the capability of executing the message event of the discovery message based on the capability information.
In a possible implementation manner of the present application, the application verification information includes group information of a group in which the second application information is located, where each piece of the second application information is associated with at least one piece of group information or each piece of the group information is associated with at least one piece of second application information, and the second application information refers to application information of the second application that can trigger a message event of the discovery message; and/or the application verification information comprises terminal equipment information of terminal equipment used for installing the second application; and/or the application authentication information comprises user information for logging in the second application.
In a possible implementation manner of the present application, the executing module 820 is further configured to: when the application verification information is not received, determining that all applications can trigger message events of discovery messages; or when the application verification information is not received, determining that all applications cannot trigger a message event of the discovery message; or when the application verification information is not received, determining the preconfigured verification information as the application verification information; or, when the application verification information is not received, determining the historical application verification information configured at the time closest to the current time as the application verification information.
In a possible implementation manner of this application, the terminal device includes a D2D direct connection layer and an access layer, and when the message event includes sending a discovery message, the executing module 820 is further configured to:
if the verification result comprises a verification success message, constructing a discovery message through the D2D direct connection layer, and transmitting the discovery message to the access layer;
and adding the first application information as the additional information of the discovery message through the access layer, and sending the added discovery message.
In a possible implementation manner of this application, the terminal device includes an application layer, a D2D direct connection layer, and an access layer, the message event includes a discovery monitoring message, and the execution module 820 is further configured to:
receiving a discovery message added with additional information through the access layer, and detecting whether first application information in the additional information is application information of an application needing monitoring; when the first application information is determined to be the application information of the application needing monitoring through the access layer, the first application information is transferred to the application layer or transferred to the application layer through the D2D direct connection layer.
In a possible implementation manner of the present application, the network function network element is a policy control function network element or a session management function network element.
In this embodiment of the present application, when the terminal device needs to verify the first application, the application verification information preconfigured by the network function network element may be obtained, and since the application verification information includes the second application information of the second application that can trigger the message event of the discovery message, the terminal device may verify whether the first application can trigger the message event of the discovery message based on the first application information and the application verification information, thereby implementing information verification in the 5G system.
Referring to fig. 9, fig. 9 is a schematic structural diagram illustrating an information verification apparatus according to another exemplary embodiment, where the apparatus may include:
a third sending module 910, configured to send, to a terminal device, application verification information, where the application verification information is used for the terminal device to determine whether to execute a message event of a discovery message for a first application that needs to be verified based on first application information verification of the first application.
In one possible implementation manner of the present application, the message event includes sending a discovery message or listening for a discovery message.
In a possible implementation manner of the present application, the third sending module 910 is further configured to: and acquiring the application verification information from the user data management network element, wherein the application verification information in the user data management network element is sent by the application server in advance.
In a possible implementation manner of the present application, the third sending module 910 is further configured to: and packaging the application verification information into a third transparent container and sending the third transparent container to a mobility management network element, and adding the third transparent container to NAS information by the mobility management network element and then forwarding the NAS information to the terminal equipment.
In a possible implementation manner of the present application, the third sending module 910 is further configured to: and sending the application verification information to a mobility management network element, and packaging the application verification information into an NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
In a possible implementation manner of the present application, the application verification information includes group information of a group in which the second application information is located, where each piece of the second application information is associated with at least one piece of group information or each piece of the group information is associated with at least one piece of second application information, and the second application information refers to application information of the second application that can trigger a message event of the discovery message; and/or the application verification information comprises terminal equipment information of terminal equipment used for installing the second application; and/or the application authentication information comprises user information for logging in the second application.
In this embodiment of the present application, when the terminal device needs to verify the first application, the application verification information preconfigured by the network function network element may be obtained, and since the application verification information includes the second application information of the second application that can trigger the message event of the discovery message, the terminal device may verify whether the first application can trigger the message event of the discovery message based on the first application information and the application verification information, thereby implementing information verification in the 5G system.
Referring to fig. 10, it shows a schematic structural diagram of an apparatus provided in an exemplary embodiment of the present application, where the apparatus may be the terminal apparatus or the network functional network element, and includes: a processor 1001, a receiver 1002, a transmitter 1003, a memory 1004, and a bus 1005.
The processor 1001 includes one or more processing cores, and the processor 1001 executes various functional applications and information processing by running software programs and modules.
The receiver 1002 and the transmitter 1003 may be implemented as one communication component, which may be a piece of communication chip.
The memory 1004 is connected to the processor 1001 through a bus 1005.
The memory 1004 may be configured to store at least one instruction, which the processor 1001 is configured to execute to implement the various steps performed by the apparatus in the various method embodiments described above.
Further, the memory 1004 may be implemented by any type or combination of volatile or non-volatile storage devices, including, but not limited to: magnetic or optical disks, electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), Static Random Access Memory (SRAM), read-only memory (ROM), magnetic memory, flash memory, programmable read-only memory (PROM).
The present application provides a computer-readable storage medium, in which at least one instruction is stored, and the at least one instruction is loaded and executed by the processor to implement the method provided by the above-mentioned method embodiments.
The present application also provides a computer program product, which when run on a computer causes the computer to perform the methods provided by the various method embodiments described above.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (73)

  1. An information verification method is applied to terminal equipment, and is characterized by comprising the following steps:
    sending an information verification request to a network function network element, wherein the information verification request carries first application information of a first application needing to be verified;
    and determining whether to execute a message event of the discovery message for the first application according to a verification result received from the network function network element, wherein the network function network element is a fifth generation 5G core network element.
  2. The method of claim 1, wherein the message event comprises sending a discovery message or listening for a discovery message.
  3. The method of claim 1 or 2, wherein said sending an information verification request to a network function network element comprises:
    and encapsulating the information verification request into a first transparent container, adding the first transparent container into a non-access stratum (NAS) message, sending the NAS message to a mobility management network element, and forwarding the first transparent container to the network function network element by the mobility management network element.
  4. The method of claim 1 or 2, wherein said sending an information verification request to a network function network element comprises:
    and encapsulating the information verification request into an NAS message and sending the NAS message to a mobility management network element, and analyzing the information verification request from the NAS message by the mobility management network element and then forwarding the information verification request to the network function network element.
  5. The method of claim 1,
    the information verification request comprises group information, and the group information is used for indicating a group where the first application is located; and/or the presence of a gas in the gas,
    the information verification request comprises terminal equipment information of the terminal equipment; and/or the presence of a gas in the gas,
    the information verification request includes user information.
  6. The method of claim 5,
    the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the gas,
    the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the gas,
    the application authentication information includes user information for logging in to the second application.
  7. The method according to any of claims 1-6, wherein the verification result comprises configuration information of a timer, the configuration information indicating that the verification result is valid for a running period of time of the timer.
  8. The method of claim 7, wherein the starting time of the timer comprises at least one of:
    the time when the configuration information of the timer is received; alternatively, the first and second electrodes may be,
    the time when a restart timer command is received; alternatively, the first and second electrodes may be,
    time of receiving the updated verification result.
  9. The method of claim 1, wherein the terminal device comprises a D2D direct layer and an access layer, and when the message event comprises sending a discovery message, the method further comprises:
    if the verification result comprises a verification success message, constructing a discovery message through the D2D direct connection layer, and transmitting the discovery message to the access layer;
    and adding the first application information as the additional information of the discovery message through the access layer, and sending the added discovery message.
  10. The method of claim 1, wherein the terminal device comprises an application layer, a D2D direct layer, and an access layer, wherein the message event comprises a snoop discovery message, the method further comprising:
    receiving a discovery message added with additional information through the access layer, and detecting whether first application information in the additional information is application information of an application needing monitoring;
    when the first application information is determined to be the application information of the application needing monitoring through the access layer, the first application information is transferred to the application layer or transferred to the application layer through the D2D direct connection layer.
  11. The method of claim 1, wherein the terminal device comprises an application layer, a D2D direct layer, and an access layer; the message event comprises a snoop discovery message, the method further comprising:
    receiving a discovery message through the access layer, and transmitting the discovery message to the D2D direct connection layer, where the discovery message includes the first application information;
    parsing the discovery message through the D2D direct connection layer;
    and when the D2D direct connection layer determines that the analyzed first application information is the application information of the application needing monitoring, transmitting the first application information to the application layer.
  12. The method of claim 1, wherein the network function network element is a policy control function network element or a session management function network element.
  13. An information verification method is applied to a network function network element, and is characterized in that the network function network element is a 5G core network element, and the method comprises the following steps:
    receiving an information verification request, wherein the information verification request carries first application information of a first application needing to be verified;
    and sending a verification result of the first application information to a terminal device, wherein the verification result is used for indicating whether the first application can trigger a message event of a discovery message.
  14. The method of claim 13, wherein the message event comprises sending a discovery message or listening for a discovery message.
  15. The method of claim 13 or 14, wherein the method further comprises:
    acquiring application verification information;
    performing verification based on the first application information and the application verification information.
  16. The method of claim 15, wherein the obtaining application authentication information comprises:
    acquiring the application verification information from the local; alternatively, the first and second electrodes may be,
    and acquiring the application verification information from the user data management network element, wherein the application verification information in the user data management network element is sent by the application server in advance.
  17. The method of claim 13, wherein sending the verification result of the first application information to a terminal device comprises:
    and packaging the verification result into a second transparent container, sending the second transparent container to a mobility management network element, packaging the second transparent container into an NAS message by the mobility management network element, and then forwarding the NAS message to the terminal equipment.
  18. The method of claim 13, wherein sending the verification result of the first application information to a terminal device comprises:
    and sending the verification result to a mobility management network element, and encapsulating the verification result into an NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
  19. The method of any one of claims 13-18, wherein the network function network element is a policy control function network element or a session management function network element.
  20. The method of claim 15,
    the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the gas,
    the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the gas,
    the application authentication information includes user information for logging in to the second application.
  21. An information verification method is applied to terminal equipment, and is characterized by comprising the following steps:
    verifying the first application to be verified based on the application verification information;
    determining whether to execute a message event of a discovery message for the first application according to a verification result;
    the application verification information is sent by the network function network element in advance, and the network function network element is a 5G core network element.
  22. The method of claim 21, wherein the message event comprises sending a discovery message or listening for a discovery message.
  23. The method of claim 21, wherein the method further comprises:
    and receiving a UE configuration updating message sent by a mobility management network element, wherein the UE configuration updating message carries the application verification information.
  24. The method of claim 21, wherein the method further comprises:
    sending a service request or a registration request to a mobility management network element, wherein the service request or the registration request carries the capability information of the terminal equipment executing the message event of the discovery message;
    and receiving a service response or a registration response sent by the mobility management network element, wherein the service response or the registration response carries the application verification information, and the application verification information is sent by the mobility management network element after the mobility management network element determines that the terminal equipment has the capability of executing the message event of the discovery message based on the capability information.
  25. The method of any one of claims 21-24,
    the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the gas,
    the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the gas,
    the application authentication information includes user information for logging in to the second application.
  26. The method of claim 21, wherein the method further comprises:
    when the application verification information is not received, determining that all applications can trigger message events of discovery messages; alternatively, the first and second electrodes may be,
    when the application verification information is not received, determining that all applications cannot trigger a message event of a discovery message; alternatively, the first and second electrodes may be,
    when the application verification information is not received, determining the preconfigured verification information as the application verification information; alternatively, the first and second electrodes may be,
    and when the application verification information is not received, determining the historical application verification information configured at the time closest to the current time as the application verification information.
  27. The method of claim 21, wherein the terminal device comprises a D2D direct layer and an access layer, and when the message event comprises sending a discovery message, the method further comprises:
    if the verification result comprises a verification success message, constructing a discovery message through the D2D direct connection layer, and transmitting the discovery message to the access layer;
    and adding the first application information as the additional information of the discovery message through the access layer, and sending the added discovery message.
  28. The method of claim 21, wherein the terminal device comprises an application layer, a D2D direct layer, and an access layer, wherein the message event comprises a snoop discovery message, the method further comprising:
    receiving a discovery message added with additional information through the access layer, and detecting whether first application information in the additional information is application information of an application needing monitoring;
    when the first application information is determined to be the application information of the application needing monitoring through the access layer, the first application information is transferred to the application layer or transferred to the application layer through the D2D direct connection layer.
  29. The method of any of claims 21-27, wherein the network function network element is a policy control function network element or a session management function network element.
  30. An information verification method is applied to a network function network element, and is characterized in that the network function network element is a 5G core network element, and the method comprises the following steps:
    sending application verification information to a terminal device, wherein the application verification information is used for the terminal device to determine whether to execute a message event of a discovery message of a first application based on first application information verification of the first application needing verification.
  31. The method of claim 30, wherein the message event comprises sending a discovery message or listening for a discovery message.
  32. The method of claim 30, wherein the method further comprises:
    and acquiring the application verification information from the user data management network element, wherein the application verification information in the user data management network element is sent by the application server in advance.
  33. The method of claim 30, wherein sending application authentication information to a terminal device comprises:
    and packaging the application verification information into a third transparent container and sending the third transparent container to a mobility management network element, and adding the third transparent container to NAS information by the mobility management network element and then forwarding the NAS information to the terminal equipment.
  34. The method of claim 30, wherein sending application authentication information to a terminal device comprises:
    and sending the application verification information to a mobility management network element, and packaging the application verification information into an NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
  35. The method of claim 30,
    the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the gas,
    the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the gas,
    the application authentication information includes user information for logging in to the second application.
  36. An information verification apparatus applied to a terminal device, the apparatus comprising:
    the first sending module is used for sending an information verification request to a network function network element, wherein the information verification request carries first application information of a first application needing to be verified;
    a determining module, configured to determine whether to execute a message event of the discovery message for the first application according to a verification result received from the network function network element, where the network function network element is a fifth-generation 5G core network element.
  37. The apparatus of claim 36, wherein the message event comprises sending a discovery message or listening for a discovery message.
  38. The apparatus of claim 36 or 37, wherein the first transmitting module is to:
    and encapsulating the information verification request into a first transparent container, adding the first transparent container into a non-access stratum (NAS) message, sending the NAS message to a mobility management network element, and forwarding the first transparent container to the network function network element by the mobility management network element.
  39. The apparatus of claim 36 or 37, wherein the first transmitting module is to:
    and encapsulating the information verification request into an NAS message and sending the NAS message to a mobility management network element, and analyzing the information verification request from the NAS message by the mobility management network element and then forwarding the information verification request to the network function network element.
  40. The apparatus of claim 36,
    the information verification request comprises group information, and the group information is used for indicating a group where the first application is located; and/or the presence of a gas in the gas,
    the information verification request comprises terminal equipment information of the terminal equipment; and/or the presence of a gas in the gas,
    the information verification request includes user information.
  41. The apparatus of claim 40,
    the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the gas,
    the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the gas,
    the application authentication information includes user information for logging in to the second application.
  42. The apparatus according to any of claims 36-41, wherein the verification result comprises configuration information of a timer, the configuration information indicating that the verification result is valid for a running period of the timer.
  43. The apparatus as recited in claim 42, wherein said timer's starting time comprises at least one of:
    the time when the configuration information of the timer is received; alternatively, the first and second electrodes may be,
    the time when a restart timer command is received; alternatively, the first and second electrodes may be,
    time of receiving the updated verification result.
  44. The apparatus of claim 36, wherein the terminal device comprises a D2D direct layer and an access layer, and wherein when the message event comprises sending a discovery message, the determining module is further to:
    if the verification result comprises a verification success message, constructing a discovery message through the D2D direct connection layer, and transmitting the discovery message to the access layer;
    and adding the first application information as the additional information of the discovery message through the access layer, and sending the added discovery message.
  45. The apparatus of claim 36, wherein the terminal device comprises an application layer, a D2D direct layer, and an access layer, wherein the message event comprises a snoop discovery message, and wherein the determining module is further configured to:
    receiving a discovery message added with additional information through the access layer, and detecting whether first application information in the additional information is application information of an application needing monitoring;
    when the first application information is determined to be the application information of the application needing monitoring through the access layer, the first application information is transferred to the application layer or transferred to the application layer through the D2D direct connection layer.
  46. The apparatus of claim 36, wherein the terminal device comprises an application layer, a D2D direct layer, and an access layer; the message event comprises a snoop discovery message, the determination module is further configured to:
    receiving a discovery message through the access layer, and transmitting the discovery message to the D2D direct connection layer, where the discovery message includes the first application information;
    parsing the discovery message through the D2D direct connection layer;
    and when the D2D direct connection layer determines that the analyzed first application information is the application information of the application needing monitoring, transmitting the first application information to the application layer.
  47. The apparatus of claim 36, wherein the network function network element is a policy control function network element or a session management function network element.
  48. An information verification device is applied to a network function network element, wherein the network function network element is a 5G core network element, and the device comprises:
    the receiving module is used for receiving an information verification request, wherein the information verification request carries first application information of a first application needing to be verified;
    a second sending module, configured to send a verification result of the first application information to a terminal device, where the verification result is used to indicate whether the first application can trigger a message event of a discovery message.
  49. The apparatus of claim 48, wherein the message event comprises sending a discovery message or listening for a discovery message.
  50. The apparatus of claim 48 or 49, wherein the second sending module is further configured to:
    acquiring application verification information;
    performing verification based on the first application information and the application verification information.
  51. The apparatus of claim 50, wherein the second sending module is further configured to:
    acquiring the application verification information from the local; alternatively, the first and second electrodes may be,
    and acquiring the application verification information from the user data management network element, wherein the application verification information in the user data management network element is sent by the application server in advance.
  52. The apparatus of claim 48, wherein the second sending module is to:
    and packaging the verification result into a second transparent container, sending the second transparent container to a mobility management network element, packaging the second transparent container into an NAS message by the mobility management network element, and then forwarding the NAS message to the terminal equipment.
  53. The apparatus of claim 48, wherein the second sending module is to:
    and sending the verification result to a mobility management network element, and encapsulating the verification result into an NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
  54. The apparatus of any one of claims 48-53, wherein the network function network element is a policy control function network element or a session management function network element.
  55. The apparatus of claim 50,
    the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the gas,
    the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the gas,
    the application authentication information includes user information for logging in to the second application.
  56. An information verification apparatus applied to a terminal device, the apparatus comprising:
    the verification module is used for verifying the first application to be verified based on the application verification information;
    an execution module, configured to determine whether to execute a message event of a discovery message for the first application according to a verification result;
    the application verification information is sent by the network function network element in advance, and the network function network element is a 5G core network element.
  57. The apparatus of claim 56, wherein the message event comprises sending a discovery message or listening for a discovery message.
  58. The apparatus of claim 56, wherein the execution module is further to:
    and receiving a UE configuration updating message sent by a mobility management network element, wherein the UE configuration updating message carries the application verification information.
  59. The apparatus of claim 56, wherein the execution module is further to:
    sending a service request or a registration request to a mobility management network element, wherein the service request or the registration request carries the capability information of the terminal equipment executing the message event of the discovery message;
    and receiving a service response or a registration response sent by the mobility management network element, wherein the service response or the registration response carries the application verification information, and the application verification information is sent by the mobility management network element after the mobility management network element determines that the terminal equipment has the capability of executing the message event of the discovery message based on the capability information.
  60. The apparatus of any one of claims 56-59,
    the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the gas,
    the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the gas,
    the application authentication information includes user information for logging in to the second application.
  61. The apparatus of claim 56, wherein the execution module is further to:
    when the application verification information is not received, determining that all applications can trigger message events of discovery messages; alternatively, the first and second electrodes may be,
    when the application verification information is not received, determining that all applications cannot trigger a message event of a discovery message; alternatively, the first and second electrodes may be,
    when the application verification information is not received, determining the preconfigured verification information as the application verification information; alternatively, the first and second electrodes may be,
    and when the application verification information is not received, determining the historical application verification information configured at the time closest to the current time as the application verification information.
  62. The apparatus of claim 56, wherein the terminal device comprises a D2D direct layer and an access layer, and wherein when the message event comprises sending a discovery message, the performing module is further to:
    if the verification result comprises a verification success message, constructing a discovery message through the D2D direct connection layer, and transmitting the discovery message to the access layer;
    and adding the first application information as the additional information of the discovery message through the access layer, and sending the added discovery message.
  63. The apparatus of claim 56, wherein the terminal device comprises an application layer, a D2D direct layer, and an access layer, wherein the message event comprises a snoop discovery message, and wherein the execution module is further configured to:
    receiving a discovery message added with additional information through the access layer, and detecting whether first application information in the additional information is application information of an application needing monitoring;
    when the first application information is determined to be the application information of the application needing monitoring through the access layer, the first application information is transferred to the application layer or transferred to the application layer through the D2D direct connection layer.
  64. The apparatus of any one of claims 56-63, wherein the network function network element is a policy control function network element or a session management function network element.
  65. An information verification device is applied to a network function network element, wherein the network function network element is a 5G core network element, and the device comprises:
    the third sending module is configured to send application verification information to the terminal device, where the application verification information is used for the terminal device to determine whether to execute a message event of a discovery message for a first application based on first application information verification of the first application that needs to be verified.
  66. The apparatus of claim 65, wherein the message event comprises sending a discovery message or listening for a discovery message.
  67. The apparatus of claim 65, wherein the third sending module is further for:
    and acquiring the application verification information from the user data management network element, wherein the application verification information in the user data management network element is sent by the application server in advance.
  68. The apparatus of claim 65, wherein the third sending module is further for:
    and packaging the application verification information into a third transparent container and sending the third transparent container to a mobility management network element, and adding the third transparent container to NAS information by the mobility management network element and then forwarding the NAS information to the terminal equipment.
  69. The apparatus of claim 65, wherein the third sending module is further for:
    and sending the application verification information to a mobility management network element, and packaging the application verification information into an NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
  70. The apparatus of claim 65,
    the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the gas,
    the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the gas,
    the application authentication information includes user information for logging in to the second application.
  71. A terminal device, comprising a processor and a memory, the memory storing at least one instruction for execution by the processor to perform the method of any one of claims 1-12 or to perform the method of any one of claims 21-29.
  72. A network functional network element, characterized in that said device comprises a processor and a memory, said memory storing at least one instruction for execution by said processor to implement the method of any of claims 13-20 or to implement the method of any of claims 30-35.
  73. A computer readable storage medium having stored thereon instructions, which when executed by a processor, carry out the method of any of claims 1-12, or carry out the method of any of claims 13-20, or carry out the method of any of claims 21-29, or carry out the method of any of claims 30-35.
CN201980091289.3A 2019-08-12 2019-08-12 Information verification method, device, equipment and storage medium Active CN113396600B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/100208 WO2021026726A1 (en) 2019-08-12 2019-08-12 Information verification method, device, apparatus and storage medium

Publications (2)

Publication Number Publication Date
CN113396600A true CN113396600A (en) 2021-09-14
CN113396600B CN113396600B (en) 2022-11-29

Family

ID=74570253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980091289.3A Active CN113396600B (en) 2019-08-12 2019-08-12 Information verification method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN113396600B (en)
WO (1) WO2021026726A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023212930A1 (en) * 2022-05-06 2023-11-09 北京小米移动软件有限公司 Communication method and apparatus, and device and storage medium
WO2024020752A1 (en) * 2022-07-25 2024-02-01 北京小米移动软件有限公司 Artificial intelligence (ai)-based method for providing service, apparatus, device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104066070A (en) * 2013-03-20 2014-09-24 中兴通讯股份有限公司 Terminal registration method, terminal finding method, terminal and devices
CN109511115A (en) * 2017-09-14 2019-03-22 华为技术有限公司 A kind of authorization method and network element
WO2019095128A1 (en) * 2017-11-15 2019-05-23 Nokia Technologies Oy Authorization of applications for direct discovery
US20190394631A1 (en) * 2017-03-10 2019-12-26 Intel IP Corporation Technology coordination for device-to-device discovery

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8849203B2 (en) * 2012-06-27 2014-09-30 Alcatel Lucent Discovering proximity devices in broadband networks
CN104168664B (en) * 2013-05-20 2017-12-15 华为终端(东莞)有限公司 It was found that method and device
CN104581685B (en) * 2013-10-18 2018-12-14 电信科学技术研究院 It was found that the method for sending and receiving and transmission and receiving device of signal
CN106470382A (en) * 2015-08-14 2017-03-01 中兴通讯股份有限公司 Authority checking method, configuration information method of reseptance, device, base station and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104066070A (en) * 2013-03-20 2014-09-24 中兴通讯股份有限公司 Terminal registration method, terminal finding method, terminal and devices
US20190394631A1 (en) * 2017-03-10 2019-12-26 Intel IP Corporation Technology coordination for device-to-device discovery
CN109511115A (en) * 2017-09-14 2019-03-22 华为技术有限公司 A kind of authorization method and network element
WO2019095128A1 (en) * 2017-11-15 2019-05-23 Nokia Technologies Oy Authorization of applications for direct discovery

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023212930A1 (en) * 2022-05-06 2023-11-09 北京小米移动软件有限公司 Communication method and apparatus, and device and storage medium
WO2024020752A1 (en) * 2022-07-25 2024-02-01 北京小米移动软件有限公司 Artificial intelligence (ai)-based method for providing service, apparatus, device and storage medium

Also Published As

Publication number Publication date
WO2021026726A1 (en) 2021-02-18
CN113396600B (en) 2022-11-29

Similar Documents

Publication Publication Date Title
EP3726806B1 (en) Method for remotely controlling vehicle on the basis of smart apparatus
US11711682B2 (en) Cross-resource subscription for M2M service layer
US11134543B2 (en) Interworking LPWAN end nodes in mobile operator network
US10257800B2 (en) Method and apparatus for authenticating access authorization in wireless communication system
US11658975B2 (en) Authorization for network function registration
US9769801B2 (en) Method and apparatus for updating information regarding specific resource in wireless communication system
US20170215072A1 (en) Method and apparatus for authenticating access authority for specific resource in wireless communication system
US7933584B2 (en) Method for implementing security update of mobile station and a correlative reacting system
US9900727B2 (en) Method and apparatus for controlling access in wireless communication system
CN114124451B (en) Data processing method and system for Internet of things equipment and computer storage medium
CN113396600B (en) Information verification method, device, equipment and storage medium
CN111031517A (en) Message notification method, device, network element, system and storage medium
US9438603B2 (en) Method for managing access right of terminal to resource by server in wireless communication system, and device for same
KR102005361B1 (en) Cloud-Based Terminal Integrating Management System Using OTA Technique of IoT Terminal Over LPWA Network
WO2022257927A1 (en) Key burning method and apparatus, electronic device board card, and storage medium
CN110045969A (en) Application program installation method, server, system, equipment and storage medium
CN111787093B (en) Application management method, application management device, related equipment and medium
US20170127472A1 (en) Method and wireless device for controlling disconnection of a wireless device in a wi-fi direct group of a wireless network
WO2010124571A1 (en) Node information acquirement method, client, and server
KR102647498B1 (en) Methods for transmitting a notification message for M2M system and Apparatuses thereof
TWI474731B (en) Wimax client and mothed for setting parameters of wimax client
US9923810B1 (en) Application update using multiple disparate networks
WO2022170943A1 (en) Wireless network access method and apparatus, and computer-readable storage medium and computer program
WO2024000134A1 (en) Verification method and apparatus, device, and storage medium
KR101808537B1 (en) Networlk device and control method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant