CN113613242B - Location privacy setting method and related product - Google Patents

Location privacy setting method and related product Download PDF

Info

Publication number
CN113613242B
CN113613242B CN202110826346.7A CN202110826346A CN113613242B CN 113613242 B CN113613242 B CN 113613242B CN 202110826346 A CN202110826346 A CN 202110826346A CN 113613242 B CN113613242 B CN 113613242B
Authority
CN
China
Prior art keywords
information
exemption
allowed
lpi
location
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110826346.7A
Other languages
Chinese (zh)
Other versions
CN113613242A (en
Inventor
张燕
武海峰
张咏霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spreadtrum Communications Shanghai Co Ltd
Original Assignee
Spreadtrum Communications Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spreadtrum Communications Shanghai Co Ltd filed Critical Spreadtrum Communications Shanghai Co Ltd
Priority to CN202110826346.7A priority Critical patent/CN113613242B/en
Publication of CN113613242A publication Critical patent/CN113613242A/en
Priority to PCT/CN2021/143425 priority patent/WO2023000622A1/en
Application granted granted Critical
Publication of CN113613242B publication Critical patent/CN113613242B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application provides a position privacy setting method and a related product, wherein the method comprises the following steps: adding exemption information to LPI (LCS privacy indicator) information, wherein the exemption information comprises an exemption object, and the exemption information is used for indicating that the exemption object is allowed or not allowed to obtain the positioning information of the terminal equipment. By adopting the embodiment of the application, various requirements of practical application can be met, and the practicability of the LPI function can be improved.

Description

Location privacy setting method and related product
Technical Field
The present application relates to the field of wireless communication technologies, and in particular, to a location privacy setting method and related products.
Background
In a New Radio (NR) system, a functional LPI, namely, a Location service (LCS) Privacy Indicator (Privacy Indicator), is added to the 3gpp Release 16, so that a user can set whether any service at a commercial application level is allowed to obtain Location information of a device of the user.
When using this protocol, once it is set that the UE (user equipment) location is not allowed to be acquired, it is not allowed to any LCS client (client) except for the Privacy Override Indicator (POI). The POI is used for determining whether the positioning service request covers the privacy setting of a user to be positioned, but the POI is only suitable for emergency service and legal interception service. The LCS client for the commercial level is not allowed uniformly, thus not conforming to the actual use scene. Therefore, a solution to the above problem is desired.
Disclosure of Invention
The embodiment of the application provides a position privacy setting method and a related product, which can meet various requirements of practical application and are beneficial to improving the practicability of an LPI function.
A first aspect of an embodiment of the present application provides a location privacy setting method, including:
adding exemption information in LPI (LCS privacy indicator) information, wherein the exemption information comprises an exemption object, and the exemption information is used for indicating that the exemption object is allowed or not allowed to acquire the positioning information of the terminal equipment.
In one possible example, the exemption information includes: an exemption list, wherein the exemption list is used to store the exemption object.
In one possible example, the exempt object includes at least one of: terminal equipment and an area are designated.
In a possible example, if the exemption object is the specified terminal device, the exemption information further includes: the maximum number of specified terminal devices.
In one possible example, when the exempt object includes the specified terminal device;
and when the LPI information is used for indicating that the acquisition of the positioning information of other terminal equipment is allowed, the exemption information is used for indicating that the designated terminal equipment is not allowed to acquire the positioning information of the terminal equipment.
In one possible example, when the exempt object includes the specified terminal device;
and when the LPI information is used for indicating that the acquisition of the positioning request of other terminal equipment is not allowed, the exemption information is used for indicating that the appointed terminal equipment is allowed to acquire the positioning information of the terminal equipment.
In one possible example, the specified terminal device is different from the other terminal devices.
In one possible example, location notification response information is sent to the network device in response to a received location request sent by the network device.
In one possible example, the location notification response information includes: the LPI information includes: the exemption information.
In one possible example, location privacy settings information is sent to a network device, the location privacy settings information being used to invoke a location privacy settings process.
In one possible example, the location privacy settings information includes: the LPI information, the LPI information comprising: the exemption information.
In one possible example, the exemption list further includes: exemption conditions are imposed.
In one possible example, the exemption condition is to indicate that at least one of: the type of the positioning information and the designated equipment corresponding to the designated area.
A second aspect of the embodiments of the present application provides a location privacy setting apparatus, including: a setting unit, wherein,
the setting unit is configured to add exemption information to LPI (LCS privacy indicator) information, where the exemption information includes an exempted object, and the exemption information is used to indicate whether the exempted object is allowed or not allowed to obtain the location information of the terminal device.
A third aspect of the present application provides a chip module, comprising a transceiver component and a chip, wherein,
the chip is configured to add exemption information to LPI (LCS privacy indicator) information, where the exemption information includes an exempted object, and the exemption information is used to indicate whether the exempted object is allowed or not allowed to obtain location information of the terminal device.
A fourth aspect of the present application provides a chip, where the chip is configured to add exemption information to LPI (LCS privacy indicator) information, where the exemption information includes an exemption object, and the exemption information is used to indicate whether the exemption object is allowed or not allowed to obtain location information of the terminal device.
A fifth aspect of the present application provides a terminal device, including: a processor and a memory; and one or more programs stored in the memory and configured to be executed by the processor, the programs including instructions for some or all of the steps as described in the first aspect.
A sixth aspect of embodiments of the present application provides a computer-readable storage medium, where the computer-readable storage medium is used to store a computer program, where the computer program is to make a computer execute some or all of the steps described in the first aspect of embodiments of the present application.
A seventh aspect of embodiments of the present application provides a computer program product, wherein the computer program product comprises a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps as described in the first aspect of embodiments of the present application. The computer program product may be a software installation package.
The embodiment of the application has the following beneficial effects:
it can be seen that, by the location privacy setting method and the related product described in the embodiments of the present application, exemption information may be added to LPI (LCS privacy indicator) information, where the exemption information includes an exempted object, and the exemption information is used to indicate whether the exempted object is allowed or not allowed to obtain location information of the terminal device. Therefore, in specific application, when the terminal equipment sets privacy indication, the privacy indication can be expanded into various requirements for meeting practical application under various conditions according to exemption information, and the practicability of the LPI function is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a system architecture diagram of a location privacy setting method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of an embodiment of a location privacy setting method provided in an embodiment of the present application;
fig. 3 is a schematic structural diagram of an embodiment of a location privacy setting apparatus provided in an embodiment of the present application;
fig. 4 is a schematic structural diagram of an embodiment of a terminal device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an embodiment of a network device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of this application and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein may be combined with other embodiments.
In order to better understand the location privacy setting method and the related product provided by the embodiment of the present application, a system architecture of the location privacy setting method applied to the embodiment of the present application is described below.
Referring to fig. 1, fig. 1 is a schematic system architecture diagram of a location privacy setting method according to an embodiment of the present application. As shown in fig. 1, the system architecture may include one or more terminal devices (terminal device 110a, terminal device 110b, and terminal device 110 c), access network device 120, and core network device 130.
The system architecture is applicable to various network architectures, for example, a relay network architecture, a vehicle networking architecture, and the like, which are not limited herein.
The terminal device in the embodiment of the present application is a device having a wireless communication function, and may be referred to as a terminal (terminal), a User Equipment (UE), a Mobile Station (MS), a Mobile Terminal (MT), an access terminal device, a vehicle-mounted terminal device, an industrial control terminal device, a UE unit, a UE station, a mobile station, a remote terminal device, a mobile device, a UE terminal device, a wireless communication device, a UE agent, or a UE apparatus. The terminal device may be fixed or mobile. It should be noted that the terminal device may support at least one wireless communication technology, such as LTE, new Radio (NR), wideband Code Division Multiple Access (WCDMA), and the like. For example, the terminal device may be a mobile phone (mobile phone), a tablet (pad), a desktop, a notebook, a kiosk, a vehicle terminal, a Virtual Reality (VR) terminal device, an Augmented Reality (AR) terminal device, a wireless terminal in industrial control (industrial control), a wireless terminal in self driving (self driving), a wireless terminal in remote surgery (remote medical surgery), a wireless terminal in smart grid (smart grid), a wireless terminal in transport security (transportation safety), a wireless network terminal in smart city (smart city), a wireless terminal in smart home (smart home), a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a wireless local loop (wireless local, personal) station, a personal digital assistant (wlphone), a wireless communication terminal connected to a wireless network, a portable mobile terminal with future function, a wireless communication network, a wireless communication terminal with future evolution (PLMN), or other mobile communication device with a future function, etc. In some embodiments of the present application, the terminal device may also be an apparatus having a transceiving function, such as a system-on-chip. The chip system may include a chip and may also include other discrete devices.
In the embodiment of the present application, the access network device is a device that provides a wireless communication function for the terminal device, and may also be referred to as an access network element, a Radio Access Network (RAN) device, and the like. Wherein the access network device may support at least one wireless communication technology, such as LTE, NR, WCDMA, etc. By way of example, access network devices include, but are not limited to: next Generation base stations (Next Generation Node B, gNB), evolved Node B (eNB), radio Network Controller (RNC), node B (NB), base Station Controller (BSC), base Transceiver Station (BTS), home base station (e.g., home evolved Node B or home Node B, HNB), base Band Unit (BBU), transceiving point (TRP), transmission Point (TP), mobile switching center (msc), and the like in a fifth Generation mobile communication system (5 th-Generation, 5G). The access network device may also be a wireless controller, a Centralized Unit (CU), and/or a Distributed Unit (DU) in a Cloud Radio Access Network (CRAN) scenario, or the access network device may be a relay station, an access point, a vehicle-mounted device, a terminal device, a wearable device, and an access network device in future mobile communication or an access network device in a PLMN for future evolution, and the like. In some embodiments, the access network device may also be an apparatus, such as a system-on-a-chip, having functionality for providing wireless communications to user equipment. By way of example, a system of chips may include a chip and may also include other discrete devices.
In the core network device in the embodiment of the present application, the core network device may be a functional entity, may be a core network element, and the like, and is located in a core network. Such as access and mobility management function (AMF) network elements.
In this embodiment, the network devices may be the access network device 120 and the core network device 130, which is not limited herein.
In a New Radio (NR) system, a functional LPI, namely, a Location service (LCS) Privacy Indicator (Privacy Indicator), is added to the 3gpp Release 16, so that a user can set whether any service at a commercial application level is allowed to obtain Location information of a device of the user.
When using this protocol, once it is set that the UE (user equipment) location is not allowed to be acquired, it is not allowed to any LCS client (client) except for the Privacy Override Indicator (POI). The POI is used for determining whether the positioning service request covers the privacy setting of a user to be positioned, but the POI is only suitable for emergency service and legal interception service. The LCS client for the commercial level is not allowed uniformly, which is not in accordance with the actual use scenario.
In view of the foregoing problems, embodiments of the present application provide a location privacy setting method and related product, where exemption information is added to LPI (LCS privacy indicator) information, where the exemption information includes an exempted object, and the exemption information is used to indicate whether the exempted object is allowed or not allowed to obtain location information of a terminal device. Therefore, in specific application, when the terminal equipment sets privacy indication, the privacy indication can be expanded into various requirements for meeting practical application under various conditions according to exemption information, and the practicability of the LPI function is improved. It can be applied to a fifth generation (5th generation, 5g) system (also called NR system), and also can be a next generation evolution system according to the 5G system, and so on.
The one or more terminal devices (terminal device 110a, terminal device 110b, and terminal device 110 c) may establish a communication connection (e.g., a wireless communication connection) with a network device (access network device 120 or core network device 130), and the terminal device (terminal device 110a, terminal device 110b, or terminal device 110 c) may add exemption information to LPI (LCS privacy indicator) information, where the exemption information includes an exemption object, and the exemption information is used to indicate that the exemption object is allowed or not allowed to obtain location information of the terminal device. Therefore, in specific application, when the terminal equipment sets privacy indication, the privacy indication can be expanded into various requirements for meeting practical application under various conditions according to exemption information, and the practicability of the LPI function is improved.
It should be noted that, in the embodiment of the present application, only one terminal device is used for description, and the rest is not described herein again.
In the embodiment of the present application, a unidirectional communication link from a network device to a terminal device is defined as a Downlink (DL), data transmitted on the Downlink is Downlink data, and a transmission direction of the Downlink data is referred to as a Downlink direction; and the unidirectional communication link from the terminal device to the network device is Uplink (UL), the data transmitted on the Uplink is Uplink data, and the transmission direction of the Uplink data is referred to as Uplink direction.
It should be understood that reference to "at least one" in the embodiments of this application means one or more, and "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a alone, A and B together, and B alone, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple.
And, unless stated to the contrary, the embodiments of the present application refer to the ordinal numbers "first", "second", etc., for distinguishing a plurality of objects, and do not limit the sequence, timing, priority, or importance of the plurality of objects. For example, the first information and the second information are different information only for distinguishing them from each other, and do not indicate a difference in the contents, priority, transmission order, importance, or the like of the two kinds of information.
The expression "network" and "system" appearing in the embodiments of the present disclosure are the same concept, and the communication system is a communication network. The term "connected" in the embodiments of the present disclosure refers to various connection manners, such as direct connection or indirect connection, for example, different devices are connected through a communication interface, and is not limited at all.
Please refer to fig. 2, which is a flowchart illustrating an embodiment of a method for setting location privacy according to an embodiment of the present application. The location privacy setting method described in this embodiment is applied to a terminal device, and includes the following steps:
201. adding exemption information to LPI (LCS privacy indicator) information, wherein the exemption information comprises an exemption list, and the exemption list comprises an exemption object which is used for allowing or not allowing to obtain the positioning information of the terminal equipment.
Wherein, location Services (LCS) Privacy Indicator (Privacy Indicator), i.e. LPI (LCS Privacy Indicator) information, may be used to indicate whether a request for obtaining Location information from any other terminal equipment (UE) is allowed (allowed) or not allowed (distributed).
The exemption information may refer to information added to LPI information, may be used to indicate location privacy settings and the like, and may include an exemption object.
Specifically, the exemption information may include an exemption list, an exemption condition, and other information, where the exemption list may include an exemption object, and the exemption information is used to indicate whether the exemption object is allowed or not allowed to obtain the positioning information of the terminal device.
The exemption may also be understood as an exception, that is, an exception condition of LPI specification information or an indication index may be understood, specifically, there are two conditions in the LPI, that is, there are an allowed condition and a disallowed condition, and for LPI in different conditions, corresponding meanings of the exemption information are different, for example, when there is an allowed condition in the LPI, the exemption information is used to indicate the disallowed condition; when there is a permitted condition in the LPI, the exemption information is used to indicate a non-permitted condition.
The structure or format of the protocol information corresponding to the indication exemption information is compatible with the structure or format for storing the LPI.
It can be seen that the location privacy setting method described in the embodiment of the present application may add exemption information to LPI (LCS privacy indicator) information, where the exemption information includes an exempted object, and the exemption information is used to indicate whether the exempted object is allowed or not allowed to obtain the location information of the terminal device. Therefore, in specific application, when the terminal equipment sets privacy indication, the privacy indication can be expanded into various requirements for meeting practical application under various conditions according to exemption information, and the practicability of the LPI function is improved.
In one possible example, the exemption information includes: an exemption list, wherein the exemption list is used to store the exemption object.
The exemption list can be used to store the exemption objects, and the exemption list can include one or more exemption objects.
In one possible example, the exempt object includes at least one of: terminal equipment and an area are designated.
The exemption object may be user-defined or default, and is not limited herein. The exemption object in the embodiment of the present application is only an example, and an application program or an application scene may be specified after the terminal device and the area are specified, which is not limited herein.
In one possible example, when the exempt object includes the specified terminal device; and when the LPI information is used for indicating that the acquisition of the positioning information of other terminal equipment is allowed, the exemption information is used for indicating that the appointed terminal equipment is not allowed to acquire the positioning information of the terminal equipment.
In the LPI, for an allowed (allowed) case, that is, when the LPI is used to indicate that a request for obtaining location information from any other terminal device (UE) is allowed, the exempt information may be used to indicate that an exempt object in the exempt list (that is, a specified terminal device) is an exception, that is, the specified terminal device is an exception in the LPI, that is, the specified terminal device is not allowed to obtain location information of the terminal device.
In one possible example, when the exempt object includes the specified terminal device; and when the LPI information is used for indicating that the acquisition of the positioning request of other terminal equipment is not allowed, the exemption information is used for indicating that the appointed terminal equipment is allowed to acquire the positioning information of the terminal equipment.
In the LPI, for a non-allowed (disabled) condition, that is, when the LPI is used to indicate that a request for obtaining location information from any other terminal device (UE) is not allowed, the exemption information may be used to indicate that a specific terminal device in the exemption list is an exception, that is, the specific terminal device is an exception in the LPI information, that is, the obtaining of location information of the terminal device is allowed.
In a possible example, if the exemption object is the specified terminal device, the exemption information further includes: the maximum number of specified terminal devices.
In specific implementation, the number of the appointed terminal devices can be limited, and the number can be flexibly set according to actual conditions. For example, the external interface condition of the terminal device, the processing capability of the terminal device, etc., are not limited herein.
In a possible example, when the exemption object is a designated area, if the LPI information is used to indicate that other terminal devices are not allowed to obtain the positioning request, the exemption information may be used to indicate that the terminal devices in the designated area are allowed to obtain the positioning information of the terminal device.
The designated area can be customized by a user or defaulted by a system, and is not limited herein; the designated area may refer to a designated area location or range of a cell or a mall or a street, and the like, but is not limited thereto.
The terminal device in the designated area may include at least one of the other terminal devices, or include the other terminal devices, and may be specifically set in the exemption information. The terminal equipment in the designated area can obtain the positioning information of the terminal equipment in the application.
In a possible example, when the exemption object includes a designated area and a designated terminal device, if the LPI information is used to indicate that other terminal devices are not allowed to obtain a positioning request, the exemption information may be used to indicate that the designated terminal device is in the designated area, and then positioning information of the terminal device may be obtained.
The designated terminal device may be the same as or different from other terminal devices, and is not limited herein.
Therefore, in the embodiment of the application, different exemption objects can be set, so that the setting of different exemption methods is realized, the determination of the position privacy is realized, the improvement of the practicability of the LPI function is facilitated, and the actual requirement can be further met.
In one possible example, the exemption list may further include an exemption condition, and the like, which is not limited herein.
The exemption list may include an exempted object, an exempted condition, and the like, and the exemption condition may refer to an exempted condition in the exemption list for allowing or disallowing the exempted object to acquire the positioning information of the terminal device.
In one possible example, the exempt condition is used to indicate that at least one of: the type of the positioning information, the designated device corresponding to the designated area, and the like, which are not limited herein.
The type of the positioning information may include at least one of the following: the Global Navigation Satellite System (GNSS) positioning position information, network position information, inertial Navigation position information, and the like are not limited herein.
The exemption condition may be user-defined or default to the system, and is not limited herein. Besides the type of the positioning information and the designated device corresponding to the designated area, the method may also include designated time, designated scene, and the like, which are not limited herein; the specified scenario may include: a work scene, a shopping scene, an off-road scene, a visiting exhibition scene, etc., which are not limited herein; the exemption conditions can be set according to actual requirements or applications.
In a specific implementation, the exemption condition may include a superposition of one or more exemption conditions, and when the exemption information includes a plurality of exemption conditions, the exemption object must satisfy the plurality of exemption conditions at the same time. For example, the terminal device may be specified to allow the terminal devices corresponding to other work partners to acquire the own positioning information during work.
It can be seen that, in the embodiment of the present application, no specific limitation is imposed on the exemption condition, the exemption condition may be set according to actual requirements, and the exemption condition may be one or more, which may satisfy more practical applications.
In this embodiment of the present application, if the exemption information is added to the LPI (LCS Privacy indicator) information, location Notification (Location Notification) information and Location Privacy Setting (Location Privacy Setting) information that are sent to the network device by the terminal device may be affected, which is specifically described below with reference to the embodiment.
First, the positioning Notification (Location Notification) information will be specifically described with reference to the following examples.
In one possible example, location notification response information is sent to a network device in response to a received location request sent by the network device.
The location notification response (location notification res) information is used to respond to a location request of the network device, and may be used to implement the LPI function, and specifically may send privacy indication information related to the LPI to the network device through the location response information.
In one possible example, the location notification response information includes: the LPI information, the LPI information comprising: the exemption information.
Before adding the exemption information, the location notification response information may include: a verification Response (verification Response), a location Privacy Indication (location Privacy Indication), a valid Time Period (valid Time Period), and the like, which are not limited herein.
After the new Exemption information is added, the location notification response message also adds Exemption information such as an Exemption List (lCS Client exception List) and an Exemption object in the Exemption information in synchronization.
The location request is used for requesting the terminal device to verify the attempted location request or informing the terminal device of information about authorizing the location request. After the exemption information is newly added to the LPI, location privacy settings related to the exempted object in the exemption information of the network device are indicated.
Specifically, the method can comprise the following steps: the network device may send a location request to the terminal device, where the location request is called by the network device to request the terminal device to verify the attempted location request or notify the terminal device of information about authorized location requests, where the location notification procedure may be called by including a registration (REGISTER) message of the LCS location notification calling component, for example, two information of a mandatory notification Type (notification Type), a location Type (location Type), and optionally LCS client external ID (LCS client external ID) information, and so on, which are not limited herein; in the case of privacy verification, after receiving the location request, the terminal device may respond to the location request sent by the network device by sending a RELEASE COMPLETE message, where the message includes location notification response information of the terminal device, and location privacy indication information (LPI information) of the terminal device included in the location notification response information is in a return result component to be returned to the network device.
Next, location Privacy Setting (Location Privacy Setting) information will be specifically described with reference to the following embodiments.
The Location Privacy Setting (Location Privacy Setting) information may include an identifier of LCS-Location Privacy Setting arg, where the identifier may refer to a parameter sent by the terminal device to the network device.
In one possible example, the terminal device may send location privacy settings information to the network device, the location privacy settings information being used to invoke the location privacy settings process.
In one possible example, the location privacy settings information includes: the LPI information, the LPI information comprising: the exemption information.
Before the new exemption information is added, the location privacy setting information may include the following information in addition to the mandatory location privacy indication (location privacy indication) information: valid time period (validTimePeriod), etc., and is not limited herein.
After adding the exemption information, for example, an exemption list (cscClientExemptinList), may be added to the location privacy setting information.
Specifically, the terminal device invokes the location privacy setting procedure by sending a REGISTER message containing a defined location privacy setting (location privacy setting) message, which may be indicated by an LCS-location privacy setting arg identifier, which may include the above-mentioned exemption information therein; furthermore, when the network device is a core network device, if the Access and Mobility Management Function (AMF) network element can correctly process the Location Privacy Setting (Location Privacy Setting) information, the AMF will return a RELEASE COMPLETE message (RELEASE COMPLETE) containing a Location Privacy Setting confirmation (LCS-Location Privacy Setting Acknowledgement) component to the terminal device, so that the configuration or determination of the Location Privacy can be completed.
In accordance with the above, the following is an apparatus for implementing the location privacy setting method, specifically as follows:
referring to fig. 3, a schematic structural diagram of an embodiment of a location privacy setting apparatus 300 according to an embodiment of the present application is shown. The location privacy setting apparatus 300 described in this embodiment is applied to a terminal device, and includes: a unit 301 is provided in which, among other things,
the setting unit 301 is configured to add exemption information to LPI (LCS privacy indicator) information, where the exemption information includes an exempted object, and the exemption information is used to indicate that the exempted object is allowed or not allowed to obtain the location information of the terminal device.
The setting unit 301 may be configured to implement the method described in step 201.
It can be seen that, by using the location privacy setting apparatus described in the embodiment of the present application, exemption information can be added to LPI (LCS privacy indicator) information, where the exemption information includes an exempted object, and the exemption information is used to indicate whether the exempted object is allowed or not allowed to obtain location information of the terminal device. Therefore, in specific application, when the terminal equipment sets privacy indication, the privacy indication can be expanded into various requirements for meeting practical application under various conditions according to exemption information, and the practicability of the LPI function is improved.
It can be understood that the functions of each program module of the location privacy setting apparatus in this embodiment may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the related description of the foregoing method embodiment, which is not described herein again.
Each module/unit included in each apparatus and product described in the above embodiments may be a software module/unit, or may also be a hardware module/unit, or may also be a part of a software module/unit and a part of a hardware module/unit. For example, for each apparatus and product applied to or integrated into a chip, each module/unit included in the apparatus and product may all be implemented by hardware such as a circuit, or at least a part of the modules/units may be implemented by a software program running on a processor integrated within the chip, and the remaining (if any) part of the modules/units may be implemented by hardware such as a circuit; for each device and product applied to or integrated in the chip module, each module/unit included in the device and product may be implemented by using hardware such as a circuit, and different module units may be located in the same component (e.g., a chip, a circuit module, etc.) or different components of the chip module, or at least part of the modules/units may be implemented by using a software program running on a processor integrated inside the chip module, and the rest (if any) part of the modules/units may be implemented by using hardware such as a circuit; for each device and product applied to or integrated in the terminal, each module/unit included in the device and product may be implemented by hardware such as a circuit, different modules/units may be located in the same component (e.g., a chip, a circuit module, etc.) or different components in the terminal, or at least part of the modules/units may be implemented by a software program running on a processor integrated in the terminal, and the rest (if any) part of the modules/units may be implemented by hardware such as a circuit.
In accordance with the foregoing, please refer to fig. 4, which is a schematic structural diagram of an embodiment of a terminal device according to an embodiment of the present application. As shown in the figure, the terminal device includes a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and in this embodiment, the programs include instructions for performing the following steps:
adding exemption information to LPI (LCS privacy indicator) information, wherein the exemption information comprises an exemption object, and the exemption information is used for indicating that the exemption object is allowed or not allowed to obtain the positioning information of the terminal equipment
It can be seen that, with the terminal device described in the embodiment of the present application, exemption information may be added to LPI (LCS privacy indicator) information, where the exemption information includes an exempted object, and the exemption information is used to indicate whether the exempted object is allowed or not allowed to obtain location information of the terminal device. Therefore, in specific application, when the terminal equipment sets privacy indication, the privacy indication can be expanded into various requirements for meeting practical application under various conditions according to exemption information, and the practicability of the LPI function is improved.
In one possible example, the exemption information includes: an exemption list, wherein the exemption list is used to store the exemption object.
In one possible example, the exempt object includes at least one of: terminal equipment and an area are designated.
In a possible example, if the exemption object is the specified terminal device, the exemption information further includes: the maximum number of specified terminal devices.
In one possible example, when the exempt object includes the specified end device;
and when the LPI information is used for indicating that the acquisition of the positioning information of other terminal equipment is allowed, the exemption information is used for indicating that the appointed terminal equipment is not allowed to acquire the positioning information of the terminal equipment.
In one possible example, when the exempt object includes the specified terminal device;
and when the LPI information is used for indicating that the acquisition of the positioning request of other terminal equipment is not allowed, the exemption information is used for indicating that the appointed terminal equipment is allowed to acquire the positioning information of the terminal equipment.
In one possible example, the specified terminal device is different from the other terminal devices.
In one possible example, the program includes instructions for performing the steps of:
and sending position notification response information to the network equipment in response to the received positioning request sent by the network equipment.
In one possible example, the location notification response information includes: the exemption information.
In one possible example, the program includes instructions for performing the steps of:
and sending location privacy setting information to the network equipment, wherein the location privacy setting information is used for calling a location privacy setting process.
In one possible example, the location privacy settings information includes: the exemption information.
In one possible example, the exemption list further includes: exemption conditions are imposed.
In one possible example, the exemption condition is to indicate that at least one of: the type of the positioning information and the designated equipment corresponding to the designated area.
In accordance with the above, please refer to fig. 5, which is a schematic structural diagram of an embodiment of a network device according to an embodiment of the present application. As shown, the network device includes a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the programs include operations for performing operations performed by a device on the network side in the methods as described in the embodiments of the methods of the present application.
The embodiment of the present application further provides a chip, where the chip is configured to add exemption information to LPI (LCS privacy indicator) information, where the exemption information includes an exemption object, and the exemption information is used to indicate that the exemption object is allowed or not allowed to obtain location information of the terminal device.
The embodiment of the present application further provides a chip module, which includes a transceiver module and a chip,
the chip is configured to add exemption information to LPI (LCS privacy indicator) information, where the exemption information includes an exempted object, and the exemption information is used to indicate whether the exempted object is allowed or not allowed to obtain location information of the terminal device
Embodiments of the present application further provide a computer storage medium, where the computer storage medium may store a program, and the program includes, when executed, some or all of the steps of any one of the location privacy setting methods described in the above method embodiments.
Embodiments of the present application also provide a computer program product, where the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform some or all of the steps of any one of the location privacy setting methods as described in the embodiments of the present application.
While the present application has been described in connection with various embodiments, other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed application, from a review of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the word "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus (device), or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. A computer program stored/distributed on a suitable medium supplied together with or as part of other hardware, may also take other distributed forms, such as via the Internet or other wired or wireless telecommunication systems.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable location privacy settings apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable location privacy settings apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable location privacy settings apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable location privacy settings device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer implemented process such that the instructions which execute on the computer or other programmable device provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Although the present application has been described in conjunction with specific features and embodiments thereof, it will be evident that various modifications and combinations can be made thereto without departing from the spirit and scope of the application. Accordingly, the specification and figures are merely exemplary of the present application as defined in the appended claims and are intended to cover any and all modifications, variations, combinations, or equivalents within the scope of the present application. It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (16)

1. A position privacy setting method is applied to terminal equipment and is characterized by comprising the following steps:
adding exemption information to LCS Privacy Indicator (LPI) information, wherein the exemption information comprises an exempted object and is used for indicating whether the exempted object is allowed or not to be allowed to acquire the positioning information of the terminal equipment, the exemption information is used for indicating the unallowable condition when the allowance condition exists in the LPI information, and the exemption information is used for indicating the allowance condition when the disallowance condition exists in the LPI information.
2. The method of claim 1, wherein the exemption information comprises: an exemption list, wherein the exemption list is used to store the exemption object.
3. The method of claim 1 or 2, wherein the exempt object comprises at least one of: terminal equipment and an area are designated.
4. The method of claim 3, wherein if the exempt object is the designated terminal device, the exempt information further comprises: the maximum number of specified terminal devices.
5. The method of claim 4, wherein when the exempt object comprises the specified terminal device;
and when the LPI information is used for indicating that the acquisition of the positioning information of other terminal equipment is allowed, the exemption information is used for indicating that the appointed terminal equipment is not allowed to acquire the positioning information of the terminal equipment.
6. The method of claim 5, wherein when the exempt object comprises the designated terminal device;
and when the LPI information is used for indicating that the acquisition of the positioning request of other terminal equipment is not allowed, the exemption information is used for indicating that the appointed terminal equipment is allowed to acquire the positioning information of the terminal equipment.
7. The method according to claim 5 or 6, characterized in that the specified terminal device is different from the other terminal devices.
8. The method of claim 1, wherein a location notification response message is sent to the network device in response to a received location request sent by the network device.
9. The method of claim 8, wherein the location notification response message comprises: the LPI information includes: the exemption information.
10. The method according to claim 1 or 8, characterized by sending location privacy settings information to a network device, said location privacy settings information being used to invoke a location privacy settings procedure.
11. The method of claim 10, wherein the location privacy settings information comprises: the exemption information.
12. The method of claim 2, wherein the exemption list further comprises: the LPI information, the LPI information comprising: the exemption information.
13. The method of claim 12, wherein the exemption list further comprises an exemption condition indicating that at least one of: the type of the positioning information and the designated equipment corresponding to the designated area.
14. A location privacy settings apparatus, the apparatus comprising: a setting unit, wherein,
the setting unit is configured to add exemption information to LCS privacy indicator LPI information, where the exemption information includes an exempted object, and the exemption information is used to indicate whether the exempted object is allowed or not allowed to acquire positioning information of a terminal device, where the exemption information is used to indicate a non-allowed condition when an allowed condition exists in the LPI information, and the exemption information is used to indicate an allowed condition when the non-allowed condition exists in the LPI information.
15. A chip, comprising means and/or elements for adding exemption information to LCS privacy indicator, LPI, information, the exemption information including an exempt object, the exemption information indicating whether the exemption object is allowed or not allowed to obtain location information of a terminal device, wherein the exemption information indicates a not allowed condition when an allowed condition exists in the LPI information, and wherein the exemption information indicates an allowed condition when the not allowed condition exists in the LPI information.
16. A computer-readable storage medium, characterized in that a computer program for electronic data exchange is stored, wherein the computer program causes a computer to perform the method according to any one of claims 1-13.
CN202110826346.7A 2021-07-21 2021-07-21 Location privacy setting method and related product Active CN113613242B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110826346.7A CN113613242B (en) 2021-07-21 2021-07-21 Location privacy setting method and related product
PCT/CN2021/143425 WO2023000622A1 (en) 2021-07-21 2021-12-30 Location privacy setting method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110826346.7A CN113613242B (en) 2021-07-21 2021-07-21 Location privacy setting method and related product

Publications (2)

Publication Number Publication Date
CN113613242A CN113613242A (en) 2021-11-05
CN113613242B true CN113613242B (en) 2022-12-09

Family

ID=78305039

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110826346.7A Active CN113613242B (en) 2021-07-21 2021-07-21 Location privacy setting method and related product

Country Status (2)

Country Link
CN (1) CN113613242B (en)
WO (1) WO2023000622A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113613242B (en) * 2021-07-21 2022-12-09 展讯通信(上海)有限公司 Location privacy setting method and related product
WO2023245588A1 (en) * 2022-06-23 2023-12-28 北京小米移动软件有限公司 Information processing method and apparatus, communication device, and storage medium

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090005061A1 (en) * 2005-12-30 2009-01-01 Trueposition, Inc. Location quality of service indicator
CN101115283B (en) * 2006-07-27 2011-07-20 华为技术有限公司 Terminal positional information providing system and method
US8738027B2 (en) * 2011-02-07 2014-05-27 Qualcomm Incorporated Methods and apparatus for identifying and authorizing location servers and location services
WO2013172758A1 (en) * 2012-05-14 2013-11-21 Telefonaktiebolaget L M Ericsson (Publ) Localization configuration to make location information available in user equipment
US9572026B2 (en) * 2012-10-16 2017-02-14 Cisco Technology, Inc. Location services for a wireless device
EP3267650A1 (en) * 2016-07-04 2018-01-10 Nokia Solutions and Networks Oy Support of ps data off in a mobile system
CN109842924B (en) * 2017-11-27 2021-01-12 维沃移动通信有限公司 Position acquisition control method, user terminal and device
CN111447546A (en) * 2019-03-01 2020-07-24 维沃移动通信有限公司 Control method and communication unit for location service
EP3935880A1 (en) * 2019-03-04 2022-01-12 Telefonaktiebolaget LM Ericsson (publ) Privacy control of user equipment and related apparatuses
CN113613242B (en) * 2021-07-21 2022-12-09 展讯通信(上海)有限公司 Location privacy setting method and related product

Also Published As

Publication number Publication date
CN113613242A (en) 2021-11-05
WO2023000622A1 (en) 2023-01-26

Similar Documents

Publication Publication Date Title
US20220104087A1 (en) Distributed unit, central unit, radio access network node, and method therefor
US20210112406A1 (en) Communication method and communications apparatus
US20120244828A1 (en) Methods for requesting emergency bearer services for low priority devices, and apparatuses using the same
CN113613242B (en) Location privacy setting method and related product
WO2021246164A1 (en) Network node, user equipment, and method for same
EP3987881B1 (en) Method and apparatus for admission control of sessions based on priority
KR20220044341A (en) Method and device for determining security protection mode
US20220248497A1 (en) Amf node and method thereof
US20230164878A1 (en) Radio barrier processing method and network device
CN114666850B (en) QoS control method, qoS control device and readable storage medium
CN111901895B (en) Method and device for establishing user plane
JP2019068111A (en) User device and communication method
US11588860B2 (en) Flexible selection of security features in mobile networks
CN112438058B (en) System message updating method, device and storage medium
CN117320002A (en) Communication method and device
JP7211503B2 (en) Communication method and base station
CN117981369A (en) Information indication method, first access network equipment and core network element
CN114651412A (en) Communication method, device and storage medium
CN115499470B (en) Storage management method and device for intelligent ammeter data
US20230224993A1 (en) Communication method and apparatus
EP4340410A1 (en) Server, request entity, and methods therefor
CN113950013B (en) Message sending and receiving method, equipment and medium
WO2023070446A1 (en) Network slice registration method and device
CN113993121A (en) Data association method and device of terminal equipment
CN117643079A (en) Management method, device, equipment and storage medium of Internet of things equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant