CN116803113A - Information processing method, apparatus, communication device and storage medium - Google Patents

Information processing method, apparatus, communication device and storage medium Download PDF

Info

Publication number
CN116803113A
CN116803113A CN202380008816.6A CN202380008816A CN116803113A CN 116803113 A CN116803113 A CN 116803113A CN 202380008816 A CN202380008816 A CN 202380008816A CN 116803113 A CN116803113 A CN 116803113A
Authority
CN
China
Prior art keywords
information
role
notification
discovery
positioning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202380008816.6A
Other languages
Chinese (zh)
Inventor
陆伟
商正仪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Publication of CN116803113A publication Critical patent/CN116803113A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the disclosure provides an information processing method, an information processing device, communication equipment and a storage medium. The information processing method performed by the first network device may include: receiving a first request message of first User Equipment (UE), wherein the first request message comprises: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon; determining whether to allow the position information of the first UE to be exposed according to the privacy configuration of the first UE, wherein the expected role is to locate the UE; transmitting a first response message containing a discovery key to the first UE, wherein a privacy configuration of the first UE allows exposure of location information of the first UE; the discovery key is used for mutual discovery between the first UE and the second UE.

Description

Information processing method, apparatus, communication device and storage medium
Technical Field
The present disclosure relates to the field of wireless communication technology, and in particular, to an information processing method, an apparatus, a communication device, and a storage medium.
Background
A target User Equipment (UE) may be relatively located based on a ranging/SideLink (SL) location procedure. If the location information of the Located (UE) is combined, a more accurate location of the target UE can be obtained. The positioning UE may be a UE that has determined its own position.
However, in some cases, the location information of the positioning UE is kept secret, and if the positioning UE that is unwilling to expose the location information of itself is selected in the SL positioning process of the target UE, the privacy of the positioning UE may be violated, and the location information of the positioning UE may be placed in an environment that is not trusted or in an unsafe environment by the positioning UE.
Disclosure of Invention
The embodiment of the disclosure provides an information processing method, an information processing device, communication equipment and a storage medium.
A first aspect of an embodiment of the present disclosure provides an information processing method, where the method is performed by a first network device, the method including:
receiving a first request message of first User Equipment (UE), wherein the first request message comprises: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon;
determining whether to allow the position information of the first UE to be exposed according to the privacy configuration of the first UE, wherein the expected role is to locate the UE;
transmitting a first response message containing a discovery key to the first UE, wherein a privacy configuration of the first UE allows exposure of location information of the first UE; the discovery key is used for mutual discovery between the first UE and the second UE.
A second aspect of an embodiment of the present disclosure provides an information processing method, performed by a first user equipment UE, the method including:
transmitting a first request message to a first network device, wherein the first request message comprises: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon; the expected role is to locate the UE;
receiving a first response message returned by the first network equipment;
wherein the first UE privacy configuration indication allows location information of the first UE to be exposed, the first response message comprising: discovering a secret key; the discovery key is used for mutual discovery of the first UE and the second UE.
A third aspect of an embodiment of the present disclosure provides an information processing apparatus, wherein the apparatus includes:
a first receiving module configured to receive a first request message of a first user equipment UE, wherein the first request message includes: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon;
a determining module configured to determine whether to allow exposure of location information of the first UE according to a privacy configuration of the first UE, wherein the desired role is to locate the UE;
A first sending module configured to send a first response message containing a discovery key to the first UE, wherein a privacy configuration of the first UE allows exposure of location information of the first UE; the discovery key is used for mutual discovery between the first UE and the second UE, and is used for mutual discovery with the second UE serving as a target UE.
A fourth aspect of the disclosed embodiments provides an information processing apparatus, the apparatus including:
a second sending module configured to send a first request message to a first network device, wherein the first request message includes: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon; the expected role is to locate the UE;
the second receiving module is configured to receive a first response message returned by the first network equipment;
wherein the first UE privacy configuration indication allows location information of the first UE to be exposed, the first response message comprising: discovering a secret key; the discovery key is used for mutual discovery of the first UE and the second UE.
A fifth aspect of the embodiments of the present disclosure is an information processing method, wherein the method is performed by a communication system, and the method includes:
The method comprises the steps that first User Equipment (UE) sends a first request message to first network equipment, wherein the first request message comprises: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon; the expected role is to locate the UE;
the method comprises the steps that first network equipment receives a first request message of first User Equipment (UE), wherein the first request message comprises the following steps: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon; determining whether to allow the position information of the first UE to be exposed according to the privacy configuration of the first UE, wherein the expected role is to locate the UE;
transmitting a first response message containing a discovery key to the first UE, wherein a privacy configuration of the first UE allows exposure of location information of the first UE; the discovery key is used for mutual discovery between the first UE and the second UE;
and the first UE receives a first response message returned by the first network equipment.
A sixth aspect of the disclosed embodiments provides a communication device, including a processor, a transceiver, a memory, and an executable program stored on the memory and capable of being executed by the processor, wherein the processor executes the information processing method provided in the first aspect, the second aspect, or the fifth aspect.
A seventh aspect of the presently disclosed embodiments provides a computer storage medium storing an executable program; the executable program, when executed by a processor, can implement the information processing method provided in the foregoing first aspect or second aspect or fifth aspect.
According to the technical scheme provided by the embodiment of the disclosure, the first network equipment determines that the expected role of the first UE is the positioning UE, determines whether to allow the position information of the first UE to be exposed to other UEs according to the privacy configuration of the first UE, and sends the discovery key to the first UE under the condition that the exposure is allowed. In this way, the other UE may discover the first UE based on the discovery key and obtain the location information of the first UE. Compared with the scheme of not requesting or expecting to act as privacy configuration verification of the positioning UE in the related art, the security of the position information of the first UE is improved, and the privacy violation of the first UE is reduced.
The technical solutions provided by the embodiments of the present disclosure, it should be understood that the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the embodiments of the present disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the embodiments of the invention.
Fig. 1 is a schematic diagram of a wireless communication system according to an exemplary embodiment;
FIG. 2A is a flow chart of a method of information processing according to an exemplary embodiment;
FIG. 2B is a flow chart of a method of information processing according to an exemplary embodiment;
FIG. 2C is a flow chart of a method of information processing according to an exemplary embodiment;
FIG. 3A is a flow chart illustrating a method of information processing according to an exemplary embodiment;
FIG. 3B is a flow chart illustrating a method of information processing according to an exemplary embodiment;
FIG. 4A is a flow chart illustrating a method of information processing according to an exemplary embodiment;
FIG. 4B is a flow chart of a method of information processing according to an exemplary embodiment;
fig. 5A is a schematic structural view of an information processing apparatus according to an exemplary embodiment;
fig. 5B is a schematic structural view of an information processing apparatus according to an exemplary embodiment;
fig. 6 is a schematic diagram illustrating a structure of a UE according to an exemplary embodiment;
fig. 7 is a schematic diagram of a network device according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with embodiments of the invention. Rather, they are merely examples of apparatus and methods consistent with aspects of embodiments of the invention.
The terminology used in the embodiments of the disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the embodiments of the disclosure. As used in this disclosure, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in embodiments of the present disclosure to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of embodiments of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
Referring to fig. 1, a schematic structural diagram of a wireless communication system according to an embodiment of the disclosure is shown. As shown in fig. 1, the wireless communication system is a communication system based on a cellular mobile communication technology, and may include: a number of UEs 11, a number of access devices 12 and a number of core network devices 13. The core network device 13 is connected to an access device, and can be used for mobility management, session management, quality of service (Quality of Service, qoS) management, key management, or the like for the UE. Typical core network devices include, but are not limited to, access management functions (Access Management Function, AMF), location management functions (Location Management Function, LMF), and the like.
Wherein UE 11 may be a device that provides voice and/or data connectivity to a user. The UE 11 may communicate with one or more core networks via a radio access network (Radio Access Network, RAN), and the UE 11 may be an internet of things UE such as a sensor device, a mobile phone (or "cellular" phone) and a computer with an internet of things UE, for example, a fixed, portable, pocket, hand-held, computer-built-in or vehicle-mounted device. Such as a Station (STA), subscriber unit (subscriber unit), subscriber Station (subscriber Station), mobile Station (mobile Station), mobile Station (mobile), remote Station (remote Station), access point, remote UE (remote terminal), access UE (access terminal), user terminal, user agent (user agent), user device (user equipment), or user UE (UE). Alternatively, the UE 11 may be an unmanned aerial vehicle device. Alternatively, the UE 11 may be a vehicle-mounted device, for example, a laptop with a wireless communication function, or a wireless communication device externally connected to the laptop. Alternatively, the UE 11 may be a roadside device, for example, a street lamp, a signal lamp, or other roadside devices having a wireless communication function.
Access device 12 may be a network-side device in a wireless communication system. Wherein the wireless communication system may be a fourth generation mobile communication technology (the 4th generation mobile communication,4G) system, also known as a long term evolution (Long Term Evolution, LTE) system; alternatively, the wireless communication system may be a 5G system, also known as a New Radio (NR) system or a 5G NR system. Alternatively, the wireless communication system may be a next generation system of the 5G system. Among them, the access network in the 5G system may be called NG-RAN (New Generation-Radio Access Network, new Generation radio access network). Or, an MTC system.
Wherein the access device 12 may be an evolved access device (eNB) employed in a 4G system. Alternatively, access device 12 may be an access device (gNB) in a 5G system that employs a centralized and distributed architecture. When the access device 12 employs a centralized and distributed architecture, it typically includes a Centralized Unit (CU) and at least two Distributed Units (DUs). A protocol stack of a packet data convergence protocol (Packet Data Convergence Protocol, PDCP) layer, a radio link layer control protocol (Radio Link Control, RLC) layer, and a medium access control (Media Access Control, MAC) layer is provided in the centralized unit; a Physical (PHY) layer protocol stack is provided in the distribution unit, and the specific implementation of the access device 12 is not limited by the embodiments of the present disclosure.
A wireless connection may be established between access device 12 and UE 11 over a wireless air interface. In various embodiments, the wireless air interface is a fourth generation mobile communication network technology (4G) standard-based wireless air interface; or, the wireless air interface is a wireless air interface based on a fifth generation mobile communication network technology (5G) standard, for example, the wireless air interface is a new air interface; alternatively, the wireless air interface may be a wireless air interface based on a 5G-based technology standard of a next generation mobile communication network.
As shown in fig. 2A, an embodiment of the present disclosure provides an information processing method, wherein the method is performed by a first network device, and the method includes:
s1110: receiving a first request message of first User Equipment (UE), wherein the first request message comprises: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon;
s1120: determining whether to allow the location information of the first UE to be exposed according to the privacy configuration of the first UE under the condition that the expected role is to locate the UE;
s1130: and transmitting a first response message containing a discovery key to the first UE under the condition that the position information of the first UE is allowed to be exposed, wherein the discovery key is used for mutual discovery with a second UE serving as a target UE.
The first network device may be a core network device including, but not limited to, at least one of:
the service policy control function (Policy Control Function, PCF) or the proximity service key management function (Prose Key Management Function, PKMF), the direct discovery name management function (Direct Discovery Name Management Function, DDNMF).
In an embodiment of the disclosure, the first network device receives a first request message from a first UE. The first request message may be forwarded or transmitted by the first UE to the first network device through the access network device or other core network device. Illustratively, the first request message is sent by the first UE and forwarded to the PCF, PKMF, or DDNMF via the AMF.
Illustratively, the first request message may include, but is not limited to, a discovery key request (Discovery Key Request, DKR) message. The discovery key request message may also be simply referred to as a discovery key request.
The identification information of the first UE may be various unique identifications that can be recognized by the network device. Illustratively, the identification information of the first UE may include, but is not limited to: a user permanent identifier (Subscriber Permanent Identifier, SUPI) and a user hidden identifier (Subscriber Concealed Identifier, sui).
The role information may indicate a role that the first UE plays when performing a ranging/SL positioning service. Illustratively, the roles indicated by the role information may include: positioning UE and target UE.
The positioning UE may be used to assist in positioning the target UE. The location information of the positioning UE can provide higher-precision positioning for the target UE. The positioning UE is illustratively a UE that can learn absolute position information, and the target UE can obtain the absolute position information of the target UE based on the relative positioning with the positioning UE and by combining the absolute position information of the target UE, where the absolute position information can be longitude and latitude information. If the network equipment is to locate the target UE, more accurate position information of the target UE can be obtained through the assistance of the locating UE.
The target UE may also be referred to as a measured UE. The measured UE may participate in the ranging/SL positioning operation to obtain the ranging/SL positioning result. The ranging/SL positioning results may include a relative distance and/or a relative angle between two measured UEs.
In the embodiment of the present disclosure, if the desired role of the first UE is to be the positioning UE, it is determined whether to allow the location information of the positioning UE to be exposed to the network device and/or other UEs according to the privacy configuration of the positioning UE. For example, it may be determined whether to allow location information of the positioning UE to be exposed to the target UE according to a privacy configuration of the positioning UE.
If the location information of the first UE is allowed to be exposed, the network device obtains the discovery key. The obtaining the discovery key may include: generating a discovery key under the condition that the first network device does not store the discovery key of the associated service; in case there is a discovery key storing the associated service, the generated discovery key is directly acquired. After the network device obtains the discovery key, the discovery key may be returned to the first UE via a first request message. The associated service may be a service indicated by a service code carried by the first request message. In particular, the service may be a ranging/SL positioning service. The discovery key may be used for mutual discovery between the first UE and the second UE. The second UE may then be the target UE for the ranging/SL positioning service.
The discovery key may be generated from a service code, for example. At a time within a public land mobile network (Public Land Mobile Network, PLMN), the network device may have only one valid set of discovery keys for the service code. And storing a valid discovery key in the first network equipment when the first request message of the first UE is received, and directly returning the valid discovery key to the first UE. If the first request message of the first UE is received, the first network device generates a discovery key according to the service code if the first network device does not have a valid discovery key, and sends the generated discovery key to the authorized (or verified) first UE through a first response message.
Notably, are: in some embodiments, S1120 may include:
determining whether to allow the position information of the first UE to be exposed according to the privacy configuration of the first UE under the condition that the first UE is authorized to participate in the service indicated by the service code carried by the first request message according to the subscription data of the first UE; or determining whether the first UE is authorized to allow the location information of the first UE to be exposed according to the privacy configuration of the first UE under the condition that the first UE participates in the service indicated by the service code carried by the first request message to serve as the positioning UE according to the subscription data of the first UE.
If it is determined that the first UE is not authorized to participate in the service indicated by the service code according to the subscription data of the first UE and/or if it is determined that the first UE is not authorized to act as a positioning UE according to the subscription data of the first UE, the step of determining whether to allow the location information of the first UE to be exposed to other UEs according to the privacy configuration of the first UE is skipped. Further, in these cases, a first response message indicating failure may be sent to the first UE.
Illustratively, the method may further comprise:
the first network device requests subscription data and/or privacy configuration of the first UE from the second network device according to the first request message.
The second network device may include, but is not limited to: user data management (User Data Management, UDM) and/or unified data warehouse (Unified Data Repository, UDR).
In some embodiments, the privacy configuration may be part of the subscription data of the first UE. For example, the first UE subscription data indicates that the location information of the first UE is not allowed to be exposed or that the security level is high, and indicates that the configuration information of the first UE is not allowed to be exposed. For another example, the first UE subscription data indicates that the location information of the first UE is allowed to be exposed or that the security level is low, and indicates that the configuration information of the first UE is allowed to be exposed.
The discovery key may include at least one of: an integrity key for integrity protection of messages used when the first UE and the second UE discover each other; confidentiality key for the encryption protection of messages used when discovering each other between the first UE and the second UE.
If the first UE determines, based on its privacy configuration, that the first UE is not allowed to act as a positioning UE, exposing its location information to other UEs if the first UE requests or desires to act as a positioning UE, the first response message may be a reject message. The rejection message does not contain the discovery key and may contain the cause of the failure.
In the embodiments of the present disclosure, on the one hand, the discovery key may be used for security protection of messages delivered by the first UE and the second UE mutual discovery procedure, and on the other hand, whether the discovery key is sent depends on the authorization status of the positioning UE, and further used for controlling whether the location information of the positioning UE is acquired by the target UE.
In some embodiments, the first request message may further include: service codes. The service code may indicate the service currently involved. Illustratively, the service code may indicate ranging/SL location services.
In this way, in the process of issuing the discovery key, the authorization of whether the positioning UE is willing to expose the position information of the positioning UE to other UEs is realized, so that the safety of the position information of the positioning UE is ensured.
The privacy configuration may be user data management (User Data Management, UDM) and/or unified data repository (Unified Data Repository, UDR) for the first network device.
The first network device, after receiving the first request message, may request a privacy configuration of the first UE from the UDM and/or the UDR. For example, a location UE may determine whether to allow its location information to be exposed to other UEs at the time of subscription, at which point a privacy configuration may be generated. At this time, the privacy configuration may be part of the content of the subscription data of the positioning UE, or the privacy configuration specifically generated according to the contract of the subscription data. Also for example, the positioning UE may dynamically update the privacy configuration stored on the first network device and/or UDM and/or UDR by updating the flow based on the user indication to determine whether it is willing to expose the own location information.
In some embodiments, the privacy configuration of the positioning UE may be a common configuration with the positioning UE belonging to the same type of UE, or a personalized configuration of the positioning UE. If so, determining the privacy configuration shared by the UE of the type according to the type of the first UE, and further determining whether the position information of the first UE is allowed to be exposed. If so, inquiring the personal configuration of the first UE according to the identification information of the first UE, and determining whether the position information of the first UE is allowed to be exposed or not according to the personal configuration. For example, it is possible for multiple UEs belonging to a community of business, government, home, public welfare organization, etc. to have the same privacy configuration, i.e. the UEs share a common set of common configurations.
In other embodiments, if a common configuration and a personality configuration are present at the same time, the priority of the personality configuration is higher than the priority of the common configuration. If no personality exists, a common configuration is used to determine whether to allow the location information of the first UE that is expected to act as a positioning UE to be exposed to other UEs.
In still other embodiments, if privacy configurations, such as public and personal configurations, are not present, it may be considered that determining location information of a first UE requesting to act as a positioning UE is allowed to be exposed to other UEs.
As shown in fig. 2B, an embodiment of the present disclosure provides an information processing method, wherein the method is performed by a first network device, and the method includes:
s1210: receiving a first request message of first User Equipment (UE), wherein the first request message comprises: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon;
s1220: sending a verification notification to the first UE if the desired role is to locate the UE and if the privacy configuration of the first UE includes a notification indicator;
s1230: receiving notification feedback of the first UE;
s1240: determining whether to allow the location information of the first UE to be exposed according to the notification feedback;
s1250: transmitting a first response message including a discovery key to the first UE in a case where the location information of the first UE is allowed to be exposed, wherein the first response message includes: discovering a secret key; the discovery key is used for mutual discovery with a second UE serving as a target UE.
In the embodiment of the disclosure, it may be determined by information interaction with the first UE whether the first UE is allowed to be exposed to other UEs when it desires to act as a positioning UE. This is also a way to verify if a first UE is allowed to expose its location information to other UEs in the event that it is desired to act as a positioning UE. And in this manner, the user of the first UE may temporarily determine if his own location information is allowed to be exposed to other UEs as needed.
In this case, the privacy configuration of the first UE may include, alone: a notification indicator. The notification indicator is used for indicating that whether the position information of the first UE is allowed to be exposed or not is dynamically determined by means of verification notification and notification feedback of the first UE.
For example, the first UE may send a first request message to the first network device based on the triggering of the application. The operating system of the first UE may have a setting item that the location information of the first UE is kept secret or not allowed to be exposed, in which case, after receiving the authentication notification returned by the first network device, the first UE returns notification feedback to the first network device according to the setting item of the operating system or based on an operation instruction received from a User Interface (UI). The notification feedback indicates whether the location information of the first UE is allowed to be exposed.
As shown in fig. 2C, an embodiment of the present disclosure provides an information processing method, wherein the method is performed by a first network device, and the method includes: s1310: receiving a first request message of first User Equipment (UE), wherein the first request message comprises: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon;
S1320: determining whether to allow the location information of the first UE to be exposed according to the privacy configuration of the first UE under the condition that the expected role is to locate the UE;
s1330: sending a verification notification to the first UE if the desired role is to locate the UE and the location information of the first UE is determined to be allowed to be exposed according to the privacy configuration;
s1340: receiving notification feedback of the first UE;
s1350: determining again whether to allow the location information of the first UE to be exposed according to the notification feedback;
s1360: transmitting a first response message including a discovery key to the first UE in case the notification feedback indicates that the first UE location information is allowed to be exposed; and sending a first response message which does not contain a discovery key to the first UE in the condition that the notification feedback indicates that the first UE position information is not allowed to be exposed.
Finally, the first network device determines whether to allow the first UE to participate in the SL positioning service and act as a positioning UE according to the notification feedback of the first UE, and whether to allow the location information of the first UE to be exposed to other UEs.
In some embodiments, the first response message is sent to the first UE without the discovery key if the privacy configuration determines that the location information of the first UE is not allowed to be exposed. In this case, the first response message may also include a failure indication.
In some embodiments, the determining whether to verify whether to allow the location information of the first UE to be exposed according to the notification feedback includes:
determining that the location information of the first UE is allowed to be exposed in case the notification feedback indicates acknowledgement;
and in the case that the notification feedback indicates denial, determining that the location information of the first UE is not allowed to be exposed.
In some embodiments, the sending, to the first UE, a verification notification if the desired role is to locate the UE, includes:
a verification notification is sent to the first UE if the desired role is to locate the UE and the privacy configuration includes a notification indicator.
If the privacy configuration contains the notification indicator, it is only necessary to determine whether to allow the location information of the first UE to be exposed to other UEs through interaction with the verification notification and the notification feedback of the first UE, otherwise it may be determined whether to allow the location information of the first UE to be exposed to other UEs based on the privacy configuration alone.
In some embodiments, the determining whether to allow the location information of the first UE to be exposed according to the privacy configuration of the first UE in the case that the desired role is to locate the UE further includes:
In the case where the desired role is to locate a UE and the privacy configuration does not include a notification indicator, determining whether to allow location information exposure of the first UE according to the privacy configuration of the first UE.
In some embodiments, the method further comprises:
in case the first UE is allowed to act as a target UE, a first response message comprising the discovery key is sent to the target UE.
Illustratively, the role information indicates that the first UE is acting as a target UE when participating in the ranging/SL positioning service, and if it is determined that the first UE is authorized or allowed to act as the target UE according to subscription data of the target UE, a first response message including a discovery key is sent to the target UE. As such, the discovery key may be used for a first UE acting as a target UE to discover a second UE that locates the UE.
In some embodiments, if the first response message includes a discovery key, the first response message may also include a timestamp and a maximum offset value. The timestamp may be used to indicate a start time at which the discovery key carried by the current first response message is validated, and the maximum offset may be used to determine an end time at which the discovery key carried by the current first response message is validated.
After the first UE receives the discovery key, an effective period of the discovery key is determined according to the timestamp and the maximum offset, and the discovery key and the second UE are mutually discovered in the effective period.
Illustratively, the timestamp may be a timestamp of the time of generation of the discovery key.
In some embodiments, if the first UE is allowed to act as the target UE, the first response message may further include: information of the UE is located. For example, the information of the positioning UE may be carried in a UE list, so that the subsequent target UE can find the positioning UE through the announcement message.
In one embodiment, the first network device also needs to verify whether the first UE is allowed to act as a positioning UE. If the first UE is allowed to act as a positioning UE, it is determined whether the location information of the first UE is allowed to be exposed according to the privacy configuration of the first UE.
That is, in this case, a first response message including a discovery key is transmitted to the first UE in a case where the first UE is allowed to act as the positioning UE and the location information of the first UE is allowed to be exposed, and otherwise, a first response message not including a discovery key is transmitted to the first UE. The first response message that does not contain the discovery key may include: failure indication.
For example, the first network device may determine whether the first UE is capable of participating in the ranging/SL positioning service and/or is capable of acting as a positioning UE when participating in the ranging/SL positioning service according to subscription data of the first UE. If the first UE cannot participate in the ranging/SL positioning service, or if the first UE can participate in the ranging/SL positioning service but cannot act as a positioning UE, the first UE may be considered to be unable to act as a positioning UE; denial this may consider the first UE to be able to act as a positioning UE.
In some embodiments, only if the first UE is allowed to act as a positioning UE, it is determined from the privacy configuration whether to allow verification that the location information of the first UE is exposed, thereby ensuring, on the one hand, security of service execution and, on the other hand, security of positioning UE location information participating in performing the ranging/SL positioning service.
Illustratively, the first request message may include: and the service code inquires the subscription data of the first UE according to the service code and the identification information of the first UE, and performs the verification after receiving the subscription data.
Still further exemplary, the first request message may further include: the service code and the identification information of the first UE. After the first network device receives the first request message, the service code, the identification information of the first UE and the role information carried by the first request message may be given to a second network device such as UDM and/or UDR, and a query result returned by the second network device may be received, where the query result may directly indicate whether the first UE is allowed to act as a positioning UE, or may also return subscription data to the first network device.
As shown in fig. 3A, an embodiment of the present disclosure provides an information processing method, which is performed by a first UE, the method including:
s2110: transmitting a first request message to a first network device, wherein the first request message comprises: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon;
s2120: receiving a first response message returned by the first network equipment; wherein in case the first UE is allowed to act as a positioning UE and the determination from the privacy configuration indicates that the location information of the first UE can be exposed, the first response message comprises: discovering a secret key; the discovery key is used for discovering with the second UE.
The first UE may be, for example, various types of terminals, and may be any type of terminal shown in fig. 1. The first UE may be a mobile phone, a tablet computer, a wearable device, a vehicle-mounted device, an intelligent office device, an intelligent home device, and/or a flight device, etc.
The first request message may be a discovery key request message.
The first request message may contain role information that may indicate a role that the first UE requests or desires to act, e.g., indicates that the first UE requests or desires to act as a target UE, a positioning UE, etc.
If the first UE requests to act as a positioning UE, the first UE receives a first response message containing a discovery key, which is returned to the first UE if the first UE is authorized to act as a positioning UE and it is determined from the privacy configuration of the first UE that the location information of the first UE is allowed to be exposed.
The first response message may be a reject message if the first UE is not allowed to act as a positioning UE and/or the first UE privacy configuration indicates that the location information of the first UE is not allowed to be exposed. Illustratively, the first response message does not contain the discovery key. The first response message may
In some embodiments, when the first UE requests or expects to act as the target UE, but the first network device verifies that the first UE is not allowed to act as the target UE, the first response message received by the first UE indicates a failure. For example, the role information carried by the first request message indicates that the first UE requests or desires to act as the target UE, and the first network device may verify whether the first UE can participate in the service indicated by the service code carried by the first request message, and further determine whether the first UE has permission to act as the target UE if the first UE can participate in the service indicated by the service code. After performing the double verification, it is determined that the first UE is able to participate in the service indicated by the service code and is able to act as a target UE, a first response message containing the discovery key is returned to the first UE, otherwise a first response message not containing the discovery key is returned.
The aforementioned service code may be a service code of a ranging/SL positioning service, for example.
As shown in fig. 3B, an embodiment of the present disclosure provides an information processing method, which is performed by a first UE, the method including:
s2210: transmitting a first request message to a first network device, wherein the first request message comprises: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon;
s2220: receiving a verification notification when the expected role is to locate the UE;
s2230: according to the verification notification, notification feedback of the first UE is sent to the first network equipment; wherein the notification feedback indicates whether exposing the location information of the first UE is allowed;
s2240: receiving a first response message returned by the first network equipment; wherein in case the first UE is allowed to act as a positioning UE and the determination from the privacy configuration indicates that the location information of the first UE can be exposed, the first response message comprises: discovering a secret key; the discovery key is used for discovering with the second UE.
Illustratively, the first UE displays a prompt when receiving the verification notification;
Detecting a user operation generated based on the prompt information;
and sending notification feedback to the first network equipment according to the user operation.
Also illustratively, when the first UE receives the authentication notification, notification feedback is sent to the first network device according to the state or local configuration of the first UE.
For example, if the current power of the first UE is low, when assisting the target UE to locate would aggravate the power consumption of the first UE, a notification feedback indicating that the exposure of the location information of the first UE is not allowed may be automatically sent to the first network device, otherwise, a notification feedback allowing the exposure of the location information of the first UE may be sent.
The local configuration may be a configuration of a setting item in an operating system message of the first UE. For example, a setting item related to the location of the UE is configured to not allow the location information of the first UE to be exposed, and the first UE automatically sends notification feedback to the first network device indicating that the location information of the first UE is not allowed to be exposed.
In some embodiments, after receiving the discovery key, the first UE further comprises:
in case the first UE acts as a positioning UE, broadcasting an advertisement message, the advertisement message being secured using the discovery key; the advertisement message may include: information of the first UE;
The second UE monitors the broadcast announcement message, and then the discovery key is acquired from the first network equipment to carry out security verification on the announcement message;
and if the authentication is passed, the first UE and the second UE find each other.
The information of the first UE may include: identification information of the first UE. Illustratively, the identification information of the first UE may include: an application layer identity or layer 2 identity of the first UE, etc., may be used to uniquely identify the first UE to the second UE in any case.
The security verification herein may include: integrity verification, digital signature verification, and/or confidentiality verification.
In this embodiment, the advertisement message may include: role information of the first UE. The role information may indicate that the first UE acts as a positioning UE.
In some embodiments, the advertisement message may also include a service code. The service code may be a service code of a ranging/SL positioning service. In other embodiments, the first UE, after receiving the discovery key, further comprises: monitoring an announcement message broadcast by the second UE; the first UE uses the received discovery key to carry out security verification on the received notice message; if the advertisement message passes the security verification, the first UE and the second UE complete the mutual discovery or verification.
And the second UE can acquire the relative position information of the first UE, and/or the first UE can acquire the relative position information and the absolute position information of the second UE, so that the positioning accuracy of the first UE can be improved.
If the second UE acts as the target UE, the advertisement message of the second UE may include: the second UE obtains information of positioning UE from the third network device. The information for locating the UE may include: an application layer identification and/or a layer 2 identification of the first UE, etc.
Illustratively, the third network device may include: positioning management functions (Location Management Function, LMF). For example, the third network device may be aware of information capable of serving as a positioning UE in advance based on the AMF.
For example, when the UE capable of serving as the positioning UE is initially registered and/or updated to register, the AMF may inform whether the AMF itself can serve as the positioning UE through the NAS message, and if the AMF can serve as the positioning UE, the AMF may record information of the UE and provide the information to the LMF, so that the LMF may provide the information to the target UE later.
After completing the mutual discovery of the first UE and the second UE, a PC5 connection may be established between the first UE and the second UE. The PC5 is connected to be used for the execution of ranging/SL positioning services.
Illustratively, the advertisement message broadcast by the second UE may also include role information. The role information may indicate a role that the second UE requests or desires to act, and may also indicate a role that the second UE requests discovery that the peer UE can act.
If the advertisement message carries role information, the error response when a plurality of UEs acting in different roles exist around can be avoided, so that the accurate mutual discovery between the target UE and the positioning UE is realized.
In some embodiments, the advertisement message may further include ranging/SL location services may include: the ranging/SL locates the traffic code of the traffic, thereby facilitating the UE receiving the announcement message to determine the discovery key used or the traffic involved.
Illustratively, the service code of the ranging/SL positioning service code may be carried in the advertisement message in the clear, and the UE that receives the advertisement message may determine the discovery key corresponding to the service code according to the service code, so as to use the correct discovery key for security verification of the advertisement message.
Illustratively, establishing the PC5 connection may include:
receiving a direct communication request message of a second UE serving as a target UE;
based on the direct communication request message, a direct communication accept message is sent to a second serving as a target UE.
In the foregoing embodiment, the first UE and the second UE are mutually discovered through the advertisement message, that is, mutually discovered through the mode a. In other embodiments, the first UE and the second UE may also discover each other through a request message and a response message, i.e., through mode B.
For network assisted ranging/SL positioning, the target UE should discover and select a positioning UE located in the same serving PLMN as the target UE, taking into account the privacy requirements of the location of the shared positioning UE. In view of this, embodiments of the present disclosure propose to check the privacy requirements of a positioning UE in the discovery process before the positioning UE is selected by a target UE.
When a positioning UE requests a discovery key from a network, the network needs to check the privacy requirements of the positioning UE before providing the discovery key to the positioning UE. The network function that initiates the UE privacy check may be the network function responsible for generating and providing the discovery key to the UE.
As shown in fig. 4A, an embodiment of the present disclosure provides an information processing method, which may include:
the UE sends a discovery key request to the DDNMF, PCF or PKMF, the request comprising at least the UE ID, the service code of the SL location service and the role information the UE expects to play.
2. If the role of the request (or desire) is to locate the UE, the DDNMF, PCF or PKMF contacts the UDM and checks from its subscription information whether the UE is authorized as a location UE for the SL location service.
3. If the authorization is successful, the DDNMF, PCF or PKMF queries the UE privacy configuration from the UDM via a Nudm_SDM_get request.
Udm returns privacy configuration of the positioning UE to DDNMF, PCF or PKMF through nudm_sdm_get response.
The DDNMF, PCF or PKMF checks whether the positioning UE allows the location information to be acquired by the network according to the privacy configuration of the UE. Illustratively, it is determined whether the location information of the positioning UE is allowed to be exposed, i.e. according to the privacy configuration of the positioning UE.
6. Alternatively, if the indicator of the privacy check related action indicates that the UE must be notified for privacy verification, the DDNMF, PCF or PKMF notifies the UE through the AMF, which notification may include the service code of the SL location service. And then, through user interaction, the UE returns a notification result to the DDNMF, the PCF or the PKMF through the AMF, wherein the notification result indicates whether the user authorizes or refuses the current SL positioning service, if the user authorizes, the user currently agrees to position the UE to be exposed, and if the user refuses, the user does not currently agree to position the UE to be exposed. The location notification call in fig. 4A is one of the aforementioned verifications. The position notification feedback in fig. 4A is one of the feedback notifications described above.
And 7a, if the privacy check is successful, the DDNMF, PCF or PKMF generates a discovery key for the UE.
If the privacy check fails, the DDNMF, PCF or PKMF returns a discovery key response with the failure cause to the UE.
The ddnmf, PCF or PKMF returns a discovery key response to the UE containing all discovery security information.
9. The positioning UE starts broadcasting an announcement message containing its own UE information and a service code of the SL positioning service. And protects the advertisement message using the received discovery key.
10. The target UE monitors the broadcast announcement message. If the UE information of the location UE in the advertisement message matches the location UE information provided by the LMF, the target UE sends a discovery key request to the DDNMF, PCF or PKMF, the request including at least a UE ID, a service code of the SL location service, and role information the UE is to play (i.e., the target UE).
Ddnmf, PCF or PKMF contacts UDM to check if the UE is authorized as a target UE for SL location services based on its subscription information.
The ddnmf, PCF or PKMF returns a discovery key response to the UE including all discovery security information generated in step #7 a.
13. After receiving the discovery security information, the target UE can verify the received advertisement message.
14. The target UE selects the positioning UE by sending a direct communication request (Direct Communication Request, DCR) message to the positioned UE.
15. The positioning UE returns a direct communication accept (Direct Communication Accept, DCA) message to the target UE.
16. The remainder of the SL positioning procedure is completed.
As shown in fig. 4B, an embodiment of the present disclosure provides an information processing method, which may include:
The UE sends a discovery key request to the DDNMF, PCF or PKMF, the request comprising at least the UE ID, the service code of the SL location service and the role information the UE expects to play.
2. If the role is to be played as a positioning UE, the DDNMF, PCF or PKMF contacts UDM and checks whether the UE is authorized as a positioning UE for the SL positioning service based on its subscription information.
3. If the authorization is successful, the DDNMF, PCF or PKMF queries the UE privacy configuration from the UDM via a Nudm_SDM_get request.
Udm returns privacy configuration of the positioning UE to DDNMF, PCF or PKMF through nudm_sdm_get response.
The DDNMF, PCF or PKMF checks whether the positioning UE allows the location information to be acquired by the network according to the privacy configuration of the UE.
6. Alternatively, if the indicator of the privacy check-related action indicates that the UE must be notified of privacy verification, the DDNMF, PCF or PKMF notifies the UE through the AMF that the notification includes the service code of the SL location service. Then, through the user interaction, the UE returns a notification result indicating whether the user's right for the current SL location service is granted or denied to the DDNMF, PCF, or PKMF through the AMF. The location notification call in fig. 4B is one of the aforementioned verifications. The position notification feedback in fig. 4B is one of the feedback notifications described above.
And 7a, if the privacy check is successful, the DDNMF, PCF or PKMF generates a discovery key for the UE.
If the privacy check fails, the DDNMF, PCF or PKMF returns a discovery key response with the failure cause to the UE.
The ddnmf, PCF or PKMF returns a discovery key response to the UE containing all discovery security information.
9. Receiving a discovery key request of a target UE, comprising: information of target UE, role information, service code of SL positioning service, etc.
Ddnmf, PCF or PKMF contacts UDM to check if the UE is authorized as a target UE for SL location services based on its subscription information.
DNMF/PCF/PKMF returns a discovery key response to the UE, including all discovery security information generated in step # 7a.
12. Upon receipt of the discovery security information, the target UE broadcasts an advertisement message including: information of positioning UE, service code of SL positioning service, and discovery key.
13. After receiving the discovery security information, the positioning UE can verify the received advertisement message.
14. The target UE selects the positioning UE by sending a direct communication request (Direct Communication Request, DCR) message to the positioned UE.
15. The positioning UE returns a direct communication accept (Direct Communication Accept, DCA) message to the target UE.
16. The remainder of the SL positioning procedure is completed.
Illustratively, the DDNMF, PCF, or PKMF may be capable of performing at least one of the following:
the DDNMF, PCF or PKMF should be able to initiate privacy checks for locating the UE based on the authorization result of the UDM.
The DDNMF, PCF or PKMF should be able to check whether the located UE allows its location information to be exposed according to the privacy configuration of the located UE queried from the UDM.
DDNMF, PCF or PKMF shall be able to invoke location notification to the positioning UE through AMF.
DDNMF, PCF or PKMF should be able to locate the UE notification result through AMF reception.
The DDNMF, PCF or PKMF should be able to determine whether discovery security information should be generated based on the privacy check results of the located UE.
Also illustratively, the UE may be capable of performing at least one of:
the UE should be able to understand the location notification from the network indicating that privacy verification is required for a particular SL location service.
The UE should be able to return the privacy verification result of the specific SL location service to the network.
As shown in fig. 5A, an embodiment of the present disclosure provides an information processing apparatus, wherein the apparatus includes:
the first receiving module 110 is configured to receive a first request message of a first user equipment UE, where the first request message includes: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon;
A determining module 120 configured to determine whether to allow exposure of location information of the first UE according to a privacy configuration of the first UE in case the desired role is to locate the UE;
a first sending module 130 is configured to send a first response message containing a discovery key to the first UE, where the discovery key is used for mutual discovery with a second UE serving as a target UE, in a case where the location information of the first UE is allowed to be exposed.
The information processing apparatus may be a first network device. The first network device may be DDNMF, PKMF, PCF, or the like.
Illustratively, the first receiving module 110, the determining module 120, and the first transmitting module 130 may be program modules; the program modules are capable of carrying out the operations described above after being processed.
Also for example, the first receiving module 110, the determining module 120, and the first transmitting module 130 may be soft and hard combining modules, which may include various programmable arrays. The programmable array includes, but is not limited to: a field programmable array and/or a complex programmable array.
Still further exemplary, the first receiving module 110, the determining module 120, and the first transmitting module 130 may be pure hardware modules. The pure hardware modules include, but are not limited to, application specific integrated circuits.
In some embodiments, the determining module 120 is configured to send a verification notification to the first UE if the desired role is to locate the UE;
the first receiving module 110 is further configured to receive notification feedback of the first UE;
the determining module 120 is further configured to determine again whether to allow the location information of the first UE to be exposed according to the notification feedback.
In some embodiments, the determining module 120 is configured to determine that the location information of the first UE is allowed to be exposed in case the notification feedback indicates acknowledgement; and in the case that the notification feedback indicates denial, determining that the location information of the first UE is not allowed to be exposed.
In some embodiments, the first sending module 130 is further configured to send a verification notification to the first UE if the desired role is to locate the UE and the privacy configuration includes a notification indicator.
In some embodiments, the determining module 120 is further configured to determine whether to allow the location information of the first UE to be exposed according to the privacy configuration of the first UE if the desired role is to locate the UE and the privacy configuration does not include a notification indicator.
In some embodiments, the first sending module 130 is configured to send a first response message including a discovery key to the first UE if the first UE is allowed to act as the positioning UE and the location information of the first UE is allowed to be exposed.
As shown in fig. 5B, an embodiment of the present disclosure provides an information processing apparatus including:
the second sending module 210 is configured to send a first request message to the first network device, where the first request message includes: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon;
a second receiving module 220, configured to receive a first response message returned by the first network device;
wherein in case the first UE is allowed to act as a positioning UE and the determination from the privacy configuration indicates that the location information of the first UE can be exposed, the first response message comprises: discovering a secret key; the discovery key is used for discovering with the second UE.
The information processing apparatus may be a first UE.
Illustratively, the second transmitting module 210 and the second receiving module 220 may be program modules; the program modules are capable of carrying out the operations described above after being processed.
Also exemplary, the second transmitting module 210 and the second receiving module 220 may be soft and hard combining modules, which may include various programmable arrays. The programmable array includes, but is not limited to: a field programmable array and/or a complex programmable array.
Still further exemplary, the second transmitting module 210 and the second receiving module 220 may be pure hardware modules. The pure hardware modules include, but are not limited to, application specific integrated circuits.
It will be appreciated that the first response message indicates a failure in case the first UE is not allowed to act as a positioning UE and/or is not allowed to expose location information of the first UE.
As will be appreciated, the second receiving module is further configured to receive a verification notification if the desired role is to locate the UE; the second receiving module is further configured to send notification feedback to the first network device according to the verification notification; wherein the notification feedback indicates whether to allow exposing the location information of the first UE.
An embodiment of the present disclosure provides an information processing method, wherein the method is performed by a communication system, and the method includes:
the method comprises the steps that a first UE sends a first request message to first network equipment, wherein the first request message comprises the following steps: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon; the expected role is to locate the UE;
The method comprises the steps that first network equipment receives a first request message of first User Equipment (UE), wherein the first request message comprises the following steps: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon; determining whether to allow the position information of the first UE to be exposed according to the privacy configuration of the first UE, wherein the expected role is to locate the UE;
transmitting a first response message containing a discovery key to the first UE, wherein a privacy configuration of the first UE allows exposure of location information of the first UE; the discovery key is used for mutual discovery between the first UE and the second UE;
and the first UE receives a first response message returned by the first network equipment.
Illustratively, the first network device may include, but is not limited to, a GMLC.
In some implementations, a first response message is sent to the first UE that does not contain the discovery key, wherein the privacy configuration of the first UE does not allow the location information of the first UE to be exposed and/or the first UE is not allowed to act as a positioning UE.
In some embodiments, after receiving the first request message and before sending the first response message, the method further comprises:
The first network equipment sends a verification notice to the first UE; wherein the privacy configuration of the first UE includes a notification indicator;
and receiving notification feedback sent by the first UE, wherein the notification feedback indicates whether the position information of the first UE is allowed to be exposed.
In some embodiments, the privacy configuration of the first UE does not include a notification indicator.
In some embodiments, the first UE is used to assist in positioning of the second UE.
The embodiment of the disclosure provides a communication device, comprising:
a memory for storing processor-executable instructions;
the processor is connected with the memories respectively;
wherein the processor is configured to execute the policy handling method provided by any of the foregoing technical solutions.
The processor may include various types of storage medium, which are non-transitory computer storage media, capable of continuing to memorize information stored thereon after a power down of the communication device.
Here, the communication apparatus includes: UE or network device. The network device may include, but is not limited to, the first network device, the second network device, and/or the third network device of any of the foregoing solutions.
The processor may be connected to the memory via a bus or the like for reading an executable program stored on the memory, for example, at least one of the methods shown in fig. 2A to 2C, fig. 3A to 3B, and fig. 4A to 4B.
Fig. 6 is a block diagram of a UE800, according to an example embodiment. For example, the UE800 may be a mobile phone, a computer, a digital broadcast user equipment, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 6, ue800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the UE800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 802 may include one or more processors 820 to execute instructions to generate all or part of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interactions between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the UE 800. Examples of such data include instructions for any application or method operating on the UE800, contact data, phonebook data, messages, pictures, videos, and the like. The memory 804 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The power supply component 806 provides power to the various components of the UE 800. The power components 806 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the UE 800.
The multimedia component 808 includes a screen between the UE800 and the user that provides an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front camera and/or a rear camera. The front camera and/or the rear camera may receive external multimedia data when the UE800 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the UE800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 further includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be a keyboard, click wheel, buttons, etc. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor component 814 includes one or more sensors that provide status assessment of various aspects for the UE 800. For example, the sensor component 814 may detect an on/off state of the device 800, a relative positioning of components, such as a display and keypad of the UE800, the sensor component 814 may also detect a change in position of the UE800 or a component of the UE800, the presence or absence of user contact with the UE800, an orientation or acceleration/deceleration of the UE800, and a change in temperature of the UE 800. The sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communication between the UE800 and other devices, either wired or wireless. The UE800 may access a wireless network based on a communication standard, such as WiFi,2G, or 3G, or a combination thereof. In one exemplary embodiment, the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the UE800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for executing the methods described above.
In an exemplary embodiment, a non-transitory computer-readable storage medium is also provided, such as memory 804 including instructions executable by processor 820 of UE800 to generate the above-described method. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
As shown in fig. 7, an embodiment of the present disclosure shows a network device. For example, the network device 900 may be provided as a network-side device. The network device may be any one of the first network device, the second network device, and the third network device described above.
Referring to fig. 7, network device 900 includes a processing component 922 that further includes one or more processors and memory resources represented by memory 932 for storing instructions, such as applications, executable by processing component 922. The application programs stored in memory 932 may include one or more modules that each correspond to a set of instructions. Further, processing component 922 is configured to execute instructions to perform any of the methods described above as applied to the access device, e.g., at least one of the methods shown in fig. 2A-2C, 3A-3B, and 4A-4B.
The network device 900 may also include a power component 926 configured to perform power management for the network device 900, a wired or wireless network interface 950 configured to connect the network device 900 to a network, and an input output (I/O) interface 958. The network device 900 may operate based on an operating system stored in memory 932, such as Windows Server TM, mac OS XTM, unixTM, linuxTM, freeBSDTM, or the like.
Each step in a certain implementation manner or embodiment may be implemented as an independent embodiment, and the steps may be arbitrarily combined, for example, a scheme after removing part of the steps in a certain implementation manner or embodiment may be implemented as an independent embodiment, and the order of the steps in a certain implementation manner or embodiment may be arbitrarily exchanged, and further, an optional manner or optional embodiment in a certain implementation manner or embodiment may be arbitrarily combined; furthermore, various embodiments or examples may be arbitrarily combined, for example, some or all steps of different embodiments or examples may be arbitrarily combined, and a certain embodiment or example may be arbitrarily combined with alternative modes or alternative examples of other embodiments or examples.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It is to be understood that the invention is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (17)

1. An information processing method, wherein the method is performed by a first network device, the method comprising:
receiving a first request message of first User Equipment (UE), wherein the first request message comprises: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon;
determining whether to allow the position information of the first UE to be exposed according to the privacy configuration of the first UE, wherein the expected role is to locate the UE;
transmitting a first response message containing a discovery key to the first UE, wherein a privacy configuration of the first UE allows exposure of location information of the first UE; the discovery key is used for mutual discovery between the first UE and the second UE.
2. The method of claim 1, wherein after the receiving the first request message of the first user equipment UE, before the sending the first response message, the method further comprises:
Sending a verification notification to the first UE, wherein a privacy configuration of the first UE includes a notification indicator;
and receiving notification feedback of the first UE, wherein the notification feedback is used for indicating that the position of the first UE is allowed to be exposed.
3. The method of claim 1, wherein,
the first UE privacy configuration does not include a notification indicator.
4. The method of claim 1, wherein the method further comprises:
and sending a first response message which does not contain the discovery key to the first UE, wherein the privacy configuration of the first UE does not allow the position information of the first UE to be exposed.
5. The method of claim 4, wherein after the receiving the first request message of the first user equipment UE, before the sending the first response message, the method further comprises:
sending a verification notification to the first UE, wherein a privacy configuration of the first UE includes a notification indicator;
and receiving notification feedback of the first UE, wherein the notification feedback is used for indicating that the position of the first UE is not allowed to be exposed.
6. The method of claim 5, wherein the first UE privacy configuration does not include a notification indicator.
7. The method of any of claims 1 to 6, wherein prior to determining whether to allow location information exposure of the first UE according to the privacy configuration of the first UE, the method further comprises:
it is determined to allow the first UE to act as the positioning UE.
8. The method of any of claims 1 to 7, wherein the positioning UE is to assist in positioning of the second UE.
9. An information processing method performed by a first user equipment UE, the method comprising:
transmitting a first request message to a first network device, wherein the first request message comprises: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon; the expected role is to locate the UE;
receiving a first response message returned by the first network equipment;
wherein the first UE privacy configuration indication allows location information of the first UE to be exposed, the first response message comprising: discovering a secret key; the discovery key is used for mutual discovery of the first UE and the second UE.
10. The method of claim 9, wherein prior to receiving the first response message, the method further comprises:
Receiving a verification notification;
sending notification feedback to the first network device according to the verification notification; wherein the notification feedback indicates that the location information of the first UE is allowed to be exposed.
11. The method of claim 10, wherein the privacy configuration of the first UE does not allow exposing location information of the first UE, the first response message indicating a failure.
12. The method of claim 11, wherein prior to receiving the first response message, the method further comprises:
receiving a verification notification;
sending notification feedback to the first network device according to the verification notification; wherein the notification feedback indicates that the first UE's location information is not allowed to be exposed.
13. An information processing apparatus, wherein the apparatus comprises:
a first receiving module configured to receive a first request message of a first user equipment UE, wherein the first request message includes: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon;
a determining module configured to determine whether to allow exposure of location information of the first UE according to a privacy configuration of the first UE, wherein the desired role is to locate the UE;
A first sending module configured to send a first response message containing a discovery key to the first UE, wherein a privacy configuration of the first UE allows exposure of location information of the first UE; the discovery key is used for mutual discovery between the first UE and the second UE, and is used for mutual discovery with the second UE serving as a target UE.
14. An information processing apparatus, the apparatus comprising:
a second sending module configured to send a first request message to a first network device, wherein the first request message includes: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon; the expected role is to locate the UE;
the second receiving module is configured to receive a first response message returned by the first network equipment;
wherein the first UE privacy configuration indication allows location information of the first UE to be exposed, the first response message comprising: discovering a secret key; the discovery key is used for mutual discovery of the first UE and the second UE.
15. An information processing method, wherein the method is performed by a communication system, the method comprising:
The method comprises the steps that first User Equipment (UE) sends a first request message to first network equipment, wherein the first request message comprises: identification information and role information of the first UE; wherein the role information indicates a desired role that the first UE acts upon; the expected role is to locate the UE;
transmitting a first response message containing a discovery key to the first UE, wherein a privacy configuration of the first UE allows exposure of location information of the first UE; the discovery key is used for mutual discovery between the first UE and the second UE;
the first UE establishes connection with the second UE based on the discovery key;
the second UE determines a location of the second UE based on the first UE.
16. A communication device comprising a processor, a transceiver, a memory and an executable program stored on the memory and capable of being executed by the processor, wherein the processor performs the information processing method of any one of claims 1 to 8, 9 to 12 or 15 when the executable program is executed by the processor.
17. A computer storage medium storing an executable program; the executable program, when executed by a processor, is capable of implementing the information processing method according to any one of claims 1 to 8, 9 to 12, or 15.
CN202380008816.6A 2023-03-30 2023-03-30 Information processing method, apparatus, communication device and storage medium Pending CN116803113A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2023085286 2023-03-30

Publications (1)

Publication Number Publication Date
CN116803113A true CN116803113A (en) 2023-09-22

Family

ID=88048438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202380008816.6A Pending CN116803113A (en) 2023-03-30 2023-03-30 Information processing method, apparatus, communication device and storage medium

Country Status (1)

Country Link
CN (1) CN116803113A (en)

Similar Documents

Publication Publication Date Title
CN116803113A (en) Information processing method, apparatus, communication device and storage medium
WO2024092573A1 (en) Information processing method and apparatus, communication device and storage medium
WO2024031523A1 (en) Information processing method and apparatus, communication device, and storage medium
WO2024031549A1 (en) Information processing method and apparatus, and communication device and storage medium
WO2024031556A1 (en) Information processing method and apparatus, communication device, and storage medium
WO2024092735A1 (en) Communication control method, system and apparatus, and communication device and storage medium
WO2024031565A1 (en) Information processing method and apparatus, and communication device and storage medium
WO2024036495A1 (en) Information processing methods and apparatuses, communication device and storage medium
WO2023178571A1 (en) Information processing method and apparatus, communication device, and storage medium
WO2023178573A1 (en) Information processing method and apparatus, and communication device and storage medium
CN117158046A (en) Information processing method and device, communication equipment and storage medium
CN117898016A (en) Registration method, communication device, and storage medium
CN117597957A (en) Information processing method and device, communication equipment and storage medium
CN117897990A (en) Registration method, registration device and storage medium
CN117643088A (en) Key generation method and device, communication equipment and storage medium
CN117716751A (en) Information processing method and device, communication equipment and storage medium
CN116889002A (en) Information processing method, apparatus, communication device and storage medium
CN117015984A (en) Information transmission method, device, system, communication equipment and storage medium
CN116724617A (en) Information processing method and device, communication equipment and storage medium
CN117643118A (en) Information processing method, apparatus, communication device and storage medium
CN118104204A (en) Information processing method and device, communication equipment and storage medium
CN117256166A (en) Information processing method and device, communication equipment and storage medium
CN117643029A (en) Information processing method and device, communication equipment and storage medium
CN117378177A (en) Communication method, device and storage medium
CN117256164A (en) Information processing method and device, communication equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination