CN118104187A - Side-link positioning method and device - Google Patents

Side-link positioning method and device Download PDF

Info

Publication number
CN118104187A
CN118104187A CN202280003735.2A CN202280003735A CN118104187A CN 118104187 A CN118104187 A CN 118104187A CN 202280003735 A CN202280003735 A CN 202280003735A CN 118104187 A CN118104187 A CN 118104187A
Authority
CN
China
Prior art keywords
terminal device
token
positioning
network element
terminal equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202280003735.2A
Other languages
Chinese (zh)
Inventor
商正仪
陆伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Publication of CN118104187A publication Critical patent/CN118104187A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the disclosure discloses a side uplink positioning method and a device, which can be applied to the technical field of communication, wherein the method executed by a first terminal device comprises the following steps: receiving a first token sent by a second terminal device, wherein the first token is used for representing the role of the second terminal device in the side-link positioning service, and the role of the second terminal device in the side-link positioning service is used for the first terminal device to determine whether to perform the side-link positioning service with the second terminal device; verifying the first token; establishing a sidelink with the second terminal device in response to the authentication passing; performing a side-uplink positioning measurement; and sending the measurement result to the first network element. Therefore, before the side-link positioning is performed, the role authorization verification is performed on the positioning terminal equipment according to the first token, so that the privacy security of the terminal equipment in the side-link positioning process is ensured, and the security of the side-link positioning service is improved.

Description

Side-link positioning method and device Technical Field
The disclosure relates to the field of communication technologies, and in particular, to a method and a device for positioning a side uplink.
Background
Ranging, a side-link positioning service refers to determining a distance between two terminal devices (also called User Equipment, UE for short) and/or a direction from one terminal device to another terminal device through a direct communication connection. A fifth generation mobile communication technology (5 th Generation Mobile Communication Technology, abbreviated as 5G) system can provide services such as ranging, sidelink (sl) positioning, etc. In the existing ranging and side-link positioning services, the privacy of the terminal equipment cannot be protected.
Disclosure of Invention
The embodiment of the disclosure provides a side uplink positioning method and device.
In a first aspect, an embodiment of the present disclosure provides a method for positioning a side uplink, which is performed by a first terminal device, and includes:
receiving a first token sent by second terminal equipment, wherein the first token is used for representing the role of the second terminal equipment in the side uplink positioning service;
When the side-link positioning service with the second terminal equipment is determined according to the first token, a side-link between the second terminal equipment and the side-link positioning service is established;
Performing a side-uplink positioning measurement;
and sending the measurement result to the first network element.
In the disclosure, after receiving a first token sent by a second terminal device, a first terminal device may first determine whether to perform the sidelink positioning service with the second terminal device according to the first token, and after determining to perform the sidelink positioning service with the second terminal device, establish a sidelink with the second terminal device, perform sidelink positioning measurement, and send a measurement result to a first network element. Therefore, before the side-link positioning is performed, the target terminal equipment performs role authorization verification on the positioning terminal equipment according to the first token, so that the privacy security of the terminal equipment in the side-link positioning process is ensured, and the security of the side-link positioning service is improved.
In a second aspect, an embodiment of the present disclosure provides a method for positioning a side uplink, which is performed by a second terminal device, and includes:
Transmitting a first token to a first terminal device, wherein the first token is used for representing the role of the second terminal device in the side-link positioning service, and the role of the second terminal device in the side-link positioning service is used for the first terminal device to determine whether to perform the side-link positioning service with the second terminal device;
establishing a side uplink with the first terminal device;
Side-uplink positioning measurements are performed.
In a third aspect, embodiments of the present disclosure provide a communication apparatus, including:
The receiving and transmitting module is used for receiving a first token sent by second terminal equipment, and the first token is used for representing the role of the second terminal equipment in the side uplink positioning service;
a processing module, configured to establish a sidelink with the second terminal device when determining to perform the sidelink positioning service with the second terminal device according to the first token;
The processing module is further configured to perform a sidelink positioning measurement;
the transceiver module is further configured to send the measurement result to a first network element.
In a fourth aspect, embodiments of the present disclosure provide another communication apparatus, comprising:
A transceiver module, configured to send a first token to a first terminal device, where the first token is used to characterize a role of the second terminal device in the side uplink positioning service, and the role of the second terminal device in the side uplink positioning service is used by the first terminal device to determine whether to perform the side uplink positioning service with the second terminal device;
A processing module, configured to establish a sidelink with the first terminal device;
The processing module is further configured to perform a sidelink positioning measurement over the sidelink.
In a fifth aspect, embodiments of the present disclosure provide a communication device comprising a processor, which when invoking a computer program in memory, performs the method of the first aspect described above.
In a sixth aspect, embodiments of the present disclosure provide a communication device comprising a processor that, when invoking a computer program in memory, performs the method of the second aspect described above.
In a seventh aspect, embodiments of the present disclosure provide a communication apparatus comprising a processor and a memory, the memory having a computer program stored therein; the processor executes the computer program stored in the memory to cause the communication device to perform the method of the first aspect described above.
In an eighth aspect, embodiments of the present disclosure provide a communication apparatus comprising a processor and a memory, the memory having a computer program stored therein; the processor executes the computer program stored in the memory to cause the communication device to perform the method of the second aspect described above.
In a ninth aspect, embodiments of the present disclosure provide a communications apparatus comprising a processor and interface circuitry for receiving code instructions and transmitting to the processor, the processor being configured to execute the code instructions to cause the apparatus to perform the method of the first aspect described above.
In a tenth aspect, embodiments of the present disclosure provide a communications device comprising a processor and interface circuitry for receiving code instructions and transmitting to the processor, the processor being configured to execute the code instructions to cause the device to perform the method of the second aspect described above.
In an eleventh aspect, an embodiment of the present disclosure provides a side-link positioning system, where the system includes a communication device according to the third aspect and a communication device according to the fourth aspect, or where the system includes a communication device according to the fifth aspect and a communication device according to the sixth aspect, or where the system includes a communication device according to the seventh aspect and a communication device according to the eighth aspect, or where the system includes a communication device according to the ninth aspect and a communication device according to the tenth aspect.
In a twelfth aspect, an embodiment of the present invention provides a computer readable storage medium storing instructions for use by the terminal device, where the instructions, when executed, cause the terminal device to perform the method of the first aspect.
In a thirteenth aspect, an embodiment of the present invention provides a readable storage medium, configured to store instructions for use by a network device as described above, where the instructions, when executed, cause the network device to perform the method as described in the second aspect.
In a fourteenth aspect, the present disclosure also provides a computer program product comprising a computer program which, when run on a computer, causes the computer to perform the method of the first aspect described above.
In a fifteenth aspect, the present disclosure also provides a computer program product comprising a computer program which, when run on a computer, causes the computer to perform the method of the second aspect described above.
In a sixteenth aspect, the present disclosure provides a chip system comprising at least one processor and an interface for supporting a terminal device to implement the functionality referred to in the first aspect, e.g. to determine or process at least one of data and information referred to in the above-mentioned method. In one possible design, the chip system further includes a memory for holding computer programs and data necessary for the terminal device. The chip system can be composed of chips, and can also comprise chips and other discrete devices.
In a seventeenth aspect, the present disclosure provides a chip system comprising at least one processor and an interface for supporting a network device to implement the functionality referred to in the second aspect, e.g. to determine or process at least one of data and information referred to in the above-described method. In one possible design, the chip system further includes a memory to hold computer programs and data necessary for the network device. The chip system can be composed of chips, and can also comprise chips and other discrete devices.
In an eighteenth aspect, the present disclosure provides a computer program which, when run on a computer, causes the computer to perform the method of the first aspect described above.
In a nineteenth aspect, the present disclosure provides a computer program which, when run on a computer, causes the computer to perform the method of the second aspect described above.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments or the background of the present disclosure, the following description will explain the drawings that are required to be used in the embodiments or the background of the present disclosure.
Fig. 1 is a schematic architecture diagram of a communication system provided in an embodiment of the present disclosure;
fig. 2 is a schematic flow chart of a method for positioning a side uplink according to an embodiment of the disclosure;
fig. 3 is a flow chart of another method of side-uplink positioning provided by an embodiment of the present disclosure;
fig. 4 is a flow chart of another method of side-uplink positioning provided by an embodiment of the present disclosure;
fig. 5 is a flow chart of another method of side-uplink positioning provided by an embodiment of the present disclosure;
fig. 6 is a flow chart illustrating another method for positioning a side-link according to an embodiment of the present disclosure
Fig. 7 is a flow chart of yet another method of side-uplink positioning provided by an embodiment of the present disclosure;
fig. 8 is a flow chart of yet another method of side-uplink positioning provided by an embodiment of the present disclosure;
fig. 9 is an interactive schematic diagram of a side-uplink positioning method provided in an embodiment of the present disclosure;
FIG. 10 is an interactive schematic diagram of another lateral-uplink positioning method provided by an embodiment of the present disclosure;
FIG. 11 is an interactive schematic diagram of yet another lateral-uplink positioning method provided by an embodiment of the present disclosure;
fig. 12 is a schematic structural diagram of a communication device according to an embodiment of the present disclosure;
Fig. 13 is a schematic structural view of another communication device provided in an embodiment of the present disclosure;
Fig. 14 is a schematic structural diagram of a chip according to an embodiment of the disclosure.
Detailed Description
For ease of understanding, the terms referred to in this disclosure are first introduced.
1. Positioning terminal equipment (Located user equipment, located UE)
Located UE is a terminal device that can perform Uu interface-based positioning procedure and/or SL positioning, and in the side-uplink positioning service, the positioning terminal device can assist the terminal device that needs positioning in making side-uplink measurement.
2. Target terminal equipment (target UE)
A target UE is a terminal device whose location needs to be determined, i.e. it needs to be located by side-link location.
3. Side-link positioning service
A side-link positioning service, also called side-chain positioning service or ranging service, refers to determining the distance between two UEs and/or the direction from one UE to another UE through a direct communication connection.
4. Token(s)
The token in the disclosure is at least used for characterizing the role of the terminal equipment in the side-link positioning service, such as the token for positioning the terminal equipment, at least can characterize the role of the terminal equipment in the side-link positioning service as positioning the terminal equipment, and the token of the target terminal equipment at least can characterize the role of the terminal equipment in the side-link positioning service as the terminal equipment needing to position the terminal equipment.
In order to better understand a migration method disclosed in the embodiments of the present disclosure, a description is first given below of a communication system to which the embodiments of the present disclosure are applicable.
Referring to fig. 1, fig. 1 is a schematic architecture diagram of a communication system according to an embodiment of the disclosure. The communication system may include, but is not limited to, one network device and one terminal device, and the number and form of devices shown in fig. 1 are only for example and not limiting the embodiments of the present disclosure, and may include two or more network devices and two or more terminal devices in practical applications. The communication system shown in fig. 1 is exemplified as comprising 1 network device 11, one positioning terminal device 12 and one target terminal device 13.
It should be noted that the technical solution of the embodiment of the present disclosure may be applied to various communication systems. For example: long term evolution (long term evolution, LTE) system, fifth generation (5th generation,5G) mobile communication system, 5G New Radio (NR) system, or other future new mobile communication system, etc.
The network device in the embodiments of the present disclosure is an entity for transmitting or receiving signals at the network side. For example, evolved NodeB (eNB), transmission point (transmission reception point, TRP), next generation NodeB (gNB) in NR system, base station in other future mobile communication system or access node in wireless fidelity (WIRELESS FIDELITY, wiFi) system, etc. The embodiments of the present disclosure do not limit the specific technology and specific device configuration employed by the network device. The network device provided by the embodiments of the present disclosure may be composed of a Central Unit (CU) and a Distributed Unit (DU), where the CU may also be referred to as a control unit (control unit), the structure of the CU-DU may be used to split the protocol layers of the network device, such as a base station, and the functions of part of the protocol layers are placed in the CU for centralized control, and the functions of part or all of the protocol layers are distributed in the DU, so that the CU centrally controls the DU.
The terminal device 12 or 13 in the embodiment of the present disclosure is an entity on the user side for receiving or transmitting signals, such as a mobile phone. The terminal device may also be referred to as a terminal device (terminal), a User Equipment (UE), a Mobile Station (MS), a mobile terminal device (MT), etc. The terminal device may be an automobile with communication function, a smart car, a mobile phone (mobile phone), a wearable device, a tablet computer (Pad), a computer with wireless transceiving function, a Virtual Reality (VR) terminal device, an augmented reality (augmented reality, AR) terminal device, a wireless terminal device in industrial control (industrial control), a wireless terminal device in unmanned-driving (self-driving), a wireless terminal device in teleoperation (remote medical surgery), a wireless terminal device in smart grid (SMART GRID), a wireless terminal device in transportation security (transportation safety), a wireless terminal device in smart city (SMART CITY), a wireless terminal device in smart home (smart home), or the like. The embodiment of the present disclosure does not limit the specific technology and the specific device configuration adopted by the terminal device.
It may be understood that, the communication system described in the embodiments of the present disclosure is for more clearly describing the technical solutions of the embodiments of the present disclosure, and is not limited to the technical solutions provided in the embodiments of the present disclosure, and those skilled in the art can know that, with the evolution of the system architecture and the appearance of new service scenarios, the technical solutions provided in the embodiments of the present disclosure are equally applicable to similar technical problems.
In the present system, the target terminal device 12 may implement the methods shown in any of the embodiments of fig. 2 to 6 of the present disclosure, and in addition, the positioning terminal device 13 may implement the methods described in fig. 7 to 8 of the present disclosure.
It may be understood that, the communication system described in the embodiments of the present disclosure is for more clearly describing the technical solutions of the embodiments of the present disclosure, and is not limited to the technical solutions provided in the embodiments of the present disclosure, and those skilled in the art can know that, with the evolution of the system architecture and the appearance of new service scenarios, the technical solutions provided in the embodiments of the present disclosure are equally applicable to similar technical problems.
In the disclosure, a method for positioning a side link is provided mainly for the fact that the existing side link positioning service fails to protect the privacy of a terminal device, before starting the side link positioning service, a target terminal device firstly checks the authorization of the positioning terminal device, and after the authorization passes, the side link positioning service is started again, so that the privacy security of the positioning terminal device is protected in the side link positioning process, and the security of the side link positioning service is improved.
The following describes in detail the lateral uplink positioning method provided in the embodiment of the present disclosure with reference to each flowchart.
Referring to fig. 2, fig. 2 is a flowchart of a method for positioning a side uplink according to an embodiment of the disclosure. The method provided in this embodiment may be performed by the first terminal device. As shown in fig. 2, the method may include, but is not limited to, the steps of:
Step 201, a first token sent by a second terminal device is received.
Wherein the first token is used to characterize the role of the second terminal device (e.g., a positioning terminal device) in the sidelink positioning service, which is used by the first terminal device (e.g., a target terminal device) to determine whether to conduct the sidelink positioning service with the second terminal device.
That is, the first token is a token for characterizing a role of the second terminal device (locating the terminal device) during the side-uplink location service. That is, the first token may characterize that the second terminal device may use the side-uplink positioning service and its role in this service is to position the terminal device. The token may be provided by the second network element.
Optionally, the second network element may be any one of the following: a gateway mobile location center (gateway mobile location center, GMLC), a direct discovery name management function (direct discovery NAME MANAGEMENT function, DDNMF) network element, a proximity service key management function (Proximity SERVICES KEY MANAGEMENT function, proSe PKMF) network element, and a ranging application server (RANGING APP SERVER) network element.
Optionally, the first terminal device may further receive a first ranging service code (RANGING SERVICE code, RSC) transmitted by the second terminal device. Wherein the first RSC is used to characterize the version or type of ranging/side-uplink positioning services currently supported by the second end device. The first RSC may be preconfigured in the second termination device or requested by the second termination device to the second network element and provided by the second network element.
In the disclosure, the second terminal device may request the first RSC and the first token from the second network element, and after receiving the first RSC and the first token returned by the second network element, the second terminal device may send the first RSC and the first token to the first terminal device for verification when performing the side uplink positioning.
And 202, establishing a side uplink between the second terminal equipment when the side uplink positioning service is carried out with the second terminal equipment according to the first token.
In the disclosure, after receiving the first token sent by the second terminal device, the target terminal device may verify the role information of the second terminal device represented by the first token in the side uplink positioning service, for example, verify whether the second terminal device is a positioning terminal device in the side uplink positioning service, and whether the role of the second terminal device at the current moment is still a positioning terminal device, or the like. And then determining whether to perform side-link positioning service with the second terminal equipment according to the role information of the second terminal equipment represented by the first token. For example, if the second terminal device characterized by the first token is not a positioning terminal device, it may be determined that a side-link positioning service cannot be performed with the second terminal device.
Optionally, if the second terminal device also transmits the first RSC, the first terminal device may further verify the accuracy of the first RSC to determine whether the side-uplink positioning service supported by the second terminal device is the same as the side-uplink positioning service supported by the first terminal device.
Step 203, performing a side-uplink positioning measurement.
Step 204, the measurement result is sent to the first network element.
In the present disclosure, after the first token passes the verification, the first terminal device may establish a side-link between the first token and the first terminal device may perform side-link positioning measurement based on the side-link.
Alternatively, the side link may be a PC5 link, or an SR5 link, and the side link may also be another link, which is not limited in this disclosure.
Optionally, the measurement result may include a relative distance, and/or a relative angle between the second terminal device and the first terminal device, and the disclosure is not limited thereto.
Optionally, the first network element may be any one of the following: a location management function (location management function, LMF) network element, an access and mobility management function (ACCESS AND mobility management function, AMF) network element, and a gateway mobile location center (gateway mobile location center, GMLC).
In the method, after the target terminal equipment determines the side uplink measurement result between the target terminal equipment and the positioning terminal equipment, the measurement result can be sent to the related core network node, so that the core network node can process the service of the terminal equipment based on the position information of the target terminal equipment.
In the disclosure, after receiving a first token sent by a second terminal device, a first terminal device may first determine whether to perform a side uplink positioning service with the second terminal device according to the first token, and after determining that the side uplink positioning service is available, perform side uplink positioning measurement with the second terminal device, and send a measurement result to a first network element. Therefore, before the side-link positioning is carried out, the target terminal equipment firstly carries out authorization verification on the role of the positioning terminal equipment, thereby ensuring the privacy security of the terminal equipment in the side-link positioning process and improving the security of the side-link positioning service.
Referring to fig. 3, fig. 3 is a flowchart of another method for positioning a side uplink according to an embodiment of the disclosure. The method provided in this embodiment may be performed by the first terminal device. As shown in fig. 3, the method may include, but is not limited to, the steps of:
Step 301, a third request is sent to the second network element, where the third request is used to request information for establishing a side uplink.
Alternatively, the second network element may be any one of the following: GMLC, direct Discovery Name Management Function (DDNMF) network element, proximity service key management function (Proximity SERVICES KEY MANAGEMENT function, proSe PKMF) network element, and ranging application server (RANGING APP SERVER) network element.
Optionally, the first terminal device may send a second request to the second network element when accessing the network; or may send a second request to the second network element when needed. For example, the first terminal device may periodically send a second request to the second network element; or the first terminal device may send a second request to the second network element before each time of performing the sidelink positioning, so as to request the latest information that can be used for establishing the sidelink. The present disclosure is not limited in this regard.
Step 302, receiving information for establishing a side link sent by a second network element, where the information for establishing the side link includes at least one of the following: the security parameters, the second token and the validity period key corresponding to the second token are used for the discovery stage.
The security parameter used in the discovery phase is a parameter for protecting the security of the terminal device in the discovery phase. The security parameter, which may be a key, or other parameters including a key, is not limited by the present disclosure.
Optionally, the security parameter used in the discovery stage may be obtained after the first terminal device requests from the second network element; or may be configured by the second network element being actively issued after the first terminal device accesses the network, which is not limited in the present disclosure.
The second token may characterize that the first terminal device may use the side-uplink positioning service and its role in the service is the target terminal device. And the corresponding valid period of the second token is used for representing the period that the second token can be used. As the terminal device moves, its role in the side-uplink positioning service may change. For example, in the period T1, the terminal device a may execute a positioning procedure based on Uu interface and may provide SL positioning service for other terminal devices, so that it may serve as a positioning terminal device in the side uplink positioning service; in the period T2, since the Uu interface-based positioning procedure cannot be executed, it cannot be used as a positioning terminal device in the period T2, and then the terminal device a, in the periods T1 and T2, has different corresponding second tokens.
In the disclosure, in order to prevent the token corresponding to the terminal device from being tampered maliciously, the second token may be generated by encrypting information such as the role of the first terminal device for the second network element. The key contained in the information for establishing the sidelink is an encryption key used when the second network element generates the second token, or a decryption key used in association with the encryption key.
Optionally, the information sent by the second network element for establishing the side uplink may not include the validity period of the second token, and information such as the validity period of the second token is fused in the second token. That is, the second network element may encrypt the information such as the validity period of the second token and the role of the first terminal device, and then generate the second token. After receiving the information for establishing the side uplink sent by the second network element, the first terminal device decrypts the second token by using the key, and then the validity period corresponding to the second token can be determined.
Optionally, the information for establishing the side-link may further include a second RSC.
Step 303, receiving a first token sent by the second terminal device.
The specific implementation process of step 303 may refer to the detailed description of any embodiment of the disclosure, which is not repeated herein.
Step 304, verifying whether the first token is within the validity period and whether the terminal equipment type corresponding to the first token is a positioning terminal equipment by using the secret key.
Optionally, if the second terminal device further sends the first RSC to the first terminal device, the first terminal device may further compare the first RSC with the second RSC.
Because the first RSC is the code corresponding to the current ranging service, the second RSC in the first terminal equipment and the first RSC in the second terminal equipment should be the same, and therefore, the first terminal equipment can compare the second RSC and the first RSC after determining the first RSC sent by the second terminal equipment.
If the first RSC is the same as the second RSC, the distance measurement service currently used by the second terminal equipment is the same as the distance measurement service currently used by the first terminal equipment, so that the first terminal equipment can verify the first token. Otherwise, the first terminal device may determine that the ranging service cannot be currently performed with the second terminal device.
Optionally, the first terminal device may decrypt the first token with the key to obtain the validity period corresponding to the first token and the type of the second terminal device. And determining whether the first token is within the valid period according to the valid period corresponding to the first token. If the first token is in the validity period and the second terminal device is the positioning terminal device, the verification can be considered to be passed, otherwise, the verification can be confirmed to be failed.
Step 305, in response to the verification passing, a side uplink establishment request is sent to the second terminal device.
In the disclosure, after the first RSC and the first token pass the verification, the first terminal device may determine that the side uplink positioning measurement can be performed with the second terminal device, so that the first terminal device may start the side uplink establishment procedure, that is, send a side uplink establishment request to the second terminal device.
Optionally, in order to avoid that the second token corresponding to the first terminal device has expired after the discovery process corresponding to the discovery model B or the discovery process corresponding to the model a is executed, the side uplink establishment request may further include the second token, so that the second terminal device verifies the second token, thereby further ensuring reliability and security of the side uplink.
And 306, receiving a response message returned by the second terminal equipment, wherein the response message comprises the first token.
In the disclosure, in order to avoid that the first token corresponding to the second terminal device has failed after the discovery process, the second terminal device may further return the first token again in the response message after receiving the side uplink establishment request sent by the first terminal device, so that the first terminal device verifies the first token again.
Step 307, verify the first token with the key.
In step 308, in response to the first token being within the expiration date and the second terminal device being a positioning terminal device, a sidelink is established with the second terminal device.
Optionally, the first token is authenticated with the key, including decrypting the first token with the key to determine whether information contained in the first token is complete and whether various information of the second terminal device can be obtained by decrypting the first token. For example, by decrypting the first token, the corresponding validity period and the role information of the second terminal device in the side uplink positioning process can be determined.
Alternatively, if the first token is within the expiration date and the second terminal device is a positioning terminal device, then a sidelink may be established with the second terminal device.
Optionally, if the first token has failed and/or the second terminal device is not a positioning terminal device, for example, the second terminal device is also a target terminal device, the current side-link positioning procedure may be ended, or the result of the determination may be indicated to the first network element by the first terminal device, which is not limited in this disclosure.
Step 309, side-uplink positioning measurements are performed.
Step 310, the measurement result is sent to the first network element.
The specific implementation of steps 309 to 310 may refer to the detailed description of any embodiment of the disclosure, which is not repeated here.
In the disclosure, a first terminal device first sends a second request to a second network element to request a second token, a key, and the like, then after receiving a first token sent by the second terminal device, the first token can be verified, if the first token passes the verification, a side uplink establishment request is sent to the second terminal device, the second token corresponding to the side uplink establishment request is sent to the second terminal device, so that identity authentication is performed again with the second terminal device, after the identity authentication passes, a side uplink between the second terminal device and the second terminal device is established again, side uplink measurement is performed, and after a measurement result is obtained, the measurement result is sent to the first network element. Therefore, before the side-link positioning is started and before the side-link is established, the roles of the side-link positioning device and the side-link positioning device are authorized and verified through the interaction token, so that the privacy security of the terminal equipment in the side-link positioning process is ensured, and the security of the side-link positioning service is improved.
Referring to fig. 4, fig. 4 is a flowchart of another method for positioning a side uplink according to an embodiment of the disclosure. The method provided in this embodiment may be performed by the first terminal device. As shown in fig. 4, the method may include, but is not limited to, the steps of:
Step 401, sending a third request to the second network element, where the third request is used to request information for establishing the side uplink.
Step 402, receiving information for establishing a side link sent by a second network element, where the information for establishing a side link includes at least one of the following: the security parameters, the second token and the corresponding validity period and key of the second token are used for the discovery stage.
Step 403, receiving a first request sent by a first network element, where the first request is used to request a side uplink positioning service with a second terminal device.
Step 404, executing a first discovery process according to the identification of the second terminal device.
In the present disclosure, after receiving a side-link positioning service request sent by another network element, such as a Network Function (NF) network element or an application function (application function, AF) network element, the first network element may send a first request to a target terminal device, that is, a first terminal device, to request the first terminal device, that is, the target terminal device, to perform side-link positioning based on the second terminal device.
Alternatively, the first request may be a ranging request (ranging request), or a sidelink positioning request (sidelink positioning request), which is not limited by the present disclosure.
Alternatively, the first discovery process may be a discovery process based on the discovery model B. The first terminal device may run the discovery model B to send a discovery message to the second terminal device instructing the second terminal device to provide side-link services thereto.
Optionally, after receiving the first request sent by the first network element, the first terminal device determines that the side uplink measurement needs to be performed with the second terminal device, and may first determine whether the corresponding second token is still within the validity period. If the second token has expired, i.e. the first terminal device has not been available as the target terminal device, the sidelink location service procedure may be ended or an indication of the failure of the second token may be returned to the first network element.
Or if the second token is still within the validity period, i.e. the first terminal device is still available as the target terminal device, then the discovery model B may be run.
And step 405, receiving a first message returned by the second terminal equipment, wherein the first message comprises a first token.
In the present disclosure, the first message may be a discovery response message. That is, after the second terminal device listens to the discovery message sent by the first terminal device and authenticates the identity of the first terminal device, the second terminal device may return a discovery response message to the first terminal device, so as to send the first RSC and the first token corresponding to the first RSC and the first token to the first terminal device through the discovery response message.
Optionally, the first terminal device may verify the first message with security parameters for the discovery phase; in response to passing the verification, a first token contained in the first message may be obtained.
The security parameter used in the discovery phase is a parameter for protecting the security of the terminal device in the discovery phase. The security parameter, which may be a key, or other parameters including a key, is not limited by the present disclosure.
Optionally, the first message may further include a first RSC.
Step 406, determining whether to perform side-link positioning service with the second terminal device according to the first token.
It should be noted that when it is determined that the side-link positioning service is not performed with the second terminal apparatus based on the first token, the procedure may be ended.
Step 407, when it is determined to perform the side-link positioning service with the second terminal device, sending a side-link establishment request to the second terminal device.
And step 408, receiving a response message returned by the second terminal equipment, wherein the response message comprises the first token.
Step 409, the first token is verified with the key.
In step 410, in response to the first token being within the expiration date and the second terminal device being a positioning terminal device, a sidelink is established with the second terminal device.
Step 411, performing side-uplink positioning measurements.
Step 412, the measurement result is sent to the first network element.
The specific implementation of steps 406 to 412 may refer to the detailed description of any embodiment of the disclosure, and will not be repeated here.
In the disclosure, a first terminal device firstly sends a second request to a second network element to request a second token, a secret key and the like, then after receiving a first request sent by the first network element, a first discovery process is executed based on an identifier of the second terminal device in the first request, after receiving the first token sent by the second terminal device, the first token can be verified, if the verification is passed, a side uplink establishment request is sent to the second terminal device, and the second token corresponding to the side uplink establishment request is sent to the second terminal device, so that identity authentication is carried out again with the second terminal device, after the identity authentication is passed, a side uplink between the second terminal device is established again, so that side uplink measurement is carried out, and after a measurement result is obtained, the measurement result is sent to the first network element. Therefore, token interaction is carried out before the side-link positioning is started and before the side-link is established so as to carry out authorization verification on roles of the token interaction and the side-link positioning, thereby ensuring the privacy security of terminal equipment in the side-link positioning process and improving the security of side-link positioning service.
Referring to fig. 5, fig. 5 is a flowchart of another method for positioning a side uplink according to an embodiment of the disclosure. The method provided in this embodiment may be performed by the first terminal device. As shown in fig. 5, the method may include, but is not limited to, the steps of:
Step 501, a third request is sent to the second network element, where the third request is used to request information for establishing a side uplink.
Step 502, receiving information for establishing a side link sent by a second network element, where the information for establishing a side link includes at least one of the following: the security parameters, the second token and the corresponding validity period and key of the second token are used for the discovery stage.
The specific implementation process of the steps 501 to 502 may refer to the detailed description of any embodiment of the disclosure, and will not be repeated here.
Step 503, receiving a second request sent by the first network element, where the second request is used to request to discover the positioning terminal device.
Step 504, according to the second request, performing a second discovery procedure for listening to the neighboring terminal device.
In step 505, a second message sent by the second terminal device is detected, where the second message includes the first token.
In the present disclosure, after receiving a side-link positioning service request sent by another network element, such as a Network Function (NF) network element or an application function (application function, AF) network element, the first network element may send a first request to a target terminal device, that is, a first terminal device, to request the first terminal device, that is, the target terminal device, to perform side-link positioning based on the second terminal device.
Alternatively, the second request may be a positioning terminal device discovery request or a side-uplink positioning capability negotiation request, which is not limited in this disclosure.
Alternatively, the second discovery process may be a discovery process based on the discovery model a. The first terminal device may run the discovery model a to listen for a second message, i.e. a discovery message, sent by the neighboring terminal device.
Optionally, after receiving the second request sent by the first network element, the first terminal device determines that the side uplink measurement needs to be performed with the second terminal device, and may first determine whether the corresponding second token is still within the validity period. If the second token has expired, i.e. the first terminal device has not been available as the target terminal device, the sidelink location service procedure may be ended or an indication of the failure of the second token may be returned to the first network element.
Or if the second token is still within the validity period, i.e. the first terminal device is still available as the target terminal device, then the discovery model a may be run.
Optionally, the first terminal device may verify the second message with security parameters for the discovery phase; and in response to passing the verification, acquiring the first RSC and the first token contained in the second message.
Step 506, determining whether to perform a side-link positioning service with the second terminal device according to the first token.
Step 507, when it is determined to perform the side-link positioning service with the second terminal device, a side-link establishment request is sent to the second terminal device.
And step 508, receiving a response message returned by the second terminal equipment, wherein the response message comprises the first token.
Step 509, the first token is authenticated with the key.
In response to the first token being within the expiration date and the second terminal device being a positioning terminal device, a sidelink is established with the second terminal device, step 510.
Step 511 performs a side-uplink positioning measurement with the second terminal device.
Step 512, the measurement result is sent to the first network element.
The specific implementation of steps 506 to 512 may refer to the detailed description of any embodiment of the disclosure, and will not be repeated here.
In the disclosure, a first terminal device firstly sends a second request to a second network element to request a second token, a secret key and the like, then after receiving a first request sent by the first network element, executes a second discovery process according to an identifier of the second terminal device in the first request, and after receiving the first token sent by the second terminal device, verifies the first token and the first RSC, if the verification is passed, sends a side uplink establishment request to the second terminal device, and sends a second token corresponding to the second token to the second terminal device, so as to perform identity authentication again with the second terminal device, after the identity authentication is passed, establishes a side uplink with the second terminal device again, so as to perform side uplink measurement, and sends a measurement result to the first network element after obtaining the measurement result. Therefore, before the side-link positioning is started and before the side-link is established, token interaction is carried out to carry out authorization verification on roles of the two roles, so that privacy security of terminal equipment in the side-link positioning process is ensured, and security of side-link positioning service is improved.
Referring to fig. 6, fig. 6 is a flowchart of another method for positioning a side uplink according to an embodiment of the disclosure. The method provided in this embodiment may be performed by the first terminal device. As shown in fig. 6, the method may include, but is not limited to, the steps of:
Step 601, a third request is sent to the second network element, where the third request is used to request information for establishing a side uplink.
Step 602, receiving information for establishing a side link sent by a second network element, where the information for establishing the side link includes at least one of the following: the security parameters, the second token and the corresponding validity period and key of the second token are used for the discovery stage.
The specific implementation process of the steps 601 to 602 may refer to the detailed description of any embodiment of the disclosure, and will not be repeated here.
In step 603, in response to the first terminal device having a positioning requirement, executing a first discovery process or a second discovery process, and acquiring a third message sent by the second terminal device, where the third message includes the first RSC and the first token.
It should be noted that, if the first terminal device performs the first discovery process, the third message may be a discovery response message; the third message may be a discovery message if the first terminal device performs the second discovery procedure.
The specific implementation manner of verifying the third message by using the security parameter to obtain the first RSC and the first token may refer to a description of a process of parsing the first message or the second message in any embodiment of the present disclosure, which is not described herein.
In step 604, the first RSC is compared to the second RSC.
Step 605, if the first RSC is the same as the second RSC, verifying, by using the key, whether the first token is within the validity period and whether the type of the terminal device corresponding to the first token is a positioning terminal device.
Step 606, a side uplink setup request is sent to the second terminal device in response to the verification passing.
And step 607, receiving a response message returned by the second terminal equipment, wherein the response message comprises the first token.
At step 608, the first token is authenticated with the key.
In step 609, in response to the first token being within the expiration date and the second terminal device being a positioning terminal device, a sidelink is established with the second terminal device.
At step 610, side-uplink positioning measurements are performed.
Step 611, the measurement result is sent to the first network element.
The specific implementation of steps 604 to 611 may refer to the detailed description of any embodiment of the disclosure, which is not repeated here.
In the disclosure, a first terminal device firstly sends a second request to a second network element to request a second token, a secret key and the like, then when a positioning requirement exists, a first discovery process or a second discovery process is executed, a first token and a first RSC of the second terminal device are obtained, then the first token and the first RSC are verified, if the verification is passed, a side-link establishment request is sent to the second terminal device, the second token corresponding to the side-link establishment request is sent to the second terminal device, so that identity authentication is carried out again with the second terminal device, after the identity authentication is passed, a side-link between the second terminal device and the second terminal device is established again to carry out side-link measurement, and after the measurement result is obtained, the measurement result is sent to the first network element. Therefore, before the side-link positioning is started and before the side-link is established, the terminal equipment performs token interaction to perform authorization verification on roles of the terminal equipment, so that the privacy security of the terminal equipment in the side-link positioning process is ensured, and the security of the side-link positioning service is improved.
Referring to fig. 7, fig. 7 is a flowchart of another method for positioning a side uplink according to an embodiment of the disclosure. The method provided in this embodiment may be performed by the second terminal device. As shown in fig. 7, the method may include, but is not limited to, the steps of:
Step 701, sending a first token to a first terminal device.
The first token is used for representing the role of the second terminal equipment in the side-link positioning service, and the role of the second terminal equipment in the side-link positioning service is used for the first terminal equipment to determine whether to perform the side-link positioning service with the second terminal equipment.
Alternatively, the second termination device may also send the first RSC to the first termination device.
The specific meaning of the first RSC and the first token may refer to the detailed description of any embodiment of the disclosure, and will not be repeated herein. Alternatively, in the present disclosure, the second terminal device may send the first token to the first terminal device in the form of a broadcast message by performing the second discovery procedure, i.e. running discovery model a.
Or the second terminal device may also send the first token to the first terminal device if it listens to the message broadcast by the first terminal device based on the first discovery procedure (i.e. discovery model B), which is not limited by the present disclosure.
Optionally, since the message broadcasted by the first terminal device based on the first discovery procedure may include the side uplink positioning requirement information of the first terminal device, the second terminal device may determine whether to meet the requirement of the first terminal device according to its own capability information, and send the first token to the first terminal device when determining that its capability meets the requirement of the first terminal device.
In the present disclosure, the second terminal device sends the first token to the first terminal device (e.g., the target terminal device), so that the target terminal device may perform verification authorization on the role of the second terminal device based on the first token before performing the side-link positioning.
Step 702, a sidelink is established with a first terminal device.
Alternatively, the sidelink may be a PC5 link, or an SR5 link, or may be another sidelink link, which is not limited in this disclosure.
Step 703, performing side-uplink positioning measurements.
The specific implementation process of the steps 702 and 703 may refer to the detailed description of any embodiment of the disclosure, and will not be repeated here.
In the disclosure, the second terminal device first sends a first token to the first terminal device, so that the first terminal device performs authorization verification on the role of the second terminal device, then establishes a side uplink with the first terminal device, and performs side uplink positioning measurement. Therefore, before the side-link positioning is carried out, the first token is firstly sent to the target terminal equipment to carry out role authorization verification, so that the privacy security of the terminal equipment in the side-link positioning process is ensured, and the security of the side-link positioning service is improved.
Referring to fig. 8, fig. 8 is a flowchart of another method for positioning a side uplink according to an embodiment of the disclosure, where the method is performed by a second terminal device. As shown in fig. 8, the method may include, but is not limited to, the steps of:
Step 801, a request is sent to a second network element, where the request is for information for requesting establishment of a side uplink.
Step 802, receiving information for establishing a side link sent by a second network element, where the information for establishing the side link includes a security parameter for a discovery stage, a first token, a validity period corresponding to the first token, and a key.
In the present disclosure, the second terminal device may send a request to the second network element when accessing the network, or when needed, to request the second network element for information needed when establishing the side uplink. For example, the second terminal device may periodically send a request to the second network element; or the second terminal device may send a request to the second network element before each time of performing the sidelink positioning, to request the latest information that can be used for establishing the sidelink.
Optionally, the second network element in this embodiment includes any one of the following: the gateway mobile location center GMLC, a direct discovery name management function DDNMF network element, a proximity services ProSe key management function PKMF network element, and a ranging application server RANGING APP SERVER network element.
The function and meaning of each parameter in the information for establishing the side uplink sent by the second network element may refer to the detailed description of any embodiment of the disclosure, which is not repeated herein.
Step 803, a second discovery process is performed, sending the first token to the first terminal device.
Alternatively, the second terminal device may first determine whether the first token is within a validity period before performing the second discovery procedure. If the first token has expired, the sidelink location procedure may end. If the first token is still in the validity period, the role of the second terminal device in the side-link positioning service is still the positioning terminal device, so that the second discovery process can be executed.
Optionally, the second terminal device may further encrypt the first token with the security parameters for the discovery phase, that is, encrypt the discovery message with the security parameters for the discovery phase, where the discovery message includes the first token. After that, after the first terminal device listens to the discovery message, the first terminal device may parse the discovery message by using the security parameter used in the discovery phase to obtain the first token.
Optionally, the discovery message may further include the first RSC.
Step 804, a side uplink establishment request sent by the first terminal device is received, where the side uplink establishment request includes a second token.
In the disclosure, after the second terminal sends the first RSC and the first token to the first terminal, the first terminal can verify the first RSC and the first token, and after the verification is passed, the first terminal can start to establish a side uplink with the second terminal, that is, send a side uplink establishment request to the second terminal.
Step 805, verify the second token with the key.
Optionally, the second terminal device verifies the second token with the key, including decrypting the second token with the key to determine whether the information contained in the second token is complete and whether various information of the first terminal device can be obtained by decrypting the second token. For example, by decrypting the second token, the validity period corresponding to the second token, the role information of the first terminal device in the side uplink positioning process, and the like can be determined.
Alternatively, if the second token is within the validity period and the first terminal device is the target terminal device, then a sidelink may be established with the first terminal device.
Optionally, if the first token has failed and/or the first terminal device is not the target terminal device, for example, the first terminal device is also a positioning terminal device, the current side-uplink positioning procedure may be ended, or a verification failure message may be sent to the first terminal device, and the first terminal device indicates the determined result to the first network element, which is not limited in this disclosure.
And step 806, responding to the second token being in the validity period and the first terminal equipment being the target terminal equipment, and returning a response message to the first terminal equipment, wherein the response message comprises the first token.
In the disclosure, in order to avoid that the first token corresponding to the second terminal device fails after the discovery process, the second terminal device may further return the first token in the response message when receiving the side uplink establishment request sent by the first terminal device and determining that the first terminal is the target terminal device according to the second token and the second token is still valid, so that the first terminal device verifies the first token again.
Step 807 establishes a sidelink with the first terminal device.
Step 808, side-downlink positioning measurements are performed.
The specific implementation manner of the steps 807 and 808 may refer to the detailed description of any embodiment of the disclosure, and will not be repeated herein.
In the present disclosure, a second terminal device first sends a request to a second network element to request information needed when a side uplink is established, then a first token is sent to a first terminal device by executing a discovery process, so that the first terminal device performs authorization verification on the identity of the second terminal device, then after receiving the side uplink establishment request sent by the first terminal device, the second terminal device performs token interaction and verification with the first terminal device, and after the verification is passed, establishes a side uplink with the first terminal device, and performs side uplink positioning measurement. Therefore, before the side-link positioning and the side-link establishment are carried out, the role authorization verification is carried out through the interaction token, so that the privacy security of the terminal equipment in the side-link positioning process is ensured, and the security of the side-link positioning service is improved.
Referring to fig. 9, fig. 9 is an interaction schematic diagram of a side-link positioning method according to an embodiment of the disclosure. As shown in fig. 9, the method may include, but is not limited to, the steps of:
In step 900 (not shown in the figure), the target terminal device and the positioning terminal device request to obtain security parameters, tokens and keys for the discovery phase from the second network element.
In step 901, the amf receives a side uplink location service request.
Wherein the service request contains the identification of the target terminal device.
Wherein the AMF may receive ranging/side-chain location service requests from any NF or AF. After receiving the request of side uplink positioning service, the AMF can select one LMF according to the identification of the target terminal equipment.
The amf sends a side-uplink location service request to the selected LMF including an identification of the target terminal device, step 902.
In step 903, the lmf sends a first request including at least one positioning terminal device identity to the target terminal device to trigger the target terminal device to perform a side-uplink positioning procedure.
The target end device performs a second discovery procedure to obtain a first RSC and a first token for the location end device, step 904.
In step 905, the target end device validates the first RSC and the first token.
Step 906, in response to the verification passing, establishing a sidelink with the positioning terminal device.
Optionally, the positioning terminal device and the target terminal device may also interact with each other to perform authentication authorization again in the process of establishing the side uplink.
In step 907, side-uplink positioning measurements are performed.
In step 908, the target terminal device sends the side uplink measurement results to the LMF.
In step 909, the lmf sends the measurement result to the AMF.
In step 910, the amf reports the location of the target terminal device.
In the method, before the side-link positioning is carried out, the target terminal equipment and the positioning terminal equipment carry out authentication and authorization of identity through the interaction token, so that privacy security of the terminal equipment in the side-link positioning process is ensured, and security of side-link positioning service is improved.
Referring to fig. 10, fig. 10 is an interaction diagram of another method for positioning a side uplink according to an embodiment of the disclosure. As shown in fig. 10, the method may include, but is not limited to, the steps of:
Step 1000 (not shown in the figure), the target terminal device and the positioning terminal device request from the second network element to obtain security parameters, tokens and keys for the discovery phase.
In step 1001, the amf receives a side uplink location service request.
Wherein the service request contains the identification of the target terminal device.
Wherein the AMF may receive ranging/side-chain location service requests from any NF or AF. After the AMF receives the side-link positioning service request, one LMF can be selected according to the identification of the target terminal equipment.
At step 1002, the amf sends a side uplink location service request to the selected LMF.
The method comprises the step of identifying the target terminal equipment.
In step 1003, the lmf sends a location terminal device discovery request to the target terminal device.
Optionally, the LMF may also send a side uplink positioning capability negotiation request to the target terminal device.
In step 1004, the target end device performs a first discovery procedure to obtain a first RSC and a first token for the positioning end device.
In response to the authentication of the first RSC and the first token passing, the target end device returns a response message to the LMF, wherein the response message includes an identification of the location end device, step 1005.
Alternatively, if the LMF sends a request for a lateral-link positioning capability negotiation to the target terminal device, the target terminal device may also send its own and/or the lateral-link positioning capabilities of the positioning terminal device to the LMF.
In step 1006, the lmf sends a side uplink location request to the target terminal device.
In step 1007, the target terminal device establishes a sidelink with the positioning terminal device to perform sidelink positioning measurements.
Optionally, the target terminal device and the positioning terminal device may also perform token interaction and authorization verification during the establishment of the side uplink.
The target terminal device sends 1008 the side-link measurements to the LMF.
In step 1009, the lmf transmits the measurement result to the AMF.
In step 1010, the amf reports the location of the target terminal device.
In the method, before the side-link positioning is carried out, the target terminal equipment and the positioning terminal equipment carry out authentication and authorization of identity through the interaction token, so that privacy security of the terminal equipment in the side-link positioning process is ensured, and security of side-link positioning service is improved.
Referring to fig. 11, fig. 11 is an interaction diagram of yet another lateral uplink positioning method according to an embodiment of the disclosure. As shown in fig. 11, the method may include, but is not limited to, the steps of:
Step 1100 (not shown), the target terminal device and the positioning terminal device request from the second network element to obtain security parameters, tokens and keys for the discovery phase.
In step 1101, the target terminal device has a positioning requirement, and performs a first discovery procedure or a second discovery procedure to obtain a first RSC and a first token of the positioning terminal device.
In step 1102, in response to passing the first RSC and the first token verification, the target end device sends an MO-LR request to the LMF including an identification of the locating end device.
Wherein a mobile terminal initiated location request (Mobile Originated Location Request, MO-LR) characterizes the location request as initiated by a target terminal device.
In step 1103, the lmf initiates positioning of the positioning terminal device.
In step 1104, the lmf sends a side uplink location request to the target terminal device.
In step 1105, the target terminal device establishes a sidelink with the positioning terminal device to perform sidelink positioning measurements.
Optionally, the target terminal device and the positioning terminal device may also perform token interaction and authorization verification during the establishment of the side uplink.
The target terminal device sends the side-link measurements to the LMF, step 1106.
In step 1107, the lmf will determine the location of the target terminal device based on the side-link measurements and the location of the positioning terminal device.
In step 1108, the lmf sends the location of the target terminal device to the target terminal device.
In the method, before the side-link positioning is carried out, the target terminal equipment and the positioning terminal equipment carry out authentication and authorization of identity through the interaction token, so that privacy security of the terminal equipment in the side-link positioning process is ensured, and security of side-link positioning service is improved.
Referring to fig. 12, fig. 12 is a schematic structural diagram of a communication device according to an embodiment of the disclosure. The communication device 1200 shown in fig. 12 may include a transceiver module 1201 and a processing module 1202. The transceiver module 1201 may include a transmitting module for implementing a transmitting function and/or a receiving module for implementing a receiving function, and the transceiver module 1201 may implement the transmitting function and/or the receiving function.
It is understood that the communication apparatus 1200 may be a terminal device, or may be an apparatus in a terminal device, or may be an apparatus that can be used in cooperation with a terminal device.
The communication apparatus 1200 is on the first terminal device side, wherein:
A transceiver module 1201, configured to receive a first token sent by a second terminal device, where the first token is used to characterize a role of the second terminal device in the side uplink positioning service;
A processing module 1202, configured to establish a side uplink with the second terminal device when it is determined that the side uplink positioning service is performed with the second terminal device according to the first token;
the processing module 1202 is further configured to perform a side uplink positioning measurement;
The transceiver module 1201 is further configured to send the measurement result to the first network element.
Optionally, the transceiver module 1201 is further configured to:
receiving a first request sent by the first network element, wherein the first request is used for requesting a side uplink positioning service of the second terminal equipment;
executing a first discovery process according to the identification of the second terminal equipment;
And receiving a first message returned by the second terminal equipment, wherein the second message comprises a first token.
Optionally, the transceiver module 1201 is further configured to: receiving a second request sent by the first network element, wherein the second request is used for requesting to discover positioning terminal equipment;
the processing module 1202 is further configured to perform a second discovery procedure, where the second discovery procedure is used to listen to a neighboring terminal device;
The processing module 1202 is further configured to listen to a second message sent by the second terminal device, where the second message includes the first token.
Optionally, the transceiver module 1201 is further configured to: and responding to the positioning requirement of the first terminal equipment, executing a first discovery process or a second discovery process, and acquiring a third message sent by the second terminal equipment, wherein the third message comprises the first token.
Optionally, the processing module 1202 is further configured to:
Validating the first, second or third message with security parameters for a discovery phase;
And acquiring a first token contained in the first message, the second message or the third message in response to passing the verification.
Optionally, the upper transceiver module 1201 is further configured to:
transmitting a third request to the second network element, wherein the third request is used for requesting information for establishing the side uplink;
Receiving information for establishing a side link sent by the second network element, wherein the information for establishing the side link comprises at least one of the following steps:
The security device comprises a security parameter for a discovery stage, a second token, a valid period corresponding to the second token and a secret key.
Optionally, the processing module 1202 is further configured to:
And determining that the first token is in the valid period and the type of the terminal equipment corresponding to the first token is positioning terminal equipment by using the secret key.
Optionally, the transceiver module 1201 is further configured to:
transmitting a side uplink establishment request to the second terminal equipment, wherein the establishment request comprises the second token;
Receiving a response message returned by the second terminal equipment, wherein the response message comprises the first token;
the processing module 1202 is further configured to:
verifying the first token by using the secret key;
and establishing a side uplink with the second terminal equipment in response to the first token being in the validity period and the second terminal equipment being positioning terminal equipment.
Optionally, the first network element is any one of the following: a Location Management Function (LMF) network element, an access and mobility management function (AMF) network element and a Gateway Mobile Location Center (GMLC);
The second network element is any one of the following: GMLC, direct discovery name management function DDNMF network element, proximity service ProSe key management function PKMF network element, and ranging application server RANGING APP SERVER network element.
In the disclosure, after receiving a first token sent by a second terminal device, a first terminal device may first verify the first token, and after the first token passes the verification, perform side uplink positioning measurement with the second terminal device, and send a measurement result to a first network element. Therefore, before the side-link positioning is performed, the target terminal equipment firstly performs authorization verification on the role according to the first token sent by the positioning terminal equipment, so that the privacy security of the terminal equipment in the side-link positioning process is ensured, and the security of the side-link positioning service is improved.
Or the communication apparatus 1200 is on the second terminal device side, wherein:
A transceiver module 1201, configured to send a first token to a first terminal device, where the first token is used to characterize a role of the second terminal device in the side-uplink positioning service, and the role of the second terminal device in the side-uplink positioning service is used by the first terminal device to determine whether to perform the side-uplink positioning service with the second terminal device;
A processing module 1202 configured to establish a sidelink with the first terminal device;
The processing module 1202 is also configured to perform side-uplink positioning measurements.
Optionally, the transceiver module 1201 is further configured to:
the first terminal equipment is detected to broadcast a message based on a first discovery process;
and returning a message to the first terminal equipment, wherein the message comprises the first token.
Optionally, the processing module 1202 is further configured to:
determining that the capability of the second terminal device meets the side-uplink positioning requirement of the first terminal device.
Optionally, the transceiver module 1201 is further configured to:
a second discovery process is performed broadcasting the first token.
Optionally, the processing module 1202 is further configured to encrypt the first token with a security parameter used for the discovery phase.
Optionally, the transceiver module 1201 is further configured to
Sending a request to a second network element, the request being for requesting information to establish a side uplink;
Receiving information for establishing a side link sent by the second network element, wherein the information for establishing the side link comprises at least one of the following steps:
The security parameters used for the discovery stage, the first token, the validity period corresponding to the first token and the secret key.
Optionally, the transceiver module 1201 is further configured to:
And sending the first token to the first terminal equipment in response to the first token being in the valid period.
Optionally, the transceiver module 1201 is further configured to:
receiving a side uplink establishment request sent by the first terminal equipment, wherein the side uplink establishment request comprises a second token;
the processing module 1202 is further configured to:
Verifying the second token with the key;
Responding to the second token being in the valid period and the first terminal equipment being target terminal equipment, and returning a response message to the first terminal equipment, wherein the response message comprises the first token;
and establishing a side uplink with the first terminal equipment.
Optionally, the second network element is any one of the following: the gateway mobile location center GMLC, a direct discovery name management function DDNMF network element, a proximity services ProSe key management function PKMF network element, and a ranging application server RANGING APP SERVER network element.
In the disclosure, the second terminal device first sends a first token to the first terminal device, so that the first terminal device performs authorization verification on the identity of the second terminal device, then establishes a side uplink with the first terminal device, and performs side uplink positioning measurement. Therefore, before the side-link positioning is performed, the first token is firstly sent to the target terminal equipment to perform role authorization verification, so that the privacy security of the terminal equipment in the side-link positioning process is ensured, and the security of the side-link positioning service is improved.
Referring to fig. 13, fig. 13 is a schematic structural diagram of another communication device according to an embodiment of the disclosure. The communication apparatus 1300 may be a terminal device, or may be a chip, a chip system, a processor, or the like that supports the terminal device to implement the above method. The device can be used for realizing the method described in the method embodiment, and can be particularly referred to the description in the method embodiment.
The communications apparatus 1300 can include one or more processors 1301. Processor 1301 may be a general purpose processor or a special purpose processor, etc. For example, a baseband processor or a central processing unit. The baseband processor may be used to process communication protocols and communication data, and the central processor may be used to control communication devices (e.g., base stations, baseband chips, terminal equipment chips, DUs or CUs, etc.), execute computer programs, and process data of the computer programs.
Optionally, the communications apparatus 1300 can further include one or more memories 1302, on which a computer program 1304 can be stored, and the processor 1301 executes the computer program 1304, so that the communications apparatus 1300 performs the method described in the method embodiment above. Optionally, the memory 1302 may also store data. The communications device 1300 and the memory 1302 can be provided separately or can be integrated.
Optionally, the communications device 1300 may also include a transceiver 1305, an antenna 1306. The transceiver 1305 may be referred to as a transceiver unit, a transceiver, or a transceiver circuit, etc. for implementing a transceiver function. The transceiver 1205 may include a receiver, which may be referred to as a receiver or a receiving circuit, etc., for implementing a receiving function; the transmitter may be referred to as a transmitter or a transmitting circuit, etc., for implementing a transmitting function.
Optionally, one or more interface circuits 1307 may also be included in the communications device 1300. Interface circuit 1307 is used to receive code instructions and transmit them to processor 1301. Processor 1301 executes the code instructions to cause communications apparatus 1300 to perform the methods described in the method embodiments described above.
The transceiver 1305 in the communications device 1300 may be configured to perform the steps of the foregoing figures, and the processor 1301 may be configured to perform the steps of the foregoing figures.
In one implementation, a transceiver for implementing the receive and transmit functions may be included in processor 1301. For example, the transceiver may be a transceiver circuit, or an interface circuit. The transceiver circuitry, interface or interface circuitry for implementing the receive and transmit functions may be separate or may be integrated. The transceiver circuit, interface or interface circuit may be used for reading and writing codes/data, or the transceiver circuit, interface or interface circuit may be used for transmitting or transferring signals.
In one implementation, the processor 1301 may store a computer program 1303, where the computer program 1303 runs on the processor 1301, and may cause the communication apparatus 1300 to perform the method described in the above method embodiment. The computer program 1303 may be solidified in the processor 1301, in which case the processor 1301 may be implemented by hardware.
In one implementation, the communications apparatus 1300 can include circuitry that can implement the functions of transmitting or receiving or communicating in the foregoing method embodiments. The processors and transceivers described in this disclosure may be implemented on integrated circuits (INTEGRATED CIRCUIT, ICs), analog ICs, radio frequency integrated circuits RFICs, mixed signal ICs, application SPECIFIC INTEGRATED Circuits (ASICs), printed circuit boards (printed circuit board, PCBs), electronic devices, and so forth. The processor and transceiver may also be fabricated using a variety of IC process technologies such as complementary metal oxide semiconductor (complementary metal oxide semiconductor, CMOS), N-type metal oxide semiconductor (NMOS), P-type metal oxide semiconductor (PMOS), bipolar junction transistor (bipolar junction transistor, BJT), bipolar CMOS (BiCMOS), silicon germanium (SiGe), gallium arsenide (GaAs), etc.
The communication apparatus described in the above embodiment may be a network device or an intelligent relay, but the scope of the communication apparatus described in the present disclosure is not limited thereto, and the structure of the communication apparatus may not be limited by fig. 13. The communication means may be a stand-alone device or may be part of a larger device. For example, the communication device may be:
(1) A stand-alone integrated circuit IC, or chip, or a system-on-a-chip or subsystem;
(2) A set of one or more ICs, optionally including storage means for storing data, a computer program;
(3) An ASIC, such as a Modem (Modem);
(4) Modules that may be embedded within other devices;
(5) A receiver, a terminal device, an intelligent terminal device, a cellular phone, a wireless device, a handset, a mobile unit, a vehicle-mounted device, a network device, a cloud device, an artificial intelligent device, and the like;
(6) Others, and so on.
For the case where the communication device may be a chip or a chip system, reference may be made to the schematic structural diagram of the chip shown in fig. 14. The chip shown in fig. 14 includes a processor 1401 and an interface 1402. Wherein the number of processors 1401 may be one or more, and the number of interfaces 1402 may be a plurality.
For the case where the chip is used to implement the functions of the terminal device in the embodiments of the present disclosure.
Optionally, the chip further comprises a memory 1403, the memory 1403 being used for storing the necessary computer programs and data.
Those of skill in the art will further appreciate that the various illustrative logical blocks (illustrative logical block) and steps (steps) described in connection with the embodiments of the disclosure may be implemented by electronic hardware, computer software, or combinations of both. Whether such functionality is implemented as hardware or software depends upon the particular application and design requirements of the overall system. Those skilled in the art may implement the described functionality in varying ways for each particular application, but such implementation is not to be understood as beyond the scope of the embodiments of the present disclosure.
The present disclosure also provides a readable storage medium having instructions stored thereon which, when executed by a computer, perform the functions of any of the method embodiments described above.
The present disclosure also provides a computer program product which, when executed by a computer, performs the functions of any of the method embodiments described above.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product comprises one or more computer programs. When the computer program is loaded and executed on a computer, the flow or functions described in accordance with the embodiments of the present disclosure are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer program may be stored in or transmitted from one computer readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means from one website, computer, server, or data center. The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (e.g., a solid-state disk (solid-state drive STATE DISK, SSD)), or the like.
Those of ordinary skill in the art will appreciate that: the various numbers of first, second, etc. referred to in this disclosure are merely for ease of description and are not intended to limit the scope of embodiments of this disclosure, nor to indicate sequencing.
At least one of the present disclosure may also be described as one or more, a plurality may be two, three, four or more, and the present disclosure is not limited. In the embodiment of the disclosure, for a technical feature, the technical features in the technical feature are distinguished by "first", "second", "third", "a", "B", "C", and "D", and the technical features described by "first", "second", "third", "a", "B", "C", and "D" are not in sequence or in order of magnitude.
The correspondence relationships shown in the tables in the present disclosure may be configured or predefined. The values of the information in each table are merely examples, and may be configured as other values, and the present disclosure is not limited thereto. In the case of the correspondence between the configuration information and each parameter, it is not necessarily required to configure all the correspondence shown in each table. For example, in the table in the present disclosure, the correspondence shown by some rows may not be configured. For another example, appropriate morphing adjustments, e.g., splitting, merging, etc., may be made based on the tables described above. The names of the parameters indicated in the tables may be other names which are understood by the communication device, and the values or expressions of the parameters may be other values or expressions which are understood by the communication device. When the tables are implemented, other data structures may be used, for example, an array, a queue, a container, a stack, a linear table, a pointer, a linked list, a tree, a graph, a structure, a class, a heap, a hash table, or a hash table.
Predefined in this disclosure may be understood as defining, predefining, storing, pre-negotiating, pre-configuring, curing, or pre-sintering.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
The foregoing is merely specific embodiments of the disclosure, but the protection scope of the disclosure is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the disclosure, and it is intended to cover the scope of the disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (23)

  1. A method of side-link positioning, the method being performed by a first terminal device, the method comprising:
    receiving a first token sent by second terminal equipment, wherein the first token is used for representing the role of the second terminal equipment in the side uplink positioning service;
    When the side-link positioning service with the second terminal equipment is determined according to the first token, a side-link between the second terminal equipment and the side-link positioning service is established;
    Performing a side-uplink positioning measurement;
    and sending the measurement result to the first network element.
  2. The method of claim 1, wherein the receiving the first token sent by the second terminal device comprises:
    receiving a first request sent by the first network element, wherein the first request is used for requesting a side uplink positioning service of the second terminal equipment;
    executing a first discovery process according to the identification of the second terminal equipment;
    and receiving a first message returned by the second terminal equipment, wherein the first message comprises the first token.
  3. The method of claim 1, wherein the receiving the first token sent by the second terminal device comprises:
    receiving a second request sent by the first network element, wherein the second request is used for requesting to discover positioning terminal equipment;
    executing a second discovery process according to the second request, wherein the second discovery process is used for intercepting adjacent terminal equipment;
    and detecting a second message sent by the second terminal equipment, wherein the second message comprises the first token.
  4. The method of claim 1, wherein the receiving the first token sent by the second terminal device comprises:
    And responding to the positioning requirement of the first terminal equipment, executing a first discovery process or a second discovery process, and acquiring a third message sent by the second terminal equipment, wherein the third message comprises the first token.
  5. The method according to any of claims 2-4, wherein said receiving the first token sent by the second terminal device comprises:
    Validating the first, second or third message with security parameters for a discovery phase;
    And acquiring a first token contained in the first message, the second message or the third message in response to passing the verification.
  6. The method of any one of claims 1-5, further comprising:
    Transmitting a third request to the second network element, wherein the third request is used for requesting information for establishing a side uplink;
    Receiving information for establishing a side link sent by the second network element, wherein the information for establishing the side link comprises at least one of the following steps:
    The security device comprises a security parameter for a discovery stage, a second token, a valid period corresponding to the second token and a secret key.
  7. The method of claim 6, wherein the determining to conduct the side-uplink positioning service with the second terminal device based on the first token comprises:
    And determining that the first token is in the valid period and the type of the terminal equipment corresponding to the first token is positioning terminal equipment by using the secret key.
  8. The method of claim 6, wherein the establishing a side-link with the second terminal device comprises:
    transmitting a side uplink establishment request to the second terminal device;
    Receiving a response message returned by the second terminal equipment, wherein the response message comprises the first token;
    verifying the first token by using the secret key;
    and establishing a side uplink with the second terminal equipment in response to the first token being in the validity period and the second terminal equipment being positioning terminal equipment.
  9. The method of claim 6, wherein,
    The first network element is any one of the following: a Location Management Function (LMF) network element, an Access Management Function (AMF) network element and a Gateway Mobile Location Center (GMLC);
    The second network element is any one of the following: GMLC, direct discovery name management function DDNMF network element, proximity service ProSe key management function PKMF network element, and ranging application server RANGING APP SERVER network element.
  10. A method of side-link positioning, the method being performed by a second terminal device, the method comprising:
    Transmitting a first token to a first terminal device, wherein the first token is used for representing the role of the second terminal device in the side-link positioning service, and the role of the second terminal device in the side-link positioning service is used for the first terminal device to determine whether to perform the side-link positioning service with the second terminal device;
    establishing a side uplink with the first terminal device;
    Side-uplink positioning measurements are performed.
  11. The method of claim 10, wherein the sending the first token to the first terminal device comprises:
    the first terminal equipment is detected to broadcast a message based on a first discovery process;
    and returning a message to the first terminal equipment, wherein the message comprises the first token.
  12. The method of claim 11, further comprising, prior to said returning a message to said first terminal device:
    determining that the capability of the second terminal device meets the side-uplink positioning requirement of the first terminal device.
  13. The method of claim 10, wherein the sending the first token to the first terminal device comprises:
    a second discovery process is performed broadcasting the first token.
  14. The method according to any of claims 10-13, further comprising, prior to said sending the first token to the first terminal device:
    The first token is encrypted with security parameters for the discovery phase.
  15. The method of any one of claims 10-14, further comprising:
    sending a request to a second network element, the request being for requesting information to establish a side uplink;
    Receiving information for establishing a side link sent by the second network element, wherein the information for establishing the side link comprises at least one of the following steps:
    The security parameters used for the discovery stage, the first token, the validity period corresponding to the first token and the secret key.
  16. The method of claim 15, further comprising, prior to said sending the first token to the first terminal device:
    Determining that the first token is within a valid period.
  17. The method of claim 15, wherein the establishing a side-link with the first terminal device comprises:
    receiving a side uplink establishment request sent by the first terminal equipment, wherein the side uplink establishment request comprises a second token;
    Verifying the second token with the key;
    Responding to the second token being in the valid period and the first terminal equipment being target terminal equipment, and returning a response message to the first terminal equipment, wherein the response message comprises the first token;
    and establishing a side uplink with the first terminal equipment.
  18. The method of claim 15, wherein,
    The second network element is any one of the following: the gateway mobile location center GMLC, the direct discovery name management function DDNMF network element, the proximity service ProSe key management function PKMF network element, and the ranging application RANGING APP SERVER network element.
  19. A communication device, comprising:
    The receiving and transmitting module is used for receiving a first token sent by second terminal equipment, and the first token is used for representing the role of the second terminal equipment in the side uplink positioning service;
    a processing module, configured to establish a sidelink with the second terminal device when determining to perform the sidelink positioning service with the second terminal device according to the first token;
    The processing module is further configured to perform a sidelink positioning measurement;
    The transceiver module is further configured to send the measurement result to the first network element.
  20. A communication device, comprising:
    A transceiver module, configured to send a first token to a first terminal device, where the first token is used to characterize a role of the second terminal device in the side uplink positioning service, and the role of the second terminal device in the side uplink positioning service is used by the first terminal device to determine whether to perform the side uplink positioning service with the second terminal device;
    A processing module, configured to establish a sidelink with the first terminal device;
    The processing module is also configured to perform a sidelink positioning measurement.
  21. A communication system comprising a first terminal device for performing the method according to any of claims 1-9 and a second terminal device for performing the method according to any of claims 10-18.
  22. A communication device, characterized in that the device comprises a processor and a memory, the memory having stored therein a computer program, the processor executing the computer program stored in the memory to cause the device to perform the method according to any one of claims 1 to 9 or to perform the method according to any one of claims 10-18.
  23. A computer readable storage medium storing instructions which, when executed, cause the method of any one of claims 1 to 9 to be implemented or cause the method of any one of claims 10 to 18 to be implemented.
CN202280003735.2A 2022-09-28 2022-09-28 Side-link positioning method and device Pending CN118104187A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/122342 WO2024065336A1 (en) 2022-09-28 2022-09-28 Sidelink positioning method and apparatus

Publications (1)

Publication Number Publication Date
CN118104187A true CN118104187A (en) 2024-05-28

Family

ID=90475313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202280003735.2A Pending CN118104187A (en) 2022-09-28 2022-09-28 Side-link positioning method and device

Country Status (2)

Country Link
CN (1) CN118104187A (en)
WO (1) WO2024065336A1 (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114867099A (en) * 2021-01-18 2022-08-05 大唐移动通信设备有限公司 Positioning method and device
US11425675B2 (en) * 2021-01-28 2022-08-23 Qualcomm Incorporated Timing advance (TA) handling for sidelink (SL)-assisted positioning
CN115087089A (en) * 2021-03-10 2022-09-20 大唐移动通信设备有限公司 Relative positioning authorization method, device, terminal and target equipment

Also Published As

Publication number Publication date
WO2024065336A1 (en) 2024-04-04

Similar Documents

Publication Publication Date Title
CN110798833B (en) Method and device for verifying user equipment identification in authentication process
KR20180069074A (en) A method and apparatus for downloading a profile to an embedded universal integrated circuit card (eUICC)
CN110073681B (en) Method, apparatus and computer readable medium for internet of things device
CN113543126A (en) Key obtaining method and device
WO2024077455A1 (en) Access method for non-terrestrial network, and apparatus
CN118104187A (en) Side-link positioning method and device
WO2024065335A1 (en) Sidelink positioning method and apparatus
US20100067438A1 (en) Communication method and, terminal apparatus and base station apparatus using the method
WO2024082143A1 (en) Device service role verification method and apparatus and device, and storage medium
WO2024065706A1 (en) Connection construction method and apparatus
CN113365243A (en) Communication method, device, equipment and system
WO2024065339A1 (en) Network satellite coverage data authorization method, device, and storage medium
WO2023245520A1 (en) Direct communication method and apparatus in localization service
WO2024065140A1 (en) Role authorization method/apparatus/device for user equipment (ue), and storage medium
CN116472731A (en) Message verification method and device
WO2024065334A1 (en) Method, apparatus and device for generating authorization token of user equipment (ue), and storage medium
WO2023221000A1 (en) Authentication and authorization method and apparatus for ai function in core network
WO2024065469A1 (en) Direct-link establishment method, device and storage medium
CN118160336A (en) Method and device for constructing connection
WO2023225878A1 (en) Re-authentication authorization method/apparatus/device for ai network function, and storage medium
WO2024065564A1 (en) Api invoking method, apparatus, device, and storage medium
WO2024000331A1 (en) Perception service obtaining method and apparatus
WO2024065549A1 (en) Direct-communication key generation method and apparatus
CN116830771A (en) Communication connection method, device, equipment and storage medium
CN118120177A (en) Direct communication secret key generation method and device

Legal Events

Date Code Title Description
PB01 Publication