WO2014056449A1 - 设备到设备通信的管理和校验方法、装置及系统 - Google Patents

设备到设备通信的管理和校验方法、装置及系统 Download PDF

Info

Publication number
WO2014056449A1
WO2014056449A1 PCT/CN2013/085056 CN2013085056W WO2014056449A1 WO 2014056449 A1 WO2014056449 A1 WO 2014056449A1 CN 2013085056 W CN2013085056 W CN 2013085056W WO 2014056449 A1 WO2014056449 A1 WO 2014056449A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
server
verification
real
application layer
Prior art date
Application number
PCT/CN2013/085056
Other languages
English (en)
French (fr)
Inventor
梁爽
甘露
宗在峰
朱春晖
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2014056449A1 publication Critical patent/WO2014056449A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1076Screening of IP real time communications, e.g. spam over Internet telephony [SPIT]

Definitions

  • the present invention relates to the field of communications, and in particular to a device to device (D2D) communication management and verification method and device. And system. BACKGROUND OF THE INVENTION
  • D2D device to device
  • And system BACKGROUND OF THE INVENTION
  • 3GPP 3rd Generation Partnership Project
  • 3GPP Standards Working Group is working on the Evolved Packet System (EPS).
  • FIG. 1 is a schematic diagram of an architecture of an evolved packet domain system according to the related art. As shown in FIG. 1, the entire EPS system is divided into two parts: a radio access network and a core network.
  • the Home Subscriber Server which contains all the functions of the Home Location Register (HLR), is the permanent storage location for the user's subscription data, and is located in the home network to which the user subscribes.
  • HLR Home Location Register
  • the mobility management entity is the location where the user subscription data is stored in the current network, responsible for terminal-to-network non-access layer signaling management, terminal security verification function, terminal mobility management, user idle mode tracking and paging. Management functions and bearer management.
  • the Serving GPRS Support Node (SGSN) is a service support point for GERAN and UTRAN users to access the core network. It is similar in function to the mobility management entity and is responsible for user location update, paging management, and bearer management. And other functions.
  • the service gateway is a gateway of the core network to the wireless system, and is responsible for the user plane bearer of the terminal to the core network, the data buffer in the terminal idle mode, the function of initiating the service request by the network side, the lawful interception and the packet data routing and forwarding function; It is responsible for counting the situation in which the user terminal uses the wireless network, and generates the CDR of the terminal using the wireless network, and transmits it to the charging gateway.
  • the packet data gateway is a gateway of the evolved system and the external packet data network of the system. It is connected to the Internet and the packet data network, and is responsible for the Internet Protocol (IP) address allocation, charging function, and packet filtering of the terminal. , policy control and other functions.
  • IP Internet Protocol
  • the GPRS gateway support node (Gateway GPRS Support Node, referred to as GGSN) supports the edge routing function of the GPRS network. That is, the GGSN is responsible for routing and forwarding data of the GPRS network, and protecting the integrity of the GPRS network data through the firewall and filtering functions.
  • the GGSN also has a charging function.
  • the PGW contains all the functions of the GGSN, and the GGSN can be considered as a sub-function of the PGW and embedded in the PGW. Therefore, the SGSN can be directly connected to the PGW, using the Gn/Gp interface.
  • the packet data network is the operator's IP service network, which provides IP services to users through the operator's core network.
  • the policy charging rule function entity is a server in the evolution system that is responsible for providing rules for charging control, online credit control, threshold control, and quality of service (QoS) policies.
  • the radio access network is composed of an evolved base station (E-UTRAN NodeB, eNB for short) and a 3G radio network controller (Radio Network Control, RNC for short), which is mainly responsible for transmitting and receiving wireless signals, and contacting the terminal through the air interface. , manage radio resources, resource scheduling, and access control of the air interface.
  • E-UTRAN NodeB evolved base station
  • RNC Radio Network Control
  • the present invention provides a management and verification scheme for D2D communication, so as to at least solve the problem that the network side cannot manage the identifier existing in the D2D service in the related art.
  • a D2D communication management method including: a D2D server acquiring a real ID and/or an application layer ID of a terminal, and a D2D communication restriction list of the terminal, where the D2D server is used by the D2D server The D2D discovery verification is performed; the D2D server stores a D2D communication restriction list of the terminal, and a real ID and/or an application layer ID.
  • the D2D server acquiring the D2D communication restriction list of the terminal includes: the D2D server acquiring the D2D communication restriction list of the terminal according to the real ID and/or the application layer ID.
  • the obtaining, by the D2D server, the D2D communication restriction list of the terminal according to the real ID and/or the application layer ID the D2D server acquiring the real ID and/or an application layer from an MME of the terminal
  • the D2D communication restriction list corresponding to the ID or, the D2D server downloads the subscription data of the user to the HSS/HLR according to the real ID and/or the application layer ID, where the subscription data includes the D2D of the terminal.
  • the method further includes: whether the D2D server allows the application to be applied according to the subscription data.
  • the server downloads the D2D communication restriction list of the terminal, and determines whether it is necessary to download the D2D communication restriction list of the terminal to the application server.
  • the D2D server acquires the real ID and/or the application layer ID of the terminal, and the D2D server acquires the real ID and/or the application layer ID of the terminal from the MME or the PGW of the terminal.
  • the obtaining, by the D2D server, the real ID and/or the application layer ID of the terminal from the MME of the terminal the D2D server receiving a registration request from the MME, where the registration request is Carrying the real ID and/or application layer ID of the terminal.
  • the obtaining, by the D2D server, the real ID and/or the application layer ID of the terminal from the MME of the terminal includes: the D2D server initiating an identifier to the serving MME of the terminal according to the temporary identifier of the terminal a request message, where the temporary identifier is a GUTI allocated by the MME for the terminal; the D2D server receives an identifier response message from the MME, where the identifier response message carries the terminal Describe the real ID and/or application layer ID.
  • the obtaining, by the D2D server, the real ID and/or the application layer ID of the terminal from the PGW of the terminal includes: the D2D server initiating an identifier request to the PGW of the terminal according to the IP address of the terminal
  • the D2D server receives the identity response message from the PGW, where the identity response message carries the real ID and/or the application layer ID of the terminal.
  • the method further includes: the D2D server acquiring a discovery ID of the terminal, where the discovery ID is used to search for a D2D communication restriction list of the terminal in the D2D server; The discovery ID is stored.
  • the discovery ID of the terminal includes at least one of the following: the terminal fills in a complete discovery ID; the terminal fills a discovery ID assigned by the base station, and the base station fills the ID of the base station or the The cell ID where the UE is currently located; the base station fills in the complete discovery ID.
  • a method for verifying D2D communication including: receiving, by a second D2D server, a first verification request, where the first verification request carries a real ID of the first terminal and/or An application layer ID, and a discovery ID of the second terminal, where the second D2D server stores the context of the second terminal; the second D2D server queries the second terminal according to the discovery ID of the second terminal a D2D communication restriction list; the second D2D server verifies whether the second terminal allows the discovery of the second terminal according to the D2D communication restriction list of the second terminal and the real ID and/or the application layer ID of the first terminal A terminal is discovered by the first terminal; the second D2D server returns a first verification response, where the second D2D server verification result is carried.
  • the method further includes: the first D2D server receiving the second verification request, where the second verification request carries the discovery ID of the first terminal, the first D2D Storing the context of the first terminal in the server; the first D2D server queries the real ID and/or the application layer ID of the first terminal according to the discovery ID of the first terminal; the first D2D server is Filling, by the first verification request, a real ID and/or an application layer ID of the first terminal, and sending the first verification request to the second D2D server.
  • the receiving, by the first D2D server, the second verification request comprises: the first D2D server receiving a second verification request from the serving base station/PGW/MME of the first terminal or the second terminal.
  • the method further includes: the second D2D server querying the real ID and/or the application layer ID of the second terminal according to the discovery ID of the second terminal; The second D2D server sends a first verification response to the first D2D server, where the real ID and/or the application layer ID of the second terminal is carried; the first D2D server according to the D2D communication restriction list of the first terminal And verifying, by the real ID and/or the application layer ID of the second terminal, whether the first terminal is allowed to discover or be discovered by the second terminal.
  • the first D2D server determines, according to the D2D communication restriction list of the first terminal and the real ID and/or the application layer ID of the second terminal, whether the first terminal allows to discover the second terminal or is After the second terminal is found, the method further includes: the first D2D server returns a second verification response to the initiator of the second verification request, where the second verification response carries the second D2D server Verification results and/or first D2D server verification results.
  • the returning, by the first D2D server, the second verification response to the initiator of the second verification request comprises: the first D2D server returning the second verification to the serving base station of the first or second terminal Or the first D2D server returns the second verification response to the first terminal by using the PGW; or the first D2D server returns the second verification response to the serving base station of the first terminal by using the MME .
  • the first D2D server returns a second verification response to the serving base station of the first terminal or the second terminal, further comprising: the base station reporting the first terminal and/or according to the second verification response.
  • the second terminal sends a discovery list.
  • a D2D communication management apparatus which is located in a D2D server for D2D discovery verification, and includes: an obtaining module, configured to acquire a real ID and/or an application layer ID of the terminal, and a D2D communication restriction list of the terminal; a storage module, configured to store the D2D communication restriction list of the terminal, and the real ID and/or the application layer ID.
  • a verification apparatus for D2D communication which is located in a second D2D server, and includes: a first receiving module, configured to receive a first verification request, wherein the first verification request Carrying the real ID and/or the application layer ID of the first terminal, and the discovery ID of the second terminal, where the second D2D server stores the context of the second terminal; the first query module is set according to the The discovery ID of the second terminal queries the D2D communication restriction list of the second terminal; the first verification module is configured to be based on the D2D communication restriction list of the second terminal and the real ID and/or application layer of the first terminal The ID verifies whether the second terminal is allowed to discover or is discovered by the first terminal.
  • the first response module is configured to return a first verification response, where the second D2D server verification result is carried.
  • a verification system for D2D communication including the verification device located at the second D2D server, and a verification device located at the first D2D server, wherein the first D2D
  • the verification device of the server includes: a second receiving module, configured to receive a second verification request, where the second verification request carries a discovery ID of the first terminal, where the first D2D server stores the first a second query module, configured to query the first terminal according to the discovery ID of the first terminal a real ID and/or an application layer ID; a first sending module, configured to fill a first ID and/or an application layer ID of the first terminal in the first verification request, and send the first verification request to the The second D2D server.
  • the verification device of the second D2D server further includes: a third query module, configured to query a real ID and/or an application layer ID of the second terminal according to the discovery ID of the second terminal;
  • the sending module is configured to send a first verification response to the first D2D server, where the real ID and/or the application layer ID of the second terminal are carried.
  • the verification device located in the first D2D server further includes: a third receiving module, configured to receive the first verification response; and a second verification module configured to verify the first according to the D2D communication restriction list of the first terminal and the real ID and/or the application layer ID of the second terminal Whether a terminal allows discovery of the second terminal or is discovered by the second terminal.
  • the verification device of the first D2D server further includes: a second response module, configured to return a second verification response to the initiator of the second verification request, where the second verification response is carried There is the second D2D server verification result and/or the first D2D server verification result.
  • a second response module configured to return a second verification response to the initiator of the second verification request, where the second verification response is carried There is the second D2D server verification result and/or the first D2D server verification result.
  • the D2D server is used to obtain the real ID and/or the application layer ID of the terminal, and the D2D communication restriction list of the terminal, wherein the D2D server is used for D2D discovery verification; the D2D server limits the D2D communication to the terminal, and the real
  • the method of storing the ID and/or the application layer ID solves the problem that the network side cannot manage the identifier existing in the D2D service in the related art, and improves the management capability of the network side to the D2D communication service.
  • FIG. 1 is a schematic diagram of an architecture of an evolved packet domain system according to the related art
  • FIG. 2 is a schematic diagram of communication of a terminal supporting D2D function according to the related art
  • FIG. 3 is a management of D2D communication according to an embodiment of the present invention.
  • FIG. 4 is a block diagram showing a configuration of a D2D communication management apparatus according to an embodiment of the present invention
  • FIG. 5 is a flowchart of a D2D communication verification method according to an embodiment of the present invention
  • a structural block diagram of a verification device for D2D communication
  • Figure 2 is a block diagram showing the structure of a verification system for D2D communication according to an embodiment of the present invention
  • Figure 8 is a block diagram showing a preferred structure of a verification system for D2D communication according to an embodiment of the present invention
  • Figure 9 is a D2D according to an embodiment of the present invention.
  • FIG. 10 is a schematic diagram of an embodiment of a D2D user registering through an eNB according to Embodiment 1 of the present invention
  • FIG. 11 is a D2D user registered by a PGW according to Embodiment 2 of the present invention
  • FIG. 12 is a schematic diagram of an embodiment of a D2D user registering through an MME according to Embodiment 3 of the present invention
  • FIG. 13 is a schematic diagram of an implementation manner of a D2D user performing authentication by an eNB according to Embodiment 4 of the present invention
  • 14 is a schematic diagram of Embodiment 2 of a D2D user performing authentication by an eNB according to Embodiment 5 of the present invention
  • FIG. 15 is a schematic diagram of one embodiment of a D2D user performing verification by a PGW according to Embodiment 6 of the present invention
  • 16 is a schematic diagram of Embodiment 2 of the D2D user performing verification by the PGW according to Embodiment 7 of the present invention
  • FIG. 17 is an embodiment according to the present invention.
  • FIG. 18 is the second embodiment of the way D2D user authentication schematic diagram of Embodiment 9 according to the present invention is performed by MME embodiment.
  • BEST MODE FOR CARRYING OUT THE INVENTION Hereinafter, the present invention will be described in detail with reference to the accompanying drawings. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict.
  • FIG. 3 is a flowchart of a method for managing D2D communication according to an embodiment of the present invention. As shown in FIG.
  • the method includes the following steps: Step S302, the D2D server acquires a real identifier (ID) and/or an application layer ID of the terminal, and a D2D communication restriction list of the terminal, where the D2D server is used for D2D discovery verification; and step S304, the D2D server limits the D2D communication to the terminal.
  • the list, as well as the real ID and / or application layer ID are stored.
  • a D2D server for D2D discovery verification is set on the network side,
  • the D2D server After the D2D server obtains the real ID (for example, IMSI/MSISDN number) and/or application layer ID of the terminal, and the D2D communication restriction list of the terminal, the above-mentioned real ID and/or application layer ID of the D2D server to the terminal, and the terminal
  • the D2D communication restriction list is stored, and the identifier of the D2D service is stored in the D2D server on the network side, so that the network side can implement centralized management of the identifier in the D2D communication process, and the network side cannot manage the D2D service in the related art.
  • the problem of identification in the middle improves the management capability of the network side for D2D communication services.
  • the D2D server may acquire the D2D communication restriction list of the terminal according to the real ID and/or the application layer ID.
  • the D2D server may obtain the D2D communication restriction list corresponding to the real ID and/or the application layer ID from the MME of the terminal; or the D2D server may download the subscription data of the user to the HSS/HLR according to the real ID and/or the application layer ID.
  • the subscription data includes a D2D communication restriction list of the terminal; or the D2D server may download the D2D communication restriction list of the user to the application server according to the real ID and/or the application layer ID. In this way, the flexibility of the D2D server to obtain the D2D communication restriction list of the terminal is improved.
  • the D2D server may determine whether the D2D communication restriction list of the terminal is allowed to be downloaded to the application server according to the subscription data.
  • the D2D communication restriction list of the terminal needs to be downloaded to the application server. For example, if the D2D communication restriction list of the terminal is allowed to be downloaded to the application server in the subscription data, the application may be downloaded to the application server. Otherwise, the application server may not be downloaded. Instead, use other methods.
  • the D2D server may acquire the real ID and/or the application layer ID of the terminal from the MME or the PGW of the terminal.
  • the application layer ID may be added by the UE and transmitted to the D2D server through the path of the MME or the PGW, or may be added by the MME or the PGW.
  • the method for obtaining the real ID and/or the application layer ID of the terminal from the MME of the terminal may be:
  • the D2D server receives the registration request from the MME, where the registration request carries the real ID and/or the application layer ID of the terminal.
  • the D2D server may send an identifier request message to the serving MME of the terminal according to the temporary identifier of the terminal, where the temporary identifier is a globally unique temporary identifier (GUTI) allocated by the MME for the terminal;
  • the D2D server receives the identity response message from the MME, where the identity response message carries the real ID and/or the application layer ID of the terminal.
  • GUI globally unique temporary identifier
  • the manner of obtaining the real ID and/or the application layer ID of the terminal from the PGW of the terminal may be: the D2D server sends an identifier request message to the PGW of the terminal according to the IP address of the terminal; the D2D server receives the identifier response message from the PGW, where The identifier response message carries the real ID and/or the application layer ID of the terminal.
  • the D2D server may further acquire a discovery ID of the terminal, and store the discovery ID, where the discovery ID is used to search the D2D server for the D2D communication restriction list of the terminal.
  • the discovery ID of the terminal may be directly filled by the terminal; or the terminal may fill the discovery ID assigned by the base station, and the base station fills the ID of the base station or the ID of the current cell of the UE in the forwarding process; or It can be filled directly by the base station.
  • a device-to-device D2D communication management apparatus is provided, which is located in a D2D server for D2D discovery verification, and is used to implement the above embodiments and preferred embodiments. , already explained, no longer repeat them.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • FIG. 4 is a structural block diagram of a D2D communication management apparatus according to an embodiment of the present invention.
  • the apparatus includes: an acquisition module 42 and a storage module 44, and each module is described in detail below.
  • the obtaining module 42 is configured to obtain a real ID and/or an application layer ID of the terminal, and a D2D communication restriction list of the terminal.
  • the storage module 44 is connected to the obtaining module 42 and configured to limit the D2D communication of the terminal acquired by the obtaining module 42.
  • the list, as well as the real ID and / or application layer ID are stored.
  • a D2D server for D2D discovery verification is set on the network side, and the real ID (for example, IMSI/MSISDN number) and/or application layer ID of the terminal is obtained by the acquisition module 42 of the D2D server, and After the D2D communication restriction list of the terminal, the storage module 44 of the D2D server stores the above-mentioned real ID and/or application layer ID of the terminal, and the D2D communication restriction list of the terminal, because the identifier of the D2D service exists in the D2D on the network side.
  • the real ID for example, IMSI/MSISDN number
  • the storage module 44 of the D2D server stores the above-mentioned real ID and/or application layer ID of the terminal, and the D2D communication restriction list of the terminal, because the identifier of the D2D service exists in the D2D on the network side.
  • FIG. 5 is a flowchart of a D2D communication verification method according to an embodiment of the present invention. As shown in FIG. 5, the method includes the following steps.
  • Step S502 The second D2D server receives the first verification request, where the first verification request carries the real ID and/or the application layer ID of the first terminal, and the discovery ID of the second terminal, where the second D2D server stores Context of the second terminal; Step S504, the second D2D server queries the D2D communication restriction list of the second terminal according to the discovery ID of the second terminal; Step S506, the second D2D server according to the D2D communication restriction list of the second terminal and the first terminal The real ID and/or the application layer ID verifies whether the second terminal allows the first terminal to be discovered or discovered by the first terminal. Step S508, the second D2D server returns a first verification response, where the second D2D server verification result is carried.
  • the second D2D server on the network side queries the D2D communication restriction list of the second terminal according to the discovery ID of the second terminal, and limits the D2D communication according to the second terminal.
  • the list and the real ID and/or the application layer ID of the first terminal verify whether the second terminal allows the first terminal to be discovered or discovered by the first terminal, and the second D2D server returns the result of the above verification through the first verification response, since
  • the identifier of the D2D service is stored on the D2D server on the network side, so that the network side can centrally manage the D2D discovery and verification process in the D2D communication process, and the network side cannot manage the identifier existing in the D2D service in the related art.
  • the first verification request may be sent by the first D2D server to the second D2D server.
  • the first D2D server receives the second verification request, where the second verification request carries the discovery ID of the first terminal, where the The first D2D server stores the context of the first terminal; the first D2D server queries the real ID and/or the application layer ID of the first terminal according to the discovery ID of the first terminal; the first D2D server fills the first verification request A real ID and/or an application layer ID of a terminal, and the first verification request is sent to the second D2D server.
  • first and second are used merely for convenience of description and do not include other special meanings or as a limitation of the order.
  • the first D2D server and the second D2D server in this document may be the same server, or may be different servers, may be physically separated different devices, or may be in the same physical device.
  • the second verification request received by the first D2D server may be from the serving base station/PGW/MME of the first terminal or the second terminal.
  • the second D2D server may query the real ID and/or the application layer ID of the second terminal according to the discovery ID of the second terminal, and pass the query result to the first verification.
  • the first D2D server verifies whether the first terminal is allowed to discover the second terminal or is discovered by the second terminal according to the D2D communication restriction list of the first terminal and the real ID and/or the application layer ID of the second terminal .
  • the first D2D server may return whether the first terminal discovers the verification result of the second terminal or the second terminal, and/or the second D2D server verification result, and returns the second verification response to the second verification request by using the second verification response. Initiator.
  • the manner in which the first D2D server returns the second verification response to the initiator of the second verification request may be: the first D2D server returns a second verification response to the serving base station of the first or second terminal; or, the first D2D The server returns a second verification response to the first terminal by using the PGW.
  • the first D2D server returns a second verification response to the serving base station of the first terminal by using the MME.
  • the base station may further send the discovery list to the first terminal and/or the second terminal according to the second verification response.
  • a D2D communication verification device is also provided, which is located in a second D2D server that stores the context of the second terminal, and is used to implement the above embodiment. And preferred embodiments, which have been described again, are not described again.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and conceivable.
  • FIG. 6 is a structural block diagram of a verification apparatus for D2D communication according to an embodiment of the present invention. As shown in FIG.
  • the apparatus includes: a first receiving module 62, a first query module 64, a first verification module 66, and a first response.
  • Module 68 each module will be described in detail below.
  • the first receiving module 62 is configured to receive the first verification request, where the first verification request carries the real ID and/or the application layer ID of the first terminal, and the discovery ID of the second terminal.
  • the first query module 64, The first receiving module 62 is configured to query the D2D communication restriction list of the second terminal according to the discovery ID of the second terminal.
  • the first verification module 66 is connected to the first receiving module 62 and the first query module 64, and is configured to be configured according to Determining, by the D2D communication restriction list of the second terminal, the real ID and/or the application layer ID of the first terminal, whether the second terminal allows the first terminal to be discovered or discovered by the first terminal; the first response module 68, and the first verification module 66 Connected, set to return a first verification response, which carries the second D2D server verification result.
  • the first query module 64 queries the D2D communication restriction of the second terminal according to the discovery ID of the second terminal.
  • the first verification module 66 verifies whether the second terminal is allowed to discover or be discovered by the first terminal according to the D2D communication restriction list of the second terminal and the real ID and/or the application layer ID of the first terminal, and the second D2D service
  • the first response module 68 returns the verification result through the first verification response.
  • the identifier of the D2D service is stored on the D2D server on the network side, so that the network side can centrally store the D2D discovery verification process during the D2D communication process.
  • the problem that the network side cannot manage the identifier existing in the D2D service and performs D2D discovery verification according to the identifier in the related art is solved, and the management capability of the D2D communication service on the network side is improved.
  • a verification system for D2D communication is also provided in this embodiment, and FIG. 7 is a diagram according to an embodiment of the present invention.
  • a block diagram of a verification system for D2D communication includes a verification device 60 located at the second D2D server as shown in FIG. 6, and further includes a first D2D located in a context in which the first terminal is stored.
  • a verification device 70 of the server wherein the verification device 70 of the first D2D server includes: a second receiving module 72, configured to receive a second verification request, where the second verification request carries a discovery ID of the first terminal;
  • the query module 74 is connected to the second receiving module 72, and configured to query the real ID and/or the application layer ID of the first terminal according to the discovery ID of the first terminal; the first sending module 76, the second query module 74, and the first
  • the receiving module 62 is connected to be configured to fill the first ID and/or the application layer ID of the first terminal in the first verification request, and send the first verification request to the second D2D server.
  • the verification device 60 located in the second D2D server may further include: a third query module 82, and the first
  • the receiving module 62 is connected to be configured to query the real ID and/or the application layer ID of the second terminal according to the discovery ID of the second terminal.
  • the second sending module 84 is connected to the third query module 82 and configured to send to the first D2D server.
  • the first verification response which carries the real ID and/or the application layer ID of the second terminal; the verification device 70 located at the first D2D server may further include: a third receiving module 86, connected to the second sending module 84, configured to Receiving a first verification response; the second verification module 88 is connected to the third receiving module 86, and configured to verify whether the first terminal is allowed according to the D2D communication restriction list of the first terminal and the real ID and/or the application layer ID of the second terminal.
  • the second terminal is found or discovered by the second terminal.
  • FIG. 9 is a block diagram of a preferred structure of a verification system for D2D communication according to an embodiment of the present invention. As shown in FIG.
  • the verification device 70 located in the first D2D server may further include: a second response module 92, which may be The second verification module 88 is configured to return a second verification response to the initiator of the second verification request, where the second verification response carries the second D2D server verification result and/or the first D2D server verification result.
  • a second response module 92 which may be The second verification module 88 is configured to return a second verification response to the initiator of the second verification request, where the second verification response carries the second D2D server verification result and/or the first D2D server verification result.
  • the functions of the server include, but are not limited to, a plurality of identifiers for maintaining the terminal, obtaining a restricted list of D2D discovery or communication by the terminal, and verifying the discovered terminal according to the restriction list.
  • the functional network element may have interfaces with different network elements in different implementation manners, including but not limited to eNB, MME, PGW, and HSS, and D2D servers of other networks.
  • the main function of the interface with the HSS is to obtain a list of restrictions. But the acquisition is related to the content and the list saved by the HSS.
  • the D2D server will obtain this information. If the further HSS restriction list also contains a restricted list of different applications, that is, other application layer IDs that can communicate or discover the UE, the D2D server also obtains this information. If the current list of HSS does not contain a restricted list of different applications, the D2D server can also obtain this information directly through the background configuration or interacting with different application servers.
  • the D2D server can also download an identifier from the HSS whether to allow the D2D server to interact with other ASs, and/or an identifier with which ASs can interact.
  • the manner in which the D2D server and the HSS specifically obtain the restriction list of different applications is not described in the present invention.
  • the foregoing restriction list may include which other UEs the UE can be discovered, or which UEs the UE allows to discover.
  • the interface and the data communicated are common to different implementations and are not specifically described in the various embodiments. Moreover, other different interface functions and parameters of the interaction are described in part in the different preferred embodiments below.
  • Embodiment 1 10 is a schematic diagram of an implementation manner in which a D2D user registers with an eNB according to the first embodiment of the present invention. As shown in FIG.
  • Step S1002 The UE initiates a registration request to the D2D server by using the eNB.
  • the registration request sent by the UE to the eNB may include the temporary identifier of the UE (the identifier is the Globally Unique Temporary ID (GUTI) assigned by the MME), and the application layer identifier of the UE (if multiple applications want The D2D service may carry multiple application layer identifiers.
  • GUI Globally Unique Temporary ID
  • the application layer ID may be directly from the UE (for forwarding via the eNB, the D2D server has acquired the real identifier before acquiring the real identifier), or may be added by the MME.
  • the message may further carry a discovery identifier of the UE, where the identifier is used to identify the UE during the D2D discovery process.
  • the identifier is the only information that is allocated by the eNB in the eNB. However, in order to ensure the uniqueness of the discovery identifier, the identifier of the eNB or the cell information in which the UE is currently located may be added in addition to the foregoing information.
  • the discovery identifiers described later are all complete discovery identifiers.
  • the carrying manner of the identifier in the message of step S1002 is as follows:
  • the terminal fills in the complete discovery identifier. After receiving the eNB, the eNB does not need special processing and forwards it directly to the D2D server.
  • the terminal fills the discovery identifier assigned by the eNB, and the eNB adds the identifier of the eNB in the message after receiving the message, or the cell information in which the UE is currently located.
  • Step S1004 The D2D server finds the MME served by the D2D server according to the temporary identifier provided by the UE.
  • Step S1006 The D2D server sends an identifier request message to the MME of the UE, where the temporary identifier of the UE is carried.
  • Step S1008 The MME returns an identity response message to the D2D server, where the real identity of the UE is carried.
  • the HSS finds the subscription data of the UE according to the real identity of the UE, and the subscription data includes information such as the D2D communication restriction list of the UE.
  • Step S1014 The D2D server completes the acquisition of the UE identity, completes the registration process, and returns a registration response message to the terminal through the eNB. After the registration is completed, the ID maintained by the D2D server includes but is not limited to:
  • FIG. 11 is a schematic diagram of an embodiment of a D2D user registering through a PGW according to Embodiment 2 of the present invention. As shown in FIG. 11, the implementation manner may be applicable to different terminals completing respective processes of attaching to a network, and The UE establishes a PDN connection that can communicate with the D2D server.
  • Step S1102 The UE initiates a registration request to the D2D server on the data path.
  • the message is sent directly in the data packet manner by the UE and the PGW, where the IP address of the terminal is carried. If the PGW implements the NAT function, the PGW can replace the private network address carrying the IP with the public network address of the UE.
  • Step S1104 The server finds the PGW of the UE according to the IP address of the UE.
  • Step SI 106 The D2D server sends an identifier request message to the PGW of the UE, where the IP address of the UE is carried.
  • Step S1108 The PGW returns an identity response message to the D2D server, where the real identity of the UE is carried.
  • the discovery identifier of the UE 2.
  • the true identity of the UE 3.
  • the application identifier of the UE, the application layer ID may be directly from the UE (for forwarding via the PGW, the D2D server has acquired before obtaining the real identifier), or may be added by the PGW.
  • FIG. 12 is a schematic diagram of an embodiment of a D2D user registering through an MME according to Embodiment 3 of the present invention. As shown in FIG. 12, the implementation manner may be applicable to different terminals completing respective processes of attaching to a network, and The scenario where the MME has an interface with the D2D server. Step S1202: The UE initiates a registration request by using the eNB.
  • the application layer identifier of the UE may be included, and if multiple applications are required to communicate with the D2D service, the application layer ID may be from the terminal, may be forwarded by the MME, or may be from the UE. Add it to the MME.
  • the message may further carry a discovery identifier of the UE, where the identifier is used by the UE to identify itself during the D2D discovery process.
  • the identifier is the only information that is allocated by the eNB in the eNB. However, in order to ensure the uniqueness of the discovery identifier, the identifier of the eNB may be added to the identifier of the eNB or the cell information where the UE is currently located. Subsequent discovery identifiers are complete discovery identifiers.
  • the carrying manner of the identifier in the message in step S1202 is as follows:
  • the terminal fills in the complete discovery identifier. After receiving the eNB, the eNB does not perform special processing and forwards it directly to the D2D server. 2. The terminal fills the discovery identifier assigned by the eNB, and the eNB adds the identifier of the eNB in the message after receiving the message, or the cell information in which the UE is currently located.
  • the terminal does not fill the discovery identifier.
  • the eNB fills in the complete discovery identifier in the forwarded message.
  • the eNB finds the MME registered by the UE and forwards the request message of the UE to it.
  • the MME finds the real identity of the UE saved in the context of the UE.
  • Step S1206 The MME initiates a registration request to the D2D server, where the real identifier of the UE is carried, and the application layer identifier is used. If the discovery identifier is carried in step S1202, the identifier is also included in the message.
  • Steps S1208 ⁇ S1210 the D2D server downloads the subscription data of the user to the HSS according to the real identifier of the UE.
  • the HSS finds the subscription data of the UE according to the real identity of the UE, and the subscription data includes information such as the D2D communication restriction list of the UE.
  • Steps S1212 to S1214 the D2D server completes the acquisition of the UE identity, completes the registration process, and returns a registration response message to the terminal through the MME. If the eNB needs to directly contact the D2D server, the message of step S1214 may also carry the D2D server address registered by the UE. The information is saved after the eNB receives it. After the registration is completed, the ID maintained by the D2D server includes but is not limited to:
  • the real identity of the UE 3.
  • FIG. 13 is a schematic diagram of one embodiment of a D2D user performing authentication by an eNB according to Embodiment 4 of the present invention. As shown in FIG. 13, the embodiment may be applied to a D2D user that has completed the D2D registration process, and The way the eNB interfaces with the D2D server. The registration process can be performed by means of FIG. 10 or FIG.
  • Step S1302 The UE1 sends a D2D discovery report to the base station, where the discovery identifier of the UE2 that it discovers is carried.
  • Step S1304 The base station acquires the D2D server 2 serving the UE2 according to the discovery identifier of the UE2, and sends an authentication request to the D2D server, where the base station carries the discovery ID of the UE1 and the discovery identifier of the UE2.
  • Step S1306 The D2D server 2 queries the D2D server 1 serving the UE1 according to the discovery identifier of the UE1 carried in the request, and queries the context of the UE2 according to the discovery identifier of the UE2.
  • step S1308 the D2D server 2 sends an authentication request to the D2D server 1, which carries the discovery identifier of the UE1, the real identity of the UE2, and the application identifier of the UE2.
  • step S1310 the D2D server 1 finds the context of the UE1 according to the discovery ID of the UE1, and according to
  • the real identity and or application identity of UE2 checks if it is in the list of allowed or discovered by UE1.
  • the D2D server 1 returns a verification result to the D2D server 2, where the UE1 is allowed to discover or be discovered by the UE2. It can also carry the real identity of UE1, the application identifier of UE1.
  • the D2D server 2 queries the context of the UE2, and checks whether it is in the list of allowed or discovered by the UE2 according to the real identity and/or the application identifier of the UE1.
  • step S1316 the D2D server 2 returns a verification result to the base station, where the UE1 is allowed to discover or be discovered by the UE2, and whether the UE2 is allowed to discover or be discovered by the UE1.
  • the base station may also select to initiate an authentication request to the D2D server of UE1, after which the D2D server 1 initiates a verification request to the D2D server 2. The process is similar to this, in which the base station only needs to initiate a request to a D2D server.
  • Step S1318 The base station separately sends an authentication report to the two terminals according to the verification result, and the notification is discovered by another terminal, or whether another terminal is allowed to be discovered.
  • FIG. 14 is a schematic diagram of Embodiment 2 of a D2D user performing authentication by an eNB according to Embodiment 5 of the present invention. As shown in FIG. 14, the embodiment may be applied to a D2D user that has completed the D2D registration process, and The way the eNB interfaces with the D2D server. The registration process can be performed by means of FIG. 10 or FIG.
  • Step S1402 The UE2 sends a D2D discovery report to the base station, where the discovery identifier of the UE1 that it discovers is carried.
  • Steps S1404 to S1410 are similar to steps S1304 to S1310, and are not described herein.
  • Step S1412 the D2D server 1 returns a verification result to the D2D server 2, where the UE1 is allowed to discover or be discovered by the UE2.
  • Step S1414 the D2D server 2 returns a verification result to the base station, where the UE1 is allowed to discover or be discovered by the UE2.
  • the process may be that one terminal sends a D2D discovery report trigger, or two terminals respectively send a discovery report trigger.
  • a terminal trigger is taken here as an example of UE2 triggering, and UE1 triggering is also a similar process. If it is a terminal trigger, the base station may also go to the D2D server 1 to initiate verification, and the D2D server 1 may go to the D2D server 2 to initiate verification, and obtain a result of whether the UE2 allows to discover the UE1 or be discovered by the UE1, similar to the above steps S1404 to S1414.
  • Step S1416 The base station separately sends an authentication report to the two terminals according to the verification result, and the notification is discovered by another terminal, or whether another terminal is allowed to be discovered. For cases that are not allowed, the message can also be omitted, ie no notification.
  • step S1502 the UE1 initiates an authentication request to the D2D server on the data path, where the UE2's discovery identifier, and the IP address or discovery identifier or application identifier of the UE1 are carried.
  • the latter is mainly used as a cable bow
  • the message is sent directly in the form of a packet at the UE and the PGW.
  • the PGW implements the NAT function and the above message carries the IP address of the UE1, the PGW needs to replace the private network address carrying the IP with the public network address of the UE1.
  • the D2D server 1 queries the D2D server 2 serving the UE2 according to the discovery identifier of the UE2 carried in the request, and queries the context of the UE1 according to the IP address or the discovery identifier or the application identifier of the UE1.
  • Step S1506 The D2D server 1 sends an authentication request to the D2D server 2, where the discovery identifier of the UE2, the real identity of the UE1, and the application identifier of the UE1 are carried.
  • the D2D server 1 finds the context of the UE2 according to the discovery ID of the UE2, and according to
  • the real identity and/or application identity of UE1 checks if it is in the list of UE2's allowed discovery or discovery.
  • the D2D server 2 returns a verification result to the D2D server 1, which carries whether the UE2 is allowed to discover the UE1 or is discovered by the UE1. It can also carry the real identity of UE2, the application identifier of UE2.
  • the D2D server 1 queries the context of the UE1, and checks whether it is in the list of allowed discovery or discovery of the UE1 according to the real identity and or the application identifier of the UE2.
  • step S1514 the D2D server 1 returns a verification result to the UE1 through the data path, that is, whether the UE2 is in the list of allowed or discovered by the UE1.
  • step S1516 the D2D server 2 returns a verification result to the UE2 through the data path, that is, whether the UE1 is in the list of allowed or discovered by the UE2.
  • the process may be that one terminal sends a D2D discovery report trigger, or two terminals respectively send a discovery report trigger.
  • One terminal triggering here is an example of UE1 triggering, and UE2 triggering is also a similar process.
  • FIG. 16 is a schematic diagram of Embodiment 2 of a D2D user performing verification by a PGW according to Embodiment 7 of the present invention.
  • the embodiment may be applied to a D2D user that has completed the D2D registration process, and The way the PGW interfaces with the D2D server.
  • the registration process can be performed in the manner of FIG.
  • Steps S1602 to S1608 are similar to steps S1502 to S1508, and are not described again.
  • Step S1610 The D2D server 2 returns a verification result to the D2D server 1, where the UE2 is allowed to discover or be discovered by the UE1.
  • Step S1612 the D2D server 1 returns a verification result to the UE1 through the data path, that is, whether the UE2 is in the list of allowed or discovered by the UE1.
  • the process needs to be triggered by two terminals sending discovery reports.
  • UE1 triggering and UE2 triggering is a similar process.
  • the subsequent UE2 verification process requires the UE2 to initiate the D2D server 2, and the D2D server 2 goes to the D2D server 1 authentication process, thereby obtaining whether the UE1 allows the UE2 to be discovered or the UE2 to discover the result, similar to the above steps S1602 and S1612.
  • FIG. 17 is a schematic diagram of one embodiment of a D2D user performing authentication by using an MME according to Embodiment 8 of the present invention.
  • the embodiment may be applicable to a D2D user that has completed the D2D registration process, and the MME and the D2D are adopted.
  • the registration process can be performed by the method of FIG.
  • Step S1702 The UE1 sends a D2D discovery report to the base station, where the discovery identifier of the UE2 that it discovers is carried.
  • Step S1704 The base station sends an authentication request to the MME1 of the UE1, where the discovery identifier of the UE2 that it discovers is carried.
  • step S1706 the MME1 sends an authentication request to the D2D server 1 of the UE1.
  • the UE carries the real identity or the discovery identifier of the UE1, and the UE2 discovers the identifier.
  • step S1708 the D2D server 1 queries the D2D server 2 serving the UE2 according to the discovery identifier of the UE2 carried in the request, and queries the context of the UE1 according to the real identity or the discovery identifier of the UE1.
  • Step S1710 The D2D server 1 sends an authentication request to the D2D server 2, where the discovery identifier of the UE2, the real identity of the UE1, and the application identifier of the UE1 are carried.
  • Step S1712 the D2D server 1 finds the context of the UE2 according to the discovery ID of the UE2, and according to
  • the real identity and or application identity of UE1 is checked to see if it is in the list of allowed or discovered by UE2.
  • Step S1714 the D2D server 2 returns a verification result to the D2D server 1, which carries whether the UE2 is allowed to discover or be discovered by the UE1. It can also carry the real identity of UE2, the application identifier of UE2.
  • Step S1716 the D2D server 1 queries the context of the UE1, and checks whether it is in the list of allowed or discovered by the UE1 according to the real identity and or the application identifier of the UE2.
  • Step S1718 The D2D server 1 returns an authentication response to the base station by using the MME1, where the UE1 is allowed to discover the UE2 or is discovered by the UE2, and whether the UE2 allows the UE1 to be discovered or discovered by the UE1.
  • the base station may also select to initiate an authentication request to the MME2 of the UE2, after which the MME2 initiates an authentication request to the D2D server 2, and the D2D server 2 initiates a verification request to the D2D server 1.
  • the process is similar to this, in which the base station only needs to initiate a request to a D2D server.
  • Step S1720 The base station separately sends a verification report to the two terminals according to the verification result, and the notification is discovered by another terminal, or whether another terminal is allowed to be discovered. For cases that are not allowed, the message can also be omitted, ie no notification.
  • the process may be that one terminal sends a D2D discovery report trigger, or two terminals respectively send a discovery report trigger.
  • One terminal triggering here is an example of UE1 triggering, and UE2 triggering is also a similar process.
  • FIG. 18 is a schematic diagram of Embodiment 2 of a D2D user performing authentication by an MME according to Embodiment 9 of the present invention. As shown in FIG.
  • Step S 1802 to S1812 are similar to steps S 1702 to S1712 and will not be described again.
  • Step S1814 the D2D server 2 returns a verification result to the D2D server 1, which carries whether the UE2 is allowed to discover the UE1 or is discovered by the UE1.
  • Step S1816 the D2D server 1 returns an authentication response to the base station through the MME1, where the UE2 allows the UE1 to be discovered or discovered by the UE1.
  • the process may be that one terminal sends a D2D discovery report trigger, or two terminals respectively send a discovery report trigger.
  • One terminal triggering here is an example of UE1 triggering, and UE2 triggering is also a similar process. If it is a terminal trigger, the base station also needs to go to the D2D server 2 to initiate verification through the MME2, and the D2D server 2 needs to go to the D2D server 1 to initiate verification, and obtain whether the UE1 allows the discovery of the UE2 or the result discovered by the UE2, and the above steps S1804 and S1816 similar.
  • Step S1818 The base station separately sends an authentication report to the two terminals according to the verification result, and the notification is discovered by another terminal, or whether another terminal is allowed to be discovered.
  • the message can also be omitted, ie no notification.
  • software is also provided for performing the technical solutions described in the above embodiments and preferred embodiments.
  • a storage medium is also provided, the software being stored, including but not limited to an optical disk, a floppy disk, a hard disk, a rewritable memory, and the like.
  • Industrial Applicability As described above, the D2D communication management and verification scheme provided by the embodiment of the present invention has the following beneficial effects: The D2D server is used to obtain the real ID and/or the application layer ID of the terminal, and the D2D communication restriction list of the terminal.
  • the D2D server is used for D2D discovery verification; the D2D server restricts the D2D communication restriction list of the terminal, and the real ID and/or the application layer ID are stored, thereby improving the management capability of the network side for the D2D communication service.
  • the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种D2D通信的管理和校验方法、装置及系统,其中,该管理方法包括:D2D服务器获取终端的真实ID和/或应用层ID,以及终端的D2D通信限制列表,其中,该D2D服务器用于D2D发现验证;D2D服务器对终端的D2D通信限制列表,以及真实ID和/或应用层ID进行存储。通过本发明,解决了相关技术中网络侧无法管理D2D业务中存在的标识的问题,提升了网络侧对D2D通信业务的管理能力。

Description

设备到设备通信的管理和校验方法、 装置及系统 技术领域 本发明涉及通信领域, 具体而言, 涉及一种设备到设备 (Device to Device, 简称 为 D2D) 通信的管理和校验方法、 装置及系统。 背景技术 为了保持第三代移动通信系统在通信领域的竞争力, 为用户提供速率更快、 时延 更低、 更加个性化的移动通信服务, 同时, 降低运营商的运营成本, 第三代合作伙伴 计划(3rd Generation Partnership Project, 简称为 3GPP)标准工作组正致力于演进分组 系统(Evolved Packet System, 简称为 EPS) 的研究。 图 1是根据相关技术的演进分组 域系统的架构示意图, 如图 1所示, 整个 EPS系统分为无线接入网和核心网两部分。 在核心网中, 包含了归属用户服务器(Home Subscriber Server, 简称为 HSS)、 移动性 管理实体(Mobility Management Entity,简称为 MME)、服务通用无线分组业务(General Packet Radio Service, 简称为 GPRS) 支持节点 (Serving GPRS Support Node, 简称为 SGSN)、 策略计费规则功能(Policy and Charging Rule Function, 简称为 PCRF)、 服务 网关(Serving Gateway,简称为 S-GW)、分组数据网关(PDN Gateway,简称为 P-GW) 和分组数据网络 (Packet Data Network, 简称为 PDN)。 下面详细各部分功能: 归属用户服务器 (HSS), 包含了归属位置寄存器 (Home Location Register, 简称 为 HLR) 的所有功能, 是用户签约数据的永久存放地点, 位于用户签约的归属网。 移动性管理实体, 是用户签约数据在当前网络的存放地点, 负责终端到网络的非 接入层信令管理、 终端的安全验证功能、 终端的移动性管理、 用户空闲模式下的跟踪 和寻呼管理功能和承载管理。 服务 GPRS支持节点 (Serving GPRS Support Node, 简称为 SGSN), 是 GERAN 和 UTRAN用户接入核心网络的业务支持点, 功能上与移动性管理实体类似, 负责用 户的位置更新、 寻呼管理和承载管理等功能。 服务网关, 是核心网到无线系统的网关, 负责终端到核心网的用户面承载、 终端 空闲模式下的数据缓存、 网络侧发起业务请求的功能、 合法监听和分组数据路由和转 发功能; 服务网关负责统计用户终端使用无线网的情况, 并产生终端使用无线网的话 单, 传送给计费网关。 分组数据网关, 是演进系统和该系统外部分组数据网络的网关, 它连接到因特网 和分组数据网络上, 负责终端的互联网协议(Internet Protocol, 简称为 IP)地址分配、 计费功能、 分组包过滤、 策略控制等功能。
GPRS网关支持节点 (Gateway GPRS Support Node, 简称为 GGSN), 支持 GPRS 网络的边缘路由功能, 即 GGSN负责将 GPRS网络的数据进行路由转发, 并通过防火 墙和过滤功能来保护 GPRS网络数据的完整性。 GGSN还具有计费功能。
PGW包含了 GGSN的全部功能, 即可认为 GGSN作为 PGW的一个子功能, 内 嵌在 PGW内。 因此 SGSN可以直接和 PGW连接, 使用 Gn/Gp接口。 分组数据网络, 是运营商的 IP业务网络, 该网络通过运营商的核心网为用户提供 IP服务。 策略计费规则功能实体, 是演进系统中负责提供计费控制、 在线信用控制、 门限 控制、 服务质量 (Quality of Service, 简称为 QoS) 策略方面规则的服务器。 无线接入网, 是由演进基站 (E-UTRAN NodeB, 简称为 eNB)和 3G无线网络控 制器 (Radio Network Control, 简称为 RNC) 组成, 它主要负责无线信号的收发, 通 过空中接口和终端联系, 管理空中接口的无线资源、 资源调度、 接入控制。 当两个终端通过 EPS网络进行通信时, 两个终端需要分别 EPS建立承载。但是考 虑到智能终端以及各种移动互联网业务的快速发展, 很多业务希望能够发现临近的朋 友并且进行通信, 因此催生了 D2D (Device to Device) 业务。 图 2是根据相关技术的 支持 D2D功能的终端进行通信的示意图, 如图 2所示, 当两个终端位置比较接近的时 候, 两个终端可以直接通信, 其连接的数据路径可以不绕回到核心网, 一方面减少数 据路由的迂回, 另一方面也减少了网络数据负荷, 因此得到了很多运营商的重视。 在 D2D业务使用当中, 并不是所有的距离较近的用户都可以相互进行通信, 用户 可以通过设定一些规则, 来保证自己的私密性, 例如用户可以设定自己是否可以被他 人发现、是否可以被特定的用户发现、、 是否可以发现特定的用户等等。 而这些验证需 要在网络侧基于某些标识来协助终端完成。 而在 D2D业务中, 存在多种不同的标识, 并且在 D2D通信中, 这些标识并不会经过网络侧, 因此网络侧如何管理这些不同的标 识、 并根据哪些用户标识对终端进行校验和管理, 在相关技术中都不明确。 针对相关技术中网络侧无法管理 D2D业务中存在的标识的问题, 目前尚未提出有 效的解决方案。 发明内容 本发明提供了一种 D2D通信的管理和校验方案,以至少解决相关技术中网络侧无 法管理 D2D业务中存在的标识的问题。 根据本发明的一个方面, 提供了一种 D2D通信的管理方法, 包括: D2D服务器 获取终端的真实 ID和 /或应用层 ID, 以及所述终端的 D2D通信限制列表, 其中, 所述 D2D服务器用于 D2D发现验证; 所述 D2D服务器对所述终端的 D2D通信限制列表, 以及真实 ID和 /或应用层 ID进行存储。 优选地, D2D服务器获取所述终端的 D2D通信限制列表包括: 所述 D2D服务器 根据所述真实 ID和 /或应用层 ID获取所述终端的 D2D通信限制列表。 优选地, 所述 D2D服务器根据所述真实 ID和 /或应用层 ID获取所述终端的 D2D 通信限制列表包括: 所述 D2D服务器从所述终端的 MME中获取所述真实 ID和 /或应 用层 ID对应的 D2D通信限制列表; 或者, 所述 D2D服务器根据所述真实 ID和 /或应 用层 ID向 HSS/ HLR下载所述用户的签约数据, 其中, 所述签约数据中包含所述终端 的 D2D通信限制列表; 或者, 所述 D2D服务器根据所述真实 ID和 /或应用层 ID向应 用服务器下载所述用户的 D2D通信限制列表。 优选地, 在所述 D2D服务器根据所述真实 ID和 /或应用层 ID向应用服务器下载 所述用户的 D2D通信限制列表之前, 还包括: 所述 D2D服务器根据签约数据中是否 允许向所述应用服务器下载所述终端的 D2D通信限制列表,判断是否需要向所述应用 服务器下载所述终端的 D2D通信限制列表。 优选地, D2D服务器获取终端的真实 ID和 /或应用层 ID包括: 所述 D2D服务器 从所述终端的 MME或者 PGW获取所述终端的所述真实 ID和 /或应用层 ID。 优选地, 所述 D2D服务器从所述终端的 MME获取所述终端的所述真实 ID和 /或 应用层 ID包括: 所述 D2D服务器接收来自所述 MME的注册请求, 其中, 所述注册 请求中携带所述终端的所述真实 ID和 /或应用层 ID。 优选地, 所述 D2D服务器从所述终端的 MME获取所述终端的所述真实 ID和 /或 应用层 ID包括: 所述 D2D服务器根据所述终端的临时标识向所述终端的服务 MME 发起标识请求消息, 其中, 所述临时标识为所述 MME为所述终端分配的 GUTI; 所述 D2D服务器接收来自所述 MME的标识响应消息, 其中, 所述标识响应消息中携带有 所述终端的所述真实 ID和 /或应用层 ID。 优选地, 所述 D2D服务器从所述终端的 PGW获取所述终端的所述真实 ID和 /或 应用层 ID包括: 所述 D2D服务器根据所述终端的 IP地址向所述终端的 PGW发起标 识请求消息; 所述 D2D服务器接收来自所述 PGW的标识响应消息, 其中, 所述标识 响应消息中携带有所述终端的所述真实 ID和 /或应用层 ID。 优选地, 所述方法还包括: 所述 D2D服务器获取所述终端的发现 ID, 其中, 所 述发现 ID用于在所述 D2D服务器查找所述终端的 D2D通信限制列表; 所述 D2D服 务器对所述发现 ID进行存储。 优选地, 所述终端的发现 ID包括以下至少之一: 所述终端填充完整的发现 ID; 所述终端填充基站分配的发现 ID, 并由基站在转发过程中填充所述基站的 ID或者所 述 UE当前所在小区 ID; 所述基站填充完整的发现 ID。 根据本发明的另一方面, 提供了一种 D2D通信的校验方法, 包括: 第二 D2D服 务器接收第一验证请求, 其中, 所述第一验证请求中携带第一终端的真实 ID和 /或应 用层 ID, 以及第二终端的发现 ID, 所述第二 D2D服务器中保存有所述第二终端的上 下文;所述第二 D2D服务器根据所述第二终端的发现 ID查询所述第二终端的 D2D通 信限制列表; 所述第二 D2D服务器根据所述第二终端的 D2D通信限制列表和所述第 一终端的真实 ID和 /或应用层 ID验证所述第二终端是否允许发现所述第一终端或者被 所述第一终端发现;所述第二 D2D服务器返回第一验证响应,其中携带所述第二 D2D 服务器验证结果。 优选地, 在第二 D2D服务器接收第一验证请求之前, 还包括: 第一 D2D服务器 接收第二验证请求, 其中, 所述第二验证请求中携带第一终端的发现 ID, 所述第一 D2D服务器中保存有所述第一终端的上下文; 所述第一 D2D服务器根据所述第一终 端的发现 ID查询所述第一终端的真实 ID和 /或应用层 ID; 所述第一 D2D服务器在所 述第一验证请求中填充第一终端的真实 ID和 /或应用层 ID, 并将所述第一验证请求发 送给所述第二 D2D服务器。 优选地, 所述第一 D2D服务器接收第二验证请求包括: 所述第一 D2D服务器接 收来自所述第一终端或第二终端的服务基站 /PGW/MME的第二验证请求。 优选地, 在第二 D2D服务器接收第一验证请求之后, 还包括: 所述第二 D2D服 务器根据所述第二终端的发现 ID查询所述第二终端的真实 ID和 /或应用层 ID; 所述 第二 D2D服务器向所述第一 D2D服务器发送第一验证响应, 其中携带所述第二终端 的真实 ID和 /或应用层 ID; 所述第一 D2D服务器根据第一终端的 D2D通信限制列表 和所述第二终端的真实 ID和 /或应用层 ID验证所述第一终端是否允许发现所述第二终 端或者被所述第二终端发现。 优选地, 在所述第一 D2D服务器根据第一终端的 D2D通信限制列表和所述第二 终端的真实 ID和 /或应用层 ID判断所述第一终端是否允许发现所述第二终端或者被所 述第二终端发现之后, 还包括: 所述第一 D2D服务器向所述第二验证请求的发起方返 回第二验证响应, 其中, 所述第二验证响应中携带有所述第二 D2D服务器验证结果和 /或第一 D2D服务器验证结果。 优选地,所述第一 D2D服务器向所述第二验证请求的发起方返回第二验证响应包 括: 所述第一 D2D 服务器向所述第一或者第二终端的服务基站返回所述第二验证响 应; 或者,所述第一 D2D服务器通过 PGW向第一终端返回所述第二验证响应; 或者, 所述第一 D2D服务器通过 MME向所述第一终端的服务基站返回所述第二验证响应。 优选地,所述第一 D2D服务器向所述第一终端或者第二终端的服务基站返回第二 验证响应, 还包括: 所述基站根据所述第二验证响应向所述第一终端和 /或第二终端发 送发现列表。 根据本发明的再一方面, 提供了一种 D2D通信的管理装置, 位于用于 D2D发现 验证的 D2D服务器中, 包括: 获取模块, 设置为获取终端的真实 ID和 /或应用层 ID, 以及所述终端的 D2D通信限制列表; 存储模块, 设置为对所述终端的 D2D通信限制 列表, 以及真实 ID和 /或应用层 ID进行存储。 根据本发明的再一方面, 还提供了一种 D2D通信的校验装置, 位于第二 D2D服 务器中, 包括: 第一接收模块, 设置为接收第一验证请求, 其中, 所述第一验证请求 中携带第一终端的真实 ID和 /或应用层 ID, 以及第二终端的发现 ID, 所述第二 D2D 服务器中保存有所述第二终端的上下文; 第一查询模块, 设置为根据所述第二终端的 发现 ID查询所述第二终端的 D2D通信限制列表; 第一验证模块, 设置为根据所述第 二终端的 D2D通信限制列表和所述第一终端的真实 ID和 /或应用层 ID验证所述第二 终端是否允许发现所述第一终端或者被所述第一终端发现; 第一响应模块, 设置为返 回第一验证响应, 其中携带所述第二 D2D服务器验证结果。 根据本发明的还一方面, 提供了一种 D2D 通信的校验系统, 包括上述位于第二 D2D服务器的校验装置, 还包括位于第一 D2D服务器的校验装置, 其中, 所述第一 D2D服务器的校验装置包括: 第二接收模块, 设置为接收第二验证请求, 其中, 所述 第二验证请求中携带第一终端的发现 ID, 所述第一 D2D服务器中保存有所述第一终 端的上下文;第二查询模块,设置为根据所述第一终端的发现 ID查询所述第一终端的 真实 ID和 /或应用层 ID; 第一发送模块, 设置为在所述第一验证请求中填充第一终端 的真实 ID和 /或应用层 ID, 并将所述第一验证请求发送给所述第二 D2D服务器。 优选地, 所述位于第二 D2D服务器的校验装置还包括: 第三查询模块, 设置为根 据所述第二终端的发现 ID查询所述第二终端的真实 ID和 /或应用层 ID; 第二发送模 块, 设置为向所述第一 D2D服务器发送第一验证响应, 其中携带所述第二终端的真实 ID和 /或应用层 ID; 所述位于第一 D2D服务器的校验装置还包括: 第三接收模块, 设 置为接收所述第一验证响应; 第二验证模块, 设置为根据第一终端的 D2D通信限制列 表和所述第二终端的真实 ID和 /或应用层 ID验证所述第一终端是否允许发现所述第二 终端或者被所述第二终端发现。 优选地, 所述位于第一 D2D服务器的校验装置还包括: 第二响应模块, 设置为向 所述第二验证请求的发起方返回第二验证响应, 其中, 所述第二验证响应中携带有所 述第二 D2D服务器验证结果和 /或第一 D2D服务器验证结果。 通过本发明, 采用 D2D服务器获取终端的真实 ID和 /或应用层 ID, 以及终端的 D2D通信限制列表, 其中, 该 D2D服务器用于 D2D发现验证; D2D服务器对终端的 D2D通信限制列表, 以及真实 ID和 /或应用层 ID进行存储的方式,解决了相关技术中 网络侧无法管理 D2D业务中存在的标识的问题, 提升了网络侧对 D2D通信业务的管 理能力。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图 中- 图 1是根据相关技术的演进分组域系统的架构示意图; 图 2是根据相关技术的支持 D2D功能的终端进行通信的示意图; 图 3是根据本发明实施例的 D2D通信的管理方法的流程图; 图 4是根据本发明实施例的 D2D通信的管理装置的结构框图; 图 5是根据本发明实施例的 D2D通信的校验方法的流程图; 图 6是根据本发明实施例的 D2D通信的校验装置的结构框图; 图 Ί是根据本发明实施例的 D2D通信的校验系统的结构框图; 图 8是根据本发明实施例的 D2D通信的校验系统的优选结构框图一; 图 9是根据本发明实施例的 D2D通信的校验系统的优选结构框图二; 图 10是根据本发明实施例一的 D2D用户通过 eNB进行注册的实施方式的示意图; 图 11是根据本发明实施例二的 D2D用户通过 PGW进行注册的实施方式的示意 图; 图 12是根据本发明实施例三的 D2D用户通过 MME进行注册的实施方式的示意 图; 图 13是根据本发明实施例四的 D2D用户通过 eNB进行验证的实施方式之一的示 意图; 图 14是根据本发明实施例五的 D2D用户通过 eNB进行验证的实施方式之二的示 意图; 图 15是根据本发明实施例六的 D2D用户通过 PGW进行验证的实施方式之一的 示意图; 图 16是根据本发明实施例七的 D2D用户通过 PGW进行验证的实施方式之二的 示意图; 图 17是根据本发明实施例八的 D2D用户通过 MME进行验证的实施方式之一的 示意图; 图 18是根据本发明实施例九的 D2D用户通过 MME进行验证的实施方式之二的 示意图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在不冲突的 情况下, 本申请中的实施例及实施例中的特征可以相互组合。 在本实施例中, 提供了一种 D2D通信的管理方法, 图 3是根据本发明实施例的 D2D通信的管理方法的流程图, 如图 3所示, 该方法包括如下步骤: 步骤 S302, D2D服务器获取终端的真实标识 (ID) 和 /或应用层 ID, 以及终端的 D2D通信限制列表, 其中, 该 D2D服务器用于 D2D发现验证; 步骤 S304, D2D服务器对终端的 D2D通信限制列表, 以及真实 ID和 /或应用层 ID进行存储。 本实施例通过上述步骤, 在网络侧设置了用于 D2D发现验证的 D2D服务器, 在
D2D服务器获取到终端的真实 ID (例如, IMSI/MSISDN号码)和 /或应用层 ID, 以及 终端的 D2D通信限制列表之后, D2D服务器对终端的上述真实 ID和 /或应用层 ID, 以及终端的 D2D通信限制列表进行存储, 由于将 D2D业务存在的标识存储在网络侧 的 D2D服务器上, 使得网络侧在 D2D通信过程中能够实现对标识的集中管理, 解决 了相关技术中网络侧无法管理 D2D业务中存在的标识的问题, 提升了网络侧对 D2D 通信业务的管理能力。 作为一种优选实施方式, D2D服务器可以根据上述真实 ID和 /或应用层 ID获取终 端的 D2D通信限制列表。 例如, D2D服务器可以从终端的 MME中获取真实 ID和 / 或应用层 ID对应的 D2D通信限制列表; 或者, D2D服务器也可以根据真实 ID和 /或 应用层 ID 向 HSS/HLR下载用户的签约数据, 其中, 该签约数据中包含终端的 D2D 通信限制列表;或者, D2D服务器还可以根据真实 ID和 /或应用层 ID向应用服务器下 载该用户的 D2D通信限制列表。 通过这种方式, 提升了 D2D服务器获取终端的 D2D 通信限制列表的灵活性。 优选地,在 D2D服务器根据真实 ID和 /或应用层 ID向应用服务器下载用户的 D2D 通信限制列表之前, D2D服务器可以根据签约数据中是否允许向应用服务器下载终端 的 D2D通信限制列表,来判断是否需要向应用服务器下载终端的 D2D通信限制列表, 例如, 在签约数据中允许向应用服务器下载终端的 D2D通信限制列表的情况下, 则可 以向应用服务器下载, 否则, 可以不向应用服务器进行下载, 而是采用其他方式。 优选地, D2D服务器可以从终端的 MME或者 PGW获取终端的真实 ID和 /或应 用层 ID。 其中, 应用层 ID可能是由 UE加入, 并通过 MME或者 PGW的路径传输到 D2D服务器, 或者也可能是 MME或者 PGW自行添加。 优选地, 从终端的 MME获取终端的真实 ID和 /或应用层 ID的方式可以为: D2D 服务器接收来自 MME的注册请求, 其中, 该注册请求中携带终端的真实 ID和 /或应 用层 ID。 或者, 也可以为: D2D服务器根据终端的临时标识向终端的服务 MME发起 标识请求消息, 其中, 该临时标识为 MME为终端分配的全球唯一临时标识(GUTI); D2D服务器接收来自 MME的标识响应消息, 其中, 该标识响应消息中携带有终端的 真实 ID和 /或应用层 ID。 优选地, 从终端的 PGW获取终端的真实 ID和 /或应用层 ID的方式可以为: D2D 服务器根据终端的 IP地址向终端的 PGW发起标识请求消息; D2D服务器接收来自 PGW的标识响应消息,其中,该标识响应消息中携带有终端的真实 ID和 /或应用层 ID。 作为一种优选实施方式, D2D服务器还可以获取终端的发现 ID,并且对该发现 ID 进行存储,其中,该发现 ID用于在 D2D服务器查找终端的 D2D通信限制列表。当然, 也可以用真实 ID和 /或应用层 ID查找终端的 D2D通信限制列表。 优选地, 终端的发现 ID可以是由终端直接填充完整; 或者, 也可以由终端填充基 站分配的发现 ID,并由基站在转发过程中填充基站的 ID或者 UE当前所在小区的 ID; 或者, 还可以由基站直接填充完整。 对应于上述 D2D通信的管理方法, 在本实施例中提供了一种设备到设备 D2D通 信的管理装置, 位于用于 D2D发现验证的 D2D服务器中, 该装置用于实现上述实施 例及优选实施方式, 已经进行过说明的不再赘述。 如以下所使用的, 术语"模块"可以 实现预定功能的软件和 /或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来 实现, 但是硬件, 或者软件和硬件的组合的实现也是可能并被构想的。 图 4是根据本发明实施例的 D2D通信的管理装置的结构框图, 如图 4所示, 该装 置包括: 获取模块 42和存储模块 44, 下面对各个模块进行详细说明。 获取模块 42, 设置为获取终端的真实 ID和 /或应用层 ID, 以及终端的 D2D通信 限制列表; 存储模块 44, 与获取模块 42相连, 设置为对获取模块 42获取到的终端的 D2D通信限制列表, 以及真实 ID和 /或应用层 ID进行存储。 本实施例通过上述模块, 在网络侧设置了用于 D2D发现验证的 D2D服务器, 在 D2D服务器的获取模块 42获取到终端的真实 ID (例如, IMSI/MSISDN号码) 和 /或 应用层 ID, 以及终端的 D2D通信限制列表之后, D2D服务器的存储模块 44对终端的 上述真实 ID和 /或应用层 ID, 以及终端的 D2D通信限制列表进行存储, 由于将 D2D 业务存在的标识存储在网络侧的 D2D服务器上, 使得网络侧在 D2D通信过程中能够 实现对标识的集中管理,解决了相关技术中网络侧无法管理 D2D业务中存在的标识的 问题, 提升了网络侧对 D2D通信业务的管理能力。 在本实施例中还提供了一种设备到设备 D2D通信的校验方法,图 5是根据本发明 实施例的 D2D通信的校验方法的流程图, 如图 5所示, 该方法包括如下步骤: 步骤 S502, 第二 D2D服务器接收第一验证请求, 其中, 第一验证请求中携带第 一终端的真实 ID和 /或应用层 ID, 以及第二终端的发现 ID, 第二 D2D服务器中保存 有第二终端的上下文; 步骤 S504, 第二 D2D服务器根据第二终端的发现 ID查询第二终端的 D2D通信 限制列表; 步骤 S506, 第二 D2D服务器根据第二终端的 D2D通信限制列表和第一终端的真 实 ID和 /或应用层 ID验证第二终端是否允许发现第一终端或者被第一终端发现; 步骤 S508, 第二 D2D服务器返回第一验证响应, 其中携带第二 D2D服务器验证 结果。 本实施例通过上述步骤, 网络侧的第二 D2D服务器接收到第一验证请求后, 根据 其中的第二终端的发现 ID查询第二终端的 D2D通信限制列表,并根据第二终端的 D2D 通信限制列表和第一终端的真实 ID和 /或应用层 ID验证第二终端是否允许发现第一终 端或者被第一终端发现, 第二 D2D 服务器再将上述验证的结果通过第一验证响应返 回, 由于将 D2D业务存在的标识存储在网络侧的 D2D服务器上, 使得网络侧在 D2D 通信过程中能够对 D2D发现验证过程进行集中管理,解决了相关技术中网络侧无法管 理 D2D业务中存在的标识并根据该标识进行 D2D发现验证的问题, 提升了网络侧对 D2D通信业务的管理能力。 优选地, 第一验证请求可以是由第一 D2D服务器发送给第二 D2D服务器的, 例 如, 第一 D2D服务器接收第二验证请求, 该第二验证请求中携带第一终端的发现 ID, 其中该第一 D2D服务器中保存有第一终端的上下文; 第一 D2D服务器根据第一终端 的发现 ID查询第一终端的真实 ID和 /或应用层 ID; 第一 D2D服务器在第一验证请求 中填充第一终端的真实 ID和 /或应用层 ID,并将第一验证请求发送给第二 D2D服务器。 本文中的 "第一" "第二"仅仅用于描述方便, 并不包含其他特殊含义或作为对顺序的 限定。 并且, 本文中的第一 D2D服务器与第二 D2D服务器可以是同一个服务器, 也 可以是不同的服务器, 可以是物理分离的不同设备, 也可以是在同一物理设备中。 优选地,第一 D2D服务器接收的第二验证请求可以来自第一终端或第二终端的服 务基站 / PGW/MME。 优选地, 在第二 D2D服务器接收到第一验证请求之后, 第二 D2D服务器可以根 据第二终端的发现 ID查询第二终端的真实 ID和 /或应用层 ID, 并将查询结果通过第 一验证响应发送给第一 D2D服务器;第一 D2D服务器根据第一终端的 D2D通信限制 列表和第二终端的真实 ID和 /或应用层 ID验证第一终端是否允许发现第二终端或者被 第二终端发现。 优选地,第一 D2D服务器可以将第一终端是否允许发现第二终端或者被第二终端 发现的验证结果, 和 /或第二 D2D服务器验证结果, 通过第二验证响应返回给第二验 证请求的发起方。 优选地,第一 D2D服务器向第二验证请求的发起方返回第二验证响应的方式可以 是: 第一 D2D服务器向第一或者第二终端的服务基站返回第二验证响应; 或者, 第一 D2D服务器通过 PGW向第一终端返回第二验证响应; 或者, 第一 D2D服务器通过 MME向第一终端的服务基站返回第二验证响应。 优选地,在第一 D2D服务器向第一终端或者第二终端的服务基站返回第二验证响 应的情况下, 基站还可以根据第二验证响应向第一终端和 /或第二终端发送发现列表。 对应于上述 D2D通信的校验方法, 在本实施例中还提供了一种 D2D通信的校验 装置, 位于保存有第二终端的上下文的第二 D2D服务器中, 该装置用于实现上述实施 例及优选实施方式, 已经进行过说明的不再赘述。 如以下所使用的, 术语"模块"可以 实现预定功能的软件和 /或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来 实现, 但是硬件, 或者软件和硬件的组合的实现也是可能并被构想的。 图 6是根据本发明实施例的 D2D通信的校验装置的结构框图, 如图 6所示, 该装 置包括: 第一接收模块 62、 第一查询模块 64、 第一验证模块 66和第一响应模块 68, 下面对各个模块进行详细说明。 第一接收模块 62, 设置为接收第一验证请求, 其中, 该第一验证请求中携带第一 终端的真实 ID和 /或应用层 ID, 以及第二终端的发现 ID; 第一查询模块 64, 与第一 接收模块 62相连,设置为根据第二终端的发现 ID查询第二终端的 D2D通信限制列表; 第一验证模块 66, 与第一接收模块 62和第一查询模块 64相连, 设置为根据第二终端 的 D2D通信限制列表和第一终端的真实 ID和 /或应用层 ID验证第二终端是否允许发 现第一终端或者被第一终端发现; 第一响应模块 68, 与第一验证模块 66相连, 设置 为返回第一验证响应, 其中携带第二 D2D服务器验证结果。 本实施例通过上述模块, 网络侧的第二 D2D服务器的第一接收模块 62接收到第 一验证请求后, 第一查询模块 64根据其中的第二终端的发现 ID查询第二终端的 D2D 通信限制列表, 第一验证模块 66根据第二终端的 D2D通信限制列表和第一终端的真 实 ID和 /或应用层 ID验证第二终端是否允许发现第一终端或者被第一终端发现,第二 D2D服务的第一响应模块 68再将验证结果通过第一验证响应返回, 由于将 D2D业务 存在的标识存储在网络侧的 D2D服务器上,使得网络侧在 D2D通信过程中能够对 D2D 发现验证过程进行集中存储,解决了相关技术中网络侧无法管理 D2D业务中存在的标 识并根据该标识进行 D2D发现验证的问题, 提升了网络侧对 D2D通信业务的管理能 力。 在本实施例中还提供了一种 D2D通信的校验系统, 图 7是根据本发明实施例的
D2D通信的校验系统的结构框图, 如图 7所示, 该系统包括如图 6所示的位于第二 D2D服务器的校验装置 60, 还包括位于保存有第一终端的上下文的第一 D2D服务器 的校验装置 70, 其中, 第一 D2D服务器的校验装置 70包括: 第二接收模块 72, 设置 为接收第二验证请求, 该第二验证请求中携带第一终端的发现 ID; 第二查询模块 74, 与第二接收模块 72相连, 设置为根据第一终端的发现 ID查询第一终端的真实 ID和 / 或应用层 ID; 第一发送模块 76, 与第二查询模块 74和第一接收模块 62相连, 设置为 在第一验证请求中填充第一终端的真实 ID和 /或应用层 ID, 并将第一验证请求发送给 第二 D2D服务器。 图 8是根据本发明实施例的 D2D通信的校验系统的优选结构框图一,如图 8所示, 位于第二 D2D服务器的校验装置 60还可以包括: 第三查询模块 82, 与第一接收模块 62相连, 设置为根据第二终端的发现 ID查询第二终端的真实 ID和 /或应用层 ID; 第 二发送模块 84, 与第三查询模块 82相连, 设置为向第一 D2D服务器发送第一验证响 应, 其中携带第二终端的真实 ID和 /或应用层 ID; 位于第一 D2D服务器的校验装置 70还可以包括: 第三接收模块 86, 与第二发送模块 84相连, 设置为接收第一验证响 应; 第二验证模块 88, 与第三接收模块 86相连, 设置为根据第一终端的 D2D通信限 制列表和第二终端的真实 ID和 /或应用层 ID验证第一终端是否允许发现第二终端或者 被第二终端发现。 图 9是根据本发明实施例的 D2D通信的校验系统的优选结构框图二,如图 9所示, 位于第一 D2D服务器的校验装置 70还可以包括: 第二响应模块 92, 可以与第二验证 模块 88相连, 设置为向第二验证请求的发起方返回第二验证响应, 其中, 第二验证响 应中携带有第二 D2D服务器验证结果和 /或第一 D2D服务器验证结果。 下面结合优选实施例进行说明, 以下优选实施例结合了上述实施例及其优选实施 方式。 在以下优选实施例中, 提出了一种管理用户的多种标识的方法, 并提供网络侧根 据不同标识完成用户校验的方法。 在以下优选实施例中, 网络中新增了一个网元, 即 D2D服务器。 该服务器的功能 包括但不限于负责维护终端的多种标识, 获取终端进行 D2D 发现或者通信的限制列 表, 根据限制列表对被发现的终端进行校验。 该功能网元在不同的实施方式中可能与不同的网元有接口, 包括但不限于 eNB、 MME、 PGW以及 HSS, 以及其他网络的 D2D服务器。 其中与 HSS的接口的主要功能是获取限制列表。 但是获取与内容与 HSS保存的 列表有关。 如果 HSS的限制列表包括以用户的真实 ID标识, 即其他可以通信或者发 现的 UE的 IMSI/MSISDN号码, 则 D2D服务器会获取这一信息。 如果进一步的 HSS 的限制列表还包含了不同应用的限制列表,即其他可以通信或者发现 UE的应用层 ID, 则 D2D服务器也会获取这一信息。如果 HSS的现在列表不包含不同应用的限制列表, 则 D2D服务器也可以直接通过后台配置, 或者与不同的应用服务器交互, 获取这一信 息。 采用后者时, 可选的, D2D服务器还可以从 HSS下载是否允许 D2D服务器与其 他 AS交互的标识、 和 /或与哪些 AS可以进行交互的标识。 采用后者时, D2D服务器 和 HSS具体的获取不同应用的限制列表的方式不在本发明描述。 优选地, 上述的限制列表, 可以包括 UE可以被哪些其他 UE发现, 或者 UE允许 发现哪些 UE。 该接口以及传递的数据对于不同的实施方式都是通用的, 在各个实施例中不再特 殊说明。 此外, 其他不同的接口功能以及交互的参数在以下不同的优选实施例中进行部分 描述。 如果 D2D业务后续可以扩展到 2G/3G网络中, 下述实施方式也可以适用于其他 接入,但是相关网元有所替换,其中下述实施例中提及的 eNB可以替换为 2G/3G的无 线接入网元, MME可以替换为 SGSN,PGW可以替换为 GGSN,HSS可以替换为 HLR。 D2D执行的功能, 接口传递的参数都是类似的, 这里不做赘述。 实施例一 图 10是根据本发明实施例一的 D2D用户通过 eNB进行注册的实施方式的示意图, 如图 10所示, 该实施方式可以适用于不同的终端完成各自的附着到网络的过程, 并且 eNB与 D2D服务器有接口的场景中。 步骤 S1002, UE通过 eNB向 D2D服务器发起注册请求。 UE向 eNB发送的注册 请求可以包含 UE的临时标识 (该标识为 MME为其分配的全球唯一临时标识(Globally Unique Temporary ID,简称为 GUTI)), UE的应用层标识(如果是多个应用希望与 D2D 业务, 则可能携带多个应用层标识), 应用层 ID可以直接来自于 UE (经由 eNB转发, D2D服务器在获取真实标识之前已经获取),或者也可以来自于 MME自行添加。该消 息中可选的还可以携带 UE的发现标识, 该标识用于 UE进行 D2D发现过程中标识自 己。 该标识是 eNB分配的在 eNB内唯一的信息, 但是为了保证发现标识更大范围的 唯一性, 除了上述信息还可以加入 eNB的标识或者 UE当前所在的小区信息。 后续所 述的发现标识, 都是完整的发现标识。 而该标识在步骤 S1002的消息中的携带方式有 如下几种:
1. 终端填充完整的发现标识, eNB收到后不需要特殊处理, 直接转发给 D2D服 务器。
2. 终端填充 eNB分配的发现标识, eNB收到后在转发该消息中加入 eNB的标识, 或者 UE当前所在的小区信息。
3. 终端不填充发现标识, eNB收到后在转发该消息中填充完整的发现标识。 步骤 S1004, D2D服务器根据 UE提供的临时标识, 找到为其服务的 MME。 步骤 S 1006, D2D服务器向 UE的 MME发起标识请求消息,其中携带 UE的临时 标识。 步骤 S1008, MME向 D2D服务器返回标识响应消息, 其中携带 UE的真实标识。 步骤 S1010~ S1012,D2D服务器根据 UE的真实标识向 HSS下载用户的签约数据。 HSS根据 UE的真实标识找到 UE的签约数据, 签约数据包括 UE的 D2D通信限制列 表等信息。 步骤 S1014, D2D服务器完成 UE标识的获取, 完成注册过程, 并向通过 eNB向 终端返回注册响应消息。 完成注册后, D2D服务器维护的 ID包括但不限于:
1. UE的发现标识 2. UE的真实标识
3. UE的临时标识
4. UE的应用标识
5. UE1的 D2D通信限制列表 其他的支持 D2D的终端分别执行类似的过程在各自的 D2D服务器注册。 在该实施例中, 如果 MME已经从 HSS获取了限制列表, 可以在步骤 S1008中, 发送给 D2D服务器。 此时步骤 S1010~ S1012可以省略。 实施例二 图 11是根据本发明实施例二的 D2D用户通过 PGW进行注册的实施方式的示意 图, 如图 11所示, 该实施方式可以适用于不同的终端完成各自的附着到网络的过程, 并且 UE建立了可以与 D2D服务器通信的 PDN连接。 步骤 S1102,UE在数据路径上向 D2D服务器发起注册请求。该消息在 UE和 PGW 直接以数据包的方式发送,其中携带终端的 IP地址。如果 PGW实现了 NAT功能的话, 则 PGW可以将其中携带 IP的私网地址, 替换为 UE的公网地址。 步骤 S1104, 服务器根据 UE的 IP地址找到 UE的 PGW。 步骤 SI 106, D2D服务器向 UE的 PGW发起标识请求消息, 其中携带 UE的 IP 地址。 步骤 S1108, PGW向 D2D服务器返回标识响应消息, 其中携带 UE的真实标识。 步骤 S1110~S1112,D2D服务器根据 UE的真实标识向 HSS下载用户的签约数据。 HSS根据 UE的真实标识找到 UE的签约数据, 签约数据包括 UE的 D2D通信限制列 表等信息。 步骤 S1114, D2D服务器完成 UE标识的获取, 完成注册过程, 并向通过 PGW向 终端返回注册响应消息。 完成注册后, D2D服务器维护的 ID包括但不限于:
1. UE的发现标识 2. UE的真实标识 3. UE的 IP地址
4. UE的应用标识, 应用层 ID可以直接来自于 UE (经由 PGW转发, D2D服务 器在获取真实标识之前已经获取), 或者也可以来自于 PGW自行添加。
5. UE的 D2D通信限制列表 其他的支持 D2D的终端分别执行类似的过程在各自的 D2D服务器注册。 实施例三 图 12是根据本发明实施例三的 D2D用户通过 MME进行注册的实施方式的示意 图, 如图 12所示, 该实施方式可以适用于不同的终端完成各自的附着到网络的过程, 并且 MME与 D2D服务器有接口的场景中。 步骤 S1202, UE通过 eNB发起注册请求。其中可以包括 UE的应用层标识(如果 是多个应用希望与 D2D业务, 则可能携带多个应用层标识), 该实施方式中, 应用层 ID可以来自于终端, 经过 MME转发, 或者也可以来自于 MME自行添加。 该消息中 可选的还可以携带 UE的发现标识, 该标识用于 UE进行 D2D发现过程中标识自己。 该标识是 eNB分配的在 eNB内唯一的信息, 但是为了保证发现标识更大范围的唯一 性, 除了上述信息还可以加入 eNB的标识或者 UE当前所在的小区信息。 后续所述的 发现标识, 都是完整的发现标识。 而该标识在步骤 S1202的消息中的携带方式有如下 几种:
1. 终端填充完整的发现标识, eNB收到后不进行特殊处理, 直接转发给 D2D服 务器。 2. 终端填充 eNB分配的发现标识, eNB收到后在转发该消息中加入 eNB的标识, 或者 UE当前所在的小区信息。
3. 终端不填充发现标识, eNB收到后在转发该消息中填充完整的发现标识。 eNB找到 UE注册的 MME, 并向其转发 UE的请求消息。 步骤 S1204, MME找到 UE的上下文中保存的 UE的真实标识。 步骤 S1206, MME向 D2D服务器发起注册请求, 其中携带 UE的真实标识, 应 用层标识。 如果步骤 S1202中携带了发现标识, 则该消息中也包含该标识。 步骤 S1208~S1210,D2D服务器根据 UE的真实标识向 HSS下载用户的签约数据。 HSS根据 UE的真实标识找到 UE的签约数据, 签约数据包括 UE的 D2D通信限制列 表等信息。 步骤 S1212~ S1214, D2D服务器完成 UE标识的获取, 完成注册过程, 并向通过 MME向终端返回注册响应消息。如果 eNB后续需要直接与 D2D服务器联系, 则步骤 S1214的消息中还可以携带 UE注册的 D2D服务器地址。 eNB收到之后保存该信息。 完成注册后, D2D服务器维护的 ID包括但不限于:
1. UE的发现标识
2. UE的真实标识 3. UE的应用标识
4. U1的 D2D通信限制列表 其他的支持 D2D的终端分别执行类似的过程在各自的 D2D服务器注册。 在该实施例中, 如果 MME已经从 HSS获取了限制列表, 可以在步骤 S1206中, 发送给 D2D服务器。 此时步骤 S1208~ S1210可以省略。 实施例四 图 13是根据本发明实施例四的 D2D用户通过 eNB进行验证的实施方式之一的示 意图, 如图 13所示, 本实施方式可以适用于 D2D用户已经完成了 D2D注册过程, 通 过并且 eNB与 D2D服务器有接口的方式。 其中注册过程可以是通过图 10或者图 12 的方式进行的。 步骤 S1302, UE1 向基站发送 D2D发现报告, 其中携带其发现的 UE2的发现标 识。 步骤 S1304, 基站根据 UE2的发现标识, 获取为 UE2服务的 D2D服务器 2, 并 向 D2D服务器发送验证请求, 其中携带 UE1的发现 ID, UE2的发现标识。 步骤 S1306, D2D服务器 2根据请求中携带的 UE1的发现标识查询为 UE1服务 的 D2D服务器 1, 并且根据 UE2的发现标识查询 UE2的上下文。 步骤 S1308, D2D服务器 2向 D2D服务器 1发送验证请求, 其中携带 UE1的发 现标识, UE2的真实标识, UE2的应用标识。 步骤 S1310, D2D服务器 1根据 UE1 的发现 ID查找到 UE1 的上下文, 并根据
UE2的真实标识和或应用标识检查其是否在 UE1的允许发现或者被发现的列表中。 步骤 S1312, D2D服务器 1向 D2D服务器 2返回验证结果, 其中携带 UE1是否 允许发现 UE2或者被 UE2发现。 还可以携带 UE1的真实标识, UE1的应用标识。 步骤 S1314, D2D服务器 2查询到 UE2的上下文, 并根据 UE1的真实标识和 /或 应用标识检查其是否在 UE2的允许发现或者被发现的列表中。 步骤 S1316, D2D服务器 2向基站返回验证结果, 其中携带 UE1是否允许发现 UE2或者被 UE2发现, 以及 UE2是否允许发现 UE1或者被 UE1发现。 其中步骤 S1304〜步骤 S1316中, 基站也可以选择向 UE1的 D2D服务器发起验证 请求, 此后 D2D服务器 1在向 D2D服务器 2发起校验请求。 过程与这个类似, 在这 一过程中, 基站只需要向一个 D2D服务器发起请求即可。 步骤 S1318, 基站根据验证结果分别向两个终端发送验证报告, 通知被另一终端 发现, 或者是否允许发现另一终端。 对于不允许的情况, 该消息也可以省略, 即不通 知。 该过程可以是一个终端发送 D2D发现报告触发,也可以是两个终端分别发送发现 报告触发。 一个终端触发这里是以 UE1触发为例, UE2触发也是类似的过程。 实施例五 图 14是根据本发明实施例五的 D2D用户通过 eNB进行验证的实施方式之二的示 意图, 如图 14所示, 本实施方式可以适用于 D2D用户已经完成了 D2D注册过程, 通 过并且 eNB与 D2D服务器有接口的方式。 其中注册过程可以是通过图 10或者图 12 的方式进行的。 步骤 S1402, UE2向基站发送 D2D发现报告, 其中携带其发现的 UE1的发现标 识。 步骤 S1404〜步骤 S1410与步骤 S1304〜步骤 S1310类似, 不做赘述。 步骤 S1412, D2D服务器 1向 D2D服务器 2返回验证结果, 其中携带 UE1是否 允许发现 UE2或者被 UE2发现。 步骤 S1414, D2D服务器 2向基站返回验证结果, 其中携带 UE1是否允许发现 UE2或者被 UE2发现。 该过程可以是一个终端发送 D2D发现报告触发,也可以是两个终端分别发送发现 报告触发。一个终端触发这里是以 UE2触发为例, UE1触发也是类似的过程。 如果是 一个终端触发,那么基站还可以去 D2D服务器 1发起验证, D2D服务器 1可以去 D2D 服务器 2发起验证, 并获得 UE2是否允许发现 UE1或者被 UE1发现的结果, 与上述 步骤 S1404~ S1414类似。 步骤 S1416, 基站根据验证结果分别向两个终端发送验证报告, 通知被另一终端 发现, 或者是否允许发现另一终端。 对于不允许的情况, 该消息也可以省略, 即不通 知。 实施例六 图 15是根据本发明实施例六的 D2D用户通过 PGW进行验证的实施方式之一的 示意图, 如图 15所示, 本实施方式可以适用于 D2D用户已经完成了 D2D注册过程, 通过并且 PGW与 D2D服务器有接口的方式。 其中注册过程可以是通过图 11 的方式 进行的。 步骤 S1502, UE1在数据路径上向 D2D服务器发起验证请求, 其中携带 UE2的 发现标识, 以及 UE1 的 IP地址或者发现标识或者应用标识。 后者主要是用于作为索 弓 |, 查找 UE1的上下文信息。 该消息在 UE和 PGW直接以数据包的方式发送。 如果 PGW实现了 NAT功能的 话并且上述消息携带了 UE1的 IP地址, 则 PGW需要将其中携带 IP的私网地址, 替 换为 UE1的公网地址。 步骤 S1504, D2D服务器 1根据请求中携带的 UE2的发现标识查询为 UE2服务 的 D2D服务器 2, 并且根据 UE1的 IP地址或者发现标识或者应用标识查询 UE1的上 下文。 步骤 S1506, D2D服务器 1向 D2D服务器 2发送验证请求, 其中携带 UE2的发 现标识, UE1的真实标识, UE1的应用标识。 步骤 S1508, D2D服务器 1根据 UE2的发现 ID查找到 UE2的上下文, 并根据
UE1的真实标识和 /或应用标识检查其是否在 UE2的允许发现或者被发现的列表中。 步骤 S1510, D2D服务器 2向 D2D服务器 1返回验证结果, 其中携带 UE2是否 允许发现 UE1或者被 UE1发现。 还可以携带 UE2的真实标识, UE2的应用标识。 步骤 S1512, D2D服务器 1查询到 UE1的上下文, 并根据 UE2的真实标识和或 应用标识检查其是否在 UE1的允许发现或者被发现的列表中。 步骤 S1514, D2D服务器 1通过数据路径向 UE1返回验证结果, 即 UE2是否在 UE1的允许发现或者被发现的列表中。 步骤 S1516, D2D服务器 2通过数据路径向 UE2返回验证结果, 即 UE1是否在 UE2的允许发现或者被发现的列表中。 该过程可以是一个终端发送 D2D发现报告触发,也可以是两个终端分别发送发现 报告触发。 一个终端触发这里是以 UE1触发为例, UE2触发也是类似的过程。 实施例七 图 16是根据本发明实施例七的 D2D用户通过 PGW进行验证的实施方式之二的 示意图, 如图 16所示, 本实施方式可以适用于 D2D用户已经完成了 D2D注册过程, 通过并且 PGW与 D2D服务器有接口的方式。 其中注册过程可以是通过图 11 的方式 进行的。 步骤 S1602〜步骤 S1608与步骤 S1502〜步骤 S1508类似, 不做赘述。 步骤 S1610, D2D服务器 2向 D2D服务器 1返回验证结果, 其中携带 UE2是否 允许发现 UE1或者被 UE1发现。 步骤 S1612, D2D服务器 1通过数据路径向 UE1返回验证结果, 即 UE2是否在 UE1的允许发现或者被发现的列表中。 该过程需要是两个终端分别发送发现报告触发。这里是以 UE1触发为例, UE2触 发也是类似的过程。后续 UE2的验证过程,需要 UE2发起到 D2D服务器 2,并且 D2D 服务器 2去 D2D服务器 1的验证过程, 从而获得 UE1是否允许发现 UE2或者被 UE2 发现的结果, 与上述步骤 S1602 S1612类似。 实施例八 图 17是根据本发明实施例八的 D2D用户通过 MME进行验证的实施方式之一的 示意图, 如图 17所示, 本实施方式可以适用于 D2D用户已经完成了 D2D注册过程, 通过并且 MME与 D2D服务器有接口的方式。 其中注册过程可以是通过图 12的方式 进行的。 步骤 S1702, UE1 向基站发送 D2D发现报告, 其中携带其发现的 UE2的发现标 识。 步骤 S1704, 基站向 UE1的 MME1发送验证请求, 其中携带其发现的 UE2的发 现标识。 步骤 S1706, MME1向 UE1的 D2D服务器 1发送验证请求。 其中携带 UE1的真 实标识或者发现标识, 和 UE2发现标识。 步骤 S1708, D2D服务器 1根据请求中携带的 UE2的发现标识查询为 UE2服务 的 D2D服务器 2, 并且根据 UE1的真实标识或者发现标识查询 UE1的上下文。 步骤 S1710, D2D服务器 1向 D2D服务器 2发送验证请求, 其中携带 UE2的发 现标识, UE1的真实标识, UE1的应用标识。 步骤 S1712, D2D服务器 1根据 UE2的发现 ID查找到 UE2的上下文, 并根据
UE1的真实标识和或应用标识检查其是否在 UE2的允许发现或者被发现的列表中。 步骤 S1714, D2D服务器 2向 D2D服务器 1返回验证结果, 其中携带 UE2是否 允许发现 UE1或者被 UE1发现。 还可以携带 UE2的真实标识, UE2的应用标识。 步骤 S1716, D2D服务器 1查询到 UE1的上下文, 并根据 UE2的真实标识和或 应用标识检查其是否在 UE1的允许发现或者被发现的列表中。 步骤 S1718, D2D服务器 1通过 MME1向基站返回验证响应, 其中携带 UE1是 否允许发现 UE2或者被 UE2发现, 以及 UE2是否允许发现 UE1或者被 UE1发现。 其中步骤 S1704〜步骤 S1718中,基站也可以选择向 UE2的 MME2发起验证请求, 此后 MME2向 D2D服务器 2发起验证请求, D2D服务器 2在向 D2D服务器 1发起校 验请求。 过程与这个类似, 在这一过程中, 基站只需要向一个 D2D服务器发起请求即 可。 步骤 S1720, 基站根据验证结果分别向两个终端发送验证报告, 通知被另一终端 发现, 或者是否允许发现另一终端。 对于不允许的情况, 该消息也可以省略, 即不通 知。 该过程可以是一个终端发送 D2D发现报告触发,也可以是两个终端分别发送发现 报告触发。 一个终端触发这里是以 UE1触发为例, UE2触发也是类似的过程。 实施例九 图 18是根据本发明实施例九的 D2D用户通过 MME进行验证的实施方式之二的 示意图, 如图 18所示, 本实施方式可以适用于 D2D用户已经完成了 D2D注册过程, 通过并且 MME与 D2D服务器有接口的方式。 其中注册过程可以是通过图 12的方式 进行的。 步骤 S 1802〜步骤 S1812与步骤 S 1702〜步骤 S1712类似, 不做赘述。 步骤 S1814, D2D服务器 2向 D2D服务器 1返回验证结果, 其中携带 UE2是否 允许发现 UE1或者被 UE1发现。 步骤 S1816, D2D服务器 1通过 MME1向基站返回验证响应, 其中 UE2是否允 许发现 UE1或者被 UE1发现。 该过程可以是一个终端发送 D2D发现报告触发,也可以是两个终端分别发送发现 报告触发。一个终端触发这里是以 UE1触发为例, UE2触发也是类似的过程。 如果是 一个终端触发, 那么基站还需要去通过 MME2去 D2D服务器 2发起验证, D2D服务 器 2需要去 D2D服务器 1发起验证,并获得 UE1是否允许发现 UE2或者被 UE2发现 的结果, 与上述步骤 S1804 S1816类似。 步骤 S1818, 基站根据验证结果分别向两个终端发送验证报告, 通知被另一终端 发现, 或者是否允许发现另一终端。 对于不允许的情况, 该消息也可以省略, 即不通 知。 在另外一个实施例中, 还提供了一种软件, 该软件用于执行上述实施例及优选实 施例中描述的技术方案。 在另外一个实施例中, 还提供了一种存储介质, 该存储介质中存储有上述软件, 该存储介质包括但不限于光盘、 软盘、 硬盘、 可擦写存储器等。 工业实用性 如上所述,本发明实施例提供的一种 D2D通信的管理和校验方案具有以下有益效 果: 采用 D2D服务器获取终端的真实 ID和 /或应用层 ID, 以及终端的 D2D通信限制 列表, 该 D2D服务器用于 D2D发现验证; D2D服务器对终端的 D2D通信限制列表, 以及真实 ID和 /或应用层 ID进行存储的方式, 提升了网络侧对 D2D通信业务的管理 能力。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而, 可以 将它们存储在存储装置中由计算装置来执行, 并且在某些情况下, 可以以不同于此处 的顺序执行所示出或描述的步骤, 或者将它们分别制作成各个集成电路模块, 或者将 它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明不限制于任 何特定的硬件和软件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权 利 要 求 书
1. 一种设备到设备 D2D通信的管理方法, 包括:
D2D服务器获取终端的真实标识 ID和 /或应用层 ID,以及所述终端的 D2D 通信限制列表, 其中, 所述 D2D服务器用于 D2D发现验证;
所述 D2D服务器对所述终端的 D2D通信限制列表, 以及真实 ID和 /或应 用层 ID进行存储。
2. 根据权利要求 1所述的方法, 其中, D2D服务器获取所述终端的 D2D通信限 制列表包括:
所述 D2D服务器根据所述真实 ID和 /或应用层 ID获取所述终端的 D2D通 信限制列表。
3. 根据权利要求 2所述的方法, 其中, 所述 D2D服务器根据所述真实 ID和 /或应 用层 ID获取所述终端的 D2D通信限制列表包括:
所述 D2D服务器从所述终端的移动性管理实体 MME中获取所述真实 ID 和 /或应用层 ID对应的 D2D通信限制列表; 或者,
所述 D2D服务器根据所述真实 ID和 /或应用层 ID向归属用户服务器 HSS/ 归属位置寄存器 HLR下载所述用户的签约数据,其中,所述签约数据中包含所 述终端的 D2D通信限制列表; 或者,
所述 D2D服务器根据所述真实 ID和 /或应用层 ID向应用服务器下载所述 用户的 D2D通信限制列表。
4. 根据权利要求 3中所述的方法, 其中, 在所述 D2D服务器根据所述真实 ID和 / 或应用层 ID向应用服务器下载所述用户的 D2D通信限制列表之前, 还包括: 所述 D2D 服务器根据签约数据中是否允许向所述应用服务器下载所述终 端的 D2D通信限制列表,判断是否需要向所述应用服务器下载所述终端的 D2D 通信限制列表。
5. 根据权利要求 1至 4中任一项所述的方法, 其中, D2D服务器获取终端的真实 ID和 /或应用层 ID包括: 所述 D2D服务器从所述终端的 MME或者分组数据网关 PGW获取所述终 端的所述真实 ID和 /或应用层 ID。 根据权利要求 5所述的方法, 其中, 所述 D2D服务器从所述终端的 MME获取 所述终端的所述真实 ID和 /或应用层 ID包括:
所述 D2D服务器接收来自所述 MME的注册请求, 其中, 所述注册请求中 携带所述终端的所述真实 ID和 /或应用层 ID。 根据权利要求 5所述的方法, 其中, 所述 D2D服务器从所述终端的 MME获取 所述终端的所述真实 ID和 /或应用层 ID包括:
所述 D2D服务器根据所述终端的临时标识向所述终端的服务 MME发起标 识请求消息, 其中, 所述临时标识为所述 MME为所述终端分配的全球唯一临 时标识 GUTI;
所述 D2D服务器接收来自所述 MME的标识响应消息, 其中, 所述标识响 应消息中携带有所述终端的所述真实 ID和 /或应用层 ID。 根据权利要求 5所述的方法, 其中, 所述 D2D服务器从所述终端的 PGW获取 所述终端的所述真实 ID和 /或应用层 ID包括:
所述 D2D服务器根据所述终端的 IP地址向所述终端的 PGW发起标识请 求消息;
所述 D2D服务器接收来自所述 PGW的标识响应消息, 其中, 所述标识响 应消息中携带有所述终端的所述真实 ID和 /或应用层 ID。 根据权利要求 1至 8中任一项所述的方法, 其中, 所述方法还包括:
所述 D2D服务器获取所述终端的发现 ID, 其中, 所述发现 ID用于在所述 D2D服务器查找所述终端的 D2D通信限制列表;
所述 D2D服务器对所述发现 ID进行存储。 根据权利要求 9所述的方法, 其中, 所述终端的发现 ID包括以下至少之一: 所述终端填充完整的发现 ID;
所述终端填充基站分配的发现 ID,并由基站在转发过程中填充所述基站的 ID或者所述 UE当前所在小区 ID;
所述基站填充完整的发现 ID。
11. 一种设备到设备 D2D通信的校验方法, 包括:
第二 D2D服务器接收第一验证请求,其中,所述第一验证请求中携带第一 终端的真实标识 ID和 /或应用层 ID, 以及第二终端的发现 ID, 所述第二 D2D 服务器中保存有所述第二终端的上下文;
所述第二 D2D 服务器根据所述第二终端的发现 ID 查询所述第二终端的 D2D通信限制列表;
所述第二 D2D服务器根据所述第二终端的 D2D通信限制列表和所述第一 终端的真实 ID和 /或应用层 ID验证所述第二终端是否允许发现所述第一终端或 者被所述第一终端发现;
所述第二 D2D服务器返回第一验证响应, 其中携带所述第二 D2D服务器 验证结果。
12. 根据权利要求 11所述的方法, 其中, 在第二 D2D服务器接收第一验证请求之 前> 还包括:
第一 D2D服务器接收第二验证请求,其中,所述第二验证请求中携带第一 终端的发现 ID, 所述第一 D2D服务器中保存有所述第一终端的上下文;
所述第一 D2D服务器根据所述第一终端的发现 ID查询所述第一终端的真 实 ID和 /或应用层 ID;
所述第一 D2D服务器在所述第一验证请求中填充第一终端的真实 ID和 / 或应用层 ID, 并将所述第一验证请求发送给所述第二 D2D服务器。
13. 根据权利要求 12所述的方法, 其中, 所述第一 D2D服务器接收第二验证请求 包括:
所述第一 D2D服务器接收来自所述第一终端或第二终端的服务基站 /分组 数据网关 PGW/移动性管理实体 MME的第二验证请求。
14. 根据权利要求 12或 13中任一项所述的方法,其中,在第二 D2D服务器接收第 一验证请求之后, 还包括:
所述第二 D2D服务器根据所述第二终端的发现 ID查询所述第二终端的真 实 ID和 /或应用层 ID;
所述第二 D2D服务器向所述第一 D2D服务器发送第一验证响应, 其中携 带所述第二终端的真实 ID和 /或应用层 ID; 所述第一 D2D服务器根据第一终端的 D2D通信限制列表和所述第二终端 的真实 ID和 /或应用层 ID验证所述第一终端是否允许发现所述第二终端或者被 所述第二终端发现。
15. 根据权利要求 14所述的方法, 其中, 在所述第一 D2D服务器根据第一终端的 D2D通信限制列表和所述第二终端的真实 ID和 /或应用层 ID判断所述第一终 端是否允许发现所述第二终端或者被所述第二终端发现之后, 还包括:
所述第一 D2D服务器向所述第二验证请求的发起方返回第二验证响应,其 中, 所述第二验证响应中携带有所述第二 D2D服务器验证结果和 /或第一 D2D 服务器验证结果。
16. 根据权利要求 15所述的方法, 其中, 所述第一 D2D服务器向所述第二验证请 求的发起方返回第二验证响应包括:
所述第一 D2D 服务器向所述第一或者第二终端的服务基站返回所述第二 验证响应; 或者,
所述第一 D2D服务器通过 PGW向第一终端返回所述第二验证响应;或者, 所述第一 D2D服务器通过 MME向所述第一终端的服务基站返回所述第二 验证响应。
17. 根据权利要求 16所述的方法, 其中, 所述第一 D2D服务器向所述第一终端或 者第二终端的服务基站返回第二验证响应, 还包括:
所述基站根据所述第二验证响应向所述第一终端和 /或第二终端发送发现 列表。
18. 一种设备到设备 D2D通信的管理装置,位于用于 D2D发现验证的 D2D服务器 中, 包括:
获取模块, 设置为获取终端的真实标识 ID和 /或应用层 ID, 以及所述终端 的 D2D通信限制列表;
存储模块, 设置为对所述终端的 D2D通信限制列表, 以及真实 ID和 /或应 用层 ID进行存储。
19. 一种设备到设备 D2D通信的校验装置, 位于第二 D2D服务器中, 包括: 第一接收模块, 设置为接收第一验证请求, 其中, 所述第一验证请求中携 带第一终端的真实标识 ID和 /或应用层 ID, 以及第二终端的发现 ID,所述第二 D2D服务器中保存有所述第二终端的上下文;
第一查询模块, 设置为根据所述第二终端的发现 ID 查询所述第二终端的 D2D通信限制列表;
第一验证模块,设置为根据所述第二终端的 D2D通信限制列表和所述第一 终端的真实 ID和 /或应用层 ID验证所述第二终端是否允许发现所述第一终端或 者被所述第一终端发现;
第一响应模块,设置为返回第一验证响应,其中携带所述第二 D2D服务器 验证结果。
20. 一种设备到设备 D2D通信的校验系统,包括如权利要求 19所述的位于第二 D2D 服务器的校验装置, 还包括位于第一 D2D服务器的校验装置, 其中, 所述第一 D2D服务器的校验装置包括:
第二接收模块, 设置为接收第二验证请求, 其中, 所述第二验证请求中携 带第一终端的发现 ID,所述第一 D2D服务器中保存有所述第一终端的上下文; 第二查询模块, 设置为根据所述第一终端的发现 ID 查询所述第一终端的 真实 ID和 /或应用层 ID;
第一发送模块, 设置为在所述第一验证请求中填充第一终端的真实 ID和 / 或应用层 ID, 并将所述第一验证请求发送给所述第二 D2D服务器。
21. 根据权利要求 20所述的系统, 其中,
所述位于第二 D2D服务器的校验装置还包括:第三查询模块,设置为根据 所述第二终端的发现 ID查询所述第二终端的真实 ID和 /或应用层 ID; 第二发 送模块,设置为向所述第一 D2D服务器发送第一验证响应,其中携带所述第二 终端的真实 ID和 /或应用层 ID;
所述位于第一 D2D服务器的校验装置还包括:第三接收模块,设置为接收 所述第一验证响应;第二验证模块,设置为根据第一终端的 D2D通信限制列表 和所述第二终端的真实 ID和 /或应用层 ID验证所述第一终端是否允许发现所述 第二终端或者被所述第二终端发现。
22. 根据权利要求 21所述的系统, 其中, 所述位于第一 D2D服务器的校验装置还 包括: 第二响应模块, 设置为向所述第二验证请求的发起方返回第二验证响应, 其中, 所述第二验证响应中携带有所述第二 D2D 服务器验证结果和 /或第 D2D服务器验证结果。
PCT/CN2013/085056 2012-10-12 2013-10-11 设备到设备通信的管理和校验方法、装置及系统 WO2014056449A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210387229.6A CN103731830A (zh) 2012-10-12 2012-10-12 设备到设备通信的管理和校验方法、装置及系统
CN201210387229.6 2012-10-12

Publications (1)

Publication Number Publication Date
WO2014056449A1 true WO2014056449A1 (zh) 2014-04-17

Family

ID=50455722

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/085056 WO2014056449A1 (zh) 2012-10-12 2013-10-11 设备到设备通信的管理和校验方法、装置及系统

Country Status (2)

Country Link
CN (1) CN103731830A (zh)
WO (1) WO2014056449A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104768122A (zh) * 2015-03-16 2015-07-08 深圳酷派技术有限公司 基于终端直连通信的数据共享方法、装置和终端
CN111563075A (zh) * 2020-05-06 2020-08-21 政采云有限公司 一种业务校验系统、方法及设备和存储介质
CN112019489A (zh) * 2019-05-31 2020-12-01 华为技术有限公司 验证方法及装置

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016074136A1 (zh) * 2014-11-10 2016-05-19 华为技术有限公司 近距离业务解析方法、装置及设备
CN105722036B (zh) 2014-12-03 2020-03-31 中兴通讯股份有限公司 授权更新的通知方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604791A (zh) * 2001-08-03 2005-04-06 松下电器产业株式会社 访问控制系统
CN1898936A (zh) * 2004-02-19 2007-01-17 松下电器产业株式会社 被连接通信终端,连接通信终端,会话管理服务器以及触发服务器
WO2008101289A1 (en) * 2007-02-20 2008-08-28 Podmo Mobile Pty Ltd A system and method for a registered user based telecommunications network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604791A (zh) * 2001-08-03 2005-04-06 松下电器产业株式会社 访问控制系统
CN1898936A (zh) * 2004-02-19 2007-01-17 松下电器产业株式会社 被连接通信终端,连接通信终端,会话管理服务器以及触发服务器
WO2008101289A1 (en) * 2007-02-20 2008-08-28 Podmo Mobile Pty Ltd A system and method for a registered user based telecommunications network

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104768122A (zh) * 2015-03-16 2015-07-08 深圳酷派技术有限公司 基于终端直连通信的数据共享方法、装置和终端
CN104768122B (zh) * 2015-03-16 2018-08-24 深圳酷派技术有限公司 基于终端直连通信的数据共享方法、装置和终端
CN112019489A (zh) * 2019-05-31 2020-12-01 华为技术有限公司 验证方法及装置
CN112019489B (zh) * 2019-05-31 2022-03-04 华为技术有限公司 验证方法及装置
CN111563075A (zh) * 2020-05-06 2020-08-21 政采云有限公司 一种业务校验系统、方法及设备和存储介质
CN111563075B (zh) * 2020-05-06 2024-01-23 政采云有限公司 一种业务校验系统、方法及设备和存储介质

Also Published As

Publication number Publication date
CN103731830A (zh) 2014-04-16

Similar Documents

Publication Publication Date Title
US11330642B2 (en) Method for supporting and providing LADN service in wireless communication system and apparatus therefor
US11297660B2 (en) Session management with relaying and charging for indirect connection for internet of things applications in 3GPP network
EP2448297B1 (en) Information processing method and system, and mobility management network element
EP3364676B1 (en) Method for supporting pdn gw selection
US20140237125A1 (en) Method, apparatus, and system for establishing device-to-device connection
WO2014056445A1 (zh) 一种路由转发的方法、系统及控制器
WO2011000315A1 (zh) 群组管理方法、网络设备和网络系统
WO2011082636A1 (zh) 机器到机器核心网络的接入实现方法及装置
JP6982100B2 (ja) Ipバージョンの選択
WO2012130085A1 (zh) 与网管系统建立连接的方法、设备及通信系统
WO2013166913A1 (zh) 小量数据上下行传输方法、及相应终端和移动性管理单元
WO2014048397A1 (zh) 通信路径的切换方法、系统及装置
WO2017167153A1 (zh) 移动通讯系统及寻呼方法
WO2013155920A1 (zh) D2D终端接入控制方法、D2D终端、eNB和MME
CN102763372A (zh) 一种异种网络切换时选择网关方法、装置及系统
WO2014056449A1 (zh) 设备到设备通信的管理和校验方法、装置及系统
WO2012062183A1 (zh) 一种实现数据流服务质量和计费策略控制的方法及系统
JP2017528074A5 (zh)
WO2010133107A1 (zh) 家用基站网关转发消息至家用基站的方法及系统
WO2014075534A1 (zh) 通信路径的切换方法及装置、切换处理装置及系统
WO2014008806A1 (zh) 无线局域网邻居用户设备的确定方法及装置
EP2790457B1 (en) Method and device for processing local access connection
JP6191768B2 (ja) 移動無線通信装置からのデータ転送
WO2012068946A1 (zh) 查询网关的方法及系统
CN113811025A (zh) 一种释放中继连接的方法、设备及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13845879

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13845879

Country of ref document: EP

Kind code of ref document: A1