WO2019100969A1 - 位置获取的控制方法、用户终端和装置 - Google Patents

位置获取的控制方法、用户终端和装置 Download PDF

Info

Publication number
WO2019100969A1
WO2019100969A1 PCT/CN2018/115204 CN2018115204W WO2019100969A1 WO 2019100969 A1 WO2019100969 A1 WO 2019100969A1 CN 2018115204 W CN2018115204 W CN 2018115204W WO 2019100969 A1 WO2019100969 A1 WO 2019100969A1
Authority
WO
WIPO (PCT)
Prior art keywords
location
user terminal
control information
allowed
request
Prior art date
Application number
PCT/CN2018/115204
Other languages
English (en)
French (fr)
Inventor
柯小婉
秦飞
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Priority to EP18880966.9A priority Critical patent/EP3720162A4/en
Priority to US16/767,546 priority patent/US11159938B2/en
Publication of WO2019100969A1 publication Critical patent/WO2019100969A1/zh
Priority to US17/467,080 priority patent/US20210400471A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0091Signaling for the administration of the divided path
    • H04L5/0094Indication of how sub-channels of the path are allocated
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • H04W52/0241Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal where no transmission is received, e.g. out of range of the transmitter
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0251Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity
    • H04W52/0254Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity detecting a user operation or a tactile contact or a motion of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0251Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity
    • H04W52/0258Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity controlling an operation mode according to history or models of usage information, e.g. activity schedule or time of day
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0261Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
    • H04W52/0274Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof
    • H04W52/028Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof switching on or off only a part of the equipment circuit blocks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0044Arrangements for allocating sub-channels of the transmission path allocation of payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/16Mobility data transfer selectively restricting mobility data tracking
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the embodiments of the present disclosure relate to the field of communications technologies, and in particular, to a method, a user terminal, and a device for controlling location.
  • the network actively requests the user terminal to report the location to the user terminal. For example, the network requests the user terminal to perform location measurement and location reporting according to the request of the location service client.
  • the user of the user terminal does not necessarily want to report its own location, so the user terminal may not respond to the request sent by the network, which results in waste of transmission resources occupied by signaling, and also consumes power consumption of the user terminal. It can be seen that there is a problem of waste of transmission resources and excessive power consumption in the location service in the related art.
  • an embodiment of the present disclosure provides a method for controlling location acquisition, which is applied to a user terminal, including:
  • control information is transmitted, and the control information is used to control a related behavior of acquiring the location of the user terminal.
  • the embodiment of the present disclosure further provides a method for controlling location acquisition, which is applied to a network unit, including:
  • control information being used to control a related behavior of acquiring a location of the user terminal
  • the related behavior of acquiring the location of the user terminal is controlled according to or with reference to the control information.
  • an embodiment of the present disclosure further provides a user terminal, including:
  • a determining module configured to determine whether the predetermined condition is satisfied
  • a sending module configured to, when determining that the predetermined condition is met, send control information, where the control information is used to control a related behavior of acquiring a location of the user terminal.
  • the embodiment of the present disclosure further provides a location acquisition control device, where the device is applied to a network unit or a location service client, including:
  • a receiving module configured to receive control information, where the control information is used to control a related behavior of acquiring a location of the user terminal;
  • control module configured to control, according to or reference to the control information, a related behavior of acquiring a location of the user terminal.
  • an embodiment of the present disclosure further provides a user terminal, including: a memory, a processor, and a computer program stored on the memory and executable on the processor, where the computer program is processed.
  • a user terminal including: a memory, a processor, and a computer program stored on the memory and executable on the processor, where the computer program is processed.
  • an embodiment of the present disclosure further provides a location acquisition control apparatus, where the apparatus is applied to a network unit or a location service client, including: a memory, a processor, and the storage on the memory and in the processing A computer program running on the computer, the computer program being executed by the processor to implement the steps in the control method of the position acquisition on the control device side of the position acquisition provided by the embodiment of the present disclosure.
  • the embodiment of the present disclosure further provides a computer readable storage medium, where the computer readable storage medium stores a computer program, and when the computer program is executed by the processor, the user terminal provided by the embodiment of the present disclosure is implemented. The steps of the control method of the position acquisition of the side.
  • an embodiment of the present disclosure further provides a computer readable storage medium, where the computer readable storage medium stores a computer program, where the computer program is executed by a processor to implement location acquisition provided by an embodiment of the present disclosure.
  • FIG. 1 is a structural diagram of a position acquisition control system to which an embodiment of the present disclosure is applicable;
  • FIG. 2 is a flowchart of a method for controlling location acquisition according to an embodiment of the present disclosure
  • FIG. 3 is a flowchart of another method for controlling location acquisition according to an embodiment of the present disclosure.
  • FIG. 5 is a schematic diagram of another method for controlling location acquisition according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic diagram of another method for controlling location acquisition according to an embodiment of the present disclosure.
  • FIG. 7 is a schematic diagram of another method for controlling location acquisition according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic diagram of another method for controlling location acquisition according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic diagram of another method for controlling location acquisition according to an embodiment of the present disclosure.
  • FIG. 10 is a structural diagram of a user terminal according to an embodiment of the present disclosure.
  • FIG. 11 is a structural diagram of a position acquisition control apparatus according to an embodiment of the present disclosure.
  • FIG. 12 is a structural diagram of another position acquisition control apparatus according to an embodiment of the present disclosure.
  • FIG. 13 is a structural diagram of another position acquisition control apparatus according to an embodiment of the present disclosure.
  • FIG. 14 is a structural diagram of another user terminal according to an embodiment of the present disclosure.
  • FIG. 15 is a structural diagram of another position acquisition control apparatus according to an embodiment of the present disclosure.
  • FIG. 1 is a structural diagram of a location acquisition control system applicable to an embodiment of the present disclosure.
  • the user terminal 11, the radio access network unit 12, the core network unit 13, and at least one are included.
  • the location service client 14, wherein the user terminal 11 may be a UE (User Equipment), for example, may be a mobile phone, a tablet personal computer, a laptop computer, a personal digital assistant (PDA)
  • PDA personal digital assistant
  • a terminal device such as a mobile Internet device (MID) or a wearable device (Wearable Device), it should be noted that the specific type of the user terminal 11 is not limited in the embodiment of the present disclosure.
  • the radio access network unit 12 may be a radio access network node and/or a radio access network function, and the radio access network unit may include but is not limited to at least one of the following: an evolved Node B (eNB), a next generation Base station (gNB), Centralized Unit (CU), Distributed Unit (DU), Centralized Unit Control Plane (CU-CP), Centralized Unit User (Centralized Unit User) Plane, CU-UP), it should be noted that the specific type of the radio access network unit 12 is not limited in the embodiment of the present disclosure.
  • eNB evolved Node B
  • gNB next generation Base station
  • CU Centralized Unit
  • DU Centralized Unit Control Plane
  • CU-CP Centralized Unit Control Plane
  • CU-UP Centralized Unit User Plane
  • the user terminal 11 can communicate with the core network unit 13 through the radio access network unit 12, wherein the core network unit 13 can be a core network node and/or a core network function, and the core network unit can include, but is not limited to, at least one of the following: : Mobile Management Node, Mobile Management Function, Location Service Management Node, Location Service Management Function, User Data Management Node, User Data Management Function, Access and Mobility Management Function (AMF), Mobile Management Entity (Mobile) Management Entity, MME), Location Services (LCS), Enhanced Serving Mobile Location Centre (E-SMLC).
  • the location service client 14 can send a location acquisition request to the core network unit 13, and the core network unit 13 can respond to or reject the location acquisition request.
  • the location service client 14 may be referred to as an LCS client, and may be a third party device, such as a third party device such as a commercial third party device or a third party of an emergency service such as a public security bureau.
  • the specific functions of the user terminal 11, the radio access network unit 12, the core network unit point 13, and the location service client 14 will be specifically described by the following various embodiments.
  • control information appearing in the present disclosure may be one of the following information:
  • Control information about obtaining a location of the user terminal
  • Control information for controlling the relevant behavior of obtaining the location of the user terminal is referred to.
  • control information described herein may also be understood as the user terminal and/or the user's propensity information regarding the relevant behavior of acquiring the location of the user terminal or may be understood as the user and/or the user terminal regarding the location of the user terminal. Propensity information.
  • allowing appearing in the present disclosure may also be referred to as enabling.
  • “Not allowed” appearing in the present disclosure may also be referred to as one of the following: disable, prohibit.
  • the information of the interaction between the user terminal and the core network unit may be forwarded or transparently transmitted through the wireless access network.
  • the user terminal may send the message to the core network unit by using a Radio Resource Control (RRC) message or a non-access stratum (NAS) message.
  • RRC Radio Resource Control
  • NAS non-access stratum
  • the user terminal can send to the core network unit by the following but not limited to the following message:
  • Registration request (such as Registration request, Attach Request), registration completion (such as Registration Complete, Attach Complete), location update request message (such as Registration request, TAU Request), location update completion (such as Registration Complete, TAU Complete), location request permission
  • the control information in the verification response is sent to the mobility management node/function regarding UE location acquisition.
  • the NAS message is transparently transmitted through the radio access network unit.
  • the RRC message is sent through the radio access network unit, and then the radio access network unit forwards the message to the management node/function (such as AMF, MME) through the S1 or NG interface message.
  • the management node/function such as AMF, MME
  • the mobility management node/function may send control information about UE location acquisition to the location service management node/function (such as E-SMLC, LCS).
  • the location service management node/function such as E-SMLC, LCS.
  • the core network unit may contain multiple network nodes or network functions (mobile management node/function, location service management node/function, user data management node/function, etc.). In the embodiments of the present disclosure, operations between network nodes or network functions within the core network unit are not limited.
  • the location service management unit may generate a location request for the user terminal to be sent to the mobility management unit, and the mobility management unit sends the result of acquiring the location of the user terminal to the location service management unit, and the location service management
  • the interoperable position between the unit and the mobility management unit is not limited in the embodiment.
  • the network elements herein may represent network entities and/or network functions.
  • the core network elements may represent core network entities and/or core network functions.
  • the radio access network node may represent a radio access network entity and/or a radio access network function.
  • the mobility management unit can represent the mobility management entity/mobile management unit.
  • the location service management unit can represent the location service management entity/location service management unit.
  • the verification request or the verification process of acquiring the location of the user terminal may be a request to request the user terminal to confirm whether to permit the location of the user terminal.
  • it may be an authentication request regarding the privacy permission of the user terminal location acquisition, or may be an authentication request depending on whether the user terminal itself is allowed to acquire the location of the user terminal.
  • the "subsequent" appearing herein, on the user terminal side may be followed by the user terminal after transmitting the control information.
  • “subsequent” as used herein, on the network element side is followed by the network element receiving control information.
  • FIG. 2 is a flowchart of a method for controlling location acquisition according to an embodiment of the present disclosure. As shown in FIG. 2, the method includes the following steps:
  • Step 201 Determine whether the predetermined condition is satisfied.
  • the predetermined condition may be pre-configured by the user terminal, or preset by the user, or pre-defined by the protocol, or pre-configured by the network to the user terminal, and the like.
  • the foregoing predetermined condition may receive a specific instruction input by the user, or receive a specific request sent by the network, etc., which is not limited in this embodiment of the disclosure.
  • Step 202 When it is determined that the predetermined condition is met, send control information, where the control information is used to control a related behavior of acquiring a location of the user terminal.
  • the control information sent above may be generated and/or updated according to an operation input by the user.
  • control information may be generated for not allowing the related behavior of the location of the user terminal.
  • the subsequent user wants to disclose the location of the user terminal, and the control information can be updated for allowing access and/or permission to disclose the user terminal location to a third party. vice versa.
  • the above control information may be intelligently generated by the user terminal.
  • the control information may be generated for not allowing the related behavior of the location of the user terminal.
  • the control information may be updated for allowing acquisition and/or permission to disclose the location of the user terminal to a third party. vice versa.
  • the embodiment of the present disclosure is not limited thereto.
  • control information sent by the foregoing may also be control information sent by the user terminal according to the received request message.
  • the network side when the network side sends a request for acquiring the location of the user terminal multiple times and/or sends a verification request for acquiring the location of the user terminal, the user or the user terminal does not intend to acquire the location of the user terminal for a period of time. Then, the control information may be generated and sent, so that the network side does not send a location request to the user terminal and/or sends an authentication request for acquiring the location of the user terminal for a period of time. After the time limit expires, the network may send a request for obtaining the location of the user terminal to the user terminal and/or send a verification request for obtaining the location of the user terminal.
  • the user or the user terminal does not intend to acquire the location of the user terminal for a period of time, and the control information may be generated and sent, and on the one hand, the request for acquiring the location of the user terminal and/or the sending may be friendly.
  • the request for acquiring the location of the user terminal and/or the sending may be friendly.
  • the network may send a request for obtaining the location of the user terminal to the user terminal and/or send a verification request for obtaining the location of the user terminal.
  • receiving the request to acquire the control information For example, receiving the control information request indicates returning the control information when the control information is updated. Then, when the control information is updated, the control information is returned.
  • control information is used to control the related behavior of acquiring the location of the user terminal, where the control information may be related to acquiring a related behavior of the location of the user terminal, where the location of the user terminal is obtained.
  • the behavior may be an action related to obtaining a location of the user terminal, including but not limited to at least one of: acquiring a location of the user terminal, publicizing the location of the user terminal (such as transmitting the acquired location of the user terminal to the location service client), triggering the location
  • the user terminal performs location measurement and responds to a location acquisition request sent by the location service client.
  • the above control information may be a location that allows the user terminal to be acquired, or a location of the user terminal is not allowed to be obtained, or the location of the user terminal is allowed to be disclosed, or the location of the user terminal is not allowed to be disclosed.
  • the foregoing sending control information may be that the control information is sent to the network side, including but not limited to sending the control information to the network unit and/or the location service client.
  • the manner in which the user terminal sends control information to the location service client is transparently transmitted or forwarded to the location service client through the network unit.
  • the network unit and/or the location service client may control the related behavior of acquiring the location of the user terminal according to or refer to the control information, for example, acquiring the location of the user terminal, or not allowing acquisition.
  • the location of the user terminal, or the location of the user terminal is disclosed, or the location of the user terminal is not allowed to be disclosed, and the like.
  • control information may be applicable to all location service customers or a part of location service customers.
  • the user terminal and the network unit pre-negotiate the location service client to which the control information is applicable, or the protocol pre-defines the location service client to which the control information is applicable.
  • a location request for an emergency service request of a location service customer such as a public security bureau or a school may be always allowed, and is not limited by the control information.
  • the user terminal can control the related behavior of acquiring the location of the user terminal, thereby reducing some meaningless signaling overhead, saving transmission resources, and reducing power consumption and location measurement of the user terminal. Overhead, etc.
  • control information for controlling the related behavior of acquiring the location of the user terminal is transmitted.
  • some meaningless signaling overhead can be reduced to save transmission resources, and the power consumption of the user terminal can also be reduced.
  • FIG. 3 is a flowchart of another method for controlling location acquisition according to an embodiment of the present disclosure. As shown in FIG. 3, the method includes the following steps:
  • Step 301 Determine whether the predetermined condition is met
  • the predetermined condition may include, but is not limited to, at least one of the following:
  • control information generated and/or updated may be referred to the embodiment shown in FIG. 2, and details are not described herein.
  • the obtaining the obtaining request of the location of the user terminal may be that the network unit or the location service client requests the user terminal to acquire the location of the user terminal; the foregoing obtaining the verification request of the location of the user terminal may be requesting the user terminal to confirm whether to allow the obtaining.
  • the request for obtaining the location of the user terminal; the request for acquiring the current control information may request the user terminal to acquire control information for controlling the related behavior of acquiring the location of the user terminal; and the request for acquiring the updated control information may be It is requesting the user terminal to obtain the updated control information.
  • the predetermined condition can be used to enable the user terminal to send the control information under certain circumstances, thereby improving the flexibility of the location service, and also saving the overhead of the user terminal and the network, because the network unit or the location service client can be avoided by the predetermined condition.
  • the user terminal sends control information, and the overhead is wasted.
  • Step 302 When it is determined that the predetermined condition is met, send control information, where the control information is used to control a related behavior of acquiring a location of the user terminal.
  • control information indicates at least one of the following:
  • the disallowing condition for obtaining the relevant behavior of the location of the user terminal is not allowed
  • the permission condition for allowing the related behavior of acquiring the location of the user terminal may refer to a related behavior that may allow obtaining the location of the user terminal and/or not satisfying the permission condition when the permission condition is met. At the same time, the relevant behavior of obtaining the location of the user terminal may not be allowed.
  • the disallowing condition that the related behavior of the location of the user terminal is not allowed to be obtained may be: when the disallowing condition is met, the related behavior of acquiring the location of the user terminal may not be allowed and/or When the disallowed condition is satisfied, the related behavior of obtaining the location of the user terminal may be allowed.
  • the permission condition for allowing subsequent acquisition of the related behavior of the location of the user terminal may refer to a related behavior that may allow subsequent acquisition of the location of the user terminal and/or dissatisfaction when the permission condition is met.
  • the subsequent related behavior of acquiring the location of the user terminal may not be allowed.
  • the disallowing condition that the subsequent related behavior of the location of the user terminal is not allowed to be obtained may be: when the disallowing condition is met, the subsequent behavior of acquiring the location of the user terminal may be disallowed. And/or may not allow subsequent acquisition of the relevant behavior of the location of the user terminal when the disallowed condition is not met.
  • the permission condition for allowing the location of the acquired user terminal to be disclosed may mean that when the permission condition is met, the location of the acquired user terminal may be allowed to be disclosed and/or the permission condition may not be met, The location of the acquired user terminal is allowed to be disclosed.
  • the disallowed disclosure condition that does not allow disclosure of the location of the acquired user terminal may mean that the location of the obtained user terminal may not be disclosed and/or is not satisfied when the disallowed condition is satisfied.
  • the location of the acquired user terminal may be allowed to be disclosed.
  • the foregoing control information may be used to indicate whether the related behavior of obtaining the location of the user terminal is allowed to be performed, for example, the foregoing control indicates that the related behavior of the location of the user terminal is allowed to be acquired, or the user is not allowed to be acquired.
  • the relevant behavior of the location of the terminal may be used to indicate whether the related behavior of obtaining the location of the user terminal is allowed to be performed, for example, the foregoing control indicates that the related behavior of the location of the user terminal is allowed to be acquired, or the user is not allowed to be acquired. The relevant behavior of the location of the terminal.
  • the foregoing control information may indicate whether to allow the related behavior of acquiring the location of the user terminal from the network request, and whether to allow subsequent acquisition of the related behavior of the location of the user terminal.
  • the related behavior of acquiring the location of the user terminal from the network request may be the latest or current related behavior of acquiring the location of the user terminal by the network, for example, acquiring the location of the user terminal. Or requesting the user terminal to permit verification of the location request, or triggering the user terminal to perform location measurement and the like.
  • the foregoing control information may indicate whether the current is allowed, and whether subsequent acquisition of the related behavior of the location of the user terminal is allowed, thereby saving signaling overhead.
  • the network initiates an authentication request for acquiring the location of the user terminal to the user terminal, and the user terminal returns the foregoing control information to the network verification response.
  • the network determines whether to acquire the location information of the user terminal and/or how to obtain the location information of the user terminal according to the above control information, and whether to disclose the location information of the user terminal to the location service client.
  • the above control information may indicate at least one of the following:
  • the length of time associated with the subsequent acquisition of the location of the user terminal is not allowed.
  • the duration of the related behavior of not obtaining the location of the user terminal may refer to the need to wait for a period of time before allowing subsequent related behaviors to acquire the location of the UE or may not allow subsequent acquisition of the location of the UE for a period of time. Related behavior.
  • the user terminal may allow the current location request for the user terminal, and temporarily disallow subsequent location requests for the user terminal. This can be achieved by setting a length of time that allows subsequent requests for user terminal location requests, and does not allow for subsequent location requests for user terminals.
  • the network unit may perform the related behavior of acquiring the location of the user terminal within the waiting duration or the disallowed duration, as described above, and details are not described herein again.
  • the network node/function may ask the user terminal whether to allow acquisition and/or permission to disclose location information about the user terminal.
  • this location request for the user terminal can be allowed, but subsequent location requests are delayed.
  • control information can implicitly indicate the allowable range and the disallowed range by indicating the above-described description of the allowable condition and the disallowed condition, thereby saving signaling overhead.
  • control information indicates a related behavior that allows obtaining a location of the user terminal.
  • the control information indicates a related behavior that allows subsequent acquisition of the location of the user terminal.
  • the control information indicates an allowable range of related behaviors that allow obtaining the location of the user terminal.
  • the control information indicates an allowable range of related behaviors that allow subsequent acquisition of the location of the user terminal.
  • the foregoing control information only indicates that the related behavior of allowing the location of the user terminal is allowed to be understood as not limiting the allowed range.
  • the foregoing control information only indicates that the related behavior of allowing the subsequent location of the user terminal to be obtained may also be understood as being not limited. Allowable range.
  • control information indicates that the allowed range of the related behavior of the location of the user terminal is allowed to be understood, and the related behavior of the location of the user terminal is allowed to be obtained within the allowed range, and the user terminal is not allowed to be acquired outside the scope.
  • the relevant behavior of the location is not allowed to be acquired outside the scope.
  • the allowable range of the above-mentioned related behaviors for allowing the subsequent acquisition of the location of the user terminal can be understood as that the subsequent behavior of obtaining the location of the user terminal is allowed within the allowed range, and the subsequent acquisition is not allowed outside the scope.
  • the relevant behavior of the location of the user terminal can be understood as that the subsequent behavior of obtaining the location of the user terminal is allowed within the allowed range, and the subsequent acquisition is not allowed outside the scope.
  • control information indicates that the location of the user terminal is not allowed to be acquired.
  • the control information indicates that the disallowed range of the location of the user terminal is not allowed to be acquired.
  • the control information indicates that subsequent acquisition of the location of the user terminal is not allowed; and/or
  • the control information indicates that the subsequent disallowing range of the location of the user terminal is not allowed.
  • the related behavior of the above-mentioned indication that the location of the user terminal is not allowed to be obtained may be that the scope of the disallowing is not limited.
  • the related behavior of not allowing the location of the subsequent acquiring the user terminal may also be that the disallowing range is not limited.
  • the above-mentioned indication may not allow the relevant behavior of obtaining the location of the user terminal, and the disallowing range may be that the related behavior of the location of the user terminal is not allowed to be obtained within the disallowed range, and the user is allowed to acquire the user outside the scope.
  • the relevant behavior of the location of the terminal may not allow the relevant behavior of obtaining the location of the user terminal, and the disallowing range may be that the related behavior of the location of the user terminal is not allowed to be obtained within the disallowed range, and the user is allowed to acquire the user outside the scope.
  • the above-mentioned indication may not allow the subsequent disallowing range of the related behavior of acquiring the location of the user terminal, and may not allow subsequent acquisition of the related behavior of the location of the user terminal within the disallowed range, and outside the range, The subsequent behavior of obtaining the location of the user terminal is allowed.
  • control information further indicates at least one of the following:
  • Allowing disclosure of the allowed range of the location of the acquired user terminal and/or
  • whether the location of the user terminal that allows the disclosure to be disclosed may be a behavior result of whether the related behavior of the acquired location of the user terminal is allowed to be disclosed to a third party, for example, whether the user terminal of the acquired location is allowed to be publicly disclosed to the location service client. position.
  • the above allowable range of the location of the user terminal allowing the disclosure of the acquisition may be, within the allowable range, the location of the publicly available user terminal is allowed to be publicized, for example, the location of the publicly available user terminal is allowed to be publicized within the allowable range.
  • the above-mentioned disallowing range of the location of the user terminal that is not allowed to disclose the obtained acquisition may be that the location of the acquired user terminal is not allowed to be disclosed within the disallowed range, for example, public access is not allowed within the disallowed range.
  • the location of the user terminal may be that the location of the acquired user terminal is not allowed to be disclosed within the disallowed range, for example, public access is not allowed within the disallowed range.
  • flexible control can be implemented to disclose the location of the user terminal to improve privacy protection performance.
  • control information indicates the allowed range by including an allowable condition and/or an impermissible condition; wherein a range that satisfies the allowable condition belongs to the allowable range and/or a range that does not satisfy the disallowed condition belongs to The allowable range;
  • control information indicates the disallowed range by including an allowable condition and/or including an impermissible condition, wherein a range that does not satisfy the allowable condition belongs to the disallowed range and/or satisfies the disallowed condition
  • the range belongs to the above disallowed range.
  • the allowable range may be indicated by an allowable condition and/or an impermissible condition, for example, the range corresponding to the allowable condition is the allowable range, and the range outside the range corresponding to the unallowable condition is the allowable range.
  • the impermissible range by including an allowable condition and/or including an impermissible condition, for example, a range outside the range corresponding to the allowable condition is an impermissible range, and a range corresponding to the unallowable condition is an allowable range.
  • the allowed operation in conjunction with the disallowed operation.
  • the control information of the user terminal can be updated to the network. Since the network may not need to request verification of each location request from the user terminal, the network does not need to frequently request the user terminal to perform authorization verification on each location request, and the network may directly request the user terminal to perform location measurement, thereby saving location request. Verify the required signaling interaction process and save the overhead of the user terminal and network.
  • the permission condition may include at least one of: allowed time period, allowed time duration, allowed location service customer information, permitted usage information, allowed terminal status information, allowed location type information, allowed Mobile area range information, location measurement technology information allowed; and/or
  • the disallowing condition may include at least one of the following: an impermissible time period, an unallowed time length, an impermissible location service customer information, an impermissible use information, an impermissible terminal status information, an impermissible location type. Information, not allowed mobile range information and information on location measurement techniques that are not allowed.
  • the matching time period or duration can be more controllable to the location service.
  • the time period may be valid for a certain time interval, and the duration may be that the network unit starts the timer after receiving the time, and the time is valid according to the duration.
  • the signaling of the interaction between the network and the user terminal and the overhead of the user terminal can be reduced for a period of time.
  • the information of the allowed location service client by instructing the information of the allowed location service client, it is possible to perform screening of the location service client who desires to acquire the location of the user terminal. It is not difficult to see that the user terminal can not allow too frequent location acquisition by setting the information of the allowed location service customer, the information of the location service customer not allowed, and the like. For example, according to the client type, only the location request for the emergency service may be allowed, or only the location service client that the user trusts or the UE presets may obtain the location request.
  • the above-mentioned permitted usage information may refer to a related behavior that allows execution or permission to perform subsequent acquisition of the location of the user terminal under the specified use; the above-mentioned disallowed usage information may mean that the specified use is not allowed.
  • the purpose of obtaining the location of the user terminal; the subsequent execution of the location-related behavior of the user terminal is not allowed or allowed to be performed. It is not difficult to see that some uses are for emergency services, user terminals may allow, some uses are for commercial use, and user terminals may not.
  • the above-mentioned allowed terminal status information may refer to a related behavior that the user terminal is allowed to perform or allow subsequent execution to acquire the location of the user terminal in the specified state; the terminal status information that is not allowed may refer to the user terminal in the specified state, Allows execution or allows subsequent execution to obtain location-related behavior of the user terminal.
  • the user terminal when the user terminal is in an idle state or an inactive state, if a location request is required, the user terminal needs to be paged, and the user terminal needs to set up a connection or restore the connection, which requires more signaling overhead; if only the user is obtained in the connected state The terminal location can save a lot of signaling overhead; in the connected state, frequently measuring the location of the user terminal occupies the measurement overhead of the user terminal. If the location of the user terminal is allowed to be obtained in other states, the overhead measured by the user terminal can be saved.
  • the user terminal can be implemented by the allowed terminal state information and the allowed terminal state information.
  • the above-mentioned allowed location type information may refer to a related behavior that allows the location type information to be performed, and the above-mentioned disallowed location type information may refer to a related behavior that is not allowed to perform the location type information.
  • “current location” needs to initiate location measurement acquisition, and “newest location” is the latest measured location, which can be saved without resources.
  • the "historical location” relates to the trajectory of the user terminal, involving more privacy of the user terminal.
  • the user terminal can set different location types according to requirements or preferences, thereby saving the power consumption of the user terminal or protecting the privacy of the user terminal.
  • the above allowed mobile area range information may be a related behavior that allows the location of the user terminal to be acquired within the range of the mobile area indicated by the control information.
  • the above-mentioned impermissible mobile area range information may be that the related behavior of acquiring the location of the user terminal is not allowed to be performed within the range of the mobile area indicated by the control information.
  • the effect of saving power consumption of the user terminal and protecting the privacy of the user terminal can be achieved by allowing and/or disallowing the range of the mobile area, since the power consumption of the location measurement by the user terminal in some mobile areas may be different or the location privacy tendency may be different. For example, in some mobile area areas, users may not want to disclose the location of the user terminal.
  • the location measurement technology information allowed to be used may be a related behavior indicating that the location of the user terminal is allowed to be performed under a specific location measurement technology, and the location measurement technology information not allowed to be used may be an indication that the specific location measurement technology is allowed to be allowed. Get the relevant behavior of the location of the user terminal. For example, some location measurement technologies are dominated by user terminals (such as UTDOA), which require more power consumption of user terminals; some location measurement technologies are dominated by wireless access network nodes, and relatively less demanding on user terminals, thus user terminals Different measurement technical requirements can be allowed and/or not allowed according to their own requirements. In addition, it can also be directly sent to the Radio Access Network (RAN), or sent to the LCS and then sent to the RAN.
  • RAN Radio Access Network
  • the information of the location service client, the usage information, the terminal status information, the location type information, the mobile area range information, and the location measurement technology information can be referred to as follows, but is not limited thereto.
  • the information about the location service client includes at least one of the following: an identifier of the location service client, a name of the location service client identifier, a domain name address of the location service client identifier, an identifier of the location service client requester, and a location service.
  • the usage information includes at least one of the following: emergency business use and commercial use; and/or
  • the terminal status information includes at least one of the following: an idle state, a connected state, an inactive state, an available state, a non-use for location measurement, a booting time, and a shutdown state; and/or
  • the location type information includes at least one of: a current location, a historical location, and a latest location; and/or
  • the mobile area range information includes at least one of: a tracking area (TA) identifier list, a radio access network node identifier list, a mobility management unit list, an authentication management function AMF identifier list, a mobility management entity MME identifier list, a list of locations, a list of cells in the list of service areas; and/or
  • TA tracking area
  • the location measurement technical information includes at least one of the following: Enhanced Cell-ID (ECID) measurement, Observed Time Difference of Arrival (OTDOA) measurement, and uplink arrival time difference (Uplink) Time Difference of Arrival, UTDOA) measurement.
  • ECID Enhanced Cell-ID
  • OTDOA Observed Time Difference of Arrival
  • UTDOA uplink arrival time difference
  • the above-mentioned available status may be a state in which the location service can be used, and may not be used before the position measurement may be a state in which the preset time (for example, 1 second or 0.1 second or even shorter time) before the position measurement is not possible.
  • the preset time for example, 1 second or 0.1 second or even shorter time
  • the location measurement cannot be performed before the location measurement is impossible, such as the moment of shutdown, or the capability of the location service is completely turned off, or the coverage of the user terminal begins to deteriorate.
  • the final location of the user terminal can be obtained, which is useful for emergency service related positioning requirements.
  • the network unit may decide to request the user terminal to request the user terminal whether to permit the location request operation.
  • the network still has to decide whether to request the user terminal to perform privacy authentication on the location request for the UE according to the indication.
  • control information indicates whether the user terminal is required to request the location request to obtain a verification request for the location of the user terminal when the location of the user terminal needs to be acquired.
  • the indication herein may be implemented in combination with the foregoing description, for example, the related behavior of obtaining the location of the user terminal is allowed to be implemented together with the foregoing indication.
  • the indication herein may also be implemented separately.
  • the disclosed embodiments are not limited.
  • control information may indicate at least one of the following: a location service client that needs to verify the location request, a location service client that needs to verify the location request, does not need to verify the location request, and does not need to perform location request. Verify the location of the customer service information.
  • a process of indicating whether or not the location request is required to be verified may be implemented, thereby indicating whether to skip the verification, to save the overhead of the user terminal and the network.
  • the network still has to decide according to the indication whether to request the user terminal to perform privacy authentication on the location request for the user terminal.
  • the related behavior of acquiring the location of the user terminal includes at least one of the following:
  • the related behavior of obtaining the location of the user terminal may be: when (such as a network unit or a location service client) generates a location request for acquiring the user terminal or receives a location request for the user terminal, including at least the following One:
  • the related behavior of allowing or disallowing, or allowing within the allowed range, or not allowing the at least one item to acquire the location of the user terminal in the disallowed range may be implemented, thereby saving transmission resources and user terminals. Power consumption. For example, allowing the permission request to acquire the location of the user terminal, allowing the location of the user terminal to be obtained, allowing the user terminal to be triggered, when the location requirement for acquiring the user terminal is generated within the allowable range Measure or allow location acquisition requests sent by the customer in response to the location.
  • the permission verification request to obtain the location of the user terminal is not allowed, the location of the user terminal is not allowed to be acquired, and the triggering is not allowed.
  • the user terminal performs location measurement or does not allow a location acquisition request sent by the location service client.
  • the related behavior of acquiring the location of the user terminal includes, but is not limited to, the behavior of the foregoing list.
  • step 302 may be: when determining that the predetermined condition is met, sending a network element or location service client control information, where the control information is used to control a related behavior of acquiring a location of the user terminal.
  • Step 302 may be to send the foregoing control information to the network unit, for example, the NAS message or the RRC message to send the foregoing control information to the network unit.
  • the foregoing network unit may include at least one of the following: a radio access network node, a radio access network function, a core network function, a core network node, a mobility management node, a mobility management function, a location service management function, and a location service management. Node, location service management client, eNB, gNB, AMF, MME, LCS, and E-SMLC.
  • the network unit or the location service client may perform corresponding control according to the foregoing control information, for example, allowing the user terminal to be acquired when the location requirement for acquiring the user terminal is generated within the allowed range.
  • the location allows the verification request, acquires the location of the user terminal, triggers the user terminal to perform location measurement, or responds to a location acquisition request sent by the location service client.
  • the verification request is obtained to obtain the location of the user terminal, the location of the user terminal is acquired, the location measurement of the user terminal is triggered, or Respond to the location acquisition request sent by the location service client.
  • FIG. 4 is a schematic diagram of another method for controlling location acquisition according to an embodiment of the present disclosure.
  • the method is applied to a network unit or a location service client. As shown in FIG. 4, the method includes the following steps:
  • Step 401 Receive control information, where the control information is used to control a related behavior of acquiring a location of the user terminal.
  • control information sent by the user terminal may be control information that is forwarded or transparently transmitted by the user terminal through the radio access network unit.
  • Step 402 Control, according to or refer to the control information, a related behavior of acquiring a location of the user terminal.
  • the foregoing may be performed to obtain the location of the user terminal, the location of the user terminal, the location of the user terminal, and the like.
  • control information indicates at least one of the following:
  • the disallowing condition for obtaining the relevant behavior of the location of the user terminal is not allowed
  • control information indicates a related behavior that allows obtaining the location of the user terminal.
  • the control information indicates a related behavior that allows subsequent acquisition of the location of the user terminal.
  • the control information indicates an allowable range of related behaviors that allow obtaining the location of the user terminal.
  • the control information indicates an allowable range of related behaviors that allow subsequent acquisition of the location of the user terminal
  • the controlling the related behavior of acquiring the location of the user terminal according to the reference to the control information including:
  • a subsequent related behavior of acquiring the location of the user terminal is performed within an allowable range in which the control information indicates a subsequent behavior that allows subsequent acquisition of the location of the user terminal.
  • the related behavior may be performed according to or refer to the foregoing control information, and the related behavior may be performed within a specific range, thereby saving the overhead of the user terminal and the network.
  • control information indicates that the location of the user terminal is not allowed to be acquired.
  • the control information indicates that the disallowed range of the location of the user terminal is not allowed to be acquired.
  • the control information indicates that subsequent acquisition of the location of the user terminal is not allowed; and/or
  • the control information indicates that the subsequent unacceptable range of obtaining the location of the user terminal is not allowed
  • the controlling the related behavior of acquiring the location of the user terminal according to the reference to the control information including:
  • the location of the user terminal is not allowed to be obtained within an impermissible range in which the control information indicates that the location of the user terminal is not allowed to be acquired;
  • control information subsequent acquisition of the location of the user terminal is not allowed.
  • control information indicates that the subsequent acquisition of the location of the user terminal is not allowed, the subsequent acquisition of the location of the user terminal is not allowed.
  • the related behavior may be disabled according to or reference to the foregoing control information, and the location of the user terminal may not be allowed to be obtained within a specific range, thereby saving the overhead of the user terminal and the network.
  • control information further indicates at least one of the following:
  • Allowing disclosure of the allowed range of the location of the acquired user terminal and/or
  • the controlling the related behavior of acquiring the location of the user terminal according to the reference to the control information including:
  • Devising according to or with reference to the control information, a location of the acquired user terminal within an allowable range of allowing the location of the acquired user terminal to be disclosed;
  • the location of the acquired user terminal is not allowed to be disclosed within the disallowed range of the location of the user terminal that is not allowed to disclose the acquisition.
  • the location of the user terminal may be disclosed according to the control information sent by the reference user terminal, or the location of the user terminal may not be disclosed, so that the effect of protecting the privacy of the user terminal may be achieved.
  • control information indicates the allowed range by indicating an allowable condition
  • the control information indicates the allowable range by indicating an impermissible condition, wherein a range that does not satisfy the disallowed condition belongs to the allowable range;
  • the control information indicates the disallowed range by indicating an impermissible condition
  • the control information indicates the disallowed range by indicating an allowable condition, wherein a range that does not satisfy the disallowed condition belongs to the allowable range.
  • the permission condition includes at least one of the following: an allowed time period, an allowed time period, an allowed location service customer information, permitted usage information, allowed terminal status information, allowed location type information, allowed Mobile area range information, location measurement technology information allowed; and/or
  • the disallowing condition includes at least one of the following: an impermissible time period, an unallowed time length, an impermissible location service customer information, an impermissible use information, an impermissible terminal status information, and an impermissible location type information. Information about mobile area range that is not allowed, and location measurement technology that is not allowed.
  • the location service client information includes at least one of the following: an identifier of the location service client, a name of the location service client identifier, a domain name address of the location service client identifier, an identifier of the location service client requester, and a location
  • an identifier of the location service client e.g., a name of the location service client identifier, a domain name address of the location service client identifier, an identifier of the location service client requester, and a location
  • the name of the service client requestor, the IP address of the location service client requestor, the port number of the location service client application of the type of location service client location request a location service client application of the type of location service client location request.
  • the usage information includes at least one of the following: emergency business use and commercial use; and/or
  • the terminal status information includes at least one of the following: an idle state, a connected state, an inactive state, an available state, a non-use for location measurement, a booting time, and a shutdown state; and/or
  • the location type information includes at least one of: a current location, a historical location, and a latest location; and/or
  • the mobile area range information includes at least one of the following: a TA identifier list, a radio access network node identifier list, a mobility management unit list, an AMF identifier list, an MME identifier list, a location area list, and a cell list of the service area list; and/ or
  • the position measurement technique information includes at least one of the following: an ECID measurement, an OTDOA measurement, and an UTDOA measurement.
  • control information indicates whether it is required to request the user terminal to perform permission verification on the location request when the location of the user terminal needs to be acquired;
  • the controlling the related behavior of acquiring the location of the user terminal according to the reference to the control information including:
  • control information indicates that when the location of the user terminal needs to be acquired, the user does not need to be requested.
  • the terminal allows the location request to be verified, and the network unit can acquire the location of the user terminal, thereby reducing the verification signaling to save transmission resources.
  • control information indicates at least one of: a location service client that needs to verify the location request, needs to verify the location request, does not need to verify the location request, and does not need to verify the location request.
  • Location service customer information indicates at least one of: a location service client that needs to verify the location request, needs to verify the location request, does not need to verify the location request, and does not need to verify the location request.
  • the method before the receiving the control information, the method further includes at least one of the following:
  • a request to obtain the updated control information is sent.
  • control information of the user terminal can be obtained by using at least one of the foregoing four requests, and the related behavior of acquiring the location of the user terminal can be controlled according to the acquired control information, so as to save the user terminal and the network. Overhead.
  • controlling the related behavior of acquiring the location of the user terminal includes at least one of the following:
  • the foregoing behavior of allowing the location of the user terminal to be obtained may be understood as performing the related behavior of obtaining the location of the user terminal that is allowed by the foregoing control information.
  • the above execution does not allow to acquire the relevant behavior of the location of the user terminal.
  • the start timer can be understood as performing a related behavior that does not allow obtaining the location of the user terminal for a period of time, and the control is implemented by starting a timer. That is, after the counter is started and before the timeout, the relevant behavior that does not allow obtaining the location of the user terminal is performed.
  • the duration of the timer may be pre-configured, or may be configured according to an unallowed duration indicated in the control information.
  • the start timer can also be understood as performing a related behavior allowing access to the location of the user terminal for a period of time, by implementing a timer to achieve control. That is, after the counter is started and before the timeout, the relevant behavior of allowing the location of the user terminal to be acquired is performed.
  • the duration of the timer may be configured according to the allowed duration indicated in the control information.
  • the controlling according to the control information, the related behavior of acquiring the location of the user terminal, including:
  • the timer is started, and after the timer starts to be timed and before the timeout, the subsequent execution of the location of the user terminal is not allowed to be performed. Acting; wherein the timer duration of the timer is preset or set according to the duration of the control information indicating that it is not allowed; and/or
  • the timer is started, and before the timer expires, the related behavior that is not allowed to acquire the location of the user terminal is performed; wherein the timer
  • the chronograph duration is preset or set according to the duration of the control information indicating that it is not allowed;
  • the control information indicates a related behavior that allows obtaining the location of the user terminal, and when the control information indicates an allowable time, the timer is started, and before the timer expires, a related behavior that allows obtaining the location of the user terminal is performed.
  • related behaviors that do not allow control information to be allowed in a special time period, and related behaviors allowed by the control information to be executed in a special time period can be implemented, thereby saving the overhead of the user terminal and the network, and also avoiding the The effects of circumstances that are not allowed or always allowed.
  • the user terminal may be sent an inquiry request asking whether to allow the location of the user terminal and/or the location of the user terminal to be obtained, and the subsequent response message of the inquiry request may be correspondingly controlled according to the user terminal, Improve the flexibility of the system.
  • the performing does not allow the related behavior of acquiring the location of the user terminal, including but not limited to: at least one of the following:
  • the foregoing behavior of performing the disallowing of obtaining the location of the user terminal is performed, but is not limited to at least one of the following when generating a location requirement for acquiring the user terminal or receiving a location request for the user terminal. :
  • the foregoing behavior can save the overhead of the user terminal and the network.
  • the related behavior of performing the subsequent disallowing to obtain the location of the user terminal may also refer to performing at least one of the following when generating a location requirement for acquiring the user terminal or receiving a location request for the user terminal. item:
  • performing related actions that allow obtaining the location of the user terminal including performing at least one of the following:
  • the location of the user terminal is obtained in response to the received location request for the user terminal.
  • the foregoing performing the behavior of allowing the location of the user terminal to be obtained refers to performing at least one of the following when generating a location requirement for acquiring the user terminal or receiving a location request for the user terminal:
  • the location of the user terminal is obtained in response to the received location request for the user terminal.
  • the corresponding behavior can be performed under the condition that the control information allows, thereby ensuring the performance of the location service.
  • the method further includes: before, according to the control information, the related behavior of acquiring the location of the user terminal, the method further includes:
  • the controlling the related behavior of acquiring the location of the user terminal according to the reference to the control information including:
  • the related behavior of acquiring the location of the user terminal is controlled according to or referring to the control information.
  • the interactivity between the network element or the location service client can be increased by the above return message.
  • the network unit includes, but is not limited to, at least one of the following: a radio access network node, a radio access network function, a core network function, a core network node, a mobility management node, a mobility management function, a location service management function, Location Service Management Node, Location Service Management Client, eNB, AMF, MME, LCS and E-SMLC.
  • FIG. 5 is a schematic diagram of another method for controlling location acquisition according to an embodiment of the present disclosure. As shown in FIG. 5, the method includes the following steps:
  • Step 501 The user terminal (UE) sends control information about UE location acquisition to a core network unit (such as AMF, MME).
  • a core network unit such as AMF, MME.
  • the user terminal transmits control information about the location of the user terminal to the core network unit through the radio access network unit.
  • the control information about the UE location acquisition is described in the control information in step 302, and details are not described herein again.
  • the UE may send to the core network unit by using an RRC message or a NAS message.
  • the UE may send to the core network unit by the following but not limited to the following message.
  • Registration request (such as Registration request, Attach Request), registration completion (such as Registration Complete, Attach Complete), location update request message (such as Registration request, TAU Request), location update completion (such as Registration Complete, TAU Complete), location request permission
  • the control information in the verification response is sent to the mobility management node/function regarding UE location acquisition.
  • the NAS message is transparently transmitted through the radio access network unit.
  • the RRC message is sent through the radio access network unit, and then the radio access network unit forwards the message to the management node/function (such as AMF, MME) through the S1 or NG interface message.
  • the management node/function such as AMF, MME
  • the mobility management node/function may send control information about UE location acquisition to the location service management node/function (such as E-SMLC, LCS).
  • the location service management node/function such as E-SMLC, LCS.
  • the core network element herein may contain multiple network nodes or network functions (mobile management node/function, location service management node/function, user data management node/function, etc.). In an embodiment, operations between network nodes or network functions within a core network element are not limited.
  • the mobility management node/function or location service management node/function may save or update control information regarding UE location acquisition.
  • the mobility management node/function or location service management node/function may send control information about UE location acquisition to a user data management node/function (such as HSS, UDM) for storage or update.
  • Step 502 The location service client sends a location service request to a core network unit, such as a location service management unit. After receiving the location request sent by the location service client, the location service management unit may generate a location request for the UE and send it to the mobility management unit. The mobility management unit transmits the result of acquiring the location of the UE to the location service management unit.
  • the interoperation position between the location service management unit and the mobility management unit is not limited in the embodiment.
  • the core network unit controls the location service request of the location service client according to the received control information, the subscription information of the UE, and/or the capabilities of the UE.
  • the core network unit can obtain the latest control information about UE location acquisition from the user data management section unit.
  • the core network unit may perform at least one of the following:
  • the core network unit Before the core network unit receives the update of the control information sent by the UE, such as not allowing the location update of the UE to be allowed to obtain the location of the UE, the following may be performed: the verification request for obtaining the location of the user terminal is not sent to the UE, The location of the UE is not acquired, and the UE location measurement is not triggered to the wireless access node.
  • Step 503 The core network unit returns a location service response to the location service client, and indicates a reason for obtaining the location failure and/or failure of the UE.
  • the reason for the failure may be that the user terminal does not allow it.
  • the location service customer can start a timer (which can be pre-configured) for timing. The location request for the UE is not sent to the network until the timer expires.
  • FIG. 6 is a schematic diagram of another method for controlling location acquisition according to an embodiment of the present disclosure. As shown in FIG. 6, the method includes the following steps:
  • Step 601 is the same as step 501 in the embodiment shown in FIG. 5, and details are not described herein again.
  • Step 602 When the control information about the UE location acquisition indicates that the time period/time length of the UE location is not allowed to be acquired, the core network unit may perform at least one of the following:
  • the core network unit may set the back off timer sent to the location service client according to the duration.
  • the backoff time can be greater than or equal to the duration.
  • the location service client does not send a location request for the UE within the specified backoff time.
  • the core network unit may set a back off period sent to the location service client according to the time period.
  • the back off period may include, but is not limited to, the period of time.
  • the location service client does not send a location request for the UE during the specified backoff period.
  • Step 603 The core network unit receives a location service request for the UE sent by the location service client.
  • Step 604 The core network unit returns a location service response to the location service client, and indicates a reason for obtaining the location failure and/or failure of the UE.
  • the reason for the failure may be that the UE does not allow it. If the core network unit also returns a backoff time to the location service customer, the location service client can time the timer according to the backoff time. The location request for the UE is not sent to the network until the timer expires. If the core network unit also returns a fallback time period to the location service client, the location service client does not send a location request for the UE to the network within the backoff period after receipt.
  • Step 605 the timer expires or the current time is not within the time period.
  • Step 606 The location service client sends a location service request for the UE to the core network unit.
  • Step 607 The core network unit initiates a process of acquiring the location of the UE, and the step is not limited in this embodiment.
  • Step 608 The core network unit returns a location service response to the location service client.
  • FIG. 7 is a schematic diagram of another method for controlling location acquisition according to an embodiment of the present disclosure. As shown in FIG. 7, the method includes the following steps:
  • Step 701 is the same as step 501 in the embodiment shown in FIG. 5, and details are not described herein again.
  • Step 702 The first location service client sends a location service request for the UE to the core network unit.
  • the control information regarding UE location acquisition indicates that it is not allowed to acquire location service customer information of the UE location or location service customer information that allows acquisition of the UE location.
  • the first location service client is the location service client information indicated by the control information that is not allowed to acquire the location of the UE, and is not included in the location service client information that is not allowed to acquire the location of the UE indicated by the control information.
  • the core network unit returns to the first location service client to obtain the UE location failure, the back off timer, the back off period, and/or the reason for the failure (such as the UE does not allow).
  • the control information about the UE location acquisition further includes a time period/time length that does not allow the first location service client to acquire the UE location
  • the core network unit may set the backoff time period according to the time period.
  • the backoff period may include, but is not limited to, the period of time.
  • the core network unit can set the backoff time according to the duration. The backoff time can be greater than or equal to the duration.
  • Step 703 The core network unit returns a location service response to the location service client, and indicates a reason for obtaining the location failure and/or failure of the UE.
  • Step 704 The second location service client sends a location service request for the UE to the core network unit.
  • the second location service client is in the location service client information indicating that the control information indicates that the location of the UE is allowed to be acquired or is not included in the location service client information that the control information indicates that the location of the UE is not allowed to be acquired.
  • Step 705 The core network unit initiates a process of acquiring the location of the UE. This step is not limited in this embodiment.
  • Step 706 The core network unit returns a location service response to the location service client.
  • FIG. 8 is a schematic diagram of another method for controlling location acquisition according to an embodiment of the present disclosure. As shown in FIG. 8, the method includes the following steps:
  • Step 801 The location service client sends a location service request for the UE to the core network unit.
  • Step 802 The core network unit sends a verification request or a location request for acquiring the location of the user terminal to the UE.
  • Step 803 The UE sends a verification response or a location request response to the location request to the UE to the core network unit.
  • control information about UE location acquisition is included in the foregoing response.
  • the control information about the UE location acquisition is as described in the control information in step 302, and details are not described herein again.
  • control information regarding UE location acquisition indicates at least one of the following:
  • the related behavior of obtaining the location of the user terminal requested by the network unit or the location service client; the subsequent related behavior of obtaining the location of the user terminal is not allowed;
  • the duration of subsequent actions related to obtaining the location of the user terminal is not allowed
  • the duration of the subsequent behavior that does not allow the subsequent acquisition of the location of the user terminal may be set by the length of time in the control information that does not allow subsequent conditions of the related behavior of obtaining the location of the user terminal.
  • the duration of the related behavior of not obtaining the location of the user terminal may refer to the need to wait for a period of time before allowing subsequent related behaviors to acquire the location of the UE or may not allow subsequent acquisition of the location of the UE for a period of time.
  • the related behaviors of obtaining the location of the UE in this embodiment are as described in step 302, and details are not described herein again.
  • the current situation (energy, overhead) of the UE may not support frequent location measurements.
  • this location request for the UE can be allowed, but by setting a length of time that does not allow subsequent related actions regarding the location of the UE.
  • Step 804 The core network unit receives the verification response information that includes the control information, and the control information indicates that the subsequent behavior of obtaining the location of the user terminal is not allowed, and the core network unit may start a timing according to the default configuration timer. The device starts timing.
  • a timer may be started according to the duration.
  • the core network unit performs at least one of the following: the location request for the UE received from the location service client returns a failure, does not send a verification request to the UE for obtaining the location of the user terminal, does not trigger the acquisition.
  • the location behavior of the UE does not request the behavior of the radio access network unit to trigger the location of the UE.
  • Step 805 The core network unit triggers the current process of acquiring the UE location, and acquires the location of the UE.
  • Step 806 The core network unit sends a location service response to the location service client, and may include a back off timer. After receiving the backoff time, the location service client does not initiate a location request for the UE to the network within the backoff time. The core network unit sets the backoff time according to the duration provided by the UE that does not allow subsequent UE location acquisition. The backoff time can be greater than or equal to the duration.
  • FIG. 9 is a schematic diagram of another method for controlling location acquisition according to an embodiment of the present disclosure. As shown in FIG. 9, the method includes the following steps:
  • Step 901 The core network unit requests, by using a radio access network unit, control information about acquiring a location of the UE.
  • the request may indicate at least one of the following:
  • the current control information about the location of the UE is requested by the UE.
  • the control information about the location of the UE is as described in the control information in step 302, and details are not described herein again.
  • the requesting UE reports the updated control information about acquiring the location of the UE when the control information about the location of the UE is changed.
  • Step 902 The UE returns control information about acquiring the location of the UE to the core network unit. After receiving the control information, the core network unit controls the related behavior about acquiring the location of the UE according to or with reference to the control information.
  • Step 903 The UE side changes the control information about acquiring the location of the UE, for example, the UE or the user changes the tendency to acquire the location of the UE.
  • the UE decides whether to send control information about acquiring the location of the UE after the update is sent to the core network. If it is decided to send, then go to step 904, otherwise the process ends.
  • Step 904 The UE sends updated control information about acquiring the location of the UE to the core network unit.
  • the core network unit updates according to the received control information, and subsequently controls the related behavior about acquiring the location of the UE according to the updated control information.
  • the information sent by the UE to the core network unit can be forwarded or transparently transmitted through the radio access network.
  • FIG. 10 is a structural diagram of a user terminal according to an embodiment of the present disclosure. As shown in FIG. 10, the user terminal 1000 includes:
  • the determining module 1001 is configured to determine whether the predetermined condition is met;
  • the sending module 1002 is configured to, when determining that the predetermined condition is met, send control information, where the control information is used to control a related behavior of acquiring a location of the user terminal.
  • control information indicates at least one of the following:
  • the disallowing condition for obtaining the relevant behavior of the location of the user terminal is not allowed
  • control information indicates a related behavior that allows obtaining the location of the user terminal.
  • the control information indicates a related behavior that allows subsequent acquisition of the location of the user terminal.
  • the control information indicates an allowable range of related behaviors that allow obtaining the location of the user terminal.
  • the control information indicates an allowable range of related behaviors that allow subsequent acquisition of the location of the user terminal.
  • control information indicates that the location of the user terminal is not allowed to be acquired.
  • the control information indicates that the disallowed range of the location of the user terminal is not allowed to be acquired.
  • the control information indicates that subsequent acquisition of the location of the user terminal is not allowed; and/or
  • the control information indicates that the subsequent disallowing range of the location of the user terminal is not allowed.
  • control information further indicates at least one of the following:
  • Allowing disclosure of the allowed range of the location of the acquired user terminal and/or
  • control information indicates the allowed range by indicating an allowable condition
  • the control information indicates the allowable range by indicating an impermissible condition, wherein a range that does not satisfy the disallowed condition belongs to the allowable range;
  • the control information indicates the disallowed range by indicating an impermissible condition
  • the control information indicates the disallowed range by indicating an allowable condition, wherein a range that does not satisfy the disallowed condition belongs to the allowable range.
  • the permission condition includes at least one of the following: an allowed time period, an allowed time period, an allowed location service customer information, permitted usage information, allowed terminal status information, allowed location type information, allowed Mobile area range information, location measurement technology information allowed; and/or
  • the disallowing condition includes at least one of the following: an impermissible time period, an unallowed time length, an impermissible location service customer information, an impermissible use information, an impermissible terminal status information, and an impermissible location type information. Information about mobile area range that is not allowed, and location measurement technology that is not allowed.
  • the location service client information includes at least one of the following: an identifier of the location service client, a name of the location service client identifier, a domain name address of the location service client identifier, an identifier of the location service client requester, and a location
  • an identifier of the location service client e.g., a name of the location service client identifier, a domain name address of the location service client identifier, an identifier of the location service client requester, and a location
  • the name of the service client requestor, the IP address of the location service client requestor, the port number of the location service client application of the type of location service client location request a location service client application of the type of location service client location request.
  • the usage information includes at least one of the following: emergency business use and commercial use; and/or
  • the terminal status information includes at least one of the following: an idle state, a connected state, an inactive state, an available state, a non-use for location measurement, a booting time, and a shutdown state; and/or
  • the location type information includes at least one of: a current location, a historical location, and a latest location; and/or
  • the mobile area range information includes at least one of the following: a tracking area TA identifier list, a radio access network node identifier list, a mobility management unit list, an authentication management function AMF identifier list, a mobility management entity MME identifier list, a location area list, and a service. a list of cells in the zone list; and/or
  • the location measurement technology information includes at least one of the following: an enhanced base station center positioning method ECID measurement, an observation time difference difference OTDOA measurement, and an uplink arrival time difference UTDOA measurement.
  • control information indicates whether the user terminal is required to perform the permission verification on the location request when the location of the user terminal needs to be acquired.
  • control information indicates at least one of: a location service client that needs to verify the location request, needs to verify the location request, does not need to verify the location request, and does not need to verify the location request.
  • Location service customer information indicates at least one of: a location service client that needs to verify the location request, needs to verify the location request, does not need to verify the location request, and does not need to verify the location request.
  • the predetermined condition includes at least one of the following:
  • the acquiring the related behavior of the location of the user terminal refers to: when, for example, a network unit or a location service client generates a location request for acquiring the user terminal or receives a location request for the user terminal, including At least one of the following:
  • the sending is used to send the control information to a network unit
  • the network unit includes at least one of the following: a radio access network node, a radio access network function, a core network function, a core network node, a mobility management node, a mobility management function, a location service management function, a location service management node, The location service manages clients, eNBs, gNBs, AMFs, MMEs, LCSs, and E-SMLCs.
  • the base station provided by the embodiment of the present disclosure can implement various processes implemented by the user terminal in the method embodiment of FIG. 2 to FIG. 3, to avoid repetition, no further details are provided herein, and transmission resources can be saved, and power consumption of the user terminal can also be reduced. .
  • FIG. 11 is a structural diagram of a position acquisition control apparatus according to an embodiment of the present disclosure.
  • the apparatus is applied to a network unit or a location service client.
  • the location acquisition control apparatus 1100 includes :
  • the receiving module 1101 is configured to receive control information, where the control information is used to control a related behavior of acquiring a location of the user terminal;
  • the control module 1102 is configured to control, according to or refer to the control information, a related behavior of acquiring a location of the user terminal.
  • control information indicates at least one of the following:
  • the disallowing condition for obtaining the relevant behavior of the location of the user terminal is not allowed
  • control information indicates a related behavior that allows obtaining the location of the user terminal.
  • the control information indicates a related behavior that allows subsequent acquisition of the location of the user terminal.
  • the control information indicates an allowable range of related behaviors that allow obtaining the location of the user terminal.
  • the control information indicates an allowable range of related behaviors that allow subsequent acquisition of the location of the user terminal
  • the control module 1102 is configured to perform, according to or refer to the control information, a related behavior of acquiring a location of the user terminal; and/or perform subsequent acquisition of a location of the location of the user terminal according to or referring to the control information. Acting; and/or performing, in accordance with or with reference to the control information, performing an act of acquiring a location of the user terminal within an allowable range of the control information indicating that the location of the user terminal is permitted to be acquired; and/or According to or referring to the control information, a subsequent related behavior of acquiring the location of the user terminal is performed within an allowable range in which the control information indicates a subsequent behavior that allows subsequent acquisition of the location of the user terminal.
  • control information indicates that the location of the user terminal is not allowed to be acquired.
  • the control information indicates that the disallowed range of the location of the user terminal is not allowed to be acquired.
  • the control information indicates that subsequent acquisition of the location of the user terminal is not allowed; and/or
  • the control information indicates that the subsequent unacceptable range of obtaining the location of the user terminal is not allowed
  • the control module 1102 is configured to not acquire the location of the user terminal according to or refer to the control information; and or, according to or refer to the control information, the control information indicates that the location of the user terminal is not allowed to be acquired. Within the disallowed range, the location of the user terminal is not allowed to be obtained; and or the subsequent acquisition of the location of the user terminal is not permitted according to or with reference to the control information; and/or according to or referring to the control information, The control information indicates that the subsequent acquisition of the location of the user terminal is not allowed, and the subsequent acquisition of the location of the user terminal is not allowed.
  • control information further indicates at least one of the following:
  • Allowing disclosure of the allowed range of the location of the acquired user terminal and/or
  • the control module 1102 is configured to disclose the location of the acquired user terminal according to or refer to the control information; and/or according to or refer to the control information, in the location of the user terminal that is allowed to disclose the acquired Within the permitted range, the location of the acquired user terminal is disclosed; and/or according to or with reference to the control information, the disclosure is not allowed within the disallowed range of the location of the user terminal that is not allowed to disclose the acquisition.
  • the location of the obtained user terminal is configured to disclose the location of the acquired user terminal according to or refer to the control information; and/or according to or refer to the control information, in the location of the user terminal that is allowed to disclose the acquired Within the permitted range, the location of the acquired user terminal is disclosed; and/or according to or with reference to the control information, the disclosure is not allowed within the disallowed range of the location of the user terminal that is not allowed to disclose the acquisition.
  • the location of the obtained user terminal is configured to disclose the location of the acquired user terminal according to or refer to the control information; and/or according to or refer to the
  • control information indicates the allowed range by indicating an allowable condition
  • the control information indicates the allowable range by indicating an impermissible condition, wherein a range that does not satisfy the disallowed condition belongs to the allowable range;
  • the control information indicates the disallowed range by indicating an impermissible condition
  • the control information indicates the disallowed range by indicating an allowable condition, wherein a range that does not satisfy the disallowed condition belongs to the allowable range.
  • the permission condition includes at least one of the following: an allowed time period, an allowed time period, an allowed location service customer information, permitted usage information, allowed terminal status information, allowed location type information, allowed Mobile area range information, location measurement technology information allowed; and/or
  • the disallowing condition includes at least one of the following: an impermissible time period, an unallowed time length, an impermissible location service customer information, an impermissible use information, an impermissible terminal status information, and an impermissible location type information. Information about mobile area range that is not allowed, and location measurement technology that is not allowed.
  • the location service client information includes at least one of the following: an identifier of the location service client, a name of the location service client identifier, a domain name address of the location service client identifier, an identifier of the location service client requester, and a location
  • an identifier of the location service client e.g., a name of the location service client identifier, a domain name address of the location service client identifier, an identifier of the location service client requester, and a location
  • the name of the service client requestor, the IP address of the location service client requestor, the port number of the location service client application of the type of location service client location request a location service client application of the type of location service client location request.
  • the usage information includes at least one of the following: emergency business use and commercial use; and/or
  • the terminal status information includes at least one of the following: an idle state, a connected state, an inactive state, an available state, a non-use for location measurement, a booting time, and a shutdown state; and/or
  • the location type information includes at least one of: a current location, a historical location, and a latest location; and/or
  • the mobile area range information includes at least one of the following: a TA identifier list, a radio access network node identifier list, a mobility management unit list, an AMF identifier list, an MME identifier list, a location area list, and a cell list of the service area list; and/ or
  • the position measurement technique information includes at least one of the following: an ECID measurement, an OTDOA measurement, and an UTDOA measurement.
  • control information indicates whether it is required to request the user terminal to perform permission verification on the location request when the location of the user terminal needs to be acquired;
  • the control module is configured to determine, when referring to the control information, whether to request the user terminal to perform permission verification on the location request, when the location of the user terminal needs to be acquired.
  • control information indicates at least one of: a location service client that needs to verify the location request, needs to verify the location request, does not need to verify the location request, and does not need to verify the location request.
  • Location service customer information indicates at least one of: a location service client that needs to verify the location request, needs to verify the location request, does not need to verify the location request, and does not need to verify the location request.
  • the location acquiring control apparatus 1100 further includes at least one of the following:
  • the first sending module 1103 is configured to send an acquisition request for acquiring a location of the user terminal.
  • a second sending module 1104 configured to send a verification request for acquiring a location of the user terminal
  • a third sending module 1105 configured to send a request for acquiring the current control information
  • the fourth sending module 1106 is configured to send a request for obtaining the updated control information.
  • controlling the related behavior of acquiring the location of the user terminal includes at least one of the following:
  • control module 1102 is configured to start a timer when the control information indicates that the subsequent related behavior of acquiring the location of the user terminal is not allowed, and perform subsequent imperencing after the timer starts timing and before the timer expires.
  • the related behavior of the location of the user terminal is started, the timer is started, and before the timer expires, a related behavior that is not allowed to acquire the location of the user terminal is performed; wherein the timer duration of the timer is preset or Setting the length of time according to the control information indicating that the time limit is not allowed; and/or the control information indicating that the relevant behavior of the location of the user terminal is allowed to be acquired and the control information indicates the time allowed, the timer is started, and the time is counted. Before the timer expires
  • the performing does not allow the related behavior of acquiring the location of the user terminal, including performing at least one of the following:
  • the performing the behavior of allowing the location of the user terminal to be obtained includes performing at least one of the following:
  • the location of the user terminal is obtained in response to the received location request for the user terminal.
  • the location acquiring control apparatus 1100 further includes at least one of the following:
  • the confirmation module 1107 is configured to confirm whether the control information is accepted, and return a return message to the user terminal whether to confirm acceptance of the control information and/or confirm the accepted control information;
  • the control module 1102 is configured to control, after receiving the control information, the related behavior of acquiring the location of the user terminal according to or referring to the control information.
  • the network unit includes at least one of the following: a radio access network node, a radio access network function, a core network function, a core network node, a mobility management node, a mobility management function, a location service management function, and a location service management.
  • a radio access network node a radio access network function
  • a core network function a core network node
  • a mobility management node a mobility management function
  • a location service management function a location service management function
  • a location service management e.g., Location Service Management Client, eNB, AMF, MME, LCS and E-SMLC.
  • the base station provided by the embodiment of the present disclosure can implement various processes implemented by the network unit in the method embodiment of FIG. 4, and is not described herein again to avoid repetition, and can save transmission resources, and can also reduce power consumption of the user terminal.
  • FIG. 14 is a schematic structural diagram of hardware of a user terminal that implements various embodiments of the present disclosure.
  • the user terminal 1400 includes, but is not limited to, a radio frequency unit 1401, a network module 1402, an audio output unit 1403, an input unit 1404, a sensor 1405, a display unit 1406, a user input unit 1407, an interface unit 1408, a memory 1409, a processor 1410, and Power supply 1411 and other components. It will be understood by those skilled in the art that the user terminal structure shown in FIG. 14 does not constitute a limitation on the user terminal, and the user terminal may include more or less components than the illustration, or combine some components, or different components. Arrangement.
  • the user terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, an in-vehicle user terminal, a wearable device, a pedometer, and the like.
  • the processor 1410 is configured to determine whether the predetermined condition is met
  • the radio frequency unit 1401 is configured to, when determining that the predetermined condition is met, send control information, where the control information is used to control a related behavior of acquiring a location of the user terminal.
  • control information indicates at least one of the following:
  • the disallowing condition for obtaining the relevant behavior of the location of the user terminal is not allowed
  • control information indicates a related behavior that allows obtaining the location of the user terminal.
  • the control information indicates a related behavior that allows subsequent acquisition of the location of the user terminal.
  • the control information indicates an allowable range of related behaviors that allow obtaining the location of the user terminal.
  • the control information indicates an allowable range of related behaviors that allow subsequent acquisition of the location of the user terminal.
  • control information indicates that the location of the user terminal is not allowed to be acquired.
  • the control information indicates that the disallowed range of the location of the user terminal is not allowed to be acquired.
  • the control information indicates that subsequent acquisition of the location of the user terminal is not allowed; and/or
  • the control information indicates that the subsequent disallowing range of the location of the user terminal is not allowed.
  • control information further indicates at least one of the following:
  • Allowing disclosure of the allowed range of the location of the acquired user terminal and/or
  • control information indicates the allowed range by indicating an allowable condition
  • the control information indicates the allowable range by indicating an impermissible condition, wherein a range that does not satisfy the disallowed condition belongs to the allowable range;
  • the control information indicates the disallowed range by indicating an impermissible condition
  • the control information indicates the disallowed range by indicating an allowable condition, wherein a range that does not satisfy the disallowed condition belongs to the allowable range.
  • the permission condition includes at least one of the following: an allowed time period, an allowed time period, an allowed location service customer information, permitted usage information, allowed terminal status information, allowed location type information, allowed Mobile area range information, location measurement technology information allowed; and/or
  • the disallowing condition includes at least one of the following: an impermissible time period, an unallowed time length, an impermissible location service customer information, an impermissible use information, an impermissible terminal status information, and an impermissible location type information. Information about mobile area range that is not allowed, and location measurement technology that is not allowed.
  • the location service client information includes at least one of the following: an identifier of the location service client, a name of the location service client identifier, a domain name address of the location service client identifier, an identifier of the location service client requester, and a location
  • an identifier of the location service client e.g., a name of the location service client identifier, a domain name address of the location service client identifier, an identifier of the location service client requester, and a location
  • the name of the service client requestor, the IP address of the location service client requestor, the port number of the location service client application of the type of location service client location request a location service client application of the type of location service client location request.
  • the usage information includes at least one of the following: emergency business use and commercial use; and/or
  • the terminal status information includes at least one of the following: an idle state, a connected state, an inactive state, an available state, a non-use for location measurement, a booting time, and a shutdown state; and/or
  • the location type information includes at least one of: a current location, a historical location, and a latest location; and/or
  • the mobile area range information includes at least one of the following: a tracking area TA identifier list, a radio access network node identifier list, a mobility management unit list, an authentication management function AMF identifier list, a mobility management entity MME identifier list, a location area list, and a service. a list of cells in the zone list; and/or
  • the location measurement technology information includes at least one of the following: an enhanced base station center positioning method ECID measurement, an observation time difference difference OTDOA measurement, and an uplink arrival time difference UTDOA measurement.
  • control information indicates whether the user terminal is required to perform the permission verification on the location request when the location of the user terminal needs to be acquired.
  • control information indicates at least one of: a location service client that needs to verify the location request, needs to verify the location request, does not need to verify the location request, and does not need to verify the location request.
  • Location service customer information indicates at least one of: a location service client that needs to verify the location request, needs to verify the location request, does not need to verify the location request, and does not need to verify the location request.
  • the predetermined condition includes at least one of the following:
  • a verification request (such as sent by a network unit or a location service client) to obtain a location of the user terminal
  • Receiving (such as sent by the network unit or the location service client), when the control information is changed, obtaining the updated request for the control information.
  • the acquiring the related behavior of the location of the user terminal refers to: when, for example, a network unit or a location service client generates a location request for acquiring the user terminal or receives a location request for the user terminal, including At least one of the following:
  • the network unit includes at least one of the following: a radio access network node, a radio access network function, a core network function, a core network node, a mobility management node, a mobility management function, a location service management function, a location service management node, Location service management client, evolved base station eNB, next generation base station gNB, access and mobility management function AMF, mobility management entity MME, location service function LCS and enhanced service mobile location center E-SMLC.
  • a radio access network node a radio access network function, a core network function, a core network node, a mobility management node, a mobility management function, a location service management function, a location service management node, Location service management client, evolved base station eNB, next generation base station gNB, access and mobility management function AMF, mobility management entity MME, location service function LCS and enhanced service mobile location center E-SMLC.
  • the radio frequency unit 1401 may be used for receiving and transmitting signals during and after receiving or transmitting information or a call, and specifically, after receiving downlink data from the base station, processing the processor 1410; The uplink data is sent to the base station.
  • radio frequency unit 1401 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the radio unit 1401 can also communicate with the network and other devices through a wireless communication system.
  • the user terminal provides the user with wireless broadband Internet access through the network module 1402, such as helping the user to send and receive emails, browse web pages, and access streaming media.
  • the audio output unit 1403 may convert the audio data received by the radio frequency unit 1401 or the network module 1402 or stored in the memory 1409 into an audio signal and output as a sound. Moreover, the audio output unit 1403 can also provide audio output (eg, call signal reception sound, message reception sound, etc.) related to a particular function performed by the user terminal 1400.
  • the audio output unit 1403 includes a speaker, a buzzer, a receiver, and the like.
  • the input unit 1404 is for receiving an audio or video signal.
  • the input unit 1404 may include a graphics processing unit (GPU) 14041 and a microphone 14042, and the graphics processor 14041 images an still picture or video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode.
  • the data is processed.
  • the processed image frame can be displayed on display unit 1406.
  • the image frames processed by the graphics processor 14041 may be stored in the memory 1409 (or other storage medium) or transmitted via the radio unit 1401 or the network module 1402.
  • the microphone 14042 can receive sound and can process such sound as audio data.
  • the processed audio data can be converted to a format output that can be transmitted to the mobile communication base station via the radio unit 1401 in the case of a telephone call mode.
  • User terminal 1400 also includes at least one type of sensor 1405, such as a light sensor, motion sensor, and other sensors.
  • the light sensor includes an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display panel 14061 according to the brightness of the ambient light, and the proximity sensor can close the display panel 14061 when the user terminal 1400 moves to the ear. / or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the posture of the user terminal (such as horizontal and vertical screen switching, related games).
  • sensor 1405 may also include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, Infrared sensors and the like are not described here.
  • the display unit 1406 is for displaying information input by the user or information provided to the user.
  • the display unit 1406 can include a display panel 14061.
  • the display panel 14061 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the user input unit 1407 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the user terminal.
  • the user input unit 1407 includes a touch panel 14071 and other input devices 14072.
  • the touch panel 14071 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 1471 or near the touch panel 14071. operating).
  • the touch panel 14071 may include two parts of a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 1410 receives the commands from the processor 1410 and executes them.
  • the touch panel 14071 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the user input unit 1407 may also include other input devices 14072.
  • the other input devices 14072 may include, but are not limited to, a physical keyboard, function keys (such as a volume control button, a switch button, etc.), a trackball, a mouse, and a joystick, which are not described herein.
  • the touch panel 14071 can be overlaid on the display panel 14061.
  • the touch panel 14071 detects a touch operation thereon or nearby, the touch panel 14071 transmits to the processor 1410 to determine the type of the touch event, and then the processor 1410 according to the touch.
  • the type of event provides a corresponding visual output on display panel 14061.
  • the touch panel 14071 and the display panel 14061 are used as two independent components to implement the input and output functions of the user terminal, in some embodiments, the touch panel 14071 and the display panel 14061 may be integrated.
  • the input and output functions of the user terminal are implemented, and are not limited herein.
  • the interface unit 1408 is an interface in which an external device is connected to the user terminal 1400.
  • the external device may include a wired or wireless headset port, an external power (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, and an audio input/output. (I/O) port, video I/O port, headphone port, and more.
  • the interface unit 1408 can be configured to receive input from an external device (eg, data information, power, etc.) and transmit the received input to one or more components within the user terminal 1400 or can be used at the user terminal 1400 and externally Data is transferred between devices.
  • Memory 1409 can be used to store software programs as well as various data.
  • the memory 1409 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
  • memory 1409 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the processor 1410 is a control center of the user terminal that connects various portions of the entire user terminal using various interfaces and lines, by running or executing software programs and/or modules stored in the memory 1409, and recalling data stored in the memory 1409.
  • the user terminal performs various functions and processing data, thereby performing overall monitoring on the user terminal.
  • the processor 1410 can include one or more processing units; optionally, the processor 1410 can integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, an application, etc., and a modulation solution
  • the processor mainly handles wireless communication. It will be appreciated that the above described modem processor may also not be integrated into the processor 1410.
  • the user terminal 1400 can also include a power source 1411 (such as a battery) for powering various components.
  • a power source 1411 such as a battery
  • the power source 1411 can be logically coupled to the processor 1410 through a power management system to manage charging, discharging, and power consumption through the power management system. Management and other functions.
  • the user terminal 1400 includes some functional modules not shown, and details are not described herein again.
  • an embodiment of the present disclosure further provides a user terminal, including a processor 1410, a memory 1409, a computer program stored on the memory 1409 and executable on the processor 1410, the computer program being executed by the processor 1410.
  • a user terminal including a processor 1410, a memory 1409, a computer program stored on the memory 1409 and executable on the processor 1410, the computer program being executed by the processor 1410.
  • FIG. 15 is a structural diagram of another location acquisition control apparatus applicable to an embodiment of the present disclosure.
  • the apparatus is applied to a network unit or a location service client.
  • the location acquisition control apparatus 1500 is shown.
  • the system includes: a processor 1501, a transceiver 1502, a memory 1503, and a bus interface, wherein:
  • the transceiver 1502 is configured to receive control information, where the control information is used to control a related behavior of acquiring a location of the user terminal.
  • the processor 1501 is configured to control, according to or refer to the control information, a related behavior of acquiring a location of the user terminal.
  • control information indicates at least one of the following:
  • the disallowing condition for obtaining the relevant behavior of the location of the user terminal is not allowed
  • control information indicates a related behavior that allows obtaining the location of the user terminal.
  • the control information indicates a related behavior that allows subsequent acquisition of the location of the user terminal.
  • the control information indicates an allowable range of related behaviors that allow obtaining the location of the user terminal.
  • the control information indicates an allowable range of related behaviors that allow subsequent acquisition of the location of the user terminal
  • the controlling the related behavior of acquiring the location of the user terminal according to the reference to the control information including:
  • a subsequent related behavior of acquiring the location of the user terminal is performed within an allowable range in which the control information indicates a subsequent behavior that allows subsequent acquisition of the location of the user terminal.
  • control information indicates that the location of the user terminal is not allowed to be acquired.
  • the control information indicates that the disallowed range of the location of the user terminal is not allowed to be acquired.
  • the control information indicates that subsequent acquisition of the location of the user terminal is not allowed; and/or
  • the control information indicates that the subsequent unacceptable range of obtaining the location of the user terminal is not allowed
  • the controlling the related behavior of acquiring the location of the user terminal according to the reference to the control information including:
  • the location of the user terminal is not allowed to be obtained within an impermissible range in which the control information indicates that the location of the user terminal is not allowed to be acquired;
  • control information subsequent acquisition of the location of the user terminal is not allowed.
  • control information indicates that the subsequent acquisition of the location of the user terminal is not allowed, the subsequent acquisition of the location of the user terminal is not allowed.
  • control information further indicates at least one of the following:
  • Allowing disclosure of the allowed range of the location of the acquired user terminal and/or
  • the controlling the related behavior of acquiring the location of the user terminal according to the reference to the control information including:
  • Devising according to or with reference to the control information, a location of the acquired user terminal within an allowable range of allowing the location of the acquired user terminal to be disclosed;
  • the location of the acquired user terminal is not allowed to be disclosed within the disallowed range of the location of the user terminal that is not allowed to disclose the acquisition.
  • control information indicates the allowed range by indicating an allowable condition
  • the control information indicates the allowable range by indicating an impermissible condition, wherein a range that does not satisfy the disallowed condition belongs to the allowable range;
  • the control information indicates the disallowed range by indicating an impermissible condition
  • the control information indicates the disallowed range by indicating an allowable condition, wherein a range that does not satisfy the disallowed condition belongs to the allowable range.
  • the permission condition includes at least one of the following: an allowed time period, an allowed time period, an allowed location service customer information, permitted usage information, allowed terminal status information, allowed location type information, allowed Mobile area range information, location measurement technology information allowed; and/or
  • the disallowing condition includes at least one of the following: an impermissible time period, an unallowed time length, an impermissible location service customer information, an impermissible use information, an impermissible terminal status information, and an impermissible location type information. Information about mobile area range that is not allowed, and location measurement technology that is not allowed.
  • the location service client information includes at least one of the following: an identifier of the location service client, a name of the location service client identifier, a domain name address of the location service client identifier, an identifier of the location service client requester, and a location
  • an identifier of the location service client e.g., a name of the location service client identifier, a domain name address of the location service client identifier, an identifier of the location service client requester, and a location
  • the name of the service client requestor, the IP address of the location service client requestor, the port number of the location service client application of the type of location service client location request a location service client application of the type of location service client location request.
  • the usage information includes at least one of the following: emergency business use and commercial use; and/or
  • the terminal status information includes at least one of the following: an idle state, a connected state, an inactive state, an available, a non-useable location measurement, a power on time, and a power off time; and/or
  • the location type information includes at least one of: a current location, a historical location, and a latest location; and/or
  • the mobile area range information includes at least one of the following: a TA identifier list, a radio access network node identifier list, a mobility management unit list, an AMF identifier list, an MME identifier list, a location area list, and a cell list of the service area list; and/ or
  • the position measurement technique information includes at least one of the following: an ECID measurement, an OTDOA measurement, and an UTDOA measurement.
  • control information indicates whether it is required to request the user terminal to perform permission verification on the location request when the location of the user terminal needs to be acquired;
  • the controlling the related behavior of acquiring the location of the user terminal according to the reference to the control information including:
  • control information indicates at least one of: a location service client that needs to verify the location request, needs to verify the location request, does not need to verify the location request, and does not need to verify the location request.
  • Location service customer information indicates at least one of: a location service client that needs to verify the location request, needs to verify the location request, does not need to verify the location request, and does not need to verify the location request.
  • the transceiver 1502 before receiving the control information, is further configured to: at least one of the following:
  • a request to obtain the updated control information is sent.
  • controlling the related behavior of acquiring the location of the user terminal includes at least one of the following:
  • a timer is started by performing a related behavior that does not allow obtaining the location of the user terminal.
  • the controlling according to the control information, the related behavior of acquiring the location of the user terminal, including:
  • the timer is started, and after the timer starts to be timed and before the timeout, the subsequent execution of the location of the user terminal is not allowed to be performed. Acting; wherein the timer duration of the timer is preset or set according to the duration of the control information indicating that it is not allowed; and/or
  • the timer is started, and before the timer expires, the related behavior that is not allowed to acquire the location of the user terminal is performed; wherein the timer
  • the chronograph duration is preset or set according to the duration of the control information indicating that it is not allowed;
  • the control information indicates a related behavior that allows obtaining the location of the user terminal, and when the control information indicates an allowable time, the timer is started, and before the timer expires, a related behavior that allows obtaining the location of the user terminal is performed.
  • the performing does not allow the related behavior of acquiring the location of the user terminal, including performing at least one of the following:
  • the performing the behavior of allowing the location of the user terminal to be obtained includes performing at least one of the following:
  • the location of the user terminal is obtained in response to the received location request for the user terminal.
  • the transceiver 1502 is further configured to confirm whether to accept the control information, according to the reference to the control information, before controlling the related behavior of acquiring the location of the user terminal. And returning to the user terminal, whether to confirm the acceptance of the control information and/or confirming the received return message of the control information;
  • the controlling the related behavior of acquiring the location of the user terminal according to the reference to the control information including:
  • the related behavior of acquiring the location of the user terminal is controlled according to or referring to the control information.
  • the network unit includes at least one of the following: a radio access network node, a radio access network function, a core network function, a core network node, a mobility management node, a mobility management function, a location service management function, and a location service management.
  • a radio access network node a radio access network function
  • a core network function a core network node
  • a mobility management node a mobility management function
  • a location service management function a location service management function
  • a location service management e.g., Location Service Management Client, eNB, AMF, MME, LCS and E-SMLC.
  • the transceiver 1502 is configured to receive and transmit data under the control of the processor 1501, and the transceiver 1502 includes at least two antenna ports.
  • the bus architecture may include any number of interconnected buses and bridges, specifically linked by one or more processors represented by processor 1501 and various circuits of memory represented by memory 1503.
  • the bus architecture can also link various other circuits such as peripherals, voltage regulators, and power management circuits, which are well known in the art and, therefore, will not be further described herein.
  • the bus interface provides an interface.
  • Transceiver 1502 can be a plurality of components, including a transmitter and a receiver, providing means for communicating with various other devices on a transmission medium.
  • the user interface 1504 may also be an interface capable of externally connecting the required devices, including but not limited to a keypad, a display, a speaker, a microphone, a joystick, and the like.
  • the processor 1501 is responsible for managing the bus architecture and general processing, and the memory 1503 can store data used by the processor 1501 when performing operations.
  • the embodiment of the present disclosure further provides a location acquisition control device, including a processor 1501, a memory 1503, a computer program stored on the memory 1503 and operable on the processor 1501, the computer program being processed
  • a location acquisition control device including a processor 1501, a memory 1503, a computer program stored on the memory 1503 and operable on the processor 1501, the computer program being processed
  • the process of the embodiment of the control method for implementing the above-mentioned location acquisition is performed, and the same technical effect can be achieved. To avoid repetition, details are not described herein again.
  • the embodiment of the present disclosure further provides a computer readable storage medium on which a computer program is stored, and the computer program is executed by the processor to implement various processes of the method for controlling the location of the user terminal.
  • the embodiment of the present disclosure further provides a computer readable storage medium having a computer program stored thereon, the computer program being executed by the processor to implement various processes of the method for controlling the location of the network unit side.
  • the computer readable storage medium such as a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk.
  • the foregoing embodiment method can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases, the former is better.
  • Implementation Based on such understanding, the technical solution of the present disclosure, which is essential or contributes to the related art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk, CD-ROM).
  • the instructions include a number of instructions for causing a terminal (which may be a cell phone, computer, server, air conditioner, or network device, etc.) to perform the methods described in various embodiments of the present disclosure.

Abstract

本公开实施例提供一种位置获取的控制方法、用户终端和装置,该方法包括:判断预定条件是否满足;在确定预定条件满足时,发送控制信息,所述控制信息用于控制获取所述用户终端的位置的相关行为。

Description

位置获取的控制方法、用户终端和装置
相关申请的交叉引用
本申请主张在2017年11月27日在中国提交的中国专利申请号No.201711204326.6的优先权,其全部内容通过引用包含于此。
技术领域
本公开实施例涉及通信技术领域,尤其涉及一种位置获取的控制方法、用户终端和装置。
背景技术
相关技术中的位置服务中,是网络主动向用户终端请求用户终端上报位置,例如:网络根据位置服务客户的请求,要求用户终端进行位置测量,以及位置上报。但在实际应用中用户终端的用户并不一定想上报自己的位置,所以用户终端可能不会响应网络发送的请求,这样就导致信令占用的传输资源浪费,且还消耗用户终端的功耗。可见,相关技术中的位置服务中存在传输资源浪费和功耗过大的问题。
发明内容
第一方面,本公开实施例提供了一种位置获取的控制方法,应用于用户终端,包括:
判断预定条件是否满足;
在确定预定条件满足时,发送控制信息,所述控制信息用于控制获取所述用户终端的位置的相关行为。
第二方面,本公开实施例还提供了一种位置获取的控制方法,应用于网络单元,包括:
接收控制信息,所述控制信息用于控制获取所述用户终端的位置的相关行为;
根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进 行控制。
第三方面,本公开实施例还提供了一种用户终端,包括:
判断模块,用于判断预定条件是否满足;
发送模块,用于在确定预定条件满足时,发送控制信息,所述控制信息用于控制获取所述用户终端的位置的相关行为。
第四方面,本公开实施例还提供了一种位置获取的控制装置,所述装置应用于网络单元或者位置服务客户,包括:
接收模块,用于接收控制信息,所述控制信息用于控制获取所述用户终端的位置的相关行为;
控制模块,用于根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制。
第五方面,本公开实施例还提供了一种用户终端,包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现本公开实施例提供的用户终端侧的位置获取的控制方法中的步骤。
第六方面,本公开实施例还提供了一种位置获取的控制装置,所述装置应用于网络单元或者位置服务客户,包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现本公开实施例提供的位置获取的控制装置侧的位置获取的控制方法中的步骤。
第七方面,本公开实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现本公开实施例提供的用户终端侧的位置获取的控制方法的步骤。
第八方面,本公开实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现本公开实施例提供的位置获取的控制装置侧的位置获取的控制方法的步骤。
附图说明
为了更清楚地说明本公开实施例的技术方案,下面将对本公开实施例描 述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本公开的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是本公开实施例可应用的一种位置获取的控制系统的结构图;
图2是本公开实施例提供的一种位置获取的控制方法的流程图;
图3是本公开实施例提供的另一种位置获取的控制方法的流程图;
图4是本公开实施例提供的另一种位置获取的控制方法的流程图;
图5是本公开实施例提供的另一种位置获取的控制方法的示意图;
图6是本公开实施例提供的另一种位置获取的控制方法的示意图;
图7是本公开实施例提供的另一种位置获取的控制方法的示意图;
图8是本公开实施例提供的另一种位置获取的控制方法的示意图;
图9是本公开实施例提供的另一种位置获取的控制方法的示意图;
图10是本公开实施例提供的一种用户终端的结构图;
图11是本公开实施例提供的一种位置获取的控制装置的结构图;
图12是本公开实施例提供的另一种位置获取的控制装置的结构图;
图13是本公开实施例提供的另一种位置获取的控制装置的结构图;
图14是本公开实施例提供的另一种用户终端的结构图;
图15是本公开实施例提供的另一种位置获取的控制装置的结构图。
具体实施方式
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。
参见图1,图1是本公开实施例可应用的一种位置获取的控制系统的结构图,如图1所示,包括用户终端11、无线接入网单元12、核心网单元13和至少一个位置服务客户14,其中,用户终端11可以是UE(User Equipment),例如:可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)、个人数字助理(personal digital assistant,PDA)、移动上网装置 (Mobile Internet Device,MID)或可穿戴式设备(Wearable Device)等终端侧设备,需要说明的是,在本公开实施例中并不限定用户终端11的具体类型。无线接入网单元12可以是无线接入网节点和/或无线接入网功能,无线接入网单元可以包括但不限于至少以下一项:演进性基站(evolved Node B,eNB),下一代基站(gNB)、集中控制单元(Centralized Unit,CU)、分布式单元(Distributed Unit,DU)、集中控制单元控制面(Centralized Unit Control Plane,CU-CP)、集中控制单元用户面(Centralized Unit User Plane,CU-UP),需要说明的是,在本公开实施例中并不限定无线接入网单元12的具体类型。用户终端11通过无线接入网单元12可以与核心网单元13进行通信,其中,核心网单元13可以是核心网节点和/或核心网功能,且核心网单元可以包括但不限于至少以下一项:移动管理节点、移动管理功能、位置服务管理节点、位置服务管理功能,用户数据管理节点、用户数据管理功能、接入和移动管理功能(Access and Mobility Management Function,AMF),移动管理实体(Mobile Management Entity,MME),位置服务功能(Location Services,LCS),增强型服务移动定位中心(Enhanced Serving Mobile Location Centre,E-SMLC)。另外,位置服务客户14可以向核心网单元13发送位置获取请求,核心网单元13可以响应或者拒绝该位置获取请求。另外,位置服务客户14可以称作LCS client,可以是第三方设备,例如:商业(commercial)第三方的设备,紧急业务的第三方(比如公安局)的设备等第三方向设备。
用户终端11、无线接入网单元12、核心网单元点13和位置服务客户14的具体功能将通过以下多个实施例进行具体描述。
另外,需要说明的是,本公开中出现的控制信息可以是称作如下信息之一:
关于获取用户终端的位置的控制信息;
用于控制获取用户终端的位置的相关行为的控制信息。
在一些实施方式中,本文所述控制信息也可以理解为用户终端和/或用户的关于获取用户终端位置的相关行为的倾向信息或者可以理解为用户和/或用户终端关于获取用户终端的位置的倾向信息。
另外,需要说明的是,本公开中出现的“允许”还可以称作使能够。本 公开中出现的“不允许”还可以称作以下之一:使不能够,禁止。
另外,在本公开实施例中,用户终端向核心网单元之间的交互的信息都可以通过无线接入网转发或透传。
可选的,用户终端可以通过无线资源控制(Radio Resource Control,RRC)消息或非接入层(Non-access stratum,NAS)消息向核心网单元发送。
用户终端可以通过以下但不限于以下消息向核心网单元发送:
注册请求(比如Registration request,Attach Request)、注册完成(比如Registration Complete,Attach Complete)、位置更新请求消息(比如Registration request,TAU Request)、位置更新完成(比如Registration Complete,TAU Complete)、位置请求允许验证响应中向移动性管理节点/功能发送关于UE位置获取的控制信息。其中,NAS消息是通过无线接入网单元透传的。
通过RRC消息发送通过无线接入网单元,再由无线接入网单元通过S1或NG接口消息转发给管理节点/功能(比如AMF、MME)。
移动管理节点/功能(比如AMF、MME)可以向位置服务管理节点/功能(比如E-SMLC、LCS)发送关于UE位置获取的控制信息。
核心网单元可以包含多个网络节点或网络功能(移动管理节点/功能、位置服务管理节点/功能、用户数据管理节点/功能等)。在本公开实施例中,核心网单元内网络节点或网络功能之间的操作不作限定。
位置服务管理单元收到位置服务客户发送的位置请求后,可以生成关于用户终端的位置请求发送给移动管理单元,移动管理单元将获取用户终端的位置的结果发送给位置服务管理单元,位置服务管理单元和移动管理单元的之间的互操作位置在实施例中不作限定。
另外,本文中的网络单元可以代表网络实体和/或网络功能。核心网单元可以代表核心网实体和/或核心网功能。无线接入网节点可以代表无线接入网实体和/或无线接入网功能。移动管理单元可以代表移动管理实体/移动管理单元。位置服务管理单元可以代表位置服务管理实体/位置服务管理单元。
另外,本公开提到获取所述用户终端的位置的验证请求或验证过程可以是请求用户终端确认是否允许获取用户终端的位置的请求。例如:可以是关于用户终端位置获取的隐私允许的验证请求,也可以是根据用户终端本身倾 向是否允许获取用户终端的位置的验证请求。
在一些实施方式中,本文出现的“后续”,在用户终端侧,后续可以是指用户终端发送控制信息之后。在另一些实施方式中,本文出现的“后续”,在网络单元侧,后续是指网络单元接收控制信息之后。
请参见图2,图2是本公开实施例提供的一种位置获取的控制方法的流程图,如图2所示,包括以下步骤:
步骤201、判断预定条件是否满足。
其中,上述预定条件可以用户终端预先配置的,或者用户预先设置的,或者协议预先定义的,或者网络预先配置给用户终端的等等。例如:上述预定条件可以接收到用户输入的特定指令,或者接收到网络发送的特定请求等,对此本公开实施例不作限定。
步骤202、在确定预定条件满足时,发送控制信息,所述控制信息用于控制获取所述用户终端的位置的相关行为。
其中,上述发送的控制信息可以是根据用户输入的操作而生成和/或更新的。
例如:用户想保护位置隐私,则可以生成所述控制信息,用于不允许获取用户终端位置的相关行为。后续用户想公开用户终端的位置,则可以更新所述控制信息,用于允许获取和/或允许向第三方公开用户终端位置。反之亦然。或者上述控制信息可以用户终端智能生成的。
例如:用户终端电量比较低(比如进入省电模式时)或者测量开销太大影响UE的其他业务时,则可以生成所述控制信息,用于不允许获取用户终端位置的相关行为。后续用户终端电量充足或者空闲时,则可以更新所述控制信息,用于允许获取和/或允许向第三方公开用户终端位置。反之亦然。对此本公开实施例不作限定。
或者,上述发送的控制信息还可以是用户终端根据接收到的请求消息发送的控制信息。
例如:收到网络侧多次发送获取用户终端的位置的请求和/或发送获取所述用户终端的位置的验证请求时,用户或用户终端在一段时间内都不打算被获取用户终端的位置,则可以生成并发送所述控制信息,使网络侧在一段时 间内不再向用户终端发送位置请求和/或发送获取所述用户终端的位置的验证请求。等所述限制时间超时后,网络又可以向用户终端发送获取用户终端的位置的请求和/或发送获取所述用户终端的位置的验证请求。或者,用户或用户终端在一段时间内都不打算被获取用户终端的位置,则可以生成并发送所述控制信息,一方面可以友好地允许本次的获取用户终端的位置的请求和/或发送获取所述用户终端的位置的验证请求;但要求使网络侧在后续的一段时间内不再向用户终端发送位置请求和/或发送获取所述用户终端的位置的验证请求。等所述限制时间超时后,网络又可以向用户终端发送获取用户终端的位置的请求和/或发送获取所述用户终端的位置的验证请求。
例如,接收所述获取所述控制信息的请求,返回所述控制信息。例如,接收所述控制信息请求指示在所述控制信息发生更新时返回所述控制信息。则在所述控制信息更新时,返回所述控制信息。
另外,上述控制信息用于控制获取所述用户终端的位置的相关行为可以是,该控制信息可以对获取所述用户终端的位置的相关行为进行控制,其中,获取所述用户终端的位置的相关行为可以是与获取用户终端的位置相关的行为,包括但不限于如下至少一项:获取用户终端的位置、公开用户终端的位置(比如向位置服务客户发送获取的用户终端的位置)、触发所述用户终端进行位置测量和响应位置服务客户发送的位置获取请求。例如:上述控制信息可以是允许获取用户终端的位置,或者不允许获取用户终端的位置,或者允许公开用户终端的位置,或者不允许公开用户终端的位置等等。
其中,上述发送控制信息可以是向网络侧发送控制信息,包括但不限于向网络单元和/或位置服务客户发送控制信息。用户终端向位置服务客户发送控制信息的方式是可以通过网络单元向位置服务客户透传或转发。网络单元和/或位置服务客户接收到上述控制信息后,可以根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,例如:获取用户终端的位置,或者不允许获取用户终端的位置,或者公开用户终端的位置,或者不允许公开用户终端的位置等等。
另外,上述控制信息可以适用于所有的位置服务客户或者一部分位置服务客户,例如:用户终端与网络单元预先协商上述控制信息适用的位置服务 客户,或者协议预先定义上述控制信息适用的位置服务客户等等,如公安局或者学校等位置服务客户的紧急业务需求的位置请求可以总是被允许的,不受所述控制信息的限制。
通过上述步骤可以实现,用户终端能够控制获取所述用户终端的位置的相关行为,从而可以减少一些毫无意义的信令开销,以节约传输资源,以及还可以降低用户终端的功耗、位置测量开销等。
需要说明的是,本公开实施例中提供的上述方法可以应用于5G系统,但对此不作限定,只要能够实现基本相同的功能,适用于其他通信系统,例如:可以应用6G系统或者其他应用位置服务的通信系统等等。
本实施例中,通过发送用于控制获取所述用户终端的位置的相关行为的控制信息。从而可以减少一些毫无意义的信令开销,以节约传输资源,以及还可以降低用户终端的功耗。
请参见图3,图3是本公开实施例提供的另一种位置获取的控制方法的流程图,如图3所示,包括以下步骤:
步骤301、判断预定条件是否满足;
其中,所述预定条件可以包括但不限于如下至少一项:
生成和/或更新所述控制信息;
接收到获取所述用户终端的位置的获取请求;
接收到获取所述用户终端的位置的验证请求;
接收到获取当前所述控制信息的请求;
接收到当所述控制信息变更时,获取更新后的所述控制信息的请求。
其中,上述生成和/或更新所述控制信息可以参见图2所示的实施例,此处不作赘述。
而上述获取所述用户终端的位置的获取请求可以是网络单元或位置服务客户向用户终端请求获取用户终端的位置;上述获取所述用户终端的位置的验证请求可以是请求用户终端确认是否允许获取用户终端的位置的请求;上述获取当前所述控制信息的请求可以向用户终端请求获取用于控制获取所述用户终端的位置的相关行为的控制信息;获取更新后的所述控制信息的请求可以是向用户终端请求获取更新后的控制信息。
通过上述预定条件可以实现用户终端在特定情况下才发送控制信息,从而可以提高位置服务的灵活性,且还可以节约用户终端和网络的开销,因为通过上述预定条件可以避免网络单元或者位置服务客户不需要进行位置服务时,用户终端发送控制信息,而造成的开销浪费。
步骤302、在确定预定条件满足时,发送控制信息,所述控制信息用于控制获取所述用户终端的位置的相关行为。
可选的,所述控制信息指示如下至少一项:
是否允许进行获取所述用户终端的位置的相关行为;
是否允许本次被请求的获取所述用户终端的位置的相关行为;
是否允许后续的获取所述用户终端的位置的相关行为;
允许进行获取所述用户终端的位置的相关行为的允许条件;
不允许进行获取所述用户终端的位置的相关行为的不允许条件;
允许后续的获取所述用户终端的位置的相关行为的允许条件;
不允许后续的获取所述用户终端的位置的相关行为的不允许条件;
是否允许公开所述获取的用户终端的位置;
允许公开所述获取的用户终端的位置的允许条件;
不允许公开所述获取的用户终端的位置的不允许条件。
其中,所述允许获取所述用户终端的位置的相关行为的允许条件可以是指在满足所述允许条件时,可以允许获取所述用户终端的位置的相关行为和/或不满足所述允许条件时,可以不允许获取所述用户终端的位置的相关行为。
其中,所述不允许获取所述用户终端的位置的相关行为的不允许条件可以是指在满足所述不允许条件时,可以不允许获取所述用户终端的位置的相关行为和/或在不满足所述不允许条件时,可以允许获取所述用户终端的位置的相关行为。
其中,所述允许后续的获取所述用户终端的位置的相关行为的允许条件可以是指在满足所述允许条件时,可以允许后续的获取所述用户终端的位置的相关行为和/或不满足所述允许条件时,可以不允许后续的获取所述用户终端的位置的相关行为。
其中,所述不允许后续的获取所述用户终端的位置的相关行为的不允许 条件可以是指在满足所述不允许条件时,可以不允许后续的获取所述用户终端的位置的相关行为和/或在不满足所述不允许条件时,可以允许后续的获取所述用户终端的位置的相关行为。
其中,允许公开所述获取的用户终端的位置的允许条件可以是指在满足所述允许条件时,可以允许公开所述获取的用户终端的位置和/或不满足所述允许条件时,可以不允许公开所述获取的用户终端的位置。
其中,所述不允许公开所述获取的用户终端的位置的不允许公开条件可以是指在满足所述不允许条件时,可以不允许公开所述获取的用户终端的位置和/或在不满足所述不允许条件时,可以允许公开所述获取的用户终端的位置。
该实施方式中,可以实现上述控制信息可以指示是否允许进行获取所述用户终端的位置的相关行为,例如:上述控制指示允许获取所述用户终端的位置的相关行为,或者不允许获取所述用户终端的位置的相关行为。
而在另一个实施方式中,上述控制信息可以指示是否允许本次来自网络请求的获取所述用户终端的位置的相关行为,以及是否允许后续的获取所述用户终端的位置的相关行为。其中,上述本次来自网络请求的获取所述用户终端的位置的相关行为可以是网络针对上述用户终端进行的最近或者当前的获取所述用户终端的位置的相关行为,例如:获取用户终端的位置,或者请求所述用户终端对位置请求进行允许验证,或者触发用户终端进行位置测量等等。通过上述控制信息可以指示是否允许本次,以及是否允许后续的获取所述用户终端的位置的相关行为,从而可以节约信令开销。
例如:网络向用户终端发起获取所述用户终端的位置的验证请求,用户终端向网络验证响应中返回上述控制信息。网络根据上述控制信息决定是否获取用户终端的位置信息和/或如何获取用户终端的位置信息,以及是否向位置服务客户公开用户终端的位置信息。且上述控制信息可以指示如下至少一项:
是否允许本次请求的关于获取UE的位置的相关行为;
是否允许后续的关于获取UE的位置的相关行为;
不允许后续的获取所述用户终端的位置的相关行为的时长。
不允许后续的获取所述用户终端的位置的相关行为的时长可以指需要等待一段时间后才能允许后续的关于获取UE位置的相关行为或者可以指在一段时间内不允许后续的关于获取UE位置的相关行为。
一种实施方式中,用户终端可以允许本次的关于用户终端的位置请求,暂时不允许后续的关于用户终端的位置请求。这样可以通过设置允许后续的关于用户终端位置请求的等待时长、不允许后续的关于用户终端的位置请求的时长实现。收到所述等待时长或不允许时长后,网络单元在等待时长或不允许时长内,可以执行获取用户终端的位置的相关行为,如上所述,此处不再赘述。在不允许时长或者等待时长超时后,如果收到关于用户终端的位置服务请求,网络节点/功能可以向用户终端询问是否允许获取和/或允许公开关于用户终端的位置信息。
这样可以实现用户终端当前的情况(能量或者开销)可能不能支持频繁的位置测量。出于友好的方式,可以允许本次关于用户终端的位置请求,但延迟后续的位置请求。
另外,上述控制信息通过指示上述描述允许条件和不允许条件,可以实现通过这些条件来隐式指示允许范围和不允许范围,从而可以节省信令开销。
在一种实施方式中,所述控制信息指示允许获取所述用户终端的位置的相关行为;和/或
所述控制信息指示允许后续的获取所述用户终端的位置的相关行为;和/或
所述控制信息指示允许获取所述用户终端的位置的相关行为的允许范围;和/或
所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围。
其中,上述控制信息仅仅指示允许获取所述用户终端的位置的相关行为可以理解为不限定允许范围,上述控制信息仅仅指示允许后续的获取所述用户终端的位置的相关行为也可以理解为不限定允许范围。
而上述控制信息指示允许获取所述用户终端的位置的相关行为的允许范 围可以理解为,在该允许范围内才允许获取所述用户终端的位置的相关行为,范围外不允许获取所述用户终端的位置的相关行为。
上述允许后续的获取所述用户终端的位置的相关行为的允许范围可以理解为,在该允许范围内才允许后续的获取所述用户终端的位置的相关行为,范围外不允许后续的获取所述用户终端的位置的相关行为。
在另一种实施方式中,所述控制信息指示不允许获取所述用户终端的位置;和/或
所述控制信息指示不允许获取所述用户终端的位置的不允许范围;和/或
所述控制信息指示不允许后续的获取用户终端的位置;和/或
所述控制信息指示不允许后续的获取所述用户终端的位置的不允许范围。
其中,上述指示不允许获取所述用户终端的位置的相关行为可以是对不允许范围不作限定,上述不允许后续的获取用户终端的位置的相关行为也可以是对不允许范围不作限定。
上述指示不允许获取所述用户终端的位置的相关行为的不允许范围可以是,在该不允许范围内不允许获取所述用户终端的位置的相关行为,而该范围之外允许获取所述用户终端的位置的相关行为。
上述指示不允许后续的获取所述用户终端的位置的相关行为的不允许范围可以是,在该不允许范围内不允许后续的获取所述用户终端的位置的相关行为,而该范围之外,允许后续的获取所述用户终端的位置的相关行为。
在另一种实施方式中,所述控制信息进一步还指示如下至少一项:
是否允许公开所述获取的用户终端的位置;和/或
允许公开所述获取的用户终端的位置的允许范围;和/或
不允许公开所述获取的用户终端的位置的不允许范围。
其中,上述是否允许公开所述获取的用户终端的位置可以是,是否允许向第三方公开获取的用户终端的位置的相关行为的行为结果,例如:是否允许向位置服务客户公开获取的用户终端的位置。
上述允许公开所述获取的用户终端的位置的允许范围可以是是,在该允许范围内允许公开获取的用户终端的位置,例如:在该允许范围内允许公开 获取的用户终端的位置。
上述不允许公开所述获取的用户终端的位置的不允许范围可以是,在该不允许范围内不允许公开所述获取的用户终端的位置,例如:在该不允许范围内不允许公开获取的用户终端的位置。
该实施方式中,可以实现灵活控制是否公开用户终端的位置,以提高隐私保护性能。
可选的,所述控制信息通过包含允许条件和/或包含不允许条件指示所述允许范围;其中,满足所述允许条件的范围属于所述允许范围和/或不满足不允许条件的范围属于所述允许范围;
其中,所述控制信息通过包含允许条件和/或包含不允许条件指示所述不允许范围,其中,不满足所述允许条件的范围属于所述不允许范围和/或满足所述不允许条件的范围属于所述不允许范围。
该实施方式中,可以实现通过允许条件和/或包含不允许条件指示所述允许范围,例如:允许条件对应的范围为允许范围,不允许条件对应的范围之外的范围为允许范围。以及还可以实现通过包含允许条件和/或包含不允许条件指示所述不允许范围,例如:允许条件对应的范围之外的范围为不允许范围,不允许条件对应的范围为允许范围。
该实施方式中,还可以实现允许的操作是配合不允许的操作进行的。另外,当用户终端从不允许变为允许时,可以向网络更新用户终端的控制信息。由于网络可以不需要向用户终端请求验证每一次的位置请求,这样网络不需要频繁地请求用户终端对每次的位置请求进行授权验证,网络可以直接要求用户终端进行位置测量,节省了对位置请求验证需要的信令交互流程,节省用户终端和网络的开销。
可选的,所述允许条件可以包括如下至少一项:允许的时间段、允许的时长、允许的位置服务客户的信息、允许的用途信息、允许的终端状态信息、允许的位置类型信息、允许的移动区域范围信息、允许采用的位置测量技术信息;和/或
所述不允许条件可以包括如下至少一项:不允许的时间段、不允许的时长、不允许的位置服务客户的信息、不允许的用途信息、不允许的终端状态 信息、不允许的位置类型信息、不允许的移动区域范围信息和不允许采用的位置测量技术的信息。
上述实施方式中,可以实现配合时间段或时长对位置服务更有可控性。时间段可以是具体某个时间区间内有效,时长可以是指,网络单元收到后启动计时器,按所述时长计时有效。这样,通过设置允许的时间段、允许的时长、不允许的时间段和/或不允许的时长等,可以在一段时间内减少网络和用户终端之间交互的信令和用户终端的开销。
另外,上述实施方式中,通过指示允许的位置服务客户的信息,可以实现对希望获取用户终端位置的位置服务客户进行筛选。不难看出,用户终端通过设置允许的位置服务客户的信息、不允许的位置服务客户的信息等,可以不允许过于频繁的位置获取。比如根据客户类型可以仅仅允许对紧急业务的位置请求,或者仅仅允许用户信任或UE预设的位置服务客户获取位置请求。
另外,上述允许的用途信息可以是指在所述指定用途下,允许执行或允许后续执行获取用户终端的位置的相关行为;上述不允许的用途信息可以是指在所述指定用途下,不允许获取用户终端的位置的用途;不允许执行或不允许后续执行获取用户终端的位置相关行为。不难看出,有些用途是用于紧急业务,用户终端可以允许,有些用途是商业用途,用户终端可以不允许。
另外,上述允许的终端状态信息可以是指用户终端在指定状态下,允许执行或允许后续执行获取用户终端的位置的相关行为;不允许的终端状态信息可以是指用户终端在指定状态下,不允许执行或允许后续执行获取用户终端的位置相关行为。例如:当用户终端处于在空闲态或非活跃态下,如果需要位置请求,需要寻呼用户终端,用户终端建立连接或恢复连接,需要更多的信令开销;如果仅仅在连接态下获取用户终端位置,可以节省许多信令开销;在连接态下,频繁地测量用户终端位置会占用用户终端的测量开销。如果在其他状态下允许获取用户终端的位置,可以节省用户终端测量的开销。用户终端可以通过允许的终端状态信息、不允许的终端状态信息来实现。
上述允许的位置类型信息可以指允许执行该位置类型信息的相关行为,而上述不允许的位置类型信息可以指不允许执行该位置类型信息的相关行为。 例如:“当前位置”需要发起位置测量获得,“最新位置”是现成最新测量过的位置的,可以不用测量,可以节省资源。“历史位置”涉及用户终端的运动轨迹,涉及更多的用户终端的隐私。用户终端可以根据自身要求或倾向设置允许或不允许得不同的位置类型,从而达到节约用户终端的功耗,或者保护用户终端的隐私的效果。
上述允许的移动区域范围信息可以是,允许在控制信息指示的移动区域范围内执行获取用户终端的位置的相关行为。而上述不允许的移动区域范围信息可以是,不允许在控制信息指示的移动区域范围内执行获取用户终端的位置的相关行为。通过允许和/或不允许移动区域范围可以达到节约用户终端的功耗和保护用户终端的隐私的效果,因为一些移动区域范围内用户终端进行位置测量的功耗可能不同或者位置隐私倾向不同。比如在一些移动区域范围用户可能不想公开用户终端的位置。
上述允许采用的位置测量技术信息可以是指示允许特定的位置测量技术下进行获取用户终端的位置的相关行为,而上述不允许采用的位置测量技术信息可以是指示允许特定的位置测量技术下不允许获取用户终端的位置的相关行为。例如:有些位置测量技术是用户终端主导的(比如UTDOA),需要用户终端更多的功耗;有些位置测量技术是无线接入网节点主导的,对用户终端的要求相对较少,从而用户终端可以根据自身要求允许和/或不允许不同的测量技术要求。另外,还可以直接发送给无线接入网(Radio Access Network,RAN),或者发送给LCS再发送给RAN。
其中,本实施例中,位置服务客户的信息、用途信息、终端状态信息、位置类型信息、移动区域范围信息和位置测量技术信息可以参见如下描述,但对此不作限定。
可选的,上述位置服务客户的信息包括如下至少一项:位置服务客户的标识、位置服务客户的标识的名字、位置服务客户的标识的域名地址、位置服务客户方请求者的标识、位置服务客户方请求者的名字、位置服务客户方请求者的IP地址、位置服务客户的位置请求的类型的位置服务客户端应用的端口号;和/或
所述用途信息包括如下至少一项:紧急业务用途和商业用途;和/或
所述终端状态信息包括如下至少一项:空闲态、连接态、非活跃态、可用、不可用于位置测量之前、开机时和关机时;和/或
所述位置类型信息包括如下至少一项:当前的位置、历史的位置和最新的位置;和/或
所述移动区域范围信息包括如下至少一项:跟踪区(tracking area,TA)标识列表,无线接入网节点标识列表、移动管理单元列表、认证管理功能AMF标识列表、移动管理实体MME标识列表、位置区列表、服务区列表的小区列表;和/或
所述位置测量技术信息包括如下至少一项:增强型基地台中心定位法(Enhanced Cell-ID,ECID)测量、观测到达时间差(Observed Time Difference of Arrival,OTDOA)测量和上行链路到达时间差(Uplink Time Difference of Arrival,UTDOA)测量。
其中,上述可用可以为可以使用位置服务的状态,而不可用于位置测量之前可以是,不可进行位置测量之前的预设时间(例如:1秒或者0.1秒,甚至更短时间)的状态。例如:由于用户终端的原因导致不可进行位置测量之前,如关机的瞬间,或者位置服务的能力被彻底关闭之前,或者用户终端覆盖开始变差到快不能支持位置服务的时间。通过允许不可用于位置测量之前的状态的上报,可以获得用户终端最后的位置,对紧急业务相关的定位要求有用。
另外,在一些实施方式中,收到是否要求对位置请求进行隐私验证指示。收到关于用户终端的位置请求,根据上述控制信息,网络单元可以决定请求用户终端对该位置请求用户终端是否允许该次位置请求操作。一种实施方式中,允许获取用户终端的位置和/或允许公开用户终端的位置时,网络仍然要根据该指示决定是否请求用户终端对关于UE的位置请求进行隐私认证。
可选的,所述控制信息指示当需要获取所述用户终端的位置时,是否需要请求所述用户终端对位置请求进行获取所述用户终端的位置的验证请求。
需要说明的是,这里指示可以与上面描述的指示结合实现,例如:结合上述指示的允许进行获取所述用户终端的位置的相关行为一起实现,当然,这里的指示也可以单独实现,对此本公开实施例不作限定。
该实施方式中,所述控制信息可以指示至少以下之一:需要对位置请求进行验证、需要对位置请求进行验证的位置服务客户的信息、不需要对位置请求进行验证,不需要对位置请求进行验证的位置服务客户的信息。
该实施方式中,可以实现指示需要或者不需要对位置请求进行验证,从而可以指示是否跳过验证的过程,以节约用户终端和网络的开销。当然,在一种实施方式中,允许获取用户终端的位置和/或允许公开用户终端的位置时,网络仍然要根据该指示决定是否请求用户终端对关于用户终端的位置请求进行隐私认证。
可选的,所述获取所述用户终端的位置的相关行为,包括如下至少一项:
是否向所述用户终端发送获取所述用户终端的位置的验证请求;
是否获取所述用户终端的位置;
是否请求无线接入网单元触发对所述用户终端进行位置测量;
是否触发所述用户终端进行位置测量;
是否成功响应收到的关于用户终端的位置请求;
是否向外部公开获取到的所述用户终端的位置;
是否要求启动计时器。
例如:上述获取所述用户终端的位置的相关行为可以是,指当(如网络单元或位置服务客户)产生获取所述用户终端的位置需求或者收到关于用户终端的位置请求时,包括如下至少一项:
是否向所述用户终端发送获取所述用户终端的位置的验证请求;
是否获取所述用户终端的位置;
是否请求无线接入网单元触发对所述用户终端进行位置测量;
是否触发所述用户终端进行位置测量;
是否成功响应收到的关于用户终端的位置请求;
是否向外部公开获取到的所述用户终端的位置;
是否要求启动计时器。
该实施方式中,可以实现允许或者不允许,或者在允许范围内允许,或者在不允许范围内不允许上述至少一项获取所述用户终端的位置的相关行为,从而可以节约传输资源和用户终端的功耗。例如:在允许范围内允许当产生 获取所述用户终端的位置需求时,允许向获取所述用户终端的位置的允许验证请求、允许获取所述用户终端的位置、允许触发所述用户终端进行位置测量或者允许响应位置服务客户发送的位置获取请求。又例如:在不允许范围内当产生获取所述用户终端的位置需求时,不允许向获取所述用户终端的位置的允许验证请求、不允许获取所述用户终端的位置、不允许触发所述用户终端进行位置测量或者不允许响应位置服务客户发送的位置获取请求。
当然,本公开实施例中,获取所述用户终端的位置的相关行为包括但不限于上述列表的行为。
可选的,步骤302可以是在确定预定条件满足时,发送网络单元或位置服务客户控制信息,所述控制信息用于控制获取所述用户终端的位置的相关行为。
步骤302可以是向网络单元发送上述控制信息,例如:NAS消息或者RRC消息向网络单元发送上述控制信息。其中,上述网络单元可以包括不限于如下至少一项:无线接入网节点、无线接入网功能、核心网功能、核心网节点、移动管理节点、移动管理功能、位置服务管理功能、位置服务管理节点、位置服务管理客户、eNB、gNB、AMF、MME、LCS和E-SMLC。
当网络单元或位置服务客户接收到上诉述控制信息后,可以根据上述控制信息进行相应的控制,例如:在允许范围内允许当产生获取所述用户终端的位置需求时,向获取所述用户终端的位置的允许验证请求、获取所述用户终端的位置、触发所述用户终端进行位置测量或者响应位置服务客户发送的位置获取请求。又例如:在不允许范围内当产生获取所述用户终端的位置需求时,向获取所述用户终端的位置的允许验证请求、获取所述用户终端的位置、触发所述用户终端进行位置测量或者响应位置服务客户发送的位置获取请求。
本实施例,在图2所示的实施例的基础上增加了多种可选的实施方式,且均可以节约传输资源和用户终端的功耗。
请参见图4,图4是本公开实施例提供的另一种位置获取的控制方法的示意图,该方法应用于网络单元或者位置服务客户,如图4所示,包括以下步骤:
步骤401、接收控制信息,所述控制信息用于控制获取所述用户终端的位置的相关行为。
其中,上述控制信息可以是用户终端发送的控制信息,例如:可以是用户终端通过无线接入网单元转发或者透传的控制信息。
步骤402、根据或参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制。
其中,上述对获取所述用户终端的位置的相关行为进行控制可以是获取用户终端的位置、不允许获取用户终端的位置等等,具体可以通过参见下面的描述。
通过上述步骤可以减少一些毫无意义的信令开销,以节约传输资源,以及还可以降低用户终端的功耗。
可选的,所述控制信息指示如下至少一项:
是否允许进行获取所述用户终端的位置的相关行为;
是否允许本次被请求的获取所述用户终端的位置的相关行为;
是否允许后续的获取所述用户终端的位置的相关行为;
允许进行获取所述用户终端的位置的相关行为的允许条件;
不允许进行获取所述用户终端的位置的相关行为的不允许条件;
允许后续的获取所述用户终端的位置的相关行为的允许条件;
不允许后续的获取所述用户终端的位置的相关行为的不允许条件;
是否允许公开所述获取的用户终端的位置;
允许公开所述获取的用户终端的位置的允许条件;
不允许公开所述获取的用户终端的位置的不允许条件。
其中,上述控制信息可以参见图3所示的实施例的相关说明,此处不作赘述,且可以达到相同的有益效果。
可选的,所述控制信息指示允许获取所述用户终端的位置的相关行为;和/或
所述控制信息指示允许后续的获取所述用户终端的位置的相关行为;和/或
所述控制信息指示允许获取所述用户终端的位置的相关行为的允许范围; 和/或
所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围;
所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
根据或者参考所述控制信息,执行获取所述用户终端的位置的相关行为;和/或
根据或者参考所述控制信息,执行后续的获取所述用户终端的位置的相关行为;和/或
根据或者参考所述控制信息,在所述控制信息指示允许获取所述用户终端的位置的相关行为的允许范围内,执行获取所述用户终端的位置的相关行为;和/或
根据或者参考所述控制信息,在所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围内,执行后续的获取所述用户终端的位置的相关行为。
该实施方式中,可以实现根据或者参考上述控制信息执行相关行为,且可以是在特定范围内执行上述相关行为,从而可以节约用户终端和网络的开销。
可选的,所述控制信息指示不允许获取所述用户终端的位置;和或
所述控制信息指示不允许获取所述用户终端的位置的不允许范围;和/或
所述控制信息指示不允许后续的获取用户终端的位置;和/或
所述控制信息指示不允许后续的获取所述用户终端的位置的不允许范围;
所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
根据或者参考所述控制信息,不允许获取所述用户终端的位置;和或
根据或者参考所述控制信息,在所述控制信息指示不允许获取所述用户终端的位置的不允许范围内,不允许获取所述用户终端的位置;和或
根据或者参考所述控制信息,不允许后续的获取用户终端的位置;和/或
根据或者参考所述控制信息,在所述控制信息指示不允许后续的获取所 述用户终端的位置的不允许范围内,不允许后续的获取所述用户终端的位置。
该实施方式中,可以实现根据或者参考上述控制信息不允许相关行为,且可以是在特定范围内不允许获取所述用户终端的位置,从而可以节约用户终端和网络的开销。
可选的,所述控制信息进一步还指示如下至少一项:
是否允许公开所述获取的用户终端的位置;和/或
允许公开所述获取的用户终端的位置的允许范围;和/或
不允许公开所述获取的用户终端的位置的不允许范围;
所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
根据或者参考所述控制信息,公开所述获取的用户终端的位置;和/或
根据或者参考所述控制信息,在所述允许公开所述获取的用户终端的位置的允许范围内,公开所述获取的用户终端的位置;和/或
根据或者参考所述控制信息,在所述不允许公开所述获取的用户终端的位置的不允许范围内,不允许公开所述获取的用户终端的位置。
该实施方式中,可以实现根据或者参考用户终端发送的控制信息公开用户终端的位置,或者不允许公开用户终端的位置,从而可以达到保护用户终端隐私的效果。
可选的,所述控制信息通过指示允许条件指示所述允许范围;和/或
所述控制信息通过指示不允许条件指示所述允许范围,其中,不满足不允许条件的范围属于所述允许范围;和或
所述控制信息通过指示不允许条件指示所述不允许范围;和/或
所述控制信息通过指示允许条件指示所述不允许范围,其中,不满足不允许条件的范围属于所述允许范围。
其中,上述控制信息可以参见图3所示的实施例的相关说明,此处不作赘述,且可以达到相同的有益效果。
可选的,所述允许条件包括如下至少一项:允许的时间段、允许的时长、允许的位置服务客户的信息、允许的用途信息、允许的终端状态信息、允许的位置类型信息、允许的移动区域范围信息、允许采用的位置测量技术信息; 和/或
所述不允许条件包括如下至少一项:不允许的时间段、不允许的时长、不允许的位置服务客户的信息、不允许的用途信息、不允许的终端状态信息、不允许的位置类型信息、不允许的移动区域范围信息和不允许采用的位置测量技术的信息。
其中,上述允许条件和不允许条件均可以参见图3所示的实施例的相关说明,此处不作赘述,且可以达到相同的有益效果。
可选的,所述位置服务客户的信息包括如下至少一项:位置服务客户的标识、位置服务客户的标识的名字、位置服务客户的标识的域名地址、位置服务客户方请求者的标识、位置服务客户方请求者的名字、位置服务客户方请求者的IP地址、位置服务客户的位置请求的类型的位置服务客户端应用的端口号;和/或
所述用途信息包括如下至少一项:紧急业务用途和商业用途;和/或
所述终端状态信息包括如下至少一项:空闲态、连接态、非活跃态、可用、不可用于位置测量之前、开机时和关机时;和/或
所述位置类型信息包括如下至少一项:当前的位置、历史的位置和最新的位置;和/或
所述移动区域范围信息包括如下至少一项:TA标识列表,无线接入网节点标识列表、移动管理单元列表、AMF标识列表、MME标识列表、位置区列表、服务区列表的小区列表;和/或
所述位置测量技术信息包括如下至少一项:ECID测量、OTDOA测量和UTDOA测量。
其中,上述信息均可以参见图3所示的实施例的相关说明,此处不作赘述,且可以达到相同的有益效果。
可选的,所述控制信息指示当需要获取所述用户终端的位置时,是否需要请求所述用户终端对位置请求进行允许验证;
所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
当需要获取所述用户终端的位置时,根据或者参考所述控制信息,决定 是否需要请求所述用户终端对位置请求进行允许验证。
该实施方式中,可以实现根据或者参考上述控制信息决定是否需要请求所述用户终端对位置请求进行允许验证,例如:控制信息指示当需要获取所述用户终端的位置时,不需要请求所述用户终端对位置请求进行允许验证,网络单元可以获取用户终端的位置,从而减少验证信令,以节约传输资源。
可选的,所述控制信息指示如下至少一项:需要对位置请求进行验证、需要对位置请求进行验证的位置服务客户的信息、不需要对位置请求进行验证,不需要对位置请求进行验证的位置服务客户的信息。
其中,上述控制信息可以参见图3所示的实施例的相关说明,此处不作赘述,且可以达到相同的有益效果。
可选的,所述接收控制信息之前,所述方法还包括如下至少一项:
发送获取所述用户终端的位置的获取请求;
发送获取所述用户终端的位置的验证请求;
发送获取当前的所述控制信息的请求;
发送获取更新的所述控制信息的请求。
该实施方式中,可以实现通过上述四个请求中的至少一项获取用户终端的控制信息,进而可以根据获取的控制信息对获取用户终端的位置的相关行为进行控制,以节约用户终端和网络的开销。
可选的,所述对获取所述用户终端的位置的相关行为进行控制包括如下至少一项:
执行允许获取所述用户终端的位置的相关行为;
执行不允许获取所述用户终端的位置的相关行为;
启动计时器。
其中,上述执行允许获取所述用户终端的位置的相关行为可以理解为,执行上述控制信息允许的获取所述用户终端的位置的相关行为。上述执行不允许获取所述用户终端的位置的相关行为。启动计时器可以理解为,在一段时间内执行不允许获取所述用户终端的位置的相关行为,通过启动计时器实现控制。即在计数器启动后且超时之前,执行不允许获取所述用户终端的位置的相关行为。其中,该计时器的时长可以是预先配置的,或者根据上述控 制信息中指示的不允许的时长进行配置等。启动计时器还可以理解为,在一段时间内执行允许获取所述用户终端的位置的相关行为,通过启动计时器实现控制。即在计数器启动后且超时之前,执行允许获取所述用户终端的位置的相关行为。其中,该计时器的时长可以是根据上述控制信息中指示的允许的时长进行配置等。
该实施方式中,通过执行或者不允许对应行为,从而可以节约用户终端和网络的开销。
可选的,所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
所述控制信息指示不允许后续的获取所述用户终端的位置的相关行为时,启动计时器计时,在计时器开始计时之后和超时之前,执行后续的不允许获取所述用户终端的位置的相关行为;其中,所述计时器的计时时长为预先设定或者根据所述控制信息指示不允许的时长进行设定;和/或
所述控制信息指示不允许获取所述用户终端的位置的相关行为时,启动计时器计时,在计时器超时之前,执行不允许获取所述用户终端的位置的相关行为;其中,所述计时器的计时时长为预先设定或者根据所述控制信息指示不允许的时长进行设定;和/或
所述控制信息指示允许获取所述用户终端的位置的相关行为且所述控制信息指示允许时间时,启动计时器计时,在计时器超时之前,执行允许获取所述用户终端的位置的相关行为。
该实施方式中,可以实现在特计时间内不允许控制信息不允许的相关行为,以及在特计时间内执行控制信息允许的相关行为,以节约用户终端和网络的开销,且还可以避免一直不允许或者一直允许的情况带来的影响。另外,在计时器超时时,可以向用户终端发送询问是否允许获取用户终端的位置和/或公开用户终端的位置的询问请求,后续可以根据用户终端对该询问请求的答复消息进行相应控制,以提高系统的灵活性。
可选的,所述执行不允许获取所述用户终端的位置的相关行为,包括执行但不限于如下至少一项:
收到关于所述用户终端的位置请求时,直接返回获取所述用户终端位置 失败;
不向所述用户终端发送获取所述用户终端位置的验证请求;
不获取所述用户终端的位置;
不请求无线接入网单元触发对所述用户终端进行位置测量;
不触发所述用户终端进行位置测量;
不响应位置服务客户发送的位置获取请求。
例如:上述所述执行不允许获取所述用户终端的位置的相关行为,是指当产生获取所述用户终端的位置需求或者收到关于用户终端的位置请求时,执行但不限于如下至少一项:
收到关于所述用户终端的位置请求时,直接返回获取所述用户终端位置失败;
不向所述用户终端发送获取所述用户终端位置的验证请求;
不获取所述用户终端的位置;
不请求无线接入网单元触发对所述用户终端进行位置测量;
不触发所述用户终端进行位置测量;
不响应位置服务客户发送的位置获取请求。
该实施方式中,上述行为可以节约用户终端和网络的开销。需要说明的是,上述执行后续的不允许获取所述用户终端的位置的相关行为也可以是指当产生获取所述用户终端的位置需求或者收到关于用户终端的位置请求时,执行如下至少一项:
收到关于所述用户终端的位置请求时,直接返回获取所述用户终端位置失败;
不向所述用户终端请获取所述用户终端位置的验证请求;
不获取所述用户终端的位置;
不请求无线接入网单元触发对所述用户终端进行位置测量;
不触发所述用户终端进行位置测量;
不响应位置服务客户发送的位置获取请求。
且执行后续的不允许获取所述用户终端的位置的相关行为同样可以节约用户终端和网络的开销。
可选的,执行允许获取所述用户终端的位置的相关行为,包括执行如下至少一项:
向所述用户终端发送获取用户终端位置的验证请求;
获取所述用户终端的位置;
请求无线接入网单元触发对所述用户终端进行位置测量;
触发所述用户终端进行位置测量;
响应位置服务客户发送的位置获取请求,获取所述用户终端的位置;
响应接收的关于所述用户终端的位置请求,获取所述用户终端的位置。
例如:上述执行允许获取所述用户终端的位置的相关行为,是指当产生获取所述用户终端的位置需求或者收到关于用户终端的位置请求时,执行如下至少一项:
向所述用户终端发送获取用户终端位置的验证请求;
获取所述用户终端的位置;
请求无线接入网单元触发对所述用户终端进行位置测量;
触发所述用户终端进行位置测量;
响应位置服务客户发送的位置获取请求,获取所述用户终端的位置;
响应接收的关于所述用户终端的位置请求,获取所述用户终端的位置。
该实施方式中,可以实现在控制信息允许的条件下,执行相应行为,从而保证位置服务的性能。
可选的,所述接收控制信息之后,所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制之前,所述方法还包括:
确认是否接受所述控制信息,并向所述用户终端返回是否确认接受所述控制信息和/或确认接受的所述控制信息的返回消息;
所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
确认接受所述控制信息后,根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制。
该实施方式中,通过上述返回消息可以增加网络单元或者位置服务客户之间的交互性。
可选的,所述网络单元包括但不限于至少以下之一:无线接入网节点、无线接入网功能、核心网功能、核心网节点、移动管理节点、移动管理功能、位置服务管理功能、位置服务管理节点、位置服务管理客户、eNB、AMF,MME,LCS和E-SMLC。
其中,上述网络单元可以参见图2和图3所示的实施例的相关说明,此处不作赘述。
需要说明的是,本实施例作为图2至图3所示的实施例对应的网络单元或者位置服务客户的实施方式,其具体的实施方式可以参见图2至图3所示的实施例相关说明,以及达到相同的有益效果,为了避免重复说明,此处不再赘述。
请参见图5,图5是本公开实施例提供的另一种位置获取的控制方法的示意图,如图5所示,包括以下步骤:
步骤501、用户终端(UE)向核心网单元(比如AMF、MME)发送关于UE位置获取的控制信息。所述控制信息可以参见如图2至图4所示的实施例的控制信息,此处不再赘述。
用户终端通过无线接入网单元向核心网单元发送关于用户终端位置的控制信息。所述关于UE位置获取的控制信息如步骤302中控制信息描述,此处不再赘述。
可选的,UE可以通过RRC消息或NAS消息向核心网单元发送。
UE可以通过以下但不限于以下消息向核心网单元发送。注册请求(比如Registration request,Attach Request)、注册完成(比如Registration Complete,Attach Complete)、位置更新请求消息(比如Registration request,TAU Request)、位置更新完成(比如Registration Complete,TAU Complete)、位置请求允许验证响应中向移动性管理节点/功能发送关于UE位置获取的控制信息。NAS消息是通过无线接入网单元透传的。
通过RRC消息发送通过无线接入网单元,再由无线接入网单元通过S1或NG接口消息转发给管理节点/功能(比如AMF、MME)。
移动管理节点/功能(比如AMF、MME)可以向位置服务管理节点/功能(比如E-SMLC、LCS)发送关于UE位置获取的控制信息。
此处的核心网单元可以包含多个网络节点或网络功能(移动管理节点/功能、位置服务管理节点/功能、用户数据管理节点/功能等)。在实施例中,核心网单元内网络节点或网络功能之间的操作不作限定。移动管理节点/功能或位置服务管理节点/功能可以保存或更新关于UE位置获取的控制信息。移动管理节点/功能或位置服务管理节点/功能可以将关于UE位置获取的控制信息发送给用户数据管理节点/功能(比如HSS、UDM)进行存放或更新。
步骤502、位置服务客户向核心网单元(比如位置服务管理单元)发送位置服务请求。位置服务管理单元收到位置服务客户发送的位置请求后,可以生成关于UE的位置请求发送给移动管理单元。移动管理单元将获取UE的位置的结果发送给位置服务管理单元。位置服务管理单元和移动管理单元的之间的互操作位置在实施例中不作限定。
核心网单元根据所述接收的控制信息、UE的签约信息和/或UE的能力对位置服务客户的位置服务请求进行控制。核心网单元可以从用户数据管理节单元获得最新的关于UE位置获取的控制信息。
关于UE位置获取的控制信息指示不允许获取UE的位置时,核心网单元可以执行至少以下之一:
1)拒绝位置服务客户关于UE的位置服务请求。
2)启动一个计时器(可以是预先配置的)进行计时。在计时器超时之前,拒绝位置服务客户关于UE的位置请求。
核心网单元收到UE发送的更新所述控制信息(比如不允许获取UE位置更新为允许获取UE位置)之前,可以执行以下之一:不向UE发送获取所述用户终端的位置的验证请求、不获取UE的位置、不向无线接入节点触发UE位置测量。
步骤503、核心网单元向位置服务客户返回位置业务响应,以及说明获取UE的位置失败和/或失败的原因。失败的原因可以是用户终端不允许。位置服务客户收到后可以启动一个计时器(可以是预先配置的)进行计时。在计时器超时之前,不向网络发送关于所述UE的位置请求。
请参见图6,图6是本公开实施例提供的另一种位置获取的控制方法的示意图,如图6所示,包括以下步骤:
步骤601、与图5所示的实施例中的步骤501一致,此处不再赘述。
步骤602、关于UE位置获取的控制信息指示不允许获取UE位置的时间段/时长时,核心网单元可以执行至少以下之一:
1)根据所述时长启动计时器,在所述指示的时长超时之前如果收到位置服务客户关于UE的位置服务请求,返回获取所述UE位置失败,回退时间(Back off timer)和/或失败的原因(比如UE不允许)。核心网单元可以根据所述时长设置所述发送给位置服务客端的回退时间(Back off timer)。回退时间可以大于或等于所述时长。在指定回退时间内,位置服务客户不会发送关于UE的位置请求。
2)根据所述时间段启动监测,在所述指示的时间段内如果收到位置服务客户关于UE的位置服务请求,返回获取UE位置失败,回退时间段(Back off period)和/或失败的原因(比如UE不允许)。核心网单元可以根据所述时间段设置发送给位置服务客户的回退时间段(Back off period)。Back off period可以包含但不限于所述时间段。在指定回退时间段内,位置服务客户不会发送关于UE的位置请求。
步骤603、核心网单元接收位置服务客户发送的关于UE的位置服务请求。
步骤604、核心网单元向位置服务客户返回位置业务响应,以及说明获取UE的位置失败和/或失败的原因。失败的原因可以是UE不允许。如果核心网单元还向位置服务客户返回回退时间,位置服务客户收到后可以根据回退时间启动计时器进行计时。在计时器超时之前,不向网络发送关于所述UE的位置请求。如果核心网单元还向位置服务客户返回回退时间段,位置服务客户收到后在回退时间段内,不向网络发送关于所述UE的位置请求。
步骤605、计时器超时或者当前时间不在所述时间段内。
步骤606、位置服务客户向核心网单元发送关于UE的位置服务请求。
步骤607、核心网单元发起获取UE位置的流程,对此步骤本实施例不作限定。
步骤608、核心网单元向位置服务客户返回位置业务响应。
请参见图7,图7是本公开实施例提供的另一种位置获取的控制方法的示意图,如图7所示,包括以下步骤:
步骤701、与图5所示的实施例中的步骤501一致,此处不再赘述。
步骤702、第一位置服务客户向核心网单元发送关于UE的位置服务请求。
关于UE位置获取的控制信息指示不允许获取UE位置的位置服务客户信息或允许获取UE位置的位置服务客户信息。
第一位置服务客户是所述控制信息指示的不允许获取UE位置的位置服务客户获知不包含在所述控制信息指示的不允许获取UE位置的位置服务客户信息中。核心网单元向第一位置服务客户返回获取UE位置失败、回退时间(Back off timer)、回退时间段(Back off period)和/或失败的原因(比如UE不允许)。如果关于UE位置获取的控制信息包含还包含不允许第一位置服务客户获取UE位置的时间段/时长,核心网单元可以根据所述时间段设置所述回退时间段。回退时间段可以包含但不限于所述时间段。核心网单元可以根据所述时长设置所述回退时间。回退时间可以大于或等于所述时长。位置服务客户收到后在所述回退时间和/或回退时间段内不向网络发起关于该UE的位置请求。
步骤703、核心网单元向位置服务客户返回位置业务响应,以及说明获取UE的位置失败和/或失败的原因。
步骤704、第二位置服务客户向核心网单元发送关于UE的位置服务请求。第二位置服务客户是所述控制信息指示允许获取UE位置的位置服务客户信息中或者是不包含在所述控制信息指示不允许获取UE位置的位置服务客户信息中。
步骤705、核心网单元发起获取UE位置的流程,本实施例对此步骤不作限定。
步骤706、核心网单元向位置服务客户返回位置业务响应。
请参见图8,图8是本公开实施例提供的另一种位置获取的控制方法的示意图,如图8所示,包括以下步骤:
步骤801、位置服务客户向核心网单元发送关于UE的位置服务请求。
步骤802、核心网单元向UE发送获取所述用户终端的位置的验证请求或者位置请求。
步骤803、UE向核心网单元向UE发送关于该位置请求的验证响应或者 位置请求响应。可选的,在上述响应中包含关于UE位置获取的控制信息。所述关于UE位置获取的控制信息如步骤302中控制信息所述,此处不再赘述。
在一些实施方式中,所述关于UE位置获取的控制信息指示至少以下之一:
允许本次来自网络单位或位置服务客户请求的获取所述用户终端的位置的相关行为;不允许后续的获取所述用户终端的位置的相关行为;
不允许后续的获取所述用户终端的位置的相关行为的时长;
不允许后续的获取所述用户终端的位置的相关行为的时长可以通过所述控制信息中的不允许后续的获取所述用户终端的位置的相关行为的不允许条件指示不允许的时长进行设置。
不允许后续的获取所述用户终端的位置的相关行为的时长可以指需要等待一段时间后才能允许后续的关于获取UE位置的相关行为或者可以指在一段时间内不允许后续的关于获取UE位置的相关行为。本实施例中的关于获取UE位置的相关行为如步骤302所述,此处不再赘述。
在一些实施方式中,UE当前的情况(能量,开销)可能不能支持频繁的位置测量。出于友好的方式,可以允许本次关于UE的位置请求,但通过设置一段不允许后续的关于获取UE的位置的相关行为的时长来实现。
步骤804、核心网单元收到所述验证响应信息包含所述控制信息且所述控制信息指示不允许后续的获取所述用户终端的位置的相关行为,核心网单元可以根据默认配置timer启动一个计时器开始计时。
核心网单元收到所述验证响应信息包含所述控制信息且所述控制信息指示不允许后续的获取所述用户终端的位置的相关行为的时长时,可以根据所述时长启动一个计时器开始计时。
在计时超时之前,核心网单元执行至少以下之一:从位置服务客户收到的其他关于UE的位置请求都返回失败、不向UE发送关于获取所述用户终端的位置的验证请求、不触发获取UE的位置行为、不请求无线接入网单元触发获取UE的位置的行为。
步骤805、核心网单元触发本次获取UE位置流程,获取UE的位置。
步骤806、核心网单元向本次位置服务客户发送位置服务响应,可以包 含一个回退时间(back off timer)。位置服务客户收到后在该回退时间后,在回退时间内不向网络发起关于该UE的位置请求。核心网单元根据UE提供的所述不允许后续的关于UE位置获取的时长设置所述回退时间。回退时间可以大于或等于所述时长。
请参见图9,图9是本公开实施例提供的另一种位置获取的控制方法的示意图,如图9所示,包括以下步骤:
步骤901、核心网单元通过无线接入网单元向UE请求关于获取UE位置的控制信息。
在所述请求可以指示至少以下之一:
请求UE当前的关于获取UE位置的控制信息;所述关于UE位置获取的控制信息如步骤302中控制信息所述,此处不再赘述。
请求UE在关于获取UE位置的控制信息发生变更时上报更新后的关于获取UE位置的控制信息。
步骤902、UE向核心网单元返回关于获取UE位置的控制信息。核心网单元收到所述控制信息后根据或者参考所述控制信息对关于获取UE位置的相关行为进行控制。
步骤903、UE侧关于获取UE位置的控制信息发生变更,比如UE或用户关于获取UE位置的倾向发生变更。根据步骤901中的请求,UE决定是否向核心网发送更新后发送更新的关于获取UE位置的控制信息。如果决定发送,则进入步骤904,否则流程结束。
步骤904、UE向核心网单元发送更新的关于获取UE位置的控制信息。核心网单元根据收到所述控制信息进行更新,并后续根据更新的所述控制信息对关于获取UE位置的相关行为进行控制。
其中,UE向核心网单元发送的信息都可以通过无线接入网转发或透传。
请参见图10,图10是本公开实施例提供的一种用户终端的结构图,如图10所示,用户终端1000包括:
判断模块1001,用于判断预定条件是否满足;
发送模块1002,用于在确定预定条件满足时,发送控制信息,所述控制信息用于控制获取所述用户终端的位置的相关行为。
可选的,所述控制信息指示如下至少一项:
是否允许进行获取所述用户终端的位置的相关行为;
是否允许本次来自网络单元或位置服务客户请求的获取所述用户终端的位置的相关行为;
是否允许后续的获取所述用户终端的位置的相关行为;
允许进行获取所述用户终端的位置的相关行为的允许条件;
不允许进行获取所述用户终端的位置的相关行为的不允许条件;
允许后续的获取所述用户终端的位置的相关行为的允许条件;
不允许后续的获取所述用户终端的位置的相关行为的不允许条件;
是否允许公开所述获取的用户终端的位置;
允许公开所述获取的用户终端的位置的允许条件;
不允许公开所述获取的用户终端的位置的不允许条件。
可选的,所述控制信息指示允许获取所述用户终端的位置的相关行为;和/或
所述控制信息指示允许后续的获取所述用户终端的位置的相关行为;和/或
所述控制信息指示允许获取所述用户终端的位置的相关行为的允许范围;和/或
所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围。
可选的,所述控制信息指示不允许获取所述用户终端的位置;和/或
所述控制信息指示不允许获取所述用户终端的位置的不允许范围;和/或
所述控制信息指示不允许后续的获取用户终端的位置;和/或
所述控制信息指示不允许后续的获取所述用户终端的位置的不允许范围。
可选的,所述控制信息进一步还指示如下至少一项:
是否允许公开所述获取的用户终端的位置;和/或
允许公开所述获取的用户终端的位置的允许范围;和/或
不允许公开所述获取的用户终端的位置的不允许范围。
可选的,所述控制信息通过指示允许条件指示所述允许范围;和/或
所述控制信息通过指示不允许条件指示所述允许范围,其中,不满足不允许条件的范围属于所述允许范围;和或
所述控制信息通过指示不允许条件指示所述不允许范围;和/或
所述控制信息通过指示允许条件指示所述不允许范围,其中,不满足不允许条件的范围属于所述允许范围。
可选的,所述允许条件包括如下至少一项:允许的时间段、允许的时长、允许的位置服务客户的信息、允许的用途信息、允许的终端状态信息、允许的位置类型信息、允许的移动区域范围信息、允许采用的位置测量技术信息;和/或
所述不允许条件包括如下至少一项:不允许的时间段、不允许的时长、不允许的位置服务客户的信息、不允许的用途信息、不允许的终端状态信息、不允许的位置类型信息、不允许的移动区域范围信息和不允许采用的位置测量技术的信息。
可选的,所述位置服务客户的信息包括如下至少一项:位置服务客户的标识、位置服务客户的标识的名字、位置服务客户的标识的域名地址、位置服务客户方请求者的标识、位置服务客户方请求者的名字、位置服务客户方请求者的IP地址、位置服务客户的位置请求的类型的位置服务客户端应用的端口号;和/或
所述用途信息包括如下至少一项:紧急业务用途和商业用途;和/或
所述终端状态信息包括如下至少一项:空闲态、连接态、非活跃态、可用、不可用于位置测量之前、开机时和关机时;和/或
所述位置类型信息包括如下至少一项:当前的位置、历史的位置和最新的位置;和/或
所述移动区域范围信息包括如下至少一项:跟踪区TA标识列表,无线接入网节点标识列表、移动管理单元列表、认证管理功能AMF标识列表、移动管理实体MME标识列表、位置区列表、服务区列表的小区列表;和/或
所述位置测量技术信息包括如下至少一项:增强型基地台中心定位法ECID测量、观测到达时间差OTDOA测量和上行链路到达时间差UTDOA测量。
可选的,所述控制信息指示当需要获取所述用户终端的位置时,是否需要请求所述用户终端对位置请求进行允许验证。
可选的,所述控制信息指示如下至少一项:需要对位置请求进行验证、需要对位置请求进行验证的位置服务客户的信息、不需要对位置请求进行验证,不需要对位置请求进行验证的位置服务客户的信息。
可选的,所述预定条件包括如下至少一项:
生成和/或更新所述控制信息;
接收到获取所述用户终端的位置的获取请求;
接收到获取所述用户终端的位置的验证请求;
接收到获取当前所述控制信息的请求;
接收到当所述控制信息变更时,获取更新后的所述控制信息的请求。
可选的,所述获取所述用户终端的位置的相关行为,是指当(如网络单元或位置服务客户)产生获取所述用户终端的位置需求或者收到关于用户终端的位置请求时,包括如下至少一项:
是否向所述用户终端发送获取所述用户终端的位置的验证请求;
是否获取所述用户终端的位置;
是否请求无线接入网单元触发对所述用户终端进行位置测量;
是否触发所述用户终端进行位置测量;
是否成功响应收到的关于用户终端的位置请求;
是否向外部公开获取到的所述用户终端的位置;
是否要求启动计时器。
可选的,所述发送用于向网络单元发送所述控制信息;
其中,所述网络单元包括如下至少一项:无线接入网节点、无线接入网功能、核心网功能、核心网节点、移动管理节点、移动管理功能、位置服务管理功能、位置服务管理节点、位置服务管理客户、eNB,gNB、AMF、MME、LCS和E-SMLC。
本公开实施例提供的基站能够实现图2至图3的方法实施例中用户终端实现的各个过程,为避免重复,这里不再赘述,且可以节约传输资源,以及还可以降低用户终端的功耗。
请参见图11,图11是本公开实施例提供的一种位置获取的控制装置的结构图,所述装置应用于网络单元或者位置服务客户,如图11所示,位置获取的控制装置1100包括:
接收模块1101,用于接收控制信息,所述控制信息用于控制获取所述用户终端的位置的相关行为;
控制模块1102,用于根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制。
可选的,所述控制信息指示如下至少一项:
是否允许进行获取所述用户终端的位置的相关行为;
是否允许本次来自网络请求的获取所述用户终端的位置的相关行为;
是否允许后续的获取所述用户终端的位置的相关行为;
允许进行获取所述用户终端的位置的相关行为的允许条件;
不允许进行获取所述用户终端的位置的相关行为的不允许条件;
允许后续的获取所述用户终端的位置的相关行为的允许条件;
不允许后续的获取所述用户终端的位置的相关行为的不允许条件;
是否允许公开所述获取的用户终端的位置;
允许公开所述获取的用户终端的位置的允许条件;
不允许公开所述获取的用户终端的位置的不允许条件。
可选的,所述控制信息指示允许获取所述用户终端的位置的相关行为;和/或
所述控制信息指示允许后续的获取所述用户终端的位置的相关行为;和/或
所述控制信息指示允许获取所述用户终端的位置的相关行为的允许范围;和/或
所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围;
所述控制模块1102用于根据或者参考所述控制信息,执行获取所述用户终端的位置的相关行为;和/或根据或者参考所述控制信息,执行后续的获取所述用户终端的位置的相关行为;和/或根据或者参考所述控制信息,在所述 控制信息指示允许获取所述用户终端的位置的相关行为的允许范围内,执行获取所述用户终端的位置的相关行为;和/或根据或者参考所述控制信息,在所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围内,执行后续的获取所述用户终端的位置的相关行为。
可选的,所述控制信息指示不允许获取所述用户终端的位置;和或
所述控制信息指示不允许获取所述用户终端的位置的不允许范围;和/或
所述控制信息指示不允许后续的获取用户终端的位置;和/或
所述控制信息指示不允许后续的获取所述用户终端的位置的不允许范围;
所述控制模块1102用于根据或者参考所述控制信息,不允许获取所述用户终端的位置;和或根据或者参考所述控制信息,在所述控制信息指示不允许获取所述用户终端的位置的不允许范围内,不允许获取所述用户终端的位置;和或根据或者参考所述控制信息,不允许后续的获取用户终端的位置;和/或根据或者参考所述控制信息,在所述控制信息指示不允许后续的获取所述用户终端的位置的不允许范围内,不允许后续的获取所述用户终端的位置。
可选的,所述控制信息进一步还指示如下至少一项:
是否允许公开所述获取的用户终端的位置;和/或
允许公开所述获取的用户终端的位置的允许范围;和/或
不允许公开所述获取的用户终端的位置的不允许范围;
所述控制模块1102用于根据或者参考所述控制信息,公开所述获取的用户终端的位置;和/或根据或者参考所述控制信息,在所述允许公开所述获取的用户终端的位置的允许范围内,公开所述获取的用户终端的位置;和/或根据或者参考所述控制信息,在所述不允许公开所述获取的用户终端的位置的不允许范围内,不允许公开所述获取的用户终端的位置。
可选的,所述控制信息通过指示允许条件指示所述允许范围;和/或
所述控制信息通过指示不允许条件指示所述允许范围,其中,不满足不允许条件的范围属于所述允许范围;和或
所述控制信息通过指示不允许条件指示所述不允许范围;和/或
所述控制信息通过指示允许条件指示所述不允许范围,其中,不满足不允许条件的范围属于所述允许范围。
可选的,所述允许条件包括如下至少一项:允许的时间段、允许的时长、允许的位置服务客户的信息、允许的用途信息、允许的终端状态信息、允许的位置类型信息、允许的移动区域范围信息、允许采用的位置测量技术信息;和/或
所述不允许条件包括如下至少一项:不允许的时间段、不允许的时长、不允许的位置服务客户的信息、不允许的用途信息、不允许的终端状态信息、不允许的位置类型信息、不允许的移动区域范围信息和不允许采用的位置测量技术的信息。
可选的,所述位置服务客户的信息包括如下至少一项:位置服务客户的标识、位置服务客户的标识的名字、位置服务客户的标识的域名地址、位置服务客户方请求者的标识、位置服务客户方请求者的名字、位置服务客户方请求者的IP地址、位置服务客户的位置请求的类型的位置服务客户端应用的端口号;和/或
所述用途信息包括如下至少一项:紧急业务用途和商业用途;和/或
所述终端状态信息包括如下至少一项:空闲态、连接态、非活跃态、可用、不可用于位置测量之前、开机时和关机时;和/或
所述位置类型信息包括如下至少一项:当前的位置、历史的位置和最新的位置;和/或
所述移动区域范围信息包括如下至少一项:TA标识列表,无线接入网节点标识列表、移动管理单元列表、AMF标识列表、MME标识列表、位置区列表、服务区列表的小区列表;和/或
所述位置测量技术信息包括如下至少一项:ECID测量、OTDOA测量和UTDOA测量。
可选的,所述控制信息指示当需要获取所述用户终端的位置时,是否需要请求所述用户终端对位置请求进行允许验证;
所述控制模块用于当需要获取所述用户终端的位置时,根据或者参考所述控制信息,决定是否需要请求所述用户终端对位置请求进行允许验证。
可选的,所述控制信息指示如下至少一项:需要对位置请求进行验证、需要对位置请求进行验证的位置服务客户的信息、不需要对位置请求进行验 证,不需要对位置请求进行验证的位置服务客户的信息。
可选的,如图12所示,所述位置获取的控制装置1100还包括如下至少一项:
第一发送模块1103,用于发送获取所述用户终端的位置的获取请求;
第二发送模块1104,用于发送获取所述用户终端的位置的验证请求;
第三发送模块1105,用于发送获取当前的所述控制信息的请求;
第四发送模块1106,用于发送获取更新的所述控制信息的请求。
可选的,所述对获取所述用户终端的位置的相关行为进行控制包括如下至少一项:
执行允许获取所述用户终端的位置的相关行为;
执行不允许获取所述用户终端的位置的相关行为;
启动计时器。
可选的,控制模块1102用于所述控制信息指示不允许后续的获取所述用户终端的位置的相关行为时,启动计时器计时,在计时器开始计时之后和超时之前,执行后续的不允许获取所述用户终端的位置的相关行为;其中,所述计时器的计时时长为预先设定或者根据所述控制信息指示不允许的时长进行设定;和/或所述控制信息指示不允许获取所述用户终端的位置的相关行为时,启动计时器计时,在计时器超时之前,执行不允许获取所述用户终端的位置的相关行为;其中,所述计时器的计时时长为预先设定或者根据所述控制信息指示不允许的时长进行设定;和/或所述控制信息指示允许获取所述用户终端的位置的相关行为且所述控制信息指示允许时间时,启动计时器计时,在计时器超时之前,执行允许获取所述用户终端的位置的相关行为。
可选的,所述执行不允许获取所述用户终端的位置的相关行为,包括执行如下至少一项:
收到关于所述用户终端的位置请求时,直接返回获取所述用户终端位置失败;
不向所述用户终端发送获取所述用户终端位置的验证请求;
不获取所述用户终端的位置;
不请求无线接入网单元触发对所述用户终端进行位置测量;
不触发所述用户终端进行位置测量;
不响应位置服务客户发送的位置获取请求。
可选的,所述执行允许获取所述用户终端的位置的相关行为,包括执行如下至少一项:
向所述用户终端发送获取所述用户终端位置的验证请求;
获取所述用户终端的位置;
请求无线接入网单元触发对所述用户终端进行位置测量;
触发所述用户终端进行位置测量;
响应位置服务客户发送的位置获取请求,获取所述用户终端的位置;
响应接收的关于所述用户终端的位置请求,获取所述用户终端的位置。
可选的,如图13所示,所述位置获取的控制装置1100还包括如下至少一项:
确认模块1107,用于确认是否接受所述控制信息,并向所述用户终端返回是否确认接受所述控制信息和/或确认接受的所述控制信息的返回消息;
所述控制模块1102用于确认接受所述控制信息后,根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制。
可选的,所述网络单元包括至少以下之一:无线接入网节点、无线接入网功能、核心网功能、核心网节点、移动管理节点、移动管理功能、位置服务管理功能、位置服务管理节点、位置服务管理客户、eNB、AMF,MME,LCS和E-SMLC。
本公开实施例提供的基站能够实现图4的方法实施例中网络单元实现的各个过程,为避免重复,这里不再赘述,且可以节约传输资源,以及还可以降低用户终端的功耗。
图14为实现本公开各个实施例的一种用户终端的硬件结构示意图,
该用户终端1400包括但不限于:射频单元1401、网络模块1402、音频输出单元1403、输入单元1404、传感器1405、显示单元1406、用户输入单元1407、接口单元1408、存储器1409、处理器1410、以及电源1411等部件。本领域技术人员可以理解,图14中示出的用户终端结构并不构成对用户终端的限定,用户终端可以包括比图示更多或更少的部件,或者组合某些部件, 或者不同的部件布置。在本公开实施例中,用户终端包括但不限于手机、平板电脑、笔记本电脑、掌上电脑、车载用户终端、可穿戴设备、以及计步器等。
处理器1410,用于判断预定条件是否满足;
射频单元1401,用于在确定预定条件满足时,发送控制信息,所述控制信息用于控制获取所述用户终端的位置的相关行为。
可选的,所述控制信息指示如下至少一项:
是否允许进行获取所述用户终端的位置的相关行为;
是否允许本次被请求的获取所述用户终端的位置的相关行为;
是否允许后续的获取所述用户终端的位置的相关行为;
允许进行获取所述用户终端的位置的相关行为的允许条件;
不允许进行获取所述用户终端的位置的相关行为的不允许条件;
允许后续的获取所述用户终端的位置的相关行为的允许条件;
不允许后续的获取所述用户终端的位置的相关行为的不允许条件;
是否允许公开所述获取的用户终端的位置;
允许公开所述获取的用户终端的位置的允许条件;
不允许公开所述获取的用户终端的位置的不允许条件。
可选的,所述控制信息指示允许获取所述用户终端的位置的相关行为;和/或
所述控制信息指示允许后续的获取所述用户终端的位置的相关行为;和/或
所述控制信息指示允许获取所述用户终端的位置的相关行为的允许范围;和/或
所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围。
可选的,所述控制信息指示不允许获取所述用户终端的位置;和/或
所述控制信息指示不允许获取所述用户终端的位置的不允许范围;和/或
所述控制信息指示不允许后续的获取用户终端的位置;和/或
所述控制信息指示不允许后续的获取所述用户终端的位置的不允许范围。
可选的,所述控制信息进一步还指示如下至少一项:
是否允许公开所述获取的用户终端的位置;和/或
允许公开所述获取的用户终端的位置的允许范围;和/或
不允许公开所述获取的用户终端的位置的不允许范围。
可选的,所述控制信息通过指示允许条件指示所述允许范围;和/或
所述控制信息通过指示不允许条件指示所述允许范围,其中,不满足不允许条件的范围属于所述允许范围;和或
所述控制信息通过指示不允许条件指示所述不允许范围;和/或
所述控制信息通过指示允许条件指示所述不允许范围,其中,不满足不允许条件的范围属于所述允许范围。
可选的,所述允许条件包括如下至少一项:允许的时间段、允许的时长、允许的位置服务客户的信息、允许的用途信息、允许的终端状态信息、允许的位置类型信息、允许的移动区域范围信息、允许采用的位置测量技术信息;和/或
所述不允许条件包括如下至少一项:不允许的时间段、不允许的时长、不允许的位置服务客户的信息、不允许的用途信息、不允许的终端状态信息、不允许的位置类型信息、不允许的移动区域范围信息和不允许采用的位置测量技术的信息。
可选的,所述位置服务客户的信息包括如下至少一项:位置服务客户的标识、位置服务客户的标识的名字、位置服务客户的标识的域名地址、位置服务客户方请求者的标识、位置服务客户方请求者的名字、位置服务客户方请求者的IP地址、位置服务客户的位置请求的类型的位置服务客户端应用的端口号;和/或
所述用途信息包括如下至少一项:紧急业务用途和商业用途;和/或
所述终端状态信息包括如下至少一项:空闲态、连接态、非活跃态、可用、不可用于位置测量之前、开机时和关机时;和/或
所述位置类型信息包括如下至少一项:当前的位置、历史的位置和最新的位置;和/或
所述移动区域范围信息包括如下至少一项:跟踪区TA标识列表,无线 接入网节点标识列表、移动管理单元列表、认证管理功能AMF标识列表、移动管理实体MME标识列表、位置区列表、服务区列表的小区列表;和/或
所述位置测量技术信息包括如下至少一项:增强型基地台中心定位法ECID测量、观测到达时间差OTDOA测量和上行链路到达时间差UTDOA测量。
可选的,所述控制信息指示当需要获取所述用户终端的位置时,是否需要请求所述用户终端对位置请求进行允许验证。
可选的,所述控制信息指示如下至少一项:需要对位置请求进行验证、需要对位置请求进行验证的位置服务客户的信息、不需要对位置请求进行验证,不需要对位置请求进行验证的位置服务客户的信息。
可选的,所述预定条件包括如下至少一项:
生成和/或更新所述控制信息;
接收到(如网络单元或位置服务客户发送的)获取所述用户终端的位置的获取请求;
接收到(如网络单元或位置服务客户发送的)获取所述用户终端的位置的验证请求;
接收到(如网络单元或位置服务客户发送的)获取当前所述控制信息的请求;
接收到(如网络单元或位置服务客户发送的)当所述控制信息变更时,获取更新后的所述控制信息的请求。
可选的,所述获取所述用户终端的位置的相关行为,是指当(如网络单元或位置服务客户)产生获取所述用户终端的位置需求或者收到关于用户终端的位置请求时,包括如下至少一项:
是否向所述用户终端发送获取所述用户终端的位置的验证请求;
是否获取所述用户终端的位置;
是否请求无线接入网单元触发对所述用户终端进行位置测量;
是否触发所述用户终端进行位置测量;
是否成功响应收到的关于用户终端的位置请求;
是否向外部公开获取到的所述用户终端的位置;
是否要求启动计时器。
向网络单元发送所述控制信息;
其中,所述网络单元包括如下至少一项:无线接入网节点、无线接入网功能、核心网功能、核心网节点、移动管理节点、移动管理功能、位置服务管理功能、位置服务管理节点、位置服务管理客户、演进性基站eNB,下一代基站gNB、接入和移动管理功能AMF、移动管理实体MME、位置服务功能LCS和增强型服务移动定位中心E-SMLC。
应理解的是,本公开实施例中,射频单元1401可用于收发信息或通话过程中,信号的接收和发送,具体的,将来自基站的下行数据接收后,给处理器1410处理;另外,将上行的数据发送给基站。通常,射频单元1401包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。此外,射频单元1401还可以通过无线通信系统与网络和其他设备通信。
用户终端通过网络模块1402为用户提供了无线的宽带互联网访问,如帮助用户收发电子邮件、浏览网页和访问流式媒体等。
音频输出单元1403可以将射频单元1401或网络模块1402接收的或者在存储器1409中存储的音频数据转换成音频信号并且输出为声音。而且,音频输出单元1403还可以提供与用户终端1400执行的特定功能相关的音频输出(例如,呼叫信号接收声音、消息接收声音等等)。音频输出单元1403包括扬声器、蜂鸣器以及受话器等。
输入单元1404用于接收音频或视频信号。输入单元1404可以包括图形处理器(Graphics Processing Unit,GPU)14041和麦克风14042,图形处理器14041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。处理后的图像帧可以显示在显示单元1406上。经图形处理器14041处理后的图像帧可以存储在存储器1409(或其它存储介质)中或者经由射频单元1401或网络模块1402进行发送。麦克风14042可以接收声音,并且能够将这样的声音处理为音频数据。处理后的音频数据可以在电话通话模式的情况下转换为可经由射频单元1401发送到移动通信基站的格式输出。
用户终端1400还包括至少一种传感器1405,比如光传感器、运动传感 器以及其他传感器。具体地,光传感器包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板14061的亮度,接近传感器可在用户终端1400移动到耳边时,关闭显示面板14061和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别用户终端姿态(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;传感器1405还可以包括指纹传感器、压力传感器、虹膜传感器、分子传感器、陀螺仪、气压计、湿度计、温度计、红外线传感器等,在此不再赘述。
显示单元1406用于显示由用户输入的信息或提供给用户的信息。显示单元1406可包括显示面板14061,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板14061。
用户输入单元1407可用于接收输入的数字或字符信息,以及产生与用户终端的用户设置以及功能控制有关的键信号输入。具体地,用户输入单元1407包括触控面板14071以及其他输入设备14072。触控面板14071,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板14071上或在触控面板14071附近的操作)。触控面板14071可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1410,接收处理器1410发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板14071。除了触控面板14071,用户输入单元1407还可以包括其他输入设备14072。具体地,其他输入设备14072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
进一步的,触控面板14071可覆盖在显示面板14061上,当触控面板14071检测到在其上或附近的触摸操作后,传送给处理器1410以确定触摸事件的类型,随后处理器1410根据触摸事件的类型在显示面板14061上提供相应的视 觉输出。虽然在图14中,触控面板14071与显示面板14061是作为两个独立的部件来实现用户终端的输入和输出功能,但是在某些实施例中,可以将触控面板14071与显示面板14061集成而实现用户终端的输入和输出功能,具体此处不做限定。
接口单元1408为外部装置与用户终端1400连接的接口。例如,外部装置可以包括有线或无线头戴式耳机端口、外部电源(或电池充电器)端口、有线或无线数据端口、存储卡端口、用于连接具有识别模块的装置的端口、音频输入/输出(I/O)端口、视频I/O端口、耳机端口等等。接口单元1408可以用于接收来自外部装置的输入(例如,数据信息、电力等等)并且将接收到的输入传输到用户终端1400内的一个或多个元件或者可以用于在用户终端1400和外部装置之间传输数据。
存储器1409可用于存储软件程序以及各种数据。存储器1409可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器1409可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
处理器1410是用户终端的控制中心,利用各种接口和线路连接整个用户终端的各个部分,通过运行或执行存储在存储器1409内的软件程序和/或模块,以及调用存储在存储器1409内的数据,执行用户终端的各种功能和处理数据,从而对用户终端进行整体监控。处理器1410可包括一个或多个处理单元;可选的,处理器1410可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1410中。
用户终端1400还可以包括给各个部件供电的电源1411(比如电池),可选的,电源1411可以通过电源管理系统与处理器1410逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
另外,用户终端1400包括一些未示出的功能模块,在此不再赘述。
可选的,本公开实施例还提供一种用户终端,包括处理器1410,存储器1409,存储在存储器1409上并可在所述处理器1410上运行的计算机程序,该计算机程序被处理器1410执行时实现上述位置获取的控制方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
参见图15,图15是本公开实施例可应用的另一种位置获取的控制装置的结构图,该装置应用于网络单元或者位置服务客户,如图15所示,该位置获取的控制装置1500包括:处理器1501、收发机1502、存储器1503和总线接口,其中:
其中,收发机1502,用于接收控制信息,所述控制信息用于控制获取所述用户终端的位置的相关行为;
处理器1501用于根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制。
可选的,所述控制信息指示如下至少一项:
是否允许进行获取所述用户终端的位置的相关行为;
是否允许本次被请求的获取所述用户终端的位置的相关行为;
是否允许后续的获取所述用户终端的位置的相关行为;
允许进行获取所述用户终端的位置的相关行为的允许条件;
不允许进行获取所述用户终端的位置的相关行为的不允许条件;
允许后续的获取所述用户终端的位置的相关行为的允许条件;
不允许后续的获取所述用户终端的位置的相关行为的不允许条件;
是否允许公开所述获取的用户终端的位置;
允许公开所述获取的用户终端的位置的允许条件;
不允许公开所述获取的用户终端的位置的不允许条件。
可选的,所述控制信息指示允许获取所述用户终端的位置的相关行为;和/或
所述控制信息指示允许后续的获取所述用户终端的位置的相关行为;和/或
所述控制信息指示允许获取所述用户终端的位置的相关行为的允许范围;和/或
所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围;
所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
根据或者参考所述控制信息,执行获取所述用户终端的位置的相关行为;和/或
根据或者参考所述控制信息,执行后续的获取所述用户终端的位置的相关行为;和/或
根据或者参考所述控制信息,在所述控制信息指示允许获取所述用户终端的位置的相关行为的允许范围内,执行获取所述用户终端的位置的相关行为;和/或
根据或者参考所述控制信息,在所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围内,执行后续的获取所述用户终端的位置的相关行为。
可选的,所述控制信息指示不允许获取所述用户终端的位置;和或
所述控制信息指示不允许获取所述用户终端的位置的不允许范围;和/或
所述控制信息指示不允许后续的获取用户终端的位置;和/或
所述控制信息指示不允许后续的获取所述用户终端的位置的不允许范围;
所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
根据或者参考所述控制信息,不允许获取所述用户终端的位置;和或
根据或者参考所述控制信息,在所述控制信息指示不允许获取所述用户终端的位置的不允许范围内,不允许获取所述用户终端的位置;和或
根据或者参考所述控制信息,不允许后续的获取用户终端的位置;和/或
根据或者参考所述控制信息,在所述控制信息指示不允许后续的获取所述用户终端的位置的不允许范围内,不允许后续的获取所述用户终端的位置。
可选的,所述控制信息进一步还指示如下至少一项:
是否允许公开所述获取的用户终端的位置;和/或
允许公开所述获取的用户终端的位置的允许范围;和/或
不允许公开所述获取的用户终端的位置的不允许范围;
所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
根据或者参考所述控制信息,公开所述获取的用户终端的位置;和/或
根据或者参考所述控制信息,在所述允许公开所述获取的用户终端的位置的允许范围内,公开所述获取的用户终端的位置;和/或
根据或者参考所述控制信息,在所述不允许公开所述获取的用户终端的位置的不允许范围内,不允许公开所述获取的用户终端的位置。
可选的,所述控制信息通过指示允许条件指示所述允许范围;和/或
所述控制信息通过指示不允许条件指示所述允许范围,其中,不满足不允许条件的范围属于所述允许范围;和或
所述控制信息通过指示不允许条件指示所述不允许范围;和/或
所述控制信息通过指示允许条件指示所述不允许范围,其中,不满足不允许条件的范围属于所述允许范围。
可选的,所述允许条件包括如下至少一项:允许的时间段、允许的时长、允许的位置服务客户的信息、允许的用途信息、允许的终端状态信息、允许的位置类型信息、允许的移动区域范围信息、允许采用的位置测量技术信息;和/或
所述不允许条件包括如下至少一项:不允许的时间段、不允许的时长、不允许的位置服务客户的信息、不允许的用途信息、不允许的终端状态信息、不允许的位置类型信息、不允许的移动区域范围信息和不允许采用的位置测量技术的信息。
可选的,所述位置服务客户的信息包括如下至少一项:位置服务客户的标识、位置服务客户的标识的名字、位置服务客户的标识的域名地址、位置服务客户方请求者的标识、位置服务客户方请求者的名字、位置服务客户方请求者的IP地址、位置服务客户的位置请求的类型的位置服务客户端应用的端口号;和/或
所述用途信息包括如下至少一项:紧急业务用途和商业用途;和/或
所述终端状态信息包括如下至少一项:空闲态、连接态、非活跃态、可 用、不可用于位置测量之前、开机时和关机时;和/或
所述位置类型信息包括如下至少一项:当前的位置、历史的位置和最新的位置;和/或
所述移动区域范围信息包括如下至少一项:TA标识列表,无线接入网节点标识列表、移动管理单元列表、AMF标识列表、MME标识列表、位置区列表、服务区列表的小区列表;和/或
所述位置测量技术信息包括如下至少一项:ECID测量、OTDOA测量和UTDOA测量。
可选的,所述控制信息指示当需要获取所述用户终端的位置时,是否需要请求所述用户终端对位置请求进行允许验证;
所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
当需要获取所述用户终端的位置时,根据或者参考所述控制信息,决定是否需要请求所述用户终端对位置请求进行允许验证。
可选的,所述控制信息指示如下至少一项:需要对位置请求进行验证、需要对位置请求进行验证的位置服务客户的信息、不需要对位置请求进行验证,不需要对位置请求进行验证的位置服务客户的信息。
可选的,所述接收控制信息之前,收发机1502还用于如下至少一项:
发送获取所述用户终端的位置的获取请求;
发送获取所述用户终端的位置的验证请求;
发送获取当前的所述控制信息的请求;
发送获取更新的所述控制信息的请求。
可选的,所述对获取所述用户终端的位置的相关行为进行控制包括如下至少一项:
执行允许获取所述用户终端的位置的相关行为;
执行不允许获取所述用户终端的位置的相关行为,启动计时器。
可选的,所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
所述控制信息指示不允许后续的获取所述用户终端的位置的相关行为时, 启动计时器计时,在计时器开始计时之后和超时之前,执行后续的不允许获取所述用户终端的位置的相关行为;其中,所述计时器的计时时长为预先设定或者根据所述控制信息指示不允许的时长进行设定;和/或
所述控制信息指示不允许获取所述用户终端的位置的相关行为时,启动计时器计时,在计时器超时之前,执行不允许获取所述用户终端的位置的相关行为;其中,所述计时器的计时时长为预先设定或者根据所述控制信息指示不允许的时长进行设定;和/或
所述控制信息指示允许获取所述用户终端的位置的相关行为且所述控制信息指示允许时间时,启动计时器计时,在计时器超时之前,执行允许获取所述用户终端的位置的相关行为。
可选的,所述执行不允许获取所述用户终端的位置的相关行为,包括执行如下至少一项:
收到关于所述用户终端的位置请求时,直接返回获取所述用户终端位置失败;
不向所述用户终端发送获取所述用户终端位置的验证请求;
不获取所述用户终端的位置;
不请求无线接入网单元触发对所述用户终端进行位置测量;
不触发所述用户终端进行位置测量;
不响应位置服务客户发送的位置获取请求。
可选的,所述执行允许获取所述用户终端的位置的相关行为,包括执行如下至少一项:
向所述用户终端发送获取所述用户终端位置的验证请求;
获取所述用户终端的位置;
请求无线接入网单元触发对所述用户终端进行位置测量;
触发所述用户终端进行位置测量;
响应位置服务客户发送的位置获取请求,获取所述用户终端的位置;
响应接收的关于所述用户终端的位置请求,获取所述用户终端的位置。
可选的,所述接收控制信息之后,所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制之前,收发机1502还用于确认 是否接受所述控制信息,并向所述用户终端返回是否确认接受所述控制信息和/或确认接受的所述控制信息的返回消息;
所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
确认接受所述控制信息后,根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制。
可选的,所述网络单元包括至少以下之一:无线接入网节点、无线接入网功能、核心网功能、核心网节点、移动管理节点、移动管理功能、位置服务管理功能、位置服务管理节点、位置服务管理客户、eNB、AMF,MME,LCS和E-SMLC。
其中,收发机1502,用于在处理器1501的控制下接收和发送数据,所述收发机1502包括至少两个天线端口。
在图15中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器1501代表的一个或多个处理器和存储器1503代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机1502可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。针对不同的用户设备,用户接口1504还可以是能够外接内接需要设备的接口,连接的设备包括但不限于小键盘、显示器、扬声器、麦克风、操纵杆等。
处理器1501负责管理总线架构和通常的处理,存储器1503可以存储处理器1501在执行操作时所使用的数据。
可选的,本公开实施例还提供一种位置获取的控制装置,包括处理器1501,存储器1503,存储在存储器1503上并可在所述处理器1501上运行的计算机程序,该计算机程序被处理器1501执行时实现上述位置获取的控制方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本公开实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现用户终端侧的位置获取的控制方法实施例的各个过程。
本公开实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现网络单元侧的位置获取的控制方法实施例的各个过程。
其中,所述的计算机可读存储介质,如只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本公开的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本公开各个实施例所述的方法。
上面结合附图对本公开的实施例进行了描述,但是本公开并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本公开的启示下,在不脱离本公开宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本公开的保护之内。

Claims (65)

  1. 一种位置获取的控制方法,应用于用户终端,包括:
    判断预定条件是否满足;
    在确定预定条件满足时,发送控制信息,所述控制信息用于控制获取所述用户终端的位置的相关行为。
  2. 如权利要求1所述的方法,其中,所述控制信息指示如下至少一项:
    是否允许进行获取所述用户终端的位置的相关行为;
    是否允许本次被请求的获取所述用户终端的位置的相关行为;
    是否允许后续的获取所述用户终端的位置的相关行为;
    允许进行获取所述用户终端的位置的相关行为的允许条件;
    不允许进行获取所述用户终端的位置的相关行为的不允许条件;
    允许后续的获取所述用户终端的位置的相关行为的允许条件;
    不允许后续的获取所述用户终端的位置的相关行为的不允许条件;
    是否允许公开所述获取的用户终端的位置;
    允许公开所述获取的用户终端的位置的允许条件;
    不允许公开所述获取的用户终端的位置的不允许条件。
  3. 如权利要求2所述的方法,其中,
    所述控制信息指示允许获取所述用户终端的位置的相关行为;和/或
    所述控制信息指示允许后续的获取所述用户终端的位置的相关行为;和/或
    所述控制信息指示允许获取所述用户终端的位置的相关行为的允许范围;和/或
    所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围。
  4. 如权利要求2所述的方法,其中,
    所述控制信息指示不允许获取所述用户终端的位置;和/或
    所述控制信息指示不允许获取所述用户终端的位置的不允许范围;和/或
    所述控制信息指示不允许后续的获取用户终端的位置;和/或
    所述控制信息指示不允许后续的获取所述用户终端的位置的不允许范围。
  5. 如权利要求3所述的方法,其中,所述控制信息进一步还指示如下至少一项:
    是否允许公开所述获取的用户终端的位置;和/或
    允许公开所述获取的用户终端的位置的允许范围;和/或
    不允许公开所述获取的用户终端的位置的不允许范围。
  6. 如权利要求2至4中任一项所述的方法,其中,
    所述控制信息通过指示允许条件指示所述允许范围;和/或
    所述控制信息通过指示不允许条件指示所述允许范围,其中,不满足不允许条件的范围属于所述允许范围;和或
    所述控制信息通过指示不允许条件指示所述不允许范围;和/或
    所述控制信息通过指示允许条件指示所述不允许范围,其中,不满足不允许条件的范围属于所述允许范围。
  7. 如权利要求2所述的方法,其中,所述允许条件包括如下至少一项:允许的时间段、允许的时长、允许的位置服务客户的信息、允许的用途信息、允许的终端状态信息、允许的位置类型信息、允许的移动区域范围信息、允许采用的位置测量技术信息;和/或
    所述不允许条件包括如下至少一项:不允许的时间段、不允许的时长、不允许的位置服务客户的信息、不允许的用途信息、不允许的终端状态信息、不允许的位置类型信息、不允许的移动区域范围信息和不允许采用的位置测量技术的信息。
  8. 如权利要求7所述的方法,其中,
    所述位置服务客户的信息包括如下至少一项:位置服务客户的标识、位置服务客户的标识的名字、位置服务客户的标识的域名地址、位置服务客户方请求者的标识、位置服务客户方请求者的名字、位置服务客户方请求者的IP地址、位置服务客户的位置请求的类型的位置服务客户端应用的端口号;和/或
    所述用途信息包括如下至少一项:紧急业务用途和商业用途;和/或
    所述终端状态信息包括如下至少一项:空闲态、连接态、非活跃态、可 用、不可用于位置测量之前、开机时和关机时;和/或
    所述位置类型信息包括如下至少一项:当前的位置、历史的位置和最新的位置;和/或
    所述移动区域范围信息包括如下至少一项:跟踪区TA标识列表,无线接入网节点标识列表、移动管理单元列表、认证管理功能AMF标识列表、移动管理实体MME标识列表、位置区列表、服务区列表的小区列表;和/或
    所述位置测量技术信息包括如下至少一项:增强型基地台中心定位法ECID测量、观测到达时间差OTDOA测量和上行链路到达时间差UTDOA测量。
  9. 如权利要求1至4中任一项所述的方法,其中,所述控制信息指示当需要获取所述用户终端的位置时,是否需要请求所述用户终端对位置请求进行允许验证。
  10. 如权利要求9所述的方法,其中,所述控制信息指示如下至少一项:需要对位置请求进行验证、需要对位置请求进行验证的位置服务客户的信息、不需要对位置请求进行验证,不需要对位置请求进行验证的位置服务客户的信息。
  11. 如权利要求1至4中任一项所述的方法,其中,所述预定条件包括如下至少一项:
    生成和/或更新所述控制信息;
    接收到获取所述用户终端的位置的获取请求;
    接收到获取所述用户终端的位置的验证请求;
    接收到获取当前所述控制信息的请求;
    接收到当所述控制信息变更时,获取更新后的所述控制信息的请求。
  12. 如权利要求1至4中任一项所述的方法,其中,所述获取所述用户终端的位置的相关行为,包括如下至少一项:
    是否向所述用户终端发送获取所述用户终端的位置的验证请求;
    是否获取所述用户终端的位置;
    是否请求无线接入网单元触发对所述用户终端进行位置测量;
    是否触发所述用户终端进行位置测量;
    是否成功响应收到的关于用户终端的位置请求;
    是否向外部公开获取到的所述用户终端的位置;
    是否要求启动计时器。
  13. 如权利要求1至4任一所述的方法,其中,所述发送所述控制信息包括:
    向网络单元发送所述控制信息;
    其中,所述网络单元包括如下至少一项:无线接入网节点、无线接入网功能、核心网功能、核心网节点、移动管理节点、移动管理功能、位置服务管理功能、位置服务管理节点、位置服务管理客户、演进性基站eNB,下一代基站gNB、接入和移动管理功能AMF、移动管理实体MME、位置服务功能LCS和增强型服务移动定位中心E-SMLC。
  14. 如权利要求1至13任一所述的方法,其中,所述预定条件由所述用户终端配置,或者所述预定条件由用户预先设置,或者所述预定条件由协议预先定义,或者所述预定条件由网络预先配置给所述用户终端。
  15. 一种位置获取的控制方法,应用于网络单元或者位置服务客户,包括:
    接收控制信息,所述控制信息用于控制获取用户终端的位置的相关行为;
    根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制。
  16. 如权利要求15所述的方法,其中,所述控制信息指示如下至少一项:
    是否允许进行获取所述用户终端的位置的相关行为;
    是否允许本次被请求的获取所述用户终端的位置的相关行为;
    是否允许后续的获取所述用户终端的位置的相关行为;
    允许进行获取所述用户终端的位置的相关行为的允许条件;
    不允许进行获取所述用户终端的位置的相关行为的不允许条件;
    允许后续的获取所述用户终端的位置的相关行为的允许条件;
    不允许后续的获取所述用户终端的位置的相关行为的不允许条件;
    是否允许公开所述获取的用户终端的位置;
    允许公开所述获取的用户终端的位置的允许条件;
    不允许公开所述获取的用户终端的位置的不允许条件。
  17. 如权利要求16所述的方法,其中,
    所述控制信息指示允许获取所述用户终端的位置的相关行为;和/或
    所述控制信息指示允许后续的获取所述用户终端的位置的相关行为;和/或
    所述控制信息指示允许获取所述用户终端的位置的相关行为的允许范围;和/或
    所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围;
    所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
    根据或者参考所述控制信息,执行获取所述用户终端的位置的相关行为;和/或
    根据或者参考所述控制信息,执行后续的获取所述用户终端的位置的相关行为;和/或
    根据或者参考所述控制信息,在所述控制信息指示允许获取所述用户终端的位置的相关行为的允许范围内,执行获取所述用户终端的位置的相关行为;和/或
    根据或者参考所述控制信息,在所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围内,执行后续的获取所述用户终端的位置的相关行为。
  18. 如权利要求16所述的方法,其中,所述控制信息指示不允许获取所述用户终端的位置;和或
    所述控制信息指示不允许获取所述用户终端的位置的不允许范围;和/或
    所述控制信息指示不允许后续的获取用户终端的位置;和/或
    所述控制信息指示不允许后续的获取所述用户终端的位置的不允许范围;
    所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
    根据或者参考所述控制信息,不允许获取所述用户终端的位置;和或
    根据或者参考所述控制信息,在所述控制信息指示不允许获取所述用户终端的位置的不允许范围内,不允许获取所述用户终端的位置;和或
    根据或者参考所述控制信息,不允许后续的获取用户终端的位置;和/或
    根据或者参考所述控制信息,在所述控制信息指示不允许后续的获取所述用户终端的位置的不允许范围内,不允许后续的获取所述用户终端的位置。
  19. 如权利要求16或17所述的方法,其中,所述控制信息进一步还指示如下至少一项:
    是否允许公开所述获取的用户终端的位置;和/或
    允许公开所述获取的用户终端的位置的允许范围;和/或
    不允许公开所述获取的用户终端的位置的不允许范围;
    所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
    根据或者参考所述控制信息,公开所述获取的用户终端的位置;和/或
    根据或者参考所述控制信息,在所述允许公开所述获取的用户终端的位置的允许范围内,公开所述获取的用户终端的位置;和/或
    根据或者参考所述控制信息,在所述不允许公开所述获取的用户终端的位置的不允许范围内,不允许公开所述获取的用户终端的位置。
  20. 如权利要求16至18中任一项所述的方法,其中,
    所述控制信息通过指示允许条件指示所述允许范围;和/或
    所述控制信息通过指示不允许条件指示所述允许范围,其中,不满足不允许条件的范围属于所述允许范围;和或
    所述控制信息通过指示不允许条件指示所述不允许范围;和/或
    所述控制信息通过指示允许条件指示所述不允许范围,其中,不满足不允许条件的范围属于所述允许范围。
  21. 如权利要求16所述的方法,其中,所述允许条件包括如下至少一项:允许的时间段、允许的时长、允许的位置服务客户的信息、允许的用途信息、允许的终端状态信息、允许的位置类型信息、允许的移动区域范围信息、允许采用的位置测量技术信息;和/或
    所述不允许条件包括如下至少一项:不允许的时间段、不允许的时长、 不允许的位置服务客户的信息、不允许的用途信息、不允许的终端状态信息、不允许的位置类型信息、不允许的移动区域范围信息和不允许采用的位置测量技术的信息。
  22. 如权利要求21所述的方法,其中,
    所述位置服务客户的信息包括如下至少一项:位置服务客户的标识、位置服务客户的标识的名字、位置服务客户的标识的域名地址、位置服务客户方请求者的标识、位置服务客户方请求者的名字、位置服务客户方请求者的IP地址、位置服务客户的位置请求的类型的位置服务客户端应用的端口号;和/或
    所述用途信息包括如下至少一项:紧急业务用途和商业用途;和/或
    所述终端状态信息包括如下至少一项:空闲态、连接态、非活跃态、可用、不可用于位置测量之前、开机时和关机时;和/或
    所述位置类型信息包括如下至少一项:当前的位置、历史的位置和最新的位置;和/或
    所述移动区域范围信息包括如下至少一项:TA标识列表,无线接入网节点标识列表、移动管理单元列表、AMF标识列表、MME标识列表、位置区列表、服务区列表的小区列表;和/或
    所述位置测量技术信息包括如下至少一项:ECID测量、OTDOA测量和UTDOA测量。
  23. 如权利要求15至18中任一项所述的方法,其中,所述控制信息指示当需要获取所述用户终端的位置时,是否需要请求所述用户终端对位置请求进行允许验证;
    所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
    当需要获取所述用户终端的位置时,根据或者参考所述控制信息,决定是否需要请求所述用户终端对位置请求进行允许验证。
  24. 如权利要求23所述的方法,其中,所述控制信息指示如下至少一项:需要对位置请求进行验证、需要对位置请求进行验证的位置服务客户的信息、不需要对位置请求进行验证,不需要对位置请求进行验证的位置服务客户的 信息。
  25. 如权利要求15至18中任一项所述的方法,其中,所述接收控制信息之前,所述方法还包括如下至少一项:
    发送获取所述用户终端的位置的获取请求;
    发送获取所述用户终端的位置的验证请求;
    发送获取当前的所述控制信息的请求;
    发送获取更新的所述控制信息的请求。
  26. 如权利要求15至18中任一项所述的方法,其中,所述对获取所述用户终端的位置的相关行为进行控制包括如下至少一项:
    执行允许获取所述用户终端的位置的相关行为;
    执行不允许获取所述用户终端的位置的相关行为;
    启动计时器。
  27. 如权利要求15至18任一所述的方法,其中,所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:所述控制信息指示不允许后续的获取所述用户终端的位置的相关行为时,启动计时器计时,在计时器开始计时之后和超时之前,执行后续的不允许获取所述用户终端的位置的相关行为;其中,所述计时器的计时时长为预先设定或者根据所述控制信息指示不允许的时长进行设定;和/或
    所述控制信息指示不允许获取所述用户终端的位置的相关行为时,启动计时器计时,在计时器超时之前,执行不允许获取所述用户终端的位置的相关行为;其中,所述计时器的计时时长为预先设定或者根据所述控制信息指示不允许的时长进行设定;和/或
    所述控制信息指示允许获取所述用户终端的位置的相关行为且所述控制信息指示允许时间时,启动计时器计时,在计时器超时之前,执行允许获取所述用户终端的位置的相关行为。
  28. 如权利要求26所述的方法,其中,所述执行不允许获取所述用户终端的位置的相关行为,包括执行如下至少一项:
    收到关于所述用户终端的位置请求时,直接返回获取所述用户终端位置失败;
    不向所述用户终端发送获取所述用户终端位置的验证请求;
    不获取所述用户终端的位置;
    不请求无线接入网单元触发对所述用户终端进行位置测量;
    不触发所述用户终端进行位置测量;
    不响应位置服务客户发送的位置获取请求。
  29. 如权利要求26所述的方法,其中,所述执行允许获取所述用户终端的位置的相关行为,包括执行如下至少一项:
    向所述用户终端发送获取所述用户终端位置的验证请求;
    获取所述用户终端的位置;
    请求无线接入网单元触发对所述用户终端进行位置测量;
    触发所述用户终端进行位置测量;
    响应位置服务客户发送的位置获取请求,获取所述用户终端的位置;
    响应接收的关于所述用户终端的位置请求,获取所述用户终端的位置。
  30. 如权利要求15至18任一所述的方法,其中,所述接收控制信息之后,所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制之前,所述方法还包括:
    确认是否接受所述控制信息,并向所述用户终端返回是否确认接受所述控制信息和/或确认接收的所述控制信息的返回消息;
    所述根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制,包括:
    确认接受所述控制信息后,根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制。
  31. 如权利要求15至18任一所述的方法,其中,所述网络单元包括至少以下之一:无线接入网节点、无线接入网功能、核心网功能、核心网节点、移动管理节点、移动管理功能、位置服务管理功能、位置服务管理节点、位置服务管理客户、eNB、AMF,MME,LCS和E-SMLC。
  32. 一种用户终端,包括:
    判断模块,用于判断预定条件是否满足;
    发送模块,用于在确定预定条件满足时,发送控制信息,所述控制信息 用于控制获取所述用户终端的位置的相关行为。
  33. 如权利要求32所述的用户终端,其中,所述控制信息指示如下至少一项:
    是否允许进行获取所述用户终端的位置的相关行为;
    是否允许本次被请求的获取所述用户终端的位置的相关行为;
    是否允许后续的获取所述用户终端的位置的相关行为;
    允许进行获取所述用户终端的位置的相关行为的允许条件;
    不允许进行获取所述用户终端的位置的相关行为的不允许条件;
    允许后续的获取所述用户终端的位置的相关行为的允许条件;
    不允许后续的获取所述用户终端的位置的相关行为的不允许条件;
    是否允许公开所述获取的用户终端的位置;
    允许公开所述获取的用户终端的位置的允许条件;
    不允许公开所述获取的用户终端的位置的不允许条件。
  34. 如权利要求33所述的用户终端,其中,
    所述控制信息指示允许获取所述用户终端的位置的相关行为;和/或
    所述控制信息指示允许后续的获取所述用户终端的位置的相关行为;和/或
    所述控制信息指示允许获取所述用户终端的位置的相关行为的允许范围;和/或
    所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围。
  35. 如权利要求33所述的用户终端,其中,
    所述控制信息指示不允许获取所述用户终端的位置;和/或
    所述控制信息指示不允许获取所述用户终端的位置的不允许范围;和/或
    所述控制信息指示不允许后续的获取用户终端的位置;和/或
    所述控制信息指示不允许后续的获取所述用户终端的位置的不允许范围。
  36. 如权利要求33或34所述的用户终端,其中,所述控制信息进一步还指示如下至少一项:
    是否允许公开所述获取的用户终端的位置;和/或
    允许公开所述获取的用户终端的位置的允许范围;和/或
    不允许公开所述获取的用户终端的位置的不允许范围。
  37. 如权利要求33至35中任一项所述的用户终端,其中,
    所述控制信息通过指示允许条件指示所述允许范围;和/或
    所述控制信息通过指示不允许条件指示所述允许范围,其中,不满足不允许条件的范围属于所述允许范围;和或
    所述控制信息通过指示不允许条件指示所述不允许范围;和/或
    所述控制信息通过指示允许条件指示所述不允许范围,其中,不满足不允许条件的范围属于所述允许范围。
  38. 如权利要求33所述的用户终端,其中,所述允许条件包括如下至少一项:允许的时间段、允许的时长、允许的位置服务客户的信息、允许的用途信息、允许的终端状态信息、允许的位置类型信息、允许的移动区域范围信息、允许采用的位置测量技术信息;和/或
    所述不允许条件包括如下至少一项:不允许的时间段、不允许的时长、不允许的位置服务客户的信息、不允许的用途信息、不允许的终端状态信息、不允许的位置类型信息、不允许的移动区域范围信息和不允许采用的位置测量技术的信息。
  39. 如权利要求38所述的用户终端,其中,
    所述位置服务客户的信息包括如下至少一项:位置服务客户的标识、位置服务客户的标识的名字、位置服务客户的标识的域名地址、位置服务客户方请求者的标识、位置服务客户方请求者的名字、位置服务客户方请求者的IP地址、位置服务客户的位置请求的类型的位置服务客户端应用的端口号;和/或
    所述用途信息包括如下至少一项:紧急业务用途和商业用途;和/或
    所述终端状态信息包括如下至少一项:空闲态、连接态、非活跃态、可用、不可用于位置测量之前、开机时和关机时;和/或
    所述位置类型信息包括如下至少一项:当前的位置、历史的位置和最新的位置;和/或
    所述移动区域范围信息包括如下至少一项:跟踪区TA标识列表,无线 接入网节点标识列表、移动管理单元列表、认证管理功能AMF标识列表、移动管理实体MME标识列表、位置区列表、服务区列表的小区列表;和/或
    所述位置测量技术信息包括如下至少一项:增强型基地台中心定位法ECID测量、观测到达时间差OTDOA测量和上行链路到达时间差UTDOA测量。
  40. 如权利要求32至35中任一项所述的用户终端,其中,所述控制信息指示当需要获取所述用户终端的位置时,是否需要请求所述用户终端对位置请求进行允许验证。
  41. 如权利要求40所述的用户终端,其中,所述控制信息指示如下至少一项:需要对位置请求进行验证、需要对位置请求进行验证的位置服务客户的信息、不需要对位置请求进行验证,不需要对位置请求进行验证的位置服务客户的信息。
  42. 如权利要求32至35中任一项所述的用户终端,其中,所述预定条件包括如下至少一项:
    生成和/或更新所述控制信息;
    接收到获取所述用户终端的位置的获取请求;
    接收到获取所述用户终端的位置的验证请求;
    接收到获取当前所述控制信息的请求;
    接收到当所述控制信息变更时,获取更新后的所述控制信息的请求。
  43. 如权利要求32至35中任一项所述的用户终端,其中,所述获取所述用户终端的位置的相关行为,包括如下至少一项:
    是否向所述用户终端发送获取所述用户终端的位置的验证请求;
    是否获取所述用户终端的位置;
    是否请求无线接入网单元触发对所述用户终端进行位置测量;
    是否触发所述用户终端进行位置测量;
    是否成功响应收到的关于用户终端的位置请求;
    是否向外部公开获取到的所述用户终端的位置;
    是否要求启动计时器。
  44. 如权利要求32至35任一所述的用户终端,其中,所述发送模块用 于向网络单元发送所述控制信息;
    其中,所述网络单元包括如下至少一项:无线接入网节点、无线接入网功能、核心网功能、核心网节点、移动管理节点、移动管理功能、位置服务管理功能、位置服务管理节点、位置服务管理客户、eNB,gNB、AMF、MME、LCS和E-SMLC。
  45. 如权利要求32至44任一所述的用户终端,其中,所述预定条件由所述用户终端配置,或者所述预定条件由用户预先设置,或者所述预定条件由协议预先定义,或者所述预定条件由网络预先配置给所述用户终端。
  46. 一种位置获取的控制装置,所述装置应用于网络单元或者位置服务客户,包括:
    接收模块,用于接收控制信息,所述控制信息用于控制获取用户终端的位置的相关行为;
    控制模块,用于根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制。
  47. 如权利要求46所述的装置,其中,所述控制信息指示如下至少一项:
    是否允许进行获取所述用户终端的位置的相关行为;
    是否允许本次被请求的获取所述用户终端的位置的相关行为;
    是否允许后续的获取所述用户终端的位置的相关行为;
    允许进行获取所述用户终端的位置的相关行为的允许条件;
    不允许进行获取所述用户终端的位置的相关行为的不允许条件;
    允许后续的获取所述用户终端的位置的相关行为的允许条件;
    不允许后续的获取所述用户终端的位置的相关行为的不允许条件;
    是否允许公开所述获取的用户终端的位置;
    允许公开所述获取的用户终端的位置的允许条件;
    不允许公开所述获取的用户终端的位置的不允许条件。
  48. 如权利要求47所述的装置,其中,
    所述控制信息指示允许获取所述用户终端的位置的相关行为;和/或
    所述控制信息指示允许后续的获取所述用户终端的位置的相关行为;和/或
    所述控制信息指示允许获取所述用户终端的位置的相关行为的允许范围;和/或
    所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围;
    所述控制模块用于根据或者参考所述控制信息,执行获取所述用户终端的位置的相关行为;和/或根据或者参考所述控制信息,执行后续的获取所述用户终端的位置的相关行为;和/或根据或者参考所述控制信息,在所述控制信息指示允许获取所述用户终端的位置的相关行为的允许范围内,执行获取所述用户终端的位置的相关行为;和/或根据或者参考所述控制信息,在所述控制信息指示允许后续的获取所述用户终端的位置的相关行为的允许范围内,执行后续的获取所述用户终端的位置的相关行为。
  49. 如权利要求47所述的装置,其中,所述控制信息指示不允许获取所述用户终端的位置;和或
    所述控制信息指示不允许获取所述用户终端的位置的不允许范围;和/或
    所述控制信息指示不允许后续的获取用户终端的位置;和/或
    所述控制信息指示不允许后续的获取所述用户终端的位置的不允许范围;
    所述控制模块用于根据或者参考所述控制信息,不允许获取所述用户终端的位置;和或根据或者参考所述控制信息,在所述控制信息指示不允许获取所述用户终端的位置的不允许范围内,不允许获取所述用户终端的位置;和或根据或者参考所述控制信息,不允许后续的获取用户终端的位置;和/或根据或者参考所述控制信息,在所述控制信息指示不允许后续的获取所述用户终端的位置的不允许范围内,不允许后续的获取所述用户终端的位置。
  50. 如权利要求47或48所述的装置,其中,所述控制信息进一步还指示如下至少一项:
    是否允许公开所述获取的用户终端的位置;和/或
    允许公开所述获取的用户终端的位置的允许范围;和/或
    不允许公开所述获取的用户终端的位置的不允许范围;
    所述控制模块用于根据或者参考所述控制信息,公开所述获取的用户终端的位置;和/或根据或者参考所述控制信息,在所述允许公开所述获取的用 户终端的位置的允许范围内,公开所述获取的用户终端的位置;和/或根据或者参考所述控制信息,在所述不允许公开所述获取的用户终端的位置的不允许范围内,不允许公开所述获取的用户终端的位置。
  51. 如权利要求46至49中任一项所述的装置,其中,
    所述控制信息通过指示允许条件指示所述允许范围;和/或
    所述控制信息通过指示不允许条件指示所述允许范围,其中,不满足不允许条件的范围属于所述允许范围;和或
    所述控制信息通过指示不允许条件指示所述不允许范围;和/或
    所述控制信息通过指示允许条件指示所述不允许范围,其中,不满足不允许条件的范围属于所述允许范围。
  52. 如权利要求47所述的装置,其中,所述允许条件包括如下至少一项:允许的时间段、允许的时长、允许的位置服务客户的信息、允许的用途信息、允许的终端状态信息、允许的位置类型信息、允许的移动区域范围信息、允许采用的位置测量技术信息;和/或
    所述不允许条件包括如下至少一项:不允许的时间段、不允许的时长、不允许的位置服务客户的信息、不允许的用途信息、不允许的终端状态信息、不允许的位置类型信息、不允许的移动区域范围信息和不允许采用的位置测量技术的信息。
  53. 如权利要求52所述的装置,其中,
    所述位置服务客户的信息包括如下至少一项:位置服务客户的标识、位置服务客户的标识的名字、位置服务客户的标识的域名地址、位置服务客户方请求者的标识、位置服务客户方请求者的名字、位置服务客户方请求者的IP地址、位置服务客户的位置请求的类型的位置服务客户端应用的端口号;和/或
    所述用途信息包括如下至少一项:紧急业务用途和商业用途;和/或
    所述终端状态信息包括如下至少一项:空闲态、连接态、非活跃态、可用、不可用于位置测量之前、开机时和关机时;和/或
    所述位置类型信息包括如下至少一项:当前的位置、历史的位置和最新的位置;和/或
    所述移动区域范围信息包括如下至少一项:TA标识列表,无线接入网节点标识列表、移动管理单元列表、AMF标识列表、MME标识列表、位置区列表、服务区列表的小区列表;和/或
    所述位置测量技术信息包括如下至少一项:ECID测量、OTDOA测量和UTDOA测量。
  54. 如权利要求46至49中任一项所述的装置,其中,所述控制信息指示当需要获取所述用户终端的位置时,是否需要请求所述用户终端对位置请求进行允许验证;
    所述控制模块用于当需要获取所述用户终端的位置时,根据或者参考所述控制信息,决定是否需要请求所述用户终端对位置请求进行允许验证。
  55. 如权利要求54所述的装置,其中,所述控制信息指示如下至少一项:需要对位置请求进行验证、需要对位置请求进行验证的位置服务客户的信息、不需要对位置请求进行验证,不需要对位置请求进行验证的位置服务客户的信息。
  56. 如权利要求46至49中任一项所述的装置,还包括如下至少一项:
    第一发送模块,用于发送获取所述用户终端的位置的获取请求;
    第二发送模块,用于发送获取所述用户终端的位置的验证请求;
    第三发送模块,用于发送获取当前的所述控制信息的请求;
    第四发送模块,用于发送获取更新的所述控制信息的请求。
  57. 如权利要求46至49中任一项所述的装置,其中,所述对获取所述用户终端的位置的相关行为进行控制包括如下至少一项:
    执行允许获取所述用户终端的位置的相关行为;
    执行不允许获取所述用户终端的位置的相关行为;
    启动计时器。
  58. 如权利要求46至49任一所述的装置,其中,所述控制模块用于所述控制信息指示不允许后续的获取所述用户终端的位置的相关行为时,启动计时器计时,在计时器开始计时之后和超时之前,执行后续的不允许获取所述用户终端的位置的相关行为;其中,所述计时器的计时时长为预先设定或者根据所述控制信息指示不允许的时长进行设定;和/或所述控制信息指示不 允许获取所述用户终端的位置的相关行为时,启动计时器计时,在计时器超时之前,执行不允许获取所述用户终端的位置的相关行为;其中,所述计时器的计时时长为预先设定或者根据所述控制信息指示不允许的时长进行设定;和/或所述控制信息指示允许获取所述用户终端的位置的相关行为且所述控制信息指示允许时间时,启动计时器计时,在计时器超时之前,执行允许获取所述用户终端的位置的相关行为。
  59. 如权利要求57所述的装置,其中,所述执行不允许获取所述用户终端的位置的相关行为,包括执行如下至少一项:
    收到关于所述用户终端的位置请求时,直接返回获取所述用户终端位置失败;
    不向所述用户终端发送获取所述用户终端位置的验证请求;
    不获取所述用户终端的位置;
    不请求无线接入网单元触发对所述用户终端进行位置测量;
    不触发所述用户终端进行位置测量;
    不响应位置服务客户发送的位置获取请求。
  60. 如权利要求57所述的装置,其中,所述执行允许获取所述用户终端的位置的相关行为,包括执行如下至少一项:
    向所述用户终端发送获取所述用户终端位置的验证请求;
    获取所述用户终端的位置;
    请求无线接入网单元触发对所述用户终端进行位置测量;
    触发所述用户终端进行位置测量;
    响应位置服务客户发送的位置获取请求,获取所述用户终端的位置;
    响应接收的关于所述用户终端的位置请求,获取所述用户终端的位置。
  61. 如权利要求46至49任一所述的装置,还包括:
    确认模块,用于确认是否接受所述控制信息,并向所述用户终端返回是否确认接受所述控制信息和/或确认接收的所述控制信息的返回消息;
    所述控制模块用于确认接受所述控制信息后,根据或者参考所述控制信息,对获取所述用户终端的位置的相关行为进行控制。
  62. 如权利要求46至49任一所述的装置,其中,所述网络单元包括至 少以下之一:无线接入网节点、无线接入网功能、核心网功能、核心网节点、移动管理节点、移动管理功能、位置服务管理功能、位置服务管理节点、位置服务管理客户、eNB、AMF,MME,LCS和E-SMLC。
  63. 一种用户终端,包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如权利要求1至14中任一项所述的位置获取的控制方法中的步骤。
  64. 一种位置获取的控制装置,包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如权利要求15至31中任一项所述的位置获取的控制方法中的步骤。
  65. 一种计算机可读存储介质,存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至14中任一项所述的位置获取的控制方法的步骤;或者所述计算机程序被处理器执行时实现如权利要求15至31中任一项所述的位置获取的控制方法的步骤。
PCT/CN2018/115204 2017-11-27 2018-11-13 位置获取的控制方法、用户终端和装置 WO2019100969A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP18880966.9A EP3720162A4 (en) 2017-11-27 2018-11-13 METHOD, TERMINAL DEVICE AND DEVICE FOR CONTROLLING POSITION DETECTION
US16/767,546 US11159938B2 (en) 2017-11-27 2018-11-13 Method of controlling location acquisition, user terminal and device
US17/467,080 US20210400471A1 (en) 2017-11-27 2021-09-03 Method of controlling location acquisition, user terminal and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201711204326.6A CN109842924B (zh) 2017-11-27 2017-11-27 一种位置获取的控制方法、用户终端和装置
CN201711204326.6 2017-11-27

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US16/767,546 A-371-Of-International US11159938B2 (en) 2017-11-27 2018-11-13 Method of controlling location acquisition, user terminal and device
US17/467,080 Continuation US20210400471A1 (en) 2017-11-27 2021-09-03 Method of controlling location acquisition, user terminal and device

Publications (1)

Publication Number Publication Date
WO2019100969A1 true WO2019100969A1 (zh) 2019-05-31

Family

ID=66631813

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/115204 WO2019100969A1 (zh) 2017-11-27 2018-11-13 位置获取的控制方法、用户终端和装置

Country Status (4)

Country Link
US (2) US11159938B2 (zh)
EP (1) EP3720162A4 (zh)
CN (1) CN109842924B (zh)
WO (1) WO2019100969A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112243198A (zh) * 2019-07-16 2021-01-19 大唐移动通信设备有限公司 一种终端位置信息上报方法、装置、终端及网络侧设备
US11206595B2 (en) * 2019-08-14 2021-12-21 Qualcomm Incorporated Systems and methods for handover of 5G location sessions for an NG-RAN location management component
CN112492504A (zh) * 2019-08-21 2021-03-12 中兴通讯股份有限公司 位置获取方法、装置、hss、udm设备及存储介质
CN114731608A (zh) * 2019-12-25 2022-07-08 华为技术有限公司 定位请求处理方法、设备及系统
CN113613242B (zh) * 2021-07-21 2022-12-09 展讯通信(上海)有限公司 位置隐私设置方法及相关产品
CN116830636A (zh) * 2022-01-27 2023-09-29 北京小米移动软件有限公司 信息反馈、请求发送、配置信息接收方法和装置
WO2023225877A1 (zh) * 2022-05-24 2023-11-30 北京小米移动软件有限公司 位置信息获取方法和装置
WO2024060144A1 (zh) * 2022-09-22 2024-03-28 北京小米移动软件有限公司 终端位置信息的验证方法、装置、通信设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009929A (zh) * 2001-01-04 2007-08-01 诺基亚有限公司 在电信网络上调用隐私的方法及相关网络单元和电信系统
CN101155025A (zh) * 2006-09-27 2008-04-02 华为技术有限公司 隐私保护系统及方法和全局许可管理服务器和客户端
US20100041418A1 (en) * 2008-08-18 2010-02-18 Qualcomm Incorporated Control plane location solution to support wireless access
CN103596172A (zh) * 2013-11-25 2014-02-19 中国联合网络通信集团有限公司 用户信息保护的方法、装置及系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10129261B2 (en) * 2004-06-23 2018-11-13 Nokia Technologies Oy Method for serving location information access requests
CN1327743C (zh) * 2005-01-25 2007-07-18 华为技术有限公司 一种延迟型位置请求的处理方法
WO2009024002A1 (en) 2007-08-17 2009-02-26 Huawei Technologies Co., Ltd. A method of sending location service request in mobile communication network
KR101616253B1 (ko) * 2012-01-26 2016-04-28 엘지전자 주식회사 무선 통신 시스템에서 보고 방법 및 이를 지원하는 장치
CN103974416B (zh) * 2014-05-28 2017-10-31 大唐移动通信设备有限公司 获取移动终端位置信息方法、装置及系统
EP3304116B1 (en) 2015-06-02 2021-05-05 Hangit Llc Mobile device location

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101009929A (zh) * 2001-01-04 2007-08-01 诺基亚有限公司 在电信网络上调用隐私的方法及相关网络单元和电信系统
CN101155025A (zh) * 2006-09-27 2008-04-02 华为技术有限公司 隐私保护系统及方法和全局许可管理服务器和客户端
US20100041418A1 (en) * 2008-08-18 2010-02-18 Qualcomm Incorporated Control plane location solution to support wireless access
CN103596172A (zh) * 2013-11-25 2014-02-19 中国联合网络通信集团有限公司 用户信息保护的方法、装置及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3720162A4 *

Also Published As

Publication number Publication date
CN109842924A (zh) 2019-06-04
EP3720162A1 (en) 2020-10-07
US11159938B2 (en) 2021-10-26
US20210136571A1 (en) 2021-05-06
EP3720162A4 (en) 2020-12-16
CN109842924B (zh) 2021-01-12
US20210400471A1 (en) 2021-12-23

Similar Documents

Publication Publication Date Title
WO2019100969A1 (zh) 位置获取的控制方法、用户终端和装置
JP7317242B2 (ja) ブルートゥース接続方法、システム、および電子デバイス
WO2019137424A1 (zh) 参考信号的测量方法和用户终端
WO2019096119A1 (zh) 业务处理方法及移动通信终端
US11553367B2 (en) Measurement method, user equipment, and network side device
KR102531979B1 (ko) 정보 보고 방법, 수신 방법, 단말 및 네트워크 기기
WO2019062627A1 (zh) 随机接入方法、移动终端及网络设备
WO2019218996A1 (zh) 测量控制方法、终端和网络侧设备
WO2019137224A1 (zh) 传输方法、移动终端及网络设备
JP7173669B2 (ja) 干渉報告制御方法およびユーザ機器
WO2019062509A1 (zh) 寻呼方法、终端及网络侧设备
JP7377366B2 (ja) マルチキャストサービスの伝送方法、伝送処理方法及び関連機器
WO2019214706A1 (zh) 接入控制方法、消息广播方法及相关设备
TW202037199A (zh) 事件處理方法和設備以及系統
JP2022549250A (ja) 無線能力識別子伝送方法、端末機器及びネットワークノード
WO2019137368A1 (zh) 系统信息的传输方法和用户终端
WO2019192520A1 (zh) 测量方法、终端及网络侧设备
US20220322051A1 (en) Multicast service processing method, multicast service configuration method, and communications device
WO2020244479A1 (zh) 连接管理方法、终端及网络侧设备
CN111615158A (zh) 一种更新方法、重建请求处理方法、终端和网络设备
WO2021155794A1 (zh) 位置信息获取方法、发送方法、终端和控制面节点
WO2023016435A1 (zh) 辅助感知方法、装置、网络侧设备及终端
WO2024031640A1 (zh) 一种信息传输方法、装置、通信设备及存储介质
JPWO2021136473A5 (zh)

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18880966

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2018880966

Country of ref document: EP

Effective date: 20200629