WO2020151600A1 - 数据传输系统、方法及其装置 - Google Patents

数据传输系统、方法及其装置 Download PDF

Info

Publication number
WO2020151600A1
WO2020151600A1 PCT/CN2020/072852 CN2020072852W WO2020151600A1 WO 2020151600 A1 WO2020151600 A1 WO 2020151600A1 CN 2020072852 W CN2020072852 W CN 2020072852W WO 2020151600 A1 WO2020151600 A1 WO 2020151600A1
Authority
WO
WIPO (PCT)
Prior art keywords
setting data
privacy setting
positioning
network element
management network
Prior art date
Application number
PCT/CN2020/072852
Other languages
English (en)
French (fr)
Inventor
郭龙华
李�赫
陈璟
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP20745745.8A priority Critical patent/EP3905728A4/en
Publication of WO2020151600A1 publication Critical patent/WO2020151600A1/zh
Priority to US17/380,455 priority patent/US20210352481A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/104Location integrity, e.g. secure geotagging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Definitions

  • the present application relates to embodiments related to the field of communication technologies, and in particular to a data transmission system, method and device.
  • 5G communication technology can provide high-precision and low-latency location services, and can enhance the protection of user privacy data.
  • users can change location privacy settings on the user terminal at any time.
  • positioning privacy settings include not allowing positioning (that is, not allowing access to user equipment location information), requiring notification and authorization by the user whether positioning is allowed, allowing positioning but requiring notification to the user, and allowing positioning but not requiring notification, etc.
  • UE user equipment
  • AMF Access and Mobility Management Function
  • RAN radio access network
  • the network element sends a location privacy setting data update request.
  • the location privacy setting data update request carries the updated location privacy setting data.
  • the AMF network element sends the location privacy setting data to the gateway mobile location center function (gateway mobile location center, GMLC).
  • GMLC gateway mobile location center
  • GMLC gateway mobile location center
  • UDM unified data management
  • the positioning privacy setting data reported by the UE to the UDM network element passes through the GMLC network element.
  • the GMLC network element has the risk of maliciously modifying the positioning privacy setting data, and the UE and UDM network element cannot detect whether it has been modified.
  • the UDM network element stores incorrect positioning privacy setting data, and the positioning privacy setting data between the UE and the UDM network element lacks effective end-to-end integrity protection.
  • the technical problem to be solved by the embodiments of this application is to provide a data transmission system, method and device, which can effectively prevent the location privacy setting data from being tampered with, thereby ensuring the end of the location privacy setting data between the user terminal and the UDM network element. End-to-end integrity protection.
  • the first aspect of the embodiments of the present application provides a data transmission transmission system, which includes a user terminal and a data management network element;
  • the user terminal is used to calculate the first message check code of the first positioning privacy setting data, and send the first message check code and the first positioning privacy setting data to the data management network element;
  • the data management network element is used to receive the first message check code and the first positioning privacy setting data from the user terminal; to obtain the second message check code of the first positioning privacy setting data;
  • the two message check codes are the same, it is determined that the first positioning privacy setting data has not been tampered with, and the first positioning privacy setting data is stored.
  • the data management network element compares the first message check code with the second message check code to determine whether the first location privacy setting data has been tampered with, which can effectively prevent the location privacy setting data from being tampered, thereby ensuring that the user terminal Positioning privacy with the data management network element sets the end-to-end integrity protection of the data. If it has not been tampered with, the first location privacy setting data is stored so that other network elements can obtain the location privacy setting data of the user terminal from the data management network element.
  • the user terminal when the user terminal sends the first message check code and the first positioning privacy setting data to the data management network element, it can send the first message check code and the first message check code to the data management network element through the access network and the core network element.
  • Target privacy settings data In a possible implementation manner, the core network element includes an access management network element. At this time, the user terminal can send the first message check code and the first message check code and the first message to the data management network element through the access network and the access management network element in sequence.
  • Location privacy setting data in another possible implementation, the core network elements include access management network elements and location management network elements.
  • the user terminal can pass through the access network, access management network elements, and location management in turn
  • the network element sends the first message check code and the first positioning privacy setting data to the data management network element;
  • the core network element includes an access management network element, a location management network element, and a gateway mobile Locate the network element.
  • the user terminal can send the first message verification code and the first positioning privacy setting data to the data management network element through the access network, the access management network element, the location management network element and the gateway mobile positioning network element in turn .
  • the gateway mobile positioning network element can include the home gateway mobile positioning network element and the visited gateway mobile positioning network element.
  • the user terminal can pass through the access network, access management network element, location management network element, visited gateway mobile positioning network element and home gateway in turn
  • the mobile positioning network element sends the first message check code and the first positioning privacy setting data to the data management network element.
  • the user terminal may perform a second check.
  • the data management network element obtains the third message check code of the first positioning privacy setting data, and when it is determined that the first message check code is the same as the second message check code, sends the third message check code to the user terminal ;
  • the user terminal receives the third message check code, it calculates the fourth message check code of the first positioning privacy setting data, and judges whether the third message check code is the same as the fourth message check code, if they are the same, It is determined that the first location privacy setting data has not been tampered with. Two verifications further ensure the end-to-end integrity protection of the positioning privacy setting data between the user terminal and the data management network element.
  • the user terminal can calculate the first message check code of the first positioning privacy setting data according to the first freshness parameter.
  • the first freshness parameter includes the first counter value and the first function counter value.
  • the user terminal can calculate the first freshness
  • the data management network element is notified of the security parameter so that the data management network element obtains the second message check code of the first positioning privacy setting data according to the first freshness parameter; the user terminal calculates the value of the first positioning privacy setting data according to the second freshness parameter
  • the fourth message check code, the second positioning privacy setting data includes the first counter value and the second function counter value; the second function counter value is different from the first function counter value.
  • the user terminal calculates the first message check code of the first positioning privacy setting data according to the first random value, and calculates the second message check code of the first positioning privacy setting data according to the second random value.
  • the first random value is generated by the user terminal, and the user terminal can inform the data management network element of the first random value so that the data management network element obtains the second message check code of the first positioning privacy setting data according to the first random value.
  • the second random value is generated by the data management network element or the authentication service network element, and then the data management network element or the authentication service network element informs the user terminal of the second random value so that the user terminal can calculate the first positioning privacy setting data according to the second random value
  • the fourth message check code is generated by the data management network element or the authentication service network element, and then the data management network element or the authentication service network element informs the user terminal of the second random value so that the user terminal can calculate the first positioning privacy setting data according to the second random value.
  • the data management network element obtains the second message check code of the first positioning privacy setting data, which may be the second message check code of the first positioning privacy setting data calculated by the data management network element, for example, according to the first freshness parameter Or the first random value is used to calculate the second message check code of the first positioning privacy setting data; or the data management network element may obtain the second message check code of the first positioning privacy setting data from the authentication service network element, such as data management
  • the network element informs the authentication service network element of the first freshness parameter, and then the authentication service network element calculates the second message check code of the first positioning privacy setting data according to the first freshness parameter, and then informs the data of the second message check code Manage network elements.
  • the user terminal is further configured to send the first freshness parameter, the first freshness parameter and the first message check code, and the first positioning privacy setting data to the data management network element Can be carried in the same message.
  • the user terminal informs the data management network element of the first freshness parameter, so that the data management network element informs the authentication service network element of the first freshness parameter, so that the authentication service network element calculates the first location privacy setting data according to the first freshness parameter. 2. Message check code.
  • the data transmission system further includes an access management network element and a gateway mobile positioning network element,
  • the gateway mobile positioning network element is used to send a positioning service request to the access management network element
  • Access management network element used to receive location service request from gateway mobile positioning network element, and send location privacy setting data acquisition request to data management network element; receive location privacy setting data acquisition response from data management network element, location privacy
  • the setting data acquisition response includes the first location privacy setting data; the location service operation is performed according to the first location privacy setting data.
  • the access management network element obtains the first positioning privacy setting data from the data management network element and executes the positioning service operation according to the first positioning privacy setting data, which can prevent the gateway mobile positioning network element from issuing the first positioning privacy setting to the access management network element Set the action indication information that the data does not match, thereby effectively protecting the location information of the user terminal.
  • the access management network element when the access management network element performs a positioning service operation based on the first positioning privacy setting data, it is specifically used to notify the user if the first positioning privacy setting data is to allow positioning, but Then send a notification message to the user terminal through the access network and request to obtain the location information of the user terminal; if the first positioning privacy setting data allows positioning but does not need to notify the user, then request to obtain the location information of the user terminal; if the first positioning The privacy setting data is the need to notify the user and the user authorizes whether to allow positioning, then a notification message is sent to the user terminal through the access network, and when a positioning permission message from the user terminal is received, the user terminal location information is requested.
  • the above-mentioned positioning privacy setting data acquisition response further includes first indication information, and the first indication information is used to indicate that the first positioning privacy setting data is requested to access the management network element for the first time;
  • the access management network element is used to obtain the second positioning privacy setting data from the user terminal according to the first instruction information before performing the positioning service operation according to the first positioning privacy setting data; if the second positioning privacy setting data is consistent with the first positioning If the privacy setting data is the same, the operation of executing the location service operation according to the first location privacy setting data is executed.
  • the access management network element After receiving the first instruction information, the access management network element obtains the second positioning privacy setting data from the user terminal to determine whether the positioning privacy setting data of the user terminal stored in the data management network element is the latest positioning privacy setting data .
  • the access management network element is also used to perform a location service according to the second location privacy setting data if the second location privacy setting data is different from the first location privacy setting data Operation, that is, perform the corresponding location service operation according to the latest location privacy setting data, and send the second location privacy setting data to the data management network element;
  • the data management network element is also used to receive the second location from the access management network element Privacy setting data, and updating the stored positioning privacy setting data of the user terminal from the first positioning privacy setting data to the second positioning privacy setting data, so that the data management network element stores the latest positioning privacy setting data.
  • the positioning service request issued by the gateway mobile positioning network element includes action indication information.
  • the action indication information is used to indicate the positioning service operation.
  • the access management network element receives the When the action instruction information, check whether the action instruction information matches the first positioning privacy setting data, if it matches, it is determined that the gateway mobile positioning network element has not tampered with the first positioning privacy setting data; if it does not match, the gateway mobile positioning network element is determined to be The first location privacy setting data is tampered with. At this time, the access management network element can report the error reason that the gateway mobile location network element tampered with the first location privacy setting data.
  • the data transmission system further includes an access management network element and a gateway mobile positioning network element,
  • the gateway mobile positioning network element is used to send a positioning privacy setting data acquisition request to the data management network element, the positioning privacy data acquisition request includes a third freshness parameter, and the third freshness parameter includes a second counter value and a third function counter value;
  • the data management network element is also used to receive the positioning privacy setting data acquisition request from the gateway mobile positioning network element; digitally sign the first positioning privacy setting data according to the third freshness parameter to obtain digital signature data; to the gateway mobile positioning network
  • the meta sends a positioning privacy setting data acquisition response, and the positioning privacy setting data acquisition response includes the first positioning privacy setting data, the digital signature data, and the third freshness parameter;
  • the gateway mobile positioning network element is also used to send a positioning service request to the access management network element, the positioning service request includes action indication information, digital signature data and a third freshness parameter, and the action indication information is used to indicate the location service operation;
  • the access management network element is used to receive the location service request from the access management network element, and check whether the digital signature data matches the action indication information according to the public key of the data management network element; if it matches, it is determined that the gateway mobile positioning network element is not The first location privacy setting data is tampered with; if it does not match, the location service operation is executed according to the first location privacy setting data obtained by deciphering the digital signature data.
  • the data management network element digitally signs the first positioning privacy setting data to prevent the gateway mobile positioning network element from issuing action instructions that do not match the first positioning privacy setting data, thereby effectively protecting the location information of the user terminal.
  • a second aspect of the embodiments of the present application provides a data transmission method, including:
  • the user terminal calculates the first message check code of the first positioning privacy setting data
  • the user terminal sends the first message check code and the first positioning privacy setting data to the data management network element.
  • the user terminal sends the first message check code and the first positioning privacy setting data to the data management network element, so that the data management network element compares the first message check code with the obtained second message check code.
  • the message check code is used to determine whether the first location privacy setting data has been tampered with, which can effectively prevent the location privacy setting data from being tampered with, thereby ensuring the end-to-end integrity protection of the location privacy setting data between the user terminal and the data management network element .
  • the user terminal calculates the first message check code of the first positioning privacy setting data according to the first freshness parameter; the first freshness parameter includes the first counter value and the first Function counter value. Or the user terminal calculates the first message check code of the first positioning privacy setting data according to the first random value.
  • the user terminal further sends the first freshness parameter to the data management network element, so that the data management network element obtains the second message check code.
  • the user terminal receives the third message check code from the data management network element, and calculates the fourth message check code of the first positioning privacy setting data; if the third message If the check code is the same as the fourth message check code, the user terminal determines that the first positioning privacy setting data has not been tampered with.
  • the user terminal performs secondary verification to further ensure the end-to-end integrity protection of the positioning privacy setting data between the user terminal and the data management network element.
  • the user terminal calculates the fourth message check code of the first positioning privacy setting data according to the second freshness parameter; the second freshness parameter includes the first counter value and/or The second function counter value is different from the first function counter value.
  • the first function counter value is for the user terminal, and the second function counter value is for the authentication service network element or the data management network element.
  • the user terminal calculates the fourth message check code of the first positioning privacy setting data according to the second random value.
  • the second random value is generated by the data management network element or the authentication service network element and can be sent to the third message check code together User terminal.
  • a third aspect of the embodiments of the present application provides a user terminal, and the user terminal has a function of implementing the method provided in the second aspect.
  • the functions can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • the user terminal includes: a processing unit and a transceiving unit; the processing unit is used to calculate the first message check code of the first positioning privacy setting data; the transceiving unit is used to send data to the data management network element Send the first message check code and the first positioning privacy setting data.
  • the user terminal includes a processor, a transceiver, and a memory, where a computer program is stored in the memory, the computer program includes program instructions, and the processor is configured to call the program code to perform the following operations: Calculate the first message check code of the first positioning privacy setting data; control the transceiver to send the first message check code and the first positioning privacy setting data to the data management network element.
  • the implementation of the device can refer to the implementation of the method, and the repetition will not be repeated. .
  • a fourth aspect of the embodiments of the present application provides a computer-readable storage medium having instructions stored in the computer-readable storage medium, which when run on a computer, cause the computer to execute the method described in the second aspect.
  • the fifth aspect of the embodiments of the present application provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the method described in the second aspect.
  • a sixth aspect of the embodiments of the present application provides a data transmission method, including:
  • the data management network element receives the first message check code and the first positioning privacy setting data from the user terminal;
  • the data management network element obtains the second message check code of the first positioning privacy setting data
  • the data management network element determines that the first positioning privacy setting number has not been tampered with, and stores the first positioning privacy setting data.
  • the data management network element checks whether the first message check code is the same as the second message check code, so as to determine whether the first location privacy setting data has been tampered with, thereby effectively preventing the location privacy setting data from being tampered with and ensuring users
  • the location privacy between the terminal and the data management network element sets the end-to-end integrity protection of the data.
  • the data management network element can autonomously calculate the second message check code of the first positioning privacy setting data, for example, calculate the first message check code according to the first freshness parameter or the first random value.
  • the second message check code of the positioning privacy setting data can also be the second message check code of the data management network element obtaining the first positioning privacy setting data from the authentication service network element.
  • the data management network element sets the first freshness parameter
  • the authentication service network element is notified, and then the authentication service network element calculates the second message check code of the first positioning privacy setting data according to the first freshness parameter, and then informs the data management network element of the second message check code.
  • the data management network element obtains the third message check code of the first positioning privacy setting data, and sends the third message check code to the user terminal.
  • the data management network element can autonomously calculate the third message check code of the first positioning privacy setting data, for example, calculate the third message check code of the first positioning privacy setting data according to the second freshness parameter or the second random value; or
  • the data management network element obtains the third message check code of the first positioning privacy setting data from the authentication service network element.
  • the authentication service network element calculates the third message check code of the first positioning privacy setting data according to the second freshness parameter. , And then inform the data management network element of the third message check code.
  • the data management network element when the data management network element receives the second positioning privacy setting data from the access management network element, it transfers the stored positioning privacy setting data of the user terminal from the first positioning
  • the privacy setting data is updated to the second positioning privacy setting data, so that other network elements can obtain the positioning privacy setting data of the user terminal from the data management network element.
  • the data management network element receives a positioning privacy setting data acquisition request from the gateway mobile positioning network element, and the positioning privacy data acquisition request includes a third freshness parameter and a third freshness parameter Including the third counter value and the third function counter value; digitally sign the first positioning privacy setting data according to the third freshness parameter to obtain the digital signature data; send the positioning privacy setting data acquisition response to the gateway mobile positioning network element to locate privacy
  • the setting data acquisition response includes the first positioning privacy setting data, the digital signature data, and the third freshness parameter.
  • the data management network element digitally signs the first positioning privacy setting data according to a random value to obtain the digital signature data, and then sends the random value, the digital signature data, and the first positioning privacy setting data to the gateway mobile positioning network element.
  • the data management network element When the data management network element provides the first positioning privacy setting data to the gateway mobile positioning network element, it also provides digital signature data so that the access management network element can check whether the action instruction information issued by the gateway mobile positioning network element is correct according to the digital signature data. Thus, the location information of the user terminal can be effectively protected.
  • a seventh aspect of the embodiments of the present application provides a data management network element, and the data management network element has a function of implementing the method provided in the sixth aspect.
  • the functions can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • the data management network element includes: a processing unit, a transceiving unit, and a storage unit; the transceiving unit is configured to receive the first message check code and the first positioning privacy setting data from the user terminal, and obtain A second message check code of the first positioning privacy setting data; a processing unit, configured to determine that the first positioning privacy setting number has not been tampered with if the second message check code is the same as the first message check code; a storage unit, Used to store the first location privacy setting data.
  • the data management network element includes: a processor, a transceiver, and a memory, where a computer program is stored in the memory, and the computer program includes program instructions.
  • the processor is configured to call the program code to execute the following Operation: control the transceiver to receive the first message check code and the first positioning privacy setting data from the user terminal; obtain the second message check code of the first positioning privacy setting data; if the second message check code is the same as the first message If the verification code is the same, it is determined that the number of the first location privacy setting has not been tampered with, and the memory is controlled to store the first location privacy setting data.
  • the implementation of the device can refer to the implementation of the method, and there is no repetition. Repeat it again.
  • An eighth aspect of the embodiments of the present application provides a computer-readable storage medium having instructions stored in the computer-readable storage medium, which when run on a computer, cause the computer to execute the method described in the sixth aspect.
  • the ninth aspect of the embodiments of the present application provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the method described in the sixth aspect.
  • a tenth aspect of the embodiments of the present application provides a data transmission method, including:
  • the access management network element When the access management network element receives the location service request from the gateway mobile positioning network element, it sends a location privacy setting data acquisition request to the data management network element;
  • the access management network element receives the location privacy setting data acquisition response from the data management network element, and the location privacy setting data acquisition response includes the first location privacy setting data;
  • the access management network element performs a location service operation according to the first location privacy setting data.
  • the access management network element directly obtains the first positioning privacy setting data from the data management network element, and executes the corresponding positioning service operation according to the first positioning privacy setting data, which can prevent the location information of the user terminal from being illegally obtained, thereby Effectively protect the location information of the user terminal.
  • the access management network element performs the location service operation according to the first location privacy setting data, including:
  • the access management network element sends a notification message to the user terminal through the access network, and requests to obtain the location information of the user terminal;
  • the access management network element requests to obtain the position information of the user terminal;
  • the access management network element sends a notification message to the user terminal through the access network, and when receiving a positioning permission message from the user terminal, request Obtain the location information of the user terminal.
  • the positioning privacy setting data acquisition response further includes first indication information, where the first indication information is used to indicate that the first positioning privacy setting data is requested to access the management network element for the first time;
  • the access management network element Before the access management network element performs the location service operation according to the first location privacy setting data, it also obtains the second location privacy setting data from the user terminal according to the first instruction information; if the second location privacy setting data is the same as the first location privacy setting data , Then execute the step of executing the location service operation according to the first location privacy setting data.
  • the access management network element performs the positioning service operation according to the second positioning privacy setting data, and Send the second positioning privacy setting data to the data management network element, so that the data management network element stores the latest positioning privacy setting data.
  • the access management network element generates second indication information when it obtains the location information of the user terminal, and the second indication information is used to indicate that the positioning of the user terminal is completed , And send the location information of the user terminal and the second indication information to the gateway mobile positioning network element, so that the external client can learn the location information of the user terminal.
  • the eleventh aspect of the embodiments of the present application provides an access management network element, and the access management network element has a function of implementing the method provided in the tenth aspect.
  • the functions can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • the access management network element includes: a processing unit and a transceiving unit; the transceiving unit is used to send a positioning service request from the gateway mobile positioning network element to the data management network element Privacy setting data acquisition request; receiving a positioning privacy setting data acquisition response from a data management network element, the positioning privacy setting data acquisition response including the first positioning privacy setting data; a processing unit for performing a positioning service operation based on the first positioning privacy setting data .
  • the access management network element includes: a processor, a transceiver, and a memory, where a computer program is stored in the memory, and the computer program includes program instructions, and the processor is configured to call program code and execute The following operations: when the control transceiver receives the location service request from the gateway mobile location network element, it sends a location privacy setting data acquisition request to the data management network element, receives the location privacy setting data acquisition response from the data management network element, and location privacy The setting data acquisition response includes the first location privacy setting data; the location service operation is performed according to the first location privacy setting data.
  • the implementation of the device can refer to the implementation of the method, and the repetition No longer.
  • An eighth aspect of the embodiments of the present application provides a computer-readable storage medium having instructions stored in the computer-readable storage medium, which when run on a computer, cause the computer to execute the method described in the tenth aspect.
  • the ninth aspect of the embodiments of the present application provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the method described in the tenth aspect.
  • Figure 1 is a schematic diagram of the network architecture of the 5G system
  • Figure 2 is a schematic diagram of the current process of updating positioning privacy setting data in a roaming scenario
  • FIG. 3 is a schematic diagram of a flow of obtaining UE location information by an external client in a current roaming scenario
  • Figure 4 is a schematic diagram of a network architecture applying an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a data transmission method provided in Embodiment 1 of this application.
  • FIG. 5a is a schematic flowchart of another data transmission method provided in Embodiment 1 of this application.
  • FIG. 6 is a schematic flowchart of a data transmission method provided in Embodiment 2 of this application.
  • FIG. 7 is a schematic flowchart of a data transmission method provided in Embodiment 3 of this application.
  • FIG. 8 is a schematic flowchart of a data transmission method provided in Embodiment 4 of this application.
  • FIG. 9 is a schematic diagram of the logical structure of a communication device provided by an embodiment of the application.
  • FIG. 10 is a simplified schematic diagram of the physical structure of a communication device provided by an embodiment of the application.
  • At least one item (a) refers to any combination of these items, including any combination of a single item (a) or plural items (a).
  • at least one of a, b, or c can mean: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
  • words such as “first” and “second” are used to distinguish the same items or similar items with substantially the same function and effect. Those skilled in the art can understand that the words “first”, “second” and the like do not limit the quantity and execution order, and the words “first” and “second” do not limit the difference.
  • the user terminal involved in the embodiments of the present application may include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices, or other processing devices connected to a wireless modem; it may also include UEs, subscriber units (subscriber units). ), cellular phone, smart phone, wireless data card, personal digital assistant (PDA) computer, tablet computer, wireless modem (modem), handheld device (handheld), laptop Laptop computer, cordless phone or wireless local loop (WLL) station, machine type communication (MTC) terminal, UE, mobile station (MS), Terminal device (terminal device) or relay user equipment, etc.
  • the relay user equipment may be, for example, a 5G residential gateway (RG).
  • RG 5G residential gateway
  • the network architecture includes UE, access network (AN) equipment, and core network elements.
  • the access network equipment may also be RAN equipment.
  • the core network network elements may include these network elements: user plane function (UPF), data network (data network, DN), authentication server function (authentication server function, AUSF), AMF, session management function ( session management function (SMF), location management function (location management function, LMF), network slice selection function (network slice selection function, NSSF), network exposure function (NEF), network storage function (network repository function, NRF), policy control function (PCF), UDM and application function (application, AF).
  • UPF user plane function
  • data network data network
  • DN authentication server function
  • authentication server function authentication server function
  • AMF session management function
  • SMF session management function
  • location management function location management function
  • NEF network slice selection function
  • NRF network exposure function
  • PCF policy control function
  • UDM application function
  • application application, AF
  • AMF network element the termination point of non-access stratum (NAS) signaling, is mainly responsible for user access and mobility management.
  • the SMF network element is responsible for managing the creation and deletion of user (protocol data unit, PDU) sessions, and maintaining the PDU session context and user plane forwarding pipeline information.
  • PDU protocol data unit
  • the LMF network element is used to support positioning measurement and obtain positioning measurement information.
  • the NSSF network element is used to support information such as network slice selection assistance information (network slice selection assistance information, NSSAI), user location area, slice capacity, slice current load, etc., based on user request and contract, for flexible slice selection.
  • network slice selection assistance information network slice selection assistance information, NSSAI
  • NEF network elements are used to support capability and event opening, provide security for external applications, and provide functions such as internal and external information translation.
  • NRF network element is used to allow each network function to discover other network functions and provide services for discovery.
  • PCF network element used to generate and manage users, sessions, and quality of service (QoS) flow processing policies.
  • QoS quality of service
  • UDM network element used to support the third-generation partnership project (3 rd -generation partnership project, 3GPP) authentication, user identity operation, permission grant, registration and mobility management functions.
  • 3GPP third-generation partnership project
  • the AF network element is a functional network element that provides various business services, provides a framework, authentication and interfaces related to network capability opening, and transmits information between 5G system network functions and other network functions.
  • the network elements involved in the embodiment of the present application include UE, RAN, AMF, LMF, UDM, AUSF, and NEF.
  • the network elements involved in the embodiments of the present application also include GMLC network elements.
  • the GMLC network element serves as the first network element of the external positioning application to access the core network, performs the task of registration and authentication, and requests routing information from the UDM network element.
  • the GMLC network element can be an independent network function (network function) network element, or it can be included in the NEF network element.
  • the schematic diagram of the network architecture shown in Figure 1 also includes the interfaces between the various network elements.
  • N2 represents the interface between the AMF network element and the RAN device; it also includes the interface between the network element and the communication bus, for example, Namf represents AMF.
  • Namf represents AMF.
  • Figure 2 is a schematic diagram of the current process of updating positioning privacy setting data in a roaming scenario.
  • FIG 2 is a schematic diagram of the current process of updating positioning privacy setting data in a roaming scenario.
  • the update process in a roaming scenario is shown in Figure 2.
  • the flowchart shown in Figure 2 includes the following steps:
  • the UE sends a location privacy setting data update request (for example, a privacy setting update request) to the AMF or LMF through the RAN, and the location privacy setting data update request carries location privacy setting data.
  • the AMF or LMF receives the location privacy setting data update request from the UE.
  • the AMF or LMF sends an update message (for example, Nudm_UECM_update) to a visited gateway mobile location center (V-GMLC), and the update message carries the location privacy setting data reported by the UE.
  • V-GMLC receives update messages from AMF or LMF.
  • the V-GMLC sends an update message (for example, Nudm_UECM_update) to the home gateway mobile location center (H-GMLC), and the update message carries the location privacy setting data reported by the UE.
  • H-GMLC receives the update message from V-GMLC.
  • the H-GMLC sends an update message (for example, Nudm_UECM_update) to the UDM, and the update message carries the positioning privacy setting data reported by the UE.
  • UDM receives the update message from H-GMLC.
  • the UDM updates and saves the positioning privacy setting data reported by the UE, and sends an update message (for example, Nudm_UECM_update) to the H-GMLC.
  • the update message is used to indicate that the UDM has been updated.
  • H-GMLC receives the update message from UDM.
  • the H-GMLC sends an update message (for example, Nudm_UECM_update) to the V-GMLC, and the update message is used to indicate that the UDM has been updated.
  • V-GMLC receives the update message from H-GMLC.
  • the V-GMLC sends an update message (for example, Nudm_UECM_update) to the AMF or LMF, and the update message is used to indicate that the UDM has been updated.
  • the AMF or LMF receives the update message from the V-GMLC.
  • the AMF or LMF sends a location privacy setting data update response (for example, privacy setting update response) to the UE.
  • the location privacy setting data update response is used to respond to the location privacy setting data update request and is used to indicate that the UDM has updated the location reported by the UE Privacy settings data.
  • the UE receives the location privacy setting data update response from the AMF or LMF.
  • V-GMLC has the risk of maliciously modifying the positioning privacy setting data reported by the UE, and the UE and UDM cannot detect whether it has been modified, which causes the UDM to store the wrong positioning privacy setting data, causing the UE and UDM
  • the positioning privacy settings data between the lack of effective end-to-end integrity protection.
  • the embodiments of the present application provide a data transmission method and device, which can effectively prevent the location privacy setting data from being tampered with, thereby ensuring the end-to-end integrity protection of the location privacy setting data between the UE and the UDM.
  • the first and second embodiments of the present application can ensure the end-to-end integrity protection of the positioning privacy setting data between the UE and the UDM.
  • FIG. 3 is a schematic diagram of a flow of obtaining the location information of the UE by an external client in a current roaming scenario.
  • the external client is used to request the location information of the UE (for example, the current location of the user terminal), which can be an application on the UE, for example, a navigation application needs to obtain the location information of the UE. It can be the server corresponding to the application on the UE, or the server called by the UE during the running process.
  • some functional network elements or network elements in the core network can also request to obtain the location information of the UE.
  • the external client sends a location service request to the H-GMLC.
  • the location service request may be a location service (LCS) service request (request).
  • H-GMLC receives location service requests from external clients.
  • the external client can directly communicate with the H-GMLC.
  • the external client directly sends a location service request to the H-GMLC.
  • the H-GMLC sends a location privacy setting data acquisition request to the UDM, and the location privacy setting data acquisition request is used to request the location privacy setting data of the UE.
  • the location privacy setting data acquisition request may be Nudm_UECM_Get_request.
  • UDM receives the location privacy setting data acquisition request from H-GMLC.
  • UDM sends a location privacy setting data acquisition response to H-GMLC to respond to the location privacy setting data acquisition request.
  • the location privacy setting data acquisition response may be Nudm_UECM_Get_response.
  • H-GMLC receives the location privacy setting data acquisition response from UDM.
  • the location privacy setting data acquisition response includes the UE’s location privacy setting data.
  • the positioning privacy setting data can be converted into action instruction information for instructing the AMF to perform the corresponding positioning service operation.
  • the action indication information is used to instruct the AMF to send a notification message to the UE and request the location information of the UE when receiving the UE's positioning permission message.
  • the message is used to request whether the UE allows the external client to request the location information of the UE.
  • the UE feeds back a positioning permission message to the AMF.
  • the action indication information is used to instruct AMF to send a notification message to the UE and instruct AMF to request the location information of the UE, and the notification message is used to instruct the external client to obtain the UE Location information.
  • the action indication information is used to instruct the AMF to request the location information of the UE.
  • H-GMLC sends a location service request to V-GMLC.
  • the location service request may be an LCS service request.
  • V-GMLC receives location service requests from H-GMLC.
  • the location service request includes action instruction information. For example, when the positioning privacy setting data obtained by the H-GMLC is to allow positioning, the H-GMLC sends a positioning service request to the V-GMLC, and the action indication information carried in the positioning service request is used to instruct to obtain the location information of the UE.
  • V-GMLC sends a location service request to AMF.
  • AMF receives the location service request from V-GMLC.
  • the location service request may be Namf_Location_Provide_positioningInfo_request.
  • the location service request includes action instruction information to instruct the AMF to perform the corresponding location service operation.
  • the AMF triggers a network-side service request to the UE.
  • the UE being in the idle state indicates that the UE and the AMF have not established a NAS signaling connection, and the AMF triggers the service request procedure on the UE side to establish a secure communication connection between the UE and the core network.
  • the AMF sends a notification message to the UE via the RAN, and the notification message is used to notify the user that the external client will obtain the UE Then AMF performs step 7 and subsequent steps. If the action indication information instructs the AMF to send a notification message to the UE and request to obtain the location information of the UE when it receives the UE's positioning permission message, then in the process of performing step 6, the AMF sends a notification message to the UE through the RAN.
  • the notification message is To request whether the user allows the external client to obtain the location information of the UE, if the user authorizes the location to be allowed, the UE sends a location permission message to the AMF through the RAN, and the AMF executes step 7 and subsequent steps when receiving the location permission message; if the user does not authorize For positioning, the UE sends a positioning rejection message to the AMF through the RAN. When the AMF receives the positioning rejection message, it feeds it back to the GMLC, and the GMLC feeds it back to the external client. If the action indication information indicates that the AMF requests to obtain the location information of the UE, the AMF performs step 7 and subsequent steps.
  • AMF sends a positioning request to LMF.
  • the LMF receives the positioning request from the AMF.
  • the location request may be Nlmf_Location_DetermineLocation Request.
  • the LMF issues network positioning information to the AMF.
  • the AMF receives the network positioning information from the LMF.
  • LMF can send network location information to AMF through Namf_Communication_N1N2 transfer (message).
  • the AMF issues network positioning information to the RAN.
  • the RAN receives the network positioning information from the AMF.
  • AMF can deliver network positioning information to the RAN through N2 transmission messages.
  • the RAN acquires measurement data, which may include signal strength, etc.
  • the RAN reports network positioning information such as measurement to the AMF.
  • the AMF receives network positioning information such as measurements from the RAN.
  • RAN can send network positioning information such as measurement to AMF through N2 transmission message.
  • AMF reports network positioning information such as measurement to LMF.
  • the LMF receives network positioning information such as measurements from the AMF.
  • AMF can send network positioning information such as measurement to AMF through Namf_Communication_N1N2Infonotify.
  • LMF can calculate the location information of the UE based on the network positioning information reported by the AMF. For example, if the UE is connected to a wireless hotspot (wireless-fidelity, WIFI), the LMF can be calculated based on the location of the wireless hotspot and the network positioning information such as signal strength Location information of the UE.
  • WIFI wireless-fidelity
  • the LMF delivers the location information of the UE to the AMF.
  • the AMF receives the location information of the UE from the LMF.
  • AMF reports UE location information to V-GMLC.
  • the V-GMLC receives the location information of the UE from the AMF.
  • the V-GMLC reports the location information of the UE to the H-GMLC.
  • the H-GMLC receives the location information of the UE from the V-GMLC.
  • the V-GMLC can carry the location information of the UE in the LCS service response.
  • the H-GMLC sends the location information of the UE to the external client.
  • the external client receives the location information of the UE from the H-GMLC.
  • H-GMLC can carry the location information of the UE in the LCS service response.
  • the UE’s location privacy setting data is to notify the user and authorize whether to allow positioning, but the V-GMLC or H-GMLC sends an incorrect indication to the AMF.
  • the visited network may also tamper with the location privacy setting data of the UE, causing the GMLC to issue an incorrect instruction.
  • the visited network may include AMF, or AMF and LMF.
  • FIG. 4 is a schematic diagram of a network architecture to which an embodiment of the present application is applied.
  • the network architecture includes a user terminal, a data management network element, an access management network element, and a gateway mobile positioning network element.
  • the network architecture shown in FIG. 4 omits the access network equipment between the user terminal and the access management network element.
  • the access network equipment may be a RAN equipment or an AN equipment.
  • the figure corresponding to the embodiment does not show the word "network element", and the specific description of the embodiment does not indicate the word "network element”. However, this does not affect the understanding of the embodiments of this application.
  • the user terminal can be user equipment such as UE;
  • the data management network element can be the UDM in the 5G system, or the network element with the same function as the UDM in the future communication system;
  • the access management network element can be the AMF in the 5G system, It can also be a network element with the same function as the AMF in the future communication system;
  • the mobile positioning network element of the network element can be a GMLC, or a network element with the same function as the GMLC in the future communication system.
  • the embodiment of the application also relates to the authentication service network element, which can be the AUSF in the 5G system, or a network element with the same function as the AUSF in the future communication system; it also relates to the location management network element, which can be the LMF in the 5G system, It can also be a network element with the same function as the LMF in the future communication system. It should be noted that the name of each network element involved in the embodiment of this application does not constitute a limitation to the embodiment of this application.
  • the user terminal can report the positioning privacy setting data input or updated by the user to the data management network element through the access network and the core network network element.
  • the core network element includes an access management network element; in another possible implementation, the core network element includes an access management network element and a location management network element; in another In a possible implementation manner, the core network network element includes an access management network element, a location management network element, and a gateway mobile positioning network element.
  • the user terminal When the user terminal reports the positioning privacy setting data, it can also report the first message check code of the positioning privacy setting data calculated by it to the data management network element, so that the data management network element can check the user terminal according to the first message check code Whether it was maliciously modified by the visited network or the gateway mobile positioning network element during the process of reporting the location privacy setting data to the data management network element.
  • the user terminal can use the private key of the user terminal to digitally sign the positioning privacy setting data entered or updated by the user, so that the data management network element can check whether the user terminal is reporting the positioning privacy setting data to the data management network element according to the digital signature. Malicious modification of the visited network or gateway mobile positioning network element.
  • the user terminal can also perform secondary verification to further verify whether the location privacy setting data has been maliciously modified by the visited network or the gateway mobile location network element.
  • the data management network element can store and update the positioning privacy setting data, and can digitally sign the stored positioning privacy setting data, so that the user terminal can verify whether the positioning privacy setting data saved by the data management network element is tamper.
  • the data management network element digitally signs the positioning privacy setting data, so that the access management network element checks that the gateway mobile positioning network element issues malicious instructions that do not match the positioning privacy setting data.
  • the data management network element may also obtain a second message check code of the positioning privacy setting data, and if the first message check code is the same as the second message check code, it is determined that the positioning privacy setting data has not been tampered with.
  • the data management network element may independently obtain the second message check code, that is, autonomously calculate the second message check code, or may obtain the second message check code calculated by the authentication service network element from the authentication service network element.
  • the access management network element when the access management network element receives a positioning service request from the gateway mobile positioning network element, it requests the data management network element to obtain the positioning privacy setting data of the user terminal, and executes it according to the positioning privacy setting data Corresponding location service operations, for example, if the location privacy setting data needs to notify the user and is authorized by the user to allow positioning, the access management network element sends a notification message to the user terminal through the access network, and when it receives permission from the user terminal When locating the message, request to obtain the location information of the user terminal.
  • the access management network element can also obtain the current positioning privacy setting data of the user terminal from the user terminal, and compare it with the positioning privacy setting data obtained from the data management network element.
  • the access management network element can The positioning privacy setting data of the user terminal is sent to the data management network element, so that the data management network element updates the positioning privacy setting data of the user terminal.
  • the access management network element receives the action indication information and data signature data from the gateway mobile positioning network element, it checks whether the digital signature data matches the action indication information. If it does not match, then Make sure that the gateway mobile positioning network element issues an incorrect indication.
  • the network architecture shown in FIG. 4 also includes an authentication service network element.
  • the service authentication network element can calculate the second message check code and the third message check code, and the service authentication network element can receive data from And determine whether the first message check code and the second message check code are the same to determine whether the positioning privacy setting data reported by the user terminal has been tampered with.
  • the service authentication network element may also send the second message check code and the third message check code to the data management network element, and the data management network element determines whether the first message check code and the second message check code are the same.
  • the management network element determines that it is the same, it sends the third message check code to the user terminal.
  • the user terminal is the UE
  • the access management network element is the AMF network element
  • the data management network element is the UDM network element
  • the authentication service network element is the AUSF network element
  • the gateway moves
  • the positioning network element takes GMLC as an example
  • the location management network element takes LMF as an example.
  • the gateway mobile positioning network element can be divided into V-GMLC and H-GMLC in roaming scenarios, and in non-roaming scenarios, V-GMLC and H-GMLC are not distinguished.
  • H-GMLC can communicate with external clients directly or through NEF.
  • the embodiments of the present application can be applied in roaming scenarios, and can also be applied in non-roaming scenarios. If applied in non-roaming scenarios, the V-GMLC and V-GMLC in Figure 5, Figure 5a, Figure 6, Figure 7 and Figure 8 can be used. H-GMLC is treated as a GMLC.
  • Positioning privacy setting data the data set by the user on the UE whether positioning is allowed or not. Examples can include the following situations: 1. Positioning is not allowed; 2. The user needs to be notified and authorized by the user to allow positioning. There are two types In one case, positioning is performed only when the user is authorized to allow positioning, and the other is positioning when the user is authorized to allow positioning or positioning when the user does not respond; 3. Positioning is allowed but the user needs to be notified ;4, allows positioning but does not need to notify the user, etc.
  • the fresh parameter is used to protect the network from low-altitude replay attacks.
  • the freshness parameter is used to calculate the message verification code and perform digital signature.
  • the message check code is used in the embodiment of the present application to check whether the location privacy setting data has been tampered with.
  • the counter value is a kind of freshness parameter and is used to indicate the number of times a specific message is sent.
  • the function counter (function, FC) value is a kind of freshness parameter, and different counter values are assigned to the message according to the function.
  • Figure 5, Figure 5a, and Figure 6 to Figure 8 take roaming scenarios as examples for introduction.
  • the access network between the UE and the AMF is omitted.
  • the schematic flow chart of the data transmission method provided in the first embodiment of this application is used in this embodiment.
  • the message check code can effectively prevent the location privacy setting data from being tampered with, thereby ensuring the end-to-end integrity protection of the location privacy setting data between the UE and UDM.
  • the embodiment shown in FIG. 5 may include but is not limited to the following steps:
  • Step S101 The UE calculates the first message check code of the first positioning privacy setting data.
  • the first location privacy setting data is location privacy setting data input or updated by the user on the UE.
  • the UE may save the first positioning privacy setting data so that the UE can report the first positioning privacy setting data to UDM.
  • the UE may calculate the first message check code of the first positioning privacy setting data according to the input key and the first input parameter. Specifically, the UE derives a key used to calculate the message check code of the positioning privacy setting data, and uses the key as the input key. The UE uses the input password and the first input parameter to calculate the first positioning privacy setting data.
  • the hash value is the first message check code.
  • the first input parameter may include the first freshness parameter and the first positioning privacy setting data.
  • the first freshness parameter may include a first counter (counter) value and/or a first function counter (function counter, FC) value.
  • the embodiments of the present application are introduced by taking freshness parameters including counter values and FC values as examples.
  • the specific value of the first counter value is maintained by the UE, and the specific value of the first FC value is fixed.
  • the first message check code can be expressed as PS-MAC-Iue or MACue.
  • Kausf is a key determined through negotiation between the UE and the network when the UE registers with the network.
  • the AUSF or UDM on the network side can derive and determine the same key Kausf.
  • the specific process refers to the prior art, and will not be repeated here.
  • the UE side and the network side use the same input key and input parameters to calculate the hash value. If the hash value calculated by the UE side and the network side are different, it indicates that the positioning privacy setting data has been tampered with during transmission.
  • Step S102 if the UE is in an idle state, trigger the service request process on the UE side.
  • the UE being in the idle state indicates that the UE and the AMF have not established a NAS signaling connection, and the service request procedure on the UE side is triggered to establish a secure communication connection between the UE and the core network. If the UE is in the connected state, step S102 may not be executed.
  • Step S103 The UE sends the first message check code, the first freshness parameter, and the first positioning privacy setting data to the AMF through the RAN.
  • the AMF receives the first message check code, the first freshness parameter and the first positioning privacy setting data from the UE.
  • the UE can send the first message check code, the first freshness parameter, and the first positioning privacy setting data to the AMF through the NAS transport message, that is, the first message check, the first freshness parameter, and the first positioning privacy setting
  • the data is carried in the NAS transmission message.
  • the NAS message may be a separate NAS message or a part of a registration request (registration request) message.
  • the first message check code, the first freshness parameter, and the first positioning privacy setting data may also be carried in a radio resource control (radio resource control, RRC) connection reconfiguration (reconfiguration) message sent by the UE to the RAN, Or it is carried in the N2 message sent by the RAN to the AMF.
  • RRC radio resource control
  • Step S104 the AMF sends the first message check code, the first freshness parameter and the first positioning privacy setting data to the LMF.
  • the LMF receives the first message check code, the first freshness parameter, and the first positioning privacy setting data from the AMF.
  • the message may be Namf_Communication_N1 message notify, for example.
  • Step S105 The LMF sends the first message check code, the first freshness parameter and the first positioning privacy setting data to the V-GMLC.
  • the V-GMLC receives the first message check code, the first freshness parameter and the first positioning privacy setting data from the LMF.
  • the LMF sends the first message check code, the first freshness parameter and the first positioning privacy setting data to the V-GMLC
  • the first message check code, the first freshness parameter and the first positioning privacy setting data can be carried in
  • the message may be Ngmlc_UesrPrivacy_Set request, for example.
  • Step S106 The V-GMLC sends the first message check code, the first freshness parameter and the first positioning privacy setting data to the H-GMLC.
  • the H-GMLC receives the first message check code, the first freshness parameter and the first positioning privacy setting data from the V-GMLC.
  • V-GMLC When V-GMLC sends the first message check code, first freshness parameter, and first positioning privacy setting data to H-GMLC, the first message check code, first freshness parameter, and first positioning privacy setting data It is carried in a message, and the message may be, for example, Ngmlc_UesrPrivacy_Set request.
  • Step S107 The H-GMLC sends the first message check code, the first freshness parameter and the first positioning privacy setting data to the UDM.
  • the UDM receives the first message check code, the first freshness parameter and the first positioning privacy setting data from the H-GMLC.
  • the first message check code, first freshness parameter, and first positioning privacy setting data can be carried in In a message
  • the message may be Nudm_UECM_Update request, for example.
  • step S103-step S107 is a process in which the UE reports the first message check code, the first freshness parameter, and the first positioning privacy setting data to the UDM through the RAN and the core network element.
  • the core involved in the process The network elements include AMF, LMF, V-GMLC and H-GMLC, and the reporting process is UE->AMF->LMF->V-GMLC->H-GMLC->UDM.
  • the UE reports the first message check code, the first freshness parameter, and the first positioning privacy setting data to the UDM through the RAN and AMF.
  • the core network elements involved include AMF, and the reporting process It is UE->AMF->UDM.
  • the UE reports the first message check code, the first freshness parameter, and the first positioning privacy setting data to the UDM through RAN, AMF, and LMF.
  • the core network elements involved include AMF And LMF, the reporting process is UE->AMF->LMF->UDM.
  • the LMF can send the first message check code, the first freshness parameter, and the first positioning privacy setting data to the GMLC, and then the GMLC sends the first message check code, the first freshness parameter, and the first location privacy setting data to the UDM.
  • Location privacy setting data In a non-roaming scenario, the process for the UE to report the first message check code, the first freshness parameter and the first positioning privacy setting data to the UDM can be UE->AMF->UDM, UE->AMF->LMF->UDM , Or UE->AMF->LMF->GMLC->UDM.
  • the method by which the UE reports to the UDM is not limited, nor the method by which the UDM is delivered to the UE.
  • the first freshness parameter includes the first counter value and the first FC value. Since the first FC value is fixed and can be learned by the network element in the core network, the first freshness parameter transmitted in step S103-step S107 is specifically Can be the first counter value.
  • Step S108 UDM sends the first positioning privacy setting data and the first freshness parameter to AUSF.
  • AUSF receives the first positioning privacy setting data and the first freshness parameter from the UDM.
  • the first positioning privacy setting data and the first freshness parameter may be carried in one message, and the message may be, for example, Nausf_protection request.
  • Step S109 AUSF calculates the second message check code and the third message check code of the first positioning privacy setting data.
  • the AUSF can calculate the second message check code of the first positioning privacy setting data according to the input key Kausf and the first input parameter.
  • the second message check code can be expressed as PS-MAC-Iue' or MACue'.
  • the AUSF can calculate the third message check code for the positioning privacy setting data according to the input key Kausf and the second input parameter.
  • the second input parameter may include the second freshness parameter and the first positioning privacy setting data, and the second freshness parameter includes the first counter value and/or the second FC value.
  • the specific value of the second FC value is fixed, but the second FC value is different from the first FC value.
  • the third message check code can be expressed as PS-MAC-Iausf or MACausf.
  • Step S110 AUSF sends the second message check code and the third message check code to UDM.
  • UDM receives the second message check code and the third message check code from AUSF.
  • the second message check code and the third message check code may be carried in one message, and the message may be Nausf_protection response, for example.
  • Step S111 UDM judges whether the first message check code is the same as the second message check code.
  • UDM judges whether the first message check code is the same as the second message check code. If they are the same, it indicates that the first location privacy setting data reported by the UE to UDM has not been maliciously modified by the visited network or GMLC. UDM stores and updates the UE's location The privacy setting data, the first positioning privacy setting data that is about to be received, is stored as the latest positioning privacy setting data of the UE. If they are not the same, it indicates that the first location privacy setting data reported by the UE to the UDM has been maliciously modified by the visited network or the GMLC.
  • Step S112 UDM sends the third message check code to H-GMLC.
  • H-GMLC receives the third message check code from UDM.
  • the UDM may send the third message check code to the H-GMLC through a message, and the message may be Nudm_UECM_Update response, for example.
  • Step S113 H-GMLC sends a third message check code to V-GMLC.
  • the V-GMLC receives the third message check code from the H-GMLC.
  • the H-GMLC can send the third message check code to the V-GMLC through a message, and the message can be, for example, Ngmlc_UesrPrivacy_Set response.
  • Step S114 the V-GMLC sends the third message check code to the LMF.
  • the LMF receives the third message check code from the V-GMLC.
  • the V-GMLC may send the third message check code to the LMF through a message, and the message may be Ngmlc_UesrPrivacy_Set response, for example.
  • Step S115 the LMF sends the third message check code to the AMF.
  • the AMF receives the third message check code from the LMF.
  • the LMF may send the third message check code to the AMF through a message, and the message may be Namf_Communication_N1 message notify, for example.
  • Step S116 the AMF sends the third message check code to the UE.
  • the UE receives the third message check code from the LMF.
  • the AMF sends the third message check code to the UE through the RAN.
  • the AMF may send the third message check code to the UE through a message, and the message may be a NAS transport message, for example.
  • step S109-step S113 is a process of UDM delivering the third message check code to the UE, and the process is UDM->H-GMLC->V-GMLC->LMF->AMF->UE.
  • UDM delivers the third message check code to the UE through RAN and AMF, and the delivery process is UDM->AMF->UE.
  • UDM delivers the third message check code to the UE through RAN, AMF, and LMF, and the delivery process is UDM->LMF->AMF->UE.
  • the UDM may send the third message check code to the GMLC, and then the GMLC sends the third message check code to the LMF.
  • the process of UDM to deliver the third message check code to UE can be UDM->GMLC->LMF->AMF->UE, UDM->AMF->UE or UDM->LMF->AMF ->UE.
  • Step S117 The UE calculates the fourth message check code of the first positioning privacy setting data, and judges whether the third message check code is the same as the fourth message check code.
  • the UE may calculate the third message check code on the positioning privacy setting data according to the input key Kausf and the second input parameter.
  • the second input parameter may include the second freshness parameter and the first positioning privacy setting data, and the second freshness parameter includes the first counter value and/or the second FC value.
  • the specific value of the second FC value is fixed, but the second FC value is different from the first FC value.
  • the third message check code can be expressed as PS-MAC-Iausf or MACausf.
  • the second FC value is for AUSF
  • the first FC value is for UE
  • the first FC value is used to calculate the first message check code and the second message check code
  • the second FC value is used for The third message check code and the fourth message check code are calculated for the second check.
  • the first check is performed by UDM
  • the first check is performed by the UE.
  • the fourth message check code can be expressed as PS-MAC-Iausf' or MACausf'.
  • the third message check code is the same as the fourth message check code, the first positioning privacy setting data reported by the UE to the UDM has not been maliciously modified by the visited network or the GMLC. If the third message check code is different from the fourth message check code, it indicates that the first location privacy setting data reported by the UE to the UDM has been maliciously modified by the visited network or the GMLC.
  • the UE calculates the first message check code of the first positioning privacy setting data
  • AUSF calculates the second message check code and the third message check code of the first positioning privacy setting data.
  • UDM judges whether the first message check code is the same as the second message check code.
  • the UE receives the third message check code, it calculates the fourth message check code and judges the third message check code and the fourth message check code. Whether they are the same, the two verification processes can effectively prevent the location privacy setting data from being tampered with, thereby ensuring the end-to-end integrity protection of the location privacy setting data between the UE and UDM.
  • the message check code may also be calculated based on a random value.
  • the first random value calculates the first message check code of the first positioning privacy setting data, and then the UE sends the first message check code, the first positioning privacy setting data and the first random value to the UDM; the UDM sums the first random value
  • the first positioning privacy setting data is sent to AUSF; AUSF calculates the second message check code according to the first random value, generates the second random value, calculates the third message check code according to the second random value, and then AUSF sends the second message to UDM
  • the message check code, the third message check code, and the second random value when UDM determines that the second message check code is the same as the third message check code, it sends the third message check code sum to the UE
  • digital signature based on the freshness parameter in the subsequent embodiments is also a possible implementation, and does not constitute a limitation to the embodiment of this application.
  • the UE performs the first positioning privacy setting data according to a random value and the UE's private key.
  • UDM digitally signs the first location privacy setting data according to another random value and UDM's private key.
  • UDM obtains the second message check code from AUSF is a possible implementation, and does not constitute a limitation to the embodiment of this application.
  • UDM can also obtain the second message check code in other ways. For example, UDM autonomously calculates the second message check code. The same is true for the third message check code.
  • FIG. 5a it is a schematic flowchart of another data transmission method provided in the first embodiment of the present application.
  • Setting the data to calculate the message check code can effectively prevent the location privacy setting data from being tampered with, thereby ensuring the end-to-end integrity protection of the location privacy setting data between the UE and UDM.
  • FIG. 5a As in the embodiment shown in FIG. 5, please refer to the detailed description of FIG.
  • the difference between Fig. 5a and Fig. 5 is that in Fig. 5, UDM performs one check and the UE performs one check, while Fig. 5a uses AUSF to perform one check and the UE performs one check.
  • the embodiment shown in Figure 5a may include but is not limited to the following steps:
  • step S101a the UE calculates the first message check code of the first positioning privacy setting data.
  • Step S102a if the UE is in an idle state, trigger the service request process on the UE side.
  • Step S103a The UE sends the first message check code, the first freshness parameter, and the first positioning privacy setting data to the AMF through the RAN.
  • the AMF receives the first message check code, the first freshness parameter and the first positioning privacy setting data from the UE.
  • Step S104a The AMF sends the first message check code, the first freshness parameter and the first positioning privacy setting data to the LMF.
  • the LMF receives the first message check code, the first freshness parameter, and the first positioning privacy setting data from the AMF.
  • step S105a the LMF sends the first message check code, the first freshness parameter and the first positioning privacy setting data to the V-GMLC.
  • the V-GMLC receives the first message check code, the first freshness parameter and the first positioning privacy setting data from the LMF.
  • Step S106a The V-GMLC sends the first message check code, the first freshness parameter and the first positioning privacy setting data to the H-GMLC.
  • the H-GMLC receives the first message check code, the first freshness parameter and the first positioning privacy setting data from the V-GMLC.
  • Step S107a The H-GMLC sends the first message check code, the first freshness parameter, and the first positioning privacy setting data to the AUSF.
  • AUSF receives the first message check code, the first freshness parameter and the first positioning privacy setting data from the H-GMLC.
  • Step S108a AUSF calculates the second message check code and the third message check code of the first positioning privacy setting data.
  • the AUSF can calculate the second message check code of the first positioning privacy setting data according to the input key Kausf and the first input parameter.
  • the second message check code can be expressed as PS-MAC-Iue' or MACue'.
  • the AUSF can calculate the third message check code for the positioning privacy setting data according to the input key Kausf and the second input parameter.
  • the second input parameter may include the second freshness parameter and the first positioning privacy setting data, and the second freshness parameter includes the first counter value and/or the second FC value.
  • the specific value of the second FC value is fixed, but the second FC value is different from the first FC value.
  • the third message check code can be expressed as PS-MAC-Iausf or MACausf.
  • the AUSF judges whether the first message check code is the same as the second message check code. If they are the same, it indicates that the first positioning privacy setting data reported by the UE to the UDM has not been visited by the network or GMLC. For malicious modification, AUSF stores and updates the location privacy setting data of the UE, and the received first location privacy setting data is to be stored as the latest location privacy setting data of the UE. If they are not the same, it indicates that the first location privacy setting data reported by the UE to the UDM has been maliciously modified by the visited network or the GMLC.
  • step S109a is executed.
  • Step S109a AUSF sends the first positioning privacy setting data to UDM.
  • UDM receives and stores the first positioning privacy setting data from AUSF.
  • the AUSF may send the first positioning privacy setting data to the UDM through a message, and the message may be, for example, Nausf_protection request.
  • Step S110a UDM sends a response message to AUSF.
  • AUSF receives the response message from UDM.
  • the response message may be Nausf_protection response, for example.
  • Step S111a AUSF sends the third message check code to H-GMLC.
  • H-GMLC receives the third message check code from AUSF.
  • Step S112a the H-GMLC sends the third message check code to the V-GMLC.
  • the V-GMLC receives the third message check code from the H-GMLC.
  • Step S113a the V-GMLC sends the third message check code to the LMF.
  • the LMF receives the third message check code from the V-GMLC.
  • Step S114a the LMF sends the third message check code to the AMF.
  • the AMF receives the third message check code from the LMF.
  • Step S115a the AMF sends the third message check code to the UE.
  • the UE receives the third message check code from the LMF.
  • Step S116a the UE calculates the fourth message check code of the first positioning privacy setting data, and judges whether the third message check code is the same as the fourth message check code.
  • the UE calculates the first message check code of the first positioning privacy setting data
  • AUSF calculates the second message check code and the third message check code of the first positioning privacy setting data
  • AUSF Determine whether the first message check code is the same as the second message check code
  • the fourth message check code is calculated Verify the code and determine whether the third message verification code is the same as the fourth message verification code. The two verification processes can effectively prevent the location privacy setting data from being tampered with, thereby ensuring the end-to-end location privacy setting data between the UE and UDM Integrity protection.
  • FIG. 6 a schematic flow chart of the data transmission method provided in the first embodiment of this application.
  • This embodiment uses the UE to perform positioning privacy setting data.
  • the digital signature can effectively prevent the location privacy setting data from being tampered with, thereby ensuring the end-to-end integrity protection of the location privacy setting data between the UE and UDM.
  • the embodiment shown in FIG. 6 may include but is not limited to the following steps:
  • Step S201 The UE digitally signs the first positioning privacy setting data to obtain a first digital signature.
  • the first positioning privacy setting data is the first positioning privacy setting data entered or updated by the user on the UE, and is the first positioning privacy setting data before digital signature processing.
  • the first digital signature is a digital signature performed by the UE on the first positioning privacy setting data.
  • the UE may digitally sign the first positioning privacy setting data according to the UE's private key and input parameters to obtain the first digital signature.
  • the input parameter may include a freshness parameter
  • the freshness parameter may include a counter (counter) value and a function counter (function counter, FC) value.
  • the specific value of the counter value is maintained by the UE, and the specific value of the FC value is fixed.
  • the UE can digitally sign the first positioning privacy setting data according to the UE's private key and the counter value.
  • Step S202 If the UE is in an idle state, trigger the service request process on the UE side.
  • the UE is in the idle state, indicating that the UE has not accessed the core network through the RAN, and triggers the service request process on the UE side, which triggers the UE to access the core network through the RAN to establish a communication connection between the UE and the core network.
  • step S202 may not be executed.
  • Step S203 The UE sends the first digital signature, the freshness parameter and the first positioning privacy setting data to the AMF through the RAN.
  • the AMF receives the first digital signature, the freshness parameter and the first positioning privacy setting data from the UE.
  • the first digital signature, the freshness parameter, and the first positioning privacy setting data may be carried in a message, which may be, for example, a NAS Transmission message.
  • Step S204 The AMF sends the first digital signature, the freshness parameter and the first positioning privacy setting data to the LMF.
  • the LMF receives the first digital signature, the freshness parameter and the first positioning privacy setting data from the AMF.
  • the first digital signature, freshness parameter, and first positioning privacy setting data can be carried in a message, which may be Namf_Communication_N2, for example. message notify.
  • Step S205 the LMF sends the first digital signature, the freshness parameter and the first positioning privacy setting data to the V-GMLC.
  • the V-GMLC receives the first digital signature, the freshness parameter and the first positioning privacy setting data from the LMF.
  • the LMF sends the first digital signature, the freshness parameter, and the first positioning privacy setting data to the V-GMLC
  • the first digital signature, the freshness parameter, and the first positioning privacy setting data can be carried in a message.
  • the message may, for example, It is Ngmlc_UesrPrivacy_Set request.
  • Step S206 The V-GMLC sends the first digital signature, the freshness parameter and the first positioning privacy setting data to the H-GMLC.
  • the H-GMLC receives the first digital signature, the freshness parameter and the first positioning privacy setting data from the V-GMLC.
  • the first digital signature, freshness parameter, and first positioning privacy setting data can be carried in one message.
  • it can be Ngmlc_UesrPrivacy_Set request.
  • Step S207 The H-GMLC sends the first digital signature, the freshness parameter and the first positioning privacy setting data to the UDM.
  • the UDM receives the first digital signature, the freshness parameter and the first positioning privacy setting data from the H-GMLC.
  • the first digital signature, freshness parameter, and first positioning privacy setting data can be carried in a message, which may, for example, It is Nudm_UECM_Update request.
  • step S203-step S207 is a process in which the UE reports the first digital signature, the freshness parameter, and the first positioning privacy setting data to the UDM through RAN, AMF, LMF, V-GMLC, and H-GMLC.
  • the UE reports the first digital signature and freshness parameters to UDM through RAN and AMF.
  • the core network elements involved include AMF, and the reporting process is UE->AMF->UDM.
  • the UE reports the first digital signature and freshness parameters to UDM through RAN, AMF, and LMF.
  • the core network elements involved include AMF and LMF, and the reporting process is UE->AMF- >LMF->UDM.
  • the LMF may send the first digital signature, the freshness parameter, and the first positioning privacy setting data to the GMLC, and then the GMLC may send the first digital signature, the freshness parameter, and the first positioning privacy setting data to the UDM.
  • the process for the UE to report the first digital signature, freshness parameter, and first positioning privacy setting data to UDM can be UE->AMF->UDM, UE->AMF->LMF->UDM, or UE- >AMF->LMF->GMLC->UDM.
  • the freshness parameter includes a counter value and an FC value. Since the FC value is fixed and can be learned by network elements in the core network, the freshness parameter transmitted in step S203 to step S207 may specifically be a counter value.
  • step S208 the UDM judges whether the first positioning privacy setting data matches the first digital signature, and in the case of matching, performs a data signature on the first positioning privacy setting data to obtain a second digital signature.
  • the UDM determines whether the first positioning privacy setting data matches the first digital signature according to the UE's public key and input parameters.
  • the public key of the UE can be obtained during the UE registration process and stored in the UDM.
  • Input parameters include freshness parameters.
  • Freshness parameters can include counter value and FC value. Since the UE reports the counter value to UDM, UDM can determine the first positioning privacy setting data and the first digital signature according to the UE’s public key and counter value Whether it matches.
  • the UDM judges whether the first positioning privacy setting data matches the first digital signature, that is, using the UE’s public key and the freshness parameter to de-sign the first digital signature. If the first positioning privacy setting data obtained by de-signing matches the first positioning If the privacy setting data is the same, the first location privacy setting data matches the first digital signature, and the verification indicates that the first location privacy setting data reported by the UE to the UDM has not been maliciously modified by the visited network or the GMLC. If the first location privacy setting data does not match the first digital signature, it indicates that the first location privacy setting data reported by the UE to the UDM has been maliciously modified by the visited network or the GMLC.
  • UDM stores and updates the UE’s first positioning privacy setting data when the first positioning privacy setting data matches the first digital signature, that is, storing the first positioning privacy setting data as the UE’s latest first positioning privacy setting data .
  • the UDM When the UDM matches the first positioning privacy setting data with the first digital signature, the UDM performs a data signature on the first positioning privacy setting data to obtain a second digital signature. Specifically, the UDM digitally signs the first positioning privacy setting data according to the UDM private key and input parameters to obtain the second digital signature. Similarly, the input parameters include freshness parameters, and the freshness parameters may include counter values and FC values. The counter value of the UDM digital signature is the counter value reported by the UE to the UDM.
  • Step S209 UDM sends the second digital signature to H-GMLC.
  • H-GMLC receives the second digital signature from UDM.
  • the UDM may send the second digital signature to the H-GMLC through a message, and the message may be Nudm_UECM_Update response, for example.
  • Step S210 H-GMLC sends a second digital signature to V-GMLC.
  • V-GMLC receives the second digital signature from H-GMLC.
  • the H-GMLC may send the second digital signature to the V-GMLC through a message, and the message may be Ngmlc_UesrPrivacy_Set response, for example.
  • Step S211 the V-GMLC sends the second digital signature to the LMF.
  • the LMF receives the second digital signature from the V-GMLC.
  • the V-GMLC may send the second digital signature to the LMF through a message, and the message may be Ngmlc_UesrPrivacy_Set response, for example.
  • Step S212 the LMF sends the second digital signature to the AMF.
  • the AMF receives the second digital signature from the LMF.
  • the LMF may send the second digital signature to the AMF through a message, and the message may be Namf_Communication_N2 message notify, for example.
  • Step S213 The AMF sends the second digital signature to the UE.
  • the UE receives the second digital signature from the LMF.
  • the AMF sends the second digital signature to the UE through the RAN.
  • the AMF may send the second digital signature to the UE through a message, and the message may be a NAS transport message, for example.
  • step S209-step S213 is a process of UDM delivering the second digital signature to the UE, and the process is UDM->H-GMLC->V-GMLC->LMF->AMF->UE.
  • the UDM issues the second digital signature to the UE through the RAN and AMF, and the issuing process is UDM->AMF->UE.
  • the UDM issues the second digital signature to the UE through RAN, AMF, and LMF, and the issuing process is UDM->LMF->AMF->UE.
  • the UDM may send the second digital signature to the GMLC, and then the GMLC sends the second digital signature to the LMF.
  • the process for UDM to issue the second digital signature to the UE can be UDM->GMLC->LMF->AMF->UE, UDM->AMF->UE or UDM->LMF->AMF-> UE.
  • Step S214 The UE judges whether the second digital signature matches the first positioning privacy setting data.
  • the UE judges whether the second digital signature matches the first location privacy setting data according to the UDM public key and freshness parameters, that is, uses the UDM public key and freshness parameters to de-sign the second digital signature. If the location obtained by de-signing If the privacy setting data is the same as the first location privacy setting data, the second digital signature matches the first location privacy setting data, and the first location privacy setting data saved by UDM has not been maliciously modified by the visited network or GMLC. If the second digital signature does not match the first location privacy setting data, it indicates that the first location privacy setting data saved by UDM has been maliciously modified by the visited network or GMLC.
  • the UE can obtain the UDM public key through a broadcast message or other methods.
  • the UE digitally signs the location privacy setting data.
  • the UDM receives the location privacy setting data after the digital signature, it checks it to determine whether it is malicious by the visited network or GMLC. Modify, and if the verification is passed, UDM digitally signs the positioning privacy setting data, and sends the digitally signed positioning privacy setting data to the UE, and the UE verifies it.
  • the verification process is effective twice. Prevent location privacy setting data from being tampered with, thereby ensuring the end-to-end integrity protection of location privacy setting data between UE and UDM.
  • FIG. 7 the flow diagram of the data transmission method provided in the third embodiment of this application is shown in this embodiment.
  • the embodiment shown in FIG. 7 may include but is not limited to the following steps:
  • Step S301 The external client sends a location service request to the H-GMLC.
  • the location service request may be, for example, an LCS service request.
  • H-GMLC receives location service requests from external clients.
  • the location service request may carry the identifier of the UE, which is used to indicate which UE's location information the external client wants to obtain.
  • step S302 the H-GMLC sends a location privacy setting data acquisition request to the UDM, where the location privacy setting data acquisition request is used to request the location privacy setting data of the UE.
  • the location privacy setting data acquisition request may be Nudm_UECM_Get_request, for example.
  • UDM receives the location privacy setting data acquisition request from H-GMLC.
  • the location privacy setting data acquisition request may carry the identity of the UE.
  • step S303 the UDM sends a location privacy setting data acquisition response to the H-GMLC for responding to the location privacy setting data acquisition request.
  • the location privacy setting data acquisition request may be Nudm_UECM_Get_response, for example.
  • H-GMLC receives the location privacy setting data acquisition response from UDM.
  • the location privacy setting data acquisition response includes the location privacy setting data of the UE stored in the UDM.
  • Step S304 The H-GMLC sends a location service request to the V-GMLC.
  • the location service request may be, for example, an LCS service request.
  • V-GMLC receives location service requests from H-GMLC.
  • the H-GMLC sends a positioning service request to the V-GMLC to obtain the location information of the UE.
  • the H-GMLC obtains the location privacy setting data of the UE, if the location privacy setting data indicates that positioning is not allowed, the H-GMLC directly feeds back the location service response to the external client, and the location service response indicates that the location service is rejected.
  • the positioning privacy setting data can be converted into action instruction information for instructing the AMF to perform the corresponding positioning service operation.
  • action instruction information for instructing the AMF to perform the corresponding positioning service operation.
  • the GMLC sends a location privacy setting data acquisition request to the UDM, and the UDM sends a location privacy setting data acquisition response to the GMLC, so that the GMLC can obtain the location privacy setting data of the UE.
  • the GMLC directly sends the location service request to the AMF, that is, steps S305 and S306 are simplified into one step, for the GMLC to send the location service request to the AMF.
  • the positioning privacy setting data of the UE stored in the UDM is the first positioning privacy setting data.
  • Step S305 The V-GMLC sends a location service request to the AMF.
  • AMF receives the location service request from V-GMLC.
  • the positioning service request may be Namf_Location_Provide_positioningInfo_request, for example.
  • the location service request includes action indication information, that is, action indication information obtained by the GMLC converting the first location privacy setting data, and is used to instruct the AMF to perform a corresponding location service operation.
  • action indication information is used to instruct the AMF to notify the user and request the location information of the UE.
  • step S306 the AMF sends a location privacy setting data acquisition request to the UDM.
  • UDM receives the location privacy setting data acquisition request from AMF.
  • the location privacy setting data acquisition request may be, for example, a privacy setting verification request, which is used to request the UE's location privacy setting data to be acquired from the UDM, that is, to obtain the first location privacy setting data.
  • the UE is the UE for which the external client wants to obtain location information.
  • step S307 the UDM sends a location privacy setting data acquisition response to the AMF.
  • the AMF receives the location privacy setting data acquisition response from the UDM.
  • the location privacy setting data acquisition response may be, for example, a privacy setting verification response, which is used to respond to the location privacy setting data acquisition request and carries the first location privacy setting data stored in the UDM.
  • the positioning privacy setting data acquisition response also includes first indication information for indicating that the first positioning privacy setting data is in First requested by AMF after UDM update. If the location privacy setting data acquisition response includes the first indication information, step S309 to step S310 are executed; if it does not include, step S309 to step S310 are not executed.
  • Step S308 If the UE is in an idle state, the AMF triggers a network-side service request to the UE.
  • the UE being in the idle state indicates that the UE and the AMF have not established a NAS signaling connection, and the AMF triggers the service request procedure on the UE side to establish a secure communication connection between the UE and the core network.
  • Step S309 The AMF sends a location privacy setting data acquisition request to the UE.
  • the UE receives the location privacy setting data acquisition request from the AMF.
  • the location privacy setting data acquisition request may be, for example, a privacy setting request.
  • the location privacy setting data acquisition request may be combined with the RRC connection reconfiguration message or the N2 message involved in step S308.
  • Step S310 The UE sends a positioning privacy setting data acquisition response to the AMF.
  • the AMF receives the positioning privacy setting data acquisition response from the UE.
  • the positioning privacy setting data acquisition response may be, for example, a privacy setting response, including the positioning privacy setting data reported by the UE. Assuming that the positioning privacy setting data reported by the UE is the second positioning privacy setting data, the second positioning privacy setting data is the current UE’s Target privacy settings data.
  • the location privacy setting data acquisition response may be combined with the RRC connection reconfiguration message or the N2 message involved in step S308.
  • step S311 the AMF performs a location service operation according to the first location privacy setting data.
  • the location service request sent by GMLC to AMF does not carry action indication information or the location service request sent by V-GMLC to AMF does not carry action indication information, then AMF directly sets according to the first location privacy setting The data performs location service operations.
  • the AMF sends a notification message to the UE through the RAN and requests to obtain the location information of the UE; if the first positioning privacy setting data is that positioning is allowed but no notification is required User, AMF requests to obtain the location information of the UE; if the first location privacy setting data indicates that the user needs to be notified and authorized by the user to allow positioning, the AMF sends a notification message to the UE through the RAN, and receives the positioning permission message from the UE When, request to obtain the location information of the UE.
  • the location service request sent by the GMLC to the AMF carries action indication information or the location service request sent by the V-GMLC to the AMF carries action indication information, and the AMF checks the action indication information with the first positioning Whether the privacy setting data matches, if it matches, it is determined that the visited network or the GMLC has not tampered with the first location privacy setting data. At this time, the AMF executes the location service operation according to the action instruction information or the first location privacy setting data. If it does not match, AMF still performs location service operations based on the first location privacy setting data. At this time, it can be determined that the visited network or GMLC has not tampered with the first location privacy setting data. AMF can report the error that the first location privacy setting data has been tampered with the reason.
  • the AMF determines whether the second positioning privacy setting data is the same as the first positioning privacy setting data. If the same, it means that the current positioning privacy setting data of the UE is not The changes are consistent with those saved in UDM. At this time, AMF still performs location service operations based on the first location privacy setting data. If they are not the same, it indicates that the UDM does not store the latest location privacy setting data of the UE. At this time, the AMF executes the location service operation according to the second location privacy setting data, that is, executes the location service operation according to the latest location privacy setting data, and the AMF also executes step S312 -Step S313.
  • the AMF request to obtain the location information of the UE may include the following steps:
  • step S3111 the AMF sends a positioning request to the LMF.
  • the LMF receives the positioning request from the AMF.
  • the location request may be Nlmf_Location_DetermineLocation Request, for example.
  • Step S3112 Measure and calculate the location information of the UE. Refer to the detailed description of step 8 to step 12 in the embodiment shown in FIG. 3, which will not be repeated here.
  • Step S3113 the LMF delivers the location information of the UE to the AMF.
  • the AMF receives the location information of the UE from the LMF.
  • Step S312 the AMF sends the second positioning privacy setting data to the UDM.
  • the UDM receives the second positioning privacy setting data from the AMF.
  • the AMF may send the second location privacy setting data to the UDM through the location privacy setting data update request.
  • the location privacy setting data update request may be, for example, a privacy setting update request.
  • Step S313 UDM sends a confirmation message to AMF.
  • AMF receives the confirmation message from UDM.
  • the UDM can send a confirmation message to AMF by locating the privacy setting data update response.
  • the location privacy setting data update response may be, for example, a privacy setting update response.
  • Step S314 The AMF reports the second indication information and the location information of the UE to the V-GMLC.
  • the V-GMLC receives the second indication information from the AMF and the location information of the UE.
  • the second indication information is used to indicate whether the positioning is completed.
  • Step S315 The V-GMLC reports the second indication information and the location information of the UE to the H-GMLC.
  • the H-GMLC receives the second indication information from the V-GMLC and the location information of the UE.
  • Step S316 The H-GMLC sends the location information of the UE to the external client.
  • the external client receives the location information of the UE from the H-GMLC.
  • the H-GMLC sends the location information of the UE to the external client.
  • the AMF can directly report the second indication information and the location information of the UE to the GMLC. If the second indication information indicates that the positioning is completed, the GMLC sends the location information of the UE to the external client.
  • the verification of the location privacy setting data by AMF is added to check whether the location privacy setting data sent by the visited network or GMLC to AMF has been tampered. It can effectively prevent the visited network or GMLC from issuing wrong action instructions, thereby effectively protecting the UE's location information.
  • FIG. 8 a schematic flow diagram of the data transmission method provided in the fourth embodiment of this application.
  • the UDM adopts a digital signature to
  • the signed location privacy setting data issued to the AMF can effectively prevent the visited network or the GMLC from issuing erroneous action instruction information, thereby effectively protecting the UE's location information.
  • the embodiment shown in FIG. 8 may include but is not limited to the following steps:
  • Step S401 The external client sends a location service request to the H-GMLC, and the location service request may be an LCS service request.
  • H-GMLC receives location service requests from external clients.
  • the H-GMLC sends a location privacy setting data acquisition request to the UDM, where the location privacy setting data acquisition request is used to request to acquire the location privacy setting data of the UE stored in the UDM.
  • the location privacy setting data acquisition request may be Nudm_UECM_Get_request, for example.
  • UDM receives the location privacy setting data acquisition request from H-GMLC. It is assumed that the location privacy setting data of the UE saved in the UDM is the second location privacy setting data.
  • the location privacy setting data acquisition request includes a second counter value
  • the second counter value is maintained by the H-GMLC
  • the UE side has no second counter value. Therefore, the second counter value is different from the first counter value in FIG. 5, FIG. 5a or FIG.
  • step S403 the UDM digitally signs the first positioning privacy setting data to obtain digital signature data.
  • the UDM performs data signature on the first location privacy setting data to obtain digital signature data. Specifically, the UDM digitally signs the first positioning privacy setting data according to the UDM's private key and input parameters to obtain the digital signature data.
  • the input parameter includes a third freshness parameter, and the third freshness parameter may include a second counter value or a third FC value.
  • the second counter value is the second counter value carried in step S402, and the third FC value is a fixed value.
  • the third FC value is different from the first FC value and different from the second FC value.
  • step S404 the UDM sends a location privacy setting data acquisition response to the H-GMLC for responding to the location privacy setting data acquisition request.
  • the location privacy setting data acquisition request may be Nudm_UECM_Get_response, for example.
  • H-GMLC receives the location privacy setting data acquisition response from UDM.
  • the location privacy setting data acquisition response includes first location privacy setting data, digital signature data, and second counter value.
  • Step S405 The H-GMLC sends a location service request to the V-GMLC.
  • the location service request may be, for example, an LCS service request.
  • V-GMLC receives location service requests from H-GMLC.
  • the location service request includes action instruction information, digital signature data, and second counter value.
  • Step S406 the V-GMLC sends a location service request to the AMF.
  • AMF receives the location service request from V-GMLC.
  • the positioning service request may be Namf_Location_Provide_positioningInfo_request, for example.
  • the location service request includes action instruction information, digital signature data, and second counter value.
  • the GMLC sends a location service request directly to the AMF.
  • the AMF receives the location service request from the GMLC.
  • the location service request includes action instruction information, digital signature data, and a second counter value.
  • Step S407 the AMF judges whether the digital signature data matches the action instruction information.
  • AMF judges whether the digital signature data matches the action instruction information according to the UDM public key and the second counter value. That is, the UDM public key and the second counter value are used to de-sign the digital signature data. If the first location privacy is obtained by de-signing If the setting data matches the location service operation indicated by the action indication information, the digital signature data matches the action indication information, and the action indication information issued by the GMLC has not been maliciously modified. If the digital signature data does not match the action instruction information, it indicates that the action instruction information issued by the GMLC has been maliciously modified.
  • the AMF can obtain the public key of the UDM. For example, when the AMF obtains the first positioning privacy setting data from the UDM, it can obtain the public key of the UDM at the same time.
  • the specific manner in which the AMF obtains the public key of the UDM is not limited in the embodiment of the present application.
  • Step S408 If the UE is in an idle state, the AMF triggers a network-side service request to the UE.
  • step S409 the AMF performs a location service operation according to the first location privacy setting data.
  • the AMF executes the location service operation according to the first location privacy setting data obtained by de-signing.
  • the AMF performs the location service operation according to the first location privacy setting data obtained by de-signing.
  • Step S410 The AMF reports the second indication information and the location information of the UE to the V-GMLC.
  • the V-GMLC receives the second indication information from the AMF and the location information of the UE.
  • the second indication information is used to indicate whether the positioning is completed.
  • Step S411 The V-GMLC reports the second indication information and the location information of the UE to the H-GMLC.
  • the H-GMLC receives the second indication information from the V-GMLC and the location information of the UE.
  • Step S412 The H-GMLC sends the location information of the UE to the external client.
  • the external client receives the location information of the UE from the H-GMLC.
  • the H-GMLC sends the location information of the UE to the external client.
  • the AMF can directly report the second indication information and the location information of the UE to the GMLC. If the second indication information indicates that the positioning is completed, the GMLC sends the location information of the UE to the external client.
  • UDM adopts digital signatures, which can effectively prevent the GMLC from issuing erroneous action instructions after signing the location privacy setting data sent by the UDM to the AMF. Information, thereby effectively protecting the location information of the UE.
  • the communication device 60 may include a transceiver unit 601 and a processing unit 602.
  • the communication device 60 is a data transmission device, which may be a user terminal, a data management network element, or an access management network element.
  • the communication device 60 is a user terminal:
  • the processing unit 602 is configured to calculate the first message check code of the first positioning privacy setting data.
  • the transceiver unit 601 is configured to send the first message check code and the first positioning privacy setting data to the data management network element.
  • the communication device 60 When the communication device 60 is a user terminal, it can implement the functions of the UE in the embodiments shown in FIG. 5, FIG. 5a, and FIGS. 6-8. For detailed processes performed by each unit in the communication device 60, see FIG. 5, FIG. 5a and FIG. The steps performed by the UE in the embodiment shown in FIG. 8 and 6 are not repeated here.
  • the data management network element further includes a storage unit 603.
  • the transceiver unit 601 is configured to receive the first message check code and the first positioning privacy setting data from the user terminal, and obtain the second message check code of the first positioning privacy setting data.
  • the processing unit 602 is configured to determine that the first location privacy setting number has not been tampered with if the second message check code is the same as the first message check code.
  • the storage unit 603 is configured to store the first positioning privacy setting data.
  • the communication device 60 When the communication device 60 is a data management network element, it can realize the functions of UDM in the embodiments shown in FIG. 5, FIG. 5a and FIGS. 6-8. The detailed process of each unit in the communication device 60 can be seen in FIG. 5 and FIG. 5a And the execution steps of UDM in the embodiment shown in FIG. 6 to FIG. 8 are not repeated here.
  • the communication device 60 is an access management network element:
  • the transceiver unit 601 is configured to send a positioning privacy setting data acquisition request to the data management network element when receiving a positioning service request from the gateway mobile positioning network element; receiving a positioning privacy setting data acquisition response from the data management network element, and positioning privacy
  • the setting data acquisition response includes the first positioning privacy setting data.
  • the processing unit 602 is configured to perform a location service operation according to the first location privacy setting data.
  • the communication device 60 When the communication device 60 is an access management network element, it can implement the functions of the AMF in the embodiments shown in Figs. 5, 5a, and 6-8. The detailed processes performed by each unit in the communication device 60 can be seen in Figs. 5a and the execution steps of the AMF in the embodiment shown in FIG. 6 to FIG. 8 will not be repeated here.
  • the communication device 70 is a data transmission device, which may be a user terminal, a data management network element, or an access management network element.
  • the communication device 70 includes a transceiver 701, a processor 702, and a memory 703.
  • the transceiver 701, the processor 702, and the memory 703 may be connected to each other through the bus 704, or may be connected in other ways.
  • the related functions implemented by the transceiver unit 601 shown in FIG. 9 may be implemented by the transceiver 701.
  • the related functions implemented by the processing unit 602 shown in FIG. 9 may be implemented by one or more processors 702.
  • the memory 703 includes but is not limited to random access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (erasable programmable read-only memory, EPROM), or Portable read-only memory (compact disc read-only memory, CD-ROM), the memory 703 is used for related instructions and data.
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable read-only memory
  • EPROM erasable programmable read-only memory
  • Portable read-only memory compact disc read-only memory, CD-ROM
  • the transceiver 701 is used for sending data and/or signaling, and receiving data and/or signaling.
  • the transceiver 701 can be used to communicate with the AMF through the RAN, for example, perform step S103 in the embodiment shown in FIG. 5 And step S116; execute step S102a and step S115a in the embodiment shown in FIG. 5a; execute step S203 and step S213 in the embodiment shown in FIG. 6; execute step S309 and step S310 in the embodiment shown in FIG.
  • the transceiver 701 can be used to communicate with AMF, GMLC, and AUSF, for example, perform the operation in the embodiment shown in FIG. 5 Step S107, step S108, and step S110; execute step S109a and step S110a in the embodiment shown in FIG. 5a; execute step S207 and step S209 in the embodiment shown in FIG. 6; execute step S302 in the embodiment shown in FIG. 7 , Step S303, step S306, step S307, step S312, and step S313; execute step S402 and step S404 in the embodiment shown in FIG. 8.
  • the transceiver 701 can be used to communicate with UE, GMLC, UDM, and LMF, for example, the embodiment shown in FIG. 5 is implemented Step S103, step S104, step S115, and step S116 in the embodiment; execute step S103a, step S104a, step S114a, and step S115a in the embodiment shown in FIG. 5a; execute step S203, step S204, and step S204 in the embodiment shown in FIG. Step S212 and step S213; execute step S305, step S306, step S307, step S309, step S310, step S312, step S313, and step S314 in the embodiment shown in FIG. 7; execute step S406 in the embodiment shown in FIG. 8 And step S410.
  • the processor 702 may include one or more processors, such as one or more central processing units (CPUs).
  • processors such as one or more central processing units (CPUs).
  • CPUs central processing units
  • the CPU may be a single-core CPU, or It can be a multi-core CPU.
  • the processor 702 can be used to perform operations to control the UE, for example, perform steps S101 and S101 in the embodiment shown in FIG. 5 Step S117; execute step S101a and step S116a in the embodiment shown in FIG. 5a; execute step S201 and step S214 in the embodiment shown in FIG. 6.
  • the processor 702 can be used to perform UDM control operations, such as performing step S111 in the embodiment shown in FIG. 5; Step S208 in the embodiment shown in FIG. 6 is executed; Step S403 in the embodiment shown in FIG. 8 is executed.
  • the processor 702 can be used to perform operations to control the AMF, for example, perform step S311 in the embodiment shown in FIG. 7; Step S407 and step S409 in the embodiment shown in FIG. 8 are executed.
  • the memory 703 is used to store program codes and data of the communication device 70.
  • the memory 703 is used to store the positioning privacy setting data reported by the UE.
  • FIG. 10 only shows a simplified design of the communication device.
  • the communication device may also contain other necessary components, including but not limited to any number of transceivers, processors, controllers, memories, communication units, etc., and all the devices that can implement the application are included in this application. Within the scope of protection.
  • the embodiment of the present application also provides a data transmission system, including a user terminal, a data management network element, an access management network element, and a gateway mobile positioning network element.
  • the user terminal is used to implement the functions of the UE in Figure 5, Figure 5a, Figure 6- Figure 8;
  • the data management network element is used to implement the UDM function in Figure 5, Figure 5a, Figure 6- Figure 8;
  • the access management network element is used To realize the functions of the AMF in Figure 5, Figure 5a, Figure 6- Figure 8;
  • the gateway mobile positioning network element is used to implement the functions of the V-GMLC and H-GMLC in Figure 5, Figure 5a, and Figure 6- Figure 8.
  • the data transmission system also includes an authentication service network element, which is used to implement the functions of AUSF in Figure 5, Figure 5a, and Figure 6-8.
  • a person of ordinary skill in the art can understand that all or part of the process in the above-mentioned embodiment method can be realized.
  • the process can be completed by a computer program instructing relevant hardware.
  • the program can be stored in a computer readable storage medium. , May include the processes of the foregoing method embodiments.
  • the aforementioned storage media include: ROM or random storage RAM, magnetic disks or optical disks and other media that can store program codes. Therefore, yet another embodiment of the present application provides a computer-readable storage medium that stores instructions in the computer-readable storage medium, which when run on a computer, causes the computer to execute the methods described in the above aspects.
  • Another embodiment of the present application also provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the methods described in the above aspects.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above embodiments it may be implemented in whole or in part by software, hardware, firmware or any combination thereof.
  • software it can be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted through the computer-readable storage medium.
  • the computer instructions can be sent from a website, computer, server, or data center through wired (for example, coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (for example, infrared, wireless, microwave, etc.) Another website site, computer, server or data center for transmission.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供一种数据传输系统、方法及其装置,其中该系统包括用户终端和数据管理网元,用户终端,用于计算第一定位隐私设置数据的第一消息校验码,向数据管理网元发送第一消息校验码和第一定位隐私设置数据;数据管理网元,用于接收来自用户终端的第一消息校验码和第一定位隐私设置数据;获取第一定位隐私设置数据的第二消息校验码;若第二消息校验码与第一消息校验码相同,确定第一定位隐私设置数据未被篡改,并存储第一定位隐私设置数据。采用本申请实施例,可以有效防止定位隐私设置数据被篡改,从而确保用户终端与数据管理网元之间的定位隐私设置数据的端到端完整性保护。

Description

数据传输系统、方法及其装置
本申请要求于2019年1月21日提交中国专利局、申请号为201910055458.X、申请名称为“数据传输系统、方法及其装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及实施例涉及通信技术领域,具体涉及一种数据传输系统、方法及其装置。
背景技术
随着通信技术的发展,第五代(5 th-generation,5G)通信技术应运而生。5G通信技术可以提供高精度低时延的定位服务,并可以增强对用户隐私数据的保护。对于使用5G定位服务的用户终端,用户可以在用户终端上随时更改定位隐私设置。目前,定位隐私设置包括不允许定位(即不允许获取用户设备的位置信息),需要通知用户并由用户授权是否允许定位,允许定位但需要通知用户,以及允许定位但不需要通知用户等。
在目前的定位隐私设置更新流程中,用户设备(user equipment,UE)通过无线接入网(radio access network,RAN)向核心网中的接入与移动性管理功能(Access and Mobility Management Function,AMF)网元发送定位隐私设置数据更新请求,该定位隐私设置数据更新请求携带更新后的定位隐私设置数据,AMF网元将该定位隐私设置数据发送至网关移动定位中心功能(gateway mobile location center,GMLC)网元,然后GMLC网元将该定位隐私设置数据发送至统一数据管理(unified data management,UDM)网元,UDM网元根据该定位隐私设置数据更新该UE的定位隐私设置数据,并存储。
在上述定位隐私设置更新流程中,UE向UDM网元上报的定位隐私设置数据经过GMLC网元,GMLC网元存在恶意修改定位隐私设置数据的风险,而UE和UDM网元无法察觉是否被修改,导致UDM网元存储错误的定位隐私设置数据,使得UE与UDM网元之间的定位隐私设置数据缺乏有效的端到端完整性保护。
发明内容
本申请实施例所要解决的技术问题在于,提供一种数据传输系统、方法及其装置,可以有效防止定位隐私设置数据被篡改,从而确保用户终端与UDM网元之间的定位隐私设置数据的端到端完整性保护。
本申请实施例第一方面提供一种数据传输传输系统,该系统包括用户终端和数据管理网元;
用户终端,用于计算第一定位隐私设置数据的第一消息校验码,并向数据管理网元发送第一消息校验码和第一定位隐私设置数据;
数据管理网元,用于接收来自用户终端的第一消息校验码和第一定位隐私设置数据;获取第一定位隐私设置数据的第二消息校验码;若第一消息校验码与第二消息校验码相同,确定第一定位隐私设置数据未被篡改,并存储第一定位隐私设置数据。
第一方面,数据管理网元通过比较第一消息校验码与第二消息校验码,来判断第一定 位隐私设置数据是否被篡改,可以有效防止定位隐私设置数据被篡改,从而确保用户终端与数据管理网元之间的定位隐私设置数据的端到端完整性保护。在未被篡改的情况下,存储第一定位隐私设置数据,以便其他网元可以从数据管理网元获取用户终端的定位隐私设置数据。
其中,用户终端向数据管理网元发送第一消息校验码和第一定位隐私设置数据时,可通过接入网和核心网网元向数据管理网元发送第一消息校验码和第一定位隐私设置数据。在一种可能的实现方式,核心网网元包括接入管理网元,此时用户终端可依次通过接入网和接入管理网元向数据管理网元发送第一消息校验码和第一定位隐私设置数据;在另一种可能的实现方式中,核心网网元包括接入管理网元和位置管理网元,此时用户终端可依次通过接入网、接入管理网元和位置管理网元向数据管理网元发送第一消息校验码和第一定位隐私设置数据;在又一种可能的实现方式中,核心网网元包括接入管理网元、位置管理网元和网关移动定位网元,此时用户终端可依次通过接入网、接入管理网元、位置管理网元和网关移动定位网元向数据管理网元发送第一消息校验码和第一定位隐私设置数据。网关移动定位网元可包括归属网关移动定位网元和拜访网关移动定位网元,用户终端可依次通过接入网、接入管理网元、位置管理网元、拜访网关移动定位网元和归属网关移动定位网元向数据管理网元发送第一消息校验码和第一定位隐私设置数据。
结合第一方面,在一种可能的实现方式中,在数据管理网元判断出第一消息校验码与第二消息校验码相同之后,用户终端可进行二次校验。数据管理网元获取第一定位隐私设置数据的第三消息校验码,在判断出第一消息校验码与第二消息校验码相同的情况下,向用户终端发送第三消息校验码;用户终端在接收到第三消息校验码时,计算第一定位隐私设置数据的第四消息校验码,并判断第三消息校验码与第四消息校验码是否相同,若相同,则确定第一定位隐私设置数据未被篡改。两次校验,进一步确保用户终端与数据管理网元之间的定位隐私设置数据的端到端完整性保护。
其中,用户终端可根据第一新鲜性参数计算第一定位隐私设置数据的第一消息校验码,第一新鲜性参数包括第一计数器值和第一功能计数器值,用户终端可将第一新鲜性参数告知数据管理网元,以便数据管理网元根据第一新鲜性参数获取第一定位隐私设置数据的第二消息校验码;用户终端根据第二新鲜性参数计算第一定位隐私设置数据的第四消息校验码,第二定位隐私设置数据包括第一计数器值和第二功能计数器值;第二功能计数器值与第一功能计数器值不相同。
或,用户终端根据第一随机数值计算第一定位隐私设置数据的第一消息校验码,根据第二随机数值计算第一定位隐私设置数据的第二消息校验码。第一随机数值由用户终端生成,用户终端可将第一随机数值告知数据管理网元,以便数据管理网元根据第一随机数值获取第一定位隐私设置数据的第二消息校验码。第二随机数值由数据管理网元或认证服务网元生成,然后数据管理网元或认证服务网元将第二随机数值告知用户终端,以便用户终端根据第二随机数值计算第一定位隐私设置数据的第四消息校验码。
其中,数据管理网元获取第一定位隐私设置数据的第二消息校验码,可以是数据管理网元自主计算第一定位隐私设置数据的第二消息校验码,例如根据第一新鲜性参数或第一随机数值计算第一定位隐私设置数据的第二消息校验码;也可以是数据管理网元从认证服 务网元获取第一定位隐私设置数据的第二消息校验码,例如数据管理网元将第一新鲜性参数告知认证服务网元,然后认证服务网元根据第一新鲜性参数计算第一定位隐私设置数据的第二消息校验码,然后将第二消息校验码告知数据管理网元。
结合第一方面,在一种可能的实现方式中,用户终端还用于向数据管理网元发送第一新鲜性参数,第一新鲜性参数与第一消息校验码和第一定位隐私设置数据可携带在同一消息中。用户终端告知数据管理网元第一新鲜性参数,以便数据管理网元将第一新鲜性参数告知认证服务网元,以便认证服务网元根据第一新鲜性参数计算第一定位隐私设置数据的第二消息校验码。
结合第一方面,在一种可能的实现方式中,该数据传输系统还包括接入管理网元和网关移动定位网元,
网关移动定位网元,用于向接入管理网元发送定位服务请求;
接入管理网元,用于接收来自网关移动定位网元的定位服务请求,并向数据管理网元发送定位隐私设置数据获取请求;接收来自数据管理网元的定位隐私设置数据获取响应,定位隐私设置数据获取响应包括第一定位隐私设置数据;根据第一定位隐私设置数据执行定位服务操作。
接入管理网元从数据管理网元获取第一定位隐私设置数据并根据第一定位隐私设置数据执行定位服务操作,可避免网关移动定位网元向接入管理网元下发与第一定位隐私设置数据不匹配的动作指示信息,从而有效保护用户终端的位置信息。
结合第一方面,在一种可能的实现方式中,接入管理网元根据第一定位隐私设置数据执行定位服务操作时,具体用于若第一定位隐私设置数据为允许定位但需要通知用户,则通过接入网向用户终端发送通知消息,并请求获取用户终端的位置信息;若第一定位隐私设置数据为允许定位但不需要通知用户,则请求获取用户终端的位置信息;若第一定位隐私设置数据为需要通知用户并由用户授权是否允许定位,则通过接入网向用户终端发送通知消息,并在接收到来自用户终端的允许定位消息时,请求获取用户终端的位置信息。
结合第一方面,在一种可能的实现方式中,上述定位隐私设置数据获取响应还包括第一指示信息,第一指示信息用于指示第一定位隐私设置数据首次被接入管理网元请求;接入管理网元用于根据第一定位隐私设置数据执行定位服务操作之前,还用于根据第一指示信息从用户终端获取第二定位隐私设置数据;若第二定位隐私设置数据与第一定位隐私设置数据相同,则执行根据第一定位隐私设置数据执行定位服务操作的操作。
接入管理网元在接收到第一指示信息的情况下,从用户终端获取第二定位隐私设置数据,以判断数据管理网元存储的用户终端的定位隐私设置数据是否为最新的定位隐私设置数据。
结合第一方面,在一种可能的实现方式中,接入管理网元还用于若第二定位隐私设置数据与第一定位隐私设置数据不相同,则根据第二定位隐私设置数据执行定位服务操作,即根据最新的定位隐私设置数据执行相应的定位服务操作,并向数据管理网元发送第二定位隐私设置数据;数据管理网元,还用于接收来自接入管理网元的第二定位隐私设置数据,并将存储的用户终端的定位隐私设置数据由第一定位隐私设置数据更新为第二定位隐私设置数据,使得数据管理网元存储最新的定位隐私设置数据。
结合第一方面,在一种可能的实现方式中,网关移动定位网元下发的定位服务请求包括动作指示信息,该动作指示信息用于指示定位服务操作,接入管理网元在接收到该动作指示信息时,检验该动作指示信息与第一定位隐私设置数据是否匹配,若匹配,则确定网关移动定位网元未篡改第一定位隐私设置数据;若不匹配,则确定网关移动定位网元篡改了第一定位隐私设置数据,此时接入管理网元可上报网关移动定位网元篡改第一定位隐私设置数据的错误原因。
结合第一方面,在一种可能的实现方式中,该数据传输系统还包括接入管理网元和网关移动定位网元,
网关移动定位网元,用于向数据管理网元发送定位隐私设置数据获取请求,定位隐私数据获取请求包括第三新鲜性参数,第三新鲜性参数包括第二计数器值和第三功能计数器值;
数据管理网元,还用于接收来自网关移动定位网元的定位隐私设置数据获取请求;根据第三新鲜性参数对第一定位隐私设置数据进行数字签名,得到数字签名数据;向网关移动定位网元发送定位隐私设置数据获取响应,定位隐私设置数据获取响应包括第一定位隐私设置数据、数字签名数据和第三新鲜性参数;
网关移动定位网元,还用于向接入管理网元发送定位服务请求,定位服务请求包括动作指示信息、数字签名数据和第三新鲜性参数,动作指示信息用于指示定位服务操作;
接入管理网元,用于接收来自接入管理网元的定位服务请求,根据数据管理网元的公钥检验数字签名数据与动作指示信息是否匹配;若匹配,则确定网关移动定位网元未篡改第一定位隐私设置数据;若不匹配,则根据解数字签名数据得到的第一定位隐私设置数据执行定位服务操作。
数据管理网元通过对第一定位隐私设置数据进行数字签名,以防止网关移动定位网元下发与第一定位隐私设置数据不匹配的动作指示信息,从而有效保护用户终端的位置信息。
本申请实施例第二方面提供一种数据传输方法,包括:
用户终端计算第一定位隐私设置数据的第一消息校验码;
用户终端向数据管理网元发送第一消息校验码和第一定位隐私设置数据。
本申请实施例第二方面,用户终端将第一消息校验码和第一定位隐私设置数据发送至数据管理网元,以使数据管理网元通过比较第一消息校验码与获取的第二消息校验码,来判断第一定位隐私设置数据是否被篡改,可以有效防止定位隐私设置数据被篡改,从而确保用户终端与数据管理网元之间的定位隐私设置数据的端到端完整性保护。
结合第二方面,在一种可能的实现方式中,用户终端根据第一新鲜性参数计算第一定位隐私设置数据的第一消息校验码;第一新鲜性参数包括第一计数器值和第一功能计数器值。或用户终端根据第一随机数值计算第一定位隐私设置数据的第一消息校验码。
结合第二方面,在一种可能的实现方式中,用户终端还向数据管理网元发送第一新鲜性参数,以便数据管理网元获取第二消息校验码。
结合第二方面,在一种可能的实现方式中,用户终端接收来自数据管理网元的第三消息校验码,并计算第一定位隐私设置数据的第四消息校验码;若第三消息校验码与第四消息校验码相同,则用户终端确定第一定位隐私设置数据未被篡改。用户终端进行二次校验, 进一步确保用户终端与数据管理网元之间的定位隐私设置数据的端到端完整性保护。
结合第二方面,在一种可能的实现方式中,用户终端根据第二新鲜性参数计算第一定位隐私设置数据的第四消息校验码;第二新鲜性参数包括第一计数器值和/或第二功能计数器值,第二功能计数器值与第一功能计数器值不相同。第一功能计数器值针对用户终端,第二功能计数器值针对认证服务网元或数据管理网元。
或用户终端根据第二随机数值计算第一定位隐私设置数据的第四消息校验码,第二随机数值由数据管理网元或认证服务网元生成,可与第三消息校验码一同发送至用户终端。
本申请实施例第三方面提供一种用户终端,该用户终端具有实现第二方面提供方法的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
在一种可能的实现方式中,该用户终端包括:处理单元和收发单元;处理单元,用于计算第一定位隐私设置数据的第一消息校验码;收发单元,用于向数据管理网元发送第一消息校验码和第一定位隐私设置数据。
在一种可能的实现方式中,该用户终端包括:处理器、收发器和存储器,其中,存储器中存储计算机程序,计算机程序包括程序指令,处理器被配置用于调用程序代码,执行以下操作:计算第一定位隐私设置数据的第一消息校验码;控制收发器向数据管理网元发送第一消息校验码和第一定位隐私设置数据。
基于同一发明构思,由于该用户终端解决问题的原理以及有益效果可以参见第二方面所述的方法以及所带来的有益效果,因此该装置的实施可以参见方法的实施,重复之处不再赘述。
本申请实施例第四方面提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述第二方面所述的方法。
本申请实施例第五方面提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第二方面所述的方法。
本申请实施例第六方面提供一种数据传输方法,包括:
数据管理网元接收来自用户终端的第一消息校验码和第一定位隐私设置数据;
数据管理网元获取第一定位隐私设置数据的第二消息校验码;
若第二消息校验码与第一消息校验码相同,则数据管理网元确定第一定位隐私设置数未被篡改,并存储第一定位隐私设置数据。
第六方面,数据管理网元检验第一消息校验码与第二消息校验码是否相同,从而确定第一定位隐私设置数据是否被篡改,从而可以有效防止定位隐私设置数据被篡改,确保用户终端与数据管理网元之间的定位隐私设置数据的端到端完整性保护。
结合第六方面,在一种可能的实现方式中,数据管理网元可自主计算第一定位隐私设置数据的第二消息校验码,例如根据第一新鲜性参数或第一随机数值计算第一定位隐私设置数据的第二消息校验码;也可以是数据管理网元从认证服务网元获取第一定位隐私设置数据的第二消息校验码,例如数据管理网元将第一新鲜性参数告知认证服务网元,然后认证服务网元根据第一新鲜性参数计算第一定位隐私设置数据的第二消息校验码,然后将第二消息校验码告知数据管理网元。
结合第六方面,在一种可能的实现方式中,数据管理网元获取第一定位隐私设置数据的第三消息校验码,并向用户终端发送第三消息校验码。数据管理网元可自主计算第一定位隐私设置数据的第三消息校验码,例如根据第二新鲜性参数或第二随机数值计算第一定位隐私设置数据的第三消息校验码;也可以是数据管理网元从认证服务网元获取第一定位隐私设置数据的第三消息校验码,例如认证服务网元根据第二新鲜性参数计算第一定位隐私设置数据的第三消息校验码,然后将第三消息校验码告知数据管理网元。
结合第六方面,在一种可能的实现方式中,数据管理网元在接收到来自接入管理网元的第二定位隐私设置数据时,将存储的用户终端的定位隐私设置数据由第一定位隐私设置数据更新为第二定位隐私设置数据,以便其他网元可以从数据管理网元获取用户终端的定位隐私设置数据。
结合第六方面,在一种可能的实现方式中,数据管理网元接收来自网关移动定位网元的定位隐私设置数据获取请求,定位隐私数据获取请求包括第三新鲜性参数,第三新鲜性参数包括第三计数器值和第三功能计数器值;根据第三新鲜性参数对第一定位隐私设置数据进行数字签名,得到数字签名数据;向网关移动定位网元发送定位隐私设置数据获取响应,定位隐私设置数据获取响应包括第一定位隐私设置数据、数字签名数据和第三新鲜性参数。或,数据管理网元根据一个随机数值对第一定位隐私设置数据进行数字签名,得到数字签名数据,然后将该随机数值、数字签名数据以及第一定位隐私设置数据发送至网关移动定位网元。
数据管理网元向网关移动定位网元提供第一定位隐私设置数据的同时,提供数字签名数据,以便接入管理网元根据数字签名数据检验网关移动定位网元下发的动作指示信息是否正确,从而可以有效保护用户终端的位置信息。
本申请实施例第七方面提供一种数据管理网元,该数据管理网元具有实现第六方面提供方法的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
在一种可能的实现方式中,该数据管理网元包括:处理单元、收发单元和存储单元;收发单元,用于接收来自用户终端的第一消息校验码和第一定位隐私设置数据,获取第一定位隐私设置数据的第二消息校验码;处理单元,用于若第二消息校验码与第一消息校验码相同,则确定第一定位隐私设置数未被篡改;存储单元,用于存储第一定位隐私设置数据。
在一种可能的实现方式中,该数据管理网元包括:处理器、收发器和存储器,其中,存储器中存储计算机程序,计算机程序包括程序指令,处理器被配置用于调用程序代码,执行以下操作:控制收发器接收来自用户终端的第一消息校验码和第一定位隐私设置数据;获取第一定位隐私设置数据的第二消息校验码;若第二消息校验码与第一消息校验码相同,则确定第一定位隐私设置数未被篡改,控制存储器存储第一定位隐私设置数据。
基于同一发明构思,由于该数据管理网元解决问题的原理以及有益效果可以参见第六方面所述的方法以及所带来的有益效果,因此该装置的实施可以参见方法的实施,重复之处不再赘述。
本申请实施例第八方面提供一种计算机可读存储介质,所述计算机可读存储介质中存 储有指令,当其在计算机上运行时,使得计算机执行上述第六方面所述的方法。
本申请实施例第九方面提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第六方面所述的方法。
本申请实施例第十方面提供一种数据传输方法,包括:
接入管理网元在接收到来自网关移动定位网元的定位服务请求时,向数据管理网元发送定位隐私设置数据获取请求;
接入管理网元接收来自数据管理网元的定位隐私设置数据获取响应,定位隐私设置数据获取响应包括第一定位隐私设置数据;
接入管理网元根据第一定位隐私设置数据执行定位服务操作。
第十方面,接入管理网元直接从数据管理网元获取第一定位隐私设置数据,并根据第一定位隐私设置数据执行相应的定位服务操作,可防止用户终端的位置信息被非法获取,从而有效保护用户终端的位置信息。
结合第十方面,在一种可能的实现方式中,接入管理网元根据第一定位隐私设置数据执行定位服务操作,包括:
若第一定位隐私设置数据为允许定位但需要通知用户,则接入管理网元通过接入网向用户终端发送通知消息,并请求获取用户终端的位置信息;
若第一定位隐私设置数据为允许定位但不需要通知用户,则接入管理网元请求获取用户终端的位置信息;
若第一定位隐私设置数据为需要通知用户并由用户授权是否允许定位,则接入管理网元通过接入网向用户终端发送通知消息,并在接收到来自用户终端的允许定位消息时,请求获取用户终端的位置信息。
结合第十方面,在一种可能的实现方式中,定位隐私设置数据获取响应还包括第一指示信息,第一指示信息用于指示第一定位隐私设置数据首次被接入管理网元请求;
接入管理网元根据第一定位隐私设置数据执行定位服务操作之前,还根据第一指示信息从用户终端获取第二定位隐私设置数据;若第二定位隐私设置数据与第一定位隐私设置数据相同,则执行根据第一定位隐私设置数据执行定位服务操作的步骤。
结合第十方面,在一种可能的实现方式中,若第二定位隐私设置数据与第一定位隐私设置数据不相同,则接入管理网元根据第二定位隐私设置数据执行定位服务操作,并向数据管理网元发送第二定位隐私设置数据,以便数据管理网元存储最新的定位隐私设置数据。
结合第十方面,在一种可能的实现方式中,接入管理网元在获取到用户终端的位置信息的情况下,生成第二指示信息,第二指示信息用于指示对用户终端的定位完成,并向网关移动定位网元发送用户终端的位置信息和第二指示信息,以便外部客户端可以获知用户终端的位置信息。
本申请实施例第十一方面提供一种接入管理网元,该接入管理网元具有实现第十方面提供方法的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
在一种可能的实现方式中,该接入管理网元包括:处理单元和收发单元;收发单元,用于在接收到来自网关移动定位网元的定位服务请求时,向数据管理网元发送定位隐私设 置数据获取请求;接收来自数据管理网元的定位隐私设置数据获取响应,定位隐私设置数据获取响应包括第一定位隐私设置数据;处理单元,用于根据第一定位隐私设置数据执行定位服务操作。
在一种可能的实现方式中,该接入管理网元包括:处理器、收发器和存储器,其中,存储器中存储计算机程序,计算机程序包括程序指令,处理器被配置用于调用程序代码,执行以下操作:控制收发器在接收到来自网关移动定位网元的定位服务请求时,向数据管理网元发送定位隐私设置数据获取请求,接收来自数据管理网元的定位隐私设置数据获取响应,定位隐私设置数据获取响应包括第一定位隐私设置数据;根据第一定位隐私设置数据执行定位服务操作。
基于同一发明构思,由于该接入管理网元解决问题的原理以及有益效果可以参见第十方面所述的方法以及所带来的有益效果,因此该装置的实施可以参见方法的实施,重复之处不再赘述。
本申请实施例第八方面提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述第十方面所述的方法。
本申请实施例第九方面提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第十方面所述的方法。
附图说明
为了更清楚地说明本申请实施例或背景技术中的技术方案,下面将对本申请实施例或背景技术中所需要使用的附图进行说明。
图1为5G系统的网络架构示意图;
图2为目前在漫游场景下的定位隐私设置数据更新的流程示意图;
图3为目前在漫游场景下的外部客户端获取UE的位置信息的流程示意图;
图4为应用本申请实施例的网络架构示意图;
图5为本申请实施例一提供的数据传输方法的流程示意图;
图5a为本申请实施例一提供的另一种数据传输方法的流程示意图;
图6为本申请实施例二提供的数据传输方法的流程示意图;
图7为本申请实施例三提供的数据传输方法的流程示意图;
图8为本申请实施例四提供的数据传输方法的流程示意图;
图9为本申请实施例提供的通信装置的逻辑结构示意图;
图10为本申请实施例提供的通信装置的实体结构简化示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,在本申请的描述中,除非另有说明,“/”表示前后关联的对象是一种“或”的关系,例如,A/B可以表示A或B;本申请中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。并且,在本申请的描述中,除非另有说明,“多个”是指两个或多于两个。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包 括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。
此外,本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
本申请实施例所涉及的用户终端可以包括各种具有无线通信功能的手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其它处理设备;还可以包括UE、用户单元(subscriber unit)、蜂窝电话(cellular phone)、智能电话(smart phone)、无线数据卡、个人数字助理(personal digital assistant,PDA)电脑、平板型电脑、无线调制解调器(modem)、手持设备(handheld)、膝上型电脑(laptop computer)、无绳电话(cordless phone)或者无线本地环路(wireless local loop,WLL)台、机器类型通信(machine type communication,MTC)终端、UE,移动台(mobile station,MS),终端设备(terminal device)或者中继用户设备等。其中,中继用户设备例如可以是5G家庭网关(residential gateway,RG)。为方便描述,本申请实施例中,上面提到的设备统称为用户终端,并且用户终端以UE为例进行介绍。
请参见图1,为5G系统的网络架构示意图,该网络架构包括UE、接入网(access network,AN)设备和核心网网元。
其中,接入网设备也可以是RAN设备。
其中,核心网网元可以包括这些网元:用户面功能(user plane function,UPF)、数据网络(data network,DN)、鉴权服务器功能(authentication server function,AUSF)、AMF、会话管理功能(session management function,SMF)、位置管理功能(location management function,LMF)、网络切片选择功能(network slice selection function,NSSF)、网络开放功能(network exposure function,NEF)、网络存储功能(network repository function,NRF)、策略控制功能(policy control function,PCF)、UDM和应用功能(application,AF)。
AMF网元,非接入层(Non-access stratum,NAS)信令的终结点,主要负责用户的接入和移动性管理。
SMF网元,负责管理用户(protocol data unit,PDU)会话的创建、删除等,维护PDU会话上下文及用户面转发管道信息。
LMF网元,用于支持定位测定,获取定位测量信息等。
NSSF网元,用于支持基于用户请求的和签约的网络切片选择辅助信息(network slice selection assistance information,NSSAI)、用户位置区域、切片容量、切片当前负荷等信息,进行切片的灵活选择。
NEF网元,用于支持能力和事件开放,为外部应用安全提供信息、内外信息翻译等功 能。
NRF网元,用于允许每个网络功能发现其他网络功能,并为发现提供服务。
PCF网元,用于生成、管理用户、会话、服务质量(quality of service,QoS)流处理策略。
UDM网元,用于支持第三代合作伙伴计划(3 rd-generation partnership project,3GPP)认证、用户身份操作、权限授予、注册和移动性管理等功能。
AF网元,为提供各种业务服务的功能网元,提供网络能力开放相关的框架、鉴权和接口,在5G系统网络功能和其他网络功能之间传递信息。
图1所示的网络架构示意图中,本申请实施例涉及的网元包括UE、RAN、AMF、LMF、UDM、AUSF和NEF。
本申请实施例涉及的网元除了包括5G网络架构中的网元之外,还包括GMLC网元。GMLC网元作为外部定位应用接入核心网的第一网元,执行注册鉴权的任务,并从UDM网元请求路由信息。GMLC网元可以是一个独立的网络功能(network function)网元,也可以包含在NEF网元中。
图1所示的网络架构示意图中,还包括各个网元之间的接口,例如N2表示AMF网元与RAN设备之间的接口;还包括网元与通信总线之间的接口,例如Namf表示AMF网元与通信总线之间的接口。
请参见图2,为目前在漫游场景下的定位隐私设置数据更新的流程示意图。对于使用5G定位服务的UE,用户可以随时在UE上更改定位隐私设置数据,在漫游场景下的更新过程如图2所示。图2所示的流程示意图包括如下步骤:
1,UE通过RAN向AMF或LMF发送定位隐私设置数据更新请求(例如为privacy setting update request),该定位隐私设置数据更新请求携带定位隐私设置数据。相应的,AMF或LMF接收来自UE的定位隐私设置数据更新请求。
2,AMF或LMF向拜访网关移动定位中心(visited gateway mobile location center,V-GMLC)发送更新消息(例如为Nudm_UECM_update),该更新消息携带UE上报的定位隐私设置数据。相应的,V-GMLC接收来自AMF或LMF的更新消息。
3,V-GMLC向归属网关移动定位中心(home gateway mobile location center,H-GMLC)发送更新消息(例如为Nudm_UECM_update),该更新消息携带UE上报的定位隐私设置数据。相应的,H-GMLC接收来自V-GMLC的更新消息。
4,H-GMLC向UDM发送更新消息(例如为Nudm_UECM_update),该更新消息携带UE上报的定位隐私设置数据。相应的,UDM接收来自H-GMLC的更新消息。UDM更新并保存UE上报的定位隐私设置数据,向H-GMLC发送更新消息(例如为Nudm_UECM_update),该更新消息用于指示UDM已更新。相应的,H-GMLC接收来自UDM的更新消息。
5,H-GMLC向V-GMLC发送更新消息(例如为Nudm_UECM_update),该更新消息用于指示UDM已更新。相应的,V-GMLC接收来自H-GMLC的更新消息。
6,V-GMLC向AMF或LMF发送更新消息(例如为Nudm_UECM_update),该更新消息用于指示UDM已更新。相应的,AMF或LMF接收来自V-GMLC的更新消息。
7,AMF或LMF向UE发送定位隐私设置数据更新响应(例如为privacy setting update response),该定位隐私设置数据更新响应用于响应定位隐私设置数据更新请求,用于指示UDM已更新UE上报的定位隐私设置数据。相应的,UE接收来自AMF或LMF的定位隐私设置数据更新响应。
在图2所示的流程示意图中,V-GMLC存在恶意修改UE上报的定位隐私设置数据的风险,而UE和UDM无法察觉是否被修改,导致UDM存储错误的定位隐私设置数据,使得UE与UDM之间的定位隐私设置数据缺乏有效的端到端完整性保护。
鉴于此,本申请实施例提供一种数据传输方法及其装置,可以有效防止定位隐私设置数据被篡改,从而确保UE与UDM之间的定位隐私设置数据的端到端完整性保护。本申请实施例一和实施例二可确保UE与UDM之间的定位隐私设置数据的端到端完整性保护。
请参见图3,为目前在漫游场景下的外部客户端获取UE的位置信息的流程示意图。其中,外部客户端(external client)用于请求获取UE的位置信息(例如,用户终端当前所处的位置),可以是UE上的应用程序,例如导航类应用程序需要获取UE的位置信息,也可以是UE上的应用程序对应的服务器,也可以是UE在运行过程中所调用的服务器。除了外部客户端可以请求获取UE的位置信息之外,核心网中的某些功能网元或网络单元也可以请求获取UE的位置信息。
图3所示的流程示意图包括如下步骤:
1,外部客户端向H-GMLC发送定位服务请求,该定位服务请求可以是定位服务(location service,LCS)service请求(request)。相应的,H-GMLC接收来自外部客户端的定位服务请求。外部客户端与H-GMLC可直接通信连接,例如图3中外部客户端直接向H-GMLC发送定位服务请求。外部客户端与H-GMLC之间可能存在NEF,外部客户端段可通过NEF向H-GMLC发送定位服务请求。
2,H-GMLC向UDM发送定位隐私设置数据获取请求,该定位隐私设置数据获取请求用于请求获取UE的定位隐私设置数据。该定位隐私设置数据获取请求可以是Nudm_UECM_Get_request。相应的,UDM接收来自H-GMLC的定位隐私设置数据获取请求。
3,UDM向H-GMLC发送定位隐私设置数据获取响应,用于响应定位隐私设置数据获取请求。该定位隐私设置数据获取响应可以是Nudm_UECM_Get_response。相应的,H-GMLC接收来自UDM的定位隐私设置数据获取响应。其中,定位隐私设置数据获取响应包括UE的定位隐私设置数据,H-GMLC在获取到UE的定位隐私设置数据时,若定位隐私设置数据为不允许定位,则H-GMLC直接向外部客户端反馈定位服务响应,该定位服务响应指示拒绝定位服务。在定位隐私设置数据不为不允许定位的情况下,可将该定位隐私设置数据转换为动作指示信息,用于指示AMF执行相应的定位服务操作。例如,定位隐私设置数据为需要通知用户并由用户授权是否允许定位,则动作指示信息用于指示AMF向UE发送通知消息并在接收到UE的允许定位消息时请求获取UE的位置信息,该通知消息用于请求UE是否允许外部客户端请求获取UE的位置信息,在UE允许定位的情况下,UE向AMF反馈允许定位消息。再例如,定位隐私设置数据为允许定位但需要通知用户,则动作指示信息用于指示AMF向UE发送通知消息并指示AMF请求获取UE的位置信息, 该通知消息用于指示外部客户端将获取UE的位置信息。再例如,定位隐私设置数据为允许定位但不需要通知用户,则动作指示信息用于指示AMF请求获取UE的位置信息。
4,H-GMLC向V-GMLC发送定位服务请求,该定位服务请求可以是LCS service request。相应的,V-GMLC接收来自H-GMLC的定位服务请求。其中,定位服务请求包括动作指示信息。例如,H-GMLC获取的定位隐私设置数据为允许定位时,H-GMLC向V-GMLC发送定位服务请求,该定位服务请求所携带的动作指示信息用于指示获取UE的位置信息。
5,V-GMLC向AMF发送定位服务请求。相应的,AMF接收来自V-GMLC的定位服务请求。该定位服务请求可以是Namf_Location_Provide_positioningInfo_request。该定位服务请求包括动作指示信息,以指示AMF执行相应的定位服务操作。
6,如果UE处于空闲态,则AMF向UE触发网络侧服务请求。UE处于空闲态表明UE和AMF没有建立NAS信令连接,则AMF触发UE侧的服务请求流程,建立UE和核心网之间的安全通信连接。
若动作指示信息指示AMF请求获取UE的位置信息并向UE发送通知消息,那么在执行步骤6的过程中,AMF通过RAN向UE发送通知消息,该通知消息用于通知用户外部客户端将获取UE的位置信息,然后AMF执行步骤7以及后续步骤。若动作指示信息指示AMF向UE发送通知消息并在接收到UE的允许定位消息时请求获取UE的位置信息,那么在执行步骤6的过程中,AMF通过RAN向UE发送通知消息,该通知消息用于请求用户是否允许外部客户端获取UE的位置信息,若用户授权允许定位则UE通过RAN向AMF发送允许定位消息,AMF在接收到该允许定位消息时执行步骤7以及后续步骤;若用户不授权定位则UE通过RAN向AMF发送拒绝定位消息,AMF在接收到该拒绝定位消息时,将其反馈至GMLC,由GMLC反馈至外部客户端。若动作指示信息指示AMF请求获取UE的位置信息,则AMF执行步骤7以及后续步骤。
7,AMF向LMF发送定位请求。相应的,LMF接收来自AMF的定位请求。该定位请求可以是Nlmf_Location_DetermineLocation Request。
8,LMF向AMF下发网络定位信息。相应的,AMF接收来自LMF的网络定位信息。LMF可通过Namf_Communication_N1N2传输(transfer)消息(message)向AMF下发网络定位信。
9,AMF向RAN下发网络定位信息。相应的,RAN接收来自AMF的网络定位信息。AMF可通过N2传输消息向RAN下发网络定位信息。
10,RAN获取测量数据,测量数据可以包括信号强度等。
11,RAN向AMF上报测量等网络定位信息。相应的,AMF接收来自RAN的测量等网络定位信息。RAN可通过N2传输消息向AMF发送测量等网络定位信息。
12,AMF向LMF上报测量等网络定位信息。相应的,LMF接收来自AMF的测量等网络定位信息。AMF可通过Namf_Communication_N1N2Info notify向AMF发送测量等网络定位信息。LMF可根据AMF上报的测量等网络定位信息计算得到UE的位置信息,例如若UE连接的是无线热点(wireless-fidelity,WIFI),LMF可根据无线热点的位置以及信号强度等网络定位信息计算得到UE的位置信息。
13,LMF向AMF下发UE的位置信息。相应的,AMF接收来自LMF的UE的位置信息。
14,AMF向V-GMLC上报UE的位置信息。相应的,V-GMLC接收来自AMF的UE的位置信息。
15,V-GMLC向H-GMLC上报UE的位置信息。相应的,H-GMLC接收来自V-GMLC的UE的位置信息。V-GMLC可将UE的位置信息携带在LCS service response中。
16,H-GMLC向外部客户端发送UE的位置信息。相应的,外部客户端接收来自H-GMLC的UE的位置信息。H-GMLC可将UE的位置信息携带在LCS service response中。
在图3所示的流程示意图中,如果UE的定位隐私设置数据为需要通知用户并由用户授权是否允许定位,但V-GMLC或H-GMLC向AMF下发错误的指示,为允许定位不需要通知用户,这样UE的位置信息将被非法获取而UE无法感知,造成UE的位置信息被泄露。拜访网络也可能篡改UE的定位隐私设置数据,导致GMLC下发错误的指示,其中拜访网络可以包括AMF,或包括AMF和LMF等。本申请实施例三和实施例四可克服该缺陷,防止拜访网络或GMLC下发错误的指示,从而有效保护UE的位置信息。
请参见图4,为应用本申请实施例的网络架构示意图,该网络架构包括用户终端、数据管理网元、接入管理网元和网关移动定位网元。图4所示的网络架构中省略了用户终端与接入管理网元之间的接入网设备,该接入网设备可以是RAN设备,也可以是AN设备。为了简便描述,在介绍图4所示的网络架构以及后续方法实施例中,实施例对应的图未示出“网元”两个字,实施例的具体描述中未指出“网元”两个字,但是这样并不影响对本申请实施例的理解。
用户终端可以是UE等用户设备;数据管理网元可以是5G系统中的UDM,也可以是未来通信系统中与UDM具有相同功能的网元;接入管理网元可以是5G系统中的AMF,也可以是未来通信系统中与AMF具有相同功能的网元;网元移动定位网元可以是GMLC,也可以是未来通信系统中与GMLC具有相同功能的网元。本申请实施例还涉及认证服务网元,可以是5G系统中的AUSF,也可以是未来通信系统中与AUSF具有相同功能的网元;还涉及位置管理网元,可以是5G系统中的LMF,也可以是未来通信系统中与LMF具有相同功能的网元。需要说明的是,本申请实施例中所涉及的各个网元的名称并不构成对本申请实施例的限定。
应用在本申请实施例中,用户终端可通过接入网和核心网网元向数据管理网元上报用户输入或更新的定位隐私设置数据。在一种可能的实现方式中,核心网网元包括接入管理网元;在另一种可能的实现方式中,核心网网元包括接入管理网元和位置管理网元;在又一种可能的实现方式中,核心网网元包括接入管理网元、位置管理网元和网关移动定位网元。用户终端在上报定位隐私设置数据时,可将其计算的定位隐私设置数据的第一消息校验码一同上报至数据管理网元,以便数据管理网元根据该第一消息校验码检验用户终端在向数据管理网元上报定位隐私设置数据的过程中是否被拜访网络或网关移动定位网元恶意修改。用户终端可以利用用户终端的私钥对用户输入或更新的定位隐私设置数据进行数字签名,以便数据管理网元根据该数字签名检验用户终端在向数据管理网元上报定位隐私设置数据的过程中是否被拜访网络或网关移动定位网元恶意修改。用户终端还可以进行二次 校验,进一步验证定位隐私设置数据是否被拜访网络或网关移动定位网元恶意修改。
应用在本申请实施例中,数据管理网元可存储、更新定位隐私设置数据,可对其存储的定位隐私设置数据进行数字签名,以便用户终端检验数据管理网元保存的定位隐私设置数据是否被篡改。在另一种可能的实现方式中,数据管理网元对定位隐私设置数据进行数字签名,以便接入管理网元检验网关移动定位网元下发与定位隐私设置数据不匹配的恶意指示。数据管理网元还可以获取定位隐私设置数据的第二消息校验码,在第一消息校验码与第二消息校验码相同的情况下,确定定位隐私设置数据未被篡改。数据管理网元可自主获取第二消息校验码,即自主计算第二消息校验码,也可以从认证服务网元获取认证服务网元计算的第二消息校验码。
应用在本申请实施例中,接入管理网元在接收到来自网关移动定位网元的定位服务请求时,向数据管理网元请求获取用户终端的定位隐私设置数据,根据该定位隐私设置数据执行相应的定位服务操作,例如,定位隐私设置数据为需要通知用户并由用户授权是否允许定位,则接入管理网元通过接入网向用户终端发送通知消息,并在接收到来自用户终端的允许定位消息时,请求获取用户终端的位置信息。接入管理网元还可以从用户终端获取用户终端当前的定位隐私设置数据,将其与从数据管理网元获取的定位隐私设置数据进行比较,若不相同,则接入管理网元可将当前的定位隐私设置数据发送至数据管理网元,以使数据管理网元更新用户终端的定位隐私设置数据。在另一种可能的实现方式中,接入管理网元在接收到来自网关移动定位网元的动作指示信息和数据签名数据时,检验数字签名数据与动作指示信息是否匹配,若不匹配,则确定网关移动定位网元下发错误的指示。
图4所示的网络架构还包括认证服务网元,应用在本申请实施例中,服务认证网元可计算得到第二消息校验码和第三消息校验码,服务认证网元可接收来自用户终端的第一消息校验码,并判断第一消息校验码和第二消息校验码是否相同,从而确定用户终端上报的定位隐私设置数据是否被篡改。服务认证网元也可将第二消息校验码和第三消息校验码发送至数据管理网元,由数据管理网元判断第一消息校验码和第二消息校验码是否相同,数据管理网元在判断相同的情况下,向用户终端下发第三消息校验码。
在本申请实施例中,用户终端以UE为例,接入管理网元以AMF网元为例,数据管理网元以UDM网元为例,认证服务网元以AUSF网元为例,网关移动定位网元以GMLC为例,位置管理网元以LMF为例进行介绍。
网关移动定位网元在漫游场景下可分为V-GMLC和H-GMLC,在非漫游场景下,可不区分V-GMLC和H-GMLC。H-GMLC与外部客户端可直接通信,也可以通过NEF进行通信。本申请实施例可以应用于漫游场景下,也可以应用非漫游场景下,若应用于非漫游场景下,则可将图5、图5a、图6、图7以及图8中的V-GMLC和H-GMLC当作一个GMLC处理。
下面将对本申请实施例涉及的术语或名称进行介绍。
定位隐私设置数据,用户在UE上设置的是否允许定位的数据,示例性的可以包括以下几种情况:1,不允许定位;2,需要通知用户并由用户授权是否允许定位,分为两种情况,一种只有在用户授权允许定位的情况下才进行定位,另一种是在用户授权允许定位的情况下进行定位或在用户无响应的情况下进行定位;3,允许定位但需要通知用户;4,允 许定位但不需要通知用户等。
新鲜性(fresh)参数(parameter),用于保护网络低空重放攻击。应用在本申请实施例中,新鲜性参数用于计算消息校验码以及进行数字签名。
消息(message)校验码,应用在本申请实施例中,用于校验定位隐私设置数据是否被篡改。
计数器(counter)值,是新鲜性参数的一种,用于表示特定消息发送的次数。
功能计数器(function,FC)值,是新鲜性参数的一种,根据功能对消息分配不同的计数器值。
下面将对本申请实施例提供的数据传输方法进行具体阐述。需要说明的是,图5、图5a以及图6-图8以漫游场景为例进行介绍。在介绍图5、图5a以及图6-图8所示的实施例时,省略了UE与AMF之间的接入网,实际应用中,UE与AMF之间存在接入网。
以本申请实施例应用于图4所示的网络架构示意图为例,如图5所示,为本申请实施例一提供的数据传输方法的流程示意图,该实施例通过UE对定位隐私设置数据计算消息校验码,可以有效防止定位隐私设置数据被篡改,从而确保UE与UDM之间的定位隐私设置数据的端到端完整性保护。图5所示实施例可包括但不限于如下步骤:
步骤S101,UE计算第一定位隐私设置数据的第一消息校验码。
其中,第一定位隐私设置数据为用户在UE上输入或更新的定位隐私设置数据。UE可对第一定位隐私设置数据进行保存,以便UE可以向UDM上报第一定位隐私设置数据。
UE可根据输入密钥以及第一输入参数计算第一定位隐私设置数据的第一消息校验码。具体的,UE推演出用于计算定位隐私设置数据的消息校验码的密钥,将该密钥作为输入密钥,UE使用该输入密码和第一输入参数对第一定位隐私设置数据计算哈希(hash)值,该哈希值为第一消息校验码。
其中,第一输入参数可以包括第一新鲜性参数和第一定位隐私设置数据等。第一新鲜性参数可以包括第一计数器(counter)值和/或第一功能计数器(function counter,FC)值。本申请实施例以新鲜性参数包括计数器值和FC值为例进行介绍。第一计数器值的具体数值由UE维护,第一FC值的具体数值是固定的。第一消息校验码可以表示为PS-MAC-Iue或MACue。Kausf是UE注册到网络时,UE和网络协商确定的密钥,网络侧的AUSF或者UDM可以推演确定相同的密钥Kausf,具体过程参考现有技术,这里不再赘述。
UE侧和网络侧使用相同的输入密钥和输入参数计算哈希值,若UE侧和网络侧计算得到的哈希值不同,则表明定位隐私设置数据在传输过程中被篡改。
步骤S102,如果UE处于空闲态,则触发UE侧的服务请求流程。
UE处于空闲态表明UE和AMF没有建立NAS信令连接,则触发UE侧的服务请求流程,建立UE和核心网之间的安全通信连接。如果UE处于连接态,则步骤S102可不执行。
步骤S103,UE通过RAN向AMF发送第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。相应的,AMF接收来自UE的第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。
UE可通过NAS传输(transport)消息向AMF发送第一消息校验码、第一新鲜性参数和第一定位隐私设置数据,即第一消息校验、第一新鲜性参数和第一定位隐私设置数据携 带在NAS传输消息中。其中,NAS消息可以是单独的NAS消息,也可以是注册请求(registration request)消息中的一部分。第一消息校验码、第一新鲜性参数和第一定位隐私设置数据还可以携带在UE向RAN发送的无线资源控制(radio resource control,RRC)连接(connection)重配置(reconfiguration)消息中,或者携带在RAN向AMF发送的N2消息中。
步骤S104,AMF向LMF发送第一消息检验码、第一新鲜性参数和第一定位隐私设置数据。相应的,LMF接收来自AMF的第一消息检验码、第一新鲜性参数和第一定位隐私设置数据。
AMF向LMF发送第一消息检验码、第一新鲜性参数和第一定位隐私设置数据时,可将第一消息检验码、第一新鲜性参数和第一定位隐私设置数据携带在一条消息中,该消息例如可以是Namf_Communication_N1 message notify。
步骤S105,LMF向V-GMLC发送第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。相应的,V-GMLC接收来自LMF的第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。
LMF向V-GMLC发送第一消息校验码、第一新鲜性参数和第一定位隐私设置数据时,可将第一消息校验码、第一新鲜性参数和第一定位隐私设置数据携带在一条消息中,该消息例如可以是Ngmlc_UesrPrivacy_Set request。
步骤S106,V-GMLC向H-GMLC发送第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。相应的,H-GMLC接收来自V-GMLC的第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。
V-GMLC向H-GMLC发送第一消息校验码、第一新鲜性参数和第一定位隐私设置数据时,可将第一消息校验码、第一新鲜性参数和第一定位隐私设置数据携带在一条消息中,该消息例如可以是Ngmlc_UesrPrivacy_Set request。
步骤S107,H-GMLC向UDM发送第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。相应的,UDM接收来自H-GMLC的第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。
H-GMLC向UDM发送第一消息校验码、第一新鲜性参数和第一定位隐私设置数据时,可将第一消息校验码、第一新鲜性参数和第一定位隐私设置数据携带在一条消息中,该消息例如可以是Nudm_UECM_Update request。
可以理解的是,步骤S103-步骤S107为UE通过RAN和核心网网元向UDM上报第一消息校验码、第一新鲜性参数和第一定位隐私设置数据的过程,该过程所涉及的核心网网元包括AMF、LMF、V-GMLC和H-GMLC,上报过程为UE->AMF->LMF->V-GMLC->H-GMLC->UDM。
在一种可能的实现方式中,UE通过RAN和AMF向UDM上报第一消息校验码、第一新鲜性参数和第一定位隐私设置数据,此时涉及的核心网网元包括AMF,上报过程为UE->AMF->UDM。在另一种可能的实现方式中,UE通过RAN、AMF和LMF向UDM上报第一消息校验码、第一新鲜性参数和第一定位隐私设置数据,此时涉及的核心网网元包括AMF和LMF,上报过程为UE->AMF->LMF->UDM。
在非漫游场景下,LMF可向GMLC发送第一消息校验码、第一新鲜性参数和第一定位隐私设置数据,然后GMLC向UDM发送第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。非漫游场景下,UE向UDM上报第一消息校验码、第一新鲜性参数和第一定位隐私设置数据的过程可为UE->AMF->UDM,UE->AMF->LMF->UDM,或UE->AMF->LMF->GMLC->UDM。
本申请实施例中不限定UE通过何种方式向UDM上报,也不限定UDM通过何种方式向UE下发。
第一新鲜性参数包括第一计数器值和第一FC值,由于第一FC值是固定的,核心网中的网元可获知,那么在步骤S103-步骤S107中传输的第一新鲜性参数具体可为第一计数器值。
步骤S108,UDM向AUSF发送第一定位隐私设置数据和第一新鲜性参数。相应的,AUSF接收来自UDM的第一定位隐私设置数据和第一新鲜性参数。
UDM向AUSF发送第一定位隐私设置数据和第一新鲜性参数时,可将第一定位隐私设置数据和第一新鲜性参数携带在一条消息中,该消息例如可以是Nausf_protection request。
步骤S109,AUSF计算第一定位隐私设置数据的第二消息校验码和第三消息校验码。
AUSF可根据输入密钥Kausf以及第一输入参数计算第一定位隐私设置数据的第二消息校验码。第二消息校验码可以表示为PS-MAC-Iue’或MACue’。
AUSF可根据输入密钥Kausf以及第二输入参数对定位隐私设置数据计算第三消息校验码。其中,第二输入参数可以包括第二新鲜性参数和第一定位隐私设置数据,第二新鲜性参数包括第一计数器值和/或第二FC值。第二FC值的具体数值是固定的,但是第二FC值与第一FC值不相同。第三消息校验码可以表示为PS-MAC-Iausf或MACausf。
步骤S110,AUSF向UDM发送第二消息校验码和第三消息校验码。相应的,UDM接收来自AUSF的第二消息校验码和第三消息校验码。
AUSF向UDM发送第二消息校验码和第三消息校验码时,可将第二消息校验码和第三消息校验码携带在一条消息中,该消息例如可以是Nausf_protection response。
步骤S111,UDM判断第一消息校验码与第二消息校验码是否相同。
UDM判断第一消息校验码与第二消息校验码是否相同,若相同,则表明UE向UDM上报的第一定位隐私设置数据未被拜访网络或GMLC恶意修改,UDM存储并更新UE的定位隐私设置数据,即将接收到的第一定位隐私设置数据作为UE最新的定位隐私设置数据进行存储。若不相同,则表明UE向UDM上报的第一定位隐私设置数据被拜访网络或GMLC恶意修改。
步骤S112,UDM向H-GMLC发送第三消息校验码。相应的,H-GMLC接收来自UDM的第三消息校验码。
在第一消息校验码与第二消息校验码相同的情况下,UDM可通过一条消息向H-GMLC发送第三消息校验码,该消息例如可以是Nudm_UECM_Update response。
步骤S113,H-GMLC向V-GMLC发送第三消息校验码。相应的,V-GMLC接收来自H-GMLC的第三消息校验码。
H-GMLC可通过一条消息向V-GMLC发送第三消息校验码,该消息例如可以是 Ngmlc_UesrPrivacy_Set response。
步骤S114,V-GMLC向LMF发送第三消息校验码。相应的,LMF接收来自V-GMLC的第三消息校验码。
V-GMLC可通过一条消息向LMF发送第三消息校验码,该消息例如可以是Ngmlc_UesrPrivacy_Set response。
步骤S115,LMF向AMF发送第三消息校验码。相应的,AMF接收来自LMF的第三消息校验码。
LMF可通过一条消息向AMF发送第三消息校验码,该消息例如可以是Namf_Communication_N1 message notify。
步骤S116,AMF向UE发送第三消息校验码。相应的,UE接收来自LMF的第三消息校验码。
AMF通过RAN向UE发送第三消息校验码。AMF可通过一条消息向UE发送第三消息校验码,该消息例如可以是NAS transport消息。
可以理解的是,步骤S109-步骤S113为UDM向UE下发第三消息校验码的过程,该过程为UDM->H-GMLC->V-GMLC->LMF->AMF->UE。在一种可能的实现方式中,UDM通过RAN和AMF向UE下发第三消息校验码,下发过程为UDM->AMF->UE。在另一种可能的实现方式中,UDM通过RAN、AMF和LMF向UE下发第三消息校验码,下发过程为UDM->LMF->AMF->UE。
在非漫游场景下,UDM可向GMLC发送第三消息校验码,然后GMLC向LMF发送第三消息校验码。在非漫游场景下,UDM向UE下发第三消息校验码的过程可为UDM->GMLC->LMF->AMF->UE,UDM->AMF->UE或UDM->LMF->AMF->UE。
步骤S117,UE计算第一定位隐私设置数据的第四消息校验码,并判断第三消息校验码与第四消息校验码是否相同。
UE可根据输入密钥Kausf以及第二输入参数对定位隐私设置数据计算第三消息校验码。其中,第二输入参数可以包括第二新鲜性参数和第一定位隐私设置数据,第二新鲜性参数包括第一计数器值和/或第二FC值。第二FC值的具体数值是固定的,但是第二FC值与第一FC值不相同。第三消息校验码可以表示为PS-MAC-Iausf或MACausf。
可以理解的是,第二FC值为针对AUSF的,第一FC值为针对UE的,第一FC值用于计算第一消息校验码和第二消息校验码,第二FC值用于计算第三消息校验码和第四消息校验码,以便进行二次校验,在图5所示的实施例一中,一次校验由UDM执行,一次校验由UE执行。
第四消息校验码可以表示为PS-MAC-Iausf’或MACausf’。
若第三消息校验码与第四消息检验码相同,则UE向UDM上报的第一定位隐私设置数据未被拜访网络或GMLC恶意修改。若第三消息校验码与第四消息检验码不相同,则表明UE向UDM上报的第一定位隐私设置数据被拜访网络或GMLC恶意修改。
在图5所示的实施例一中,UE计算第一定位隐私设置数据的第一消息校验码,AUSF计算第一定位隐私设置数据的第二消息校验码和第三消息校验码,UDM判断第一消息校验码与第二消息校验码是否相同,UE在接收到第三消息校验码时,计算第四消息校验码并判 断第三消息检验码与第四消息检验码是否相同,两次校验过程,可以有效防止定位隐私设置数据被篡改,从而确保UE与UDM之间的定位隐私设置数据的端到端完整性保护。
需要说明的是,根据新鲜性参数计算消息校验码是一种可能的实现方式,并不构成对本申请实施例的限定,例如还可以根据随机数值来计算消息校验码,具体的:UE根据第一随机数值计算第一定位隐私设置数据的第一消息校验码,然后UE向UDM发送第一消息校验码、第一定位隐私设置数据和第一随机数值;UDM将第一随机数值和第一定位隐私设置数据发送至AUSF;AUSF根据第一随机数值计算第二消息校验码,生成第二随机数值,根据第二随机数值计算第三消息校验码,然后AUSF向UDM发送第二消息校验码、第三消息校验码以及第二随机数值;UDM在判断出第二消息校验码与第三消息校验码相同的情况下,向UE下发第三消息校验码和第二随机数值;UE根据第二随机数值计算第四消息校验码。
进一步的,后续实施例中根据新鲜性参数进行数字签名也是一种可能的实现方式,并不构成对本申请实施例的限定,例如UE根据一个随机数值和UE的私钥对第一定位隐私设置数据进行数字签名,UDM根据另一个随机数值和UDM的私钥对第一定位隐私设置数据进行数字签名。
图5所示的实施例一,UDM从AUSF获取第二消息校验码是一种可能的实现方式,并不构成对本申请实施例的限定,UDM也可以通过其他方式获取第二消息校验码,例如UDM自主计算第二消息校验码。同理第三消息校验码。
以本申请实施例应用于图4所示的网络架构示意图为例,如图5a所示,为本申请实施例一提供的另一种数据传输方法的流程示意图,该实施例通过UE对定位隐私设置数据计算消息校验码,可以有效防止定位隐私设置数据被篡改,从而确保UE与UDM之间的定位隐私设置数据的端到端完整性保护。图5a与图5所示实施例相同的部分可参见图5的具体描述。图5a与图5的区别在于,图5由UDM进行一次校验,由UE进行一次校验,而图5a由AUSF进行一次校验,由UE进行一次校验。图5a所示实施例可包括但不限于如下步骤:
步骤S101a,UE计算第一定位隐私设置数据的第一消息校验码。
步骤S102a,如果UE处于空闲态,则触发UE侧的服务请求流程。
步骤S103a,UE通过RAN向AMF发送第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。相应的,AMF接收来自UE的第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。
步骤S104a,AMF向LMF发送第一消息检验码、第一新鲜性参数和第一定位隐私设置数据。相应的,LMF接收来自AMF的第一消息检验码、第一新鲜性参数和第一定位隐私设置数据。
步骤S105a,LMF向V-GMLC发送第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。相应的,V-GMLC接收来自LMF的第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。
步骤S106a,V-GMLC向H-GMLC发送第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。相应的,H-GMLC接收来自V-GMLC的第一消息校验码、第一新鲜性参数 和第一定位隐私设置数据。
步骤S107a,H-GMLC向AUSF发送第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。相应的,AUSF接收来自H-GMLC的第一消息校验码、第一新鲜性参数和第一定位隐私设置数据。
步骤S108a,AUSF计算第一定位隐私设置数据的第二消息校验码和第三消息校验码。
AUSF可根据输入密钥Kausf以及第一输入参数计算第一定位隐私设置数据的第二消息校验码。第二消息校验码可以表示为PS-MAC-Iue’或MACue’。
AUSF可根据输入密钥Kausf以及第二输入参数对定位隐私设置数据计算第三消息校验码。其中,第二输入参数可以包括第二新鲜性参数和第一定位隐私设置数据,第二新鲜性参数包括第一计数器值和/或第二FC值。第二FC值的具体数值是固定的,但是第二FC值与第一FC值不相同。第三消息校验码可以表示为PS-MAC-Iausf或MACausf。
AUSF在得到第二消息校验码之后,判断第一消息校验码与第二消息校验码是否相同,若相同,则表明UE向UDM上报的第一定位隐私设置数据未被拜访网络或GMLC恶意修改,AUSF存储并更新UE的定位隐私设置数据,即将接收到的第一定位隐私设置数据作为UE最新的定位隐私设置数据进行存储。若不相同,则表明UE向UDM上报的第一定位隐私设置数据被拜访网络或GMLC恶意修改。
AUSF在判断出第一消息校验码与第二消息校验码相同的情况下,执行步骤S109a。
步骤S109a,AUSF向UDM发送第一定位隐私设置数据。相应的,UDM接收并存储来自AUSF的第一定位隐私设置数据。
AUSF可通过一条消息向UDM发送第一定位隐私设置数据,该消息例如可以是Nausf_protection request。
步骤S110a,UDM向AUSF发送响应消息。相应的,AUSF接收来自UDM的响应消息。
该响应消息,例如可以是Nausf_protection response。
步骤S111a,AUSF向H-GMLC发送第三消息校验码。相应的,H-GMLC接收来自AUSF的第三消息校验码。
步骤S112a,H-GMLC向V-GMLC发送第三消息校验码。相应的,V-GMLC接收来自H-GMLC的第三消息校验码。
步骤S113a,V-GMLC向LMF发送第三消息校验码。相应的,LMF接收来自V-GMLC的第三消息校验码。
步骤S114a,LMF向AMF发送第三消息校验码。相应的,AMF接收来自LMF的第三消息校验码。
步骤S115a,AMF向UE发送第三消息校验码。相应的,UE接收来自LMF的第三消息校验码。
步骤S116a,UE计算第一定位隐私设置数据的第四消息校验码,并判断第三消息校验码与第四消息校验码是否相同。
在图5a所示的实施例中,UE计算第一定位隐私设置数据的第一消息校验码,AUSF计算第一定位隐私设置数据的第二消息校验码和第三消息校验码,AUSF判断第一消息校 验码与第二消息校验码是否相同,并在相同的情况下向UDM发送第一定位隐私设置数据,UE在接收到第三消息校验码时,计算第四消息校验码并判断第三消息检验码与第四消息检验码是否相同,两次校验过程,可以有效防止定位隐私设置数据被篡改,从而确保UE与UDM之间的定位隐私设置数据的端到端完整性保护。
以本申请实施例应用于图4所示的网络架构示意图为例,如图6所示,为本申请实施例一提供的数据传输方法的流程示意图,该实施例通过UE对定位隐私设置数据进行数字签名,可以有效防止定位隐私设置数据被篡改,从而确保UE与UDM之间的定位隐私设置数据的端到端完整性保护。图6所示实施例可包括但不限于如下步骤:
步骤S201,UE对第一定位隐私设置数据进行数字签名,得到第一数字签名。
其中,第一定位隐私设置数据为用户在UE上输入或更新的第一定位隐私设置数据,为未经过数字签名处理之前的第一定位隐私设置数据。第一数字签名为UE对第一定位隐私设置数据进行的数字签名。
UE可根据UE的私钥以及输入参数对第一定位隐私设置数据进行数字签名,得到第一数字签名。其中,输入参数可以包括新鲜性参数,新鲜性参数可以包括计数器(counter)值和功能计数器(function counter,FC)值。计数器值的具体数值由UE维护,FC值得具体数值是固定的。换言之,UE可根据UE的私钥以及计数器值对第一定位隐私设置数据进行数字签名。
步骤S202,如果UE处于空闲态,则触发UE侧的服务请求流程。
UE处于空闲态,表明UE未通过RAN接入核心网,触发UE侧的服务请求流程,几触发UE通过RAN接入核心网,建立UE与核心网之间的通信连接。
如果UE处于连接态,则步骤S202可不执行。
步骤S203,UE通过RAN向AMF发送第一数字签名、新鲜性参数和第一定位隐私设置数据。相应的,AMF接收来自UE的第一数字签名、新鲜性参数和第一定位隐私设置数据。
UE向AMF发送第一数字签名、新鲜性参数和第一定位隐私设置数据时,可将第一数字签名、新鲜性参数和第一定位隐私设置数据携带在一条消息中,该消息例如可以是NAS传输消息。
步骤S204,AMF向LMF发送第一数字签名、新鲜性参数和第一定位隐私设置数据。相应的,LMF接收来自AMF的第一数字签名、新鲜性参数和第一定位隐私设置数据。
AMF向LMF发送第一数字签名、新鲜性参数和第一定位隐私设置数据时,可将第一数字签名、新鲜性参数和第一定位隐私设置数据携带在一条消息中,该消息例如可以是Namf_Communication_N2 message notify。
步骤S205,LMF向V-GMLC发送第一数字签名、新鲜性参数和第一定位隐私设置数据。相应的,V-GMLC接收来自LMF的第一数字签名、新鲜性参数和第一定位隐私设置数据。
LMF向V-GMLC发送第一数字签名、新鲜性参数和第一定位隐私设置数据时,可将第一数字签名、新鲜性参数和第一定位隐私设置数据携带在一条消息中,该消息例如可以是Ngmlc_UesrPrivacy_Set request。
步骤S206,V-GMLC向H-GMLC发送第一数字签名、新鲜性参数和第一定位隐私设置数据。相应的,H-GMLC接收来自V-GMLC的第一数字签名、新鲜性参数和第一定位隐私设置数据。
V-GMLC向H-GMLC发送第一数字签名、新鲜性参数和第一定位隐私设置数据时,可将第一数字签名、新鲜性参数和第一定位隐私设置数据携带在一条消息中,该消息例如可以是Ngmlc_UesrPrivacy_Set request。
步骤S207,H-GMLC向UDM发送第一数字签名、新鲜性参数和第一定位隐私设置数据。相应的,UDM接收来自H-GMLC的第一数字签名、新鲜性参数和第一定位隐私设置数据。
H-GMLC向UDM发送第一数字签名、新鲜性参数和第一定位隐私设置数据时,可将第一数字签名、新鲜性参数和第一定位隐私设置数据携带在一条消息中,该消息例如可以是Nudm_UECM_Update request。
可以理解的是,步骤S203-步骤S207为UE通过RAN、AMF、LMF、V-GMLC和H-GMLC向UDM上报第一数字签名、新鲜性参数和第一定位隐私设置数据的过程。
在一种可能的实现方式中,UE通过RAN和AMF向UDM上报第一数字签名和新鲜性参数,此时涉及的核心网网元包括AMF,上报过程为UE->AMF->UDM。在另一种可能的实现方式中,UE通过RAN、AMF和LMF向UDM上报第一数字签名和新鲜性参数,此时涉及的核心网网元包括AMF和LMF,上报过程为UE->AMF->LMF->UDM。
在非漫游场景下,LMF可向GMLC发送第一数字签名、新鲜性参数和第一定位隐私设置数据,然后GMLC向UDM发送第一数字签名、新鲜性参数和第一定位隐私设置数据。非漫游场景下,UE向UDM上报第一数字签名、新鲜性参数和第一定位隐私设置数据的过程可为UE->AMF->UDM,UE->AMF->LMF->UDM,或UE->AMF->LMF->GMLC->UDM。
新鲜性参数包括计数器值和FC值,由于FC值是固定的,核心网中的网元可获知,那么在步骤S203-步骤S207中传输的新鲜性参数具体可为计数器值。
步骤S208,UDM判断第一定位隐私设置数据与第一数字签名是否匹配,并在匹配的情况下,对第一定位隐私设置数据进行数据签名,得到第二数字签名。
由于UE是根据UE的私钥以及输入参数对第一定位隐私设置数据进行数字签名,因此UDM根据UE的公钥以及输入参数判断第一定位隐私设置数据与第一数字签名是否匹配。UE的公钥可在UE注册过程中获得,并保存在UDM中。输入参数包括新鲜性参数,新鲜性参数可以包括计数器值和FC值,由于UE向UDM上报了计数器值,那么UDM可根据UE的公钥以及计数器值判断第一定位隐私设置数据与第一数字签名是否匹配。
UDM判断第一定位隐私设置数据与第一数字签名是否匹配,即利用UE的公钥以及新鲜性参数对第一数字签名进行解签名,若解签名得到的第一定位隐私设置数据与第一定位隐私设置数据相同,则第一定位隐私设置数据与第一数字签名匹配,通过校验,表明UE向UDM上报的第一定位隐私设置数据未被拜访网络或GMLC恶意修改。若第一定位隐私设置数据与第一数字签名不匹配,则表明UE向UDM上报的第一定位隐私设置数据被拜访网络或GMLC恶意修改。
UDM在第一定位隐私设置数据与第一数字签名相匹配的情况下,存储并更新UE的第 一定位隐私设置数据,即将第一定位隐私设置数据作为UE最新的第一定位隐私设置数据进行存储。
UDM在第一定位隐私设置数据与第一数字签名相匹配的情况下,UDM对第一定位隐私设置数据进行数据签名,得到第二数字签名。具体的,UDM根据UDM的私钥以及输入参数对第一定位隐私设置数据进行数字签名,得到第二数字签名。同样,输入参数包括新鲜性参数,新鲜性参数可以包括计数器值和FC值。UDM进行数字签名的计数器值即为UE向UDM上报的计数器值。
步骤S209,UDM向H-GMLC发送第二数字签名。相应的,H-GMLC接收来自UDM的第二数字签名。
UDM可通过一条消息向H-GMLC发送第二数字签名,该消息例如可以是Nudm_UECM_Update response。
步骤S210,H-GMLC向V-GMLC发送第二数字签名。相应的,V-GMLC接收来自H-GMLC的第二数字签名。
H-GMLC可通过一条消息向V-GMLC发送第二数字签名,该消息例如可以是Ngmlc_UesrPrivacy_Set response。
步骤S211,V-GMLC向LMF发送第二数字签名。相应的,LMF接收来自V-GMLC的第二数字签名。
V-GMLC可通过一条消息向LMF发送第二数字签名,该消息例如可以是Ngmlc_UesrPrivacy_Set response。
步骤S212,LMF向AMF发送第二数字签名。相应的,AMF接收来自LMF的第二数字签名。
LMF可通过一条消息向AMF发送第二数字签名,该消息例如可以是Namf_Communication_N2 message notify。
步骤S213,AMF向UE发送第二数字签名。相应的,UE接收来自LMF的第二数字签名。
AMF通过RAN向UE发送第二数字签名。AMF可通过一条消息向UE发送第二数字签名,该消息例如可以是NAS transport消息。
可以理解的是,步骤S209-步骤S213为UDM向UE下发第二数字签名的过程,该过程为UDM->H-GMLC->V-GMLC->LMF->AMF->UE。在一种可能的实现方式中,UDM通过RAN和AMF向UE下发第二数字签名,下发过程为UDM->AMF->UE。在另一种可能的实现方式中,UDM通过RAN、AMF和LMF向UE下发第二数字签名,下发过程为UDM->LMF->AMF->UE。
在非漫游场景下,UDM可向GMLC发送第二数字签名,然后GMLC向LMF发送第二数字签名。在非漫游场景下,UDM向UE下发第二数字签名的过程可为UDM->GMLC->LMF->AMF->UE,UDM->AMF->UE或UDM->LMF->AMF->UE。
步骤S214,UE判断第二数字签名与第一定位隐私设置数据是否匹配。
UE根据UDM的公钥以及新鲜性参数判断第二数字签名与第一定位隐私设置数据是否匹配,即利用UDM的公钥以及新鲜性参数对第二数字签名进行解签名,若解签名得到的 定位隐私设置数据与第一定位隐私设置数据相同,则第二数字签名与第一定位隐私设置数据匹配,UDM保存的第一定位隐私设置数据未被拜访网络或GMLC恶意修改。若第二数字签名与第一定位隐私设置数据不匹配,则表明UDM保存的第一定位隐私设置数据被拜访网络或GMLC恶意修改。
UE可通过广播消息或其他方式获得UDM的公钥。
在图6所示的实施例二中,UE通过对定位隐私设置数据进行数字签名,UDM在接收到数字签名后的定位隐私设置数据时,对其进行校验,判断是否被拜访网络或GMLC恶意修改,并在校验通过的情况下,UDM对定位隐私设置数据进行数字签名,并向UE下发数字签名后的定位隐私设置数据,UE对其进行校验,两次校验过程,可以有效防止定位隐私设置数据被篡改,从而确保UE与UDM之间的定位隐私设置数据的端到端完整性保护。
以本申请实施例应用于图4所示的网络架构示意图为例,如图7所示,为本申请实施例三提供的数据传输方法的流程示意图,该实施例通过AMF检验拜访网络或GMLC向AMF下发的动作指示信息是否被篡改,可有效防止拜访网络或GMLC下发错误的动作指示信息,从而有效保护UE的位置信息。图7所示实施例可包括但不限于如下步骤:
步骤S301,外部客户端向H-GMLC发送定位服务请求,该定位服务请求例如可以是LCS service request。相应的,H-GMLC接收来自外部客户端的定位服务请求。
其中,定位服务请求中可携带UE的标识,用于指示外部客户端想要获取哪个UE的位置信息。
步骤S302,H-GMLC向UDM发送定位隐私设置数据获取请求,该定位隐私设置数据获取请求用于请求获取UE的定位隐私设置数据。该定位隐私设置数据获取请求例如可以是Nudm_UECM_Get_request。相应的,UDM接收来自H-GMLC的定位隐私设置数据获取请求。
其中,定位隐私设置数据获取请求中可携带UE的标识。
步骤S303,UDM向H-GMLC发送定位隐私设置数据获取响应,用于响应定位隐私设置数据获取请求。该定位隐私设置数据获取请求例如可以是Nudm_UECM_Get_response。相应的,H-GMLC接收来自UDM的定位隐私设置数据获取响应。其中,定位隐私设置数据获取响应包括UDM存储的UE的定位隐私设置数据。
步骤S304,H-GMLC向V-GMLC发送定位服务请求,该定位服务请求例如可以是LCS service request。相应的,V-GMLC接收来自H-GMLC的定位服务请求。H-GMLC获取的定位隐私设置数据为允许定位时,H-GMLC向V-GMLC发送定位服务请求,以获取该UE的位置信息。
H-GMLC在获取到UE的定位隐私设置数据时,若定位隐私设置数据为不允许定位,则H-GMLC直接向外部客户端反馈定位服务响应,该定位服务响应指示拒绝定位服务。在定位隐私设置数据不为不允许定位的情况下,可将该定位隐私设置数据转换为动作指示信息,用于指示AMF执行相应的定位服务操作。将定位隐私设置数据转换为动作指示信息的示例可参见图3所示实施例中步骤3的描述,在此不再赘述。
在非漫游场景下,GMLC向UDM发送定位隐私设置数据获取请求,UDM向GMLC发送定位隐私设置数据获取响应,以使GMLC获取UE的定位隐私设置数据。之后,GMLC 直接向AMF发送定位服务请求,即将步骤S305和步骤S306简化为一个步骤,为GMLC向AMF发送定位服务请求。
由于图7为图5、图5a或图6的后续步骤,那么UDM所存储的UE的定位隐私设置数据即为第一定位隐私设置数据。
步骤S305,V-GMLC向AMF发送定位服务请求。相应的,AMF接收来自V-GMLC的定位服务请求。该定位服务请求例如可以是Namf_Location_Provide_positioningInfo_request。
可选的,定位服务请求包括动作指示信息,即包括GMLC将第一定位隐私设置数据转换得到的动作指示信息,用于指示AMF执行相应的定位服务操作。例如,第一定位隐私设置数据为允许定位但需要通知用户,则动作指示信息用于指示AMF通知用户,并请求获取UE的位置信息。
步骤S306,AMF向UDM发送定位隐私设置数据获取请求。相应的,UDM接收来自AMF的定位隐私设置数据获取请求。
其中,定位隐私设置数据获取请求例如可以是privacy setting verification request,用于请求从UDM获取UE的定位隐私设置数据,即获取第一定位隐私设置数据。该UE即为外部客户端想要获取位置信息的UE。
步骤S307,UDM向AMF发送定位隐私设置数据获取响应。相应的,AMF接收来自UDM的定位隐私设置数据获取响应。
其中,定位隐私设置数据获取响应例如可以是privacy setting verification response,用于响应定位隐私设置数据获取请求,并携带UDM存储的第一定位隐私设置数据。
若第一定位隐私设置数据在UDM中,是UDM更新后首次被AMF请求,则该定位隐私设置数据获取响应还包括第一指示信息,该第一指示信息用于指示第一定位隐私设置数据在UDM更新后首次被AMF请求。若该定位隐私设置数据获取响应包括第一指示信息,则执行步骤S309-步骤S310;若不包括则不执行步骤S309-步骤S310。
步骤S308,如果UE处于空闲态,则AMF向UE触发网络侧服务请求。
UE处于空闲态表明UE和AMF没有建立NAS信令连接,则AMF触发UE侧的服务请求流程,建立UE和核心网之间的安全通信连接。
步骤S309,AMF向UE发送定位隐私设置数据获取请求。相应的,UE接收来自AMF的定位隐私设置数据获取请求。
其中,定位隐私设置数据获取请求例如可以是privacy setting request。该定位隐私设置数据获取请求可与步骤S308中所涉及的RRC连接重配置消息或N2消息合并。
步骤S310,UE向AMF发送定位隐私设置数据获取响应。相应的,AMF接收来自UE的定位隐私设置数据获取响应。
该定位隐私设置数据获取响应例如可以是privacy setting response,包括UE上报的定位隐私设置数据,假设UE上报的定位隐私设置数据为第二定位隐私设置数据,第二定位隐私设置数据即为UE当前的定位隐私设置数据。该定位隐私设置数据获取响应可与步骤S308中所涉及的RRC连接重配置消息或N2消息合并。
步骤S311,AMF根据第一定位隐私设置数据执行定位服务操作。
在一种可能的实现方式中,GMLC向AMF发送的定位服务请求中不携带动作指示信息或V-GMLC向AMF发送的定位服务请求中不携带动作指示信息,则AMF直接根据第一定位隐私设置数据执行定位服务操作。具体的,若第一定位隐私设置数据为允许定位但需要通知用户,则AMF通过RAN向UE发送通知消息,并请求获取UE的位置信息;若第一定位隐私设置数据为允许定位但不需要通知用户,则AMF请求获取UE的位置信息;若第一定位隐私设置数据为需要通知用户并由用户授权是否允许定位,则AMF通过RAN向UE发送通知消息,并在接收到来自UE的允许定位消息时,请求获取UE的位置信息。
在一种可能的实现方式中,GMLC向AMF发送的定位服务请求中携带动作指示信息或V-GMLC向AMF发送的定位服务请求中携带动作指示信息,则AMF检验该动作指示信息与第一定位隐私设置数据是否匹配,若匹配则确定拜访网络或GMLC未篡改第一定位隐私设置数据,此时AMF根据动作指示信息或第一定位隐私设置数据执行定位服务操作。若不匹配,则AMF依然根据第一定位隐私设置数据执行定位服务操作,此时可确定拜访网络或GMLC未篡改了第一定位隐私设置数据,AMF可上报第一定位隐私设置数据被篡改的错误原因。
在一种可能的实现方式中,在执行了步骤S308和步骤S309的情况下,AMF判断第二定位隐私设置数据与第一定位隐私设置数据是否相同,若相同表明UE当前的定位隐私设置数据未更改,与UDM保存的一致,此时AMF依然根据第一定位隐私设置数据执行定位服务操作。若不相同,则表明UDM未存储UE最新的定位隐私设置数据,此时AMF根据第二定位隐私设置数据执行定位服务操作,即根据最新的定位隐私设置数据执行定位服务操作,AMF还执行步骤S312-步骤S313。
其中,AMF请求获取UE的位置信息可包括如下步骤:
步骤S3111,AMF向LMF发送定位请求。相应的,LMF接收来自AMF的定位请求。该定位请求例如可以是Nlmf_Location_DetermineLocation Request。
步骤S3112,对UE的位置信息进行测量和计算。可参见图3所示实施例中的步骤8-步骤12的具体描述,在此不再赘述。
步骤S3113,LMF向AMF下发UE的位置信息。相应的,AMF接收来自LMF的UE的位置信息。
步骤S312,AMF向UDM发送第二定位隐私设置数据。相应的,UDM接收来自AMF的第二定位隐私设置数据。
AMF可通过定位隐私设置数据更新请求向UDM发送第二定位隐私设置数据。该定位隐私设置数据更新请求例如可以是privacy setting update request。
步骤S313,UDM向AMF发送确认消息。相应的,AMF接收来自UDM的确认消息。
UDM可通过定位隐私设置数据更新响应向AMF发送确认消息。该定位隐私设置数据更新响应例如可以是privacy setting update response。
步骤S314,AMF向V-GMLC上报第二指示信息和UE的位置信息。相应的,V-GMLC接收来自AMF的第二指示信息和UE的位置信息。
其中,第二指示信息用于指示是否完成定位。
步骤S315,V-GMLC向H-GMLC上报第二指示信息和UE的位置信息。相应的, H-GMLC接收来自V-GMLC的第二指示信息和UE的位置信息。
步骤S316,H-GMLC向外部客户端发送UE的位置信息。相应的,外部客户端接收来自H-GMLC的UE的位置信息。
若第二指示信息指示完成定位,则H-GMLC向外部客户端发送UE的位置信息。
在非漫游场景下,AMF可直接向GMLC上报第二指示信息和UE的位置信息,若第二指示信息指示完成定位,则GMLC向外部客户端发送UE的位置信息。
在图7所示的实施例三中,基于图3所示的流程示意图,增加AMF对定位隐私设置数据的校验,可检验拜访网络或GMLC向AMF下发的定位隐私设置数据是否被篡改,可有效防止拜访网络或GMLC下发错误的动作指示信息,从而有效保护UE的位置信息。
以本申请实施例应用于图4所示的网络架构示意图为例,如图8所示,为本申请实施例四提供的数据传输方法的流程示意图,该实施例中UDM采用数字签名,对UDM向AMF下发的签名后的定位隐私设置数据,可有效防止拜访网络或GMLC下发错误的动作指示信息,从而有效保护UE的位置信息。图8所示实施例可包括但不限于如下步骤:
步骤S401,外部客户端向H-GMLC发送定位服务请求,该定位服务请求可以是LCS service request。相应的,H-GMLC接收来自外部客户端的定位服务请求。
步骤S402,H-GMLC向UDM发送定位隐私设置数据获取请求,该定位隐私设置数据获取请求用于请求获取UDM保存的UE的定位隐私设置数据。该定位隐私设置数据获取请求例如可以是Nudm_UECM_Get_request。相应的,UDM接收来自H-GMLC的定位隐私设置数据获取请求。假设UDM保存的UE的定位隐私设置数据为第二定位隐私设置数据。
其中,定位隐私设置数据获取请求包括第二计数器值,该第二计数器值由H-GMLC维护,UE侧没有第二计数器值。因此第二计数器值不同于图5、图5a或图6中的第一计数器值。
步骤S403,UDM对第一定位隐私设置数据进行数字签名,得到数字签名数据。
UDM对第一定位隐私设置数据进行数据签名,得到数字签名数据。具体的,UDM根据UDM的私钥以及输入参数对第一定位隐私设置数据进行数字签名,得到数字签名数据。输入参数包括第三新鲜性参数,第三新鲜性参数可以包括第二计数器值或第三FC值。第二计数器值为步骤S402所携带的第二计数器值,第三FC值为固定值。第三FC值与第一FC值不同,与第二FC值不同。
步骤S404,UDM向H-GMLC发送定位隐私设置数据获取响应,用于响应定位隐私设置数据获取请求。该定位隐私设置数据获取请求例如可以是Nudm_UECM_Get_response。相应的,H-GMLC接收来自UDM的定位隐私设置数据获取响应。
其中,定位隐私设置数据获取响应包括第一定位隐私设置数据、数字签名数据和第二计数器值。
步骤S405,H-GMLC向V-GMLC发送定位服务请求,该定位服务请求例如可以是LCS service request。相应的,V-GMLC接收来自H-GMLC的定位服务请求。
其中,定位服务请求包括动作指示信息、数字签名数据和第二计数器值。
步骤S406,V-GMLC向AMF发送定位服务请求。相应的,AMF接收来自V-GMLC的定位服务请求。该定位服务请求例如可以是 Namf_Location_Provide_positioningInfo_request。
其中,定位服务请求包括动作指示信息、数字签名数据和第二计数器值。
在非漫游场景下,GMLC直接向AMF发送定位服务请求。相应的,AMF接收来自GMLC的定位服务请求。该定位服务请求包括动作指示信息、数字签名数据和第二计数器值。
步骤S407,AMF判断数字签名数据与动作指示信息是否匹配。
AMF根据UDM的公钥以及第二计数器值判断数字签名数据与动作指示信息是否匹配,即利用UDM的公钥以及第二计数器值对数字签名数据进行解签名,若解签名得到的第一定位隐私设置数据与动作指示信息所指示的定位服务操作匹配,则数字签名数据与动作指示信息匹配,GMLC下发的动作指示信息未被恶意修改。若数字签名数据与动作指示信息不匹配,则表明GMLC下发的动作指示信息被恶意修改。
AMF可获取UDM的公钥,例如AMF在从UDM获取第一定位隐私设置数据时,可同时获取UDM的公钥。具体AMF获取UDM的公钥的方式在本申请实施例中不作限定。
步骤S408,如果UE处于空闲态,则AMF向UE触发网络侧服务请求。
步骤S409,AMF根据第一定位隐私设置数据执行定位服务操作。
不管数字签名数据与动作指示信息是否匹配,AMF根据解签名得到的第一定位隐私设置数据执行定位服务操作。AMF根据第一定位隐私设置数据执行定位服务操作的具体实现过程可参见图7所示实施例中步骤S311中相应的描述,在此不再赘述。
步骤S410,AMF向V-GMLC上报第二指示信息和UE的位置信息。相应的,V-GMLC接收来自AMF的第二指示信息和UE的位置信息。
其中,第二指示信息用于指示是否完成定位。
步骤S411,V-GMLC向H-GMLC上报第二指示信息和UE的位置信息。相应的,H-GMLC接收来自V-GMLC的第二指示信息和UE的位置信息。
步骤S412,H-GMLC向外部客户端发送UE的位置信息。相应的,外部客户端接收来自H-GMLC的UE的位置信息。
若第二指示信息指示完成定位,则H-GMLC向外部客户端发送UE的位置信息。
在非漫游场景下,AMF可直接向GMLC上报第二指示信息和UE的位置信息,若第二指示信息指示完成定位,则GMLC向外部客户端发送UE的位置信息。
在图8所示的实施例四中,基于图3所示的流程示意图,UDM采用数字签名,对UDM向AMF下发的签名后的定位隐私设置数据,可有效防止GMLC下发错误的动作指示信息,从而有效保护UE的位置信息。
可以理解的是,图7所示的实施例三和图8所示的实施例四为图5、图5a所示的实施例一和图6所示的实施例二的后续步骤。
上述详细阐述了本申请实施例的方法,下面提供了本申请实施例的装置。
请参见图9,是本申请实施例提供的通信装置的逻辑结构示意图,该通信装置60可以包括收发单元601和处理单元602。该通信装置60为数据传输装置,可以是用户终端,也可以是数据管理网元,还可以是接入管理网元。
针对该通信装置60为用户终端的情况:
处理单元602,用于计算第一定位隐私设置数据的第一消息校验码。
收发单元601,用于向数据管理网元发送第一消息校验码和第一定位隐私设置数据。
该通信装置60为用户终端时,可以实现图5、图5a以及图6-图8所示实施例中UE的功能,该通信装置60中各个单元执行详细过程可以参见图5、图5a以及图6-图8所示实施例中UE的执行步骤,此处不再赘述。
针对该通信装置60为数据管理网元的情况,数据管理网元还包括存储单元603。
收发单元601,用于接收来自用户终端的第一消息校验码和第一定位隐私设置数据,获取第一定位隐私设置数据的第二消息校验码。
处理单元602,用于若第二消息校验码与第一消息校验码相同,则确定第一定位隐私设置数未被篡改。
存储单元603,用于存储第一定位隐私设置数据。
该通信装置60为数据管理网元时,可以实现图5、图5a以及图6-图8所示实施例中UDM的功能,该通信装置60中各个单元执行详细过程可以参见图5、图5a以及图6-图8所示实施例中UDM的执行步骤,此处不再赘述。
针对该通信装置60为接入管理网元的情况:
收发单元601,用于在接收到来自网关移动定位网元的定位服务请求时,向数据管理网元发送定位隐私设置数据获取请求;接收来自数据管理网元的定位隐私设置数据获取响应,定位隐私设置数据获取响应包括第一定位隐私设置数据。
处理单元602,用于根据第一定位隐私设置数据执行定位服务操作。
该通信装置60为接入管理网元时,可以实现图5、图5a以及图6-图8所示实施例中AMF的功能,该通信装置60中各个单元执行详细过程可以参见图5、图5a以及图6-图8所示实施例中AMF的执行步骤,此处不再赘述。
请参见图10,是本申请实施例提供的通信装置的实体结构简化示意图。该通信装置70为数据传输装置,可以是用户终端,也可以是数据管理网元,还可以是接入管理网元。
该通信装置70包括收发器701、处理器702和存储器703。收发器701、处理器702和存储器703可以通过总线704相互连接,也可以通过其它方式相连接。图9所示的收发单元601所实现的相关功能可以由收发器701来实现。图9所示的处理单元602所实现的相关功能可以通过一个或多个处理器702来实现。
存储器703包括但不限于是随机存储记忆体(random access memory,RAM)、只读存储器(read-only memory,ROM)、可擦除可编程只读存储器(erasable programmable read only memory,EPROM)、或便携式只读存储器(compact disc read-only memory,CD-ROM),该存储器703用于相关指令及数据。
收发器701用于发送数据和/或信令,以及接收数据和/或信令。
若该通信装置70是图5、图5a以及图6-图8所示实施例中的UE,则收发器701可用于通过RAN与AMF进行通信,例如执行图5所示实施例中的步骤S103和步骤S116;执行图5a所示实施例中的步骤S102a和步骤S115a;执行图6所示实施例中的步骤S203和步骤S213;执行图7所示实施例中的步骤S309和步骤S310。
若该通信装置70是图5、图5a以及图6-图8所示实施例中的UDM,则收发器701可 用于与AMF、GMLC、AUSF进行通信,例如执行图5所示实施例中的步骤S107、步骤S108和步骤S110;执行图5a所示实施例中的步骤S109a和步骤S110a;执行图6所示实施例中的步骤S207和步骤S209;执行图7所示实施例中的步骤S302、步骤S303、步骤S306、步骤S307、步骤S312和步骤S313;执行图8所示实施例中的步骤S402和步骤S404。
若该通信装置70是图5、图5a以及图6-图8所示实施例中的AMF,则收发器701可用于与UE、GMLC、UDM以及LMF进行通信,例如执行图5所示实施例中的步骤S103、步骤S104、步骤S115和步骤S116;执行图5a所示实施例中的步骤S103a、步骤S104a、步骤S114a和步骤S115a;执行图6所示实施例中的步骤S203、步骤S204、步骤S212和步骤S213;执行图7所示实施例中的步骤S305、步骤S306、步骤S307、步骤S309、步骤S310、步骤S312、步骤S313和步骤S314;执行图8所示实施例中的步骤S406和步骤S410。
处理器702可以包括是一个或多个处理器,例如包括一个或多个中央处理器(central processing unit,CPU),在处理器702是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。
若该通信装置70是图5、图5a以及图6-图8所示实施例中的UE,则处理器702可用于执行控制UE的操作,例如执行图5所示实施例中的步骤S101和步骤S117;执行图5a所示实施例中的步骤S101a和步骤S116a;执行图6所示实施例中的步骤S201和步骤S214。
若该通信装置70是图5、图5a以及图6-图8所示实施例中的UDM,则处理器702可用于执行控制UDM的操作,例如执行图5所示实施例中的步骤S111;执行图6所示实施例中的步骤S208;执行图8所示实施例中的步骤S403。
若该通信装置70是图5、图5a以及图6-图8所示实施例中的AMF,则处理器702可用于执行控制AMF的操作,例如执行图7所示实施例中的步骤S311;执行图8所示实施例中的步骤S407和步骤S409。
存储器703用于存储通信装置70的程序代码和数据。通信装置为70为图5、图5a以及图6-图8所示实施例中的UDM时,存储器703用于存储UE上报的定位隐私设置数据。
关于处理器702和收发器701所执行的步骤,具体可参见图5、图5a以及图6-图8所示实施例的描述,在此不再赘述。
可以理解的是,图10仅仅示出了通信装置的简化设计。在实际应用中,通信装置还可以分别包含必要的其他元件,包含但不限于任意数量的收发器、处理器、控制器、存储器、通信单元等,而所有可以实现本申请的设备都在本申请的保护范围之内。
本申请实施例还提供一种数据传输系统,包括用户终端、数据管理网元、接入管理网元和网关移动定位网元。用户终端用于实现图5、图5a、图6-图8中UE的功能;数据管理网元用于实现图5、图5a、图6-图8中UDM的功能;接入管理网元用于实现图5、图5a、图6-图8中AMF的功能;网关移动定位网元用于实现图5、图5a、图6-图8中V-GMLC和H-GMLC的功能。该数据传输系统还包括认证服务网元,用于实现图5、图5a、图6-图8中AUSF的功能。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,该流程可以由计算机程序来指令相关的硬件完成,该程序可存储于计算机可读取存储介质中,该程序在执行时,可包括如上述各方法实施例的流程。而前述的存储介质包括:ROM或随机存储 记忆体RAM、磁碟或者光盘等各种可存储程序代码的介质。因此,本申请又一实施例提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述各方面所述的方法。
本申请又一实施例还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述各方面所述的方法。
本领域普通技术人员可以意识到,结合本申请中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者通过所述计算机可读存储介质进行传输。所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。

Claims (54)

  1. 一种数据传输系统,其特征在于,包括用户终端和数据管理网元,
    所述用户终端,用于计算第一定位隐私设置数据的第一消息校验码,向所述数据管理网元发送所述第一消息校验码和所述第一定位隐私设置数据;
    所述数据管理网元,用于接收来自所述用户终端的所述第一消息校验码和所述第一定位隐私设置数据;获取所述第一定位隐私设置数据的第二消息校验码;若所述第二消息校验码与所述第一消息校验码相同,确定所述第一定位隐私设置数据未被篡改,并存储所述第一定位隐私设置数据。
  2. 根据权利要求1所述的系统,其特征在于,
    所述数据管理网元,还用于获取所述第一定位隐私设置数据的第三消息校验码,向所述用户终端发送所述第三消息校验码;
    所述用户终端,还用于接收来自所述数据管理网元的第三消息校验码,并计算所述第一定位隐私设置数据的第四消息校验码;若所述第三消息校验码与所述第四消息校验码相同,确定所述第一定位隐私设置数据未被篡改。
  3. 根据权利要求1或2所述的系统,其特征在于,所述系统还包括接入管理网元和网关移动定位网元,
    所述网关移动定位网元,用于向所述接入管理网元发送定位服务请求;
    所述接入管理网元,用于接收来自所述网关移动定位网元的定位服务请求,并向所述数据管理网元发送定位隐私设置数据获取请求;接收来自所述数据管理网元的定位隐私设置数据获取响应,所述定位隐私设置数据获取响应包括所述第一定位隐私设置数据;根据所述第一定位隐私设置数据执行定位服务操作。
  4. 根据权利要求3所述的系统,其特征在于,所述定位隐私设置数据获取响应还包括第一指示信息,所述第一指示信息用于指示所述第一定位隐私设置数据首次被所述接入管理网元请求;
    所述接入管理网元用于根据所述第一定位隐私设置数据执行定位服务操作之前,还用于根据所述第一指示信息从所述用户终端获取第二定位隐私设置数据;若所述第二定位隐私设置数据与所述第一定位隐私设置数据相同,则执行根据所述第一定位隐私设置数据执行定位服务操作的操作。
  5. 根据权利要求4所述的系统,其特征在于,所述接入管理网元,还用于若所述第二定位隐私设置数据与所述第一定位隐私设置数据不相同,根据所述第二定位隐私设置数据执行定位服务操作,并向所述数据管理网元发送所述第二定位隐私设置数据;
    所述数据管理网元,还用于接收来自所述接入管理网元的所述第二定位隐私设置数据,并将存储的所述用户终端的定位隐私设置数据由所述第一定位隐私设置数据更新为第二定位隐私设置数据。
  6. 根据权利要求3所述的系统,其特征在于,所述定位服务请求包括动作指示信息,所述动作指示信息用于指示定位服务操作;
    所述接入管理网元,还用于检验所述动作指示信息与所述第一定位隐私设置数据是否 匹配,若匹配,确定所述网关移动定位网元未篡改所述第一定位隐私设置数据。
  7. 一种数据传输方法,其特征在于,包括:
    用户终端计算第一定位隐私设置数据的第一消息校验码;
    所述用户终端向数据管理网元发送所述第一消息校验码和所述第一定位隐私设置数据。
  8. 根据权利要求7所述的方法,其特征在于,所述用户终端计算第一定位隐私设置数据的第一消息校验码,包括:
    所述用户终端根据第一新鲜性参数计算第一定位隐私设置数据的第一消息校验码;所述第一新鲜性参数包括第一计数器值和第一功能计数器值。
  9. 根据权利要求8所述的方法,其特征在于,所述方法还包括:
    所述用户终端向所述数据管理网元发送所述第一新鲜性参数。
  10. 根据权利要求8或9所述的方法,其特征在于,所述方法还包括:
    所述用户终端接收来自所述数据管理网元的第三消息校验码,并计算所述第一定位隐私设置数据的第四消息校验码;
    若所述第三消息校验码与所述第四消息校验码相同,所述用户终端确定所述第一定位隐私设置数据未被篡改。
  11. 一种数据传输方法,其特征在于,包括:
    数据管理网元接收来自用户终端的第一消息校验码和第一定位隐私设置数据;
    所述数据管理网元获取所述第一定位隐私设置数据的第二消息校验码;
    若所述第二消息校验码与所述第一消息校验码相同,所述数据管理网元确定所述第一定位隐私设置数未被篡改,并存储所述第一定位隐私设置数据。
  12. 根据权利要求11所述的方法,其特征在于,所述方法还包括:
    所述数据管理网元获取所述第一定位隐私设置数据的第三消息校验码,并向所述用户终端发送所述第三消息校验码。
  13. 根据权利要求11所述的方法,其特征在于,所述方法还包括:
    所述数据管理网元在接收到来自接入管理网元的第二定位隐私设置数据时,将存储的所述用户终端的定位隐私设置数据由所述第一定位隐私设置数据更新为第二定位隐私设置数据。
  14. 根据权利要求13所述的方法,其特征在于,所述方法还包括:
    所述数据管理网元接收来自网关移动定位网元的定位隐私设置数据获取请求,所述定位隐私数据获取请求包括第三新鲜性参数,所述第三新鲜性参数包括第三计数器值和第三功能计数器值;
    所述数据管理网元根据所述第三新鲜性参数对所述第一定位隐私设置数据进行数字签名,得到数字签名数据;
    所述数据管理网元向所述网关移动定位网元发送定位隐私设置数据获取响应,所述定位隐私设置数据获取响应包括所述第一定位隐私设置数据、所述数字签名数据和所述第三新鲜性参数。
  15. 一种数据传输方法,其特征在于,包括:
    接入管理网元在接收到来自网关移动定位网元的定位服务请求时,向数据管理网元发送定位隐私设置数据获取请求;
    所述接入管理网元接收来自所述数据管理网元的定位隐私设置数据获取响应,所述定位隐私设置数据获取响应包括第一定位隐私设置数据;
    所述接入管理网元根据所述第一定位隐私设置数据执行定位服务操作。
  16. 根据权利要求15所述的方法,其特征在于,所述接入管理网元根据所述第一定位隐私设置数据执行定位服务操作,包括:
    若所述第一定位隐私设置数据为允许定位但需要通知用户,所述接入管理网元向所述用户终端发送通知消息,并请求获取所述用户终端的位置信息;
    若所述第一定位隐私设置数据为允许定位但不需要通知用户,所述接入管理网元请求获取所述用户终端的位置信息;
    若所述第一定位隐私设置数据为需要通知用户并由所述用户授权是否允许定位,所述接入管理网元向所述用户终端发送通知消息,并在接收到来自所述用户终端的允许定位消息时,请求获取所述用户终端的位置信息。
  17. 根据权利要求15所述的方法,其特征在于,所述定位隐私设置数据获取响应还包括第一指示信息,所述第一指示信息用于指示所述第一定位隐私设置数据首次被所述接入管理网元请求;
    所述接入管理网元根据所述第一定位隐私设置数据执行定位服务操作之前,还包括:
    所述接入管理网元根据所述第一指示信息从所述用户终端获取第二定位隐私设置数据;若所述第二定位隐私设置数据与所述第一定位隐私设置数据相同,执行所述根据所述第一定位隐私设置数据执行定位服务操作的步骤。
  18. 根据权利要求16所述的方法,其特征在于,所述方法还包括:
    若所述第二定位隐私设置数据与所述第一定位隐私设置数据不相同,所述接入管理网元根据所述第二定位隐私设置数据执行定位服务操作,并向所述数据管理网元发送所述第二定位隐私设置数据。
  19. 一种用户终端,其特征在于,包括处理单元和收发单元;
    所述处理单元,用于计算第一定位隐私设置数据的第一消息校验码;
    所述收发单元,用于向数据管理网元发送所述第一消息校验码和所述第一定位隐私设置数据。
  20. 根据权利要求19所述的用户终端,其特征在于,所述处理单元具体用于根据第一新鲜性参数计算第一定位隐私设置数据的第一消息校验码;所述第一新鲜性参数包括第一计数器值和第一功能计数器值。
  21. 根据权利要求20所述的用户终端,其特征在于,所述收发单元,还用于向所述数据管理网元发送所述第一新鲜性参数。
  22. 根据权利要求20或21所述的用户终端,其特征在于,
    所述收发单元,还用于接收来自所述数据管理网元的第三消息校验码;
    所述处理单元,还用于计算所述第一定位隐私设置数据的第四消息校验码;若所述第三消息校验码与所述第四消息校验码相同,确定所述第一定位隐私设置数据未被篡改。
  23. 一种数据管理网元,其特征在于,包括处理单元、收发单元和存储单元;
    所述收发单元,用于接收来自用户终端的第一消息校验码和第一定位隐私设置数据;
    所述处理单元,用于获取所述第一定位隐私设置数据的第二消息校验码;若所述第二消息校验码与所述第一消息校验码相同,确定所述第一定位隐私设置数未被篡改;
    所述存储单元,用于存储所述第一定位隐私设置数据。
  24. 根据权利要求23所述的数据管理网元,其特征在于,
    所述处理单元,还用于获取所述第一定位隐私设置数据的第三消息校验码;
    所述收发单元,还用于向所述用户终端发送所述第三消息校验码。
  25. 根据权利要求24所述的数据管理网元,其特征在于,所述处理单元,还用于在所述收发单元接收到来自接入管理网元的第二定位隐私设置数据时,将所述存储单元存储的所述用户终端的定位隐私设置数据由所述第一定位隐私设置数据更新为第二定位隐私设置数据。
  26. 根据权利要求25所述的数据管理网元,其特征在于,所述收发单元,还用于接收来自网关移动定位网元的定位隐私设置数据获取请求,所述定位隐私数据获取请求包括第三新鲜性参数,所述第三新鲜性参数包括第三计数器值和第三功能计数器值;
    所述处理单元,还用于根据所述第三新鲜性参数对所述第一定位隐私设置数据进行数字签名,得到数字签名数据;
    所述收发单元,还用于向所述网关移动定位网元发送定位隐私设置数据获取响应,所述定位隐私设置数据获取响应包括所述第一定位隐私设置数据、所述数字签名数据和所述第三新鲜性参数。
  27. 一种接入管理网元,其特征在于,包括处理单元和收发单元;
    收发单元,用于在接收到来自网关移动定位网元的定位服务请求时,向数据管理网元发送定位隐私设置数据获取请求;接收来自所述数据管理网元的定位隐私设置数据获取响应,所述定位隐私设置数据获取响应包括第一定位隐私设置数据;
    所述处理单元,用于根据所述第一定位隐私设置数据执行定位服务操作。
  28. 根据权利要求27所述的接入管理网元,其特征在于,所述处理单元具体用于若所述第一定位隐私设置数据为允许定位但需要通知用户,控制所述收发单元向所述用户终端发送通知消息,并请求获取所述用户终端的位置信息;若所述第一定位隐私设置数据为允许定位但不需要通知用户,请求获取所述用户终端的位置信息;若所述第一定位隐私设置数据为需要通知用户并由所述用户授权是否允许定位,控制所述收发单元向所述用户终端发送通知消息,并在接收到来自所述用户终端的允许定位消息时,请求获取所述用户终端的位置信息。
  29. 根据权利要求28所述的接入管理网元,其特征在于,所述定位隐私设置数据获取响应还包括第一指示信息,所述第一指示信息用于指示所述第一定位隐私设置数据首次被所述接入管理网元请求;
    所述处理单元,还用于根据所述第一指示信息从所述用户终端获取第二定位隐私设置数据;若所述第二定位隐私设置数据与所述第一定位隐私设置数据相同,执行所述根据所述第一定位隐私设置数据执行定位服务操作的步骤。
  30. 根据权利要求29所述的接入管理网元,其特征在于,所述处理单元,还用于若所述第二定位隐私设置数据与所述第一定位隐私设置数据不相同,根据所述第二定位隐私设置数据执行定位服务操作;所述收发单元,还用于向所述数据管理网元发送所述第二定位隐私设置数据。
  31. 一种用户终端,其特征在于,包括处理器和收发器;
    所述处理器,用于计算第一定位隐私设置数据的第一消息校验码;
    所述收发器,用于向数据管理网元发送所述第一消息校验码和所述第一定位隐私设置数据。
  32. 根据权利要求31所述的用户终端,其特征在于,所述处理器具体用于根据第一新鲜性参数计算第一定位隐私设置数据的第一消息校验码;所述第一新鲜性参数包括第一计数器值和第一功能计数器值。
  33. 根据权利要求32所述的用户终端,其特征在于,所述收发器,还用于向所述数据管理网元发送所述第一新鲜性参数。
  34. 根据权利要求32或33所述的用户终端,其特征在于,
    所述收发器,还用于接收来自所述数据管理网元的第三消息校验码;
    所述处理器,还用于计算所述第一定位隐私设置数据的第四消息校验码;若所述第三消息校验码与所述第四消息校验码相同,确定所述第一定位隐私设置数据未被篡改。
  35. 一种数据管理网元,其特征在于,包括处理器、收发器和存储器;
    所述收发器,用于接收来自用户终端的第一消息校验码和第一定位隐私设置数据;
    所述处理器,用于获取所述第一定位隐私设置数据的第二消息校验码;若所述第二消息校验码与所述第一消息校验码相同,确定所述第一定位隐私设置数未被篡改;
    所述存储器,用于存储所述第一定位隐私设置数据。
  36. 根据权利要求35所述的数据管理网元,其特征在于,
    所述处理器,还用于获取所述第一定位隐私设置数据的第三消息校验码;
    所述收发器,还用于向所述用户终端发送所述第三消息校验码。
  37. 根据权利要求36所述的数据管理网元,其特征在于,所述处理器,还用于在所述收发器接收到来自接入管理网元的第二定位隐私设置数据时,将所述存储器存储的所述用户终端的定位隐私设置数据由所述第一定位隐私设置数据更新为第二定位隐私设置数据。
  38. 根据权利要求37所述的数据管理网元,其特征在于,所述收发器,还用于接收来自网关移动定位网元的定位隐私设置数据获取请求,所述定位隐私数据获取请求包括第三新鲜性参数,所述第三新鲜性参数包括第三计数器值和第三功能计数器值;
    所述处理器,还用于根据所述第三新鲜性参数对所述第一定位隐私设置数据进行数字签名,得到数字签名数据;
    所述收发器,还用于向所述网关移动定位网元发送定位隐私设置数据获取响应,所述定位隐私设置数据获取响应包括所述第一定位隐私设置数据、所述数字签名数据和所述第三新鲜性参数。
  39. 一种接入管理网元,其特征在于,包括处理器和收发器;
    收发器,用于在接收到来自网关移动定位网元的定位服务请求时,向数据管理网元发 送定位隐私设置数据获取请求;接收来自所述数据管理网元的定位隐私设置数据获取响应,所述定位隐私设置数据获取响应包括第一定位隐私设置数据;
    所述处理器,用于根据所述第一定位隐私设置数据执行定位服务操作。
  40. 根据权利要求39所述的接入管理网元,其特征在于,所述处理器具体用于若所述第一定位隐私设置数据为允许定位但需要通知用户,控制所述收发器向所述用户终端发送通知消息,并请求获取所述用户终端的位置信息;若所述第一定位隐私设置数据为允许定位但不需要通知用户,请求获取所述用户终端的位置信息;若所述第一定位隐私设置数据为需要通知用户并由所述用户授权是否允许定位,控制所述收发器向所述用户终端发送通知消息,并在接收到来自所述用户终端的允许定位消息时,请求获取所述用户终端的位置信息。
  41. 根据权利要求40所述的接入管理网元,其特征在于,所述定位隐私设置数据获取响应还包括第一指示信息,所述第一指示信息用于指示所述第一定位隐私设置数据首次被所述接入管理网元请求;
    所述处理器,还用于根据所述第一指示信息从所述用户终端获取第二定位隐私设置数据;若所述第二定位隐私设置数据与所述第一定位隐私设置数据相同,执行所述根据所述第一定位隐私设置数据执行定位服务操作的步骤。
  42. 根据权利要求41所述的接入管理网元,其特征在于,所述处理器,还用于若所述第二定位隐私设置数据与所述第一定位隐私设置数据不相同,根据所述第二定位隐私设置数据执行定位服务操作;所述收发器,还用于向所述数据管理网元发送所述第二定位隐私设置数据。
  43. 一种用户终端,其特征在于,所述用户终端包括存储器和处理器,所述存储器用于存储指令,所述处理器用于执行所述存储器中的指令,使得如权利要求7-10任一项所述的方法被实现。
  44. 一种数据管理网元,其特征在于,所述用户终端包括存储器和处理器,所述存储器用于存储指令,所述处理器用于执行所述存储器中的指令,使得如权利要求11-14任一项所述的方法被实现。
  45. 一种接入管理网元,其特征在于,所述接入管理网元包括存储器和处理器,所述存储器用于存储指令,所述处理器用于执行所述存储器中的指令,使得如权利要求15-18任一项所述的方法被实现。
  46. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求7到10任一项所述的方法。
  47. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求11到14任一项所述的方法。
  48. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求15到18任一项所述的方法。
  49. 一种包含指令的计算机程序产品,其特征在于,当其在计算机上运行时,使得计算机执行如权利要求7到10任一项所述的方法。
  50. 一种包含指令的计算机程序产品,其特征在于,当其在计算机上运行时,使得计 算机执行如权利要求11到14任一项所述的方法。
  51. 一种包含指令的计算机程序产品,其特征在于,当其在计算机上运行时,使得计算机执行如权利要求15到18任一项所述的方法。
  52. 一种计算机芯片,其特征在于,所述芯片与存储器相连,所述芯片用于读取并执行所述存储器中存储的软件程序,执行如权利要求7到10任一项所述的方法。
  53. 一种计算机芯片,其特征在于,所述芯片与存储器相连,所述芯片用于读取并执行所述存储器中存储的软件程序,执行如权利要求11到14任一项所述的方法。
  54. 一种计算机芯片,其特征在于,所述芯片与存储器相连,所述芯片用于读取并执行所述存储器中存储的软件程序,执行如权利要求15到18任一项所述的方法。
PCT/CN2020/072852 2019-01-21 2020-01-17 数据传输系统、方法及其装置 WO2020151600A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP20745745.8A EP3905728A4 (en) 2019-01-21 2020-01-17 DATA TRANSMISSION SYSTEM, METHOD, AND DEVICE
US17/380,455 US20210352481A1 (en) 2019-01-21 2021-07-20 Data Transmission System and Method, and Apparatus Thereof

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910055458.X 2019-01-21
CN201910055458.XA CN111464934B (zh) 2019-01-21 2019-01-21 数据传输系统、方法及其装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/380,455 Continuation US20210352481A1 (en) 2019-01-21 2021-07-20 Data Transmission System and Method, and Apparatus Thereof

Publications (1)

Publication Number Publication Date
WO2020151600A1 true WO2020151600A1 (zh) 2020-07-30

Family

ID=71682153

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/072852 WO2020151600A1 (zh) 2019-01-21 2020-01-17 数据传输系统、方法及其装置

Country Status (4)

Country Link
US (1) US20210352481A1 (zh)
EP (1) EP3905728A4 (zh)
CN (1) CN111464934B (zh)
WO (1) WO2020151600A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11317321B1 (en) * 2020-10-27 2022-04-26 Sprint Communications Company L.P. Methods for delivering network slices to a user
CN117061093A (zh) * 2022-05-06 2023-11-14 华为技术有限公司 一种授权的方法和装置
CN117061141A (zh) * 2022-05-07 2023-11-14 维沃移动通信有限公司 隐私保护信息处理方法、装置及通信设备
CN115333885B (zh) * 2022-06-23 2023-05-26 广州大学 一种基于联邦学习的智能家居隐私保护方法及装置
CN115103443B (zh) * 2022-07-04 2024-04-19 中国联合网络通信集团有限公司 定位方法、装置和存储介质
GB2622369A (en) * 2022-09-13 2024-03-20 Nokia Technologies Oy Controlling network behaviour to inhibit information leakage
CN115997434A (zh) * 2022-10-14 2023-04-21 北京小米移动软件有限公司 定位感知方法、装置、设备、存储介质及芯片
CN116628708A (zh) * 2023-07-25 2023-08-22 荣耀终端有限公司 启动芯片的方法、电子设备及可读存储介质

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1567878A (zh) * 2003-06-27 2005-01-19 华为技术有限公司 一种在无线局域网中进行数据完整性保护的方法

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011094763A1 (en) * 2010-02-01 2011-08-04 Loc-Aid Technologies, Inc. System and method for location privacy and location information management over wireless systems
CN107409344B (zh) * 2015-03-17 2021-03-16 诺基亚技术有限公司 无线路由
CN114826673A (zh) * 2016-07-06 2022-07-29 华为技术有限公司 一种传输数据的保护系统、方法及装置
WO2018202284A1 (en) * 2017-05-03 2018-11-08 Telefonaktiebolaget Lm Ericsson (Publ) Authorizing access to user data
US11831655B2 (en) * 2017-10-02 2023-11-28 Qualcomm Incorporated Incorporating network policies in key generation

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1567878A (zh) * 2003-06-27 2005-01-19 华为技术有限公司 一种在无线局域网中进行数据完整性保护的方法

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
3GPP: "3GPP TR 23.731 V0.7.0", 3RD GENERATION PARTNERSHIP PROJECT; TECHNICAL SPECIFICATION GROUP SERVICES AND SYSTEM ASPECTS; STUDY ON ENHANCEMENT TO THE 5GC LOCATION SERVICES (RELEASE 16), 31 October 2018 (2018-10-31), pages 1 - 165, XP051487688 *
HUAWEI ET AL.: "3GPP TSG SA WG3 (Security) Meeting #93 S3-183771", KEY ISSUE FOR INTEGRITY PROTECTION OF LOCATION AND ASSISTANCE DATA, 16 November 2018 (2018-11-16), XP051490345, DOI: 20200325144558Y *
HUAWEI ET AL.: "3GPP TSG-SA WG3 (Security) Meeting #94 S3-190188", SOLUTION ON INTEGRITY PROTECTION OF PRIVACY SETTING BETWEEN UE AND UDM, 21 January 2019 (2019-01-21), XP051611455, DOI: 20200325144455PX *
See also references of EP3905728A4
VIVO ET AL.: "SA WG2 Meeting #127 S2-183951", SOLUTION5 UPDATE: PRIVACY CHECK PROCEDURE W.R.T. LMF BASED ARCHITECTURE, 20 April 2018 (2018-04-20), XP051432504 *

Also Published As

Publication number Publication date
CN111464934B (zh) 2021-10-15
EP3905728A1 (en) 2021-11-03
CN111464934A (zh) 2020-07-28
EP3905728A4 (en) 2022-06-01
US20210352481A1 (en) 2021-11-11

Similar Documents

Publication Publication Date Title
WO2020151600A1 (zh) 数据传输系统、方法及其装置
US20220321599A1 (en) Mobile communication method, apparatus, and device
US20210297410A1 (en) Mec platform deployment method and apparatus
CN111866733B (zh) 终端设备的位置确定方法和设备
CN111727611B (zh) 位置特定的用户信息提供
WO2019184728A1 (zh) 终端设备的位置确定方法和设备
ES2934600T3 (es) Método de conexión de red, terminal de punto de acceso y terminal de gestión
RU2411659C2 (ru) Система обработки информации определения местоположения и способ выполнения уведомления на основе определения местоположения
CN113132908B (zh) 一种业务管理方法及装置
US20220046415A1 (en) Systems and methods for enhanced authentication techniques using network-implemented location determination
US20080183714A1 (en) Location-based brokerage service for heterogeneous access roaming
US8285253B2 (en) Method for managing a telecommunication network and associated devices
EP4142328A1 (en) Network authentication method and apparatus, and system
AU2021247219B2 (en) Terminal parameter updating protection method and communication device
EP4030798A1 (en) Method for implementing external authentication, communication device and communication system
WO2018196705A1 (zh) 网络安全保护方法、设备及系统
EP3876129B1 (en) Integrity for mobile network data storage
CN114301788A (zh) 一种切片管理方法、装置及通信设备
US20220217539A1 (en) Authorization in cellular communication systems
WO2021233286A1 (zh) 数据处理方法、装置、网络设备及终端
US20230308440A1 (en) Establishment of Secure Communication
KR101906085B1 (ko) 존재 정보를 이용한 근접도 서비스(prose)를 위한 치안/보안 ue 통신 프레임워크
CN113170276A (zh) 用于递送局限于预定义服务区域的专用服务的方法和系统
EP4072179B1 (en) Method for license-based access network access control independent of subscriber data in a telecommunications network and telecommunications network thereof
WO2024061207A1 (zh) 用户级数据的管理方法、装置、通信设备及可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20745745

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020745745

Country of ref document: EP

Effective date: 20210728