WO2020220854A1 - 未授权无人机的检测方法、装置和系统 - Google Patents

未授权无人机的检测方法、装置和系统 Download PDF

Info

Publication number
WO2020220854A1
WO2020220854A1 PCT/CN2020/079989 CN2020079989W WO2020220854A1 WO 2020220854 A1 WO2020220854 A1 WO 2020220854A1 CN 2020079989 W CN2020079989 W CN 2020079989W WO 2020220854 A1 WO2020220854 A1 WO 2020220854A1
Authority
WO
WIPO (PCT)
Prior art keywords
user equipment
attribute information
message
unauthorized
network
Prior art date
Application number
PCT/CN2020/079989
Other languages
English (en)
French (fr)
Inventor
张成晨
舒林
吴问付
宗在峰
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP20798209.1A priority Critical patent/EP3952377B1/en
Publication of WO2020220854A1 publication Critical patent/WO2020220854A1/zh
Priority to US17/513,356 priority patent/US20220051570A1/en

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G5/00Traffic control systems for aircraft, e.g. air-traffic control [ATC]
    • G08G5/0004Transmission of traffic-related information to or from an aircraft
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • H04W4/027Services making use of location information using location based information parameters using movement velocity, acceleration information
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B64AIRCRAFT; AVIATION; COSMONAUTICS
    • B64CAEROPLANES; HELICOPTERS
    • B64C39/00Aircraft not otherwise provided for
    • B64C39/02Aircraft not otherwise provided for characterised by special use
    • B64C39/024Aircraft not otherwise provided for characterised by special use of the remote controlled vehicle type, i.e. RPV
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/10Scheduling measurement reports ; Arrangements for measurement reports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/12Mobility data transfer between location registers or mobility servers
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B64AIRCRAFT; AVIATION; COSMONAUTICS
    • B64UUNMANNED AERIAL VEHICLES [UAV]; EQUIPMENT THEREFOR
    • B64U10/00Type of UAV
    • B64U10/10Rotorcrafts
    • B64U10/13Flying platforms
    • B64U10/14Flying platforms with four distinct rotor axes, e.g. quadcopters
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B64AIRCRAFT; AVIATION; COSMONAUTICS
    • B64UUNMANNED AERIAL VEHICLES [UAV]; EQUIPMENT THEREFOR
    • B64U2101/00UAVs specially adapted for particular uses or applications
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B64AIRCRAFT; AVIATION; COSMONAUTICS
    • B64UUNMANNED AERIAL VEHICLES [UAV]; EQUIPMENT THEREFOR
    • B64U2101/00UAVs specially adapted for particular uses or applications
    • B64U2101/20UAVs specially adapted for particular uses or applications for use as communications relays, e.g. high-altitude platforms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/60Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Definitions

  • This application relates to the field of communication technology, and in particular to a detection method, device and system for unauthorized drones.
  • unmanned aerial vehicle UAV
  • UE user equipment
  • the drone controller uses the network to use the drone’s flight data Send to the cloud, so that the regulatory authority can detect whether the drone violates the regulations based on the flight data in the cloud; or, the regulatory agency can detect whether the drone violates the regulations through the drone detection counter device, so as to conduct the drone Detection.
  • a user equipment accessing a 3GPP network requests to use the UAV system communication capability, and it needs to pass the authentication and authorization of the UTM (Unmanned Aerial System Traffic Management) network element.
  • UTM Unmanned Aerial System Traffic Management
  • an unauthorized drone can be understood as a user equipment that meets the following conditions: a user equipment that does not have the communication capability of an unmanned aerial system (UAS), and its mobile attributes conform to the mobile attributes of a drone, or , A user device with UAV system communication capability, and instructed not to use the UAV system communication capability during registration, but its mobile attributes conform to the UAV mobile attributes, or users with UAV system communication capabilities Device, and instructed to use the communication capability of the UAV system during registration. Its movement attributes conform to that of the UAV, but its movement attribute information does not match the movement attribute information allowed by its contract information.
  • UAS unmanned aerial system
  • the communication capability of the UAV system refers to the ability of the user equipment connected to the 3GPP system to request and obtain permission from the 3GPP system or allow it to be used for UAV system communication according to the contract data.
  • the user equipment is in use
  • the communication capability of the UAV system needs to meet specific conditions, that is, specific mobile attribute information.
  • the movement attribute information includes specific time range, space range, and motion speed and other attribute information that restricts the movement of the user equipment.
  • the UAV system here includes UAV and UAV controller.
  • Unauthorized drones have a large negative impact on individuals and society, and may cause unpredictable loss of life and property. Therefore, how to detect unlicensed drones that have been connected to the 3GPP network is an urgent technical problem to be solved by those skilled in the art.
  • This application provides a detection method, device and system for unauthorized drones, which realize the detection of unauthorized drones that have been connected to the 3GPP network.
  • an embodiment of the present application provides a detection method for an unauthorized drone.
  • the detection method for an unauthorized drone may include:
  • the tracking instruction message is used to instruct to report the attribute information of the user equipment when the attribute information of the user equipment in the coverage area of the network equipment meets preset conditions; wherein the attribute information includes location information and/or speed information ;
  • the identity status of the user equipment is identified, and the identity status includes an authorized drone or an unauthorized drone.
  • the AMF sends a tracking instruction message to the network device; wherein the tracking instruction message is used to indicate when the attribute information of the user equipment in the coverage area of the network device meets the preset When conditions are met, report the attribute information of the user equipment; and obtain the attribute information of the user equipment; in this way, after the attribute information of the user equipment is obtained, the identity status of the user equipment can be identified according to the attribute information of the user equipment, that is, the user equipment is identified Whether it is an unauthorized drone, so as to realize the detection of unauthorized drones that have been connected to the 3GPP network.
  • identifying the identity state of the user equipment according to the attribute information of the user equipment may include:
  • the identity of the user equipment is identified according to the attribute information of the user equipment and the subscription data of the user equipment to obtain the identity status of the user equipment.
  • the identity of the user equipment may further include:
  • the subscription data response message includes the subscription data of the user equipment, so that the AMF can identify the identity of the user equipment according to the attribute information of the user equipment and the subscription data of the user equipment, thereby obtaining the user equipment Status status.
  • identifying the identity state of the user equipment according to the attribute information of the user equipment may include:
  • the analysis response message includes the identity status of the user equipment, so that AMF does not need to identify the identity of the user equipment according to the attribute information of the user equipment and the subscription data of the user equipment, and only needs to receive the identification result. Reduce the load of AMF.
  • the detection method of the unauthorized drone may further include:
  • the unauthorized drone report message is used to indicate that the user device is an unauthorized drone, so that the UTM can learn the identity status of the user device.
  • the detection method of the unauthorized drone may further include:
  • restriction instruction information is used to instruct the network device to restrict the available network resources of the user equipment.
  • restricting the available network resources of the user equipment can be understood as denying the data transmission and reception of the user equipment, or only allowing the signaling transmission and reception of the user equipment, or not allowing network switching, or when it is below a certain altitude or speed. Resume the data transmission and reception of the user equipment, or only provide services with lower QoS requirements, or other measures used to restrict the user equipment from using network resources.
  • sending a tracking instruction message to the network device may include:
  • a tracking instruction message is sent to the network device.
  • sending a tracking instruction message to the network device may include:
  • the detection request message includes information about a specific area
  • sending a tracking instruction message to the network device may include:
  • a tracking instruction message is sent to the network equipment.
  • the embodiments of the present application also provide a detection method for unauthorized drones, and the detection method for unauthorized drones may include:
  • the tracking instruction message is used to instruct to report the attribute information of the user equipment when the attribute information of the user equipment in the coverage area of the network equipment meets a preset condition; wherein, the attribute The information includes location information and/or speed information;
  • the AMF before sending the attribute information of the user equipment to the AMF, it may further include:
  • the location report instruction message is used to instruct the user equipment to report the attribute information of the user equipment when the attribute information of the user equipment meets the preset condition;
  • the method may also include:
  • the restriction indication information is used to instruct the network device to restrict the available network resources of the user equipment.
  • the embodiments of the present application also provide a detection method for unauthorized drones, and the detection method for unauthorized drones may further include:
  • the detection request message is sent to the UAV traffic management network element AMF.
  • the detection request message includes information about a specific area.
  • the method may further include:
  • the unauthorized drone report message is used to indicate that the user equipment is an unauthorized drone.
  • an embodiment of the present application also provides a communication device, which may include:
  • the sending unit is used to send a tracking instruction message to the network device;
  • the tracking instruction message is used to instruct to report the attribute information of the user equipment when the attribute information of the user equipment in the coverage area of the network equipment meets a preset condition; wherein the attribute information includes location information And/or speed information;
  • the processing unit is used to obtain the attribute information of the user equipment, and identify the identity status of the user equipment according to the attribute information of the user equipment.
  • the identity status includes an authorized drone or an unauthorized drone.
  • the processing unit is specifically configured to identify the identity of the user equipment according to the attribute information of the user equipment and the subscription data of the user equipment to obtain the identity status of the user equipment.
  • the communication device may further include a receiving unit;
  • the sending unit is also used to send a subscription data query message to the unified data management network element UDM, where the query message is used to instruct the UDM device to query the subscription data of the user equipment;
  • the receiving unit is configured to receive a subscription data response message from UDM, and the subscription data response message includes subscription data of the user equipment.
  • the sending unit is also used to send an analysis request message to the network data analysis network element NWDAF, where the analysis request message includes the attribute information of the user equipment, and the analysis request message is used to instruct the NWDAF device according to the user equipment Attribute information to identify the identity status of the user equipment;
  • the receiving unit is further configured to receive an analysis response message from the NWDAF device, and the analysis response message includes the identity status of the user equipment.
  • the sending unit is also used to send an unauthorized drone report message to the UTM device of the drone traffic management network element.
  • the man-machine report message is used to indicate that the user equipment is an unauthorized drone.
  • the sending unit is also used to send a restriction indication message to the network equipment; the restriction indication information is used to instruct the network equipment to restrict the use of the user equipment Internet resources.
  • the receiving unit is also used to receive a subscription data change notification message from UDM; the subscription data change notification message is used to indicate that the subscription data of the user equipment has changed;
  • the sending unit is specifically configured to send a tracking instruction message to the network device according to the subscription data change notification message.
  • the receiving unit is also used to receive a detection request message from UTM;
  • the sending unit is specifically configured to send a tracking instruction message to the network device.
  • the detection request message includes information about a specific area
  • the sending unit is specifically configured to send a tracking instruction message to the network device if there is an intersection area between the registration area of the user equipment and the specific area.
  • an embodiment of the present application also provides a communication device, which may include:
  • the receiving unit is configured to receive a tracking instruction message from the access and mobility management function network element AMF, where the tracking instruction message is used to instruct to report the attributes of the user equipment when the attribute information of the user equipment in the coverage area of the network equipment meets preset conditions Information; where the attribute information includes position information and/or speed information;
  • the sending unit is used to send the attribute information of the user equipment to the AMF.
  • the sending unit is further configured to send a location report instruction message to the user equipment;
  • the location report instruction message is used to instruct the user equipment to report the attribute information of the user equipment when the attribute information of the user equipment meets a preset condition;
  • the receiving unit is also used to receive attribute information from the user equipment.
  • the receiving unit is also used to receive a restriction indication message from AMF; the restriction indication information is used to instruct the network equipment to restrict the available network resources of the user equipment .
  • an embodiment of the present application also provides a communication device, which may include:
  • the processing unit is used to obtain whether to send a detection request message
  • the sending unit is used to send the detection request message to the UAV traffic management network element AMF when it is determined to send the detection request message.
  • the detection request message includes information about a specific area.
  • the communication device further includes:
  • the receiving unit is used to receive an unauthorized drone report message from the access and mobility management function network element AMF.
  • the unauthorized drone report message is used to indicate that the user equipment is an unauthorized drone.
  • an embodiment of the present application also provides a communication device.
  • the communication device may include a memory and a processor, where:
  • the memory is used to store program instructions
  • the processor is configured to read the program instructions in the memory, and execute the unauthorized drone detection method described in any one of the possible implementations of the first aspect according to the program instructions in the memory; or , Execute the detection method for unauthorized drones described in any of the possible implementations of the second aspect; or, execute the detection method of unauthorized drones in any of the possible implementations of the third aspect. Detection method.
  • an embodiment of the present application further provides a computer storage medium, including instructions, when the instructions are executed by one or more processors, cause the communication device to execute any one of the possible implementations of the first aspect.
  • the detection method for unauthorized drones described above; or, the detection method for unauthorized drones described in any one of the possible implementations of the second aspect described above; or, any one of the possible implementations of the third aspect described above The detection method for unauthorized drones described in the implementation mode.
  • an embodiment of the present application also provides a chip on which a computer program is stored.
  • the computer program executes the unauthorized unauthorised implementation described in any one of the possible implementations of the first aspect.
  • an embodiment of the present application further provides a communication system.
  • the communication system may include: user equipment and the communication device described in any possible implementation manner of the fifth aspect.
  • an embodiment of the present application also provides a communication system, which may include user equipment and network equipment;
  • the network device is used to receive the tracking instruction message from the access and mobility management function network element AMF, and send the location report instruction message to the user equipment; wherein, the tracking instruction message is used to indicate when the user equipment in the coverage area of the network device Report the attribute information of the user equipment when the attribute information meets the preset condition; wherein, the attribute information includes location information and/or speed information;
  • the user equipment is used to report the attribute information of the user equipment to the network equipment after receiving the location report indication message.
  • an embodiment of the present application further provides a communication system.
  • the communication system may include: the communication device in any possible implementation manner of the fourth aspect and the communication device in any possible implementation manner of the fifth aspect. Communication device.
  • an embodiment of the present application also provides a communication system, which may include AMF and network equipment;
  • AMF is used to send a tracking instruction message to the network device;
  • the tracking instruction message is used to instruct to report the attribute information of the user equipment when the attribute information of the user equipment in the coverage area of the network equipment meets preset conditions; wherein, the attribute information includes the location Information and/or speed information;
  • the network equipment is used to send the attribute information of the user equipment to the AMF after receiving the tracking instruction message;
  • AMF is also used to identify the identity status of the user equipment based on the attribute information of the user equipment.
  • the identity status includes authorized drones or unauthorized drones.
  • the AMF is specifically used to identify the identity of the user equipment according to the attribute information of the user equipment and the subscription data of the user equipment to obtain the identity status of the user equipment.
  • the AMF is also used to send a restriction instruction message to the network device; wherein the restriction instruction information is used to instruct the network device to restrict the user equipment's availability Use network resources.
  • an embodiment of the present application further provides a communication system.
  • the communication system may include: the communication device in any possible implementation manner of the fourth aspect and the communication device in any possible implementation manner of the sixth aspect. Communication device.
  • an embodiment of the present application also provides a communication system, which may include AMF and UTM;
  • UTM is used to obtain whether to send a detection request message; and when it is determined to send a detection request message, it sends a detection request message to the UAV traffic management network element AMF;
  • AMF is used to send a tracking instruction message to the network device after receiving the detection request message, and identify the identity status of the user equipment according to the attribute information of the user equipment.
  • the identity status includes authorized drones or unauthorized drones;
  • the tracking indication message is used to instruct to report the attribute information of the user equipment when the attribute information of the user equipment in the coverage area of the network equipment meets a preset condition; wherein, the attribute information includes location information and/or speed information.
  • the detection request message includes information about a specific area.
  • the identity status of the user equipment in the coverage area of the network device is an unauthorized drone, AMF, it is also used to send an unauthorized drone report message to the UTM device, and the unauthorized drone reports The message is used to indicate that the user equipment is an unauthorized drone;
  • UTM is also used to receive unauthorized UAV report messages from the access and mobility management function network element AMF.
  • the AMF sends a tracking instruction message to the network device; wherein the tracking instruction message is used to indicate when the attribute information of the user equipment in the coverage area of the network device meets the preset When conditions are met, report the attribute information of the user equipment; and obtain the attribute information of the user equipment; in this way, after the attribute information of the user equipment is obtained, the identity status of the user equipment can be identified according to the attribute information of the user equipment, that is, the user equipment is identified Whether it is an unauthorized drone, so as to realize the detection of unauthorized drones that have been connected to the 3GPP network.
  • FIG. 1 is a schematic diagram of an application scenario provided by an embodiment of the application
  • FIG. 2 is a schematic diagram of an unauthorized drone detection method provided by an embodiment of the application
  • FIG. 3 is a schematic diagram of another method for detecting unauthorized drones according to an embodiment of the application.
  • FIG. 4 is a schematic diagram of another method for detecting unauthorized drones according to an embodiment of the application.
  • FIG. 5 is a schematic diagram of an unauthorized drone detection method provided by an embodiment of the application.
  • FIG. 6 is a schematic structural diagram of a communication device provided by an embodiment of this application.
  • FIG. 7 is a schematic structural diagram of another communication device provided by an embodiment of this application.
  • FIG. 8 is a schematic structural diagram of another communication device provided by an embodiment of this application.
  • FIG. 9 is a schematic structural diagram of a communication device provided by an embodiment of the application.
  • the embodiments of the present application may be applied to the fifth generation (5G) mobile communication system, and may also be applied to other communication systems, such as other mobile communication systems that may appear in the future.
  • 5G fifth generation
  • other communication systems such as other mobile communication systems that may appear in the future.
  • Figure 1 is a schematic diagram of an application scenario provided by an embodiment of the application.
  • the embodiment of the application can be applied to an unmanned aerial system (UAS), and the communication system involved can be Including at least one user equipment, network equipment and access and mobility management function (AMF).
  • the communication system can also include unified data management (UDM) and drones Traffic management network element (unmanned aerial vehicle traffic management, UTM).
  • UTM unmanned aerial vehicle traffic management
  • AMF sends a tracking instruction message to the network device; wherein the tracking instruction message is used To indicate that when the attribute information of the user equipment in the coverage area of the network device meets the preset conditions, report the attribute information of the user equipment; wherein the attribute information includes location information and/or speed information, and obtain the attribute information of the user equipment; After the attribute information of the user equipment is reached, the identity status of the user equipment can be identified according to the attribute information of the user equipment, that is, whether the user equipment is an unauthorized drone, so as to realize the unauthorized access to the 3GPP network. Detection of drones.
  • unauthorized drones can be understood as user equipment that meets the following conditions: user equipment that does not have the UAS communication capability of the drone system, and its mobile attributes conform to the drone’s Mobile attributes, or user equipment with UAV system communication capabilities, and instructed not to use the UAV system communication capabilities during registration, but its mobile attributes comply with the UAV’s mobile attributes, or have UAV systems User equipment with communication capability, and instructed to use the UAV system communication capability during registration, its mobile attribute conforms to the UAV's mobile attribute, but its mobile attribute information does not match the mobile attribute information allowed by its contract information.
  • the attribute information includes position information and/or speed information. It can be understood that the attribute information may only include position information or speed information, or may include both position information and speed information. Actual settings need to be performed, and the embodiments of the present application do not make specific limitations here. It can be understood that the location information is not limited to include the horizontal position of the user equipment, and may also include the height of the user equipment. Wherein, the horizontal position of the user equipment can be determined by the tracking area identifier, or can be determined by other alternative methods.
  • the altitude information of the user equipment can be the altitude of the user equipment, the height from the ground, or other methods for determining The vertical position information; the speed information may include the speed information of the user equipment in the horizontal direction, and may also include the speed of the user equipment in the vertical direction.
  • user equipment is also called a terminal or terminal device, which is a device that provides users with voice and/or data connectivity, for example, a handheld device with a wireless connection function , Car equipment, etc.
  • Common user equipment includes, for example: mobile phones, tablet computers, laptops, handheld computers, mobile internet devices (MID), and wearable devices.
  • wearable devices include smart watches, smart bracelets, and step counters.
  • the user equipment in this application may also be a drone device with 3GPP system communication capabilities.
  • the network equipment involved in the embodiments of this application also known as a radio access network (RAN) equipment, is an access device that a terminal device accesses to the mobile communication system in a wireless manner, and may be a base station NodeB, Evolved NodeB (eNB), transmission reception point (TRP), next generation NodeB (gNB) in 5G mobile communication system, base station in future mobile communication system or WiFi system Access node, etc.; it may also be a module or unit that completes part of the functions of the base station, for example, it may be a centralized unit (CU) or a distributed unit (DU).
  • CU centralized unit
  • DU distributed unit
  • the embodiment of the present application does not limit the specific technology and specific device form adopted by the radio access network device.
  • “at least one” refers to one or more, and “multiple” refers to two or more.
  • “And/or” describes the association relationship of the associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone. A and B can be singular or plural.
  • the character "/" generally indicates that the associated objects before and after are in an "or" relationship.
  • indications, messages, etc. in the embodiments of the present application may be new message types or new information elements, or may be included in existing messages or information elements.
  • FIG. 2 is an example of an unauthorized drone provided by this application.
  • Machine detection methods can include:
  • the AMF sends a tracking instruction message to the network device.
  • the tracking indication message is used to instruct to report the attribute information of the user equipment when the attribute information of the user equipment in the coverage area of the network equipment meets a preset condition; the attribute information may include location information and/or speed information. It is understandable that the attribute information of the user equipment reported in this application is not limited to the current attribute information of the user equipment, and can be extended to the recent attribute information of the user equipment.
  • the tracking instruction message may include a preset condition, and the preset condition may be UAV detection threshold information. Satisfying the preset condition can be understood as greater than or equal to the UAV detection threshold.
  • the drone detection threshold information may include the critical value of the height of the user equipment from the ground (AGL) and/or the critical value of the speed.
  • the speed critical value may include the average moving speed critical value of the user equipment, the instantaneous moving speed critical value of the user equipment, and the speed critical value may include horizontal and vertical directions.
  • the tracking instruction message may indicate the range of user equipment in the coverage area of the network device to be detected. It may be all user equipment in the coverage area of the network device, or it may be that the coverage area does not have UAV system communication capability or User equipment that has UAV system communication capabilities but instructs not to use it, or may be a user equipment that uses UAV system communication capabilities within the coverage area.
  • the UAV detection threshold information acquired by the AMF may be detection threshold information pre-configured by the operator, or may be detection threshold information sent by the receiving UTM.
  • the UTM detection threshold information provided by UTM may be configured by aviation regulatory authorities.
  • AMF when AMF not only receives the drone detection threshold information sent by UTM, but also configures the drone detection threshold information by the operator, AMF can set the smaller of the two drone detection threshold information The value is determined as the UAV target detection threshold information, and the target detection threshold information is sent to the network device.
  • the network device After the network device receives the tracking instruction message sent by the AMF, it can configure the user equipment in its coverage area according to the drone detection threshold information included in the instruction message, that is, perform the following S202:
  • the network device configures the user equipment in its coverage area according to the detection threshold information of the drone.
  • a network device configures user equipment in its coverage area according to the drone detection threshold information
  • the network device may follow the tracking instruction message to indicate the network equipment coverage area
  • the user equipment range or local configuration of the user equipment is configured to configure drone detection threshold information to some user equipment in its coverage area.
  • the network device may configure drone detection threshold information for all user equipment in its coverage area.
  • the communication capability of the UAV system in the embodiments of this application refers to the communication capability of the UAV system provided by the 3GPP system, including the communication capability within the UAV system, that is, the UAV and the UAV controller The communication capability between the UAV or the UAV, or the UTM system and the UTM.
  • the network equipment can configure the threshold information according to the above method.
  • the network device may first request it to report attribute information, and then determine whether to configure threshold information or directly report to AMF according to the above method and the obtained attribute information.
  • the network device can also provide the user equipment in its coverage area with the average altitude of the ground where the user equipment is currently located, so that the user equipment can be based on the average ground Altitude, determine its height from the ground.
  • the user equipment After the network device configures the user equipment in its coverage area according to the drone detection threshold information through the above S202, the user equipment can determine whether to report its attribute information to the network device according to its attribute information and the configured drone detection threshold information.
  • the attribute information of the user equipment in the embodiment of the present application satisfies the preset condition, which can mean that a certain parameter information of the user equipment meets a threshold in its corresponding drone detection threshold information, or it can refer to the user equipment The multiple parameter information of all satisfies the threshold in the corresponding UAV detection threshold information. It should be noted that if the attribute information of the user equipment meets the preset condition in this application, the reported attribute information of the user equipment is not limited to the current attribute information of the user equipment, and can be extended to the recent attribute information of the user equipment.
  • the attribute information reported by the user equipment may be direct or indirect.
  • the user equipment may directly report the speed value and direction, or the user equipment may report the position information and the corresponding time stamp, based on which the speed information of the user equipment can be inferred.
  • the user equipment when the user equipment reports its attribute information to the network device, it may be that the attribute information of the user equipment has already met the preset conditions when the user equipment is connected to the network device. In this way, once the drone detection threshold information is configured, it can be reported to the network device.
  • the network device reports the attribute information of the user equipment; it can also be that the attribute information of the user equipment does not meet the preset conditions when the user equipment is connected to the network equipment, but meets the preset conditions at a later point in time, or the user can be reported to the network equipment
  • the attribute information of the device it can also report the attribute information of the user equipment after receiving a request from the network device when the user equipment switches from the idle state to the connected state.
  • the network device may send the attribute information reported by the user equipment to the AMF, that is, perform the following S204:
  • the network device sends a location report message to the AMF.
  • the location report message may include the identification of the user equipment and the attribute information of the user equipment, and of course, may also include other information.
  • the embodiment of the present application only uses the location report message to include the identification of the user equipment and the user equipment.
  • the attribute information of the device is described as an example, but it does not mean that the embodiment of the present application is limited to this.
  • the network device when it sends a location report message to the AMF, it can directly carry the attribute information of the user equipment in the location report message and send it to the AMF when it receives the attribute information reported by a certain user equipment, or it can wait A preset period of time, and the attribute information of all user equipment received within the preset period of time is carried in a location report message in the form of a list and sent to the AMF, which can be set according to actual needs.
  • how to Sending a location report message is not further limited in the embodiment of this application.
  • the network device when the network device sends a location report message to the AMF, it may not be limited to the attribute information reported by the user equipment itself, and may also include the attribute information of the user equipment actively measured by the network device.
  • the AMF can obtain more attribute information of the user equipment, and carry out the identity status of the user equipment according to the attribute information. Recognition can further improve the accuracy of recognition.
  • the attribute information of the user equipment actively measured by the network equipment may replace the attribute information reported by the user equipment. For example, when a user equipment reaches a threshold or receives an active report request from a network device, it does not report its attribute information in time or does not report its attribute information. In this case, the network device may actively measure the attribute information of the user equipment after the preset timer expires, and The obtained attribute information is reported to AMF. If the measured attribute information has exceeded the threshold, the report message may also include an identifier that the user equipment has not reported in time, as auxiliary information for AMF to determine unauthorized drones; in addition, the network The device may periodically or selectively measure the attribute information of the user equipment in the characteristic time and space range.
  • the report message may also include the identifier of the abnormal information reported by the user equipment as auxiliary information for AMF to determine the unauthorized UAV.
  • the AMF identifies the identity state of the user equipment according to the attribute information of the user equipment.
  • the identity status includes authorized drones or unauthorized drones.
  • the AMF identifies the identity of the user equipment according to the attribute information of the user equipment and the subscription data of the user equipment to obtain the identity status of the user equipment.
  • the subscription data of the user equipment may include information such as the time allowed to fly by the user equipment, the position allowed to fly (including the altitude allowed to fly), and the speed allowed to fly.
  • the AMF does not have the subscription data of the user equipment, it needs to send a subscription data query message to the unified data management network element UDM.
  • the query message is used to instruct the UDM device to query the subscription data of the user equipment to query the subscription data of the user equipment , And receive the subscription data response message from the UDM, and the subscription data response message includes the subscription data of the user equipment, so as to obtain the subscription data of the user equipment.
  • the location report message received by the AMF includes the attribute information of the user equipment in the form of a list, the AMF needs to query the UDM to be in the list, but there is no corresponding subscription data in the AMF.
  • the subscription data of the user equipment if the location report message received by the AMF includes the attribute information of the user equipment in the form of a list, the AMF needs to query the UDM to be in the list, but there is no corresponding subscription data in the AMF. The subscription data of the user equipment.
  • AMF does not need to identify the identity of the user equipment according to the attribute information of the user equipment and the subscription data of the user equipment, but sends to the network data analysis function (NWDAF)
  • NWDAF network data analysis function
  • the analysis request message enables the NWDAF device to recognize the identity status of the user equipment according to the attribute information of the user equipment, and receive an analysis response message from the NWDAF device.
  • the analysis response message includes the identity status of the user equipment, thereby obtaining the identity status of the user equipment.
  • the analysis request message includes attribute information of the user equipment.
  • the attribute information may be attribute information of the user equipment at different time points.
  • the analysis request message is used to instruct the NWDAF device to identify the identity status of the user equipment according to the attribute information of the user equipment.
  • the AMF can send an analysis request message to the NWDAF to instruct the NWDAF device to identify the identity status of the user equipment according to the attribute information of the user equipment.
  • it can also instruct the NWDAF device to identify the user according to the attribute information of the user equipment in a subscription manner The identity status of the device.
  • the AMF sends a tracking instruction message to the network device; wherein the tracking instruction message is used to indicate when the attribute information of the user equipment in the coverage area of the network device meets the preset When conditions are met, report the attribute information of the user equipment; and obtain the attribute information of the user equipment; in this way, after the attribute information of the user equipment is obtained, the identity status of the user equipment can be identified according to the attribute information of the user equipment, that is, the user equipment is identified Whether it is an unauthorized drone, so as to realize the detection of unauthorized drones that have been connected to the 3GPP network.
  • the detection method for the unauthorized drone may also include:
  • the AMF sends an unauthorized drone report message to the UTM device of the drone traffic management network element.
  • the unauthorized drone report message is used to indicate that the user equipment is an unauthorized drone.
  • the unauthorised drone report message may include the identification of the user equipment, recent attribute information, etc.
  • the unlicensed drone report message can also include the type of unlicensed drone, that is, user equipment that does not have drone system communication capabilities, has drone system communication capabilities but is not registered for drone systems Communication user equipment, or user equipment that has UAV system communication capabilities and is registered for UAV system communication but its mobile attributes do not meet the mobile attributes allowed by the contract data.
  • the location report message received by the AMF includes the attribute information of the user equipment in the form of a list
  • the AMF can carry the list of unauthorized user equipment in an unauthorized drone report message at one time and send it to UTM.
  • You can also carry the list of unauthorized user equipment in an unauthorized drone report message and send it to UTM in stages.
  • the AMF sends a restriction instruction message to the network device.
  • the restriction indication information is used to instruct the network device to restrict the available network resources of the user equipment.
  • the AMF When the AMF recognizes that the user equipment is an unauthorized drone, it can send a restriction instruction message to the network equipment to instruct the network equipment to restrict the available network resources of the user equipment.
  • restricting the available network resources of the user equipment can be understood as denying the data transmission and reception of the user equipment, or only allowing the signaling transmission and reception of the user equipment, or not allowing network switching, or when it is below a certain altitude or speed. Resume the data transmission and reception of the user equipment, or only provide services with lower QoS requirements, or other measures used to restrict the user equipment from using network resources.
  • S206 can be executed first, and then S207; S207 can also be executed first, and then S206; of course, S206 and S207 can also be executed simultaneously. It can be specifically set according to actual needs.
  • the embodiment of the present application only takes the execution of S206 and then S207 as an example for description, but it does not mean that the embodiment of the present application is limited to this.
  • the identity state that is insufficient to identify the user equipment may include the inability to recognize the identity state of the user equipment, or it may include an unauthorized drone that determines the identity state of the user equipment as suspicious.
  • FIG. 3 is a schematic diagram of another unauthorized drone detection method provided by an embodiment of the application.
  • the unauthorized drone detection method may further include:
  • the AMF sends a tracking location indication message to the network device.
  • the tracking location indication message may include the identification of the user equipment.
  • the user equipment here may be a user equipment whose identity status cannot be determined through the above S201-S205 in the coverage area of the network equipment.
  • the number of the user equipment may be one or multiple.
  • the identity status of some user equipment cannot be identified through the above S201-S205, it may be necessary to continue to track the location of the user equipment within a certain period of time, and the user needs to be acquired again.
  • Attribute information of the device Generally, if AMF determines that the collected user equipment attribute information is insufficient, or receives a response from NWDAF indicating that it needs to continue to obtain user equipment attribute information, AMF needs to send a tracking location indication message to the network device again to obtain it again according to The attribute information of the obtained user equipment identifies the identity state of the user equipment.
  • the tracking location indication message may also include the frequency of tracking, the frequency of reporting, and the duration of collection.
  • the reporting frequency can be that the network device collects the attribute information of the user equipment multiple times and sends it to the AMF at one time, or sends the attribute information of multiple user equipment to the AMF at a certain interval, which can be set according to actual needs. , The embodiments of this application do not make specific restrictions.
  • the network device can send a tracking location indication message to the new network device, or the AMF can send it to the new network device.
  • the location indication message is tracked, so that the new network device continues to obtain the attribute information of the user equipment.
  • S302 The network equipment instructs the user equipment that has not recognized the identity status to report their respective attribute information.
  • the network device when a network device instructs a user equipment that does not recognize its status to report their attribute information, the network device can instruct the user equipment to report their attribute information at a specified frequency at one time, or the network device can request the user equipment according to the specified frequency Report their respective attribute information.
  • the reported attribute information may include a timestamp.
  • the user equipment that does not recognize the identity status reports their respective attribute information
  • they can report their respective attribute information to the network device, and then send the respective attribute information to the AMF through the network device; or the identity is not recognized
  • the user equipment in the state can directly report their respective attribute information to the AMF, so that the AMF can obtain the attribute information of the user equipment in the unidentified state.
  • the AMF obtains the attribute information of the user equipment whose identity status is not recognized.
  • the attribute information may include position information and/or speed information. It is understandable that the attribute information of the user equipment reported in this application is not limited to the current attribute information of the user equipment, and can be extended to the recent attribute information of the user equipment.
  • the attribute information of the user equipment in the unidentified state acquired by AMF may not be limited to the attribute information reported by the user equipment in the unidentified state, and may also include network The attribute information of the user equipment whose identity status is not recognized by the equipment actively measured.
  • the AMF can obtain more attribute information of the user equipment, and based on these The attribute information identifies the identity state of the user equipment, which can further improve the accuracy of identification.
  • the attribute information of the user equipment of the unidentified state that is actively measured by the network equipment may replace the attribute information reported by the user equipment of the unidentified state. For example, when a user equipment that has not recognized its identity status reaches a threshold or receives an active report request from a network device, it does not report its attribute information in time or does not report its attribute information. At this time, the network device may actively measure the unidentified after the preset timer expires. The attribute information of the user equipment in the identity state is reported, and the obtained attribute information is reported to the AMF.
  • the report message may also include information that the user equipment in the unidentified state does not report in time
  • the identification is used as auxiliary information for AMF to determine unauthorized drones; in addition, network equipment may periodically or selectively measure the attribute information of user equipment with unidentified status in the characteristic time and space range, if the status of the user is not identified
  • the user equipment reports its attribute information after reaching the threshold, but the difference between the reported attribute information and the attribute information actively measured by the network device is greater than the preset threshold, then the actively measured attribute information is reported to the AMF, possibly in the report message at the same time Contains the identifier of the abnormal information reported by the user equipment of the unidentified status as auxiliary information for the AMF to determine the unauthorized UAV.
  • the AMF recognizes the identity state of the user equipment according to the attribute information of the user equipment whose identity state is not recognized.
  • the AMF obtains the attribute information of the user equipment in the unidentified status, so as to identify the user according to the attribute information of the user equipment in the unidentified status.
  • the identity status of the device may also obtain the attribute information of the user equipment in the unidentified status, so as to identify the identity status of the user equipment according to the attribute information of the user equipment in the unidentified status.
  • the user equipment in the unidentified state can report their respective attribute information to the network device, and then directly send their respective attributes through the network device Information is reported to NWDAF, or network devices indirectly report their respective attribute information to NWDAF through UPF and other network elements; or, user devices that have not recognized their identity status can directly report their respective attribute information to NWDAF so that NWDAF can obtain The attribute information of the user equipment whose identity status is not recognized.
  • NWDAF needs to send the identification result to the AMF so that the AMF can obtain the identity state of the user equipment according to the identification result.
  • S207 can also be executed to send a restriction instruction message to the network device to instruct the network device to restrict the available network resources of the user device.
  • AMF when detecting whether the user equipment is an unauthorized drone, AMF sends a tracking instruction message to the network device to indicate when the user equipment is in the coverage area of the network device.
  • the attribute information meets the preset conditions, report the attribute information of the user equipment, and after receiving the location report message sent by the network device, identify whether the user equipment is an unauthorized drone according to the attribute information included in the location report message; If the attribute information included in the received location report message is not sufficient for the AMF to identify the identity status of the user equipment, it may be necessary to continue to track the location of the user equipment within a certain period of time, and the attribute information of the user equipment needs to be acquired again.
  • the identity status of the user equipment is identified according to the attribute information of the user equipment acquired again, thereby realizing the detection of unauthorized drones that have been connected to the 3GPP network.
  • AMF when the AMF determines that it needs to track the user equipment, it sends a tracking instruction message to the network device to execute the entire detection method for unauthorized drones. , But did not limit the specific situation.
  • AMF can send a tracking instruction message to a network device under two possible situations. The two possible situations are as follows: In the first possible situation, if the AMF receives the message from the UDM The subscription data change notification message used to indicate that the subscription data of the user equipment has changed; then a tracking instruction message is sent to the network device. In the second possible situation, if the AMF receives the detection request message from the UTM, it sends a tracking instruction message to the user equipment. In the following, the detection methods of unauthorized drones in these two possible situations will be described in detail.
  • the AMF receives the subscription data change notification message sent from the UDM and used to indicate that the subscription data of the user equipment has changed, it sends a tracking instruction message to the network device.
  • FIG. 4 is a schematic diagram of another method for detecting unauthorized drones provided by an embodiment of the application, and the method for detecting unauthorized drones may further include:
  • S401 The user equipment executes the registration process to complete the registration process.
  • the user equipment when the user equipment is registered, it is instructed to use the UAV system for communication.
  • the registration process is performed on the user equipment to complete the specific implementation of the entire registration process.
  • the embodiment of the application is not in progress. Repeat.
  • the AMF receives the subscription data change notification message from the UDM.
  • the subscription data change notification message is used to indicate that the subscription data of the user equipment has been changed.
  • the subscription data change notification message may include the identification of the user equipment whose subscription data is changed. It is understandable that in the embodiment of this application, the contract data may be changed because the user equipment originally has the UAV system communication capability, but no longer has the UAV system communication capability; or, in a certain area , The user’s device changed from allowing flying to not allowing flying.
  • UTM After UTM detects that the subscription data of one or more user equipment has changed, it sends a subscription data change notification message to AMF to notify AMF that the subscription data of the user equipment has changed. After the AMF receives the subscription data change notification message , Execute the following S403:
  • the AMF sends the tracking instruction message to the network device according to the subscription data change notification message.
  • the tracking indication message is used to instruct to report the attribute information of the user equipment when the attribute information of the user equipment in the coverage area of the network equipment meets a preset condition; the attribute information may include location information and/or speed information.
  • the tracking instruction message can also indicate that the user equipment whose subscription data has been changed no longer has the UAV system communication capability.
  • the user equipment in the coverage area indicated in the tracking instruction message in S403 is different from the user equipment in the network device coverage area indicated by the tracking instruction message in S201.
  • the user equipment in the above S201 refers to the user equipment in the coverage area of the network device, which has no directivity; and the user equipment in the coverage area indicated in the tracking instruction message in S403 refers to the user equipment whose subscription data has changed. Directivity.
  • the above S202-S205 can be executed.
  • the network device configures the user equipment in its coverage area according to the drone detection threshold information. If the attribute information of the user equipment meets the preset conditions, the user equipment The network device reports the attribute information of the user equipment, and the network device sends a location report message to the AMF, so that the AMF can identify the identity status of the user equipment according to the attribute information of the user equipment included in the location report message.
  • the AMF can identify the identity status of the user equipment according to the attribute information of the user equipment included in the location report message.
  • the AMF identifies the user equipment as an unauthorized drone based on the attribute information included in the received location report message, it can directly execute the above S206-S207; if the AMF according to the attributes included in the received location report message If the information is insufficient to identify the identity status of the user equipment, S301-S304 are executed, and the attribute information of the user equipment needs to be acquired again to identify the identity status of the user equipment according to the acquired attribute information of the user equipment again. After further identifying the identity status of the user equipment through the above S301-S304, if the user equipment is an unauthorized drone, you can perform the above S206 to send an unauthorized drone report message to the UTM device of the drone traffic management network element , So that the UTM can obtain the unauthorized drone information.
  • S207 can also be executed to send a restriction instruction message to the network device to instruct the network device to restrict the available network resources of the user device.
  • the AMF receives the detection request message from the UTM, it sends a tracking instruction message to the network device.
  • FIG. 5 is a schematic diagram of an unauthorized drone detection method provided by an embodiment of the application, and the unauthorized drone detection method may further include:
  • the AMF receives a registration request message sent by the user equipment.
  • the registration request message is used to instruct the user equipment to use the UAV system for communication.
  • the registration request message may include the identification of the user equipment, and may also include the identification of the registration area of the user equipment.
  • the AMF receives a detection request message from the UTM.
  • the detection request message may include information about a specific area, and/or threshold information for indicating a specific area, and of course, may also include time information.
  • the detection request message includes information and time information of a specific area, it is used to instruct the AMF to detect an unauthorized UAV in a certain area within a certain period of time.
  • the information of the specific area may include preset conditions, and the preset conditions may include the height, average moving speed, and instantaneous moving speed corresponding to the specific area. That is, in the specific area, if the attribute information of a certain user equipment reaches the preset Assuming one or more of the thresholds included in the condition, it is necessary to further determine whether the user equipment is an unauthorized drone.
  • the specific area may be a flight area in some specific scenarios, for example, a campus area where a sports meeting is held, or an area where a concert is held.
  • the specific area in this application is cell granularity, TA granularity or TA list granularity, etc.
  • UTM sends a detection request message to AMF
  • the height, average moving speed, and instantaneous moving speed corresponding to the specific area are stored in a list, and the information is carried in the detection request message in the form of a list and sent to AMF, so that AMF can obtain the information.
  • the height, average moving speed, and instantaneous moving speed corresponding to a specific area is cell granularity, TA granularity or TA list granularity, etc.
  • S503 Send a tracking instruction message to the network device.
  • the tracking indication message is used to instruct to report the attribute information of the user equipment when the attribute information of the user equipment in the coverage area of the network equipment meets a preset condition;
  • the attribute information may include location information and/or speed information.
  • the tracking instruction message may include a preset condition, and the preset condition may be UAV detection threshold information.
  • the UAV detection threshold information may include the height, average moving speed, and instantaneous moving speed corresponding to the intersection area. It is understandable that if the registration area of the user equipment overlaps with multiple specific areas at the same time, the smallest value of the drone detection thresholds corresponding to each intersection area is selected as the target drone target detection threshold information, and the target The detection threshold information is sent to the network device.
  • the drone detection threshold corresponding to each area may be the detection threshold information pre-configured by the operator, or may be the detection threshold information sent by the receiving UTM. For details, see S201 in the embodiment shown in FIG. 2 Relevant descriptions are not repeated here in the embodiments of the present application.
  • the AMF when the detection request message may include information of a specific area, if there is an intersection between the registration area of the user equipment and the specific area included in the detection request message, the AMF sends a tracking instruction message to the network device.
  • the tracking indication message may include a reporting period, and the reporting period needs to be greater than or equal to the time period during which the network device obtains the attribute information of the user equipment.
  • the user equipment in the coverage area indicated in the tracking instruction message in S503 is different from the user equipment in the network device coverage area indicated in the tracking instruction message in S201.
  • the user equipment in the above S201 refers to the user equipment in the coverage area of the network device, and has no directivity; while the user equipment in the coverage area indicated in the tracking instruction message in S503 in this embodiment refers to the existence of the registered area and the specific area Intersecting user equipment has directivity.
  • the above S202-S205 can be executed.
  • the network device configures the user equipment in its coverage area according to the drone detection threshold information. If the attribute information of the user equipment meets the preset conditions, then The user equipment reports the attribute information of the user equipment to the network equipment, and the network equipment sends a location report message to the AMF, so that the AMF can identify the identity status of the user equipment according to the attribute information of the user equipment included in the location report message. For details, see S202-S205 above. For related descriptions in, the embodiments of the present application will not be repeated here.
  • the AMF identifies the user equipment as an unauthorized drone based on the attribute information included in the received location report message, it can directly execute the above S206-S207; if the AMF according to the attributes included in the received location report message If the information is insufficient to identify the identity status of the user equipment, S301-S304 are executed, and the attribute information of the user equipment needs to be acquired again to identify the identity status of the user equipment according to the acquired attribute information of the user equipment again. After further identifying the identity status of the user equipment through the above S301-S304, if the user equipment is an unauthorized drone, you can perform the above S206 to send an unauthorized drone report message to the UTM device of the drone traffic management network element , So that the UTM can obtain the unauthorized drone information.
  • S207 can also be executed to send a restriction instruction message to the network device to instruct the network device to restrict the available network resources of the user device.
  • FIG. 6 is a schematic structural diagram of a communication device 60 provided by an embodiment of the application.
  • the communication device 60 may include:
  • the sending unit 601 is configured to send a tracking instruction message to the network device; the tracking instruction message is used to instruct to report the attribute information of the user equipment when the attribute information of the user equipment in the coverage area of the network equipment meets a preset condition; wherein the attribute information includes the location Information and/or speed information.
  • the processing unit 602 is configured to obtain attribute information of the user equipment, and identify the identity state of the user equipment according to the attribute information of the user equipment, and the identity state includes an authorized drone or an unauthorized drone.
  • the processing unit 602 is specifically configured to identify the identity of the user equipment according to the attribute information of the user equipment and the subscription data of the user equipment to obtain the identity status of the user equipment.
  • the communication device 60 further includes a receiving unit 603; the sending unit 601 is further configured to send a subscription data query message to the unified data management network element UDM, where the query message is used to instruct the UDM device to query the subscription data of the user equipment.
  • the receiving unit 603 is configured to receive a subscription data response message from UDM, and the subscription data response message includes subscription data of the user equipment.
  • the sending unit 601 is further configured to send an analysis request message to the network data analysis network element NWDAF, where the analysis request message includes attribute information of the user equipment, and the analysis request message is used to instruct the NWDAF device to identify according to the attribute information of the user equipment The identity status of the user device.
  • the receiving unit 603 is further configured to receive an analysis response message from the NWDAF device, where the analysis response message includes the identity status of the user equipment.
  • the sending unit 601 is also used to send an unauthorized drone report message to the drone traffic management network element UTM device, and the unauthorized drone report message Used to indicate that the user device is an unauthorized drone.
  • the sending unit 601 is also used to send a restriction indication message to the network equipment; the restriction indication information is used to instruct the network equipment to restrict the available network resources of the user equipment.
  • the receiving unit 603 is further configured to receive a subscription data change notification message from UDM; the subscription data change notification message is used to indicate that the subscription data of the user equipment has changed.
  • the sending unit 601 is specifically configured to send a tracking instruction message to the network device according to the subscription data change notification message.
  • the receiving unit 603 is further configured to receive a detection request message from UTM.
  • the sending unit 601 is specifically configured to send a tracking instruction message to the network device.
  • the detection request message includes information about a specific area
  • the sending unit 601 is specifically configured to send a tracking instruction message to the network device if there is an intersection area between the registration area of the user equipment and the specific area.
  • the communication device 60 shown in the embodiment of the present application can execute the detection method of the unauthorized drone on the AMF side in the embodiment shown in FIG. 2 to FIG. 5. Its implementation principle and beneficial effects are similar to those on the AMF side. The implementation principles and beneficial effects of the human-machine detection method are similar, and will not be repeated here.
  • FIG. 7 is a schematic structural diagram of another communication device 70 according to an embodiment of the application.
  • the communication device 70 may include:
  • the receiving unit 701 is configured to receive a tracking instruction message from the access and mobility management function network element AMF, where the tracking instruction message is used to indicate that when the attribute information of the user equipment in the coverage area of the network device meets preset conditions, report the user equipment Attribute information; where the attribute information includes position information and/or speed information.
  • the sending unit 702 is configured to send attribute information of the user equipment to the AMF.
  • the sending unit 702 is further configured to send a location report indication message to the user equipment; the location report indication message is used to indicate that the attribute information of the user equipment meets a preset condition, to report the attribute information of the user equipment.
  • the receiving unit 701 is also configured to receive attribute information from the user equipment.
  • the receiving unit 701 is further configured to receive a restriction indication message from the AMF; the restriction indication information is used to instruct the network equipment to restrict the available network resources of the user equipment.
  • the communication device 70 shown in the embodiment of the present application can execute the method for detecting unauthorized drones on the network device side in the embodiments shown in FIGS. 2 to 5, and its implementation principle and beneficial effects are similar to those on the network device side.
  • the implementation principles and beneficial effects of the detection method for authorized drones are similar, and will not be repeated here.
  • FIG. 8 is a schematic structural diagram of another communication device 80 provided by an embodiment of the application.
  • the communication device 80 may include:
  • the processing unit 801 is configured to obtain whether to send a detection request message.
  • the sending unit 802 is configured to send a detection request message to the UAV traffic management network element AMF when it is determined to send the detection request message.
  • the detection request message includes information about a specific area.
  • the communication device 80 further includes:
  • the receiving unit 803 is configured to receive an unauthorized drone report message from the access and mobility management function network element AMF.
  • the unauthorized drone report message is used to indicate that the user equipment is an unauthorized drone.
  • the communication device 80 shown in the embodiment of the present application can execute the detection method of the unauthorized drone on the UTM side in the embodiment shown in FIG. 2 to FIG. 5. Its implementation principle and beneficial effects are similar to those on the UTM side. The implementation principles and beneficial effects of the human-machine detection method are similar, and will not be repeated here.
  • FIG. 9 is a schematic structural diagram of a communication device 90 provided by an embodiment of this application.
  • the communication device 90 may include a memory 902 and a processor 901, wherein,
  • the memory 902 is used to store program instructions
  • the processor 901 is configured to read the program instructions in the memory 902, and execute according to the program instructions in the memory 902, the unauthorized drones on the AMF side in the embodiment shown in FIGS. 2 to 5 above. Detection method; or, execute the method for detecting unauthorized drones on the network device side in the embodiment shown in Figures 2 to 5; or, execute the method for detecting on the UTM side in the embodiment shown in Figures 2 to 5 above.
  • Detection method or, execute the method for detecting unauthorized drones on the network device side in the embodiment shown in Figures 2 to 5; or, execute the method for detecting on the UTM side in the embodiment shown in Figures 2 to 5 above
  • the implementation principle and beneficial effects of the detection method of authorized drones are similar to the implementation principles and beneficial effects of the detection method of unauthorized drones, and will not be repeated here.
  • the embodiment of the present application also provides a computer storage medium, including instructions, when the instructions are executed by one or more processors, the communication device is caused to execute the unauthorized operation on the AMF side in the embodiment shown in FIG. 2 to FIG. 5.
  • UAV detection method or, execute the method for detecting unauthorized drones on the network device side in the embodiment shown in Figs. 2-5; or, execute the embodiment shown in Figs. 2-5
  • the implementation principle and beneficial effects of the detection method for unauthorized drones on the UTM side are similar to the implementation principles and beneficial effects of the detection method for unauthorized drones, and will not be repeated here.
  • the embodiment of the present application also provides a chip on which a computer program is stored.
  • the method for detecting unauthorized drones on the AMF side in the embodiment shown in Figs. 2 to 5 is executed.
  • execute the method for detecting unauthorized drones on the network device side in the embodiment shown in Figures 2 to 5; or, execute the method for detecting unauthorized drones on the UTM side in the embodiment shown in Figures 2 to 5 above The realization principle and beneficial effects of the detection method for humans and machines are similar to the realization principle and beneficial effects of the detection method for unlicensed drones, and will not be repeated here.
  • An embodiment of the present application also provides a communication system, which may include: user equipment and a first communication device, where the first communication device is used to perform the network equipment in the embodiments shown in FIGS. 2 to 5 above.
  • a communication system which may include: user equipment and a first communication device, where the first communication device is used to perform the network equipment in the embodiments shown in FIGS. 2 to 5 above.
  • the implementation principle and beneficial effects of the detection method of authorized drones are similar to the implementation principles and beneficial effects of the detection method of unauthorized drones, and will not be repeated here.
  • An embodiment of the present application also provides a communication system, which may include: a first communication device and a second communication device, where the first communication device is used to execute the network equipment in the embodiments shown in FIG. 2 to FIG.
  • the second communication device is used to perform the detection method of the unauthorized drone on the AMF side in the embodiment shown in Figure 2 to Figure 5 above.
  • the implementation principle and beneficial effects are compared with the unauthorized drone detection method on the AMF side.
  • the implementation principles and beneficial effects of the detection method for authorized drones are similar, and will not be repeated here.
  • An embodiment of the present application also provides a communication system, which may include: a second communication device and a third communication device, where the second communication device is used to perform the AMF side in the embodiments shown in FIGS. 2 to 5 above.
  • the third communication device is used to perform the detection method of the unauthorized drone on the UTM side in the embodiment shown in Figure 2 to Figure 5 above.
  • the implementation principle and beneficial effects are compared with unauthorized drones.
  • the realization principle and beneficial effects of the detection method of the unmanned aerial vehicle are similar and will not be repeated here.
  • the processor in each of the foregoing embodiments may be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), and a field programmable gate array (FPGA) Or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in random access memory (RAM), flash memory, read-only memory (read-only memory, ROM), programmable read-only memory, or electrically erasable programmable memory, registers, etc. mature in the field Storage medium.
  • RAM random access memory
  • flash memory read-only memory
  • read-only memory read-only memory
  • ROM programmable read-only memory
  • electrically erasable programmable memory registers, etc. mature in the field Storage medium.
  • the storage medium is located in the memory, and the processor reads the instructions in the memory and completes the steps of the above method in combination with its hardware.
  • the disclosed device and method may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • each unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit may be implemented in the form of hardware, or may be implemented in the form of hardware plus software functional units.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本申请实施例提供了一种未授权无人机的检测方法、装置和系统,AMF向网络设备发送跟踪指示消息;其中,跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;并获取用户设备的属性信息;这样在获取到用户设备的属性信息之后,就可以根据用户设备的属性信息,识别用户设备的身份状态,即识别该用户设备是否为未授权无人机,从而实现了对已接入3GPP网络但未授权的无人机的检测。

Description

未授权无人机的检测方法、装置和系统
本申请要求于2019年04月29日提交中国专利局、申请号为201910353747.8、申请名称为“未授权无人机的检测方法、装置和系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种未授权无人机的检测方法、装置和系统。
背景技术
随着电子技术和通信技术的迅速发展,无人机(unmanned aerial vehicle,UAV)相关技术也更加成熟。通过在无人机上设置具有通信能力的芯片,使得无人机作为一种用户设备(user equipment,UE)在空中执行相应的飞行任务。
现有技术中,若该无人机为未接入第三代合作伙伴计划(3rd generation partnership project,3GPP)网络的无人机,则无人机控制器通过网络将该无人机的飞行数据发送到云端,使得监管部门可以根据云端的飞行数据检测该无人机是否违规;或者,监管部门可以通过无人机侦测反制设备检测该无人机是否违规,从而对该无人机进行检测。通常情况下,接入3GPP网络的用户设备请求使用无人机系统通信能力,需要通过无人机系统流量管理(unmanned aerial system traffic management,UTM)网元的鉴权和授权。目前,对于接入3GPP网络但未得到授权的无人机,没有合适的识别或检测方法。其中,未授权的无人机可以理解为满足下述条件的用户设备:不具备无人机系统(unmanned aerial system,UAS)通信能力的用户设备,其移动属性符合无人机的移动属性,或者,具备无人机系统通信能力的用户设备,且在注册时指示不使用该无人机系统通信能力,但其移动属性符合无人机的移动属性,或者,具备无人机系统通信能力的用户设备,且在注册时指示使用该无人机系统通信能力,其移动属性符合无人机的移动属性,但其移动属性信息与其签约信息允许的移动属性信息不相符合。其中,无人机系统通信能力,指接入3GPP系统的用户设备,向3GPP系统请求且得到允许或根据签约数据允许其用于无人机系统通信的能力,一般情况下,该用户设备在使用该无人机系统通信能力时需要满足特定的条件,即特定的移动属性信息。移动属性信息包括特定的时间范围,空间范围,以及运动速度等限制用户设备移动的属性信息。这里的无人机系统包括无人机和无人机控制器。
未授权的无人机对于个人和社会都具有较大的负向影响,可能会造成不可估计的生命财产损失。因此,如何检测已接入3GPP网络但未授权的无人机,是本领域技术人员亟待解决的技术问题。
发明内容
本申请提供一种未授权无人机的检测方法、装置和系统,实现了对已接入3GPP网络但未授权的无人机的检测。
第一方面,本申请实施例提供一种未授权无人机的检测方法,该未授权无人机的检测方法可以包括:
向网络设备发送跟踪指示消息;跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;其中,属性信息包括位置信息和/或速度信息;
获取用户设备的属性信息;
根据用户设备的属性信息,识别用户设备的身份状态,身份状态包括已授权无人机或未授权无人机。
由此可见,本申请实施例提供的未授权无人机的检测方法,AMF向网络设备发送跟踪指示消息;其中,跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;并获取用户设备的属性信息;这样在获取到用户设备的属性信息之后,就可以根据用户设备的属性信息,识别用户设备的身份状态,即识别该用户设备是否为未授权无人机,从而实现了对已接入3GPP网络但未授权的无人机的检测。
在一种可能的实现方式中,根据用户设备的属性信息,识别用户设备的身份状态,可以包括:
根据用户设备的属性信息和用户设备的签约数据对用户设备的身份进行识别,得到用户设备的身份状态。
在一种可能的实现方式中,根据用户设备的属性信息和用户设备的签约数据对用户设备的身份进行识别之前,还可以包括:
向统一数据管理网元UDM发送签约数据查询消息,查询消息用于指示UDM设备查询用户设备的签约数据;
接收来自UDM的签约数据响应消息,签约数据响应消息中包括用户设备的签约数据,使得AMF可以根据用户设备的属性信息和用户设备的签约数据共同对用户设备的身份进行识别,从而得到用户设备的身份状态。
在一种可能的实现方式中,根据用户设备的属性信息,识别用户设备的身份状态,可以包括:
向网络数据分析网元NWDAF发送分析请求消息,其中,分析请求消息包括用户设备的属性信息,分析请求消息用于指示NWDAF设备根据用户设备的属性信息识别用户设备的身份状态;
接收来自NWDAF设备的分析响应消息,分析响应消息包括用户设备的身份状态,使得AMF无需根据用户设备的属性信息和用户设备的签约数据对用户设备的身份进行识别,只需要接收识别结果即可,降低了AMF的负载。
在一种可能的实现方式中,若用户设备的身份状态为未授权无人机,该未授权无人机的检测方法还可以包括:
向无人机流量管理网元UTM设备发送未授权无人机上报消息,未授权无人机上报消息用于指示用户设备为未授权无人机,使得UTM可以获知该用户设备的身份状态。
在一种可能的实现方式中,若用户设备的身份状态为未授权无人机,该未授权无人机的检测方法还可以包括:
向网络设备发送限制指示消息;限制指示信息用于指示网络设备限制用户设备的可使用网络资源。其中,限制用户设备的可使用网络资源可以理解为拒绝该用户设备的数据发送和接收,或只允许用户设备的信令发送和接收,或不允许进行网络切换,或低于某高度或速度时恢复用户设备的数据发送和接收,或只提供较低QoS要求的服务,或其它用于限制用户设备使用网络资源的措施。
在一种可能的实现方式中,向网络设备发送跟踪指示消息,可以包括:
接收来自UDM的签约数据变更通知消息;签约数据变更通知消息用于指示用户设备的签约数据已发生变更;
根据签约数据变更通知消息,向网络设备发送跟踪指示消息。
在一种可能的实现方式中,向网络设备发送跟踪指示消息,可以包括:
接收来自UTM的检测请求消息;
向网络设备发送跟踪指示消息。
在一种可能的实现方式中,检测请求消息包括特定区域的信息,向网络设备发送跟踪指示消息,可以包括:
若用户设备的注册区域和特定区域存在交集区域,则向网络设备发送跟踪指示消息。
第二方面,本申请实施例还提供一种未授权无人机的检测方法,该未授权无人机的检测方法可以包括:
接收来自接入与移动性管理功能网元AMF的跟踪指示消息,跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;其中,属性信息包括位置信息和/或速度信息;
向AMF发送用户设备的属性信息。
在一种可能的实现方式中,向AMF发送用户设备的属性信息之前,还可以包括:
向用户设备发送位置上报指示消息;位置上报指示消息用于指示用户设备的属性信息满足预设条件时,上报用户设备的属性信息;
接收来自用户设备的属性信息。
在一种可能的实现方式中,若用户设备为未授权的无人机,方法还可以包括:
接收来自AMF的限制指示消息;限制指示信息用于指示网络设备限制用户设备的可使用网络资源。
第三方面,本申请实施例还提供一种未授权无人机的检测方法,该未授权无人机的检测方法还可以包括:
获取是否发送检测请求消息;
在确定发送检测请求消息时,向无人机流量管理网元AMF发送检测请求消息。
在一种可能的实现方式中,检测请求消息包括特定区域的信息。
在一种可能的实现方式中,若网络设备覆盖区域内用户设备的身份状态为未授权无人机,方法还可以包括:
接收来自接入与移动性管理功能网元AMF的未授权无人机上报消息,未授权无人机上报消息用于指示用户设备为未授权无人机。
第四方面,本申请实施例还提供一种通信装置,该通信装置可以包括:
发送单元,用于向网络设备发送跟踪指示消息;跟踪指示消息用于指示当网络设备覆 盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;其中,属性信息包括位置信息和/或速度信息;
处理单元,用于获取用户设备的属性信息,并根据用户设备的属性信息,识别用户设备的身份状态,身份状态包括已授权无人机或未授权无人机。
在一种可能的实现方式中,处理单元,具体用于根据用户设备的属性信息和用户设备的签约数据对用户设备的身份进行识别,得到用户设备的身份状态。
在一种可能的实现方式中,该通信装置还可以包括接收单元;
发送单元,还用于向统一数据管理网元UDM发送签约数据查询消息,查询消息用于指示UDM设备查询用户设备的签约数据;
接收单元,用于接收来自UDM的签约数据响应消息,签约数据响应消息中包括用户设备的签约数据。
在一种可能的实现方式中,发送单元,还用于向网络数据分析网元NWDAF发送分析请求消息,其中,分析请求消息包括用户设备的属性信息,分析请求消息用于指示NWDAF设备根据用户设备的属性信息识别用户设备的身份状态;
接收单元,还用于接收来自NWDAF设备的分析响应消息,分析响应消息包括用户设备的身份状态。
在一种可能的实现方式中,若用户设备的身份状态为未授权无人机,发送单元,还用于向无人机流量管理网元UTM设备发送未授权无人机上报消息,未授权无人机上报消息用于指示用户设备为未授权无人机。
在一种可能的实现方式中,若用户设备的身份状态为未授权无人机,发送单元,还用于向网络设备发送限制指示消息;限制指示信息用于指示网络设备限制用户设备的可使用网络资源。
在一种可能的实现方式中,接收单元,还用于接收来自UDM的签约数据变更通知消息;签约数据变更通知消息用于指示用户设备的签约数据已发生变更;
发送单元,具体用于根据签约数据变更通知消息,向网络设备发送跟踪指示消息。
在一种可能的实现方式中,接收单元,还用于接收来自UTM的检测请求消息;
发送单元,具体用于向网络设备发送跟踪指示消息。
在一种可能的实现方式中,检测请求消息包括特定区域的信息,发送单元,具体用于若用户设备的注册区域和特定区域存在交集区域,则向网络设备发送跟踪指示消息。
第五方面,本申请实施例还提供一种通信装置,该通信装置可以包括:
接收单元,用于接收来自接入与移动性管理功能网元AMF的跟踪指示消息,跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;其中,属性信息包括位置信息和/或速度信息;
发送单元,用于向AMF发送用户设备的属性信息。
在一种可能的实现方式中,发送单元,还用于向用户设备发送位置上报指示消息;位置上报指示消息用于指示用户设备的属性信息满足预设条件时,上报用户设备的属性信息;
接收单元,还用于接收来自用户设备的属性信息。
在一种可能的实现方式中,若用户设备为未授权的无人机,接收单元,还用于接收来 自AMF的限制指示消息;限制指示信息用于指示网络设备限制用户设备的可使用网络资源。
第六方面,本申请实施例还提供一种通信装置,该通信装置可以包括:
处理单元,用于获取是否发送检测请求消息;
发送单元,用于在确定发送检测请求消息时,向无人机流量管理网元AMF发送检测请求消息。
在一种可能的实现方式中,检测请求消息包括特定区域的信息。
在一种可能的实现方式中,若网络设备覆盖区域内用户设备的身份状态为未授权无人机,通信装置还包括:
接收单元,用于接收来自接入与移动性管理功能网元AMF的未授权无人机上报消息,未授权无人机上报消息用于指示用户设备为未授权无人机。
第七方面,本申请实施例还提供一种通信装置,该通信装置可以包括存储器及处理器,其中,
所述存储器用于存储程序指令;
所述处理器用于读取所述存储器中的程序指令,并根据所述存储器中的程序指令执行上述第一方面任一种可能的实现方式中所述的未授权无人机的检测方法;或者,执行上述第二方面任一种可能的实现方式中所述的未授权无人机的检测方法;或者,执行上述第三方面任一种可能的实现方式中所述的未授权无人机的检测方法。
第八方面,本申请实施例还提供一种计算机存储介质,包括指令,当所述指令由一个或多个处理器运行时,使得通信装置执行上述第一方面任一种可能的实现方式中所述的未授权无人机的检测方法;或者,执行上述第二方面任一种可能的实现方式中所述的未授权无人机的检测方法;或者,执行上述第三方面任一种可能的实现方式中所述的未授权无人机的检测方法。
第九方面,本申请实施例还提供一种芯片,芯片上存储有计算机程序,在计算机程序被处理器执行时,执行上述第一方面任一种可能的实现方式中所述的未授权无人机的检测方法;或者,执行上述第二方面任一种可能的实现方式中所述的未授权无人机的检测方法;或者,执行上述第三方面任一种可能的实现方式中所述的未授权无人机的检测方法。
第十方面,本申请实施例还提供一种通信系统,该通信系统可以包括:用户设备和上述第五方面任一种可能的实现方式中所述的通信装置。
第十一方面,本申请实施例还提供一种通信系统,该通信系统可以包括用户设备和网络设备;
其中,网络设备,用于接收来自接入与移动性管理功能网元AMF的跟踪指示消息,并向用户设备发送位置上报指示消息;其中,跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;其中,属性信息包括位置信息和/或速度信息;
用户设备,用于在接收到位置上报指示消息后,向网络设备用户设备的属性信息。
第十二方面,本申请实施例还提供一种通信系统,该通信系统可以包括:上述第四方面任一种可能的实现方式中的通信装置和第五方面任一种可能的实现方式中的通信装置。
第十三方面,本申请实施例还提供一种通信系统,该通信系统可以包括AMF和网络 设备;
其中,AMF,用于向网络设备发送跟踪指示消息;跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;其中,属性信息包括位置信息和/或速度信息;
网络设备,用于在接收到跟踪指示消息后,向AMF发送用户设备的属性信息;
AMF,还用于根据用户设备的属性信息,识别用户设备的身份状态,身份状态包括已授权无人机或未授权无人机。
在一种可能的实现方式中,AMF,具体用于根据用户设备的属性信息和用户设备的签约数据对用户设备的身份进行识别,得到用户设备的身份状态。
在一种可能的实现方式中,若用户设备的身份状态为未授权无人机,AMF,还用于向网络设备发送限制指示消息;其中,限制指示信息用于指示网络设备限制用户设备的可使用网络资源。
第十四方面,本申请实施例还提供一种通信系统,该通信系统可以包括:上述第四方面任一种可能的实现方式中的通信装置和第六方面任一种可能的实现方式中的通信装置。
第十五方面,本申请实施例还提供一种通信系统,该通信系统可以包括AMF和UTM;
其中,UTM,用于获取是否发送检测请求消息;并在确定发送检测请求消息时,向无人机流量管理网元AMF发送检测请求消息;
AMF,用于在接收到检测请求消息后,向网络设备发送跟踪指示消息,并根据用户设备的属性信息,识别用户设备的身份状态,身份状态包括已授权无人机或未授权无人机;其中,跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;其中,属性信息包括位置信息和/或速度信息。
在一种可能的实现方式中,检测请求消息包括特定区域的信息。
在一种可能的实现方式中,若网络设备覆盖区域内用户设备的身份状态为未授权无人机,AMF,还用于向UTM设备发送未授权无人机上报消息,未授权无人机上报消息用于指示用户设备为未授权无人机;
UTM,还用于接收来自接入与移动性管理功能网元AMF的未授权无人机上报消息。
本申请实施例提供的未授权无人机的检测方法、装置和系统,AMF向网络设备发送跟踪指示消息;其中,跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;并获取用户设备的属性信息;这样在获取到用户设备的属性信息之后,就可以根据用户设备的属性信息,识别用户设备的身份状态,即识别该用户设备是否为未授权无人机,从而实现了对已接入3GPP网络但未授权的无人机的检测。
附图说明
图1为本申请实施例提供的一种应用场景示意图;
图2为本申请实施例提供的一种未授权无人机的检测方法的示意图;
图3为本申请实施例提供的另一种未授权无人机的检测方法的示意图;
图4为本申请实施例提供的又一种未授权无人机的检测方法的示意图;
图5为本申请实施例提供的一种未授权无人机的检测方法的示意图;
图6为本申请实施例提供的一种通信装置的结构示意图;
图7为本申请实施例提供的另一种通信装置的结构示意图;
图8为本申请实施例提供的又一种通信装置的结构示意图;
图9为本申请实施例提供的一种通信装置的结构示意图。
具体实施方式
本申请实施例可以应用于第五代(the fifth generation,5G)移动通信系统,还可以应用于其他通信系统,例如或未来可能出现的其他移动通信系统。
以下对本申请中的部分用语进行解释说明,以便于本领域技术人员理解。需要说明的是,当本申请实施例的方案应用于5G或未来可能出现的其它移动通信系统时,网络设备和终端的名称可能发生变化,但这并不影响本申请实施例方案的实施。
图1为本申请实施例提供的一种应用场景示意图,示例的,请参见图1所示,本申请实施例可应用于无人机系统(unmanned aerial system,UAS)中,涉及的通信系统可以包括至少一个用户设备、网络设备及接入和移动管理网元(access and mobility management function,AMF),当然,该通信系统也可以包括统一数据管理网元(Unified Data Management,UDM)和无人机流量管理网元(unmanned aerial vehicle traffic management,UTM)。为了实现对已接入3GPP网络但未授权的无人机的检测,本申请实施例提供了一种未授权无人机的检测方法,AMF向网络设备发送跟踪指示消息;其中,跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;其中,属性信息包括位置信息和/或速度信息,并获取用户设备的属性信息;这样在获取到用户设备的属性信息之后,就可以根据用户设备的属性信息,识别用户设备的身份状态,即识别该用户设备是否为未授权无人机,从而实现了对已接入3GPP网络但未授权的无人机的检测。
可以理解的是,在本申请实施例中,未授权的无人机可以理解为满足下述条件的用户设备:不具备无人机系统UAS通信能力的用户设备,其移动属性符合无人机的移动属性,或者,具备无人机系统通信能力的用户设备,且在注册时指示不使用该无人机系统通信能力,但其移动属性符合无人机的移动属性,或者,具备无人机系统通信能力的用户设备,且在注册时指示使用该无人机系统通信能力,其移动属性符合无人机的移动属性,但其移动属性信息与其签约信息允许的移动属性信息不相符合。
需要说明的是,在本申请实施例中,属性信息包括位置信息和/或速度信息,可以理解为属性信息可以只包括位置信息或速度信息,也可以同时包括位置信息和速度信息,具体可以根据实际需要进行设置,在此,本申请实施例不做具体限制。可以理解的是,位置信息不局限于包括用户设备的水平位置,也可以包括用户设备的所在高度。其中,用户设备的水平位置可以通过追踪区域标识确定,也可以通过其他可替代的方式确定,用户设备的高度信息可以是用户设备的海拔高度,也可以是离地面的高度,或者其他用于确定其垂直方向位置的信息;速度信息可以包括用户设备在水平方向上的速度信息,也可以包括用户设备在垂直方向上的速度。
在本申请的实施例中,用户设备(user equipment,UE)又称为终端或终端设备,是一种向用户提供语音和/或数据连通性的设备,例如,具有无线连接功能的手持式设备、车载 设备等。常见的用户设备例如包括:手机、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,其中,可穿戴设备例如包括:智能手表、智能手环、计步器等。本申请中的用户设备也可以是具备3GPP系统通信能力的无人机设备。
本申请实施例中涉及的网络设备,又称为无线接入网(radio access network,RAN)设备,是终端设备通过无线方式接入到该移动通信系统中的接入设备,可以是基站NodeB、演进型基站(evolved NodeB,eNB)、发送接收点(transmission reception point,TRP)、5G移动通信系统中的下一代基站(next generation NodeB,gNB)、未来移动通信系统中的基站或WiFi系统中的接入节点等;也可以是完成基站部分功能的模块或单元,例如,可以是集中式单元(central unit,CU),也可以是分布式单元(distributed unit,DU)。本申请的实施例对无线接入网设备所采用的具体技术和具体设备形态不做限定。
在本申请的实施例中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。在本申请的文字描述中,字符“/”一般表示前后关联对象是一种“或”的关系。
需要说明的是,本申请实施例中的指示、消息等可以是新的消息类型或新的信息元素,也可以包含在已存在的消息或信息元素中。
下面,将通过详细的实施例对本申请实施例提供的未授权无人机的检测方法进行详细地说明,示例的,请参见图2所示,图2为本申请实施例提供的一种未授权无人机的检测方法的示意图,在图2所示的实施例中,是AMF在确定需要对用户设备进行追踪时执行的技术方案,但是具体追踪条件并不做任何限定,该未授权无人机的检测方法可以包括:
S201、AMF向网络设备发送跟踪指示消息。
其中,跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;属性信息可以包括位置信息和/或速度信息。可以理解的是,本申请中上报的用户设备的属性信息不局限于用户设备当前的属性信息,可以扩展到该用户设备近期的属性信息。可选的,跟踪指示消息可以包括预设条件,预设条件可以为无人机检测阈值信息,满足预设条件,可以理解为大于或者等于无人机检测阈值。示例的,当用户设备的属性信息包括位置信息和/或速度信息时,对应的,该无人机检测阈值信息可以包括用户设备距离地面高度(AGL)的临界值和/或速度的临界值。速度的临界值可以包括用户设备的平均移动速度临界值,用户设备的瞬间移动速度临界值,关于速度临界值,可能包含水平和垂直方向。
本申请实施例中跟踪指示消息可能指示需要检测的网络设备覆盖区域内用户设备的范围,可以是网络设备覆盖区域内的所有用户设备,也可以是覆盖范围内不具有无人机系统通信能力或具有无人机系统通信能力但指示不使用的用户设备,或者可以是覆盖范围内使用无人机系统通信能力的用户设备。
AMF在向网络设备发送跟踪指示消息之前,需要先获取到无人机检测阈值信息。可选的,在本申请实施例中,AMF获取的无人机检测阈值信息可以为运营商预先配置的检测阈值信息,也可以为接收UTM发送的检测阈值信息。示例的,在接收UTM发送的无人机检测阈值信息时,可以直接接收UTM发送的无人机检测阈值信息,也可以通过NEF等网元 间接接收UTM发送的无人机检测阈值信息。其中,UTM提供的无人机检测阈值信息可能是航空监管部门配置的。需要说明的是,当AMF既接收到UTM发送的无人机检测阈值信息,又被运营商配置了无人机检测阈值信息时,AMF可以将这两种无人机检测阈值信息中的较小值确定为无人机目标检测阈值信息,并将该目标检测阈值信息发送给网络设备。
网络设备在接收到AMF发送的跟踪指示消息之后,就可以根据指示消息中包括的无人机检测阈值信息配置其覆盖区域内的用户设备,即执行下述S202:
S202、网络设备根据无人机检测阈值信息配置其覆盖区域内用户设备。
示例的,网络设备在根据无人机检测阈值信息配置其覆盖区域内的用户设备时,若该网络设备已经获取到用户设备的类型,即是否为具有无人机系统通信能力的用户设备,或者,具有无人机系统通信能力的用户设备注册时选择的能力,即具有无人机系统通信能力的用户设备的注册是否用于飞行,则网络设备可能根据跟踪指示消息指示的网络设备覆盖区域内的用户设备范围或本地配置等向其覆盖区域内的部分用户设备配置无人机检测阈值信息。相反的,若该网络设备没有获取到用户设备的类型,则网络设备可能向其覆盖区域内的所有用户设备配置无人机检测阈值信息。可以理解的是,本申请实施例中的无人机系统通信能力指3GPP系统提供的无人机系统的通信能力,包括无人机系统内部的通信能力,即无人机和无人机控制器之间的通信能力或无人机和无人机之间的通信能力,或无人机系统与UTM之间的通信能力等。
对于处于连接态的用户设备,网络设备可根据上述方法配置阈值信息。对于处于空闲态的用户设备,在其从空闲态切换为连接态时,网络设备可先请求其上报属性信息,再根据上述方法及得到的属性信息确定是否配置阈值信息或直接向AMF上报。
需要说明的是,为了使得用户设备可以识别其距离地面的高度,网络设备还可以向其覆盖区域内的用户设备提供当前用户设备所在地的地面的平均海拔高度,以使用户设备可以根据地面的平均海拔高度,确定其距离地面的高度。
网络设备在通过上述S202根据无人机检测阈值信息配置其覆盖区域内用户设备后,用户设备就可以根据其属性信息和配置的无人机检测阈值信息,确定是否向网络设备上报其属性信息。
S203、若用户设备的属性信息满足预设条件,则向网络设备上报用户设备的属性信息。
可以理解的是,本申请实施例中的用户设备的属性信息满足预设条件,可以指用户设备的某一个参数信息满足其对应的无人机检测阈值信息中的一个阈值,也可以指用户设备的多个参数信息均满足其对应的无人机检测阈值信息中的阈值。需要说明的是,本申请中若用户设备的属性信息满足预设条件,则上报的用户设备的属性信息不局限于用户设备当前的属性信息,可以扩展到该用户设备近期的属性信息。
示例地,用户设备上报的属性信息,可以是直接的也可以是间接的。例如,对于用户设备的属性信息中的速度信息,用户设备可能直接上报速度值和方向,也可能是用户设备上报位置信息和相应的时间戳,据此可推断用户设备的速度信息。
可选的,用户设备在向网络设备上报其属性信息时,可以是该用户设备在接入网络设备时其属性信息已经满足预设条件,这样一旦配置了无人机检测阈值信息,就可以向网络设备上报用户设备的属性信息;也可以是该用户设备在接入网络设备时其属性信息未满足预设条件,但在之后的某个时间点满足预设条件,也可以向网络设备上报用户设备的属性 信息;也可以是在用户设备从空闲态切换到连接态时接收到网络设备的请求后,上报用户设备的属性信息。网络设备在接收到用户设备上报的属性信息之后,可以将该用户设备上报的属性信息发送给AMF,即执行下述S204:
S204、网络设备向AMF发送位置报告消息。
其中,位置报告消息可以包括用户设备的标识,及该用户设备的属性信息,当然,也可以包括其它信息,在此,本申请实施例只是以位置报告消息可以包括用户设备的标识,及该用户设备的属性信息为例进行说明,但并不代表本申请实施例仅局限于此。
可选的,网络设备在向AMF发送位置报告消息时,可以在接收到某一个用户设备上报的属性信息时,直接将该用户设备的属性信息携带在位置报告消息中发送给AMF,也可以等待一个预设时间段,并将该预设时间段内接收到的所有用户设备的属性信息以列表的形式携带在位置报告消息中发送给AMF,具体可以根据实际需要进行设置,在此,对于如何发送位置报告消息,本申请实施例不做进一步地限制。
需要说明的是,在本申请实施例中,网络设备在向AMF发送位置报告消息时,可以不局限于用户设备自己上报的属性信息,还可以包括网络设备主动测量的用户设备的属性信息。通过将用户设备自己上报的属性信息和网络设备主动测量的用户设备的属性信息发送给AMF,使得AMF可以获取到较多的用户设备的属性信息,并根据这些属性信息对用户设备的身份状态进行识别,可以进一步提高识别的准确度。
对于某些场景,网络设备主动测量到的用户设备的属性信息可能取代用户设备上报的属性信息。例如,用户设备在达到阈值或收到网络设备的主动上报请求时,不及时或不上报其属性信息,此时网络设备可能在预设计时器超时后,主动测量用户设备的属性信息,并将得到的属性信息上报给AMF,若测量到的属性信息已超过阈值,则可能同时在上报消息中包含用户设备不及时上报的标识,以作为AMF判断未授权无人机的辅助信息;另外,网络设备可能周期性或选择性测量特性时间空间范围的用户设备的属性信息,若用户设备在达到阈值后上报其属性信息,但其上报的属性信息和网络设备主动测量到的属性信息区别大于预设阈值,则将主动测量到的属性信息上报给AMF,可能同时在上报消息中包含用户设备上报信息异常的标识,以作为AMF判断未授权无人机的辅助信息。
S205、AMF根据用户设备的属性信息,识别用户设备的身份状态。
其中,身份状态包括已授权无人机或未授权无人机。
可选的,在本申请实施例中,在根据用户设备的属性信息,识别用户设备的身份状态时,可以通过至少两种可能的实现方式实现:
在一种可能的实现方式中,AMF根据用户设备的属性信息和用户设备的签约数据对用户设备的身份进行识别,得到用户设备的身份状态。示例的,用户设备的签约数据可以包括该用户设备允许飞行的时间,允许飞行的位置(包括允许飞行的高度),及允许飞行的速度等信息。
可选的,若AMF没有用户设备的签约数据,则需要向统一数据管理网元UDM发送签约数据查询消息,查询消息用于指示UDM设备查询用户设备的签约数据,以查询该用户设备的签约数据,并接收来自UDM的签约数据响应消息,签约数据响应消息中包括用户设备的签约数据,从而获取到用户设备的签约数据。需要说明的是,若AMF接收到的位置报告消息中包括的是以列表形式存在的用户设备的属性信息,则AMF需要向UDM查 询的是存在于列表中,但AMF中没有相应的签约数据的用户设备的签约数据。
在另一种可能的实现方式中,AMF无需根据用户设备的属性信息和用户设备的签约数据对用户设备的身份进行识别,而是通过向网络数据分析网元(network data analytics function,NWDAF)发送分析请求消息,使得NWDAF设备根据用户设备的属性信息识别用户设备的身份状态,并接收来自NWDAF设备的分析响应消息,分析响应消息包括用户设备的身份状态,从而得到用户设备的身份状态。
其中,分析请求消息包括用户设备的属性信息,该属性信息可以为用户设备在不同时间点的属性信息,分析请求消息用于指示NWDAF设备根据用户设备的属性信息识别用户设备的身份状态。示例的,AMF可以向NWDAF发送分析请求消息,以请求的方式指示NWDAF设备根据用户设备的属性信息识别用户设备的身份状态,当然,也可以订阅的方式指示NWDAF设备根据用户设备的属性信息识别用户设备的身份状态。
由此可见,本申请实施例提供的未授权无人机的检测方法,AMF向网络设备发送跟踪指示消息;其中,跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;并获取用户设备的属性信息;这样在获取到用户设备的属性信息之后,就可以根据用户设备的属性信息,识别用户设备的身份状态,即识别该用户设备是否为未授权无人机,从而实现了对已接入3GPP网络但未授权的无人机的检测。
可选的,S205AMF根据用户设备的属性信息,识别用户设备的身份状态后,若用户设备的身份状态为未授权无人机,该未授权无人机的检测方法还可以包括:
S206、AMF向无人机流量管理网元UTM设备发送未授权无人机上报消息。
其中,未授权无人机上报消息用于指示用户设备为未授权无人机。
示例的,未授权无人机上报消息中可以包含用户设备的标识,近期的属性信息等。可选的,未授权无人机上报消息还可以包含未授权无人机的类型,即不具有无人机系统通信能力的用户设备,具有无人机系统通信能力但注册不用于无人机系统通信的用户设备,或具有无人机系统通信能力且注册用于无人机系统通信但其移动属性不符合签约数据允许的移动属性的用户设备。若AMF接收到的位置报告消息中包括的是以列表形式存在的用户设备的属性信息,则AMF可以一次性将未授权的用户设备列表携带在未授权无人机上报消息中发送给UTM,当然,也可以分次将未授权的用户设备列表携带在未授权无人机上报消息中发送给UTM。
S207、AMF向网络设备发送限制指示消息。
其中,限制指示信息用于指示网络设备限制用户设备的可使用网络资源。
AMF在识别出用户设备为未授权无人机时,可以向网络设备发送限制指示消息,以指示网络设备限制用户设备的可使用网络资源。其中,限制用户设备的可使用网络资源可以理解为拒绝该用户设备的数据发送和接收,或只允许用户设备的信令发送和接收,或不允许进行网络切换,或低于某高度或速度时恢复用户设备的数据发送和接收,或只提供较低QoS要求的服务,或其它用于限制用户设备使用网络资源的措施。
需要说明的是,在本申请实施例中,S206和S207之间并无先后顺序,可以先执行S206,再执行S207;也可以先执行S207,再执行S206;当然,也可以同时执行S206和S207,具体可以根据实际需要进行设置,在此,本申请实施例只是以先执行S206,再执行S207 为例进行说明,但并不代表本申请实施例仅局限于此。
基于图2所示的实施例,需要说明的是,在上述图2所示的实施例中,S205AMF根据用户设备的属性信息,识别用户设备的身份状态时,若根据接收到的用户设备的属性信息可以识别出用户设备的身份状态,则可以直接执行上述S206-S207。相反的,若AMF根据接收到的用户设备的属性信息不足以识别出用户设备的身份状态,可能需要在一定的时间段内继续跟踪用户设备的位置,则需要再次获取用户设备的属性信息,以根据再次获取到的用户设备的属性信息识别该用户设备的身份状态。其中,不足以识别出用户设备的身份状态可以包括无法识别出用户设备的身份状态,也可以包括确定用户设备的身份状态为可疑的未授权无人机。示例的,请参见图3所示,图3为本申请实施例提供的另一种未授权无人机的检测方法的示意图,该未授权无人机的检测方法还可以包括:
S301、AMF向网络设备发送跟踪位置指示消息。
示例的,该跟踪位置指示消息可以包括用户设备的标识。此处的用户设备可以为网络设备覆盖区域内,通过上述S201-S205不能确定其身份状态的用户设备。该用户设备的数量可以为一个,也可以为多个。
可以理解的是,在本申请实施例中,若通过上述S201-S205不能识别出某些用户设备的身份状态时,可能需要在一定的时间段内继续跟踪用户设备的位置,则需要再次获取用户设备的属性信息。通常情况下,若AMF确定已收集的用户设备的属性信息不足,或收到NWDAF的响应指示需要继续获取用户设备的属性信息,则AMF需要再次向网络设备发送跟踪位置指示消息,以根据再次获取到的用户设备的属性信息识别该用户设备的身份状态。
示例的,该跟踪位置指示消息除了包括用户设备的标识之外,还可以包括跟踪的频率,上报的频率,采集的时长。上报的频率可以是网络设备多次采集用户设备的属性信息后,一次性发送给AMF,或者,间隔一定时间将多个用户设备的属性信息发送给AMF,具体可以根据实际需要进行设置,在此,本申请实施例不做具体限制。
可以理解的是,若网络设备在获取用户设备的属性信息的过程中,用户设备发生网络切换,则网络设备可以向新的网络设备发送跟踪位置指示消息,或者,AMF再向新的网络设备发送跟踪位置指示消息,从而使得新的网络设备继续获取该用户设备的属性信息。
S302、网络设备指示未识别出身份状态的用户设备上报各自的属性信息。
示例的,网络设备在指示未识别出身份状态的用户设备上报各自的属性信息时,网络设备可以一次性指示用户设备按照指定频率上报各自的属性信息,也可以是网络设备根据指定频率请求用户设备上报各自的属性信息。其中,上报的属性信息中可以包含时间戳。
可选的,未识别出身份状态的用户设备上报各自的属性信息时,可以将其各自的属性信息上报给网络设备,再通过网络设备将该各自的属性信息发送给AMF;或者未识别出身份状态的用户设备可以直接将各自的属性信息上报给AMF,以使AMF获取到未识别出身份状态的用户设备的属性信息。
S303、AMF获取未识别出身份状态的用户设备的属性信息。
其中,属性信息可以包括位置信息和/或速度信息。可以理解的是,本申请中上报的用户设备的属性信息不局限于用户设备当前的属性信息,可以扩展到该用户设备近期的属性信息。
同样需要说明的是,在本申请实施例中,AMF获取的未识别出身份状态的用户设备的属性信息,可以不局限于未识别出身份状态的用户设备自己上报的属性信息,还可以包括网络设备主动测量的未识别出身份状态的用户设备的属性信息。通过获取未识别出身份状态的用户设备自己上报的属性信息和网络设备主动测量的未识别出身份状态的用户设备的属性信息,使得AMF可以获取到较多的用户设备的属性信息,并根据这些属性信息对用户设备的身份状态进行识别,可以进一步提高识别的准确度。
对于某些场景,网络设备主动测量到的未识别出身份状态的用户设备的属性信息可能取代未识别出身份状态的用户设备自己上报的属性信息。例如,未识别出身份状态的用户设备在达到阈值或收到网络设备的主动上报请求时,不及时或不上报其属性信息,此时网络设备可能在预设计时器超时后,主动测量未识别出身份状态的用户设备的属性信息,并将得到的属性信息上报给AMF,若测量到的属性信息已超过阈值,则可能同时在上报消息中包含未识别出身份状态的用户设备不及时上报的标识,以作为AMF判断未授权无人机的辅助信息;另外,网络设备可能周期性或选择性测量特性时间空间范围的未识别出身份状态的用户设备的属性信息,若未识别出身份状态的用户设备在达到阈值后上报其属性信息,但其上报的属性信息和网络设备主动测量到的属性信息区别大于预设阈值,则将主动测量到的属性信息上报给AMF,可能同时在上报消息中包含未识别出身份状态的用户设备上报信息异常的标识,以作为AMF判断未授权无人机的辅助信息。
S304、AMF根据未识别出身份状态的用户设备的属性信息,识别出用户设备的身份状态。
需要说明的是,S304的具体实现过程与上述图2所示的实施例中S205的实现过程类似,具体可以参见上述图2所示的实施例中S205中的相关描述,在此,本申请实施例不再进行赘述。
可以看出,上述S303-S304在识别用户设备的身份状态时,是AMF获取到未识别出身份状态的用户设备的属性信息,从而根据未识别出身份状态的用户设备的属性信息,识别出用户设备的身份状态。当然,在识别用户设备的身份状态时,也可以是NWDAF获取未识别身份状态的用户设备的属性信息,从而根据未识别出身份状态的用户设备的属性信息,识别出用户设备的身份状态。在这种情况下,NWDAF在获取未识别身份状态的用户设备的属性信息时,未识别身份状态的用户设备可以将其各自的属性信息上报给网络设备,再通过网络设备直接将其各自的属性信息上报给NWDAF,或者网络设备通过UPF等网元间接将其各自的属性信息上报给NWDAF;或者,未识别出身份状态的用户设备可以直接将各自的属性信息上报给NWDAF,以使NWDAF获取到未识别出身份状态的用户设备的属性信息。不同的是,NWDAF在根据未识别出身份状态的用户设备的属性信息,识别出用户设备的身份状态之后,需要向AMF发送识别结果,以使AMF根据识别结果获取到用户设备的身份状态。
在通过上述S301-S304进一步识别出用户设备的身份状态之后,若该用户设备为未授权无人机,则可以执行上述S206向无人机流量管理网元UTM设备发送未授权无人机上报消息,以使UTM获取到未授权无人机信息,当然,也可以执行上述S207向网络设备发送限制指示消息,以指示网络设备限制用户设备的可使用网络资源。
由此可见,通过上述图2和图3所示实施例,在检测用户设备是否为未授权无人机时, AMF是通过向网络设备发送跟踪指示消息,以指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息,并在接收到网络设备发送的位置报告消息后,根据位置报告消息中包括的属性信息,识别用户设备是否为未授权无人机;若AMF根据接收到的位置报告消息中包括的属性信息不足以识别出用户设备的身份状态,可能需要在一定的时间段内继续跟踪用户设备的位置,则需要再次获取用户设备的属性信息,以根据再次获取到的用户设备的属性信息识别该用户设备的身份状态,从而实现了对已接入3GPP网络但未授权的无人机的检测。
需要说明的是,在上述图2或图3所示的实施例中,是AMF在确定需要对用户设备进行追踪时,向网络设备发送跟踪指示消息,以执行整个未授权无人机的检测方法,但是并未限定确定的具体情况。示例的,在本申请实施例中,AMF可以在两种可能的情况下,向网络设备发送跟踪指示消息,这两种可能的情况分别为:第一种可能的情况,若AMF接收来自UDM发送的用于指示用户设备的签约数据已发生变更的签约数据变更通知消息;则向网络设备发送跟踪指示消息。第二种可能的情况,若AMF接收来自UTM的检测请求消息,则向用户设备发送跟踪指示消息。下面,将分别对这两种可能的情况的未授权无人机的检测方法进行详细地描述。
在第一种可能的情况下,若AMF接收来自UDM发送的用于指示用户设备的签约数据已发生变更的签约数据变更通知消息;则向网络设备发送跟踪指示消息。示例的,可参见图4所示,图4为本申请实施例提供的又一种未授权无人机的检测方法的示意图,该未授权无人机的检测方法还可以包括:
S401、用户设备执行注册流程,完成注册过程。
其中,用户设备注册时,指示用户设备用于无人机系统通信。
需要说明的是,在本申请实施例中,对于用户设备执行注册流程,以完成整个注册过程的具体实现,具体可参见现有技术中用户设备的注册过程,在此,本申请实施例不在进行赘述。
S402、AMF接收自UDM的签约数据变更通知消息。
其中,所述签约数据变更通知消息用于指示所述用户设备的签约数据已发生变更。示例的,签约数据变更通知消息可以包括签约数据发生变更的用户设备的标识。可以理解的是,在本申请实施例中,签约数据发生变更可能是由于用户设备原本具有无人机系统通信能力,但现在不再具有无人机系统通信能力;或者,在某个特定区域内,用户设备从原本的允许飞行变为不允许飞行。
UTM在检测到某一个或多个用户设备的签约数据发生变更后,向AMF发生签约数据变更通知消息,以通知AMF有用户设备的签约数据发生变更,AMF在接收到该签约数据变更通知消息后,执行下述S403:
S403、AMF根据签约数据变更通知消息,向网络设备发送所述跟踪指示消息。
其中,跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;属性信息可以包括位置信息和/或速度信息。当然,该跟踪指示消息还可以指示签约数据已发生变更的用户设备不再具有无人机系统通信能力。
需要说明的是,S403中的跟踪指示消息中指示的覆盖区域内的用户设备不同于上述S201中跟踪指示消息指示的网络设备覆盖区域内用户设备。上述S201中的用户设备是指 网络设备覆盖区域内的用户设备,不具有指向性;而S403中的跟踪指示消息中指示的覆盖区域内的用户设备,是指签约数据发生变更的用户设备,具有指向性。
在向网络设备发送跟踪指示消息之后,就可以执行上述S202-S205,网络设备根据无人机检测阈值信息配置其覆盖区域内用户设备,若用户设备的属性信息满足预设条件,则用户设备向网络设备上报用户设备的属性信息,网络设备向AMF发送位置报告消息,使得AMF根据位置报告消息中包括的用户设备的属性信息,识别用户设备的身份状态,具体可参见上述S202-S205中的相关描述,在此,本申请实施例不再进行赘述。
进一步地,若AMF根据接收到的位置报告消息中包括的属性信息识别出用户设备为未授权无人机,则可以直接执行上述S206-S207;若AMF根据接收到的位置报告消息中包括的属性信息不足以识别出用户设备的身份状态,则执行S301-S304,需要再次获取用户设备的属性信息,以根据再次获取到的用户设备的属性信息识别该用户设备的身份状态。在通过上述S301-S304进一步识别出用户设备的身份状态之后,若该用户设备为未授权无人机,则可以执行上述S206向无人机流量管理网元UTM设备发送未授权无人机上报消息,以使UTM获取到未授权无人机信息,当然,也可以执行上述S207向网络设备发送限制指示消息,以指示网络设备限制用户设备的可使用网络资源。
在第二种可能的情况下,若AMF接收来自UTM的检测请求消息,则向网络设备发送跟踪指示消息。示例的,可参见图5所示,图5为本申请实施例提供的一种未授权无人机的检测方法的示意图,该未授权无人机的检测方法还可以包括:
S501、AMF接收用户设备发送的注册请求消息。
其中,注册请求消息用于指示用户设备用于无人机系统通信。示例的,该注册请求消息可以包括用户设备的标识,也可以包括用户设备的注册区域标识。
S502、AMF接收UTM的检测请求消息。
可选的,检测请求消息可以包括特定区域的信息,和/或用于指示特定区域的阈值信息,当然,也可以包括时间信息。当检测请求消息包括特定区域的信息和时间信息时,用于指示AMF在某个时间段内检测某个区域内的未授权无人机。进一步地,该特定区域的信息可以包括预设条件,预设条件可以包括特定区域对应的高度、平均移动速度、瞬间移动速度,即在该特定区域内,若某一用户设备的属性信息达到预设条件包括的阈值中的某一个或多个,则需要进一步判断该用户设备是否为未授权无人机。示例的,特定区域可以为一些特定场景下的飞行区域,例如,开运动会的校园区域,或者开演唱会的区域等。
可以理解的是,本申请中的特定区域为小区粒度、TA粒度或TA列表粒度等。UTM在向AMF发送检测请求消息时,该特定区域对应的高度、平均移动速度、瞬间移动速度这些信息存放在列表中,以列表的形式携带在检测请求消息中发送给AMF,使得AMF获取到该特定区域对应的高度、平均移动速度、瞬间移动速度这些信息。
S503、向网络设备发送跟踪指示消息。
其中,跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;属性信息可以包括位置信息和/或速度信息。
可选的,跟踪指示消息可以包括预设条件,预设条件可以为无人机检测阈值信息。示例的,该无人机检测阈值信息可以包括交集区域对应的高度、平均移动速度及瞬间移动速度。可以理解的是,若用户设备的注册区域同时与多个特定区域存在交集,则选择各交集 区域对应的无人机检测阈值中的最小值作为目标无人机目标检测阈值信息,并将该目标检测阈值信息发送给网络设备。可选的,各区域对应的无人机检测阈值可以为运营商预先配置的检测阈值信息,也可以为接收UTM发送的检测阈值信息,具体可以参见上述图2所示的实施例中S201中的相关描述,在此,本申请实施例不再进行赘述。
可选的,当检测请求消息可以包括特定区域的信息时,若用户设备的注册区域和检测请求消息中包括的特定区域存在交集区域,则AMF向网络设备发送跟踪指示消息。跟踪指示消息中可能包括上报周期,上报周期需要大于或者等于网络设备获取用户设备的属性信息的时间段。
需要说明的是,在本申请实施例中,S503中的跟踪指示消息中指示的覆盖区域内的用户设备不同于上述S201中跟踪指示消息指示的网络设备覆盖区域内用户设备。上述S201中的用户设备是指网络设备覆盖区域内的用户设备,不具有指向性;而本实施例S503中的跟踪指示消息中指示的覆盖区域内的用户设备,是指注册区域与特定区域存在交集的用户设备,具有指向性。
同样的,在向网络设备发送跟踪指示消息之后,就可以执行上述S202-S205,网络设备根据无人机检测阈值信息配置其覆盖区域内用户设备,若用户设备的属性信息满足预设条件,则用户设备向网络设备上报用户设备的属性信息,网络设备向AMF发送位置报告消息,使得AMF根据位置报告消息中包括的用户设备的属性信息,识别用户设备的身份状态,具体可参见上述S202-S205中的相关描述,在此,本申请实施例不再进行赘述。
进一步地,若AMF根据接收到的位置报告消息中包括的属性信息识别出用户设备为未授权无人机,则可以直接执行上述S206-S207;若AMF根据接收到的位置报告消息中包括的属性信息不足以识别出用户设备的身份状态,则执行S301-S304,需要再次获取用户设备的属性信息,以根据再次获取到的用户设备的属性信息识别该用户设备的身份状态。在通过上述S301-S304进一步识别出用户设备的身份状态之后,若该用户设备为未授权无人机,则可以执行上述S206向无人机流量管理网元UTM设备发送未授权无人机上报消息,以使UTM获取到未授权无人机信息,当然,也可以执行上述S207向网络设备发送限制指示消息,以指示网络设备限制用户设备的可使用网络资源。
图6为本申请实施例提供的一种通信装置60的结构示意图,示例的,请参见图6所示,该通信装置60可以包括:
发送单元601,用于向网络设备发送跟踪指示消息;跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;其中,属性信息包括位置信息和/或速度信息。
处理单元602,用于获取用户设备的属性信息,并根据用户设备的属性信息,识别用户设备的身份状态,身份状态包括已授权无人机或未授权无人机。
可选的,处理单元602,具体用于根据用户设备的属性信息和用户设备的签约数据对用户设备的身份进行识别,得到用户设备的身份状态。
可选的,通信装置60还包括接收单元603;发送单元601,还用于向统一数据管理网元UDM发送签约数据查询消息,查询消息用于指示UDM设备查询用户设备的签约数据。
接收单元603,用于接收来自UDM的签约数据响应消息,签约数据响应消息中包括用户设备的签约数据。
可选的,发送单元601,还用于向网络数据分析网元NWDAF发送分析请求消息,其中,分析请求消息包括用户设备的属性信息,分析请求消息用于指示NWDAF设备根据用户设备的属性信息识别用户设备的身份状态。
接收单元603,还用于接收来自NWDAF设备的分析响应消息,分析响应消息包括用户设备的身份状态。
可选的,若用户设备的身份状态为未授权无人机,发送单元601,还用于向无人机流量管理网元UTM设备发送未授权无人机上报消息,未授权无人机上报消息用于指示用户设备为未授权无人机。
可选的,若用户设备的身份状态为未授权无人机,发送单元601,还用于向网络设备发送限制指示消息;限制指示信息用于指示网络设备限制用户设备的可使用网络资源。
可选的,接收单元603,还用于接收来自UDM的签约数据变更通知消息;签约数据变更通知消息用于指示用户设备的签约数据已发生变更。
发送单元601,具体用于根据签约数据变更通知消息,向网络设备发送跟踪指示消息。
可选的,接收单元603,还用于接收来自UTM的检测请求消息。
发送单元601,具体用于向网络设备发送跟踪指示消息。
可选的,检测请求消息包括特定区域的信息,发送单元601,具体用于若用户设备的注册区域和特定区域存在交集区域,则向网络设备发送跟踪指示消息。
本申请实施例所示的通信装置60,可以执行上述图2-图5所示的实施例中AMF侧的未授权无人机的检测方法,其实现原理以及有益效果与AMF侧的未授权无人机的检测方法的实现原理及有益效果类似,此处不再进行赘述。
图7为本申请实施例提供的另一种通信装置70的结构示意图,示例的,请参见图7所示,该通信装置70可以包括:
接收单元701,用于接收来自接入与移动性管理功能网元AMF的跟踪指示消息,跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报用户设备的属性信息;其中,属性信息包括位置信息和/或速度信息。
发送单元702,用于向AMF发送用户设备的属性信息。
可选的,发送单元702,还用于向用户设备发送位置上报指示消息;位置上报指示消息用于指示用户设备的属性信息满足预设条件时,上报用户设备的属性信息。
接收单元701,还用于接收来自用户设备的属性信息。
可选的,若用户设备为未授权的无人机,接收单元701,还用于接收来自AMF的限制指示消息;限制指示信息用于指示网络设备限制用户设备的可使用网络资源。
本申请实施例所示的通信装置70,可以执行上述图2-图5所示的实施例中网络设备侧的未授权无人机的检测方法,其实现原理以及有益效果与网络设备侧的未授权无人机的检测方法的实现原理及有益效果类似,此处不再进行赘述。
图8为本申请实施例提供的又一种通信装置80的结构示意图,示例的,请参见图8所示,该通信装置80可以包括:
处理单元801,用于获取是否发送检测请求消息。
发送单元802,用于在确定发送检测请求消息时,向无人机流量管理网元AMF发送检测请求消息。
可选的,检测请求消息包括特定区域的信息。
可选的,若网络设备覆盖区域内用户设备的身份状态为未授权无人机,通信装置80还包括:
接收单元803,用于接收来自接入与移动性管理功能网元AMF的未授权无人机上报消息,未授权无人机上报消息用于指示用户设备为未授权无人机。
本申请实施例所示的通信装置80,可以执行上述图2-图5所示的实施例中UTM侧的未授权无人机的检测方法,其实现原理以及有益效果与UTM侧的未授权无人机的检测方法的实现原理及有益效果类似,此处不再进行赘述。
图9为本申请实施例提供的一种通信装置90的结构示意图,示例的,请参见图9所示,该通信装置90可以包括存储器902及处理器901,其中,
所述存储器902用于存储程序指令;
所述处理器901用于读取所述存储器902中的程序指令,并根据所述存储器902中的程序指令执行上述图2-图5所示的实施例中AMF侧的未授权无人机的检测方法;或者,执行上述图2-图5所示的实施例中网络设备侧的未授权无人机的检测方法;或者,执行上述图2-图5所示的实施例中UTM侧的未授权无人机的检测方法,其实现原理以及有益效果与未授权无人机的检测方法的实现原理及有益效果类似,此处不再进行赘述。
本申请实施例还提供一种计算机存储介质,包括指令,当所述指令由一个或多个处理器运行时,使得通信装置执行上述图2-图5所示的实施例中AMF侧的未授权无人机的检测方法;或者,执行上述图2-图5所示的实施例中网络设备侧的未授权无人机的检测方法;或者,执行上述图2-图5所示的实施例中UTM侧的未授权无人机的检测方法,其实现原理以及有益效果与未授权无人机的检测方法的实现原理及有益效果类似,此处不再进行赘述。
本申请实施例还提供一种芯片,芯片上存储有计算机程序,在计算机程序被处理器执行时,执行上述图2-图5所示的实施例中AMF侧的未授权无人机的检测方法;或者,执行上述图2-图5所示的实施例中网络设备侧的未授权无人机的检测方法;或者,执行上述图2-图5所示的实施例中UTM侧的未授权无人机的检测方法,其实现原理以及有益效果与未授权无人机的检测方法的实现原理及有益效果类似,此处不再进行赘述。
本申请实施例还提供一种通信系统,该通信系统可以包括:用户设备和第一通信装置,其中,第一通信装置用于执行上述图2-图5所示的实施例中网络设备的未授权无人机的检测方法,其实现原理以及有益效果与未授权无人机的检测方法的实现原理及有益效果类似,此处不再进行赘述。
本申请实施例还提供一种通信系统,该通信系统可以包括:第一通信装置和第二通信装置,其中,第一通信装置用于执行上述图2-图5所示的实施例中网络设备侧的未授权无人机的检测方法,第二通信装置用于执行上述图2-图5所示的实施例中AMF侧的未授权无人机的检测方法,其实现原理以及有益效果与未授权无人机的检测方法的实现原理及有益效果类似,此处不再进行赘述。
本申请实施例还提供一种通信系统,该通信系统可以包括:第二通信装置和第三通信装置,其中,第二通信装置用于执行上述图2-图5所示的实施例中AMF侧的未授权无人机的检测方法,第三通信装置用于执行上述图2-图5所示的实施例中UTM侧的未授权无 人机的检测方法,其实现原理以及有益效果与未授权无人机的检测方法的实现原理及有益效果类似,此处不再进行赘述。
上述各个实施例中处理器可以是通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存取存储器(random access memory,RAM)、闪存、只读存储器(read-only memory,ROM)、可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的指令,结合其硬件完成上述方法的步骤。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。

Claims (35)

  1. 一种未授权无人机的检测方法,其特征在于,
    向网络设备发送跟踪指示消息;所述跟踪指示消息用于指示当所述网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报所述用户设备的属性信息;其中,所述属性信息包括位置信息和/或速度信息;
    获取所述用户设备的属性信息;
    根据所述用户设备的属性信息,识别所述用户设备的身份状态,所述身份状态包括已授权无人机或未授权无人机。
  2. 根据权利要求1所述的方法,其特征在于,所述根据所述用户设备的属性信息,识别所述用户设备的身份状态,包括:
    根据所述用户设备的属性信息和所述用户设备的签约数据对所述用户设备的身份进行识别,得到所述用户设备的身份状态。
  3. 根据权利要求2所述的方法,其特征在于,所述根据所述用户设备的属性信息和所述用户设备的签约数据对所述用户设备的身份进行识别之前,还包括:
    向统一数据管理网元UDM发送签约数据查询消息,所述查询消息用于指示所述UDM设备查询所述用户设备的签约数据;
    接收来自所述UDM的签约数据响应消息,所述签约数据响应消息中包括所述用户设备的签约数据。
  4. 根据权利要求1所述的方法,其特征在于,所述根据所述用户设备的属性信息,识别所述用户设备的身份状态,包括:
    向网络数据分析网元NWDAF发送分析请求消息,其中,所述分析请求消息包括所述用户设备的属性信息,所述分析请求消息用于指示所述NWDAF设备根据所述用户设备的属性信息识别所述用户设备的身份状态;
    接收来自所述NWDAF设备的分析响应消息,所述分析响应消息包括所述用户设备的身份状态。
  5. 根据权利要求1-4任一项所述的方法,其特征在于,若所述用户设备的身份状态为未授权无人机,所述方法还包括:
    向无人机流量管理网元UTM设备发送未授权无人机上报消息,所述未授权无人机上报消息用于指示所述用户设备为未授权无人机。
  6. 根据权利要求1-5任一项所述的方法,其特征在于,若所述用户设备的身份状态为未授权无人机,所述方法还包括:
    向所述网络设备发送限制指示消息;所述限制指示信息用于指示所述网络设备限制所述用户设备的可使用网络资源。
  7. 根据权利要求1-6任一项所述的方法,其特征在于,所述向网络设备发送跟踪指示消息,包括:
    接收来自UDM的签约数据变更通知消息;所述签约数据变更通知消息用于指示所述用户设备的签约数据已发生变更;
    根据所述签约数据变更通知消息,向所述网络设备发送所述跟踪指示消息。
  8. 根据权利要求1-6任一项所述的方法,其特征在于,所述向网络设备发送跟踪指示消息,包括:
    接收来自UTM的检测请求消息;
    向所述网络设备发送所述跟踪指示消息。
  9. 根据权利要求8所述的方法,其特征在于,所述检测请求消息包括特定区域的信息,所述向所述网络设备发送所述跟踪指示消息,包括:
    若所述用户设备的注册区域和所述特定区域存在交集区域,则向所述网络设备发送所述跟踪指示消息。
  10. 一种未授权无人机的检测方法,其特征在于,包括:
    接收来自接入与移动性管理功能网元AMF的跟踪指示消息,所述跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报所述用户设备的属性信息;其中,所述属性信息包括位置信息和/或速度信息;
    向所述AMF发送所述用户设备的属性信息。
  11. 根据权利要求10所述的方法,其特征在于,所述向所述AMF发送所述用户设备的属性信息之前,还包括:
    向所述用户设备发送位置上报指示消息;所述位置上报指示消息用于指示所述用户设备的属性信息满足预设条件时,上报所述用户设备的属性信息;
    接收来自所述用户设备的属性信息。
  12. 根据权利要求10或11所述的方法,其特征在于,若所述用户设备为未授权的无人机,所述方法还包括:
    接收来自所述AMF的限制指示消息;所述限制指示信息用于指示所述网络设备限制所述用户设备的可使用网络资源。
  13. 一种未授权无人机的检测方法,其特征在于,包括:
    获取是否发送检测请求消息;
    在确定发送检测请求消息时,向无人机流量管理网元AMF发送检测请求消息。
  14. 根据权利要求13所述的方法,其特征在于,
    所述检测请求消息包括特定区域的信息。
  15. 根据权利要求13或14所述的方法,其特征在于,若网络设备覆盖区域内用户设备的身份状态为未授权无人机,所述方法还包括:
    接收来自接入与移动性管理功能网元AMF的未授权无人机上报消息,所述未授权无人机上报消息用于指示所述用户设备为未授权无人机。
  16. 一种通信装置,其特征在于,
    发送单元,用于向网络设备发送跟踪指示消息;所述跟踪指示消息用于指示当所述网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报所述用户设备的属性信息;其中,所述属性信息包括位置信息和/或速度信息;
    处理单元,用于获取所述用户设备的属性信息,并根据所述用户设备的属性信息,识别所述用户设备的身份状态,所述身份状态包括已授权无人机或未授权无人机。
  17. 根据权利要求16所述的装置,其特征在于,
    所述处理单元,具体用于根据所述用户设备的属性信息和所述用户设备的签约数据对 所述用户设备的身份进行识别,得到所述用户设备的身份状态。
  18. 根据权利要求17所述的装置,其特征在于,所述通信装置还包括接收单元;
    所述发送单元,还用于向统一数据管理网元UDM发送签约数据查询消息,所述查询消息用于指示所述UDM设备查询所述用户设备的签约数据;
    所述接收单元,用于接收来自所述UDM的签约数据响应消息,所述签约数据响应消息中包括所述用户设备的签约数据。
  19. 根据权利要求18所述的装置,其特征在于,
    所述发送单元,还用于向网络数据分析网元NWDAF发送分析请求消息,其中,所述分析请求消息包括所述用户设备的属性信息,所述分析请求消息用于指示所述NWDAF设备根据所述用户设备的属性信息识别所述用户设备的身份状态;
    所述接收单元,还用于接收来自所述NWDAF设备的分析响应消息,所述分析响应消息包括所述用户设备的身份状态。
  20. 根据权利要求16-19任一项所述的装置,其特征在于,若所述用户设备的身份状态为未授权无人机,所述发送单元,还用于向无人机流量管理网元UTM设备发送未授权无人机上报消息,所述未授权无人机上报消息用于指示所述用户设备为未授权无人机。
  21. 根据权利要求16-20任一项所述的装置,其特征在于,若所述用户设备的身份状态为未授权无人机,所述发送单元,还用于向所述网络设备发送限制指示消息;所述限制指示信息用于指示所述网络设备限制所述用户设备的可使用网络资源。
  22. 根据权利要求18或19任一项所述的装置,其特征在于,
    所述接收单元,还用于接收来自UDM的签约数据变更通知消息;所述签约数据变更通知消息用于指示所述用户设备的签约数据已发生变更;
    所述发送单元,具体用于根据所述签约数据变更通知消息,向所述网络设备发送所述跟踪指示消息。
  23. 根据权利要求18或19任一项所述的装置,其特征在于,
    所述接收单元,还用于接收来自UTM的检测请求消息;
    所述发送单元,具体用于向所述网络设备发送所述跟踪指示消息。
  24. 根据权利要求23所述的装置,其特征在于,所述检测请求消息包括特定区域的信息,所述发送单元,具体用于若所述用户设备的注册区域和所述特定区域存在交集区域,则向所述网络设备发送所述跟踪指示消息。
  25. 一种通信装置,其特征在于,包括:
    接收单元,用于接收来自接入与移动性管理功能网元AMF的跟踪指示消息,所述跟踪指示消息用于指示当网络设备覆盖区域内用户设备的属性信息满足预设条件时,上报所述用户设备的属性信息;其中,所述属性信息包括位置信息和/或速度信息;
    发送单元,用于向所述AMF发送所述用户设备的属性信息。
  26. 根据权利要求25所述的装置,其特征在于,
    所述发送单元,还用于向所述用户设备发送位置上报指示消息;所述位置上报指示消息用于指示所述用户设备的属性信息满足预设条件时,上报所述用户设备的属性信息;
    所述接收单元,还用于接收来自所述用户设备的属性信息。
  27. 根据权利要求25或26所述的装置,其特征在于,若所述用户设备为未授权的无 人机,所述接收单元,还用于接收来自所述AMF的限制指示消息;所述限制指示信息用于指示所述网络设备限制所述用户设备的可使用网络资源。
  28. 一种通信装置,其特征在于,包括:
    处理单元,用于获取是否发送检测请求消息;
    发送单元,用于在确定发送检测请求消息时,向无人机流量管理网元AMF发送检测请求消息。
  29. 根据权利要求28所述的装置,其特征在于,
    所述检测请求消息包括特定区域的信息。
  30. 根据权利要求28或29所述的装置,其特征在于,若网络设备覆盖区域内用户设备的身份状态为未授权无人机,所述通信装置还包括:
    接收单元,用于接收来自接入与移动性管理功能网元AMF的未授权无人机上报消息,所述未授权无人机上报消息用于指示所述用户设备为未授权无人机。
  31. 一种通信装置,其特征在于,包括存储器及处理器,其中,
    所述存储器用于存储程序指令;
    所述处理器用于读取所述存储器中的程序指令,并根据所述存储器中的程序指令执行上述权利要求1-9中任一项所述的未授权无人机的检测方法;或者,执行上述权利要求10-12中任一项所述的未授权无人机的检测方法;或者,执行上述权利要求13-15中任一项所述的未授权无人机的检测方法。
  32. 一种通信系统,其特征在于,包括:用户设备和上述权利要求25-27任一项所述的通信装置。
  33. 一种通信系统,其特征在于,包括:上述权利要求16-24任一项所述的通信装置和25-27任一项所述的通信装置。
  34. 一种通信系统,其特征在于,包括:上述权利要求16-24任一项所述的通信装置和28-30任一项所述的通信装置。
  35. 一种计算机存储介质,包括指令,其特征在于,当所述指令由一个或多个处理器运行时,使得通信装置执行上述权利要求1-9中任一项所述的未授权无人机的检测方法;或者,执行上述权利要求10-12中任一项所述的未授权无人机的检测方法;或者,执行上述权利要求13-15中任一项所述的未授权无人机的检测方法。
PCT/CN2020/079989 2019-04-29 2020-03-18 未授权无人机的检测方法、装置和系统 WO2020220854A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP20798209.1A EP3952377B1 (en) 2019-04-29 2020-03-18 Detection method, apparatus and system for unauthorized unmanned aerial vehicle
US17/513,356 US20220051570A1 (en) 2019-04-29 2021-10-28 Method For Detecting Unauthorized Uncrewed Aerial Vehicle, Apparatus, And System

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910353747.8 2019-04-29
CN201910353747.8A CN111954252B (zh) 2019-04-29 2019-04-29 未授权无人机的检测方法、装置和系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/513,356 Continuation US20220051570A1 (en) 2019-04-29 2021-10-28 Method For Detecting Unauthorized Uncrewed Aerial Vehicle, Apparatus, And System

Publications (1)

Publication Number Publication Date
WO2020220854A1 true WO2020220854A1 (zh) 2020-11-05

Family

ID=73029615

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/079989 WO2020220854A1 (zh) 2019-04-29 2020-03-18 未授权无人机的检测方法、装置和系统

Country Status (4)

Country Link
US (1) US20220051570A1 (zh)
EP (1) EP3952377B1 (zh)
CN (1) CN111954252B (zh)
WO (1) WO2020220854A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023117150A1 (en) * 2021-12-21 2023-06-29 Telefonaktiebolaget Lm Ericsson (Publ) Network-event data based detection of rogue unmanned aerial vehicles

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170015414A1 (en) * 2015-07-15 2017-01-19 Elwha Llc System and method for power transfer to an unmanned aircraft
CN108073181A (zh) * 2016-11-10 2018-05-25 中国移动通信集团公司 一种无人机监管方法、装置及系统
CN108401503A (zh) * 2018-01-30 2018-08-14 北京小米移动软件有限公司 无人机服务的支持方法及装置
CN108573619A (zh) * 2018-04-25 2018-09-25 河南聚合科技有限公司 一种空地协同作业的无人机运管云平台

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109548039A (zh) * 2017-08-11 2019-03-29 索尼公司 无线通信系统中的装置和方法、计算机可读存储介质
CN107945581A (zh) * 2017-11-09 2018-04-20 佛山市海科云筹信息技术有限公司 飞行器监管方法、装置、存储介质及移动终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170015414A1 (en) * 2015-07-15 2017-01-19 Elwha Llc System and method for power transfer to an unmanned aircraft
CN108073181A (zh) * 2016-11-10 2018-05-25 中国移动通信集团公司 一种无人机监管方法、装置及系统
CN108401503A (zh) * 2018-01-30 2018-08-14 北京小米移动软件有限公司 无人机服务的支持方法及装置
CN108573619A (zh) * 2018-04-25 2018-09-25 河南聚合科技有限公司 一种空地协同作业的无人机运管云平台

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI ET AL.: "Identification of Air-borne UE", 3GPP TSG-RAN WG2 MEETING #99 R2-1708543, 11 August 2017 (2017-08-11), XP051318395 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023117150A1 (en) * 2021-12-21 2023-06-29 Telefonaktiebolaget Lm Ericsson (Publ) Network-event data based detection of rogue unmanned aerial vehicles

Also Published As

Publication number Publication date
CN111954252B (zh) 2022-09-09
EP3952377A1 (en) 2022-02-09
EP3952377A4 (en) 2022-03-23
US20220051570A1 (en) 2022-02-17
EP3952377B1 (en) 2023-10-11
CN111954252A (zh) 2020-11-17

Similar Documents

Publication Publication Date Title
CN112188533B (zh) 一种网络性能的上报方法及装置
WO2022047752A1 (zh) 通信方法、终端、通信节点、通信设备及存储介质
CN110351828B (zh) 一种定位方法及装置
EP2712237B1 (en) Controlling a terminal device to access wireless network
CN110868712B (zh) 终端设备识别方法及通信装置
US20200187151A1 (en) Methods of identifying aerial user equipment in cellular networks
WO2020147681A1 (zh) 终端设备的标签管理方法和装置
CN106961704B (zh) 一种转换通信方式的方法和设备
EP3668210A1 (en) Method and device for configuring wireless resource pool
US20170041823A1 (en) Wireless assistance method, apparatus and system
EP3761590B1 (en) Method for controlling terminal to access network, and network element
JP2015231152A (ja) ネットワーク制御装置、ネットワーク制御方法、及びプログラム
EP3522602B1 (en) Communication connection control method and device
WO2020220854A1 (zh) 未授权无人机的检测方法、装置和系统
EP3806510B1 (en) Information transmission method, device and system, and storage medium
US11337054B2 (en) System and method for obtaining an identifier of a mobile communication terminal at a control checkpoint
WO2022084148A1 (en) Registration procedure for an unmanned aerial vehicle ue / unmanned aerial vehicle controller ue
WO2023216854A1 (zh) 无人机通信方法、装置及系统
CN108713222A (zh) 飞行控制的方法、装置和系统
US11200409B2 (en) Utilizing an array of cameras including IoT sensors with cameras to search for objects via a wireless communication network
US20230345264A1 (en) Systems and methods for time-sensitive networking analytics
WO2018192410A1 (zh) 一种小区组网的方法及装置
EP3721423A1 (en) Method and apparatus for preventing sharing vehicle parking congestion
WO2017202463A1 (en) Method and network node for providing an rf model of a telecommunications system
WO2023061412A1 (zh) 一种传输信息的方法、装置以及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20798209

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020798209

Country of ref document: EP

Effective date: 20211029