WO2021026726A1 - 信息验证方法、装置、设备及存储介质 - Google Patents

信息验证方法、装置、设备及存储介质 Download PDF

Info

Publication number
WO2021026726A1
WO2021026726A1 PCT/CN2019/100208 CN2019100208W WO2021026726A1 WO 2021026726 A1 WO2021026726 A1 WO 2021026726A1 CN 2019100208 W CN2019100208 W CN 2019100208W WO 2021026726 A1 WO2021026726 A1 WO 2021026726A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
information
verification
network element
message
Prior art date
Application number
PCT/CN2019/100208
Other languages
English (en)
French (fr)
Inventor
刘建华
杨皓睿
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to CN201980091289.3A priority Critical patent/CN113396600B/zh
Priority to PCT/CN2019/100208 priority patent/WO2021026726A1/zh
Publication of WO2021026726A1 publication Critical patent/WO2021026726A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management

Definitions

  • This application relates to the field of communication technology, and in particular to an information verification method, device, equipment and storage medium.
  • D2D direct communication services are mainly aimed at certain speed and time requirements. Extend applications with higher requirements for service quality.
  • the terminal device can discover other nearby terminal devices that use the same application by sending discovery messages or monitoring discovery messages. Before that, it is necessary to verify whether the application can trigger message events related to discovery messages, including sending discovery messages or monitoring discovery messages. At present, in non-5G systems, it is generally necessary to verify whether the application allows triggering of message events related to discovery messages through ProSe functional network elements.
  • the ProSe functional network element is replaced by some network elements in the communication network architecture. Therefore, a method is urgently needed to solve the verification problem of the discovery message in the 5G system.
  • the embodiments of the present application provide an information verification method, device, equipment, and storage medium, which can be used to solve the verification problem for discovery messages in a 5G system.
  • the technical solution is as follows:
  • an information verification method which is applied to a terminal device, and the method includes:
  • the network function network element is a fifth-generation 5G core network element.
  • an information verification method is provided, which is applied to a network function network element, where the network function network element is a 5G core network network element, and the method includes:
  • the information verification request carrying first application information of a first application that needs to be verified; sending a verification result of the first application information to a terminal device, the verification result being used to indicate the first application Whether it can trigger the message event of the discovery message.
  • an information verification method which is applied to a terminal device, and the method includes:
  • the network function network element is a 5G core network network element.
  • an information verification method is provided, which is applied to a network function network element, where the network function network element is a 5G core network network element, and the method includes:
  • the application verification information is used by the terminal device to verify based on the first application information of the first application that needs to be verified, and determine whether to execute a message event of a discovery message for the first application.
  • an information verification device which is applied to terminal equipment, and the device includes:
  • the first sending module is configured to send an information verification request to the network function network element, where the information verification request carries the first application information of the first application that needs to be verified; the determining module is configured to send an information verification request based on the information received from the network function network element. As a result of the verification, it is determined whether to execute a message event for the discovery message of the first application, where the network function network element is a fifth-generation 5G core network element.
  • an information verification device which is applied to a network function network element, the network function network element is a 5G core network network element, and the device includes:
  • the receiving module is configured to receive an information verification request, where the information verification request carries the first application information of the first application that needs to be verified; the second sending module is configured to send the verification result of the first application information to the terminal device, The verification result is used to indicate whether the first application can trigger a message event of a discovery message.
  • an information verification device which is applied to terminal equipment, and the device includes:
  • the verification module is used to verify the first application to be verified based on the application verification information; the execution module is used to determine whether to execute the message event of the discovery message for the first application according to the verification result; wherein the application verification information is Pre-sent by the network function network element, the network function network element is a 5G core network network element.
  • an information verification device which is applied to a network function network element, the network function network element is a 5G core network network element, and the device includes:
  • the third sending module is configured to send application verification information to the terminal device, where the application verification information is used by the terminal device to verify based on the first application information of the first application that needs to be verified, and to determine whether to execute the verification for the first application The message event of the discovery message.
  • a terminal device in another aspect, includes a processor and a memory, the memory stores at least one instruction, and the at least one instruction is used to be executed by the processor to implement the terminal device in this application Steps of either method on the side.
  • a network function network element in another aspect, includes a processor and a memory, the memory stores at least one instruction, and the at least one instruction is used to be executed by the processor to implement the Steps of any method on the network element side of the network function in the application.
  • a computer-readable storage medium stores instructions that, when executed by a processor, implement the steps of any method on the terminal device side in this application.
  • a computer-readable storage medium stores instructions that, when executed by a processor, implement the steps of any method on the terminal device side in this application.
  • the terminal device sends the first application information of the first application that needs to be verified to the network function network element, and the network function network element verifies whether the first application can trigger the message event of the discovery message, and feeds back the verification result to the terminal device, The terminal device determines whether to execute the message event of the discovery message for the first application according to the feedback verification result, thereby realizing information verification in the 5G system.
  • Fig. 1 is a schematic diagram of a service-oriented network structure provided by an exemplary embodiment of the present application
  • Fig. 2 is a flowchart of an information verification method provided by an exemplary embodiment of the present application
  • FIG. 3 is a schematic diagram of the internal structure of a terminal device provided by an exemplary embodiment of the present application.
  • Fig. 4 is a schematic diagram of the internal structure of a terminal device provided by another exemplary embodiment of the present application.
  • Fig. 5 is a flowchart of an information verification method provided by another exemplary embodiment of the present application.
  • Fig. 6 is a schematic structural diagram of an information verification device provided by an exemplary embodiment of the present application.
  • Fig. 7 is a schematic structural diagram of an information verification device provided by another exemplary embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of an information verification device provided by another exemplary embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of an information verification device provided by another exemplary embodiment of the present application.
  • Fig. 10 is a schematic structural diagram of a device provided by another exemplary embodiment of the present application.
  • FIG. 1 is a schematic diagram showing a communication network architecture according to an exemplary embodiment.
  • the communication network architecture can be applied to a car networking service using D2D technology.
  • the communication network architecture may include but is not limited to PCF (Policy Control Function) network elements, UDM (User Data Manager, user data management) network elements, AMF (Access and Mobility Management Function, access and mobility management functions) Network element, AF (Application Function) network element, NEF (Network Exposure Function, network development function) network element, SMF (Session Management Function, session management function) network element, NG-RAN (New Generation-Radio Access Network) , Radio Access Network) and UE (User Equipment).
  • PCF Policy Control Function
  • UDM User Data Manager
  • AMF Access and Mobility Management Function, access and mobility management functions
  • AF Application Function
  • NEF Network Exposure Function, network development function
  • SMF Session Management Function, session management function
  • NG-RAN New Generation-Radio Access Network
  • Radio Access Network Radio Access Network
  • AMF can communicate directly with PCF and SMF respectively, the AMF can communicate directly with UE, PCF can communicate directly with UDM, and the UDM can communicate directly with AF.
  • the UDM can be equipped with UDR (Unified Data Repository, unified data storage).
  • the NG-RAN is connected to the UE through the Uu interface respectively, and multiple UEs are connected through the PC5 interface. Among them, two adjacent UEs can communicate directly through the PC5 interface, and each UE is provided with a D2D direct connection layer.
  • At least one application capable of triggering a message event of a discovery message can be installed in each UE. In some embodiments, this type of application can be called a V2X application.
  • the communication network architecture including the foregoing network elements as an example.
  • the communication network architecture may also include other network elements, for example, UPF (User Plane Function) , User plane function) network element, NRF (Network Function Repository Function, network repository function) network element, etc., which are not limited in the embodiment of the present application.
  • UPF User Plane Function
  • User plane function User plane function
  • NRF Network Function Repository Function, network repository function
  • the AMF may be referred to as a mobility management network element, and the policy control function network element and the session management function network element may be collectively referred to as a network function network element.
  • the network function network element is The 5G core network element, the AF may be called an application server.
  • FIG. 2 is a flowchart of an information verification method according to an exemplary embodiment.
  • the information verification method may be applied to the communication network architecture shown in FIG. 1, and the method may include the following Implementation steps:
  • Step 201 The terminal device sends an information verification request to the network function network element, where the information verification request carries the first application information of the first application that needs to be verified.
  • the first application information can be used to uniquely identify the first application.
  • the first application information can be composed of OS (Operating System, operating system) ID (Identification) and APP (Application, application) ID.
  • the first application information may also be a predefined character string, etc., which is not limited in the embodiment of the present application.
  • the terminal device when a certain service related to the first application needs to establish direct communication, the terminal device needs to be able to discover other nearby terminal devices installed with the first application. To this end, a discovery message can be sent or monitored. Before sending or monitoring, it is also necessary to verify whether the first application can trigger a message event related to the discovery message.
  • the message event includes sending a discovery message or monitoring a discovery message, that is, it needs to verify whether the first application can trigger the terminal device to send a discovery Message or monitor discovery message.
  • the terminal device may send an information verification request carrying the first application information that needs to be verified to the network function network element.
  • the specific implementation of the terminal device sending the information verification request to the network function network element may include: the terminal device encapsulates the information verification request into a first transparent container and then adds it to the non-access layer NAS message It is sent to the mobility management network element, and the mobility management network element forwards the first transparent container to the network function network element.
  • the terminal device may send the information verification request to NAS (Non Access Stratum), and the NAS layer encapsulates the verification request message into a first transparent container, and encapsulates the first transparent container into the NAS message Send to the mobility management network element after the middle.
  • NAS Non Access Stratum
  • the mobility management network element does not need to analyze it, and can directly forward the first transparent container to the network function network element.
  • the mobility management network element since the terminal device encapsulates the information verification request as the first transparent container and then adds it to the NAS message, the mobility management network element does not need to interpret the content in the first transparent container. Reduce the computing burden of mobility management network elements.
  • the terminal device encapsulates the information verification request into a NAS message and sends it to the mobility management network element, and the mobility management network element parses the information verification request from the NAS message and forwards it to the network.
  • Functional network element As another example, the terminal device encapsulates the information verification request into a NAS message and sends it to the mobility management network element, and the mobility management network element parses the information verification request from the NAS message and forwards it to the network. Functional network element.
  • the terminal device passes the information verification request to the NAS layer, and the NAS layer directly encapsulates the information verification request into a NAS message and then sends it to the mobility management network element.
  • the The mobility management network element parses the NAS message to parse out the information verification request, and then sends the obtained information verification request to the network function network element.
  • the terminal device since the terminal device does not need to perform the operation of encapsulating the information verification request as the first transparent container, it is directly encapsulated into the NAS message, so the function of the terminal device can be reduced. Consumption.
  • the information verification request may also include group information, which is used to indicate the group in which the first application is located; and/or, the information verification request may also include terminal device information of the terminal device; and/ Or, the information verification request may also include user information.
  • the group identifier can be used to uniquely identify a group.
  • the terminal devices in the same group can come from the same PLMN (Public Land Mobile Network, Public Land Mobile Network), or from different PLMNs.
  • PLMN Public Land Mobile Network
  • a group includes 5 terminal devices, of which 3 can be terminal devices in PLMN1, 2 are terminal devices in PLMN2, and 3 terminal devices in PLMN1 can communicate directly on the PC5 interface using D2D technology.
  • the three terminal devices of PLMN1 can also communicate with the two terminal devices of PLMN2 using the network.
  • the group to which the first application is located can also be verified to determine whether the group allows the triggering of the message event of the discovery message. Therefore, the information verification request is also Can include group information.
  • the terminal device information is used to uniquely identify the terminal device.
  • the terminal device information may be GPSI (Generic Public Subscription Identifier, General Public User Identifier).
  • some specific terminal devices can be restricted to trigger the message event of the discovery message. Therefore, while verifying the first application, the terminal device on which the first application is installed can also be verified, that is, the information can be verified.
  • the request carries terminal device information to check whether the terminal device where the first application is located can trigger the message event of the discovery message.
  • the user information can be used to uniquely identify a user in an application.
  • the user information can be a user account.
  • the user account that logs in to the first application can also be verified, that is, whether the user information is allowed to trigger the message event of the discovery message, therefore, the information verification request can carry user information.
  • the information verification request is used to instruct the network function network element to perform verification based on the first application information and application verification information.
  • the information verification request is used to instruct the network function network element to perform verification based on the first application information and application verification information.
  • the network function network element For specific implementation, please refer to the following steps.
  • Step 202 The network function network element receives the information verification request.
  • Step 203 The network function network element obtains application verification information.
  • the application verification information includes second application information of the second application that can trigger the message event of the discovery message.
  • the second application mentioned here refers to an application that is authorized to trigger the message event of the discovery message.
  • the authorized second application may include one or more, that is, the application verification information includes at least A second application information.
  • the application verification information further includes group information of the group where the second application information is located, wherein each second application information is associated with at least one group information or each group information is associated with at least one second application information; and /Or, the application verification information further includes terminal device information of the terminal device used to install the second application; and/or, the application verification information further includes user information used to log in to the second application.
  • the application verification information may include At least one of group information, terminal device information, and user information related to the authorized second application.
  • the association relationship between the second application information and the group information may include two types, one is that the second application information is associated with at least one group information, that is, each group in at least one group related to the second application is allowed to trigger the discovery message.
  • the other is that a certain group information is associated with at least one second application information, that is, each second application in at least one second application in the certain group is allowed to trigger the message event of the discovery message.
  • the specific implementation of the network function network element acquiring application verification information may include: the network function network element acquiring application verification information locally.
  • the network function network element may store the application verification information locally, and the locally stored application verification information may be pulled from the user data management network element in advance. In this case, when the first application of the first application is required When the information is verified, the application verification information can be obtained locally.
  • the specific implementation of the network function network element acquiring application verification information may further include: the network function network element acquiring the application verification information from the user data management network element, and the application verification information in the user data management network element It is sent in advance by the application server.
  • the application verification information can be pulled from the user data management network element.
  • the network function network element is a session management function network element
  • the session management function network element uses a policy control function network element to pull the application verification information from the user data management network element, that is, At this time, the policy control function network element needs to forward the application verification information pulled from the user data management network element to the session management function network element.
  • the application server may send application verification information that can be applied to the PC5 to perform the discovery process to the user data management network element. Further, the application server may send the application verification information to NEF, and the NEF sends to the user data management network element.
  • the user data management network element receives and stores the application verification information sent from the application server. Further, the user data management network element may also store the application verification information in the UDR.
  • Step 204 The network function network element performs verification based on the first application information and the application verification information.
  • the network function network element can detect whether the second application information in the application verification information includes the second application information during the verification process. If the first application information is included, the verification is passed, which means that the first application can trigger the message event of the discovery message. If it is not included, the verification fails, which means that the first application cannot trigger the message event of the discovery message.
  • the group identification needs to be verified, that is, whether the application verification information includes the group identification in the information verification request, if included, the verification is passed, if not included , The verification fails.
  • the terminal device identification needs to be verified, that is, the application verification information includes the terminal device identification in the information verification request, and if included, the verification is passed. If it is not included, the verification fails.
  • the user ID needs to be verified, that is, whether the application verification information includes the user ID in the information verification request, if included, the verification is passed, if not included , The verification fails.
  • the application verification information may correspond to the information that needs to be verified carried in the above information verification request.
  • the application verification information also includes a group ID, it means that it is not only necessary to verify whether the first application can be performed on the PC5 interface. In the discovery process, it is also necessary to verify whether the group corresponding to the group ID allows the discovery process on the PC5 interface.
  • the application verification information includes the terminal device identification, it means that it is not only necessary to verify whether the first application can perform the discovery process on the PC5 interface, but also whether the terminal device where the first application is installed can perform the discovery process on the PC5 interface. ,and many more.
  • Step 205 Send the verification result of the first application information to the terminal device, the verification result is used to indicate whether the first application can trigger the message event of the discovery message
  • the network function network element sends the verification result to the terminal device.
  • the verification result may include a verification success message or a verification failure message.
  • the verification success message is used to indicate that the first application can perform the discovery process on the PC5 interface
  • the verification failure message is used to indicate that the first application cannot be used on the PC5 interface.
  • the discovery process is performed on the interface.
  • the verification result may also include an application code, and the application code may be used by the terminal device for the secure transmission mechanism in the subsequent direct communication process.
  • the verification result when the verification result includes a verification failure message, the verification result also includes a failure reason.
  • the failure reason may include not allowed by the application, not allowed by the group, or not allowed by the terminal device.
  • the specific implementation of the network function network element sending the verification result of the first application information to the terminal device may include the following two possible implementation manners:
  • the first implementation mode the network function network element encapsulates the verification result as a second transparent container and sends it to the mobility management network element, and the mobility management network element encapsulates the second transparent container into a NAS message and forwards it to The terminal equipment.
  • the network function network element may perform an encapsulation operation on the verification result, that is, encapsulate it into a second transparent container, and then send it to the mobility management network element.
  • the mobility management network element may send the second transparent container to the NAS layer, and encapsulate the second transparent container in the NAS message through the NAS layer and send it to the terminal device.
  • the mobility management network element may send the second transparent container to the terminal device through a UE configuration update message.
  • the second implementation manner the network function network element sends the verification result to the mobility management network element, and the mobility management network element encapsulates the verification result in a NAS message and forwards it to the terminal device.
  • the network function network element does not process the verification result, but directly sends it to the mobility management network element, and the mobility management network element encapsulates the verification result into a NAS message and forwards it to the terminal device.
  • the mobility management network element may send the verification result to the NAS layer, and the verification result is encapsulated in a NAS message through the NAS layer and then forwarded to the terminal device.
  • the mobility management network element may send the verification result to the terminal device through a UE configuration update message.
  • Step 206 The terminal device determines whether to execute the message event of the discovery message for the first application according to the verification result received from the network function network element.
  • the terminal device receives the verification result fed back by the network function network element, and the verification result is used to indicate whether the first application can trigger the message event of the discovery message.
  • the network function network element may use different methods to send the verification result to the terminal device, correspondingly, the terminal device uses different methods to obtain the verification result, which may specifically include:
  • Case 1 For the first case in step 201, the terminal device receives the NAS message through the NAS layer, reads the second transparent container from the NAS message, and interprets the second transparent container to obtain the verification result.
  • the second case for the second case in step 202, the terminal device receives the NAS message through the NAS layer, parses the NAS message, and obtains the verification result.
  • the terminal device may also receive the verification result through the D2D direct connection layer, and further, may feed back the verification result to the application layer.
  • the terminal device decides whether to execute a message event related to the discovery message according to the message included in the verification result. It is not difficult to understand that when the verification result includes a verification success message, it executes the message event related to the discovery message. When the verification success message is not included, the message event related to the discovery message is not executed.
  • the terminal device may include an application layer, a D2D direct connection layer, and an access layer.
  • the interlayer relationship among the application layer, D2D direct connection layer, and access layer is shown in Figure 3, where the connection The incoming layer can directly transmit information with the application layer, that is, no D2D direct layer forwarding is required.
  • the terminal device constructs a discovery message through the D2D direct connection layer, and transmits the discovery message to the access layer; the terminal The device adds the first application information as additional information of the discovery message through the access layer, and sends the added discovery message.
  • the terminal device when sending a discovery message, if it is verified that the first application can trigger the sending of the discovery message, the terminal device constructs the discovery message through the D2D direct connection layer, and then sends it to the access layer of the terminal device and indicates the message type For the discovery message.
  • the access layer of the terminal device sets the first application information to the additional information of the discovery message.
  • the first application information can be packaged with the discovery message, and then the access layer will package the The data is sent to the terminal device on the receiving side.
  • the first application information packaged by the access layer of the terminal device may be pre-configured, or may be sent by the application layer.
  • the message event includes a monitoring discovery message
  • the verification result includes a verification success message
  • the terminal device receives the discovery message added with additional information through the access layer, and detects whether the first application information in the additional information is It is the application information of the application that needs to be monitored.
  • the terminal device determines through the access layer that the first application information is application information of an application that needs to be monitored, the first application information is transferred to the application layer or is transferred to the application layer through the D2D direct connection layer.
  • the terminal device when the terminal device is used as the terminal device on the receiving side, after being authorized to monitor the discovery message, the terminal device receives the discovery message through the access layer.
  • the access layer obtains additional information of the discovery message, that is, obtains the first application information.
  • the access layer can determine whether the first application information is the application of the application that needs to be monitored according to the pre-configured application detection information information. If so, the access layer can send the first application information directly to the access layer, or the access layer can send the first application information to the D2D direct connection layer, and the D2D direct connection layer forwards it To the application layer.
  • the above-mentioned pre-configured application detection information may come from the application layer, the D2D direct connection layer, or may also come from the network side.
  • the specific implementation from the network side may mean that the network function network element configures the application detection information for the terminal device.
  • the application detection information may be the same as the application verification information, or may also be a subset of the application verification information.
  • the network function network element may pull the application detection information from the user data management network element.
  • the additional information includes the first application information.
  • the additional information may also include group information, etc.
  • the application in the terminal device on the receiving side The detection information also includes the group information of the group that needs to be monitored. At this time, it is also necessary to determine whether the group information in the additional information is the group information of the group that needs to be monitored, and after determining the group information of the group that needs to be monitored, it is also necessary to change This group of information is fed back to the application layer, and its specific implementation will not be repeated here.
  • the terminal device constructs a discovery message through the D2D direct connection layer and transmits it to the access layer, and the discovery message includes the first application information , The terminal device sends the discovery message through the access layer.
  • the terminal device is the terminal device on the sending side. After determining that the verification is passed, the terminal device may add the first application information to the discovery message when establishing a discovery message through the D2D direct connection layer, and then send the discovery message including the first application information through the access layer. Further, when building the discovery message, in addition to building based on the first application information, the building may also be based on at least one of a group ID, a terminal device ID, and a user ID.
  • the terminal device receives the discovery message through the access layer, transfers the discovery message to the D2D direct connection layer, and pairs through the D2D direct connection layer.
  • the discovery message is analyzed, and when it is determined that the first application information obtained after the analysis is the application information of the application that needs to be monitored, the first application information is passed to the application layer.
  • the discovery message is received through the access layer after being authorized to monitor the discovery message.
  • the discovery message is passed to the D2D direct connection layer, and the D2D direct connection layer parses the discovery message to parse the first application information in the discovery message.
  • the D2D direct connection layer detects whether the first application information in the discovery message is application information of the application that needs to be monitored.
  • the D2D direct connection layer can determine the first application information according to the pre-configured application detection information. Whether the application information is the application information of the application that needs to be monitored.
  • the terminal device determines through the D2D direct connection layer that the first application information in the discovery message is the application information of the application that needs to be monitored, the first application information is passed to the application layer, so that the terminal device realizes the discovery process .
  • the terminal device receives the discovery message through the access layer, detects whether the first application information in the discovery message is application information of the application that needs to be monitored, and when the terminal device determines through the access layer that the first application information is When the application information of the application needs to be monitored, the first application information is transferred to the D2D direct connection layer, and the terminal device transfers the first application information to the application layer through the D2D direct connection layer.
  • the terminal device is a terminal device that receives terminal information
  • the discovery message is received through the access layer, and then the access layer can detect whether the first application information in the discovery message is It is the application information of the application that needs to be monitored.
  • the access layer can determine whether the first application is the application information of the application that needs to be monitored according to the pre-configured application detection information.
  • the pre-configured information can come from the application layer, the direct connection layer, or from the network side.
  • the access layer determines that the first application is an application that needs to be monitored
  • the first application information is passed to the D2D direct connection layer, and the D2D direct connection layer is passed to the application layer, or the access layer directly transmits the first application information to the application layer.
  • An application information is passed to the application layer.
  • the verification result includes configuration information of the timer, and the configuration information is used to indicate that the verification result is always valid during the running time period of the timer.
  • the configuration information may include the timing duration of the timer. That is to say, the network function network element may configure a timer for the terminal device after the verification is completed. As an example, the network function network element may decide whether to configure the timer according to the local policy. Further, the network function network element The element may configure the timer according to the auxiliary information of the application server, that is, the auxiliary information may include configuration information of the timer.
  • the terminal device can always use the verification result. For example, the message event of the discovery message triggered by the same application or group multiple times does not need to be verified. Once the timer expires, the terminal device needs to re-initiate the verification process.
  • the start time of the timer includes at least one of the following:
  • the terminal device once the terminal device receives the configuration information, it starts the timer, and the running duration of the timer is the timing duration in the configuration information. It is not difficult to understand that since the configuration information of the timer is included in the verification result, it can also be understood that when the verification result is received, the terminal device starts the timer.
  • the restart timer command may be instructed by the network side, that is, in some cases, the terminal device may be required to restart the timer due to factors such as changes in the verification result.
  • the network side can issue a restart timer command, correspondingly Ground, the terminal device starts the timer.
  • the timer can be started, which is equivalent to restarting timing.
  • the user data management network element may also configure the terminal device according to the local policy or the auxiliary information of the application server. This timer is not limited in this embodiment of the application.
  • the terminal device sends the first application information of the first application that needs to be verified to the network function network element, and the network function network element verifies whether the first application can trigger the message event of the discovery message, and The verification result is fed back to the terminal device, and the terminal device determines whether to execute the message event of the discovery message for the first application according to the fed-back verification result, thereby realizing information verification in the 5G system.
  • the above description is based on the verification of the first application through the network function network element as an example.
  • the terminal device may also use pre-configured application verification information to verify the first application.
  • the realization method is introduced in detail. Please refer to FIG. 5, which is a flowchart of an information verification method according to another embodiment. The method can be applied to the communication network architecture shown in FIG. 1. The method may include the following implementation steps :
  • Step 501 The network function network element sends application verification information to the terminal device.
  • the application verification information includes the second application information of the second application that can trigger the message event of the discovery message, and is used for the terminal device to verify whether the first application can be triggered based on the first application information of the first application that needs to be verified
  • the message event of the discovery message includes sending a discovery message and monitoring a discovery message.
  • the second application information of the second application may be used to uniquely identify the second application.
  • the second application information may be identified by OS ID and APP ID; or, the second application information may also be pre- A defined character string, etc., this embodiment of the application does not limit it,
  • the second application mentioned here refers to the application that is authorized to trigger the message event of the discovery message.
  • the authorized second application may include one or more, that is, the application verification information includes at least one first application. 2. Application information.
  • the application verification information further includes group information of the group where the second application information is located, wherein each second application information is associated with at least one group information or each group information is associated with at least one second application information; and /Or, the application verification information further includes terminal device information of the terminal device used to install the second application; and/or, the application verification information further includes user information used to log in to the second application.
  • the association relationship between the second application information and the group information may include two types, one is that the second application information is associated with at least one group information, that is, each group in at least one group related to the second application is allowed to trigger the discovery message.
  • the other is that a certain group information is associated with at least one second application information, that is, each second application in at least one second application in the certain group is allowed to trigger the message event of the discovery message.
  • the network function network element encapsulates the application verification information as a third transparent container and sends it to the mobility management network element. After the mobility management network element adds the third transparent container to the NAS message Forward to the terminal device.
  • the network function network element can encapsulate the application verification information, that is, encapsulate it into a third transparent container, and then send it to the mobility management network element.
  • the mobility management network element may send the third transparent container to the NAS layer, and encapsulate the third transparent container in the NAS message through the NAS layer and send it to the terminal device.
  • the network function network element sends the application verification information to the mobility management network element, which is encapsulated in a NAS message and forwarded to the terminal device.
  • the network function network element does not process the application verification information, but directly sends it to the mobility management network element, and the mobility management network element encapsulates the application verification information in a NAS message and forwards it to the terminal equipment.
  • the mobility management network element may send the application verification information to the NAS layer, and the application verification information is encapsulated in the NAS message through the NAS layer and then forwarded to the terminal device.
  • the mobility management network element may send application verification information to the terminal device through a UE configuration update message.
  • the mobility management network element may send the application verification information to the terminal device in the following manner: receiving terminal A service request or registration request sent by a device, and the service request or registration request carries information about the ability of the terminal device to execute the message event of the discovery message.
  • the application verification information is sent to the terminal device through the service response or the registration response, and if it is determined based on the capability information that the terminal device does not have the message event of the discovery message If the capability is enabled, a rejection message can be sent to the terminal device, and the rejection message can carry the reason for rejection.
  • the network function network element does not provide application verification information to the terminal device, it can be expressed as any of the following situations: all applications can trigger the message event of the discovery message, or all applications cannot trigger the message discovery of the message Event, or, the historical application verification information configured at the time closest to the current time is determined as the application verification information, that is, the most recently configured historical application verification information is used.
  • the application verification information needs to be acquired, and the specific implementation of the acquisition may include:
  • the first case the network function network element obtains application verification information locally.
  • the network function network element may store the application verification information locally, and the locally stored application verification information may be pulled from the user data management network element in advance. In this case, when the first application of the first application is required When the information is verified, the application verification information can be obtained locally.
  • the second case the network function network element obtains the application verification information from the user data management network element, and the application verification information in the user data management network element is sent in advance by the application server.
  • the application verification information can be pulled from the user data management network element.
  • the network function network element is a session management function network element
  • the session management function network element uses a policy control function network element to pull the application verification information from the user data management network element, that is, At this time, the policy control function network element needs to forward the application verification information pulled from the user data management network element to the session management function network element. Further, if the user data management network element does not have application verification information, it may not provide application verification information.
  • the application server may send application verification information that can be applied to the PC5 to perform the discovery process to the user data management network element. Further, the application server may send the application verification information to NEF, and the NEF sends to the user data management network element.
  • the user data management network element receives and stores the application verification information sent from the application server. Further, the user data management network element may also store the application verification information in the UDR.
  • Step 502 The terminal device receives and stores the application verification information.
  • the specific implementation of the terminal device receiving the application verification information may include: the terminal device receives the UE configuration update message sent by the mobility management network element, and the UE configuration update message carries the application verification information.
  • the specific implementation of the terminal device receiving the application verification information may also include: the terminal device sends a service request or registration request to the mobility management network element, the service request or registration request carries a message event for the terminal device to execute a discovery message
  • the terminal device receives the service response or registration response sent by the mobility management network element, the service response or registration response carries the application verification information, and the application verification information is determined by the mobility management network element based on the capability information
  • the terminal device has the ability to execute the message event of the discovery message to be sent.
  • the terminal device when the terminal device does not receive the application verification information, it is determined that all applications can trigger the message event of the discovery message; or, when the terminal device does not receive the application verification sent by the network function network element Information, determine that all applications cannot trigger the message event of the discovery message; or, determine the pre-configured verification information as application verification information; or, determine the historical application verification information configured at the closest time to the current time as the application verification Information, that is, the last configured historical application verification information is determined as the application verification information.
  • the above is an introduction to the process of configuring application verification information for the terminal device by the network function network element.
  • the terminal device can verify the first application information that needs to be verified according to the pre-configured application verification Information is verified.
  • Step 503 The terminal device verifies the first application to be verified based on the application verification information.
  • the terminal device can obtain the application verification information and the first application information of the first application that needs to be verified.
  • the application layer of the terminal device may send the first application information of the first application to the D2D direct connection layer.
  • Step 504 The terminal device determines whether to execute the message event of the discovery message for the first application according to the verification result.
  • the terminal device verifies whether the first application can trigger the message event of the discovery message based on the first application information and the application verification information.
  • the terminal device can be verified through the D2D direct connection layer.
  • the D2D direct connection layer of the terminal device verifies whether the first application information is authorized to trigger the message event of the discovery message based on the application verification information. Further, the D2D direct connection layer of the terminal device verifies whether the first application information and the group identifier are authorized to trigger the message event of the discovery message based on the application verification information. Further, the D2D direct connection layer of the terminal device verifies the first application information and the group identifier based on the application verification information and whether the terminal device is authorized to trigger the message event of the discovery message. Further, the D2D direct connection layer of the terminal device verifies the first application information and whether the terminal device is authorized to trigger the message event of the discovery message based on the application verification information, and so on.
  • the terminal device determines whether to execute the message event related to the discovery message according to the verification result. It is not difficult to understand that when the verification is passed, the message event related to the discovery message is executed, and when the verification fails, the message event related to the discovery message is not executed. .
  • step 203 for operations performed by the terminal device in the case of successful verification, refer to step 203 in the embodiment of FIG. 2 described above, and details are not repeated here.
  • the terminal device when the terminal device needs to verify the first application, it can obtain the application verification information pre-configured by the network function network element, because the application verification information includes the information of the second application that can trigger the message event of the discovery message.
  • the second application information therefore, the terminal device can verify whether the first application can trigger the message event of the discovery message based on the first application information and the application verification information, thereby realizing information verification in the 5G system.
  • FIG. 6 is a schematic structural diagram of an information verification device according to an exemplary embodiment.
  • the device may include:
  • the first sending module 610 is configured to send an information verification request to a network function network element, where the information verification request carries first application information of the first application that needs to be verified;
  • the determining module 620 is configured to determine whether to execute the message event of the discovery message for the first application according to the verification result received from the network function network element, where the network function network element is a fifth-generation 5G core network Network element.
  • the message event includes sending a discovery message or monitoring a discovery message.
  • the first sending module 610 is configured to: encapsulate the information verification request as a first transparent container and add it to a non-access stratum NAS message and send it to the mobility management network element , The mobility management network element forwards the first transparent container to the network function network element.
  • the first sending module 610 is configured to: encapsulate the information verification request into a NAS message and send it to a mobility management network element, and the mobility management network element receives the information from the The information verification request is parsed from the NAS message and forwarded to the network function network element.
  • the information verification request includes group information, and the group information is used to indicate the group in which the first application is located; and/or, the information verification request includes the terminal device And/or, the information verification request includes user information.
  • the application verification information includes group information of the group where the second application information is located, wherein each second application information is associated with at least one group information or each group information is associated with at least one first application information.
  • the second application information refers to the application information of the second application that can trigger the message event of the discovery message; and/or, the application verification information includes terminal device information of the terminal device used to install the second application; And/or, the application verification information includes user information used to log in to the second application.
  • the verification result includes configuration information of a timer, and the configuration information is used to indicate that the verification result is always valid during the running time period of the timer.
  • the start time of the timer includes at least one of the following:
  • the terminal device includes a D2D direct connection layer and an access layer
  • the determining module 620 is further configured to: if the verification result is If the verification success message is included, a discovery message is formed through the D2D direct connection layer, and the discovery message is passed to the access layer; the first application information is added as the information of the discovery message through the access layer Additional information, send the added discovery message.
  • the terminal device includes an application layer, a D2D direct connection layer, and an access layer
  • the message event includes a monitoring discovery message
  • the determining module 620 is further configured to:
  • the access layer receives the discovery message with additional information added, and detects whether the first application information in the additional information is the application information of the application that needs to be monitored; when the access layer determines that the first application information is the application that needs to be monitored When applying application information, the first application information is transferred to the application layer or transferred to the application layer through the D2D direct connection layer.
  • the terminal device includes an application layer, a D2D direct connection layer, and an access layer;
  • the message event includes a monitoring discovery message, and the determining module 620 is further configured to:
  • the incoming layer receives the discovery message, and transfers the discovery message to the D2D direct connection layer, and the discovery message includes the first application information;
  • the discovery message is parsed through the D2D direct connection layer;
  • the D2D direct connection layer determines that the first application information obtained after parsing is the application information of the application that needs to be monitored, the first application information is transferred to the application layer.
  • the network function network element is a policy control function network element or a session management function network element.
  • the terminal device sends the first application information of the first application that needs to be verified to the network function network element, and the network function network element verifies whether the first application can trigger the message event of the discovery message, and The verification result is fed back to the terminal device, and the terminal device determines whether to execute the message event of the discovery message for the first application according to the fed-back verification result, thereby realizing information verification in the 5G system.
  • FIG. 7 is a schematic structural diagram of an information verification apparatus according to another exemplary embodiment.
  • the apparatus may include:
  • the receiving module 710 is configured to receive an information verification request, where the information verification request carries first application information of the first application that needs to be verified;
  • the second sending module 720 is configured to send a verification result of the first application information to a terminal device, where the verification result is used to indicate whether the first application can trigger a message event of a discovery message.
  • the message event includes sending a discovery message or monitoring a discovery message.
  • the second sending module 720 is further configured to:
  • the second sending module 720 is further configured to:
  • the application verification information is acquired from the user data management network element, and the application verification information in the user data management network element is sent in advance by the application server.
  • the second sending module 720 is configured to:
  • the verification result is encapsulated as a second transparent container and sent to a mobility management network element, and the mobility management network element encapsulates the second transparent container in a NAS message and then forwards it to the terminal device.
  • the second sending module 720 is configured to:
  • the verification result is sent to a mobility management network element, and the mobility management network element encapsulates the verification result in a NAS message and then forwards it to the terminal device.
  • the network function network element is a policy control function network element or a session management function network element.
  • the application verification information includes group information of the group where the second application information is located, wherein each second application information is associated with at least one group information or each group information is associated with at least one first application information.
  • the second application information refers to the application information of the second application that can trigger the message event of the discovery message; and/or, the application verification information includes terminal device information of the terminal device used to install the second application; And/or, the application verification information includes user information used to log in to the second application.
  • the terminal device sends the first application information of the first application that needs to be verified to the network function network element, and the network function network element verifies whether the first application can trigger the message event of the discovery message, and The verification result is fed back to the terminal device, and the terminal device determines whether to execute the message event of the discovery message for the first application according to the fed-back verification result, thereby realizing information verification in the 5G system.
  • FIG. 8 is a schematic structural diagram of an information verification apparatus according to another exemplary embodiment.
  • the apparatus may include:
  • the verification module 810 is configured to verify the first application to be verified based on the application verification information
  • the execution module 820 is configured to determine whether to execute the message event of the discovery message for the first application according to the verification result
  • the application verification information is sent in advance by the network function network element, and the network function network element is a 5G core network network element.
  • the message event includes sending a discovery message or monitoring a discovery message.
  • the execution module 820 is further configured to receive a user equipment UE configuration update message sent by a mobility management network element, where the UE configuration update message carries the application verification information.
  • the execution module 820 is further configured to: send a service request or a registration request to the mobility management network element, the service request or the registration request carrying a message that the terminal device executes the discovery message Event capability information; receiving the service response or registration response sent by the mobility management network element, the service response or registration response carrying the application verification information, the application verification information being based on the mobility management network element
  • the capability information is sent after it is determined that the terminal device has the capability of executing the message event of the discovery message.
  • the application verification information includes group information of the group where the second application information is located, wherein each second application information is associated with at least one group information or each group information is associated with at least one first application information.
  • the second application information refers to the application information of the second application that can trigger the message event of the discovery message; and/or, the application verification information includes terminal device information of the terminal device used to install the second application; And/or, the application verification information includes user information used to log in to the second application.
  • the execution module 820 is further configured to: when the application verification information is not received, determine that all applications can trigger the message event of the discovery message; or, when the application verification information is not received When it is determined that all applications cannot trigger the message event of the discovery message; or, when the application verification information is not received, the pre-configured verification information is determined as the application verification information; or, when the application verification information is not received, the The historical application verification information configured at the time closest to the current time is determined to be the application verification information.
  • the terminal device includes a D2D direct connection layer and an access layer
  • the execution module 820 is further configured to:
  • the verification result includes a verification success message
  • construct a discovery message through the D2D direct connection layer and pass the discovery message to the access layer
  • the terminal device includes an application layer, a D2D direct connection layer, and an access layer
  • the message event includes a monitoring discovery message
  • the execution module 820 is further configured to:
  • Receive the discovery message with additional information added through the access layer and detect whether the first application information in the additional information is application information of the application that needs to be monitored; when the first application information is determined through the access layer When it is the application information of the application that needs to be monitored, the first application information is delivered to the application layer or delivered to the application layer through the D2D direct connection layer.
  • the network function network element is a policy control function network element or a session management function network element.
  • the terminal device when the terminal device needs to verify the first application, it can obtain the application verification information pre-configured by the network function network element, because the application verification information includes the information of the second application that can trigger the message event of the discovery message.
  • the second application information therefore, the terminal device can verify whether the first application can trigger the message event of the discovery message based on the first application information and the application verification information, thereby realizing information verification in the 5G system.
  • FIG. 9 is a schematic structural diagram of an information verification apparatus according to another exemplary embodiment.
  • the apparatus may include:
  • the third sending module 910 is configured to send application verification information to the terminal device, where the application verification information is used by the terminal device to verify based on the first application information of the first application that needs to be verified, and to determine whether to execute the verification for the first application The message event of the discovery message.
  • the message event includes sending a discovery message or monitoring a discovery message.
  • the third sending module 910 is further configured to: obtain the application verification information from the user data management network element, and the application verification information in the user data management network element It is sent in advance by the application server.
  • the third sending module 910 is further configured to: encapsulate the application verification information into a third transparent container and send it to the mobility management network element, and the mobility management network The element adds the third transparent container to the NAS message and forwards it to the terminal device.
  • the third sending module 910 is further configured to: send the application verification information to a mobility management network element, and the mobility management network element encapsulates it into a NAS message. Forward to the terminal device.
  • the application verification information includes group information of the group where the second application information is located, wherein each second application information is associated with at least one group information or each group information is associated with at least one first application information.
  • the second application information refers to the application information of the second application that can trigger the message event of the discovery message; and/or, the application verification information includes terminal device information of the terminal device used to install the second application; And/or, the application verification information includes user information used to log in to the second application.
  • the terminal device when the terminal device needs to verify the first application, it can obtain the application verification information pre-configured by the network function network element, because the application verification information includes the information of the second application that can trigger the message event of the discovery message.
  • the second application information therefore, the terminal device can verify whether the first application can trigger the message event of the discovery message based on the first application information and the application verification information, thereby realizing information verification in the 5G system.
  • FIG. 10 shows a schematic structural diagram of a device provided by an exemplary embodiment of the present application.
  • the device may be the foregoing terminal device, or may also be the foregoing network function network element, including: a processor 1001, a receiver 1002, transmitter 1003, memory 1004, and bus 1005.
  • the processor 1001 includes one or more processing cores, and the processor 1001 executes various functional applications and information processing by running software programs and modules.
  • the receiver 1002 and the transmitter 1003 may be implemented as a communication component, and the communication component may be a communication chip.
  • the memory 1004 is connected to the processor 1001 through a bus 1005.
  • the memory 1004 may be used to store at least one instruction, and the processor 1001 is used to execute the at least one instruction, so as to implement each step executed by the device in each of the foregoing method embodiments.
  • the memory 1004 can be implemented by any type of volatile or non-volatile storage device or a combination thereof.
  • the volatile or non-volatile storage device includes, but is not limited to: magnetic disks or optical disks, electrically erasable and programmable Read-only memory (EEPROM), erasable programmable read-only memory (EPROM), static anytime access memory (SRAM), read-only memory (ROM), magnetic memory, flash memory, programmable read-only memory (PROM) .
  • the present application provides a computer-readable storage medium in which at least one instruction is stored, and the at least one instruction is loaded and executed by the processor to implement the methods provided by the foregoing method embodiments.
  • the present application also provides a computer program product, which when the computer program product runs on a computer, causes the computer to execute the methods provided in the foregoing method embodiments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种信息验证方法、装置、设备及存储介质,涉及通信技术领域。所述方法包括:向网络功能网元发送信息验证请求,该信息验证请求携带需要验证的第一应用的第一应用信息,据从该网络功能网元接收的验证结果,确定是否执行针对该第一应用的发现消息的消息事件,其中,该网络功能网元为第五代5G核心网网元,从而实现5G系统中的信息验证。

Description

信息验证方法、装置、设备及存储介质 技术领域
本申请涉及通信技术领域,特别涉及一种信息验证方法、装置、设备及存储介质。
背景技术
随着5G(Fifth Generation,第五代)通信技术的快速发展,D2D(Device to Device,设备至设备)的直连通信业务逐渐得到广泛关注,D2D的直连通信业务主要针对一些对速率、时延等业务质量有较高要求的应用。
在针对某应用建立D2D过程中,终端设备可以通过发送发现消息或监听发现消息的方式来发现临近的且使用相同应用的其它终端设备。在此之前,需要验证该应用是否能够触发与发现消息相关的消息事件,包括发送发现消息或监听发现消息。目前,在非5G系统中,一般需要通过ProSe功能网元来验证应用是否允许触发与发现消息相关的消息事件。
然而,在5G通信系统中,该ProSe功能网元被通信网络架构中的部分网元所代替,因此,目前亟需一种方法来解决5G系统中针对发现消息的验证问题。
发明内容
本申请实施例提供了一种信息验证方法、装置、设备及存储介质,可以用于解决5G系统中针对发现消息的验证问题。所述技术方案如下:
一个方面,提供了一种信息验证方法,应用于终端设备中,所述方法包括:
向网络功能网元发送信息验证请求,所述信息验证请求携带需要验证的第一应用的第一应用信息;根据从所述网络功能网元接收的验证结果,确定是否执行针对所述第一应用的发现消息的消息事件,其中,所述网络功能网元为第五代5G核心网网元。
另一方面,提供了一种信息验证方法,应用于网络功能网元中,所述网络功能网元为5G核心网网元,所述方法包括:
接收信息验证请求,所述信息验证请求携带需要验证的第一应用的第一应用信息;将所述第一应用信息的验证结果发送给终端设备,所述验证结果用于指示所述第一应用是否能够触发发现消息的消息事件。
另一方面,提供了一种信息验证方法,应用于终端设备中,所述方法包括:
基于应用验证信息对待验证的第一应用进行验证;根据验证结果确定是否执行针对所述第一应用的发现消息的消息事件;其中,所述应用验证信息是由所述网络功能网元预先发送的,所述网络功能网元为5G核心网网元。
另一方面,提供了一种信息验证方法,应用于网络功能网元中,所述网络功能网元为5G核心网网元,所述方法包括:
向终端设备发送应用验证信息,所述应用验证信息用于所述终端设备基于需要验证的第一应用的第一应用信息验证,确定是否执行针对所述第一应用的发现消息的消息事件。
另一方面,提供了一种信息验证装置,应用于终端设备中,所述装置包括:
第一发送模块,用于向网络功能网元发送信息验证请求,所述信息验证请求携带需要验证的第一应用的第一应用信息;确定模块,用于根据从所述网络功能网元接收的验证结果,确定是否执行针对所述第一应用的发现消息的消息事件,其中,所述网络功能网元为第五代5G核心网网元。
另一方面,提供了一种信息验证装置,应用于网络功能网元中,所述网络功能网元为5G核心网网元,所述装置包括:
接收模块,用于接收信息验证请求,所述信息验证请求携带需要验证的第一应用的第一 应用信息;第二发送模块,用于将所述第一应用信息的验证结果发送给终端设备,所述验证结果用于指示所述第一应用是否能够触发发现消息的消息事件。
另一方面,提供了一种信息验证装置,应用于终端设备中,所述装置包括:
验证模块,用于基于应用验证信息对待验证的第一应用进行验证;执行模块,用于根据验证结果确定是否执行针对所述第一应用的发现消息的消息事件;其中,所述应用验证信息是由所述网络功能网元预先发送的,所述网络功能网元为5G核心网网元。
另一方面,提供了一种信息验证装置,应用于网络功能网元中,所述网络功能网元为5G核心网网元,所述装置包括:
第三发送模块,用于向终端设备发送应用验证信息,所述应用验证信息用于所述终端设备基于需要验证的第一应用的第一应用信息验证,确定是否执行针对所述第一应用的发现消息的消息事件。
另一方面,提供了一种终端设备,所述终端设备包括处理器和存储器,所述存储器存储有至少一条指令,所述至少一条指令用于被所述处理器执行以实现本申请中终端设备侧的任一方法的步骤。
另一方面,提供了一种网络功能网元,所述网络功能网元包括处理器和存储器,所述存储器存储有至少一条指令,所述至少一条指令用于被所述处理器执行以实现本申请中网络功能网元侧的任一方法的步骤。
另一方面,提供了一种计算机可读存储介质,所述计算机可读存储介质上存储有指令,所述指令被处理器执行时实现本申请中终端设备侧的任一方法的步骤。
另一方面,提供了一种计算机可读存储介质,所述计算机可读存储介质上存储有指令,所述指令被处理器执行时实现本申请中终端设备侧的任一方法的步骤。
本申请实施例提供的技术方案带来的有益效果至少包括:
终端设备将需要验证的第一应用的第一应用信息发送给网络功能网元,由该网络功能网元来验证该第一应用是否能够触发发现消息的消息事件,并向终端设备反馈验证结果,终端设备根据反馈的验证结果确定是否执行针对该第一应用的发现消息的消息事件,从而实现5G系统中的信息验证。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请一个示例性实施例提供的服务化网络结构的示意图;
图2是本申请一个示例性实施例提供的信息验证方法的流程图;
图3是本申请一个示例性实施例提供的终端设备的内部结构示意图;
图4是本申请另一个示例性实施例提供的终端设备的内部结构示意图;
图5是本申请另一个示例性实施例提供的信息验证方法的流程图;
图6是本申请一个示例性实施例提供的信息验证装置的结构示意图;
图7是本申请另一个示例性实施例提供的信息验证装置的结构示意图;
图8是本申请另一个示例性实施例提供的信息验证装置的结构示意图;
图9是本申请另一个示例性实施例提供的信息验证装置的结构示意图;
图10是本申请另一个示例性实施例提供的设备的结构示意图。
具体实施方式
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。
在对本申请实施例提供的信息验证方法进行详细介绍之前,先对本申请实施例涉及的实 施环境进行简单介绍。
本申请实施例提供的信息验证方法应用于服务化的通信网络架构中,在服务化的通信网络架构中定义的接口协议为第三方业务开发提供了更多可能。请参考图1,该图1是根据一示例性实施例示出的一种通信网络架构的示意图,该通信网络构架可以应用于使用D2D技术的车联网业务。
该通信网络架构可以包括但不限于PCF(Policy Control Function,策略控制功能)网元、UDM(User Data Manager,用户数据管理)网元、AMF(Access and Mobility Management Function,接入和移动管理功能)网元,AF(Application Function,应用功能)网元、NEF(Network Exposure Function,网络开发功能)网元、SMF(Session Management Function,会话管理功能)网元、NG-RAN(New Generation-Radio Access Network,无线接入网)和UE(User Equipment,用户设备)。
在该通信网络架构中,AMF可以分别与PCF和SMF直接进行通信,该AMF与UE可以直接进行通信,PCF与UDM可以直接进行通信,该UDM可以与AF直接进行通信,该UDM中可以设有UDR(Unified Data Repository,统一数据存储)。NG-RAN分别通过Uu接口与UE连接,多个UE之间通过PC5接口连接。其中,相邻的两个UE之间可以通过PC5接口进行直连通信,每个UE中均设置有D2D直连层。每个UE中可以安装至少一个能够触发发现消息的消息事件的应用,在一些实施例中,该类应用可以称为V2X应用。
需要说明的是,上述仅是以该通信网络架构包括上述网元为例进行说明,在另一实施例中,该通信网络架构还可以包括其它网元,譬如,还可以包括UPF(User Plane Function,用户面功能)网元、NRF(Network Function Repository Function,网络存储库功能)网元等,本申请实施例对此不作限定。
在本申请实施例中,该AMF可以被称为移动性管理网元,该策略控制功能网元和该会话管理功能网元可以统称为网络功能网元,进一步来说,该网络功能网元为5G核心网网元,该AF可以被称为应用服务器。
在介绍完本申请实施例涉及的通信网络架构后,接下来将结合附图对本申请实施例提供的信息验证方法进行详细介绍。
请参考图2,该图2是根据一示例性实施例示出的一种信息验证方法的流程图,该信息验证方法可以应用于上述图1所示的通信网络架构中,该方法可以包括如下几个实现步骤:
步骤201:终端设备向网络功能网元发送信息验证请求,该信息验证请求携带需要验证的第一应用的第一应用信息。
其中,该第一应用信息可以用于唯一标识该第一应用,示例性地,该第一应用信息可以由OS(Operating System,操作系统)ID(Identification,身份)和APP(Application,应用)ID来进行标识;或者,该第一应用信息还可以为预定义的一个字符串等,本申请实施例对此不做限定。
作为一种示例,当与第一应用相关的某业务需要建立直连通信时,终端设备需要能够发现附近安装有该第一应用的其它终端设备,为此,可以发送发现消息或监听发现消息。在发送或监听之前,还需要验证该第一应用是否能够触发与发现消息相关的消息事件,该消息事件包括发送发现消息或监听发现消息,即需要验证该第一应用是否能够触发终端设备发送发现消息或监听发现消息。作为一种示例,终端设备可以向网络功能网元发送携带需要验证的第一应用信息的信息验证请求。
在一种可能的实现方式中,终端设备向网络功能网元发送信息验证请求的具体实现可以包括:该终端设备将该信息验证请求封装为第一透明容器后添加至非接入层NAS消息中发给移动性管理网元,由该移动性管理网元将该第一透明容器转发给该网络功能网元。
由于终端设备与网络侧的移动性管理网元(AMF)之间建立通信连接,以及该移动性管理网元与网络功能网元连接,因此,为了将该信息验证请求发给网络功能网元,该终端设备 可以将该信息验证请求发给NAS(Non Access Stratum,非接入层),由该NAS层将该验证请求消息封装为第一透明容器,并将该第一透明容器封装至NAS消息中后发送给移动性管理网元。该移动性管理网元接收到该第一透明容器后无需解析,可以直接将该第一透明容器转发给网络功能网元。
值得一提的是,由于终端设备将信息验证请求封装为第一透明容器后添加至NAS消息中,如此以来,移动性管理网元可以不需要对该第一透明容器中的内容进行解读,减小了移动性管理网元的运算负担。
作为另一种示例,该终端设备将该信息验证请求封装至NAS消息中发给移动性管理网元,由该移动性管理网元从该NAS消息中解析出该信息验证请求后转发给该网络功能网元。
在该种实现方式,该终端设备将该信息验证请求传递给NAS层,由该NAS层直接将该信息验证请求封装至NAS消息中后发给移动性管理网元,在该种情况下,该移动性管理网元对该NAS消息进行解析,以解析出该信息验证请求,之后,将得到的信息验证请求发给网络功能网元。
值得一提的是,在该种实现方式中,由于不需要终端设备执行将信息验证请求封装为第一透明容器的操作,而是直接封装至NAS消息中,因此,可以减小终端设备的功耗。
作为一种示例,该信息验证请求还可以包括组信息,该组信息用于指示该第一应用所在的组;和/或,该信息验证请求还可以包括该终端设备的终端设备信息;和/或,该信息验证请求还可以包括用户信息。
其中,该组标识可以用于唯一标识一个组。作为一种示例,针对相同应用,若多个终端设备间针对该应用建立有相同的直连通信业务的会话,则可以认为该多个终端设备属于同一个组,譬如,在游戏中组队。同一个组内的终端设备可以来自相同的PLMN(Public Land Mobile Network,公共陆地移动网络),也可以来自不同的PLMN。举例来说,一个组中包括5个终端设备,其中3个可以是PLMN1中的终端设备,2个是PLMN2中的终端设备,3个PLMN1的终端设备可以使用D2D技术在PC5接口上直接通信,并且,3个PLMN1的终端设备还可以与PLMN2中的2个终端设备使用网络进行通信。在一些实施例中,除了需要对第一应用进行验证之外,还可以对该第一应用所在的组进行验证,以确定该组是否允许触发发现消息的消息事件,因此,该信息验证请求还可以包括组信息。
其中,该终端设备信息用于唯一标识该终端设备,示例性的,该终端设备信息可以为GPSI(Generic Public Subscription Identifier,通用公共用户标识符)。在一些实施例中,可以限定部分特定的终端设备能够触发发现消息的消息事件,所以,在验证第一应用的同时还可以对安装该第一应用的终端设备进行验证,即可以在该信息验证请求中携带终端设备信息,以检验该第一应用所在的终端设备是否能够触发发现消息的消息事件。
其中,该用户信息可以用于在一个应用中唯一标识一个用户,譬如,该用户信息可以为用户账号等。在一些实施例中,还可以对登录该第一应用的用户账号进行验证,即可以验证该用户信息是否允许触发发现消息的消息事件,因此,该信息验证请求可以携带用户信息。
该信息验证请求用于指示该网络功能网元基于该第一应用信息和应用验证信息进行验证,具体实现请参见如下步骤。
步骤202:该网络功能网元接收该信息验证请求。
步骤203:该网络功能网元获取应用验证信息。
其中,该应用验证信息包括能够触发发现消息的消息事件的第二应用的第二应用信息。
其中,这里所说的第二应用是指被授权能够触发发现消息的消息事件的应用,在该应用验证信息中,被授权的第二应用可以包括一个或者多个,即该应用验证信息包括至少一个第二应用信息。
作为一种示例,该应用验证信息还包括第二应用信息所在组的组信息,其中,每个第二应用信息与至少一个组信息关联或每个组信息与至少一个第二应用信息关联;和/或,该应用验证信息还包括用于安装第二应用的终端设备的终端设备信息;和/或,该应用验证信息还包 括用于登录第二应用的用户信息。
如前文所述,除了可以对第一应用进行验证外,还可能需要对与第一应用相关的组信息、终端设备信息和用户信息中的至少一个进行验证,对应地,该应用验证信息可以包括与被授权的第二应用相关的组信息、终端设备信息和用户信息中的至少一个。
其中,第二应用信息与组信息的关联关系可以包括两种,一种是第二应用信息与至少一个组信息关联,即与第二应用相关的至少一个组中每个组都允许触发发现消息的消息事件;另一种是某个组信息与至少一个第二应用信息关联,即该某个组内的至少一个第二应用中每个第二应用都允许触发发现消息的消息事件。
作为一种示例,网络功能网元获取应用验证信息的具体实现可以包括:网络功能网元从本地获取应用验证信息。
该网络功能网元本地可能存储有该应用验证信息,本地存储的应用验证信息可以是预先从用户数据管理网元中拉取的,在该种情况下,当需要对第一应用的第一应用信息进行验证时,可以从本地获取该应用验证信息。
作为一种示例,网络功能网元获取应用验证信息的具体实现还可以包括:该网络功能网元从该用户数据管理网元中获取该应用验证信息,该用户数据管理网元中的应用验证信息是由该应用服务器预先发送的。
当该网络功能网元的本地未存储该应用验证信息时,可以从用户数据管理网元中拉取该应用验证信息。作为一种示例,当该网络功能网元为会话管理功能网元时,该会话管理功能网元通过策略控制功能网元,从用户数据管理网元中拉取该应用验证信息,也即是,此时需要由策略控制功能网元将从用户数据管理网元中拉取的应用验证信息转发给该会话管理功能网元。
这里对该用户数据管理网元中的应用验证信息的由来进行简单介绍。在一些实施例中,应用服务器可以将能够应用于PC5上进行发现过程的应用验证信息发送至该用户数据管理网元中,进一步地,该应用服务器可以将该应用验证信息发送给NEF,由该NEF发送给该用户数据管理网元。该用户数据管理网元接收并存储来自该应用服务器发送的应用验证信息,进一步地,该用户数据管理网元还可以将该应用验证信息存储至UDR中。
步骤204:该网络功能网元基于该第一应用信息和该应用验证信息进行验证。
由于该应用验证信息包括能够触发发现消息的消息事件的第二应用的第二应用信息,因此,该网络功能网元在验证过程中,可以检测该应用验证信息中的第二应用信息是否包括该第一应用信息,如果包括,则验证通过,即说明该第一应用能够触发发现消息的消息事件,如果不包括,则验证未通过,即说明该第一应用不能够触发发现消息的消息事件。
进一步地,当上述信息验证请求还包括组标识时,还需要对该组标识进行验证,即查询该应用验证信息中是否包括信息验证请求中的组标识,如果包括,则验证通过,如果不包括,则验证未通过。
进一步地,当上述信息验证请求还包括终端设备标识时,还需要对该终端设备标识进行验证,即查询该应用验证信息中是否包括信息验证请求中的终端设备标识,如果包括,则验证通过,如果不包括,则验证未通过。
进一步地,当上述信息验证请求还包括用户标识时,还需要对该用户标识进行验证,即查询该应用验证信息中是否包括信息验证请求中的用户标识,如果包括,则验证通过,如果不包括,则验证未通过。
也即是,该应用验证信息与上述信息验证请求中携带的需要验证的信息可能是对应的,当该应用验证信息还包括组标识时,说明不仅需要验证第一应用是否能够在PC5接口上进行发现过程,还需要验证该组标识对应的组是否允许在PC5接口上进行发现过程。同理,当该应用验证信息包括终端设备标识时,说明不仅需要验证第一应用是否能够在PC5接口上进行发现过程,还需要验证安装第一应用的终端设备是否能够在PC5接口上进行发现过程,等等。
步骤205:将对该第一应用信息的验证结果发送给该终端设备,该验证结果用于指示该 第一应用是否能够触发发现消息的消息事件
验证结束后,该网络功能网元将验证结果发送给终端设备。其中,该验证结果可以包括验证成功消息或验证失败消息,该验证成功消息用于指示该第一应用能够在PC5接口上进行发现过程,该验证失败消息用于指示该第一应用不能够在PC5接口上进行发现过程。进一步地,当该验证结果包括验证成功消息时,该验证结果还可以包括应用码,该应用码可以由终端设备在后续进行直连通信过程中针对安全发送机制进行使用。进一步地,当该验证结果包括验证失败消息时,该验证结果还包括失败原因,譬如,失败原因可以包括应用不允许、组不允许,或者终端设备不允许等。
作为一种示例,该网络功能网元将对该第一应用信息的验证结果发送给该终端设备的具体实现可以包括如下两种可能的实现方式:
第一种实现方式:该网络功能网元将该验证结果封装为第二透明容器发给移动性管理网元,由该移动性管理网元将该第二透明容器封装至NAS消息中后转发给该终端设备。
也即是,在该种实现方式中,该网络功能网元可以对该验证结果进行封装操作,即将其封装为第二透明容器,之后,发给移动性管理网元。移动性管理网元接收到该第二透明容器后,可以将该第二透明容器发送至NAS层,通过该NAS层将第二透明容器封装至NAS消息中发给终端设备。作为一种实例,该移动性管理网元可以将通过UE配置更新消息将该第二透明容器发送给终端设备。
第二种实现方式:该网络功能网元将该验证结果发移动性管理网元,由该移动性管理网元将该验证结果封装至NAS消息中转发给该终端设备。
在该种实现方式中,网络功能网元不对该验证结果进行处理,而是直接发给移动性管理网元,由该移动性管理网元将该验证结果封装至NAS消息中转发给终端设备。作为一种示例,移动性管理网元接收到该验证结果后,可以将该验证结果发送至NAS层,通过该NAS层将验证结果封装至NAS消息中后转发给终端设备。示例性地,该移动性管理网元可以将通过UE配置更新消息将该验证结果发送给终端设备。
步骤206:该终端设备根据从网络功能网元接收的验证结果,确定是否执行针对第一应用的发现消息的消息事件。
该终端设备接收该网络功能网元反馈的验证结果,该验证结果用于指示该第一应用是否能够触发发现消息的消息事件。如前文所述,由于网络功能网元可能采用不同方式将该验证结果发送该终端设备,相应地,该终端设备采用不同的方式来获取验证结果,具体可以包括:
第一种情况:针对上述步骤201中的第一种情况,该终端设备通过NAS层接收该NAS消息,从NAS消息中读取第二透明容器,对该第二透明容器进行解读从而得到该验证结果。
第二种情况:针对上述步骤202中的第二种情况,该终端设备通过NAS层接收该NAS消息,对该NAS消息进行解析,从而获取到该验证结果。
作为一种示例,该终端设备还可以通过D2D直连层接收该验证结果,进一步地,可以向应用层反馈验证结果。
该终端设备根据该验证结果中包括的消息来决定是否执行与发现消息相关的消息事件,不难理解,当该验证结果包括验证成功消息时,执行与发现消息相关的消息事件,当该验证结果不包括验证成功消息时,不执行与发现消息相关的消息事件。
接下来,针对验证成功的情况下,对终端设备执行的操作做如下介绍:
在对终端设备执行的操作进行介绍之前,先对终端设备的内部包括的层及层间关系进行简单介绍。请参考图3,该终端设备可以包括应用层、D2D直连层和接入层,该应用层、D2D直连层和接入层三者的层间关系如图3所示,其中,该接入层可以与该应用层之间可以直接传递信息,即不需要D2D直连层转发。
作为一种示例,当消息事件包括发送发现消息时,若该验证结果包括验证成功消息,则该终端设备通过该D2D直连层组建发现消息,将该发现消息传递给该接入层;该终端设备通过该接入层将该第一应用信息添加为该发现消息的附加信息,发送添加后的发现消息。
也就是说,在发送发现消息时,如果经过验证确定该第一应用能够触发发送发现消息,则终端设备通过D2D直连层组建发现消息,之后发给终端设备的接入层,并指示消息类型为发现消息。终端设备的接入层接收到该发现消息后,将第一应用信息设置该发现消息的附加信息,譬如,可以将该第一应用信息与该发现消息进行打包,之后由接入层将打包的数据发送给接收侧的终端设备。其中,终端设备的接入层打包的第一应用信息可以是预配置的,也可以是由应用层发送的。
作为一种示例,该消息事件包括监听发现消息,若该验证结果包括验证成功消息,该终端设备通过该接入层接收添加有附加信息的发现消息,检测该附加信息中的第一应用信息是否为需要监听的应用的应用信息。当该终端设备通过该接入层确定该第一应用信息为需要监听的应用的应用信息时,将该第一应用信息传递给该应用层或者通过该D2D直连层传递至该应用层。
与发送端对应,当该终端设备作为接收侧的终端设备时,在被授权可以监听发现消息后,该终端设备通过接入层接收发现消息。当接收到发现消息,接入层获取该发现消息的附加信息,即获取第一应用信息,该接入层可以根据预配置的应用检测信息确定该第一应用信息是否为需要监听的应用的应用信息。如果是,则可以由该接入层将该第一应用信息直接发给接入层,或者,由该接入层将该第一应用信息发给D2D直连层,由该D2D直连层转发给应用层。
其中,上述预配置的应用检测信息可以来自于应用层、D2D直连层,或者,还可以是来自于网络侧。其中,来自网络侧的具体实现可以是指由网络功能网元为该终端设备配置该应用检测信息,该应用检测信息可以与应用验证信息相同,或者,也可以为该应用验证信息的子集。进一步地,该网络功能网元可以从用户数据管理网元拉取该应用检测信息。
当然,上述仅是以该附加信息包括第一应用信息为例进行说明,在另一实施例中,该附加信息还可以包括组信息等,在该种情况下,接收侧的终端设备中的应用检测信息还包括需要监听的组的组信息等,此时还需要确定附加信息中的组信息是否为需要监听的组的组信息,并在确定是需要监听的组的组信息后,还需要将该组信息反馈给应用层,其具体实现这里不再重复赘述。
作为一种示例,如果该消息事件包括发送发现消息,若该验证结果包括验证成功消息,该终端设备通过D2D直连层组建发现消息后传递给接入层,该发现消息包括该第一应用信息,该终端设备通过该接入层发送该发现消息。
如果该消息事件包括发送发现消息,该终端设备为发送侧的终端设备。该终端设备在确定验证通过后,在通过D2D直连层组建发现消息时,可以将该第一应用信息添加至该发现消息中,然后通过接入层发送包括该第一应用信息的发现消息。进一步地,在组建发现消息时,除了基于第一应用信息进行组建之外,还可以基于组标识、终端设备标识和用户标识中的至少一个进行组建。
作为一种示例,如果消息事件包括监听发现消息,若该验证结果包括验证成功消息,终端设备通过接入层接收该发现消息,将该发现消息传递至D2D直连层,通过D2D直连层对该发现消息进行解析,当确定解析后得到的第一应用信息为需要监听的应用的应用信息时,将该第一应用信息传递至应用层。
也就是说,如图4所示,若该终端设备为接收端的终端设备,则在授权监听发现消息后,通过接入层接收发现消息。一旦接收到发现消息,将该发现消息传递至D2D直连层,由该D2D直连层对该发现消息进行解析,以解析出该发现消息中的第一应用信息。之后,由D2D直连层检测该发现消息中的第一应用信息是否为需要监听的应用的应用信息,如前文所述,该D2D直连层可以根据预配置的应用检测信息来确定该第一应用信息是否为需要监听的应用的应用信息。当该终端设备通过该D2D直连层确定该发现消息中的第一应用信息为需要监听的应用的应用信息时,将该第一应用信息传递至该应用层,从而使得该终端设备实现发现过程。
进一步地,终端设备通过该接入层接收发现消息,检测该发现消息中的第一应用信息是否为需要监听的应用的应用信息,当该终端设备通过该接入层确定该第一应用信息为需要监听的应用的应用信息时,将该第一应用信息传递至该D2D直连层,该终端设备通过该D2D直连层将该第一应用信息传递至该应用层。
也就是说,若该终端设备为接收端息的终端设备,则在授权监听发现消息后,通过接入层接收发现消息,之后可以通过该接入层检测该发现消息中的第一应用信息是否为需要监听的应用的应用信息。同理,该接入层可以根据预配置的应用检测信息判断该第一应用是否为需要监听的应用的应用信息。其中,该预配置的信息可以来自于应用层、直连层或者来自于网络侧。当接入层确定该第一应用为需要监听的应用时,将该第一应用信息传递给D2D直连层,由该D2D直连层传递至应用层,或者,该接入层直接将该第一应用信息传递给应用层。
进一步地,该验证结果包括定时器的配置信息,该配置信息用于指示在该定时器的运行时间段内该验证结果一直有效。
该配置信息可以包括定时器的定时时长。也就是说,该网络功能网元在验证结束后,可以为终端设备配置定时器,作为一种示例,该网络功能网元可以根据本地策略决定是否配置该定时器,进一步地,该网络功能网元可以根据该应用服务器的辅助信息配置该定时器,即该辅助信息可以包括定时器的配置信息。在该定时器运行时间段内,终端设备可以一直使用该验证结果,例如同一个应用或组多次触发的发现消息的消息事件不需要进行验证。一旦定时器超时,终端设备需要重新发起验证过程。
作为一种示例,该定时器的启动时刻包括如下至少一种:
(1)接收到该定时器的配置信息的时刻。
也就是说,终端设备一旦接收到该配置信息,就启动该定时器,该定时器的运行时长即为该配置信息中的定时时长。不难理解,由于该定时器的配置信息是包括在验证结果中,所以也可以理解为,当接收到验证结果,终端设备启动该定时器。
(2)接收到重启定时器命令的时刻。
该重启定时器命令可以是由网络侧指示的,也即是,在一些情况下,可能会由于验证结果变更等因素需要终端设备重启定时器,此时网络侧可以下发重启定时器指令,相应地,该终端设备启动该定时器。
(3)接收到更新的验证结果的时刻。
当验证结果发生变化时,说明当前的验证结果已经失效,在该种情况下,可以启动该定时器,此时相当于重新进行定时。
需要说明的是,上述仅是以由网络功能网元配置定时器为例进行说明,在另一实施例,还可以由用户数据管理网元根据本地策略或者应用服务器的辅助信息,为终端设备配置该定时器,本申请实施例对此不作限定。
在本申请实施例中,终端设备将需要验证的第一应用的第一应用信息发送给网络功能网元,由该网络功能网元来验证该第一应用是否能够触发发现消息的消息事件,并向终端设备反馈验证结果,终端设备根据反馈的验证结果确定是否执行针对该第一应用的发现消息的消息事件,从而实现5G系统中的信息验证。
上述是以通过网络功能网元对第一应用进行验证为例进行说明,在另一实施例中,终端设备还可以预配置的应用验证信息,对该第一应用进行验证,接下来对该种实现方式进行详细介绍。请参考图5,该图5是根据另一实施例示出的一种信息验证方法的流程图,该方法可以应用于上述图1所示的通信网络架构中,该方法可以包括如下几个实现步骤:
步骤501:该网络功能网元向该终端设备发送应用验证信息。
其中,该应用验证信息包括能够触发发现消息的消息事件的第二应用的第二应用信息,用于该终端设备基于需要验证的第一应用的第一应用信息验证验证该第一应用是否能够触发发现消息的消息事件,该消息事件包括发送发现消息和监听发现消息。
其中,第二应用的第二应用信息可以用于唯一标识第二应用,示例性地,该第二应用信息可以由OS ID和APP ID来进行标识;或者,该第二应用信息还可以为预定义的一个字符串等,本申请实施例对此不做限定,
这里所说的第二应用是指被授权能够触发发现消息的消息事件的应用,在该应用验证信息中,被授权的第二应用可以包括一个或者多个,即该应用验证信息包括至少一个第二应用信息。
作为一种示例,该应用验证信息还包括第二应用信息所在组的组信息,其中,每个第二应用信息与至少一个组信息关联或每个组信息与至少一个第二应用信息关联;和/或,该应用验证信息还包括用于安装第二应用的终端设备的终端设备信息;和/或,该应用验证信息还包括用于登录第二应用的用户信息。
其中,第二应用信息与组信息的关联关系可以包括两种,一种是第二应用信息与至少一个组信息关联,即与第二应用相关的至少一个组中每个组都允许触发发现消息的消息事件;另一种是某个组信息与至少一个第二应用信息关联,即该某个组内的至少一个第二应用中每个第二应用都允许触发发现消息的消息事件。
作为一种示例,该网络功能网元将该应用验证信息封装为第三透明容器后发给该移动性管理网元,由该移动性管理网元将该第三透明容器添加至NAS消息中后转发给该终端设备。
也即是,在该种实现方式中,该网络功能网元可以对应用验证信息进行封装操作,即将其封装为第三透明容器,之后,发给移动性管理网元。移动性管理网元接收到该第三透明容器后,可以将该第三透明容器发送至NAS层,通过该NAS层将第三透明容器封装至NAS消息中发给终端设备。
作为一种示例,该网络功能网元将该应用验证信息发给该移动性管理网元,由该移动性管理网元封装至NAS消息中后转发给该终端设备。
在该种实现方式中,网络功能网元不对该应用验证信息进行处理,而是直接发给移动性管理网元,由该移动性管理网元将该应用验证信息封装至NAS消息中转发给终端设备。作为一种示例,移动性管理网元接收到该验证结果后,可以将该应用验证信息发送至NAS层,通过该NAS层将应用验证信息封装至NAS消息中后转发给终端设备。
进一步地,当终端设备与该移动性管理网元处于连接状态时,该移动性管理网元可以通过UE配置更新消息向终端设备发送应用验证信息。
进一步地,当该终端设备与该移动性管理网元处于未连接状态,即该终端设备处于空闲状态时,该移动性管理网元可以通过如下方式将该应用验证信息发送给终端设备:接收终端设备发送的服务请求或注册请求,该服务请求或注册请求中携带终端设备执行发现消息的消息事件的能力信息。如果基于该能力信息确定终端设备具有执行发现消息的消息事件的能力,则通过服务响应或注册响应将应用验证信息发送给终端设备,如果基于该能力信息确定终端设备不具有执行发现消息的消息事件的能力,则可以向终端设备发送拒绝消息,该拒绝消息可以携带拒绝理由。
进一步地,如果网络功能网元没有给终端设备提供应用验证信息,则可以表示为如下任一种情况:所有应用都能够触发发现消息的消息事件,或者,所有应用都不能够触发发现消息的消息事件,或者,将距离当前时间最近的时间配置的历史应用验证信息确定为应用验证信息,也即是,采用最近一次配置的历史应用验证信息。
进一步地,对于网络功能网元来说,在向终端设备发送应用验证信息之前,需要获取该应用验证信息,获取的具体实现可以包括:
第一种情况:网络功能网元从本地获取应用验证信息。
该网络功能网元本地可能存储有该应用验证信息,本地存储的应用验证信息可以是预先从用户数据管理网元中拉取的,在该种情况下,当需要对第一应用的第一应用信息进行验证时,可以从本地获取该应用验证信息。
第二种情况:该网络功能网元从该用户数据管理网元中获取该应用验证信息,该用户数 据管理网元中的应用验证信息是由该应用服务器预先发送的。
当该网络功能网元的本地未存储该应用验证信息时,可以从用户数据管理网元中拉取该应用验证信息。作为一种示例,当该网络功能网元为会话管理功能网元时,该会话管理功能网元通过策略控制功能网元,从用户数据管理网元中拉取该应用验证信息,也即是,此时需要由策略控制功能网元将从用户数据管理网元中拉取的应用验证信息转发给该会话管理功能网元。进一步地,如果该用户数据管理网元没有应用验证信息,则可以不提供应用验证信息。
这里对该用户数据管理网元中的应用验证信息的由来进行简单介绍。在一些实施例中,应用服务器可以将能够应用于PC5上进行发现过程的应用验证信息发送至该用户数据管理网元中,进一步地,该应用服务器可以将该应用验证信息发送给NEF,由该NEF发送给该用户数据管理网元。该用户数据管理网元接收并存储来自该应用服务器发送的应用验证信息,进一步地,该用户数据管理网元还可以将该应用验证信息存储至UDR中。
步骤502:终端设备接收并存储该应用验证信息。
作为一种示例,终端设备接收应用验证信息的具体实现可以包括:终端设备接收移动性管理网元发送的UE配置更新消息,UE配置更新消息携带应用验证信息。
作为一种示例,终端设备接收应用验证信息的具体实现还可以包括:终端设备向该移动性管理网元发送服务请求或注册请求,该服务请求或注册请求携带该终端设备执行发现消息的消息事件的能力信息,该终端设备接收该移动性管理网元发送的服务响应或注册响应,该服务响应或注册响应携带该应用验证信息,该应用验证信息由该移动性管理网元基于该能力信息确定该终端设备具有执行发现消息的消息事件的能力后发送的。
进一步地,对于终端设备来说,当终端设备未接收到应用验证信息时,确定所有应用都能够触发发现消息的消息事件;或者,当该终端设备未接收到该网络功能网元发送的应用验证信息时,确定所有应用都不能够触发发现消息的消息事件;或者,将预配置的验证信息确定为应用验证信息;或者,将距离当前时间最近的时间配置的历史应用验证信息确定为该应用验证信息,即将最近一次配置的历史应用验证信息确定为该应用验证信息。
需要说明的是,上述是对网络功能网元为终端设备配置应用验证信息的过程进行介绍,基于上述实现,终端设备在对需要验证的第一应用信息进行验证时,可以根据预先配置的应用验证信息进行验证。
步骤503:终端设备基于应用验证信息对待验证的第一应用进行验证。
当需要验证第一应用时,终端设备可以获取应用验证信息和需要验证的第一应用的第一应用信息。
作为一种示例,当与第一应用相关的某业务在应用层激活,或者在第一应用中有特定的组建立时,需要对第一应用进行验证。作为一种示例,该终端设备的应用层可以将该第一应用的第一应用信息发送给D2D直连层。
步骤504:终端设备根据验证结果确定是否执行针对第一应用的发现消息的消息事件。
也即是,终端设备基于该第一应用信息和该应用验证信息验证该第一应用是否能够触发该发现消息的消息事件。
作为一种示例,该终端设备可以通过D2D直连层进行验证。示例性地,该终端设备的D2D直连层基于应用验证信息验证第一应用信息是否被授权触发发现消息的消息事件。进一步地,该终端设备的D2D直连层基于应用验证信息验证第一应用信息以及组标识是否被授权触发发现消息的消息事件。进一步地,该终端设备的D2D直连层基于应用验证信息验证第一应用信息以及组标识和此终端设备是否被授权触发发现消息的消息事件。进一步地,该终端设备的D2D直连层基于应用验证信息验证该第一应用信息以及此终端设备是否被授权触发发现消息的消息事件,等等。
该终端设备根据验证结果决定是否执行与发现消息相关的消息事件,不难理解,当验证通过时,执行与发现消息相关的消息事件,当验证未通过时,不执行与发现消息相关的消息事件。
另外,针对验证成功的情况下终端设备执行的操作可以参见上述图2实施例中的步骤203,这里不再重复赘述。
在本申请实施例中,当终端设备需要对第一应用进行验证时,可以获取网络功能网元预先配置的应用验证信息,由于该应用验证信息包括能够触发发现消息的消息事件的第二应用的第二应用信息,因此,终端设备可以基于第一应用信息和该应用验证信息来验证该第一应用是否能够触发发现消息的消息事件,实现了5G系统中的信息验证。
请参考图6,该图6是根据一示例性实施例示出的一种信息验证装置的结构示意图,该装置可以包括:
第一发送模块610,用于向网络功能网元发送信息验证请求,所述信息验证请求携带需要验证的第一应用的第一应用信息;
确定模块620,用于根据从所述网络功能网元接收的验证结果,确定是否执行针对所述第一应用的发现消息的消息事件,其中,所述网络功能网元为第五代5G核心网网元。
在本申请一种可能的实现方式中,所述消息事件包括发送发现消息或监听发现消息。
在本申请一种可能的实现方式中,所述第一发送模块610用于:将所述信息验证请求封装为第一透明容器后添加至非接入层NAS消息中发给移动性管理网元,由所述移动性管理网元将所述第一透明容器转发给所述网络功能网元。
在本申请一种可能的实现方式中,所述第一发送模块610用于:将所述信息验证请求封装至NAS消息中发给移动性管理网元,由所述移动性管理网元从所述NAS消息中解析出所述信息验证请求后转发给所述网络功能网元。
在本申请一种可能的实现方式中,所述信息验证请求包括组信息,所述组信息用于指示所述第一应用所在的组;和/或,所述信息验证请求包括所述终端设备的终端设备信息;和/或,所述信息验证请求包括用户信息。
在本申请一种可能的实现方式中,所述应用验证信息包括第二应用信息所在组的组信息,其中,每个第二应用信息与至少一个组信息关联或每个组信息与至少一个第二应用信息关联,第二应用信息是指能够触发发现消息的消息事件的第二应用的应用信息;和/或,所述应用验证信息包括用于安装第二应用的终端设备的终端设备信息;和/或,所述应用验证信息包括用于登录第二应用的用户信息。
在本申请一种可能的实现方式中,所述验证结果包括定时器的配置信息,所述配置信息用于指示在所述定时器的运行时间段内所述验证结果一直有效。
在本申请一种可能的实现方式中,所述定时器的启动时刻包括如下至少一种:
接收到所述定时器的配置信息的时刻;或者,接收到重启定时器命令的时刻;或者,接收到更新的验证结果的时刻。
在本申请一种可能的实现方式中,所述终端设备包括D2D直连层和接入层,当所述消息事件包括发送发现消息时,所述确定模块620还用于:若所述验证结果包括验证成功消息,则通过所述D2D直连层组建发现消息,将所述发现消息传递给所述接入层;通过所述接入层将所述第一应用信息添加为所述发现消息的附加信息,发送添加后的发现消息。
在本申请一种可能的实现方式中,所述终端设备包括应用层、D2D直连层和接入层,所述消息事件包括监听发现消息,所述确定模块620还用于:通过所述接入层接收添加有附加信息的发现消息,检测所述附加信息中的第一应用信息是否为需要监听的应用的应用信息;当通过所述接入层确定所述第一应用信息为需要监听的应用的应用信息时,将所述第一应用信息传递给所述应用层或者通过所述D2D直连层传递至所述应用层。
在本申请一种可能的实现方式中,所述终端设备包括应用层、D2D直连层和接入层;所述消息事件包括监听发现消息,所述确定模块620还用于:通过所述接入层接收发现消息,将所述发现消息传递给所述D2D直连层,该发现消息中包括所述第一应用信息;通过所述D2D直连层对所述发现消息进行解析;当通过所述D2D直连层确定解析后得到的第一应用信 息为需要监听的应用的应用信息时,将所述第一应用信息传递至所述应用层。
在本申请一种可能的实现方式中,所述网络功能网元为策略控制功能网元或会话管理功能网元。
在本申请实施例中,终端设备将需要验证的第一应用的第一应用信息发送给网络功能网元,由该网络功能网元来验证该第一应用是否能够触发发现消息的消息事件,并向终端设备反馈验证结果,终端设备根据反馈的验证结果确定是否执行针对该第一应用的发现消息的消息事件,从而实现5G系统中的信息验证。
请参考图7,该图7是根据另一示例性实施例示出的一种信息验证装置的结构示意图,该装置可以包括:
接收模块710,用于接收信息验证请求,所述信息验证请求携带需要验证的第一应用的第一应用信息;
第二发送模块720,用于将所述第一应用信息的验证结果发送给终端设备,所述验证结果用于指示所述第一应用是否能够触发发现消息的消息事件。
在本申请一种可能的实现方式中,所述消息事件包括发送发现消息或监听发现消息。
在本申请一种可能的实现方式中,所述第二发送模块720还用于:
获取应用验证信息;
基于所述第一应用信息和所述应用验证信息进行验证。
在本申请一种可能的实现方式中,所述第二发送模块720还用于:
从本地获取所述应用验证信息;或者,
从所述用户数据管理网元中获取所述应用验证信息,所述用户数据管理网元中的应用验证信息是由所述应用服务器预先发送的。
在本申请一种可能的实现方式中,所述第二发送模块720用于:
将所述验证结果封装为第二透明容器发给移动性管理网元,由所述移动性管理网元将所述第二透明容器封装至NAS消息中后转发给所述终端设备。
在本申请一种可能的实现方式中,所述第二发送模块720用于:
将所述验证结果发给移动性管理网元,由所述移动性管理网元将所述验证结果封装至NAS消息中后转发给所述终端设备。
在本申请一种可能的实现方式中,所述网络功能网元为策略控制功能网元或会话管理功能网元。
在本申请一种可能的实现方式中,所述应用验证信息包括第二应用信息所在组的组信息,其中,每个第二应用信息与至少一个组信息关联或每个组信息与至少一个第二应用信息关联,第二应用信息是指能够触发发现消息的消息事件的第二应用的应用信息;和/或,所述应用验证信息包括用于安装第二应用的终端设备的终端设备信息;和/或,所述应用验证信息包括用于登录第二应用的用户信息。
在本申请实施例中,终端设备将需要验证的第一应用的第一应用信息发送给网络功能网元,由该网络功能网元来验证该第一应用是否能够触发发现消息的消息事件,并向终端设备反馈验证结果,终端设备根据反馈的验证结果确定是否执行针对该第一应用的发现消息的消息事件,从而实现5G系统中的信息验证。
请参考图8,该图8是根据另一示例性实施例示出的一种信息验证装置的结构示意图,该装置可以包括:
验证模块810,用于基于应用验证信息对待验证的第一应用进行验证;
执行模块820,用于根据验证结果确定是否执行针对所述第一应用的发现消息的消息事件;
其中,所述应用验证信息是由所述网络功能网元预先发送的,所述网络功能网元为5G 核心网网元。
在本申请一种可能的实现方式中,所述消息事件包括发送发现消息或监听发现消息。
在本申请一种可能的实现方式中,所述执行模块820还用于:接收移动性管理网元发送的用户设备UE配置更新消息,所述UE配置更新消息携带所述应用验证信息。
在本申请一种可能的实现方式中,所述执行模块820还用于:向移动性管理网元发送服务请求或注册请求,所述服务请求或注册请求携带所述终端设备执行发现消息的消息事件的能力信息;接收所述移动性管理网元发送服务响应或注册响应,所述服务响应或注册响应携带所述应用验证信息,所述应用验证信息由所述移动性管理网元基于所述能力信息确定所述终端设备具有执行发现消息的消息事件的能力后发送的。
在本申请一种可能的实现方式中,所述应用验证信息包括第二应用信息所在组的组信息,其中,每个第二应用信息与至少一个组信息关联或每个组信息与至少一个第二应用信息关联,第二应用信息是指能够触发发现消息的消息事件的第二应用的应用信息;和/或,所述应用验证信息包括用于安装第二应用的终端设备的终端设备信息;和/或,所述应用验证信息包括用于登录第二应用的用户信息。
在本申请一种可能的实现方式中,所述执行模块820还用于:当未接收到应用验证信息时,确定所有应用都能够触发发现消息的消息事件;或者,当未接收到应用验证信息时,确定所有应用都不能够触发发现消息的消息事件;或者,当未接收到应用验证信息时,将预配置的验证信息确定为应用验证信息;或者,当未接收到应用验证信息时,将距离当前时间最近的时间配置的历史应用验证信息确定为所述应用验证信息。
在本申请一种可能的实现方式中,所述终端设备包括D2D直连层和接入层,当所述消息事件包括发送发现消息时,所述执行模块820还用于:
若所述验证结果包括验证成功消息,则通过所述D2D直连层组建发现消息,将所述发现消息传递给所述接入层;
通过所述接入层将所述第一应用信息添加为所述发现消息的附加信息,发送添加后的发现消息。
在本申请一种可能的实现方式中,所述终端设备包括应用层、D2D直连层和接入层,所述消息事件包括监听发现消息,所述执行模块820还用于:
通过所述接入层接收添加有附加信息的发现消息,检测所述附加信息中的第一应用信息是否为需要监听的应用的应用信息;当通过所述接入层确定所述第一应用信息为需要监听的应用的应用信息时,将所述第一应用信息传递给所述应用层或者通过所述D2D直连层传递至所述应用层。
在本申请一种可能的实现方式中,所述网络功能网元为策略控制功能网元或会话管理功能网元。
在本申请实施例中,当终端设备需要对第一应用进行验证时,可以获取网络功能网元预先配置的应用验证信息,由于该应用验证信息包括能够触发发现消息的消息事件的第二应用的第二应用信息,因此,终端设备可以基于第一应用信息和该应用验证信息来验证该第一应用是否能够触发发现消息的消息事件,实现了5G系统中的信息验证。
请参考图9,该图9是根据另一示例性实施例示出的一种信息验证装置的结构示意图,该装置可以包括:
第三发送模块910,用于向终端设备发送应用验证信息,所述应用验证信息用于所述终端设备基于需要验证的第一应用的第一应用信息验证,确定是否执行针对所述第一应用的发现消息的消息事件。
在本申请一种可能的实现方式中,所述消息事件包括发送发现消息或监听发现消息。
在本申请一种可能的实现方式中,所述第三发送模块910还用于:从所述用户数据管理网元中获取所述应用验证信息,所述用户数据管理网元中的应用验证信息是由所述应用服务 器预先发送的。
在本申请一种可能的实现方式中,所述第三发送模块910还用于:将所述应用验证信息封装为第三透明容器后发给移动性管理网元,由所述移动性管理网元将所述第三透明容器添加至NAS消息中后转发给所述终端设备。
在本申请一种可能的实现方式中,所述第三发送模块910还用于:将所述应用验证信息发给移动性管理网元,由所述移动性管理网元封装至NAS消息中后转发给所述终端设备。
在本申请一种可能的实现方式中,所述应用验证信息包括第二应用信息所在组的组信息,其中,每个第二应用信息与至少一个组信息关联或每个组信息与至少一个第二应用信息关联,第二应用信息是指能够触发发现消息的消息事件的第二应用的应用信息;和/或,所述应用验证信息包括用于安装第二应用的终端设备的终端设备信息;和/或,所述应用验证信息包括用于登录第二应用的用户信息。
在本申请实施例中,当终端设备需要对第一应用进行验证时,可以获取网络功能网元预先配置的应用验证信息,由于该应用验证信息包括能够触发发现消息的消息事件的第二应用的第二应用信息,因此,终端设备可以基于第一应用信息和该应用验证信息来验证该第一应用是否能够触发发现消息的消息事件,实现了5G系统中的信息验证。
请参考图10,其示出了本申请一个示例性实施例提供的设备的结构示意图,该设备可以为上述终端设备,或者,也可以为上述网络功能网元,包括:处理器1001、接收器1002、发射器1003、存储器1004和总线1005。
处理器1001包括一个或者一个以上处理核心,处理器1001通过运行软件程序以及模块,从而执行各种功能应用以及信息处理。
接收器1002和发射器1003可以实现为一个通信组件,该通信组件可以是一块通信芯片。
存储器1004通过总线1005与处理器1001相连。
存储器1004可用于存储至少一个指令,处理器1001用于执行该至少一个指令,以实现上述各个方法实施例中的设备执行的各个步骤。
此外,存储器1004可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,易失性或非易失性存储设备包括但不限于:磁盘或光盘,电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),静态随时存取存储器(SRAM),只读存储器(ROM),磁存储器,快闪存储器,可编程只读存储器(PROM)。
本申请提供了一种计算机可读存储介质,所述存储介质中存储有至少一条指令,所述至少一条指令由所述处理器加载并执行以实现上述各个方法实施例提供的方法。
本申请还提供了一种计算机程序产品,当计算机程序产品在计算机上运行时,使得计算机执行上述各个方法实施例提供的方法。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上所述仅为本申请的较佳实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (73)

  1. 一种信息验证方法,应用于终端设备,其特征在于,所述方法包括:
    向网络功能网元发送信息验证请求,所述信息验证请求携带需要验证的第一应用的第一应用信息;
    根据从所述网络功能网元接收的验证结果,确定是否执行针对所述第一应用的发现消息的消息事件,其中,所述网络功能网元为第五代5G核心网网元。
  2. 如权利要求1所述的方法,其特征在于,所述消息事件包括发送发现消息或监听发现消息。
  3. 如权利要求1或2所述的方法,其特征在于,所述向网络功能网元发送信息验证请求,包括:
    将所述信息验证请求封装为第一透明容器后添加至非接入层NAS消息中发给移动性管理网元,由所述移动性管理网元将所述第一透明容器转发给所述网络功能网元。
  4. 如权利要求1或2所述的方法,其特征在于,所述向网络功能网元发送信息验证请求,包括:
    将所述信息验证请求封装至NAS消息中发给移动性管理网元,由所述移动性管理网元从所述NAS消息中解析出所述信息验证请求后转发给所述网络功能网元。
  5. 如权利要求1所述的方法,其特征在于,
    所述信息验证请求包括组信息,所述组信息用于指示所述第一应用所在的组;和/或,
    所述信息验证请求包括所述终端设备的终端设备信息;和/或,
    所述信息验证请求包括用户信息。
  6. 如权利要求5所述的方法,其特征在于,
    所述应用验证信息包括第二应用信息所在组的组信息,其中,每个第二应用信息与至少一个组信息关联或每个组信息与至少一个第二应用信息关联,第二应用信息是指能够触发发现消息的消息事件的第二应用的应用信息;和/或,
    所述应用验证信息包括用于安装第二应用的终端设备的终端设备信息;和/或,
    所述应用验证信息包括用于登录第二应用的用户信息。
  7. 如权利要求1-6任一项所述的方法,其特征在于,所述验证结果包括定时器的配置信息,所述配置信息用于指示在所述定时器的运行时间段内所述验证结果一直有效。
  8. 如权利要求7所述的方法,其特征在于,所述定时器的启动时刻包括如下至少一种:
    接收到所述定时器的配置信息的时刻;或者,
    接收到重启定时器命令的时刻;或者,
    接收到更新的验证结果的时刻。
  9. 如权利要求1所述的方法,其特征在于,所述终端设备包括D2D直连层和接入层,当所述消息事件包括发送发现消息时,所述方法还包括:
    若所述验证结果包括验证成功消息,则通过所述D2D直连层组建发现消息,将所述发现消息传递给所述接入层;
    通过所述接入层将所述第一应用信息添加为所述发现消息的附加信息,发送添加后的发现消息。
  10. 如权利要求1所述的方法,其特征在于,所述终端设备包括应用层、D2D直连层和接入层,所述消息事件包括监听发现消息,所述方法还包括:
    通过所述接入层接收添加有附加信息的发现消息,检测所述附加信息中的第一应用信息是否为需要监听的应用的应用信息;
    当通过所述接入层确定所述第一应用信息为需要监听的应用的应用信息时,将所述第 一应用信息传递给所述应用层或者通过所述D2D直连层传递至所述应用层。
  11. 如权利要求1所述的方法,其特征在于,所述终端设备包括应用层、D2D直连层和接入层;所述消息事件包括监听发现消息,所述方法还包括:
    通过所述接入层接收发现消息,将所述发现消息传递给所述D2D直连层,该发现消息中包括所述第一应用信息;
    通过所述D2D直连层对所述发现消息进行解析;
    当通过所述D2D直连层确定解析后得到的第一应用信息为需要监听的应用的应用信息时,将所述第一应用信息传递至所述应用层。
  12. 如权利要求1所述的方法,其特征在于,所述网络功能网元为策略控制功能网元或会话管理功能网元。
  13. 一种信息验证方法,应用于网络功能网元,其特征在于,所述网络功能网元为5G核心网网元,所述方法包括:
    接收信息验证请求,所述信息验证请求携带需要验证的第一应用的第一应用信息;
    将所述第一应用信息的验证结果发送给终端设备,所述验证结果用于指示所述第一应用是否能够触发发现消息的消息事件。
  14. 如权利要求13所述的方法,其特征在于,所述消息事件包括发送发现消息或监听发现消息。
  15. 如权利要求13或14所述的方法,其特征在于,所述方法还包括:
    获取应用验证信息;
    基于所述第一应用信息和所述应用验证信息进行验证。
  16. 如权利要求15所述的方法,其特征在于,所述获取应用验证信息,包括:
    从本地获取所述应用验证信息;或者,
    从所述用户数据管理网元中获取所述应用验证信息,所述用户数据管理网元中的应用验证信息是由所述应用服务器预先发送的。
  17. 如权利要求13所述的方法,其特征在于,所述将所述第一应用信息的验证结果发送给终端设备,包括:
    将所述验证结果封装为第二透明容器发给移动性管理网元,由所述移动性管理网元将所述第二透明容器封装至NAS消息中后转发给所述终端设备。
  18. 如权利要求13所述的方法,其特征在于,所述将所述第一应用信息的验证结果发送给终端设备,包括:
    将所述验证结果发给移动性管理网元,由所述移动性管理网元将所述验证结果封装至NAS消息中后转发给所述终端设备。
  19. 如权利要求13-18任一项所述的方法,其特征在于,所述网络功能网元为策略控制功能网元或会话管理功能网元。
  20. 如权利要求15所述的方法,其特征在于,
    所述应用验证信息包括第二应用信息所在组的组信息,其中,每个第二应用信息与至少一个组信息关联或每个组信息与至少一个第二应用信息关联,第二应用信息是指能够触发发现消息的消息事件的第二应用的应用信息;和/或,
    所述应用验证信息包括用于安装第二应用的终端设备的终端设备信息;和/或,
    所述应用验证信息包括用于登录第二应用的用户信息。
  21. 一种信息验证方法,应用于终端设备,其特征在于,所述方法包括:
    基于应用验证信息对待验证的第一应用进行验证;
    根据验证结果确定是否执行针对所述第一应用的发现消息的消息事件;
    其中,所述应用验证信息是由所述网络功能网元预先发送的,所述网络功能网元为5G核心网网元。
  22. 如权利要求21所述的方法,其特征在于,所述消息事件包括发送发现消息或监听发现消息。
  23. 如权利要求21所述的方法,其特征在于,所述方法还包括:
    接收移动性管理网元发送的用户设备UE配置更新消息,所述UE配置更新消息携带所述应用验证信息。
  24. 如权利要求21所述的方法,其特征在于,所述方法还包括:
    向移动性管理网元发送服务请求或注册请求,所述服务请求或注册请求携带所述终端设备执行发现消息的消息事件的能力信息;
    接收所述移动性管理网元发送服务响应或注册响应,所述服务响应或注册响应携带所述应用验证信息,所述应用验证信息由所述移动性管理网元基于所述能力信息确定所述终端设备具有执行发现消息的消息事件的能力后发送的。
  25. 如权利要求21-24任一项所述的方法,其特征在于,
    所述应用验证信息包括第二应用信息所在组的组信息,其中,每个第二应用信息与至少一个组信息关联或每个组信息与至少一个第二应用信息关联,第二应用信息是指能够触发发现消息的消息事件的第二应用的应用信息;和/或,
    所述应用验证信息包括用于安装第二应用的终端设备的终端设备信息;和/或,
    所述应用验证信息包括用于登录第二应用的用户信息。
  26. 如权利要求21所述的方法,其特征在于,所述方法还包括:
    当未接收到应用验证信息时,确定所有应用都能够触发发现消息的消息事件;或者,
    当未接收到应用验证信息时,确定所有应用都不能够触发发现消息的消息事件;或者,
    当未接收到应用验证信息时,将预配置的验证信息确定为应用验证信息;或者,
    当未接收到应用验证信息时,将距离当前时间最近的时间配置的历史应用验证信息确定为所述应用验证信息。
  27. 如权利要求21所述的方法,其特征在于,所述终端设备包括D2D直连层和接入层,当所述消息事件包括发送发现消息时,所述方法还包括:
    若所述验证结果包括验证成功消息,则通过所述D2D直连层组建发现消息,将所述发现消息传递给所述接入层;
    通过所述接入层将所述第一应用信息添加为所述发现消息的附加信息,发送添加后的发现消息。
  28. 如权利要求21所述的方法,其特征在于,所述终端设备包括应用层、D2D直连层和接入层,所述消息事件包括监听发现消息,所述方法还包括:
    通过所述接入层接收添加有附加信息的发现消息,检测所述附加信息中的第一应用信息是否为需要监听的应用的应用信息;
    当通过所述接入层确定所述第一应用信息为需要监听的应用的应用信息时,将所述第一应用信息传递给所述应用层或者通过所述D2D直连层传递至所述应用层。
  29. 如权利要求21-27任一项所述的方法,其特征在于,所述网络功能网元为策略控制功能网元或会话管理功能网元。
  30. 一种信息验证方法,应用于网络功能网元,其特征在于,所述网络功能网元为5G核心网网元,所述方法包括:
    向终端设备发送应用验证信息,所述应用验证信息用于所述终端设备基于需要验证的第一应用的第一应用信息验证,确定是否执行针对所述第一应用的发现消息的消息事件。
  31. 如权利要求30所述的方法,其特征在于,所述消息事件包括发送发现消息或监听发现消息。
  32. 如权利要求30所述的方法,其特征在于,所述方法还包括:
    从所述用户数据管理网元中获取所述应用验证信息,所述用户数据管理网元中的应用 验证信息是由所述应用服务器预先发送的。
  33. 如权利要求30所述的方法,其特征在于,所述向终端设备发送应用验证信息,包括:
    将所述应用验证信息封装为第三透明容器后发给移动性管理网元,由所述移动性管理网元将所述第三透明容器添加至NAS消息中后转发给所述终端设备。
  34. 如权利要求30所述的方法,其特征在于,所述向终端设备发送应用验证信息,包括:
    将所述应用验证信息发给移动性管理网元,由所述移动性管理网元封装至NAS消息中后转发给所述终端设备。
  35. 如权利要求30所述的方法,其特征在于,
    所述应用验证信息包括第二应用信息所在组的组信息,其中,每个第二应用信息与至少一个组信息关联或每个组信息与至少一个第二应用信息关联,第二应用信息是指能够触发发现消息的消息事件的第二应用的应用信息;和/或,
    所述应用验证信息包括用于安装第二应用的终端设备的终端设备信息;和/或,
    所述应用验证信息包括用于登录第二应用的用户信息。
  36. 一种信息验证装置,应用于终端设备,其特征在于,所述装置包括:
    第一发送模块,用于向网络功能网元发送信息验证请求,所述信息验证请求携带需要验证的第一应用的第一应用信息;
    确定模块,用于根据从所述网络功能网元接收的验证结果,确定是否执行针对所述第一应用的发现消息的消息事件,其中,所述网络功能网元为第五代5G核心网网元。
  37. 如权利要求36所述的装置,其特征在于,所述消息事件包括发送发现消息或监听发现消息。
  38. 如权利要求36或37所述的装置,其特征在于,所述第一发送模块用于:
    将所述信息验证请求封装为第一透明容器后添加至非接入层NAS消息中发给移动性管理网元,由所述移动性管理网元将所述第一透明容器转发给所述网络功能网元。
  39. 如权利要求36或37所述的装置,其特征在于,所述第一发送模块用于:
    将所述信息验证请求封装至NAS消息中发给移动性管理网元,由所述移动性管理网元从所述NAS消息中解析出所述信息验证请求后转发给所述网络功能网元。
  40. 如权利要求36所述的装置,其特征在于,
    所述信息验证请求包括组信息,所述组信息用于指示所述第一应用所在的组;和/或,
    所述信息验证请求包括所述终端设备的终端设备信息;和/或,
    所述信息验证请求包括用户信息。
  41. 如权利要求40所述的装置,其特征在于,
    所述应用验证信息包括第二应用信息所在组的组信息,其中,每个第二应用信息与至少一个组信息关联或每个组信息与至少一个第二应用信息关联,第二应用信息是指能够触发发现消息的消息事件的第二应用的应用信息;和/或,
    所述应用验证信息包括用于安装第二应用的终端设备的终端设备信息;和/或,
    所述应用验证信息包括用于登录第二应用的用户信息。
  42. 如权利要求36-41任一项所述的装置,其特征在于,所述验证结果包括定时器的配置信息,所述配置信息用于指示在所述定时器的运行时间段内所述验证结果一直有效。
  43. 如权利要求42所述的装置,其特征在于,所述定时器的启动时刻包括如下至少一种:
    接收到所述定时器的配置信息的时刻;或者,
    接收到重启定时器命令的时刻;或者,
    接收到更新的验证结果的时刻。
  44. 如权利要求36所述的装置,其特征在于,所述终端设备包括D2D直连层和接入层,当所述消息事件包括发送发现消息时,所述确定模块还用于:
    若所述验证结果包括验证成功消息,则通过所述D2D直连层组建发现消息,将所述发现消息传递给所述接入层;
    通过所述接入层将所述第一应用信息添加为所述发现消息的附加信息,发送添加后的发现消息。
  45. 如权利要求36所述的装置,其特征在于,所述终端设备包括应用层、D2D直连层和接入层,所述消息事件包括监听发现消息,所述确定模块还用于:
    通过所述接入层接收添加有附加信息的发现消息,检测所述附加信息中的第一应用信息是否为需要监听的应用的应用信息;
    当通过所述接入层确定所述第一应用信息为需要监听的应用的应用信息时,将所述第一应用信息传递给所述应用层或者通过所述D2D直连层传递至所述应用层。
  46. 如权利要求36所述的装置,其特征在于,所述终端设备包括应用层、D2D直连层和接入层;所述消息事件包括监听发现消息,所述确定模块还用于:
    通过所述接入层接收发现消息,将所述发现消息传递给所述D2D直连层,该发现消息中包括所述第一应用信息;
    通过所述D2D直连层对所述发现消息进行解析;
    当通过所述D2D直连层确定解析后得到的第一应用信息为需要监听的应用的应用信息时,将所述第一应用信息传递至所述应用层。
  47. 如权利要求36所述的装置,其特征在于,所述网络功能网元为策略控制功能网元或会话管理功能网元。
  48. 一种信息验证装置,应用于网络功能网元,其特征在于,所述网络功能网元为5G核心网网元,所述装置包括:
    接收模块,用于接收信息验证请求,所述信息验证请求携带需要验证的第一应用的第一应用信息;
    第二发送模块,用于将所述第一应用信息的验证结果发送给终端设备,所述验证结果用于指示所述第一应用是否能够触发发现消息的消息事件。
  49. 如权利要求48所述的装置,其特征在于,所述消息事件包括发送发现消息或监听发现消息。
  50. 如权利要求48或49所述的装置,其特征在于,所述第二发送模块还用于:
    获取应用验证信息;
    基于所述第一应用信息和所述应用验证信息进行验证。
  51. 如权利要求50所述的装置,其特征在于,所述第二发送模块还用于:
    从本地获取所述应用验证信息;或者,
    从所述用户数据管理网元中获取所述应用验证信息,所述用户数据管理网元中的应用验证信息是由所述应用服务器预先发送的。
  52. 如权利要求48所述的装置,其特征在于,所述第二发送模块用于:
    将所述验证结果封装为第二透明容器发给移动性管理网元,由所述移动性管理网元将所述第二透明容器封装至NAS消息中后转发给所述终端设备。
  53. 如权利要求48所述的装置,其特征在于,所述第二发送模块用于:
    将所述验证结果发给移动性管理网元,由所述移动性管理网元将所述验证结果封装至NAS消息中后转发给所述终端设备。
  54. 如权利要求48-53任一项所述的装置,其特征在于,所述网络功能网元为策略控制功能网元或会话管理功能网元。
  55. 如权利要求50所述的装置,其特征在于,
    所述应用验证信息包括第二应用信息所在组的组信息,其中,每个第二应用信息与至少一个组信息关联或每个组信息与至少一个第二应用信息关联,第二应用信息是指能够触发发现消息的消息事件的第二应用的应用信息;和/或,
    所述应用验证信息包括用于安装第二应用的终端设备的终端设备信息;和/或,
    所述应用验证信息包括用于登录第二应用的用户信息。
  56. 一种信息验证装置,应用于终端设备中,其特征在于,所述装置包括:
    验证模块,用于基于应用验证信息对待验证的第一应用进行验证;
    执行模块,用于根据验证结果确定是否执行针对所述第一应用的发现消息的消息事件;
    其中,所述应用验证信息是由所述网络功能网元预先发送的,所述网络功能网元为5G核心网网元。
  57. 如权利要求56所述的装置,其特征在于,所述消息事件包括发送发现消息或监听发现消息。
  58. 如权利要求56所述的装置,其特征在于,所述执行模块还用于:
    接收移动性管理网元发送的用户设备UE配置更新消息,所述UE配置更新消息携带所述应用验证信息。
  59. 如权利要求56所述的装置,其特征在于,所述执行模块还用于:
    向移动性管理网元发送服务请求或注册请求,所述服务请求或注册请求携带所述终端设备执行发现消息的消息事件的能力信息;
    接收所述移动性管理网元发送服务响应或注册响应,所述服务响应或注册响应携带所述应用验证信息,所述应用验证信息由所述移动性管理网元基于所述能力信息确定所述终端设备具有执行发现消息的消息事件的能力后发送的。
  60. 如权利要求56-59任一项所述的装置,其特征在于,
    所述应用验证信息包括第二应用信息所在组的组信息,其中,每个第二应用信息与至少一个组信息关联或每个组信息与至少一个第二应用信息关联,第二应用信息是指能够触发发现消息的消息事件的第二应用的应用信息;和/或,
    所述应用验证信息包括用于安装第二应用的终端设备的终端设备信息;和/或,
    所述应用验证信息包括用于登录第二应用的用户信息。
  61. 如权利要求56所述的装置,其特征在于,所述执行模块还用于:
    当未接收到应用验证信息时,确定所有应用都能够触发发现消息的消息事件;或者,
    当未接收到应用验证信息时,确定所有应用都不能够触发发现消息的消息事件;或者,
    当未接收到应用验证信息时,将预配置的验证信息确定为应用验证信息;或者,
    当未接收到应用验证信息时,将距离当前时间最近的时间配置的历史应用验证信息确定为所述应用验证信息。
  62. 如权利要求56所述的装置,其特征在于,所述终端设备包括D2D直连层和接入层,当所述消息事件包括发送发现消息时,所述执行模块还用于:
    若所述验证结果包括验证成功消息,则通过所述D2D直连层组建发现消息,将所述发现消息传递给所述接入层;
    通过所述接入层将所述第一应用信息添加为所述发现消息的附加信息,发送添加后的发现消息。
  63. 如权利要求56所述的装置,其特征在于,所述终端设备包括应用层、D2D直连层和接入层,所述消息事件包括监听发现消息,所述执行模块还用于:
    通过所述接入层接收添加有附加信息的发现消息,检测所述附加信息中的第一应用信息是否为需要监听的应用的应用信息;
    当通过所述接入层确定所述第一应用信息为需要监听的应用的应用信息时,将所述第一应用信息传递给所述应用层或者通过所述D2D直连层传递至所述应用层。
  64. 如权利要求56-63任一项所述的装置,其特征在于,所述网络功能网元为策略控制功能网元或会话管理功能网元。
  65. 一种信息验证装置,应用于网络功能网元,其特征在于,所述网络功能网元为5G核心网网元,所述装置包括:
    第三发送模块,用于向终端设备发送应用验证信息,所述应用验证信息用于所述终端设备基于需要验证的第一应用的第一应用信息验证,确定是否执行针对所述第一应用的发现消息的消息事件。
  66. 如权利要求65所述的装置,其特征在于,所述消息事件包括发送发现消息或监听发现消息。
  67. 如权利要求65所述的装置,其特征在于,所述第三发送模块还用于:
    从所述用户数据管理网元中获取所述应用验证信息,所述用户数据管理网元中的应用验证信息是由所述应用服务器预先发送的。
  68. 如权利要求65所述的装置,其特征在于,所述第三发送模块还用于:
    将所述应用验证信息封装为第三透明容器后发给移动性管理网元,由所述移动性管理网元将所述第三透明容器添加至NAS消息中后转发给所述终端设备。
  69. 如权利要求65所述的装置,其特征在于,所述第三发送模块还用于:
    将所述应用验证信息发给移动性管理网元,由所述移动性管理网元封装至NAS消息中后转发给所述终端设备。
  70. 如权利要求65所述的装置,其特征在于,
    所述应用验证信息包括第二应用信息所在组的组信息,其中,每个第二应用信息与至少一个组信息关联或每个组信息与至少一个第二应用信息关联,第二应用信息是指能够触发发现消息的消息事件的第二应用的应用信息;和/或,
    所述应用验证信息包括用于安装第二应用的终端设备的终端设备信息;和/或,
    所述应用验证信息包括用于登录第二应用的用户信息。
  71. 一种终端设备,其特征在于,所述设备包括处理器和存储器,所述存储器存储有至少一条指令,所述至少一条指令用于被所述处理器执行以实现权利要求1-12任一所述的方法,或者,实现权利要求21-29任一所述的方法。
  72. 一种网络功能网元,其特征在于,所述设备包括处理器和存储器,所述存储器存储有至少一条指令,所述至少一条指令用于被所述处理器执行以实现权利要求13-20任一所述的方法,或者,实现权利要求30-35任一所述的方法。
  73. 一种计算机可读存储介质,所述计算机可读存储介质上存储有指令,其特征在于,所述指令被处理器执行时实现权利要求1-12任一所述的方法,或者,实现权利要求13-20任一所述的方法,或者,实现权利要求21-29任一所述的方法,或者,实现权利要求30-35任一所述的方法。
PCT/CN2019/100208 2019-08-12 2019-08-12 信息验证方法、装置、设备及存储介质 WO2021026726A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201980091289.3A CN113396600B (zh) 2019-08-12 2019-08-12 信息验证方法、装置、设备及存储介质
PCT/CN2019/100208 WO2021026726A1 (zh) 2019-08-12 2019-08-12 信息验证方法、装置、设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/100208 WO2021026726A1 (zh) 2019-08-12 2019-08-12 信息验证方法、装置、设备及存储介质

Publications (1)

Publication Number Publication Date
WO2021026726A1 true WO2021026726A1 (zh) 2021-02-18

Family

ID=74570253

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/100208 WO2021026726A1 (zh) 2019-08-12 2019-08-12 信息验证方法、装置、设备及存储介质

Country Status (2)

Country Link
CN (1) CN113396600B (zh)
WO (1) WO2021026726A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117378277A (zh) * 2022-05-06 2024-01-09 北京小米移动软件有限公司 通信方法、装置、设备以及存储介质
WO2024020752A1 (zh) * 2022-07-25 2024-02-01 北京小米移动软件有限公司 一种基于人工智能ai提供服务的方法、装置、设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140004796A1 (en) * 2012-06-27 2014-01-02 Alcatel-Lucent Usa Inc. Discovering proximity devices in broadband networks
CN104066070A (zh) * 2013-03-20 2014-09-24 中兴通讯股份有限公司 终端注册方法、终端发现方法、终端及装置
CN104168664A (zh) * 2013-05-20 2014-11-26 华为终端有限公司 发现的方法及装置
CN104581685A (zh) * 2013-10-18 2015-04-29 电信科学技术研究院 发现信号的发送和接收方法、以及发送和接收装置
CN106470382A (zh) * 2015-08-14 2017-03-01 中兴通讯股份有限公司 授权验证方法、配置信息接收方法、装置、基站及终端
CN109511115A (zh) * 2017-09-14 2019-03-22 华为技术有限公司 一种授权方法和网元

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111247820B (zh) * 2017-03-10 2023-04-25 苹果公司 用于设备到设备发现的技术协调
US11553348B2 (en) * 2017-11-15 2023-01-10 Nokia Technologies Oy Authorization of applications for direct discovery

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140004796A1 (en) * 2012-06-27 2014-01-02 Alcatel-Lucent Usa Inc. Discovering proximity devices in broadband networks
CN104066070A (zh) * 2013-03-20 2014-09-24 中兴通讯股份有限公司 终端注册方法、终端发现方法、终端及装置
CN104168664A (zh) * 2013-05-20 2014-11-26 华为终端有限公司 发现的方法及装置
CN104581685A (zh) * 2013-10-18 2015-04-29 电信科学技术研究院 发现信号的发送和接收方法、以及发送和接收装置
CN106470382A (zh) * 2015-08-14 2017-03-01 中兴通讯股份有限公司 授权验证方法、配置信息接收方法、装置、基站及终端
CN109511115A (zh) * 2017-09-14 2019-03-22 华为技术有限公司 一种授权方法和网元

Also Published As

Publication number Publication date
CN113396600B (zh) 2022-11-29
CN113396600A (zh) 2021-09-14

Similar Documents

Publication Publication Date Title
EP3726806B1 (en) Method for remotely controlling vehicle on the basis of smart apparatus
US20210227367A1 (en) Cross-resource subscription for m2m service layer
US9774704B2 (en) Home gateway, cloud server, and method for communication therebetween
EP2577946B1 (en) Keep-alive hiatus declaration
KR101740449B1 (ko) M2m(machine-to-machine)시스템에서 게이트웨이 변경 방법 및 이를 위한 장치
WO2021082715A1 (zh) 直接通信的处理方法、装置、中继终端及远端终端
WO2016179924A1 (zh) 一种无线局域网的接入控制方法及装置、终端
US8001263B2 (en) Method for suspending and resuming content transmission/reception
WO2021026726A1 (zh) 信息验证方法、装置、设备及存储介质
WO2015078341A1 (zh) 应用程序远程更新的方法和装置
WO2020125168A1 (zh) 基于心跳报文数据发送和接收方法、存储介质及处理器
CN109412844B (zh) 一种管理实体的实现方法、装置、设备和存储介质
WO2011082684A1 (zh) 数据配置的方法和装置
WO2010031304A1 (zh) 一种组播升级文件的方法、装置和系统
WO2018196463A1 (zh) 网络接入方法、装置、存储介质及处理器
WO2014038820A1 (ko) 무선 통신 시스템에서 서버의 단말의 리소스에 대한 접근 권한을 관리하기 위한 방법 및 이를 위한 장치
CN114268938A (zh) 用户前置设备的纳管方法、装置、设备以及存储介质
CN109640181A (zh) 一种通过机顶盒对家庭网关进行升级的方法
US20230090543A1 (en) User Plane Security Enforcement Information Determining Method, Apparatus, and System
US9125207B2 (en) Method and device for controlling channel transmission
TWI474731B (zh) WiMAX用戶端及設置該WiMAX用戶端參數之方法
WO2018028341A1 (zh) 无线承载的处理方法及装置、终端、基站
US9923810B1 (en) Application update using multiple disparate networks
CN110650071B (zh) 用户设备的接入管理方法、装置和管理服务器
CN113114692A (zh) 一种5g独立组网的移动网络蜜罐系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19941611

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19941611

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 19941611

Country of ref document: EP

Kind code of ref document: A1