WO2022135006A1 - 一种消息过滤方法及装置 - Google Patents

一种消息过滤方法及装置 Download PDF

Info

Publication number
WO2022135006A1
WO2022135006A1 PCT/CN2021/132866 CN2021132866W WO2022135006A1 WO 2022135006 A1 WO2022135006 A1 WO 2022135006A1 CN 2021132866 W CN2021132866 W CN 2021132866W WO 2022135006 A1 WO2022135006 A1 WO 2022135006A1
Authority
WO
WIPO (PCT)
Prior art keywords
identifier
application
terminal
message
identification
Prior art date
Application number
PCT/CN2021/132866
Other languages
English (en)
French (fr)
Inventor
杨淼
李明超
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to JP2023538989A priority Critical patent/JP2024501528A/ja
Priority to EP21909005.7A priority patent/EP4266718A1/en
Publication of WO2022135006A1 publication Critical patent/WO2022135006A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/46Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/40Connection management for selective distribution or broadcast

Definitions

  • the present application relates to the field of Internet of Vehicles, and in particular, to a message filtering method and device.
  • V2X Vehicle to Everything
  • LTE Long Term Evolution
  • the embodiment of the present application discloses a message filtering method and device, which can realize the filtering of the repeatedly received messages indicating the same application service sent from the same device by the terminal, effectively saving the consumption of computing resources of the terminal and improving the message processing. efficiency.
  • an embodiment of the present application provides a message filtering method, which is applied to a first terminal.
  • the first terminal establishes a first unicast connection with a third terminal, and the first terminal stores a first unicast connection based on the first unicast connection.
  • the method includes: receiving a broadcast of the second terminal.
  • the first message includes a second identity identifier and a second application identifier, wherein the second identity identifier is the unique identifier of the second terminal, and the second application identifier is the identifier of the application service provided by the second terminal;
  • the identity identifier is the same as the first identity identifier, and if the second application identifier matches the first application identifier, the first terminal refuses to establish a second unicast connection with the second terminal.
  • the mapping relationship between the second identity identifier corresponding to the first message and the second application identifier and the first identity identifier and the first application identifier corresponding to the first unicast connection established by the first terminal are used.
  • the first terminal discards the first message and does not establish a second unicast connection with the second terminal, thereby realizing the filtering of the repeatedly received messages from the same device indicating the same application service by the terminal, effectively The consumption of computing resources of the terminal is saved, and the message processing efficiency is improved.
  • the first identity identifier is the media access control MAC address of the third terminal
  • the second identity identifier is the MAC address of the second terminal
  • the first application identifier includes the identifier of the first application or at least one of the mapping values of the identification of the first application
  • the second application identification includes at least one of the identification of the second application or the mapping value of the identification of the second application.
  • the first identity identifier uniquely represents the third terminal
  • the second identity identifier uniquely represents the second terminal
  • the first application identifier uniquely represents the first application provided by the third terminal
  • the second application identifier uniquely represents the second terminal. Therefore, it can be judged whether the second terminal and the third terminal are the same terminal by comparing whether the second identification and the first identification are the same, and by comparing whether the second application identification and the first application identification are the same, Determining whether the second application and the first application are the same application helps the first terminal to filter repeatedly received messages from the same device indicating the same application service, effectively saving the consumption of computing resources of the terminal.
  • the matching between the second application identifier and the first application identifier is Refers to: the identifier of the second application is the same as the identifier of the first application.
  • the second terminal and the third terminal are the same terminal, if the identifier of the second application is the same as the identifier of the first application, it means that the second terminal and the third terminal also provide the same application.
  • the first terminal can directly filter the first message, which effectively saves the consumption of computing resources of the terminal and improves the efficiency of message processing.
  • the second application identifier is the same as the second application's identifier.
  • the matching of the first application identification means that the mapping value of the identification of the second application is the same as the mapping value of the identification of the first application.
  • the mapping value of the identifier of the second application is the same as the mapping value of the identifier of the first application, it means that the second terminal and the third terminal are the same.
  • the same application service is also provided.
  • the first terminal can directly filter the first message, which effectively saves the consumption of computing resources of the terminal and improves the efficiency of message processing.
  • the first application identifier includes an identifier of the first application and a mapping value of the identifier of the first application
  • the second application identifier includes an identifier of the second application and an identifier of the second application.
  • the mapping value of the identification the matching of the second application identification with the first application identification means that the identification of the second application is the same as the identification of the first application, and the mapping value of the identification of the second application is the same as that of the identification of the first application.
  • the mapped values are the same.
  • the second terminal and the third terminal are the same terminal, if the identifier of the second application is the same as the identifier of the first application, and the mapping value of the identifier of the second application is the same as that of the first application. If the mapping values of the identifiers are the same, it means that the second terminal and the third terminal also provide the same application service. In this case, the first terminal can directly filter the first message, which effectively saves the consumption of computing resources of the terminal and improves the Message processing efficiency.
  • the first message further includes an identification area, where the identification area is used to indicate the service scope of the second application supported by the second terminal, and the method further includes: adding the second identity identifier and the first If the identity identifiers are not identical, or if the second application identifier does not match the first application identifier, the identification area is acquired; when the first terminal is not located in the identification area, the first terminal refuses to establish a second order with the second terminal broadcast connection.
  • the first message needs to be parsed to obtain the identification If the first terminal is not located in the identification area, it means that the first terminal is not currently in the service range of the second application supported by the second terminal, so the first message has nothing to do with the first terminal, and the first terminal can directly filter the first terminal. message, improving the efficiency of message processing.
  • the first terminal may further establish the above-mentioned second unicast connection with the second terminal in response to the first message, and store the mapping relationship between the second identity identifier and the second application identifier.
  • the first terminal responds to the first message, establishes a second unicast connection with the second terminal, and stores the mapping relationship between the second identity identifier based on the second unicast connection and the second application identifier , thereby realizing the rapid establishment of the unicast connection and improving the efficiency of the unicast interaction.
  • the first terminal after the first terminal establishes the second unicast connection with the second terminal, if the first terminal is no longer located in the identification area, the first terminal deletes the stored The mapping relationship between the second identity identifier and the second application identifier.
  • the first terminal needs to delete the second unicast connection corresponding to the second unicast connection.
  • the mapping relationship between the identity identifier and the second application identifier can prevent the received first message from being erroneously filtered out when the first terminal is located within the service range of the second application again.
  • mapping relationship between the first identity identifier and the first application identifier is stored in mapping information.
  • the mapping information is stored in the network layer or the message layer of the first terminal.
  • mapping information when the mapping information is stored in the network layer of the first terminal, the mapping information is established and maintained by the network layer through cross-layer primitives, and the first message is filtered based on the network layer, effectively avoiding the upper layer in the first terminal. consumption of resources.
  • mapping information is stored in the message layer of the first terminal, the mapping information is directly established and maintained by the message layer, without using cross-layer primitives, and the operation is simple.
  • the second identity identifier is the second source layer identifier of the first message
  • the identifier of the second application is the application identifier of the first message
  • the mapping value of the identifier of the second application is the first A target layer 2 identifier for a message.
  • the second identity identifier may be the field of the source layer 2 identifier of the first message
  • the identifier of the second application may be the field of the application identifier of the first message
  • the mapping value of the identifier of the second application may be the first The message's target layer two identifies this field.
  • the first message is a unicast service announcement, and the first message is carried by a dedicated service announcement DSA.
  • the second terminal is a roadside unit RSU or an on-board unit OBU.
  • the unicast interaction efficiency between the first terminal and the roadside unit RSU can be improved, or the unicast interaction efficiency between the first terminal and the vehicle-mounted unit OBU can be improved.
  • an embodiment of the present application provides an apparatus for message filtering, the apparatus establishes a first unicast connection with a third terminal, and the apparatus stores a first identity identifier and a first unicast connection based on the first unicast connection.
  • a mapping relationship of application identifiers wherein the first identity identifier is the unique identifier of the third terminal, and the first application identifier is the identifier of the application service provided by the third terminal, and the apparatus includes: a receiving unit for receiving the broadcasted by the second terminal.
  • the processing unit It is used to refuse to establish a second unicast connection with the second terminal when the second identification is the same as the first identification and the second application identification matches the first application identification.
  • the first identification is the media access control MAC address of the third terminal
  • the second identification is the MAC address of the second terminal
  • the first application identification includes at least one of the identification of the first application or a mapping value of the identification of the first application
  • the second application identifier includes at least one of an identifier of the second application or a mapping value of the identifier of the second application.
  • the matching between the second application identifier and the first application identifier is Refers to: the identifier of the second application is the same as the identifier of the first application.
  • the second application identifier is the same as the mapping value of the first application's identifier and the second application identifier is the mapping value of the second application's identifier
  • the second application identifier is the same as the mapping value of the first application.
  • the first application identifier includes an identifier of the first application and a mapping value of the identifier of the first application
  • the second application identifier includes an identifier of the second application and an identifier of the second application.
  • the mapping value of the identification the matching of the second application identification with the first application identification means that the identification of the second application is the same as the identification of the first application, and the mapping value of the identification of the second application is the same as that of the identification of the first application.
  • the mapped values are the same.
  • the first message further includes an identification area, where the identification area is used to indicate the service scope of the second application supported by the second terminal, and the processing unit is further configured to: If the first identity identifiers are not the same, or if the second application identifier does not match the first application identifier, the identification area is acquired; when the device is not located in the identification area, the establishment of the second unicast connection with the second terminal is refused.
  • the processing unit is further configured to: in the case that the second identity identifier and the first identity identifier are different, or that the second application identifier and the first application identifier do not match, and When the device is located in the identification area, in response to the first message, a second unicast connection is established, and the mapping relationship between the second identity identifier and the second application identifier is stored.
  • the processing unit is further configured to: after the second unicast connection is established, in the case that the device is no longer located in the identification area, delete the stored second identification and The mapping relationship of the second application identifier.
  • mapping relationship between the first identity identifier and the first application identifier is stored in the mapping information.
  • mapping information is stored in the network layer or the message layer of the device.
  • the second identity identifier is the second source layer identifier of the first message
  • the identifier of the second application is the application identifier of the first message
  • the mapping value of the identifier of the second application is the first A target layer 2 identifier for a message.
  • the first message is a unicast service announcement, and the first message is carried by a dedicated service announcement DSA.
  • the second terminal is a roadside unit RSU or an on-board unit OBU.
  • embodiments of the present application provide an apparatus for message filtering, the apparatus includes a processor and a memory, the memory stores computer program instructions, and the processor executes the computer program instructions to cause the apparatus to perform the first aspect Or the method in any possible implementation manner of the first aspect.
  • an embodiment of the present application provides a computer-readable storage medium, where the computer-readable medium stores program code for execution by an apparatus, and the program code includes any method for executing the first aspect or the first aspect. Instructions for a method in a possible implementation.
  • an embodiment of the present application provides a computer program product that, when the computer program product runs on a processor, enables the apparatus for message filtering to execute the first aspect or any possibility of the first aspect the method in the examples.
  • the computer program product may be a software installation package, and if the method provided by any of the possible designs of the first aspect needs to be used, the computer program product may be downloaded and executed on the device to The method in the first aspect or any possible embodiment of the first aspect is implemented.
  • Figure 1 is an architecture diagram of a communication system of the Internet of Vehicles
  • Fig. 2 is a schematic diagram of a protocol stack of the Internet of Vehicles
  • Figure 3 is a schematic diagram of an application scenario
  • 5A is a schematic diagram of a protocol stack of an OBU provided by an embodiment of the present application.
  • 5B is a schematic diagram of a protocol stack of another OBU provided by an embodiment of the present application.
  • FIG. 6 is a flowchart of another message filtering method provided by an embodiment of the present application.
  • FIG. 7 is a schematic diagram of an application scenario provided by an embodiment of the present application.
  • FIG. 9 is a schematic diagram of another application scenario provided by an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a computing device provided by this embodiment of the present application.
  • FIG. 11 is a schematic functional structural diagram of a computing device provided by this embodiment of the present application.
  • FIG. 1 is an architecture diagram of a communication system of the Internet of Vehicles, wherein the communication system at least includes a plurality of terminals, and any two of the plurality of terminals can communicate with each other in a wireless manner.
  • the terminals in this application may include but are not limited to On Board Units (OBUs), RSUs, mobile phones, tablet computers or computers with wireless transceiver functions, smart gas stations, smart signal lights, and the like.
  • Messages can be transmitted between terminals through different types of communication interfaces, for example, PC5 port and/or Uu port.
  • terminal 1 and terminal 2 may be taken as an example, terminal 1 may be an OBU, terminal 2 may be an RSU, and terminal 1 and terminal 2 may communicate with each other in a wireless manner.
  • the RSU periodically broadcasts the first message, and the first message carries the application identifier.
  • the OBU After receiving the first message, if the OBU needs to establish a unicast connection corresponding to the first message with the RSU, in response to the first message, the OBU establishes its own Unicast connection between RSUs.
  • the multiple terminals further include terminal 3, terminal 1 may be OBU1, terminal 3 may be OBU2, and terminal 2 may be RSU.
  • the RSU periodically broadcasts the first message. If both OBU1 and OBU2 are within the broadcast communication range of the RSU, both OBU1 and OBU2 can receive the first message, and can determine whether to establish a relationship with the RSU according to their own service requirements. If the unicast connection corresponding to the first message does not need to establish a unicast connection with the RSU, the subsequently received first message is filtered out, wherein the so-called filtering of the first message refers to discarding or ignoring the first message.
  • not responding to the first message is essentially refusing to repeatedly establish the unicast connection corresponding to the first message with the sender of the first message.
  • the first message may be a unicast service advertisement, and the first message may be carried by a dedicated service advertisement (Dedicated Service Advertisement, DSA).
  • DSA Dedicated Service Advertisement
  • the terminal 3 may also broadcast the first message.
  • terminal 2 is an RSU
  • terminal 1 is OBU1
  • terminal 3 is OBU2.
  • OBU2 periodically broadcasts the first message
  • both OBU1 and RSU receive the first message
  • RSU filters the first message after judging according to the field (for example, the application identifier) in the first message
  • OBU1 according to The field (for example, the application identifier) in the first message is determined to establish a unicast connection corresponding to the first message with the OBU2.
  • the system also includes a wireless network device, a wired network, and a server.
  • the terminal can communicate with the server through a wired network or a wireless network device.
  • the terminal can receive the first message broadcast by the server, and the terminal can determine whether to filter the first message or In response to the first message, a unicast connection corresponding to the first message is established with the server.
  • the wireless network equipment may be 2G, 3G, 4G, 5G or network equipment in future communication systems, including multiple cellular towers (only one is shown) and any other networking required to connect the wireless network equipment with the wired network part.
  • the wired network may be a conventional wired communication network that connects wireless network devices and terminals (eg, RSUs) to the server.
  • wireless network devices and terminals eg, RSUs
  • One or more portions of a wired network can be implemented using standard wired networks, fiber optic or other optical networks, cable networks, power lines, and any combination thereof.
  • the server can be a service center computer, a V2X application server, an Internet of Things (IoT) application server, a public safety business application server, and a drone server (such as a drone supervision enabling server or a drone application business server) Or a V2X Application Enabler (V2X Application Enabler, VAE) server, etc., which are not specifically limited in this application.
  • a service center computer a V2X application server, an Internet of Things (IoT) application server, a public safety business application server, and a drone server (such as a drone supervision enabling server or a drone application business server) Or a V2X Application Enabler (V2X Application Enabler, VAE) server, etc., which are not specifically limited in this application.
  • the communication system shown in FIG. 1 may be a 3rd Generation Partnership Project (3GPP) communication system, for example, a Long Term Evolution (Long Term Evolution, LTE) system, or a fifth generation A (5th Generation, 5G) mobile communication system or a New Radio (New Radio, NR) system may also be a non-3GPP communication system, which is not specifically limited in this application.
  • 3GPP 3rd Generation Partnership Project
  • LTE Long Term Evolution
  • 5G Fifth Generation
  • NR New Radio
  • FIG. 1 is only an exemplary architecture diagram, but does not limit the number of network elements included in the communication system shown in FIG. 1 .
  • the network shown in FIG. 1 may also include other functional entities.
  • the methods provided in the embodiments of the present application may be applied to the communication system shown in FIG. 1 .
  • the methods provided in the embodiments of the present application may also be applied to other communication systems, which are not limited in the embodiments of the present application.
  • a terminal may establish a protocol stack as shown in FIG. 2 , and interactions between terminals or between a terminal and a network side device may be based on the protocol stack shown in FIG. 2 .
  • FIG. 2 provides a schematic diagram of a protocol stack of the Internet of Vehicles.
  • the protocol stack includes application layer, network layer and access layer.
  • the application layer is mainly used to process the application layer business logic of the application service, such as generating instant messages, unicast service announcements, and so on.
  • the application layer includes a user application and a message layer.
  • the message layer is located inside the application layer.
  • the message layer connects to the data sub-layer downward and supports specific user applications upward.
  • the message layer can support the transmission of various types of data defined by the network layer of the LTE-based vehicle networking wireless communication technology.
  • the interaction between the message layer and the data sublayer inside the network layer is realized through cross-layer primitives (also called operation primitives or service primitives).
  • the network layer includes a management sublayer and a data sublayer.
  • the management sublayer is used to provide functions such as system configuration and maintenance for the terminal.
  • the management sublayer can be a dedicated management entity (Dedicated Management Entity, DME), and DME is all data sublayers. Layer entities provide management interfaces.
  • the data sublayer includes an adaptation layer, a DSMP layer, etc., wherein the DSMP layer is used for data interaction with different applications, and the adaptation layer is used to provide the transmission adaptation function between the bottom access layer and the upper layer protocol stack, for example, Distinguish the underlying interface used by the data packets to be sent (for example, DSMP data packets, IP data packets, etc.) and transmit the corresponding data packets to the corresponding interface of the access layer for transmission, etc.
  • DME Dedicated Management Entity
  • Layer entities provide management interfaces.
  • the data sublayer includes an adaptation layer, a DSMP layer, etc., wherein the DSMP layer is used for data interaction with different applications, and
  • the function of the adaptation layer also includes establishing application identifiers Mapping with the target layer 2 identity, generation/change/maintenance of the source layer 2 identity, etc.
  • the data sublayer not only transmits the data flow between the application layers, but also transmits the data flow between the management layer entities of different devices or between the management layer entities and the application.
  • the access layer supports a cellular communication interface (for example, a Uu port) and/or a direct connection communication interface (for example, a PC5 port), wherein the PC5 port and the Uu port can support different radio access technologies (Radio Access Technology, RAT),
  • RAT Radio Access Technology
  • the RAT may include LTE technology or NR technology.
  • the unicast service announcement broadcast by the roadside unit RSU can be filtered on the OBU side.
  • the network layer based on LTE V2X only supports filtering of unicast service announcements based on Application Identifier (AID).
  • the OBU receives the unicast service announcement from the RSU, since the dedicated short message protocol (Dedicated Short Message Protocol, DSMP) packet header of the network layer contains AID, and the AIDs corresponding to different applications are different, for example, emergency vehicles
  • the AID of the conventional basic safety message (Basic Safety Message, BSM) is 113
  • the AID of the static roadside traffic message (Road Side Information, RSI) is 3620, so the OBU can filter specific types of messages according to the AID.
  • BSM Basic Safety Message
  • RSI Road Side Information
  • RSU devices are generally deployed at the roadside, and the OBU may be in the broadcast range of multiple RSU devices that provide the same application service (eg, highway toll).
  • Figure 3 is a schematic diagram of an application scenario.
  • an RSU device is deployed on the upward road and the downward road respectively, that is, RSU1 is set on the upward road, and RSU2 is set on the downward road.
  • RSU1 and RSU2 respectively communicate with the OBU in a wireless manner.
  • RSU1 periodically broadcasts Msg1
  • RSU2 periodically broadcasts Msg2.
  • the application IDs of Msg1 and Msg2 are the same, so the AIDs of both Msg1 and Msg2 are the same, for example, both are 1. . Since the OBU is currently both within the communication range of RSU1 and within the communication range of RSU2, the OBU can receive Msg1 and Msg2.
  • the OBU receives the Msg1 broadcast by RSU1 and establishes a unicast connection with RSU1, and also receives the Msg2 sent by RSU2 and the Msg1 broadcast by RSU1 again.
  • the sent Msg1 but since the AID of Msg1 and the AID of Msg2 are the same, the Msg2 broadcast by RSU2 will also be directly filtered out, so that the OBU cannot establish a unicast connection with RSU2.
  • the OBU side only filters messages based on the AID, it may happen that the OBU cannot establish a unicast connection with other RSUs to be connected due to incorrect filtering. If the message is not filtered at all on the OBU side, the application layer of the OBU will continuously process the received unicast service announcements from each RSU, for example, message signature verification, decoding, etc., thus occupying a lot of computing resources. Reduced message processing efficiency.
  • the present application provides a message filtering method, which can effectively filter broadcast messages of the same type of applications sent by a terminal that has established a unicast connection with the OBU, saves the consumption of computing resources of the OBU, and improves the message processing efficiency of the OBU.
  • the present application proposes a message filtering method.
  • the application service-related fields in the first message are processed by the first terminal. (for example, at least one of the application identifier or the target layer 2 identifier) and the source layer 2 identifier in the first message to perform judgment and analysis, so that when the second terminal has established a unicast connection corresponding to the first message with the first terminal.
  • the following implements filtering of the message broadcast by the second terminal indicating that the same application service is provided.
  • FIG. 4 is a flowchart of a message filtering method provided by an embodiment of the present application. The method includes but is not limited to the following steps:
  • a first terminal receives a first message broadcast by a second terminal.
  • the second terminal periodically broadcasts a first message to the outside, where the first message includes a source layer 2 identifier, and the first message further includes at least one of an application identifier or a target layer 2 identifier.
  • the source layer 2 identifier can also be called an identity identifier, which is the unique identifier of the second terminal.
  • Both the application identifier and the target layer 2 identifier are related to the application service, and the target layer 2 identifier corresponds to the application identifier. Therefore, the application identifier and the target layer 2 identifier correspond to the application identifier.
  • Both the layer two identifiers can be used to represent the identifiers of the application services provided by the second terminal.
  • an application identifier (Application Identifier, AID) is used to distinguish different applications, in other words, AID can be used to distinguish different application layer services.
  • the source layer 2 identifier (Source Layer 2 ID) is the MAC address of the second terminal, and the source layer 2 identifier is used to indicate the sender of the first message, that is, the second terminal. Since the second terminal sends the first message in the form of broadcast, the destination layer 2 ID (Destination Layer 2 ID) in this application is the mapping value of the application ID, and the destination layer 2 ID corresponds to the application ID one-to-one.
  • the first message may be a unicast service announcement, and the first message is carried by the DSA.
  • the first terminal can be any one of OBU, RSU, mobile phone, computer with wireless transceiver function, intelligent gas station, etc.
  • the second terminal is a device that can communicate with the first terminal and has the ability to broadcast messages, and the second terminal Including but not limited to OBU, RSU, mobile phone, computer with wireless transceiver function, smart gas station, smart signal light, tablet, etc.
  • different terminals have different source layer 2 identifiers (or identifiers), that is, if two terminals have the same identifiers, it means that the two terminals are the same a terminal.
  • identity identifier as the MAC address
  • different terminals have different MAC addresses, and there is no MAC address conflict between different terminals. If there are two terminals with the same MAC address, it means that the two terminals are the same terminal.
  • the first terminal receives the first message broadcast by the second terminal, and it can be understood that the identity of the first terminal is different from the identity of the second terminal.
  • the first terminal filters the first message according to at least one of the application identifier or the target layer two identifier and the source layer two identifier.
  • the first terminal may combine three fields of the application identifier, the source layer 2 identifier and the target layer 2 identifier in the first message to determine whether to filter the first message. Specifically, the first terminal may judge whether the unicast connection corresponding to the first message has been established according to the combined fields, and filter the first message in the case that the unicast connection corresponding to the first message has been established.
  • there are three main combinations namely: application identification and source layer two identification, target layer two identification and source layer two identification, and application identification, source layer two identification and target layer two identification.
  • the so-called filtering of the first message by the first terminal means that the first terminal ignores or discards the first message, and does not need to perform parsing processing such as signature verification and decoding on the first message, and the first terminal refuses to establish the first message with the second terminal.
  • a unicast connection corresponding to a message thus greatly reduces the consumption of computing resources of the first terminal and improves the processing efficiency of the message.
  • the first terminal may also rely on mapping information, where the mapping information records the application identifier, the source layer 2 identifier, and the target layer 2 identifier corresponding to the unicast connection currently established by the first terminal. the mapping relationship between them.
  • the mapping information may be stored in the message layer of the first terminal, in other words, the mapping information is established and maintained by the message layer of the first terminal.
  • the mapping information may be stored in the network layer of the first terminal, in other words, the mapping information is established and maintained by the network layer of the first terminal.
  • the mapping information can be a mapping relationship table similar to that shown in Table 1.
  • two mapping relationships are recorded in Table 1, namely aid1-mac3-f(aid1) and aid3-mac4-f(aid3) , take aid1-mac3-f(aid1) as an example for illustration, where mac3 is assumed to be the MAC address of the third terminal of the sender of a message, aid1 is the identifier of the first application provided by the third terminal, f(aid1 ) represents the mapping value corresponding to the application identifier aid1 in the message, and f() is a mapping function.
  • the mapping relationship of aid1-mac3-f(aid1) exists in the mapping relationship table, which means that the first terminal has established a unicast connection based on the first application with the third terminal.
  • aid3-mac4-f(aid3) it is assumed that mac4 is the MAC address of the fourth terminal, aid3 is the identifier of the third application, and aid3 and aid1 are not equal, that is, the third application is different from the first application, mac4 It is not equal to mac3, that is, the fourth terminal is different from the third terminal, f(aid3) is the mapping value of the identifier of the third application, and there is a mapping relationship of aid3-mac4-f(aid3) in the mapping relationship table, which means that the first A terminal has established a unicast connection based on the third application with the fourth terminal.
  • the first combination mode whether to filter the first message is determined according to the application identifier and the second source layer identifier.
  • the first terminal determines whether there is a first mapping relationship between the application identifier in the first message and the source layer 2 identifier in the mapping information, and if there is a first mapping relationship in the mapping information, it is determined that the first terminal has established a relationship with the second terminal
  • the first message is filtered when it is determined that the unicast connection corresponding to the first message has been established. If the first mapping relationship does not exist in the mapping information, it means that the first terminal has not established the unicast connection corresponding to the first message with the second terminal.
  • a message the first terminal establishes a unicast connection corresponding to the first message with the second terminal.
  • the second combination mode whether to filter the first message is determined according to the target layer 2 identifier and the source layer 2 identifier.
  • the first terminal may establish a unicast connection corresponding to the first message with the second terminal.
  • the third combination mode determining whether to filter the first message according to the application identifier, the target layer 2 identifier and the source layer 2 identifier.
  • the first terminal may establish a unicast connection corresponding to the first message with the second terminal.
  • the so-called responding to the first message means that the first terminal sends its own MAC address to the second terminal to enable the first terminal to establish a unicast connection corresponding to the first message with the second terminal, and the first terminal applies the first message to the second terminal.
  • the mapping relationship among the identifier, the source layer two identifier and the target two identifier is added to the mapping information. It should be noted that after the first terminal and the second terminal establish a unicast connection corresponding to the first message, the first terminal and the second terminal can perform unicast interaction based on the unicast connection, so as to perform a business transaction corresponding to the application identifier. , for example, payment business, vehicle identification, safety reminder business, etc.
  • aid1-mac3 it is different from the mapping relationship of aid1-mac3 in Table 1.
  • aid2 and aid3 are different (indicating that the second application is different from the third application), or, mac2 and aid3 are different.
  • mac4 is different (indicating that the second terminal is different from the fourth terminal)
  • This mapping relationship means that the first terminal does not establish a unicast connection based on the second application with the second terminal, in other words, the first terminal does not establish a unicast connection corresponding to the first message with the second terminal.
  • aid2-mac2 corresponding to the first message and the mapping relationships corresponding to all established unicast connections in Table 1, for aid2-mac2 and aid3-mac4 in Table 1, if aid2 It is different from aid3 (indicating that the second application is different from the third application), or, mac2 is different from mac4 (indicating that the second terminal is different from the fourth terminal), then the mapping relationship of aid2-mac2 is the same as that of aid3- in Table 1.
  • the mapping relationship of mac4 is different; but for aid2-mac2 and aid1-mac3 in Table 1, if aid2 and aid1 are the same (indicating that the second application and the first application are the same application) and mac2 and mac3 are the same (indicating that the second terminal is the same as the first application)
  • the third terminal is the same terminal
  • aid2-mac2 is the same as the mapping relationship of aid1-mac3 in Table 1. Therefore, it can be determined that aid2-mac2 already exists in Table 1, which means that the first terminal
  • the unicast connection corresponding to the first message has been established with the second terminal before. In this case, the first terminal can filter the first message. Unicast connection.
  • the core idea of filtering the first message by the first terminal is summarized as follows: Before the first terminal receives the first message broadcast by the second terminal, the first terminal establishes a first unicast connection with the third terminal , and the first terminal stores the mapping relationship between the first identity identifier and the first application identifier corresponding to the first unicast connection.
  • the mapping relationship between the first identity identifier and the first application identifier is stored in the Mapping information, where the mapping information is located at the network layer or the message layer of the first terminal.
  • the first identity identifier is the unique identifier of the third terminal, for example, the MAC address of the third terminal, the first application identifier is the identifier of the application service provided by the third terminal, and the first application identifier includes the identifier of the first application and the identifier of the first application.
  • One or more of the mapped values of an application's identity is the unique identifier of the third terminal, for example, the MAC address of the third terminal
  • the first application identifier is the identifier of the application service provided by the third terminal
  • the first application identifier includes the identifier of the first application and the identifier of the first application.
  • One or more of the mapped values of an application's identity is the unique identifier of the third terminal, for example, the MAC address of the third terminal
  • the first application identifier is the identifier of the application service provided by the third terminal
  • the first application identifier includes the identifier of the first application and the identifier of the first application.
  • the first terminal receives the first message broadcast by the second terminal, where the first message includes a second identity identifier and a second application identifier, where the second identity identifier is a unique identifier of the second terminal, for example, the MAC address of the second terminal,
  • the second application identifier is an identifier of an application service provided by the second terminal, and the second application identifier includes one or more of an identifier of the second application and a mapping value of the identifier of the second application.
  • the identity of the first terminal is different from the first identity (the identity of the third terminal), and the identity of the first terminal is different from the second identity (the identity of the second terminal).
  • the second identification is the same as the first identification and the second application identification matches the first application identification
  • the second terminal and the third terminal are the same terminal (because the second identification and the first identification are same)
  • the application service provided by the second terminal is the same as the application service provided by the third terminal (because the second application identifier is the same as the first application identifier)
  • the first terminal can filter the first message, which shows that the first terminal refuses to establish a second unicast connection with the second terminal.
  • the so-called match between the second application identifier and the first application identifier includes the following three situations:
  • the first one when the second application identifier is the identifier of the second application and the identifier of the first application is the identifier of the first application, the so-called match between the identifier of the second application and the identifier of the first application means that the identifier of the second application matches the identifier of the first application.
  • the identity of the application is the same.
  • mapping information There is a first mapping relationship between the application identifier in the first message and the second source layer identifier, wherein the second identifier is the source layer two identifier in the above, and the identifier of the second application is the application identifier in the above.
  • the second type when the second application identification is the mapping value of the identification of the second application and the first application identification is the mapping value of the identification of the first application, the so-called matching between the second application identification and the first application identification means: the second application identification
  • the mapping value of the identification of the application is the same as the mapping value of the identification of the first application.
  • mapping information There is a second mapping relationship between the target layer two identifier and the source layer two identifier in the first message, wherein the second identifier is the source layer two identifier in the above, and the mapping value of the identifier of the second application is the above The target layer two identifier in .
  • the third type when the second application identifier includes the second application identifier and the mapping value of the second application identifier and the first application identifier includes the first application identifier and the mapping value of the first application identifier, the so-called second application Matching the identifier with the identifier of the first application means that the identifier of the second application is the same as the identifier of the first application and the mapping value of the identifier of the second application is the same as the mapping value of the identifier of the first application.
  • mapping information There is a third mapping relationship between the application identifier in the first message, the target layer two identifier and the source layer two identifier, wherein the second identifier is the source layer two identifier in the above, and the identifier of the second application is is the application identifier in the above, and the mapping value of the identifier of the second application is the target layer 2 identifier in the above.
  • mapping information may be established and maintained by the network layer or the message layer of the first terminal.
  • the network layer or the message layer please refer to the relevant description in FIG. 2 above, which will not be repeated here. Therefore, the first There are also two ways for the terminal to add the mapping relationship among the application identifier in the first message, the source layer two identifier and the target two identifier in the mapping information:
  • the mapping information of the network layer is established by the application layer of the first terminal instructing the network layer through cross-layer primitives (or called operation primitives, service primitives, etc.).
  • cross-layer primitives or called operation primitives, service primitives, etc.
  • the first terminal receives the first message for the first time (so the first message will not be filtered out)
  • the first message carries AID, Source Layer 2 ID and Destination Layer 2 ID
  • the first terminal determines that the The terminal establishes a unicast connection corresponding to the AID
  • the application layer of the first terminal can instruct the DME of the network layer to add the AID, Source Layer 2 ID and Destination Layer 2 ID in the first message to the mapping information of the network layer through the cross-layer primitive
  • the grammatical format of its cross-layer primitive is as follows:
  • DME-UserService.request (LocalApplicationIndex, Action, UserRequestType, Other Information).
  • UserService indicates that the first terminal serves as a user receiving the service
  • LocalApplicationIndex indicates the serial number i
  • Action indicates an action. Since the above action is Add, Action is set to Add.
  • UserRequestType indicates the user request type, set to Address Mapping, and Other Information is set to (AID, Source Layer 2 ID, Destination Layer 2 ID), so the network layer adds AID, Source Layer 2 ID and Destination Layer in the first message to the mapping information 2
  • the cross-layer primitive of the mapping relationship between the three IDs can be:
  • DME-UserService.request (i, Add, Address Mapping, (AID, Source Layer 2 ID, Destination Layer 2 ID)).
  • the Action in the corresponding cross-layer primitive can be set to Delete, in this case , the cross-layer primitives are as follows:
  • DME-UserService.request (i, Delete, Address Mapping, (AID, Source Layer 2 ID, Destination Layer 2 ID)).
  • DME-ProviderService.request (LocalApplicationIndex, Action, UserRequestType, Other Information).
  • the ProviderService indicates that the first terminal acts as a provider of the service, and parameters such as LocalApplicationIndex, Action, UserRequestType, and Other Information can refer to the above description, and are not repeated here.
  • the network layer of the first terminal can set the Action to Add or Delete according to actual needs. Take the setting of Add as an example. If the first terminal is the service provider, when the network layer of the first terminal needs to be in the When the mapping relationship between AID, Source Layer 2 ID and Destination Layer 2 ID in the first message is added to the mapping information, the corresponding cross-layer primitive is:
  • DME-ProviderService.request (i, Delete, Address Mapping, (AID, Source Layer 2 ID, Destination Layer 2 ID)).
  • the network layer of the first terminal can filter the first message based on any one of the above three combination methods and the mapping information, which effectively avoids the need for upper-layer resources in the first terminal. consume.
  • FIG. 5A is a schematic diagram of a protocol stack of a first terminal provided by an embodiment of the present application.
  • the mapping information is stored in the network layer by the first terminal, that is, the above Table 1 is located in the network layer , when the first terminal needs to add a certain mapping relationship to the mapping information or delete a certain mapping relationship from the mapping information, the network layer of the first terminal can use the above-mentioned cross-layer primitive to perform corresponding mapping information maintained in the network layer. deal with.
  • Mode B When the mapping information is stored in the message layer, the mapping information is established by the message layer. For example, when the first terminal receives the first message for the first time (so the first message will not be filtered out), the first message carries the AID, Source Layer 2 ID and Destination Layer 2 ID, and the first terminal decides to match the The two terminals establish a unicast connection corresponding to the AID, then the first terminal can directly add the mapping relationship between the AID, the Source Layer 2 ID and the Destination Layer 2 ID in the first message to the mapping information in the message layer. In some possible embodiments, when the first terminal needs to delete the mapping relationship corresponding to the first message, the message layer of the first terminal can directly perform corresponding processing on the mapping information stored in the message layer.
  • FIG. 5B is a schematic diagram of a protocol stack of a first terminal provided by an embodiment of the present application.
  • the mapping information is stored in the message layer by the first terminal, that is, the above Table 1 is located in the message layer , when the first terminal needs to add a certain mapping relationship to the mapping information or delete a certain mapping relationship from the mapping information, the message layer of the first terminal can directly perform related operations on the mapping information maintained in the message layer.
  • the first mapping relationship does not exist in the mapping information or the second mapping relationship or mapping does not exist in the mapping information
  • There is no third mapping relationship in the information which means that the first terminal has not established a unicast connection corresponding to the first message with the second terminal.
  • the first message also includes an identification area, and the first terminal can also combine identification The area further determines whether to filter the first message.
  • the first terminal when the first terminal is located outside the identification area, it means that the first message has nothing to do with the first terminal, and the first terminal filters the first message; when the first terminal is located in the identification area, because the unicast corresponding to the first message If the connection is not established, in response to the first message, the first terminal and the second terminal establish a unicast connection corresponding to the first message, and add the mapping relationship corresponding to the first message to the mapping information of the application layer or the network layer.
  • the first terminal parses the first message to obtain an identification area in the first message, and the identification area is used to indicate the second terminal
  • the service range of the application corresponding to the application identifier in the supported first message that is, the application corresponding to the application identifier is only valid in the identification area
  • the identification area may be an identification radius, area range coordinates, or the like.
  • the first terminal when the identification area is an area range coordinate, the first terminal obtains its own location information, and determines whether its own location information belongs to the area range coordinate.
  • a terminal is located outside the identification area, so the first terminal directly filters the first message; if the location information of the first terminal belongs to the area range coordinates, it means that the first terminal is located in the identification area, and in response to the first message, the first terminal communicates with the first terminal.
  • the two terminals establish a unicast connection corresponding to the first message.
  • the first terminal when the identification area is the identification radius, the first terminal needs to obtain the position information of the second terminal in addition to its own position information, wherein the position information of the second terminal may be included in the first message. , may also be included in other messages broadcast by the second terminal, and the location information of the second terminal may also be sent by other terminals that know the location information of the second terminal, which is not specifically limited in this application. Calculate the distance between the first terminal and the second terminal according to the position information of the first terminal and the position information of the second terminal.
  • the first terminal When the distance is greater than or equal to the identification radius, it means that the first terminal is located outside the identification area, so the first terminal The first message is directly filtered; when the distance is less than the identification radius, it means that the first terminal is located in the identification area, so in response to the first message, the first terminal and the second terminal establish a unicast connection corresponding to the first message.
  • the first terminal may also add the mapping relationship among the application identifier, the source layer two identifier and the identification area in the first message to the interaction area information.
  • the interaction area information is stored in the message layer (see FIG. 5A or FIG. 5B ), and the interaction area information is used to record the mapping relationship between the application identifier, the source layer two identifier and the identification area corresponding to the unicast connection established by the first terminal .
  • the interactive area information can be a mapping relationship table similar to that shown in Table 2.
  • Table 2 two mapping relationships are recorded in Table 2, namely aid1-mac3-area1 and aid3-mac4-area2, with aid1-mac3 -area1 is taken as an example to illustrate, this mapping relationship indicates that the first terminal has established a unicast connection based on the application identifier aid1 with the terminal whose source layer 2 identifier is mac3, and the identification area corresponding to the application identifier aid1 is area1.
  • the interaction area information shown in Table 2 is located in the message layer.
  • the first terminal after the unicast connection corresponding to the first message is established, if the current location of the first terminal is no longer within the identification area of the first message, the first terminal needs to delete the first terminal from the mapping information A mapping relationship corresponding to a message. In this way, if the first terminal receives the first message when it is located in the identification area corresponding to the application identifier again, since there is no mapping relationship corresponding to the first message in the mapping information, the first terminal The unicast connection corresponding to the first message can be established with the second terminal to perform related services (for example, payment of fees for highway sections).
  • the application layer may also delete the mapping relationship corresponding to the first message from the interaction area information, which is not specifically limited in this application.
  • the service scope of the first application supported by the third terminal is area1.
  • the first terminal When the first terminal is no longer located in area1, the first terminal will delete aid1-mac3-f(aid1) from the mapping information (for example, the above Table 1). This mapping relationship, and the first terminal will delete the mapping relationship aid1-mac3-area1 from the interactive area information (for example, the above Table 2).
  • the first terminal and the second terminal have established a unicast connection based on a high-speed near-field payment application, assuming that the first terminal is an OBU, and the OBU has completed the payment service on the high-speed road section where it is located based on the unicast connection.
  • the OBU can directly filter the information according to the mapping information.
  • the OBU when the OBU drives out of the identification area of the high-speed near-field payment application, the OBU needs to delete the mapping relationship corresponding to the unicast connection from the mapping information, so that when the OBU re-enters the identification area of the high-speed near-field payment application, When receiving the message corresponding to the high-speed near-field payment application broadcasted by the second terminal, the OBU will not filter the message by mistake.
  • mapping information may be located at the message layer or the network layer, and the interaction area information may be located at the message layer.
  • the mapping information and the interaction area information may also be merged into a table, which is used to represent the unicast information established by the first terminal Connect the mapping relationship among the corresponding application identifier, the source layer 2 identifier, the target layer 2 identifier and the identification area.
  • the first terminal when the first terminal receives the first message periodically broadcast by the second terminal, according to the application-related fields in the first message (for example, the application identifier and the target layer 2 identifier at least one) and the identifier of the sender in the first message (that is, the source layer two identifier) to judge and analyze, and filter the second terminal when the first terminal has established a unicast connection corresponding to the first message with the second terminal.
  • Broadcasting the first message indicating the same application improves the accuracy of message filtering, reduces the consumption of computing resources by the first terminal due to parsing the message, and improves message processing efficiency.
  • the first terminal may take the OBU as an example
  • the second terminal may take the RSU as an example to illustrate the solution
  • the present application does not limit
  • the first terminal is only OBU
  • the second terminal is only RSU.
  • the embodiment in FIG. 6 may be independent of the embodiment in FIG. 4 , or may be a supplement to the embodiment in FIG. 4 .
  • the method includes but is not limited to the following steps:
  • the OBU receives the first message broadcast by the RSU.
  • the OBU is called an on-board unit, which is an on-board device that uses LTE-V2X or NR-V2X technology to communicate with the RSU.
  • the OBU is usually installed on the vehicle, for example, on the windshield.
  • RSU is mainly used in vehicle-road communication, and is the key equipment for realizing smart road and vehicle-road system.
  • the RSU consists of an antenna (RSU antenna) and a radio frequency controller (RSU controller).
  • RSU is usually set on the roadside, and it can also be connected to road sensing monitoring equipment (such as signal lights, cameras, microwave radar, etc.) to collect road information and road traffic information, and conduct two-way communication and interactive data with nearby passing vehicles.
  • the first message includes an application identifier, a source layer two identifier and a target layer two identifier, wherein the application identifier is used to distinguish different applications, the source layer two identifier is the MAC address of the RSU, and the target layer two identifier is the mapping value corresponding to the application identifier.
  • the application layer or network layer of the OBU determines whether the unicast connection corresponding to the first message has been established according to at least one of the application identifier or the target layer two identifier and the source layer two identifier.
  • the unicast connection corresponding to the first message refers to the communication connection between the OBU and the RSU based on the application identifier.
  • mapping information can be established and maintained by the application layer or the network layer.
  • the OBU determines whether there is a mapping relationship corresponding to the first message in the mapping information based on any one of the above three combinations. For example, if the three fields included in the first message are (aid1, mac3, f(aid1)), it can be determined that there is a mapping relationship of aid1-mac3-f(aid1) in the mapping information (see Table 1 above), It means that the unicast connection corresponding to the first message has been established, and S203 is executed; if the three fields corresponding to the first message are (aid2, mac3, f(aid2)), it can be determined that aid2-mac3-f does not exist in the mapping information (aid2) this mapping relationship, of course, the mapping relationship of aid2-mac3 does not exist in the mapping information or the mapping relationship of mac3-f(aid2) does not exist in the mapping information, it means that the unicast corresponding to the first message If the connection is not established, S204 is executed.
  • mapping information of the network layer can be established through the cross-layer primitive DME-UserService.request() or DME-ProviderService.request().
  • DME-UserService.request() DME-ProviderService.request().
  • the OBU filters the first message.
  • the OBU filters the first message, in other words, the OBU refuses to establish the unicast connection corresponding to the first message with the RSU.
  • the OBU parses the first message to obtain an identification area.
  • the OBU further parses the first message to obtain an identification area, where the identification area is the service range corresponding to the application identifier in the first message supported by the RSU.
  • the identification area is the service range corresponding to the application identifier in the first message supported by the RSU.
  • the application identifier in the first message broadcast by the RSU is used to indicate that the application type is highway toll payment, and the first message also includes an identification area.
  • the identification area represents the current toll collection. section.
  • the OBU judges whether it is within the identification area.
  • the OBU can determine whether it is within the identification area according to its own position information, and when it is determined that it is located in the identification area, S206 is performed; when it is determined that it is not located in the identification area, S203 is performed.
  • the method for determining whether the OBU is located in the identification area may refer to the relevant description in S102, which will not be repeated here.
  • the OBU judges according to the two fields of the source layer 2 identifier and the application identifier in the first message and the mapping information, and concludes that it has not established a unicast connection corresponding to the first message with the RSU.
  • the OBU parses the first message to obtain the current toll road section, and judges whether its current position is within the toll road section. If it is within the toll road section, it will execute S206; Execute S203.
  • the OBU and the RSU establish a unicast connection corresponding to the first message, and add the mapping relationship corresponding to the first message to the mapping information.
  • the OBU in response to the first message, the OBU sends its own MAC address to the RSU to establish a unicast connection corresponding to the first message with the RSU, and the OBU sends the application identifier, the source layer two identifier and the target layer two identifier in the first message
  • the mapping relationship among the three is added to the mapping information, and at the same time, the OBU may also add the mapping information among the application identifier, the source layer 2 identifier and the identification area in the first message to the interaction area information.
  • mapping information can be stored in the network layer or the message layer
  • the interaction area information is stored in the application layer
  • the interaction area information stores the application identifier, source layer two identifier and identification area three corresponding to the unicast connection established by the OBU. the mapping relationship between them.
  • the first message includes (aid1, mac2, f(aid1), area1), where aid1 is the identifier of the first application, mac2 is the source layer 2 identifier of the RSU, and f(aid1) is the target layer 2 of the RSU identifier, area1 is an identification area, and area1 is obtained by parsing the first message.
  • the OBU determines based on the mapping information that it has not established a unicast connection with the RSU based on the application identifier aid1, and its own location is located in area1, the OBU sends its own MAC address to the RSU to establish the unicast connection corresponding to the first message, and Add aid1-mac2-f(aid1) to the mapping information, and add aid1-mac2-area1 to the interaction area information.
  • the OBU deletes the mapping relationship corresponding to the first message from the mapping information of the application layer or the network layer.
  • the vehicle where the OBU is located continues to drive, and the location of the vehicle will change.
  • the location of the OBU is the same as the location of the vehicle where the OBU is located.
  • the OBU deletes the mapping relationship corresponding to the unicast connection from the mapping information of the application layer or the network layer.
  • the OBU can determine in real time whether it is in the identification area in the first message, and the OBU can also determine whether it is in the first message at regular intervals. In the identification area, when it is determined that the OBU is no longer located in the identification area, the OBU deletes the mapping relationship corresponding to the unicast connection from the mapping information.
  • mapping information in S206 is consistent with the storage location of the mapping information in S207, that is, if the mapping information in S206 is located at the network layer, then in S207, the network layer of the OBU deletes the corresponding first message from the mapping information.
  • mapping information if the mapping information in S206 is located in the message layer, in S207 the message layer of the OBU deletes the mapping information corresponding to the first message from the mapping information.
  • FIG. 7 is a schematic diagram of a high-speed charging scenario. It is assumed that after the OBU receives the first message broadcast by the RSU for the first time at position 1 in FIG. 7, the first message includes (aid1, mac2, f(aid1 ), area1), the OBU and the RSU establish a unicast connection corresponding to the first message, and add the mapping relationship of aid1-mac2-f(aid1) corresponding to the first message into the mapping information, and add the corresponding aid1-mac2-area1 is added to the interaction area information, and the OBU completes the unicast interaction with the RSU at position 1 (completes a fee payment).
  • the OBU completes the unicast interaction with the RSU at position 1 (completes a fee payment).
  • the OBU determines that it has established a unicast connection corresponding to the first message with the RSU based on the mapping information, so the OBU will directly filter the first message received at position 2.
  • message which means that the OBU has completed a service payment at position 1 in the identification area area1, so when the OBU is still in the identification area area1, the OBU does not need to pay again in response to the first message rebroadcasted by the RSU.
  • the OBU deletes the mapping relationship of aid1-mac3-f(aid1) corresponding to the first message from the mapping information, so that when the OBU again When entering area1, the first message broadcast by the RSU received by the OBU will not be erroneously filtered out.
  • the message filtering method provided by the embodiment of the present application is applied to the scenario shown in FIG. 3 .
  • the OBU is located within the communication range of RSU1 and within the communication range of RSU2, and the OBU can receive the Msg1 broadcast by RSU1.
  • Msg2 broadcast by RSU1, where Msg1 includes (aid1, mac1, f(aid1), area1), and Msg2 includes (aid1, mac2, f(aid1), area2), if OBU receives Msg1 and Msg2 for the first time , OBU has judged that there is no mapping relationship corresponding to Msg1 in the mapping information, and there is no mapping relationship corresponding to Msg2 in the mapping information, so the OBU has not established a unicast connection corresponding to Msg1 with RSU1, nor has it established with RSU2 corresponding to Msg2 The OBU further determines that it is currently located in the identification area area1 corresponding to Msg1 and is also located in the identification area area2 corresponding to Msg2.
  • area1 is located within the communication range of RSU1, and area1 is located within the communication range of RSU2, although
  • the application identifiers of Msg1 and Msg2 are the same (both aid1, assuming that aid1 represents the vehicle near-field payment service), but the message filtering method provided by this application is applied. In the above case, Msg1 and Msg2 will not be filtered.
  • responding to Msg1, OBU and RSU1 establish a unicast connection corresponding to Msg1, and add the mapping relationship aid1-mac1-f(aid1) to the mapping information.
  • OBU and RSU2 establish a unicast connection corresponding to Msg2, and send The mapping relationship of aid1-mac2-f(aid1) is added to the mapping information.
  • the OBU may also add two mapping relationships of aid1-mac1-area1 and aid1-mac2-area2 to the interactive area information. If the OBU receives the Msg1 broadcast by RSU1 again in the area1 area, the OBU judges that the mapping relationship of aid1-mac1-f(aid1) corresponding to Msg1 already exists in the mapping information, and the OBU directly filters the received Msg1 this time.
  • Msg2' includes (aid2, mac2, f(aid2), area2), assuming that aid2 represents the vehicle identification service, OBU judges that there is no aid2 in the mapping information -Any one of the mapping relationships of mac2-f(aid2), aid2-mac2, and mac2-f(aid2), so the OBU responds to Msg2', and the OBU establishes a unicast connection corresponding to Msg2' with RSU2.
  • the OBU determines whether the unicast connection corresponding to the first message has been established based on the mapping information of the application layer or the network layer. In the case of being established, the OBU filters the first message, thereby realizing the filtering of broadcast messages broadcast by the same RSU and indicating the same application, which greatly reduces the consumption of computing resources of the OBU. In addition, the OBU can also determine whether to refuse to establish a unicast connection corresponding to the first message with the RSU in combination with the mapping information and the identification area obtained after parsing the first message, which improves the accuracy of message filtering and the efficiency of message processing.
  • the message filtering provided by the present application may also be used for filtering broadcast messages between OBUs, for example, the first terminal may be OBU1, and the second terminal may be OBU2.
  • FIG. 8 exemplarily provides a flowchart of a message filtering method.
  • the embodiment of FIG. 8 may be independent of the embodiments of FIG. 4 and FIG. 6, or may be a supplement to the embodiments of FIG. 4 and FIG.
  • the method includes but is not limited to the following steps:
  • the OBU1 receives the first message broadcast by the OBU2.
  • the first message broadcast by OBU2 includes an application identifier, a source layer 2 identifier and a target layer 2 identifier, wherein the application identifier is used to indicate the type of application, different applications have different application identifiers, and the source layer two identifier is the MAC of OBU2 Address, since the first message is sent in the form of broadcast, the target layer 2 identifier is the mapping value of the application identifier, and the target layer 2 identifier corresponds to the application representation.
  • the application layer or network layer of the OBU1 determines whether the unicast connection corresponding to the first message has been established according to at least one of the application identifier or the target layer two identifier and the source layer two identifier.
  • the mapping information records the mapping relationship among the application identifier corresponding to the unicast connection established by the OBU1, the source layer 2 identifier and the target layer 2 identifier.
  • the mapping information can be established by the application layer or the network layer, but when the mapping information is established by the network layer, the application layer uses the cross-layer primitive to instruct the network layer to establish.
  • the OBU judges whether the unicast connection corresponding to the first message has been established according to the mapping information means: judging whether there is a mapping relationship corresponding to the first message in the mapping information, that is, the first mapping relationship between the application identifier and the source layer 2 identifier, or , the second mapping relationship between the target layer two identifier and the source layer two identifier, or the third mapping relationship between the application identifier, the source layer two identifier and the target layer two identifier, there is a first message in the mapping information
  • S303 is executed; when there is no mapping relationship corresponding to the first message in the mapping information, it is determined that the unicast connection corresponding to the first message has not been established, Execute S304.
  • S304 For a specific determination method, reference may be made to the relevant description in S102, which is not repeated here.
  • the OBU1 filters the first message.
  • the OBU1 parses the first message to obtain the identification area.
  • the identification area is the service scope corresponding to the application identifier in the first message supported by the OBU2.
  • the identification area is the area of the adjacent lane corresponding to the OBU2.
  • the OBU1 determines whether it is within the identification area.
  • OBU1 judges whether it is in the identification area in combination with its own position information. When OBU1 is located in the identification area, it is explained that the first message is related to OBU1, and S306 is executed; when OBU1 is not located in the area, then the first message is explained. Regardless of the OBU1, S303 is executed.
  • OBU1 and OBU2 establish a unicast connection corresponding to the first message, and add the mapping relationship corresponding to the first message to the mapping information.
  • mapping relationship corresponding to the first message in the mapping information and OBU1 is located in the identification area
  • OBU1 and OBU2 in response to the first message, establish a unicast connection corresponding to the first message, and add a unicast connection corresponding to the first message. Mapping relationship to mapping information.
  • OBU1 and OBU2 may perform unicast interaction based on the unicast connection, that is, perform corresponding services based on the unicast connection. For example, if the unicast connection corresponds to When the application type of the unicast connection is vehicle identification, the corresponding service is to obtain the identity of the vehicle; if the application identifier corresponding to the unicast connection indicates a lane change, the corresponding service is to obtain the lane change information of the corresponding vehicle.
  • the OBU1 deletes the mapping relationship corresponding to the first message from the mapping information of the application layer or the network layer.
  • OBU1 deletes the mapping relationship corresponding to the first message from the mapping information of the application layer or network layer .
  • FIG. 9 is a schematic diagram of an application scenario. It is assumed that OBU1, OBU2, and OBU3 are driving in the same direction on the highway, and OBU3, OBU1, and OBU2 occupy a lane from left to right, and the lane where OBU1 is located. is the middle lane, the lane where OBU3 is located and the lane where OBU2 is located are adjacent to the lane where OBU1 is located. Assuming that OBU2 wants to change lanes to the left and enter the lane where OBU1 is located, then OBU2 broadcasts a first message to notify the surrounding vehicles that they are about to change lanes.
  • the first message includes (aid2, mac2, f(aid2)), where, aid2 is the application identifier corresponding to the lane change, mac2 is the MAC address of OBU2, and f(aid2) is the mapping value of the application identifier. Since both OBU1 and OBU3 are within the communication range of OBU2, both OBU1 and OBU3 can receive the broadcasted information from OBU2. First news.
  • OBU3 For OBU3, it is assumed that after OBU3 receives the first message, OBU3 judges that there is no mapping relationship of f(aid2)-mac2 (the second combination method in S102 above) in the mapping information, so OBU3 determines that it is not related to OBU2 establishes a unicast connection corresponding to the first message, and further, OBU3 parses the first message to obtain an identification area area2 (the oval area shown in FIG. 9 ) in the first message, and OBU3 judges that it is not currently If it is located in area2, it means that the first message received by OBU3 has nothing to do with OBU3, then OBU3 can directly filter the first message.
  • an identification area area2 the oval area shown in FIG. 9
  • OBU1 determines that the mapping relationship of aid2-mac2 (the first method in the above S102) does not exist in the Hu mapping information, so OBU1 determines that it does not correspond to the first message established with OBU2
  • the unicast connection further, OBU1 parses the first message to obtain the identification area area2 (the oval area shown in Figure 9) in the first message, and OBU1 is judged to be currently located in area2, that is, it is explained that OBU1
  • the received first message is related to OBU1, and OBU1 will respond to the first message by sending its own MAC address to OBU2 to establish a unicast connection corresponding to the first message with OBU2, and send the aid2-mac2-f(aid2)
  • the mapping relationship is added to the mapping information.
  • OBU1 may perform unicast interaction with OBU2 based on the established unicast connection. For example, OBU1 may obtain information such as the time and speed of OBU2's lane change from OBU2. OBU1 continues to drive, and when OBU1 is still located in area2, if OBU1 receives the first message broadcast by OBU2 again, OBU1 can directly filter the first message received this time by judging by the above method. When OBU1 is no longer located in area2, OBU1 can delete the mapping relationship of aid2-mac2-f(aid2) from the mapping information.
  • the OBU in the interaction between the OBU and the OBU, can accurately filter the repeated transmission of the target OBU indicating the same application service when a unicast connection corresponding to a certain broadcast message has been established with the target OBU.
  • the broadcast message greatly reduces the computing resources consumed by the OBU due to message parsing, and improves the message processing efficiency.
  • FIG. 10 is a schematic structural diagram of a computing device provided by an embodiment of the present application.
  • the computing device 30 includes at least a processor 110 , a memory 111 , and a receiver 112 .
  • computing device 30 also includes transmitter 113 .
  • the receiver 112 and the transmitter 113 can also be replaced by communication interfaces for providing information input and/or output for the processor 110 .
  • the memory 111, the receiver 112, and the transmitter 113 may be connected or coupled to the processor 110 through a bus, respectively.
  • the computing device 30 may be the first terminal in the embodiment of FIG. 4 , or the OBU in the embodiment of FIG. 6 , or the OBU1 in the embodiment of FIG. 8 .
  • the receiver 112 is used to receive the first message broadcast from the vehicle-mounted unit/roadside unit or the like.
  • the transmitter 113 is configured to send the MAC address of the computing device 30 to the vehicle-mounted unit/roadside unit.
  • Receiver 112 and transmitter 113 may include antennas and chipsets for communicating directly or over the air interface with devices, sensors or RSUs or other physical devices in the vehicle.
  • Transmitter 113 and transceiver 112 constitute a communication module that may be configured to receive and transmit messages according to one or more other types of wireless communications (eg, protocols), such as Bluetooth, IEEE 802.11 communication protocols, Cellular technology, Worldwide Interoperability for Microwave Access (WiMAX) or LTE (Long Term Evolution, Long Term Evolution), ZigBee protocol, Dedicated Short Range Communications (DSRC) and RFID (Radio Frequency Identification, radio frequency) identification) communication, etc.
  • protocols eg, protocols
  • Bluetooth Bluetooth
  • WiMAX Worldwide Interoperability for Microwave Access
  • LTE Long Term Evolution, Long Term Evolution
  • ZigBee protocol Long Term Evolution, Long Term Evolution
  • DSRC Dedicated Short Range Communications
  • RFID Radio Frequency Identification, radio frequency
  • the processor 110 may be composed of one or more general-purpose processors, such as a central processing unit (Central Processing Unit, CPU), or a combination of a CPU and a hardware chip.
  • the above-mentioned hardware chip may be an application-specific integrated circuit (Application-Specific Integrated Circuit, ASIC), a programmable logic device (Programmable Logic Device, PLD) or a combination thereof.
  • the above-mentioned PLD can be a complex programmable logic device (Complex Programmable Logic Device, CPLD), a field programmable gate array (Field-Programmable Gate Array, FPGA), a general array logic (Generic Array Logic, GAL) or any combination thereof.
  • CPLD Complex Programmable Logic Device
  • FPGA Field-Programmable Gate Array
  • GAL General array logic
  • the memory 111 may include a volatile memory (Volatile Memory), such as a random access memory (Random Access Memory, RAM); the memory 111 may also include a non-volatile memory (Non-Volatile Memory), such as a read-only memory (Read- Only Memory (ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid-state drive (Solid-State Drive, SSD); the memory 111 may also include a combination of the above types.
  • the memory 111 can store programs and data, wherein the stored programs include: update mapping information programs, update interactive area information programs, etc., and the stored data include: mapping information (i.e. application identification-source layer two identification-target layer two identification three). The mapping relationship between the two), the interaction area information (ie, the mapping relationship between the application identifier-source layer two identifier-identification area), and so on.
  • the memory 111 may exist alone, or may be integrated inside the processor 110 .
  • FIG. 10 is only an example of a computing device 30, and the computing device 30 may include more or less components than those shown in FIG. 10, or have different component configurations. Meanwhile, various components shown in FIG. 10 may be implemented in hardware, software, or a combination of hardware and software.
  • the computing device 30 is configured to implement the method described in FIG. 4 , the OBU-side method described in the embodiment of FIG. 6 , and the OBU1-side method described in the embodiment of FIG. 8 .
  • FIG. 11 is a schematic functional structure diagram of a computing device provided by an embodiment of the present application.
  • the computing device 41 includes a receiving unit 410 and a processing unit 411 .
  • the computing device 41 further includes a sending unit 412 .
  • the computing device 41 may be implemented by hardware, software or a combination of software and hardware.
  • the computing device 41 establishes a first unicast connection with the third terminal, the computing device 41 stores the mapping relationship between the first identity identifier and the first application identifier based on the first unicast connection, and the first identity identifier is the third terminal
  • the unique identifier of the first application identifier is the identifier of the application service provided by the third terminal.
  • the receiving unit 410 is configured to receive the first message broadcast by the second terminal, where the first message includes a second identity identifier and a second application identifier, and the second identity identifies the unique identifier of the second terminal, and the second application identifier provides the second terminal with a unique identifier.
  • the identification of the application service is configured to refuse to establish a second unicast connection with the second terminal when the second identification is the same as the first identification, and the second application identification matches the first application identification .
  • the sending unit 412 is configured to, in response to the first message, send the identity of the computing device 41 to the second terminal to establish the above-mentioned second unicast connection.
  • Each functional module of the computing device 41 can be used to implement the method described in the embodiment of FIG. 4 .
  • the receiving unit 410 may be configured to execute S101
  • the processing unit 411 may be configured to execute S102.
  • the functional modules of the computing device 41 can also be used to implement the method on the OBU side described in the embodiment of FIG. 6 and the method on the OBU1 side described in the embodiment of FIG. 8 , which are not repeated here for brevity of the description.
  • the storage medium includes read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), programmable read-only memory (Programmable Read-only Memory, PROM), erasable programmable read-only memory ( Erasable Programmable Read Only Memory, EPROM), One-time Programmable Read-Only Memory (OTPROM), Electronically-Erasable Programmable Read-Only Memory (EEPROM), Compact Disc Read-Only Memory (CD-ROM) or other optical disk storage, magnetic disk storage, tape storage, or any other computer-readable medium that can be used to carry or store data.
  • Read-Only Memory Read-Only Memory
  • RAM Random Access Memory
  • PROM Programmable Read-only Memory
  • PROM Programmable Read-only Memory
  • EPROM Erasable Programmable Read Only Memory
  • OTPROM One-time Programmable Read-Only Memory
  • EEPROM Electronically-Erasable Programmable Read-Only Memory
  • CD-ROM Compact Disc Read-Only Memory
  • the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art, or all or part of the technical solution.
  • the computer software product is stored in a storage medium, including a number of instructions for So that a device (which may be a personal computer, a server, or a network device, a robot, a single-chip microcomputer, a chip, a robot, etc.) executes all or part of the steps of the methods described in the various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种消息过滤方法及装置,该方法包括:第一终端与第三终端建立了第一单播连接,并存储该连接对应的第一身份标识与第一应用标识的映射关系,其中,第一身份标识为第三终端的唯一标识,第一应用标识为第三终端提供的应用服务的标识。第一终端接收第二终端广播的第一消息,第一消息包括第二身份标识和第二应用标识,其中,第二身份标识为第二终端的唯一标识,第二应用标识为第二终端提供的应用服务的标识;在第二身份标识与第一身份标识相同,并且,第二应用标识与第一应用标识匹配的情况下,第一终端拒绝与第二终端建立第二单播连接。实施本申请,通过过滤重复的消息有效节省了终端的计算资源的消耗,提高了消息处理效率。

Description

一种消息过滤方法及装置
本申请要求于2020年12月26日提交到中国专利局、申请号202011570800.9、申请名为“一种消息过滤方法及装置”的中国专利的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及车联网领域,尤其涉及一种消息过滤方法及装置。
背景技术
随着汽车保有量的持续增长,道路承载容量也逐渐饱和,导致交通堵塞、交通事故等问题日益突出,基于车联网(Internet of Vehicle,IOV)技术,可实现车与X(人、车、路、云端等)智能信息交换、共享,使得车辆能及时获取道路交通信息、安全预警信息等,能有效缓解交通堵塞、避免交通事故的发生,在一定程度上降低了交通安全风险。
在智能车联网的发展中,基于长期演进(Long Term Evolution,LTE)的V2X(Vehicle to Everything)的单播业务需求逐渐凸显,例如,汽车近场支付、车辆身份识别等。不妨以V2I(Vehicle to Infrastructure)的单播建立过程为例:路侧单元(Road Side Unit,RSU)周期性地向外广播一条单播业务公告(例如,业务建立邀请),以通知周边车辆,周边车辆接收到单播业务公告后需对其进行验签等解析操作,根据实际业务需要与RSU建立基于单播业务公告的单播连接。
由于单播业务公告是周期性发送的,故已与RSU建立单播连接后的车辆仍会重复接收并解析RSU广播的单播业务公告,大大消耗了车辆的计算资源,降低了消息处理效率。
发明内容
本申请实施例公开了一种消息过滤方法和装置,能够实现终端对重复接收到的来自同一设备发送的指示同一应用服务的消息的过滤,有效节省了终端的计算资源的消耗,提高了消息处理效率。
第一方面,本申请实施例提供了一种消息过滤方法,应用于第一终端,第一终端与第三终端建立了第一单播连接,第一终端基于第一单播连接存储了第一身份标识与第一应用标识的映射关系,其中,第一身份标识为第三终端的唯一标识,第一应用标识为第三终端提供的应用服务的标识,该方法包括:接收第二终端广播的第一消息,第一消息包括第二身份标识和第二应用标识,其中,第二身份标识为第二终端的唯一标识,第二应用标识为第二终端提供的应用服务的标识;在第二身份标识与第一身份标识相同,并且,第二应用标识与第一应用标识匹配的情况下,第一终端拒绝与第二终端建立第二单播连接。
上述方法中,通过在第一消息对应的第二身份标识和第二应用标识之间的映射关系与第一终端已建立的第一单播连接对应的第一身份标识和第一应用标识之间的映射关系相同时,第一终端丢弃第一消息,不与第二终端建立第二单播连接,由此实现终端对重复接收到的来自同一设备发送的指示同一应用服务的消息的过滤,有效节省了终端的计算资源的消耗,提高了消息处理效率。
在第一方面的一种可能的实现方式中,第一身份标识为第三终端的媒体访问控制MAC 地址,第二身份标识为第二终端的MAC地址,第一应用标识包括第一应用的标识或第一应用的标识的映射值中的至少一个,第二应用标识包括第二应用的标识或第二应用的标识的映射值中的至少一个。
实施上述实现方式,第一身份标识唯一表示第三终端,第二身份标识唯一表示第二终端,第一应用标识唯一表示第三终端提供的第一应用,第二应用标识唯一表示第二终端提供的第二应用,因此,可以通过比较第二身份标识和第一身份标识是否相同以判断第二终端与第三终端是否为同一个终端,通过比较第二应用标识和第一应用标识是否相同以判断第二应用和第一应用是否为同一个应用,有助于实现第一终端对重复接收到的来自同一设备发送的指示同一应用服务的消息的过滤,有效节省了终端的计算资源的消耗。
在第一方面的一种可能的实现方式中,在第一应用标识为第一应用的标识且第二应用标识为第二应用的标识的情况下,第二应用标识与第一应用标识匹配是指:第二应用的标识与第一应用的标识相同。
实施上述实现方式,在第二终端与第三终端为同一个终端的前提下,若第二应用的标识与第一应用的标识相同,则说明第二终端与第三终端还提供了相同的应用服务,在此情况下,第一终端可直接过滤第一消息,有效节省了终端的计算资源的消耗,提高了消息处理效率。
在第一方面的一种可能的实现方式中,在第一应用标识为第一应用的标识的映射值且第二应用标识为第二应用的标识的映射值的情况下,第二应用标识与第一应用标识匹配是指:第二应用的标识的映射值与第一应用的标识的映射值相同。
实施上述实现方式,在第二终端与第三终端为同一个终端的前提下,若第二应用的标识的映射值与第一应用的标识的映射值相同,则说明第二终端与第三终端还提供了相同的应用服务,在此情况下,第一终端可直接过滤第一消息,有效节省了终端的计算资源的消耗,提高了消息处理效率。
在第一方面的一种可能的实现方式中,在第一应用标识包括第一应用的标识和第一应用的标识的映射值,且第二应用标识包括第二应用的标识和第二应用的标识的映射值的情况下,第二应用标识与第一应用标识匹配是指:第二应用的标识与第一应用的标识相同,且第二应用的标识的映射值与第一应用的标识的映射值相同。
实施上述实现方式,在第二终端与第三终端为同一个终端的前提下,若第二应用的标识与第一应用的标识相同,且,第二应用的标识的映射值与第一应用的标识的映射值相同,则说明第二终端与第三终端还提供了相同的应用服务,在此情况下,第一终端可直接过滤第一消息,有效节省了终端的计算资源的消耗,提高了消息处理效率。
在第一方面的一种可能的实现方式中,第一消息还包括识别区域,识别区域用于指示第二终端支持的第二应用的服务范围,该方法还包括:在第二身份标识和第一身份标识不相同,或,第二应用标识和第一应用标识不匹配的情况下,获取识别区域;在第一终端不位于识别区域内时,第一终端拒绝与第二终端建立第二单播连接。
实施上述实现方式,在第二终端与第三终端不为同一个终端,或者,第二终端提供的第二应用与第三终端提供的第一应用不同时,需对第一消息进行解析获得识别区域,若第一终端不位于识别区域内,则说明第一终端当前不在第二终端支持的第二应用的服务范围内,故第一消息与第一终端无关,第一终端可直接过滤第一消息,提高了消息处理效率。
在第一方面的一种可能的实现方式中,在第二身份标识和第一身份标识不相同,或,第二应用标识和第一应用标识不匹配的情况下,且第一终端位于识别区域内时,第一终端还可以响应于第一消息,与第二终端建立上述第二单播连接,以及存储第二身份标识与第二应用 标识的映射关系。
实施上述实现方式,在第二终端与第三终端不为同一个终端,或者,第二终端提供的第二应用与第三终端提供的第一应用不同时,且第一终端位于第二终端支持的第二应用的服务范围内时,第一终端响应第一消息,与第二终端建立第二单播连接,并存储基于第二单播连接的第二身份标识与第二应用标识的映射关系,由此实现了单播连接的快速建立,提升了单播交互的效率。
在第一方面的一种可能的实现方式中,在第一终端与第二终端建立第二单播连接后,在第一终端不再位于识别区域内的情况下,第一终端删除已存储的第二身份标识与第二应用标识的映射关系。
实施上述实现方式,在第二单播连接建立完成后,若第一终端不再位于第二终端支持的第二应用的服务范围内时,第一终端需删除第二单播连接对应的第二身份标识与第二应用标识的映射关系,由此当第一终端再次重新位于第二应用的服务范围内时可以避免接收到的第一消息被错误过滤掉。
在第一方面的一种可能的实现方式中,第一身份标识与第一应用标识的映射关系存储于映射信息中。
在第一方面的一种可能的实现方式中,映射信息存储于第一终端的网络层或消息层。
实施上述实现方式,当映射信息存储于第一终端的网络层时,映射信息由网络层通过跨层原语建立及维护,基于网络层进行第一消息的过滤,有效避免了第一终端内上层资源的消耗。当映射信息存储于第一终端的消息层时,映射信息由消息层直接建立及维护,无需使用跨层原语,操作简便。
在第一方面的一种可能的实现方式中,第二身份标识为第一消息的源层二标识,第二应用的标识为第一消息的应用标识,第二应用的标识的映射值为第一消息的目标层二标识。
实施上述实现方式,第二身份标识可以为第一消息的源层二标识这个字段,第二应用的标识可以为第一消息的应用标识这个字段,第二应用的标识的映射值可以为第一消息的目标层二标识这个字段。
在第一方面的一种可能的实现方式中,第一消息为单播业务公告,第一消息由专用业务公告DSA承载。
在第一方面的一种可能的实现方式中,第二终端为路侧单元RSU或者车载单元OBU。
实施上述实现方式,可以提高第一终端与路侧单元RSU之间的单播交互效率,或者,提高第一终端与车载单元OBU之间的单播交互效率。
第二方面,本申请实施例提供了一种用于消息过滤的装置,该装置与第三终端建立了第一单播连接,该装置基于第一单播连接存储了第一身份标识与第一应用标识的映射关系,其中,第一身份标识为第三终端的唯一标识,第一应用标识为第三终端提供的应用服务的标识,该装置包括:接收单元,用于接收第二终端广播的第一消息,第一消息包括第二身份标识和第二应用标识,其中,第二身份标识为第二终端的唯一标识,第二应用标识为第二终端提供的应用服务的标识;处理单元,用于在第二身份标识与第一身份标识相同,并且,第二应用标识与第一应用标识匹配的情况下,拒绝与第二终端建立第二单播连接。
第一身份标识为第三终端的媒体访问控制MAC地址,第二身份标识为第二终端的MAC地址,第一应用标识包括第一应用的标识或第一应用的标识的映射值中的至少一个,第二应用标识包括第二应用的标识或第二应用的标识的映射值中的至少一个。
在第二方面的一种可能的实现方式中,在第一应用标识为第一应用的标识且第二应用标 识为第二应用的标识的情况下,第二应用标识与第一应用标识匹配是指:第二应用的标识与第一应用的标识相同。
在第二方面的一种可能的实现方式中,在第一应用标识为第一应用的标识的映射值且第二应用标识为第二应用的标识的映射值的情况下,第二应用标识与第一应用标识匹配是指:第二应用的标识的映射值与第一应用的标识的映射值相同。
在第二方面的一种可能的实现方式中,在第一应用标识包括第一应用的标识和第一应用的标识的映射值,且第二应用标识包括第二应用的标识和第二应用的标识的映射值的情况下,第二应用标识与第一应用标识匹配是指:第二应用的标识与第一应用的标识相同,且第二应用的标识的映射值与第一应用的标识的映射值相同。
在第二方面的一种可能的实现方式中,第一消息还包括识别区域,识别区域用于指示第二终端支持的第二应用的服务范围,处理单元还用于:在第二身份标识和第一身份标识不相同,或,第二应用标识和第一应用标识不匹配的情况下,获取识别区域;在该装置不位于识别区域内时,拒绝与第二终端建立第二单播连接。
在第二方面的一种可能的实现方式中,处理单元还用于:在第二身份标识和第一身份标识不相同,或,第二应用标识和第一应用标识不匹配的情况下,且该装置位于识别区域内时,响应于第一消息,建立第二单播连接,以及存储第二身份标识与第二应用标识的映射关系。
在第二方面的一种可能的实现方式中,处理单元还用于:在建立第二单播连接后,在该装置不再位于识别区域内的情况下,删除已存储的第二身份标识与第二应用标识的映射关系。
在第二方面的一种可能的实现方式中,第一身份标识与第一应用标识的映射关系存储于映射信息中。
在第二方面的一种可能的实现方式中,映射信息存储于该装置的网络层或消息层。
在第二方面的一种可能的实现方式中,第二身份标识为第一消息的源层二标识,第二应用的标识为第一消息的应用标识,第二应用的标识的映射值为第一消息的目标层二标识。
在第二方面的一种可能的实现方式中,第一消息为单播业务公告,第一消息由专用业务公告DSA承载。
在第二方面的一种可能的实现方式中,第二终端为路侧单元RSU或者车载单元OBU。
第三方面,本申请实施例提供了一种用于消息过滤的装置,该装置包括处理器和存储器,该存储器存储计算机程序指令,该处理器运行该计算机程序指令以使该装置执行第一方面或者第一方面的任一可能的实现方式中的方法。
第四方面,本申请实施例提供了一种计算机可读存储介质,所述计算机可读介质存储用于装置执行的程序代码,所述程序代码包括用于执行第一方面或者第一方面的任一可能的实现方式中的方法的指令。
第五方面,本申请实施例提供了一种计算机程序产品,当该计算机程序产品在处理器上运行时,使得所述用于消息过滤的装置执行前述第一方面或者第一方面的任一可能的实施例中的所述方法。该计算机程序产品可以为一个软件安装包,在需要使用前述第一方面的任一种可能的设计提供的方法的情况下,可以下载该计算机程序件产品并在装置上执行该计算机程序产品,以实现第一方面或者第一方面的任一可能的实施例中的所述方法。
附图说明
为了更清楚地说明本申请实施例技术方案,下面将对实施例描述中所需要使用的附图作 简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是一种车联网的通信系统的架构图;
图2是一种车联网的协议栈的示意图;
图3是一种应用场景示意图;
图4是本申请实施例提供的一种消息过滤方法的流程图;
图5A是本申请实施例提供的一种OBU的协议栈的示意图;
图5B是本申请实施例提供的又一种OBU的协议栈的示意图;
图6是本申请实施例提供的又一种消息过滤方法的流程图;
图7是本申请实施例提供的一种应用场景示意图;
图8是本申请实施例提供的又一种消息过滤方法的流程图;
图9是本申请实施例提供的又一种应用场景示意图;
图10是本申请本实施例提供的一种计算装置的结构示意图;
图11是本申请本实施例提供的一种计算装置的功能结构示意图。
具体实施方式
在本申请实施例中使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本申请。本申请实施例中的说明书和权利要求书中的术语“第一”、“第二”等是用于区别不同对象,而不是用于描述特定顺序。
下面将结合附图,对本申请中的技术方案进行描述。
参见图1,图1是一种车联网的通信系统的架构图,其中,该通信系统至少包括多个终端,多个终端中任意两个终端之间可以通过无线的方式进行通信。本申请中的终端可以包括但不限于车载单元(On Board Unit,OBU)、RSU、手机、平板电脑或带无线收发功能的电脑、智能加油站、智能信号灯等。终端与终端之间可以通过不同类型的通信接口传输消息,例如,PC5口和/或Uu口。
多个终端不妨以终端1和终端2为例,终端1可以是OBU,终端2可以是RSU,终端1和终端2之间可以通过无线的方式进行通信。RSU周期性地广播第一消息,第一消息中携带有应用标识,OBU接收到第一消息后,若需要与RSU建立第一消息对应的单播连接,则响应于第一消息,建立自身与RSU之间的单播连接。
一具体实施中,如图1所示,多个终端还包括终端3,终端1可以是OBU1,终端3可以是OBU2,终端2可以是RSU。在此情况下,RSU周期性地广播第一消息,若OBU1和OBU2均在RSU的广播通信范围内,则OBU1和OBU2均能接收到第一消息,并可以根据自身业务需求确定是否与RSU建立第一消息对应的单播连接,若不需要与RSU建立单播连接,则过滤掉后续接收到的第一消息,其中,所谓过滤第一消息是指丢弃或忽略第一消息。换句话说,即不响应第一消息,其实质为拒绝与第一消息的发送方重复建立第一消息对应的单播连接。需要说明的是,第一消息可以是单播业务公告,第一消息可以由专用业务公告(Dedicated Service Advertisement,DSA)承载。
一具体实施中,终端3也可以广播第一消息。例如,假设终端2为RSU,终端1为OBU1,终端3为OBU2。在此情况下,假设OBU2周期性地广播第一消息,OBU1和RSU均接收到第一消息,RSU根据第一消息中的字段(例如,应用标识)进行判断后过滤了第一消息,OBU1 根据第一消息中的字段(例如,应用标识)进行判断后确定与OBU2建立第一消息对应的单播连接。
在一些可能的实施例中,该系统还包括无线网络设备、有线网络和服务器。终端可以通过有线网络,或者,无线网络设备与服务器进行通信,例如,终端可以接收服务器广播的第一消息,终端可以根据第一消息中的字段(例如,应用标识)判断是过滤第一消息还是响应第一消息,即与服务器建立第一消息对应的单播连接。
其中,无线网络设备可以是2G、3G、4G、5G或者未来通信系统中的网络设备,包括多个蜂窝塔(仅示出一个)以及将无线网络设备与有线网络连接所要求的任何其它的联网部件。
有线网络可以是常规的有线通信网络,它将无线网络设和终端(例如,RSU)连接到服务器。有线网络的一个或多个部分能够通过使用标准的有线网络、光纤或者其它光学网络、电缆网络、电力线及其任何组合来实施。
服务器可以是服务中心计算机、V2X应用服务器、物联网(Internet of Thing,IoT)应用服务器、公共安全业务应用服务器、无人机服务器(例如无人机监管使能服务器或者无人机应用业务服务器)或V2X应用使能(V2X Application Enabler,VAE)服务器等,本申请不做具体限定。
需要说明的是,图1所示的通信系统可以为第三代合作伙伴计划(3rd Generation Partnership Project,3GPP)通信系统,例如,长期演进(Long Term Evolution,LTE)系统,又可以为第五代(5th Generation,5G)移动通信系统或者新空口(New Radio,NR)系统,也可以为非3GPP通信系统,本申请不做具体限定。
需要说明的是,图1仅是为示例性架构图,但不限定图1所示通信系统包括的网元的数量。虽然未示出,但除图1所示的网络功能实体外,图1所示网络还可以包括其他功能实体。另外,本申请实施例提供的方法可以应用于图1所示的通信系统,当然本申请实施例提供的方法也可以适用其他通信系统,本申请实施例对此不予限制。
具体地,终端可以建立如图2所示的协议栈,终端之间,或者终端与网络侧设备之间可以基于图2所示的协议栈进行交互。参见图2,图2提供了一种车联网的协议栈的示意图。
该协议栈包括应用层、网络层和接入层。其中,应用层主要用于处理应用服务的应用层业务逻辑,例如,生成即时消息、单播业务公告等。应用层包括用户应用和消息层,消息层位于应用层内部,消息层向下对接数据子层,向上支持具体的用户应用。消息层可支持基于LTE的车联网无线通信技术的网络层定义的各类数据的传输。消息层与网络层内部的数据子层之间的交互通过跨层原语(也可称为操作原语或服务原语)实现。
网络层包括管理子层和数据子层,其中,管理子层用于为终端提供系统配置及维护等功能,管理子层可以是专用管理实体(Dedicated Management Entity,DME),DME为所有的数据子层的实体提供管理接口。数据子层包括适配层、DSMP层等,其中,DSMP层用于与不同应用进行数据交互,适配层用于提供底层的接入层与上层协议栈之间的传输适配功能,例如,区分待发送的数据包(例如,DSMP数据包、IP数据包等)所使用的底层接口并将相应数据包传递至接入层的对应接口进行传输等,适配层的功能还包括建立应用标识与目标层二标识之间的映射,源层二标识的产生/改变/维持等。数据子层既传输应用层间的数据流,也传输不同设备管理层实体间或管理层实体与应用间的数据流。
接入层支持蜂窝通信接口(例如,Uu口)和/或直连通信接口(例如,PC5口),其中,PC5口、Uu口可以支持不同的无线接入技术(Radio Access Technology,RAT),例如,RAT可以包括LTE技术或者NR技术。
为了减少单播建立过程中OBU的计算资源的消耗,优化信息处理效率,可在OBU侧对路侧单元RSU播发的单播业务公告进行过滤。当前基于LTE V2X的网络层只支持基于应用标识(Application Identifier,AID)对单播业务公告进行过滤。具体地,OBU接收到来自RSU的单播业务公告后,由于网络层的专用短消息协议(Dedicated Short Message Protocol,DSMP)数据包头中包含AID,并且,不同应用对应的AID不同,例如,紧急车辆的常规基本安全消息(Basic Safety Message,BSM)的AID为113,静态的路侧交通消息(Road Side Information,RSI)的AID为3620,所以,OBU可实现根据AID对特定类型的消息进行过滤。
RSU设备一般部署在路边,OBU可能会处于提供了相同的应用服务(例如,高速公路收费)的多个RSU设备的广播范围内。例如,参加图3,图3是一种应用场景示意图,高速公路上,分别在上行道路和下行道路上在部署了一个RSU设备,即上行道路上设置了RSU1,下行道路上设置了RSU2,以实现与不同行驶方向上的OBU进行通信。RSU1、RSU2分别与OBU通过无线的方式进行通信。由图3可以看出,RSU1向外周期性地广播Msg1,RSU2向外周期性地广播Msg2,其中,Msg1和Msg2的应用标识相同,故Msg1和Msg2两者的AID相同,例如,均为1。由于OBU当前既位于RSU1的通信范围内又位于RSU2的通信范围内,因此,OBU可以接收到Msg1和Msg2。
假设OBU接收到RSU1广播的Msg1与RSU1建立了单播连接后,还接收到RSU2发送的Msg2以及RSU1再次广播发送的Msg1,若使用上述基于AID的方式进行消息的过滤,虽然可以滤掉RSU1再次发送的Msg1,但由于Msg1的AID和Msg2的AID相同,故还会直接过滤掉RSU2广播的Msg2,导致OBU无法与RSU2建立单播连接。
由此可以看出,若在OBU侧仅基于AID对消息进行过滤,可能会发生因错误过滤导致OBU无法与其他待连接的RSU建立单播连接。若在OBU端完全不对消息进行过滤,则导致OBU的应用层不断地对接收到的来自各RSU的单播业务公告进行处理,例如,消息验签、解码等,从而占用了大量的计算资源,降低了消息的处理效率。
本申请提供了一种消息过滤方法,能有效过滤与OBU已建立单播连接的终端发送的同类型应用的广播消息,节省了OBU的计算资源的消耗,提高了OBU对消息的处理效率。
基于上述存在的问题,本申请提出一种消息过滤方法,当第二终端周期性地广播第一消息时,在第一终端接收到第一消息后,根据第一消息中与应用服务相关的字段(例如,应用标识或目标层二标识中的至少一个)以及第一消息中的源层二标识进行判断分析,以在第二终端已与第一终端建立第一消息对应的单播连接的情况下实现对第二终端广播的指示提供相同应用服务的消息的过滤。参见图4,图4是本申请实施例提供的一种消息过滤方法流程图,该方法包括但不限于以下步骤:
S101、第一终端接收到第二终端广播的第一消息。
本申请实施例中,第二终端向外周期性地广播第一消息,第一消息包括源层二标识,第一消息还包括应用标识或目标层二标识中的至少一个。其中,源层二标识也可以称作身份标识,是第二终端的唯一标识,应用标识和目标层二标识均与应用服务相关,且目标层二标识与应用标识对应,因此,应用标识和目标层二标识均可用于表示第二终端提供的应用服务的标识。
一具体实施中,应用标识(Application Identifier,AID)用于区分不同的应用,换句话说,AID可用于区分不同的应用层业务。源层二标识(Source Layer 2 ID)为第二终端的MAC地 址,源层二标识用于表示第一消息的发送方,即第二终端。由于第二终端以广播的形式发送第一消息,故本申请中目标层二标识(Destination Layer 2 ID)为应用标识的映射值,目标层二标识与应用标识一一对应。
需要说明的是,第一消息可以是单播业务公告,第一消息由DSA承载。
第一终端可以是OBU、RSU、手机、带有无线收发功能的电脑、智能加油站等中的任意一种,第二终端为可以与第一终端通信且具有消息广播能力的设备,第二终端包括但不限于OBU、RSU、手机、带有无线收发功能的电脑、智能加油站、智能信号灯、平板等。
需要说明的是,在本申请实施例中,不同的终端具有不同的源层二标识(或身份标识),也就是说,若有两个终端的身份标识相同,则说明这两个终端为同一个终端。不妨以身份标识为MAC地址为例,不同的终端的MAC地址不同,不同的终端之间不存在MAC地址冲突。若有两个终端的MAC地址相同,则说明这两个终端为同一个终端。在S101中,第一终端接收到第二终端广播的第一消息,可以理解,第一终端的身份标识与第二终端的身份标识不同。
S102、第一终端根据应用标识或目标层二标识中的至少一个和源层二标识过滤第一消息。
本申请实施例中,第一终端接收到第一消息后,可以对第一消息中的应用标识、源层二标识和目标层二标识这三个字段进行组合以判断是否过滤第一消息。具体地,第一终端可以根据组合后的字段判断第一消息对应的单播连接是否已建立,在第一消息对应的单播连接已建立的情况下,过滤第一消息。其中,组合方式主要有三种,分别为:应用标识和源层二标识、目标层二标识和源层二标识、以及应用标识、源层二标识和目标层二标识。
需要说明的是,所谓第一终端过滤第一消息是指第一终端忽略或者丢弃第一消息,无需对第一消息进行验签、解码等解析处理,且第一终端拒绝与第二终端建立第一消息对应的单播连接,因而大大减少了第一终端的计算资源的消耗,提高了消息的处理效率。
第一终端在判断是否对第一消息进行过滤时,还可以依赖映射信息,映射信息记录了第一终端当前已建立的单播连接对应的应用标识、源层二标识和目标层二标识三者之间的映射关系。一具体实施中,映射信息可以存储于第一终端的消息层,换句话说,即映射信息由第一终端的消息层建立及维护。另一具体实施中,映射信息可以存储于第一终端的网络层,换句话说,即映射信息由第一终端的网络层建立及维护。
映射信息可以是类似于表1所示的映射关系表,如表1所示,表1中记录了两条映射关系,分别为aid1-mac3-f(aid1)和aid3-mac4-f(aid3),以aid1-mac3-f(aid1)为例进行说明,其中,假设mac3为某条消息的发送方第三终端的MAC地址,aid1为第三终端的提供的第一应用的标识,f(aid1)表示该条消息中应用标识aid1对应的映射值,f()为一种映射函数。映射关系表中存在aid1-mac3-f(aid1)这条映射关系,即说明第一终端已与第三终端建立了基于第一应用的单播连接。同理,在aid3-mac4-f(aid3)中,假设mac4为第四终端的MAC地址,aid3为第三应用的标识,且aid3与aid1不相等,即第三应用与第一应用不同,mac4与mac3不相等,即第四终端与第三终端不同,f(aid3)为第三应用的标识的映射值,映射关系表中存在aid3-mac4-f(aid3)这条映射关系,即说明第一终端已与第四终端建立了基于第三应用的单播连接。
表1
Figure PCTCN2021132866-appb-000001
Figure PCTCN2021132866-appb-000002
下面基于映射信息依次介绍上述三种组合方式对应的判别方式:
第一种组合方式:根据应用标识和源层二标识确定是否过滤第一消息。
具体地,判断映射信息中是否存在第一消息中的应用标识与源层二标识之间的第一映射关系,若映射信息中存在第一映射关系,则确定第一终端已与第二终端建立第一消息对应的单播连接,在确定第一消息对应的单播连接已建立的情况下,过滤第一消息。若映射信息中不存在第一映射关系,则说明第一终端未与第二终端建立第一消息对应的单播连接,在确定第一消息对应的单播连接未建立的情况下,响应于第一消息,第一终端与第二终端建立第一消息对应的单播连接。
第二种组合方式:根据目标层二标识和源层二标识确定是否过滤第一消息。
具体地,判断映射信息中是否存在第一消息中的目标层二标识与源层二标识之间的第二映射关系,若映射信息中存在第二映射关系,则确定第一终端已与第二终端建立第一消息对应的单播连接,在确定第一消息对应的单播连接已建立的情况下,过滤第一消息。若映射信息中不存在第二映射关系,则说明第一终端未与第二终端建立第一消息对应的单播连接,在确定第一消息对应的单播连接未建立的情况下,响应于第一消息,第一终端可以与第二终端建立第一消息对应的单播连接。
第三种组合方式:根据应用标识、目标层二标识和源层二标识确定是否过滤第一消息。
具体地,判断映射信息中是否存在第一消息中的应用标识、目标层二标识与源层二标识三者之间的第三映射关系,若映射信息中存在第三映射关系,则确定第一终端已与第二终端建立第一消息对应的单播连接,在确定第一消息对应的单播连接已建立的情况下,过滤第一消息。若映射信息中不存在第三映射关系,则说明第一终端未与第二终端建立第一消息对应的单播连接,在确定第一消息对应的单播连接未建立的情况下,响应于第一消息,第一终端可以与第二终端建立第一消息对应的单播连接。
所谓响应于第一消息是指:第一终端向第二终端发送自身的MAC地址以使第一终端与第二终端建立第一消息对应的单播连接,并且第一终端将第一消息中应用标识、源层二标识和目标二标识三者之间的映射关系添加至映射信息中。需要说明的是,第一终端与第二终端建立第一消息对应的单播连接后,第一终端可以与第二终端基于该单播连接进行单播交互,以以进行应用标识对应的业务交易,例如,支付业务、车辆身份识别、安全提醒业务等。
不妨以上述第一种组合方式为例,结合上述表1说明第一种组合方式的判断过程:若第一消息的应用标识为aid2,aid2为第二应用的标识,第一消息的源层二标识为mac2,mac2表示第二终端,将aid2-mac2与表1中已建立的所有单播连接对应的映射关系依次进行比较,例如,先比较第一消息对应的aid2-mac2与表1中的aid1-mac3比较,若aid2与aid1不相同(说明第二应用与第一应用不同),或者,mac2与mac3不同(说明第二终端与第三终端不同),则说明aid2-mac2这条映射关系与表1中的aid1-mac3这条映射关系不同,继续比较aid2-mac2与表1中的aid3-mac4,若aid2与aid3不相同(说明第二应用与第三应用不同),或者,mac2与mac4不同(说明第二终端与第四终端不同),则说明aid2-mac2这条映射关系与表1中的aid3-mac4这条映射关系不同,因此,可以确定,表1中不存在aid2-mac2这条映射关系,即第一终端未与第二终端建立基于第二应用的单播连接,换句话说,第一终端未与第二终端建立第一消息对应的单播连接。
又例如,在比较第一消息对应的aid2-mac2与表1中已建立的所有单播连接对应的映射关系依次进行比较的过程中,对于aid2-mac2与表1中的aid3-mac4,若aid2与aid3不相同(说明第二应用与第三应用不同),或者,mac2与mac4不同(说明第二终端与第四终端不同),则说明aid2-mac2这条映射关系与表1中的aid3-mac4这条映射关系不同;但对于aid2-mac2与表1中的aid1-mac3,若aid2与aid1相同(说明第二应用与第一应用为同一应用)且mac2与mac3相同(说明第二终端与第三终端为同一终端),则说明aid2-mac2这条映射关系与表1中的aid1-mac3这条映射关系相同,因此,可以确定,表1中已存在aid2-mac2,即说明第一终端之前已与第二中终端建立第一消息对应的单播连接,在此情况下,第一终端可过滤第一消息,换句话说,第一终端拒绝再次与第二终端建立第一消息对应的单播连接。
综上,对第一终端过滤第一消息的核心思想进行总结,具体如下:第一终端在接收到第二终端广播的第一消息之前,第一终端与第三终端建立了第一单播连接,且第一终端存储了第一单播连接对应的第一身份标识和第一应用标识的映射关系,在一些可能的实施例中,第一身份标识和第一应用标识的映射关系被存储至映射信息,该映射信息位于第一终端的网络层或消息层。其中,第一身份标识为第三终端的唯一标识,例如,第三终端的MAC地址,第一应用标识为第三终端提供的应用服务的标识,第一应用标识包括第一应用的标识和第一应用的标识的映射值中的一个或多个。第一终端接收第二终端广播的第一消息,第一消息包括第二身份标识和第二应用标识,其中,第二身份标识为第二终端的唯一标识,例如,第二终端的MAC地址,第二应用标识为第二终端提供的应用服务的标识,第二应用标识包括第二应用的标识和第二应用的标识的映射值中的一个或多个。其中,第一终端的身份标识与第一身份标识(第三终端的身份标识)不同,第一终端的身份标识与第二身份标识(第二终端的身份标识)不同。在第二身份标识与第一身份标识相同且第二应用标识与第一应用标识匹配的情况下,即说明第二终端与第三终端为同一个终端(因为第二身份标识与第一身份标识相同),且第二终端提供的应用服务与第三终端提供的应用服务相同(由于第二应用标识与第一应用标识相同),也就是说,第一消息对应的单播连接第一终端当前已经建立,故第一终端可以过滤第一消息,表现为,第一终端拒绝与第二终端建立第二单播连接。
其中,所谓第二应用标识与第一应用标识匹配包含下述三种情况:
第一种,在第二应用标识为第二应用的标识且第一应用标识为第一应用的标识时,所谓第二应用标识与第一应用标识匹配是指:第二应用的标识与第一应用的标识相同。在此情况下,结合第二终端的MAC地址与第三终端的MAC地址相同(即第二身份标识与第一身份标识相同),即等同于上述第一种组合方式的相关叙述:映射信息中存在第一消息中的应用标识与源层二标识之间的第一映射关系,其中,第二身份标识即为上述中的源层二标识,第二应用的标识即为上述中的应用标识。
第二种:在第二应用标识为第二应用的标识的映射值且第一应用标识为第一应用的标识的映射值时,所谓第二应用标识与第一应用标识匹配是指:第二应用的标识的映射值与第一应用的标识的映射值相同。在此情况下,结合第二终端的MAC地址与第三终端的MAC地址相同(即第二身份标识与第一身份标识相同),即等同于上述第二种组合方式的相关叙述:映射信息中存在第一消息中的目标层二标识与源层二标识之间的第二映射关系,其中,第二身份标识即为上述中的源层二标识,第二应用的标识的映射值即为上述中的目标层二标识。
第三种:在第二应用标识包括第二应用的标识和第二应用的标识的映射值且第一应用标识包括第一应用的标识和第一应用的标识的映射值时,所谓第二应用标识与第一应用标识匹配是指:第二应用的标识与第一应用的标识相同且第二应用的标识的映射值与第一应用的标 识的映射值相同。在此情况下,结合第二终端的MAC地址与第三终端的MAC地址相同(即第二身份标识与第一身份标识相同),即等同于上述第三种组合方式的相关叙述:映射信息中存在第一消息中的应用标识、目标层二标识与源层二标识三者之间的第三映射关系,其中,第二身份标识即为上述中的源层二标识,第二应用的标识即为上述中的应用标识,第二应用的标识的映射值即为上述中的目标层二标识。
需要说明的是,上述映射信息可由第一终端的网络层或消息层建立及维护,关于网络层或消息层的叙述可参考上述图2中的相关描述,在此不再赘述,因此,第一终端在映射信息中添加第一消息中的应用标识、源层二标识和目标二标识三者之间的映射关系的方式也有如下两种:
方式A:
当映射信息存储于网络层时,网络层的映射信息是第一终端的应用层通过跨层原语(或称作操作原语、服务原语等)指示网络层建立的。例如,假设第一终端第一次接收到第一消息(故第一消息不会被过滤掉),第一消息中携带有AID、Source Layer 2 ID和Destination Layer2 ID,第一终端确定与第二终端建立AID对应的单播连接,则第一终端的应用层可以通过跨层原语指示网络层的DME在网络层的映射信息中添加第一消息中AID、Source Layer 2 ID和Destination Layer 2 ID三者之间的映射关系。其一,在第一终端作为接受服务的用户方时,其跨层原语的语法格式如下:
DME-UserService.request(LocalApplicationIndex,Action,UserRequestType,Other Information)。
其中,UserService表示第一终端作为接受服务的用户方,LocalApplicationIndex表示序号i,Action表示动作,由于上述的动作为添加,故Action设置为Add。UserRequestType表示用户请求类型,设置为Address Mapping,Other Information设置为(AID,Source Layer 2 ID,Destination Layer 2 ID),故网络层在映射信息中添加第一消息中AID、Source Layer 2 ID和Destination Layer 2 ID三者之间的映射关系的跨层原语可以是:
DME-UserService.request(i,Add,Address Mapping,(AID,Source Layer 2 ID,Destination Layer 2 ID))。
在一些可能的实施例中,若需要从网络层的映射信息中删除第一消息中应用标识对应的映射关系时,其对应的跨层原语中的Action设置为Delete即可,在此情况下,跨层原语具体如下:
DME-UserService.request(i,Delete,Address Mapping,(AID,Source Layer 2 ID,Destination Layer 2 ID))。
其二,在第一终端作为服务的提供方时,其跨层原语的语法格式如下:
DME-ProviderService.request(LocalApplicationIndex,Action,UserRequestType,Other Information)。
其中,ProviderService表示第一终端作为服务的提供方,LocalApplicationIndex、Action、UserRequestType、Other Information等参数可参考上述描述,在此不再赘述。需要说明的是,第一终端的网络层可以根据实际需求将Action设置为Add或Delete,不妨以Add的设置为例,若第一终端作为服务的提供方,当第一终端的网络层需要在映射信息中添加第一消息中AID、Source Layer 2 ID和Destination Layer 2 ID三者之间的映射关系时,对应的跨层原语为:
DME-ProviderService.request(i,Delete,Address Mapping,(AID,Source Layer 2 ID, Destination Layer 2 ID))。
需要说明的是,若映射信息存储于网络层中,第一终端的网络层可以基于上述三种组合方式中的任意一种和映射信息过滤第一消息,有效避免了第一终端内上层资源的消耗。
参见图5A,图5A是本申请实施例提供的一种第一终端的协议栈的示意图,如图5A所示,映射信息由第一终端存储于网络层中,即上述表1位于网络层中,当第一终端需要添加某条映射关系至映射信息中或从映射信息中删除某条映射关系时,第一终端的网络层可通过上述跨层原语对网络层中维护的映射信息进行相应处理。
方式B:当映射信息存储于消息层时,映射信息由消息层建立。例如,当第一终端首次接收到第一消息时,(故第一消息不会被过滤掉),第一消息中携带有AID、Source Layer 2 ID和Destination Layer 2 ID,第一终端决定与第二终端建立AID对应的单播连接,则第一终端可以直接将第一消息中AID、Source Layer 2 ID和Destination Layer 2 ID三者之间的映射关系添加至消息层中的映射信息。在一些可能的实施例中,当第一终端需要删除第一消息对应的映射关系时,第一终端的消息层可以直接对存储于消息层中的映射信息进行相应处理。
参见图5B,图5B是本申请实施例提供的一种第一终端的协议栈的示意图,如图5B所示,映射信息由第一终端存储于消息层中,即上述表1位于消息层中,当第一终端需要添加某条映射关系至映射信息中或从映射信息中删除某条映射关系时,第一终端的消息层可直接对消息层中维护的映射信息进行相关操作。
在一些可能的实施例中,通过上述三种组合方式的任意一种判断是否过滤第一消息时,可能会出现映射信息中不存在第一映射关系或者映射信息中不存在第二映射关系或者映射信息中不存在第三映射关系,即说明第一终端未与第二终端建立第一消息对应的单播连接,在此情况下,第一消息中还包括识别区域,第一终端还可以结合识别区域进一步判断是否过滤第一消息。具体地,当第一终端位于识别区域外时,即说明第一消息与第一终端无关,第一终端过滤第一消息;当第一终端位于识别区域内时,由于第一消息对应的单播连接未建立,响应于第一消息,第一终端与第二终端建立第一消息对应的单播连接,并将第一消息对应的映射关系添加至应用层或网络层的映射信息中。
具体地,在确定第一终端未与第二终端建立第一消息对应的单播连接的情况下,第一终端解析第一消息获得第一消息中的识别区域,识别区域用于指示第二终端支持的第一消息中应用标识对应的应用的服务范围,也就是说,该应用标识对应的应用仅在该识别区域内有效,识别区域可以是识别半径、区域范围坐标等。
一具体实施中,识别区域为区域范围坐标时,第一终端获取自身的位置信息,并判断自身的位置信息是否属于区域范围坐标,若第一终端的位置信息不属于区域范围坐标,则说明第一终端位于识别区域外,故第一终端直接过滤第一消息;若第一终端的位置信息属于区域范围坐标,则说明第一终端位于识别区域内,响应于第一消息,第一终端与第二终端建立第一消息对应的单播连接。
另一具体实施中,识别区域为识别半径时,第一终端除了需要获取自身的位置信息外,还需获取第二终端的位置信息,其中,第二终端的位置信息可以包含于第一消息中,也可以包含于第二终端广播的其他消息中,第二终端的位置信息还可以是已知第二终端的位置信息的其他终端发送的,本申请不做具体限定。根据第一终端的位置信息和第二终端的位置信息计算第一终端与第二终端之间的距离,在该距离大于等于识别半径时,则说明第一终端位于识别区域外,故第一终端直接过滤第一消息;当该距离小于识别半径时,则说明第一终端位于识别区域内,故响应于第一消息,第一终端与第二终端建立第一消息对应的单播连接。
需要说明的是,第一终端在对第一消息进行解析获取识别区域后,还可以将第一消息中应用标识、源层二标识和识别区域三者之间的映射关系添加至交互区域信息,交互区域信息存储于消息层(参见图5A或图5B),交互区域信息用于记录第一终端已建立的单播连接对应的应用标识、源层二标识和识别区域三者之间的映射关系。
交互区域信息可以是类似于表2所示的映射关系表,如表2所示,表2中记录了两条映射关系,分别为aid1-mac3-area1和aid3-mac4-area2,以aid1-mac3-area1为例进行说明,该条映射关系说明第一终端已与源层二标识为mac3的终端建立了基于应用标识为aid1的单播连接,且应用标识aid1对应的识别区域为area1。例如,参见图5A或图5B,表2所示的交互区域信息位于消息层中。
表2
Figure PCTCN2021132866-appb-000003
在一些可能的实施例中,在建立第一消息对应的单播连接后,若第一终端的当前位置不再位于第一消息的识别区域内时,则第一终端需从映射信息中删除第一消息对应的映射关系,如此,当第一终端再次位于该应用标识对应的识别区域内时若接收到第一消息,由于映射信息中不存在第一消息对应的映射关系,因此,第一终端可以与第二终端建立第一消息对应的单播连接执行相关的业务(例如,高速路段支付费用),由此可以看出,在基于第一消息的单播交互完成后若第一终端不再位于识别区域内时,从映射信息中删除第一消息对应的映射关系这个操作,能有效防止第一终端再次位于识别区域内时接收到的第一消息被错误过滤。
在一些可能的实施例中,在建立第一消息对应的单播连接后,当第一终端的位置不再位于第一消息的识别区域内时,除了可以从映射信息中删除第一消息对应的映射关系外,应用层还可以从交互区域信息中删除第一消息对应的映射关系,本申请不做具体限定。例如,对于表1中aid1-mac3-f(aid1),即假设第一终端与第三终端建立了基于第一应用(aid1)的单播连接,由表2的aid1-mac3-area1可以看出,第三终端支持的第一应用的服务范围为area1,当第一终端不再位于area1内时,第一终端将从映射信息(例如,上述表1)中删除aid1-mac3-f(aid1)这条映射关系,以及第一终端将从交互区域信息(例如,上述表2)中删除aid1-mac3-area1这条映射关系。
例如,第一终端与第二终端建立了基于高速近场支付应用的单播连接,假设第一终端为OBU,OBU基于该单播连接完成了其所在高速路段的支付业务,若OBU仍位于该高速近场支付应用的识别区域内,当OBU再次接收到第二终端广播的同一高速近场支付应用的消息时,由于OBU已在该高速路段完成一次支付业务,OBU可根据映射信息直接过滤该消息;当OBU驶出该高速近场支付应用的识别区域时,OBU需从映射信息中删除该单播连接对应的映射关系,从而使得当OBU重新进入该高速近场支付应用的识别区域内,接收到第二终端广播的该高速近场支付应用对应的消息时,OBU不会错误过滤该消息。
需要说明的是,映射信息可以位于消息层或者网络层,交互区域信息位于消息层。在一些可能的实施例中,当映射信息和交互区域信息均由消息层维护时,映射信息和交互区域信息也可以融合为一张表,该张表用于表示第一终端已建立的单播连接对应的应用标识、源层 二标识、目标层二标识和识别区域四者之间的映射关系。
可以看出,实施本申请实施例,在第一终端接收到第二终端周期性广播的第一消息时,根据第一消息中与应用相关的字段(例如,应用标识和目标层二标识中的至少一种)以及第一消息中发送方的标识(即源层二标识)进行判断分析,在第一终端已与第二终端建立第一消息对应的单播连接的情况下,过滤第二终端广播的指示相同应用的第一消息,提高了消息过滤的准确率,减少了第一终端因解析消息导致的计算资源的消耗,提高了消息的处理效率。
参见图6,下面描述本申请实施例提供的一种消息过滤方法,其中,第一终端不妨以OBU为例、第二终端不妨以RSU为例进行方案的示例性阐述,但本申请并不限定第一终端仅为OBU,第二终端仅为RSU。另外,图6实施例可以独立于图4实施例,也可以是对图4实施例的补充。该方法包括但不限于以下步骤:
S201、OBU接收RSU广播的第一消息。
其中,OBU称作车载单元,是采用LTE-V2X或NR-V2X技术与RSU进行通讯的车载装置,OBU通常安装在车辆上,例如,挡风玻璃上。RSU主要应用于车路通信中,是实现智慧道路、车路系统的关键设备。RSU由天线(RSU天线)和射频控制器(RSU控制器)等组成。RSU通常被设置在路侧,其还可以连接路面感应监测设备(例如:信号灯、摄像头、微波雷达等)采集道路信息以及路面交通信息等,与附近过往车辆进行双向通信、交互数据。
第一消息包括应用标识、源层二标识和目标层二标识,其中,应用标识用于区分不同的应用,源层二标识为RSU的MAC地址,目标层二标识为应用标识对应的映射值。
S202、OBU的应用层或网络层根据应用标识或目标层二标识中的至少一个和源层二标识判断第一消息对应的单播连接是否已建立。
其中,第一消息对应的单播连接指的是OBU与RSU之间基于应用标识的通信连接。OBU的应用层或网络层判断第一消息对应的单播连接是否已建立的方法三种,分别为上述S102中所述的第一种组合方式:判断映射信息中是否存在应用标识与源层二标识之间的第一映射关系;第二种组合方式:判断映射信息中是否存在目标层二标识与源层二标识之间的第二映射关系;第三种组合方式:判断映射信息中是否存在应用标识、源层二标识和目标层二标识三者之间的第三映射关系。可基于上述三种方式中的任意一种进行判断,当映射信息中存在第一映射关系或者映射信息中存在第二映射关系或者映射信息中存在第三映射关系时,确定第一消息对应的单播连接已建立,执行S203;当映射信息中不存在第一映射关系或者映射信息中不存在第二映射关系或者映射信息中不存在第三映射关系时,确定第一消息对应的单播连接未建立,执行S204。需要说明的是,映射信息可由应用层或网络层建立及维护。
不妨以映射信息位于OBU的网络层为例,一具体实施中,由OBU基于上述三种组合方式中的任意一种判断映射信息中是否存在第一消息对应的映射关系。例如,若第一消息包括的三个字段为(aid1,mac3,f(aid1)),可以判断出映射信息(可参见上述表1)中存在aid1-mac3-f(aid1)这条映射关系,则说明第一消息对应的单播连接已建立,执行S203;若第一消息对应的三个字段为(aid2,mac3,f(aid2)),可以判断出映射信息中不存在aid2-mac3-f(aid2)这条映射关系,当然,映射信息中也不存在aid2-mac3这条映射关系或者映射信息中也不存在mac3-f(aid2)这条映射关系,则说明第一消息对应的单播连接未建立,执行S204。其中,网络层的映射信息可通过跨层原语DME-UserService.request()或DME-ProviderService.request()建立,具体过程可参考上述S102的相关叙述,在此不再赘述。
S203、OBU过滤第一消息。
具体地,在第一消息对应的单播连接已建立的情况下,OBU过滤第一消息,换句话说,OBU拒绝与RSU建立第一消息对应的单播连接。
S204、OBU解析第一消息获得识别区域。
具体地,当确定第一消息对应的单播连接未建立时,OBU进一步地对第一消息进行解析以获得识别区域,识别区域为RSU支持的第一消息中应用标识对应的服务范围。例如,在高速公路收费应用场景中,RSU广播的第一消息中的应用标识用于指示应用类型为高速路费支付,第一消息中还包括识别区域,在此情况下,识别区域表示当前的收费路段。
S205、OBU判断自身是否在识别区域内。
具体地,OBU可以根据自身的位置信息判断自身是否在识别区域内,当判断自身位于识别区域内时,执行S206;当判断自身不位于识别区域内时,执行S203。OBU判断自身是否位于识别区域内的方法可参考S102中的相关叙述,在此不再赘述。
例如,在高速公路收费应用场景中,OBU根据第一消息中的源层二标识和应用标识这两个字段以及映射信息进行判断,得出自身未与RSU建立第一消息对应的单播连接,在此情况下,OBU对第一消息进行解析获得当前的收费路段,并判断当前自身的位置是否在收费路段内,若位于该收费路段内,则执行S206;若不位于该收费路段内,则执行S203。
S206、响应于第一消息,OBU与RSU建立第一消息对应的单播连接,以及添加第一消息对应的映射关系添加至映射信息。
具体地,响应于第一消息,OBU将自身的MAC地址发送给RSU以与RSU建立第一消息对应的单播连接,并且OBU将第一消息中应用标识、源层二标识和目标层二标识三者之间的映射关系添加至映射信息,同时,OBU还可以将第一消息中应用标识、源层二标识和识别区域三者之间的映射信息添加至交互区域信息中。
需要说明的是,映射信息可存储于网络层或消息层,交互区域信息存储于应用层,交互区域信息中存储了OBU已建立的单播连接对应的应用标识、源层二标识和识别区域三者之间的映射关系。
例如,若第一消息中包括(aid1,mac2,f(aid1),area1),其中,aid1为第一应用的标识,mac2为RSU的源层二标识,f(aid1)为RSU的目标层二标识,area1为识别区域,且area1是通过对第一消息进行解析获得的。假设OBU基于映射信息判断得出自身未与RSU建立基于应用标识aid1的单播连接,且自身位置位于area1内,则OBU向RSU发送自身的MAC地址以建立第一消息对应的单播连接,并将aid1-mac2-f(aid1)添加至映射信息中,以及将aid1-mac2-area1添加至交互区域信息中。
S207、当OBU不再位于识别区域内时,OBU从应用层或网络层的映射信息中删除第一消息对应的映射关系。
一具体实施中,在OBU与RSU完成基于第一消息对应的单播连接的交互后,OBU所在的车辆继续行驶,车辆的位置会发生变化,OBU的位置与OBU所在的车辆的位置相同,当OBU不再位于识别区域内时(即OBU所在的车辆驶离识别区域),OBU从应用层或网络层的映射信息中删除该单播连接对应的映射关系。
需要说明的是,在OBU建立第一消息对应的单播连接后,OBU可以实时判断自身是否在第一消息中的识别区域内,OBU也可以每隔一段时间判断自身是否在第一消息中的识别区域内,当确定OBU不再位于识别区域内时,OBU将该单播连接对应的映射关系从映射信息中删除。
需要说明的是,S206中映射信息的存储位置与S207中映射信息的存储位置一致,即若S206中映射信息位于网络层,则S207中由OBU的网络层从映射信息中删除第一消息对应的映射信息;若S206中映射信息位于消息层,则S207中由OBU的消息层从映射信息中删除第一消息对应的映射信息。
例如,参见图7,图7是一种高速收费场景示意图,假设OBU在图7中的位置1上首次接收到RSU广播的第一消息后,第一消息中包括(aid1,mac2,f(aid1),area1),OBU与RSU建立第一消息对应的单播连接,并将第一消息对应的aid1-mac2-f(aid1)这条映射关系添加至映射信息中,以及将第一消息对应的aid1-mac2-area1添加至交互区域信息中,OBU在位置1处完成与RSU的单播交互(完成一次费用支付)。假设OBU在位置2处再次接收到RSU广播的第一消息,OBU基于映射信息判断出自身已与RSU建立第一消息对应的单播连接,故OBU会直接过滤在位置2处接收到的第一消息,这意味着OBU在识别区域area1内的位置1处已完成一次业务支付,故当OBU还在识别区域area1内时OBU无需响应于RSU再次广播的第一消息进行再次支付。但OBU随着车辆移动,当OBU判断自位置不再位于识别区域area1内时,OBU将第一消息对应的aid1-mac3-f(aid1)这条映射关系从映射信息中删除,使得当OBU再次进入area1内时,OBU接收到的RSU广播的第一消息不会被错误过滤掉。
将本申请实施例提供的消息过滤方法应用于图3所示的场景中,如图3所示,OBU既位于RSU1的通信范围内又位于RSU2的通信范围内,OBU可以接收到RSU1广播的Msg1和RSU1广播的Msg2,其中,Msg1中包括(aid1,mac1,f(aid1),area1),Msg2中包括(aid1,mac2,f(aid1),area2),若OBU均是首次接收到Msg1和Msg2,OBU经判断得出映射信息中不存在Msg1对应的映射关系,且映射信息中也不存在Msg2对应的映射关系,故OBU未与RSU1建立Msg1对应的单播连接,也未与RSU2建立Msg2对应的单播连接,OBU进一步判断出自身当前位于Msg1对应的识别区域area1内且也位于Msg2对应的识别区域area2内,可以理解,area1位于RSU1的通信范围内,area1位于RSU2的通信范围内,虽然Msg1和Msg2的应用标识相同(均为aid1,假设aid1表示车辆近场支付服务),但应用本申请提供的消息过滤方法,在上述情况下,Msg1和Msg2不会被过滤,相应地,响应于Msg1,OBU与RSU1建立Msg1对应的单播连接,并将aid1-mac1-f(aid1)这条映射关系添加至映射信息中,响应于Msg2,OBU与RSU2建立Msg2对应的单播连接,并将aid1-mac2-f(aid1)这条映射关系添加至映射信息中。在一些可能的实施例中,OBU还可以将aid1-mac1-area1以及aid1-mac2-area2这两条映射关系添加至交互区域信息中。若OBU在area1区域内再次接收到RSU1广播的Msg1,OBU经判断得出映射信息中已经存在Msg1对应的aid1-mac1-f(aid1)这条映射关系,OBU直接过滤该次接收到的Msg1。若OBU在area2区域内接收到RSU2广播的Msg2’,Msg2’中包括(aid2,mac2,f(aid2),area2),假设aid2表示车辆身份识别服务,OBU经判断得出映射信息中不存在aid2-mac2-f(aid2)、aid2-mac2、mac2-f(aid2)这些映射关系中的任意一种,故OBU响应于Msg2’,OBU与RSU2建立Msg2’对应的单播连接。
需要说明的是,以上仅是以高速上车辆近场支付业务为例进行说明,本申请实施例提供的方案不仅可以应用于车辆近场支付服务中,还可以应用于其他业务中,例如,车辆身份识别服务、路况安全服务等,本申请不做具体限定。
可以看到,实施本申请实施例,OBU在接收到RSU周期性广播的第一消息后,基于应用层或网络层的映射信息判断第一消息对应的单播连接是否已建立,在单播连接已建立的情况下OBU过滤第一消息,从而实现对同一RSU广播的指示相同应用的广播消息的过滤,大 大减少了OBU的计算资源的消耗。另外,OBU还可以结合映射信息以及第一消息经解析后获得的识别区域确定是否拒绝与RSU建立第一消息对应的单播连接,提高了消息过滤的准确率以及消息处理的效率。
在另一具体实施中,本申请提供的消息过滤还可以用于OBU与OBU之间广播消息的过滤,例如,第一终端可以是OBU1,第二终端可以是OBU2。参见图8,图8示例性地提供了一种消息过滤方法的流程图,图8实施例可以独立于图4、图6实施例,也可以是对图4和图6实施例的补充,该方法包括但不限于以下步骤:
S301、OBU1接收OBU2广播的第一消息。
其中,OBU2广播的第一消息包括应用标识、源层二标识和目标层二标识,其中,应用标识用于表示应用的类型,不同的应用具有不同的应用标识,源层二标识为OBU2的MAC地址,由于第一消息是以广播的形式发送的,因此,目标层二标识为应用标识的映射值,目标层二标识与应用表示对应。
S302、OBU1的应用层或网络层根据应用标识或目标层二标识中的至少一个和源层二标识判断第一消息对应的单播连接是否已建立。
具体地,映射信息中记录了OBU1已建立的单播连接对应的应用标识、源层二标识和目标层二标识三者之间的映射关系。映射信息可由应用层建立,也可由网络层建立,但映射信息由网络层建立时,应用层使用跨层原语指示网络层建立。
OBU根据映射信息判断第一消息对应的单播连接是否已建立是指:判断映射信息中是否存在第一消息对应的映射关系,即应用标识与源层二标识之间的第一映射关系,或者,目标层二标识与源层二标识之间的第二映射关系,或者,应用标识、源层二标识和目标层二标识三者之间的第三映射关系,在映射信息中存在第一消息对应的映射关系时,则确定第一消息对应的单播连接已建立,执行S303;在映射信息中不存在第一消息对应的映射关系时,则确定第一消息对应的单播连接未建立,执行S304。具体的判断方法可参考S102中的相关叙述,在此不再赘述。
S303、OBU1过滤第一消息。
S304、OBU1解析第一消息获得识别区域。
需要说明的是,识别区域为OBU2支持的第一消息中的应用标识对应的服务范围。例如,第一消息为提示车辆变道的应用消息时,识别区域即为OBU2对应的相邻车道的区域。
S305、OBU1判断自身是否在识别区域内。
具体地,OBU1结合自身的位置信息判断自身是否在识别区域内,当OBU1位于识别区域内时,则说明第一消息与OBU1有关,执行S306;当OBU1不位于区域内时,则说明第一消息与OBU1无关,执行S303。
S306、响应于第一消息,OBU1与OBU2建立第一消息对应的单播连接,以及添加第一消息对应的映射关系至映射信息。
具体地,当映射信息中不存在第一消息对应的映射关系且OBU1位于识别区域内时,响应于第一消息,OBU1与OBU2建立第一消息对应的单播连接,以及添加第一消息对应的映射关系至映射信息。
需要说明的是,在第一消息对应的单播连接建立完成后,OBU1和OBU2可以基于该单播连接进行单播交互,即基于该单播连接执行对应地业务,例如,若单播连接对应的应用类型为车辆身份识别时,则对应的业务为获取车辆的身份;若单播连接对应的应用标识指示变 道,则对应的业务为获取相应车辆的变道信息。
S307、当OBU1不再位于识别区域内时,OBU1从应用层或网络层的映射信息中删除第一消息对应的映射关系。
具体地,当OBU1与OBU2的单播交互完成后,若OBU1驶出识别区域,即OBU1不再位于识别区域内时,OBU1从应用层或网络层的映射信息中删除第一消息对应的映射关系。
参见图9,图9是一种应用场景示意图,假设OBU1、OBU2、OBU3在公路上同向行驶,且OBU3、OBU1、OBU2三者从左至右依次各占一条车道,其中,OBU1所在的车道为中间车道,OBU3所在的车道、OBU2所在的车道分别与OBU1所在的车道相邻。假设OBU2欲向左变道进入OBU1所在的车道,则OBU2向外广播第一消息,以通知周围车辆自身即将变道,假设第一消息中包括(aid2,mac2,f(aid2)),其中,aid2为变道对应的应用标识,mac2为OBU2的MAC地址,f(aid2)为应用标识的映射值,由于OBU1和OBU3均在OBU2的通信范围内,故OBU1和OBU3均能接收到OBU2广播的第一消息。
对于OBU3,假设在OBU3接收到第一消息后,OBU3经判断得出映射信息中不存在f(aid2)-mac2(上述S102中的第二种组合方式)这条映射关系,故OBU3确定未与OBU2建立第一消息对应的单播连接,进一步地,OBU3对第一消息进行解析获得第一消息中的识别区域area2(如图9所示的椭圆形区域),OBU3经判断得出自身当前不位于area2内,即说明OBU3接收的第一消息与OBU3无关,则OBU3可以直接过滤第一消息。
对于OBU1,假设在OBU1接收到第一消息后,OBU1判断胡映射信息中不存在aid2-mac2(上述S102中的第一种方式)这条映射关系,故OBU1确定未与OBU2建立第一消息对应的单播连接,进一步地,OBU1对第一消息进行解析获得第一消息中的识别区域area2(如图9所示的椭圆形区域),OBU1经判断得出自身当前位于area2内,即说明OBU1接收的第一消息与OBU1有关,OBU1将响应于第一消息,即将自身的MAC地址发送给OBU2以与OBU2建立第一消息对应的单播连接,并将aid2-mac2-f(aid2)这条映射关系添加至映射信息中。当单播连接建立完成后,OBU1可与OBU2基于已建立的单播连接进行单播交互,例如,OBU1可从OBU2获取OBU2该次变道发生的时刻、速度等信息。OBU1继续行驶,当OBU1仍位于area2内时,OBU1若再次接收到OBU2广播的第一消息,OBU1经上述方式判断可直接过滤本次接收到的第一消息。当OBU1不再位于area2内时,OBU1可以从映射信息中删除aid2-mac2-f(aid2)这条映射关系。
可以看出,实施本申请实施例,在OBU与OBU的交互中,使得OBU在与目标OBU已建立某广播消息对应的单播连接的情况下,能准确过滤目标OBU重复发送的指示同一应用服务的广播消息,大大减少了OBU因消息解析消耗的计算资源,提高了消息的处理效率。
参见图10,图10是本申请实施例提供的一种计算装置的结构示意图,计算装置30至少包括处理器110、存储器111和接收器112。在一些可能的实施例中,计算装置30还包括发送器113。其中,该接收器112和发送器113也可以替换为通信接口,用于为处理器110提供信息输入和/或输出。可选的,存储器111、接收器112、发送器113可分别与处理器110通过总线连接或耦合。计算装置30可为图4实施例中的第一终端,或者图6实施例中的OBU、图8实施例中的OBU1。
接收器112用于接收来自车载单元/路侧单元等广播的第一消息。在计算装置30确定与车载单元/路侧单元等建立第一消息对应的单播连接时,发送器113用于向车载单元/路侧单元等发送计算装置30的MAC地址。接收器112和发送器113可包括用于直接或通过空中接口 与车内的设备、传感器或RSU或其它实体设备通信的天线和芯片集。发送器113和收发器112组成通信模块,通信模块可被配置为根据一个或多个其它类型的无线通信(例如,协议)来接收和发送消息,所述无线通信诸如蓝牙、IEEE 802.11通信协议、蜂窝技术、全球微波互联接入(Worldwide Interoperability for Microwave Access,WiMAX)或LTE(Long Term Evolution,长期演进)、ZigBee协议、专用短程通信(Dedicated Short Range Communications,DSRC)以及RFID(Radio Frequency Identification,射频识别)通信,等等。
处理器110执行各操作的具体实现可参考上述方法实施例中判断第一消息对应的单播连接是否已建立、过滤第一消息等具体操作。处理器110可以由一个或者多个通用处理器构成,例如中央处理器(Central Processing Unit,CPU),或者CPU和硬件芯片的组合。上述硬件芯片可以是专用集成电路(Application-Specific Integrated Circuit,ASIC)、可编程逻辑器件(Programmable Logic Device,PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(Complex Programmable Logic Device,CPLD)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、通用阵列逻辑(Generic Array Logic,GAL)或其任意组合。
存储器111可以包括易失性存储器(Volatile Memory),例如随机存取存储器(Random Access Memory,RAM);存储器111也可以包括非易失性存储器(Non-Volatile Memory),例如只读存储器(Read-Only Memory,ROM)、快闪存储器(Flash Memory)、硬盘(Hard Disk Drive,HDD)或固态硬盘(Solid-State Drive,SSD);存储器111还可以包括上述种类的组合。存储器111可以存储程序以及数据,其中,存储的程序包括:更新映射信息程序、更新交互区域信息程序等,存储的数据包括:映射信息(即应用标识-源层二标识-目标层二标识三者之间的映射关系)、交互区域信息(即应用标识-源层二标识-识别区域三者之间的映射关系)等。存储器111可以单独存在,也可以集成于处理器110内部。
此外,图10仅仅是一个计算装置30的例子,计算装置30可能包含相比于图10展示的更多或者更少的组件,或者有不同的组件配置方式。同时,图10中展示的各种组件可以用硬件、软件或者硬件与软件的结合方式实施。
本申请实施例中,计算装置30用于实现上述图4所描述的方法、图6实施例中所描述的OBU侧的方法以及图8实施例所描述的OBU1侧的方法。
参见图11,图11是本申请实施例提供的一种计算装置的功能结构示意图,计算装置41包括接收单元410和处理单元411。可选地,在一些可能的实施例中,计算装置41还包括发送单元412。该计算装置41可以通过硬件、软件或者软硬件结合的方式来实现。
其中,计算装置41与第三终端建立了第一单播连接,计算装置41基于第一单播连接存储了第一身份标识与第一应用标识的映射关系,且第一身份标识为第三终端的唯一标识,第一应用标识为第三终端提供的应用服务的标识。接收单元410用于接收第二终端广播的第一消息,第一消息包括第二身份标识和第二应用标识,且第二身份标识第二终端的唯一标识,第二应用标识为第二终端提供的应用服务的标识;处理单元411用于在第二身份标识与第一身份标识相同,并且,第二应用标识与第一应用标识匹配的情况下,拒绝与第二终端建立第二单播连接。在一些可能的实施例中,发送单元412用于在响应于第一消息时,向第二终端发送计算装置41的身份标识以建立上述第二单播连接。
该计算装置41的各功能模块可用于实现图4实施例所描述的方法。在图4实施例中,接收单元410可用于执行S101,处理单元411可用于执行S102。该计算装置41的各功能模块还可用于实现图6实施例所描述的OBU侧的方法和图8实施例所描述的OBU1侧的方法, 为了说明书的简洁,在此不再赘述。
在本文上述的实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详细描述的部分,可以参见其他实施例的相关描述。
需要说明的是,本领域普通技术人员可以看到上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质包括只读存储器(Read-Only Memory,ROM)、随机存储器(Random Access Memory,RAM)、可编程只读存储器(Programmable Read-only Memory,PROM)、可擦除可编程只读存储器(Erasable Programmable Read Only Memory,EPROM)、一次可编程只读存储器(One-time Programmable Read-Only Memory,OTPROM)、电子抹除式可复写只读存储(Electrically-Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储器、磁盘存储器、磁带存储器、或者能够用于携带或存储数据的计算机可读的任何其他介质。
本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一个设备(可以是个人计算机,服务器,或者网络设备、机器人、单片机、芯片、机器人等)执行本申请各个实施例所述方法的全部或部分步骤。

Claims (29)

  1. 一种消息过滤方法,应用于第一终端,其特征在于,所述第一终端与第三终端建立了第一单播连接,所述第一终端基于所述第一单播连接存储了第一身份标识与第一应用标识的映射关系,其中,所述第一身份标识为所述第三终端的唯一标识,所述第一应用标识为所述第三终端提供的应用服务的标识,所述方法包括:
    接收第二终端广播的第一消息,所述第一消息包括第二身份标识和第二应用标识,其中,所述第二身份标识为所述第二终端的唯一标识,所述第二应用标识为所述第二终端提供的应用服务的标识;
    在所述第二身份标识与所述第一身份标识相同,并且,所述第二应用标识与所述第一应用标识匹配的情况下,所述第一终端拒绝与所述第二终端建立第二单播连接。
  2. 根据权利要求1所述的方法,其特征在于,所述第一身份标识为所述第三终端的媒体访问控制MAC地址,所述第二身份标识为所述第二终端的MAC地址,所述第一应用标识包括第一应用的标识或所述第一应用的标识的映射值中的至少一个,所述第二应用标识包括第二应用的标识或所述第二应用的标识的映射值中的至少一个。
  3. 根据权利要求2所述的方法,其特征在于,在所述第一应用标识为所述第一应用的标识且所述第二应用标识为所述第二应用的标识的情况下,所述第二应用标识与所述第一应用标识匹配是指:所述第二应用的标识与所述第一应用的标识相同。
  4. 根据权利要求2所述的方法,其特征在于,在所述第一应用标识为所述第一应用的标识的映射值且所述第二应用标识为所述第二应用的标识的映射值的情况下,所述第二应用标识与所述第一应用标识匹配是指:所述第二应用的标识的映射值与所述第一应用的标识的映射值相同。
  5. 根据权利要求2所述的方法,其特征在于,在所述第一应用标识包括所述第一应用的标识和所述第一应用的标识的映射值,且所述第二应用标识包括所述第二应用的标识和所述第二应用的标识的映射值的情况下,所述第二应用标识与所述第一应用标识匹配是指:所述第二应用的标识与所述第一应用的标识相同,且所述第二应用的标识的映射值与所述第一应用的标识的映射值相同。
  6. 根据权利要求1-5任一项所述的方法,其特征在于,所述第一消息还包括识别区域,所述识别区域用于指示所述第二终端支持的第二应用的服务范围,所述方法还包括:
    在所述第二身份标识和所述第一身份标识不相同,或,所述第二应用标识和所述第一应用标识不匹配的情况下,获取所述识别区域;
    在所述第一终端不位于所述识别区域内时,所述第一终端拒绝与所述第二终端建立所述第二单播连接。
  7. 根据权利要求6所述的方法,其特征在于,所述方法还包括:
    在所述第二身份标识和所述第一身份标识不相同,或,所述第二应用标识和所述第一应用标识不匹配的情况下,且所述第一终端位于所述识别区域内时,响应于所述第一消息,建 立所述第二单播连接,以及存储所述第二身份标识与所述第二应用标识的映射关系。
  8. 根据权利要求7所述的方法,其特征在于,所述方法还包括:
    在建立所述第二单播连接后,在所述第一终端不再位于所述识别区域内的情况下,删除已存储的所述第二身份标识与所述第二应用标识的映射关系。
  9. 根据权利要求1-8任一项所述的方法,其特征在于,所述第一身份标识与第一应用标识的映射关系存储于映射信息中。
  10. 根据权利要求9所述的方法,其特征在于,所述映射信息存储于所述第一终端的网络层或消息层。
  11. 根据权利要求2-10任一项所述的方法,其特征在于,所述第二身份标识为所述第一消息的源层二标识,所述第二应用的标识为所述第一消息的应用标识,所述第二应用的标识的映射值为所述第一消息的目标层二标识。
  12. 根据权利要求1-11任一项所述的方法,其特征在于,所述第一消息为单播业务公告,所述第一消息由专用业务公告DSA承载。
  13. 根据权利要求1-12任一项所述的方法,其特征在于,所述第二终端为路侧单元RSU或者车载单元OBU。
  14. 一种用于消息过滤的装置,其特征在于,所述装置与第三终端建立了第一单播连接,所述装置基于所述第一单播连接存储了第一身份标识与第一应用标识的映射关系,其中,所述第一身份标识为所述第三终端的唯一标识,所述第一应用标识为所述第三终端提供的应用服务的标识,所述装置包括:
    接收单元,用于接收第二终端广播的第一消息,所述第一消息包括第二身份标识和第二应用标识,其中,所述第二身份标识为所述第二终端的唯一标识,所述第二应用标识为所述第二终端提供的应用服务的标识;
    处理单元,用于在所述第二身份标识与所述第一身份标识相同,并且,所述第二应用标识与所述第一应用标识匹配的情况下,拒绝与所述第二终端建立第二单播连接。
  15. 根据权利要求14所述的装置,其特征在于,所述第一身份标识为所述第三终端的媒体访问控制MAC地址,所述第二身份标识为所述第二终端的MAC地址,所述第一应用标识包括第一应用的标识或所述第一应用的标识的映射值中的至少一个,所述第二应用标识包括第二应用的标识或所述第二应用的标识的映射值中的至少一个。
  16. 根据权利要求15所述的装置,其特征在于,在所述第一应用标识为所述第一应用的标识且所述第二应用标识为所述第二应用的标识的情况下,所述第二应用标识与所述第一应用标识匹配是指:所述第二应用的标识与所述第一应用的标识相同。
  17. 根据权利要求15所述的装置,其特征在于,在所述第一应用标识为所述第一应用的标识的映射值且所述第二应用标识为所述第二应用的标识的映射值的情况下,所述第二应用标识与所述第一应用标识匹配是指:所述第二应用的标识的映射值与所述第一应用的标识的映射值相同。
  18. 根据权利要求15所述的装置,其特征在于,在所述第一应用标识包括所述第一应用的标识和所述第一应用的标识的映射值,且所述第二应用标识包括所述第二应用的标识和所述第二应用的标识的映射值的情况下,所述第二应用标识与所述第一应用标识匹配是指:所述第二应用的标识与所述第一应用的标识相同,且所述第二应用的标识的映射值与所述第一应用的标识的映射值相同。
  19. 根据权利要求14-18任一项所述的装置,其特征在于,所述第一消息还包括识别区域,所述识别区域用于指示所述第二终端支持的第二应用的服务范围,所述处理单元还用于:
    在所述第二身份标识和所述第一身份标识不相同,或,所述第二应用标识和所述第一应用标识不匹配的情况下,获取所述识别区域;
    在所述装置不位于所述识别区域内时,拒绝与所述第二终端建立所述第二单播连接。
  20. 根据权利要求19所述的装置,其特征在于,所述处理单元还用于:
    在所述第二身份标识和所述第一身份标识不相同,或,所述第二应用标识和所述第一应用标识不匹配的情况下,且所述装置位于所述识别区域内时,响应于所述第一消息,建立所述第二单播连接,以及存储所述第二身份标识与所述第二应用标识的映射关系。
  21. 根据权利要求20所述的装置,其特征在于,所述处理单元还用于:
    在建立所述第二单播连接后,在所述装置不再位于所述识别区域内的情况下,删除已存储的所述第二身份标识与所述第二应用标识的映射关系。
  22. 根据权利要求14-21任一项所述的装置,其特征在于,所述第一身份标识与第一应用标识的映射关系存储于映射信息中。
  23. 根据权利要求22所述的装置,其特征在于,所述映射信息存储于所述装置的网络层或消息层。
  24. 根据权利要求15-23任一项所述的装置,其特征在于,所述第二身份标识为所述第一消息的源层二标识,所述第二应用的标识为所述第一消息的应用标识,所述第二应用的标识的映射值为所述第一消息的目标层二标识。
  25. 根据权利要求14-24任一项所述的装置,其特征在于,所述第一消息为单播业务公告,所述第一消息由专用业务公告DSA承载。
  26. 根据权利要求14-25任一项所述的装置,其特征在于,所述第二终端为路侧单元RSU或者车载单元OBU。
  27. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有程序指令,所述程序指令用于实现权利要求1-13中任一项所述的方法。
  28. 一种用于消息过滤的装置,其特征在于,所述装置包括存储器和处理器,所述存储器存储计算机程序指令,所述处理器运行所述计算机程序指令以使所述装置执行如权利要求1-13任一项所述的方法。
  29. 一种计算机程序产品,当所述计算机程序产品在处理器上运行时,使得所述用于消息过滤的装置执行如权利要求1-13任一项所述的方法。
PCT/CN2021/132866 2020-12-26 2021-11-24 一种消息过滤方法及装置 WO2022135006A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2023538989A JP2024501528A (ja) 2020-12-26 2021-11-24 メッセージフィルタリング方法及び装置
EP21909005.7A EP4266718A1 (en) 2020-12-26 2021-11-24 Message filtering method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011570800.9A CN114697911A (zh) 2020-12-26 2020-12-26 一种消息过滤方法及装置
CN202011570800.9 2020-12-26

Publications (1)

Publication Number Publication Date
WO2022135006A1 true WO2022135006A1 (zh) 2022-06-30

Family

ID=82129823

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/132866 WO2022135006A1 (zh) 2020-12-26 2021-11-24 一种消息过滤方法及装置

Country Status (4)

Country Link
EP (1) EP4266718A1 (zh)
JP (1) JP2024501528A (zh)
CN (1) CN114697911A (zh)
WO (1) WO2022135006A1 (zh)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200084592A1 (en) * 2018-09-06 2020-03-12 Qualcomm Incorporated Link identity determination and signaling
US20200205209A1 (en) * 2018-12-24 2020-06-25 Asustek Computer Inc. Method and apparatus for supporting one-to-one sidelink communication in a wireless communication system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200084592A1 (en) * 2018-09-06 2020-03-12 Qualcomm Incorporated Link identity determination and signaling
US20200205209A1 (en) * 2018-12-24 2020-06-25 Asustek Computer Inc. Method and apparatus for supporting one-to-one sidelink communication in a wireless communication system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Architecture enhancements for 5G System (5GS) to support Vehicle-to-Everything (V2X) services (Release 16)", 3GPP STANDARD; TECHNICAL SPECIFICATION; 3GPP TS 23.287, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), no. V16.3.0, 9 July 2020 (2020-07-09), pages 1 - 57, XP051924376 *
ERICSSON ET AL.: "V2X Service Type", 3GPP TSG-SA WG2 MEETING #138E S2- 2002852, 24 April 2020 (2020-04-24), XP051874380 *
VIVO MOBILE COMMUNICATIONS LTD. ET AL.: "Solution 2: V2X based solution- update", SA WG2 MEETING #139E (E-MEETING) S2-2004272, 12 June 2020 (2020-06-12), XP051890276 *

Also Published As

Publication number Publication date
EP4266718A1 (en) 2023-10-25
JP2024501528A (ja) 2024-01-12
CN114697911A (zh) 2022-07-01

Similar Documents

Publication Publication Date Title
EP3462754B1 (en) Apparatus and method for v2x communication
JP6928184B2 (ja) 車両システムにおけるターゲット車両選択およびメッセージ配信
EP3893530B1 (en) Communication method and communication device
CN106470449B (zh) 一种数据收发、中继方法、装置及通信系统
US20200374053A1 (en) Device and method for v2x communication
CN105723753A (zh) 一种车载终端间的信息交互方法及车载终端
CN106210152B (zh) 一种基于物联网的车载云系统及资源获取方法
WO2020259525A1 (zh) 一种通信方法及装置
WO2021017723A1 (zh) 一种车路协同方法及装置
US11810407B2 (en) Selecting V2X communications interface
WO2016127895A1 (zh) 一种车路信息交互方法、设备及系统
US10667295B2 (en) Method for Internet of Vehicles (IoV) electric traffic sign information broadcast with Quality of Service (QoS) guaranteed mechanism based on conflict detection
WO2019192350A1 (zh) 车联网数据传输系统中实施的方法、车载单元、以及车联网数据传输系统
CN108140303A (zh) 交通消息传递的方法、装置、车载终端及服务器
CN110505254A (zh) 一种车辆编队行驶的通信方法、系统和终端
US8774053B2 (en) Method, network element device, and network system for associating a terminal device with a network
US20230336953A1 (en) Method by which first server transmits second message in wireless communication system, and device therefor
WO2022135006A1 (zh) 一种消息过滤方法及装置
WO2021018260A1 (zh) 通信方法及相关装置
KR20210070038A (ko) 교통 안전 서비스를 위한 유무선 통신 네트워크 시스템 및 제공 방법
EP4319207A1 (en) Communication method and apparatus, and related device
KR102205678B1 (ko) 슬리핑 모드를 갖는 차량 애드 혹 망의 통신 시스템
CN103260220A (zh) 车载智能终端的接入控制方法
WO2023040708A1 (zh) 发送道路信息的方法、装置和系统
WO2023143260A1 (zh) 一种车联网信息处理方法、装置、设备及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21909005

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2023538989

Country of ref document: JP

ENP Entry into the national phase

Ref document number: 2021909005

Country of ref document: EP

Effective date: 20230718

NENP Non-entry into the national phase

Ref country code: DE