WO2023179320A1 - 一种终端设备位置的验证方法及通信装置 - Google Patents

一种终端设备位置的验证方法及通信装置 Download PDF

Info

Publication number
WO2023179320A1
WO2023179320A1 PCT/CN2023/079013 CN2023079013W WO2023179320A1 WO 2023179320 A1 WO2023179320 A1 WO 2023179320A1 CN 2023079013 W CN2023079013 W CN 2023079013W WO 2023179320 A1 WO2023179320 A1 WO 2023179320A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
location
terminal device
network device
access network
Prior art date
Application number
PCT/CN2023/079013
Other languages
English (en)
French (fr)
Inventor
吴小宁
胡星星
耿婷婷
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023179320A1 publication Critical patent/WO2023179320A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent

Definitions

  • the present application relates to the field of wireless communication technology, and in particular, to a method for verifying the location of a terminal device and a communication device.
  • the access network device can verify the location information reported by the terminal device. For example, the access network device can verify whether the location information reported by the terminal device is accurate based on one or more time advance (TA) information reported by the terminal device.
  • TA time advance
  • NTN non-terrestrial networks
  • access network equipment is deployed on non-terrestrial equipment such as high-altitude platforms or satellites.
  • the position of the terminal equipment relative to the non-ground equipment is different, and the corresponding TA is also different.
  • the terminal device since the terminal device reports TA in time slot units, there may be an error between the TA reported by the terminal device and the actual TA, for example, there is an error of 1ms. Therefore, the accuracy of verifying the location of the terminal device based on TA information is low.
  • This application provides a method for verifying the location of a terminal device and a communication device to improve the accuracy of verifying the location of the terminal device.
  • inventions of the present application provide a method for verifying the location of a terminal device.
  • the method can be executed by a first communication device.
  • the first communication device can be a communication device or a communication device that can support the communication device to implement the functions required by the method. , such as chip systems.
  • the first communication device is an access network device, or a chip provided in the access network device, or other components used to implement functions of the access network device.
  • the following description takes the communication device as the first access network device as an example.
  • the method includes:
  • the first access network device receives the first location information sent by the terminal device, and sends verification information to the terminal device. Afterwards, the first access network device receives the feedback result sent by the terminal device, and verifies the first location information according to the feedback result. Alternatively, after receiving the feedback result sent by the terminal device, the first access network device sends the received feedback result and the first location information to the core network device.
  • the verification information includes at least one of the following: at least one reference signal, at least one verification code, or at least one service data.
  • the feedback result includes a measurement result of at least one reference signal, a feedback code corresponding to the verification code, or indication information.
  • the indication information indicates whether the terminal device receives service data.
  • the verification information can be used to verify the location of the terminal device.
  • the first access network device sends verification information to the terminal device, and the terminal device may send a feedback result for the verification information to the first access network device.
  • the feedback result may indicate whether the terminal device has received certain verification information or certain verification information. If the terminal device does not receive the verification information, then the terminal device is not located within the coverage area of the beam that sent the verification information, so that the first access network device can determine the location of the terminal device based on the feedback result.
  • the first access network device communicates Verify whether the location reported by the terminal device is trustworthy by sending verification information to the terminal device.
  • the first location information sent by the terminal device indicates that the terminal device is located in the first location area
  • the first access network device determines that the terminal device is located in the second location area based on the feedback result.
  • the feedback result may also be considered to indicate that the terminal device is located in the second location. area. If there is no overlapping area between the first location area and the second location area, then the first location information is not credible. Compared with verifying the location of the terminal device based on TA information, this method can avoid the delay in reporting TA information by the terminal device, thus verifying the location with higher accuracy.
  • the first access network device determines that the first location information is not trustworthy, it may prohibit certain services of the terminal device to reduce illegal services.
  • the first access network device verifies the first location information based on the feedback result, including: the first access network device determines a location verification result based on the feedback result, and the location verification result indicates the location indicated by the first location information.
  • the confidence level of a region e.g. the first location region.
  • the credibility of the location can be determined based on the location accuracy requirements of the location. For example, if the first location information is not trustworthy as long as the first location area is not within the range of the second location area, then the location verification result indicates a confidence level of 0%. If the actual location area of the terminal device is allowed to overlap, for example, the second location area overlaps the first location area, then the first location area overlaps the second location area more, and the first location information can be considered credible.
  • the first location information can be considered credible. At this time, there is no need to prohibit the terminal device's services to ensure the normal conduct of legitimate services. It is more reasonable to use the credibility of the location to indicate whether the location is trustworthy. While reducing illegal business, try to ensure the normal conduct of legal business.
  • one reference signal corresponds to one beam
  • one verification code corresponds to one beam
  • one service data corresponds to one beam. That is, the first access network device sends verification information to the terminal device in the form of a beam. If the terminal device can obtain the reference signal, verification code or service data corresponding to a beam, it can be considered that the beam covers the terminal device, so that the terminal device can be determined location area.
  • the coverage area of the beam corresponding to part of the verification information in the verification information includes the location area indicated by the first location information. It can also be understood that among the multiple beams sent by the first access network device, only some of the beams cover the terminal device, and the other part of the beams may not cover the terminal device. This solution can prevent terminal devices from falsely reporting feedback results. For example, the coverage area of the beam corresponding to the reference signal numbered 4 cannot cover the first location area reported by the terminal device. If the feedback result reported by the terminal device indicates that the reference signal numbered 4 was measured, the first access network device may consider that the terminal device falsely reported the feedback result.
  • the beams cover different areas at different times. That is, the coverage area of the beam is time-varying. For the same location area, different beams need to be used at different times, which can improve the reliability of location verification of terminal equipment and at the same time, minimize the probability of terminal equipment falsely reporting feedback results.
  • the first access network device sends configuration information to the terminal device, and the configuration information indicates one or more of the following: the maximum number of reference signals sent by the first access network device, the first The maximum number of verification codes sent by the network access device, or the maximum number of service data sent by the first access network device.
  • the number of at least one reference signal sent by the first access network device to the terminal device is less than or equal to the maximum number.
  • the number of at least one verification code sent by the first access network device to the terminal device is less than or equal to the maximum number.
  • the number of at least one piece of service data sent by the first access network device to the terminal device is less than or equal to the maximum number.
  • the number of verification information (beams) actually sent by the first access network device to the terminal device is less than the number of measurement and/or reception verification information (beams) configured by the first access network device for the terminal device, This saves resource overhead.
  • the first access network device configures the terminal device to measure 8 beams, 3 of the 8 beams cover the terminal device, and the remaining 5 beams do not cover the terminal device. Since the five beams do not cover the terminal equipment, even if the first access network equipment sends these five beams, the terminal equipment It can't be measured either. Therefore, the first access network device can send three beams to the terminal device, thereby saving resource overhead.
  • the configuration information includes one or more of the following: measurement configuration information, receiving configuration information, feedback indication information, or reporting configuration information.
  • the measurement configuration information includes a configuration for measuring the at least one reference signal.
  • the receiving configuration information includes information used to instruct the first access network device to send a reference signal or a verification code or a maximum number of service data.
  • the feedback instruction information includes a configuration instructing the terminal device to feed back the feedback result.
  • the reporting configuration information includes one or more of the following: reporting method, reporting threshold, and reporting format.
  • the reporting method includes periodic reporting or non-periodic reporting.
  • the reporting format can also be understood as the reported content, or the form in which the reported content is implemented.
  • the method further includes: the first access network device determines verification information and/or configuration information based on the first location information, or the first access network device determines the verification information and/or configuration information based on the first location information. and auxiliary information to determine the verification information and/or configuration information.
  • the auxiliary information includes information about the reference signal of the current serving cell that can be measured by the terminal device.
  • the first access network device may refer to the first location information to try to determine a more reasonable beam. For example, select an appropriate number of beams and select beams in an appropriate direction to save resource overhead as much as possible.
  • the first position information can be verified within a certain accuracy range.
  • the auxiliary information can be used to determine a smaller area in the first location area where the terminal device is located, so that a more reasonable beam can be determined to verify the location of the terminal device within a certain accuracy range.
  • the method further includes: the first access network device sending first indication information to the terminal device, the first indication information indicating that the service of the terminal device is prohibited, and/or the first indication information indicating The reason for prohibiting the terminal device's services.
  • the first access network device can prohibit services of the terminal device, that is, intercept illegal services to ensure network security or meet network supervision requirements.
  • the first access network device can also inform the terminal device that its service is prohibited. Further, the first access network device can also inform the terminal device of the reason why its service is prohibited, thereby preventing the terminal device from performing illegal services again.
  • the method further includes: the first access network device sending second indication information to the core network device, where the second indication information includes the location verification result.
  • the first access network device can notify the core network device of the location verification result, and the core network device can determine whether to prohibit services of the terminal device based on the location verification result. For example, if the location verification result indicates that the location area reported by the terminal device is not trustworthy, the core network device can prohibit the terminal device's services to reduce illegal services and ensure network security as much as possible.
  • the second instruction information also indicates one or more of the following: a request to disconnect the terminal device, a request to switch the core network device of the terminal device, a reason for initiating the request, and a request to locate the terminal device.
  • the first access network device finds that the location area of the terminal device is not trustworthy, it can request the core network device to release the terminal device, for example, request to disconnect the terminal device, or request to switch the core network device of the terminal device to intercept illegal services. .
  • the method further includes: the first access network device sending first location verification information to the core network device, where the first location verification information includes the first location information and the feedback result. That is, the first access network device notifies the core network device of the verification information and feedback results, and the core network device verifies the first location information.
  • the core network equipment determines that the first location information is not trustworthy, it can also prohibit the services of the terminal equipment to minimize illegal services.
  • the core network verifies the first location information, which can also protect the privacy of the terminal device.
  • the method further includes: the first access network device receives third indication information sent by the core network device, the third indication information includes a location verification result, and the location verification result indicates the first location information indication.
  • the credibility of the location area After the core network device determines the credibility of the location area indicated by the first location information, it can notify the first access network device, so that the first access network device can release the terminal device to reduce illegal services.
  • embodiments of the present application provide a method for verifying the location of a terminal device.
  • the method can be executed by a second communication device.
  • the second communication device can be a communication device or a communication device that can support the communication device to implement the functions required by the method. , such as chip systems.
  • the second communication device is a terminal device, or a chip provided in the terminal device, or other components used to implement functions of the terminal device.
  • the following description takes the communication device as a terminal device as an example.
  • the method includes:
  • the terminal device sends first location information to the first access network device, receives verification information sent by the first access network device, and sends a feedback result to the first access network device.
  • the verification information includes one or more of the following: at least one reference signal, at least one verification code, or at least one service data.
  • the feedback result includes a measurement result of at least one reference signal, a feedback code corresponding to the verification code, or indication information indicating whether the terminal device has received the service data.
  • one reference signal corresponds to one beam
  • one verification code corresponds to one beam
  • one service data corresponds to one beam
  • the coverage area of the beam corresponding to part of the verification information in the verification information includes the location area indicated by the first location information.
  • the beam covers different areas at different times.
  • the method further includes: the terminal device receiving configuration information sent by the first access network device, the configuration information indicating one or more of the following: The maximum number, the maximum number of verification codes sent by the first access network device, or the maximum number of service data sent by the first access network device.
  • the number of at least one reference signal sent by the first access network device to the terminal device is less than or equal to the maximum number.
  • the number of at least one verification code sent by the first access network device to the terminal device is less than or equal to the maximum number.
  • the number of at least one piece of service data sent by the first access network device to the terminal device is less than or equal to the maximum number.
  • the configuration information includes one or more of the following: measurement configuration information, receiving configuration information, feedback indication information, or reporting configuration information.
  • the measurement configuration information includes a configuration for measuring the at least one reference signal.
  • the receiving configuration information includes information used to instruct the first access network device to send a reference signal or a verification code or a maximum number of service data.
  • the feedback instruction information includes a configuration instructing the terminal device to feed back the feedback result.
  • the reporting configuration information includes one or more of the following: reporting method, reporting threshold, and reporting format.
  • the reporting method includes periodic reporting or non-periodic reporting.
  • the reporting format can also be understood as the reported content, or the form in which the reported content is implemented.
  • the method further includes: the terminal device receiving the first indication information sent by the first access network device.
  • the first indication information indicates that the service of the terminal device is prohibited, and/or the first indication information indicates the reason for prohibiting the service of the terminal device.
  • embodiments of the present application provide a method for verifying the location of a terminal device.
  • the method can be executed by a third communication device.
  • the third communication device can be a communication device or a communication device that can support the communication device to implement the functions required by the method. , such as chip systems.
  • the third communication device is a core network device, or a chip provided in the core network device, or other components used to implement the functions of the core network device.
  • the following description takes the communication device as a core network device as an example.
  • the method includes:
  • the core network device receives the first location verification information sent by the first access network device, and verifies the first location information according to the feedback result.
  • the first location verification information includes the first location information of the terminal device and the first connection information of the terminal device.
  • the verification information includes one or more of the following: at least one reference signal, at least one verification code, or at least one business data.
  • the feedback result includes the measurement result of the at least one reference signal, a feedback code corresponding to the verification code, or indication information indicating whether the terminal device receives the service data.
  • one reference signal corresponds to one beam
  • one verification code corresponds to one beam
  • one service data corresponds to one beam
  • the first location verification information also includes one or more of the following: verification information, configuration information of the verification information, configuration information of the beam corresponding to the verification information, and coverage information of the beam corresponding to the verification information, At least one TA information of the terminal device, satellite position information corresponding to the at least one TA information, time information corresponding to the at least one TA information, ephemeris information corresponding to the at least one TA information, or cell information corresponding to the at least one TA information.
  • the verification information and/or the configuration information are also determined based on the auxiliary information, which includes information about the reference signal of the current serving cell that the terminal device can currently measure. Coverage information indicates the coverage area of the beam at different times.
  • the method further includes: the core network device sending the first indication information to the first access network device.
  • the first indication information includes a location verification result indicating the credibility of the location area indicated by the first location information.
  • the first indication information also indicates one or more of the following: a request to disconnect the terminal device, a request to switch the core network device of the terminal device, a reason for initiating the request, or a request to locate the terminal device. .
  • inventions of the present application provide a method for verifying the location of a terminal device.
  • the method can be executed by a first communication device.
  • the first communication device can be a communication device or a communication device that can support the communication device to implement the functions required by the method. , such as chip systems.
  • the first communication device is a first access network device, or a chip provided in the first access network device, or other components used to implement functions of the access network device.
  • the following description takes the communication device as the first access network device as an example.
  • the method includes:
  • the first access network device determines the second location verification information and sends the second location verification information to the second access network device.
  • the second location verification information includes TA information used by the first access network device to determine the location of the terminal device.
  • the embodiment of this application is applicable to the scenario where the terminal device switches from the first access network device to the second access network device.
  • the second access network device can be regarded as the service base station of the terminal device, and the first access network device is The base station that the second access network device previously served the terminal device. It is understandable that after the terminal device has just connected to the second access network device, it will take a period of time before the second access network device can obtain multiple TA information of the terminal device, and it takes a long time to verify the location of the terminal device.
  • the first access network device can inform the second access network device of the historical TA information of the terminal device, so that the second access network device can obtain the information that can verify the terminal device without waiting for a long time.
  • TA information of the location thus reducing the delay in verifying the terminal device. Therefore, illegal services after the terminal device is switched to the second access network device can be promptly prohibited.
  • the second location verification information also includes a location verification result and second location information.
  • the location verification result is a verification result of the first access network device on the location information sent by the terminal device.
  • the second location information indicates the location area where the terminal device is located as determined by the first access network device.
  • the first access network device can indicate whether the determined location area where the terminal device is located is trustworthy through the location verification result. For example, if the location verification result indicates that the location of the terminal device is trustworthy, then the second access network device may determine that the location reported by the terminal device is trustworthy.
  • the second location verification information also includes one or more of the following: at least One TA information, satellite position information corresponding to at least one TA information, time information corresponding to at least one TA information, ephemeris information corresponding to at least one TA information, cell information corresponding to at least one TA information, and verification information.
  • the verification information corresponds to The configuration information of the beam, the coverage information of the beam corresponding to the verification information, the configuration information, or the feedback result.
  • the verification information includes at least one reference signal, at least one verification code or at least one service data. Coverage information indicates the coverage area of the beam at different times.
  • the feedback result includes the measurement result of at least one reference signal, the feedback code corresponding to the verification code, or indication information indicating whether the terminal device receives the service data.
  • the second location verification information is carried in a handover request message sent by the first access network device to the second access network device.
  • the handover request message is used to request the second access network device to prepare resources for handover.
  • Embodiments of the present application are applicable to scenarios where a terminal device switches to a serving base station.
  • the handover request message sent by the first access network device to the second access network device is reused to carry the second location verification information, which can save signaling overhead as much as possible.
  • embodiments of the present application provide a method for verifying the location of a terminal device.
  • the method can be executed by a second communication device.
  • the second communication device can be a communication device or a communication device that can support the communication device to implement the functions required by the method. , such as chip systems.
  • the second communication device is a second access network device, or a chip provided in the terminal device, or other components used to implement the functions of the second access network device.
  • the following description takes the communication device as the second access network device as an example.
  • the method includes:
  • the second access network device receives the second location verification information sent by the first access network device, and verifies the location of the terminal device according to the second location verification information.
  • the second location verification information includes the second location verification information used by the first access network device to determine the terminal device. Location TA information.
  • the second location verification information includes a location verification result and second location information.
  • the location verification result is the verification result of the first access network device on the location information sent by the terminal device.
  • the second location information indicates the location area where the terminal device is located as determined by the first access network device.
  • the second location verification information also includes one or more of the following: at least one TA information of the terminal device, satellite position information corresponding to at least one TA information, time information corresponding to at least one TA information, at least Ephemeris information corresponding to one TA information, cell information corresponding to at least one TA information, verification information, configuration information of the beam corresponding to the verification information, coverage information of the beam corresponding to the verification information, the configuration information, or feedback results .
  • the verification information includes at least one reference signal, at least one verification code or at least one service data. Coverage information indicates the coverage area of the beam at different times.
  • the feedback result includes the measurement result of at least one reference signal, the feedback code corresponding to the verification code, or indication information indicating whether the terminal device receives the service data.
  • the second location verification information is carried in a handover request message sent by the first access network device to the second access network device.
  • the handover request message requests the second access network device to prepare resources for handover.
  • embodiments of the present application provide a communication device, which has the function of implementing the behaviors in the method embodiments of one or more aspects of the first to fifth aspects. For beneficial effects, see the first aspect. The descriptions of aspects to the fifth aspect will not be repeated here.
  • the communication device may be the terminal device in the first to fifth aspects, or the communication device may be a device capable of implementing the method provided by at least one of the first to fifth aspects, such as a chip or a chip system.
  • the communication device includes corresponding means or modules for performing the method of at least one aspect of the first to fifth aspects.
  • the communication device includes a processing unit (sometimes also referred to as processing module or processor) and/or transceiver unit (sometimes also called a transceiver module or transceiver).
  • processing module or processor sometimes also referred to as processing module or processor
  • transceiver unit sometimes also called a transceiver module or transceiver.
  • inventions of the present application provide a communication device.
  • the communication device may be the communication device in at least one of the first to fifth aspects in the above embodiments, or may be provided in the first to fifth aspects.
  • the communication device includes a communication interface and a processor, and optionally, a memory. Wherein, the memory is used to store computer programs, and the processor is coupled to the memory and the communication interface.
  • the communication device executes the above method by the terminal device and the first access network in the embodiment. The method is executed by the device, the second access network device, or the core network device.
  • embodiments of the present application provide a communication device, which includes an input-output interface and a logic circuit. Input and output interfaces are used to input and/or output information.
  • the logic circuit is used to perform the method described in at least one of the first to fifth aspects.
  • inventions of the present application provide a chip system.
  • the chip system includes a processor and may also include a memory and/or a communication interface for implementing one or more aspects of the first to fifth aspects. method described.
  • the chip system further includes a memory for storing a computer program.
  • the chip system can be composed of chips or include chips and other discrete devices.
  • inventions of the present application provide a communication system.
  • the communication system includes a first access network device and a terminal device, wherein the first access network device is used to perform the first access network device in the first aspect.
  • the method executed by the network access device, the terminal device is used to execute the method executed by the terminal device in the above second aspect.
  • the communication system includes a first access network device, a terminal device and a core network device, wherein the first access network device is used to perform the method performed by the first access network device in the first aspect, and the terminal The device is configured to execute the method executed by the terminal device in the above second aspect, and the core network device is configured to execute the method executed by the core network device in the above third aspect.
  • the communication system includes a first access network device and a second access network device, wherein the first access network device is configured to perform the method performed by the first access network device in the fourth aspect, and the first access network device The second access network device is configured to perform the method performed by the second access network device in the fifth aspect.
  • the present application provides a computer-readable storage medium that stores a computer program.
  • the computer program When the computer program is run, one or more of the above-mentioned first to fifth aspects are implemented. methods in aspects.
  • a computer program product includes: computer program code.
  • the computer program product includes: computer program code.
  • the computer program code is run, one or more of the above first to fifth aspects are achieved. method is executed.
  • Figure 1 is a schematic diagram of determining the location of a terminal device based on TA information
  • Figure 2 is a schematic diagram of the position estimation error caused by the error between the TA reported by the terminal device and the actual TA of the terminal device;
  • Figure 3 is a schematic diagram showing position estimation errors in terminal equipment based on TA positioning
  • Figure 4 is a schematic diagram of the architecture of the NTN network (transparent transmission mode);
  • FIG. 5 is a schematic diagram of the architecture of the NTN network (regeneration mode).
  • FIG. 6 is a schematic diagram of the architecture of the NTN network (with ISL);
  • Figure 7 is a schematic diagram of the architecture of the NTN network (network equipment includes DU and CU);
  • Figure 8 is a schematic flow chart of the first verification method for the location of a terminal device provided by an embodiment of the present application.
  • Figure 9 is a schematic flow chart of the second verification method for the location of a terminal device provided by an embodiment of the present application.
  • Figure 10 is a schematic flow chart of the third verification method for the location of a terminal device provided by an embodiment of the present application.
  • Figure 11 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • Figure 12 is another schematic structural diagram of a communication device provided by an embodiment of the present application.
  • the network device is an access device through which the terminal device wirelessly accesses the mobile communication system, and includes, for example, an access network (AN) device, such as a base station.
  • AN access network
  • Network equipment may also refer to equipment that communicates with terminal equipment over the air interface.
  • Network equipment may include evolved base stations (evolved Node B) (also referred to as eNB or e-NodeB) in LTE systems or long term evolution-advanced (LTE-A); network equipment may also include 5G NR systems
  • eNB evolved base stations
  • e-NodeB evolved base stations
  • LTE-A long term evolution-advanced
  • network equipment may also include 5G NR systems
  • the next generation node B (gNB) in Equipment and future evolution of Public Land Mobile Network (PLMN) equipment, equipment in D2D networks, equipment in machine to machine (M2M) networks, Internet of Things (IoT) networks equipment in the PLMN network or network equipment in the PLMN network, etc.
  • PLMN Public Land Mobile Network
  • M2M machine to machine
  • IoT Internet of Things
  • the base station in the embodiment of the present application may include a centralized unit (CU) and a distributed unit (DU), and multiple DUs may be centrally controlled by one CU.
  • CU and DU can be divided according to the protocol layer functions of the wireless network they possess. For example, the functions of the packet data convergence protocol (PDCP) layer and above are set in CU and the protocol layer below PDCP, such as wireless link. Functions such as the radio link control (RLC) layer and the medium access control (medium access control, MAC) layer are set in the DU. It should be noted that this division of protocol layers is just an example, and division can also be performed on other protocol layers.
  • PDCP packet data convergence protocol
  • RLC radio link control
  • MAC medium access control
  • the radio frequency device can be remote and not placed in the DU, or it can be integrated in the DU, or partially remote and partially integrated in the DU.
  • the control plane (CP) and user plane (UP) of the CU can also be separated and implemented into different entities, respectively control plane CU entities (CU-CP entities). and user plane CU entities (CU-UP entities).
  • CU-CP entities control plane CU entities
  • CU-UP entities user plane CU entities
  • the signaling generated by the CU can be sent to the terminal device through the DU, or the signaling generated by the UE can be sent to the CU through the DU.
  • the DU may directly encapsulate the signaling and transparently transmit it to the UE or CU through the protocol layer without parsing the signaling.
  • the CU is divided into network equipment on the radio access network (radio access network, RAN) side.
  • the CU can also be divided into network equipment on the core network (core network, CN) side. This application describes There is no restriction on this.
  • the access network device may also be a server or the like.
  • the network equipment in vehicle to everything (V2X) technology can be a road side unit (RSU).
  • RSU road side unit
  • the following description takes the access network equipment as a base station as an example.
  • the base station can communicate with the terminal device or communicate with the terminal device through the relay station.
  • Terminal devices can communicate with multiple base stations in different access technologies.
  • the core network equipment is used to implement functions such as mobility management, data processing, session management, policy and billing.
  • functions such as mobility management, data processing, session management, policy and billing.
  • the names of devices that implement core network functions in systems with different access technologies may be different, and the embodiments of this application do not limit this.
  • the core network equipment includes: access and mobility management function (AMF), session management function (SMF), policy control function (PCF) Or user plane function (UPF), etc.
  • AMF access and mobility management function
  • SMF session management function
  • PCF policy control function
  • UPF user plane function
  • the terminal device is a device with a wireless transceiver function, which can send signals to or receive signals from the network device.
  • Terminal equipment may include user equipment (UE), sometimes also called terminal, access station, UE station, remote station, wireless communication equipment, or user device, etc.
  • UE user equipment
  • the terminal equipment is used to connect people, things, machines, etc., and can be widely used in various scenarios, including but not limited to the following scenarios: cellular communication, D2D, V2X, machine-to-machine communication (machine-to-machine communication), etc.
  • the terminal device may be a mobile phone, a tablet, a computer with wireless transceiver functions, a VR terminal, an AR terminal, a wireless terminal in industrial control, a wireless terminal in driverless driving, or an IoT network Smart speakers, wireless terminal equipment in telemedicine, wireless terminal equipment in smart grids, wireless terminal equipment in transportation security, wireless terminal equipment in smart cities, or wireless terminal equipment in smart homes, etc.
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices or smart wearable devices. It is a general term for applying wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes. wait.
  • the various terminal devices introduced above can be considered as vehicle-mounted terminal equipment if they are located on the vehicle (for example, placed or installed in the vehicle).
  • the vehicle-mounted terminal equipment is also called an on-board unit (OBU), for example. ).
  • OBU on-board unit
  • the terminal device of this application can also be a vehicle-mounted module, vehicle-mounted module, vehicle-mounted component, vehicle-mounted chip or vehicle-mounted unit built into the vehicle as one or more components or units.
  • the vehicle uses the built-in vehicle-mounted module, vehicle-mounted module, Vehicle-mounted components, vehicle-mounted chips or vehicle-mounted units can implement the method of the present application.
  • the communication device used to implement the function of the network device may be a network device, or may be a device that can support the network device to implement the function, such as a chip system, and the device may be installed in the network device.
  • the technical solution provided by the embodiment of the present application the technical solution provided by the embodiment of the present application is described by taking the device for realizing the functions of the network device being a network device as an example.
  • the number of nouns means “singular noun or plural noun", that is, “one or more”, unless otherwise specified.
  • At least one means one or more
  • plural means two or more.
  • “And/or” describes the association of associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A exists alone, A and B exist simultaneously, and B exists alone, where A, B can be singular or plural.
  • the character “/" generally indicates that the related objects are in an "or” relationship.
  • A/B means: A or B.
  • At least one of the following or similar expressions thereof refers to any combination of these items, including any combination of a single item (items) or a plurality of items (items).
  • at least one of a, b, or c means: a, b, c, a and b, a and c, b and c, or a and b and c, where a, b, c Can be single or multiple.
  • first and second are used to distinguish multiple objects and are not used to limit the size, content, order, timing, priority or importance of multiple objects.
  • first location information and the second location information can be the same location information, or they can be different location information, and this name does not mean Indicates the difference in location, priority or importance indicated by the two location information.
  • the terminal device will report the location of the terminal device to the access network device.
  • the location reported by the terminal equipment can be verified, so that corresponding actions can be performed based on the determination results.
  • the location reported by the terminal device to the access network device is the first location area.
  • the terminal device is actually located in the second location area. It is assumed that the first service is illegal in the second location area and the first service is legal in the first location area. If the access network device does not verify the location reported by the terminal device, and the location reported by the terminal device is accurate by default, then even if the terminal device is actually located in the second location area, the access network device will allow the first service, which will cause network instability. Security, network non-compliance issues.
  • the location of the terminal device needs to be verified.
  • the access network device may verify the location of the terminal device based on one or more TA information reported by the terminal device.
  • Figure 1 is a schematic diagram of determining the location of a terminal device based on TA information.
  • Figure 1 includes terminal equipment and satellites. The position of the terminal equipment relative to the satellite is different, and the TA of the terminal equipment is also different. For example, at time T1, the TA of the terminal device is TA1; at time T2, the TA of the terminal device is TA2; at time T3, the TA of the terminal device is TA3.
  • the access network device can determine ring 1 based on TA1.
  • the access network device can determine ring 2 based on TA2 and ring 3 based on TA3.
  • the location of the terminal device is the intersection point of ring 1, ring 2 and ring 3.
  • Figure 2 is a schematic diagram of a position estimation error caused by an error between the TA reported by the terminal device and the actual TA of the terminal device.
  • Figure 2 takes the satellite directly above the terminal device as an example. As shown in Figure 2, it is assumed that the actual TA of the terminal device indicates that the terminal device is 500km away from the satellite.
  • the terminal equipment deviates 45° from directly below the satellite.
  • the actual TA of the terminal equipment indicates that the terminal equipment is 707km away from the satellite, and the TA reported by the terminal equipment indicates that the terminal equipment is 857km away from the satellite. At this time, There is an error of 196km between the location of the terminal equipment and the actual location of the terminal equipment. It should be noted that the various distances between the terminal equipment and the satellite in Figure 2 are only examples.
  • Figure 3 is a schematic diagram showing the position estimation error of the terminal device based on TA positioning when the satellite orbit is not directly above the terminal device.
  • Figure 3 takes as an example that the TA reported by the terminal device is the same as the actual TA of the terminal, that is, there is no TA error.
  • TA1 is the actual TA of the terminal device at time 1
  • TA2 is the actual TA of the terminal device at time 2.
  • the access network device determines that the terminal device is located on ring 1 based on TA1, and determines that the terminal device is located on ring 2 based on TA2.
  • the access network device can send verification information to the terminal device in the form of a beam. If the terminal device receives and/or measures the verification information, the terminal device can be considered to be within the coverage of the beam corresponding to the verification information. Therefore, the terminal device can inform the access network device of the verification information received or measured, so that the access network device can determine the location range of the terminal device based on the feedback result of the terminal device. Compared with determining the location range of the terminal device based on TA information, the method provided by the embodiments of the present application can improve the verification accuracy of the terminal device, that is, the location of the terminal device can be verified more accurately.
  • the technical solutions provided by the embodiments of this application can be applied to the fourth generation mobile communication technology (the 4th generation, 4G) system, 5G system, NTN system, vehicle to everything (V2X), long-term evolution - Internet of Vehicles (LTE) -vehicle, LTE-V), vehicle to vehicle (V2V), Internet of Vehicles, Machine Type Communications (MTC), Internet of things (IoT), long-term evolution-machine to machine ( LTE-machine to machine, LTE-M), machine to machine (machine to machine, M2M), Internet of Things, or future mobile communication systems.
  • the 4th generation, 4G system 5G system, NTN system
  • V2X vehicle to everything
  • LTE long-term evolution - Internet of Vehicles
  • LTE-V vehicle to vehicle
  • V2V Internet of Vehicles
  • MTC Machine Type Communications
  • IoT Internet of things
  • LTE-machine to machine LTE-M
  • machine to machine machine to machine
  • M2M Internet of Things
  • NTN systems can include satellite systems.
  • the satellite system can be divided into highly elliptical orbiting (HEO) satellites, GEO satellites, medium earth orbit (MEO) satellites and low-earth orbit (low-earth orbit).
  • LEO low-earth orbit
  • the NTN system can also include aerial network equipment such as a high altitude platform station (HAPS) communication system.
  • HAPS high altitude platform station
  • the NTN network includes first network equipment, second network equipment, ground base stations, ground core networks and terminals.
  • the first network device may be a satellite, for example, it may be a HEO satellite, a GEO satellite, a MEO satellite, a LEO satellite, or a HAPS, etc., which is not limited here.
  • the second network device may be a gateway (also called a ground station, earth station, gateway station, gateway station), which may be used to connect the first network device and the base station.
  • One or more first network devices may be connected to one or more ground base stations through one or more second network devices, which is not limited here.
  • the communication mode of the first network device is a transparent transmission mode (transparent), that is, the first network device acts as an analog radio frequency repeater to realize wireless frequency conversion and amplification, and can transparently transmit or copy the communication between the base station and the terminal. signal between.
  • the signal sent by the terminal can be transparently transmitted through the first network device, forwarded by the second network device, and enter the ground base station.
  • the communication mode of the first network device may also be a regenerative mode.
  • the communication mode of the first network device is the regeneration mode, that is, the first network device can serve as a base station for wireless communication, realize the regeneration of signals received from the ground, and can understand and process these signals.
  • the first network device may be a base station mounted on an artificial earth satellite or a high-altitude aircraft.
  • the base station may be an evolved base station (eNB) or a 5G base station (gNB).
  • the second network device can forward signaling between the first network device (ie, the base station) and the core network.
  • FIG. 5 only shows one first network device and one second network device.
  • an architecture of multiple first network devices and/or multiple second network devices may be adopted as needed.
  • Each first network device may provide services to one or more terminals
  • each second network device may correspond to one or more first network devices
  • each first network device may correspond to one or more third
  • the second network device is not specifically limited in the embodiment of this application.
  • Figure 6 shows another architectural diagram of an NTN network.
  • Figure 6 takes the example of including two first network devices and two second network devices.
  • the communication mode of the two first network devices is the regeneration mode, that is, the two first network devices can serve as base stations for wireless communication.
  • the difference from Figure 5 is that there is a Inter-satellite link (ISL).
  • ISL Inter-satellite link
  • different first network devices can communicate with each other or be connected to the same ground core network.
  • the first network device can also serve as the DU of the base station and be separated from the CU of the ground base station to form a CU DU distributed architecture.
  • Figure 7 shows another architectural schematic diagram of the NTN network.
  • the service link between the terminal device and the first network device can transmit NR-Uu wireless interface signals, and the feed link between the first network device and the second network device transmits the satellite wireless interface (satellite radio interface (SRI) signal.
  • SRI satellite radio interface
  • the method for verifying the location of a terminal device provided by the embodiment of the present application will be introduced in detail below with reference to the accompanying drawings. In the following introduction process, this method can be applied to any communication system shown in Figures 4-7.
  • the location of the terminal device can be verified by the access network device, or the location of the terminal device can be verified by the core network device.
  • the access network device may be, for example, the first network device and/or the ground base station in Figures 4-7. It should be noted that the embodiment of the present application only takes the communication system shown in Figures 4-7 as an example and is not limited to this scenario.
  • the reference signal in this article can be a channel state information reference signal (CSI-RS), a synchronization signal and a physical broadcast channel (PBCH) block (synchronization signal and PBCH block, SSB), Or it may be other reference signals sent in the form of beams, which is not limited here.
  • CSI-RS channel state information reference signal
  • PBCH physical broadcast channel
  • SSB synchronization signal and PBCH block, SSB
  • FIG. 8 is a schematic flow chart of a first verification method for the location of a terminal device provided by an embodiment of the present application.
  • the terminal device sends the first location information to the first access network device.
  • the terminal device may report its location to the first access network device.
  • the terminal device sends first location information to the first access network device, and the first location information may indicate that the terminal device is located in the first location area.
  • the first access network device receives the first location information sent by the terminal device, and based on the first location information, it can be determined that the terminal device is located in the first location area.
  • the first location information may include global positioning system (GPS) coordinates of the first location area.
  • GPS global positioning system
  • the first location information may include a street address where the first location area is located, etc.
  • the specific information included in the first location information is not limited by the embodiment of the present application, as long as it can indicate the first location area.
  • the first location area reported by the terminal device may be different from the location area where the terminal device is actually located.
  • the terminal device is actually located in the second location area, but notifies the first access network device that it is located in the first location area.
  • the terminal device can be considered as a malicious terminal.
  • the first access network device may verify the first location information reported by the terminal device. That is, verify whether the location area reported by the terminal device is trustworthy. The definition of trustworthy will be introduced in detail below and will not be explained here.
  • the first access network device sends verification information to the terminal device.
  • the verification information can be used to verify whether the first location information is trustworthy.
  • the first access network device may send the verification information in the form of a beam.
  • the verification information has a corresponding relationship with the beam. If the terminal device can receive the verification information, it can be considered that the terminal device is within the coverage of the beam corresponding to the received verification information.
  • the terminal device feeds back the beam information corresponding to the measured or received verification information, such as beam ID and/or beam intensity, etc., to the first access network device.
  • the first access network device can verify the terminal based on the beam information fed back by the terminal device. Whether the location area reported by the device is trustworthy.
  • the verification information may be a reference signal, a verification code, or business data.
  • the verification information may also include reference signals, verification codes, and business data. at least two of them.
  • the verification information may include one or more of the following: at least one reference signal, at least one verification code, or at least one service data.
  • one verification information can correspond to one beam.
  • a reference signal corresponds to a beam
  • a verification code corresponds to a beam
  • a service data corresponds to a beam.
  • one beam can correspond to multiple verification information, for example, one beam can correspond to multiple verification codes.
  • one verification information can also correspond to multiple beams, for example, one reference signal corresponds to two beams.
  • the first access network device receives the first location information and may determine beam configuration information based on the first location information.
  • the beam configuration information includes the beam configuration used by the first access network device to send verification information, for example, the number of sending beams. , beam size, beam position, beam emission intensity, beam shape, etc. It should be noted that the beam configuration information is used by the first access network device and is not sent to the terminal device.
  • the accuracy of verifying the location of the terminal device may not be guaranteed.
  • the accuracy of verifying the location of the terminal device requires being able to verify which street area the terminal device is located. If the first access network device sends a beam, and the area covered by the beam is the administrative area, it is obviously impossible to accurately determine the location of the terminal device based on this beam. to the street area.
  • the first access network device sends multiple beams, the overlapping area of the coverage areas of the multiple beams may be a street area, which can make the location of the terminal device accurate to the street area.
  • the first access network device sends more beams, and accordingly, the resource overhead is larger.
  • the first access network device can determine beam configuration information based on the first location information, such as determining an appropriate number of beams and beams in an appropriate direction, so as to take into account resource overhead and verification location accuracy as much as possible. .
  • the first access network device may determine that the beams that need to be transmitted are multiple beams covering the first location area. Considering that the first location area may be untrustworthy, the first access network device may also determine that the transmitted beam may include other beams than the beam covering the first location area in addition to the beam covering the first location area.
  • the first access network device can also determine a more accurate location of the terminal device and then determine reasonable beam configuration information.
  • the first access network device may determine the beam configuration information according to the first location information and the auxiliary information.
  • the auxiliary information can assist the first access network device to further narrow the location area where the terminal device is located.
  • the auxiliary information may include reference signal information of the current serving cell that the terminal device can measure, for example, beam information of the cell where the terminal device is located.
  • the SSB beam ID where the terminal device is located.
  • the auxiliary information may be reported by the terminal device to the first access network device before.
  • the first access network device can determine a more precise location of the terminal device based on the auxiliary information, and then determine the beam configuration information in combination with the first location information. Since the first access network device can determine a more accurate location of the terminal device based on the auxiliary information, the subsequently determined beam configuration information is also more reasonable.
  • the first access network device may also determine some configuration information based on the first location information, for example, the configuration of the terminal device measuring verification information, the configuration of the terminal device receiving verification information, the configuration of the terminal device sending feedback results for verification information, etc.
  • the following takes an example to introduce the relevant content of the configuration information, and how the first access network device determines the configuration information based on the first location information will be introduced later.
  • the configuration information may include configuration information of terminal device measurement verification information, which is also called measurement configuration information.
  • the measurement configuration information may include a configuration for measuring at least one reference signal, such as a configuration of the number of reference signals that need to be measured.
  • the configuration information may include feedback indication information, which includes a configuration instructing the terminal device to feed back a feedback result for the verification information.
  • the feedback result for the verification information may indicate the beam information corresponding to the verification information received by the terminal device.
  • the terminal device may determine whether it is necessary to send the feedback result to the first access network device according to the feedback indication information.
  • the feedback instruction information instructs the terminal device to send the feedback result, and the terminal device receives the Feedback instruction information, sending the feedback result to the first access network device.
  • the configuration information may also include reporting configuration information, and the reporting configuration information may instruct the terminal device how to send feedback results.
  • the reporting configuration information may include one or more of the following, reporting method, reporting threshold, or reporting format, etc.
  • the reporting method is, for example, periodic reporting or non-periodic reporting.
  • the terminal device can send feedback results according to the configured reporting method.
  • Reporting thresholds including signal quality thresholds, for example.
  • the feedback result sent by the terminal equipment includes the reference signal information and/or the corresponding beam information, such as the reference signal ID and/or the beam ID; on the contrary, if the quality of the reference signal received by the terminal device is less than or equal to the signal quality threshold, the feedback result sent by the terminal device does not include the reference signal information and corresponding beam information.
  • the reporting format may indicate the content or form of the feedback result that the terminal device needs to send.
  • the verification information is a reference signal
  • the feedback result may include one or more of the ID of the reference signal measured by the terminal device, the frame number or subframe number or symbol corresponding to the measured reference signal, or the identification ID of the beam. kind. It can be understood that the ID of the reference signal has a corresponding relationship with the ID of the beam.
  • the feedback result may also include the strength of the reference signal.
  • the verification information is a verification code
  • the feedback result may include the feedback code corresponding to the verification code received by the terminal device.
  • the feedback code corresponding to the verification code can be the verification code itself, or the feedback code can be a part of the verification code.
  • the feedback result may be indication information indicating whether the terminal device has received the service data, such as ACK or NACK indication information.
  • the configuration information may also include receiving configuration information, and the receiving configuration information may indicate the maximum number of verification information sent by the first access network device.
  • the received configuration information includes the maximum number of reference signals, verification codes or service data sent by the first access network device.
  • the terminal device may determine the maximum number of verification information sent by the first access network device according to the receiving configuration information.
  • the first access network device may determine one or more configuration information as above based on the first location information, or may determine one or more configuration information as above based on the first location information and auxiliary information. For example, the first access network device may determine to receive configuration information, that is, determine the maximum number of verification information sent by the first access network device. Similarly, the first access network device may also determine the verification information based on the first location information, or determine the verification information based on the first location information and the auxiliary information. For example, determine the number of reference signals, the number of verification codes, the number of business data, etc.
  • the first access network device may send one or more of the above configuration information to the terminal device. It should be noted that the above one or more configuration information may also be predefined or configured. In this case, the first access network device may not send the above one or more configuration information to the terminal device. , shown as a dotted line in Figure 8.
  • the CU receives the first location information sent by the terminal device.
  • the CU may determine the beam configuration information and/or configuration information according to the first location information, or the DU may determine the beam configuration information and/or configuration information.
  • the CU may send the first location information to the DU, and the DU determines the beam configuration information and/or configuration information according to the first location information.
  • the configuration information is determined by the CU, after the CU determines the configuration information, the configuration information can be sent to the terminal device or the configuration information can be sent to the DU.
  • the DU sends the configuration information to the terminal device.
  • the configuration information is determined by the DU, after the DU determines the configuration information, the configuration information can be sent to the terminal device or the configuration information can be sent to the CU.
  • the CU receives the configuration information and sends the configuration information to the terminal device.
  • the first access network device After determining the verification information, the first access network device sends the verification information to the terminal device.
  • the first access network device sends the verification information in the form of a beam, which can also be understood as the first access network device sends a beam.
  • the first access network device may send verification information according to the determined configuration information.
  • the number of verification information sent by the first access network device is the same as the maximum number of verification information sent by the first access network device. i.e. first
  • the access network device is configured to send a maximum number of verification information to N, and the first access network device sends N verification information.
  • the first access network device configures the maximum number of verification information to be sent, which can also be understood as the first access network device indicating the number of pieces of verification information that the terminal device needs to measure.
  • the coverage area of the beam corresponding to part of the verification information sent by the first access network device includes the first location area. That is to say, the terminal device may not necessarily be able to measure or receive the verification information sent by the first access network device to the terminal device. For example, the first access network device sends 8 pieces of verification information using 8 beams, where one beam sends one piece of verification information. Three of these eight beams cover terminal equipment, and the remaining five beams do not cover terminal equipment. Since the first access network device determines which beams cover the first location area, this solution can prevent the terminal from falsely reporting measurement results. For example, the coverage area of the beam corresponding to the reference signal numbered 4 cannot cover the first location area reported by the terminal device. If the feedback result reported by the terminal device indicates that the reference signal numbered 4 was measured, the first access network device may consider that the terminal device falsely reported the feedback result.
  • the terminal device may not receive part of the verification information sent by the first access network device.
  • the first access network device is configured to send a maximum number of verification information to 8. Taking one verification information corresponding to one beam as an example, if 3 of the 8 beams corresponding to the 8 verification information cover the terminal equipment, the other 5 beams do not cover the terminal equipment. The first access network equipment believes that even if these five beams are sent, the terminal equipment cannot receive them. Therefore, in this embodiment of the present application, the number of verification information actually sent by the first access network device may be less than the maximum number of verification information sent by the first access network device configured, thereby saving resource overhead as much as possible.
  • the maximum number of reference signals configured by the first access network device to be sent is N, and the number of at least one reference signal actually sent by the first access network device to the terminal device is M, and M is less than N.
  • the maximum number of verification codes sent by the first access network device is P, and the number of at least one verification code actually sent by the first access network device to the terminal device is Q, and Q is less than P.
  • the maximum number of service data sent by the first access network device is L, and the number of at least one service data actually sent by the first access network device to the terminal device is K, and K is less than L. Since the first access network device transmits fewer beams, interference may be reduced. At the same time, more resources can be saved for data transmission of other terminal devices to improve system performance.
  • the beam is time-varying, that is, the same beam covers different areas at different times. For the same location area, different beams used at different times are required to cover.
  • the first access network device can use different beams to send different reference signals at different times, that is, the number of reference signals that can cover the location area changes. For example, at time T1, the reference signal numbered 2 can cover the first location area reported by the terminal device, but the reference signal numbered 4 cannot. At time T2, the reference signal numbered 4 can cover the first location area, but the reference signal numbered 2 cannot. In other words, the terminal equipment cannot measure a certain reference signal during certain measurement periods.
  • the terminal equipment cannot measure the reference signal numbered 4.
  • the set of reference signals that the terminal equipment can measure is different.
  • the terminal equipment can measure the reference signal numbered 2
  • the terminal equipment can measure the reference signal numbered 4. reference signal.
  • the verification information is a verification code (service data)
  • the first access network device uses different verification codes (service data) at different times. Since the beams are time-varying, the set of beams that the terminal equipment can measure is different in different measurement periods, which can improve the reliability of the location verification of the terminal equipment. At the same time, it increases the difficulty for terminal equipment to falsely report feedback results, that is, it reduces the possibility of terminal equipment falsely reporting feedback results.
  • the DU configures a beam
  • the DU sends verification information to the terminal device in the form of a beam.
  • the beam configuration information used by the DU to configure the beam may be determined by the CU or the DU. After determining the beam configuration information, the CU sends the beam configuration information to the DU.
  • the terminal device sends the feedback result to the first access network device.
  • the first access network device sends verification information. If the terminal device receives the verification information, the terminal device can send a feedback result for the verification information to the first access network device.
  • the feedback result may indicate that the terminal device has received corresponding verification information, so that the first access network device can determine which beams the terminal device has received, and then verify the location of the terminal device based on the coverage areas of these beams.
  • the feedback result is the measurement result of the reference signal, such as the strength of the reference signal, the ID of the reference signal, or the beam ID corresponding to the reference signal, etc.
  • the feedback result can be the feedback code corresponding to the verification code.
  • This feedback code is associated with the verification code.
  • the feedback code may be a verification code, or the feedback code may be a part of the verification code.
  • the feedback code may be the first few digits of the verification code, or the feedback code may be the last few digits of the verification code. Bit.
  • the feedback code may also be a code word corresponding to the verification code.
  • the feedback code can be the sum of the verification code and the preset value, etc.
  • the feedback result may indicate whether the terminal device has received indication information of the service data. For example, acknowledgment (ACK, ACK) or negative acknowledgment (no acknowledgment, NACK) for business information.
  • ACK acknowledgment
  • NACK negative acknowledgment
  • the first access network device may continue to send service data to the terminal device to ensure the normal operation of the service. If the first access network device receives a NACK from the terminal device for the service data on a certain beam, it means that the terminal device is not within the coverage of the beam. However, the first access network device can still send service data to the first location area to ensure normal operation of the service.
  • the terminal device can send the feedback result to the first access network device according to the reported configuration information.
  • the first access network device receives the feedback result sent by the terminal device.
  • the reporting mode indicated by the reporting configuration information is periodic reporting
  • the terminal device periodically sends feedback results to the first access network device.
  • the reporting configuration information instructs the terminal device to report the frame number of the measurement reference signal.
  • the terminal device may send the frame number corresponding to the measured or received verification information to the first access network device.
  • the terminal device may send the feedback result to the DU or CU.
  • the first access network device verifies the first location information according to the feedback result.
  • the feedback result may indicate the beam corresponding to the verification information received by the terminal device. It can also be considered that the feedback result may indicate the beam received by the terminal device. Therefore, the first access network device can verify the location area where the terminal device is located based on the coverage area of the beam indicated by the feedback result. For example, if the feedback result indicates three beams, then the first access network device may determine that the terminal device is located in an overlapping area of the areas covered by the three beams, such as the second location area. That is, the feedback result can indirectly indicate that the terminal device is located in the second location area.
  • the first access network device may compare the first location area and the second location area to determine a location verification result.
  • the location verification result may indicate whether the first location information is trustworthy. Whether the first location information is credible can be characterized by the credibility of the location area indicated by the first location information. It can also be considered that the location verification result can indicate the credibility of the location area indicated by the first location information.
  • the first access network device verifies whether the first location information is credible, that is, determines the credibility of the location area indicated by the first location information. It should be noted that credibility and verification accuracy are related. For example, if network regulation for a geographical area requires location area verification accuracy to be street level, then the second location area used for location verification should also be street level.
  • the first location area can be considered credible in terms of street-level verification accuracy. If the accuracy of the first location area reported by the terminal device is lower, for example, at the administrative region level, and the second location area is at the street level, it can be considered that the location area reported by the terminal device does not meet the accuracy requirements. In this case, first The access network device can further determine the current location of the terminal device in the first location area according to the accuracy requirements, and further determine whether the service of the terminal device in the current location is legal. Alternatively, when the location area reported by the terminal device does not meet the accuracy requirements, the first access network device may consider that the location area reported by the terminal device is unreliable in terms of street-level verification accuracy.
  • the first location area can be considered credible, and accordingly, the credibility is 100%. On the contrary, if there is no overlapping area between the first location area and the second location area, the first location area can be considered to be untrustworthy, and accordingly, the credibility is 0%. If the first location area and the second location area have an overlapping area, the credibility can be determined based on the proportion of the overlapping area in the first location area.
  • the location verification result may include the credibility of the location area indicated by the first location information.
  • the location verification results may indicate whether the first location area is authentic. For example, the location verification result is 1 bit of information. The value of this 1 bit is "0", indicating that the first location area is trustworthy.
  • this 1 bit is “1”, indicating that the first location area is not trustworthy. .
  • the value of this 1 bit is “1”, indicating that the first location area is trustworthy, and correspondingly, the value of this 1 bit is "0", indicating that the first location area is not trustworthy.
  • the first access network device determines the second location area, and then verifies whether the first location area is trustworthy by comparing the first location area and the second location area.
  • the first access network device does not need to determine the second location area.
  • the first location information, verification information and feedback results can be used as inputs through a machine learning method to determine whether the first information location is available.
  • the letter establishes a corresponding relationship between the feedback result and whether the first position information is credible for the output.
  • the first access network device does not need to determine the second location area first, and can directly verify whether the first location information is trustworthy based on the feedback result.
  • the corresponding relationship between the feedback result and whether the first location information is credible is not limited to the corresponding relationship of the model, and may also be the corresponding relationship of the table, which is not limited in the embodiment of the present application.
  • the location verification result can be determined by the CU or the DU.
  • the CU receives the feedback result and can determine the location verification result, or the CU can send the feedback result to the DU, and the DU determines the location verification result.
  • the DU receives the feedback result and can determine the location verification result, or the DU can send the feedback result to the CU, and the CU determines the location verification result. It can be understood that if the location verification information is determined by DU, and if the terminal device reports the first location information to the CU, the CU also needs to send the first location information reported by the terminal device to the DU.
  • the first access network device sends the first instruction information to the terminal device.
  • the first access network device may prohibit services of the terminal device to reduce illegal services. In this case, the first access network device may prohibit services of the terminal device. For example, the first access network device releases the terminal device. In addition, the first access network device may notify the terminal device that the first access network device has prohibited services of the terminal device. For example, the first access network device sends first indication information to the terminal device, and the first indication information indicates that the service of the terminal device is prohibited. The terminal device receives the first indication information sent by the first access network device and can determine that the service is prohibited. Further, the first indication information may also indicate the reason for prohibiting the service of the terminal device, so that the terminal device can determine subsequent actions based on the service. For example, if the legality of the service is associated with the location area and the terminal device determines that the service is not allowed due to the restricted location area, then the subsequent terminal device can perform the service in the location area where the service is allowed.
  • the first indication information indicates that the service of the terminal device is prohibited, which can also be understood as the first indication information indicates that the terminal device is released.
  • the first indication information indicating the reason for prohibiting the terminal device from providing services can also be understood as the first indication information indicating the reason for releasing the terminal device.
  • the first access network device can trigger the NG interface switching process to connect the terminal device to Connect to another core network device, for example, another AMF.
  • another core network device for example, another AMF.
  • the first access network device can trigger the NG interface switching process so that the terminal device accesses the country corresponding to the second location area.
  • AMF AMF.
  • S805 is an optional step, illustrated by a dotted line in Figure 8 .
  • the first access network device when the first access network device is implemented in an architecture in which CU and DU are separated, if DU determines the credibility, DU can generate corresponding first indication information and send it to the terminal device. Or, the DU sends the credibility to the CU, the CU generates the first indication information, and the CU sends it to the terminal device. If the CU determines the credibility, the CU can generate corresponding first knowledge information and send it to the terminal device. Alternatively, the CU sends the credibility to the DU, the DU generates the first indication information, and the DU sends it to the corresponding terminal device.
  • the first access network device sends the second instruction information to the core network device.
  • the second indication information may include a location verification result.
  • the first access network device may send the location verification result to the core network device. If the location verification result indicates that the first location area is untrustworthy, the core network device may prohibit services of the terminal device, for example, the core network device releases the terminal device.
  • the first access network device sends the second indication information to the core network device. If the first location area is trusted, the first access network device does not need to send the second indication information to the core network device. Therefore, S806 is an optional step, illustrated by a dotted line in Figure 8 .
  • the first access network device may also request the core network device to release the terminal device.
  • the second indication information may also include information requesting the core network device to release the terminal device.
  • the core network device may determine to release the terminal device according to the second instruction information.
  • the first access network device can also trigger the NG interface switching process and request the core network device to switch the terminal device to another core network device.
  • the second indication information may also include information requesting switching of the NG interface. Since the first location area is not trustworthy, the first access network device may also request the core network device to locate the terminal device to update the location of the terminal device.
  • the second indication information may also include information requesting the core network device to locate the terminal device.
  • the first access network device may inform the core network device of the reason why the first access network device initiated the request.
  • the second indication information may include information indicating a reason for initiating the request.
  • the second indication information may include one or more of the above information.
  • the second instruction information may also indicate one or more of the following: a request to disconnect the terminal device, a request to switch the core network device of the terminal device, a reason for initiating the request, or a request to locate the terminal device.
  • the CU determines the credibility
  • the CU can determine the second indication information and send the second indication information to the core network device.
  • the DU may send the determined credibility to the CU, and the CU determines the second indication information based on the credibility, and then sends the second indication information to the core network device.
  • S805 can be executed before S806, or S805 can be executed after S806, or S805 and S806 can be executed at the same time.
  • the first access network device uses a beam to send verification information for verifying the location of the terminal device, such as at least one reference signal, at least one verification code, or at least one service data, to the terminal device. Therefore, the location area reported by the terminal device is verified based on the feedback result of the terminal device for the verification information, that is, the beam corresponding to the received verification information.
  • the first access network device determines that the location area reported by the terminal device is not trustworthy, it can prohibit services of the terminal device, thereby reducing illegal services.
  • the embodiments of the present application can identify terminal devices that maliciously report wrong locations, and then take corresponding measures (such as banning services) to ensure network security as much as possible.
  • services that comply with network regulatory requirements can be provided, such as lawful intercept, emergency communications, public warning service, etc.
  • the process shown in Figure 8 takes the first access network device to verify the upper position of the terminal device as an example.
  • the core network device can verify whether the location reported by the terminal device is trustworthy.
  • Figure 9 is a second verification method for the location of a terminal device provided by an embodiment of the present application. The process of this method is described as follows.
  • the terminal device sends the first location information to the first access network device.
  • S901a is the same as that of S801.
  • S801 related content which will not be described again here.
  • the first access network device sends the first location information to the core network device.
  • the first access network device may send the first location information to the core network device, and the core network device verifies the first location information.
  • the first access network device may transparently transmit the first location information to the core network device, or may parse the first location information, process the first location information and then send it to the core network device.
  • the first access network device when the first access network device is implemented in an architecture in which CU and DU are separated, the first access network device can receive and parse the first location information through the CU, and then send it to the core network device. Alternatively, the first access network device can also receive the first location information through the DU and transparently transmit it to the CU, and the CU then transparently transmits the first location information to the core network device.
  • the first access network device sends verification information to the terminal device.
  • S902 is the same as that of S802.
  • S802 related content please refer to the introduction of S802 related content, which will not be described again here.
  • the first access network device receives the feedback result sent by the terminal device.
  • S903 is the same as that of S803.
  • S803 related content please refer to the introduction of S803 related content, which will not be described again here.
  • the first access network device sends the first location verification information to the core network device.
  • the first location verification information can be used by the core network device to verify the first location information.
  • the first location verification information may include a feedback result of the terminal device for the verification information.
  • the first access network device may send the feedback result to the core network device, and the core network device verifies the first location information based on the first location information and the feedback result.
  • the first location verification information may also include content that assists the core network device in verifying the first location information.
  • the first location verification information may also include configuration information sent by the first access network device to the terminal device, such as measurement configuration information, receiving configuration information, reporting configuration information, etc.
  • configuration information sent by the first access network device to the terminal device, such as measurement configuration information, receiving configuration information, reporting configuration information, etc.
  • the core network equipment does not know which areas the beam covers, so it cannot determine the location of the terminal equipment.
  • the first location verification information may also include coverage information of the beam corresponding to the verification information, and the coverage information may indicate the area covered by different beams of the first access network device at different times.
  • the first access network device notifies the core network device of the area covered by the beam through the coverage information, so that the core network device can verify the location of the terminal device.
  • coverage information may indicate the coverage area of a particular beam at different times.
  • the specific beams include beams corresponding to the verification information measured and/or received by the terminal device. That is, beam coverage information that is not measured and/or received by the terminal equipment does not need to be sent to the core network equipment, thereby minimizing the amount of transmitted data.
  • the first location verification information may also include verification information, configuration information of the verification information, beam configuration information corresponding to the verification information, at least one TA information of the terminal device, satellite position information corresponding to the at least one TA information, and at least Time information corresponding to one TA information, ephemeris information corresponding to at least one TA information, or cell information corresponding to at least one TA information, etc.
  • the TA information may indicate that the time of the terminal device is advanced quantity.
  • the embodiments of this application do not limit the specific implementation form of TA information.
  • the TA information may be a TA value, or location information of the terminal device used to calculate the TA, etc.
  • the satellite position information corresponding to the TA information may indicate the satellite position corresponding to the time advance of the terminal device.
  • the time information corresponding to the TA information may indicate the time corresponding to the time advance of the terminal device.
  • the ephemeris information corresponding to the TA information may indicate the ephemeris of the satellite corresponding to the time advance of the terminal device.
  • the time information corresponding to the TA information and the ephemeris information corresponding to the TA information are used together to determine the ephemeris corresponding to different times.
  • the cell information corresponding to the TA information includes the cell configuration corresponding to the time advance of the terminal equipment, such as cell reference point, cell radius, cell shape, etc.
  • part of the information included in the first location verification information may be sent to the core network device in advance.
  • the first access network device may send part of the Configuration information, etc. are sent to the core network equipment.
  • the first access network device may also send the feedback result and part of the configuration information to the core network device.
  • the first access network device can also transparently transmit the feedback result sent by the terminal device to the core network device.
  • the first access network device can send information other than the feedback result in the first location verification information to the core network device at any time. Core network equipment.
  • the first access network device may send the first location information and the feedback result to the core network device, and may also send the first location information to the core network device. If the first access network device sends the first location information to the core network device, the first access network device may also send information after processing the feedback result to the core network device. For example, after receiving the feedback result sent by the terminal device, the first access network device processes the feedback result, forms coverage information of the beam indicated by the feedback result, and then sends it to the core network device. For the core network device, although the information received is the feedback result processed by the first access network device, the feedback result can be determined based on the information.
  • the coverage area of the beam corresponding to part of the verification information includes the first location area.
  • the coverage area of the beam corresponding to part of the verification information includes the first location area.
  • the first location verification information is sent by the CU to the core network device.
  • the first access network device can receive the feedback result through the DU, determine the first location verification information, and send the first location verification information to the CU, and then the CU sends the first location verification information to the core network device.
  • the first access network device may receive the feedback result through the DU, and the DU sends the feedback result to the CU.
  • the CU determines the first location verification information based on the received feedback result, and then sends the first location verification information to the core network device.
  • the first access network device receives the feedback result through the CU, determines the first location verification information, and then sends the first location verification information to the core network device.
  • the core network device verifies the first location information based on the feedback result.
  • the specific implementation of the core network device verifying the first location information based on the feedback result is similar to the specific implementation of the first access network device verifying the first location information based on the feedback information.
  • the relevant content of the aforementioned S804 please refer to the relevant content of the aforementioned S804, which will not be described again here.
  • the core network device sends the third instruction information to the first access network device.
  • the third indication information may include a location verification result. After the core network device determines the location verification result, it may send the location verification result to the first access network device. If the location verification result indicates that the first location area is untrustworthy, the core network device may prohibit services of the terminal device, for example, the core network device releases the terminal device. Optionally, when the core network device determines that the first location area is untrustworthy, the core network device sends the third indication information to the first access network device. If the first location area is trusted, the core network device does not need to send the third indication information to the first access network device. Therefore, S906 is an optional step, illustrated with a dotted line in Figure 9 .
  • the core network device may also request the first access network device to release the terminal device.
  • the third indication information may also include information requesting the first access network device to release the terminal device.
  • the first access network device may determine to release the terminal device according to the third instruction information.
  • the core network device may also request the first access network device to initiate an NG interface switching process to connect the terminal device to other core network devices.
  • the third indication information may also include information requesting the first access network device to initiate switching of the NG interface.
  • the core network device may inform the first access network device of the reason why the core network device initiated the request.
  • the third indication information may include information indicating a reason for initiating the request.
  • the third indication information may include one or more of the above information. It can also be understood that the third instruction information may also indicate one or more of the following: a request to disconnect the terminal device, a request to switch the core network device of the terminal device, and a reason for initiating the request.
  • the first access network device sends the first instruction information to the terminal device.
  • S907 is the same as that of S805.
  • S805 The specific implementation of S907 is the same as that of S805.
  • S805 Please refer to the related content of S805 mentioned above, and will not be described again here.
  • the first access network device can also be implemented in the form of a DU and CU separated architecture.
  • the core network device sends the third indication information
  • the CU can receive the third indication information.
  • the CU receives the third indication information and determines to send the first indication information to the terminal device.
  • the CU may send the first indication information to the DU, and the DU sends the first indication information to the terminal device.
  • the CU may send the third indication information to the DU, and the DU determines to send the first indication information to the terminal device, and sends the first indication information to the terminal device.
  • the first access network device uses a beam to send verification information for verifying the location of the terminal device to the terminal device, and receives a feedback result from the terminal device regarding the verification information.
  • the location information and feedback results of the terminal equipment can be sent to the core network equipment.
  • the core network device verifies the location reported by the terminal device.
  • the terminal device's services can be prohibited, thereby reducing illegal services. It can identify terminal devices that maliciously report wrong locations, and then take corresponding measures (such as banning services) to ensure network security as much as possible.
  • services that comply with network supervision requirements can be provided, such as lawful intercept, emergency communications, public warning service, etc.
  • the location of the terminal device is verified by the core network equipment, which helps to preserve user privacy.
  • the terminal equipment needs to be switched from the source base station to the target base station.
  • the process of determining the location of the terminal device based on TA information since the terminal device first accesses the second access network device, it takes a period of time before the second access network device can obtain multiple TA information of the terminal device. That is to say, when the terminal device first connects to the second access network device, the second access network device lacks historical TA information for reference, and it takes a long time to obtain multiple TA information of the terminal device to verify the terminal device. The location time is longer, which reduces the efficiency of location verification.
  • embodiments of the present application provide a third verification method for the location of a terminal device.
  • This method is suitable for switching scenarios of the terminal device, for example, the terminal device switches from one access network device to another access network device.
  • the following takes the terminal device switching from the first access network device to the second access network device as an example.
  • Figure 10 is a schematic flow chart of a third method for verifying the location of a terminal device provided by an embodiment of the present application. This method takes verifying the location of the terminal device based on TA information as an example.
  • the terminal device sends TA information to the first access network device.
  • the terminal device may send the TA information to the first access network device, and accordingly, the first access network device receives the TA information.
  • the terminal device may send one or more TA information to the first access network device.
  • the TA information reported by the terminal device can be the TA information from the terminal device to the satellite and the TA information from the satellite to the third The superimposed information of TA information of an access network device.
  • the TA information reported by the terminal device includes the sum of the TA value between the terminal device and the satellite and the TA value from the satellite to the base station.
  • the TA information from the satellite to the first access network device may be configured by the first access network device to the terminal device.
  • the TA information from the satellite to the first access network device may be calculated by the terminal device according to the configuration and/or related protocols of the first access network device. It can be understood that the TA information between the terminal device and the satellite can be used to verify the location of the terminal device.
  • the first access network device needs to obtain the TA information between the terminal device and the satellite from the superimposed information.
  • the embodiment of the present application does not limit how the first access network device obtains the TA information between the terminal device and the satellite from the overlay information.
  • the first access network device can obtain the TA information between the terminal device and the satellite from the overlay information through an internal algorithm.
  • the TA information reported by the terminal device may be TA information between the terminal device and the satellite.
  • the first access network device may use the TA information between the terminal device and the satellite to verify the location of the terminal device.
  • the TA information used to verify the location of the terminal device refers to the TA information from the terminal device to the satellite.
  • the first access network device verifies the location area where the terminal device is located based on the TA information.
  • the first access network device may determine which location area the terminal device is located based on the received one or more TA information.
  • the principle for the first access network device to determine the location of the terminal device based on the TA information can be referred to the aforementioned content related to the embodiment in Figure 1, and will not be described again here. It can be understood that before step S1002, the terminal device has reported the location area where the terminal device is located to the first access network device.
  • the first access network device is implemented in the form of a CU and DU separation architecture of the base station, and the first access network device can verify the location area where the terminal device is located through the CU or DU.
  • the first access network device may receive the TA information sent by the terminal device through the DU and verify the location area where the terminal device is located.
  • the first access network device may receive TA information sent by the terminal device through the DU, and the DU sends the received TA information to the CU, and the CU verifies the location area where the terminal device is located based on the received TA information.
  • the first access network device may receive the TA information sent by the terminal device through the CU, and the CU verifies the location area where the terminal device is located. It should be understood that if the DU verifies the location area where the terminal device is located, and if the terminal device reports location information to the CU, the CU should send the location information of the terminal device to the DU.
  • the first access network device sends the second location verification information to the second access network device.
  • the first access network device is the serving base station for the terminal device, and the second access network device can be considered the target base station to which the terminal device is to be switched.
  • the second location verification information may be used to assist the second access network device in verifying the location area where the terminal device is located.
  • the second location verification information may include TA information used to determine the location of the terminal device.
  • the second access network device can verify the location of the terminal device according to the received TA information. Since the first access network device notifies the second access network device of the historical TA information of the terminal device in advance, the second access network device does not need to wait for a long time to obtain TA information that can verify the location of the terminal device. Therefore, It can reduce the delay of verifying terminal equipment. Therefore, illegal services after the terminal device is switched to the second access network device can be promptly prohibited.
  • the TA information included in the second location verification information may be TA information from the terminal device to the satellite, or may be superimposed information of TA information from the terminal device to the satellite and TA information from the satellite to the first access network device. If the TA information included in the second location verification information is the superimposed information of the TA information from the terminal device to the satellite and the TA information from the satellite to the first access network device, the first access network device should also report to the second access network device Send auxiliary information that can obtain TA information from the terminal device to the satellite from the superimposed information.
  • the first access network device also sends the TA information from the satellite to the first access network device to the second access network device, so that the second access network device can obtain the TA information from the satellite to the first access network device based on the TA information from the satellite to the first access network device.
  • the TA information from the satellite to the access network device may be empty or non-empty. This is not the case in the embodiment of the present application. Make limitations.
  • the second location verification information may also include a location verification result and second location information.
  • the second location information may indicate the location area where the terminal device is located as determined by the first access network device.
  • the second location information may be the first location information, that is, the first access network device forwards the location information reported by the terminal device to the second access network device.
  • the second location information may also be different from the first location information.
  • the first access network device determines that the terminal device is located in the second location area, and the second location information may indicate the second location area.
  • the location verification result is the verification result of the first access network device on the first location information sent by the terminal device.
  • the location verification result can be obtained by the first access network device through the process shown in Figure 8 or Figure 9.
  • the second location verification information may also include one or more of the following: at least one TA information of the terminal device, satellite position information corresponding to the at least one TA information, time information corresponding to the at least one TA information, satellite location information corresponding to the at least one TA information. historical information, cell information corresponding to at least one TA information, verification information, configuration information of the beam corresponding to the verification information, and coverage information of the beam corresponding to the verification information.
  • the coverage information indicates the coverage area and configuration information of the beam at different times, or feedback information.
  • the cell information corresponding to at least one piece of TA information includes, for example, cell reference point, cell radius, cell shape, etc.
  • the cell information corresponding to at least one TA information can limit the location area of the terminal device to the area determined based on the TA information to fall within the cell, thereby improving the accuracy of verifying the terminal device.
  • the second location verification information is carried in a handover request message sent by the first access network device to the second access network device.
  • the handover request message is used to request the second access network device to prepare resources for handover.
  • Embodiments of the present application are applicable to scenarios where a terminal device switches to a serving base station.
  • the handover request message sent by the first access network device to the second access network device is reused to carry the second location verification information, which can save signaling overhead as much as possible.
  • the terminal device switches to the second access network device.
  • the terminal device can switch to the second access network device.
  • the process of switching the terminal equipment to the second access network equipment is an existing technology and will not be introduced in detail here.
  • the terminal device may report the location of the terminal device to the second access network device.
  • the terminal device may send second location information to the second access network device.
  • the second location information may indicate The location area where the terminal device is located.
  • the terminal device may also report the TA information of the terminal device to the second access network device to assist the second access network device in verifying the second location information.
  • the second access network device may verify the second location information based on the TA information from the first access network device and the TA information from the terminal device.
  • the second access network device verifies the location of the terminal device according to the second location verification information.
  • the second access network device receives the second location verification information and can verify the second location information based on historical TA information of the terminal device. For example, the second access network device may determine the location area where the terminal device is located based on the historical TA information of the terminal device in the second location verification information, and compare the location area with the location area indicated by the second location information, thereby determining the location area of the terminal device. Whether the location of the device is trustworthy. Alternatively, the second access network device may determine the location area where the terminal device is located based on the historical TA information of the terminal device in the second location verification information and the TA information sent by the terminal device, and compare the location area with the location indicated by the second location information. Areas are compared to determine whether the location of the terminal device is credible.
  • the second access network device can determine the integrity record of the location information reported by the terminal device based on the location verification result, and can further determine the frequency and accuracy of verifying the location of the terminal device, thereby improving the efficiency of location verification. For example, if the integrity record of the terminal device in the first access network device is good, that is, the location information reported by the terminal device to the first access network device has a high probability of being trusted, then the second access network device can reduce the location of the terminal device. frequency of verification, or deferring the final The time when the end device performs the first location verification.
  • the second access network device may also use technical means such as neural networks to verify the location of the terminal device based on the second location verification information.
  • S1003 can be executed before S1004, or S1003 can be executed after S1004, or S1003 and S1004 can be executed at the same time.
  • the first access network device is implemented in the form of a CU and DU separated architecture
  • the second access network device is implemented in a form of a CU and DU separated architecture.
  • the first access network device may receive the TA information sent by the terminal device through the DU, determine the location verification result of the terminal device, and then send the location verification result to the CU.
  • the first access network device sends the location verification result to the CU of the second access network device through the CU.
  • the first access network device may receive the TA information sent by the terminal device through the DU, and send the TA information of the terminal device to the CU.
  • the CU determines the location verification result of the terminal device, it sends the location verification result to the second access network.
  • the CU of the device receives the TA information of the terminal device through the CU, determines the location verification result of the terminal device, and then sends the location verification result to the CU of the second access network device.
  • the embodiment of the present application considers that the target base station and the source base station may not be on the same orbit, so the source base station notifies the target base station of the historical TA information of the terminal device. Since the TA information used by the target base station to determine the location of the terminal device is provided by the source base station, it does not need to obtain it from the terminal device itself, which reduces the time to obtain the TA information of the terminal device, thereby improving the efficiency of verifying the location of the terminal device. In addition, the target base station determines the location of the terminal device more accurately by combining the historical TA information of the terminal device, which can improve the positioning accuracy of the terminal device.
  • the process shown in Figure 8 and the process shown in Figure 9 and the process shown in Figure 10 can be executed individually or combined.
  • the process shown in Figure 8 and the process shown in Figure 9 can be combined with each other, and the process shown in Figure 8 and the process shown in Figure 10 can also be combined with each other.
  • the process shown in Figure 9 and the process shown in Figure 10 can be combined with each other, or the process shown in Figure 8, the process shown in Figure 9, and the process shown in Figure 10 can also be combined with each other.
  • the methods provided by the embodiments of the present application are introduced from the perspective of interaction between terminal equipment, access network equipment, or core network equipment.
  • the terminal equipment, the access network equipment and the core network equipment may include a hardware structure and/or a software module, in the form of a hardware structure, a software module, or a hardware structure plus a software module. form to achieve the above functions. Whether one of the above functions is performed as a hardware structure, a software module, or a hardware structure plus a software module depends on the specific application and design constraints of the technical solution.
  • the embodiment of the present application provides a communication device.
  • the communication device used to implement the above method in the embodiment of the present application will be introduced below with reference to the accompanying drawings.
  • FIG 11 is a schematic block diagram of a communication device 1100 provided by an embodiment of the present application.
  • the communication device 1100 may include a processing module 1110 and a transceiver module 1120.
  • a storage unit may also be included, which may be used to store instructions (code or programs) and/or data.
  • the processing module 1110 and the transceiver module 1120 can be coupled with the storage unit.
  • the processing module 1110 can read the instructions (code or program) and/or data in the storage unit to implement the corresponding method.
  • Each of the above modules can be set up independently or partially or fully integrated.
  • the communication device 1100 can correspondingly implement the behaviors and functions of the access network equipment in the above method embodiments.
  • the communication device 1100 can be an access network device or a component applied in the access network device (for example, a chip or circuit), or it can be a chip or chipset in the access network equipment or a chip used to perform related method functions. part of the energy.
  • the communication device 1100 implements the method performed by the first access network device in the embodiment of FIG. 8 or FIG. 9 .
  • the transceiver module 1120 is configured to receive the first location information sent by the terminal device, send verification information to the terminal device, and receive feedback results sent by the terminal device.
  • the verification information includes one or more of the following: at least one reference signal, at least one verification code, or at least one service data.
  • the feedback result includes the measurement result of the at least one reference signal, a feedback code corresponding to the verification code, or indication information indicating whether the terminal device receives the service data.
  • the processing module 1110 is used to verify the first location information according to the feedback result.
  • the transceiver module 1120 is also configured to send the first location information and the feedback result to the core network device.
  • the processing module 1110 is specifically configured to determine a location verification result according to the feedback result, where the location verification result indicates the credibility of the location area indicated by the first location information.
  • one reference signal corresponds to one beam
  • one verification code corresponds to one beam
  • one service data corresponds to one beam
  • the coverage area of the beam corresponding to part of the verification information in the verification information includes the location area indicated by the first location information.
  • the beams cover different areas at different times.
  • the transceiver module 1120 is also configured to send configuration information to the terminal device.
  • the configuration information indicates one or more of the following: the maximum number of reference signals sent by the communication device 1100, the maximum number of reference signals sent by the communication device 1100, The maximum number of verification codes, or the maximum number of service data sent by the communication device 1100.
  • the number of at least one reference signal sent by the communication device 1100 to the terminal device is less than or equal to the maximum number.
  • the number of at least one verification code sent by the communication device 1100 to the terminal device is less than or equal to the maximum number.
  • the number of at least one piece of service data sent by the communication device 1100 to the terminal device is less than or equal to the maximum number.
  • the configuration information includes one or more of the following: measurement configuration information, receiving configuration information, feedback indication information, or reporting configuration information.
  • the measurement configuration information includes a configuration for measuring the at least one reference signal.
  • the reception configuration information includes information used to instruct the communication device 1100 to send a reference signal or a verification code or a maximum number of service data.
  • the feedback instruction information includes a configuration instructing the terminal device to send the feedback result.
  • the reporting configuration information includes one or more of the following: reporting method, reporting threshold, and reporting format.
  • the reporting method includes periodic reporting or non-periodic reporting.
  • the processing module 1110 is also configured to determine verification information and/or configuration information according to the first location information.
  • the processing module 1110 is also configured to determine verification information and/or configuration information according to the first location information and auxiliary information.
  • the auxiliary information includes information about the reference signal of the current serving cell that can be measured by the terminal device.
  • the transceiving module 1120 is also configured to send the first indication information to the terminal device.
  • the first indication information indicates that the service of the terminal device is prohibited, and/or the first indication information indicates the reason for prohibiting the service of the terminal device.
  • the transceiving module 1120 is also configured to send second indication information to the core network device, where the second indication information includes the location verification result.
  • the second instruction information also indicates one or more of the following: a request to disconnect the terminal device, a request to switch the core network device of the terminal device, a reason for initiating the request, a request to perform operations on the terminal device. position.
  • the transceiver module 1120 is also configured to send first location verification information to the core network device, where the first location verification information includes the first location information and the feedback result.
  • the communication device 1100 implements the method performed by the first access network device in the embodiment of FIG. 10 .
  • the processing module 1110 is used to determine the second location verification information.
  • the second location verification information includes second location information and second auxiliary information.
  • the second location information indicates the location area where the terminal device is located as determined by the communication device 1100.
  • the second auxiliary information includes the location information used by the communication device 1100 to determine the location of the terminal device.
  • Historical TA information The transceiving module 1120 is configured to send the second location verification information to the second access network device.
  • the communication device 1100 implements the method performed by the second access network device in the embodiment of FIG. 10 .
  • the transceiver module 1120 is configured to receive the second location verification information sent by the first access network device.
  • the second location verification information includes historical TA information used to determine the location of the terminal device.
  • the processing module 1110 is used to verify the location of the terminal device according to the second location verification information.
  • the second location verification information also includes a location verification result and second location information.
  • the location verification result is a verification result of the first access network device on the location information sent by the terminal device.
  • the second location information indicates the location area where the terminal device is located as determined by the first access network device.
  • the second location verification information also includes one or more of the following: at least one TA information of the terminal device, satellite position information corresponding to the at least one TA information, and time information corresponding to the at least one TA information. , ephemeris information corresponding to at least one TA information, cell information corresponding to at least one TA information, verification information, configuration information of the beam corresponding to the verification information, coverage information of the beam corresponding to the verification information, configuration information, or feedback results.
  • the verification information includes at least one reference signal, at least one verification code or at least one service data. Coverage information indicates the coverage area of the beam at different times.
  • the feedback result includes a measurement result of at least one reference signal, a feedback code corresponding to the verification code, or indication information indicating whether the terminal device has received the service data.
  • the second location verification information is carried in a handover request message sent by the first access network device to the communication device 1110.
  • the handover request message is used to request the communication device 1110 to prepare resources for handover.
  • the communication device 1100 can correspondingly implement the behaviors and functions of the terminal device in the above method embodiments.
  • the communication device 1100 can be a terminal device or a component (such as a chip or circuit) used in the terminal device. ), or it can be a chip or chipset in the terminal device or a part of the chip used to perform related method functions.
  • the communication device 1100 implements the method performed by the terminal device in the embodiment of FIG. 8 or FIG. 9 .
  • the transceiver module 1120 is configured to send the first location information to the first access network device, receive the verification information sent by the first access network device, and send a feedback result to the first access network device.
  • the verification information includes one or more of the following: at least one reference signal, at least one verification code, or at least one business data.
  • the feedback result includes the measurement result of the at least one reference signal, the feedback code corresponding to the verification code, or indication information indicating whether the communication device 1100 receives the service data.
  • one reference signal corresponds to one beam
  • one verification code corresponds to one beam
  • one service data corresponds to one beam
  • the coverage area of the beam corresponding to part of the verification information in the verification information includes the location area indicated by the first location information.
  • the beams cover different areas at different times.
  • the transceiver module 1120 is also configured to receive configuration information sent by the first access network device, where the configuration information indicates one or more of the following: The maximum number, the maximum number of verification codes sent by the first access network device, or the maximum number of service data sent by the first access network device.
  • the number of at least one reference signal sent by the first access network device to the communication device 1100 is less than or equal to the maximum number.
  • the number of at least one verification code sent by the first access network device to the communication device 1100 is less than or equal to the maximum number.
  • the number of at least one service data sent by the first access network device to the communication device 1100 is less than or equal to the maximum number. Big number.
  • the transceiving module 1120 is also configured to receive the first indication information sent by the first access network device.
  • the first instruction information indicates that the service of the communication device 1100 is prohibited, and/or the first instruction information indicates the reason for prohibiting the service of the communication device 1100 .
  • the communication device 1100 can correspondingly implement the behaviors and functions of the core network equipment in the above method embodiments.
  • the communication device 1100 can be a core network device, or can be a component applied to and in the core network device (for example, a chip or circuit), it may also be a chip or chipset in the core network equipment, or a part of the chip used to perform related method functions.
  • the communication device 1100 implements the method performed by the core network device in the embodiment of FIG. 8 or FIG. 9 .
  • the transceiver module 1120 is configured to receive the first location verification information sent by the first access network device.
  • the first location verification information includes the first location information of the terminal device and/or the feedback result of the terminal device for the verification information sent by the first access network device.
  • the verification information includes one or more of the following: at least one reference signal, at least one verification code, or at least one business data.
  • the feedback result includes a measurement result of at least one reference signal, a feedback code corresponding to the verification code, or indication information indicating whether the terminal device has received the service data.
  • the processing module 1110 is used to verify the first location information according to the feedback result.
  • one reference signal corresponds to one beam
  • one verification code corresponds to one beam
  • one service data corresponds to one beam
  • the first location verification information also includes one or more of the following: verification information, configuration information of the verification information, configuration information of the beam corresponding to the verification information, and coverage of the beam corresponding to the verification information.
  • information at least one TA information of the terminal device, satellite position information corresponding to at least one TA information, time information corresponding to at least one TA information, ephemeris information corresponding to at least one TA information, or cell information corresponding to at least one TA information.
  • Coverage information indicates the coverage area of the beam at different times.
  • Authentication information and/or configuration information is also determined based on the auxiliary information.
  • the auxiliary information includes information about the reference signal of the current serving cell that the terminal device can currently measure.
  • the transceiving module 1120 is also configured to send third indication information to the first access network device, where the third indication information includes the location verification result.
  • the location verification result indicates the credibility of the location area indicated by the first location information.
  • receiving the third instruction information also indicates one or more of the following: a request to disconnect the terminal device, a request to switch the core network device of the terminal device, a reason for initiating the request, or a request to The device is positioned.
  • processing module 1110 in the embodiment of the present application can be implemented by a processor or processor-related circuit components
  • transceiver module 1120 can be implemented by a transceiver or transceiver-related circuit components or a communication interface.
  • FIG 12 is a schematic block diagram of a communication device 1200 provided by an embodiment of the present application.
  • the communication device 1200 may be a terminal device and can implement the functions of the terminal device in the method provided by the embodiments of the present application.
  • the communication device 1200 may also be a device that can support the terminal device to implement the corresponding functions in the method provided by the embodiment of the present application, wherein the communication device 1200 may be a chip system.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the communication device 1200 may also be an access network device, capable of realizing the functions of the first access network device or the second access network device in the method provided in the embodiments of this application.
  • the communication device 1200 may also be a device that can support the access network equipment to implement the corresponding functions in the method provided in the embodiment of the present application, wherein the communication device 1200 may be a chip system.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the communication device 1200 may also be a core network device and can implement the functions of the core network device in the method provided by the embodiments of this application.
  • the communication device 1200 may also be a device that can support the core network equipment to implement the corresponding functions in the method provided in the embodiment of the present application, wherein the communication device 1200 may be a chip system.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the communication device 1200 includes one or more processors 1201, which can be used to implement or support the communication device 1200 to implement the functions of the terminal device in the method provided by the embodiment of the present application. For details, please refer to the detailed description in the method example and will not be repeated here.
  • One or more processors 1201 may also be used to implement or support the communication device 1200 in implementing the functions of the first access network device or the second access network device in the method provided by the embodiments of this application. For details, please refer to the detailed description in the method example and will not be repeated here.
  • One or more processors 1201 may also be used to implement or support the communication device 1200 in implementing the functions of the core network equipment in the method provided by the embodiments of the present application.
  • the processor 1201 can also be called a processing unit or processing module, and can implement certain control functions.
  • the processor 1201 may be a general-purpose processor or a special-purpose processor, or the like.
  • the central processing unit may be used to control the communication device 1200, execute software programs and/or process data.
  • Different processors may be independent devices, or may be integrated in one or more processors, for example, integrated on one or more application specific integrated circuits.
  • the communication device 1200 includes one or more memories 1202 to store instructions 1204, which can be executed on the processor 1201, so that the communication device 1200 executes the method described in the above method embodiment.
  • the memory 1202 and the processor 1201 may be provided separately or integrated together, or the memory 1202 and the processor 1201 may be considered coupled.
  • the coupling in the embodiment of this application is an indirect coupling or communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information interaction between devices, units or modules.
  • Processor 1201 may cooperate with memory 1202. At least one of the at least one memory may be included in the processor. It should be noted that the memory 1202 is not necessary, so it is illustrated with a dotted line in FIG. 12 .
  • the memory 1202 may also store data.
  • the processor and memory can be provided separately or integrated together.
  • the memory 1202 may be a non-volatile memory, such as a hard disk drive (HDD) or a solid-state drive (SSD), etc., or it may be a volatile memory (volatile memory).
  • volatile memory volatile memory
  • RAM random-access memory
  • Memory is, but is not limited to, any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
  • the memory in the embodiment of the present application can also be a circuit or any other device capable of realizing a storage function, used to store program instructions and/or data.
  • the communication device 1200 may include instructions 1203 (sometimes also referred to as codes or programs), and the instructions 1203 may be executed on the processor, causing the communication device 1200 to perform the methods described in the above embodiments.
  • Data may be stored in processor 1201.
  • the communication device 1200 may also include a transceiver 1205 and an antenna 1206.
  • the transceiver 1205 may be called a transceiver unit, transceiver module, transceiver, transceiver circuit, transceiver, input/output interface, etc., and is used to realize the transceiver function of the communication device 1200 through the antenna 1206.
  • the processor 1201 and transceiver 1205 described in this application can be implemented in an integrated circuit (IC), an analog IC, a radio frequency identification (RFID), a mixed signal IC, an ASIC, or a printed circuit board (printed circuit). board, PCB), or electronic equipment, etc.
  • IC integrated circuit
  • RFID radio frequency identification
  • ASIC application specific integrated circuit
  • PCB printed circuit board
  • electronic equipment etc.
  • Implementing the communication device described in this article it is possible to It is an independent device (for example, an independent integrated circuit, a mobile phone, etc.), or it can be a part of a larger device (for example, a module that can be embedded in other devices).
  • IC integrated circuit
  • RFID radio frequency identification
  • ASIC integrated circuit integrated circuit
  • PCB printed circuit board
  • electronic equipment etc.
  • the communication device described in this article it is possible to It is an independent device (for example, an independent integrated circuit, a mobile phone, etc.), or it can be a part of a larger device (for example, a
  • the communication device 1200 may also include one or more of the following components: a wireless communication module, an audio module, an external memory interface, an internal memory, a universal serial bus (USB) interface, a power management module, and an antenna. Speakers, microphones, input and output modules, sensor modules, motors, cameras, or displays, etc. It can be understood that in some embodiments, the communication device 1200 may include more or fewer components, or some components may be integrated, or some components may be separated. These components may be implemented in hardware, software, or a combination of software and hardware.
  • the communication device in the above embodiments may be a terminal device (or network device) or a circuit, or may be a chip applied in the terminal device (or network device) or other devices having the above terminal functions (or network device).
  • the transceiver module may be a transceiver, which may include an antenna and a radio frequency circuit, etc.
  • the processing module may be a processor, such as a central processing unit (CPU).
  • the transceiver module may be a radio frequency unit, and the processing module may be a processor.
  • the communication device can be a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), or a system on chip (system on chip) , SoC), it can also be a CPU, it can be a network processor (network processor, NP), it can also be a digital signal processing circuit (digital signal processor, DSP), or it can be a microcontroller (micro controller unit, MCU) , it can also be a programmable logic device (PLD) or other integrated chip.
  • the processing module may be a processor of a chip system.
  • the transceiver module or communication interface may be the input/output interface or interface circuit of the chip system.
  • the interface circuit may be a code/data read and write interface circuit.
  • the interface circuit can be used to receive code instructions (code instructions are stored in the memory and can be read directly from the memory, or can also be read from the memory through other devices) and transmitted to the processor; the processor can be used to run all The code instructions are used to execute the methods in the above method embodiments.
  • the interface circuit may also be a signal transmission interface circuit between the communication processor and the transceiver.
  • the device may include a transceiver unit and a processing unit.
  • the transceiver unit may be an input-output circuit and/or a communication interface;
  • the processing unit may be an integrated processor or microprocessor or an integrated circuit.
  • Embodiments of the present application also provide a communication system.
  • the communication system includes at least one terminal device and at least one first access network device, or may also include at least one second access network device and/or core network device.
  • the communication system includes access network equipment, terminal equipment and core network equipment used to implement the relevant functions of one or more of the figures in Figures 8-10. For details, please refer to the relevant descriptions in the above method embodiments, which will not be described again here.
  • An embodiment of the present application also provides a computer-readable storage medium, which includes instructions that, when run on a computer, cause the computer to execute the first access network device or the second access network device in one or more of Figures 8-10.
  • Method implemented by access network equipment Or, when it is run on the computer, the computer is caused to execute the method executed by the terminal device in one or more of the figures in Figures 8 to 10. Or, when it is run on a computer, the computer is caused to perform the method performed by the core network device in one or more of the figures in Figures 8-10.
  • An embodiment of the present application also provides a computer program product, which includes instructions that, when run on a computer, cause the computer to execute the first access network device or the second access network device in one or more of Figures 8-10.
  • Network device execution method When it is run on the computer, the computer is caused to execute the method executed by the terminal device in one or more of the figures in Figures 8 to 10. Or, when it is run on a computer, causing the computer to execute one or more of the figures in Figures 8-10 Methods implemented by core network equipment.
  • Embodiments of the present application provide a chip system.
  • the chip system includes a processor and may also include a memory for implementing the functions of the first access network device or the second access network device in the foregoing method; or for implementing the foregoing method.
  • the chip system can be composed of chips or include chips and other discrete devices.
  • the size of the sequence numbers of the above-mentioned processes does not mean the order of execution.
  • the execution order of each process should be determined by its functions and internal logic, and should not be used in the embodiments of the present application.
  • the implementation process constitutes any limitation.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the computer software product is stored in a storage medium and includes a number of instructions to enable a A computer device (which may be a personal computer, a server, or a network device, etc.) executes all or part of the steps of the methods described in various embodiments of this application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), RAM, magnetic disk or optical disk and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开一种终端设备位置的验证方法及通信装置,该方法包括:第一接入网设备接收终端设备发送的第一位置信息,并向终端设备发送验证信息。之后,第一接入网设备接收终端设备发送的反馈结果,并根据该反馈结果验证第一位置信息,或者,第一接入网设备将接收的反馈结果以及第一位置信息发送给核心网设备。其中,验证信息包括如下的至少一项:至少一个参考信号、至少一个验证码,或者至少一个业务数据。相应的,反馈结果包括至少一个参考信号的测量结果,验证码对应的反馈码,或指示信息,该指示信息指示终端设备是否接收到业务数据。通过本申请提供的方法可提高验证终端设备的位置的精确度。

Description

一种终端设备位置的验证方法及通信装置
相关申请的交叉引用
本申请要求在2022年03月25日提交中国专利局、申请号为202210304227.X、申请名称为“一种终端设备位置的验证方法及通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及无线通信技术领域,尤其涉及一种终端设备位置的验证方法及通信装置。
背景技术
接入网设备可以对终端设备所上报的位置信息进行验证。例如,接入网设备可基于终端设备上报的一个或多个时间提前量(time advance,TA)信息验证终端设备上报的位置信息是否准确。
在非陆地网络(non terrestrial networks,NTN)中,接入网设备部署在高空平台或者卫星等非地面设备上。终端设备相对非地面设备的位置不同,对应的TA也有所不同。在NTN网络中,由于终端设备以时隙为单位上报TA,终端设备上报的TA与实际TA相比可能存在误差,例如存在1ms误差。因此基于TA信息验证终端设备的位置的精确度较低。
发明内容
本申请提供一种终端设备位置的验证方法以及通信装置,以提高验证终端设备的位置的精确度。
第一方面,本申请实施例提供一种终端设备位置的验证方法,该方法可由第一通信装置执行,第一通信装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片系统。示例性地,所述第一通信装置为接入网设备,或者为设置在接入网设备中的芯片,或者为用于实现接入网设备的功能的其他部件。下面以所述通信设备是第一接入网设备为例进行描述。该方法包括:
第一接入网设备接收终端设备发送的第一位置信息,并向终端设备发送验证信息。之后,第一接入网设备接收终端设备发送的反馈结果,并根据该反馈结果验证第一位置信息。或者,第一接入网设备接收终端设备发送的反馈结果之后,将接收的反馈结果以及第一位置信息发送给核心网设备。其中,验证信息包括如下的至少一项:至少一个参考信号、至少一个验证码,或者至少一个业务数据。相应的,反馈结果包括至少一个参考信号的测量结果,验证码对应的反馈码,或指示信息。该指示信息指示终端设备是否接收到业务数据。
在本申请实施例中,验证信息可用于验证终端设备的位置。例如,第一接入网设备向终端设备发送验证信息,终端设备可向第一接入网设备发送针对验证信息的反馈结果。该反馈结果可指示终端设备是否接收到某个或某些验证信息。如果终端设备没有接收到验证信息,那么终端设备没有位于发送该验证信息的波束的覆盖区域内,从而第一接入网设备可根据反馈结果确定终端设备的位置。通过本申请实施例提供的方法,第一接入网设备通 过向终端设备发送验证信息的方式来验证终端设备上报的位置是否可信。例如,终端设备发送的第一位置信息指示终端设备位于第一位置区域,而第一接入网设备根据反馈结果确定终端设备位于第二位置区域,也可以认为反馈结果指示终端设备位于第二位置区域。如果第一位置区域和第二位置区域无重叠区域,那么第一位置信息不可信。该方法相较于基于TA信息验证终端设备的位置来说,可避免由于终端设备上报TA信息的时延,从而验证位置的精确度更高。另外,第一接入网设备在确定第一位置信息不可信时,可禁止终端设备的某些业务,以减少不合法的业务。
在可能的实现方式中,第一接入网设备根据反馈结果验证第一位置信息,包括:第一接入网设备根据反馈结果确定位置验证结果,该位置验证结果指示第一位置信息指示的位置区域(例如第一位置区域)的可信度。位置的可信度可根据位置的定位精度的需求来确定。例如,如果只要第一位置区域不在第二位置区域范围内,第一位置信息就不可信,那么位置验证结果指示的可信度可为0%。如果允许终端设备实际所在位置区域,例如第二位置区域与第一位置区域存在重叠,那么第一位置区域与第二位置区域重叠较多,可认为第一位置信息可信。例如,第一位置区域与第二位置区域有80%的区域重叠,可认为第一位置信息可信。此时,无需禁止终端设备的业务,以尽量保证合法业务的正常进行。通过位置的可信度来表征位置是否可信,更为合理,减少不合法业务的同时,尽量保证合法业务的正常进行。
在可能的实现方式中,一个参考信号对应一个波束,一个验证码对应一个波束,一个业务数据对应一个波束。即第一接入网设备以波束的形式向终端设备发送验证信息,如果终端设备可获得一个波束对应的参考信号、验证码或业务数据,可认为该波束覆盖该终端设备,从而可确定终端设备所在的位置区域。
在可能的实现方式中,验证信息中的部分验证信息对应的波束的覆盖区域包括第一位置信息指示的位置区域。也可以理解为,第一接入网设备发送的多个波束中,只有部分波束覆盖终端设备,另一部分波束可能并不覆盖终端设备。通过该方案可以防止终端设备虚报反馈结果。例如,编号为4的参考信号对应的波束的覆盖区域并不能覆盖终端设备上报的第一位置区域。若终端设备上报的反馈结果表明测量到了编号为4的参考信号,第一接入网设备则可以认为终端设备虚假上报反馈结果。
在可能的实现方式中,所述波束在不同时间所覆盖的区域不同。也就是,波束的覆盖区域是时变的。针对同一位置区域,需要不同时刻使用的不同的波束,可提高对终端设备位置验证的可靠性,同时,可尽量降低终端设备虚假上报反馈结果的概率。
在可能的实现方式中,第一接入网设备向终端设备发送配置信息,该配置信息指示如下的一项或多项:第一接入网设备发送的参考信号的最大个数、第一接入网设备发送的验证码的最大个数,或者,第一接入网设备发送的业务数据的最大个数。其中,第一接入网设备向终端设备发送的至少一个参考信号的个数小于或等于最大个数。第一接入网设备向终端设备发送的至少一个验证码的个数小于或等于最大个数。第一接入网设备向终端设备发送的至少一个业务数据的个数小于或等于最大个数。该方案中,第一接入网设备实际向终端设备发送的验证信息(波束)的个数小于第一接入网设备为终端设备配置的测量和/或接收验证信息(波束)的个数,从而节约资源开销。例如,第一接入网设备配置终端设备测量8个波束,这8个波束中的3个波束覆盖终端设备,剩余5个波束没有覆盖终端设备。由于5个波束没有覆盖终端设备,即使第一接入网设备发送了这5个波束,终端设备 也测量不到。因此,第一接入网设备可向终端设备发送3个波束,从而节约了资源开销。
在可能的实现方式中,所述配置信息包括如下的一项或多项:测量配置信息、接收配置信息、反馈指示信息,或者上报配置信息。其中,测量配置信息包括用于测量所述至少一个参考信号的配置。接收配置信息包括用于指示第一接入网设备发送参考信号或验证码或业务数据的最大个数的信息。反馈指示信息包括指示终端设备反馈所述反馈结果的配置。上报配置信息包括如下的一项或多项:上报方式、上报门限、上报格式,所述上报方式包括周期上报或非周期上报。上报格式也可以理解为上报的内容,或者上报的内容以何种形式实现。
在可能的实现方式中,所述方法还包括:第一接入网设备根据第一位置信息确定验证信息和/或配置信息,或者,所述第一接入网设备根据所述第一位置信息和辅助信息确定所述验证信息和/或配置信息。辅助信息包括终端设备能够测量到的当前服务小区的参考信号的信息。第一接入网设备确定验证信息时可以参考第一位置信息,以尽量确定较为合理的波束。例如,选择合适数量的波束,选择合适方向的波束,以尽量节约资源开销。进一步地,可以在一定精度范围内,验证第一位置信息。例如,通过辅助信息可以确定终端设备所在第一位置区域中的更小区域,这样可确定更为合理的波束,达到在一定精确度范围内验证终端设备的位置。
在可能的实现方式中,所述方法还包括:第一接入网设备向终端设备发送第一指示信息,该第一指示信息指示终端设备的业务被禁止,和/或,第一指示信息指示禁止终端设备的业务的原因。当终端设备的位置不可信时,第一接入网设备可禁止终端设备的业务,即拦截不合法的业务,以尽量保证网络安全或者满足网络监管要求。同时,第一接入网设备也可告知终端设备其业务被禁止。进一步地,第一接入网设备还可以告知终端设备其业务被禁止的原因,从而避免终端设备再次进行不合法业务。
在可能的实现方式中,所述方法还包括:第一接入网设备向核心网设备发送第二指示信息,该第二指示信息包括位置验证结果。第一接入网设备可将位置验证结果告知核心网设备,由核心网设备可根据位置验证结果确定是否禁止终端设备的业务。例如,位置验证结果指示终端设备上报的位置区域不可信,那么核心网设备可禁止终端设备的业务,以减少不合法的业务,尽量保证网络安全。
在可能的实现方式中,第二指示信息还指示如下的一项或多项:请求断开终端设备的连接、请求切换终端设备的核心网设备、发起请求的原因、请求对终端设备的定位。第一接入网设备发现终端设备的位置区域不可信时,可请求核心网设备释放终端设备,例如,请求断开终端设备的连接,或请求切换终端设备的核心网设备,以拦截不合法业务。
在可能的实现方式中,所述方法还包括:第一接入网设备向核心网设备发送第一位置验证信息,该第一位置验证信息包括所述第一位置信息和所述反馈结果。即第一接入网设备将验证信息和反馈结果通知给核心网设备,由核心网设备对第一位置信息进行验证。核心网设备在确定第一位置信息不可信时,也可禁止终端设备的业务,以尽量减少不合法业务。同时,由核心网对第一位置信息进行验证,还可以保护终端设备的隐私。
在可能的实现方式中,所述方法还包括:第一接入网设备接收核心网设备发送的第三指示信息,该第三指示信息包括位置验证结果,该位置验证结果指示第一位置信息指示的位置区域的可信度。核心网设备确定第一位置信息指示的位置区域的可信度之后,可告知第一接入网设备,从而第一接入网设备可释放终端设备,以减少不合法业务。
第二方面,本申请实施例提供一种终端设备位置的验证方法,该方法可由第二通信装置执行,第二通信装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片系统。示例性地,所述第二通信装置为终端设备,或者为设置在终端设备中的芯片,或者为用于实现终端设备的功能的其他部件。下面以所述通信设备是终端设备为例进行描述。该方法包括:
终端设备向第一接入网设备发送第一位置信息,接收第一接入网设备发送的验证信息,以及向第一接入网设备发送反馈结果。其中,验证信息包括如下的一项或多项:至少一个参考信号、至少一个验证码,或至少一个业务数据。反馈结果包括至少一个参考信号的测量结果,验证码对应的反馈码,或指示信息,该指示信息指示终端设备是否接收到业务数据。
在可能的实现方式中,一个参考信号对应一个波束,一个验证码对应一个波束,一个业务数据对应一个波束。
在可能的实现方式中,验证信息中的部分验证信息对应的波束的覆盖区域包括第一位置信息指示的位置区域。
在可能的实现方式中,波束在不同时间所覆盖的区域不同。
在可能的实现方式中,所述方法还包括:终端设备接收第一接入网设备发送的配置信息,该配置信息指示如下的一项或多项:第一接入网设备发送的参考信号的最大个数、第一接入网设备发送的验证码的最大个数,或,第一接入网设备发送的业务数据的最大个数。其中,第一接入网设备向终端设备发送的至少一个参考信号的个数小于或等于最大个数。第一接入网设备向终端设备发送的至少一个验证码的个数小于或等于最大个数。第一接入网设备向终端设备发送的至少一个业务数据的个数小于或等于最大个数。
在可能的实现方式中,所述配置信息包括如下的一项或多项:测量配置信息、接收配置信息、反馈指示信息,或者上报配置信息。其中,测量配置信息包括用于测量所述至少一个参考信号的配置。接收配置信息包括用于指示第一接入网设备发送参考信号或验证码或业务数据的最大个数的信息。反馈指示信息包括指示终端设备反馈所述反馈结果的配置。上报配置信息包括如下的一项或多项:上报方式、上报门限、上报格式,所述上报方式包括周期上报或非周期上报。上报格式也可以理解为上报的内容,或者上报的内容以何种形式实现。
在可能的实现方式中,所述方法还包括:终端设备接收第一接入网设备发送的第一指示信息。其中,第一指示信息指示终端设备的业务被禁止,和/或,该第一指示信息指示禁止终端设备的业务的原因。
关于第二方面以及第二方面的各个可能的实施方式所带来的技术效果,可以参考对第一方面以及第一方面的各个可能的实施方式的技术效果的介绍。
第三方面,本申请实施例提供一种终端设备位置的验证方法,该方法可由第三通信装置执行,第三通信装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片系统。示例性地,所述第三通信装置为核心网设备,或者为设置在核心网设备中的芯片,或者为用于实现核心网设备的功能的其他部件。下面以所述通信设备是核心网设备为例进行描述。该方法包括:
核心网设备接收第一接入网设备发送的第一位置验证信息,并根据反馈结果验证第一位置信息。其中,第一位置验证信息包括终端设备的第一位置信息和终端设备针对第一接 入网设备发送的验证信息的反馈结果。验证信息包括如下的一项或多项:至少一个参考信号、至少一个验证码,或至少一个业务数据。反馈结果包括所述至少一个参考信号的测量结果,验证码对应的反馈码,或指示信息,该指示信息指示终端设备是否接收到业务数据。
在可能的实现方式中,一个参考信号对应一个波束,一个验证码对应一个波束,一个业务数据对应一个波束。
在可能的实现方式中,第一位置验证信息还包括如下的一项或多项:验证信息、验证信息的配置信息、验证信息对应的波束的配置信息、验证信息对应的波束的覆盖范围信息,终端设备的至少一个TA信息、至少一个TA信息对应的卫星位置信息、至少一个TA信息对应的时间信息、至少一个TA信息对应的星历信息,或所述至少一个TA信息对应的小区信息。其中,验证信息和/或配置信息还根据辅助信息确定,该辅助信息包括终端设备当前能测量到的当前服务小区的参考信号的信息。覆盖范围信息指示波束在不同时间的覆盖区域。
在可能的实现方式中,所述方法还包括:核心网设备向第一接入网设备发送第一指示信息。该第一指示信息包括位置验证结果,所述位置验证结果指示第一位置信息指示的位置区域的可信度。
在可能的实现方式中,第一指示信息还指示如下的一项或多项:请求断开终端设备的连接、请求切换终端设备的核心网设备、发起请求的原因,或请求对终端设备进行定位。
关于第三方面以及第三方面的各个可能的实施方式所带来的技术效果,可以参考对第一方面以及第一方面的各个可能的实施方式的技术效果的介绍。
第四方面,本申请实施例提供一种终端设备位置的验证方法,该方法可由第一通信装置执行,第一通信装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片系统。示例性地,所述第一通信装置为第一接入网设备,或者为设置在第一接入网设备中的芯片,或者为用于实现接入网设备的功能的其他部件。下面以所述通信设备是第一接入网设备为例进行描述。该方法包括:
第一接入网设备确定第二位置验证信息,并向第二接入网设备发送第二位置验证信息。该第二位置验证信息包括用于第一接入网设备确定终端设备位置的TA信息。本申请实施例适用于终端设备从第一接入网设备切换到第二接入网设备的场景,可将第二接入网设备看作是终端设备的服务基站,第一接入网设备是第二接入网设备之前为终端设备服务的基站。可以理解的是,终端设备刚接入第二接入网设备,需要经过一段时间,第二接入网设备才可以获得终端设备的多个TA信息,验证终端设备的位置的时间较长。通过本申请实施例的方案,第一接入网设备可将终端设备的历史TA信息告知第二接入网设备,这样第二接入网设备无需等待较长时间,即可获得能够验证终端设备的位置的TA信息,因此可降低验证终端设备的时延。从而可及时禁止终端设备切换到第二接入网设备后的不合法业务。
在可能的实现方式中,第二位置验证信息还包括位置验证结果和第二位置信息。其中,该位置验证结果为第一接入网设备对所述终端设备发送的位置信息的验证结果。第二位置信息指示第一接入网设备所确定的终端设备所在的位置区域。该方案中,第一接入网设备可通过位置验证结果指示所确定的终端设备所在的位置区域是否可信。例如,位置验证结果指示终端设备的位置可信,那么第二接入网设备可确定终端设备所上报的位置可信。
在可能的实现方式中,第二位置验证信息还包括如下的一项或多项:终端设备的至少 一个TA信息、至少一个TA信息对应的卫星位置信息、至少一个TA信息对应的时间信息、至少一个TA信息对应的星历信息、至少一个TA信息对应的小区信息、验证信息,所述验证信息对应的波束的配置信息、所述验证信息对应的波束的覆盖范围信息、所述配置信息,或反馈结果。验证信息包括至少一个参考信号、至少一个验证码或至少一个业务数据。覆盖范围信息指示波束在不同时间的覆盖区域。反馈结果包括至少一个参考信号的测量结果,所述验证码对应的反馈码,或指示信息,该指示信息指示终端设备是否接收到业务数据。
在可能的实现方式中,第二位置验证信息承载于第一接入网设备向第二接入网设备发送的切换请求消息中。该切换请求消息用于请求第二接入网设备为切换准备资源。本申请实施例可适用于终端设备切换服务基站的场景,复用第一接入网设备向第二接入网设备发送的切换请求消息承载第二位置验证信息,可尽量节约信令开销。
第五方面,本申请实施例提供一种终端设备位置的验证方法,该方法可由第二通信装置执行,第二通信装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片系统。示例性地,所述第二通信装置为第二接入网设备,或者为设置在终端设备中的芯片,或者为用于实现第二接入网设备的功能的其他部件。下面以所述通信设备是第二接入网设备为例进行描述。该方法包括:
第二接入网设备接收第一接入网设备发送的第二位置验证信息,并根据第二位置验证信息验证终端设备的位置第二位置验证信息包括用于第一接入网设备确定终端设备位置的TA信息。
在可能的实现方式中,第二位置验证信息包括位置验证结果和第二位置信息。该位置验证结果为第一接入网设备对终端设备发送的位置信息的验证结果。该第二位置信息指示第一接入网设备所确定的终端设备所在的位置区域。
在可能的实现方式中,第二位置验证信息还包括如下的一项或多项:终端设备的至少一个TA信息、至少一个TA信息对应的卫星位置信息、至少一个TA信息对应的时间信息、至少一个TA信息对应的星历信息、至少一个TA信息对应的小区信息、验证信息,所述验证信息对应的波束的配置信息、验证信息对应的波束的覆盖范围信息、所述配置信息,或反馈结果。验证信息包括至少一个参考信号、至少一个验证码或至少一个业务数据。覆盖范围信息指示波束在不同时间的覆盖区域。反馈结果包括至少一个参考信号的测量结果,所述验证码对应的反馈码,或指示信息,该指示信息指示终端设备是否接收到业务数据。
在可能的实现方式中,第二位置验证信息承载于第一接入网设备向第二接入网设备发送的切换请求消息中。该切换请求消息请求第二接入网设备为切换准备资源。
关于第五方面以及第五方面的各个可能的实施方式所带来的技术效果,可以参考对第四方面以及第四方面的各个可能的实施方式的技术效果的介绍。
第六方面,本申请实施例提供了一种通信装置,所述通信装置具有实现上述第一方面至第五方面中一个或多个方面的方法实施例中行为的功能,有益效果可以参见第一方面至第五方面的描述,此处不再赘述。该通信装置可以是第一方面至第五方面中的终端设备,或者该通信装置可以是能够实现第一方面至第五方面中至少一个方面提供的方法的装置,例如芯片或芯片系统。
在一个可能的设计中,该通信装置包括用于执行第一方面至第五方面中至少一个方面的方法的相应手段(means)或模块。例如,所述通信装置:包括处理单元(有时也称为 处理模块或处理器)和/或收发单元(有时也称为收发模块或收发器)。这些单元(模块)可以执行上述第一方面至第五方面中至少一个方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
第七方面,本申请实施例提供一种通信装置,该通信装置可以为上述实施例中第一方面至第五方面中至少一个方面中的通信装置,或者为设置在第一方面至第五方面中至少一个方面中的通信装置中的芯片或芯片系统。该通信装置包括通信接口以及处理器,可选的,还包括存储器。其中,该存储器用于存储计算机程序,处理器与存储器、通信接口耦合,当处理器读取所述计算机程序或指令时,使通信装置执行上述方法实施例中由终端设备、第一接入网设备、第二接入网设备,或者核心网设备所执行的方法。
第八方面,本申请实施例提供了一种通信装置,该通信装置包括输入输出接口和逻辑电路。输入输出接口用于输入和/或输出信息。逻辑电路用于执行第一方面至第五方面中至少一个方面中所述的方法。
第九方面,本申请实施例提供了一种芯片系统,该芯片系统包括处理器,还可以包括存储器和/或通信接口,用于实现第一方面至第五方面中一个或多个方面中所述的方法。在一种可能的实现方式中,所述芯片系统还包括存储器,用于保存计算机程序。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。
第十方面,本申请实施例提供了一种通信系统,所述通信系统包括第一接入网设备、终端设备,其中,第一接入网设备用于执行上述第一方面中由第一接入网设备所执行的方法,终端设备用于执行上述第二方面中由终端设备所执行的方法。或者,所述通信系统包括第一接入网设备、终端设备和核心网设备,其中,第一接入网设备用于执行上述第一方面中由第一接入网设备所执行的方法,终端设备用于执行上述第二方面中由终端设备所执行的方法,核心网设备用于执行上述第三方面中由核心网设备所执行的方法。或者,所述通信系统包括第一接入网设备和第二接入网设备,其中,第一接入网设备用于执行上述第四方面中由第一接入网设备所执行的方法,第二接入网设备用于执行上述第五方面中由第二接入网设备所执行的方法。
第十一方面,本申请提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,当该计算机程序被运行时,实现上述第一方面至第五方面中一个或多个方面中的方法。
第十二方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码被运行时,使得上述第一方面至第五方面中一个或多个方面中的方法被执行。
上述第六方面至第十二方面及其实现方式的有益效果可以参考对第一方面至第五方面及其实现方式的有益效果的描述。
附图说明
图1为基于TA信息确定终端设备的位置的示意图;
图2为终端设备上报的TA与终端设备实际的TA存在误差导致位置估计误差的示意图;
图3为基于TA定位终端设备存在位置估计误差的示意图;
图4为NTN网络(透传模式)的架构示意图;
图5为NTN网络(再生模式)的种架构示意图;
图6为NTN网络(具有ISL)的架构示意图;
图7为NTN网络(网络设备包括DU和CU)的架构示意图;
图8为本申请实施例提供的终端设备位置的第一种验证方法的流程示意图;
图9为本申请实施例提供的终端设备位置的第二种验证方法的流程示意图;
图10为本申请实施例提供的终端设备位置的第三种验证方法的流程示意图;
图11为本申请实施例提供的通信装置的一种结构示意图;
图12为本申请实施例提供的通信装置的另一种结构示意图。
具体实施方式
为便于本领域技术人员理解本申请实施例提供的技术方案,首先对本申请实施例中的部分用语进行解释说明。
本申请实施例中,网络设备是终端设备通过无线方式接入到移动通信系统中的接入设备,例如包括接入网(access network,AN)设备,例如基站。网络设备也可以是指在空口与终端设备通信的设备。网络设备可以包括LTE系统或高级长期演进(long term evolution-advanced,LTE-A)中的演进型基站(evolved Node B)(也简称为eNB或e-NodeB);网络设备也可以包括5G NR系统中的下一代节点B(next generation node B,gNB);或者,网络设备也可以包括无线保真(wireless-fidelity,Wi-Fi)系统中的接入节点等;或者网络设备可以为中继站、车载设备以及未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)设备、D2D网络中的设备、机器到机器(machine to machine,M2M)网络中的设备、物联网(internet of things,IoT)网络中的设备或者PLMN网络中的网络设备等。本申请的实施例对网络设备所采用的具体技术和具体设备形态不做限定。
另外,本申请实施例中的基站可以包括集中式单元(centralized unit,CU)和分布式单元(distributed unit,DU),多个DU可以由一个CU集中控制。CU和DU可以根据其具备的无线网络的协议层功能进行划分,例如分组数据汇聚协议(packet data convergence protocol,PDCP)层及以上协议层的功能设置在CU,PDCP以下的协议层,例如无线链路控制(radio link control,RLC)层和介质访问控制(medium access control,MAC)层等的功能设置在DU。需要说明的是,这种协议层的划分仅仅是一种举例,还可以在其它协议层划分。射频装置可以拉远,不放在DU中,也可以集成在DU中,或者部分拉远部分集成在DU中,本申请实施例不作任何限制。另外,在一些实施例中,还可以将CU的控制面(control plan,CP)和用户面(user plan,UP)分离,分成不同实体来实现,分别为控制面CU实体(CU-CP实体)和用户面CU实体(CU-UP实体)。在该网络架构中,CU产生的信令可以通过DU发送给终端设备,或者UE产生的信令可以通过DU发送给CU。DU可以不对该信令进行解析而直接通过协议层封装而透传给UE或CU。在该网络架构中,将CU划分为无线接入网(radio access network,RAN)侧的网络设备,此外,也可以将CU划分作为核心网(core network,CN)侧的网络设备,本申请对此不做限制。
所述接入网设备还可以是服务器等。例如,车到一切(vehicle to everything,V2X)技术中的网络设备可以为路侧单元(road side unit,RSU)。以下对接入网设备以为基站为例进行说明。基站可以与终端设备进行通信,也可以通过中继站与终端设备进行通信。终端设备可以与不同接入技术中的多个基站进行通信。
本申请实施例中,核心网设备用于实现移动管理,数据处理,会话管理,策略和计费等功能。不同接入技术的系统中实现核心网功能的设备名称可以不同,本申请实施例并不对此进行限定。以5G系统为例,所述核心网设备包括:接入和移动管理功能(access and mobility management function,AMF)、会话管理功能(session management function,SMF)、策略控制功能(policy control function,PCF)或用户面功能(user plane function,UPF)等。
本申请实施例中,终端设备是一种具有无线收发功能的设备,可以向网络设备发送信号,或接收来自网络设备的信号。终端设备可包括用户设备(user equipment,UE),有时也称为终端、接入站、UE站、远方站、无线通信设备、或用户装置等等。所述终端设备用于连接人,物,机器等,可广泛用于各种场景,例如包括但不限于以下场景:蜂窝通信、D2D、V2X、机器到机器/机器类通信(machine-to-machine/machine-type communications,M2M/MTC)、物联网(internet of things,IoT)、虚拟现实(virtual reality,VR)、增强现实(augmented reality,AR)、工业控制(industrial control)、无人驾驶(self driving)、远程医疗(remote medical)、智能电网(smart grid)、智能家具、智能办公、智能穿戴、智能交通、智慧城市(smart city)、无人机、机器人等场景的终端设备。例如,所述终端设备可以是手机(mobile phone)、平板电脑(Pad)、带无线收发功能的电脑、VR终端、AR终端、工业控制中的无线终端、无人驾驶中的无线终端、IoT网络中智能音箱、远程医疗中的无线终端设备、智能电网中的无线终端设备、运输安全中的无线终端设备、智慧城市中的无线终端设备,或智慧家庭中的无线终端设备等等。作为示例而非限定,在本申请的实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备或智能穿戴式设备等,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。而如上介绍的各种终端设备,如果位于车辆上(例如放置在车辆内或安装在车辆内),都可以认为是车载终端设备,车载终端设备例如也称为车载单元(on-board unit,OBU)。本申请的终端设备还可以是作为一个或多个部件或者单元而内置于车辆的车载模块、车载模组、车载部件、车载芯片或者车载单元,车辆通过内置的所述车载模块、车载模组、车载部件、车载芯片或者车载单元可以实施本申请的方法。
本申请实施例中,用于实现网络设备功能的通信装置可以是网络设备,也可以是能够支持网络设备实现该功能的装置,例如芯片系统,该装置可以被安装在网络设备中。在本申请实施例提供的技术方案中,以用于实现网络设备的功能的装置是网络设备为例,描述本申请实施例提供的技术方案。
本申请实施例中,对于名词的数目,除非特别说明,表示“单数名词或复数名词”,即"一个或多个”。“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。例如,A/B,表示:A或B。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),表示:a,b,c,a和b,a和c,b和c,或a和b和c,其中a,b,c可以是单个,也可以是多个。
本申请实施例提及“第一”、“第二”等序数词是用于对多个对象进行区分,不用于限定多个对象的大小、内容、顺序、时序、优先级或者重要程度等。例如,第一位置信息和第二位置信息,可以是同一位置信息,也可以是不同的位置信息,且,这种名称也并不是表 示这两个位置信息指示的位置、优先级或者重要程度等的不同。
如上简单介绍了本申请实施例涉及的技术术语,下面介绍本申请实施例涉及的相关技术方案。
在可能的场景中,终端设备会向接入网设备上报终端设备所在的位置。对于接入网设备而言,可以验证终端设备所上报的位置,从而根据确定结果可执行相应的行为。举例来说,终端设备向接入网设备上报的位置为第一位置区域。但是终端设备实际位于第二位置区域,假设第一业务在第二位置区域不合法,第一业务在第一位置区域合法。如果接入网设备不对终端设备上报的位置进行验证,默认终端设备上报的位置是准确的,那么即使终端设备实际位于第二位置区域,接入网设备也会允许第一业务,会造成网络不安全,网络不合规的问题。
因此,在一些应用场景中,需要验证终端设备的位置。例如,在紧急呼叫路由、公共陆地移动网(public land mobile network,PLMN)的选择,区域业务限制等场景中,需要验证终端设备的位置。有提出基于TA信息验证终端设备的位置。例如,接入网设备可基于终端设备上报的一个或多个TA信息验证终端设备位置。
举例来说,请参见图1,为基于TA信息确定终端设备的位置的示意图。图1包括终端设备和卫星,终端设备相对于卫星的位置不同,终端设备的TA也不同。例如,在T1时刻,终端设备的TA为TA1;在T2时刻,终端设备的TA为TA2;在T3时刻,终端设备的TA为TA3。从图1中可以看出,接入网设备可根据TA1确定圆环1,类似地,接入网设备可根据TA2确定圆环2,根据TA3确定圆环3。终端设备所在位置为圆环1、圆环2和圆环3相交的点。
由于终端设备以时隙为单位上报TA,终端设备上报的TA与实际TA相比存在误差,例如存在1ms误差。因此,接入网设备确定终端设备的位置也存在误差。例如,请参见图2,为终端设备上报的TA与终端设备实际的TA存在误差导致位置估计误差的示意图。图2以卫星在终端设备的正上方为例,如图2所示,假设终端设备实际的TA指示终端设备距离卫星500km。由于终端设备上报TA存在1ms的误差,那么终端设备上报的TA指示终端设备距离卫星为500km+(3×108)m/s×1ms/2=650km。如图2中的(a)所示,接入网设备基于TA确定终端设备的位置与终端设备实际的位置存在415km的误差。可以理解的是,终端设备相对卫星的位置不同,终端设备上报的TA与终端设备实际的TA之间的误差导致的位置估计误差也有所不同。如图2中的(b)所示,终端设备相对于卫星的正下方偏离45°,终端设备实际的TA指示终端设备距离卫星707km,终端设备上报的TA指示终端设备距离卫星857km,此时,终端设备的位置与终端设备实际的位置存在196km的误差。需要说明的是,图2中终端设备距离卫星的各个距离仅是举例示意。
除了TA上报误差导致位置估计误差之外,卫星的运行轨迹也会额外引入位置估计误差。为方便理解,请参见图3,为卫星运行轨道不在终端设备正上方时基于TA定位终端设备存在位置估计误差的示意图。图3以终端设备上报的TA与终端实际的TA相同,即不存在TA误差为例。图3中,TA1为终端设备在时刻1的实际的TA,TA2为终端设备在时刻2的实际的TA。接入网设备基于TA1确定终端设备位于圆环1上,基于TA2确定终端设备位于圆环2上。由于终端设备与卫星的运行轨迹不重合,圆环1和圆环2的交点有两个,而不是一个。因此,无法确定UE在两个交点的哪个交点位置处。可见,基于TA 验证终端设备的位置的误差较大。
鉴于此,提供本申请实施例的方案。在本申请实施例中,接入网设备可以波束的形式向终端设备发送验证信息,如果终端设备接收和/或测量到验证信息,可认为终端设备位于该验证信息所对应的波束的覆盖范围。因此,终端设备可告知接入网设备所接收或所测量的验证信息,从而接入网设备可根据终端设备的反馈结果,确定终端设备的位置范围。相较于,基于TA信息确定终端设备的位置范围,本申请实施例所提供的方法,可提高终端设备的验证精度,即能够更为准确地验证终端设备的位置。
本申请实施例提供的技术方案可以应用于第四代移动通信技术(the 4th generation,4G)系统,5G系统,NTN系统,车到万物(vehicle to everything,V2X),长期演进-车联网(LTE-vehicle,LTE-V),车到车(vehicle to vehicle,V2V),车联网,机器类通信(Machine Type Communications,MTC),物联网(internet of things,IoT),长期演进-机器到机器(LTE-machine to machine,LTE-M),机器到机器(machine to machine,M2M),物联网,或者将来的移动通信系统。
作为一种可能的应用场景,NTN系统可以包括卫星系统。按照卫星高度,即卫星轨位高度,可以将卫星系统分为高椭圆轨道(highly elliptical orbiting,HEO)卫星、GEO卫星、中轨(medium earth orbit,MEO)卫星和低轨(low-earth orbit,LEO)卫星。此外,NTN系统还可以包括高空平台(high altitude platform station,HAPS)通信系统等空中网络设备,本申请涉及的空中网络设备不限于以上举例。
作为一种示例,请参见图4,示出了一种NTN网络的架构示意图。该NTN网络包括第一网络设备、第二网络设备、地面基站、地面核心网以及终端。第一网络设备可以是卫星,例如可为HEO卫星、GEO卫星、MEO卫星或LEO卫星,或HAPS等,这里不作限制。第二网络设备可以是网关(或称地面站、地球站、信关站、关口站)(gateway),可用于连接第一网络设备和基站。一个或多个第一网络设备可以通过一个或多个第二网络设备连接到一个或多个地面基站,在此不做限制。在图4中,第一网络设备的通信模式为透传模式(transparent),即,第一网络设备作为一个模拟射频中继器,实现无线频率转换和放大,可透传或复制基站与终端之间的信号。例如,终端发送的信号可通过第一网络设备透传,第二网络设备转发,进入地面基站。
本申请实施例对第一网络设备的通信模式不作限制。例如,第一网络设备的通信模式也可以是再生模式(regenerative)。请参见图5,示出了NTN网络的另一种架构示意图。在图5中,第一网络设备的通信模式为再生模式,即第一网络设备可以作为无线通信的基站,实现从地面接收的信号的再生,可以理解并且处理这些信号。例如第一网络设备可以是搭载在人造地球卫星或高空飞行器上的基站,例如基站可以为演进型基站(eNB)或5G基站(gNB)等。第二网络设备可转发第一网络设备(即基站)与核心网之间的信令。
需要说明的是,图5仅示出了一个第一网络设备以及一个第二网络设备,在实际使用中,可根据需要采取多个第一网络设备和/或多个第二网络设备的架构。其中,每个第一网络设备可向一个或多个终端提供服务,每个第二网络设备可对应于一个或多个第一网络设备,每个第一网络设备可对应于一个或多个第二网络设备,本申请实施例不予具体限定。
作为一种示例,请参见图6,示出了NTN网络的另一种架构示意图。图6以包括两个第一网络设备和两个第二网络设备为例。两个第一网络设备的通信模式为再生模式,即两个第一网络设备可以作为无线通信的基站。与图5的区别在于,两个第一网络设备之间存 在卫星之间的链路(inter-satellite link,ISL)。该网络架构下,不同第一网络设备可以相互通信,也可以连接到相同的地面核心网。
作为一种示例,第一网络设备还可以作为基站的DU,与地面基站的CU分离,形成CU DU分布式架构。示例性的,请参见图7,示出了NTN网络的另一种架构示意图。图7与图4的不同之处在于,第一网络设备作为基站的DU,可以理解、处理并再生来自地面的信号,而并不仅是透传或者复制,而地面基站仅作为CU。这种网络架构下,终端设备和第一网络设备之间的服务链路可以传输NR-Uu无线接口信号,第一网络设备和第二网络设备之间的馈电链路传输卫星无线接口(satellite radio interface,SRI)信号,在该SRI信号之上,传输DU与CU之间的F1接口信号。
下面结合附图对本申请实施例提供的终端设备位置的验证方法进行详细介绍。在下文的介绍过程中,该方法可以应用于图4-图7所示的任意通信系统。在本申请实施例中,可由接入网设备对终端设备的位置进行验证,也可以由核心网设备对终端设备的位置进行验证。接入网设备,例如可为图4-图7中的第一网络设备和/或地面基站。需要说明的是,本申请实施例只是以图4-图7所示的通信系统为例,并不限制于这种场景。本文中的参考信号可以是信道状态信息参考信号(channel state information reference signal,CSI-RS),可以是同步信号和物理广播信道(physical broadcast channel,PBCH)块(synchronization signal and PBCH block,SSB),或者也可以是其他以波束的形式发送的参考信号,在此并不限定。
请参见图8,为本申请实施例提供的终端设备位置的第一种验证方法的流程示意图。
S801、终端设备向第一接入网设备发送第一位置信息。
终端设备可以向第一接入网设备上报自己所在的位置。例如,终端设备向第一接入网设备发送第一位置信息,该第一位置信息可指示终端设备位于第一位置区域。相应的,第一接入网设备接收终端设备发送的第一位置信息,根据第一位置信息,可确定终端设备位于第一位置区域。例如,第一位置信息可包括第一位置区域的全球定位系统(global positioning system,GPS)坐标。或者,第一位置信息可包括第一位置区域所在的街道地址等。具体第一位置信息包括何种信息,本申请实施例不作限定,只要能够指示第一位置区域即可。
考虑到终端设备上报的第一位置区域与终端设备实际所在的位置区域可能不同。例如,终端设备实际位于第二位置区域,却通知第一接入网设备位于第一位置区域,这种情况下,可将终端设备认为是恶意终端。为避免恶意终端的不合法业务,第一接入网设备可对终端设备上报的第一位置信息进行验证。也就是,验证终端设备上报的位置区域是否可信。关于可信的释义将在下文中具体介绍,此处暂不作说明。
S802、第一接入网设备向终端设备发送验证信息。
验证信息可用于验证第一位置信息是否可信。在本申请实施例中,第一接入网设备可以波束的形式发送验证信息。验证信息与波束具有对应关系。如果终端设备能够接收到该验证信息,可认为,终端设备位于所接收的验证信息对应的波束的覆盖范围内。终端设备将所测量或接收的验证信息对应的波束信息,例如波束ID和/或波束强度等,反馈给第一接入网设备,第一接入网设备根据终端设备反馈的波束信息可验证终端设备上报的位置区域是否可信。
验证信息有多种具体实现形式。示例性的,验证信息可以是参考信号,也可以是验证码,还可以是业务数据等。或者,验证信息也可以包括参考信号、验证码,以及业务数据 中的至少两种。例如,验证信息可包括如下的一项或多项:至少一个参考信号、至少一个验证码,或者至少一个业务数据。其中,一个验证信息可以对应一个波束。例如,一个参考信号对应一个波束,一个验证码对应一个波束,一个业务数据对应一个波束。或者,一个波束可以对应多个验证信息,例如一个波束可以对应多个验证码。或者,一个验证信息也可以对应多个波束,例如一个参考信号对应两个波束。
第一接入网设备接收第一位置信息,可根据第一位置信息确定波束配置信息,该波束配置信息包括第一接入网设备用于发送验证信息的波束配置,例如,发送波束的个数、波束的大小、波束的位置、波束的发射强度、波束的形状等等。需要注意的是,波束配置信息由第一接入网设备使用,不发送给终端设备。
可以理解的是,如果第一接入网设备发送的波束较少,覆盖终端设备的波束也较少,可能无法保证验证终端设备的位置的精度。例如,验证终端设备的位置的精度要求能够验证终端设备位于哪个街道区域,如果第一接入网设备发送一个波束,该波束覆盖的区域为行政区域,根据该波束显然无法将终端设备的位置精确到街道区域。相反,如果第一接入网设备发送多个波束,这多个波束的覆盖区域的交叠区域可能是街道区域,可使得终端设备的位置精确到街道区域。然而第一接入网设备发送较多的波束,相应的,资源开销较大。
为此,在本申请实施例中,第一接入网设备可根据第一位置信息确定波束配置信息,例如确定合适数量的波束,合适方向的波束,以尽量兼顾资源的开销和验证位置的精度。例如,第一接入网设备可确定需要发送的波束是覆盖第一位置区域的多个波束。考虑到第一位置区域可能不可信,第一接入网设备还可以确定发送的波束除了覆盖第一位置区域的波束,还可以包括除覆盖第一位置区域的波束之外的其他波束。
另外,考虑到第一位置信息上报的位置信息可能存在精度误差,也可以认为,第一位置区域存在精度误差。为了尽量节约更多资源或者更为准确地验证终端设备的位置。第一接入网设备还可确定终端设备更为准确的位置,再确定合理的波束配置信息。例如,第一接入网设备可根据第一位置信息和辅助信息确定波束配置信息。该辅助信息可辅助第一接入网设备进一步缩小终端设备所在的位置区域。示例性的,辅助信息可包括终端设备能够测量到的当前服务小区的参考信号的信息,例如,终端设备所在小区的波束信息。例如,终端设备所在的SSB波束ID。其中,辅助信息可以是终端设备之前就上报给第一接入网设备。第一接入网设备可根据辅助信息确定终端设备更为精确的位置,再结合第一位置信息确定波束配置信息。由于第一接入网设备根据辅助信息可确定终端设备更为准确的位置,从而后续所确定的波束配置信息也更为合理。
第一接入网设备根据第一位置信息还可以确定一些配置信息,例如,终端设备测量验证信息的配置、终端设备接收验证信息的配置,终端设备发送针对验证信息的反馈结果的配置等。下面举例介绍配置信息的相关内容,关于第一接入网设备如何根据第一位置信息确定配置信息后续介绍。
配置信息可包括终端设备测量验证信息的配置信息,也称为测量配置信息。例如,该测量配置信息可包括用于测量至少一个参考信号的配置,例如需要测量的参考信号的个数的配置。在一些示例中,配置信息可包括反馈指示信息,该反馈指示信息包括指示终端设备反馈针对验证信息的反馈结果的配置。针对验证信息的反馈结果可指示终端设备所接收的验证信息对应的波束信息。终端设备根据该反馈指示信息可确定是否需要向第一接入网设备发送反馈结果。例如,反馈指示信息指示终端设备发送反馈结果,终端设备接收到该 反馈指示信息,向第一接入网设备发送反馈结果。
配置信息也可包括上报配置信息,该上报配置信息可指示终端设备如何发送反馈结果。例如,该上报配置信息可包括如下的一项或多项,上报方式、上报门限,或上报格式等。上报方式例如为周期上报或非周期上报。终端设备可以根据配置的上报方式发送反馈结果。上报门限,例如包括信号质量门限。例如,终端设备在确定所接收的参考信号的质量大于或等于信号质量门限,终端设备发送的反馈结果包括该参考信号信息和/或对应的波束信息,例如参考信号ID和/或波束ID;相反,如果终端设备所接收的参考信号的质量小于或等于信号质量门限,终端设备发送的反馈结果不包括该参考信号信息和对应的波束信息。上报格式可指示终端设备需要发送的反馈结果的内容或形式。举例来说,验证信息为参考信号,反馈结果可包括终端设备测量到的参考信号的ID、测量到的参考信号对应的帧号或子帧号或符号,或者波束的标识ID等一种或多种。可以理解的是,参考信号的ID与波束的ID具有对应关系。或者,反馈结果也可以包括参考信号的强度。如果验证信息为验证码,反馈结果可包括终端设备接收到的验证码对应的反馈码。验证码对应的反馈码可以是验证码本身,或者反馈码可以是验证码中的一部分。如果验证信息为业务数据,反馈结果可以为指示信息,指示终端设备是否接收到业务数据,例如ACK或NACK指示信息。
配置信息也可包括接收配置信息,该接收配置信息可指示第一接入网设备发送验证信息的最大个数。例如,接收配置信息包括第一接入网设备发送参考信号、验证码或业务数据等的最大个数。终端设备可根据该接收配置信息确定第一接入网设备最多发送多少个验证信息。
第一接入网设备可以根据第一位置信息确定如上的一种或多种配置信息,也可以根据第一位置信息和辅助信息确定如上的一种或多种配置信息。例如,第一接入网设备可确定接收配置信息,即确定第一接入网设备发送验证信息的最大个数。类似的,第一接入网设备也可以根据第一位置信息确定验证信息,或者,根据第一位置信息和辅助信息确定验证信息。例如,确定参考信号的数量、验证码的数量、业务数据的数量等。
第一接入网设备确定配置信息之后,可以向终端设备发送如上的一种或多种配置信息。需要说明的是,如上的一种或多种配置信息也可以是预先定义或者配置的,这种情况下,第一接入网设备也可以不向终端设备发送如上的一种或多种配置信息,在图8中以虚线示意。
可以理解的是,第一接入网设备为基站的DU和CU分离架构时,CU接收终端设备发送的第一位置信息。可由CU根据第一位置信息确定波束配置信息和/或配置信息,也可以由DU确定波束配置信息和/或配置信息。例如,CU可将第一位置信息发送给DU,由DU根据第一位置信息确定波束配置信息和/或配置信息。若由CU确定配置信息,CU确定配置信息之后,可以将配置信息发送给终端设备,也可以将配置信息发送给DU。DU接收配置信息之后,将该配置信息发送给终端设备。若由DU确定配置信息,DU确定配置信息之后,可将配置信息发送给终端设备,也可以将配置信息发送给CU。CU接收到配置信息,将该配置信息发送给终端设备。
第一接入网设备确定验证信息之后,向终端设备发送验证信息。在本申请实施例中,第一接入网设备以波束的形式发送验证信息,也可以理解为,第一接入网设备发送波束。具体来讲,第一接入网设备可以根据确定的配置信息发送验证信息。通常来讲,第一接入网设备发送验证信息的个数与第一接入网设备配置发送验证信息的最大个数相同。即第一 接入网设备配置发送验证信息的最大个数为N,第一接入网设备发送N个验证信息。第一接入网设备配置发送验证信息的最大个数,也可以理解为,第一接入网设备指示终端设备需要测量(验证信息)的个数。
第一接入网设备发送的验证信息中的部分验证信息对应的波束的覆盖区域包括第一位置区域。也就是说,第一接入网设备发送给终端设备的验证信息,终端设备不一定都可以测量或者接收到。举例来说,第一接入网设备发送以8个波束发送8个验证信息,其中,一个波束发送一个验证信息。这8个波束中的3个波束覆盖终端设备,其余的5个波束并不覆盖终端设备。由于第一接入网设备确定哪些波束覆盖第一位置区域,因此通过该方案可以防止终端虚假上报测量结果。例如,编号为4的参考信号对应的波束的覆盖区域并不能覆盖终端设备上报的第一位置区域。若终端设备上报的反馈结果表明测量到了编号为4的参考信号,第一接入网设备则可以认为终端设备虚假上报反馈结果。
考虑到终端设备可能接收不到第一接入网设备发送的部分验证信息。例如,第一接入网设备配置发送验证信息的最大个数为8。以一个验证信息对应一个波束为例,如果这8个验证信息对应的8个波束中有3个波束覆盖终端设备,另外的5个波束没有覆盖终端设备。第一接入网设备认为即使发送了这5个波束,终端设备也接收不到。因此,在本申请实施例中,第一接入网设备实际发送的验证信息的个数可以少于第一接入网设备配置的发送验证信息的最大个数,从而尽量节约资源开销。例如,第一接入网设备配置的发送参考信号的最大个数为N,第一接入网设备实际向终端设备发送的至少一个参考信号的个数为M,M小于N。同理,第一接入网设备发送的验证码的最大个数为P,第一接入网设备实际向终端设备发送的至少一个验证码的个数为Q,Q小于P。第一接入网设备发送的业务数据的最大个数为L,第一接入网设备实际向终端设备发送的至少一个业务数据的个数为K,K小于L。由于第一接入网设备发送更少的波束,所以可降低干扰。同时,还可节省更多的资源,用于其他终端设备的数据传输等,以提高系统性能。
在可能的实现方式中,波束是时变的,也就是,同一个波束在不同时间所覆盖的区域不同。针对同一位置区域,需要不同时刻使用的不同的波束来覆盖。以验证信息是参考信号为例,针对同一位置区域,第一接入网设备在不同时刻可采用不同的波束发送不同的参考信号,即能覆盖该位置区域的参考信号的编号是变化的。例如,在T1时刻,编号为2的参考信号能覆盖终端设备上报的第一位置区域,而编号为4的参考信号则不能。到了T2时刻,编号为4的参考信号能覆盖第一位置区域,而编号为2的参考信号则不能。也就是说,终端设备在某些测量周期不能测量到某个参考信号。例如,在T1时刻,终端设备测量不到编号为4的参考信号。在不同的测量周期,终端设备能测量到的参考信号集合是不同的,例如,在T1时刻,终端设备能测量到编号为2的参考信号,在T2时刻,终端设备能测量到编号为4的参考信号。同理,如果验证信息为验证码(业务数据),第一接入网设备在不同时刻使用不同的验证码(业务数据)。由于波束是时变的,在不同的测量周期,终端设备能测量到的波束集合是不同的,从而可提高对终端设备位置验证的可靠性。同时,增加了终端设备虚假上报反馈结果的难度,即降低终端设备虚假上报反馈结果的可能性。
可以理解的是,第一接入网设备为基站的DU和CU分离架构时,DU配置波束,且DU以波束的形式向终端设备发送验证信息。其中,DU配置波束所使用的波束配置信息可由CU确定,也可以由DU确定。CU确定该波束配置信息之后,将该波束配置信息发送给DU。
S803、终端设备向第一接入网设备发送反馈结果。
第一接入网设备发送验证信息,如果终端设备接收到验证信息,那么终端设备可向第一接入网设备发送针对该验证信息的反馈结果。反馈结果可指示终端设备接收到对应的验证信息,从而第一接入网设备可确定终端设备接收到哪些波束,进而根据这些波束的覆盖区域验证终端设备的位置。
可以理解的是,反馈结果与验证信息是相对而言的。如果验证信息是参考信号,反馈结果为参考信号的测量结果,例如参考信号的强度、参考信号的ID,或者参考信号对应的波束ID等。如果验证信息是验证码,反馈结果可为验证码对应的反馈码。该反馈码与验证码具有关联关系。示例性的,反馈码可以是验证码,或者,该反馈码也可以是验证码的一部分,例如,反馈码可以是验证码中的前几位,或者,反馈码可以是验证码中的后几位。或者,反馈码也可以是与验证码具有对应关系的码字。例如,反馈码可以是验证码和预设取值之和,等等。如果验证信息是业务数据,反馈结果可以指示终端设备是否接收到业务数据的指示信息。例如,针对业务信息的确认(acknowledge,ACK)或否定确认(no acknowledge,NACK)。需要说明的是,第一接入网设备接收到终端设备针对业务数据发送的ACK,后续第一接入网设备可继续向终端设备发送业务数据,以尽量保证业务的正常进行。如果第一接入网设备接收到终端设备针对某个波束上的业务数据的NACK,说明终端设备不在该波束覆盖范围内。但是第一接入网设备仍然可以向第一位置区域发送业务数据,以尽量保证业务的正常进行。
可以理解的是,终端设备可根据上报配置信息向第一接入网设备发送反馈结果。相应的,第一接入网设备接收终端设备发送的反馈结果。例如,上报配置信息指示的上报方式为周期上报,那么终端设备周期性地向第一接入网设备发送反馈结果。又例如,上报配置信息指示终端设备上报测量参考信号的帧号。终端设备可向第一接入网设备发送所测量或接收的验证信息对应的帧号。另外,如果第一接入网设备以基站的CU和DU分离架构的形式实现,终端设备可将反馈结果发送给DU或CU。
S804、第一接入网设备根据反馈结果验证第一位置信息。
反馈结果可指示终端设备所接收的验证信息对应的波束,也可以认为,反馈结果可指示终端设备所接收的波束。从而第一接入网设备根据反馈结果指示的波束的覆盖区域可验证终端设备所在的位置区域。例如,反馈结果指示3个波束,那么第一接入网设备可确定终端设备位于这3个波束分别覆盖的区域的重叠区域,例如第二位置区域。即反馈结果可间接指示终端设备位于第二位置区域。
第一接入网设备可比较第一位置区域和第二位置区域,从而确定位置验证结果。该位置验证结果可指示第一位置信息是否可信。第一位置信息是否可信可通过第一位置信息指示的位置区域的可信度来表征,也可以认为,位置验证结果可指示第一位置信息指示的位置区域的可信度。第一接入网设备验证第一位置信息是否可信,也就是,确定第一位置信息指示的位置区域的可信度。需要说明的是,可信度和验证精度具有关联关系。例如,一个地理区域的网络监管要求的位置区域验证精度为街道级别,则用于位置验证的第二位置区域也应达到街道级别。如果终端设备上报的第一位置区域的精度更高,例如精确到了某小区,且该小区在第二位置区域的街道内,可认为第一位置区域以街道级别的验证精度来说是可信。如果终端设备上报的第一位置区域的精度更低,例如是行政区域级别,第二位置区域是街道级别,可认为终端设备上报的位置区域不符合精度要求。这种情况下,第一 接入网设备可以根据精度要求,在第一位置区域中进一步确定终端设备当前所在位置,进而确定终端设备在当前位置内的服务是否合法。或者,当终端设备上报的位置区域不符合精度要求,第一接入网设备可认为终端设备上报的位置区域以街道级别的验证精度来说是不可信的。
如果第一位置区域位于第二位置区域内,可认为第一位置区域可信,相应的,可信度为100%。相反,如果第一位置区域与第二位置区域无重叠区域,可认为第一位置区域不可信,相应的,可信度为0%。如果第一位置区域和第二位置区域有重叠区域,可根据重叠区域在第一位置区域的占比可确定可信度。在一些示例中,位置验证结果可包括第一位置信息指示的位置区域的可信度。在一些示例中,位置验证结果可指示第一位置区域是否可信。例如,位置验证结果为1比特信息,该1比特的取值为“0”,指示第一位置区域可信,相应的,该1比特的取值为“1”,指示第一位置区域不可信。或者,该1比特的取值为“1”,指示第一位置区域可信,相应的,该1比特的取值为“0”,指示第一位置区域不可信。
需要说明的是,上述方法以第一接入网设备确定第二位置区域,再通过对比第一位置区域和第二位置区域验证第一位置区域是否可信为例。在可能的实现方式中,第一接入网设备实现无需确定第二位置区域,例如,可通过机器学习的方法,以第一位置信息、验证信息以及反馈结果为输入,第一信息位置是否可信为输出建立反馈结果和第一位置信息是否可信的对应关系。这种情况下,第一接入网设备无需先确定第二位置区域,可根据反馈结果直接验证第一位置信息是否可信。当然,反馈结果和第一位置信息是否可信的对应关系不限于模型的对应关系,也可以是表格的对应关系,本申请实施例对此不做限定。
可以理解的是,第一接入网设备以基站的DU和CU分离架构的形式实现时,位置验证结果可由CU或DU确定。例如,CU接收反馈结果,可确定位置验证结果,或者,CU可将反馈结果发送给DU,由DU确定位置验证结果。又例如,DU接收反馈结果,可确定位置验证结果,或者,DU可将反馈结果发送给CU,由CU确定位置验证结果。可以理解的是,如果位置验证信息由DU确定,若终端设备上报第一位置信息给CU,则还需CU将终端设备上报的第一位置信息发送给DU。
S805、第一接入网设备向终端设备发送第一指示信息。
如果第一接入网设备确定第一位置区域不可信,那么第一接入网设备可禁止终端设备的业务,以减少不合法业务。这种情况下,第一接入网设备可以禁止终端设备的业务。例如,第一接入网设备释放终端设备。另外,第一接入网设备可通知终端设备,第一接入网设备禁止了终端设备的业务。例如,第一接入网设备向终端设备发送第一指示信息,该第一指示信息指示终端设备的业务被禁止。终端设备接收第一接入网设备发送的第一指示信息,可明确业务被禁止。进一步地,第一指示信息还可指示禁止终端设备的业务的原因,从而终端设备可根据该业务确定后续的行为。例如,如果业务的合法性与位置区域关联,终端设备确定业务由于位置区域受限不被允许,那么后续终端设备可在该业务允许的位置区域进行该业务。
需要说明的是,终端设备的业务被禁止,也可以认为,该终端设备被释放。第一指示信息指示终端设备的业务被禁止,也可以理解为,第一指示信息指示终端设备被释放。同理,第一指示信息指示禁止终端设备的业务的原因,也可以理解为,第一指示信息指示终端设备被释放的原因。
在可能的实现方式中,第一接入网设备可以触发NG接口切换过程,以将终端设备连 接到另一核心网设备,例如,另一AMF。例如当第一接入网设备根据第二位置区域确定终端设备发生了跨国家移动时,第一接入网设备可以触发NG接口切换过程,使得终端设备接入第二位置区域对应的国家对应的AMF。切换过程与现有技术相同,此处不再赘述。
可以理解的是,如果第一位置信息指示的位置区域可信,那么第一接入网设备无需发送第一指示信息。因此,S805是可选的步骤,在图8中以虚线进行示意。
可以理解的是,第一接入网设备以CU和DU分离的架构实现时,若DU确定可信度,DU可以生成对应的第一指示信息,并发送给终端设备。或者,DU将可信度发给CU,由CU生成第一指示信息,CU发送给终端设备。若CU确定可信度,CU可以生成对应的第一知识信息,并发送给终端设备。或者,CU将可信度发给DU,由DU生成第一指示信息,DU发给对应的终端设备。
S806、第一接入网设备向核心网设备发送第二指示信息。
第二指示信息可包括位置验证结果。第一接入网设备确定位置验证结果之后,可将该位置验证结果发送给核心网设备。如果该位置验证结果指示第一位置区域不可信,核心网设备可禁止终端设备的业务,例如核心网设备释放终端设备。可选地,第一接入网设备在确定第一位置区域不可信时,将第二指示信息发送给核心网设备。如果第一位置区域可信,第一接入网设备无需向核心网设备发送第二指示信息。因此,S806是可选的步骤,在图8中以虚线进行示意。
如果第一位置区域不可信,第一接入网设备还可以请求核心网设备释放终端设备。例如,第二指示信息还可包括请求核心网设备释放终端设备的信息。核心网设备根据第二指示信息可确定释放终端设备。第一接入网设备也可以触发NG接口切换过程,请求核心网设备将终端设备切换到另一核心网设备。例如,第二指示信息还可以包括请求切换NG接口的信息。由于第一位置区域不可信,第一接入网设备也可以请求核心网设备对终端设备进行定位,以更新终端设备的位置。例如,第二指示信息还可以包括请求核心网设备对终端设备进行定位的信息。进一步地,第一接入网设备可告知核心网设备,第一接入网设备发起请求的原因。例如,第二指示信息可包括用于指示发起请求的原因的信息。在可能的实现方式中,第二指示信息可包括如上的一种或多种信息。也可以理解为,第二指示信息还可以指示如下的一项或多项:请求断开终端设备的连接,请求切换终端设备的核心网设备,发起请求的原因,或请求对终端设备进行定位。
可以理解的是,第一接入网设备以CU和DU分离的架构实现时,如果CU确定可信度,则CU可以确定第二指示信息,并将第二指示信息发送给核心网设备。如果DU确定可信度,DU可将所确定的可信度发送给CU,CU根据可信度确定第二指示信息,再将第二指示信息发送给核心网设备。
需要说明的是,本申请实施例对S805和S806的执行顺序不作限制。即S805可在S806之前执行,或者,S805在S806之后执行,又或者,S805和S806可同时执行。
本申请实施例中,第一接入网设备利用波束向终端设备发送用于验证终端设备的位置的验证信息,例如,至少一个参考信号,至少一个验证码,或者至少一个业务数据等。从而根据终端设备针对验证信息的反馈结果,即接收到的验证信息对应的波束来验证终端设备上报的位置区域。当第一接入网设备确定终端设备上报的位置区域不可信,可禁止终端设备的业务,减少了不合法业务。也可以认为,本申请实施例可识别恶意上报错误位置的终端设备,进而采取对应措施(例如禁止业务),以尽量保证网络安全。通过本申请实施 例可提供符合网络监管要求的服务,例如,合法拦截(lawful intercept),紧急通信(emergency communications),公共警告(public warning service)等。
图8所示的流程由第一接入网设备验证终端设备上位的位置为例。在可能的实现方式中,可由核心网设备验证终端设备上报的位置是否可信。
请参见图9,为本申请实施例提供的终端设备位置的第二种验证方法,该方法的流程描述如下。
S901a、终端设备向第一接入网设备发送第一位置信息。
S901a的实现与S801的实现相同,具体可参考S801的相关内容的介绍,此处不再赘述。
S901b、第一接入网设备向核心网设备发送第一位置信息。
第一接入网设备接收第一位置信息之后,可将该第一位置信息发送给核心网设备,由核心网设备对第一位置信息进行验证。其中,第一接入网设备可以将第一位置信息透传给核心网设备,也可以解析第一位置信息,对第一位置信息处理以后发送给核心网设备。
可以理解的是,第一接入网设备以CU和DU分离的架构实现时,第一接入网设备可通过CU接收并解析该第一位置信息,然后发送给核心网设备。或者,第一接入网设备也可以通过DU接收第一位置信息,并透传给CU,CU再将第一位置信息透传给核心网设备。
S902、第一接入网设备向终端设备发送验证信息。
S902的实现与S802的实现相同,具体可参考S802的相关内容的介绍,此处不再赘述。
S903、第一接入网设备接收终端设备发送的反馈结果。
S903的实现与S803的实现相同,具体可参考S803的相关内容的介绍,此处不再赘述。
S904、第一接入网设备向核心网设备发送第一位置验证信息。
该第一位置验证信息可用于核心网设备验证第一位置信息。第一位置验证信息可包括终端设备针对验证信息的反馈结果。例如,第一接入网设备接收到终端设备发送的反馈结果之后,可将该反馈结果发送给核心网设备,由核心网设备根据第一位置信息和反馈结果验证第一位置信息。
第一位置验证信息还可以包括辅助核心网设备验证第一位置信息的内容。例如,第一位置验证信息还可以包括第一接入网设备发送给终端设备的配置信息,例如,测量配置信息、接收配置信息、上报配置信息等。如上的配置信息的具体实现可参考前述S802的相关内容,此处不再赘述。可以理解的是,核心网设备并不知道波束覆盖哪些区域,因此无法确定终端设备的位置。在一些示例中,第一位置验证信息还可以包括验证信息对应的波束的覆盖范围信息,该覆盖范围信息可指示第一接入网设备在不同时间的不同波束覆盖的区域范围。第一接入网设备通过覆盖范围信息将波束覆盖的区域告知核心网设备,从而核心网设备可以验证终端设备的位置。在一些实施例中,覆盖范围信息可以指示特定波束在不同时间的覆盖区域。特定波束包括终端设备测量到和/或接收到的验证信息对应的波束。也就是,终端设备没有测量到和/或接收到的波束覆盖范围信息无需发送给核心网设备,尽量减少传输数据量。
在另一些示例中,第一位置验证信息还可以包括验证信息,验证信息的配置信息,验证信息对应的波束配置信息、终端设备的至少一个TA信息、至少一个TA信息对应的卫星位置信息、至少一个TA信息对应的时间信息、至少一个TA信息对应的星历信息,或至少一个TA信息对应的小区信息等。可以理解的是,TA信息可指示终端设备的时间提前 量。本申请实施例对TA信息的具体实现形式不作限制。例如,TA信息可以是TA值,也可以是用于计算TA的终端设备的位置信息等。TA信息对应的卫星位置信息可指示终端设备的时间提前量对应的卫星位置。TA信息对应的时间信息可指示终端设备的时间提前量对应的时间。TA信息对应的星历信息可指示终端设备的时间提前量对应的卫星的星历。TA信息对应的时间信息和TA信息对应的星历信息配合使用可确定不同时间对应的星历。TA信息对应的小区信息包括终端设备的时间提前量对应的小区配置,例如小区参考点,小区半径,小区形状等。
需要说明的是,第一位置验证信息包括的部分信息可以提前发送给核心网设备,例如,第一接入网设备在接收到针对验证信息的反馈结果之前,第一接入网设备可将部分配置信息等发送给核心网设备。当然,第一接入网设备也可以将反馈结果和部分配置信息等一起发送给核心网设备。或者,第一接入网设备也可以将终端设备发送的反馈结果透传给核心网设备,第一接入网设备可在任意时间将第一位置验证信息中除反馈结果之外的信息发送给核心网设备。另外,第一接入网设备可向核心网设备发送第一位置信息和反馈结果,也可以向核心网设备发送第一位置信息。若第一接入网设备向核心网设备发送第一位置信息,第一接入网设备还可以向核心网设备发送对反馈结果处理之后的信息。例如,第一接入网设备接收终端设备发送的反馈结果之后,对该反馈结果进行处理之后,形成反馈结果指示的波束的覆盖范围信息,再发送给核心网设备。对于核心网设备来说,尽管接收的是第一接入网设备对反馈结果处理之后的信息,但是根据该信息可确定反馈结果。
需要说明的是,第一位置验证信息包括的验证信息中,部分验证信息对应的波束的覆盖区域包括第一位置区域。对于核心网设备来说,接收反馈结果之后,可以根据波束的覆盖范围信息确定终端设备是否虚报反馈结果。
当第一接入网设备以CU和DU分离的架构实现时,第一位置验证信息由CU发送给核心网设备。例如,第一接入网设备可通过DU接收反馈结果,并确定第一位置验证信息,将该第一位置验证信息发送给CU,再由CU将第一位置验证信息发送给核心网设备。又例如,第一接入网设备可通过DU接收反馈结果,DU将反馈结果发送给CU,CU根据接收的反馈结果确定第一位置验证信息,再将第一位置验证信息发送给核心网设备。又例如,第一接入网设备通过CU接收反馈结果,并确定第一位置验证信息,再将第一位置验证信息发送给核心网设备。
S905、核心网设备根据反馈结果验证第一位置信息。
核心网设备根据反馈结果验证第一位置信息的具体实现与第一接入网设备根据反馈信息验证第一位置信息的具体实现类似,具体可参考前述S804的相关内容,此处不再赘述。
S906、核心网设备向第一接入网设备发送第三指示信息。
第三指示信息可包括位置验证结果。核心网设备确定位置验证结果之后,可将该位置验证结果发送给第一接入网设备。如果该位置验证结果指示第一位置区域不可信,核心网设备可禁止终端设备的业务,例如核心网设备释放终端设备。可选地,核心网设备在确定第一位置区域不可信时,将第三指示信息发送给第一接入网设备。如果第一位置区域可信,核心网设备无需向第一接入网设备发送第三指示信息。因此,S906是可选的步骤,在图9中以虚线进行示意。
如果第一位置区域不可信,核心网设备还可以请求第一接入网设备释放终端设备。例 如,第三指示信息还可包括请求第一接入网设备释放终端设备的信息。第一接入网设备根据第三指示信息可确定释放终端设备。核心网设备也可以请求第一接入网设备发起NG接口切换过程,以将终端设备连接到其他核心网设备。例如,第三指示信息还可以包括请求第一接入网设备发起切换NG接口的信息。进一步地,核心网设备可告知第一接入网设备,核心网设备发起请求的原因。例如,第三指示信息可包括用于指示发起请求的原因的信息。在可能的实现方式中,第三指示信息可包括如上的一种或多种信息。也可以理解为,第三指示信息还可以指示如下的一项或多项:请求断开终端设备的连接,请求切换终端设备的核心网设备,发起请求的原因。
S907、第一接入网设备向终端设备发送第一指示信息。
S907的具体实现同S805的具体实现,具体可参考前述S805的相关内容,此处不再赘述。
可以理解的是,在图9所示的流程中,第一接入网设备也可以以DU和CU分离架构的形式实现。这种情况下,核心网设备发送第三指示信息,CU可接收该第三指示信息。CU接收第三指示信息,确定向终端设备发送第一指示信息,CU可将第一指示信息发送给DU,由DU将第一指示信息发送给终端设备。或者,CU可将第三指示信息发送给DU,DU确定向终端设备发送第一指示信息,并将第一指示信息发送给终端设备。
本申请实施例中,第一接入网设备利用波束向终端设备发送用于验证终端设备的位置的验证信息,接收到据终端设备针对验证信息的反馈结果。可将终端设备的位置信息和反馈结果发送给核心网设备。从而由核心网设备对终端设备上报的位置进行验证。同样在确定终端设备上报的位置区域不可信时,可禁止终端设备的业务,减少了不合法业务。即可识别恶意上报错误位置的终端设备,进而采取对应措施(例如禁止业务),以尽量保证网络安全。通过本申请实施例可提供符合网络监管要求的服务,例如,合法拦截(lawful intercept),紧急通信(emergency communications),公共警告(public warning service)等。同时,识别恶意上报错误位置的终端设备,采取对应措施保证网络安全。另外,由核心网设备验证终端设备的位置,有助于保住用户隐私。
可以理解的是,由于终端设备的移动性,为保证通信的连续性,需要终端设备从源基站切换到目标基站。在基于TA信息确定终端设备的位置过程中,由于终端设备刚接入第二接入网设备时,需要经过一段时间,第二接入网设备才可以获得终端设备的多个TA信息。也就是说,终端设备刚接入第二接入网设备时,第二接入网设备缺少可供参考的历史TA信息,需要经过较长时间获取终端设备的多个TA信息,验证终端设备的位置的时间较长,降低了位置验证的效率。
为此,本申请实施例提供了终端设备位置的第三种验证方法,该方法适用于终端设备的切换场景,例如,终端设备从一个接入网设备切换到另一个接入网设备。为方便描述,下文以终端设备从第一接入网设备切换到第二接入网设备为例。
请参见图10,为本申请实施例提供的终端设备位置的第三种验证方法的流程示意图。该方法以基于TA信息验证终端设备的位置为例。
S1001、终端设备向第一接入网设备发送TA信息。
终端设备可将TA信息发送给第一接入网设备,相应的,第一接入网设备接收该TA信息。终端设备可向第一接入网设备发送一个或多个TA信息。
需要说明的,终端设备上报的TA信息可以是终端设备到卫星的TA信息和卫星到第 一接入网设备的TA信息的叠加信息。例如,终端设备上报的TA信息包括终端设备到卫星之间的TA值与卫星到基站的TA值之和。卫星到第一接入网设备的TA信息可以是第一接入网设备配置给终端设备的。或者,卫星到第一接入网设备的TA信息可以是终端设备根据第一接入网设备的配置和/或相关协议计算出来的。可以理解的是,终端设备到卫星之间的TA信息可用于验证终端设备的位置。如果终端设备上报的TA信息是上述两种TA信息的叠加信息,第一接入网设备需要从该叠加信息中获取终端设备到卫星之间的TA信息。本申请实施例对第一接入网设备如何从叠加信息中获取终端设备到卫星之间的TA信息不作限制。例如第一接入网设备可以通过内部算法实现从叠加信息中获取终端设备到卫星之间的TA信息。当然,终端设备上报的TA信息可以是终端设备到卫星之间的TA信息,这种情况下,第一接入网设备可使用终端设备到卫星之间的TA信息验证终端设备的位置。若无特殊说明,用于验证终端设备的位置的TA信息指的是终端设备到卫星的TA信息。
S1002、第一接入网设备根据TA信息验证终端设备所在的位置区域。
第一接入网设备根据所接收的一个或多个TA信息可确定终端设备位于哪个位置区域。第一接入网设备基于TA信息确定终端设备的位置的原理可参考前述图1实施例相关的内容,此处不再赘述。可以理解的是,在步骤S1002之前,终端设备已经向第一接入网设备上报了终端设备所在的位置区域。
可选地,第一接入网设备以基站的CU和DU分离架构的形式实现,第一接入网设备可通过CU或DU验证终端设备所在的位置区域。例如,第一接入网设备可通过DU接收终端设备发送的TA信息,验证终端设备所在的位置区域。又例如,第一接入网设备可通过DU接收终端设备发送的TA信息,DU将所接收的TA信息发送给CU,由CU根据所接收的TA信息验证终端设备所在的位置区域。或者,第一接入网设备可通过CU接收终端设备发送的TA信息,CU验证终端设备所在的位置区域。应理解,如果DU验证终端设备所在的位置区域,若终端设备上报位置信息给CU,CU应该把终端设备的位置信息发送给DU。
S1003、第一接入网设备向第二接入网设备发送第二位置验证信息。
第一接入网设备为终端设备的服务基站,第二接入网设备可认为终端设备要切换到的目标基站。第二位置验证信息可用于辅助第二接入网设备验证终端设备所在的位置区域。例如,第二位置验证信息可包括用于确定终端设备位置的TA信息。第二接入网设备可根据所接收的TA信息验证终端设备的位置。由于第一接入网设备提前将终端设备的历史TA信息告知第二接入网设备,这样第二接入网设备无需等待较长时间,即可获得能够验证终端设备的位置的TA信息,因此可降低验证终端设备的时延。从而可及时禁止终端设备切换到第二接入网设备后的不合法业务。
需要说明的,第二位置验证信息所包括的TA信息可以是终端设备到卫星的TA信息,也可以是终端设备到卫星的TA信息和卫星到第一接入网设备的TA信息的叠加信息。如果第二位置验证信息所包括的TA信息是终端设备到卫星的TA信息和卫星到第一接入网设备的TA信息的叠加信息,第一接入网设备还应向第二接入网设备发送能够从叠加信息中获取终端设备到卫星的TA信息的辅助信息。例如,第一接入网设备还向第二接入网设备发送卫星到第一接入网设备的TA信息,从而第二接入网设备可根据卫星到第一接入网设备的TA信息从叠加信息中获取终端设备到卫星的TA信息。在透传模式和再生模式的NTN架构中,卫星到接入网设备的TA信息可以为空,也可以非空,本申请实施例对此不 做限定。
第二位置验证信息还可包括位置验证结果和第二位置信息。其中,第二位置信息可指示第一接入网设备所确定的终端设备所在的位置区域。例如,第二位置信息可以是第一位置信息,也就是,第一接入网设备将终端设备上报的位置信息转发给第二接入网设备。又例如,第二位置信息也可以不同于第一位置信息,例如,第一接入网设备确定终端设备位于第二位置区域,第二位置信息可指示第二位置区域。位置验证结果为第一接入网设备对终端设备发送的第一位置信息的验证结果。该位置验证结果可以由第一接入网设备通过前述图8或图9所示的流程获得。
第二位置验证信息还可包括如下的一项或多项:终端设备的至少一个TA信息、至少一个TA信息对应的卫星位置信息、至少一个TA信息对应的时间信息、至少一个TA信息对应的星历信息、至少一个TA信息对应的小区信息、验证信息、验证信息对应的波束的配置信息、验证信息对应的波束的覆盖范围信息,该覆盖范围信息指示波束在不同时间的覆盖区域、配置信息,或反馈信息。其中,至少一个TA信息对应的小区信息,例如包括小区参考点、小区半径、小区形状等。由于基于TA信息确定的区域可能超出小区的范围,而至少一个TA信息对应的小区信息可将终端设备的位置区域限定基于TA信息确定的区域落在小区内,从而可提高验证终端设备的精度。
在可能的实现方式中,第二位置验证信息承载于第一接入网设备向第二接入网设备发送的切换请求消息中。该切换请求消息用于请求第二接入网设备为切换准备资源。本申请实施例可适用于终端设备切换服务基站的场景,复用第一接入网设备向第二接入网设备发送的切换请求消息承载第二位置验证信息,可尽量节约信令开销。
S1004、终端设备切换到第二接入网设备。
终端设备可切换到第二接入网设备。终端设备切换到第二接入网设备的流程是现有技术,此处不作详细介绍。终端设备切换到第二接入网设备之后,可向第二接入网设备上报终端设备的位置,例如终端设备可向第二接入网设备发送第二位置信息,该第二位置信息可指示终端设备所在的位置区域。终端设备切换到第二接入网设备之后,还可以向第二接入网设备上报终端设备的TA信息,以辅助第二接入网设备验证第二位置信息。例如,第二接入网设备可根据来自第一接入网设备的TA信息以及来自终端设备的TA信息验证第二位置信息。
S1005、第二接入网设备根据第二位置验证信息验证终端设备的位置。
第二接入网设备接收第二位置验证信息,可根据终端设备的历史TA信息,验证第二位置信息。例如,第二接入网设备可根据第二位置验证信息中的终端设备的历史TA信息确定终端设备所在的位置区域,将该位置区域与第二位置信息指示的位置区域进行比较,从而确定终端设备的位置是否可信。或者,第二接入网设备可根据第二位置验证信息中的终端设备的历史TA信息以及终端设备发送的TA信息确定终端设备所在的位置区域,将该位置区域与第二位置信息指示的位置区域进行比较,从而确定终端设备的位置是否可信。
如果第一接入网设备将位置验证结果和对应的终端设备上报的位置信息发送给第二接入网设备。第二接入网设备可以位置验证结果确定终端设备上报位置信息的诚信记录,进而可确定验证终端设备的位置的频率和精度,从而提高位置验证的效率。例如,若终端设备在第一接入网设备的诚信记录良好,即终端设备向第一接入网设备上报的位置信息可信的概率较高,那么第二接入网设备可以降低终端设备位置验证的频率,或者推迟对该终 端设备进行首次位置验证的时间。
需要说明的,上述第二接入网设备根据第二位置验证信息验证终端设备的具体方法仅是举例。在可能的实现方式中,第二接入网设备也可以利用神经网络等技术手段根据第二位置验证信息来验证终端设备的位置。
需要说明的是,本申请实施例对S1003和S1004的执行顺序不作限制。即S1003可在S1004之前执行,或者,S1003在S1004之后执行,又或者,S1003和S1004可同时执行。
可选地,第一接入网设备以CU和DU分离架构的形式实现,第二接入网设备以CU和DU分离架构的形式实现。这种情况下,第一接入网设备可通过DU接收终端设备发送的TA信息,确定终端设备的位置验证结果之后,将位置验证结果发送给CU。第一接入网设备通过CU将位置验证结果发送给第二接入网设备的CU。或者,第一接入网设备可通过DU接收终端设备发送的TA信息,将终端设备的TA信息发送给CU,CU确定终端设备的位置验证结果之后,将位置验证结果发送给第二接入网设备的CU。或者,第一接入网设备通过CU接收终端设备的TA信息,确定终端设备的位置验证结果之后,将位置验证结果发送给第二接入网设备的CU。
本申请实施例考虑到目标基站和源基站可能不在一个轨道上,从而源基站将终端设备的历史TA信息告知目标基站。由于目标基站确定终端设备的位置的TA信息由源基站提供,无需自己从终端设备获取,减少了获取终端设备的TA信息的时间,从而提高验证终端设备的位置的效率。另外,目标基站结合终端设备的历史TA信息确定终端设备的位置更为准确,即可提高终端设备的定位精度。
需要说明的是,本申请实施例中,图8所示的流程、图9所示的流程和图10所示的流程可以单独执行,也可以结合。例如,图8所示的流程和图9所示的流程可以相互结合,图8所示的流程和图10所示的流程也可以相互结合。图9所示的流程和图10所述的流程可以相互结合,或者,图8所示的流程、图9所示的流程和图10所示的流程也可以相互结合。
所述本申请提供的实施例中,分别从终端设备、接入网设备,或者核心网设备之间交互的角度对本申请实施例提供的方法进行了介绍。为了实现上述本申请实施例提供的方法中的各功能,终端设备、接入网设备和核心网设备可以包括硬件结构和/或软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能以硬件结构、软件模块、还是硬件结构加软件模块的方式来执行,取决于技术方案的特定应用和设计约束条件。
基于与方法实施例的同一构思,本申请实施例提供一种通信装置。下面结合附图介绍本申请实施例中用来实现上述方法的通信装置。
图11为本申请实施例提供的通信装置1100的示意性框图。该通信装置1100可以包括处理模块1110和收发模块1120。可选地,还可以包括存储单元,该存储单元可以用于存储指令(代码或者程序)和/或数据。处理模块1110和收发模块1120可以与该存储单元耦合,例如,处理模块1110可以读取存储单元中的指令(代码或者程序)和/或数据,以实现相应的方法。上述各个模块可以独立设置,也可以部分或者全部集成。
一些可能的实施方式中,通信装置1100能够对应实现上述方法实施例中接入网设备的行为和功能,通信装置1100可以为接入网设备,也可以为应用于接入网设备中的部件(例如芯片或者电路),也可以是接入网设备中的芯片或芯片组或芯片中用于执行相关方法功 能的一部分。
例如,通信装置1100实现图8或图9的实施例中第一接入网设备执行的方法。收发模块1120用于接收终端设备发送的第一位置信息,向终端设备发送验证信息,并接收终端设备发送的反馈结果。其中,验证信息包括如下的一项或多项:至少一个参考信号、至少一个验证码,或至少一个业务数据。反馈结果包括所述至少一个参考信号的测量结果,验证码对应的反馈码,或指示信息,该指示信息指示终端设备是否接收到业务数据。处理模块1110用于根据反馈结果验证第一位置信息。或者,收发模块1120还用于向核心网设备发送第一位置信息和反馈结果。
作为一种可选的实现方式,处理模块1110具体用于根据反馈结果确定位置验证结果,该位置验证结果指示第一位置信息指示的位置区域的可信度。
作为一种可选的实现方式,一个参考信号对应一个波束,一个验证码对应一个波束,一个业务数据对应一个波束。
作为一种可选的实现方式,验证信息中的部分验证信息对应的波束的覆盖区域包括第一位置信息指示的位置区域。
作为一种可选的实现方式,波束在不同时间所覆盖的区域不同。
作为一种可选的实现方式,收发模块1120还用于向终端设备发送配置信息,该配置信息指示如下的一项或多项:通信装置1100发送的参考信号的最大个数、通信装置1100发送的验证码的最大个数,或者,通信装置1100发送的业务数据的最大个数。其中,通信装置1100向终端设备发送的至少一个参考信号的个数小于或等于所述最大个数。通信装置1100向终端设备发送的至少一个验证码的个数小于或等于所述最大个数。通信装置1100向终端设备发送的至少一个业务数据的个数小于或等于所述最大个数。
作为一种可选的实现方式,所述配置信息包括如下的一项或多项:测量配置信息、接收配置信息、反馈指示信息,或上报配置信息。测量配置信息包括用于测量所述至少一个参考信号的配置。接收配置信息包括用于指示通信装置1100发送参考信号或验证码或业务数据的最大个数的信息。反馈指示信息包括指示终端设备发送反馈结果的配置。上报配置信息包括如下的一项或多项:上报方式、上报门限、上报格式,所述上报方式包括周期上报或非周期上报。
作为一种可选的实现方式,处理模块1110还用于根据第一位置信息确定验证信息和/或配置信息。或者,处理模块1110还用于根据第一位置信息和辅助信息确定验证信息和/或配置信息。辅助信息包括终端设备能够测量到的当前服务小区的参考信号的信息。
作为一种可选的实现方式,收发模块1120还用于向终端设备发送第一指示信息。其中,第一指示信息指示终端设备的业务被禁止,和/或,第一指示信息指示禁止终端设备的业务的原因。
作为一种可选的实现方式,收发模块1120还用于向核心网设备发送第二指示信息,该第二指示信息包括位置验证结果。
作为一种可选的实现方式,第二指示信息还指示如下的一项或多项:请求断开终端设备的连接、请求切换终端设备的核心网设备,发起请求的原因,请求对终端设备进行定位。
作为一种可选的实现方式,收发模块1120还用于向核心网设备发送第一位置验证信息,该第一位置验证信息包括第一位置信息和反馈结果。
又例如,通信装置1100实现图10的实施例中第一接入网设备执行的方法。其中,处 理模块1110用于确定第二位置验证信息。该第二位置验证信息包括第二位置信息和第二辅助信息,第二位置信息指示通信装置1100所确定的终端设备所在的位置区域,第二辅助信息包括用于通信装置1100确定终端设备位置的历史TA信息。收发模块1120用于向第二接入网设备发送第二位置验证信息。
又例如,通信装置1100实现图10的实施例中第二接入网设备执行的方法。收发模块1120用于接收第一接入网设备发送的第二位置验证信息。该第二位置验证信息包括用于确定终端设备位置的历史TA信息。处理模块1110用于根据第二位置验证信息验证终端设备的位置。
作为一种可选的实现方式,第二位置验证信息还包括位置验证结果和第二位置信息。其中,位置验证结果为第一接入网设备对终端设备发送的位置信息的验证结果。第二位置信息指示第一接入网设备所确定的终端设备所在的位置区域。
作为一种可选的实现方式,第二位置验证信息还包括如下的一项或多项:终端设备的至少一个TA信息、至少一个TA信息对应的卫星位置信息、至少一个TA信息对应的时间信息、至少一个TA信息对应的星历信息、至少一个TA信息对应的小区信息、验证信息、验证信息对应的波束的配置信息、验证信息对应的波束的覆盖范围信息、配置信息,或反馈结果。验证信息包括至少一个参考信号、至少一个验证码或至少一个业务数据。覆盖范围信息指示波束在不同时间的覆盖区域。反馈结果包括至少一个参考信号的测量结果,验证码对应的反馈码,或指示信息,该指示信息指示终端设备是否接收到业务数据。
作为一种可选的实现方式,第二位置验证信息承载于第一接入网设备向通信装置1110发送的切换请求消息中,该切换请求消息用于请求通信装置1110为切换准备资源。
在另一些可能的实施方式中,通信装置1100能够对应实现上述方法实施例中终端设备的行为和功能,通信装置1100可以为终端设备,也可以为应用于终端设备中的部件(例如芯片或者电路),也可以是终端设备中的芯片或芯片组或芯片中用于执行相关方法功能的一部分。
例如,通信装置1100实现图8或图9的实施例中终端设备执行的方法。收发模块1120用于向第一接入网设备发送第一位置信息,接收第一接入网设备发送的验证信息,并向第一接入网设备发送反馈结果。验证信息包括如下的一项或多项:至少一个参考信号、至少一个验证码,或至少一个业务数据。反馈结果包括所述至少一个参考信号的测量结果,验证码对应的反馈码,或指示信息,该指示信息指示通信装置1100是否接收到业务数据。
作为一种可选的实现方式,一个参考信号对应一个波束,一个验证码对应一个波束,一个业务数据对应一个波束。
作为一种可选的实现方式,验证信息中的部分验证信息对应的波束的覆盖区域包括第一位置信息指示的位置区域。
作为一种可选的实现方式,波束在不同时间所覆盖的区域不同。
作为一种可选的实现方式,收发模块1120还用于接收第一接入网设备发送的配置信息,该配置信息指示如下的一项或多项:第一接入网设备发送的参考信号的最大个数、第一接入网设备发送的验证码的最大个数,或,第一接入网设备发送的业务数据的最大个数。其中,第一接入网设备向通信装置1100发送的至少一个参考信号的个数小于或等于所述最大个数。第一接入网设备向通信装置1100发送的至少一个验证码的个数小于或等于所述最大个数。第一接入网设备向通信装置1100发送的至少一个业务数据的个数小于或等于所述最 大个数。
作为一种可选的实现方式,收发模块1120还用于接收第一接入网设备发送的第一指示信息。该第一指示信息指示通信装置1100的业务被禁止,和/或,该第一指示信息指示禁止通信装置1100的业务的原因。
在另一些可能的实施方式中,通信装置1100能够对应实现上述方法实施例中核心网设备的行为和功能,通信装置1100可以为核心网设备,也可以为应用于和核心网设备中的部件(例如芯片或者电路),也可以是核心网设备中的芯片或芯片组或芯片中用于执行相关方法功能的一部分。
例如,通信装置1100实现图8或图9的实施例中核心网设备执行的方法。收发模块1120用于接收第一接入网设备发送的第一位置验证信息。该第一位置验证信息包括终端设备的第一位置信息和/或终端设备针对第一接入网设备发送的验证信息的反馈结果。验证信息包括如下的一项或多项:至少一个参考信号、至少一个验证码,或至少一个业务数据。反馈结果包括至少一个参考信号的测量结果,验证码对应的反馈码,或指示信息,该指示信息指示终端设备是否接收到业务数据。处理模块1110用于根据反馈结果验证第一位置信息。
作为一种可选的实现方式,一个参考信号对应一个波束,一个验证码对应一个波束,一个业务数据对应一个波束。
作为一种可选的实现方式,第一位置验证信息还包括如下的一项或多项:验证信息、验证信息的配置信息、验证信息对应的波束的配置信息、验证信息对应的波束的覆盖范围信息、终端设备的至少一个TA信息、至少一个TA信息对应的卫星位置信息、至少一个TA信息对应的时间信息、至少一个TA信息对应的星历信息,或至少一个TA信息对应的小区信息。覆盖范围信息指示波束在不同时间的覆盖区域。验证信息和/或配置信息还根据辅助信息确定。辅助信息包括终端设备当前能测量到的当前服务小区的参考信号的信息。
作为一种可选的实现方式,收发模块1120还用于向第一接入网设备发送第三指示信息,该第三指示信息包括位置验证结果。位置验证结果指示第一位置信息指示的位置区域的可信度。
作为一种可选的实现方式,收第三指示信息还指示如下的一项或多项:请求断开终端设备的连接、请求切换终端设备的核心网设备、发起请求的原因,或请求对终端设备进行定位。
应理解,本申请实施例中的处理模块1110可以由处理器或处理器相关电路组件实现,收发模块1120可以由收发器或收发器相关电路组件或者通信接口实现。
图12为本申请实施例提供的通信装置1200的示意性框图。其中,通信装置1200可以是终端设备,能够实现本申请实施例提供的方法中终端设备的功能。通信装置1200也可以是能够支持终端设备实现本申请实施例提供的方法中对应的功能的装置,其中,该通信装置1200可以为芯片系统。本申请实施例中,芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。具体的功能可以参见上述方法实施例中的说明。通信装置1200也可以是接入网设备,能够实现本申请实施例提供的方法中第一接入网设备或第二接入网设备的功能。通信装置1200也可以是能够支持接入网设备实现本申请实施例提供的方法中对应的功能的装置,其中,该通信装置1200可以为芯片系统。本申请实施例中,芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。具体的功能可以参见上述方法实施 例中的说明。通信装置1200也可以是核心网设备,能够实现本申请实施例提供的方法中核心网设备的功能。通信装置1200也可以是能够支持核心网设备实现本申请实施例提供的方法中对应的功能的装置,其中,该通信装置1200可以为芯片系统。本申请实施例中,芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。具体的功能可以参见上述方法实施例中的说明。
通信装置1200包括一个或多个处理器1201,可用于实现或用于支持通信装置1200实现本申请实施例提供的方法中终端设备的功能。具体参见方法示例中的详细描述,此处不做赘述。一个或多个处理器1201也可以用于实现或用于支持通信装置1200实现本申请实施例提供的方法中第一接入网设备或第二接入网设备的功能。具体参见方法示例中的详细描述,此处不做赘述。一个或多个处理器1201也可以用于实现或用于支持通信装置1200实现本申请实施例提供的方法中核心网设备的功能。具体参见方法示例中的详细描述,此处不做赘述。处理器1201也可以称为处理单元或处理模块,可以实现一定的控制功能。处理器1201可以是通用处理器或者专用处理器等。例如,包括:中央处理器,应用处理器,调制解调处理器,图形处理器,图像信号处理器,数字信号处理器,视频编解码处理器,控制器,存储器,和/或神经网络处理器等。所述中央处理器可以用于对通信装置1200进行控制,执行软件程序和/或处理数据。不同的处理器可以是独立的器件,也可以是集成在一个或多个处理器中,例如,集成在一个或多个专用集成电路上。
可选地,通信装置1200中包括一个或多个存储器1202,用以存储指令1204,所述指令可在所述处理器1201上被运行,使得通信装置1200执行上述方法实施例中描述的方法。存储器1202和处理器1201可以单独设置,也可以集成在一起,也可以认为存储器1202和处理器1201耦合。本申请实施例中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性,机械或其它的形式,用于装置、单元或模块之间的信息交互。处理器1201可能和存储器1202协同操作。所述至少一个存储器中的至少一个可以包括于处理器中。需要说明的是,存储器1202不是必须的,所以在图12中以虚线进行示意。
可选地,所述存储器1202中还可以存储有数据。所述处理器和存储器可以单独设置,也可以集成在一起。在本申请实施例中,存储器1202可以是非易失性存储器,比如硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD)等,还可以是易失性存储器(volatile memory),例如随机存取存储器(random-access memory,RAM)。存储器是能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。本申请实施例中的存储器还可以是电路或者其它任意能够实现存储功能的装置,用于存储程序指令和/或数据。
可选地,通信装置1200可以包括指令1203(有时也可以称为代码或程序),所述指令1203可以在所述处理器上被运行,使得所述通信装置1200执行上述实施例中描述的方法。处理器1201中可以存储数据。
可选地,通信装置1200还可以包括收发器1205以及天线1206。所述收发器1205可以称为收发单元,收发模块、收发机、收发电路、收发器,输入输出接口等,用于通过天线1206实现通信装置1200的收发功能。
本申请中描述的处理器1201和收发器1205可实现在集成电路(integrated circuit,IC)、模拟IC、射频集成电路(radio frequency identification,RFID)、混合信号IC、ASIC、印刷电路板(printed circuit board,PCB)、或电子设备等上。实现本文描述的通信装置,可以 是独立设备(例如,独立的集成电路,手机等),或者可以是较大设备中的一部分(例如,可嵌入在其他设备内的模块),具体可以参照前述关于终端设备,以及网络设备的说明,在此不再赘述。
可选地,通信装置1200还可以包括以下一个或多个部件:无线通信模块,音频模块,外部存储器接口,内部存储器,通用串行总线(universal serial bus,USB)接口,电源管理模块,天线,扬声器,麦克风,输入输出模块,传感器模块,马达,摄像头,或显示屏等等。可以理解,在一些实施例中,通信装置1200可以包括更多或更少部件,或者某些部件集成,或者某些部件拆分。这些部件可以是硬件,软件,或者软件和硬件的组合实现。
需要说明的是,上述实施例中的通信装置可以是终端设备(或网络设备)也可以是电路,也可以是应用于终端设备(或网络设备)中的芯片或者其他具有上述终端功能(或网络设备)的组合器件、部件等。当通信装置是终端设备(或网络设备)时,收发模块可以是收发器,可以包括天线和射频电路等,处理模块可以是处理器,例如:中央处理模块(central processing unit,CPU)。当通信装置是具有上述终端设备(或网络设备)功能的部件时,收发模块可以是射频单元,处理模块可以是处理器。当通信装置是芯片系统时,该通信装置可以是现场可编程门阵列(field programmable gate array,FPGA),可以是专用集成芯片(application specific integrated circuit,ASIC),还可以是系统芯片(system on chip,SoC),还可以是CPU,还可以是网络处理器(network processor,NP),还可以是数字信号处理电路(digital signal processor,DSP),还可以是微控制器(micro controller unit,MCU),还可以是可编程控制器(programmable logic device,PLD)或其他集成芯片。处理模块可以是芯片系统的处理器。收发模块或通信接口可以是芯片系统的输入输出接口或接口电路。例如,接口电路可以为代码/数据读写接口电路。所述接口电路,可以用于接收代码指令(代码指令存储在存储器中,可以直接从存储器读取,或也可以经过其他器件从存储器读取)并传输至处理器;处理器可以用于运行所述代码指令以执行上述方法实施例中的方法。又例如,接口电路也可以为通信处理器与收发机之间的信号传输接口电路。
当该通信装置为芯片类的装置或者电路时,该装置可以包括收发单元和处理单元。其中,所述收发单元可以是输入输出电路和/或通信接口;处理单元为集成的处理器或者微处理器或者集成电路。
本申请实施例还提供一种通信系统,具体的,通信系统包括至少一个终端设备和至少一个第一接入网设备,或者还可以包括至少一个第二接入网设备和/或核心网设备。示例性的,通信系统包括用于实现上述图8-图10中一个或多个图的相关功能的接入网设备、终端设备和核心网设备。具体请参考上述方法实施例中的相关描述,这里不再赘述。
本申请实施例中还提供一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行图8-图10中一个或多个图中第一接入网设备或第二接入网设备执行的方法。或者,当其在计算机上运行时,使得计算机执行图8-图10中一个或多个图中终端设备执行的方法。或者,当其在计算机上运行时,使得计算机执行图8-图10中一个或多个图中核心网设备执行的方法。
本申请实施例中还提供一种计算机程序产品,包括指令,当其在计算机上运行时,使得计算机执行图8-图10中一个或多个图中第一接入网设备或第二接入网设备执行的方法。或者,当其在计算机上运行时,使得计算机执行图8-图10中一个或多个图中终端设备执行的方法。或者,当其在计算机上运行时,使得计算机执行图8-图10中一个或多个图中 核心网设备执行的方法。
本申请实施例提供了一种芯片系统,该芯片系统包括处理器,还可以包括存储器,用于实现前述方法中第一接入网设备或第二接入网设备的功能;或者用于实现前述方法中终端设备的功能;或者用于实现前述方法中核心网设备的功能。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各种说明性逻辑块(illustrative logical block)和步骤(step),能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、RAM、磁碟或者光盘等各种可以存储程序代码的介质。

Claims (60)

  1. 一种终端设备位置的验证方法,其特征在于,包括:
    第一接入网设备接收终端设备发送的第一位置信息;
    所述第一接入网设备向所述终端设备发送验证信息,所述验证信息包括如下的一项或多项:至少一个参考信号、至少一个验证码,或至少一个业务数据;
    所述第一接入网设备接收所述终端设备发送的反馈结果,所述反馈结果包括所述至少一个参考信号的测量结果,所述验证码对应的反馈码,或指示信息,所述指示信息指示所述终端设备是否接收到所述业务数据;
    所述第一接入网设备根据所述反馈结果验证所述第一位置信息,或者,所述第一接入网设备向核心网设备发送所述第一位置信息和所述反馈结果。
  2. 如权利要求1所述的方法,其特征在于,所述第一接入网设备根据所述反馈结果验证所述第一位置信息,包括:
    所述第一接入网设备根据所述反馈结果确定位置验证结果,所述位置验证结果指示所述第一位置信息指示的位置区域的可信度。
  3. 如权利要求1或2所述的方法,其特征在于,一个所述参考信号对应一个波束,一个所述验证码对应一个波束,一个所述业务数据对应一个波束。
  4. 如权利要求3所述的方法,其特征在于,所述验证信息中的部分验证信息对应的波束的覆盖区域包括所述第一位置信息指示的位置区域。
  5. 如权利要求3或4所述的方法,其特征在于,所述波束在不同时间所覆盖的区域不同。
  6. 如权利要求1-5任一项所述的方法,其特征在于,所述方法还包括:所述第一接入网设备向所述终端设备发送配置信息,所述配置信息指示如下的一项或多项:
    所述第一接入网设备发送的参考信号的最大个数、所述第一接入网设备发送的验证码的最大个数,或者,所述第一接入网设备发送的业务数据的最大个数;其中,所述第一接入网设备向所述终端设备发送的所述至少一个参考信号的个数小于或等于所述最大个数;所述第一接入网设备向所述终端设备发送的所述至少一个验证码的个数小于或等于所述最大个数;所述第一接入网设备向所述终端设备发送的所述至少一个业务数据的个数小于或等于所述最大个数。
  7. 如权利要求6所述的方法,其特征在于,所述配置信息包括如下的一项或多项:测量配置信息、接收配置信息、反馈指示信息,或上报配置信息,其中,所述测量配置信息包括用于测量所述至少一个参考信号的配置,所述接收配置信息包括用于指示所述第一接入网设备发送参考信号或验证码或业务数据的最大个数的信息,所述反馈指示信息包括指示所述终端设备反馈所述反馈结果的配置,所述上报配置信息包括如下的一项或多项:上报方式、上报门限、上报格式,所述上报方式包括周期上报或非周期上报。
  8. 如权利要求4-7任一项所述的方法,其特征在于,所述方法还包括:
    所述第一接入网设备根据所述第一位置信息确定所述验证信息和/或配置信息;或者,所述第一接入网设备根据所述第一位置信息和辅助信息确定所述验证信息和/或配置信息;其中,所述辅助信息包括所述终端设备能够测量到的当前服务小区的参考信号的信息。
  9. 如权利要求1-8任一项所述的方法,其特征在于,所述方法还包括:
    所述第一接入网设备向所述终端设备发送第一指示信息,其中,所述第一指示信息指示所述终端设备的业务被禁止,和/或,所述第一指示信息指示禁止所述终端设备的业务的原因。
  10. 如权利要求2-9任一项所述的方法,其特征在于,所述方法还包括:
    所述第一接入网设备向核心网设备发送第二指示信息,所述第二指示信息包括位置验证结果。
  11. 如权利要求10所述的方法,其特征在于,所述第二指示信息还指示如下的一项或多项:请求断开所述终端设备的连接、请求切换所述终端设备的核心网设备,发起请求的原因,请求对所述终端设备进行定位。
  12. 如权利要求1-11任一项所述的方法,其特征在于,所述方法还包括:
    所述第一接入网设备向核心网设备发送第一位置验证信息,所述第一位置验证信息包括所述第一位置信息和所述反馈结果。
  13. 一种终端设备位置的验证方法,其特征在于,包括:
    终端设备向第一接入网设备发送第一位置信息;
    所述终端设备接收所述第一接入网设备发送的验证信息,所述验证信息包括如下的一项或多项:至少一个参考信号、至少一个验证码,或至少一个业务数据;
    所述终端设备向所述第一接入网设备发送反馈结果,所述反馈结果包括所述至少一个参考信号的测量结果,所述验证码对应的反馈码,或指示信息,所述指示信息指示所述终端设备是否接收到所述业务数据。
  14. 如权利要求13所述的方法,其特征在于,一个所述参考信号对应一个波束,一个所述验证码对应一个波束,一个所述业务数据对应一个波束。
  15. 如权利要求14所述的方法,其特征在于,所述验证信息中的部分验证信息对应的波束的覆盖区域包括所述第一位置信息指示的位置区域。
  16. 如权利要求14或15所述的方法,其特征在于,所述波束在不同时间所覆盖的区域不同。
  17. 如权利要求13-16任一项所述的方法,其特征在于,所述方法还包括:所述终端设备接收所述第一接入网设备发送的配置信息,所述配置信息指示如下的一项或多项:
    所述第一接入网设备发送的参考信号的最大个数、所述第一接入网设备发送的验证码的最大个数,或者,所述第一接入网设备发送的业务数据的最大个数;其中,所述第一接入网设备向所述终端设备发送的所述至少一个参考信号的个数小于或等于所述最大个数;所述第一接入网设备向所述终端设备发送的所述至少一个验证码的个数小于或等于所述最大个数;所述第一接入网设备向所述终端设备发送的所述至少一个业务数据的个数小于或等于所述最大个数。
  18. 如权利要求13-17任一项所述的方法,其特征在于,所述方法还包括:
    所述终端设备接收所述第一接入网设备发送的第一指示信息,其中,所述第一指示信息指示所述终端设备的业务被禁止,和/或,所述第一指示信息指示禁止所述终端设备的业务的原因。
  19. 一种终端设备位置的验证方法,其特征在于,包括:
    核心网设备接收第一接入网设备发送的第一位置验证信息,所述第一位置验证信息包括终端设备的第一位置信息和所述终端设备针对第一接入网设备发送的验证信息的反馈 结果,所述验证信息包括如下的一项或多项:至少一个参考信号、至少一个验证码,或至少一个业务数据,所述反馈结果包括所述至少一个参考信号的测量结果,所述验证码对应的反馈码,或指示信息,所述指示信息指示所述终端设备是否接收到所述业务数据;
    核心网设备根据所述反馈结果验证所述第一位置信息。
  20. 如权利要求19所述的方法,其特征在于,一个所述参考信号对应一个波束,一个所述验证码对应一个波束,一个所述业务数据对应一个波束。
  21. 如权利要求19或20所述的方法,其特征在于,所述第一位置验证信息还包括如下的一项或多项:所述验证信息、所述验证信息的配置信息、所述验证信息对应的波束的配置信息、所述验证信息对应的波束的覆盖范围信息、所述终端设备的至少一个时间提前量TA信息、所述至少一个TA信息对应的卫星位置信息、所述至少一个TA信息对应的时间信息、所述至少一个TA信息对应的星历信息,或所述至少一个TA信息对应的小区信息,其中,所述覆盖范围信息指示波束在不同时间的覆盖区域,所述验证信息和/或所述配置信息还根据辅助信息确定,所述辅助信息包括所述终端设备当前能测量到的当前服务小区的参考信号的信息。
  22. 如权利要求19-21任一项所述的方法,其特征在于,所述方法还包括:
    所述核心网设备向所述第一接入网设备发送第三指示信息,所述第三指示信息包括位置验证结果,所述位置验证结果指示所述第一位置信息指示的位置区域的可信度。
  23. 如权利要求19-22任一项所述的方法,其特征在于,所述第三指示信息还指示如下的一项或多项:请求断开所述终端设备的连接、请求切换所述终端设备的核心网设备、发起请求的原因,或请求对所述终端设备进行定位。
  24. 一种终端设备位置的验证方法,其特征在于,包括:
    第二接入网设备接收第一接入网设备发送的第二位置验证信息,所述第二位置验证信息包括用于所述第一接入网设备确定所述终端设备位置的历史时间提前量TA信息;
    所述第二接入网设备根据所述第二位置验证信息验证所述终端设备的位置。
  25. 如权利要求24所述的方法,其特征在于,所述第二位置验证信息还包括位置验证结果和第二位置信息,所述位置验证结果为所述第一接入网设备对所述终端设备发送的位置信息的验证结果,所述第二位置信息指示所述第一接入网设备所确定的终端设备所在的位置区域。
  26. 如权利要求24所述的方法,其特征在于,所述第二位置验证信息还包括如下的一项或多项:验证信息、配置信息、反馈结果、所述终端设备的至少一个TA信息、所述至少一个TA信息对应的卫星位置信息、所述至少一个TA信息对应的时间信息、所述至少一个TA信息对应的星历信息、所述至少一个时间提前量TA信息对应的小区信息、所述验证信息对应的波束配置信息,或所述验证信息对应的波束的覆盖范围信息,所述验证信息包括至少一个参考信号、至少一个验证码或至少一个业务数据,所述覆盖范围信息指示波束在不同时间的覆盖区域,所述反馈结果包括所述至少一个参考信号的测量结果,所述验证码对应的反馈码,或指示信息,所述指示信息指示所述终端设备是否接收到所述业务数据。
  27. 如权利要求24-26任一项所述的方法,其特征在于,所述第二位置验证信息承载于所述第一接入网设备向所述第二接入网设备发送的切换请求消息中,所述切换请求消息用于请求所述第二接入网设备为切换准备资源。
  28. 一种终端设备位置的验证方法,其特征在于,包括:
    第一接入网设备确定第二位置验证信息,所述第二位置验证信息包括用于所述第一接入网设备确定所述终端设备位置的历史时间提前量TA信息;
    所述第一接入网设备向第二接入网设备发送所述第二位置验证信息。
  29. 一种通信装置,其特征在于,包括处理模块和收发模块;
    其中,所述收发模块,用于设备接收终端设备发送的第一位置信息,并向所述终端设备发送验证信息,以及接收所述终端设备发送的反馈结果;所述验证信息包括如下的一项或多项:至少一个参考信号、至少一个验证码,或至少一个业务数据;所述反馈结果包括所述至少一个参考信号的测量结果,所述验证码对应的反馈码,或指示信息,所述指示信息指示所述终端设备是否接收到所述业务数据;
    所述处理模块,用于根据所述反馈结果验证所述第一位置信息,或者,所述收发模块还用于向核心网设备发送所述第一位置信息和所述反馈结果。
  30. 如权利要求29所述的装置,其特征在于,所述处理模块用于根据所述反馈结果验证所述第一位置信息,包括:
    所述处理模块用于根据所述反馈结果确定位置验证结果,所述位置验证结果指示所述第一位置信息指示的位置区域的可信度。
  31. 如权利要求29或30所述的装置,其特征在于,一个所述参考信号对应一个波束,一个所述验证码对应一个波束,一个所述业务数据对应一个波束。
  32. 如权利要求31所述的装置,其特征在于,所述验证信息中的部分验证信息对应的波束的覆盖区域包括所述第一位置信息指示的位置区域。
  33. 如权利要求31或32所述的装置,其特征在于,所述波束在不同时间所覆盖的区域不同。
  34. 如权利要求29-33任一项所述的装置,其特征在于,所述方法还包括:所述收发模块还用于向所述终端设备发送配置信息,所述配置信息指示如下的一项或多项:
    所述通信装置发送的参考信号的最大个数、所述通信装置发送的验证码的最大个数,或者,所述通信装置发送的业务数据的最大个数;其中,所述通信装置向所述终端设备发送的所述至少一个参考信号的个数小于或等于所述最大个数;所述通信装置向所述终端设备发送的所述至少一个验证码的个数小于或等于所述最大个数;所述通信装置向所述终端设备发送的所述至少一个业务数据的个数小于或等于所述最大个数。
  35. 如权利要求34所述的装置,其特征在于,所述配置信息包括如下的一项或多项:测量配置信息、接收配置信息、反馈指示信息,或上报配置信息,其中,所述测量配置信息包括用于测量所述至少一个参考信号的配置,所述接收配置信息包括用于指示所述通信装置发送参考信号或验证码或业务数据的最大个数的信息,所述反馈指示信息包括指示所述终端设备反馈所述反馈结果的配置,所述上报配置信息包括如下的一项或多项:上报方式、上报门限、上报格式,所述上报方式包括周期上报或非周期上报。
  36. 如权利要求32-35任一项所述的装置,其特征在于,所述处理模块还用于:
    根据所述第一位置信息确定所述验证信息和/或配置信息;或者,根据所述第一位置信息和辅助信息确定所述验证信息和/或配置信息;其中,所述辅助信息包括所述终端设备能够测量到的当前服务小区的参考信号的信息。
  37. 如权利要求29-36任一项所述的装置,其特征在于,所述收发模块还用于:
    向所述终端设备发送第一指示信息,其中,所述第一指示信息指示所述终端设备的业务被禁止,和/或,所述第一指示信息指示禁止所述终端设备的业务的原因。
  38. 如权利要求30-37任一项所述的装置,其特征在于,所述收发模块还用于:
    向核心网设备发送第二指示信息,所述第二指示信息包括位置验证结果。
  39. 如权利要求38所述的装置,其特征在于,所述第二指示信息还指示如下的一项或多项:请求断开所述终端设备的连接、请求切换所述终端设备的核心网设备,发起请求的原因,请求对所述终端设备进行定位。
  40. 如权利要求29-39任一项所述的装置,其特征在于,所述收发模块还用于:
    向核心网设备发送第一位置验证信息,所述第一位置验证信息包括所述第一位置信息和所述反馈结果。
  41. 一种通信装置,其特征在于,包括处理模块和收发模块;
    其中,所述处理模块,用于确定第一位置信息,
    所述收发模块,用于向第一接入网设备发送所述第一位置信息,接收所述第一接入网设备发送的验证信息,向所述第一接入网设备发送反馈结果;所述验证信息包括如下的一项或多项:至少一个参考信号、至少一个验证码,或至少一个业务数据;所述反馈结果包括所述至少一个参考信号的测量结果,所述验证码对应的反馈码,或指示信息,所述指示信息指示所述通信装置是否接收到所述业务数据。
  42. 如权利要求41所述的装置,其特征在于,一个所述参考信号对应一个波束,一个所述验证码对应一个波束,一个所述业务数据对应一个波束。
  43. 如权利要求42所述的装置,其特征在于,所述验证信息中的部分验证信息对应的波束的覆盖区域包括所述第一位置信息指示的位置区域。
  44. 如权利要求42或43所述的装置,其特征在于,所述波束在不同时间所覆盖的区域不同。
  45. 如权利要求41-44任一项所述的装置,其特征在于,所述收发模块还用于接收所述第一接入网设备发送的配置信息,所述配置信息指示如下的一项或多项:
    所述第一接入网设备发送的参考信号的最大个数、所述第一接入网设备发送的验证码的最大个数,或者,所述第一接入网设备发送的业务数据的最大个数;其中,所述第一接入网设备向所述通信装置发送的所述至少一个参考信号的个数小于或等于所述最大个数;所述第一接入网设备向所述通信装置发送的所述至少一个验证码的个数小于或等于所述最大个数;所述第一接入网设备向所述通信装置发送的所述至少一个业务数据的个数小于或等于所述最大个数。
  46. 如权利要求41-45任一项所述的装置,其特征在于,收发模块还用于接收所述第一接入网设备发送的第一指示信息,其中,所述第一指示信息指示所述终端设备的业务被禁止,和/或,所述第一指示信息指示禁止所述终端设备的业务的原因。
  47. 一种通信装置,其特征在于,包括处理模块和收发模块;
    其中,所述收发模块,用于接收第一接入网设备发送的第一位置验证信息,所述第一位置验证信息包括终端设备的第一位置信息和所述终端设备针对第一接入网设备发送的验证信息的反馈结果,所述验证信息包括如下的一项或多项:至少一个参考信号、至少一个验证码,或至少一个业务数据,所述反馈结果包括所述至少一个参考信号的测量结果,所述验证码对应的反馈码,或指示信息,所述指示信息指示所述终端设备是否接收到所述 业务数据;
    所述处理模块,用于根据所述反馈结果验证所述第一位置信息。
  48. 如权利要求47所述的装置,其特征在于,一个所述参考信号对应一个波束,一个所述验证码对应一个波束,一个所述业务数据对应一个波束。
  49. 如权利要求47或48所述的装置,其特征在于,所述第一位置验证信息还包括如下的一项或多项:所述验证信息、所述验证信息的配置信息、所述验证信息对应的波束的配置信息、所述验证信息对应的波束的覆盖范围信息、所述终端设备的至少一个时间提前量TA信息、所述至少一个TA信息对应的卫星位置信息、所述至少一个TA信息对应的时间信息、所述至少一个TA信息对应的星历信息,或所述至少一个TA信息对应的小区信息,其中,所述覆盖范围信息指示波束在不同时间的覆盖区域,所述验证信息和/或所述配置信息还根据辅助信息确定,所述辅助信息包括所述终端设备当前能测量到的当前服务小区的参考信号的信息。
  50. 如权利要求47-49任一项所述的装置,其特征在于,所述收发模块还用于:
    向所述第一接入网设备发送第三指示信息,所述第三指示信息包括位置验证结果,所述位置验证结果指示所述第一位置信息指示的位置区域的可信度。
  51. 如权利要求47-50任一项所述的装置,其特征在于,所述第三指示信息还指示如下的一项或多项:请求断开所述终端设备的连接、请求切换所述终端设备的通信装置、发起请求的原因,或请求对所述终端设备进行定位。
  52. 一种通信装置,其特征在于,包括处理模块和收发模块;
    所述收发模块,用于接收第一接入网设备发送的第二位置验证信息,所述第二位置验证信息包括用于所述第一接入网设备确定所述终端设备位置的历史时间提前量TA信息;
    所述处理模块,用于根据所述第二位置验证信息验证所述终端设备的位置。
  53. 如权利要求52所述的装置,其特征在于,所述第二位置验证信息还包括位置验证结果和第二位置信息,所述位置验证结果为所述第一接入网设备对所述终端设备发送的位置信息的验证结果,所述第二位置信息指示所述第一接入网设备所确定的终端设备所在的位置区域。
  54. 如权利要求52所述的装置,其特征在于,所述第二位置验证信息还包括如下的一项或多项:验证信息、配置信息、反馈结果、所述终端设备的至少一个TA信息、所述至少一个TA信息对应的卫星位置信息、所述至少一个TA信息对应的时间信息、所述至少一个TA信息对应的星历信息、所述至少一个时间提前量TA信息对应的小区信息、所述验证信息对应的波束配置信息,或所述验证信息对应的波束的覆盖范围信息,所述验证信息包括至少一个参考信号、至少一个验证码或至少一个业务数据,所述覆盖范围信息指示波束在不同时间的覆盖区域,所述反馈结果包括所述至少一个参考信号的测量结果,所述验证码对应的反馈码,或指示信息,所述指示信息指示所述终端设备是否接收到所述业务数据。
  55. 如权利要求52-54任一项所述的装置,其特征在于,所述第二位置验证信息承载于所述第一接入网设备向所述通信装置发送的切换请求消息中,所述切换请求消息用于请求所述通信装置为切换准备资源。
  56. 一种通信装置,其特征在于,包括处理模块和收发模块;
    所述处理模块,用于确定第二位置验证信息,所述第二位置验证信息包括用于所述通 信装置确定所述终端设备位置的历史时间提前量TA信息;
    所述收发模块,用于向第二接入网设备发送所述第二位置验证信息。
  57. 一种通信装置,其特征在于,所述通信装置包括处理器和通信接口,所述通信接口用于输入和/或输出信息,所述处理器用于执行计算机程序,使得所述通信装置执行如权利要求1-12任一项所述的方法,或者,使得所述通信装置执行如权利要求13-18任一项所述的方法,或者,使得所述通信装置执行如权利要求19-23任一项所述的方法,或者,使得所述通信装置执行如权利要求24-27任一项所述的方法,或者,使得所述通信装置执行如权利要求28所述的方法。
  58. 如权利要求57所述的通信装置,其特征在于,所述通信装置为芯片或芯片系统。
  59. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序当被计算机执行时,使得所述计算机执行如权利要求1-12任一项所述的方法,或者,使得所述计算机执行如权利要求13-18任一项所述的方法,或者,使得所述计算机执行如权利要求19-23任一项所述的方法,或者,使得所述计算机执行如权利要求24-27任一项所述的方法,或者,使得所述计算机执行如权利要求28所述的方法。
  60. 一种计算机程序产品,其特征在于,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码被运行时,使得如权利要求1-12任一项所述的方法被执行,或者,使得如权利要求13-18任一项所述的方法被执行,或者,使得如权利要求19-23任一项所述的方法被执行,或者,使得如权利要求24-27任一项所述的方法被执行,或者,使得如权利要求28所述的方法被执行。
PCT/CN2023/079013 2022-03-25 2023-03-01 一种终端设备位置的验证方法及通信装置 WO2023179320A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210304227.XA CN116847358A (zh) 2022-03-25 2022-03-25 一种终端设备位置的验证方法及通信装置
CN202210304227.X 2022-03-25

Publications (1)

Publication Number Publication Date
WO2023179320A1 true WO2023179320A1 (zh) 2023-09-28

Family

ID=88099875

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/079013 WO2023179320A1 (zh) 2022-03-25 2023-03-01 一种终端设备位置的验证方法及通信装置

Country Status (2)

Country Link
CN (1) CN116847358A (zh)
WO (1) WO2023179320A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102790674A (zh) * 2011-05-20 2012-11-21 阿里巴巴集团控股有限公司 身份验证方法、设备和系统
WO2015027476A1 (zh) * 2013-08-30 2015-03-05 华为技术有限公司 网络切换方法、接入点、控制器和基站
CN105472737A (zh) * 2015-12-31 2016-04-06 上海华为技术有限公司 一种终端定位方法及服务器
CN105763526A (zh) * 2014-12-19 2016-07-13 中国移动通信集团公司 一种安全认证方法、网络设备及系统
CN107086976A (zh) * 2016-02-14 2017-08-22 广州市动景计算机科技有限公司 数据校验的方法,装置和系统
US20220053294A1 (en) * 2019-04-29 2022-02-17 Huawei Technologies Co., Ltd. Terminal device location determining method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102790674A (zh) * 2011-05-20 2012-11-21 阿里巴巴集团控股有限公司 身份验证方法、设备和系统
WO2015027476A1 (zh) * 2013-08-30 2015-03-05 华为技术有限公司 网络切换方法、接入点、控制器和基站
CN105763526A (zh) * 2014-12-19 2016-07-13 中国移动通信集团公司 一种安全认证方法、网络设备及系统
CN105472737A (zh) * 2015-12-31 2016-04-06 上海华为技术有限公司 一种终端定位方法及服务器
CN107086976A (zh) * 2016-02-14 2017-08-22 广州市动景计算机科技有限公司 数据校验的方法,装置和系统
US20220053294A1 (en) * 2019-04-29 2022-02-17 Huawei Technologies Co., Ltd. Terminal device location determining method and device

Also Published As

Publication number Publication date
CN116847358A (zh) 2023-10-03

Similar Documents

Publication Publication Date Title
US20210218467A1 (en) Communication method, related device, and computer storage medium
WO2021004233A1 (zh) 卫星通信方法、装置、终端设备、卫星及可读存储介质
US20190058980A1 (en) V2x communication method and apparatus
WO2022206313A1 (zh) 无线通信方法、装置及系统
EP4102890A1 (en) Cell handover method, electronic device, and storage medium
US20220303730A1 (en) Point to Point and Point to Multipoint Switching with Service Continuity for Broadcast and Multicast Service
JP2023536968A (ja) ユーザ機器が登録エリア内に位置しているか否かを判定するための装置および方法
CN111757373B (zh) 通信方法、装置及系统
WO2022116839A1 (zh) 通信方法、装置、设备、存储介质及程序产品
WO2024027613A1 (zh) 一种通信方法和装置
CN115604812A (zh) 定位方法、装置及系统
EP3955614A1 (en) Communication method and device
WO2023179320A1 (zh) 一种终端设备位置的验证方法及通信装置
US20230319739A1 (en) Sidelink synchronization source selection
CN112437394A (zh) 一种定位辅助信息指示数据的发送方法及设备
US20230421999A1 (en) Point to Point and Point to Multipoint Switching with Service Continuity for Broadcast and Multicast Service
WO2024153125A1 (zh) 确定终端设备的位置的方法和装置
US20230292275A1 (en) Transceiver device, network entity and base station
WO2024207966A1 (zh) 通信方法及装置
WO2023236869A1 (zh) 接入方法及通信装置
WO2024199334A1 (zh) 卫星通信方法及装置
WO2023070449A1 (zh) 信息传输方法、相关设备及介质
WO2024093939A1 (zh) 信号配置方法、系统以及通信装置
WO2023020352A1 (zh) 一种数据传输方法及相关装置
WO2022198523A1 (zh) 信息传输方法、装置、通信设备和存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23773571

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2023773571

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2023773571

Country of ref document: EP

Effective date: 20240809