WO2023231038A1 - 测距方法及装置 - Google Patents

测距方法及装置 Download PDF

Info

Publication number
WO2023231038A1
WO2023231038A1 PCT/CN2022/097014 CN2022097014W WO2023231038A1 WO 2023231038 A1 WO2023231038 A1 WO 2023231038A1 CN 2022097014 W CN2022097014 W CN 2022097014W WO 2023231038 A1 WO2023231038 A1 WO 2023231038A1
Authority
WO
WIPO (PCT)
Prior art keywords
ranging
terminal device
request message
ranging request
response
Prior art date
Application number
PCT/CN2022/097014
Other languages
English (en)
French (fr)
Inventor
梁浩然
沈洋
陆伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2022/097014 priority Critical patent/WO2023231038A1/zh
Priority to CN202280001845.5A priority patent/CN117501717A/zh
Publication of WO2023231038A1 publication Critical patent/WO2023231038A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Definitions

  • the present application relates to the field of communication technology, and in particular, to a ranging method and device.
  • the ranging service defined in 3GPP technical report TR 22.855 refers to determining the distance between two UEs (User Equipment) and/or the direction between one UE and another UE through a direct communication connection.
  • the UE that needs to perform ranging on another UE is called the reference UE, and the UE to be ranged is called the target UE.
  • the reference UE can directly initiate the ranging process by sending a ranging request to the target UE on PC5 (underlay direct cellular communication protocol interface).
  • PC5 underlay direct cellular communication protocol interface
  • the reference UE initiates the ranging process directly on PC5
  • there is no privacy check mechanism and the reference UE can obtain highly accurate distance and direction information of the target UE without the permission of the target UE, resulting in location privacy leakage.
  • the first embodiment of the present application provides a ranging method, which is executed by a second terminal device.
  • the method includes:
  • a ranging response message is sent to the first terminal device, where the ranging response message is used to confirm whether to accept the ranging request.
  • the privacy profile includes at least one of the following information:
  • a terminal device list including the identification of at least one terminal device that the second terminal device allows to connect;
  • the ranging request message includes: the first terminal device identifier, the second terminal device identifier and the ranging type;
  • the ranging type includes the first terminal device directly initiating a ranging request, or the first terminal device initiating a ranging request under the trigger of a third terminal device.
  • the ranging request message further includes the third terminal device identifier.
  • the ranging request message also includes ranging information, and the ranging information includes at least one of the following:
  • Ranging geographical area information ranging time information; ranging distance accuracy information; ranging direction accuracy information.
  • performing privacy verification on the ranging request message according to the privacy configuration file stored in the second terminal device includes:
  • the privacy verification of the ranging request message passes;
  • performing privacy verification on the ranging request message according to the privacy configuration file stored in the second terminal device includes:
  • the privacy verification of the ranging request message passes;
  • the ranging request message privacy verification fails.
  • performing privacy verification on the ranging request message according to the privacy configuration file stored in the second terminal device further includes:
  • the privacy verification of the ranging request message passes;
  • the privacy verification of the ranging request message fails.
  • performing privacy verification on the ranging request message according to the privacy configuration file stored in the second terminal device includes:
  • the privacy verification of the ranging request message passes.
  • the ranging response message is used to reject the ranging request of the first terminal device.
  • the method also includes:
  • the ranging response message is used to reject the ranging request of the first terminal device.
  • the ranging response message is used to confirm acceptance of the ranging request of the first terminal device.
  • the second embodiment of the present application provides a ranging method, which is executed by a first terminal device.
  • the method includes:
  • the ranging request message includes: the first terminal device identifier, the second terminal device identifier and the ranging type;
  • the ranging type includes the first terminal device directly initiating a ranging request, or the first terminal device initiating a ranging request under the trigger of a third terminal device.
  • the ranging request message in response to the ranging type being ranging triggered by a third terminal device, the ranging request message further includes the third terminal device identifier.
  • the ranging request message also includes ranging information, and the ranging information includes at least one of the following:
  • Ranging geographical area information ranging time information; ranging distance accuracy information; ranging direction accuracy information.
  • the method also includes:
  • the ranging response message In response to the integrity check of the ranging response message failing, the ranging response message is rejected.
  • the third embodiment of the present application provides a ranging device, which is applied to a second terminal device.
  • the device includes:
  • a receiving unit configured to receive a ranging request message sent by the first terminal device
  • a processing unit configured to perform privacy verification on the ranging request message according to the privacy configuration file stored in the second terminal device
  • a sending unit configured to send a ranging response message to the first terminal device, where the ranging response message is used to confirm whether to accept the ranging request.
  • the privacy profile includes at least one of the following information:
  • a terminal device list including the identification of at least one terminal device that the second terminal device allows to connect;
  • the ranging request message includes: the first terminal device identifier, the second terminal device identifier and the ranging type;
  • the ranging type includes the first terminal device directly initiating a ranging request, or the first terminal device initiating a ranging request under the trigger of a third terminal device.
  • the ranging request message further includes the third terminal device identifier.
  • the ranging request message also includes ranging information, and the ranging information includes at least one of the following:
  • Ranging geographical area information ranging time information; ranging distance accuracy information; ranging direction accuracy information.
  • processing unit is specifically used for:
  • the privacy verification of the ranging request message passes;
  • processing unit is specifically used for:
  • the privacy verification of the ranging request message passes;
  • the ranging request message privacy verification fails.
  • processing unit is also used to:
  • the privacy verification of the ranging request message passes;
  • the privacy verification of the ranging request message fails.
  • processing unit is specifically used for:
  • the privacy verification of the ranging request message passes.
  • the ranging response message is used to reject the ranging request of the first terminal device.
  • processing unit is also used to:
  • the ranging response message is used to reject the ranging request of the first terminal device.
  • the ranging response message is used to confirm acceptance of the ranging request of the first terminal device.
  • the fourth embodiment of the present application provides a ranging device, which is applied to a first terminal device.
  • the device includes:
  • a sending unit configured to send a ranging request message to the second terminal device, where the ranging request message is used to request ranging for the second terminal device;
  • a receiving unit configured to receive a ranging response message sent by the second terminal device, where the ranging response message is used to confirm whether to accept the ranging request.
  • the ranging request message includes: the first terminal device identifier, the second terminal device identifier and the ranging type;
  • the ranging type includes the first terminal device directly initiating a ranging request, or the first terminal device initiating a ranging request under the trigger of a third terminal device.
  • the ranging request message in response to the ranging type being ranging triggered by a third terminal device, the ranging request message further includes the third terminal device identifier.
  • the ranging request message also includes ranging information, and the ranging information includes at least one of the following:
  • Ranging geographical area information ranging time information; ranging distance accuracy information; ranging direction accuracy information.
  • the device also includes:
  • a processing unit used to verify the integrity of the ranging response message
  • the processing unit is further configured to reject the ranging response message in response to failure of integrity check of the ranging response message.
  • the fifth embodiment of the present application provides a communication device.
  • the device includes a processor and a memory.
  • a computer program is stored in the memory.
  • the processor executes the computer program stored in the memory so that the The device executes the ranging method described in the above embodiment of the first aspect.
  • the sixth embodiment of the present application provides a communication device.
  • the device includes a processor and a memory.
  • a computer program is stored in the memory.
  • the processor executes the computer program stored in the memory so that the The device executes the ranging method described in the above embodiment of the second aspect.
  • the seventh embodiment of the present application provides a communication device.
  • the device includes a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is used to run the code instructions to enable the The device executes the ranging method described in the above embodiment of the first aspect.
  • the eighth embodiment of the present application provides a communication device.
  • the device includes a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is used to run the code instructions to enable the The device executes the ranging method described in the above embodiment of the second aspect.
  • the ninth embodiment of the present application provides a computer-readable storage medium for storing instructions. When the instructions are executed, the ranging method described in the first embodiment is implemented.
  • the tenth embodiment of the present application provides a computer-readable storage medium for storing instructions, and when the instructions are executed, the ranging method described in the second embodiment is implemented.
  • the eleventh aspect embodiment of the present application provides a computer program that, when run on a computer, causes the computer to execute the ranging allocation method described in the first aspect embodiment.
  • the twelfth aspect embodiment of the present application provides a computer program that, when run on a computer, causes the computer to perform the ranging method described in the second aspect embodiment.
  • a ranging method and device by receiving a ranging request message sent by a first terminal device, performs privacy verification on the ranging request message according to a privacy configuration file stored in the second terminal device, and provides The first terminal device sends a ranging response message.
  • the ranging response message is used to confirm whether to accept the ranging request, so that the first terminal device needs to pass the privacy verification of the second terminal device and obtain the permission of the second terminal device before proceeding.
  • the ranging service can be performed to obtain the distance and direction of the second terminal device being measured, which effectively protects the privacy of the terminal device from being leaked and improves the security of the system.
  • Figure 1a is a schematic architectural diagram of a communication system provided by an embodiment of the present application.
  • Figure 1b is a schematic diagram of providing ranging services to terminal devices with or without network coverage
  • Figure 2 is a schematic flow chart of a ranging method provided by an embodiment of the present application.
  • Figure 3 is a schematic flow chart of a ranging method provided by an embodiment of the present application.
  • Figure 4 is a schematic flow chart of a ranging method provided by an embodiment of the present application.
  • Figure 5 is a schematic flowchart of a ranging method provided by an embodiment of the present application.
  • Figure 6 is a schematic flow chart of a ranging method provided by an embodiment of the present application.
  • Figure 7 is a schematic flow chart of a ranging method provided by an embodiment of the present application.
  • Figure 8 is a schematic flow chart of a ranging method provided by an embodiment of the present application.
  • Figure 9 is a schematic structural diagram of a distance measuring device provided by an embodiment of the present application.
  • Figure 10 is a schematic structural diagram of a distance measuring device provided by an embodiment of the present application.
  • Figure 11 is a schematic structural diagram of another distance measuring device provided by an embodiment of the present application.
  • Figure 12 is a schematic structural diagram of a chip provided by an embodiment of the present application.
  • first, second, third, etc. may be used to describe various information in the embodiments of this application, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from each other.
  • first information may also be called second information, and similarly, the second information may also be called first information.
  • the words "if” and “if” as used herein may be interpreted as "when” or "when” or “in response to determining.”
  • Figure 1a is a schematic architectural diagram of a communication system provided by an embodiment of the present application.
  • the communication system may include but is not limited to a first terminal device and a second terminal device.
  • the number and form of devices shown in Figure 1a are only for examples and do not constitute a limitation on the embodiments of the present application. In actual applications, two terminal devices may be included. Or two or more network devices and two or more terminal devices.
  • the communication system shown in Figure 1a takes as an example a first terminal device 101 and a second terminal device 102.
  • LTE Long Term Evolution
  • 5G new air interface system 5G new air interface system
  • other future new mobile communication systems 5G new air interface system
  • the first terminal device 101 and the second terminal device 102 in the embodiment of this application are entities on the user side that are used to receive or transmit signals, such as a mobile phone.
  • Terminal equipment can also be called terminal equipment (terminal), user equipment (user equipment, UE), mobile station (Mobile Station, MS), mobile terminal equipment (Mobile Terminal, MT), etc.
  • Terminal devices can be cars with communication functions, smart cars, mobile phones, wearable devices, tablets (Pad), computers with wireless transceiver functions, virtual reality (Virtual Reality, VR) terminal devices, augmented reality ( Augmented Reality (AR) terminal equipment, wireless terminal equipment in industrial control (Industrial Control), wireless terminal equipment in self-driving (Self-Driving), wireless terminal equipment in remote surgery (Remote Medical Surgery), smart grid ( Wireless terminal equipment in Smart Grid, wireless terminal equipment in Transportation Safety, wireless terminal equipment in Smart City, wireless terminal equipment in Smart Home, etc.
  • the embodiments of this application do not limit the specific technology and specific equipment form used by the terminal equipment.
  • the ranging service defined in 3GPP technical report TR 22.855 refers to the determination of the distance between two terminal devices and/or the direction between one terminal device and another terminal device through a direct communication connection.
  • the terminal device that needs to perform ranging on another terminal device may be called a reference terminal device (the first terminal device 101 in this embodiment of the present application), and the terminal device to be ranged may be called a target terminal device (the first terminal device in this embodiment of the present application). 2. Terminal equipment 102).
  • the first terminal device 101 has a reference plane and a reference direction.
  • the direction from the second terminal device 102 to the first terminal device 101 is the angle between the connection line between the first terminal device 101 and the second terminal device 102 and the reference direction. It is represented by its azimuth and elevation directions.
  • the azimuth direction of the second terminal device 102 is the angle formed between the projection of the line connecting the first terminal device 101 to the second terminal device 102 on the same plane as the reference direction perpendicular to the vertex and the reference direction.
  • the elevation direction of the second terminal device 102 is an angle above the horizontal plane.
  • Ranging services can be supported with or without 5G network coverage.
  • Figure 1b is a schematic diagram of providing ranging services to terminal devices with or without network coverage. If the licensed band is used for ranging, it should be fully under operator control.
  • the first terminal device 101 can directly start the ranging process by sending a ranging request to the second terminal device 102 on PC5 (underlying direct cellular communication protocol interface). This process can be regarded as a ranging process based on the terminal device.
  • PC5 underlying direct cellular communication protocol interface
  • This process can be regarded as a ranging process based on the terminal device.
  • the first terminal device 101 directly initiates the ranging process on the PC 5 there is no privacy check mechanism, and the first terminal device 101 can obtain the highly accurate distance of the second terminal device 102 without the permission of the second terminal device 102. and direction information, resulting in location privacy leakage. Therefore, when the first terminal device 101 directly initiates the ranging process on the PC 5, a mechanism needs to be designed to protect the privacy of the second terminal device 102.
  • Figure 2 is a schematic flowchart of a ranging method provided by an embodiment of the present application. It should be noted that the ranging method in this embodiment of the present application is executed by the second terminal device. This method can be executed independently or in conjunction with any other embodiment of the present application. As shown in Figure 2, the method may include the following steps:
  • Step 201 Receive a ranging request message sent by the first terminal device.
  • the second terminal device can receive the ranging request message sent by the first terminal device, receive the ranging request initiated by the first terminal device, and perform privacy verification on the ranging request message to determine whether to allow it.
  • the first terminal device performs ranging service.
  • the secure direct connection between the first terminal device and the second terminal device is established based on the ProSe (Proximity-based Services, short-range communication) process.
  • ProSe Proximity-based Services, short-range communication
  • the ranging request message includes: a first terminal device identifier, a second terminal device identifier and a ranging type.
  • the ranging type may be direct ranging, that is, the first terminal device directly initiates a ranging request, or ranging triggered by the third terminal device, that is, the first terminal device triggers the ranging request on the third terminal device. Initiate a ranging request.
  • the first terminal device in response to the ranging type, initiates a ranging request under the trigger of the third terminal device, and the ranging request message also includes the third terminal device identifier.
  • the ranging request message also includes ranging information
  • the ranging information includes at least one of the following: ranging geographical area information; ranging time information; ranging distance accuracy information; ranging direction accuracy information.
  • the ranging geographical area information refers to the geographical area where the ranging task requested by the first terminal device is performed
  • the ranging time information refers to the time period in which the ranging task requested by the first terminal device occurs
  • the ranging distance accuracy information refers to the ranging distance accuracy required by the ranging task requested by the first terminal device
  • the ranging direction accuracy information refers to the ranging direction accuracy required by the ranging task requested by the first terminal device.
  • the second terminal device can also perform integrity verification on the received ranging request message to verify whether the request message has been tampered with. If the integrity check fails, it means that the ranging request message has been tampered with, and the second terminal device can reject the ranging request of the first terminal device.
  • Step 202 Perform privacy verification on the ranging request message according to the privacy configuration file stored in the second terminal device.
  • the second terminal device can securely store the privacy configuration file, and perform privacy verification on the ranging request message sent by the first terminal device according to the privacy configuration file to determine whether to allow the first terminal device Perform ranging services.
  • the second terminal device can transfer the locally stored privacy configuration file from the public layer to the ProSe layer.
  • the privacy profile includes at least one of the following information: terminal device list; ranging type restriction information; ranging geographical area restriction information; ranging time restriction information; ranging distance accuracy restriction information; ranging direction Accuracy limit information; auxiliary terminal device quantity limit information.
  • the terminal device list is a list of terminal devices that are trusted by the second terminal device and are allowed to connect, and the terminal device list includes an identifier of at least one terminal device that the second terminal device is allowed to connect to;
  • the ranging type restriction information refers to the ranging type supported by the second terminal device
  • the ranging geographical area restriction information refers to the area in which the second terminal device is allowed to be ranged
  • the ranging time limit information refers to the time period during which the second terminal device is allowed to be ranging
  • the ranging distance accuracy limit information refers to the highest accuracy of ranging distance allowed by the second terminal device
  • the ranging direction accuracy limit information refers to the highest accuracy in the ranging direction allowed by the second terminal device
  • the auxiliary terminal device quantity limit information refers to the maximum number of auxiliary terminal devices participating in the collaborative ranging process.
  • auxiliary terminal devices participate in the collaborative ranging process. The greater the number of auxiliary terminal devices, the higher the accuracy of the final ranging result. If the first terminal device initiates the ranging request under the trigger of the third terminal device, the first terminal device is the auxiliary terminal device.
  • the third terminal device may trigger at least one auxiliary terminal device to initiate a ranging request to the second terminal device.
  • the ranging request message privacy verification passes.
  • the ranging request message privacy verification passes.
  • the second terminal device is also able to determine the number of auxiliary terminal devices triggered by the third terminal device. In response to the number of auxiliary terminal devices triggered by the third terminal device being less than or equal to the auxiliary terminal device quantity limit information, the privacy verification of the ranging request message passes.
  • the ranging request message privacy verification passes.
  • Step 203 Send a ranging response message to the first terminal device.
  • the ranging response message is used to confirm whether to accept the ranging request.
  • the second terminal device can send a ranging response message to the first terminal device.
  • the ranging response message is used to confirm whether to accept the ranging request message. Ranging request.
  • the first terminal device can determine whether the ranging request is allowed or rejected based on the ranging response message.
  • the ranging response message in response to the privacy verification of the ranging request message failing, is used to reject the ranging request of the first terminal device.
  • the ranging response message in response to the ranging request message privacy verification passing, is used to confirm acceptance of the ranging request of the first terminal device, and the second terminal device accepts the ranging request, Continue with this ranging mission.
  • the ranging response message in response to the ranging response message being used to reject the ranging request of the first terminal device, the ranging response message also includes a reason for rejecting the ranging request.
  • the ranging response message is used to confirm whether to accept the ranging request, so that the first terminal device needs to pass the privacy verification of the second terminal device and obtain the permission of the second terminal device before it can perform the ranging service and obtain the ranged information.
  • the distance and direction of the second terminal device effectively protect the privacy of the terminal device from being leaked and improve the security of the system.
  • Figure 3 is a schematic flowchart of a ranging method provided by an embodiment of the present application. It should be noted that the ranging method in the embodiment of the present application is executed by the terminal device. This method can be executed independently or in conjunction with any other embodiment of the present application. As shown in Figure 3, the method may include the following steps:
  • Step 301 Receive a ranging request message sent by the first terminal device.
  • the second terminal device can receive the ranging request message sent by the first terminal device, receive the ranging request initiated by the first terminal device, and perform privacy verification on the ranging request message to determine whether to allow it.
  • the first terminal device performs ranging service.
  • the secure direct connection between the first terminal device and the second terminal device is established based on the ProSe process.
  • the ranging request message includes: a first terminal device identifier, a second terminal device identifier and a ranging type.
  • the ranging type may be direct ranging, that is, the first terminal device directly initiates a ranging request, or ranging triggered by the third terminal device, that is, the first terminal device triggers the ranging request on the third terminal device. Initiate a ranging request.
  • the first terminal device in response to the ranging type, initiates a ranging request under the trigger of the third terminal device, and the ranging request message also includes the third terminal device identifier.
  • the ranging request message also includes ranging information
  • the ranging information includes at least one of the following: ranging geographical area information; ranging time information; ranging distance accuracy information; ranging direction accuracy information.
  • the ranging geographical area information refers to the geographical area where the ranging task requested by the first terminal device is performed
  • the ranging time information refers to the time period in which the ranging task requested by the first terminal device occurs
  • the ranging distance accuracy information refers to the ranging distance accuracy required by the ranging task requested by the first terminal device
  • the ranging direction accuracy information refers to the ranging direction accuracy required by the ranging task requested by the first terminal device.
  • Step 302 Verify the integrity of the ranging request message.
  • the second terminal device can perform an integrity check on the received ranging request message to determine that the ranging request message has not been tampered with.
  • the second terminal device rejects the ranging request of the first terminal device.
  • the second terminal device in response to the ranging request message passing the integrity check, it means that the ranging request message has not been tampered with, and the second terminal device continues to perform privacy verification on the ranging request message.
  • Step 303 Perform privacy verification on the ranging request message according to the privacy configuration file stored in the second terminal device.
  • the second terminal device can securely store the privacy configuration file, and perform privacy verification on the ranging request message sent by the first terminal device according to the privacy configuration file to determine whether to allow the first terminal device Perform ranging services.
  • the second terminal device can transfer the locally stored privacy configuration file from the public layer to the ProSe layer.
  • the privacy profile includes at least one of the following information: terminal device list; ranging type restriction information; ranging geographical area restriction information; ranging time restriction information; ranging distance accuracy restriction information; ranging direction Accuracy limit information; auxiliary terminal device quantity limit information.
  • the terminal device list is a list of terminal devices that are trusted by the second terminal device and are allowed to connect, and the terminal device list includes an identifier of at least one terminal device that the second terminal device is allowed to connect to;
  • the ranging type restriction information refers to the ranging type supported by the second terminal device
  • the ranging geographical area restriction information refers to the area in which the second terminal device is allowed to be ranged
  • the ranging time limit information refers to the time period during which the second terminal device is allowed to be ranging
  • the ranging distance accuracy limit information refers to the highest accuracy of ranging distance allowed by the second terminal device
  • the ranging direction accuracy limit information refers to the highest accuracy in the ranging direction allowed by the second terminal device
  • the auxiliary terminal device quantity limit information refers to the maximum number of auxiliary terminal devices participating in the collaborative ranging process.
  • auxiliary terminal devices participate in the collaborative ranging process. The greater the number of auxiliary terminal devices, the higher the accuracy of the final ranging result. If the first terminal device initiates the ranging request under the trigger of the third terminal device, the first terminal device is the auxiliary terminal device.
  • the third terminal device may trigger at least one auxiliary terminal device to initiate a ranging request to the second terminal device.
  • the ranging request message privacy verification in response to the first terminal device identifier being in the terminal device list, the ranging request message privacy verification passes. In response to the first terminal device identifier not being in the terminal device list, the ranging request message privacy verification fails.
  • the ranging type of ranging initiated by the first terminal device is ranging triggered by a third terminal device, and the second terminal device needs to verify the first terminal device and the third terminal device. Are they all in the list of terminal devices allowed to connect?
  • the privacy verification of the ranging request message passes.
  • the ranging request message privacy verification fails. That is, both the first terminal device and the third terminal device must be in the terminal device list so that the privacy verification of the ranging request message can pass. If one of the first terminal device and the third terminal device is not in the terminal device list, the privacy verification of the ranging request message will fail.
  • the ranging type of ranging initiated by the first terminal device is ranging triggered by a third terminal device, and the first terminal device is an auxiliary terminal device.
  • the second terminal device is also able to determine the number of auxiliary terminal devices triggered by the third terminal device.
  • the privacy verification of the ranging request message passes. In response to the number of auxiliary terminal devices triggered by the third terminal device being greater than the auxiliary terminal device quantity limit information, the privacy verification of the ranging request message fails.
  • the ranging request message privacy verification passes. That is to say, the ranging information in the ranging request message must comply with the restriction information in the privacy profile, and the privacy verification of the ranging request message can pass. If any of the ranging information in the ranging request message does not comply with the restricted information in the privacy profile, the privacy verification of the ranging request message will fail.
  • the first terminal device identification, ranging type and ranging information included in the ranging request message must all comply with the restrictions in the privacy profile, so that the privacy verification of the ranging request message can pass.
  • the first terminal device identifier, the third terminal device identifier, the ranging type and the ranging information included in the ranging request message must all The privacy verification of the ranging request message can pass only if it complies with the restrictions in the privacy profile and the number of auxiliary terminal devices triggered by the third terminal device is less than or equal to the number limit information of auxiliary terminal devices.
  • Step 304 Send a ranging response message to the first terminal device.
  • the ranging response message is used to confirm whether to accept the ranging request.
  • the second terminal device can send a ranging response message to the first terminal device.
  • the ranging response message is used to confirm whether to accept the ranging request message. Ranging request.
  • the first terminal device can determine whether the ranging request is allowed or rejected based on the ranging response message.
  • the ranging response message in response to the privacy verification of the ranging request message failing, is used to reject the ranging request of the first terminal device.
  • the ranging response message in response to the ranging request message privacy verification passing, is used to confirm acceptance of the ranging request of the first terminal device, and the second terminal device accepts the ranging request, Continue with this ranging mission.
  • the ranging response message in response to the ranging response message being used to reject the ranging request of the first terminal device, the ranging response message also includes a reason for rejecting the ranging request.
  • the first terminal device sends a ranging response message.
  • the ranging response message is used to confirm whether to accept the ranging request, so that the first terminal device needs to pass the privacy verification of the second terminal device and obtain the permission of the second terminal device before proceeding.
  • the ranging service can be performed to obtain the distance and direction of the second terminal device being measured, which effectively protects the privacy of the terminal device from being leaked and improves the security of the system.
  • Figure 4 is a schematic flowchart of a ranging method provided by an embodiment of the present application. It should be noted that the ranging method in this embodiment of the present application is executed by the first terminal device. This method can be executed independently or in conjunction with any other embodiment of the present application. As shown in Figure 4, the method may include the following steps:
  • Step 401 Send a ranging request message to a second terminal device, where the ranging request message is used to request ranging for the second terminal device.
  • the first terminal device can send a ranging request message to the second terminal device, and the second terminal device can receive the ranging request initiated by the first terminal device and perform privacy verification on the ranging request message. to determine whether the first terminal device is allowed to perform the ranging service.
  • the ranging request message sent by the first terminal device to the second terminal device is used to request ranging for the second terminal device.
  • the second terminal device can perform privacy verification on the ranging request message according to its own stored privacy configuration file, that is, at the same time, the ranging request message can also be used for privacy verification on the second terminal device.
  • the secure direct connection between the first terminal device and the second terminal device is established based on the ProSe process.
  • the ranging request message includes: a first terminal device identifier, a second terminal device identifier and a ranging type.
  • the ranging type may be direct ranging, that is, the first terminal device directly initiates a ranging request, or ranging triggered by the third terminal device, that is, the first terminal device triggers the ranging request on the third terminal device. Initiate a ranging request.
  • the first terminal device in response to the ranging type, initiates a ranging request under the trigger of the third terminal device, and the ranging request message also includes the third terminal device identifier.
  • the ranging request message also includes ranging information
  • the ranging information includes at least one of the following: ranging geographical area information; ranging time information; ranging distance accuracy information; ranging direction accuracy information.
  • the ranging geographical area information refers to the geographical area where the ranging task requested by the first terminal device is performed
  • the ranging time information refers to the time period in which the ranging task requested by the first terminal device occurs
  • the ranging distance accuracy information refers to the ranging distance accuracy required by the ranging task requested by the first terminal device
  • the ranging direction accuracy information refers to the ranging direction accuracy required by the ranging task requested by the first terminal device.
  • Step 402 Receive a ranging response message sent by the second terminal device.
  • the ranging response message is used to confirm whether to accept the ranging request.
  • the first terminal device can receive a ranging response message sent by the second terminal device, and the ranging response message is used to confirm whether to accept the ranging request.
  • the first terminal device can determine whether the ranging request is allowed or rejected based on the ranging response message.
  • the ranging response message in response to the privacy verification of the ranging request message failing, is used to reject the ranging request of the first terminal device.
  • the ranging response message in response to the ranging request message privacy verification passing, is used to confirm acceptance of the ranging request of the first terminal device, and the second terminal device accepts the ranging request, Continue with this ranging mission.
  • the first terminal device can also perform integrity verification on the received ranging response message to verify whether the response message has been tampered with. If the integrity check fails, it means that the ranging response message has been tampered with, and the first terminal device can reject the ranging response message.
  • the ranging response message in response to the ranging response message being used to reject the ranging request of the first terminal device, the ranging response message also includes a reason for rejecting the ranging request.
  • the ranging request message is used to request ranging for the second terminal device, and receiving the ranging response message sent by the second terminal device, the ranging response
  • the message is used to confirm whether to accept the ranging request, so that the first terminal device needs to pass the privacy verification of the second terminal device and obtain the permission of the second terminal device before it can perform the ranging service and obtain the ranged second terminal device.
  • the distance and direction effectively protect the privacy of the terminal device from being leaked and improve the security of the system.
  • Figure 5 is a schematic flowchart of a ranging method provided by an embodiment of the present application. It should be noted that the ranging method in this embodiment of the present application is executed by the first terminal device. This method can be executed independently or in conjunction with any other embodiment of the present application. As shown in Figure 5, the method may include the following steps:
  • Step 501 Send a ranging request message to a second terminal device, where the ranging request message is used to request ranging for the second terminal device.
  • the first terminal device can send a ranging request message to the second terminal device, and the second terminal device can receive the ranging request initiated by the first terminal device and perform privacy verification on the ranging request message. to determine whether the first terminal device is allowed to perform the ranging service.
  • the secure direct connection between the first terminal device and the second terminal device is established based on the ProSe process.
  • the ranging request message sent by the first terminal device to the second terminal device is used to request ranging for the second terminal device.
  • the second terminal device can perform privacy verification on the ranging request message according to its own stored privacy configuration file, that is, at the same time, the ranging request message can also be used for privacy verification on the second terminal device.
  • the ranging request message includes: a first terminal device identifier, a second terminal device identifier and a ranging type.
  • the ranging type may be direct ranging, that is, the first terminal device directly initiates a ranging request, or ranging triggered by the third terminal device, that is, the first terminal device triggers the ranging request on the third terminal device. Initiate a ranging request.
  • the first terminal device in response to the ranging type, initiates a ranging request under the trigger of the third terminal device, and the ranging request message also includes the third terminal device identifier.
  • the ranging request message also includes ranging information
  • the ranging information includes at least one of the following: ranging geographical area information; ranging time information; ranging distance accuracy information; ranging direction accuracy information.
  • the ranging geographical area information refers to the geographical area where the ranging task requested by the first terminal device is performed
  • the ranging time information refers to the time period in which the ranging task requested by the first terminal device occurs
  • the ranging distance accuracy information refers to the ranging distance accuracy required by the ranging task requested by the first terminal device
  • the ranging direction accuracy information refers to the ranging direction accuracy required by the ranging task requested by the first terminal device.
  • the second terminal device can perform privacy verification on the ranging request message according to its own stored privacy configuration file, and obtain the privacy verification result of the ranging request message.
  • Step 502 Receive a ranging response message sent by the second terminal device.
  • the ranging response message is used to confirm whether to accept the ranging request.
  • the first terminal device can receive a ranging response message sent by the second terminal device, and the ranging response message is used to confirm whether to accept the ranging request.
  • the first terminal device can determine whether the ranging request is allowed or rejected based on the ranging response message.
  • the ranging response message in response to the privacy verification of the ranging request message failing, is used to reject the ranging request of the first terminal device.
  • the ranging response message in response to the ranging request message privacy verification passing, is used to confirm acceptance of the ranging request of the first terminal device, and the second terminal device accepts the ranging request, Continue with this ranging mission.
  • Step 503 Verify the integrity of the ranging response message.
  • the first terminal device can perform an integrity check on the received ranging response message to determine that the ranging response message has not been tampered with.
  • the first terminal device in response to the failure of the integrity check of the ranging response message, it means that the ranging response message has been tampered with, and the first terminal device can reject the ranging response message.
  • the first terminal device in response to the ranging response message passing the integrity check, it means that the ranging response message has not been tampered with, and the first terminal device receives and parses the ranging response message.
  • the ranging request message is used to request ranging for the second terminal device, and receiving the ranging response message sent by the second terminal device, the ranging response
  • the message is used to confirm whether to accept the ranging request and to verify the integrity of the ranging response message, so that the first terminal device needs to pass the privacy verification of the second terminal device and obtain the permission of the second terminal device before it can perform ranging. service to obtain the distance and direction of the second terminal device being measured, effectively protecting the privacy of the terminal device from being leaked and improving the security of the system.
  • FIG. 6 is a schematic flowchart of a ranging method provided by an embodiment of the present application. It should be noted that the ranging method in this embodiment of the present application is executed by the first terminal device. This method can be executed independently or in conjunction with any other embodiment of the present application. As shown in Figure 6, the method may include the following steps:
  • Step 601 Under the trigger of the third terminal device, send a ranging request message to the second terminal device, where the ranging request message is used to request ranging for the second terminal device.
  • the first terminal device sends a ranging request message to the second terminal device under the trigger of the third terminal device.
  • the second terminal device can receive the ranging request initiated by the first terminal device and respond to the ranging request message.
  • the ranging request message undergoes privacy verification to determine whether the first terminal device is allowed to perform the ranging service.
  • the secure direct connection between the first terminal device and the second terminal device is established based on the ProSe process.
  • the ranging request message sent by the first terminal device to the second terminal device is used to request ranging for the second terminal device.
  • the second terminal device can perform privacy verification on the ranging request message according to its own stored privacy configuration file, that is, at the same time, the ranging request message can also be used for privacy verification on the second terminal device.
  • the first terminal device may receive indication information sent by the third terminal device, where the indication information is used to instruct the first terminal device to initiate a ranging request to the second terminal device.
  • the first terminal device initiates a ranging request to the second terminal device under the trigger of the third terminal device. Therefore, the first terminal device is an auxiliary terminal device, and the first terminal device The terminal device is an auxiliary terminal device serving the third terminal device.
  • the third terminal device may trigger at least one terminal device to initiate a ranging request to the second terminal device, and the at least one terminal device triggered is at least one auxiliary terminal device serving the third terminal device.
  • the ranging request message includes: a first terminal device identifier, a second terminal device identifier, a third terminal device identifier and a ranging type.
  • the ranging type is ranging triggered by a third terminal device, that is, the first terminal device initiates a ranging request when triggered by the third terminal device.
  • the ranging request message also includes ranging information
  • the ranging information includes at least one of the following: ranging geographical area information; ranging time information; ranging distance accuracy information; ranging direction accuracy information.
  • the ranging geographical area information refers to the geographical area where the ranging task requested by the first terminal device is performed
  • the ranging time information refers to the time period in which the ranging task requested by the first terminal device occurs
  • the ranging distance accuracy information refers to the ranging distance accuracy required by the ranging task requested by the first terminal device
  • the ranging direction accuracy information refers to the ranging direction accuracy required by the ranging task requested by the first terminal device.
  • the second terminal device can perform privacy verification on the ranging request message according to its own stored privacy configuration file, and obtain the privacy verification result of the ranging request message.
  • Step 602 Receive a ranging response message sent by the second terminal device.
  • the ranging response message is used to confirm whether to accept the ranging request.
  • the first terminal device can receive a ranging response message sent by the second terminal device, and the ranging response message is used to confirm whether to accept the ranging request.
  • the first terminal device can determine whether the ranging request is allowed or rejected based on the ranging response message.
  • the ranging response message in response to the privacy verification of the ranging request message failing, is used to reject the ranging request of the first terminal device.
  • the ranging response message in response to the ranging request message privacy verification passing, is used to confirm acceptance of the ranging request of the first terminal device, and the second terminal device accepts the ranging request, Continue with this ranging mission.
  • the second terminal device can verify whether it supports ranging triggered by the third terminal device, and verify whether the first terminal device identification and the third terminal device identification are both in the privacy configuration file.
  • the terminal device list verify whether the number of auxiliary terminal devices triggered by the third terminal device is less than or equal to the auxiliary terminal device quantity limit information, and verify whether the ranging information in the ranging request message all conforms to the privacy configuration file limits. If both verifications pass, the ranging request message privacy verification passes.
  • Step 603 Verify the integrity of the ranging response message.
  • the first terminal device can perform an integrity check on the received ranging response message to determine that the ranging response message has not been tampered with.
  • the first terminal device in response to the failure of the integrity check of the ranging response message, it means that the ranging response message has been tampered with, and the first terminal device can reject the ranging response message.
  • the first terminal device in response to the ranging response message passing the integrity check, it means that the ranging response message has not been tampered with, and the first terminal device receives and parses the ranging response message.
  • Step 604 In response to the integrity verification of the ranging response message passing and the privacy verification of the ranging request message passing, the ranging result is sent to the third terminal device.
  • the first terminal device in response to the passing of the integrity check of the ranging response message, it means that the ranging response message has not been tampered with, the first terminal device receives and parses the ranging response message, and the ranging request message is private If the verification is passed, the first terminal device can perform the ranging service.
  • the first terminal device can send the ranging results obtained by executing the ranging service to the third terminal device. That is, the first terminal device serves as an auxiliary terminal device serving the third terminal device and sends its measurements to the third terminal device. The distance measurement results obtained.
  • the ranging request message is sent to the second terminal device.
  • the ranging request message is used to request ranging for the second terminal device, and the ranging request message sent by the second terminal device is received.
  • the ranging response message is used to confirm whether to accept the ranging request, to verify the integrity of the ranging response message, in response to the integrity check of the ranging response message passing, and the ranging request message If the privacy verification is passed, the ranging result is sent to the third terminal device, so that the first terminal device needs to pass the privacy verification of the second terminal device and obtain the permission of the second terminal device before it can perform the ranging service and obtain the ranged
  • the distance and direction of the second terminal device effectively protects the privacy of the terminal device from being leaked and improves the security of the system.
  • FIG. 7 is a schematic flowchart of a ranging method provided by an embodiment of the present application. This method can be executed independently or in conjunction with any other embodiment of the present application. As shown in Figure 7, the method may include the following steps:
  • Step 701 The first terminal device sends a ranging request message to the second terminal device.
  • the secure direct connection between the first terminal device and the second terminal device is established based on the ProSe process.
  • the first terminal device sends a ranging request message to the second terminal device to request the second terminal device to perform ranging on the second terminal device.
  • the second terminal device can perform privacy verification on the ranging request message according to its own stored privacy configuration file.
  • the ranging request message includes: a first terminal device identifier, a second terminal device identifier and a ranging type.
  • the ranging type may be direct ranging, that is, the first terminal device directly initiates a ranging request, or ranging triggered by the third terminal device, that is, the first terminal device triggers the ranging request on the third terminal device. Initiate a ranging request.
  • the first terminal device in response to the ranging type, initiates a ranging request under the trigger of the third terminal device, and the ranging request message also includes the third terminal device identifier.
  • the ranging request message also includes ranging information
  • the ranging information includes at least one of the following: ranging geographical area information; ranging time information; ranging distance accuracy information; ranging direction accuracy information.
  • the ranging geographical area information refers to the geographical area where the ranging task requested by the first terminal device is performed
  • the ranging time information refers to the time period in which the ranging task requested by the first terminal device occurs
  • the ranging distance accuracy information refers to the ranging distance accuracy required by the ranging task requested by the first terminal device
  • the ranging direction accuracy information refers to the ranging direction accuracy required by the ranging task requested by the first terminal device.
  • the second terminal device can perform privacy verification on the ranging request message according to its own stored privacy configuration file, and obtain the privacy verification result of the ranging request message.
  • Step 702 The second terminal device performs privacy verification on the ranging request message according to the stored privacy configuration file.
  • the second terminal device can transfer the locally stored privacy configuration file from the public layer to the ProSe layer.
  • the privacy profile includes at least one of the following information: terminal device list; ranging type restriction information; ranging geographical area restriction information; ranging time restriction information; ranging distance accuracy restriction information; ranging direction Accuracy limit information; auxiliary terminal device quantity limit information.
  • the terminal device list is a list of terminal devices that are trusted by the second terminal device and are allowed to connect, and the terminal device list includes an identifier of at least one terminal device that the second terminal device is allowed to connect to;
  • the ranging type restriction information refers to the ranging type supported by the second terminal device
  • the ranging geographical area restriction information refers to the area in which the second terminal device is allowed to be ranged
  • the ranging time limit information refers to the time period during which the second terminal device is allowed to be ranging
  • the ranging distance accuracy limit information refers to the highest accuracy of ranging distance allowed by the second terminal device
  • the ranging direction accuracy limit information refers to the highest accuracy in the ranging direction allowed by the second terminal device
  • the auxiliary terminal device quantity limit information refers to the maximum number of auxiliary terminal devices participating in the collaborative ranging process.
  • auxiliary terminal devices participate in the collaborative ranging process. The greater the number of auxiliary terminal devices, the higher the accuracy of the final ranging result. If the first terminal device initiates the ranging request under the trigger of the third terminal device, the first terminal device is the auxiliary terminal device.
  • the third terminal device may trigger at least one auxiliary terminal device to initiate a ranging request to the second terminal device.
  • the ranging request message privacy verification in response to the first terminal device identifier being in the terminal device list, the ranging request message privacy verification passes. In response to the first terminal device identifier not being in the terminal device list, the ranging request message privacy verification fails.
  • the ranging type of ranging initiated by the first terminal device is ranging triggered by a third terminal device, and the second terminal device needs to verify the first terminal device and the third terminal device. Are they all in the list of terminal devices allowed to connect?
  • the privacy verification of the ranging request message passes.
  • the ranging request message privacy verification fails. That is, both the first terminal device and the third terminal device must be in the terminal device list so that the privacy verification of the ranging request message can pass. If one of the first terminal device and the third terminal device is not in the terminal device list, the privacy verification of the ranging request message will fail.
  • the ranging type of ranging initiated by the first terminal device is ranging triggered by a third terminal device, and the first terminal device is an auxiliary terminal device.
  • the second terminal device is also able to determine the number of auxiliary terminal devices triggered by the third terminal device.
  • the privacy verification of the ranging request message passes. In response to the number of auxiliary terminal devices triggered by the third terminal device being greater than the auxiliary terminal device quantity limit information, the privacy verification of the ranging request message fails.
  • the ranging request message privacy verification passes. That is to say, the ranging information in the ranging request message must comply with the restriction information in the privacy profile, and the privacy verification of the ranging request message can pass. If any of the ranging information in the ranging request message does not comply with the restricted information in the privacy profile, the privacy verification of the ranging request message will fail.
  • the first terminal device identification, ranging type and ranging information included in the ranging request message must all comply with the restrictions in the privacy profile, so that the privacy verification of the ranging request message can pass.
  • the first terminal device identifier, the third terminal device identifier, the ranging type and the ranging information included in the ranging request message must all The privacy verification of the ranging request message can pass only if it complies with the restrictions in the privacy profile and the number of auxiliary terminal devices triggered by the third terminal device is less than or equal to the number limit information of auxiliary terminal devices.
  • Step 703 The second terminal device sends a ranging response message to the first terminal device.
  • the second terminal device can send a ranging response message to the first terminal device.
  • the ranging response message is used to confirm whether to accept the ranging request message. Ranging request.
  • the first terminal device can determine whether the ranging request is allowed or rejected based on the ranging response message.
  • the ranging response message in response to the privacy verification of the ranging request message failing, is used to reject the ranging request of the first terminal device.
  • the ranging response message in response to the ranging request message privacy verification passing, is used to confirm acceptance of the ranging request of the first terminal device, and the second terminal device accepts the ranging request, Continue with this ranging mission.
  • the first terminal device sends a ranging request message to the second terminal device
  • the second terminal device performs privacy verification on the ranging request message according to the stored privacy configuration file
  • the second terminal device sends the ranging request message to the first terminal device.
  • the ranging response message requires the first terminal device to pass the privacy verification of the second terminal device and obtain the permission of the second terminal device before it can perform the ranging service and obtain the distance and direction of the measured second terminal device. It effectively protects the privacy of the terminal device from being leaked and improves the security of the system.
  • FIG. 8 is a schematic flowchart of a ranging method provided by an embodiment of the present application. This method can be executed independently or in conjunction with any other embodiment of the present application. As shown in Figure 8, the method may include the following steps:
  • Step 801 The third terminal device sends indication information to the first terminal device.
  • the indication information is used to trigger the first terminal device to initiate a ranging request to the second terminal device.
  • the secure direct connection between the third terminal device and the first terminal device, and the secure direct connection between the first terminal device and the second terminal device can be established based on the ProSe process. .
  • the third terminal device can trigger the first terminal device to initiate a ranging request to the second terminal device.
  • the first terminal device may receive indication information sent by the third terminal device, where the indication information is used to instruct the first terminal device to initiate a ranging request to the second terminal device.
  • the indication information may include the second terminal device identifier.
  • the first terminal device initiates a ranging request to the second terminal device under the trigger of the third terminal device. Therefore, the first terminal device is an auxiliary terminal device, and the first terminal device The terminal device is an auxiliary terminal device serving the third terminal device.
  • the third terminal device may trigger at least one terminal device to initiate a ranging request to the second terminal device, and the at least one terminal device triggered is at least one auxiliary terminal device serving the third terminal device.
  • Step 802 Under the trigger of the third terminal device, the first terminal device sends a ranging request message to the second terminal device.
  • the first terminal device initiates a ranging request to the second terminal device under the trigger of the third terminal device.
  • the ranging request message includes: the first terminal device identifier, the second terminal device identifier, Third terminal equipment identification and ranging type.
  • the ranging type is ranging triggered by a third terminal device, that is, the first terminal device initiates a ranging request when triggered by the third terminal device.
  • the ranging request message also includes ranging information
  • the ranging information includes at least one of the following: ranging geographical area information; ranging time information; ranging distance accuracy information; ranging direction accuracy information.
  • the ranging geographical area information refers to the geographical area where the ranging task requested by the first terminal device is performed
  • the ranging time information refers to the time period in which the ranging task requested by the first terminal device occurs
  • the ranging distance accuracy information refers to the ranging distance accuracy required by the ranging task requested by the first terminal device
  • the ranging direction accuracy information refers to the ranging direction accuracy required by the ranging task requested by the first terminal device.
  • the second terminal device can perform privacy verification on the ranging request message according to its own stored privacy configuration file, and obtain the privacy verification result of the ranging request message.
  • Step 803 The second terminal device performs privacy verification on the ranging request message according to the stored privacy configuration file.
  • the second terminal device can transfer the locally stored privacy configuration file from the public layer to the ProSe layer.
  • the privacy profile includes at least one of the following information: terminal device list; ranging type restriction information; ranging geographical area restriction information; ranging time restriction information; ranging distance accuracy restriction information; ranging direction Accuracy limit information; auxiliary terminal device quantity limit information.
  • the terminal device list is a list of terminal devices that are trusted by the second terminal device and are allowed to connect, and the terminal device list includes an identifier of at least one terminal device that the second terminal device is allowed to connect to;
  • the ranging type restriction information refers to the ranging type supported by the second terminal device
  • the ranging geographical area restriction information refers to the area in which the second terminal device is allowed to be ranged
  • the ranging time limit information refers to the time period during which the second terminal device is allowed to be ranging
  • the ranging distance accuracy limit information refers to the highest accuracy of ranging distance allowed by the second terminal device
  • the ranging direction accuracy limit information refers to the highest accuracy in the ranging direction allowed by the second terminal device
  • the auxiliary terminal device quantity limit information refers to the maximum number of auxiliary terminal devices participating in the collaborative ranging process.
  • auxiliary terminal equipment participates in the collaborative ranging process. The greater the number of auxiliary terminal equipment, the higher the accuracy of the final ranging result.
  • the first terminal device if the first terminal device initiates the ranging request under the trigger of the third terminal device, then the first terminal device is the auxiliary terminal device.
  • the third terminal device may trigger at least one auxiliary terminal device to initiate a ranging request to the second terminal device.
  • the second terminal device can perform integrity verification on the received ranging request message.
  • the second terminal device performs integrity verification on the received ranging request message according to the stored privacy configuration file. This ranging request message undergoes privacy verification.
  • the second terminal device rejects the ranging request, that is, the ranging response message sent by the second terminal device to the first terminal device is used to reject the ranging request.
  • the second terminal device needs to verify whether the first terminal device and the third terminal device are both in the list of terminal devices that are allowed to connect.
  • the privacy verification of the ranging request message passes.
  • the ranging request message privacy verification fails. That is, both the first terminal device and the third terminal device must be in the terminal device list so that the privacy verification of the ranging request message can pass. If one of the first terminal device and the third terminal device is not in the terminal device list, the privacy verification of the ranging request message will fail.
  • the second terminal device can also determine the number of auxiliary terminal devices triggered by the third terminal device.
  • the privacy verification of the ranging request message passes. In response to the number of auxiliary terminal devices triggered by the third terminal device being greater than the auxiliary terminal device quantity limit information, the privacy verification of the ranging request message fails.
  • the ranging request message privacy verification passes. That is to say, the ranging information in the ranging request message must comply with the restriction information in the privacy profile, and the privacy verification of the ranging request message can pass. If any of the ranging information in the ranging request message does not comply with the restricted information in the privacy profile, the privacy verification of the ranging request message will fail.
  • the first terminal device identifier, the third terminal device identifier, the ranging type and the ranging information included in the ranging request message must all comply with the restrictions in the privacy profile. If the number of auxiliary terminal devices triggered by the third terminal device is less than or equal to the auxiliary terminal device number limit information, the privacy verification of the ranging request message can pass.
  • Step 804 The second terminal device sends a ranging response message to the first terminal device.
  • the second terminal device can send a ranging response message to the first terminal device.
  • the ranging response message is used to confirm whether to accept the ranging request message. Ranging request.
  • the first terminal device can determine whether the ranging request is allowed or rejected based on the ranging response message.
  • the ranging response message in response to the privacy verification of the ranging request message failing, is used to reject the ranging request of the first terminal device.
  • the ranging response message in response to the ranging request message privacy verification passing, is used to confirm acceptance of the ranging request of the first terminal device.
  • the second terminal device accepts the ranging request and continues the ranging task.
  • the ranging response message in response to the ranging response message being used to reject the ranging request of the first terminal device, the ranging response message also includes a reason for rejecting the ranging request.
  • Step 805 The first terminal device sends the ranging result to the third terminal device.
  • the first terminal device can perform integrity verification on the ranging response message sent by the second terminal device.
  • the first terminal device can reject the ranging response message.
  • the first terminal device In response to the ranging response message passing the integrity check, it means that the ranging response message has not been tampered with, and the first terminal device receives and parses the ranging response message.
  • the first terminal device in response to the passing of the integrity check of the ranging response message, it means that the ranging response message has not been tampered with, the first terminal device receives and parses the ranging response message, and the ranging request message is private If the verification is passed, the first terminal device can perform the ranging service.
  • the first terminal device can send the ranging results obtained by executing the ranging service to the third terminal device. That is, the first terminal device serves as an auxiliary terminal device serving the third terminal device and sends its measurements to the third terminal device. The distance measurement results obtained.
  • the third terminal device sends instruction information to the first terminal device.
  • the instruction information is used to trigger the first terminal device to initiate a ranging request to the second terminal device.
  • the first terminal device Send a ranging request message to the second terminal device
  • the second terminal device performs privacy verification on the ranging request message according to the stored privacy configuration file
  • the second terminal device sends a ranging response message to the first terminal device
  • the first terminal sends the ranging results to the third terminal device, so that the first terminal device needs to pass the privacy verification of the second terminal device and obtain the permission of the second terminal device before it can perform the ranging service and obtain the ranged second terminal.
  • the distance and direction of the device effectively protects the privacy of the terminal device from being leaked and improves the security of the system.
  • the present application also provides a distance measurement device. Since the distance measurement device provided by the embodiments of the present application corresponds to the methods provided by the above embodiments, the distance measurement method is The implementation of the method is also applicable to the distance measuring device provided in the following embodiments, and will not be described in detail in the following embodiments.
  • FIG. 9 is a schematic structural diagram of a distance measuring device provided by an embodiment of the present application.
  • the ranging device 900 includes: a receiving unit 910, a processing unit 920 and a sending unit 930, where:
  • the receiving unit 910 is configured to receive the ranging request message sent by the first terminal device
  • the processing unit 920 is configured to perform privacy verification on the ranging request message according to the privacy configuration file stored in the second terminal device;
  • the sending unit 930 is also configured to send a ranging response message to the first terminal device, where the ranging response message is used to confirm whether to accept the ranging request.
  • the privacy profile includes at least one of the following information:
  • a terminal device list including the identification of at least one terminal device that the second terminal device is allowed to connect to;
  • the ranging request message includes: the first terminal device identifier, the second terminal device identifier and the ranging type;
  • the ranging type includes the first terminal device directly initiating a ranging request, or the first terminal device initiating a ranging request under the trigger of a third terminal device.
  • the first terminal device in response to the ranging type, initiates a ranging request under the trigger of the third terminal device, and the ranging request message also includes the third terminal device identifier.
  • the ranging request message also includes ranging information, and the ranging information includes at least one of the following:
  • Ranging geographical area information ranging time information; ranging distance accuracy information; ranging direction accuracy information.
  • processing unit 920 is specifically used to:
  • the ranging request message privacy verification passes;
  • the ranging request message privacy verification fails.
  • processing unit 920 is specifically used to:
  • the ranging request message privacy verification passes;
  • the ranging request message privacy verification fails.
  • processing unit 920 is also used to:
  • the privacy verification of the ranging request message passes;
  • the privacy verification of the ranging request message fails.
  • processing unit 920 is specifically used to:
  • the privacy verification of the ranging request message passes.
  • the ranging response message is used to reject the ranging request of the first terminal device.
  • processing unit 920 is also used to:
  • the ranging request message is used to reject the ranging request of the first terminal device.
  • the ranging response message is used to confirm acceptance of the ranging request of the first terminal device.
  • the ranging device of this embodiment can receive the ranging request message sent by the first terminal device, perform privacy verification on the ranging request message according to the privacy configuration file stored in the second terminal device, and send the ranging request message to the first terminal device.
  • the ranging response message is used to confirm whether to accept the ranging request, so that the first terminal device needs to pass the privacy verification of the second terminal device and obtain the permission of the second terminal device before it can perform the ranging service. , obtaining the distance and direction of the second terminal device being measured, effectively protecting the privacy of the terminal device from being leaked, and improving the security of the system.
  • FIG. 10 is a schematic structural diagram of a distance measuring device provided by an embodiment of the present application.
  • the ranging device 1000 includes: a receiving unit 1010 and a receiving unit 1020, where:
  • Sending unit 1010 configured to send a ranging request message to a second terminal device, where the ranging request message is used to request ranging for the second terminal device;
  • the receiving unit 1020 is also configured to receive a ranging response message sent by the second terminal device, where the ranging response message is used to confirm whether to accept the ranging request.
  • the ranging request message includes: the first terminal device identifier, the second terminal device identifier and the ranging type;
  • the ranging type includes the first terminal device directly initiating a ranging request, or the first terminal device initiating a ranging request under the trigger of a third terminal device.
  • the ranging request message in response to the ranging type being ranging triggered by a third terminal device, the ranging request message further includes the third terminal device identifier.
  • the ranging request message also includes ranging information, and the ranging information includes at least one of the following:
  • Ranging geographical area information ranging time information; ranging distance accuracy information; ranging direction accuracy information.
  • the device also includes:
  • a processing unit (not shown in the figure), used to verify the integrity of the ranging response message
  • the processing unit is also configured to reject the ranging response message in response to failure of integrity check of the ranging response message.
  • the ranging device of this embodiment can receive a ranging response sent by the second terminal device by sending a ranging request message to the second terminal device.
  • the ranging request message is used to request ranging for the second terminal device.
  • the ranging response message is used to confirm whether to accept the ranging request, so that the first terminal device needs to pass the privacy verification of the second terminal device and obtain the permission of the second terminal device before it can perform the ranging service and obtain the measured
  • the distance and direction from the second terminal device effectively protects the privacy of the terminal device from being leaked and improves the security of the system.
  • embodiments of the present application also provide a communication device, including: a processor and a memory.
  • a computer program is stored in the memory.
  • the processor executes the computer program stored in the memory, so that the device executes the steps shown in Figure 2 to The method shown in the embodiment of Figure 3.
  • embodiments of the present application also provide a communication device, including: a processor and a memory.
  • a computer program is stored in the memory.
  • the processor executes the computer program stored in the memory, so that the device executes the steps shown in Figure 4 to The method shown in the embodiment of Figure 6.
  • embodiments of the present application also provide a communication device, including: a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is used to run the code instructions to The method shown in the embodiment of FIG. 2 to FIG. 3 is executed.
  • embodiments of the present application also provide a communication device, including: a processor and an interface circuit.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor is used to run the code instructions to The methods shown in the embodiments of Figures 4 to 6 are executed.
  • FIG. 11 is a schematic structural diagram of another ranging device provided by an embodiment of the present application.
  • the ranging device 1100 may be a network device, a terminal device, a chip, a chip system, or a processor that supports a network device to implement the above method, or a chip, a chip system, or a processor that supports a terminal device to implement the above method. or processor etc.
  • the device can be used to implement the method described in the above method embodiment. For details, please refer to the description in the above method embodiment.
  • the ranging device 1100 may include one or more processors 1101 .
  • the processor 1101 may be a general-purpose processor or a special-purpose processor, or the like. For example, it can be a baseband processor or a central processing unit.
  • the baseband processor can be used to process communication protocols and communication data.
  • the central processor can be used to control ranging devices (such as base stations, baseband chips, terminal equipment, terminal equipment chips, DU or CU, etc.) and execute computer Program, a computer program that processes data.
  • the distance measurement device 1100 may also include one or more memories 1102, on which a computer program 1103 may be stored.
  • the processor 1101 executes the computer program 1103, so that the distance measurement device 1100 performs the steps described in the above method embodiment. method.
  • the computer program 1103 may be solidified in the processor 1101, in which case the processor 1101 may be implemented by hardware.
  • the memory 1102 may also store data.
  • the ranging device 1100 and the memory 1102 can be provided separately or integrated together.
  • the ranging device 1100 may also include a transceiver 1105 and an antenna 1106.
  • the transceiver 1105 may be called a transceiver unit, a transceiver, a transceiver circuit, etc., and is used to implement transceiver functions.
  • the transceiver 1105 may include a receiver and a transmitter.
  • the receiver may be called a receiver or a receiving circuit, etc., used to implement the receiving function;
  • the transmitter may be called a transmitter, a transmitting circuit, etc., used to implement the transmitting function.
  • the ranging device 1100 may also include one or more interface circuits 1107.
  • the interface circuit 1107 is used to receive code instructions and transmit them to the processor 1101 .
  • the processor 1101 executes code instructions to cause the ranging device 1100 to perform the method described in the above method embodiment.
  • the processor 1101 may include a transceiver for implementing receiving and transmitting functions.
  • the transceiver may be a transceiver circuit, an interface, or an interface circuit.
  • the transceiver circuits, interfaces or interface circuits used to implement the receiving and transmitting functions can be separate or integrated together.
  • the above-mentioned transceiver circuit, interface or interface circuit can be used for reading and writing code/data, or the above-mentioned transceiver circuit, interface or interface circuit can be used for signal transmission or transfer.
  • the ranging device 1100 may include a circuit, and the circuit may implement the sending or receiving or communication functions in the foregoing method embodiments.
  • the processor and transceiver described in this application can be implemented in integrated circuits (ICs), analog ICs, radio frequency integrated circuits RFICs, mixed signal ICs, application specific integrated circuits (ASICs), printed circuit boards ( printed circuit board (PCB), electronic equipment, etc.
  • the processor and transceiver can also be manufactured using various IC process technologies, such as complementary metal oxide semiconductor (CMOS), n-type metal oxide-semiconductor (NMOS), P-type Metal oxide semiconductor (positive channel metal oxide semiconductor, PMOS), bipolar junction transistor (BJT), bipolar CMOS (BiCMOS), silicon germanium (SiGe), gallium arsenide (GaAs), etc.
  • CMOS complementary metal oxide semiconductor
  • NMOS n-type metal oxide-semiconductor
  • PMOS P-type Metal oxide semiconductor
  • BJT bipolar junction transistor
  • BiCMOS bipolar CMOS
  • SiGe silicon germanium
  • GaAs gallium arsenide
  • the ranging device described in the above embodiments may be a network device or a terminal device, but the scope of the ranging device described in this application is not limited thereto, and the structure of the ranging device may not be limited by Figures 9-10.
  • the ranging device may be a stand-alone device or may be part of a larger device.
  • the distance measuring device can be:
  • the IC collection may also include storage components for storing data and computer programs;
  • the distance measuring device can be a chip or a chip system
  • the chip shown in Figure 12 includes a processor 1201 and an interface 1202.
  • the number of processors 1201 may be one or more, and the number of interfaces 1202 may be multiple.
  • Interface 1202 for code instructions and transmission to the processor
  • the processor 1201 is configured to run code instructions to perform the methods shown in Figures 2 to 3.
  • Interface 1202 for code instructions and transmission to the processor
  • the processor 1201 is configured to run code instructions to perform the methods shown in Figures 4 to 5.
  • the chip also includes a memory 1203, which is used to store necessary computer programs and data.
  • Embodiments of the present application also provide a communication system that includes the ranging device as a terminal device in the aforementioned embodiment of FIGS. 9-10 , or the system includes the ranging device as a terminal device in the aforementioned embodiment of FIG. 11 .
  • This application also provides a readable storage medium on which instructions are stored. When the instructions are executed by a computer, the functions of any of the above method embodiments are implemented.
  • This application also provides a computer program product, which, when executed by a computer, implements the functions of any of the above method embodiments.
  • a computer program product includes one or more computer programs.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer program may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer program may be transmitted from a website, computer, server or data center via a wireline (e.g.
  • Coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless means to transmit to another website, computer, server or data center.
  • Computer-readable storage media can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or other integrated media that contains one or more available media. Available media may be magnetic media (e.g., floppy disks, hard disks, tapes), optical media (e.g., high-density digital video discs (DVD)), or semiconductor media (e.g., solid state disks (SSD)) )wait.
  • magnetic media e.g., floppy disks, hard disks, tapes
  • optical media e.g., high-density digital video discs (DVD)
  • semiconductor media e.g., solid state disks (SSD)
  • At least one in this application can also be described as one or more, and the plurality can be two, three, four or more, which is not limited by this application.
  • the technical feature is distinguished by “first”, “second”, “third”, “A”, “B”, “C” and “D”, etc.
  • the technical features described in “first”, “second”, “third”, “A”, “B”, “C” and “D” are in no particular order or order.
  • the corresponding relationships shown in each table in this application can be configured or predefined.
  • the values of the information in each table are only examples and can be configured as other values, which are not limited by this application.
  • the corresponding relationships shown in some rows may not be configured.
  • appropriate deformation adjustments can be made based on the above table, such as splitting, merging, etc.
  • the names of the parameters shown in the titles of the above tables may also be other names understandable by the communication device, and the values or expressions of the parameters may also be other values or expressions understandable by the communication device.
  • other data structures can also be used, such as arrays, queues, containers, stacks, linear lists, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables or hash tables. wait.
  • Predefinition in this application can be understood as definition, pre-definition, storage, pre-storage, pre-negotiation, pre-configuration, solidification, or pre-burning.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例公开了一种测距方法及装置,通过接收第一终端设备发送的测距请求消息,根据该第二终端设备存储的隐私配置文件,对该测距请求消息进行隐私验证,向该第一终端设备发送测距响应消息,该测距响应消息用于确认是否接受测距请求,使得第一终端设备需要通过第二终端设备的隐私验证,获得第二终端设备的许可之后,才能够执行测距服务,获得被测距的第二终端设备的距离和方向,有效保护了终端设备的隐私不被泄漏,提高系统的安全性。

Description

测距方法及装置 技术领域
本申请涉及通信技术领域,特别是指一种测距方法及装置。
背景技术
在3GPP技术报告TR 22.855中定义的测距服务是指,通过直接通信连接来确定两个UE(UserEquipment,用户设备)之间的距离和/或一个UE与另一个UE之间的方向。需要对另一个UE进行测距的UE称为参考UE,被测距的UE称为目标UE。
参考UE可以通过在PC5(底层直连蜂窝通信协议接口)上向目标UE发送测距请求来直接启动测距过程。当参考UE直接在PC5上发起测距过程时,没有隐私检查机制,参考UE可以在未经目标UE许可的情况下获得目标UE的高度精确的距离和方向信息,从而导致位置隐私泄露。
发明内容
本申请第一方面实施例提出了一种测距方法,所述方法由第二终端设备执行,所述方法包括:
接收第一终端设备发送的测距请求消息;
根据所述第二终端设备存储的隐私配置文件,对所述测距请求消息进行隐私验证;
向所述第一终端设备发送测距响应消息,所述测距响应消息用于确认是否接受测距请求。
可选地,所述隐私配置文件包括以下至少一种信息:
终端设备列表,所述终端设备列表中包括所述第二终端设备允许连接的至少一个终端设备的标识;
测距类型限制信息;
测距地理区域限制信息;
测距时间限制信息;
测距距离精度限制信息;
测距方向精度限制信息;
辅助终端设备数量限制信息。
可选地,所述测距请求消息包括:所述第一终端设备标识,所述第二终端设备标识和测距类型;
所述测距类型包括所述第一终端设备直接发起测距请求,或者,所述第一终端设备在第三终端设备的触发下发起测距请求。
可选地,响应于所述测距类型为所述第一终端设备在第三终端设备的触发下发起测距请求,所述测距请求消息中还包括所述第三终端设备标识。
可选地,所述测距请求消息还包括测距信息,所述测距信息包括以下至少一种:
测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
可选地,所述根据所述第二终端设备存储的隐私配置文件,对所述测距请求消息进行隐私验证,包括:
响应于所述第一终端设备标识在所述终端设备列表中,所述测距请求消息隐私验证通过;
响应于所述第一终端设备标识不在所述终端设备列表中,所述测距请求消息隐私验证失败。
可选地,所述根据所述第二终端设备存储的隐私配置文件,对所述测距请求消息进行隐私验证,包括:
响应于所述第一终端设备标识和所述第三终端设备标识都在所述终端设备列表中,所述测距请求消息隐私验证通过;
响应于所述第一终端设备标识和/或所述第三终端设备标识不在所述终端设备列表中,所述测距请求消息隐私验证失败。
可选地,所述根据所述第二终端设备存储的隐私配置文件,对所述测距请求消息进行隐私验证,还包括:
确定所述第三终端设备触发的辅助终端设备的数量;
响应于所述第三终端设备触发的辅助终端设备的数量小于或等于所述辅助终端设备数量限制信息,所述测距请求消息隐私验证通过;
响应于所述第三终端设备触发的辅助终端设备的数量大于所述辅助终端设备数量限制信息,所述测距请求消息隐私验证失败。
可选地,所述根据所述第二终端设备存储的隐私配置文件,对所述测距请求消息进行隐私验证,包括:
响应于所述第一终端设备标识在所述终端设备列表中,且所述测距信息均符合所述隐私配置文件中的限制信息,所述测距请求消息隐私验证通过。
可选地,响应于所述测距请求消息隐私验证失败,所述测距响应消息用于拒绝所述第一终端设备的测距请求。
可选地,所述方法还包括:
校验所述测距请求消息的完整性;
响应于所述测距请求消息的完整性校验不通过,所述测距响应消息用于拒绝所述第一终端设备的测距请求。
可选地,响应于所述测距请求消息的完整性校验通过,且所述测距请求消息隐私验证通过,所述测距响应消息用于确认接受所述第一终端设备的测距请求。
本申请第二方面实施例提出了一种测距方法,所述方法由第一终端设备执行,所述方法包括:
向第二终端设备发送测距请求消息,所述测距请求消息用于请求对所述第二终端设备进行测距;
接收所述第二终端设备发送的测距响应消息,所述测距响应消息用于确认是否接受测距请求。
可选地,所述测距请求消息包括:所述第一终端设备标识,所述第二终端设备标识和测距类型;
所述测距类型包括所述第一终端设备直接发起测距请求,或者,所述第一终端设备在第三终端设备的触发下发起测距请求。
可选地,响应于所述测距类型为第三终端设备触发的测距,所述测距请求消息中还包括所述第三终端设备标识。
可选地,所述测距请求消息还包括测距信息,所述测距信息包括以下至少一种:
测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
可选地,所述方法还包括:
校验所述测距响应消息的完整性;
响应于所述测距响应消息的完整性校验失败,拒绝所述测距响应消息。
本申请第三方面实施例提出了一种测距装置,所述装置应用于第二终端设备,所述装置包括:
接收单元,用于接收第一终端设备发送的测距请求消息;
处理单元,用于根据所述第二终端设备存储的隐私配置文件,对所述测距请求消息进行隐私验证;
发送单元,用于向所述第一终端设备发送测距响应消息,所述测距响应消息用于确认是否接受测距请求。
可选地,所述隐私配置文件包括以下至少一种信息:
终端设备列表,所述终端设备列表中包括所述第二终端设备允许连接的至少一个终端设备的标识;
测距类型限制信息;
测距地理区域限制信息;
测距时间限制信息;
测距距离精度限制信息;
测距方向精度限制信息;
辅助终端设备数量限制信息。
可选地,所述测距请求消息包括:所述第一终端设备标识,所述第二终端设备标识和测距类型;
所述测距类型包括所述第一终端设备直接发起测距请求,或者,所述第一终端设备在第三终端设备的触发下发起测距请求。
可选地,响应于所述测距类型为所述第一终端设备在第三终端设备的触发下发起测距请求,所述测距请求消息中还包括所述第三终端设备标识。
可选地,所述测距请求消息还包括测距信息,所述测距信息包括以下至少一种:
测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
可选地,所述处理单元具体用于:
响应于所述第一终端设备标识在所述终端设备列表中,所述测距请求消息隐私验证通过;
响应于所述第一终端设备标识不在所述终端设备列表中,所述测距请求消息隐私验证失败。
可选地,所述处理单元具体用于:
响应于所述第一终端设备标识和所述第三终端设备标识都在所述终端设备列表中,所述测距请求消息隐私验证通过;
响应于所述第一终端设备标识和/或所述第三终端设备标识不在所述终端设备列表中,所述测距请求消息隐私验证失败。
可选地,所述处理单元还用于:
确定所述第三终端设备触发的辅助终端设备的数量;
响应于所述第三终端设备触发的辅助终端设备的数量小于或等于所述辅助终端设备数量限制信息,所述测距请求消息隐私验证通过;
响应于所述第三终端设备触发的辅助终端设备的数量大于所述辅助终端设备数量限制信息,所述测距请求消息隐私验证失败。
可选地,所述处理单元具体用于:
响应于所述第一终端设备标识在所述终端设备列表中,且所述测距信息均符合所述隐私配置文件中的限制信息,所述测距请求消息隐私验证通过。
可选地,响应于所述测距请求消息隐私验证失败,所述测距响应消息用于拒绝所述第一终端设备的测距请求。
可选地,所述处理单元还用于:
校验所述测距请求消息的完整性;
响应于所述测距请求消息的完整性校验不通过,所述测距响应消息用于拒绝所述第一终端设备的测距请求。
可选地,响应于所述测距请求消息的完整性校验通过,且所述测距请求消息隐私验证通过,所述测距响应消息用于确认接受所述第一终端设备的测距请求。
本申请第四方面实施例提出了一种测距装置,所述装置应用于第一终端设备,所述装置包括:
发送单元,用于向第二终端设备发送测距请求消息,所述测距请求消息用于请求对所述第二终端设备进行测距;
接收单元,用于接收所述第二终端设备发送的测距响应消息,所述测距响应消息用于确认是否接受测距请求。
可选地,所述测距请求消息包括:所述第一终端设备标识,所述第二终端设备标识和测距类型;
所述测距类型包括所述第一终端设备直接发起测距请求,或者,所述第一终端设备在第三终端设备的触发下发起测距请求。
可选地,响应于所述测距类型为第三终端设备触发的测距,所述测距请求消息中还包括所述第三终端设备标识。
可选地,所述测距请求消息还包括测距信息,所述测距信息包括以下至少一种:
测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
可选地,所述装置还包括:
处理单元,用于校验所述测距响应消息的完整性;
所述处理单元,还用于响应于所述测距响应消息的完整性校验失败,拒绝所述测距响应消息。
本申请第五方面实施例提出了一种通信装置,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行上述第一方面实施例所述的测距方法。
本申请第六方面实施例提出了一种通信装置,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行上述第二方面实施例所述的测距方法。
本申请第七方面实施例提出了一种通信装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第一方面实施例所述的测距方法。
本申请第八方面实施例提出了一种通信装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第二方面实施例所述的测距方法。
本申请第九方面实施例提出了一种计算机可读存储介质,用于存储有指令,当所述指令被执行时,使上述第一方面实施例所述的测距方法被实现。
本申请第十方面实施例提出了一种计算机可读存储介质,用于存储有指令,当所述指令被执行时,使上述第二方面实施例所述的测距方法被实现。
本申请第十一方面实施例提出了一种计算机程序,当其在计算机上运行时,使得计算机执行第一方面实施例所述的测距分配方法。
本申请第十二方面实施例提出了一种计算机程序,当其在计算机上运行时,使得计算机执行第二方面实施例所述的测距方法。
本申请实施例提供的一种测距方法及装置,通过接收第一终端设备发送的测距请求消息,根据该第二终端设备存储的隐私配置文件,对该测距请求消息进行隐私验证,向该第一终端设备发送测距响应消息,该测距响应消息用于确认是否接受测距请求,使得第一终端设备需要通过第二终端设备的隐私验证,获得第二终端设备的许可之后,才能够执行测距服务,获得被测距的第二终端设备的距离和方向,有效保护了终端设备的隐私不被泄漏,提高系统的安全性。
本申请附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本申请的实践了解到。
附图说明
为了更清楚地说明本申请实施例或背景技术中的技术方案,下面将对本申请实施例或背景技术中所需要使用的附图进行说明。
图1a为本申请实施例提供的一种通信系统的架构示意图;
图1b是向有或没有网络覆盖的终端设备提供测距服务的示意图;
图2是本申请实施例提供的一种测距方法的流程示意图;
图3是本申请实施例提供的一种测距方法的流程示意图;
图4是本申请实施例提供的一种测距方法的流程示意图;
图5是本申请实施例提供的一种测距方法的流程示意图;
图6是本申请实施例提供的一种测距方法的流程示意图;
图7是本申请实施例提供的一种测距方法的流程示意图;
图8是本申请实施例提供的一种测距方法的流程示意图;
图9是本申请实施例提供的一种测距装置的结构示意图;
图10是本申请实施例提供的一种测距装置的结构示意图;
图11是本申请实施例提供的另一种测距装置的结构示意图;
图12是本申请实施例提供的一种芯片的结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本申请实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请实施例的一些方面相一致的装置和方法的例子。
在本申请实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本申请实施例。在本申请实施例和所附权利要求书中所使用的单数形式的“一种”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本申请实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本申请实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”及“若”可以被解释成为“在……时”或“当……时”或“响应于确定”。
下面详细描述本申请的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的要素。下面通过参考附图描述的实施例是示例性的,旨在用于解释本申请,而不能理解为对本申请的限制。
为了更好的理解本申请实施例公开的一种测距方法,下面首先对本申请实施例适用的通信系统进行描述。
请参见图1a,图1a为本申请实施例提供的一种通信系统的架构示意图。该通信系统可包括但不限于一个第一终端设备和一个第二终端设备,图1a所示的设备数量和形态仅用于举例并不构成对本申请实施例的限定,实际应用中可以包括两个或两个以上的网络设备和两个或两个以上的终端设备。图1a所示的通信系统以包括一个第一终端设备101和一个第二终端设备102为例。
需要说明的是,本申请实施例的技术方案可以应用于各种通信系统。例如:长期演进(Long Term Evolution,LTE)系统、第五代移动通信系统、5G新空口系统,或者其他未来的新型移动通信系统等。
本申请实施例中的第一终端设备101和第二终端设备102是用户侧的一种用于接收或发射信号的实体,如手机。终端设备也可以称为终端设备(terminal)、用户设备(user equipment,UE)、移动台(Mobile Station,MS)、移动终端设备(Mobile Terminal,MT)等。终端设备可以是具备通信功能的汽车、智能汽车、手机(Mobile Phone)、穿戴式设备、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(Virtual Reality,VR)终端设备、增强现实(Augmented Reality,AR)终端设备、工业控制(Industrial Control)中的无线终端设备、无人驾驶(Self-Driving)中的无线终端设备、远程手术(Remote Medical Surgery)中的无线终端设备、智能电网(Smart Grid)中的无线终端设备、运输安全(Transportation Safety)中的无线终端设备、智慧城市(Smart City)中的无线终端设备、智慧家庭(Smart Home)中的无线终端设备等等。本申请的实施例对终端设备所采用的具体技术和具体设备形态不做限定。
在3GPP技术报告TR 22.855中定义的测距服务是指,通过直接通信连接来确定两个终端设备之间的距离和/或一个终端设备与另一个终端设备之间的方向。需要对另一个终端设备进行测距的终端设备可以称为参考终端设备(本申请实施例的第一终端设备101),被测距的终端设备可以称为目标终端设备(本申请实施例的第二终端设备102)。
如图1a所示,第一终端设备101有一个参考平面和一个参考方向。第二终端设备102到第一终端设备101的方向是第一终端设备101和第二终端设备102之间的连线与参考方向的夹角。它由其方位角方向和仰角方向表示。第二终端设备102的方位角方向是在第一终端设备101到第二终端设备102的连线在与垂直于顶点的参考方向相同的平面上的投影与参考方向之间形成的角度。第二终端设备102的仰角方向是水平面上方的角度。
在有或没有5G网络覆盖的情况下都可以支持测距服务。如图1b所示,图1b是向有或没有网络覆盖的终端设备提供测距服务的示意图。如果许可频段用于测距,则应完全在操作员控制之下。
第一终端设备101可以通过在PC5(底层直连蜂窝通信协议接口)上向第二终端设备102发送测距请求来直接启动测距过程。该过程可以被视为基于终端设备的测距过程。当第一终端设备101直接在PC5上发起测距过程时,没有隐私检查机制,第一终端设备101可以在未经第二终端设备102许可的情况下获得第二终端设备102的高度精确的距离和方向信息,从而导致位置隐私泄露。因此,当第一终端设备101直接在PC5上发起测距过程时,需要设计一种机制来保护第二终端设备102的隐私。
可以理解的是,本申请实施例描述的通信系统是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着系统架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
下面结合附图对本申请所提供的测距方法及其装置进行详细地介绍。
请参见图2,图2是本申请实施例提供的一种测距方法的流程示意图。需要说明的是,本申请实施例的测距方法由第二终端设备执行。该方法可以独立执行,也可以结合本申请任意一个其他实施例一起被执行。如图2所示,该方法可以包括如下步骤:
步骤201,接收第一终端设备发送的测距请求消息。
在本申请实施例中,第二终端设备能够接收第一终端设备发送的测距请求消息,接收第一终端设备发起的测距请求,并对该测距请求消息进行隐私验证,来确定是否允许该第一终端设备执行测距服务。
在本申请实施例中,第一终端设备与第二终端设备之间的安全直接连接是基于ProSe(Proximity-based Services,近距离通信)过程建立的。
在一些实施方式中,该测距请求消息中包括:第一终端设备标识,第二终端设备标识和测距类型。
其中,测距类型可以为直接测距,也就是该第一终端设备直接发起测距请求,或者,为第三终端设备触发的测距,也就是该第一终端设备在第三终端设备的触发下发起测距请求。
在一些实施方式中,响应于该测距类型为该第一终端设备在第三终端设备的触发下发起测距请求,该测距请求消息中还包括该第三终端设备标识。
在一些实施方式中,该测距请求消息还包括测距信息,该测距信息包括以下至少一种:测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
其中,测距地理区域信息是指该第一终端设备请求的测距任务执行的地理区域;
测距时间信息是指第一终端设备请求的测距任务所在的时间段;
测距距离精度信息是指第一终端设备请求的测距任务所要求的测距距离精度;
测距方向精度信息是指第一终端设备请求的测距任务所要求的测距方向精度。
在一些实施方式中,第二终端设备还能够对接收的测距请求消息进行完整性校验,校验该请求消息是否被篡改。如果完整性校验不通过,则说明该测距请求消息被篡改,第二终端设备可以拒绝该第一终端设备的测距请求。
步骤202,根据该第二终端设备存储的隐私配置文件,对该测距请求消息进行隐私验证。
在本申请实施例中,第二终端设备能够安全地存储隐私配置文件,并根据该隐私配置文件,对第一终端设备发送的测距请求消息进行隐私验证,来确定是否允许该第一终端设备执行测距服务。
需要说明的是,在本申请实施例中,第二终端设备能够将本地存储的隐私配置文件,从因公层传递到ProSe层。
在一些实施方式中,该隐私配置文件包括以下至少一种信息:终端设备列表;测距类型限制信息;测距地理区域限制信息;测距时间限制信息;测距距离精度限制信息;测距方向精度限制信息;辅助终端设备数量限制信息。
其中,终端设备列表是第二终端设备信任的允许连接的终端设备的列表,该终端设备列表中包括该第二终端设备允许连接的至少一个终端设备的标识;
测距类型限制信息是指该第二终端设备支持的测距类型;
测距地理区域限制信息是指该第二终端设备允许被测距的区域;
测距时间限制信息是指该第二终端设备允许被测距的时间段;
测距距离精度限制信息是指该第二终端设备允许的测距距离的最高精度;
测距方向精度限制信息是指该第二终端设备允许的测距方向的最高精度;
辅助终端设备数量限制信息是指参与协同测距过程的辅助终端设备的最大的数量。
需要说明的是,辅助终端设备是参与协同测距过程的,辅助终端设备数量越多,最终测距结果的精度越高。如果该第一终端设备是在第三终端设备的触发下发起该测距请求,则该第一终端设备就是辅助终端设备。该第三终端设备可以触发至少一个辅助终端设备,向第二终端设备发起测距请求。
在一些实施方式中,响应于该第一终端设备标识在该终端设备列表中,该测距请求消息隐私验证通过。
在一些实施方式中,响应于该第一终端设备标识和该第三终端设备标识都在该终端设备列表中,该测距请求消息隐私验证通过。
在一些实施方式中,第二终端设备还能够确定第三终端设备触发的辅助终端设备的数量。响应于该第三终端设备触发的辅助终端设备的数量小于或等于该辅助终端设备数量限制信息,该测距请求消息隐私验证通过。
在一些实施方式中,响应于该第一终端设备标识在该终端设备列表中,且该测距信息均符合该隐私配置文件中的限制信息,该测距请求消息隐私验证通过。
步骤203,向该第一终端设备发送测距响应消息,该测距响应消息用于确认是否接受测距请求。
在本申请实施例中,第二终端设备在对第一终端设备发送的测距请求消息进行隐私验证之后,可以向第一终端设备发送测距响应消息,该测距响应消息用于确认是否接受测距请求。第一终端设备能够根据该测距响应消息,确定该测距请求是被允许的,还是被拒绝的。
在一些实施方式中,响应于该测距请求消息隐私验证失败,该测距响应消息用于拒绝该第一终端设备的测距请求。
可以理解,在一些实施方式中,响应于该测距请求消息隐私验证通过,该测距响应消息用于确认接受该第一终端设备的测距请求,该第二终端设备接受该测距请求,继续进行该测距任务。
在一些实施方式中,响应于该测距响应消息用于拒绝该第一终端设备的测距请求,该测距响应消息中还包括拒绝该测距请求的原因。
综上,通过接收第一终端设备发送的测距请求消息,根据该第二终端设备存储的隐私配置文件,对该测距请求消息进行隐私验证,向该第一终端设备发送测距响应消息,该测距响应消息用于确认是否接受测距请求,使得第一终端设备需要通过第二终端设备的隐私验证,获得第二终端设备的许可之后,才能够执行测距服务,获得被测距的第二终端设备的距离和方向,有效保护了终端设备的隐私不被泄漏,提高系统的安全性。
请参见图3,图3是本申请实施例提供的一种测距方法的流程示意图。需要说明的是,本申请实施例的测距方法由终端设备执行。该方法可以独立执行,也可以结合本申请任意一个其他实施例一起被执行。如图3所示,该方法可以包括如下步骤:
步骤301,接收第一终端设备发送的测距请求消息。
在本申请实施例中,第二终端设备能够接收第一终端设备发送的测距请求消息,接收第一终端设备发起的测距请求,并对该测距请求消息进行隐私验证,来确定是否允许该第一终端设备执行测距服务。
在本申请实施例中,第一终端设备与第二终端设备之间的安全直接连接是基于ProSe过程建立的。
在一些实施方式中,该测距请求消息中包括:第一终端设备标识,第二终端设备标识和测距类型。
其中,测距类型可以为直接测距,也就是该第一终端设备直接发起测距请求,或者,为第三终端设备触发的测距,也就是该第一终端设备在第三终端设备的触发下发起测距请求。
在一些实施方式中,响应于该测距类型为该第一终端设备在第三终端设备的触发下发起测距请求,该测距请求消息中还包括该第三终端设备标识。
在一些实施方式中,该测距请求消息还包括测距信息,该测距信息包括以下至少一种:测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
其中,测距地理区域信息是指该第一终端设备请求的测距任务执行的地理区域;
测距时间信息是指第一终端设备请求的测距任务所在的时间段;
测距距离精度信息是指第一终端设备请求的测距任务所要求的测距距离精度;
测距方向精度信息是指第一终端设备请求的测距任务所要求的测距方向精度。
步骤302,校验该测距请求消息的完整性。
在本申请实施例中,第二终端设备能够对接收到的测距请求消息进行完整性校验,确定该测距请求消息是未被篡改的。
在一些实施方式中,响应于该测距请求消息完整性校验失败,则说明该测距请求消息被篡改,第二终端设备拒绝该第一终端设备的测距请求。
在一些实施方式中,响应于该测距请求消息完整性校验通过,则说明该测距请求消息未被篡改, 第二终端设备继续对该测距请求消息进行隐私验证。
步骤303,根据该第二终端设备存储的隐私配置文件,对该测距请求消息进行隐私验证。
在本申请实施例中,第二终端设备能够安全地存储隐私配置文件,并根据该隐私配置文件,对第一终端设备发送的测距请求消息进行隐私验证,来确定是否允许该第一终端设备执行测距服务。
需要说明的是,在本申请实施例中,第二终端设备能够将本地存储的隐私配置文件,从因公层传递到ProSe层。
在一些实施方式中,该隐私配置文件包括以下至少一种信息:终端设备列表;测距类型限制信息;测距地理区域限制信息;测距时间限制信息;测距距离精度限制信息;测距方向精度限制信息;辅助终端设备数量限制信息。
其中,终端设备列表是第二终端设备信任的允许连接的终端设备的列表,该终端设备列表中包括该第二终端设备允许连接的至少一个终端设备的标识;
测距类型限制信息是指该第二终端设备支持的测距类型;
测距地理区域限制信息是指该第二终端设备允许被测距的区域;
测距时间限制信息是指该第二终端设备允许被测距的时间段;
测距距离精度限制信息是指该第二终端设备允许的测距距离的最高精度;
测距方向精度限制信息是指该第二终端设备允许的测距方向的最高精度;
辅助终端设备数量限制信息是指参与协同测距过程的辅助终端设备的最大的数量。
需要说明的是,辅助终端设备是参与协同测距过程的,辅助终端设备数量越多,最终测距结果的精度越高。如果该第一终端设备是在第三终端设备的触发下发起该测距请求,则该第一终端设备就是辅助终端设备。该第三终端设备可以触发至少一个辅助终端设备,向第二终端设备发起测距请求。
在一些实施方式中,响应于该第一终端设备标识在该终端设备列表中,该测距请求消息隐私验证通过。响应于该第一终端设备标识不在该终端设备列表中,该测距请求消息隐私验证失败。
在一些实施方式中,该第一终端设备发起的测距的测距类型为,在第三终端设备的触发下的测距,第二终端设备需要验证该第一终端设备和该第三终端设备是否都在允许连接的终端设备列表中。
响应于该第一终端设备标识和该第三终端设备标识都在该终端设备列表中,该测距请求消息隐私验证通过。响应于该第一终端设备标识和/或该第三终端设备标识不在该终端设备列表中,该测距请求消息隐私验证失败。也就是,第一终端设备和第三终端设备都要在该终端设备列表中,该测距请求消息隐私验证才能通过。第一终端设备和第三终端设备中有一个不在该终端设备列表中,该测距请求消息隐私验证都会失败。
在一些实施方式中,该第一终端设备发起的测距的测距类型为,在第三终端设备的触发下的测距,该第一终端设备为辅助终端设备。第二终端设备还能够确定第三终端设备触发的辅助终端设备的数量。
响应于该第三终端设备触发的辅助终端设备的数量小于或等于该辅助终端设备数量限制信息,该测距请求消息隐私验证通过。响应于该第三终端设备触发的辅助终端设备的数量大于该辅助终端设备数量限制信息,该测距请求消息隐私验证失败。
在一些实施方式中,响应于该测距信息均符合该隐私配置文件中的限制信息,该测距请求消息隐私验证通过。也就是,该测距请求消息中的测距信息,都符合该隐私配置文件中的限制信息,该测距请求消息隐私验证才能通过。该测距请求消息中的测距信息,有一项不符合该隐私配置文件中的限制信息,该测距请求消息隐私验证都会失败。
可以理解的是,该测距请求消息中包括的第一终端设备标识,测距类型和测距信息,必须都符合隐私配置文件中的限制,该测距请求消息隐私验证才能通过。
如果该测距请求的测距类型为第三终端设备触发的测距,则该测距请求消息中包括的第一终端设 备标识,第三终端设备标识,测距类型和测距信息,必须都符合隐私配置文件中的限制,且该第三终端设备触发的辅助终端设备数量小于或等于辅助终端设备数量限制信息,该测距请求消息隐私验证才能通过。
步骤304,向该第一终端设备发送测距响应消息,该测距响应消息用于确认是否接受测距请求。
在本申请实施例中,第二终端设备在对第一终端设备发送的测距请求消息进行隐私验证之后,可以向第一终端设备发送测距响应消息,该测距响应消息用于确认是否接受测距请求。第一终端设备能够根据该测距响应消息,确定该测距请求是被允许的,还是被拒绝的。
在一些实施方式中,响应于该测距请求消息隐私验证失败,该测距响应消息用于拒绝该第一终端设备的测距请求。
可以理解,在一些实施方式中,响应于该测距请求消息隐私验证通过,该测距响应消息用于确认接受该第一终端设备的测距请求,该第二终端设备接受该测距请求,继续进行该测距任务。
在一些实施方式中,响应于该测距响应消息用于拒绝该第一终端设备的测距请求,该测距响应消息中还包括拒绝该测距请求的原因。
综上,通过接收第一终端设备发送的测距请求消息,校验该测距请求消息的完整性,根据该第二终端设备存储的隐私配置文件,对该测距请求消息进行隐私验证,向该第一终端设备发送测距响应消息,该测距响应消息用于确认是否接受测距请求,使得第一终端设备需要通过第二终端设备的隐私验证,获得第二终端设备的许可之后,才能够执行测距服务,获得被测距的第二终端设备的距离和方向,有效保护了终端设备的隐私不被泄漏,提高系统的安全性。
请参见图4,图4是本申请实施例提供的一种测距方法的流程示意图。需要说明的是,本申请实施例的测距方法由第一终端设备执行。该方法可以独立执行,也可以结合本申请任意一个其他实施例一起被执行。如图4所示,该方法可以包括如下步骤:
步骤401,向第二终端设备发送测距请求消息,该测距请求消息用于请求对该第二终端设备进行测距。
在本申请实施例中,第一终端设备能够向第二终端设备发送测距请求消息,第二终端设备能够接收第一终端设备发起的测距请求,并对该测距请求消息进行隐私验证,来确定是否允许该第一终端设备执行测距服务。
可以理解的是,在本申请实施例中,第一终端设备向第二终端设备发送的该测距请求消息,是用于请求对该第二终端设备进行测距。第二终端设备能够根据自身存储的隐私配置文件,对该测距请求消息进行隐私验证,也就是同时该测距请求消息也能够用于第二终端设备的隐私验证。
在本申请实施例中,第一终端设备与第二终端设备之间的安全直接连接是基于ProSe过程建立的。
在一些实施方式中,该测距请求消息中包括:第一终端设备标识,第二终端设备标识和测距类型。
其中,测距类型可以为直接测距,也就是该第一终端设备直接发起测距请求,或者,为第三终端设备触发的测距,也就是该第一终端设备在第三终端设备的触发下发起测距请求。
在一些实施方式中,响应于该测距类型为该第一终端设备在第三终端设备的触发下发起测距请求,该测距请求消息中还包括该第三终端设备标识。
在一些实施方式中,该测距请求消息还包括测距信息,该测距信息包括以下至少一种:测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
其中,测距地理区域信息是指该第一终端设备请求的测距任务执行的地理区域;
测距时间信息是指第一终端设备请求的测距任务所在的时间段;
测距距离精度信息是指第一终端设备请求的测距任务所要求的测距距离精度;
测距方向精度信息是指第一终端设备请求的测距任务所要求的测距方向精度。
步骤402,接收该第二终端设备发送的测距响应消息,该测距响应消息用于确认是否接受测距请求。
在本申请实施例中,第一终端设备能够接收第二终端设备发送的测距响应消息,该测距响应消息用于确认是否接受测距请求。第一终端设备能够根据该测距响应消息,确定该测距请求是被允许的,还是被拒绝的。
在一些实施方式中,响应于该测距请求消息隐私验证失败,该测距响应消息用于拒绝该第一终端设备的测距请求。
可以理解,在一些实施方式中,响应于该测距请求消息隐私验证通过,该测距响应消息用于确认接受该第一终端设备的测距请求,该第二终端设备接受该测距请求,继续进行该测距任务。
在一些实施方式中,第一终端设备还能够对接收到的测距响应消息进行完整性校验,校验该响应消息是否被篡改。如果完整性校验不通过,则说明该测距响应消息被篡改,第一终端设备可以拒绝该测距响应消息。
在一些实施方式中,响应于该测距响应消息用于拒绝该第一终端设备的测距请求,该测距响应消息中还包括拒绝该测距请求的原因。
综上,通过向第二终端设备发送测距请求消息,该测距请求消息用于请求对该第二终端设备进行测距,接收该第二终端设备发送的测距响应消息,该测距响应消息用于确认是否接受测距请求,使得第一终端设备需要通过第二终端设备的隐私验证,获得第二终端设备的许可之后,才能够执行测距服务,获得被测距的第二终端设备的距离和方向,有效保护了终端设备的隐私不被泄漏,提高系统的安全性。
请参见图5,图5是本申请实施例提供的一种测距方法的流程示意图。需要说明的是,本申请实施例的测距方法由第一终端设备执行。该方法可以独立执行,也可以结合本申请任意一个其他实施例一起被执行。如图5所示,该方法可以包括如下步骤:
步骤501,向第二终端设备发送测距请求消息,该测距请求消息用于请求对该第二终端设备进行测距。
在本申请实施例中,第一终端设备能够向第二终端设备发送测距请求消息,第二终端设备能够接收第一终端设备发起的测距请求,并对该测距请求消息进行隐私验证,来确定是否允许该第一终端设备执行测距服务。
在本申请实施例中,第一终端设备与第二终端设备之间的安全直接连接是基于ProSe过程建立的。
可以理解的是,在本申请实施例中,第一终端设备向第二终端设备发送的该测距请求消息,是用于请求对该第二终端设备进行测距。第二终端设备能够根据自身存储的隐私配置文件,对该测距请求消息进行隐私验证,也就是同时该测距请求消息也能够用于第二终端设备的隐私验证。
在一些实施方式中,该测距请求消息中包括:第一终端设备标识,第二终端设备标识和测距类型。
其中,测距类型可以为直接测距,也就是该第一终端设备直接发起测距请求,或者,为第三终端设备触发的测距,也就是该第一终端设备在第三终端设备的触发下发起测距请求。
在一些实施方式中,响应于该测距类型为该第一终端设备在第三终端设备的触发下发起测距请求,该测距请求消息中还包括该第三终端设备标识。
在一些实施方式中,该测距请求消息还包括测距信息,该测距信息包括以下至少一种:测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
其中,测距地理区域信息是指该第一终端设备请求的测距任务执行的地理区域;
测距时间信息是指第一终端设备请求的测距任务所在的时间段;
测距距离精度信息是指第一终端设备请求的测距任务所要求的测距距离精度;
测距方向精度信息是指第一终端设备请求的测距任务所要求的测距方向精度。
在本申请实施例中,第二终端设备能够根据其自身存储的隐私配置文件,对该测距请求消息进行隐私验证,得到该测距请求消息的隐私验证结果。
步骤502,接收该第二终端设备发送的测距响应消息,该测距响应消息用于确认是否接受测距请求。
在本申请实施例中,第一终端设备能够接收第二终端设备发送的测距响应消息,该测距响应消息用于确认是否接受测距请求。第一终端设备能够根据该测距响应消息,确定该测距请求是被允许的,还是被拒绝的。
在一些实施方式中,响应于该测距请求消息隐私验证失败,该测距响应消息用于拒绝该第一终端设备的测距请求。
可以理解,在一些实施方式中,响应于该测距请求消息隐私验证通过,该测距响应消息用于确认接受该第一终端设备的测距请求,该第二终端设备接受该测距请求,继续进行该测距任务。
步骤503,校验该测距响应消息的完整性。
在本申请实施例中,第一终端设备能够对接收到的测距响应消息进行完整性校验,确定该测距响应消息是未被篡改的。
在一些实施方式中,响应于该测距响应消息完整性校验失败,则说明该测距响应消息被篡改,第一终端设备能够拒绝该测距响应消息。
在一些实施方式中,响应于该测距响应消息完整性校验通过,则说明该测距响应消息未被篡改,第一终端设备接收解析该测距响应消息。
综上,通过向第二终端设备发送测距请求消息,该测距请求消息用于请求对该第二终端设备进行测距,接收该第二终端设备发送的测距响应消息,该测距响应消息用于确认是否接受测距请求,校验该测距响应消息的完整性,使得第一终端设备需要通过第二终端设备的隐私验证,获得第二终端设备的许可之后,才能够执行测距服务,获得被测距的第二终端设备的距离和方向,有效保护了终端设备的隐私不被泄漏,提高系统的安全性。
请参见图6,图6是本申请实施例提供的一种测距方法的流程示意图。需要说明的是,本申请实施例的测距方法由第一终端设备执行。该方法可以独立执行,也可以结合本申请任意一个其他实施例一起被执行。如图6所示,该方法可以包括如下步骤:
步骤601,在第三终端设备的触发下,向第二终端设备发送测距请求消息,该测距请求消息用于请求对该第二终端设备进行测距。
在本申请实施例中,第一终端设备在第三终端设备的触发下,向第二终端设备发送测距请求消息,第二终端设备能够接收第一终端设备发起的测距请求,并对该测距请求消息进行隐私验证,来确定是否允许该第一终端设备执行测距服务。
在本申请实施例中,第一终端设备与第二终端设备之间的安全直接连接是基于ProSe过程建立的。
可以理解的是,在本申请实施例中,第一终端设备向第二终端设备发送的该测距请求消息,是用于请求对该第二终端设备进行测距。第二终端设备能够根据自身存储的隐私配置文件,对该测距请求消息进行隐私验证,也就是同时该测距请求消息也能够用于第二终端设备的隐私验证。
可选地,在一些实施方式中,第一终端设备可以接收第三终端设备发送的指示信息,该指示信息用于指示该第一终端设备向第二终端设备发起测距请求。
可以理解,在本申请实施例中,第一终端设备是在第三终端设备的触发下,向第二终端设备发起测距请求,因此,该第一终端设备为辅助终端设备,且该第一终端设备为服务于该第三终端设备的辅助终端设备。第三终端设备可以触发至少一个终端设备向第二终端设备发起测距请求,该触发的至少一个终端设备为服务于该第三终端设备的至少一个辅助终端设备。
在一些实施方式中,该测距请求消息中包括:第一终端设备标识,第二终端设备标识,第三终端设备标识和测距类型。
其中,在本申请实施例中,该测距类型为第三终端设备触发的测距,也就是该第一终端设备在第三终端设备的触发下发起测距请求。
在一些实施方式中,该测距请求消息还包括测距信息,该测距信息包括以下至少一种:测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
其中,测距地理区域信息是指该第一终端设备请求的测距任务执行的地理区域;
测距时间信息是指第一终端设备请求的测距任务所在的时间段;
测距距离精度信息是指第一终端设备请求的测距任务所要求的测距距离精度;
测距方向精度信息是指第一终端设备请求的测距任务所要求的测距方向精度。
在本申请实施例中,第二终端设备能够根据其自身存储的隐私配置文件,对该测距请求消息进行隐私验证,得到该测距请求消息的隐私验证结果。
步骤602,接收该第二终端设备发送的测距响应消息,该测距响应消息用于确认是否接受测距请求。
在本申请实施例中,第一终端设备能够接收第二终端设备发送的测距响应消息,该测距响应消息用于确认是否接受测距请求。第一终端设备能够根据该测距响应消息,确定该测距请求是被允许的,还是被拒绝的。
在一些实施方式中,响应于该测距请求消息隐私验证失败,该测距响应消息用于拒绝该第一终端设备的测距请求。
可以理解,在一些实施方式中,响应于该测距请求消息隐私验证通过,该测距响应消息用于确认接受该第一终端设备的测距请求,该第二终端设备接受该测距请求,继续进行该测距任务。
可以理解,在本申请实施例中,第二终端设备可以验证其是否支持第三终端设备触发的测距,验证该第一终端设备标识和该第三终端设备标识是否都在该隐私配置文件中的终端设备列表中,验证该第三终端设备触发的辅助终端设备的数量是否小于或等于该辅助终端设备数量限制信息,以及验证该测距请求消息中的测距信息是否都符合隐私配置文件中的限制。如果验证都通过,则该测距请求消息隐私验证通过。
步骤603,校验该测距响应消息的完整性。
在本申请实施例中,第一终端设备能够对接收到的测距响应消息进行完整性校验,确定该测距响应消息是未被篡改的。
在一些实施方式中,响应于该测距响应消息完整性校验失败,则说明该测距响应消息被篡改,第一终端设备能够拒绝该测距响应消息。
在一些实施方式中,响应于该测距响应消息完整性校验通过,则说明该测距响应消息未被篡改,第一终端设备接收解析该测距响应消息。
步骤604,响应于该测距响应消息的完整性校验通过,且该测距请求消息隐私验证通过,向该第三终端设备发送测距结果。
在本申请实施例中,响应于测距响应消息的完整性校验通过,则说明该测距响应消息未被篡改,第一终端设备接收解析该测距响应消息,且该测距请求消息隐私验证通过,第一终端设备能够执行该 测距服务。第一终端设备能够将执行测距服务得到的测距结果,发送给该第三终端设备,也就是第一终端设备作为服务于第三终端设备的辅助终端设备,向第三终端设备发送其测量得到的测距结果。
综上,通过在第三终端设备的触发下,向第二终端设备发送测距请求消息,该测距请求消息用于请求对该第二终端设备进行测距,接收该第二终端设备发送的测距响应消息,该测距响应消息用于确认是否接受测距请求,校验该测距响应消息的完整性,响应于该测距响应消息的完整性校验通过,且该测距请求消息隐私验证通过,向该第三终端设备发送测距结果,使得第一终端设备需要通过第二终端设备的隐私验证,获得第二终端设备的许可之后,才能够执行测距服务,获得被测距的第二终端设备的距离和方向,有效保护了终端设备的隐私不被泄漏,提高系统的安全性。
请参见图7,图7是本申请实施例提供的一种测距方法的流程示意图。该方法可以独立执行,也可以结合本申请任意一个其他实施例一起被执行。如图7所示,该方法可以包括如下步骤:
步骤701,第一终端设备向第二终端设备发送测距请求消息。
在本申请实施例中,第一终端设备与第二终端设备之间的安全直接连接是基于ProSe过程建立的。
可以理解,在本申请实施例中,第一终端设备向第二终端设备发送测距请求消息,是用于向第二终端设备请求对该第二终端设备进行测距。第二终端设备能够根据自身存储的隐私配置文件,对该测距请求消息进行隐私验证。
在一些实施方式中,该测距请求消息中包括:第一终端设备标识,第二终端设备标识和测距类型。
其中,测距类型可以为直接测距,也就是该第一终端设备直接发起测距请求,或者,为第三终端设备触发的测距,也就是该第一终端设备在第三终端设备的触发下发起测距请求。
在一些实施方式中,响应于该测距类型为该第一终端设备在第三终端设备的触发下发起测距请求,该测距请求消息中还包括该第三终端设备标识。
在一些实施方式中,该测距请求消息还包括测距信息,该测距信息包括以下至少一种:测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
其中,测距地理区域信息是指该第一终端设备请求的测距任务执行的地理区域;
测距时间信息是指第一终端设备请求的测距任务所在的时间段;
测距距离精度信息是指第一终端设备请求的测距任务所要求的测距距离精度;
测距方向精度信息是指第一终端设备请求的测距任务所要求的测距方向精度。
在本申请实施例中,第二终端设备能够根据其自身存储的隐私配置文件,对该测距请求消息进行隐私验证,得到该测距请求消息的隐私验证结果。
步骤702,第二终端设备根据存储的隐私配置文件,对该测距请求消息进行隐私验证。
在本申请实施例中,第二终端设备能够将本地存储的隐私配置文件,从因公层传递到ProSe层。
在一些实施方式中,该隐私配置文件包括以下至少一种信息:终端设备列表;测距类型限制信息;测距地理区域限制信息;测距时间限制信息;测距距离精度限制信息;测距方向精度限制信息;辅助终端设备数量限制信息。
其中,终端设备列表是第二终端设备信任的允许连接的终端设备的列表,该终端设备列表中包括该第二终端设备允许连接的至少一个终端设备的标识;
测距类型限制信息是指该第二终端设备支持的测距类型;
测距地理区域限制信息是指该第二终端设备允许被测距的区域;
测距时间限制信息是指该第二终端设备允许被测距的时间段;
测距距离精度限制信息是指该第二终端设备允许的测距距离的最高精度;
测距方向精度限制信息是指该第二终端设备允许的测距方向的最高精度;
辅助终端设备数量限制信息是指参与协同测距过程的辅助终端设备的最大的数量。
需要说明的是,辅助终端设备是参与协同测距过程的,辅助终端设备数量越多,最终测距结果的精度越高。如果该第一终端设备是在第三终端设备的触发下发起该测距请求,则该第一终端设备就是辅助终端设备。该第三终端设备可以触发至少一个辅助终端设备,向第二终端设备发起测距请求。
在一些实施方式中,响应于该第一终端设备标识在该终端设备列表中,该测距请求消息隐私验证通过。响应于该第一终端设备标识不在该终端设备列表中,该测距请求消息隐私验证失败。
在一些实施方式中,该第一终端设备发起的测距的测距类型为,在第三终端设备的触发下的测距,第二终端设备需要验证该第一终端设备和该第三终端设备是否都在允许连接的终端设备列表中。
响应于该第一终端设备标识和该第三终端设备标识都在该终端设备列表中,该测距请求消息隐私验证通过。响应于该第一终端设备标识和/或该第三终端设备标识不在该终端设备列表中,该测距请求消息隐私验证失败。也就是,第一终端设备和第三终端设备都要在该终端设备列表中,该测距请求消息隐私验证才能通过。第一终端设备和第三终端设备中有一个不在该终端设备列表中,该测距请求消息隐私验证都会失败。
在一些实施方式中,该第一终端设备发起的测距的测距类型为,在第三终端设备的触发下的测距,该第一终端设备为辅助终端设备。第二终端设备还能够确定第三终端设备触发的辅助终端设备的数量。
响应于该第三终端设备触发的辅助终端设备的数量小于或等于该辅助终端设备数量限制信息,该测距请求消息隐私验证通过。响应于该第三终端设备触发的辅助终端设备的数量大于该辅助终端设备数量限制信息,该测距请求消息隐私验证失败。
在一些实施方式中,响应于该测距信息均符合该隐私配置文件中的限制信息,该测距请求消息隐私验证通过。也就是,该测距请求消息中的测距信息,都符合该隐私配置文件中的限制信息,该测距请求消息隐私验证才能通过。该测距请求消息中的测距信息,有一项不符合该隐私配置文件中的限制信息,该测距请求消息隐私验证都会失败。
可以理解的是,该测距请求消息中包括的第一终端设备标识,测距类型和测距信息,必须都符合隐私配置文件中的限制,该测距请求消息隐私验证才能通过。
如果该测距请求的测距类型为第三终端设备触发的测距,则该测距请求消息中包括的第一终端设备标识,第三终端设备标识,测距类型和测距信息,必须都符合隐私配置文件中的限制,且该第三终端设备触发的辅助终端设备数量小于或等于辅助终端设备数量限制信息,该测距请求消息隐私验证才能通过。
步骤703,第二终端设备向第一终端设备发送测距响应消息。
在本申请实施例中,第二终端设备在对第一终端设备发送的测距请求消息进行隐私验证之后,可以向第一终端设备发送测距响应消息,该测距响应消息用于确认是否接受测距请求。第一终端设备能够根据该测距响应消息,确定该测距请求是被允许的,还是被拒绝的。
在一些实施方式中,响应于该测距请求消息隐私验证失败,该测距响应消息用于拒绝该第一终端设备的测距请求。
可以理解,在一些实施方式中,响应于该测距请求消息隐私验证通过,该测距响应消息用于确认接受该第一终端设备的测距请求,该第二终端设备接受该测距请求,继续进行该测距任务。
综上,通过第一终端设备向第二终端设备发送测距请求消息,第二终端设备根据存储的隐私配置文件,对该测距请求消息进行隐私验证,第二终端设备向第一终端设备发送测距响应消息,使得第一终端设备需要通过第二终端设备的隐私验证,获得第二终端设备的许可之后,才能够执行测距服务,获得被测距的第二终端设备的距离和方向,有效保护了终端设备的隐私不被泄漏,提高系统的安全性。
请参见图8,图8是本申请实施例提供的一种测距方法的流程示意图。该方法可以独立执行,也可以结合本申请任意一个其他实施例一起被执行。如图8所示,该方法可以包括如下步骤:
步骤801,第三终端设备向第一终端设备发送指示信息,该指示信息用于触发第一终端设备向第二终端设备发起测距请求。
需要说明的是,在本申请实施例中,第三终端设备和第一终端设备之间的安全直接连接,第一终端设备和第二终端设备之间的安全直接连接,均可以基于ProSe过程建立。
在本申请实施例中,第三终端设备能够触发第一终端设备向第二终端设备发起测距请求。作为一种可能的实现方式,第一终端设备可以接收第三终端设备发送的指示信息,该指示信息用于指示该第一终端设备向第二终端设备发起测距请求。
可选地,该指示信息中可以包括第二终端设备标识。
可以理解,在本申请实施例中,第一终端设备是在第三终端设备的触发下,向第二终端设备发起测距请求,因此,该第一终端设备为辅助终端设备,且该第一终端设备为服务于该第三终端设备的辅助终端设备。第三终端设备可以触发至少一个终端设备向第二终端设备发起测距请求,该触发的至少一个终端设备为服务于该第三终端设备的至少一个辅助终端设备。
步骤802,在第三终端设备的触发下,第一终端设备向第二终端设备发送测距请求消息。
在本申请实施例中,第一终端设备在第三终端设备的触发下,向第二终端设备发起测距请求,该测距请求消息中包括:第一终端设备标识,第二终端设备标识,第三终端设备标识和测距类型。
其中,在本申请实施例中,该测距类型为第三终端设备触发的测距,也就是该第一终端设备在第三终端设备的触发下发起测距请求。
在一些实施方式中,该测距请求消息还包括测距信息,该测距信息包括以下至少一种:测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
其中,测距地理区域信息是指该第一终端设备请求的测距任务执行的地理区域;
测距时间信息是指第一终端设备请求的测距任务所在的时间段;
测距距离精度信息是指第一终端设备请求的测距任务所要求的测距距离精度;
测距方向精度信息是指第一终端设备请求的测距任务所要求的测距方向精度。
在本申请实施例中,第二终端设备能够根据其自身存储的隐私配置文件,对该测距请求消息进行隐私验证,得到该测距请求消息的隐私验证结果。
步骤803,第二终端设备根据存储的隐私配置文件,对该测距请求消息进行隐私验证。
在本申请实施例中,第二终端设备能够将本地存储的隐私配置文件,从因公层传递到ProSe层。
在一些实施方式中,该隐私配置文件包括以下至少一种信息:终端设备列表;测距类型限制信息;测距地理区域限制信息;测距时间限制信息;测距距离精度限制信息;测距方向精度限制信息;辅助终端设备数量限制信息。
其中,终端设备列表是第二终端设备信任的允许连接的终端设备的列表,该终端设备列表中包括该第二终端设备允许连接的至少一个终端设备的标识;
测距类型限制信息是指该第二终端设备支持的测距类型;
测距地理区域限制信息是指该第二终端设备允许被测距的区域;
测距时间限制信息是指该第二终端设备允许被测距的时间段;
测距距离精度限制信息是指该第二终端设备允许的测距距离的最高精度;
测距方向精度限制信息是指该第二终端设备允许的测距方向的最高精度;
辅助终端设备数量限制信息是指参与协同测距过程的辅助终端设备的最大的数量。
需要说明的是,辅助终端设备是参与协同测距过程的,辅助终端设备数量越多,最终测距结果的 精度越高。在本申请实施例中,该第一终端设备是在第三终端设备的触发下发起该测距请求,则该第一终端设备就是辅助终端设备。该第三终端设备可以触发至少一个辅助终端设备,向第二终端设备发起测距请求。
在一些实施方式中,第二终端设备能够对接收到的测距请求消息进行完整性校验,响应于该测距请求消息完整性校验通过,第二终端设备根据存储的该隐私配置文件对该测距请求消息进行隐私验证。
响应于该测距请求消息完整性校验不通过,第二终端设备拒绝该测距请求,也就是第二终端设备向第一终端设备发送的测距响应消息用于拒绝该测距请求。
在本申请实施例中,第二终端设备需要验证该第一终端设备和该第三终端设备是否都在允许连接的终端设备列表中。
响应于该第一终端设备标识和该第三终端设备标识都在该终端设备列表中,该测距请求消息隐私验证通过。响应于该第一终端设备标识和/或该第三终端设备标识不在该终端设备列表中,该测距请求消息隐私验证失败。也就是,第一终端设备和第三终端设备都要在该终端设备列表中,该测距请求消息隐私验证才能通过。第一终端设备和第三终端设备中有一个不在该终端设备列表中,该测距请求消息隐私验证都会失败。
在本申请实施例中,第二终端设备还能够确定第三终端设备触发的辅助终端设备的数量。
响应于该第三终端设备触发的辅助终端设备的数量小于或等于该辅助终端设备数量限制信息,该测距请求消息隐私验证通过。响应于该第三终端设备触发的辅助终端设备的数量大于该辅助终端设备数量限制信息,该测距请求消息隐私验证失败。
在一些实施方式中,响应于该测距信息均符合该隐私配置文件中的限制信息,该测距请求消息隐私验证通过。也就是,该测距请求消息中的测距信息,都符合该隐私配置文件中的限制信息,该测距请求消息隐私验证才能通过。该测距请求消息中的测距信息,有一项不符合该隐私配置文件中的限制信息,该测距请求消息隐私验证都会失败。
可以理解的是,在本申请实施例中,该测距请求消息中包括的第一终端设备标识,第三终端设备标识,测距类型和测距信息,必须都符合隐私配置文件中的限制,且该第三终端设备触发的辅助终端设备数量小于或等于辅助终端设备数量限制信息,该测距请求消息隐私验证才能通过。
步骤804,第二终端设备向第一终端设备发送测距响应消息。
在本申请实施例中,第二终端设备在对第一终端设备发送的测距请求消息进行隐私验证之后,可以向第一终端设备发送测距响应消息,该测距响应消息用于确认是否接受测距请求。第一终端设备能够根据该测距响应消息,确定该测距请求是被允许的,还是被拒绝的。
在一些实施方式中,响应于该测距请求消息隐私验证失败,该测距响应消息用于拒绝该第一终端设备的测距请求。
可以理解,在一些实施方式中,响应于该测距请求消息隐私验证通过,该测距响应消息用于确认接受该第一终端设备的测距请求。该第二终端设备接受该测距请求,继续进行该测距任务。
在一些实施方式中,响应于该测距响应消息用于拒绝该第一终端设备的测距请求,该测距响应消息中还包括拒绝该测距请求的原因。
步骤805,第一终端设备向第三终端设备发送测距结果。
在一些实施方式中,第一终端设备能够对第二终端设备发送的测距响应消息进行完整性校验。
响应于该测距响应消息完整性校验失败,则说明该测距响应消息被篡改,第一终端设备能够拒绝该测距响应消息。
响应于该测距响应消息完整性校验通过,则说明该测距响应消息未被篡改,第一终端设备接收解析该测距响应消息。
在本申请实施例中,响应于测距响应消息的完整性校验通过,则说明该测距响应消息未被篡改,第一终端设备接收解析该测距响应消息,且该测距请求消息隐私验证通过,第一终端设备能够执行该测距服务。第一终端设备能够将执行测距服务得到的测距结果,发送给该第三终端设备,也就是第一终端设备作为服务于第三终端设备的辅助终端设备,向第三终端设备发送其测量得到的测距结果。
综上,通过第三终端设备向第一终端设备发送指示信息,该指示信息用于触发第一终端设备向第二终端设备发起测距请求,在第三终端设备的触发下,第一终端设备向第二终端设备发送测距请求消息,第二终端设备根据存储的隐私配置文件,对该测距请求消息进行隐私验证,第二终端设备向第一终端设备发送测距响应消息,第一终端设备向第三终端设备发送测距结果,使得第一终端设备需要通过第二终端设备的隐私验证,获得第二终端设备的许可之后,才能够执行测距服务,获得被测距的第二终端设备的距离和方向,有效保护了终端设备的隐私不被泄漏,提高系统的安全性。
与上述几种实施例提供的测距方法相对应,本申请还提供一种测距装置,由于本申请实施例提供的测距装置与上述几种实施例提供的方法相对应,因此在测距方法的实施方式也适用于下述实施例提供的测距装置,在下述实施例中不再详细描述。
请参见图9,图9为本申请实施例提供的一种测距装置的结构示意图。
如图9所示,该测距装置900包括:接收单元910,处理单元920和发送单元930,其中:
接收单元910,用于接收第一终端设备发送的测距请求消息;
处理单元920,用于根据该第二终端设备存储的隐私配置文件,对该测距请求消息进行隐私验证;
发送单元930,还用于向该第一终端设备发送测距响应消息,该测距响应消息用于确认是否接受测距请求。
可选地,该隐私配置文件包括以下至少一种信息:
终端设备列表,该终端设备列表中包括该第二终端设备允许连接的至少一个终端设备的标识;
测距类型限制信息;
测距地理区域限制信息;
测距时间限制信息;
测距距离精度限制信息;
测距方向精度限制信息;
辅助终端设备数量限制信息。
可选地,该测距请求消息包括:该第一终端设备标识,该第二终端设备标识和测距类型;
该测距类型包括该第一终端设备直接发起测距请求,或者,该第一终端设备在第三终端设备的触发下发起测距请求。
可选地,响应于该测距类型为该第一终端设备在第三终端设备的触发下发起测距请求,该测距请求消息中还包括该第三终端设备标识。
可选地,该测距请求消息还包括测距信息,该测距信息包括以下至少一种:
测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
可选地,该处理单元920具体用于:
响应于该第一终端设备标识在该终端设备列表中,该测距请求消息隐私验证通过;
响应于该第一终端设备标识不在该终端设备列表中,该测距请求消息隐私验证失败。
可选地,该处理单元920具体用于:
响应于该第一终端设备标识和该第三终端设备标识都在该终端设备列表中,该测距请求消息隐私验证通过;
响应于该第一终端设备标识和/或该第三终端设备标识不在该终端设备列表中,该测距请求消息隐私验证失败。
可选地,该处理单元920还用于:
确定该第三终端设备触发的辅助终端设备的数量;
响应于该第三终端设备触发的辅助终端设备的数量小于或等于该辅助终端设备数量限制信息,该测距请求消息隐私验证通过;
响应于该第三终端设备触发的辅助终端设备的数量大于该辅助终端设备数量限制信息,该测距请求消息隐私验证失败。
可选地,该处理单元920具体用于:
响应于该第一终端设备标识在该终端设备列表中,且该测距信息均符合该隐私配置文件中的限制信息,该测距请求消息隐私验证通过。
可选地,响应于该测距请求消息隐私验证失败,该测距响应消息用于拒绝该第一终端设备的测距请求。
可选地,该处理单元920还用于:
校验该测距请求消息的完整性;
响应于该测距请求消息的完整性校验不通过,该测距请求消息用于拒绝该第一终端设备的测距请求。
可选地,响应于该测距请求消息的完整性校验通过,且该测距请求消息隐私验证通过,该测距响应消息用于确认接受所述第一终端设备的测距请求。
本实施例的测距装置,可以通过接收第一终端设备发送的测距请求消息,根据该第二终端设备存储的隐私配置文件,对该测距请求消息进行隐私验证,向该第一终端设备发送测距响应消息,该测距响应消息用于确认是否接受测距请求,使得第一终端设备需要通过第二终端设备的隐私验证,获得第二终端设备的许可之后,才能够执行测距服务,获得被测距的第二终端设备的距离和方向,有效保护了终端设备的隐私不被泄漏,提高系统的安全性。
请参见图10,图10为本申请实施例提供的一种测距装置的结构示意图。
如图10所示,该测距装置1000包括:接收单元1010和接收单元1020,其中:
发送单元1010,用于向第二终端设备发送测距请求消息,该测距请求消息用于请求对该第二终端设备进行测距;
接收单元1020,还用于接收该第二终端设备发送的测距响应消息,该测距响应消息用于确认是否接受测距请求。
可选地,该测距请求消息包括:该第一终端设备标识,该第二终端设备标识和测距类型;
该测距类型包括该第一终端设备直接发起测距请求,或者,该第一终端设备在第三终端设备的触发下发起测距请求。
可选地,响应于该测距类型为第三终端设备触发的测距,该测距请求消息中还包括该第三终端设备标识。
可选地,该测距请求消息还包括测距信息,该测距信息包括以下至少一种:
测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
可选地,该装置还包括:
处理单元(图中未示出),用于校验该测距响应消息的完整性;
该处理单元,还用于响应于该测距响应消息的完整性校验失败,拒绝该测距响应消息。
本实施例的测距装置,可以通过向第二终端设备发送测距请求消息,该测距请求消息用于请求对该第二终端设备进行测距,接收该第二终端设备发送的测距响应消息,该测距响应消息用于确认是否接受测距请求,使得第一终端设备需要通过第二终端设备的隐私验证,获得第二终端设备的许可之后,才能够执行测距服务,获得被测距的第二终端设备的距离和方向,有效保护了终端设备的隐私不被泄漏,提高系统的安全性。
为了实现上述实施例,本申请实施例还提出一种通信装置,包括:处理器和存储器,存储器中存储有计算机程序,处理器执行所述存储器中存储的计算机程序,以使装置执行图2至图3实施例所示的方法。
为了实现上述实施例,本申请实施例还提出一种通信装置,包括:处理器和存储器,存储器中存储有计算机程序,处理器执行所述存储器中存储的计算机程序,以使装置执行图4至图6实施例所示的方法。
为了实现上述实施例,本申请实施例还提出一种通信装置,包括:处理器和接口电路,接口电路,用于接收代码指令并传输至处理器,处理器,用于运行所述代码指令以执行图2至图3实施例所示的方法。
为了实现上述实施例,本申请实施例还提出一种通信装置,包括:处理器和接口电路,接口电路,用于接收代码指令并传输至处理器,处理器,用于运行所述代码指令以执行图4至图6实施例所示的方法。
请参见图11,图11是本申请实施例提供的另一种测距装置的结构示意图。测距装置1100可以是网络设备,也可以是终端设备,也可以是支持网络设备实现上述方法的芯片、芯片系统、或处理器等,还可以是支持终端设备实现上述方法的芯片、芯片系统、或处理器等。该装置可用于实现上述方法实施例中描述的方法,具体可以参见上述方法实施例中的说明。
测距装置1100可以包括一个或多个处理器1101。处理器1101可以是通用处理器或者专用处理器等。例如可以是基带处理器或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对测距装置(如,基站、基带芯片,终端设备、终端设备芯片,DU或CU等)进行控制,执行计算机程序,处理计算机程序的数据。
可选的,测距装置1100中还可以包括一个或多个存储器1102,其上可以存有计算机程序1103,处理器1101执行计算机程序1103,以使得测距装置1100执行上述方法实施例中描述的方法。计算机程序1103可能固化在处理器1101中,该种情况下,处理器1101可能由硬件实现。
可选的,存储器1102中还可以存储有数据。测距装置1100和存储器1102可以单独设置,也可以集成在一起。
可选的,测距装置1100还可以包括收发器1105、天线1106。收发器1105可以称为收发单元、收发机、或收发电路等,用于实现收发功能。收发器1105可以包括接收器和发送器,接收器可以称为接收机或接收电路等,用于实现接收功能;发送器可以称为发送机或发送电路等,用于实现发送功能。
可选的,测距装置1100中还可以包括一个或多个接口电路1107。接口电路1107用于接收代码指令并传输至处理器1101。处理器1101运行代码指令以使测距装置1100执行上述方法实施例中描述的方法。
在一种实现方式中,处理器1101中可以包括用于实现接收和发送功能的收发器。例如该收发器可以是收发电路,或者是接口,或者是接口电路。用于实现接收和发送功能的收发电路、接口或接口电路可以是分开的,也可以集成在一起。上述收发电路、接口或接口电路可以用于代码/数据的读写,或 者,上述收发电路、接口或接口电路可以用于信号的传输或传递。
在一种实现方式中,测距装置1100可以包括电路,电路可以实现前述方法实施例中发送或接收或者通信的功能。本申请中描述的处理器和收发器可实现在集成电路(integrated circuit,IC)、模拟IC、射频集成电路RFIC、混合信号IC、专用集成电路(application specific integrated circuit,ASIC)、印刷电路板(printed circuit board,PCB)、电子设备等上。该处理器和收发器也可以用各种IC工艺技术来制造,例如互补金属氧化物半导体(complementary metal oxide semiconductor,CMOS)、N型金属氧化物半导体(nMetal-oxide-semiconductor,NMOS)、P型金属氧化物半导体(positive channel metal oxide semiconductor,PMOS)、双极结型晶体管(bipolar junction transistor,BJT)、双极CMOS(BiCMOS)、硅锗(SiGe)、砷化镓(GaAs)等。
以上实施例描述中的测距装置可以是网络设备或者终端设备,但本申请中描述的测距装置的范围并不限于此,而且测距装置的结构可以不受图9-图10的限制。测距装置可以是独立的设备或者可以是较大设备的一部分。例如测距装置可以是:
(1)独立的集成电路IC,或芯片,或,芯片系统或子系统;
(2)具有一个或多个IC的集合,可选的,该IC集合也可以包括用于存储数据,计算机程序的存储部件;
(3)ASIC,例如调制解调器(Modem);
(4)可嵌入在其他设备内的模块;
(5)接收机、终端设备、智能终端设备、蜂窝电话、无线设备、手持机、移动单元、车载设备、网络设备、云设备、人工智能设备等等;
(6)其他等等。
对于测距装置可以是芯片或芯片系统的情况,可参见图12所示的芯片的结构示意图。图12所示的芯片包括处理器1201和接口1202。其中,处理器1201的数量可以是一个或多个,接口1202的数量可以是多个。
对于芯片用于实现本申请实施例中网络设备的功能的情况:
接口1202,用于代码指令并传输至处理器;
处理器1201,用于运行代码指令以执行如图2至图3的方法。
对于芯片用于实现本申请实施例中终端设备的功能的情况:
接口1202,用于代码指令并传输至处理器;
处理器1201,用于运行代码指令以执行如图4至图5的方法。
可选的,芯片还包括存储器1203,存储器1203用于存储必要的计算机程序和数据。
本领域技术人员还可以了解到本申请实施例列出的各种说明性逻辑块(illustrative logical block)和步骤(step)可以通过电子硬件、电脑软件,或两者的结合进行实现。这样的功能是通过硬件还是软件来实现取决于特定的应用和整个系统的设计要求。本领域技术人员可以对于每种特定的应用,可以使用各种方法实现的功能,但这种实现不应被理解为超出本申请实施例保护的范围。
本申请实施例还提供一种通信系统,该系统包括前述图9-图10实施例中作为终端设备的测距装置,或者,该系统包括前述图11实施例中作为终端设备的测距装置。
本申请还提供一种可读存储介质,其上存储有指令,该指令被计算机执行时实现上述任一方法实施例的功能。
本申请还提供一种计算机程序产品,该计算机程序产品被计算机执行时实现上述任一方法实施例的功能。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件 实现时,可以全部或部分地以计算机程序产品的形式实现。计算机程序产品包括一个或多个计算机程序。在计算机上加载和执行计算机程序时,全部或部分地产生按照本申请实施例的流程或功能。计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。计算机程序可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,计算机程序可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以理解:本申请中涉及的第一、第二等各种数字编号仅为描述方便进行的区分,并不用来限制本申请实施例的范围,也表示先后顺序。
本申请中的至少一个还可以描述为一个或多个,多个可以是两个、三个、四个或者更多个,本申请不做限制。在本申请实施例中,对于一种技术特征,通过“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”等区分该种技术特征中的技术特征,该“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”描述的技术特征间无先后顺序或者大小顺序。
本申请中各表所示的对应关系可以被配置,也可以是预定义的。各表中的信息的取值仅仅是举例,可以配置为其他值,本申请并不限定。在配置信息与各参数的对应关系时,并不一定要求必须配置各表中示意出的所有对应关系。例如,本申请中的表格中,某些行示出的对应关系也可以不配置。又例如,可以基于上述表格做适当的变形调整,例如,拆分,合并等等。上述各表中标题示出参数的名称也可以采用通信装置可理解的其他名称,其参数的取值或表示方式也可以通信装置可理解的其他取值或表示方式。上述各表在实现时,也可以采用其他的数据结构,例如可以采用数组、队列、容器、栈、线性表、指针、链表、树、图、结构体、类、堆、散列表或哈希表等。
本申请中的预定义可以理解为定义、预先定义、存储、预存储、预协商、预配置、固化、或预烧制。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
应当理解,可以使用上面所示的各种形式的流程,重新排序、增加或删除步骤。例如,本申请实施例中记载的各步骤可以并行地执行也可以顺序地执行也可以不同的次序执行,只要能够实现本发明公开的技术方案所期望的结果,本文在此不进行限制。
上述具体实施方式,并不构成对本发明保护范围的限制。本领域技术人员应该明白的是,根据设计要求和其他因素,可以进行各种修改、组合、子组合和替代。任何在本发明的精神和原则之内所作的修改、等同替换和改进等,均应包含在本发明保护范围之内。

Claims (40)

  1. 一种测距方法,其特征在于,所述方法由第二终端设备执行,所述方法包括:
    接收第一终端设备发送的测距请求消息;
    根据所述第二终端设备存储的隐私配置文件,对所述测距请求消息进行隐私验证;
    向所述第一终端设备发送测距响应消息,所述测距响应消息用于确认是否接受测距请求。
  2. 根据权利要求1所述的方法,其特征在于,所述隐私配置文件包括以下至少一种信息:
    终端设备列表,所述终端设备列表中包括所述第二终端设备允许连接的至少一个终端设备的标识;
    测距类型限制信息;
    测距地理区域限制信息;
    测距时间限制信息;
    测距距离精度限制信息;
    测距方向精度限制信息;
    辅助终端设备数量限制信息。
  3. 根据权利要求2所述的方法,其特征在于,所述测距请求消息包括:所述第一终端设备标识,所述第二终端设备标识和测距类型;
    所述测距类型包括所述第一终端设备直接发起测距请求,或者,所述第一终端设备在第三终端设备的触发下发起测距请求。
  4. 根据权利要求3所述的方法,其特征在于,响应于所述测距类型为所述第一终端设备在第三终端设备的触发下发起测距请求,所述测距请求消息中还包括所述第三终端设备标识。
  5. 根据权利要求3所述的方法,其特征在于,所述测距请求消息还包括测距信息,所述测距信息包括以下至少一种:
    测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
  6. 根据权利要求3所述的方法,其特征在于,所述根据所述第二终端设备存储的隐私配置文件,对所述测距请求消息进行隐私验证,包括:
    响应于所述第一终端设备标识在所述终端设备列表中,所述测距请求消息隐私验证通过;
    响应于所述第一终端设备标识不在所述终端设备列表中,所述测距请求消息隐私验证失败。
  7. 根据权利要求4所述的方法,其特征在于,所述根据所述第二终端设备存储的隐私配置文件,对所述测距请求消息进行隐私验证,包括:
    响应于所述第一终端设备标识和所述第三终端设备标识都在所述终端设备列表中,所述测距请求消息隐私验证通过;
    响应于所述第一终端设备标识和/或所述第三终端设备标识不在所述终端设备列表中,所述测距请求消息隐私验证失败。
  8. 根据权利要求7所述的方法,其特征在于,所述根据所述第二终端设备存储的隐私配置文件,对所述测距请求消息进行隐私验证,还包括:
    确定所述第三终端设备触发的辅助终端设备的数量;
    响应于所述第三终端设备触发的辅助终端设备的数量小于或等于所述辅助终端设备数量限制信息,所述测距请求消息隐私验证通过;
    响应于所述第三终端设备触发的辅助终端设备的数量大于所述辅助终端设备数量限制信息,所述测距请求消息隐私验证失败。
  9. 根据权利要求5所述的方法,其特征在于,所述根据所述第二终端设备存储的隐私配置文件, 对所述测距请求消息进行隐私验证,包括:
    响应于所述第一终端设备标识在所述终端设备列表中,且所述测距信息均符合所述隐私配置文件中的限制信息,所述测距请求消息隐私验证通过。
  10. 根据权利要求6-9任一项所述的方法,其特征在于,响应于所述测距请求消息隐私验证失败,所述测距响应消息用于拒绝所述第一终端设备的测距请求。
  11. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    校验所述测距请求消息的完整性;
    响应于所述测距请求消息的完整性校验不通过,所述测距响应消息用于拒绝所述第一终端设备的测距请求。
  12. 根据权利要求11所述的方法,其特征在于,响应于所述测距请求消息的完整性校验通过,且所述测距请求消息隐私验证通过,所述测距响应消息用于确认接受所述第一终端设备的测距请求。
  13. 一种测距方法,其特征在于,所述方法由第一终端设备执行,所述方法包括:
    向第二终端设备发送测距请求消息,所述测距请求消息用于请求对所述第二终端设备进行测距;
    接收所述第二终端设备发送的测距响应消息,所述测距响应消息用于确认是否接受测距请求。
  14. 根据权利要求13所述的方法,其特征在于,所述测距请求消息包括:所述第一终端设备标识,所述第二终端设备标识和测距类型;
    所述测距类型包括所述第一终端设备直接发起测距请求,或者,所述第一终端设备在第三终端设备的触发下发起测距请求。
  15. 根据权利要求14所述的方法,其特征在于,响应于所述测距类型为第三终端设备触发的测距,所述测距请求消息中还包括所述第三终端设备标识。
  16. 根据权利要求14所述的方法,其特征在于,所述测距请求消息还包括测距信息,所述测距信息包括以下至少一种:
    测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
  17. 根据权利要求13所述的方法,其特征在于,所述方法还包括:
    校验所述测距响应消息的完整性;
    响应于所述测距响应消息的完整性校验失败,拒绝所述测距响应消息。
  18. 一种测距装置,其特征在于,所述装置应用于第二终端设备,所述装置包括:
    接收单元,用于接收第一终端设备发送的测距请求消息;
    处理单元,用于根据所述第二终端设备存储的隐私配置文件,对所述测距请求消息进行隐私验证;
    发送单元,用于向所述第一终端设备发送测距响应消息,所述测距响应消息用于确认是否接受测距请求。
  19. 根据权利要求18所述的装置,其特征在于,所述隐私配置文件包括以下至少一种信息:
    终端设备列表,所述终端设备列表中包括所述第二终端设备允许连接的至少一个终端设备的标识;
    测距类型限制信息;
    测距地理区域限制信息;
    测距时间限制信息;
    测距距离精度限制信息;
    测距方向精度限制信息;
    辅助终端设备数量限制信息。
  20. 根据权利要求19所述的装置,其特征在于,所述测距请求消息包括:所述第一终端设备标识,所述第二终端设备标识和测距类型;
    所述测距类型包括所述第一终端设备直接发起测距请求,或者,所述第一终端设备在第三终端设备的触发下发起测距请求。
  21. 根据权利要求20所述的装置,其特征在于,响应于所述测距类型为所述第一终端设备在第三终端设备的触发下发起测距请求,所述测距请求消息中还包括所述第三终端设备标识。
  22. 根据权利要求20所述的装置,其特征在于,所述测距请求消息还包括测距信息,所述测距信息包括以下至少一种:
    测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
  23. 根据权利要求20所述的装置,其特征在于,所述处理单元具体用于:
    响应于所述第一终端设备标识在所述终端设备列表中,所述测距请求消息隐私验证通过;
    响应于所述第一终端设备标识不在所述终端设备列表中,所述测距请求消息隐私验证失败。
  24. 根据权利要求21所述的装置,其特征在于,所述处理单元具体用于:
    响应于所述第一终端设备标识和所述第三终端设备标识都在所述终端设备列表中,所述测距请求消息隐私验证通过;
    响应于所述第一终端设备标识和/或所述第三终端设备标识不在所述终端设备列表中,所述测距请求消息隐私验证失败。
  25. 根据权利要求24所述的装置,其特征在于,所述处理单元还用于:
    确定所述第三终端设备触发的辅助终端设备的数量;
    响应于所述第三终端设备触发的辅助终端设备的数量小于或等于所述辅助终端设备数量限制信息,所述测距请求消息隐私验证通过;
    响应于所述第三终端设备触发的辅助终端设备的数量大于所述辅助终端设备数量限制信息,所述测距请求消息隐私验证失败。
  26. 根据权利要求23所述的装置,其特征在于,所述处理单元具体用于:
    响应于所述第一终端设备标识在所述终端设备列表中,且所述测距信息均符合所述隐私配置文件中的限制信息,所述测距请求消息隐私验证通过。
  27. 根据权利要求23-26任一项所述的装置,其特征在于,响应于所述测距请求消息隐私验证失败,所述测距响应消息用于拒绝所述第一终端设备的测距请求。
  28. 根据权利要求18所述的装置,其特征在于,所述处理单元还用于:
    校验所述测距请求消息的完整性;
    响应于所述测距请求消息的完整性校验不通过,所述测距响应消息用于拒绝所述第一终端设备的测距请求。
  29. 根据权利要求28所述的装置,其特征在于,响应于所述测距请求消息的完整性校验通过,且所述测距请求消息隐私验证通过,所述测距响应消息用于确认接受所述第一终端设备的测距请求。
  30. 一种测距装置,其特征在于,所述装置应用于第一终端设备,所述装置包括:
    发送单元,用于向第二终端设备发送测距请求消息,所述测距请求消息用于请求对所述第二终端设备进行测距;
    接收单元,用于接收所述第二终端设备发送的测距响应消息,所述测距响应消息用于确认是否接受测距请求。
  31. 根据权利要求30所述的装置,其特征在于,所述测距请求消息包括:所述第一终端设备标识,所述第二终端设备标识和测距类型;
    所述测距类型包括所述第一终端设备直接发起测距请求,或者,所述第一终端设备在第三终端设备的触发下发起测距请求。
  32. 根据权利要求31所述的装置,其特征在于,响应于所述测距类型为第三终端设备触发的测距,所述测距请求消息中还包括所述第三终端设备标识。
  33. 根据权利要求31所述的装置,其特征在于,所述测距请求消息还包括测距信息,所述测距信息包括以下至少一种:
    测距地理区域信息;测距时间信息;测距距离精度信息;测距方向精度信息。
  34. 根据权利要求30所述的装置,其特征在于,所述装置还包括:
    处理单元,用于校验所述测距响应消息的完整性;
    所述处理单元,还用于响应于所述测距响应消息的完整性校验失败,拒绝所述测距响应消息。
  35. 一种通信装置,其特征在于,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求1至12中任一项所述的方法。
  36. 一种通信装置,其特征在于,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求13至17中任一项所述的方法。
  37. 一种通信装置,其特征在于,包括:处理器和接口电路;
    所述接口电路,用于接收代码指令并传输至所述处理器;
    所述处理器,用于运行所述代码指令以执行如权利要求1至12中任一项所述的方法。
  38. 一种通信装置,其特征在于,包括:处理器和接口电路;
    所述接口电路,用于接收代码指令并传输至所述处理器;
    所述处理器,用于运行所述代码指令以执行如权利要求13至17中任一项所述的方法。
  39. 一种计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如权利要求1至12中任一项所述的方法被实现。
  40. 一种计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如权利要求13至17中任一项所述的方法被实现。
PCT/CN2022/097014 2022-06-02 2022-06-02 测距方法及装置 WO2023231038A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2022/097014 WO2023231038A1 (zh) 2022-06-02 2022-06-02 测距方法及装置
CN202280001845.5A CN117501717A (zh) 2022-06-02 2022-06-02 测距方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/097014 WO2023231038A1 (zh) 2022-06-02 2022-06-02 测距方法及装置

Publications (1)

Publication Number Publication Date
WO2023231038A1 true WO2023231038A1 (zh) 2023-12-07

Family

ID=89026638

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/097014 WO2023231038A1 (zh) 2022-06-02 2022-06-02 测距方法及装置

Country Status (2)

Country Link
CN (1) CN117501717A (zh)
WO (1) WO2023231038A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100118833A1 (en) * 2007-04-18 2010-05-13 Gene Beck Hahn Method for performing initial ranging in wireless communication system
US20110010771A1 (en) * 2009-07-10 2011-01-13 Clear Wireless Llc Detecting a denial of service attack
US20170041926A1 (en) * 2015-08-06 2017-02-09 Emily H. Qi Responding to a ranging request from a peer device in a wireless network
CN112219437A (zh) * 2020-09-04 2021-01-12 北京小米移动软件有限公司 通信方法、终端、通信节点、通信设备及存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100118833A1 (en) * 2007-04-18 2010-05-13 Gene Beck Hahn Method for performing initial ranging in wireless communication system
US20110010771A1 (en) * 2009-07-10 2011-01-13 Clear Wireless Llc Detecting a denial of service attack
US20170041926A1 (en) * 2015-08-06 2017-02-09 Emily H. Qi Responding to a ranging request from a peer device in a wireless network
CN112219437A (zh) * 2020-09-04 2021-01-12 北京小米移动软件有限公司 通信方法、终端、通信节点、通信设备及存储介质

Also Published As

Publication number Publication date
CN117501717A (zh) 2024-02-02

Similar Documents

Publication Publication Date Title
WO2023168716A1 (zh) 一种载波相位定位的方法及其装置
WO2023231038A1 (zh) 测距方法及装置
WO2024021128A1 (zh) 同步参考源的确定方法及装置
WO2023201753A1 (zh) 一种终端能力上报方法、确定方法及其装置
WO2023216203A1 (zh) 资源配置方法及装置
WO2024000199A1 (zh) 一种信道测量方法及其装置
WO2023225830A1 (zh) 中继连接方法及装置
CN115997392A (zh) 侧行链路定位消息的发送方法、接收方法及其装置
WO2023216034A1 (zh) 一种校验位置信息的方法及其装置
WO2023201757A1 (zh) 信息上报方法及装置
WO2023087191A1 (zh) 无线资源控制rrc拒绝消息的传输方法及装置
WO2024065222A1 (zh) 侧行链路sl定位方法和装置
WO2024082143A1 (zh) 一种设备业务角色的验证方法/装置/设备及存储介质
WO2024020752A1 (zh) 一种基于人工智能ai提供服务的方法、装置、设备及存储介质
WO2024060155A1 (zh) 定位验证方法及装置
WO2024016245A1 (zh) 一种信息指示方法、装置、设备及存储介质
WO2024031373A1 (zh) 一种确定触发连续lbt失败的方法及装置
WO2024060154A1 (zh) 一种上报方法/装置/设备及存储介质
WO2024031724A1 (zh) 终端设备能力指示方法及装置
WO2024026799A1 (zh) 数据传输方法和装置
WO2024031732A1 (zh) 终端设备能力指示方法及装置
WO2024000331A1 (zh) 感知服务获取方法及装置
WO2023201758A1 (zh) 信息上报方法及装置
WO2024026795A1 (zh) 一种侧行链路sl定位参考信号prs的发送方法及装置
WO2024065335A1 (zh) 一种侧行链路定位方法及装置

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 202280001845.5

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22944366

Country of ref document: EP

Kind code of ref document: A1