WO2024001811A1 - 信息发送方法和装置 - Google Patents

信息发送方法和装置 Download PDF

Info

Publication number
WO2024001811A1
WO2024001811A1 PCT/CN2023/100499 CN2023100499W WO2024001811A1 WO 2024001811 A1 WO2024001811 A1 WO 2024001811A1 CN 2023100499 W CN2023100499 W CN 2023100499W WO 2024001811 A1 WO2024001811 A1 WO 2024001811A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
information
location
gateway mobile
positioning service
Prior art date
Application number
PCT/CN2023/100499
Other languages
English (en)
French (fr)
Inventor
张正
李飞
何承东
俞小凡
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2024001811A1 publication Critical patent/WO2024001811A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Definitions

  • the present application relates to the field of communication technology, and in particular, to an information sending method and device.
  • the third generation partner project (3GPP) defines location services (LCS) as the fifth generation mobile communication technology (5G) LCS.
  • the network client can request the location information of the terminal equipment (user equipment, UE) from the gateway mobile location center (GMLC).
  • GMLC gateway mobile location center
  • GMLC mainly considers the correspondence between the network client and the UE and the LCS request. For example, in the LCS request, the LCS privacy profile identifies that the network client is allowed to access, and the UE's location privacy identifier ( When the location privacy indication (LPI) indicator allows the network client to request the UE's LCS, the network client can request the location information of the UE in any area. Therefore, the GMLC's decision process for privacy detection between network clients and UEs is coarse-grained, which may cause the location of the UE to be leaked.
  • LPI location privacy indication
  • This application provides an information sending method and device that can avoid leakage of the location of the terminal equipment as much as possible.
  • this application provides an information sending method, including:
  • the first device receives the identification of the first terminal device
  • the first device obtains first positioning service information, the first positioning service information can indicate a terminal device that can provide the location of the terminal device;
  • the first device After determining that the location of the first terminal device can be provided based on the first positioning service information and the identification of the first terminal device, the first device sends information corresponding to the location of the first terminal device.
  • the first device receives the identification of the first terminal device, thereby being able to determine the terminal device requested for positioning service according to the identification of the first terminal device. For example, in the case where the location requesting device requests positioning services for certain/certain terminal devices, the first device can know that the first terminal device has been requested for positioning services through the identification of the first terminal device.
  • the first device After receiving the identification of the first terminal device, the first device obtains the first positioning service information.
  • the first positioning service information can indicate those terminal devices that can provide the location of the terminal device, so that it can determine based on the first positioning service information. Those terminal devices that can provide the location of the terminal device.
  • the first device After determining that the location of the first terminal device can be provided based on the first positioning service information and the identification of the first terminal device, the first device sends information corresponding to the location of the first terminal device. For example, if the first terminal device belongs to these terminal devices, the location of the first terminal device may be provided. Or the gateway mobile positioning center that can provide positioning services is determined based on the first positioning service information. If the first terminal device belongs to the terminal device that the gateway mobile positioning center can provide the position of the terminal device, the position of the first terminal device can be provided. .
  • the first device can determine whether the first terminal device can be provided with a terminal device location based on the first positioning service information and the identification of the first terminal device.
  • the first terminal device If the first terminal device can be provided with the location of the first terminal device, the first device then sends information corresponding to the location of the first terminal device. If the first terminal device cannot be provided with the location of the first terminal device, the first device will not send information corresponding to the location of the first terminal device.
  • the first device confirms whether the first terminal device can be provided with the location of the terminal device through the first positioning service information, which is equivalent to the first device being able to determine the location of the location requesting device. Whether it is authorized to request the location of the first terminal device. When the location requesting device is authorized, the first device may provide the location of the first terminal device to the location requesting device. When the location requesting device is not authorized, the first device will not provide the location of the first terminal device to the location requesting device.
  • the first device is an access and mobility management functional entity
  • the first device receives the identity of the first terminal device, including: the access and mobility management functional entity receives the identity of the first terminal device from the gateway mobile positioning center;
  • the first device sends information corresponding to the location of the first terminal device, including: the access and mobility management functional entity sends the location information of the first terminal device to the gateway mobile positioning center.
  • the access and mobility management functional entity can serve as the first device.
  • the gateway mobile positioning center requests the access and mobility management functional entity to perform positioning services for the first terminal device, and after the access and mobility Before the access and mobility management function entity sends the location information of the first terminal device to the gateway mobile positioning center, the access and mobility management function entity can determine whether the first terminal device is based on the first positioning service information and the identity of the first terminal device. The terminal device location can be provided.
  • the access and mobility management function entity may continue to perform subsequent processes such as obtaining the location information of the first terminal device through the location management function entity, After obtaining the location information of the first terminal device, the access and mobility management functional entity may send the location information of the first terminal device to the gateway mobile positioning center.
  • the access and mobility management function entity may not continue to perform subsequent steps such as obtaining the location information of the first terminal device through the location management function entity. process. Even if the location information of the first terminal device is obtained, the access and mobility management functional entity will not send the location information of the first terminal device to the gateway mobile positioning center, so that the gateway mobile positioning center will not request a location. The device sends location information of the first terminal device.
  • the access and mobility management functional entity can be used as a network element to determine whether the location of the terminal device can be provided. It can ensure that the location of the terminal device is obtained legally/reasonably and avoid leakage of the location of the terminal device as much as possible.
  • the first device is a unified data management entity
  • the first device receiving the identity of the first terminal device includes: the unified data management entity receives the identity of the first terminal device from the gateway mobile positioning center;
  • the first device sends information corresponding to the location of the first terminal device, including: the unified data management entity sends the information of the access and mobility management function entity serving the first terminal device to the gateway mobile positioning center to serve the first terminal device.
  • the information of the access and mobility management function entity is used by the gateway mobile positioning center to request the location information of the first terminal device.
  • the unified data management entity can serve as the first device.
  • the gateway mobile positioning center requests the unified data management entity for information about the access and mobility management function entity serving the first terminal device
  • the unified data management entity can According to the above implementation process, the information of the access and mobility management function entity serving the first terminal device is selectively sent to the gateway mobile positioning center, so that the gateway mobile positioning center can reasonably/legally send the information to the location acquisition device. Location information of the first terminal device. Therefore, the location of the terminal device is prevented from being leaked as much as possible.
  • the first device obtains the first positioning service information, including:
  • the first device obtains the first positioning service information corresponding to the gateway mobile positioning center according to the gateway mobile positioning center and the preconfigured correspondence between each gateway mobile positioning center and the corresponding positioning service information;
  • the first device obtains the first positioning service information from the certificate of the gateway mobile positioning center;
  • the first device obtains the first positioning service information from the access token of the gateway mobile positioning center;
  • the first device receives the first positioning service information from the gateway mobile positioning center.
  • This provides multiple channels for the access and mobility management functional entity or the unified data management entity to obtain the first positioning service information, ensuring that the access and mobility management functional entity or the unified data management entity can obtain the first positioning.
  • Service information enriches the specific implementation methods for obtaining the first positioning service information.
  • the first device is a gateway mobile positioning center
  • the first device receiving the identity of the first terminal device includes: the gateway mobile positioning center receiving the identity of the first terminal device from the location requesting device;
  • the first device sends information corresponding to the location of the terminal device, including: the gateway mobile positioning center sends the location information of the first terminal device to the location requesting device.
  • the gateway mobile positioning center can serve as the first device. After the location requesting device requests the gateway mobile positioning center to perform positioning services for the first terminal device, the gateway mobile positioning center sends the first terminal to the location requesting device. In front of the device, the gateway mobile positioning center can selectively send the location information of the first terminal device to the location requesting device according to the above implementation process, so that the location requesting device can reasonably/legally obtain the location information of the first terminal device. location information. Therefore, the location of the terminal device is prevented from being leaked as much as possible.
  • the first device obtains the first positioning service information, including:
  • the gateway mobile positioning center obtains the first positioning service information corresponding to the gateway mobile positioning center according to the corresponding relationship between the gateway mobile positioning center and the preconfigured each gateway mobile positioning center and the corresponding positioning service information;
  • the gateway mobile positioning center obtains the first positioning service information from the certificate of the location requesting device;
  • the gateway mobile positioning center receives the first positioning service information from the location requesting device.
  • This provides multiple channels for the gateway mobile positioning center to obtain the first positioning service information, which ensures that the gateway mobile positioning center can obtain the first positioning service information and enriches the specific implementation methods for obtaining the first positioning service information.
  • the first positioning service information corresponds to a terminal device identification set
  • the terminal device identification set includes: an identification of a terminal device that can provide the location of the terminal device
  • the terminal device identification set includes the identification of the first terminal device.
  • the first positioning service information may use a terminal device identification set to identify the identification of each terminal device that can provide the location of the terminal device.
  • the representation form of the first positioning service information is enriched.
  • the terminal device identification set is obtained based on the first positioning service information and the matching relationship between the preconfigured positioning service information and the corresponding terminal device identification set;
  • the terminal device identification set is obtained from the access token of the gateway mobile positioning center corresponding to the first positioning service information.
  • This provides multiple channels for the first device to obtain the terminal device identification set, which ensures that the first device can obtain the terminal device identification set and enriches the specific implementation methods for obtaining the terminal device identification set.
  • the first positioning service information corresponds to a first positioning service identifier, and the first positioning service identifier is used to identify a positioning service area corresponding to the first device that can provide the location of the terminal device;
  • the method also includes:
  • the first device obtains a second positioning service identifier from the subscription information of the first terminal device according to the identifier of the first terminal device, and the second positioning service identifier is used to identify a positioning service area that can provide the location of the first terminal device;
  • the first device determines the location that can provide the first terminal device based on the first positioning service information and the identity of the first terminal device, including:
  • the first device determines that the location of the first terminal device can be provided.
  • the first positioning service information may use the first positioning service identifier to provide a positioning service area that can provide the location of the terminal device.
  • the representation form of the first positioning service information is enriched.
  • this application provides an information sending method, including:
  • the unified data management entity receives first positioning service information from the gateway mobile positioning center or the access and mobility management function entity, and the first positioning service information can indicate a terminal device that can provide the location of the terminal device;
  • the unified data management entity obtains the terminal device identification set based on the matching relationship between the first positioning service information and the preconfigured positioning service information and the corresponding terminal device identification set.
  • the terminal device identification set includes: terminal devices that can provide the terminal device location. logo;
  • the unified data management entity sends the terminal device identification set to the gateway mobile positioning center or the access and mobility management function entity.
  • the unified data management entity can receive the first positioning service information from the gateway mobile positioning center or the access and mobility management function entity. Because the unified data management entity can obtain the matching relationship between the preconfigured positioning service information and the corresponding terminal device identification set. Therefore, based on the above matching relationship, the unified data management entity can determine the terminal device identification set corresponding to the first positioning service information. The unified data management entity can then provide the terminal device identification set to the gateway mobile positioning center or the access and mobility management functional entity, so that the gateway mobile positioning center or the access and mobility management functional entity can determine whether the terminal device identification set includes The identifier of the first terminal device.
  • the gateway mobile positioning center may send the location information of the first terminal device to the location requesting device.
  • the access and mobility management functional entity may send the location information of the first terminal device to the gateway mobile positioning center.
  • the gateway mobile positioning center or the access and mobility management functional entity will not send the location information of the first terminal device.
  • the unified data management entity can provide the terminal device identification set to the gateway mobile positioning center or the access and mobility management functional entity, so that the gateway mobile positioning center or the access and mobility management functional entity can ensure that the location of the terminal device is legitimate. /Get it reasonably to avoid leaking the location of the terminal device as much as possible.
  • this application provides an information sending method, including:
  • the unified data management entity receives the identity of the first terminal device from the gateway mobile positioning center or the access and mobility management function entity;
  • the unified data management entity determines the contract information of the first terminal device according to the identification of the first terminal device
  • the unified data management entity obtains the second positioning service identifier from the contract information of the first terminal device, and the second positioning service identifier is used to identify the positioning service area that can provide the location of the first terminal device;
  • the unified data management entity sends the second positioning service identifier to the gateway mobile positioning center or the access and mobility management function entity.
  • the unified data management entity can receive the identity of the first terminal device from the gateway mobile positioning center or the access and mobility management function entity. Since the unified data management entity can obtain the subscription information of each terminal device, and the subscription information of each terminal device pre-stores the positioning service identification of each terminal device, the positioning service identification of each terminal device is used to identify the ability to A location service area that provides the location of each terminal device. Therefore, the unified data management entity may determine the subscription information of the first terminal device corresponding to the identification of the first terminal device. The unified data management entity may obtain the second positioning service identifier of the first terminal device from the subscription information of the first device. The second positioning service identifier is used to identify a positioning service area that can provide the location of the first terminal device.
  • the unified data management entity can then send the second positioning service identifier of the first terminal device to the gateway mobile positioning center or the access and mobility management functional entity, so that the gateway mobile positioning center or the access and mobility management functional entity can determine Whether the first positioning service identifier and the second positioning service identifier are the same.
  • the gateway mobile positioning center may send the location information of the first terminal device to the location requesting device.
  • the access and mobility management functional entity may send the location information of the first terminal device to the gateway mobile positioning center.
  • the gateway mobile positioning center or the access and mobility management functional entity will not send the location information of the first terminal device.
  • the unified data management entity can provide the gateway mobile positioning center or the access and mobility management function entity with the positioning service identifier corresponding to the terminal device requested for positioning services, so that the gateway mobile positioning center or the access and mobility management function The entity can ensure that the location of the terminal device is obtained legally/reasonably and avoid leakage of the location of the terminal device as much as possible.
  • this application provides an information sending method, including:
  • the network storage function entity receives a request for applying for an access token of the gateway mobile positioning center from the gateway mobile positioning center;
  • the network storage function entity obtains first positioning service information, and the first positioning service information can indicate that the terminal device can be provided Terminal equipment at the prepared location;
  • the network storage function entity sends the access token of the gateway mobile positioning center to the gateway mobile positioning center, and the access token of the gateway mobile positioning center includes the first positioning service information.
  • the network storage function entity can realize the above-mentioned process of applying for the access token of the gateway mobile positioning center, so that the first positioning service information is pre-stored in the access token of the gateway mobile positioning center. Therefore, it is convenient for the first device (such as the access and mobility management function entity or the unified data management entity) to obtain the first positioning service information from the access token of the gateway mobile positioning center, so that the first device can determine whether Provides the location of the terminal device requested for location services. This ensures that the process of obtaining the location information of the terminal device is controllable and avoids leakage of the location of the terminal device as much as possible.
  • the network storage function entity obtains the first location service information, including:
  • the network storage function entity obtains the first positioning service information from the certificate of the gateway mobile positioning center;
  • the network storage function entity obtains the first positioning service information from the registration file of the gateway mobile positioning center;
  • the network storage function entity receives the first positioning service information from the gateway mobile positioning center.
  • multiple channels are provided for the network storage function entity to obtain the first positioning service information, which ensures that the network storage function entity can obtain the first positioning service information and enriches the specific implementation methods for obtaining the first positioning service information.
  • the method before the network storage function entity obtains the first positioning service information, the method further includes:
  • the network storage function entity receives a request for registering the gateway mobile positioning center from the gateway mobile positioning center;
  • the network storage function entity obtains second positioning service information, and the second positioning service information can indicate a terminal device that can provide the location of the terminal device;
  • the network storage function entity writes the second positioning service information into the registration file of the gateway mobile positioning center.
  • the gateway mobile positioning center can request the network storage function entity to register the gateway mobile positioning center in advance, so that the gateway The first positioning service information is pre-stored in the registration file of the mobile positioning center. This ensures that the network storage function entity can obtain the first positioning service information from the registration file of the gateway mobile positioning center.
  • the network storage function entity obtains the second positioning service information, including:
  • the network storage function entity receives the second positioning service information from the gateway mobile positioning center
  • the network storage function entity obtains the second positioning service information from the certificate of the gateway mobile positioning center.
  • the network storage function entity when the network storage function entity writes the first positioning service information into the registration file of the gateway mobile positioning center, multiple channels are provided for the network storage function entity to obtain the first positioning service information, which can ensure that the network storage function entity Being able to obtain the first positioning service information enriches the specific implementation methods of obtaining the first positioning service information.
  • the first positioning service information corresponds to the terminal device identification set
  • the terminal device identification set includes: the identification of the terminal device that can provide the terminal device location;
  • the access token of the gateway mobile positioning center includes the terminal device identification set ;
  • the first positioning service information corresponds to the first positioning service identifier, and the first positioning service identifier is used to identify the positioning service area corresponding to the first device that can provide the location of the terminal device; the access token of the gateway mobile positioning center includes the first positioning service identifier .
  • this application provides an information sending method, including:
  • the access and mobility management function entity receives a request for obtaining relevant positioning parameters of the second terminal device or sending location information of the second terminal device from the location management function entity;
  • the access and mobility management function entity obtains the first verification information of the second terminal device according to the request;
  • the access and mobility management functional entity sends the relevant positioning parameters of the second terminal device when the first verification information of the second terminal device is the same as the second verification information of the second terminal device in the access and mobility management functional entity. or the location information of the second terminal device.
  • the access and mobility management function entity receives a request from the location management function entity, so that according to the request, it can be determined that the terminal device requested for positioning service is the second terminal device.
  • the access and mobility management functional entity may obtain the first verification information of the second terminal device, and the first verification information can uniquely identify the second terminal device.
  • the gateway mobile positioning center requires the access and mobility management functional entity to determine the second verification information of the terminal device or devices whose location information is determined. Therefore, the access and mobility management functional entity may determine whether the first authentication information of the second terminal device is the same as the second authentication information of the second terminal device.
  • the access and mobility management functional entity may determine that the second terminal device is included in the gateway mobile positioning center Among those terminal devices that require this access and mobility management functional entity to determine location information.
  • the access and mobility management functional entity may request the access and mobility management functional entity to obtain the relevant positioning parameters of the second terminal device from the second terminal device.
  • the access and mobility management functional entity may request the access and mobility management functional entity to forward the location information of the second terminal device to the gateway mobile positioning center.
  • the access and mobility management functional entity may determine that the second terminal device is not included in the access and mobility management system.
  • the mobility management functional entity determines location information among those terminal devices.
  • the access and mobility management function entity may refuse to respond to the request sent by the access and mobility management function entity.
  • the access and mobility management functional entity can use the pre-stored verification information of those terminal devices that the gateway mobile positioning center needs to determine the location information of the access and mobility management functional entity, and can receive the request sent by the location management functional entity. Then, check whether the verification information of the terminal device corresponding to the request is the same as the pre-stored verification information of the terminal device to determine whether the terminal device is included in the gateway mobile positioning center and requires the access and mobility management functional entity to determine the location information.
  • illegal requests initiated by the location management function entity can be shielded, making the process of determining and forwarding the location information of the terminal device controllable, and avoiding terminal equipment damage due to malicious behavior of the access and mobility management function entity.
  • the leakage of location provides a new implementation method for privacy detection of terminal devices, reducing the risk of leaking the UE location after the access and mobility management functional entities are attacked/controlled.
  • the verification information includes: the identification and/or context identification of the second terminal device.
  • the method further includes:
  • the access and mobility management function entity marks the second verification information of the second terminal device according to the second terminal device
  • the access and mobility management function entity sends the identity of the second terminal device to the location management function entity;
  • the access and mobility management function entity receives a request from the location management function entity for obtaining relevant positioning parameters of the second terminal device or sending location information of the second terminal device, where the request includes: the identification of the second terminal device;
  • the access and mobility management functional entity obtains the first verification information of the second terminal equipment and the second verification information of the second terminal equipment according to the identification of the second terminal equipment, and determines whether the second verification information of the second terminal equipment has been mark;
  • the access and mobility management functional entity sends the second verification information of the second terminal equipment when the first verification information of the second terminal equipment is the same as the second verification information of the second terminal equipment and the second verification information of the second terminal equipment has been marked. Relevant positioning parameters or location information of the second terminal device.
  • the access and mobility management functional entity determines whether the second terminal device is included in the gateway mobile location.
  • the positioning center provides a feasible implementation method for those terminal devices that need the access and mobility management functional entity to determine location information, saving the storage space of the access and mobility management functional entity.
  • the verification information includes: a status identifier and/or a random number of the second terminal device.
  • the method before the access and mobility management function entity receives a request for obtaining relevant positioning parameters of the second terminal device or sending location information of the second terminal device from the location management function entity, the method further include:
  • the access and mobility management functional entity generates and saves the second verification information of the second terminal device according to the second terminal device;
  • the access and mobility management function entity sends the identity of the second terminal device and the second verification information of the second terminal device to the location management function entity;
  • the access and mobility management functional entity receives a request from the location management functional entity for obtaining relevant positioning parameters of the second terminal device or sending location information of the second terminal device, where the request includes: the identity of the second terminal device and the third terminal device.
  • the access and mobility management function entity obtains the first verification information of the second terminal device from the request;
  • the access and mobility management function entity obtains the second verification information of the second terminal device from the AMF according to the identification of the second terminal device;
  • the access and mobility management functional entity sends the relevant positioning parameters of the second terminal device or the location information of the second terminal device.
  • the access and mobility management functional entity determines whether the second terminal device is included in the gateway mobile location.
  • the positioning center provides another feasible implementation method for those terminal devices that need the access and mobility management functional entity to determine location information.
  • the first positioning service information is used to identify at least one of the following: the home area of the gateway mobile positioning center, the network service area of the gateway mobile positioning center, the gateway mobile positioning center The operator to which the positioning center belongs, the enterprise to which the gateway mobile positioning center belongs, the area to which the terminal equipment belongs, the enterprise to which the terminal equipment belongs, the business application of the terminal equipment, or the access network area of the terminal equipment.
  • the first positioning service information includes at least one of the following: an edge area identifier of the gateway mobile positioning center, an identifier of the gateway mobile positioning center, and an identifier of the gateway mobile positioning center.
  • Instance identification network protocol address of the gateway mobile positioning center, network port of the gateway mobile positioning center, identification of the access and mobility management function entity/unified data management entity, identification of the terminal device, application identification of the terminal device, application function entity Identity, application server identification, client identification of the terminal device, regional identification signed by the terminal equipment and the home operator, regional identification registered by the terminal equipment, home enterprise identification of the terminal equipment, network slice identification to which the terminal equipment is connected, The tracking area identification of the terminal equipment, the identification of the cell area to which the terminal equipment is connected, or the geographical location information of the terminal equipment.
  • the present application provides an information sending device, including: a module for executing the information sending method in any one of the above aspects and any possible design of this aspect.
  • the present application provides an information sending system, including: two or more network elements in each of the aforementioned devices, each network element is used to perform an aspect corresponding to the network element in the above solution and the Any possible method of sending information in the design.
  • this application provides an information sending device, including: a memory and a processor; the memory is used to store program instructions; the processor is used to call the program instructions in the memory so that the information sending device executes any one of the above aspects and any one of the aspects. possible design methods for sending information.
  • the application provides a chip, including: an interface circuit and a logic circuit.
  • the interface circuit is used to receive signals from other chips other than the chip and transmit them to the logic circuit, or to send signals from the logic circuit to the chip.
  • Other chips and logic circuits are used to implement any of the above aspects and any possible information sending method in the design of this aspect.
  • the present application provides a computer-readable storage medium on which a computer program is stored.
  • the computer program is executed by a processor so that when the information sending device is executed, any one of the above aspects and the information in any possible design of this aspect can be realized.
  • Send method any one of the above aspects and the information in any possible design of this aspect can be realized.
  • the present application provides a computer program product, including: execution instructions.
  • the execution instructions are stored in a readable storage medium.
  • At least one processor of the information sending device can read the execution instructions from the readable storage medium.
  • At least one The processor executes instructions so that the information sending device implements any one of the above aspects and any possible information sending method in this aspect.
  • Figure 1 is a signaling interaction diagram of 5G LCS business process in a related technology
  • FIGS 2-4 are schematic architectural diagrams of an LCS system provided by an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of an information sending method provided by an embodiment of the present application.
  • Figure 6 is a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • Figure 7 is a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • Figure 8 is a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • Figure 9 is a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • Figure 10 is a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • Figure 11 is a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • Figure 12 is a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • Figure 13 is a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • Figure 14 is a schematic diagram of the hardware structure of an information sending device provided by an embodiment of the present application.
  • At least one refers to one or more, and “plurality” refers to two or more.
  • “And/or” describes the association of associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A exists alone, A and B exist simultaneously, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the related objects are in an “or” relationship.
  • “At least one of the following” or similar expressions thereof refers to any combination of these items, including any combination of a single item (items) or a plurality of items (items).
  • At least one of a alone, b alone, or c alone can mean: a alone, b alone, c alone, a combination of a and b, a combination of a and c, a combination of b and c, or a combination of a, b and c, where a, b, c can be single or multiple.
  • first and second are used for descriptive purposes only and are not to be understood as indicating or implying relative importance.
  • the terms “center”, “longitudinal”, “horizontal”, “upper”, “lower”, “left”, “right”, “front”, “back”, etc. indicate the orientation or positional relationship based on that shown in the drawings.
  • orientation or positional relationship is only for the convenience of describing the present application and simplifying the description, and does not indicate or imply that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, and therefore cannot be understood as a limitation of the present application.
  • Figure 1 shows a signaling interaction diagram of the 5G LCS business process in a related technology.
  • the equipment involved in the 5G LCS business process can include: network clients, terminal equipment, and LCS systems.
  • the network client can also be called an external client (external client), such as an LCS client (client).
  • external client such as an LCS client (client).
  • the terminal device may be a wireless terminal or a wired terminal.
  • the wireless terminal may be a device that provides voice and/or other service data connectivity to the user, a handheld device with a wireless connection function, or other devices connected to a wireless modem. Handling equipment.
  • Wireless terminals can communicate with one or more core networks via a radio access network (RAN).
  • the wireless terminals can be mobile terminals, such as mobile phones (or "cellular" phones) and computers with mobile terminals. , for example, may be portable, pocket-sized, handheld, computer-built-in, or vehicle-mounted mobile devices that exchange voice and/or data with the radio access network.
  • Wireless terminals can also be called systems, subscriber units, subscriber stations, mobile stations, mobile stations, remote stations, remote terminals, and interfaces.
  • Access terminal access terminal
  • user terminal user terminal
  • user agent user agent
  • user equipment user device or user equipment
  • user equipment user equipment (UE)
  • the terminal device can adopt mobile operating systems such as Android system, Linux system, Windows system, iOS system, Harmony operating system (harmony operating system, Hongmeng OS), etc. This application does not limit this.
  • the terminal device is represented by taking UE as an example.
  • the LCS system may include: access and mobility management function (AMF), unified data management (UDM), location management function Entity (location management function, LMF), GMLC, NG radio access network (N generation radio access network, NG-RAN, such as 5G-RAN) and other network elements (ie, network function entity (NF)).
  • AMF access and mobility management function
  • UDM unified data management
  • LMF location management function Entity
  • GMLC GMLC
  • N generation radio access network NG-RAN, such as 5G-RAN
  • NF network function entity
  • the LCS system may also include: network repository function (NRF).
  • NRF network repository function
  • GMLC is the first network element node that the network client accesses in the 5G core network (5G core network, 5GC).
  • GMLC can communicate with AMF, UDM, NRF and network clients respectively.
  • NRF can communicate with GMLC and UDM respectively.
  • UDM is mainly responsible for managing user subscription context information. For example, UDM stores routing information and subscription information of each UE. UDM can communicate with AMF, GMLC and NRF respectively.
  • AMF is mainly responsible for user access and mobility management.
  • AMF can serve as a communication bridge between GMLC and LMF, as well as between LMF and UE.
  • AMF can communicate with NG-RAN, UE, LMF, GMLC and UDM respectively.
  • the LMF is mainly responsible for managing the overall coordination and scheduling of resources required for the location of the UE.
  • the LMF can obtain the request for the LCS of the UE from the GMLC through the AMF, and can also obtain the relevant positioning parameters of the UE from the UE through the AMF.
  • the LMF is also responsible for calculating or verifying the UE's location information such as location, speed or corresponding accuracy.
  • NG-RAN can provide communication connections between UE and 5GC, such as communication connections between UE and AMF.
  • NG-RAN can communicate with AMF and UE respectively.
  • the 5G LCS business process can include the following steps:
  • the network client sends an LCS Service Request (LCS request) to GMLC.
  • LCS Service Request LCS request
  • the LCS Service Request includes: the identifier of the UE, such as user permanent identifier (subscription permanent identifier, SUPI) or general public subscription identifier (generic public subscription identifier, GPSI), etc.
  • the identifier of the UE such as user permanent identifier (subscription permanent identifier, SUPI) or general public subscription identifier (generic public subscription identifier, GPSI), etc.
  • Nudm_UECM_Get Request includes: UE identifier.
  • Nudm_UECM_Get Response includes: LCS privacy configuration file and the network address of the AMF serving UE.
  • GMLC can perform privacy detection on the network client and UE, which can include the following implementation process:
  • GMLC determines whether network client access is allowed based on the LCS privacy profile.
  • the LCS privacy profile as part of the UE's contract information, mainly includes four sets: Universal Class, Call/Session related Class, Call/Session unrelated Class and PLMN Operator Class.
  • GMLC determines whether the LCS privacy profile identifies that the network client is allowed to access from the granularity of the network client. For example, all LCS clients are allowed to access, access is required after additional user confirmation, or network clients belonging to the operator can access, etc.
  • the GMLC can determine whether to allow the network client to request the UE's LCS according to the LPI indicator.
  • GMLC can obtain the UE identifier through the Nudm_SDM_Get service. GMLC can determine the LPI identifier of the UE based on the identifier of the UE.
  • the GMLC may determine whether the UE's LPI identifier identifies an LCS that allows the network client to request the UE.
  • the GMLC can determine that it can provide the network client with the UE's LCS.
  • GMLC determines that it can provide the LCS of the UE to the network client, it determines the AMF based on the network address of the AMF serving the UE, and sends a Namf_Location_ProvidePositioningInfo Request to the AMF.
  • the Namf_Location_ProvidePositioningInfo Request includes: the UE identifier and LCS related parameters.
  • the AMF initiates a Network Triggered Service Request.
  • the AMF can select an appropriate LMF based on the local configuration or the relevant information obtained for selecting the LMF.
  • the relevant information used to select the LMF may include but is not limited to: the type of network client, requested service quality information (such as LCS accuracy, delay time, etc.), or access type (such as 3GPP access or non-3GPP access). (enter) and so on.
  • AMF sends Nlmf_Location_DetemineLocation Request to LMF.
  • Nlmf_Location_DetemineLocation Request includes: LCS related parameters.
  • the LMF determines the location information (positioning) of the UE.
  • LMF sends Nlmf_Location_DetemineLocation Response to AMF.
  • Nlmf_Location_DetemineLocation Response includes: UE's location information.
  • AMF sends Namf_Location_ProvidePositioningInfo Response to GMLC.
  • Namf_Location_ProvidePositioningInfo Response includes: UE's location information.
  • GMLC sends LCS Service Response (LCS response) to the network client.
  • LCS Service Response LCS Service Response
  • the LCS Service Response includes: the location information of the UE.
  • GMLC mainly considers the correspondence between network clients and UEs and LCS requests, but does not consider the UE where the network client requests the UE's LCS from GMLC and the UE where the GMLC can provide the UE's LCS.
  • the matching relationship between areas that is, whether the UE requesting the UE's LCS is among the UEs whose GMLC can provide the UE's LCS. It also does not consider the network client's request to the GMLC for the UE's LCS and the GMLC that provides the UE's LCS.
  • the matching relationship between the GMLC areas that is, whether the GMLC that receives the LCS of the UE from the network client is among the GMLCs that can provide the LCS of the UE. Therefore, the GMLC's decision process for privacy detection between network clients and UEs is coarse-grained, which may cause the location of the UE to be leaked.
  • the GMLC can provide the network client with the location information of the UE located in the area. From security and other aspects, in principle, this type of GMLC cannot obtain the location information of UEs located in other areas except this area. However, the relevant solution based on the embodiment in Figure 1 cannot prevent this type of GMLC from obtaining the location information of UEs located in other areas. As a result, the location information of UEs located in other areas can easily be illegally obtained, thereby causing the location of the UE to be leaked.
  • GMLC GMLC-based interface
  • the open interface in the core network area (such as service-based interface (SBI interface) ) requests the location information of any UE, causing the location information of any UE to be easily obtained illegally, thus causing the location of a wide range of UEs to be leaked.
  • SI interface service-based interface
  • this application provides an information sending method that can add LCS information to check whether the ownership of the UE requesting the UE location and the GMLC that can provide the UE location in the LCS system match, and can be obtained in a controllable manner.
  • the location information of the UE prevents the leakage of the UE location and reduces the risk of leaking the UE location after GMLC is attacked.
  • the information sending method of this application can be executed in any network element in the LCS system, or in It is executed on multiple network elements in the LCS system. This application does not limit the number and type of network elements that execute this method.
  • this application uses the first device as an example to illustrate a network element that performs the information sending method of this application.
  • the LCS information can indicate the UE that can provide the UE location, so that the first device in the LCS system can determine whether the UE location can be provided to the UE requesting the UE location through the LCS information.
  • the aforementioned UE location can be understood as: the LCS of the UE, which allows the location requesting device to request the location of the UE from the GMLC in the LCS system, and allows the GMLC in the LCS system to provide the location information of the UE to the location requesting device.
  • the location requesting device may include but is not limited to: a network client, an application function entity (application function, AF), or a network data analytics function entity (network data analytics function, NWDAF), etc.
  • a network client an application function entity (application function, AF), or a network data analytics function entity (network data analytics function, NWDAF), etc.
  • application function application function
  • NWDAF network data analytics function
  • the newly added LCS information can be used to identify the UE area where each GMLC in the LCS system can provide the UE location, or can be used to Identifies the GMLC area for each UE requesting the UE location.
  • the UE area that GMLC can provide the UE location often belongs to a certain area of the LCS system, such as an edge area, such as a core network area, such as a sub-area in the edge area, such as a sub-area in the core network area, that is, the UE
  • the ownership of the area is determined/fixed. It can be seen that the ownership of the UE area in which GMLC can provide the UE location is also determined/fixed.
  • the LCS information can be used to identify: the GMLC's home region (region), the GMLC's network service area, the GMLC's home operator, the GMLC's home enterprise, the UE's home region (region), the UE's home enterprise, and the UE's business. At least one of an application (APP) or an access network area of the UE.
  • APP application
  • this application does not limit the specific implementation method of LCS information.
  • the LCS information may include: GMLC edge region identification (region ID), GMLC identification (ID), GMLC instance identification (instance ID), GMLC network protocol address IP, GMLC network port, AMF/UDM identification (NF instance ID), UE identification (such as SUPI, IMSI, etc.), UE application identification (APP ID), application function entity identification (AF ID), application server identification (Application Server (AS) ID ), the UE's client ID (Client ID), the area ID signed by the UE and the home operator, the area ID registered by the UE, the UE's home enterprise ID, and the network slice ID that the UE accesses (such as NSSAI, S- NSSAI), the UE's tracking area identifier (TA (tracking area) range), the cell area identifier (cell range) accessed by the UE, or the UE's geographical location information.
  • the LCS system can be applied to various LCS scenarios, such as edge LCS scenarios.
  • Figures 2 to 4 show a schematic architectural diagram of an LCS system provided by an embodiment of the present application.
  • the location requesting device uses an LCS client as an example.
  • the home area of the LCS system can be divided into: core network area and edge area.
  • AMF, UDM and NRF are located in the core network area of the LCS system.
  • LMF and GMLC are located in the edge area of the LCS system.
  • the LCS system may also include: 5GC proxy entity (proxy).
  • AMF, UDM, NRF and 5GC proxy are located in the core network area of the LCS system.
  • LMF and GMLC are located in the edge area of the LCS system.
  • LMF/GMLC and AMF/UDM/NRF no longer communicate directly, but need to communicate through 5GC proxy.
  • the LCS system may also include: LMF proxy and GMLC proxy.
  • AMF, UDM, NRF, LMF and GMLC are located in the core network area of the LCS system.
  • LMF proxy and GMLC proxy are located in the edge area of the LCS system.
  • LMF proxy communicates with AMF through LMF.
  • the LCS system may also include: network capability exposure function entity (network exposure function, NEF).
  • NEF network exposure function entity
  • NEF is mainly responsible for providing access interfaces to location requesting devices, obtaining a series of statuses of the network or UE, or for adjusting and optimizing network performance, affecting user behavior, etc.
  • NEF is located in the edge area of the LCS system. Among them, the GMLC and the location requesting device no longer communicate directly, but need to communicate through NEF.
  • any one of the LMF and GMLC network elements is located in the edge area of the LCS system.
  • the first device in the LCS system can be: AMF, UDM, or GMLC or NEF or GMLC proxy.
  • Figure 5 shows a schematic flowchart of an information sending method provided by an embodiment of the present application.
  • the information sending method provided by this application may include:
  • the first device receives the identity of the first UE.
  • the identity of the first UE is used to uniquely identify the first UE.
  • This application does not limit the specific implementation manner of the identification of the first UE.
  • the identity of the first UE may be the SUPI or GPSI of the first UE.
  • the number of the aforementioned first UEs may be one or more. In the case of multiple UEs, the types of multiple UEs may be the same or different.
  • the first device can determine that the location requesting device requests the location of the first UE from the GMLC in the LCS system, and can determine that the UE requested by the location requesting device to perform positioning services is the first UE.
  • the first device needs to know which/which UE has been requested for the LCS.
  • the first device obtains first LCS information, and the first LCS information can indicate a UE that can provide the UE location.
  • the first device can determine the UE area in which the GMLC corresponding to the first device can provide the UE location, or can determine the GMLC area in which the first UE requests the UE location.
  • the first device can determine which UEs the GMLC corresponding to the first device can specifically provide LCS, that is, the GMLC allows the location requesting device to request positioning services for which terminal devices, or the first device can determine which GMLC it is.
  • LCS can be provided to the first UE, that is, which GMLC is allowed to provide LCS to the first UE that has been requested by the location requesting device.
  • the GMLC corresponding to the first device is the GMLC.
  • the GMLC corresponding to the first device is other network elements in the LCS system except the GMLC.
  • the first device After determining that the location of the first UE can be provided based on the first LCS information and the identity of the first UE, the first device sends information corresponding to the location of the first UE.
  • the first UE requested to perform LCS corresponds to the first device that provides LCS.
  • the GMLC needs to match, that is, the first UE needs to be in a UE area where the GMLC corresponding to the first device can provide positioning services, or the GMLC corresponding to the first device needs to be in a GMLC area where the first UE can provide positioning services.
  • the first device can detect whether the ownership between the first UE requesting the UE location and the GMLC corresponding to the first device that can provide the UE location matches, that is, determine whether the first UE Among the UEs for which the GMLC corresponding to the first device can provide the UE information, or it can be determined whether the GMLC corresponding to the first device is among the GMLCs that can provide the information for the first UE to determine whether the location of the first UE can be provided. .
  • the first device may send information corresponding to the location of the first UE.
  • the information corresponding to the location of the first UE may be the location information of the first UE, or may be related information used to request the location information of the first UE, which is not limited in this application.
  • the information sending method provided by this application uses the first device to receive the identity of the first UE, and can determine the first UE requesting the location of the UE based on the identity of the first UE.
  • the first device obtains the first LCS information, and the first LCS information can indicate a UE that can provide the UE location, and can determine the UE area in which the GMLC corresponding to the first device can provide the UE location based on the first LCS information, or can determine the UE area according to the first LCS.
  • the information determines the GMLC region in which the first UE requested the UE location.
  • the first device can check whether the ownership between the first UE and the GMLC corresponding to the first device matches, to determine whether the location of the first UE can be provided. After determining that the first device can provide the location of the first UE, the first device may send information corresponding to the location of the first UE.
  • the location information of the UE can be obtained in a controllable manner, providing a method for privacy detection of the UE.
  • the new implementation method avoids the leakage of the UE location as much as possible and reduces the risk of leaking the UE location after the network elements in the LCS system are attacked.
  • FIG. 6 shows a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • the information sending method provided by this application may include:
  • GMLC sends the identity of the first UE to the AMF.
  • the above-mentioned GMLC is the GMLC corresponding to the first device, that is, the GMLC corresponding to the AMF.
  • the GMLC corresponding to the AMF can be understood as: a GMLC that belongs to the same LCS system as the AMF and can request the location information of the first UE from the AMF.
  • the GMLC corresponding to the AMF may send the identity of the first UE to the AMF.
  • the GMLC corresponding to the AMF may carry the identity of the first UE in the request 1 and send the request 1 to the AMF. Therefore, the AMF can obtain the identity of the first UE from request 1.
  • This application does not limit the specific implementation of request 1.
  • request 1 can use the Namf_Location_ProvidePositioningInfo Request in S14 shown in Figure 1.
  • AMF obtains the first LCS information.
  • this application does not limit the specific implementation method for the AMF to obtain the first LCS information.
  • the UE area that the GMLC can provide the UE location may belong to one or more areas in the LCS system. Therefore, the GMLC may correspond to one or more LCS information.
  • the LCS system can pre-configure the corresponding relationship between each GMLC and the LCS information corresponding to each GMLC.
  • the aforementioned corresponding relationships can be represented or stored in methods such as tables, arrays, key-value pairs, etc.
  • the AMF can obtain the LCS information corresponding to the GMLC corresponding to the AMF, that is, the first LCS information, based on the preconfigured correspondence between each GMLC and the LCS information corresponding to each GMLC.
  • the first LCS information corresponding to the GMLC corresponding to the AMF may be pre-stored in the certificate of the GMLC corresponding to the AMF. Therefore, the AMF can obtain the first LCS information from the certificate of the GMLC corresponding to the AMF.
  • the first LCS information corresponding to the GMLC corresponding to the AMF may be pre-written in the access token of the GMLC corresponding to the AMF. Therefore, the AMF can obtain the first LCS information from the access token of the GMLC corresponding to the AMF.
  • the GMLC corresponding to the AMF can carry the access token of the GMLC corresponding to the AMF in the request 2 and send the request 2 to the AMF.
  • AMF can obtain the first LCS information from request 2. This application does not limit the specific implementation method of request 2.
  • request 2 may be the same request as request 1, or may be a different request from request 1. It should be noted that when request 2 and request 1 adopt the same request, the request includes: the identity of the first UE and the access token of the GMLC corresponding to the AMF.
  • the GMLC corresponding to the AMF may send the first LCS information to the AMF.
  • the GMLC corresponding to the AMF may carry the first LCS information in the request 3 and send the request 3 to the AMF.
  • AMF can obtain the first LCS information from request 3. This application does not limit the specific implementation method of request 3.
  • request 3 may be the same request as request 1, or may be a different request from request 1. It should be noted that when request 3 and request 1 adopt the same request, the request includes: the identity of the first UE and the first LCS information.
  • AMF can obtain the first LCS information.
  • the AMF After determining that the location of the first UE can be provided based on the first LCS information and the identity of the first UE, the AMF sends the location information of the first UE to the GMLC.
  • the AMF may use multiple methods to determine whether the location of the first UE can be provided.
  • LCS information can be represented by a UE identification set (UE ID range).
  • the UE identification set includes: the identification of each UE that can provide the UE location.
  • the first LCS information corresponds to a UE identity set
  • the UE identity set includes: the identity of the UE that can provide the UE location; and the UE identity set includes the identity of the first UE.
  • the AMF can obtain the UE identity set corresponding to the first LCS information.
  • the UE identity set includes: the identity of the UE that can provide the UE location.
  • the AMF may determine whether the UE identity set includes the identity of the first UE. After determining that the UE identity set includes the identity of the first UE, the AMF may determine a location that can provide the first UE.
  • this application does not limit the specific implementation manner in which the AMF obtains the UE identity set corresponding to the first LCS information.
  • the UE identity set is obtained according to the first LCS information and the matching relationship between the preconfigured LCS information and the corresponding UE identity set.
  • the LCS system can pre-configure the matching relationship between each LCS information and the UE identity set corresponding to each LCS information in the AMF or UDM.
  • the aforementioned matching relationship can be represented by tables, arrays, key-value pairs, etc.
  • the AMF can obtain the UE identity set that matches the first LCS information, that is, the UE identity set corresponding to the first LCS information, based on the matching relationship between the preconfigured LCS information and the UE identity set corresponding to the LCS information. .
  • the AMF may obtain the UE identity set from the UDM.
  • the AMF may send the first LCS information to the UDM.
  • UDM Based on the matching relationship between the first LCS information and the preconfigured LCS information and the UE identity set corresponding to the LCS information, UDM can obtain the UE identity set that matches the first LCS information, that is, the UE identity corresponding to the first LCS information. set.
  • the UDM may send the UE identity set corresponding to the first LCS information to the AMF, so that the AMF can obtain the UE identity set corresponding to the first LCS information.
  • the AMF may carry the first LCS information in request 4 and send request 4 to the UDM.
  • UDM may carry the UE identity set corresponding to the first LCS information in response 4 and send response 4 to the AMF. Therefore, the AMF obtains the UE identity set corresponding to the first LCS information from response 4.
  • This application does not limit the specific implementation methods of request 4 and response 4.
  • the UE identity set is obtained from the access token of the GMLC corresponding to the first LCS information.
  • Each GMLC corresponds to the LCS information corresponding to each GMLC, and the access token of each GMLC can be pre-written with a UE identity set matching each GMLC.
  • the AMF can determine the access token of the GMLC corresponding to the first LCS information based on the first LCS information, that is, the access token of the GMLC corresponding to the AMF.
  • the AMF can obtain the UE identity set corresponding to the first LCS information from the GMLC access token corresponding to the first LCS information.
  • the UE identity set is a UE identity set corresponding to the first LCS information in the access token of the GMLC.
  • the UE identity set matching each LCS information can be pre-written in the access token of each GMLC.
  • the AMF can obtain the UE identity set matching the first LCS information, that is, the UE identity set corresponding to the first LCS information, from the subscription information of the GMLC corresponding to the AMF.
  • the AMF when the first LCS information is obtained from the access token of the GMLC corresponding to the AMF, the AMF usually does not obtain the UE identity set corresponding to the first LCS information from the access token of the GMLC corresponding to the AMF. , and the other methods mentioned above will be used to obtain the UE identity set.
  • the AMF can obtain the UE identity set corresponding to the first LCS information.
  • the AMF can determine whether the location of the first UE can be provided by checking whether the identity of the first UE is in the UE identity set that matches the first LCS information.
  • UE identity set 1 corresponding to LCS information 1 is: a set traversing from 01000001 to 01099999
  • UE identity set 2 corresponding to LCS information 2 is: from Traverse the collection from 075500001 to 075599999.
  • the AMF may determine that the UE identity set corresponding to the first LCS information is UE identity set 1. In the case where the first LCS information is LCS information 2, the AMF may determine that the UE identity set corresponding to the first LCS information is UE identity set 2.
  • the AMF can determine whether 075508888 is included in the UE identity set determined in the above process to determine whether the location of the first UE can be provided.
  • LCS information can be represented by an LCS identifier (region ID), which is used to identify the LCS region that can provide the UE location.
  • the LCS identifier is used to identify the LCS area corresponding to the GMLC that can provide the UE location.
  • the LCS area here may include the GMLC and the UE area corresponding to the UE location.
  • the LCS identifier is used to identify the LCS area that can provide the location of the UE, here
  • the LCS area may include the UE and the GMLC area that can provide the location of the UE.
  • the first LCS information corresponds to a first LCS identifier
  • the first LCS identifier is used to identify an LCS area corresponding to the first device that can provide the UE location.
  • the AMF can obtain the first LCS identifier corresponding to the first LCS information.
  • the first LCS identifier is used to identify the LCS area in which the GMLC corresponding to the AMF can provide the UE location, that is, to identify the GMLC corresponding to the AMF and the GMLC corresponding to the AMF.
  • UE area of UE location is used to identify the LCS area in which the GMLC corresponding to the AMF can provide the UE location.
  • the AMF can obtain the second LCS identity from the subscription information of the first UE through UDM.
  • the second LCS identity is used to identify the LCS area that can provide the location of the first UE, that is, to identify the first UE and the third UE.
  • a UE requests the GMLC area of the UE location.
  • the AMF may send the identity of the first UE to the UDM.
  • the UDM can determine the subscription information of the first UE based on the identity of the first UE, and obtain the second LCS identity from the subscription information of the first UE.
  • the UDM may send the second LCS identifier to the AMF.
  • the AMF may carry the identity of the first UE in the request 5 and send the request 5 to the UDM.
  • the UDM may carry the second LCS identity in response 5 and send response 5 to the AMF.
  • AMF can obtain the second LCS identification from response 5. This application does not limit the specific implementation methods of request 5 and response 5.
  • the AMF may determine whether the first LCS identifier and the second LCS identifier are the same to determine whether the location of the first UE can be provided. After determining that the first LCS identifier and the second identifier LCS are the same, the AMF may determine a location that can provide the first UE.
  • the AMF can determine whether the location of the first UE can be provided by checking whether the first LCS identifier and the second LCS identifier corresponding to the first UE's identifier are the same.
  • the LCS system is preconfigured: the subscription information of UE 1 includes: LCS identifier 1 used to identify Beijing, and the subscription information of UE 2 includes: LCS identifier 2 used to identify Shenzhen.
  • the identity of the first UE is 075508888, and the first LCS identity is LCS identity 2 used to identify Shenzhen. Then, when the UE corresponding to the identity of the first UE is UE 1, the AMF can obtain the second LCS identity as LCS identity 1 from the subscription information of UE 1. When the UE corresponding to the identity of the first UE is UE 2, the AMF may obtain the second LCS identity as LCS identity 2 from the subscription information of UE 2.
  • the AMF can determine whether the first LCS identifier and the second LCS identifier are the same to determine whether the location of the first UE can be provided.
  • the AMF may also obtain a judgment result from the UDM for determining whether the location of the first UE can be provided.
  • the AMF may send request 6 to the UDM, where the request 6 includes the identity of the first UE, so that the UDM obtains the identity of the first UE.
  • the UDM can also obtain the first LCS information.
  • the UDM may determine whether the AMF can provide the location of the first UE based on the first LCS information and the identity of the first UE.
  • the UDM sends response 6 to the AMF, and the response 6 is used to indicate whether the AMF can provide the location of the first UE.
  • the AMF may send the location information of the first UE to the GMLC.
  • the AMF may not send the location information of the first UE to the GMLC.
  • this application does not limit the specific implementation methods of request 6 and response 6.
  • AMF is an important participating network element in the LCS business process. After the AMF's corresponding GMLC requests the location information of the first UE from the AMF, and/or before the AMF sends the location information of the first UE to the AMF's corresponding GMLC, the AMF may, based on the first LCS information and the identity of the first UE, Determine whether the location of the first UE can be provided to check whether the ownership between the first UE and the GMLC corresponding to the AMF matches.
  • the AMF may send the location information of the first UE to the GMLC corresponding to the AMF, ensuring that the process of the GMLC corresponding to the AMF obtaining the location information of the first UE through the AMF is controllable.
  • the AMF will not send the location information of the first UE to the GMLC corresponding to the AMF, ensuring that the GMLC corresponding to the AMF cannot illegally obtain the location information of the first UE through the AMF, effectively avoiding the confusion of the location of the UE. Give way.
  • FIG. 7 shows a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • the information sending method provided by this application may include:
  • the GMLC sends and receives the identification of the first UE to the UDM.
  • the above-mentioned GMLC is the GMLC corresponding to the first device, that is, the GMLC corresponding to the UDM.
  • the GMLC corresponding to the UDM can be understood as: a GMLC that belongs to the same LCS system as the UDM and can request information about the AMF serving the first UE from the UDM.
  • the GMLC corresponding to the UDM may send the identity of the first UE to the UDM.
  • the GMLC corresponding to the UDM may carry the identity of the first UE in the request 7 and send the request 7 to the UDM. Therefore, the UDM can obtain the identity of the first UE from the request 7.
  • This application does not limit the specific implementation of request 7.
  • request 7 can use Nudm_UECM_Get Request in S12 shown in Figure 1.
  • request 7 can use a new request, such as Nudm_LCS_Check Request.
  • UDM obtains the first LCS information.
  • the specific implementation manner in which the UDM in S302 obtains the first LCS information is similar to the implementation manner in which the AMF obtains the first LCS information in S202 in Figure 6, and will not be described again here.
  • the UDM After determining the location that can provide the first UE based on the first LCS information and the identity of the first UE, the UDM sends the information of the AMF serving the first UE to the GMLC.
  • the information of the AMF serving the UE is used by the GMLC to request the location information of the first UE.
  • the information of the AMF serving the first UE can be understood as: the GMLC corresponding to the UDM can request the location information of the first UE according to the AMF information.
  • This application does not limit the specific implementation manner of the AMF information serving the first UE.
  • the information of the AMF serving the first UE may include the network address of the AMF, etc.
  • UDM may use multiple methods to determine whether the location of the first UE can be provided.
  • the first LCS information corresponds to a UE identity set
  • the UE identity set includes: the identity of the UE that can provide the UE location; and the UE identity set includes the identity of the first UE.
  • UDM can obtain the UE identity set corresponding to the first LCS information.
  • the UE identity set includes: the identity of the UE that can provide the UE location.
  • the UDM may determine whether the UE identity set includes the identity of the first UE. After determining that the UE identity set includes the identity of the first UE, the UDM may determine a location that can provide the first UE.
  • this application does not limit the specific implementation method of UDM obtaining the UE identity set corresponding to the first LCS information.
  • the UE identity set is obtained according to the first LCS information and the matching relationship between the preconfigured LCS information and the corresponding UE identity set.
  • the LCS system can pre-configure the matching relationship between each LCS information and the UE identity set corresponding to each LCS information in the UDM.
  • the aforementioned matching relationship can be represented by tables, arrays, key-value pairs, etc.
  • UDM can obtain a UE identity set that matches the first LCS information, that is, a UE identity set corresponding to the first LCS information, based on the matching relationship between the preconfigured LCS information and the UE identity set corresponding to the LCS information.
  • the UE identity set is obtained from the access token of the GMLC corresponding to the first LCS information.
  • Each GMLC corresponds to the LCS information corresponding to each GMLC, and the access token of each GMLC can be pre-written with a UE identity set matching each GMLC.
  • the UDM can determine the access token of the GMLC corresponding to the first LCS information based on the first LCS information, that is, the access token of the GMLC corresponding to the UDM.
  • the UDM can obtain the UE identity set corresponding to the first LCS information from the GMLC access token corresponding to the first LCS information.
  • the UE identity set is a UE identity set corresponding to the first LCS information in the access token of the GMLC.
  • the UE identity set matching each LCS information can be pre-written in the access token of each GMLC.
  • the UDM can obtain the UE identity set matching the first LCS information, that is, the UE identity set corresponding to the first LCS information, from the subscription information of the GMLC corresponding to the UDM.
  • the UDM when the first LCS information is obtained from the access token of the GMLC corresponding to the UDM, the UDM usually does not obtain the UE identity set corresponding to the first LCS information from the access token of the GMLC corresponding to the UDM. , and the other methods mentioned above will be used to obtain the UE identity set.
  • UDM can determine whether the location of the first UE can be provided by checking whether the identity of the first UE is in the UE identity set that matches the first LCS information.
  • the first LCS information corresponds to the first LCS identifier, and the first LCS identifier is used to identify the LCS area corresponding to the first device that can provide the UE location.
  • the UDM can obtain the first LCS identifier corresponding to the first LCS information.
  • the first LCS identifier is used to identify the LCS area in which the GMLC corresponding to the UDM can provide the UE location, that is, to identify the GMLC corresponding to the UDM and the GMLC corresponding to the UDM.
  • UE area of UE location is used to identify the LCS area in which the GMLC corresponding to the UDM can provide the UE location.
  • the UDM can determine the subscription information of the first UE based on the identity of the first UE, and obtain the second LCS identity from the subscription information of the first UE.
  • the second LCS identity is used to identify the LCS area that can provide the location of the first UE, That is, the GMLC area identifying the first UE and the first UE requesting the location of the UE.
  • the UDM may determine whether the first LCS identifier and the second LCS identifier are the same to determine whether the location of the first UE can be provided. After determining that the first LCS identifier and the second LCS identifier are the same, the UDM may determine a location that can provide the first UE.
  • UDM can determine whether the location of the first UE can be provided by checking whether the first LCS identifier and the second LCS identifier corresponding to the first UE's identifier are the same.
  • UDM is an important participating network element in the LCS business process. After the GMLC corresponding to the UDM requests the UDM for information about the AMF serving the first UE, the UDM can determine whether the location of the first UE can be provided based on the first LCS information and the identity of the first UE to check the relationship between the first UE and the UDM. Whether the ownership between corresponding GMLCs matches.
  • the UDM can send the information of the AMF serving the first UE to the GMLC corresponding to the UDM, which helps the GMLC corresponding to the UDM determine the AMF serving the first UE and ensures that the UDM corresponding
  • the process of the GMLC obtaining the location information of the first UE through the AMF is controllable. After determining that it cannot be provided first After obtaining the location of the UE, the UDM will not send the information of the AMF serving the first UE to the GMLC corresponding to the UDM, ensuring that the GMLC corresponding to the UDM cannot illegally obtain the location information of the first UE through the AMF, effectively avoiding the leakage of the UE location.
  • Figure 8 shows a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • the information sending method may include:
  • the location requesting device sends the identity of the first UE to GMLC.
  • the above-mentioned GMLC is the GMLC corresponding to the first device, that is, the GMLC itself.
  • the location requesting device may carry the identity of the first UE in the request 8 and send the request 8 to the GMLC. Therefore, the GMLC can obtain the identity of the first UE from the request 8.
  • This application does not limit the specific implementation of request 8.
  • request 8 can use the LCS Service Request in S11 shown in Figure 1.
  • GMLC obtains the first LCS information.
  • this application does not limit the specific implementation method for GMLC to obtain the first LCS information.
  • the LCS system may pre-configure the corresponding relationship between each GMLC and the LCS information corresponding to each GMLC.
  • the aforementioned corresponding relationships can be represented or stored in methods such as tables, arrays, key-value pairs, etc.
  • the GMLC can obtain the LCS information corresponding to the GMLC, that is, the first LCS information, based on the preconfigured correspondence between each GMLC and the LCS information corresponding to each GMLC.
  • the GMLC obtains the first LCS information from the certificate of the location requesting device.
  • the LCS information corresponding to the GMLC that provides the UE location for the first UE may be pre-stored in the certificate of the location requesting device, that is, the first LCS information. Therefore, GMLC can obtain the first LCS information from the certificate of the location requesting device.
  • the GMLC receives the first LCS information from the location requesting device.
  • the location requesting device may carry the first LCS information in the request 9 and send the request 9 to the GMLC.
  • the GMLC can obtain the first LCS information from request 9. This application does not limit the specific implementation of request 9.
  • request 9 may be the same request as request 8, or may be a different request from request 8. It should be noted that when request 9 and request 8 adopt the same request, the request includes: the identity of the first UE and the first LCS information.
  • the GMLC After determining that the location of the first UE can be provided based on the first LCS information and the identity of the first UE, the GMLC sends the location information of the first UE to the location requesting device.
  • the specific implementation manner in which the GMLC in S403 determines based on the first LCS information and the identity of the first UE that it can provide the location of the first UE is the same as the AMF in S203 in Figure 6 determines based on the first LCS information and the identity of the first UE that it can provide the location.
  • the implementation of providing the location of the first UE is similar and will not be described again here.
  • GMLC can also determine whether the location of the first UE can be provided through UDM.
  • the GMLC may send a request 10 to the UDM, and the request 10 includes the identity of the first UE, so that the UDM obtains the identity of the first UE.
  • the UDM can also obtain the first LCS information.
  • the UDM may determine whether the GMLC can provide the location of the first UE based on the first LCS information and the identity of the first UE.
  • UDM sends response 10 to GMLC, and response 10 is used to indicate whether GMLC can provide the location of the first UE.
  • the GMLC may send the location information of the first UE to the location requesting device.
  • the response 10 is used to indicate that the GMLC cannot provide the location information of the first UE, the GMLC may not send the location information of the first UE to the location requesting device.
  • this application does not limit the specific implementation methods of request 10 and response 10.
  • the GMLC can determine whether the first LCS identifier is the same as the second LCS identifier corresponding to the first UE identifier by checking whether the first UE identifier is in the UE identifier set that matches the first LCS information.
  • the location of the first UE can be provided.
  • the first device can also be a NEF or GMLC proxy in the LCS system.
  • the specific implementation method of the NEF or GMLC proxy executing the information sending method of the present application can be seen in the embodiment of Figure 8.
  • GMLC executes the information sending method of the present application. The description will not be repeated here.
  • GMLC is an important participating network element in the LCS business process.
  • GMLC can determine the location information of the first UE through the first LCS information and the identity of the first UE at any time after the location requesting device requests the location information of the first UE from the GMLC and before the GMLC sends the location information of the first UE to the location requesting device. Whether the location of the first UE can be provided to check whether the ownership between the first UE and the GMLC corresponding to the AMF matches.
  • the GMLC may send the location information of the first UE to the location requesting device, ensuring that the process of GMLC transmitting the location information of the first UE to the location requesting device is controllable. After determining that the location of the first UE cannot be provided, GMLC will not send the location information of the first UE to the location requesting device, ensuring that the location requesting device cannot illegally obtain the location information of the first UE through GMLC, effectively avoiding the leakage of the UE location. .
  • the first LCS information can be pre-written in the access token of the GMLC to facilitate the first device to promptly determine whether it can provide the location of the first UE. It is beneficial to obtain the location information of the UE in a controllable manner.
  • the access token of the GMLC here is different from the access token of the GMLC involved in the related technology shown in Figure 1.
  • the first LCS information has been written in the access token of the GMLC here.
  • the GMLC access token is not written with the first LCS information.
  • Figure 9 shows a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • the information sending method provided by this application may include:
  • GMLC sends a request for applying for an access token of GMLC to NRF.
  • GMLC and NRF belong to the same LCS system, and GMLC can request an access token of GMLC from NRF.
  • this application does not limit the specific implementation method of the request.
  • the request may include: the identification of the GMLC's access token. This request can use Nnrf_AccessToken_Get Request.
  • NRF obtains the first LCS information.
  • this application does not limit the specific implementation method for NRF to obtain the first LCS information.
  • the NRF obtains the first LCS information from the GMLC's certificate.
  • the first LCS information corresponding to the GMLC may be pre-stored in the certificate of the GMLC. Therefore, NRF can obtain the first LCS information from the GMLC's certificate.
  • the NRF obtains the first LCS information from the GMLC profile.
  • the first LCS information corresponding to the GMLC can be pre-written in the registration file of the GMLC. Therefore, the NRF can obtain the first LCS information from the registration file of the GMLC.
  • the NRF receives the first LCS information from the GMLC.
  • the GMLC may send the first LCS information to the NRF.
  • the NRF can obtain the first LCS information.
  • the GMLC may carry the first LCS information in the request 11 and send the request 11 to the NRF.
  • the NRF can obtain the first LCS information from request 11.
  • Request 11 may be the same request as the request in S501, or may be a different request from the request in S501. It should be noted that when request 11 and the request in S501 are the same request, the request includes: first LCS information.
  • NRF can obtain the first LCS information.
  • the NRF sends the GMLC access token to the GMLC.
  • the GMLC access token includes the first LCS information.
  • NRF can use various methods to write the first LCS information into the GMLC access token.
  • the first LCS information corresponds to the UE identity set
  • the GMLC access token includes the UE identity set
  • the NRF may write the UE identity set into the access token of the GMLC.
  • the UE identity set includes: the identity of the UE that can provide the UE location.
  • the first LCS information corresponds to the first LCS identifier
  • the GMLC access token includes the first LCS identifier
  • the NRF may write the first LCS identifier into the access token of the GMLC.
  • the first LCS identifier is used to identify the LCS area in which the GMLC corresponding to the first device can provide the UE location.
  • the NRF may also write the above-mentioned UE identity set and the first LCS identity into the GMLC access token.
  • the NRF can send the GMLC access token to the GMLC so that the first device (such as AMF/UDM) can obtain the second LCS information from the GMLC access token. 1 LCS information.
  • NRF can implement the above-mentioned process of applying for a GMLC access token, so that the first device (such as AMF/UDM) can obtain the pre-stored first LCS information from the GMLC access token, so that the first device can determine Whether the location of the first UE can be provided to ensure that the process of obtaining the location information of the UE is controllable.
  • the first device such as AMF/UDM
  • the first device can obtain the pre-stored first LCS information from the GMLC access token, so that the first device can determine Whether the location of the first UE can be provided to ensure that the process of obtaining the location information of the UE is controllable.
  • the NRF can store the registration file of the GMLC, which can realize the registration of the GMLC in the NRF (which can be understood as registration).
  • the NRF before performing S502 to obtain the first LCS information from the GMLC registration file, the NRF also needs to pre-store the first LCS information into the GMLC registration file.
  • Figure 10 shows a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • the information sending method provided by this application may include:
  • GMLC sends a request for registering GMLC to NRF.
  • GMLC and NRF belong to the same LCS system, and GMLC can request NRF to register GMLC.
  • this application does not limit the specific implementation method of the request.
  • the request may include: the identification of the GMLC. This request can use Nnrf_NFManagement_NFRegister Request.
  • the NRF obtains the second LCS information, and the second LCS information can indicate the UE that can provide the UE location.
  • this application can express the first LCS information in S602 as the second LCS information, that is, the second LCS information is the second LCS information. 1 LCS information.
  • this application does not limit the specific implementation method for NRF to obtain the second LCS information.
  • the NRF receives the second LCS information from the GMLC.
  • the GMLC may carry the first LCS information in the request 12 and send the request 12 to the NRF.
  • the NRF can obtain the second LCS information from request 12.
  • Request 12 may be the same request as the request in S601, or may be a different request from the request in S601. It should be noted that when request 12 and the request in S601 are the same request, the request includes: second LCS information.
  • NRF obtains the second LCS information from GMLC’s certificate.
  • the first LCS information corresponding to the GMLC may be pre-stored in the certificate of the GMLC. Therefore, NRF can obtain the second LCS information from the GMLC's certificate.
  • NRF can obtain the second LCS information.
  • NRF writes the second LCS information into the registration file of GMLC.
  • the NRF sends a response to the GMLC indicating that the second LCS information has been written in the registration file of the GMLC.
  • S604 is an optional step.
  • NRF After NRF determines that the second LCS information has been written into GMLC's access token, it can send this response to GMLC to conveniently notify GMLC that the registration has been successful.
  • the response may include: an identifier indicating that the second LCS information has been written in the GMLC's access token.
  • the response can be Nnrf_NFManagement_NFRegister Response.
  • NRF can realize the above-mentioned registration process of GMLC, so that subsequent NRF can obtain the first LCS information from the registration file of GMLC.
  • the LMF is maliciously controlled, after receiving the LCS request of a certain UE, the LMF is likely to send the location information of other UEs except the UE to the GMLC, resulting in The location information of other UEs can easily be illegally obtained, thus easily causing the location of the UE to be leaked.
  • the AMF can be used as a network element to check the malicious behavior of the LMF. It can use the verification information of the UE to check whether the UE and the AMF requesting the AMF to obtain relevant positioning parameters from the LMF can report to the LMF. Whether the UE that provides relevant positioning parameters is consistent can ensure that LMF can obtain the relevant positioning parameters of the UE in a controllable manner, and check whether the UE that LMF requests AMF to forward location information and the UE that AMF requests LMF to determine location information are consistent, so as to provide a basis for subsequent AMF forwarding to LMF.
  • the interception of the UE's location information can ensure that LMF can controllably send the UE's location information, solve the problem of UE location leakage due to LMF's malicious behavior, and help reduce the risk of leaking the UE's location after LMF is attacked.
  • the process of AMF checking whether the LMF has any malicious behavior of illegally requesting the relevant positioning parameters of the UE or illegally forwarding the location information of the UE can be executed independently or in conjunction with the previously mentioned LCS system.
  • the process of the first device checking whether the ownership of the UE requesting the UE location and the GMLC that can provide the UE location in the LCS system matches is performed together, which is helpful to further avoid leakage of the UE location.
  • Figure 11 shows a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • the information sending method provided by this application may include:
  • the LMF sends a request to the AMF for obtaining relevant positioning parameters of the second UE or sending location information of the second UE.
  • AMF After receiving the request from LMF, AMF can determine whether to respond to the request.
  • this application does not limit the specific implementation method of the request.
  • This request is used by the LMF to request the AMF to obtain the relevant positioning parameters of the second UE, such as Namf_Communication_N1N2MessageTransfer sent by the LMF to the AMF. It can be seen that the information sending method of this application is suitable for the scenario where the LMF obtains the relevant positioning parameters of the second UE through the AMF.
  • this request is used by the LMF to request the AMF to send the location information of the second UE, such as using the Nlmf_Location_DetemineLocation Response in S19 shown in Figure 1. It can be seen that the information sending method of this application is suitable for the scenario where the LMF sends the location information of the second UE through the AMF.
  • the AMF obtains the first verification information of the second UE according to the request.
  • the AMF may determine that the UE that the LMF needs the AMF to obtain relevant positioning parameters or forward location information is the second UE. Therefore, the AMF can obtain the first verification information of the second UE.
  • the first verification information of the second UE is used to identify the UE that the LMF currently requests the AMF to obtain relevant positioning parameters or forward location information as the second UE. This application does not limit the specific implementation manner of the first verification information of the second UE.
  • the AMF sends the relevant positioning parameters of the second UE or the location information of the UE.
  • the GMLC requests the LMF to determine the location information of the UE through the AMF. Therefore, compared to LMF, AMF will learn the aforementioned UE earlier. Furthermore, the AMF needs to request the location information of the aforementioned UE from the LMF, and the LMF needs to request the relevant positioning parameters of the aforementioned UE from the AMF. After determining the location information of the aforementioned UE, the LMF needs to send the location information of the aforementioned UE to the GMLC through the AMF.
  • the AMF can pre-store the respective second verification information of the above-mentioned UEs in the AMF.
  • the second verification information of each UE is used to identify the UEs for which the GMLC/AMF needs the LMF to determine the location information, that is, the AMF can provide relevant positioning to the LMF. Parameters or UE forwarding location information.
  • the second verification information of the second UE may be pre-stored in the AMF. If the GMLC/AMF does not require the LMF to determine the location information of the second UE, then the second verification information of the second UE will not be stored in the AMF.
  • the second verification information of the second UE is used to identify the second UE for which the GMLC/AMF requires the LMF to determine location information, that is, to identify the second UE for which the AMF can provide relevant positioning parameters to the LMF or forward location information.
  • This application does not limit the specific implementation manner of the second verification information of the second UE.
  • first verification information of the second UE and the second verification information of the second UE may be expressed in the same manner to facilitate comparison between the two.
  • the AMF may also determine whether the second verification information of the second UE has been stored in the AMF.
  • the AMF may obtain the second verification information of the second UE from the AMF.
  • the AMF can determine whether to send the relevant positioning parameters of the second UE or the location information of the second UE by checking whether the first verification information of the second UE is the same as the second verification information of the second UE.
  • the AMF may send the relevant positioning parameters of the UE to the LMF or send the location information of the UE to the GMLC.
  • the AMF will not send the relevant positioning parameters of the UE to the LMF and will not send the location information of the UE to the GMLC.
  • the AMF After determining that the second verification information of the second UE is not stored in the AMF, the AMF cannot obtain the second verification information of the second UE from the AMF.
  • the AMF may determine that the first verification information of the second UE is different from the second verification information of the second UE, and will not send the relevant positioning parameters of the UE to the LMF and will not send the location information of the UE to the GMLC.
  • the AMF may notify the LMF that it cannot provide a response to the request sent by the LMF in S701.
  • the LMF proxy in the LCS system can also execute the information sending method of the present application.
  • the information sending method provided by this application uses the AMF to receive a request from the LMF for obtaining the relevant positioning parameters of the second UE or sending the location information of the second UE.
  • the AMF may obtain the first verification information of the second UE. Since the second verification information of each UE is pre-stored in the AMF, the second verification information of each UE is used to identify the UE for which the GMLC/AMF needs to determine the location information. Therefore, when the first verification information of the second UE is the same as the second verification information of the second UE pre-stored in the AMF, the AMF can determine that the second UE and the AMF that the LMF requested the AMF to obtain relevant positioning parameters can provide relevant positioning to the LMF.
  • the second UE of the parameters is consistent, or the second UE that determines that the LMF requests the AMF to forward location information is consistent with the second UE that the AMF requests the LMF to determine location information.
  • the AMF can then send the relevant positioning parameters of the second UE to the LMF or send the location information of the second UE to the GMLC.
  • the LMF initiates a request to the AMF in the LCS business process and the UE that needs to determine the location information pre-stored in the AMF, it is possible to check the UE that the LMF requests the AMF to obtain relevant positioning parameters or forward location information. , ensuring that the LMF can controllably obtain the relevant positioning parameters or location information of the UE.
  • the subsequent AMF forwards the location information of the UE to the LMF for early interception, providing a new method for privacy detection of the UE.
  • the implementation method avoids the phenomenon of leaking the UE location due to the malicious behavior of the LMF as much as possible, and also reduces the risk of leaking the UE location after the LMF is attacked.
  • the second verification information of each UE in the AMF can be expressed in various ways.
  • the AMF may use the existing identity of the UE as the second verification information of the UE.
  • the second verification information of the UE may be: at least one of the UE's identity (SUPI or GPSI) or context identity.
  • the AMF can add a new identity to the UE and use the new identity as the second verification information of the UE.
  • the second verification information of the UE may be: at least one of the status identifier of the UE or a random number. The status identifier or random number of the UE is used to identify that the UE is in positioning, which means that the GMLC/AMF needs to determine the location information of the UE.
  • Figure 12 shows a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • the information sending method provided by this application may include:
  • the AMF marks the second verification information of the second UE according to the second UE.
  • the AMF may add an identifier to the second verification information of the second UE, or may write the second verification information of the second UE into a in the set, so that the second verification information of the second UE is marked through the identification or the setting of the set.
  • the AMF can add an identifier to the second verification information of each UE, or can add an identifier to the second verification information of multiple UEs. This application does not limit this. .
  • the AMF may write the second verification information of each UE into the same set, or may write the second verification information of multiple UEs into multiple different sets, and this application does not limit this.
  • the AMF can mark the second verification information of the second UE according to the second UE.
  • the AMF sends the identifier of the second UE to the LMF.
  • the second verification information of the second UE adopts the existing identity of the second UE. Therefore, according to the identity of the second UE, it can be determined whether the second verification information of the second UE is marked. Based on this, the AMF does not need to additionally send the second verification information of the second UE to the LMF.
  • the AMF may send the identifier of the second UE to the LMF, so that the LMF can learn the location information needed to determine the second UE.
  • the AMF may carry the identity of the second UE in the request 13 and send the request 13 to the LMF.
  • the request 13 is used to request relevant positioning parameters of the second UE. This application does not limit the specific implementation of request 13.
  • the LMF sends a request to the AMF for obtaining relevant positioning parameters of the second UE or sending location information of the second UE.
  • the request includes: the identifier of the second UE.
  • the AMF does not send the second verification information of the second UE to the LMF. Therefore, the LMF does not need to additionally send the first verification information of the second UE to the AMF.
  • the LMF may send a request carrying the identity of the second UE to the AMF, that is, the request in S701, so that the AMF can learn that the relevant positioning parameters of the second UE need to be obtained from the second UE.
  • the AMF obtains the first verification information of the second UE according to the identity of the second UE, and determines whether the second verification information of the second UE is marked.
  • the AMF may obtain the identity of the second UE.
  • the AMF may determine that both the first verification information of the second UE and the second verification information of the second UE are the identity of the second UE, and the AMF may determine the identity of the second UE based on the identity of the second UE. Determine whether the second verification information of the second UE has been marked.
  • the AMF may search whether there is a new identity added to the identity of the second UE, or whether there is a set in which the identity of the second UE is stored. If present, the AMF may determine that the second verification information of the second UE is marked. If not, the AMF may determine that the second verification information of the second UE is not marked.
  • the AMF can find the context identifier of the second UE based on the identifier of the second UE. Therefore, the AMF may determine that the first verification information of the second UE and the second verification information of the second UE are both context identifiers of the second UE, and the AMF may determine the second verification information of the second UE based on the context identifier of the second UE. Has it been marked?
  • the AMF may search whether there is a new identifier added to the context identifier of the second UE, or whether there is a set in which the context identifier of the second UE is stored. If present, the AMF may determine that the second verification information of the second UE is marked. If not, the AMF may determine that the second verification information of the second UE is not marked.
  • the AMF can determine the first verification information of the second UE according to the identity of the second UE, and determine whether the second verification information of the second UE is marked.
  • the AMF sends the relevant positioning parameters of the second UE or the location information of the second UE. .
  • the first verification information of the second UE is the same as the second verification information of the second UE.
  • the AMF may have already executed the process of marking the second verification information according to the second UE in S801. Thus, the AMF may determine that the second verification information of the second UE is marked.
  • the AMF can send the relevant positioning parameters of the second UE to the LMF or to the GMLC. Send the location information of the second UE.
  • the AMF can determine whether the LMF has illegally requested the second UE by checking whether the first verification information of the second UE is the same as the second verification information of the second UE, and whether the second verification information of the second UE has been marked.
  • Related positioning parameters or malicious behavior of illegally forwarding the location information of the second UE so that after the LMF is attacked, the subsequent AMF forwards the location information of the UE to the LMF for early interception, reducing the possibility of leaking the location information of the second UE. sex.
  • Figure 13 shows a signaling interaction diagram of an information sending method provided by an embodiment of the present application.
  • the information sending method provided by this application may include:
  • the AMF generates and saves the second verification information of the second UE.
  • the AMF may generate the second verification information of the second UE for the second UE, and save the second verification information of the second UE.
  • the AMF may generate a second verification information for each UE, or may jointly generate a second verification information for multiple UEs, which is not limited in this application.
  • the AMF can generate and save the second verification information of the second UE.
  • the AMF sends the identifier of the second UE and the second verification information of the second UE to the LMF.
  • the LMF cannot determine the second verification information of the second UE according to the identity of the second UE. Based on this, the AMF needs to additionally send the second verification information of the second UE to the LMF.
  • the AMF may send a request including the identity of the second UE and the second verification information of the second UE to the LMF, so that the LMF can learn the location information that needs to be determined for the second UE.
  • the LMF may carry the identity of the second UE and the second verification information of the second UE in the request 14 and send the request 14 to the AMF, and the request 14 requests related positioning parameters of the second UE.
  • This application does not limit the specific implementation method of request 14.
  • the LMF sends to the AMF the relevant positioning parameters of the second UE or sends the location information of the second UE.
  • the request includes: the identity of the second UE and the first verification information of the second UE.
  • the AMF sends the second verification information of the second UE to the LMF. Therefore, the LMF also needs to additionally send the first verification information of the second UE to the AMF.
  • the LMF may send a request including the identity of the second UE and the first verification information of the second UE to the AMF, that is, the request in S701, so that the AMF can learn that the relevant positioning parameters of the second UE need to be obtained from the second UE.
  • the AMF obtains the first verification information of the second UE, and obtains the second verification information of the second UE from the AMF according to the identifier of the second UE.
  • the AMF may obtain the identity of the second UE and the first verification information of the second UE.
  • the AMF may determine the first verification information of the second UE. Moreover, when the verification information of the UE adopts the status identifier or random number of the second UE, the AMF may determine the second UE according to the identifier of the second UE. The AMF can determine the second verification information of the second UE from the AMF for the second UE.
  • the AMF sends the relevant positioning parameters of the second UE or the location information of the second UE.
  • the AMF may send the relevant positioning parameters of the UE to the LMF or the location information of the second UE to the GMLC.
  • the AMF can determine whether the LMF illegally requests the relevant positioning parameters of the second UE or illegally forwards the location information of the second UE by checking whether the first verification information of the second UE is the same as the second verification information of the second UE. malicious behavior, so that after the LMF is attacked, the subsequent AMF forwards the location information of the UE to the LMF for early interception, thereby reducing the possibility of leaking the location information of the second UE.
  • this application also provides an information sending device.
  • the information sending device may exist independently or may be integrated in other devices, and may provide information corresponding to the location of the UE to the location requesting device to implement operations corresponding to the first device/LMF in any of the above method embodiments.
  • the information sending device of the present application may include modules for executing the technical solutions of the method embodiments shown above.
  • the implementation principles and technical effects are similar.
  • the operations implemented by each module can be further referred to the relevant descriptions of the method embodiments. Herein No further details will be given.
  • the modules here can also be replaced by components or circuits.
  • This application can divide the information sending device into functional modules according to the above method examples.
  • each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module.
  • the above integrated modules can be implemented in the form of hardware or software function modules. It should be noted that the division of modules in each embodiment of the present application is schematic and is only a logical function division. In actual implementation, there may be other division methods.
  • this application also provides an information sending device.
  • FIG. 14 shows a schematic diagram of the hardware structure of an information sending device provided by an embodiment of the present application.
  • the information sending apparatus 100 as a hardware support for the first device/LMF, can provide information corresponding to the location of the UE to the location requesting device, for implementing any of the above method embodiments corresponding to the first device/LMF. operation.
  • the information sending device 100 of the present application may include: a memory 101 and a processor 102.
  • the memory 101 and the processor 102 may be connected through a bus 103 .
  • the processor 102 and the memory 101 are integrated together.
  • Memory 101 used to store program code
  • the processor 102 calls the program code.
  • the program code When the program code is executed, it is used to execute the information sending method in any of the above embodiments. For details, please refer to the relevant descriptions in the foregoing method embodiments.
  • this application also includes a communication interface 104, which can be connected to the processor 102 through the bus 103.
  • the processor 102 can control the communication interface 104 to implement the above-mentioned receiving and sending functions of the information sending device 100 .
  • the information sending device in the embodiment of the present application can be used to execute the technical solutions in the above method embodiments.
  • the implementation principles and technical effects are similar and will not be described again here.
  • the communication system includes: two or more network elements in the aforementioned LCS system. Each network element can be used to implement the first step in any of the above method embodiments. Operation of equipment/LMF.
  • this application also provides a computer-readable storage medium.
  • Execution instructions are stored in the computer-readable storage medium.
  • the server executes the execution instructions, the server performs the information transmission in the above method embodiment. method.
  • this application also provides a chip, including: an interface circuit and a logic circuit.
  • the interface circuit is used to receive signals from other chips other than the chip and transmit them to the logic circuit, or to send signals from the logic circuit to Other chips and logic circuits other than the chip are used to implement the information sending method in the above method embodiment.
  • this application also provides a computer program product.
  • the computer program product includes execution instructions, and the execution instructions are stored in a readable storage medium.
  • At least one processor of the server can read the execution instruction from the readable storage medium, and at least one processor executes the execution instruction to cause the server to implement the information sending method in the above method embodiment.
  • a computer program product includes one or more computer instructions.
  • Computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, e.g., computer instructions may be transmitted from a website, computer, server or data center via a wired link (e.g.
  • Coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless means to transmit to another website site, computer, server or data center.
  • Computer-readable storage media can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or other integrated media that contains one or more available media. Available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供一种信息发送方法和装置。该方法包括:第一设备接收第一终端设备的标识;第一设备获得第一定位服务信息,第一定位服务信息能够指示能提供终端设备位置的终端设备;第一设备在根据第一定位服务信息以及第一终端设备的标识确定能够提供第一终端设备的位置后,发送第一终端设备的位置对应的信息。从而,尽可能地避免了终端设备位置的泄露。

Description

信息发送方法和装置
本申请要求于2022年06月29日提交国家知识产权局、申请号为202210757240.0、申请名称为“信息发送方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种信息发送方法和装置。
背景技术
第三代合作伙伴计划(the third generation partner project,3GPP)定义了定位服务(location services,LCS)作为第五代移动通信(the 5th generation mobile communication technology,5G)LCS。
在5G LCS业务流程中,网络客户端可向网关移动定位中心(gateway mobile location center,GMLC)请求终端设备(user equipment,UE)的位置信息。
然而,GMLC主要考虑的是网络客户端以及UE与LCS请求之间的对应关系,比如,LCS请求中,在LCS隐私配置文件(privacy profile)标识允许网络客户端访问,以及UE的位置隐私标识(location privacy indication,LPI)指示符标识允许网络客户端请求UE的LCS的情况下,网络客户端可请求任意区域内的UE的位置信息。因此,GMLC进行网络客户端与UE的隐私检测的判定过程是粗粒度的,从而可能会造成UE位置的泄露。
发明内容
本申请提供一种信息发送方法和装置,能够尽可能地避免终端设备位置的泄露。
第一方面,本申请提供一种信息发送方法,包括:
第一设备接收第一终端设备的标识;
第一设备获得第一定位服务信息,所述第一定位服务信息能够指示能提供终端设备位置的终端设备;
第一设备在根据第一定位服务信息以及所述第一终端设备的标识确定能够提供所述第一终端设备的位置后,发送第一终端设备的位置对应的信息。
通过第一方面提供的信息发送方法,第一设备接收第一终端设备的标识,从而能够根据该第一终端设备的标识确定被请求进行定位服务的终端设备。比如,在位置请求设备请求某个/某些终端设备的定位服务的情况下,第一设备可以通过第一终端设备的标识知道该第一终端设备被请求了定位服务。
第一设备在收到第一终端设备的标识后,获得第一定位服务信息,该第一定位服务信息能够指示能提供终端设备位置的那些终端设备,从而能够根据该第一定位服务信息确定 能提供终端设备位置的那些终端设备。该第一设备在根据该第一定位服务信息以及该第一终端设备的标识确定能够提供所述第一终端设备的位置后,发送所述第一终端设备的位置对应的信息。比如,如果是该第一终端设备属于这些终端设备,则可以提供该第一终端设备的位置。或者是根据该第一定位服务信息确定能够提供定位服务的网关移动定位中心,该第一终端设备属于该网关移动定位中心能提供终端设备位置的终端设备,则可以提供该第一终端设备的位置。
由此,使得第一设备根据第一定位服务信息以及该第一终端设备的标识能够确定该第一终端设备是否能够被提供终端设备位置。
在该第一终端设备能够被提供第一终端设备位置的情况下,该第一设备再发送所述第一终端设备的位置所对应的信息。在该第一终端设备不能够被提供第一终端设备位置的情况下,第一设备不会将该第一终端设备的位置对应的信息发送出去。
比如,对于位置请求设备请求获取第一终端设备位置的情况,第一设备通过第一定位服务信息确认该第一终端设备是否能够被提供终端设备位置,相当于第一设备可以确定该位置请求设备是否被授权请求第一终端设备的位置。在位置请求设备有被授权时,该第一设备可向该位置请求设备提供第一终端设备的位置。在位置请求设备没有被授权时,该第一设备不会向该位置请求设备提供第一终端设备的位置。
从而,实现了针对终端设备的隐私验证,避免了终端设备位置的泄露。
在一种可能的设计中,第一设备为接入和移动性管理功能实体,
第一设备接收第一终端设备的标识,包括:接入和移动性管理功能实体从网关移动定位中心接收第一终端设备的标识;
第一设备发送第一终端设备的位置对应的信息,包括:接入和移动性管理功能实体向网关移动定位中心发送第一终端设备的位置信息。
由此,接入和移动性管理功能实体可作为第一设备,在网关移动定位中心向该接入和移动性管理功能实体请求对第一终端设备进行定位服务之后,且在该接入和移动性管理功能实体向网关移动定位中心发送第一终端设备的位置信息之前,该接入和移动性管理功能实体可根据第一定位服务信息以及第一终端设备的标识能够确定该第一终端设备是否能够被提供终端设备位置。
在该第一终端设备能够被提供第一终端设备位置的情况下,该接入和移动性管理功能实体可继续执行后续的如通过位置管理功能实体获取该第一终端设备的位置信息的过程,并在获取到该第一终端设备的位置信息后,该接入和移动性管理功能实体可向网关移动定位中心发送该第一终端设备的位置信息。
在该第一终端设备不能够被提供第一终端设备位置的情况下,该接入和移动性管理功能实体可以不继续执行后续的如通过位置管理功能实体获取该第一终端设备的位置信息的过程。即使获取到该第一终端设备的位置信息,该接入和移动性管理功能实体也不会向网关移动定位中心发送该第一终端设备的位置信息,使得该网关移动定位中心不会向位置请求设备发送该第一终端设备的位置信息。
从而,接入和移动性管理功能实体可作为确定是否能够提供终端设备的位置的一个网元,能够保障终端设备的位置被合法/合理地获取到,可尽可能地避免终端设备的位置泄露。
在一种可能的设计中,第一设备为统一数据管理实体,
第一设备接收第一终端设备的标识,包括:统一数据管理实体从网关移动定位中心接收第一终端设备的标识;
第一设备发送第一终端设备的位置对应的信息,包括:统一数据管理实体向网关移动定位中心发送为第一终端设备服务的接入和移动性管理功能实体的信息,为第一终端设备服务的接入和移动性管理功能实体的信息用于网关移动定位中心请求第一终端设备的位置信息。
由此,统一数据管理实体可作为第一设备,在网关移动定位中心向该统一数据管理实体请求为第一终端设备服务的接入和移动性管理功能实体的信息之后,该统一数据管理实体可根据上述实现过程,选择性地向该网关移动定位中心发送为第一终端设备服务的接入和移动性管理功能实体的信息,使得该网关移动定位中心能够合理/合法地向位置获取设备发送该第一终端设备的位置信息。从而,尽可能地避免终端设备的位置泄露。
在一种可能的设计中,第一设备获得第一定位服务信息,包括:
第一设备根据网关移动定位中心以及预配置的每个网关移动定位中心与对应的定位服务信息之间的对应关系,获得与网关移动定位中心对应的第一定位服务信息;
或者,第一设备从网关移动定位中心的证书中获得第一定位服务信息;
或者,第一设备从网关移动定位中心的访问令牌中获得第一定位服务信息;
或者,第一设备从网关移动定位中心接收第一定位服务信息。
由此,为接入和移动性管理功能实体或统一数据管理实体获得第一定位服务信息提供了多种渠道,可确保接入和移动性管理功能实体或统一数据管理实体能够获得到第一定位服务信息,丰富了获得第一定位服务信息的具体实现方式。
在一种可能的设计中,第一设备为网关移动定位中心,
第一设备接收第一终端设备的标识,包括:网关移动定位中心从位置请求设备接收第一终端设备的标识;
第一设备发送终端设备的位置对应的信息,包括:网关移动定位中心向位置请求设备发送第一终端设备的位置信息。
由此,网关移动定位中心可作为第一设备,在位置请求设备向该网关移动定位中心请求对第一终端设备进行定位服务之后,且在该网关移动定位中心向位置请求设备发送该第一终端设备的之前,该网关移动定位中心可根据上述实现过程,选择地向该位置请求设备发送该第一终端设备的位置信息,使得该位置请求设备能够合理/合法地获取到该第一终端设备的位置信息。从而,尽可能地避免终端设备的位置泄露。
在一种可能的设计中,第一设备获得第一定位服务信息,包括:
网关移动定位中心根据网关移动定位中心以及预配置的每个网关移动定位中心与对应的定位服务信息之间的对应关系,获得与网关移动定位中心对应的第一定位服务信息;
或者,网关移动定位中心从位置请求设备的证书中获得第一定位服务信息;
或者,网关移动定位中心从位置请求设备接收第一定位服务信息。
由此,为网关移动定位中心获得第一定位服务信息提供了多种渠道,可确保网关移动定位中心能够获得到第一定位服务信息,丰富了获得第一定位服务信息的具体实现方式。
在一种可能的设计中,第一定位服务信息对应终端设备标识集,终端设备标识集中包括:能提供终端设备位置的终端设备的标识;
终端设备标识集中包括第一终端设备的标识。
由此,考虑到该第一定位服务信息所标识的能提供终端设备位置的那些终端设备是确定的/固定的。故,该第一定位服务信息可采用终端设备标识集标识能提供终端设备位置的每个终端设备的标识。从而,丰富了第一定位服务信息的表示形式。
在一种可能的设计中,终端设备标识集是根据第一定位服务信息以及预配置的定位服务信息与对应的终端设备标识集之间的匹配关系获得的;
或者,终端设备标识集是从与第一定位服务信息对应的网关移动定位中心的访问令牌中获得的。
由此,为第一设备获得终端设备标识集提供了多种渠道,可确保第一设备能够获得到终端设备标识集,丰富了获得终端设备标识集的具体实现方式。
在一种可能的设计中,第一定位服务信息对应第一定位服务标识,第一定位服务标识用于标识第一设备对应的能提供终端设备位置的定位服务区域;
该方法还包括:
第一设备根据第一终端设备的标识,从第一终端设备的签约信息中获得第二定位服务标识,第二定位服务标识用于标识能提供第一终端设备的位置的定位服务区域;
第一设备根据第一定位服务信息以及第一终端设备的标识确定能够提供第一终端设备的位置,包括:
第一设备在第一定位服务标识与第二定位服务标识相同时,确定能够提供第一终端设备的位置。
由此,考虑到该第一定位服务信息所标识的能提供该第一终端设备位置的那些网关移动定位中心是确定的/固定的,且该第一定位服务信息所标识的那些网关移动定位中心能提供终端设备位置的那些终端设备也是确定的/固定的。基于此,第一定位服务信息可采用第一定位服务标识能提供终端设备位置的定位服务区域。从而,丰富了第一定位服务信息的表示形式。
第二方面,本申请提供一种信息发送方法,包括:
统一数据管理实体从网关移动定位中心或接入和移动性管理功能实体接收第一定位服务信息,第一定位服务信息能够指示能提供终端设备位置的终端设备;
统一数据管理实体根据第一定位服务信息以及预配置的定位服务信息与对应的终端设备标识集之间的匹配关系,获得终端设备标识集,终端设备标识集中包括:能提供终端设备位置的终端设备的标识;
统一数据管理实体向网关移动定位中心或接入和移动性管理功能实体发送终端设备标识集。
通过第二方面提供的信息发送方法,统一数据管理实体可从网关移动定位中心或接入和移动性管理功能实体接收到第一定位服务信息。由于该统一数据管理实体可获得预配置的定位服务信息与对应的终端设备标识集之间的匹配关系。因此,该统一数据管理实体基于上述匹配关系,可确定与该第一定位服务信息对应的终端设备标识集。该统一数据管理实体便可向网关移动定位中心或接入和移动性管理功能实体提供终端设备标识集,使得网关移动定位中心或接入和移动性管理功能实体能够确定该终端设备标识集中是否包括第一终端设备的标识。
在该终端设备标识集中包括第一终端设备的情况下,该网关移动定位中心可向位置请求设备发送该第一终端设备的位置信息。或者,该接入和移动性管理功能实体可向网关移动定位中心发送该第一终端设备的位置信息。
在该终端设备标识集中不包括第一终端设备的情况下,该网关移动定位中心或该接入和移动性管理功能实体将不会发送该第一终端设备的位置信息。
综上,统一数据管理实体可向网关移动定位中心或接入和移动性管理功能实体提供终端设备标识集,使得网关移动定位中心或接入和移动性管理功能实体能够保障终端设备的位置被合法/合理地获取到,可尽可能地避免终端设备的位置泄露。
第三方面,本申请提供一种信息发送方法,包括:
统一数据管理实体从网关移动定位中心或接入和移动性管理功能实体接收第一终端设备的标识;
统一数据管理实体根据第一终端设备的标识,确定第一终端设备的签约信息;
统一数据管理实体从第一终端设备的签约信息中获得第二定位服务标识,第二定位服务标识用于标识能提供第一终端设备的位置的定位服务区域;
统一数据管理实体向网关移动定位中心或接入和移动性管理功能实体发送第二定位服务标识。
通过第三方面提供的信息发送方法,统一数据管理实体可从网关移动定位中心或接入和移动性管理功能实体接收到第一终端设备的标识。由于该统一数据管理实体可获得每一个终端设备的签约信息,且每一个终端设备的签约信息中预存储有每一个终端设备的定位服务标识,该每一个终端设备的定位服务标识用于标识能够提供每一个终端设备的位置的定位服务区域。因此,该统一数据管理实体可确定与该第一终端设备的标识对应的该第一终端设备的签约信息。该统一数据管理实体可从该第一设备的签约信息中获得该第一终端设备的第二定位服务标识,该第二定位服务标识用于标识能够提供该第一终端设备的位置的定位服务区域。该统一数据管理实体便可向网关移动定位中心或接入和移动性管理功能实体发送该第一终端设备的第二定位服务标识,使得网关移动定位中心或接入和移动性管理功能实体能够确定第一定位服务标识与第二定位服务标识是否相同。
在第一定位服务标识与第二定位服务标识相同的情况下,该网关移动定位中心可向位置请求设备发送该第一终端设备的位置信息。或者,该接入和移动性管理功能实体可向网关移动定位中心发送该第一终端设备的位置信息。
在第一定位服务标识与第二定位服务标识不同的情况下,该网关移动定位中心或该接入和移动性管理功能实体将不会发送该第一终端设备的位置信息。
综上,统一数据管理实体可向网关移动定位中心或接入和移动性管理功能实体提供被请求进行定位服务的终端设备对应的定位服务标识,使得网关移动定位中心或接入和移动性管理功能实体能够保障终端设备的位置被合法/合理地获取到,可尽可能地避免终端设备的位置泄露。
第四方面,本申请提供一种信息发送方法,包括:
网络存储功能实体从网关移动定位中心接收用于申请网关移动定位中心的访问令牌的请求;
网络存储功能实体获得第一定位服务信息,第一定位服务信息能够指示能提供终端设 备位置的终端设备;
网络存储功能实体向网关移动定位中心发送网关移动定位中心的访问令牌,网关移动定位中心的访问令牌中包括第一定位服务信息。
通过第四方面提供的信息发送方法,网络存储功能实体可实现上述申请网关移动定位中心的访问令牌的过程,使得网关移动定位中心的访问令牌中预存储有第一定位服务信息。从而,方便第一设备(如接入和移动性管理功能实体或统一数据管理实体)从该网关移动定位中心的访问令牌中,获得到第一定位服务信息,使得第一设备能够确定是否能够提供被请求进行定位服务的终端设备的位置。由此,保证获取终端设备的位置信息的过程可控,尽可能地避免终端设备的位置泄露。
在一种可能的设计中,网络存储功能实体获得第一定位服务信息,包括:
网络存储功能实体从网关移动定位中心的证书中获得第一定位服务信息;
或者,网络存储功能实体从网关移动定位中心的注册文件中获得第一定位服务信息;
或者,网络存储功能实体从网关移动定位中心接收第一定位服务信息。
从而,为网络存储功能实体获得第一定位服务信息提供了多种渠道,可确保网络存储功能实体能够获得到第一定位服务信息,丰富了获得第一定位服务信息的具体实现方式。
在一种可能的设计中,在网络存储功能实体获得第一定位服务信息之前,该方法还包括:
网络存储功能实体从网关移动定位中心接收用于注册网关移动定位中心的请求;
网络存储功能实体获得第二定位服务信息,第二定位服务信息能够指示能提供终端设备位置的终端设备;
网络存储功能实体将第二定位服务信息写入到网关移动定位中心的注册文件中。
从而,在网络存储功能实体从网关移动定位中心的注册文件中获得第一定位服务信息的情况下,该网关移动定位中心可预先向网络存储功能实体请请求注册该网关移动定位中心,使得该网关移动定位中心的注册文件中预存储有该第一定位服务信息。由此,确保了该网络存储功能实体能够从该网关移动定位中心的注册文件中获得到该第一定位服务信息。
在一种可能的设计中,网络存储功能实体获得第二定位服务信息,包括:
网络存储功能实体从网关移动定位中心接收第二定位服务信息;
或者,网络存储功能实体从网关移动定位中心的证书中获得第二定位服务信息。
从而,在网络存储功能实体将第一定位服务信息写入网关移动定位中心的注册文件中的情况下,为网络存储功能实体获得第一定位服务信息提供了多种渠道,可确保网络存储功能实体能够获得到第一定位服务信息,丰富了获得第一定位服务信息的具体实现方式。
在一种可能的设计中,第一定位服务信息对应终端设备标识集,终端设备标识集中包括:能提供终端设备位置的终端设备的标识;网关移动定位中心的访问令牌中包括终端设备标识集;
和/或,
第一定位服务信息对应第一定位服务标识,第一定位服务标识用于标识第一设备对应的能提供终端设备位置的定位服务区域;网关移动定位中心的访问令牌中包括第一定位服务标识。
从而,为网络存储功能实体在网关移动定位中心的访问令牌中写入的第一定位服务信息的提供了多种表达方式,可确保第一设备能够获得到第一定位服务信息。
第五方面,本申请提供一种信息发送方法,包括:
接入和移动性管理功能实体从位置管理功能实体接收用于获取第二终端设备的相关定位参数或发送第二终端设备的位置信息的请求;
接入和移动性管理功能实体根据请求获得第二终端设备的第一验证信息;
接入和移动性管理功能实体在第二终端设备的第一验证信息与接入和移动性管理功能实体中的第二终端设备的第二验证信息相同时,发送第二终端设备的相关定位参数或第二终端设备的位置信息。
通过第五方面提供的信息发送方法,接入和移动性管理功能实体从位置管理功能实体接收一个请求,从而根据该请求能够确定被请求进行定位服务的终端设备为第二终端设备。
该接入和移动性管理功能实体在接收到该请求后,可获得该第二终端设备的第一验证信息,该第一验证信息能够唯一标识该第二终端设备。
由于该接入和移动性管理功能实体中预存储有:该网关移动定位中心需要该接入和移动性管理功能实体确定位置信息的那个或那些终端设备的第二验证信息。因此,该接入和移动性管理功能实体可确定该第二终端设备的第一验证信息与该第二终端设备的第二验证信息是否相同。
在该第二终端设备的第一验证信息与该第二终端设备的第二验证信息相同的情况下,该接入和移动性管理功能实体可确定该第二终端设备包含在该网关移动定位中心需要该接入和移动性管理功能实体确定位置信息的那些终端设备中。
从而,该接入和移动性管理功能实体可请求该接入和移动性管理功能实体,从该第二终端设备中获取该第二终端设备的相关定位参数。或者,该接入和移动性管理功能实体可请求该接入和移动性管理功能实体,向该网关移动定位中心转发该第二终端设备的位置信息。
在该第二终端设备的第一验证信息与该第二终端设备的第二验证信息不同的情况下,该接入和移动性管理功能实体可确定该第二终端设备不包含在该接入和移动性管理功能实体确定位置信息的那些终端设备中。
从而,该接入和移动性管理功能实体可拒接响应该接入和移动性管理功能实体发送的该请求。
综上,接入和移动性管理功能实体借助预先存储网关移动定位中心需要该接入和移动性管理功能实体确定位置信息的那些终端设备的验证信息,可在接收到位置管理功能实体发送的请求后,检查该请求对应的终端设备的验证信息与预存储的该终端设备的验证信息是否相同,来判断该终端设备包含在网关移动定位中心需要该接入和移动性管理功能实体确定位置信息的那些终端设备中,从而可屏蔽该位置管理功能实体发起的非法请求,使得确定和转发终端设备的位置信息的过程可控,避免了由于接入和移动性管理功能实体的恶意行为而导致终端设备位置的泄露,为终端设备的隐私检测提供了一种新的实现方式,降低了接入和移动性管理功能实体被攻击/控制后泄露UE位置带来的风险。
在一种可能的设计中,验证信息包括:第二终端设备的标识和/或上下文标识。
在一种可能的设计中,在接入和移动性管理功能实体从位置管理功能实体接收用于获 取第二终端设备的相关定位参数或发送第二终端设备的位置信息的请求之前,该方法还包括:
接入和移动性管理功能实体根据第二终端设备标记第二终端设备的第二验证信息;
接入和移动性管理功能实体向位置管理功能实体发送第二终端设备的标识;
接入和移动性管理功能实体从位置管理功能实体接收用于获取第二终端设备的相关定位参数或发送第二终端设备的位置信息的请求,该请求中包括:第二终端设备的标识;
接入和移动性管理功能实体根据第二终端设备的标识,获得第二终端设备的第一验证信息和第二终端设备的第二验证信息,以及确定第二终端设备的第二验证信息是否已标记;
接入和移动性管理功能实体在第二终端设备的第一验证信息与第二终端设备的第二验证信息相同,且第二终端设备的第二验证信息已标记时,发送第二终端设备的相关定位参数或第二终端设备的位置信息。
从而,通过标记网关移动定位中心需要该接入和移动性管理功能实体确定位置信息的那些终端设备的已存在的标识,为接入和移动性管理功能实体确定第二终端设备是否包含在网关移动定位中心需要该接入和移动性管理功能实体确定位置信息的那些终端设备中提供一种可行的实现方式,节省了接入和移动性管理功能实体的存储空间。在一种可能的设计中,验证信息包括:第二终端设备的状态标识和/或随机数。
在一种可能的设计中,在接入和移动性管理功能实体从位置管理功能实体接收用于获取第二终端设备的相关定位参数或发送第二终端设备的位置信息的请求之前,该方法还包括:
接入和移动性管理功能实体根据第二终端设备生成并保存第二终端设备的第二验证信息;
接入和移动性管理功能实体向位置管理功能实体发送第二终端设备的标识以及第二终端设备的第二验证信息;
接入和移动性管理功能实体从位置管理功能实体接收用于获取第二终端设备的相关定位参数或发送第二终端设备的位置信息的请求,该请求中包括:第二终端设备的标识以及第二终端设备的第一验证信息;
接入和移动性管理功能实体从该请求中获得第二终端设备的第一验证信息;
接入和移动性管理功能实体根据第二终端设备的标识,从AMF中获得第二终端设备的第二验证信息;
接入和移动性管理功能实体在第二终端设备的第一验证信息与第二终端设备的第二验证信息相同时,发送第二终端设备的相关定位参数或第二终端设备的位置信息。
从而,通过标记网关移动定位中心需要该接入和移动性管理功能实体确定位置信息的那些终端设备的新生成的标识,为接入和移动性管理功能实体确定第二终端设备是否包含在网关移动定位中心需要该接入和移动性管理功能实体确定位置信息的那些终端设备中提供又一种可行的实现方式。
在上述任意一个方面及该方面任意一种可能的设计中,第一定位服务信息用于标识如下中的至少一项:网关移动定位中心的归属区域、网关移动定位中心的网络服务区域、网关移动定位中心的归属运营商、网关移动定位中心的归属企业、终端设备的归属区域、终端设备的归属企业、终端设备的业务应用、或者终端设备的接入网络区域。
在上述任意一个方面及该方面任意一种可能的设计中,第一定位服务信息包括如下中的至少一项:网关移动定位中心的边缘区域标识、网关移动定位中心的标识、网关移动定位中心的实例标识、网关移动定位中心的网络协议地址、网关移动定位中心的网络端口、接入和移动性管理功能实体/统一数据管理实体的标识、终端设备的标识、终端设备的应用标识、应用功能实体标识、应用服务器标识、终端设备的客户端标识、终端设备与归属运营商所签约的区域标识、终端设备所注册的区域标识、终端设备的归属企业标识、终端设备所接入的网络切片标识、终端设备的跟踪区域标识、终端设备所接入的小区区域标识、或者终端设备的地理位置信息。
第六方面,本申请提供一种信息发送装置,包括:用于执行上述任意一个方面及该方面任意一种可能的设计中的信息发送方法的模块。
第七方面,本申请提供一种信息发送系统,包括:前述各个设备中的两个或两个以上的网元,每个网元用于执行上述方案中与该网元对应的一个方面及该方面任意一种可能的设计中的信息发送方法。
第八方面,本申请提供一种信息发送装置,包括:存储器和处理器;存储器用于存储程序指令;处理器用于调用存储器中的程序指令使得信息发送装置执行上述任意一个方面及该方面任意一种可能的设计中的信息发送方法。
第九方面,本申请提供一种芯片,包括:接口电路和逻辑电路,接口电路用于接收来自于芯片之外的其他芯片的信号并传输至逻辑电路,或者将来自逻辑电路的信号发送给芯片之外的其他芯片,逻辑电路用于实现上述任意一个方面及该方面任意一种可能的设计中的信息发送方法。
第十方面,本申请提供一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器使得信息发送装置执行时实现上述任意一个方面及该方面任意一种可能的设计中的信息发送方法。
第十一方面,本申请提供一种计算机程序产品,包括:执行指令,执行指令存储在可读存储介质中,信息发送装置的至少一个处理器可以从可读存储介质读取执行指令,至少一个处理器执行指令使得信息发送装置实现上述任意一个方面及该方面任意一种可能的设计中的信息发送方法。
附图说明
图1为一种相关技术中5G LCS业务流程的信令交互图;
图2-图4为本申请一实施例提供的一种LCS系统的架构示意图;
图5为本申请一实施例提供的一种信息发送方法的流程示意图;
图6为本申请一实施例提供的一种信息发送方法的信令交互图;
图7为本申请一实施例提供的一种信息发送方法的信令交互图;
图8为本申请一实施例提供的一种信息发送方法的信令交互图;
图9为本申请一实施例提供的一种信息发送方法的信令交互图;
图10为本申请一实施例提供的一种信息发送方法的信令交互图;
图11为本申请一实施例提供的一种信息发送方法的信令交互图;
图12为本申请一实施例提供的一种信息发送方法的信令交互图;
图13为本申请一实施例提供的一种信息发送方法的信令交互图;
图14为本申请一实施例提供的一种信息发送装置的硬件结构示意图。
具体实施方式
本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,单独a,单独b或单独c中的至少一项(个),可以表示:单独a,单独b,单独c,组合a和b,组合a和c,组合b和c,或组合a、b和c,其中a,b,c可以是单个,也可以是多个。此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性。术语“中心”、“纵向”、“横向”、“上”、“下”、“左”、“右”、“前”、“后”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本申请和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本申请的限制。
请参阅图1,图1示出了一种相关技术中5G LCS业务流程的信令交互图。
如图1所示,相关技术中,5G LCS业务流程所涉及的设备可以包括:网络客户端、终端设备、以及LCS系统。
其中,网络客户端,也可称外部客户端(external client),如LCS客户端(client)。
其中,终端设备可以是无线终端,也可以是有线终端,无线终端可以是指向用户提供语音和/或其他业务数据连通性的设备,具有无线连接功能的手持式设备、或连接到无线调制解调器的其他处理设备。无线终端可以经无线接入网(radio access network,RAN)与一个或多个核心网进行通信,无线终端可以是移动终端,如移动电话(或称为“蜂窝”电话)和具有移动终端的计算机,例如,可以是便携式、袖珍式、手持式、计算机内置的或者车载的移动装置,它们与无线接入网交换语言和/或数据。例如,个人通信业务(personal communication service,PCS)电话、无绳电话、会话发起协议(session initiation protocol,SIP)话机、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、无人机、可穿戴设备、车联网中的终端等设备。无线终端也可以称为系统、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、移动台(mobile)、远程站(remote station)、远程终端(remote terminal)、接入终端(access terminal)、用户终端(user terminal)、用户代理(user agent)、用户设备(user device or user equipment)、用户设备(user equipment,UE),在此不作限定。此外,终端设备可以采用Android系统、Linux系统、Windows系统、iOS系统、鸿蒙操作系统(harmony operating system,鸿蒙OS)等移动操作系统,本申请对此不做限定。为了便于说明,本申请中终端设备以UE为例进行表示。
其中,LCS系统可以包括:接入和移动性管理功能实体(access and mobility management function,AMF)、统一数据管理实体(unified data management,UDM)、位置管理功能 实体(location management function,LMF)、GMLC、NG无线接入网(N generation radio access network,NG-RAN,如5G-RAN)以及其他网元(即网络功能实体(network function,NF)。另外,LCS系统还可包括:网络存储功能实体(network repository function,NRF)。
GMLC是网络客户端在5G核心网(5G core network,5GC)中访问的第一个网元节点。GMLC可分别与AMF、UDM、NRF以及网络客户端通信连接。NRF可分别与GMLC以及UDM通信连接。
UDM主要负责管理用户签约上下文信息,如UDM中存储有各个UE的路由信息和签约信息等信息。UDM可分别与AMF、GMLC以及NRF通信连接。
AMF主要负责用户接入和移动性管理,如AMF可作为GMLC和LMF以及LMF与UE之间的通信桥梁。AMF可分别与NG-RAN、UE、LMF、GMLC以及UDM通信连接。
LMF主要负责管理UE位置所需资源的整体协调和调度,如LMF可通过AMF从GMLC中获得用于请求UE的LCS的请求,还可通过AMF从UE中获得UE的相关定位参数。
LMF还负责计算或验证UE的如位置、速度或对应精度等位置信息。
NG-RAN可提供UE与5GC之间的通信连接,如UE与AMF之间的通信连接。NG-RAN可分别与AMF以及UE通信连接。
继续结合图1,相关技术中,5G LCS业务流程可以包括如下步骤:
S11、网络客户端向GMLC发送LCS Service Request(LCS请求)。
其中,LCS Service Request中包括:UE的标识符,如用户永久标识(subscription permanent identifier,SUPI)或一般公共订阅标识符(generic public subscription identifier,GPSI)等。
S12、GMLC向UDM发送Nudm_UECM_Get Request。
其中,Nudm_UECM_Get Request中包括:UE的标识符。
S13、UDM向GMLC发送Nudm_UECM_Get Response。
其中,Nudm_UECM_Get Response中包括:LCS隐私配置文件以及为UE服务的AMF的网络地址。
经过S13后,GMLC可进行网络客户端与UE的隐私检测,可包括如下实现过程:
GMLC根据LCS隐私配置文件,可确定是否允许网络客户端访问。
其中,LCS隐私配置文件作为UE的签约信息的一部分,主要包含:Universal Class、Call/Session related Class、Call/Session unrelated Class和PLMN Operator Class四类集合。
从而,GMLC是从网络客户端的粒度,来确定LCS隐私配置文件是否标识允许网络客户端访问的。例如,允许所有LCS客户端访问、需要额外的用户确认后访问、或者运营商归属的网络客户端可以访问等。
并且,GMLC根据LPI指示符,可确定是否允许网络客户端请求UE的LCS。
其中,GMLC通过Nudm_SDM_Get服务,可获得UE的标识符。GMLC根据UE的标识符,可确定UE的LPI标识符。
从而,GMLC可确定UE的LPI标识符是否标识允许网络客户端请求UE的LCS。
综上,GMLC在确定LCS隐私配置文件标识允许网络客户端访问,以及UE的LPI指示符标识允许网络客户端请求UE的LCS后,可确定能为网络客户端提供UE的LCS。
S14、GMLC在确定能为网络客户端提供UE的LCS后,根据为UE服务的AMF的网络地址,确定AMF,并向AMF发送Namf_Location_ProvidePositioningInfo Request。
其中,Namf_Location_ProvidePositioningInfo Request中包括:UE的标识符以及LCS的相关参数。
S15、在UE处于连接管理空闲(connection management,CM IDLE)态的情况下,AMF发起Network Triggered Service Request(网络触发服务请求)。
S16、AMF根据本地配置或者获得到的用于选择LMF的相关信息,可选择合适的LMF。
其中,用于选择LMF的相关信息可以包括但不限于:网络客户端的类型、请求的服务质量信息(如LCS的精度、延迟时间等)、或者接入类型(如采用3GPP接入或者非3GPP接入)等中的至少一项。
S17、AMF向LMF发送Nlmf_Location_DetemineLocation Request。
其中,Nlmf_Location_DetemineLocation Request中包括:LCS的相关参数。
S18、LMF确定UE的位置信息(positioning)。
S19、LMF向AMF发送Nlmf_Location_DetemineLocation Response。
其中,Nlmf_Location_DetemineLocation Response中包括:UE的位置信息。
S20、AMF向GMLC发送Namf_Location_ProvidePositioningInfo Response。
其中,Namf_Location_ProvidePositioningInfo Response中包括:UE的位置信息。
S21、GMLC向网络客户端发送LCS Service Response(LCS响应)。
其中,LCS Service Response中包括:UE的位置信息。
基于上述描述,GMLC主要考虑的是网络客户端以及UE,与LCS请求之间的对应关系,但没有考虑网络客户端向GMLC请求UE的LCS的该UE,与该GMLC能提供UE的LCS的UE区域之间的匹配关系,即请求UE的LCS的该UE是否在GMLC能提供UE的LCS的这些UE中,也没有考虑网络客户端向GMLC请求UE的LCS的该GMLC,与提供该UE的LCS的GMLC区域之间的匹配关系,即GMLC从网络客户端接收UE的LCS的该GMLC是否在能提供该UE的LCS的这些GMLC中。因此,GMLC进行网络客户端与UE的隐私检测的判定过程是粗粒度的,从而可能会造成UE位置的泄露。
其中,对于设置在某个区域的GMLC,GMLC可以向网络客户端提供位于该区域的UE的位置信息。从安全等方面考虑,这类GMLC原则上不能获取位于除该区域之外的其他区域的UE的位置信息。但基于图1实施例的相关方案,并不能防止这类GMLC获取位于其他区域的UE的位置信息,导致位于其他区域的UE的位置信息很容易被非法获取,从而造成UE位置的泄露。
另外,如果GMLC被恶意控制,则很容易绕过上述的GMLC进行网络客户端与UE的隐私检测的判定过程,如可通过核心网区域的开放接口(如服务化接口(service based interface,SBI接口)请求任意UE的位置信息,导致任意UE的位置信息很容易被非法获取,从而造成大范围UE位置的泄露。
为了解决上述问题,本申请提供一种信息发送方法,可新增LCS信息,来检查请求UE位置的UE以及LCS系统中能提供UE位置的GMLC之间的归属是否相匹配,能够可控地获取UE的位置信息,避免UE位置的泄露,降低GMLC被攻击后泄露UE位置带来的风险。其中,本申请的信息发送方法可在LCS系统中的任意一个网元中执行,也可在 LCS系统中的多个网元中执行,本申请对执行该方法的网元的数量和类型不做限定。为了便于说明,本申请执行本申请的信息发送方法的一个网元以第一设备为例进行示意。
其中,LCS信息能够指示能提供UE位置的UE,使得LCS系统中的第一设备通过LCS信息,可确定是否能够向请求UE位置的UE提供该UE的位置。前述的UE位置可理解为:UE的LCS,即允许位置请求设备向LCS系统中的GMLC请求该UE的位置,以及允许LCS系统中的GMLC向位置请求设备提供该UE的位置信息。
其中,位置请求设备可包括但不限于:网络客户端、应用功能实体(application function,AF)、或网络数据分析功能实体(network data analytics function,NWDAF)等。
综上,基于LCS系统的架构、位置请求设备、UE以及实际情况等因素的综合考虑,新增的LCS信息可用于标识LCS系统中的每个GMLC能提供UE位置的UE区域,或者,可用于标识每个UE请求UE位置的GMLC区域。
考虑到GMLC能提供UE位置的UE区域常常归属于LCS系统的某个区域,如边缘区域、如核心网区域、如边缘区域中的某个子区域、如核心网区域中的某个子区域,即UE区域的归属是确定的/固定的。可见,GMLC能提供UE位置的UE区域的归属也是确定的/固定的。
因此,LCS信息可以用于标识:GMLC的归属区域(region)、GMLC的网络服务区域、GMLC的归属运营商、GMLC的归属企业、UE的归属区域(region)、UE的归属企业、UE的业务应用(application,APP)、或者UE的接入网络区域中的至少一项。
其中,本申请对LCS信息的具体实现方式不做限定。
在一些实施例中,LCS信息可以包括:GMLC的边缘区域标识(region ID)、GMLC的标识(ID)、GMLC的实例标识(instance ID)、GMLC的网络协议地址IP、GMLC的网络端口port、AMF/UDM的标识(NF instance ID)、UE的标识(如SUPI、IMSI等)、UE的应用标识(APP ID)、应用功能实体标识(AF ID)、应用服务器标识(Application Server(AS)ID)、UE的客户端标识(Client ID)、UE与归属运营商所签约的区域标识、UE所注册的区域标识、UE的归属企业标识、UE所接入的网络切片标识(如NSSAI,S-NSSAI)、UE的跟踪区域标识(TA(tracking area)range)、UE所接入的小区区域标识(cell range)、或者UE的地理位置信息中的至少一项。其中,LCS系统可适用于各式各样的LCS场景,如边缘LCS场景。
下面,结合图2-图4,详细介绍边缘LCS场景中的LCS系统的各种实现方式。
请参阅图2-图4,图2-图4示出了本申请一实施例提供的一种LCS系统的架构示意图。为了便于说明,图2-图4中,位置请求设备采用LCS客户端进行举例示意。
边缘LCS场景中,可将LCS系统的归属区域划分为:核心网区域和边缘区域。
如图2所示,AMF、UDM以及NRF位于LCS系统的核心网区域。LMF和GMLC位于LCS系统的边缘区域。
如图3所示,LCS系统还可包括:5GC代理实体(proxy)。AMF、UDM、NRF以及5GC proxy位于LCS系统的核心网区域。LMF和GMLC位于LCS系统的边缘区域。
其中,LMF/GMLC与AMF/UDM/NRF不再直接通信连接,而是需要通过5GC proxy进行通信连接。
如图4所示,LCS系统还可包括:LMF proxy和GMLC proxy。AMF、UDM、NRF、 LMF以及GMLC位于LCS系统的核心网区域。LMF proxy和GMLC proxy位于LCS系统的边缘区域。
其中,GMLC与位置请求设备不再直接通信连接,而是需要通过GMLC proxy进行通信连接。LMF proxy通过LMF与AMF通信连接。
另外,在图2-图4中,LCS系统还可包括:网络能力开放功能实体(network exposure function,NEF)。NEF主要负责向位置请求设备提供访问的接口,获取网络或UE的一系列状态,或用于调整优化网络性能,影响用户行为等。
NEF位于LCS系统的边缘区域。其中,GMLC与位置请求设备不再直接通信连接,而是需要通过NEF进行通信连接。
需要说明的是,本申请包括但不限于上述的边缘LCS场景。例如,LMF和GMLC中的任意一个网元位于LCS系统的边缘区域。
其中,LCS系统中的第一设备可以为:AMF、UDM、或者GMLC或NEF或GMLC proxy。
基于前述描述,本申请以下实施例将以具有图2-图4所示的LCS系统中的第一设备为例,结合附图和应用场景,对本申请提供的信息发送方法进行详细阐述。
请参阅图5,图5示出了本申请一实施例提供的一种信息发送方法的流程示意图。
如图5所示,本申请提供的信息发送方法可以包括:
S101、第一设备接收第一UE的标识。
其中,第一UE的标识用于唯一标识第一UE。本申请对第一UE的标识的具体实现方式不做限定。例如,第一UE的标识可以为第一UE的SUPI或GPSI。另外,前述第一UE的数量可为一个或多个。在多个UE的情况下,多个UE的类型可相同或不同。
从而,第一设备根据第一UE的标识,可确定位置请求设备向LCS系统中的GMLC请求第一UE的位置,即可确定位置请求设备请求进行定位服务的UE为第一UE。
比如,在位置请求设备请求某个/某些UE的LCS的情况下,第一设备需要知道具体是哪个/哪些UE被请求了LCS。
S102、第一设备获得第一LCS信息,第一LCS信息能够指示能提供UE位置的UE。
其中,第一LCS信息的具体实现方式可参见前文提及的LCS信息的描述,能提供UE位置的具体实现方式可参见前文提及的描述,此处不再赘述。
从而,第一设备根据第一LCS信息,可确定第一设备对应的GMLC能提供UE位置的UE区域,或者,可确定第一UE请求UE位置的GMLC区域。
也就是说,第一设备可确定与第一设备对应的GMLC具体能够为哪些UE提供LCS,即该GMLC允许位置请求设备请求哪些终端设备的定位服务,或者,第一设备可确定具体是哪个GMLC能够为第一UE提供LCS,即被位置请求设备端请求了LCS的第一UE允许被哪个GMLC提供LCS。
需要说明的是,在第一设备为GMLC时,第一设备对应的GMLC即GMLC。在第一设备不为GMLC时,第一设备对应的GMLC即LCS系统中的除了GMLC之外的其他网元。
S103、第一设备在根据第一LCS信息以及第一UE的标识确定能够提供第一UE的位置后,发送第一UE的位置对应的信息。
基于S102的描述可知,被请求进行LCS的第一UE与提供LCS的第一设备对应的 GMLC需要相匹配,即第一UE需要在第一设备对应的GMLC能够提供定位服务的UE区域中,或者,第一设备对应的GMLC需要在第一UE能够被提供定位服务的GMLC区域中。
第一设备根据第一LCS信息以及第一UE的标识,可检测请求UE位置的第一UE与能提供UE位置的第一设备对应的GMLC之间的归属是否相匹配,即确定第一UE是否在第一设备对应的GMLC能提供UE信息的这些UE中,或者,可确定第一设备对应的GMLC是否在能提供第一UE的信息的这些GMLC中,来确定是否能够提供第一UE的位置。
从而,第一设备在确定能够提供第一UE的位置后,可发送第一UE的位置对应的信息。
其中,第一UE的位置对应的信息可为第一UE的位置信息,也可为用于请求第一UE的位置信息的相关信息,本申请对此不做限定。
本申请提供的信息发送方法,通过第一设备接收第一UE的标识,可根据第一UE的标识确定请求UE位置的第一UE。第一设备获得第一LCS信息,第一LCS信息能够指示能提供UE位置的UE,可根据第一LCS信息确定第一设备对应的GMLC能提供UE位置的UE区域,或者,可根据第一LCS信息确定第一UE请求UE位置的GMLC区域。由此,第一设备根据第一LCS信息和第一UE的标识,可检查第一UE与第一设备对应的GMLC之间的归属是否匹配,来确定是否能够提供第一UE的位置。第一设备在确定能够提供第一UE的位置后,可发送第一UE的位置对应的信息。
从而,基于LCS业务流程中的请求UE位置的UE以及LCS系统中的能提供UE位置的GMLC之间的归属相匹配,能够可控地获取UE的位置信息,为UE的隐私检测提供了一种新的实现方式,尽可能地避免了UE位置的泄露,降低了LCS系统中的网元被攻击后泄露UE位置带来的风险。
下面,结合第一设备的不同实现方式,分别介绍本申请的信息发送方法。
请参阅图6,图6示出了本申请一实施例提供的一种信息发送方法的信令交互图。
如图6所示,在第一设备为AMF时,本申请提供的信息发送方法可以包括:
S201、GMLC向AMF发送第一UE的标识。
其中,上述的GMLC为第一设备对应的GMLC,即AMF对应的GMLC。AMF对应的GMLC可以理解为:与AMF属于同一个LCS系统,且能够向AMF请求第一UE的位置信息的GMLC。AMF对应的GMLC可向AMF发送第一UE的标识。
其中,AMF对应的GMLC可将第一UE的标识携带在请求1中并将请求1发送给AMF。从而,AMF可从请求1中获得第一UE的标识。本申请对请求1的具体实现方式不做限定。例如,请求1可采用图1所示的S14中的Namf_Location_ProvidePositioningInfo Request。
S202、AMF获得第一LCS信息。
其中,本申请对AMF获得第一LCS信息的具体实现方式不做限定。
在一些实施例中,针对LCS系统中的任意一个GMLC而言,该GMLC能提供UE位置的UE区域可能归属于LCS系统中的一个或多个区域,故,该GMLC可对应于一个或多个LCS信息。
基于上述描述,LCS系统可预配置每个GMLC与每个GMLC对应的LCS信息之间的对应关系。其中,前述的对应关系可采用如表格、数组、键值对等方式进行表示或存储。
从而,AMF根据预配置的每个GMLC与每个GMLC对应的LCS信息之间的对应关系,可获得AMF对应的GMLC对应的LCS信息,即第一LCS信息。
在另一些实施例中,AMF对应的GMLC的证书中可预存储AMF对应的GMLC对应的第一LCS信息。从而,AMF可从AMF对应的GMLC的证书中,获得第一LCS信息。
在另一些实施例中,AMF对应的GMLC的访问令牌(access token)中可预写入AMF对应的GMLC对应的第一LCS信息。从而,AMF可从AMF对应的GMLC的访问令牌中,获得第一LCS信息。
其中,AMF对应的GMLC可将AMF对应的GMLC的访问令牌携带在请求2中并将请求2发送给AMF。从而,AMF可从请求2中获得第一LCS信息。本申请对请求2的具体实现方式不做限定。
另外,请求2可与请求1为同一个请求,也可与请求1为不同的请求。需要说明的是,在请求2与请求1采用同一个请求时,该请求中包括:第一UE的标识以及AMF对应的GMLC的访问令牌。
在另一些实施例中,AMF对应的GMLC可向AMF发送第一LCS信息。
其中,AMF对应的GMLC可将第一LCS信息携带在请求3中并将请求3发送给AMF。从而,AMF可从请求3中获得第一LCS信息。本申请对请求3的具体实现方式不做限定。
另外,请求3可与请求1为同一个请求,也可与请求1为不同的请求。需要说明的是,在请求3与请求1采用同一个请求时,该请求中包括:第一UE的标识以及第一LCS信息。
综上,AMF可获得第一LCS信息。
S203、AMF在根据第一LCS信息以及第一UE的标识确定能够提供第一UE的位置后,向GMLC发送第一UE的位置信息。
AMF可采用多种方式,确定是否能够提供第一UE的位置。
针对任意一个LCS信息而言,该LCS信息所标识的GMLC能提供UE位置的UE区域是确定的/固定的。故,LCS信息可采用UE标识集(UE ID range)进行表示,UE标识集中包括:能提供UE位置的各个UE的标识。
在一些实施例中,第一LCS信息对应UE标识集,UE标识集中包括:能提供UE位置的UE的标识;UE标识集中包括第一UE的标识。
也就是说,AMF可获得第一LCS信息对应的UE标识集。其中,该UE标识集包括:能提供UE位置的UE的标识。
从而,AMF可确定该UE标识集中是否包括第一UE的标识。AMF在确定该UE标识集中包括第一UE的标识后,可确定能够提供第一UE的位置。
其中,本申请对AMF获得第一LCS信息对应的UE标识集的具体实现方式不做限定。
可选地,UE标识集是根据第一LCS信息以及预配置的LCS信息与对应的UE标识集之间的匹配关系获得的。
LCS系统可在AMF或UDM中预配置每个LCS信息与每个LCS信息对应的UE标识集之间的匹配关系。其中,前述的匹配关系可采用如表格、数组、键值对等方式进行表示。
基于上述描述,AMF根据预配置的LCS信息与该LCS信息对应的UE标识集之间的匹配关系,可获得与第一LCS信息相匹配的UE标识集,即第一LCS信息对应的UE标识集。
或者,AMF可从UDM获得UE标识集。
其中,AMF可向UDM发送第一LCS信息。UDM根据第一LCS信息以及预配置的LCS信息与该LCS信息对应的UE标识集之间的匹配关系,可获得与第一LCS信息相匹配的UE标识集,即第一LCS信息对应的UE标识集。UDM可向AMF发送第一LCS信息对应的UE标识集,使得AMF可获得第一LCS信息对应的UE标识集。
例如,AMF可将第一LCS信息携带在请求4中并将请求4发送给UDM。UDM可将第一LCS信息对应的UE标识集携带在响应4中并将响应4发送给AMF。从而,AMF从响应4中获得第一LCS信息对应的UE标识集。本申请对请求4和响应4的具体实现方式不做限定。
可选地,UE标识集是从与第一LCS信息对应的GMLC的访问令牌中获得的。
每个GMLC与每个GMLC对应的LCS信息相对应,且每个GMLC的访问令牌中可预写入与每个GMLC相匹配的UE标识集。
从而,AMF可根据第一LCS信息,确定与第一LCS信息对应的GMLC的访问令牌,即AMF对应的GMLC的访问令牌。AMF便可从该与第一LCS信息对应的GMLC的访问令牌中,获取到第一LCS信息对应的UE标识集。
可选地,UE标识集是从GMLC的访问令牌中的与第一LCS信息对应的UE标识集。
每个GMLC的访问令牌中可预写入与每个LCS信息相匹配的UE标识集。
从而,AMF可从AMF对应的GMLC的签约信息中,获得与第一LCS信息相匹配的UE标识集,即第一LCS信息对应的UE标识集。
需要说明的是,在第一LCS信息是从AMF对应的GMLC的访问令牌中获得的情况下,AMF通常不会从AMF对应的GMLC的访问令牌中获得第一LCS信息对应的UE标识集,而会采用上述的其他方式获得该UE标识集。
从而,AMF可获得第一LCS信息对应的UE标识集。
综上,AMF通过检查第一UE的标识是否在与第一LCS信息相匹配的UE标识集中,可确定是否能够提供第一UE的位置。
例如,针对第一LCS信息而言,LCS系统中预配置有:与LCS信息1对应的UE标识集1为:从01000001遍历至01099999的集合,与LCS信息2对应的UE标识集2为:从075500001遍历至075599999的集合。
假设第一UE的标识为075508888。那么,在第一LCS信息为LCS信息1的情况下,AMF可确定与第一LCS信息对应的UE标识集为UE标识集1。在第一LCS信息为LCS信息2的情况下,AMF可确定与第一LCS信息对应的UE标识集为UE标识集2。
从而,AMF可判断075508888是否包含在上述过程所确定的UE标识集中,来确定是否能够提供第一UE的位置。
除了UE标识集之外,针对任意一个LCS信息而言,该LCS信息所标识的能提供UE位置的GMLC区域是确定的/固定的。基于此,LCS信息可采用LCS标识(region ID)进行表示,用于标识能提供UE位置的LCS区域。
其中,针对LCS系统中的任意一个GMLC而言,LCS标识用于标识该GMLC对应的能提供UE位置的LCS区域,这里的LCS区域可以包括该GMLC以及UE位置对应的UE区域。针对任意一个UE而言,LCS标识用于标识能提供该UE的位置的LCS区域,这里 的LCS区域可以包括该UE以及能提供该UE的位置的GMLC区域。
在一些实施例中,第一LCS信息对应第一LCS标识,第一LCS标识用于标识第一设备对应的能提供UE位置的LCS区域。
也就是说,AMF可获得第一LCS信息对应的第一LCS标识,第一LCS标识用于标识AMF对应的GMLC能提供UE位置的LCS区域,即标识AMF对应的GMLC以及AMF对应的GMLC能提供UE位置的UE区域。
AMF根据第一UE的标识,可通过UDM从第一UE的签约信息中获得第二LCS标识,第二LCS标识用于标识能够提供第一UE的位置的LCS区域,即标识第一UE以及第一UE请求UE位置的GMLC区域。
其中,AMF可向UDM发送第一UE的标识。UDM根据第一UE的标识,可确定第一UE的签约信息,并从第一UE的签约信息中获得第二LCS标识。UDM可向AMF发送第二LCS标识。
例如,AMF可将第一UE的标识携带在请求5中并将请求5发送给UDM。UDM可将第二LCS标识携带在响应5中并将响应5发送给AMF。从而,AMF可从响应5中获得第二LCS标识。本申请对请求5和响应5的具体实现方式不做限定。
从而,AMF可确定第一LCS标识与第二标识LCS是否相同,来确定是否能够提供第一UE的位置。AMF在确定第一LCS标识与第二标识LCS相同后,可确定能够提供第一UE的位置。
综上,AMF通过检查第一LCS标识与第一UE的标识对应的第二LCS标识是否相同,可确定是否能够提供第一UE的位置。
例如,LCS系统中预配置有:UE 1的签约信息中包括:用于标识北京的LCS标识1,UE 2的签约信息中包括:用于标识深圳的LCS标识2。
假设第一UE的标识为075508888,第一LCS标识为用于标识深圳的LCS标识2。那么,在第一UE的标识对应的UE为UE 1的情况下,AMF可从UE 1的签约信息中获得第二LCS标识为LCS标识1。在第一UE的标识对应的UE为UE 2的情况下,AMF可从UE 2的签约信息中获得第二LCS标识为LCS标识2。
从而,AMF可判断第一LCS标识与第二LCS标识是否相同,来确定是否能够提供第一UE的位置。
需要说明的是,除了上述实现方式之外,AMF还可从UDM获得用于确定是否能够提供第一UE的位置的判断结果。
在一些实施例中,AMF可向UDM发送请求6,请求6中包括第一UE的标识,使得UDM获得第一UE的标识。UDM还可获得第一LCS信息,其具体实现方式可参见图7中UDM获得第一LCS信息的描述,此处不做赘述。
UDM根据第一LCS信息和第一UE的标识,可确定AMF是否能够提供第一UE的位置。UDM向AMF发送响应6,响应6用于指示AMF是否能够提供第一UE的位置。在响应6用于指示AMF能够提供第一UE的位置时,AMF可向GMLC发送第一UE的位置信息。在响应6用于指示AMF不能提供第一UE的位置时,AMF可不向GMLC发送第一UE的位置信息。
其中,本申请对请求6和响应6的具体实现方式不做限定。
本申请中,AMF是LCS业务流程中的一个重要参与的网元。AMF在AMF对应的GMLC向AMF请求第一UE的位置信息之后,和/或,在AMF向AMF对应的GMLC发送第一UE的位置信息之前,可根据第一LCS信息以及第一UE的标识,确定是否能够提供第一UE的位置,来检查第一UE与AMF对应的GMLC之间的归属是否相匹配。
在确定能够提供第一UE的位置后,AMF可向AMF对应的GMLC发送第一UE的位置信息,保证AMF对应的GMLC通过AMF获取第一UE的位置信息的过程可控。在确定不能提供第一UE的位置后,AMF不会向AMF对应的GMLC发送第一UE的位置信息,确保AMF对应的GMLC无法通过AMF非法获取第一UE的位置信息,有效避免了UE位置的泄露。
请参阅图7,图7示出了本申请一实施例提供的一种信息发送方法的信令交互图。
如图7所示,在第一设备为UDM时,本申请提供的信息发送方法可以包括:
S301、GMLC向UDM发送接收第一UE的标识。
其中,上述的GMLC为第一设备对应的GMLC,即UDM对应的GMLC。UDM对应的GMLC可以理解为:与UDM属于同一个LCS系统,且能够向UDM请求为第一UE服务的AMF的信息的GMLC。
UDM对应的GMLC可向UDM发送第一UE的标识。其中,UDM对应的GMLC可将第一UE的标识携带在请求7中并将请求7发送给UDM。从而,UDM可从请求7中获得第一UE的标识。本申请对请求7的具体实现方式不做限定。例如,请求7可采用图1所示的S12中的Nudm_UECM_Get Request。或者,请求7可采用一个新增的请求,如Nudm_LCS_Check Request。
S302、UDM获得第一LCS信息。
其中,S302中的UDM获得第一LCS信息的具体实现方式与图6的S202中的AMF获得第一LCS信息的实现方式类似,此处不再赘述。
S303、UDM在根据第一LCS信息以及第一UE的标识确定能够提供第一UE的位置后,向GMLC发送为第一UE服务的AMF的信息。
其中,为UE服务的AMF的信息用于GMLC请求第一UE的位置信息。为第一UE服务的AMF的信息可理解为:UDM对应的GMLC根据AMF的信息能够请求第一UE的位置信息。本申请对为第一UE服务的AMF的信息的具体实现方式不做限定。例如,为第一UE服务的AMF的信息可包括AMF的网络地址等。
基于S203实施例的描述,UDM可采用多种方式,确定是否能够提供第一UE的位置。
在一些实施例中,第一LCS信息对应UE标识集,UE标识集中包括:能提供UE位置的UE的标识;UE标识集中包括第一UE的标识。
也就是说,UDM可获得第一LCS信息对应的UE标识集。其中,该UE标识集包括:能提供UE位置的UE的标识。
从而,UDM可确定该UE标识集中是否包括第一UE的标识。UDM在确定该UE标识集中包括第一UE的标识后,可确定能够提供第一UE的位置。
其中,本申请对UDM获得第一LCS信息对应的UE标识集的具体实现方式不做限定。
可选地,UE标识集是根据第一LCS信息以及预配置的LCS信息与对应的UE标识集之间的匹配关系获得的。
LCS系统可在UDM中预配置每个LCS信息与每个LCS信息对应的UE标识集之间的匹配关系。其中,前述的匹配关系可采用如表格、数组、键值对等方式进行表示。
从而,UDM根据预配置的LCS信息与该LCS信息对应的UE标识集之间的匹配关系,可获得与第一LCS信息相匹配的UE标识集,即第一LCS信息对应的UE标识集。
可选地,UE标识集是从与第一LCS信息对应的GMLC的访问令牌中获得的。
每个GMLC与每个GMLC对应的LCS信息相对应,且每个GMLC的访问令牌中可预写入与每个GMLC相匹配的UE标识集。
从而,UDM可根据第一LCS信息,确定与第一LCS信息对应的GMLC的访问令牌,即UDM对应的GMLC的访问令牌。UDM便可从该与第一LCS信息对应的GMLC的访问令牌中,获取到第一LCS信息对应的UE标识集。
可选地,UE标识集是从GMLC的访问令牌中的与第一LCS信息对应的UE标识集。
每个GMLC的访问令牌中可预写入与每个LCS信息相匹配的UE标识集。
从而,UDM可从UDM对应的GMLC的签约信息中,获得与第一LCS信息相匹配的UE标识集,即第一LCS信息对应的UE标识集。
需要说明的是,在第一LCS信息是从UDM对应的GMLC的访问令牌中获得的情况下,UDM通常不会从UDM对应的GMLC的访问令牌中获得第一LCS信息对应的UE标识集,而会采用上述的其他方式获得该UE标识集。
综上,UDM通过检查第一UE的标识是否在与第一LCS信息相匹配的UE标识集中,可确定是否能够提供第一UE的位置。
在另一些实施例中,第一LCS信息对应第一LCS标识,第一LCS标识用于标识第一设备对应的能提供UE位置的LCS区域。
也就是说,UDM可获得第一LCS信息对应的第一LCS标识,第一LCS标识用于标识UDM对应的GMLC能提供UE位置的LCS区域,即标识UDM对应的GMLC以及UDM对应的GMLC能提供UE位置的UE区域。
UDM根据第一UE的标识,可确定第一UE的签约信息,并从第一UE的签约信息中获得第二LCS标识,第二LCS标识用于标识能够提供第一UE的位置的LCS区域,即标识第一UE以及第一UE请求UE位置的GMLC区域。
从而,UDM可确定第一LCS标识与第二标识LCS是否相同,来确定是否能够提供第一UE的位置。UDM在确定第一LCS标识与第二LCS标识相同后,可确定能够提供第一UE的位置。
综上,UDM通过检查第一LCS标识与第一UE的标识对应的第二LCS标识是否相同,可确定是否能够提供第一UE的位置。
本申请中,UDM是LCS业务流程中的一个重要参与的网元。UDM在UDM对应的GMLC向UDM请求为第一UE服务的AMF的信息之后,可根据第一LCS信息以及第一UE的标识,确定是否能够提供第一UE的位置,来检查第一UE与UDM对应的GMLC之间的归属是否相匹配。
在确定能够提供第一UE的位置后,UDM可向UDM对应的GMLC发送为第一UE服务的AMF的信息,有助于UDM对应的GMLC确定出为第一UE服务的AMF,保证UDM对应的GMLC通过AMF获取第一UE的位置信息的过程可控。在确定不能提供第一 UE的位置后,UDM不会向UDM对应的GMLC发送为第一UE服务的AMF的信息,确保UDM对应的GMLC无法通过AMF非法获取第一UE的位置信息,有效避免了UE位置的泄露。
请参阅图8,图8示出了本申请一实施例提供的一种信息发送方法的信令交互图。
如图8所示,在第一设备为GMLC时,本申请提供的信息发送方法可以包括:
S401、位置请求设备向GMLC发送第一UE的标识。
其中,上述的GMLC为第一设备对应的GMLC,即GMLC自身。
位置请求设备可将第一UE的标识携带在请求8中并将请求8发送给GMLC。从而,GMLC可从请求8中获得第一UE的标识。本申请对请求8的具体实现方式不做限定。例如,请求8可采用图1所示的S11中的LCS Service Request。
S402、GMLC获得第一LCS信息。
其中,本申请对GMLC获得第一LCS信息的具体实现方式不做限定。
在一些实施例中,LCS系统可预配置每个GMLC与每个GMLC对应的LCS信息之间的对应关系。其中,前述的对应关系可采用如表格、数组、键值对等方式进行表示或存储。
从而,GMLC根据预配置的每个GMLC与每个GMLC对应的LCS信息之间的对应关系,可获得该GMLC对应的LCS信息,即第一LCS信息。
在另一些实施例中,GMLC从位置请求设备的证书中获得第一LCS信息。
位置请求设备的证书中可预存储为第一UE提供UE位置的GMLC对应的LCS信息,即第一LCS信息。从而,GMLC可从位置请求设备的证书中,获得第一LCS信息。
在另一些实施例中,GMLC从位置请求设备接收第一LCS信息。
位置请求设备可将第一LCS信息携带在请求9中并将请求9发送给GMLC。从而,GMLC可从请求9中获得第一LCS信息。本申请对请求9的具体实现方式不做限定。
另外,请求9可与请求8为同一个请求,也可与请求8为不同的请求。需要说明的是,在请求9与请求8采用同一个请求时,该请求中包括:第一UE的标识以及第一LCS信息。
S403、GMLC在根据第一LCS信息以及第一UE的标识确定能够提供第一UE的位置后,向位置请求设备发送第一UE的位置信息。
其中,S403中的GMLC根据第一LCS信息以及第一UE的标识确定能够提供第一UE的位置的具体实现方式与图6的S203中的AMF根据第一LCS信息以及第一UE的标识确定能够提供第一UE的位置的实现方式类似,此处不再赘述。
需要说明的是,除了上述实现方式之外,GMLC还可通过UDM,确定是否能够提供第一UE的位置。
在一些实施例中,以GMLC为例,GMLC可向UDM发送请求10,请求10中包括第一UE的标识,使得UDM获得第一UE的标识。UDM还可获得第一LCS信息,其具体实现方式可参见图7中UDM获得第一LCS信息的描述,此处不做赘述。
UDM根据第一LCS信息和第一UE的标识,可确定GMLC是否能够提供第一UE的位置。UDM向GMLC发送响应10,响应10用于指示GMLC是否能够提供第一UE的位置。在响应10用于指示GMLC能够提供第一UE的位置信息时,GMLC可向位置请求设备发送第一UE的位置信息。在响应10用于指示GMLC不能提供第一UE的位置信息时,GMLC可不向位置请求设备发送第一UE的位置信息。
其中,本申请对请求10和响应10的具体实现方式不做限定。
综上,GMLC通过检查第一UE的标识是否在与第一LCS信息相匹配的UE标识集中,或者通过检查第一LCS标识与第一UE的标识对应的第二LCS标识是否相同,可确定是否能够提供第一UE的位置。
需要说明的是,第一设备还可为LCS系统中的NEF或GMLC proxy,NEF或GMLC proxy执行本申请的信息发送方法的具体实现方式可参见图8实施例中GMLC执行本申请的信息发送方法的描述,此处不再赘述。
另外,一般情况下,位置请求设备优先向GMLC、NEF或GMLC proxy中的哪个网元发送第一UE的标识,则该网元可执行本申请的信息发送方法。
本申请中,GMLC是LCS业务流程中的一个重要参与的网元。GMLC在位置请求设备向GMLC请求第一UE的位置信息之后,且在GMLC向位置请求设备发送第一UE的位置信息之前的任意一个时刻,可通过第一LCS信息以及第一UE的标识,确定是否能够提供第一UE的位置,来检查第一UE与AMF对应的GMLC之间的归属是否相匹配。
在确定能够提供第一UE的位置后,GMLC可向位置请求设备发送第一UE的位置信息,保证GMLC向位置请求设备传输第一UE的位置信息的过程可控。在确定不能提供第一UE的位置后,GMLC不会向位置请求设备发送第一UE的位置信息,确保位置请求设备无法非法地通过GMLC获取第一UE的位置信息,有效避免了UE位置的泄露。
基于上述描述,主要考虑到开放式授权(open authorization,OAuth)协议下,GMLC的访问令牌中可预写入第一LCS信息,方便第一设备及时确定是否能够提供第一UE的位置,有利于可控地获取UE的位置信息。
需要说明的是,此处的GMLC的访问令牌与图1所示的相关技术涉及的GMLC的访问令牌不同,此处的GMLC的访问令牌中已写入第一LCS信息,图1中的GMLC的访问令牌未写入第一LCS信息。
下面,结合图9,详细介绍NRF将第一LCS信息写入GMLC的访问令牌的实现过程。
请参阅图9,图9示出了本申请一实施例提供的一种信息发送方法的信令交互图。
如图9所示,本申请提供的信息发送方法可以包括:
S501、GMLC向NRF发送用于申请GMLC的访问令牌的请求。
其中,GMLC与NRF属于同一个LCS系统,且GMLC能够向NRF请求申请GMLC的访问令牌。其中,本申请对该请求的具体实现方式不做限定。例如,该请求可包括:GMLC的访问令牌的标识。该请求可采用Nnrf_AccessToken_Get Request。
S502、NRF获得第一LCS信息。
其中,本申请对NRF获得第一LCS信息的具体实现方式不做限定。
在一些实施例中,NRF从GMLC的证书中获得第一LCS信息。
GMLC的证书中可预存储该GMLC对应的第一LCS信息。从而,NRF可从该GMLC的证书中,获得第一LCS信息。
在另一些实施例中,NRF从GMLC的注册文件(profile)中获得第一LCS信息。
GMLC的注册文件中可预写入该GMLC对应的第一LCS信息。从而,NRF可从该GMLC的注册文件中,获得第一LCS信息。
在另一些实施例中,NRF从GMLC接收第一LCS信息。
GMLC可向NRF发送第一LCS信息。从而,NRF可获得第一LCS信息。
其中,GMLC可将第一LCS信息携带在请求11中并将请求11发给NRF。从而,NRF可从请求11中获取第一LCS信息。本申请对请求11的具体实现方式不做限定。请求11可与S501中的请求为同一个请求,也可与S501中的请求为不同的请求。需要说明的是,在请求11与S501中的请求为同一个请求时,该请求中包括:第一LCS信息。
综上,NRF可获得第一LCS信息。
S503、NRF向GMLC发送GMLC的访问令牌,GMLC的访问令牌中包括第一LCS信息。
NRF可采用多种方式,将第一LCS信息写入到GMLC的访问令牌中。
在一些实施例中,第一LCS信息对应UE标识集,GMLC的访问令牌中包括UE标识集。
在第一LCS信息对应UE标识集的情况下,NRF可将UE标识集写入到GMLC的访问令牌中。其中,UE标识集中包括:能提供UE位置的UE的标识。
在另一些实施例中,第一LCS信息对应第一LCS标识,GMLC的访问令牌中包括第一LCS标识。
在第一LCS信息对应第一LCS标识的情况下,NRF可将第一LCS标识写入到GMLC的访问令牌中。其中,第一LCS标识用于标识第一设备对应的GMLC能提供UE位置的LCS区域。
另外,NRF还可将上述的UE标识集以及第一LCS标识均写入到GMLC的访问令牌中。
从而,NRF在确定GMLC的访问令牌中已写入第一LCS信息后,可向GMLC发送GMLC的访问令牌,方便第一设备(如AMF/UDM)能够从GMLC的访问令牌中获得第一LCS信息。
本申请中,NRF可实现上述申请GMLC的访问令牌的过程,使得第一设备(如AMF/UDM)可从GMLC的访问令牌中获得预存储的第一LCS信息,使得第一设备能够确定是否能够提供第一UE的位置,保证获取UE的位置信息的过程可控。
需要说明的是,除了GMLC之外,LCS系统中的其他网元也可向NRF申请GMLC的访问令牌,本申请对申请GMLC的访问令牌的网元不做限定。
可理解,NRF中可存储有GMLC的注册文件,能够实现GMLC在NRF中的注册(可理解为登记)。
基于上述描述,NRF在执行S502中的从GMLC的注册文件中获得第一LCS信息之前,还需要将第一LCS信息预存储到GMLC的注册文件中。
下面,结合图10,详细介绍NRF将第一LCS信息写入GMLC的注册文件的实现过程。
请参阅图10,图10示出了本申请一实施例提供的一种信息发送方法的信令交互图。
如图10所示,本申请提供的信息发送方法可以包括:
S601、GMLC向NRF发送用于注册GMLC的请求。
其中,GMLC与NRF属于同一个LCS系统,且GMLC能够向NRF请求注册GMLC。其中,本申请对该请求的具体实现方式不做限定。例如,该请求可包括:GMLC的标识。该请求可采用Nnrf_NFManagement_NFRegister Request。
S602、NRF获得第二LCS信息,第二LCS信息能够指示能提供UE位置的UE。
其中,为了便于区分S502中NRF获得的第一LCS信息与S602中NRF获得的第一LCS信息,本申请可将S602中的第一LCS信息表达为第二LCS信息,即第二LCS信息为第一LCS信息。
其中,本申请对NRF获得第二LCS信息的具体实现方式不做限定。
可选地,NRF从GMLC接收第二LCS信息。
其中,GMLC可将第一LCS信息携带在请求12中并将请求12发给NRF。从而,NRF可从请求12中获取第二LCS信息。本申请对请求12的具体实现方式不做限定。请求12可与S601中的请求为同一个请求,也可与S601中的请求为不同的请求。需要说明的是,在请求12与S601中的请求为同一个请求时,该请求中包括:第二LCS信息。
或者,NRF从GMLC的证书中获得第二LCS信息。
GMLC的证书中可预存储该GMLC对应的第一LCS信息。从而,NRF可从该GMLC的证书中,获得第二LCS信息。
综上,NRF可获得第二LCS信息。
S603、NRF将第二LCS信息写入到GMLC的注册文件中。
从而,方便后续NRF能够从GMLC的注册文件中获得第一LCS信息。
S604、NRF向GMLC发送用于指示GMLC的注册文件中已写入第二LCS信息的响应。
S604为可选地步骤。
NRF在确定GMLC的访问令牌中已写入第二LCS信息后,可向GMLC发送该响应,方便通知GMLC已注册成功。
其中,本申请对该响应的具体实现方式不做限定。例如,该响应中可以包括:用于指示GMLC的访问令牌中已写入第二LCS信息的标识。该响应可采用Nnrf_NFManagement_NFRegister Response。
综上,NRF可实现上述GMLC的注册过程,方便后续NRF能够从GMLC的注册文件中获得第一LCS信息。
另外,图1所示的相关技术中,如果LMF被恶意控制,则LMF在收到某个UE的LCS请求后,很可能会把除了该UE之外的其他UE的位置信息发送给GMLC,导致其他UE的位置信息很容易被非法获取,从而容易造成了UE位置的泄露。
为了解决上述问题,本申请还提供一种信息发送方法,AMF可作为检查LMF的恶意行为的网元,可借助UE的验证信息,来检查LMF请求AMF获得相关定位参数的UE与AMF能够向LMF提供相关定位参数的UE是否一致,能够确保LMF可控地获取UE的相关定位参数,以及检查LMF请求AMF转发位置信息的UE与AMF请求LMF确定位置信息的UE是否一致,为后续AMF为LMF转发该UE的位置信息进行了拦截,能够确保LMF可控地发送UE的位置信息,解决由于LMF的恶意行为而导致UE位置泄露的问题,有利于降低LMF被攻击后泄露UE位置带来的风险。
需要说明的是,LCS业务流程中,AMF检查LMF是否存在非法请求UE的相关定位参数或非法转发UE的位置信息的恶意行为的过程,可单独执行,也可与前文提及的LCS系统中的第一设备检查请求UE位置的UE以及LCS系统中能提供UE位置的GMLC之间的归属是否相匹配的过程共同执行,有利于进一步避免UE位置的泄露。
下面,结合图11,本申请以下实施例将以具有图2-图4所示的LCS系统中的AMF为例,结合附图和应用场景,对本申请提供的信息发送方法进行详细阐述。
请参阅图11,图11示出了本申请一实施例提供的一种信息发送方法的信令交互图。
如图11所示,本申请提供的信息发送方法可以包括:
S701、LMF向AMF发送用于获取第二UE的相关定位参数或发送第二UE的位置信息的请求。
AMF在从LMF接收到该请求后,可判断是否响应该请求。
其中,本申请对该请求的具体实现方式不做限定。
该请求用于LMF请求AMF获取第二UE的相关定位参数,如采用LMF向AMF发送的Namf_Communication_N1N2MessageTransfer。可见,本申请的信息发送方法适用于LMF通过AMF获取第二UE的相关定位参数的场景。
或者,该请求用于LMF请求AMF发送第二UE的位置信息,如采用图1所示的S19中的Nlmf_Location_DetemineLocation Response。可见,本申请的信息发送方法适用于LMF通过AMF发送第二UE的位置信息的场景。
S702、AMF根据请求获得第二UE的第一验证信息。
AMF根据S701中的请求,可确定LMF需要AMF获得相关定位参数或转发位置信息的UE为第二UE。从而,AMF可获得第二UE的第一验证信息。
其中,第二UE的第一验证信息用于标识LMF当前请求AMF获得相关定位参数或转发位置信息的UE为第二UE。本申请对第二UE的第一验证信息的具体实现方式不做限定。
S703、AMF在第二UE的第一验证信息与AMF中的第二UE的第二验证信息相同时,发送第二UE的相关定位参数或UE的位置信息。
LCS业务流程中,GMLC是通过AMF向LMF请求确定UE的位置信息的。因此,相比于LMF而言,AMF会更早获知前述UE。并且,AMF需要向LMF请求前述UE的位置信息,LMF需要向AMF请求前述UE的相关定位参数,LMF在确定前述UE的位置信息后,需要通过AMF向GMLC发送前述UE的位置信息。
基于上述描述,AMF可在AMF中预存储上述UE各自的第二验证信息,每个UE的第二验证信息用于标识GMLC/AMF需要LMF确定位置信息的UE,即AMF能够向LMF提供相关定位参数或转发位置信息的UE。
从而,为检查LMF请求AMF获得相关定位参数或发送位置信息的第二UE是否包含在GMLC/AMF需要LMF确定位置信息的UE中打下基础。
基于上述描述,如果GMLC/AMF需求LMF确定第二UE的位置信息,那么AMF中可预存储有第二UE的第二验证信息。如果GMLC/AMF不需求LMF确定第二UE的位置信息,那么AMF中将不会存储有第二UE的第二验证信息。
其中,第二UE的第二验证信息用于标识GMLC/AMF需要LMF确定位置信息的第二UE,即标识AMF能够向LMF提供相关定位参数或转发位置信息的第二UE。本申请对第二UE的第二验证信息的具体实现方式不做限定。
另外,第二UE的第一验证信息和第二UE的第二验证信息可采用相同的表示方式,方便两者的比较。
基于S701的描述,AMF还可确定AMF中是否已存储第二UE的第二验证信息。
在确定AMF中已存储第二UE的第二验证信息后,AMF可从AMF中获得第二UE的第二验证信息。AMF通过检查第二UE的第一验证信息与第二UE的第二验证信息是否相同,便可确定是否发送第二UE的相关定位参数或第二UE的位置信息。
从而,AMF在第二UE的第一验证信息与第二UE的第二验证信息相同时,可向LMF发送UE的相关定位参数或向GMLC发送UE的位置信息。AMF在第二UE的第一验证信息与第二UE的第二验证信息不同时,便不会向LMF发送UE的相关定位参数且不会向GMLC发送UE的位置信息。
在确定AMF中未存储第二UE的第二验证信息后,AMF无法从AMF中获得第二UE的第二验证信息。
从而,AMF可确定第二UE的第一验证信息与第二UE的第二验证信息不同,便不会向LMF发送UE的相关定位参数且不会向GMLC发送UE的位置信息。
另外,在第二UE的第一验证信息与第二UE的第二验证信息不同时,AMF可向LMF通知无法提供响应于S701中LMF发送的请求。
需要说明的是,LCS系统中的LMF proxy也可执行本申请的信息发送方法,其具体实现方式可参见图11实施例中LMF执行本申请的信息发送方法的描述,此处不再赘述。
本申请提供的信息发送方法,通过AMF从LMF接收用于获取第二UE的相关定位参数或发送第二UE的位置信息的请求。AMF根据该请求,可获得第二UE的第一验证信息。由于AMF中预存储有各个UE的第二验证信息,每个UE的第二验证信息用于标识GMLC/AMF需要确定位置信息的该UE。因此,AMF在第二UE的第一验证信息与AMF中预存储的第二UE的第二验证信息相同时,可确定LMF请求AMF获得相关定位参数的第二UE与AMF能够向LMF提供相关定位参数的第二UE一致,或者,确定LMF请求AMF转发位置信息的第二UE与AMF请求LMF确定位置信息的第二UE一致。AMF便可向LMF发送第二UE的相关定位参数或向GMLC发送第二UE的位置信息。
从而,基于LCS业务流程中的LMF向AMF发起请求的UE与AMF中预存储的需要确定位置信息的UE之间的一致性,能够对LMF请求AMF获取相关定位参数或转发位置信息的UE进行检查,确保了LMF能够可控地获取UE的相关定位参数或位置信息,在LMF被攻击后为后续AMF向LMF转发送该UE的位置信息进行提前拦截,为UE的隐私检测又提供了一种新的实现方式,尽可能地避免了由于LMF的恶意行为而泄露UE位置的现象,也降低了LMF被攻击后泄露UE位置带来的风险。
基于上述描述,AMF中的各个UE的第二验证信息可采用多种表示方式。
在一些实施例中,针对任意一个UE而言,AMF可将该UE已存在的标识作为该UE的第二验证信息。例如,该UE的第二验证信息可以为:该UE的标识(SUPI或GPSI)或上下文标识中的至少一个。
在另一些实施例中,针对任意一个UE而言,AMF可针对该UE新增标识,并将新增的标识作为该UE的第二验证信息。例如,该UE的第二验证信息可以为:该UE的状态标识或随机数中的至少一个。其中,该UE的状态标识或随机数用于标识该UE处于定位中,即表示GMLC/AMF需要确定该UE的位置信息。
下面,结合图12和图13,在GMLC/AMF需要确定第二UE的位置信息的前提下,阐述AMF采用上述两种第二验证信息的表示方式实现本申请的信息发送方法的详细过程。
请参阅图12,图12示出了本申请一实施例提供的一种信息发送方法的信令交互图。
如图12所示,在第二UE的验证信息采用第二UE的标识或上下文标识时,本申请提供的信息发送方法可以包括:
S801、AMF根据第二UE标记第二UE的第二验证信息。
AMF在接收到GMLC发送的用于确定第二UE的位置信息的请求后,可对第二UE的第二验证信息新增一个标识,也可将第二UE的第二验证信息写入到一个集合中,从而通过该标识或该集合的设置实现对第二UE的第二验证信息的标记。
在第二UE为多个UE时,AMF可对每个UE的第二验证信息新增一个标识,也可对多个UE的第二验证信息共同新增一个标识,本申请对此不做限定。
或者,AMF可将每个UE的第二验证信息写入到同一个集合中,也可多个UE的第二验证信息写入到不同的多个集合中,本申请对此也不做限定。
综上,AMF可根据第二UE对第二UE的第二验证信息进行标记。
S802、AMF向LMF发送第二UE的标识。
由于第二UE的第二验证信息采用第二UE已存在的标识。因此,根据第二UE的标识,便可确定第二UE的第二验证信息是否标记。基于此,AMF无需额外向LMF发送第二UE的第二验证信息。
从而,AMF可向LMF发送第二UE的标识,使得LMF能够获知需要确定第二UE的位置信息。
其中,AMF可将第二UE的标识携带在请求13中并将请求13发给LMF,请求13用于请求第二UE的相关定位参数。本申请对请求13的具体实现方式不做限定。
S803、LMF向AMF发送用于获取第二UE的相关定位参数或发送第二UE的位置信息的请求,请求中包括:第二UE的标识。
基于S802的描述,AMF未向LMF发送第二UE的第二验证信息。因此,LMF也无需额外向AMF发送第二UE的第一验证信息。
从而,LMF可向AMF发送携带有第二UE的标识的请求,即S701中的请求,使得AMF能够获知需要从第二UE中获得第二UE的相关定位参数。
S804、AMF根据第二UE的标识,获得第二UE的第一验证信息,以及确定第二UE的第二验证信息是否标记。
基于S803的描述,AMF可获得第二UE的标识。
在UE的验证信息采用第二UE的标识时,AMF可确定第二UE的第一验证信息和第二UE的第二验证信息均为第二UE的标识,且AMF可根据第二UE的标识确定第二UE的第二验证信息是否已标记。
例如,AMF根据第二UE的标识,可查找是否存在对第二UE的标识新增的标识,或者查找是否存在存储有第二UE的标识的集合。若存在,则AMF可确定第二UE的第二验证信息已标记。若不存在,则AMF可确定第二UE的第二验证信息未标记。
在UE的验证信息采用第二UE的上下文标识时,AMF可根据第二UE的标识,查找到第二UE的上下文标识。从而,AMF可确定第二UE的第一验证信息和第二UE的第二验证信息均为第二UE的上下文标识,且AMF可根据第二UE的上下文标识确定第二UE的第二验证信息是否已标记。
例如,AMF根据第二UE的上下文标识,可查找是否存在对第二UE的上下文标识新增的标识,或者查找是否存在存储有第二UE的上下文标识的集合。若存在,则AMF可确定第二UE的第二验证信息已标记。若不存在,则AMF可确定第二UE的第二验证信息未标记。
综上,AMF根据第二UE的标识,可确定第二UE的第一验证信息,以及确定第二UE的第二验证信息是否标记。
S805、AMF在第二UE的第一验证信息与第二UE的第二验证信息相同且第二UE的第二验证信息已标记时,发送第二UE的相关定位参数或第二UE的位置信息。
基于S804的描述,第二UE的第一验证信息与第二UE的第二验证信息相同。
并且,在AMF/GMLC需要确定第二UE的位置信息时,AMF便可已执行S801中的根据第二UE标记第二验证信息的过程。从而,AMF可确定第二UE的第二验证信息已标记。
从而,AMF在第二UE的第一验证信息与第二UE的第二验证信息相同,且第二UE的第二验证信息已标记时,可向LMF发送第二UE的相关定位参数或向GMLC发送第二UE的位置信息。
本申请中,AMF通过检查第二UE的第一验证信息与第二UE的第二验证信息是否相同,以及第二UE的第二验证信息是否已标记,可确定LMF是否存在非法请求第二UE的相关定位参数或非法转发第二UE的位置信息的恶意行为,从而在LMF被攻击后为后续AMF向LMF转发送该UE的位置信息进行提前拦截,降低了泄露第二UE的位置信息的可能性。
请参阅图13,图13示出了本申请一实施例提供的一种信息发送方法的信令交互图。
如图13所示,在第二UE的验证信息采用第二UE的状态标识或随机数时,本申请提供的信息发送方法可以包括:
S901、AMF生成并保存第二UE的第二验证信息。
AMF在接收到GMLC发送的用于确定第二UE的位置信息的请求后,可对第二UE生成第二UE的第二验证信息,并保存第二UE的第二验证信息。
在第二UE为多个UE的情况下,AMF可对每个UE生成一个第二验证信息,也可对多个UE共同生成一个第二验证信息,本申请对此不做限定。
综上,AMF可生成并保存第二UE的第二验证信息。
S902、AMF向LMF发送第二UE的标识以及第二UE的第二验证信息。
由于第二UE的第二验证信息采用针对第二UE新增的标识。因此,LMF无法根据第二UE的标识确定第二UE的第二验证信息。基于此,AMF需要额外向LMF发送第二UE的第二验证信息。
从而,AMF可LMF向发送包括第二UE的标识以及第二UE的第二验证信息的请求,使得LMF能够获知需要确定第二UE的位置信息。
其中,LMF可将第二UE的标识以及第二UE的第二验证信息携带在请求14并将请求14给AMF,请求14于请求第二UE的相关定位参数。本申请对请求14具体实现方式不做限定。
S903、LMF向AMF发送用于获取第二UE的相关定位参数或发送第二UE的位置信 息的请求,请求中包括:第二UE的标识以及第二UE的第一验证信息。
基于S902的描述,AMF向LMF发送了第二UE的第二验证信息。因此,LMF也需要额外向AMF发送第二UE的第一验证信息。
从而,LMF可向AMF发送包括第二UE的标识以及第二UE的第一验证信息的请求,即S701中的请求,使得AMF能够获知需要从第二UE中获得第二UE的相关定位参数。
S904、AMF获得第二UE的第一验证信息,以及根据第二UE的标识,从AMF中获得第二UE的第二验证信息。
基于S903的描述,AMF可获得第二UE的标识以及第二UE的第一验证信息。
从而,AMF可确定第二UE的第一验证信息。并且,在UE的验证信息采用第二UE的状态标识或随机数时,AMF可根据第二UE的标识,确定第二UE。AMF便可针对第二UE,从AMF中确定第二UE的第二验证信息。
S905、AMF在第二UE的第一验证信息与第二UE的第二验证信息相同时,发送第二UE的相关定位参数或第二UE的位置信息。
AMF在第二UE的第一验证信息与第二UE的第二验证信息相同时,可向LMF发送UE的相关定位参数或向GMLC发送第二UE的位置信息。
本申请中,AMF通过检查第二UE的第一验证信息与第二UE的第二验证信息是否相同,可确定LMF是否存在非法请求第二UE的相关定位参数或非法转发第二UE的位置信息的恶意行为,从而在LMF被攻击后为后续AMF向LMF转发送该UE的位置信息进行提前拦截,降低了泄露第二UE的位置信息的可能性。
示例性的,本申请还提供一种信息发送装置。信息发送装置可以独立存在,也可以集成在其他设备中,可以向位置请求设备提供UE的位置对应的信息,用于实现上述任一方法实施例中对应于第一设备/LMF的操作。
本申请的信息发送装置,可以包括用于执行上述所示方法实施例的技术方案的模块,其实现原理和技术效果类似,其中各个模块的实现的操作可以进一步参考方法实施例的相关描述,此处不再赘述。此处的模块也可以替换为部件或者电路。
本申请可以根据上述方法示例对信息发送装置进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请各实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
示例性的,本申请还提供一种信息发送装置。
请参阅图14,图14示出了本申请一实施例提供的一种信息发送装置的硬件结构示意图。
如图14所示,信息发送装置100作为第一设备/LMF的硬件支撑,可以向位置请求设备提供UE的位置对应的信息,用于实现上述任一方法实施例中对应于第一设备/LMF的操作。
本申请的信息发送装置100可以包括:存储器101和处理器102。存储器101与处理器102可以通过总线103连接。可选的,处理器102和存储器101集成在一起。
存储器101,用于存储程序代码;
处理器102,调用程序代码,当程序代码被执行时,用于执行上述任一实施例中的信息发送方法,具体可以参见前述方法实施例中的相关描述。
可选地,本申请还包括通信接口104,该通信接口104可以通过总线103与处理器102连接。处理器102可以控制通信接口104来实现信息发送装置100的上述的接收和发送的功能。
本申请实施例的信息发送装置,可以用于执行上述各方法实施例中的技术方案,其实现原理和技术效果类似,此处不再赘述。
示例性的,本申请还提供一种通信系统,通信系统包括:前述LCS系统中的两个或两个以上的网元,每个网元可用于实现上述任一方法实施例中对应于第一设备/LMF的操作。
示例性的,本申请还提供一种计算机可读存储介质,计算机可读存储介质中存储有执行指令,当服务器的至少一个处理器执行该执行指令时,服务器执行上述方法实施例中的信息发送方法。
示例性的,本申请还提供一种芯片,包括:接口电路和逻辑电路,接口电路用于接收来自于芯片之外的其他芯片的信号并传输至逻辑电路,或者将来自逻辑电路的信号发送给芯片之外的其他芯片,逻辑电路用于实现上述方法实施例中的信息发送方法。
示例性的,本申请还提供一种计算机程序产品,计算机程序产品包括执行指令,该执行指令存储在可读存储介质中。服务器的至少一个处理器可以从可读存储介质读取该执行指令,至少一个处理器执行该执行指令使得服务器实施上述方法实施例中的信息发送方法。
本领域普通技术人员可以理解:在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例的流程或功能。计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。

Claims (42)

  1. 一种信息发送方法,其特征在于,所述方法包括:
    第一设备接收第一终端设备的标识;
    所述第一设备获得第一定位服务信息,所述第一定位服务信息能够指示能提供终端设备位置的终端设备;
    所述第一设备在根据所述第一定位服务信息以及所述第一终端设备的标识确定能够提供所述第一终端设备的位置后,发送所述第一终端设备的位置对应的信息。
  2. 根据权利要求1所述的方法,其特征在于,所述第一设备为接入和移动性管理功能实体,
    所述第一设备接收第一终端设备的标识,包括:所述接入和移动性管理功能实体从网关移动定位中心接收所述第一终端设备的标识;
    所述第一设备发送所述第一终端设备的位置对应的信息,包括:所述接入和移动性管理功能实体向所述网关移动定位中心发送所述第一终端设备的位置信息。
  3. 根据权利要求1所述的方法,其特征在于,所述第一设备为统一数据管理实体,
    所述第一设备接收第一终端设备的标识,包括:所述统一数据管理实体从网关移动定位中心接收所述第一终端设备的标识;
    所述第一设备发送所述第一终端设备的位置对应的信息,包括:所述统一数据管理实体向所述网关移动定位中心发送为所述第一终端设备服务的接入和移动性管理功能实体的信息,所述为所述第一终端设备服务的接入和移动性管理功能实体的信息用于所述网关移动定位中心请求所述第一终端设备的位置信息。
  4. 根据权利要求2或3所述的方法,其特征在于,所述第一设备获得第一定位服务信息,包括:
    所述第一设备根据所述网关移动定位中心以及预配置的每个网关移动定位中心与对应的定位服务信息之间的对应关系,获得与所述网关移动定位中心对应的所述第一定位服务信息;
    或者,所述第一设备从所述网关移动定位中心的证书中获得所述第一定位服务信息;
    或者,所述第一设备从所述网关移动定位中心的访问令牌中获得所述第一定位服务信息;
    或者,所述第一设备从所述网关移动定位中心接收所述第一定位服务信息。
  5. 根据权利要求1所述的方法,其特征在于,所述第一设备为网关移动定位中心,
    所述第一设备接收第一终端设备的标识,包括:所述网关移动定位中心从位置请求设备接收所述第一终端设备的标识;
    所述第一设备发送所述终端设备的位置对应的信息,包括:所述网关移动定位中心向所述位置请求设备发送所述第一终端设备的位置信息。
  6. 根据权利要求5所述的方法,其特征在于,所述第一设备获得第一定位服务信息,包括:
    所述网关移动定位中心根据所述网关移动定位中心以及预配置的每个网关移动定位中心与对应的定位服务信息之间的对应关系,获得与所述网关移动定位中心对应的所述第一定位服务信息;
    或者,所述网关移动定位中心从所述位置请求设备的证书中获得所述第一定位服务信息;
    或者,所述网关移动定位中心从所述位置请求设备接收所述第一定位服务信息。
  7. 根据权利要求1-6任一项所述的方法,其特征在于,
    所述第一定位服务信息对应终端设备标识集,所述终端设备标识集中包括:能提供终端设备位置的终端设备的标识;
    所述终端设备标识集中包括所述第一终端设备的标识。
  8. 根据权利要求7所述的方法,其特征在于,
    所述终端设备标识集是根据所述第一定位服务信息以及预配置的定位服务信息与对应的终端设备标识集之间的匹配关系获得的;
    或者,所述终端设备标识集是从与所述第一定位服务信息对应的网关移动定位中心的访问令牌中获得的。
  9. 根据权利要求1-6任一项所述的方法,其特征在于,
    所述第一定位服务信息对应第一定位服务标识,所述第一定位服务标识用于标识所述第一设备对应的能提供终端设备位置的定位服务区域;
    所述方法还包括:
    所述第一设备根据所述第一终端设备的标识,从所述第一终端设备的签约信息中获得第二定位服务标识,所述第二定位服务标识用于标识能提供所述第一终端设备的位置的定位服务区域;
    所述第一设备根据所述第一定位服务信息以及所述第一终端设备的标识确定能够提供所述第一终端设备的位置,包括:
    所述第一设备在所述第一定位服务标识与所述第二定位服务标识相同时,确定能够提供所述第一终端设备的位置。
  10. 一种信息发送方法,其特征在于,所述方法包括:
    统一数据管理实体从网关移动定位中心或接入和移动性管理功能实体接收第一终端设备的标识;
    所述统一数据管理实体根据所述第一终端设备的标识,确定所述第一终端设备的签约信息;
    所述统一数据管理实体从所述第一终端设备的签约信息中获得第二定位服务标识,所述第二定位服务标识用于标识能提供所述第一终端设备的位置的定位服务区域;
    所述统一数据管理实体向所述网关移动定位中心或所述接入和移动性管理功能实体发送所述第二定位服务标识。
  11. 一种信息发送方法,其特征在于,所述方法包括:
    网络存储功能实体从网关移动定位中心接收用于申请所述网关移动定位中心的访问令牌的请求;
    所述网络存储功能实体获得第一定位服务信息,所述第一定位服务信息能够指示能提供终端设备位置的终端设备;
    所述网络存储功能实体向所述网关移动定位中心发送所述网关移动定位中心的访问令牌,所述网关移动定位中心的访问令牌中包括所述第一定位服务信息。
  12. 根据权利要求11所述的方法,其特征在于,所述网络存储功能实体获得第一定位服务信息,包括:
    所述网络存储功能实体从所述网关移动定位中心的证书中获得所述第一定位服务信息;
    或者,所述网络存储功能实体从所述网关移动定位中心的注册文件中获得所述第一定位服务信息;
    或者,所述网络存储功能实体从所述网关移动定位中心接收所述第一定位服务信息。
  13. 根据权利要求11或12所述的方法,其特征在于,在所述网络存储功能实体获得第一定位服务信息之前,所述方法还包括:
    所述网络存储功能实体从所述网关移动定位中心接收用于注册所述网关移动定位中心的请求;
    所述网络存储功能实体获得第二定位服务信息,所述第二定位服务信息能够指示能提供终端设备位置的终端设备;
    所述网络存储功能实体将所述第二定位服务信息写入到所述网关移动定位中心的注册文件中。
  14. 根据权利要求13所述的方法,其特征在于,所述网络存储功能实体获得第二定位服务信息,包括:
    所述网络存储功能实体从所述网关移动定位中心接收所述第二定位服务信息;
    或者,所述网络存储功能实体从所述网关移动定位中心的证书中获得所述第二定位服务信息。
  15. 根据权利要求11-14任一项所述的方法,其特征在于,
    所述第一定位服务信息对应终端设备标识集,所述终端设备标识集中包括:能提供终端设备位置的终端设备的标识;所述网关移动定位中心的访问令牌中包括所述终端设备标识集;
    和/或,
    所述第一定位服务信息对应第一定位服务标识,所述第一定位服务标识用于标识第一设备对应的能提供终端设备位置的定位服务区域;所述网关移动定位中心的访问令牌中包括所述第一定位服务标识。
  16. 一种信息发送方法,其特征在于,所述方法包括:
    网关移动定位中心和位置请求设备中的一个设备向第一设备发送第一终端设备的标识;
    所述第一设备接收所述第一终端设备的标识;
    所述第一设备获得第一定位服务信息,所述第一定位服务信息能够指示能提供终端设备位置的终端设备;
    所述第一设备在根据所述第一定位服务信息以及所述第一终端设备的标识确定能够提供所述第一终端设备的位置后,向所述网关移动定位中心和位置请求设备中的一个设备发送所述第一终端设备的位置对应的信息;
    所述网关移动定位中心和位置请求设备中的一个设备接收所述第一终端设备的位置对应的信息。
  17. 根据权利要求16所述的方法,其特征在于,所述第一设备为接入和移动性管理功能实体,
    所述第一设备接收所述第一终端设备的标识,包括:所述接入和移动性管理功能实体从所述网关移动定位中心接收所述第一终端设备的标识;
    所述第一设备向所述网关移动定位中心和位置请求设备中的一个设备发送所述第一终端设备的位置对应的信息,包括:所述接入和移动性管理功能实体向所述网关移动定位中心发送所述第一终端设备的位置信息。
  18. 根据权利要求16所述的方法,其特征在于,所述第一设备为统一数据管理实体,
    所述第一设备接收所述第一终端设备的标识,包括:所述统一数据管理实体从所述网关移动定位中心接收所述第一终端设备的标识;
    所述第一设备向所述网关移动定位中心和位置请求设备中的一个设备发送所述第一终端设备的位置对应的信息,包括:所述统一数据管理实体向所述网关移动定位中心发送为所述第一终端设备服务的接入和移动性管理功能实体的信息,所述为所述第一终端设备服务的接入和移动性管理功能实体的信息用于所述网关移动定位中心请求所述第一终端设备的位置信息。
  19. 根据权利要求17或18所述的方法,其特征在于,所述第一设备获得第一定位服务信息,包括:
    所述第一设备根据所述网关移动定位中心以及预配置的每个网关移动定位中心与对应的定位服务信息之间的对应关系,获得与所述网关移动定位中心对应的所述第一定位服务信息;
    或者,所述第一设备从所述网关移动定位中心的证书中获得所述第一定位服务信息;
    或者,所述第一设备从所述网关移动定位中心的访问令牌中获得所述第一定位服务信息;
    或者,所述第一设备从所述网关移动定位中心接收所述第一定位服务信息。
  20. 根据权利要求16所述的方法,其特征在于,所述第一设备为所述网关移动定位中心,
    所述第一设备接收所述第一终端设备的标识,包括:所述网关移动定位中心从所述位置请求设备接收所述第一终端设备的标识;
    所述第一设备向所述网关移动定位中心和位置请求设备中的一个设备发送所述第一 终端设备的位置对应的信息,包括:所述网关移动定位中心向所述位置请求设备发送所述第一终端设备的位置信息。
  21. 根据权利要求20所述的方法,其特征在于,所述第一设备获得第一定位服务信息,包括:
    所述网关移动定位中心根据所述网关移动定位中心以及预配置的每个网关移动定位中心与对应的定位服务信息之间的对应关系,获得与所述网关移动定位中心对应的所述第一定位服务信息;
    或者,所述网关移动定位中心从所述位置请求设备的证书中获得所述第一定位服务信息;
    或者,所述网关移动定位中心从所述位置请求设备接收所述第一定位服务信息。
  22. 根据权利要求16-21任一项所述的方法,其特征在于,
    所述第一定位服务信息对应终端设备标识集,所述终端设备标识集中包括:能提供终端设备位置的终端设备的标识;
    所述终端设备标识集中包括所述第一终端设备的标识。
  23. 根据权利要求22所述的方法,其特征在于,
    所述终端设备标识集是根据所述第一定位服务信息以及预配置的定位服务信息与对应的终端设备标识集之间的匹配关系获得的;
    或者,所述终端设备标识集是从与所述第一定位服务信息对应的网关移动定位中心的访问令牌中获得的。
  24. 根据权利要求16-21任一项所述的方法,其特征在于,
    所述第一定位服务信息对应第一定位服务标识,所述第一定位服务标识用于标识所述第一设备对应的能提供终端设备位置的定位服务区域;
    所述方法还包括:
    所述第一设备根据所述第一终端设备的标识,从所述第一终端设备的签约信息中获得第二定位服务标识,所述第二定位服务标识用于标识能提供所述第一终端设备的位置的定位服务区域;
    所述第一设备根据所述第一定位服务信息以及所述第一终端设备的标识确定能够提供所述第一终端设备的位置,包括:
    所述第一设备在所述第一定位服务标识与所述第二定位服务标识相同时,确定能够提供所述第一终端设备的位置。
  25. 一种信息发送装置,其特征在于,应用于第一设备,所述装置包括:
    接收单元,用于接收第一终端设备的标识;
    处理单元,用于获得第一定位服务信息,所述第一定位服务信息能够指示能提供终端设备位置的终端设备;
    发送单元,用于在所述处理单元根据所述第一定位服务信息以及所述第一终端设备的标识确定能够提供所述第一终端设备的位置后,发送所述第一终端设备的位置对应的信息。
  26. 根据权利要求25所述的装置,其特征在于,所述第一设备为接入和移动性管理功能实体,
    所述接收单元,具体用于从网关移动定位中心接收所述第一终端设备的标识;
    所述发送单元,具体用于向所述网关移动定位中心发送所述第一终端设备的位置信息。
  27. 根据权利要求25所述的装置,其特征在于,所述第一设备为统一数据管理实体,
    所述接收单元,具体用于从网关移动定位中心接收所述第一终端设备的标识;
    所述发送单元,具体用于向所述网关移动定位中心发送为所述第一终端设备服务的接入和移动性管理功能实体的信息,所述为所述第一终端设备服务的接入和移动性管理功能实体的信息用于所述网关移动定位中心请求所述第一终端设备的位置信息。
  28. 根据权利要求26或27所述的装置,其特征在于,所述处理单元,具体用于:
    根据所述网关移动定位中心以及预配置的每个网关移动定位中心与对应的定位服务信息之间的对应关系,获得与所述网关移动定位中心对应的所述第一定位服务信息;
    或者,从所述网关移动定位中心的证书中获得所述第一定位服务信息;
    或者,从所述网关移动定位中心的访问令牌中获得所述第一定位服务信息;
    或者,从所述网关移动定位中心接收所述第一定位服务信息。
  29. 根据权利要求25所述的装置,其特征在于,所述第一设备为网关移动定位中心,
    所述接收单元,具体用于从位置请求设备接收所述第一终端设备的标识;
    所述发送单元,具体用于向所述位置请求设备发送所述第一终端设备的位置信息。
  30. 根据权利要求29所述的装置,其特征在于,所述处理单元,具体用于:
    根据所述网关移动定位中心以及预配置的每个网关移动定位中心与对应的定位服务信息之间的对应关系,获得与所述网关移动定位中心对应的所述第一定位服务信息;
    或者,从所述位置请求设备的证书中获得所述第一定位服务信息;
    或者,从所述位置请求设备接收所述第一定位服务信息。
  31. 根据权利要求25-30任一项所述的装置,其特征在于,所述第一定位服务信息对应终端设备标识集,所述终端设备标识集中包括:能提供终端设备位置的终端设备的标识;
    所述终端设备标识集中包括所述第一终端设备的标识。
  32. 根据权利要求31所述的装置,其特征在于,
    所述终端设备标识集是根据所述第一定位服务信息以及预配置的定位服务信息与对应的终端设备标识集之间的匹配关系获得的;
    或者,所述终端设备标识集是从与所述第一定位服务信息对应的网关移动定位中心的访问令牌中获得的。
  33. 根据权利要求25-30任一项所述的装置,其特征在于,
    所述第一定位服务信息对应第一定位服务标识,所述第一定位服务标识用于标识所述第一设备对应的能提供终端设备位置的定位服务区域;
    所述处理单元,还用于根据所述第一终端设备的标识,从所述第一终端设备的签约信 息中获得第二定位服务标识,所述第二定位服务标识用于标识能提供所述第一终端设备的位置的定位服务区域;
    所述处理单元,还用于在所述第一定位服务标识与所述第二定位服务标识相同时,确定能够提供所述第一终端设备的位置。
  34. 一种信息发送装置,其特征在于,应用于统一数据管理实体,所述装置包括:
    接收单元,用于从网关移动定位中心或接入和移动性管理功能实体接收第一终端设备的标识;
    处理单元,用于根据所述第一终端设备的标识,确定所述第一终端设备的签约信息;
    所述处理单元,还用于从所述第一终端设备的签约信息中获得第二定位服务标识,所述第二定位服务标识用于标识能提供所述第一终端设备的位置的定位服务区域;
    发送单元,用于向所述网关移动定位中心或所述接入和移动性管理功能实体发送所述第二定位服务标识。
  35. 一种信息发送装置,其特征在于,应用于网络存储功能实体,所述装置包括:
    接收单元,用于从网关移动定位中心接收用于申请所述网关移动定位中心的访问令牌的请求;
    处理单元,用于获得第一定位服务信息,所述第一定位服务信息能够指示能提供终端设备位置的终端设备;
    发送单元,用于向所述网关移动定位中心发送所述网关移动定位中心的访问令牌,所述网关移动定位中心的访问令牌中包括所述第一定位服务信息。
  36. 根据权利要求35所述的装置,其特征在于,所述处理单元,具体用于:
    从所述网关移动定位中心的证书中获得所述第一定位服务信息;
    或者,从所述网关移动定位中心的注册文件中获得所述第一定位服务信息;
    或者,从所述网关移动定位中心接收所述第一定位服务信息。
  37. 根据权利要求35或36所述的装置,其特征在于,在所述处理单元获得第一定位服务信息之前,
    所述接收单元,还用于从所述网关移动定位中心接收用于注册所述网关移动定位中心的请求;
    所述处理单元,还用于获得第二定位服务信息,所述第二定位服务信息能够指示能提供终端设备位置的终端设备;
    所述处理单元,还用于将所述第二定位服务信息写入到所述网关移动定位中心的注册文件中。
  38. 根据权利要求37所述的装置,其特征在于,所述处理单元,具体用于:
    从所述网关移动定位中心接收所述第二定位服务信息;
    或者,从所述网关移动定位中心的证书中获得所述第二定位服务信息。
  39. 根据权利要求35-38任一项所述的装置,其特征在于,
    所述第一定位服务信息对应终端设备标识集,所述终端设备标识集中包括:能提供终端设备位置的终端设备的标识;所述网关移动定位中心的访问令牌中包括所述终端设备标 识集;
    和/或,
    所述第一定位服务信息对应第一定位服务标识,所述第一定位服务标识用于标识第一设备对应的能提供终端设备位置的定位服务区域;所述网关移动定位中心的访问令牌中包括所述第一定位服务标识。
  40. 根据权利要求1-15任一项所述的方法或权利要求25-39任一项所述的装置,其特征在于,所述第一定位服务信息用于标识如下中的至少一项:网关移动定位中心的归属区域、网关移动定位中心的网络服务区域、网关移动定位中心的归属运营商、网关移动定位中心的归属企业、终端设备的归属区域、终端设备的归属企业、终端设备的业务应用、或者终端设备的接入网络区域。
  41. 根据权利要求40所述的方法或装置,其特征在于,所述第一定位服务信息包括如下中的至少一项:网关移动定位中心的边缘区域标识、网关移动定位中心的标识、网关移动定位中心的实例标识、网关移动定位中心的网络协议地址、网关移动定位中心的网络端口、接入和移动性管理功能实体/统一数据管理实体的标识、终端设备的标识、终端设备的应用标识、应用功能实体标识、应用服务器标识、终端设备的客户端标识、终端设备与归属运营商所签约的区域标识、终端设备所注册的区域标识、终端设备的归属企业标识、终端设备所接入的网络切片标识、终端设备的跟踪区域标识、终端设备所接入的小区区域标识、或者终端设备的地理位置信息。
  42. 一种信息发送系统,其特征在于,所述系统包括如权利要求25-33任一所述的信息发送装置,以及网关移动定位中心和位置请求设备中的至少一个设备,所述网关移动定位中心和位置请求设备中的一个设备用于向所述信息发送装置发送第一终端设备的标识,以及用于接收所述第一终端设备的位置对应的信息。
PCT/CN2023/100499 2022-06-29 2023-06-15 信息发送方法和装置 WO2024001811A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210757240.0 2022-06-29
CN202210757240.0A CN117376810A (zh) 2022-06-29 2022-06-29 信息发送方法和装置

Publications (1)

Publication Number Publication Date
WO2024001811A1 true WO2024001811A1 (zh) 2024-01-04

Family

ID=89383206

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/100499 WO2024001811A1 (zh) 2022-06-29 2023-06-15 信息发送方法和装置

Country Status (2)

Country Link
CN (1) CN117376810A (zh)
WO (1) WO2024001811A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6463289B1 (en) * 1999-08-09 2002-10-08 Ericsson Inc. System and method for providing restricting positioning of a target mobile station based on the calculated location estimate
WO2004086781A1 (fr) * 2003-03-24 2004-10-07 Huawei Technologies Co., Ltd. Procede de demande d'information de localisation de zone a acces limite dans un service de localisation
CN1582007A (zh) * 2003-08-11 2005-02-16 华为技术有限公司 一种区域变化类位置信息请求的处理方法
CN111866733A (zh) * 2019-04-29 2020-10-30 华为技术有限公司 终端设备的位置确定方法和设备
EP3918854A1 (en) * 2019-02-14 2021-12-08 Samsung Electronics Co., Ltd. Position of user equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6463289B1 (en) * 1999-08-09 2002-10-08 Ericsson Inc. System and method for providing restricting positioning of a target mobile station based on the calculated location estimate
WO2004086781A1 (fr) * 2003-03-24 2004-10-07 Huawei Technologies Co., Ltd. Procede de demande d'information de localisation de zone a acces limite dans un service de localisation
CN1582007A (zh) * 2003-08-11 2005-02-16 华为技术有限公司 一种区域变化类位置信息请求的处理方法
EP3918854A1 (en) * 2019-02-14 2021-12-08 Samsung Electronics Co., Ltd. Position of user equipment
CN111866733A (zh) * 2019-04-29 2020-10-30 华为技术有限公司 终端设备的位置确定方法和设备

Also Published As

Publication number Publication date
CN117376810A (zh) 2024-01-09

Similar Documents

Publication Publication Date Title
CN109842906B (zh) 一种通信的方法、装置及系统
WO2020147760A1 (zh) 一种局域网通信方法、装置及系统
EP3577952B1 (en) Method and system for selection of an access and mobility management function in an access network environment
EP2489236B1 (en) Apparatus and method for establishing a personal network for providing a cpns service
EP4167625A1 (en) Communication method and apparatus
WO2018232570A1 (zh) 一种注册及会话建立的方法、终端和amf实体
US11522761B2 (en) Communication method and apparatus
WO2021017999A1 (zh) 策略控制功能网元的选择方法、装置、系统及存储介质
WO2020224559A1 (zh) 群组管理方法、装置及系统
WO2020173430A1 (zh) 一种会话建立方法及装置
KR20220162762A (ko) 멀티캐스트 및 브로드캐스트 서비스 통신 방법, 장치, 전자 디바이스, 및 저장 매체
TWI640214B (zh) 一種網路接入方法、相關設備和系統
JP7467669B2 (ja) 接続確立方法、通信装置、およびシステム
WO2019057015A1 (zh) 一种网络切片管理方法及装置
US20240015069A1 (en) Network function registration method, discovery method, apparatus, device and medium
US20230359515A1 (en) Method and Apparatus for Application Programming Interface Management
WO2024001811A1 (zh) 信息发送方法和装置
WO2020093742A1 (zh) 一种api发布方法及装置
US11811856B2 (en) Determining a common application context relocation method for edge computing
US10645085B2 (en) Device management across multiple operator networks
US20230137283A1 (en) Systems and methods to optimize registration and session establishment in a wireless network
WO2022099484A1 (zh) 标识发送方法和通信装置
WO2018126483A1 (zh) 一种网络服务的控制方法及装置
CN115209522B (zh) 网络功能注册方法、发现方法、装置、设备及介质
WO2024022370A1 (zh) 信息获取和发送方法、服务器访问和会话建立方法及设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23829991

Country of ref document: EP

Kind code of ref document: A1