WO2024065335A1 - 一种侧行链路定位方法及装置 - Google Patents

一种侧行链路定位方法及装置 Download PDF

Info

Publication number
WO2024065335A1
WO2024065335A1 PCT/CN2022/122341 CN2022122341W WO2024065335A1 WO 2024065335 A1 WO2024065335 A1 WO 2024065335A1 CN 2022122341 W CN2022122341 W CN 2022122341W WO 2024065335 A1 WO2024065335 A1 WO 2024065335A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
token
sidelink
network element
positioning
Prior art date
Application number
PCT/CN2022/122341
Other languages
English (en)
French (fr)
Inventor
商正仪
陆伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN202280003728.2A priority Critical patent/CN118104186A/zh
Priority to PCT/CN2022/122341 priority patent/WO2024065335A1/zh
Publication of WO2024065335A1 publication Critical patent/WO2024065335A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator

Definitions

  • the present disclosure relates to the field of communication technology, and in particular to a sidelink positioning method and device.
  • the fifth generation mobile communication technology 5th Generation Mobile Communication Technology, referred to as 5G
  • 5G Fifth Generation Mobile Communication Technology
  • the target terminal device also known as the user terminal, User Equipment, referred to as UE
  • the target terminal device needs to discover one or more positioning UEs with SL positioning and/or with Uu positioning functions, and use the selected positioning UE to perform the SL positioning measurement procedure.
  • the privacy of the terminal device is not protected.
  • the embodiments of the present disclosure provide a sidelink positioning method and device.
  • an embodiment of the present disclosure provides a sidelink positioning method, which is performed by a first terminal device, and the method includes:
  • the measurement result is sent to the first network element.
  • the first terminal device after receiving the first request sent by the first network element for requesting a sidelink positioning service with the second terminal device, the first terminal device can send its own first token to the second terminal device, and then establish a sidelink with the second terminal device, perform sidelink measurement, and send the measurement result to the first network element after obtaining the measurement result. Therefore, before performing sidelink positioning, the token is first exchanged for authorization verification, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • an embodiment of the present disclosure provides a sidelink positioning method, which is performed by a second terminal device, and the method includes:
  • a sidelink is established with the first terminal device
  • an embodiment of the present disclosure provides a communication device, including:
  • a transceiver module configured to receive a first request sent by a first network element, wherein the first request is used to request a sidelink positioning service with a second terminal device;
  • the transceiver module is further used to send a first token to the second terminal device, where the first token is used to characterize the role of the first terminal device in the sidelink positioning service, and the role of the first terminal device in the sidelink positioning service is used by the second terminal device to determine whether to perform the sidelink positioning service with the first terminal device;
  • a processing module used to establish a side link with the second terminal device and perform side link positioning measurement
  • the transceiver module is further configured to send the measurement result to the first network element.
  • an embodiment of the present disclosure provides another communication device, including:
  • a transceiver module configured to receive a first token sent by a first terminal device, wherein the first token is used to characterize a role of the first terminal device in the sidelink positioning service;
  • a processing module configured to establish a side link with the first terminal device when determining, according to the first token, to perform the side link positioning service with the first terminal device;
  • the processing module is also used to perform side link positioning measurements.
  • an embodiment of the present disclosure provides a communication device, which includes a processor.
  • the processor calls a computer program in a memory, the method described in the first aspect is executed.
  • an embodiment of the present disclosure provides a communication device, which includes a processor.
  • the processor calls a computer program in a memory, the method described in the second aspect is executed.
  • an embodiment of the present disclosure provides a communication device, which includes a processor and a memory, in which a computer program is stored; the processor executes the computer program stored in the memory so that the communication device executes the method described in the first aspect above.
  • an embodiment of the present disclosure provides a communication device, which includes a processor and a memory, in which a computer program is stored; the processor executes the computer program stored in the memory so that the communication device executes the method described in the second aspect above.
  • an embodiment of the present disclosure provides a communication device, which includes a processor and an interface circuit, wherein the interface circuit is used to receive code instructions and transmit them to the processor, and the processor is used to run the code instructions to enable the device to execute the method described in the first aspect above.
  • an embodiment of the present disclosure provides a communication device, which includes a processor and an interface circuit, wherein the interface circuit is used to receive code instructions and transmit them to the processor, and the processor is used to run the code instructions to enable the device to execute the method described in the second aspect above.
  • an embodiment of the present disclosure provides an indicating sidelink positioning system, the system comprising the communication device described in the third aspect and the communication device described in the fourth aspect, or the system comprising the communication device described in the fifth aspect and the communication device described in the sixth aspect, or the system comprising the communication device described in the seventh aspect and the communication device described in the eighth aspect, or the system comprising the communication device described in the ninth aspect and the communication device described in the tenth aspect.
  • an embodiment of the present invention provides a computer-readable storage medium for storing instructions for the above-mentioned terminal device, and when the instructions are executed, the terminal device executes the method described in the first aspect.
  • an embodiment of the present invention provides a readable storage medium for storing instructions used by the above-mentioned network device, and when the instructions are executed, the network device executes the method described in the above-mentioned second aspect.
  • the present disclosure further provides a computer program product comprising a computer program, which, when executed on a computer, enables the computer to execute the method described in the first aspect above.
  • the present disclosure further provides a computer program product comprising a computer program, which, when executed on a computer, enables the computer to execute the method described in the second aspect above.
  • the present disclosure provides a chip system, which includes at least one processor and an interface, and is used to support a terminal device to implement the functions involved in the first aspect, for example, determining or processing at least one of the data and information involved in the above method.
  • the chip system also includes a memory, and the memory is used to store computer programs and data necessary for the terminal device.
  • the chip system can be composed of a chip, or it can include a chip and other discrete devices.
  • the present disclosure provides a chip system, which includes at least one processor and an interface, and is used to support a network device to implement the functions involved in the second aspect, for example, determining or processing at least one of the data and information involved in the above method.
  • the chip system also includes a memory, and the memory is used to store computer programs and data necessary for the network device.
  • the chip system can be composed of a chip, or it can include a chip and other discrete devices.
  • the present disclosure provides a computer program, which, when executed on a computer, enables the computer to execute the method described in the first aspect.
  • the present disclosure provides a computer program which, when executed on a computer, enables the computer to execute the method described in the second aspect.
  • FIG1 is a schematic diagram of the architecture of a communication system provided by an embodiment of the present disclosure.
  • FIG2 is a schematic diagram of a flow chart of a sidelink positioning method provided by an embodiment of the present disclosure
  • FIG3 is a schematic flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG4 is a schematic diagram of a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG5 is a schematic flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG. 6 is a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG7 is a schematic flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG8 is an interactive schematic diagram of another sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG9 is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure.
  • FIG10 is a schematic diagram of the structure of another communication device provided in an embodiment of the present disclosure.
  • FIG. 11 is a schematic diagram of the structure of a chip provided in an embodiment of the present disclosure.
  • Located UE is a terminal device that is within the coverage of the network and can execute the positioning procedure based on the Uu interface and/or SL positioning.
  • the positioned terminal device in the sidelink positioning service can assist the terminal device that needs to be located to perform sidelink measurements.
  • the target UE is the terminal device whose position needs to be determined, that is, it needs to be positioned.
  • the sidelink positioning service can be used to perform sidelink measurement positioning with the positioning terminal device.
  • the target terminal device within the network coverage range, it means that the target terminal device can exchange information with the core network network elements through the access network equipment, and not within the network coverage range means that the target terminal device cannot exchange information with the core network network elements through the access network equipment.
  • Sidelink positioning service also known as sidelink positioning service or ranging service, refers to determining the distance between two UEs and/or the direction from one UE to another UE through a direct communication connection.
  • the token in the present disclosure is at least used to characterize the role of the terminal device in the sidelink positioning service.
  • the token of the positioning terminal device can at least characterize the role of the terminal device in the sidelink positioning service as a positioning terminal device
  • the token of the target terminal device can at least characterize the role of the terminal device in the sidelink positioning service as a terminal device that needs to be positioned.
  • FIG. 1 is a schematic diagram of the architecture of a communication system provided by an embodiment of the present disclosure.
  • the communication system may include, but is not limited to, a network device and a terminal device.
  • the number and form of devices shown in FIG. 1 are only used for example and do not constitute a limitation on the embodiment of the present disclosure. In actual applications, two or more network devices and two or more terminal devices may be included.
  • the communication system shown in FIG. 1 includes, for example, a network device 11, a positioning terminal device 12, and a target terminal device 13.
  • LTE long term evolution
  • 5G fifth generation
  • NR 5G new radio
  • the network device in the embodiments of the present disclosure is an entity on the network side for transmitting or receiving signals.
  • eNB evolved NodeB
  • TRP transmission reception point
  • gNB next generation NodeB
  • WiFi wireless fidelity
  • the embodiments of the present disclosure do not limit the specific technology and specific device form adopted by the network device.
  • the network device provided in the embodiments of the present disclosure may be composed of a central unit (CU) and a distributed unit (DU), wherein the CU may also be referred to as a control unit.
  • CU central unit
  • DU distributed unit
  • the CU-DU structure may be used to split the protocol layer of a network device, such as a base station, and the functions of some protocol layers are placed in the CU for centralized control, and the functions of the remaining part or all of the protocol layers are distributed in the DU, and the DU is centrally controlled by the CU.
  • a network device such as a base station
  • the terminal device 12 or 13 in the disclosed embodiment is an entity for receiving or transmitting signals on the user side, such as a mobile phone.
  • the terminal device may also be referred to as a terminal device (terminal), a user equipment (UE), a mobile station (MS), a mobile terminal device (MT), etc.
  • the terminal device may be a car with communication function, a smart car, a mobile phone (mobile phone), a wearable device, a tablet computer (Pad), a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device in industrial control (industrial control), a wireless terminal device in self-driving, a wireless terminal device in remote medical surgery, a wireless terminal device in smart grid (smart grid), a wireless terminal device in transportation safety (transportation safety), a wireless terminal device in a smart city (smart city), a wireless terminal device in a smart home (smart home), etc.
  • the embodiments of the present disclosure do not limit the specific technology and specific device form adopted by the terminal device.
  • the communication system described in the embodiment of the present disclosure is for the purpose of more clearly illustrating the technical solution of the embodiment of the present disclosure, and does not constitute a limitation on the technical solution provided by the embodiment of the present disclosure.
  • Ordinary technicians in this field can know that with the evolution of system architecture and the emergence of new business scenarios, the technical solution provided by the embodiment of the present disclosure is also applicable to similar technical problems.
  • the positioning terminal device 12 can implement the method shown in any embodiment of Figures 2 to 4 of the present disclosure.
  • the target terminal device can also implement the method described in Figures 5 to 7 of the present disclosure.
  • the communication system described in the embodiment of the present disclosure is for the purpose of more clearly illustrating the technical solution of the embodiment of the present disclosure, and does not constitute a limitation on the technical solution provided by the embodiment of the present disclosure.
  • a person skilled in the art can know that with the evolution of the system architecture and the emergence of new business scenarios, the technical solution provided by the embodiment of the present disclosure is also applicable to similar technical problems.
  • a side-link positioning method is proposed. Before starting the side-link positioning service, the target terminal device first checks the authorization of the positioning terminal device, and starts the side-link positioning service after the authorization is passed, thereby protecting the privacy of the positioning terminal device during the side-link positioning process and improving the security of the side-link positioning service.
  • Figure 2 is a schematic diagram of a flow chart of a sidelink positioning method provided by an embodiment of the present disclosure.
  • the method provided by this embodiment can be executed by a first terminal device. As shown in Figure 2, the method can include but is not limited to the following steps:
  • Step 201 Receive a first request sent by a first network element, wherein the first request is used to request a sidelink positioning service with a second terminal device.
  • the first network element may be any one of the following: a positioning management function (LMF) network element, an access and mobility management function (AMF) network element, and a gateway mobile location center (GMLC).
  • LMF positioning management function
  • AMF access and mobility management function
  • GMLC gateway mobile location center
  • the first network element can send a first request to a first terminal device (e.g., a positioning terminal device) to request the first terminal device to perform sidelink positioning with a target terminal device (e.g., a second terminal device).
  • a first terminal device e.g., a positioning terminal device
  • a target terminal device e.g., a second terminal device
  • the first request may be a ranging request or a sidelink positioning request, which is not limited in the present disclosure.
  • Step 202 Send a first token to a second terminal device.
  • the first token is a token used to characterize the role (positioning terminal device) of the first terminal device in the sidelink positioning service process.
  • the first token can characterize that the first terminal device can use the sidelink positioning service and its role in the service is a positioning terminal device.
  • the token can be provided by the second network element.
  • the second network element can be any one of the following: GMLC, direct discovery name management function (DDNMF) network element, proximity services key management function (ProSe PKMF) network element, and ranging application server (ranging App server) network element.
  • DDNMF direct discovery name management function
  • ProSe PKMF proximity services key management function
  • ranging App server ranging App server
  • the first terminal device may also send a first ranging service code (RSC) to the second terminal device.
  • the first RSC is used to characterize the version or type of ranging/sidelink positioning service currently supported by the first terminal device.
  • the first RSC may be pre-configured in the first terminal device, or requested by the first terminal device to the second network element and provided by the second network element.
  • the first terminal device may request the first RSC and the first token from the second network element, and then the second network element provides the first RSC and the first token to the first terminal device.
  • Step 203 Establish a side link with the second terminal device and perform side link positioning measurement.
  • the second terminal device can determine whether it can perform a sidelink positioning service with the first terminal device according to the first token. After determining that the sidelink positioning service can be performed with the first terminal device, a sidelink between the two can be established, and sidelink positioning measurement can be performed based on the sidelink.
  • the side link may be a PC5 link or an SR5 link, or may be other links, which is not limited in the present disclosure.
  • the measurement result may include a relative distance and/or a relative angle between the second terminal device and the first terminal device, etc., which is not limited in the present disclosure.
  • Step 204 Send the measurement result to the first network element.
  • the first terminal device after receiving the first request sent by the first network element for requesting a sidelink positioning service with the second terminal device, the first terminal device can send its first token to the second terminal device, and the second terminal device verifies the identity of the first terminal device according to the first token, and then establishes a sidelink with the second terminal device, performs sidelink measurement, and sends the measurement result to the first network element after obtaining the measurement result. Therefore, before performing sidelink positioning, tokens are first exchanged to perform authorization verification on the role of the terminal device, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • Figure 3 is a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • the method provided by this embodiment can be executed by a first terminal device. As shown in Figure 3, the method can include but is not limited to the following steps:
  • Step 301 Send a second request to a second network element, where the second request is used to request parameters for establishing a side link.
  • the second network element can be any one of the following: GMLC, direct discovery name management function (DDNMF) network element, proximity services key management function (ProSe PKMF) network element, and ranging application server (ranging App server) network element.
  • DDNMF direct discovery name management function
  • ProSe PKMF proximity services key management function
  • ranging App server ranging App server
  • the first terminal device may send the second request to the second network element when accessing the network; or, the first terminal device may send the second request to the second network element when necessary, for example, the first terminal device may periodically send the second request to the second network element; or, the first terminal device may send the second request to the second network element before performing sidelink positioning each time, to request the latest information that can be used to establish the sidelink.
  • This disclosure is not limited to this.
  • Step 302 receiving information sent by the second network element for establishing a side link, wherein the information for establishing the side link includes at least one of the following: security parameters for the discovery phase, a first token, a validity period corresponding to the first token, a first RSC and a key.
  • the security parameter used in the discovery phase is a parameter used to protect the security of the terminal device in the discovery phase.
  • the security parameter may be a key, or other parameters including a key, which is not limited in the present disclosure.
  • the security parameters used in the discovery phase may be obtained by the first terminal device after requesting the second network element; or, they may be actively configured by the second network element after the first terminal device accesses the network, which is not limited in the present disclosure.
  • the first token can represent that the first terminal device can use the sidelink positioning service, and its role in the service is a positioning terminal device.
  • the validity period corresponding to the first token is used to represent the period during which the first token can be used.
  • the first token in order to prevent the token corresponding to the terminal device from being maliciously altered, can be generated by the second network element after encrypting information such as the role of the first terminal device.
  • the key in the information for establishing the sidelink is the encryption key used by the second network element when generating the first token, or is a decryption key used in association with the encryption key.
  • the information sent by the second network element for establishing the sidelink may not include the validity period of the first token, but the validity period of the first token and other information may be integrated into the first token.
  • the second network element may encrypt the validity period of the first token and the role of the first terminal device and other information to generate the first token. After that, after the first terminal device receives the information sent by the second network element for establishing the sidelink, it decrypts the first token with the key and determines the validity period corresponding to the first token.
  • Step 303 Receive a first request sent by the first network element, wherein the first request is used to request a sidelink positioning service with the second terminal device.
  • step 303 can refer to the detailed description of any embodiment of the present disclosure, which will not be repeated here.
  • Step 304 Send the first RSC and the first token to the second terminal device.
  • the first terminal device after receiving the first request sent by the first network element, when the first terminal device determines that it needs to perform sidelink positioning on the second terminal device, it can first determine whether the corresponding first token is still within the validity period. If the first token has expired, that is, the first terminal device can no longer be used as a positioning terminal device, then the sidelink positioning service process can be terminated, or an indication of the invalidation of the first token can be returned to the first network element. Afterwards, the first network element can reselect the positioning terminal device as needed.
  • the first terminal device can still be used as a positioning terminal device, then the first terminal device can send its corresponding first RSC and first token to the second terminal device.
  • the first terminal device may run a discovery process based on discovery model B, and send the first RSC and the first token to the second terminal device by sending a discovery message to the second terminal device.
  • the first terminal device may also perform integrity protection and/or confidentiality protection on the discovery message containing the first RSC and the first token.
  • Step 305 Establish a sidelink with the second terminal device and perform sidelink positioning measurement.
  • Step 306 Send the measurement result to the first network element.
  • step 305 and step 306 may refer to the detailed description of any embodiment of the present disclosure, and will not be repeated here.
  • the first terminal device first sends a second request for parameters for establishing a sidelink to the second network element.
  • the first RSC and the first token of the first terminal device can be sent to the second terminal device, and then the sidelink with the second terminal device is established to perform sidelink measurement, and the measurement result is sent to the first network element after the measurement result is obtained. Therefore, before performing sidelink positioning, the role of the terminal device is first authorized and verified through the interactive token, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • Figure 4 is a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • the method provided by this embodiment can be executed by a first terminal device. As shown in Figure 4, the method can include but is not limited to the following steps:
  • Step 401 Send a second request to a second network element, where the second request is used to request parameters for establishing a side link.
  • Step 402 Receive information sent by the second network element for establishing a side link, wherein the information for establishing the side link includes at least one of the following: security parameters for a discovery phase, a first token, a validity period corresponding to the first token, a first RSC and a key.
  • Step 403 Receive a first request sent by the first network element, wherein the first request is used to request a sidelink positioning service with the second terminal device.
  • Step 404 determine that the first token is within the validity period, and encrypt the first message using the security parameters used in the discovery phase, wherein the first message includes the first RSC and the first token.
  • the first message may be a discovery message generated when the first terminal device runs the discovery model B.
  • the first message is used to indicate to the second terminal device that the first terminal device can be used as a positioning terminal device in the sidelink positioning service.
  • Step 405 Send a first message to the second terminal device.
  • Step 406 In response to receiving the first response message sent by the second terminal device, a sidelink establishment request is sent to the second terminal device.
  • the first response message may be a discovery response message. That is, after the second terminal device intercepts the discovery message sent by the first terminal device, it may return a discovery response message to the first terminal device, so that the first terminal device can determine that the second terminal device has authenticated and authorized its identity information (the first RSC and the first token), and determine that the authorization is passed.
  • the first terminal device may initiate the sidelink establishment process, for example, by sending a sidelink establishment request to the second terminal device.
  • the side link establishment request may also include the first token so that the second terminal device can verify the first token again, thereby further ensuring the reliability and security of the side link.
  • Step 407 Receive a second response message returned by the second terminal device, wherein the second response message includes a second token.
  • the second terminal device may also send its corresponding second token to the first terminal device for verification.
  • Step 408 Verify the second token using the key.
  • Step 409 In response to the second token being within the validity period and the type of the terminal device being a target terminal device, a side link is established with the second terminal device.
  • the second token is verified, including decrypting the second token using a key to determine whether the information contained in the second token is complete and whether various information of the second terminal device can be obtained by decrypting the second token. For example, by decrypting the second token, the corresponding validity period and the role information of the second terminal device in the sidelink positioning process can be determined.
  • a side link with the second terminal device can be established.
  • the second terminal device is not the target terminal device, for example, the second terminal device is also a positioning terminal device, then the current side link positioning process can be terminated, or the first terminal device can indicate the determined result to the first network element, etc.
  • the present disclosure does not limit this.
  • the second terminal device may also include a second token in the first response message, and then the first terminal device may verify and authorize the role of the second terminal device after receiving the first response message.
  • This disclosure does not limit this.
  • Step 410 perform sidelink positioning measurement and obtain measurement results.
  • Step 411 Send the measurement result to the first network element.
  • the first terminal device first sends a second request to the second network element to request a first token, a first RSC, etc., and then after receiving the first request sent by the first network element to indicate the sidelink positioning service with the second terminal device, it can send its own first RSC and first token to the second terminal device.
  • the first response message returned by the second terminal device After receiving the first response message returned by the second terminal device, it can send a sidelink establishment request to the second terminal device, and then after receiving the second response message returned by the second terminal device, it can verify the second token information of the second terminal device. After the verification is passed, the sidelink with the second terminal device is established to perform sidelink measurement, and the measurement result is sent to the first network element after obtaining the measurement result. Therefore, before performing the sidelink positioning service and establishing the sidelink, the role of the terminal device is authorized and verified through the interactive token, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • Figure 5 is a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • the method provided by this embodiment can be executed by a second terminal device. As shown in Figure 5, the method can include but is not limited to the following steps:
  • Step 501 Receive a first token sent by a first terminal device, where the first token is used to represent a role of the first terminal device in a sidelink positioning service.
  • the first terminal device is a positioning terminal device in the sidelink positioning service.
  • the second terminal device is a terminal device that is not currently in the network coverage but needs to be positioned, that is, when the second terminal device receives the first token sent by the first terminal device, it is not in the network coverage.
  • the second terminal device may also receive a first ranging service code RSC sent by the first terminal device.
  • RSC ranging service code
  • the specific meanings of the first RSC and the first token may refer to the detailed description of any embodiment of the present disclosure, and will not be repeated here.
  • Step 502 when it is determined based on the first token to perform the sidelink positioning service with the first terminal device, a sidelink is established with the first terminal device.
  • the second terminal device e.g., the target terminal device
  • the second terminal device can first determine the role information of the first terminal device represented by the first token in the sidelink positioning service, and then determine whether the sidelink positioning service can be performed with the first terminal device based on the role information of the first terminal device. For example, it is determined whether the first terminal device represented by the first token is a positioning terminal device in the sidelink positioning service, and whether the role of the first terminal device at the current moment is still a positioning terminal device, and so on.
  • the second terminal device may also verify the first RSC to determine whether the ranging service currently supported by the first terminal device is the same as the ranging service currently supported by the second terminal device.
  • the second terminal device when the second terminal device determines that the role of the first terminal device is a positioning terminal device, it can determine that a sidelink positioning service can be performed with the first terminal device, thereby establishing a sidelink with the first terminal device.
  • the side link may be a PC5 link, an SR5 link, or other side links, which is not limited in the present disclosure.
  • the second terminal device may end the process when determining not to provide the sidelink positioning service with the first terminal device.
  • Step 503 perform sidelink positioning measurements.
  • the second terminal device after receiving the first token sent by the first terminal device, the second terminal device first determines whether to perform the sidelink positioning service with the first terminal device according to the first token, and then establishes a sidelink with the first terminal device after determining that the sidelink positioning service can be performed with the first terminal device, and performs the sidelink positioning measurement. Therefore, before performing the sidelink positioning, the role of the terminal device is first authorized and verified through the interactive token, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • Figure 6 is a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure, and the method is executed by a second terminal device. As shown in Figure 6, the method may include but is not limited to the following steps:
  • Step 601 When within the coverage of the network, send a first request to a second network element, wherein the first request is used to request parameters for establishing a side link.
  • Step 602 Receive information for establishing a side link sent by a second network element, wherein the information for establishing the side link includes security parameters for a discovery phase, a second RSC, and a key.
  • the second terminal device may send a first request to the second network element when accessing the network or when determining that it is within the coverage of the network, so as to request the network element for parameters required for establishing a side link.
  • the second network element in this embodiment includes any one of the following items: a gateway mobile location center GMLC, a direct discovery name management function DDNMF network element, a proximity service ProSe key management function PKMF network element, and a ranging application server ranging App server network element.
  • the role and meaning of each parameter in the information sent by the second network element for establishing the side link can refer to the detailed description of any embodiment of the present disclosure, and will not be repeated here.
  • the information for establishing the side link returned by the network element to the second terminal device may also include a second token, the validity period corresponding to the second token, etc.
  • Step 603 Receive a first message sent by a first terminal device.
  • the first message may be a discovery message generated by the first terminal device when executing discovery model B.
  • Step 604 Verify the first message using the security parameters used in the discovery phase to obtain the first RSC and the first token in the first message.
  • the second terminal device may decode or decrypt the first message using the security parameter to obtain the first RSC and the first token included in the first message.
  • Step 605 comparing the first RSC with the second RSC.
  • Step 606 When the first RSC is the same as the second RSC, use the key to verify whether the first token is within the validity period and whether the terminal device type corresponding to the first token is a positioning terminal device.
  • the first RSC in the first terminal device and the second RSC in the second terminal device should be the same. Therefore, after determining the first RSC sent by the first terminal device, the second terminal device can compare the two.
  • the first RSC is the same as the second RSC, it means that the ranging service currently used by the first terminal device is the same as the ranging service currently used by the second terminal device, so that the second terminal device can verify the role of the second terminal device represented by the first token. Otherwise, the second terminal device can determine that it is currently unable to perform the ranging service with the first terminal device.
  • the second terminal device can use the key to decrypt the first token to obtain the validity period corresponding to the first token and the type of the first terminal device. And according to the validity period corresponding to the first token, determine whether the first token is within the validity period. If the first token is within the validity period and the first terminal device is a positioning terminal device, then it can be considered that the verification is passed, otherwise it can be confirmed that the verification is not passed.
  • Step 607 In response to the verification being successful, a side link is established with the first terminal device.
  • Step 608 perform sidelink positioning measurements.
  • the second terminal device when the second terminal device is within the coverage of the network, it first sends a first request to the second network element to request information for establishing a side link. After receiving the first RSC and the first token sent by the first terminal device, it can verify the first RSC and the first token based on the requested information for establishing the side link. After determining that the side link positioning service can be performed with the first terminal device, it then establishes a side link with the first terminal device and performs positioning measurements. Therefore, before performing side link positioning, the role of the positioning terminal device is first authorized and verified through an interactive token, thereby ensuring the privacy security of the terminal device during the side link positioning process and improving the security of the side link positioning service.
  • Figure 7 is a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure, and the method is executed by a second terminal device. As shown in Figure 7, the method may include but is not limited to the following steps:
  • Step 701 When within the network coverage, send a first request to a second network element, wherein the first request is used to request parameters for establishing a side link.
  • Step 702 Receive information sent by the second network element for establishing a side link, wherein the information for establishing the side link includes security parameters for the discovery phase, a second token, a validity period corresponding to the second token, a second RSC and a key.
  • Step 703 Receive a first message sent by a first terminal device.
  • Step 704 Verify the first message using the security parameters used in the discovery phase to obtain the first RSC and the first token in the first message.
  • Step 705 compare the first RSC with the second RSC.
  • Step 706 When the first RSC is the same as the second RSC, use the key to verify whether the first token is within the validity period and whether the terminal device type corresponding to the first token is a positioning terminal device.
  • Step 707 In response to the verification being successful, a first response message is sent to the first terminal device.
  • the first response message may be a discovery response message. That is, after the second terminal device intercepts the discovery message sent by the first terminal device and authorizes the identity authentication of the first terminal device, it may return a discovery response message to the first terminal device, so that the first terminal device may determine that the second terminal device has authenticated and authorized its identity information (the first RSC and the first token), and determine that the authorization is passed. Thus, the first terminal device may start the sidelink establishment process and send a sidelink establishment request to the second terminal device.
  • the second terminal device may also include a second token in the first response message, so that the first terminal device can verify and authorize the role of the second terminal device after receiving the first response message, which is not limited in the present disclosure.
  • Step 708 Receive a side link establishment request sent by the first terminal device, wherein the establishment request includes a first token.
  • the side link establishment request may also include the first token so that the second terminal device can verify the first token again, thereby further ensuring the reliability and security of the side link.
  • Step 709 Use the key to verify the first token.
  • Step 710 In response to the first token being within the validity period and the first terminal device being a positioning terminal device, a second response message is sent to the first terminal device, wherein the second response message includes the second token.
  • Step 711 establish a side link with the first terminal device and perform side link positioning measurement.
  • the second terminal device when the second terminal device is within the coverage of the network, it first sends a first request to the second network element to request the information required to establish the side link. After that, after receiving the first RSC and the first token sent by the first terminal device, the first RSC and the first token can be verified based on the requested information for establishing the side link. After determining that the side link positioning service can be performed with the first terminal device, a first response message is sent to the first terminal device. After receiving the side link establishment request sent by the first terminal device, the first token in the request is verified again. After the verification is passed, the second token is sent to the second terminal device, and then a side link is established with the first terminal device, and positioning measurements are performed through the side link. Therefore, before establishing the side link and before performing side link positioning, tokens are exchanged to authenticate each other's roles, thereby ensuring the privacy security of the terminal device during the side link positioning process and improving the security of the side link positioning service.
  • Figure 8 is an interactive schematic diagram of a sidelink positioning method provided by an embodiment of the present disclosure. As shown in Figure 8, the method may include but is not limited to the following steps:
  • Step 801 AMF receives a sidelink positioning service request, wherein the service request includes an identifier of a target terminal device.
  • AMF can receive ranging/sidechain positioning service requests from any NF or AF.
  • the AMF After receiving the sidelink positioning service request, the AMF can select an LMF and one or more positioning terminal devices according to the identification of the target terminal device.
  • Step 802 AMF sends a sidelink positioning service request to the selected LMF, which includes the identifier of the target terminal device and the identifiers of one or more positioning terminal devices.
  • Step 803 LMF sends a sidelink positioning request to one or more positioning terminal devices to trigger the sidelink positioning process.
  • Step 804 The positioning terminal device performs a ranging discovery process and provides a first RSC and a first token to the target terminal device through a discovery message.
  • Step 805 The target terminal device verifies the first RSC and the first token.
  • Step 806 In response to the verification being successful, the target terminal device sends a discovery response message to the positioning terminal device.
  • Step 807 The positioning terminal device establishes a side link with the target terminal device.
  • the positioning terminal device and the target terminal device may exchange tokens with each other during the process of establishing the side link to perform verification and authorization again.
  • Step 808 The positioning terminal device or the target terminal device performs sidelink positioning measurements via the sidelink.
  • Step 809 The positioning terminal device sends the side link measurement result to the LMF.
  • Step 810 LMF triggers a positioning process of the positioning terminal device to obtain location information of the positioning terminal device.
  • Step 811 LMF determines the location of the target terminal device based on the location information of the positioning terminal device and the side link measurement result.
  • Step 812 LMF sends the location of the target terminal device to AMF.
  • Step 813 AMF reports the location of the target terminal device.
  • the target terminal device and the positioning terminal device before performing sidelink positioning, the target terminal device and the positioning terminal device first perform identity verification and authorization by exchanging tokens, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • the communication device 900 shown in Figure 9 may include a transceiver module 901 and a processing module 902.
  • the transceiver module 901 may include a sending module and/or a receiving module, the sending module is used to implement a sending function, the receiving module is used to implement a receiving function, and the transceiver module 901 may implement a sending function and/or a receiving function.
  • the communication device 900 can be a terminal device, or can be a device in the terminal device, or can be a device that can be used in conjunction with the terminal device.
  • the communication device 900 is at the first terminal device side, wherein:
  • the transceiver module 901 is configured to receive a first request sent by a first network element, wherein the first request is used to request a sidelink positioning service with a second terminal device;
  • the transceiver module 901 is used to send a first token to the second terminal device, where the first token is used to characterize the role of the first terminal device in the sidelink positioning service, and the role of the first terminal device in the sidelink positioning service is used by the second terminal device to determine whether to perform the sidelink positioning service with the first terminal device;
  • the processing module 902 is used to establish a side link with the second terminal device and perform side link positioning measurement
  • the above-mentioned transceiver module 901 is used to send the measurement result to the first network element.
  • processing module 902 is further used to:
  • the transceiver module 901 is further used for:
  • the information for establishing the side link includes at least one of the following:
  • Security parameters used in the discovery phase the first token, the validity period corresponding to the first token, the first RSC and the key.
  • the transceiver module 901 is used to:
  • the upper processing module 902 is used to:
  • a side link is established with the second terminal device.
  • the first message also includes a first ranging service code RSC.
  • the first network element is any one of the following: a positioning management function LMF network element, an access and mobility management function network element AMF, and a gateway mobile location center GMLC;
  • the second network element is any one of the following: GMLC, direct discovery name management function DDNMF network element, proximity service ProSe key management function PKMF network element, and ranging application server ranging App server network element.
  • the first terminal device after receiving the first request sent by the first network element for requesting the sidelink positioning service with the second terminal device, the first terminal device can send its first token to the second terminal device, and then establish a sidelink with the second terminal device, perform sidelink measurement, and send the measurement result to the first network element after obtaining the measurement result. Therefore, before performing the sidelink positioning, the role of the terminal device is first authorized and verified through the interactive token, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • the communication device 900 is at the second terminal device side, wherein:
  • the transceiver module 901 is configured to receive a first token sent by a first terminal device, wherein the first token is used to characterize a role of the first terminal device in the sidelink positioning service;
  • the processing module 902 is configured to establish a side link with the first terminal device when it is determined according to the first token to perform the side link positioning service with the first terminal device;
  • the processing module 902 is used to perform sidelink positioning measurements.
  • the transceiver module 901 is further used for:
  • the information for establishing the side link includes at least one of the following:
  • Security parameters used in the discovery phase a second token, a validity period corresponding to the second token, a second RSC and a key.
  • the transceiver module 901 is used to:
  • the first message is verified using the security parameter used for the discovery phase to obtain a first token in the first message.
  • the first message also includes a first ranging service code
  • the processing module 902 is further configured to:
  • the first token is verified.
  • processing module 902 is used to:
  • the terminal device type corresponding to the first token is a positioning terminal device.
  • processing module 902 is used to:
  • the second network element is any one of the following: gateway mobile location center GMLC, direct discovery name management function DDNMF network element, proximity service ProSe key management function PKMF network element, and ranging application server ranging App server network element.
  • the second terminal device after receiving the first token sent by the first terminal device, the second terminal device first determines whether to perform the sidelink positioning service with the first terminal device according to the first token, and then establishes a sidelink with the first terminal device after determining to perform the sidelink positioning service with the first terminal device, and performs the sidelink positioning measurement. Therefore, before performing the sidelink positioning, the role of the positioning terminal device is first authorized and verified through the interactive token, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • the communication device 1000 can be a terminal device, or a chip, a chip system, or a processor that supports the terminal device to implement the above method.
  • the device can be used to implement the method described in the above method embodiment, and the details can be referred to the description in the above method embodiment.
  • the communication device 1000 may include one or more processors 1001.
  • the processor 1001 may be a general-purpose processor or a dedicated processor, etc. For example, it may be a baseband processor or a central processing unit.
  • the baseband processor may be used to process the communication protocol and communication data
  • the central processing unit may be used to control the communication device (such as a base station, a baseband chip, a terminal device, a terminal device chip, a DU or a CU, etc.), execute a computer program, and process the data of the computer program.
  • the communication device 1000 may further include one or more memories 1002, on which a computer program 1004 may be stored, and the processor 1001 executes the computer program 1004 so that the communication device 1000 performs the method described in the above method embodiment.
  • data may also be stored in the memory 1002.
  • the communication device 1000 and the memory 1002 may be provided separately or integrated together.
  • the communication device 1000 may further include a transceiver 1005 and an antenna 1006.
  • the transceiver 1005 may be referred to as a transceiver unit, a transceiver, or a transceiver circuit, etc., for implementing a transceiver function.
  • the transceiver 1205 may include a receiver and a transmitter, the receiver may be referred to as a receiver or a receiving circuit, etc., for implementing a receiving function; the transmitter may be referred to as a transmitter or a transmitting circuit, etc., for implementing a transmitting function.
  • the communication device 1000 may further include one or more interface circuits 1007.
  • the interface circuit 1007 is used to receive code instructions and transmit them to the processor 1001.
  • the processor 1001 executes the code instructions to enable the communication device 1000 to execute the method described in the above method embodiment.
  • the transceiver 1005 in the communication device 1000 may be used to execute the transceiver steps in the above figures, and the processor 1001 may be used to execute the processing steps in the above figures.
  • the processor 1001 may include a transceiver for implementing receiving and sending functions.
  • the transceiver may be a transceiver circuit, an interface, or an interface circuit.
  • the transceiver circuit, interface, or interface circuit for implementing the receiving and sending functions may be separate or integrated.
  • the above-mentioned transceiver circuit, interface, or interface circuit may be used for reading and writing code/data, or the above-mentioned transceiver circuit, interface, or interface circuit may be used for transmitting or delivering signals.
  • the processor 1001 may store a computer program 1003, which runs on the processor 1001 and enables the communication device 1000 to perform the method described in the above method embodiment.
  • the computer program 1003 may be fixed in the processor 1001, in which case the processor 1001 may be implemented by hardware.
  • the communication device 1000 may include a circuit that can implement the functions of sending or receiving or communicating in the aforementioned method embodiments.
  • the processor and transceiver described in the present disclosure may be implemented in an integrated circuit (IC), an analog IC, a radio frequency integrated circuit RFIC, a mixed signal IC, an application specific integrated circuit (ASIC), a printed circuit board (PCB), an electronic device, etc.
  • the processor and transceiver may also be manufactured using various IC process technologies, such as complementary metal oxide semiconductor (CMOS), N-type metal oxide semiconductor (NMOS), P-type metal oxide semiconductor (positive channel metal oxide semiconductor, PMOS), bipolar junction transistor (BJT), bipolar CMOS (BiCMOS), silicon germanium (SiGe), gallium arsenide (GaAs), etc.
  • CMOS complementary metal oxide semiconductor
  • NMOS N-type metal oxide semiconductor
  • PMOS P-type metal oxide semiconductor
  • BJT bipolar junction transistor
  • BiCMOS bipolar CMOS
  • SiGe silicon germanium
  • GaAs gallium arsenide
  • the communication device described in the above embodiments may be a network device or an intelligent relay, but the scope of the communication device described in the present disclosure is not limited thereto, and the structure of the communication device may not be limited by FIG. 10.
  • the communication device may be an independent device or may be part of a larger device.
  • the communication device may be:
  • the IC set may also include a storage component for storing data and computer programs;
  • ASIC such as modem
  • the communication device can be a chip or a chip system
  • the communication device can be a chip or a chip system
  • the schematic diagram of the chip structure shown in Figure 11 includes a processor 1101 and an interface 1102.
  • the number of processors 1101 can be one or more, and the number of interfaces 1102 can be multiple.
  • the chip further includes a memory 1103, and the memory 1103 is used to store necessary computer programs and data.
  • the present disclosure also provides a readable storage medium having instructions stored thereon, which implement the functions of any of the above method embodiments when executed by a computer.
  • the present disclosure also provides a computer program product, which implements the functions of any of the above method embodiments when executed by a computer.
  • the computer program product includes one or more computer programs.
  • the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
  • the computer program can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer program can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
  • the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center that includes one or more available media integrated.
  • the available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a high-density digital video disc (DVD)), or a semiconductor medium (e.g., a solid state disk (SSD)), etc.
  • a magnetic medium e.g., a floppy disk, a hard disk, a magnetic tape
  • an optical medium e.g., a high-density digital video disc (DVD)
  • DVD high-density digital video disc
  • SSD solid state disk
  • At least one in the present disclosure may also be described as one or more, and a plurality may be two, three, four or more, which is not limited in the present disclosure.
  • the technical features in the technical feature are distinguished by “first”, “second”, “third”, “A”, “B”, “C” and “D”, etc., and there is no order of precedence or size between the technical features described by the "first”, “second”, “third”, “A”, “B”, “C” and “D”.
  • the corresponding relationships shown in the tables in the present disclosure can be configured or predefined.
  • the values of the information in each table are only examples and can be configured as other values, which are not limited by the present disclosure.
  • the corresponding relationships shown in some rows may not be configured.
  • appropriate deformation adjustments can be made based on the above table, such as splitting, merging, etc.
  • the names of the parameters shown in the titles of the above tables can also use other names that can be understood by the communication device, and the values or representations of the parameters can also be other values or representations that can be understood by the communication device.
  • other data structures can also be used, such as arrays, queues, containers, stacks, linear lists, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables or hash tables.
  • the predefined in the present disclosure may be understood as defined, predefined, stored, pre-stored, pre-negotiated, pre-configured, solidified, or pre-burned.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开实施例公开了一种侧行链路定位方法及装置, 可应用于通信技术领域, 由第一终端设备执行的方法包括: 接收第一网元发送的第一请求, 其中, 第一请求用于请求与第二终端设备的侧行链路定位服务; 向第二终端设备发送第一令牌, 第一令牌用于表征第一终端设备在侧行链路定位服务的角色, 第一终端设备在侧行链路定位服务的角色用于第二终端设备确定是否与第一终端设备进行侧行链路定位服务; 建立与第二终端设备间的侧行链路, 执行侧行链路定位测量; 将测量结果发送给第一网元. 由此, 在进行侧行链路定位前, 首先交互令牌对终端设备的角色进行授权验证, 从而保证了侧行链路定位过程中终端设备的隐私安全, 提高了侧行链路定位服务的安全性.

Description

一种侧行链路定位方法及装置 技术领域
本公开涉及通信技术领域,尤其涉及一种侧行链路定位方法及装置。
背景技术
对于不在网络覆盖范围内或在网络覆盖但无法执行基于Uu接口的定位程序的终端设备,第五代移动通信技术(5th Generation Mobile Communication Technology,简称5G)系统能够提供测距、侧行链路(sidelink,sl)定位等服务。在这种情况下,目标终端设备(也称为用户终端,User Equipment,简称UE)可以使用侧行链路定位来获得与网络覆盖范围内的定位终端设备的相对定位。在网络辅助SL定位程序中,目标终端设备需要发现一个或多个具有SL定位和/或具有Uu定位功能的定位UE,并使用选定的定位UE执行SL定位测量程序。上述定位服务中,未能保护终端设备的隐私。
发明内容
本公开实施例提供一种侧行链路定位方法及装置。
第一方面,本公开实施例提供一种侧行链路定位方法,该方法由第一终端设备执行,方法包括:
接收第一网元发送的第一请求,其中,所述第一请求用于请求与第二终端设备的侧行链路定位服务;
向所述第二终端设备发送第一令牌,所述第一令牌用于表征所述第一终端设备在所述侧行链路定位服务的角色,所述第一终端设备在所述侧行链路定位服务的角色用于所述第二终端设备确定是否与所述第一终端设备进行所述侧行链路定位服务;
建立与所述第二终端设备间的侧行链路,执行侧行链路定位测量;
将测量结果发送给所述第一网元。
本公开中,第一终端设备在接收到第一网元发送的用于请求与第二终端设备的侧行链路定位服务的第一请求后,可将自身的第一令牌发送给第二终端设备,之后再建立与第二终端设备间的侧行链路,侧行链路测量,并在得到测量结果后将测量结果发送给第一网元。由此,在进行侧行链路定位前,首先交互令牌进行授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
第二方面,本公开实施例提供一种侧行链路定位方法,该方法由第二终端设备执行,方法包括:
接收第一终端设备发送的第一令牌,所述第一令牌用于表征所述第一终端设备在所述侧行链路定位服务的角色;
当根据所述第一令牌确定与所述第一终端设备进行所述侧行链路定位服务时,与所述第一终端设备建立侧行链路;
执行侧行链路定位测量。
第三方面,本公开实施例提供一种通信装置,包括:
收发模块,用于接收第一网元发送的第一请求,其中,所述第一请求用于请求与第二终端设备的侧行链路定位服务;
所述收发模块,还用于向所述第二终端设备发送第一令牌,所述第一令牌用于表征所述第一终端设备在所述侧行链路定位服务的角色,所述第一终端设备在所述侧行链路定位服务的角色用于所述第二终端设备确定是否与所述第一终端设备进行所述侧行链路定位服务;
处理模块,用于建立与所述第二终端设备间的侧行链路,执行侧行链路定位测量;
所述收发模块,还用于将测量结果发送给所述第一网元。
第四方面,本公开实施例提供另一种通信装置,包括:
收发模块,用于接收第一终端设备发送的第一令牌,所述第一令牌用于表征所述第一终端设备在所述侧行链路定位服务的角色;
处理模块,用于根据所述第一令牌确定与所述第一终端设备进行所述侧行链路定位服务时,与所述第一终端设备建立侧行链路;
所述处理模块,还用于执行侧行链路定位测量。
第五方面,本公开实施例提供一种通信装置,该通信装置包括处理器,当该处理器调用存储器中的计算机程序时,执行上述第一方面所述的方法。
第六方面,本公开实施例提供一种通信装置,该通信装置包括处理器,当该处理器调用存储器中的 计算机程序时,执行上述第二方面所述的方法。
第七方面,本公开实施例提供一种通信装置,该通信装置包括处理器和存储器,该存储器中存储有计算机程序;所述处理器执行该存储器所存储的计算机程序,以使该通信装置执行上述第一方面所述的方法。
第八方面,本公开实施例提供一种通信装置,该通信装置包括处理器和存储器,该存储器中存储有计算机程序;所述处理器执行该存储器所存储的计算机程序,以使该通信装置执行上述第二方面所述的方法。
第九方面,本公开实施例提供一种通信装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第一方面所述的方法。
第十方面,本公开实施例提供一种通信装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第二方面所述的方法。
第十一方面,本公开实施例提供一种指示侧行链路定位系统,该系统包括第三方面所述的通信装置以及第四方面所述的通信装置,或者,该系统包括第五方面所述的通信装置以及第六方面所述的通信装置,或者,该系统包括第七方面所述的通信装置以及第八方面所述的通信装置,或者,该系统包括第九方面所述的通信装置以及第十方面所述的通信装置。
第十二方面,本发明实施例提供一种计算机可读存储介质,用于储存为上述终端设备所用的指令,当所述指令被执行时,使所述终端设备执行上述第一方面所述的方法。
第十三方面,本发明实施例提供一种可读存储介质,用于储存为上述网络设备所用的指令,当所述指令被执行时,使所述网络设备执行上述第二方面所述的方法。
第十四方面,本公开还提供一种包括计算机程序的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第一方面所述的方法。
第十五方面,本公开还提供一种包括计算机程序的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第二方面所述的方法。
第十六方面,本公开提供一种芯片系统,该芯片系统包括至少一个处理器和接口,用于支持终端设备实现第一方面所涉及的功能,例如,确定或处理上述方法中所涉及的数据和信息中的至少一种。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存终端设备必要的计算机程序和数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
第十七方面,本公开提供一种芯片系统,该芯片系统包括至少一个处理器和接口,用于支持网络设备实现第二方面所涉及的功能,例如,确定或处理上述方法中所涉及的数据和信息中的至少一种。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存网络设备必要的计算机程序和数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
第十八方面,本公开提供一种计算机程序,当其在计算机上运行时,使得计算机执行上述第一方面所述的方法。
第十九方面,本公开提供一种计算机程序,当其在计算机上运行时,使得计算机执行上述第二方面所述的方法。
附图说明
为了更清楚地说明本公开实施例或背景技术中的技术方案,下面将对本公开实施例或背景技术中所需要使用的附图进行说明。
图1是本公开实施例提供的一种通信系统的架构示意图;
图2是本公开实施例提供的一种侧行链路定位方法的流程示意图;
图3是本公开实施例提供的另一种侧行链路定位方法的流程示意图;
图4是本公开实施例提供的另一种侧行链路定位方法的流程示意图;
图5是本公开实施例提供的另一种侧行链路定位方法的流程示意图;
图6是本公开实施例提供的另一种侧行链路定位方法的流程示意图
图7是本公开实施例提供的另一种侧行链路定位方法的流程示意图;
图8是本公开实施例提供的另一种侧行链路定位方法的交互示意图;
图9是本公开实施例提供的一种通信装置的结构示意图;
图10是本公开实施例提供的另一种通信装置的结构示意图;
图11是本公开实施例提供的一种芯片的结构示意图。
具体实施方式
为了便于理解,首先介绍本公开涉及的术语。
1、定位终端设备(Located user equipment,Located UE)
Located UE为在网络覆盖范围内,并且可以执行基于Uu接口的定位程序和/或及SL定位的终端设备,在侧行链路定位服务中定位终端设备可以辅助需要定位的终端设备进行侧行链路测量。
2、目标终端设备(target UE)
target UE为需要确定其位置,也就是需要对其进行定位的终端设备。当其不在网络覆盖范围内无法执行基于Uu接口的定位程序,或在网络覆盖内但仅靠执行基于Uu接口的定位程序无法达到其要求的QoS精度时,可以采用侧行链路定位服务,与定位终端设备进行侧行链路测量定位。
其中,在网络覆盖范围内,是指目标终端设备可以通过接入网设备与核心网网元进行信息交互,不在网络覆盖范围内,是指目标终端设备无法通过接入网设备与核心网网元进行信息交互。
3、侧行链路定位服务
侧行链路定位服务,又称侧链定位服务或测距服务,是指通过直接通信连接,确定两个UE之间的距离和/或从一个UE到另一UE的方向。
4、令牌
本公开中的令牌,至少用于表征终端设备在侧行链路定位服务的角色,比如定位终端设备的令牌,至少可以表征终端设备在侧行链路定位服务中的角色为定位终端设备,目标终端设备的令牌至少可以表征终端设备在侧行链路定位服务中的角色为需要对其进行定位的终端设备。
为了更好的理解本公开实施例公开的一种迁移的方法,下面首先对本公开实施例适用的通信系统进行描述。
请参见图1,图1为本公开实施例提供的一种通信系统的架构示意图。该通信系统可包括但不限于一个网络设备和一个终端设备,图1所示的设备数量和形态仅用于举例并不构成对本公开实施例的限定,实际应用中可以包括两个或两个以上的网络设备,两个或两个以上的终端设备。图1所示的通信系统以包括1个网络设备11、一个定位终端设备12为例和一个目标终端设备13。
需要说明的是,本公开实施例的技术方案可以应用于各种通信系统。例如:长期演进(long term evolution,LTE)系统、第五代(5th generation,5G)移动通信系统、5G新空口(new radio,NR)系统,或者其他未来的新型移动通信系统等。
本公开实施例中的网络设备是网络侧的一种用于发射或接收信号的实体。例如,演进型基站(evolved NodeB,eNB)、传输点(transmission reception point,TRP)、NR系统中的下一代基站(next generation NodeB,gNB)、其他未来移动通信系统中的基站或无线保真(wireless fidelity,WiFi)系统中的接入节点等。本公开的实施例对网络设备所采用的具体技术和具体设备形态不做限定。本公开实施例提供的网络设备可以是由集中单元(central unit,CU)与分布式单元(distributed unit,DU)组成的,其中,CU也可以称为控制单元(control unit),采用CU-DU的结构可以将网络设备,例如基站的协议层拆分开,部分协议层的功能放在CU集中控制,剩下部分或全部协议层的功能分布在DU中,由CU集中控制DU。
本公开实施例中的终端设备12或13为用户侧的一种用于接收或发射信号的实体,如手机。终端设备也可以称为终端设备(terminal)、用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端设备(mobile terminal,MT)等。终端设备可以是具备通信功能的汽车、智能汽车、手机(mobile phone)、穿戴式设备、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端设备、无人驾驶(self-driving)中的无线终端设备、远程手术(remote medical surgery)中的无线终端设备、智能电网(smart grid)中的无线终端设备、运输安全(transportation safety)中的无线终端设备、智慧城市(smart city)中的无线终端设备、智慧家庭(smart home)中的无线终端设备等等。本公开的实施例对终端设备所采用的具体技术和具体设备形态不做限定。
可以理解的是,本公开实施例描述的通信系统是为了更加清楚的说明本公开实施例的技术方案,并不构成对于本公开实施例提供的技术方案的限定,本领域普通技术人员可知,随着系统架构的演变和新 业务场景的出现,本公开实施例提供的技术方案对于类似的技术问题,同样适用。
本系统中,定位终端设备12可以实现本公开图2至图4任一实施例所示的方法,另外,目标终端设备还可以实现本公开图5至图7所述的方法。
可以理解的是,本公开实施例描述的通信系统是为了更加清楚的说明本公开实施例的技术方案,并不构成对于本公开实施例提供的技术方案的限定,本领域普通技术人员可知,随着系统架构的演变和新业务场景的出现,本公开实施例提供的技术方案对于类似的技术问题,同样适用。
本公开中,主要针对现有的侧行链路定位服务未能保护终端设备的隐私,提出一种侧行链路定位方法,在启动侧行链路定位服务前,目标终端设备首先检查定位终端设备的授权,并在授权通过后,再启动侧行链路定位服务,从而在侧行链路定位过程中保护定位终端设备的隐私安全,提高了侧行链路定位服务的安全性。
下面结合各流程图,对本公开实施例提供的侧行链路定位方法进行详细的说明。
请参见图2,图2是本公开实施例提供的一种侧行链路定位方法的流程示意图。本实施例提供的方法,可以由第一终端设备执行。如图2所示,该方法可以包括但不限于如下步骤:
步骤201,接收第一网元发送的第一请求,其中,第一请求用于请求与第二终端设备的侧行链路定位服务。
可选的,第一网元,可能为以下任一项:定位管理功能(location management function,LMF)网元,接入和移动管理功能(access and mobility management function,AMF)网元,及网关移动位置中心(gateway mobile location center,GMLC)。
本公开中,第一网元在收到其它网元,比如网络功能(network function,NF)网元、或应用功能(application function,AF)网元发送的侧行链路定位服务请求后,可以向第一终端设备(例如定位终端设备)发送第一请求,以请求第一终端设备与目标终端设备(例如第二终端设备)进行侧行链路定位。
可选的,第一请求,可以为测距请求(ranging request),或侧行链路定位请求(sidelink positioning request),本公开对此不做限定。
步骤202,向第二终端设备发送第一令牌。
第一令牌,为用于表征第一终端设备的在侧行链路定位服务过程中的角色(定位终端设备)的令牌。也就是说,第一令牌,可以表征第一终端设备可以使用侧行链路定位服务、且其在该服务中的角色为定位终端设备。该令牌可以由第二网元提供。
可选的,第二网元,可以为以下任一项:GMLC,直接发现名称管理功能(direct discovery name management function,DDNMF)网元,邻近服务密钥管理功能(Proximity Services key management function,ProSe PKMF)网元,及测距应用服务器(ranging App server)网元。
可选的,第一终端设备还可以向第二终端设备发送第一测距服务代码(ranging service code,RSC)。其中,第一RSC用于表征第一终端设备当前支持的测距/侧行链路定位服务的版本或类型。第一RSC可以为预先配置在第一终端设备中的,或由第一终端设备向第二网元请求,并由第二网元提供的。
本公开的一个示例中,第一终端设备可以向第二网元请求第一RSC及第一令牌,之后由第二网元向第一终端设备提供第一RSC及第一令牌。
步骤203,建立与第二终端设备间的侧行链路,执行侧行链路定位测量。
本公开中,第一终端设备在将第一令牌发送给第二终端设备后,第二终端设备可根据第一令牌确定是否可以与第一终端设备进行侧行链路定位服务。在确定可以与第一终端设备进行侧行链路定位服务后,可建立二者间的侧行链路,并基于侧行链路执行侧行链路定位测量。
可选的,侧行链路可以为PC5链路或者SR5链路,侧行链路还可以为其他链路,本公开对此不做限定。
可选的,测量结果,可以包括第二终端设备与第一终端设备间的相对距离、和/或相对角度等等,本公开对此不做限定。
步骤204,将测量结果发送给第一网元。
本公开中,第一终端设备在接收到第一网元发送的用于请求与第二终端设备间的侧行链路定位服务的第一请求后,可将自身的第一令牌发送给第二终端设备,由第二终端设备根据第一令牌对第一终端设备的身份进行验证,之后再建立与第二终端设备间的侧行链路,进行侧行链路测量,并在得到测量结果后将测量结果发送给第一网元。由此,在进行侧行链路定位前,首先交换令牌以对终端设备的角色进行 授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图3,图3是本公开实施例提供的另一种侧行链路定位方法的流程示意图。本实施例提供的方法,可以由第一终端设备执行。如图3所示,该方法可以包括但不限于如下步骤:
步骤301,向第二网元发送第二请求,其中,第二请求用于请求建立侧行链路的参数。
可选的,第二网元可以为以下任一项:GMLC,直接发现名称管理功能(direct discovery name management function,DDNMF)网元,邻近服务密钥管理功能(Proximity Services key management function,ProSe PKMF)网元,及测距应用服务器(ranging App server)网元。
可选的,第一终端设备可以在接入网络时,就向第二网元发送第二请求;或者,也可以在有需要时,再向第二网元发送第二请求,例如第一终端设备可以周期性的向第二网元发送第二请求;或者第一终端设备也可以在每次进行侧行链路定位前,先向第二网元发送第二请求,来请求最新的可以用于建立侧行链路的信息。本公开对此不做限定。
步骤302,接收第二网元发送的用于建立侧行链路的信息,其中,用于建立侧行链路的信息中包括以下至少之一:用于发现阶段的安全参数、第一令牌、第一令牌对应的有效期限、第一RSC及密钥。
其中,用于发现阶段的安全参数,为在发现阶段对终端设备的安全性进行保护的参数。该安全参数,可能为密钥,或者包含密钥在内的其他参数,本公开对此不做限定。
可选的,用于发现阶段的安全参数,可以为第一终端设备向第二网元请求后获得的;或者,也可以为第一终端设备接入网络后,由第二网元主动下发配置的,本公开对此不做限定。
第一令牌,可以表征第一终端设备可以使用侧行链路定位服务、且其在该服务中的角色为定位终端设备。第一令牌对应的有效期限,用于表征该第一令牌可以使用的期限。随着终端设备的移动,其在侧行链路定位服务中的角色可能会变化。比如终端设备A在时段T1内,由于未在网络覆盖范围内,则在侧行链路定位过程中其无法作为定位终端设备,可以作为目标终端设备,或其他角色的终端设备;而在时段T2内,由于进入了网络覆盖范围内可以在侧行链路定位过程中作为定位终端设备,那么终端设备A,在时段T1和T2时,对应的第一令牌就不同。
本公开中,为了防止终端设备对应的令牌被恶意蹿改,第一令牌,可以为第二网元将第一终端设备的角色等信息加密后生成的。用于建立侧行链路的信息中的密钥为第二网元生成第一令牌时使用的加密密钥,或者,为与加密密钥关联使用的解密密钥。
可选的,第二网元发送的用于建立侧行链路的信息中,可能未包含第一令牌的有效期限,而将第一令牌的有效期限等信息融合在第一令牌中。第二网元可以将第一令牌的有效期限及第一终端设备的角色等信息,加密后生成第一令牌。之后,第一终端设备再接收到第二网元发送的用于建立侧行链路的信息后,用密钥对第一令牌进行解密,可确定第一令牌对应的有效期限。
步骤303,接收第一网元发送的第一请求,其中,第一请求用于请求与第二终端设备的侧行链路定位服务。
上述步骤303的具体实现过程,可以参照本公开任一实施例的详细描述,此处不再赘述。
步骤304,向第二终端设备发送第一RSC及第一令牌。
可选的,第一终端设备在接收到第一网元发送的第一请求后,确定需要对第二终端设备进行侧行链路定位时,可以首先确定其对应的第一令牌是否仍处于有效期限内。若第一令牌已过期,也就是说第一终端设备已经无法作为定位终端设备使用,那么就可以结束该侧链定位服务过程,或者向第一网元返回第一令牌失效的指示。之后,第一网元可以根据需要重新选择定位终端设备。
或者,若第一令牌仍处于有效期限内,也就是说第一终端设备仍可作为定位终端设备使用,那么第一终端设备就可以将其对应的第一RSC及第一令牌发送给第二终端设备。
可选的,第一终端设备可以运行基于发现模型B的发现过程,通过向第二终端设备发送发现消息,来将第一RSC及第一令牌发送给第二终端设备。基于从第二网元获取到的安全参数,第一终端设备还可以将包含第一RSC及第一令牌的发现消息进行完整性保护和/或机密性保护。
步骤305,建立与第二终端设备间的侧行链路,执行侧行链路定位测量。
步骤306,将测量结果发送给第一网元。
其中,步骤305及步骤306的具体实现过程,可以参照本公开任一实施例的详细描述,此处不再赘述。
本公开中,第一终端设备首先向第二网元发送用于请求建立侧行链路的参数的第二请求,在接收到 第一网元发送的用于建立与第二终端设备的侧行链路定位服务的第一请求后,可将自身的第一RSC及第一令牌发送给第二终端设备,之后再建立与第二终端设备间的侧行链路,以进行侧行链路测量,并在得到测量结果后将测量结果发送给第一网元。由此,在进行侧行链路定位前,首先通过交互令牌来对终端设备的角色进行授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图4,图4是本公开实施例提供的另一种侧行链路定位方法的流程示意图。本实施例提供的方法,可以由第一终端设备执行。如图4所示,该方法可以包括但不限于如下步骤:
步骤401,向第二网元发送第二请求,其中,第二请求用于请求建立侧行链路的参数。
步骤402,接收所述第二网元发送的用于建立侧行链路的信息,其中,用于建立侧行链路的信息中包括以下至少之一:用于发现阶段的安全参数、第一令牌、第一令牌对应的有效期限、第一RSC及密钥。
步骤403,接收第一网元发送的第一请求,其中,第一请求用于请求与第二终端设备的侧行链路定位服务。
其中,上述步骤401至步骤403的具体实现过程,可以参照本公开任一实施例的详细描述,此处不再赘述。
步骤404,确定第一令牌处于有效期限内,利用用于发现阶段的安全参数,对第一消息进行加密,其中,第一消息中包括第一RSC及第一令牌。
本公开中,第一消息,可以为第一终端设备运行发现模型B时生成的发现消息。该第一消息,用于向第二终端设备指示,该第一终端设备在侧行链路定位服务中可以作为定位终端设备使用。
步骤405,向第二终端设备发送第一消息。
步骤406,响应于接收到第二终端设备发送的第一响应消息,向第二终端设备发送侧行链路建立请求。
可选的,第一响应消息,可以为发现响应消息。也就是说,第二终端设备在侦听到第一终端设备发送的发现消息后,可以向第一终端设备返回发现响应消息,从而第一终端设备可确定第二终端设备已对其身份信息(第一RSC及第一令牌)进行了验证授权,并确定授权通过。从而第一终端设备可启动侧行链路建立过程,例如向第二终端设备发送侧行链路建立请求。
可选的,为了避免在执行了发现模型B对应的发现过程后,第一终端设备对应的第一令牌已过期,侧行链路建立请求中,还可以包括第一令牌,以使第二终端设备对第一令牌再次进行验证,从而进一步保证了侧行链路的可靠性和安全性。
步骤407,接收第二终端设备返回的第二响应消息,其中,第二响应消息中包括第二令牌。
本公开中,第二终端设备在对第一令牌验证授权后,还可以将自身对应的第二令牌发送给第一终端设备进行验证。
步骤408,利用密钥对第二令牌进行验证。
步骤409,响应于第二令牌处于有效期限内、且所终端设备的类型为目标终端设备,建立与第二终端设备间的侧行链路。
可选的,对第二令牌进行验证,包括利用密钥对第二令牌进行解密,以确定第二令牌中包含的信息是否完整,及是否可以通过解密第二令牌获取第二终端设备的各种信息。比如,通过解密第二令牌,可以确定对应的有效期限及第二终端设备在侧行链路定位过程中的角色信息等。
可选的,若第二令牌处于有效期限内、且第二终端设备为目标终端设备,那么就可以建立与第二终端设备间的侧行链路。
可选的,若第二令牌已失效,和/或第二终端设备非目标终端设备,比如第二终端设备也为定位终端设备,那么就可以结束当前的侧行链路定位过程,或者由第一终端设备将确定的结果指示给第一网元等,本公开对此不做限定。
可选的,第二终端设备也可以在第一响应消息中包含第二令牌,之后第一终端设备可在收到第一响应消息后,对第二终端设备的角色等进行验证授权,本公开对此不做限定。
步骤410,执行侧行链路定位测量,获取测量结果。
步骤411,将测量结果发送给第一网元。
上述步骤410和411的具体实现形式,可以参照本公开任一实施例的详细描述,此处不再赘述。
本公开中,第一终端设备首先向第二网元发送第二请求,以请求第一令牌、第一RSC等,之后在接 收到第一网元发送的用于指示与第二终端设备的侧行链路定位服务的第一请求后,可将自身的第一RSC及第一令牌发送给第二终端设备,在接收到第二终端设备返回的第一响应消息后,则可以向第二终端设备发送侧行链路建立请求,之后再收到第二终端设备返回的第二响应消息后,再对第二终端设备的第二令牌信息验证,在验证通过后再建立与第二终端设备间的侧行链路,以进行侧行链路测量,并在得到测量结果后将测量结果发送给第一网元。由此,在进行侧行链路定位服务及建立侧行链路前,均通过交互令牌以对终端设备的角色进行授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图5,图5是本公开实施例提供的另一种侧行链路定位方法的流程示意图。本实施例提供的方法,可以由第二终端设备执行。如图5所示,该方法可以包括但不限于如下步骤:
步骤501,接收第一终端设备发送的第一令牌,第一令牌用于表征第一终端设备在侧行链路定位服务的角色。
其中,第一终端设备为侧行链路定位服务中的定位终端设备。第二终端设备为当前不处于网络覆盖范围内、但需要对其进行定位的终端设备,也就是说,第二终端设备在接收到第一终端设备发送的第一令牌时,不在网络覆盖范围内。
可选的,第二终端设备还可以接收第一终端设备发送的第一测距服务代码RSC。其中,第一RSC及第一令牌的具体含义,可以参照本公开任一实施例的详细描述,此处不再赘述。
步骤502,当根据第一令牌确定与第一终端设备进行侧行链路定位服务时,与第一终端设备建立侧行链路。本公开中,第二终端设备(例如目标终端设备)在接收到第一终端设备发送的第一令牌后,可以先确定第一令牌表征的第一终端设备在侧行链路定位服务中的角色信息,进而根据第一终端设备的角色信息确定是否可以与第一终端设备进行侧行链路定位服务。比如判断第一令牌表征的第一终端设备在侧行链路定位服务中是否为定位终端设备,及第一终端设备当前时刻的角色是否仍为定位终端设备等等。
可选的,第二终端设备若收到了第一终端设备发送的第一RSC,还可以对第一RSC进行验证,以确定第一终端设备当前支持的测距服务与第二终端设备当前支持的测距服务是否相同。
本公开实施例中,第二终端设备在确定第一终端设备的角色为定位终端设备时,即可确定可与第一终端设备进行侧行链路定位服务,从而即可与第一终端设备建立侧行链路。
可选的,侧行链路可以为PC5链路,SR5链路,或者其他侧行链路,本公开对此不做限定。
可选的,第二终端设备在确定不与第一终端设备进行侧行链路定位服务时,可以结束该过程。
步骤503,执行侧行链路定位测量。
上述步骤503的具体实现过程,可以参照本公开任一实施例的详细描述,此处不再赘述。
本公开中,第二终端设备在接收到第一终端设备发送的第一令牌后,首先根据第一令牌确定是否与第一终端设备进行侧行链路定位服务,在确定可以与第一终端设备进行侧行链路定位服务后再与第一终端设备建立侧行链路,并进行侧行链路定位测量。由此,在进行侧行链路定位前,首先通过交互令牌以对终端设备的角色进行授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图6,图6是本公开实施例提供的另一种侧行链路定位方法的流程示意图,该方法由第二终端设备执行。如图6所示,该方法可以包括但不限于如下步骤:
步骤601,在处于网络覆盖范围内时,向第二网元发送第一请求,其中,第一请求用于请求建立侧行链路的参数。
步骤602,接收第二网元发送的用于建立侧行链路的信息,其中,用于建立侧行链路的信息中包括用于发现阶段的安全参数、第二RSC及密钥。
本公开中,第二终端设备可以在接入网络时,或者在确定处于网络覆盖范围内时,就向第二网元发送第一请求,以向网元请求用于建立侧行链路时需要用的参数。
可选的,本实施例中的第二网元包括以下任一项:网关移动位置中心GMLC,直接发现名称管理功能DDNMF网元,邻近服务ProSe密钥管理功能PKMF网元,及测距应用服务器ranging App server网元。
其中,第二网元发送的用于建立侧行链路的信息中各参数的作用及意义,可以参照本公开任一实施例的详细描述,此处不再赘述。可选的,为了使得定位终端设备也可以对目标终端设备进行验证,网元向第二终端设备返回的用于建立侧行链路的信息中,还可以包括第二令牌、第二令牌对应的有效期限等 等。
步骤603,接收第一终端设备发送的第一消息。
可选的,第一消息,可以为第一终端设备在执行发现模型B时生成的发现消息。
步骤604,利用用于发现阶段的安全参数对第一消息进行验证,以获取第一消息中的第一RSC及第一令牌。
可选的,第二终端设备可以用安全参数,对第一消息进行解码或解密,以获取该第一消息中包含的第一RSC及第一令牌。
步骤605,将第一RSC与第二RSC进行比对。
步骤606,在第一RSC与所述第二RSC相同的情况下,利用密钥,对第一令牌是否处于有效期限内、及第一令牌对应的终端设备类型是否为定位终端设备进行验证。
由于第一RSC为当前测距服务对应的代码,因此,第一终端设备中的第一RSC与第二终端设备中的第二RSC应该相同,因此,第二终端设备在确定了第一终端设备发送的第一RSC后,可将二者进行比对。
若第一RSC与第二RSC相同,则说明第一终端设备当前使用的测距服务与第二终端设备当前使用的测距服务相同,从而第二终端设备可以再对第一令牌表征的第二终端设备的角色等进行验证。否则,第二终端设备则可以确定当前无法与第一终端设备进行该测距服务。
可选的,第二终端设备可以利用密钥对第一令牌进行解密,以获取第一令牌对应的有效期限及第一终端设备的类型。并根据第一令牌对应的有效期限,确定第一令牌是否处于有效期限内。若第一令牌处于有效期限内、且第一终端设备为定位终端设备,那么就可以认为验证通过,否则则可以确认验证不通过。
步骤607,响应于验证通过,与第一终端设备建立侧行链路。
步骤608,执行侧行链路定位测量。
其中,上述步骤607及步骤608的具体实现形式,可以参照本公开任一实施例的详细描述,此处不再赘述。
本公开中,第二终端设备在处于网络覆盖范围内时,首先向第二网元发送第一请求,以请求用于建立侧行链路的信息,之后在接收到第一终端设备发送的第一RSC及第一令牌后,可基于请求到的用于建立侧行链路的信息对第一RSC及第一令牌进行验证,在确定可以与第一终端设备进行侧行链路定位服务后再与第一终端设备建立侧行链路,并进行定位测量。由此,在进行侧行链路定位前,首先通过交互令牌以对定位终端设备的角色进行授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图7,图7是本公开实施例提供的另一种侧行链路定位方法的流程示意图,该方法由第二终端设备执行。如图7所示,该方法可以包括但不限于如下步骤:
步骤701,在处于网络覆盖范围内时,向第二网元发送第一请求,其中,所述第一请求用于请求建立侧行链路的参数。
步骤702,接收第二网元发送的用于建立侧行链路的信息,其中,用于建立侧行链路的信息中包括用于发现阶段的安全参数、第二令牌、所述第二令牌对应的有效期限、第二RSC及密钥。
步骤703,接收第一终端设备发送的第一消息。
步骤704,利用用于发现阶段的安全参数对第一消息进行验证,以获取第一消息中的第一RSC及第一令牌。
步骤705,将第一RSC与所述第二RSC进行比对。
步骤706,在第一RSC与第二RSC相同的情况下,利用密钥,对第一令牌是否处于有效期限内、及第一令牌对应的终端设备类型是否为定位终端设备进行验证。
上述步骤701-步骤706的具体实现过程,可以参照本公开任一实施例的详细描述,此处不再赘述。
步骤707,响应于验证通过,向第一终端设备发送第一响应消息。
可选的,若第一消息为发现消息,则第一响应消息,可以为发现响应消息。也就是说,第二终端设备在侦听到第一终端设备发送的发现消息,并对第一终端设备的身份验证授权后,可以向第一终端设备返回发现响应消息,从而第一终端设备可确定第二终端设备已对其身份信息(第一RSC及第一令牌)进行了验证授权,并确定授权通过。从而第一终端设备可启动侧行链路建立过程,向第二终端设备发送侧行链路建立请求。
可选的,第二终端设备也可以在第一响应消息中包含第二令牌,从而第一终端设备可在收到第一响应消息后,对第二终端设备的角色等进行验证授权,本公开对此不做限定。
步骤708,接收第一终端设备发送的侧行链路建立请求,其中,建立请求中包括第一令牌。
可选的,为了避免在执行了发现模型B对应的发现过程后,第一终端设备对应的第一令牌已过期,侧行链路建立请求中,还可以包括第一令牌,以使第二终端设备对第一令牌再次进行验证,从而进一步保证了侧行链路的可靠性和安全性。
步骤709,利用密钥,对所述第一令牌进行验证。
步骤710,响应于第一令牌处于有效期限内、且第一终端设备为定位终端设备,向第一终端设备发送第二响应消息,其中,第二响应消息中包括第二令牌。
步骤711,建立与第一终端设备间的侧行链路,执行侧行链路定位测量。
上述步骤709至步骤711的具体实现过程,可以参照本公开任一实施例的详细描述,此处不再赘述。
本公开中,第二终端设备在处于网络覆盖范围内时,首先向第二网元发送第一请求,以请求建立侧行链路需要的信息,之后在接收到第一终端设备发送的第一RSC及第一令牌后,可基于请求到的用于建立侧行链路的信息对第一RSC及第一令牌进行验证,在确定可以与第一终端设备进行侧行链路定位服务后再向第一终端设备发送第一响应消息,并在接收到第一终端设备发送的侧行链路建立请求后,再次对该请求中的第一令牌进行验证,并在验证通过后再将第二令牌发送给第二终端设备,之后再建立与第一终端设备间的侧行链路,并通过侧行链路进行定位测量。由此,在建立侧行链路前及进行侧行链路定位前,均通过交换令牌以对彼此的角色进行授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图8,图8是本公开实施例提供的一种侧行链路定位方法的交互示意图。如图8所示,该方法可以包括但不限于如下步骤:
步骤801,AMF接收侧行链路定位服务请求,其中,该服务请求中包含目标终端设备的标识。
其中,AMF可以从任何NF或AF接收测距/侧链定位服务请求。
AMF在接收到到侧行链路定位服务请求后,可根据目标终端设备的标识,选择一个LMF及一个或多个定位终端设备。
步骤802,AMF向选定的LMF发送侧行链路定位服务请求,其中包括目标终端设备的标识和一个或多个定位终端设备的标识。
步骤803,LMF将侧行链路定位请求发送给一个或多个定位终端设备,以触发侧行链路定位过程。
步骤804,定位终端设备执行测距发现过程,通过发现消息向目标终端设备提供第一RSC和第一令牌。
步骤805,目标终端设备对第一RSC和第一令牌进行验证。
步骤806,响应于验证通过,目标终端设备向定位终端设备发送发现响应消息。
步骤807,定位终端终端设备与目标终端设备建立侧行链路。
可选的,定位终端设备与目标终端设备在建立侧行链路的过程中,还可以互相交互令牌,以再次进行验证授权。
步骤808,定位终端设备或目标终端设备通过侧行链路执行侧行链路定位测量。
步骤809,定位终端设备向LMF发送侧行链路测量结果。
步骤810,LMF触发定位终端设备的定位过程,以获取定位终端设备的位置信息。
步骤811,LMF根据定位终端设备的位置信息及侧行链路测量结果,确定目标终端设备的位置。
步骤812,LMF将目标终端设备的位置发送给AMF。
步骤813,AMF报告目标终端设备的位置。
本公开中,在进行侧行链路定位前,目标终端设备与定位终端设备首先通过交换令牌进行身份的验证授权,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图9,图9为本公开实施例提供的一种通信装置的结构示意图。图9所示的通信装置900可包括收发模块901和处理模块902。收发模块901可包括发送模块和/或接收模块,发送模块用于实现发送功能,接收模块用于实现接收功能,收发模块901可以实现发送功能和/或接收功能。
可以理解的是,通信装置900可以是终端设备,或者,也可以是终端设备中的装置,或者,还可以是能够与终端设备匹配使用的装置。
通信装置900在第一终端设备侧,其中:
收发模块901,用于接收第一网元发送的第一请求,其中,所述第一请求用于请求与第二终端设备的侧行链路定位服务;
上述收发模块901,用于向所述第二终端设备发送第一令牌,所述第一令牌用于表征所述第一终端设备在所述侧行链路定位服务的角色,所述第一终端设备在所述侧行链路定位服务的角色用于所述第二终端设备确定是否与所述第一终端设备进行所述侧行链路定位服务;
处理模块902,用于建立与所述第二终端设备间的侧行链路,执行侧行链路定位测量;
上述收发模块901,用于将测量结果发送给所述第一网元。
可选的,上述处理模块902,还用于:
确定所述第一令牌处于有效期限内。
可选的,上述收发模块901,还用于:
向第二网元发送第二请求,其中,所述第二请求用于请求建立侧行链路的参数;
接收所述第二网元发送的用于建立侧行链路的信息,其中,所述用于建立侧行链路的信息中包括以下至少之一:
用于发现阶段的安全参数、所述第一令牌、所述第一令牌对应的有效期限、所述第一RSC及密钥。
可选的,上述收发模块901,用于:
利用所述用于发现阶段的安全参数,对第一消息进行加密,其中,所述第一消息包括所述第一令牌;
向所述第二终端设备发送所述第一消息。
可选的,上处理模块902,用于:
响应于接收到所述第二终端设备发送的第一响应消息,向所述第二终端设备发送侧行链路建立请求,其中,所述侧行链路建立请求中包括第一令牌;
接收所述第二终端设备发送的第二响应消息,其中,所述第二响应消息中包括第二令牌;
利用所述密钥对所述第二令牌进行验证;
响应于所述第二令牌处于有效期限内、且所终端设备的类型为目标终端设备,建立与所述第二终端设备间的侧行链路。
可选的,第一消息中还包括第一测距服务代码RSC。
可选的,
所述第一网元为以下任一项:定位管理功能LMF网元,接入和移动管理功能网元AMF,及网关移动位置中心GMLC;
所述第二网元为以下任一项:GMLC,直接发现名称管理功能DDNMF网元,邻近服务ProSe密钥管理功能PKMF网元,及测距应用服务器ranging App server网元。
本公开中,第一终端设备在接收到第一网元发送的用于请求与第二终端设备的侧行链路定位服务的第一请求后,可将自身的第一令牌发送给第二终端设备,之后再建立与第二终端设备间的侧行链路,进行侧行链路测量,并在得到测量结果后将测量结果发送给第一网元。由此,在进行侧行链路定位前,首先通过交互令牌以对终端设备的角色进行授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
通信装置900在第二终端设备侧,其中:
收发模块901,用于接收第一终端设备发送的第一令牌,其中,所述第一令牌用于表征所述第一终端设备在所述侧行链路定位服务的角色;
处理模块902,用于当根据所述第一令牌确定与所述第一终端设备进行所述侧行链路定位服务时,与所述第一终端设备建立侧行链路;
处理模块902,用于执行侧行链路定位测量。
可选的,上述收发模块901,还用于:
在处于网络覆盖范围内时,向第二网元发送第一请求,其中,所述第一请求用于请求建立侧行链路的参数;
接收所述第二网元发送的用于建立侧行链路的信息,其中,所述用于建立侧行链路的信息中包括以下至少之一:
用于发现阶段的安全参数、第二令牌、所述第二令牌对应的有效期限、第二RSC及密钥。
可选的,收发模块901,用于:
接收所述第一终端设备发送的第一消息;
利用所述用于发现阶段的安全参数对所述第一消息进行验证,以获取所述第一消息中的第一令牌。
可选的,所述第一消息中还包括第一测距服务代码,上述处理模块902,还用于:
将所述第一RSC与所述第二RSC进行比对;
在所述第一RSC与所述第二RSC相同的情况下,对所述第一令牌进行验证。
可选的,上述处理模块902,用于:
利用所述密钥,确定所述第一令牌处于有效期限内、及所述第一令牌对应的终端设备类型为定位终端设备。
可选的,上述处理模块902,用于:
向所述第一终端设备发送第一响应消息;
接收所述第一终端设备发送的侧行链路建立请求,其中,所述建立请求中包括第一令牌;
利用所述密钥,对所述第一令牌进行验证;
响应于所述第一令牌处于有效期限内、且所述第一终端设备为定位终端设备,向所述第一终端设备发送第二响应消息,其中,所述第二响应消息中包括所述第二令牌;
建立与所述第一终端设备间的侧行链路。
可选的,所述第二网元为以下任一项:网关移动位置中心GMLC,直接发现名称管理功能DDNMF网元,接近服务ProSe密钥管理功能PKMF网元,及测距应用服务器ranging App server网元。
本公开中,第二终端设备在接收到第一终端设备发送的第一令牌后,首先根据第一令牌确定是否与第一终端设备进行侧行链路定位服务,在确定与第一终端设备进行侧行链路定位服务后再与第一终端设备建立侧行链路,并进行侧行链路定位测量。由此,在进行侧行链路定位前,首先通过交互令牌以对定位终端设备的角色进行授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图10,图10是本公开实施例提供的另一种通信装置的结构示意图。通信装置1000可以是终端设备,也可以是支持终端设备实现上述方法的芯片、芯片系统、或处理器等。该装置可用于实现上述方法实施例中描述的方法,具体可以参见上述方法实施例中的说明。
通信装置1000可以包括一个或多个处理器1001。处理器1001可以是通用处理器或者专用处理器等。例如可以是基带处理器或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对通信装置(如,基站、基带芯片,终端设备、终端设备芯片,DU或CU等)进行控制,执行计算机程序,处理计算机程序的数据。
可选的,通信装置1000中还可以包括一个或多个存储器1002,其上可以存有计算机程序1004,处理器1001执行所述计算机程序1004,以使得通信装置1000执行上述方法实施例中描述的方法。可选的,所述存储器1002中还可以存储有数据。通信装置1000和存储器1002可以单独设置,也可以集成在一起。
可选的,通信装置1000还可以包括收发器1005、天线1006。收发器1005可以称为收发单元、收发机、或收发电路等,用于实现收发功能。收发器1205可以包括接收器和发送器,接收器可以称为接收机或接收电路等,用于实现接收功能;发送器可以称为发送机或发送电路等,用于实现发送功能。
可选的,通信装置1000中还可以包括一个或多个接口电路1007。接口电路1007用于接收代码指令并传输至处理器1001。处理器1001运行所述代码指令以使通信装置1000执行上述方法实施例中描述的方法。
通信装置1000中的收发器1005可用于执行上述各图中的收发步骤,处理器1001可用于执行上述各图中的处理步骤。
在一种实现方式中,处理器1001中可以包括用于实现接收和发送功能的收发器。例如该收发器可以是收发电路,或者是接口,或者是接口电路。用于实现接收和发送功能的收发电路、接口或接口电路可以是分开的,也可以集成在一起。上述收发电路、接口或接口电路可以用于代码/数据的读写,或者,上述收发电路、接口或接口电路可以用于信号的传输或传递。
在一种实现方式中,处理器1001可以存有计算机程序1003,计算机程序1003在处理器1001上运行,可使得通信装置1000执行上述方法实施例中描述的方法。计算机程序1003可能固化在处理器1001中,该种情况下,处理器1001可能由硬件实现。
在一种实现方式中,通信装置1000可以包括电路,所述电路可以实现前述方法实施例中发送或接收或者通信的功能。本公开中描述的处理器和收发器可实现在集成电路(integrated circuit,IC)、 模拟IC、射频集成电路RFIC、混合信号IC、专用集成电路(application specific integrated circuit,ASIC)、印刷电路板(printed circuit board,PCB)、电子设备等上。该处理器和收发器也可以用各种IC工艺技术来制造,例如互补金属氧化物半导体(complementary metal oxide semiconductor,CMOS)、N型金属氧化物半导体(nMetal-oxide-semiconductor,NMOS)、P型金属氧化物半导体(positive channel metal oxide semiconductor,PMOS)、双极结型晶体管(bipolar junction transistor,BJT)、双极CMOS(BiCMOS)、硅锗(SiGe)、砷化镓(GaAs)等。
以上实施例描述中的通信装置可以是网络设备或者智能中继,但本公开中描述的通信装置的范围并不限于此,而且通信装置的结构可以不受图10的限制。通信装置可以是独立的设备或者可以是较大设备的一部分。例如所述通信装置可以是:
(1)独立的集成电路IC,或芯片,或,芯片系统或子系统;
(2)具有一个或多个IC的集合,可选的,该IC集合也可以包括用于存储数据,计算机程序的存储部件;
(3)ASIC,例如调制解调器(Modem);
(4)可嵌入在其他设备内的模块;
(5)接收机、终端设备、智能终端设备、蜂窝电话、无线设备、手持机、移动单元、车载设备、网络设备、云设备、人工智能设备等等;
(6)其他等等。
对于通信装置可以是芯片或芯片系统的情况,可参见图11所示的芯片的结构示意图。图11所示的芯片包括处理器1101和接口1102。其中,处理器1101的数量可以是一个或多个,接口1102的数量可以是多个。
对于芯片用于实现本公开实施例中终端设备的功能的情况。
可选的,芯片还包括存储器1103,存储器1103用于存储必要的计算机程序和数据。
本领域技术人员还可以了解到本公开实施例列出的各种说明性逻辑块(illustrative logical block)和步骤(step)可以通过电子硬件、电脑软件,或两者的结合进行实现。这样的功能是通过硬件还是软件来实现取决于特定的应用和整个系统的设计要求。本领域技术人员可以对于每种特定的应用,可以使用各种方法实现所述的功能,但这种实现不应被理解为超出本公开实施例保护的范围。
本公开还提供一种可读存储介质,其上存储有指令,该指令被计算机执行时实现上述任一方法实施例的功能。
本公开还提供一种计算机程序产品,该计算机程序产品被计算机执行时实现上述任一方法实施例的功能。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序。在计算机上加载和执行所述计算机程序时,全部或部分地产生按照本公开实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机程序可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以理解:本公开中涉及的第一、第二等各种数字编号仅为描述方便进行的区分,并不用来限制本公开实施例的范围,也表示先后顺序。
本公开中的至少一个还可以描述为一个或多个,多个可以是两个、三个、四个或者更多个,本公开不做限制。在本公开实施例中,对于一种技术特征,通过“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”等区分该种技术特征中的技术特征,该“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”描述的技术特征间无先后顺序或者大小顺序。
本公开中各表所示的对应关系可以被配置,也可以是预定义的。各表中的信息的取值仅仅是举例,可以配置为其他值,本公开并不限定。在配置信息与各参数的对应关系时,并不一定要求必须配置各表 中示意出的所有对应关系。例如,本公开中的表格中,某些行示出的对应关系也可以不配置。又例如,可以基于上述表格做适当的变形调整,例如,拆分,合并等等。上述各表中标题示出参数的名称也可以采用通信装置可理解的其他名称,其参数的取值或表示方式也可以通信装置可理解的其他取值或表示方式。上述各表在实现时,也可以采用其他的数据结构,例如可以采用数组、队列、容器、栈、线性表、指针、链表、树、图、结构体、类、堆、散列表或哈希表等。
本公开中的预定义可以理解为定义、预先定义、存储、预存储、预协商、预配置、固化、或预烧制。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本公开的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
以上所述,仅为本公开的具体实施方式,但本公开的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本公开揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本公开的保护范围之内。因此,本公开的保护范围应以所述权利要求的保护范围为准。

Claims (23)

  1. 一种侧行链路定位方法,其特征在于,由第一终端设备执行,所述方法包括:
    接收第一网元发送的第一请求,其中,所述第一请求用于请求与第二终端设备的侧行链路定位服务;
    向所述第二终端设备发送第一令牌,所述第一令牌用于表征所述第一终端设备在所述侧行链路定位服务的角色,所述第一终端设备在所述侧行链路定位服务的角色用于所述第二终端设备确定是否与所述第一终端设备进行所述侧行链路定位服务;
    建立与所述第二终端设备间的侧行链路,执行侧行链路定位测量;
    将测量结果发送给所述第一网元。
  2. 如权利要求1所述的方法,其特征在于,在所述向所述第二终端设备发送第一令牌之前,所述方法还包括:
    确定所述第一令牌处于有效期限内。
  3. 如权利要求1或2所述的方法,其特征在于,还包括:
    向第二网元发送第二请求,其中,所述第二请求用于请求建立侧行链路的信息;
    接收所述第二网元发送的用于建立侧行链路的信息,其中,所述用于建立侧行链路的信息中包括以下至少之一:
    用于发现阶段的安全参数、所述第一令牌、所述第一令牌对应的有效期限、所述第一测距服务代码RSC及密钥。
  4. 如权利要求3所述的方法,其特征在于,所述向所述第二终端设备发送第一令牌,包括:
    向所述第二终端设备发送所述第一消息;所述第一消息中携带所述第一令牌,且所述第一消息为使用所述用于发现阶段的安全参数进行加密。
  5. 如权利要求4所述的方法,其特征在于,还包括:
    接收到所述第二终端设备发送的第一响应消息;所述第一响应消息用于指示所述第二终端设备确定与所述第一终端设备进行所述侧行链路定位服务。
  6. 如权利要求5所述的方法,其特征在于,所述建立与所述第二终端设备间的侧行链路,包括:
    向所述第二终端设备发送侧行链路建立请求;
    接收所述第二终端设备发送的第二响应消息,其中,所述第二响应消息中包括第二令牌;所述第二令牌用于表征所述第二终端设备在所述侧行链路定位服务的角色;
    利用所述密钥对所述第二令牌进行验证;
    响应于所述第二令牌处于有效期限内、且所终端设备的类型为目标终端设备,建立与所述第二终端设备间的侧行链路。
  7. 如权利要求4所述的方法,其特征在于,所述第一消息中还包括第一测距服务代码RSC。
  8. 如权利要求1-7任一所述的方法,其特征在于,
    所述第一网元为以下任一项:定位管理功能LMF网元,接入和移动管理功能网元AMF,及网关移动位置中心GMLC;
    所述第二网元为以下任一项:GMLC,直接发现名称管理功能DDNMF网元,邻近服务ProSe密钥管理功能PKMF网元,及测距应用服务器ranging App server网元。
  9. 一种侧行链路定位方法,其特征在于,由第二终端设备执行,所述方法包括:
    接收第一终端设备发送的第一令牌,其中,所述第一令牌用于表征所述第一终端设备在所述侧行链路定位服务的角色;
    当根据所述第一令牌确定与所述第一终端设备进行所述侧行链路定位服务时,与所述第一终端设备建立侧行链路;
    执行侧行链路定位测量。
  10. 如权利要求9所述的方法,其特征在于,还包括:
    在处于网络覆盖范围内时,向第二网元发送第一请求,其中,所述第一请求用于请求建立侧行链路的参数;
    接收所述第二网元发送的用于建立侧行链路的信息,其中,所述用于建立侧行链路的信息中包括以下至少之一:
    用于发现阶段的安全参数、第二令牌、所述第二令牌对应的有效期限、第二RSC及密钥。
  11. 如权利要求10所述的方法,其特征在于,所述接收第一终端设备发送的第一令牌,包括:
    接收所述第一终端设备发送的第一消息,所述第一消息中包括所述第一令牌;
    利用所述用于发现阶段的安全参数对所述第一消息进行验证,,获取所述第一消息中的第一令牌。
  12. 如权利要求11所述的方法,其特征在于,所述第一消息中还包括第一测距服务代码。
  13. 如权利要求12所述的方法,其特征在于,在根据所述第一令牌确定是否与所述第一终端设备进行所述侧行链路定位服务之前,所述方法还包括:
    确定所述第一RSC与所述第二RSC相同。
  14. 如权利要求10-12任一所述的方法,其特征在于,所述根据所述第一令牌确定与所述第一终端设备进行所述侧行链路定位服务,包括:
    利用所述密钥,确定所述第一令牌处于有效期限内、及所述第一令牌对应的终端设备类型为定位终端设备。
  15. 如权利要求9-14任一所述的方法,其特征在于,在所述与所述第一终端设备建立侧行链路之前,所述方法包括:
    向所述第一终端设备发送第一响应消息。
  16. 如权利要求15所述的方法,其特征在于,所述与所述第一终端设备建立侧行链路,包括:
    接收所述第一终端设备发送的侧行链路建立请求,其中,所述建立请求中包括第一令牌;
    利用所述密钥,对所述第一令牌进行验证;
    响应于所述第一令牌处于有效期限内、且所述第一终端设备为定位终端设备,向所述第一终端设备发送第二响应消息,其中,所述第二响应消息中包括所述第二令牌;
    建立与所述第一终端设备间的侧行链路。
  17. 如权利要求9-16任一所述的方法,其特征在于,
    所述第二终端设备在接收第一终端设备发送的第一令牌时,所述第二终端设备不处于网络覆盖范围。
  18. 如权利要求10所述的方法,其特征在于,所述第二网元为以下任一项:网关移动位置中心GMLC,直接发现名称管理功能DDNMF网元,邻近服务ProSe密钥管理功能PKMF网元,及测距应用服务器ranging App server网元。
  19. 一种终端设备,其特征在于,包括:
    收发模块,用于接收第一网元发送的第一请求,其中,所述第一请求用于请求与第二终端设备的侧行链路定位服务;
    所述收发模块,还用于向所述第二终端设备发送第一令牌,所述第一令牌用于表征所述第一终端设备在所述侧行链路定位服务的角色,所述第一终端设备在所述侧行链路定位服务的角色用于所述第二终端设备确定是否与所述第一终端设备进行所述侧行链路定位服务;
    处理模块,用于建立与所述第二终端设备间的侧行链路,执行侧行链路定位测量;
    所述收发模块,还用于将测量结果发送给所述第一网元。
  20. 一种终端设备,其特征在于,包括:
    收发模块,用于接收第一终端设备发送的第一令牌,所述第一令牌用于表征所述第一终端设备在所述侧行链路定位服务的角色;
    处理模块,用于当根据所述第一令牌确定与所述第一终端设备进行所述侧行链路定位服务时,与所述第一终端设备建立侧行链路;
    所述处理模块,还用于执行侧行链路定位测量。
  21. 一种通信系统,其特征在于,所述通信系统包括第一终端设备及第二终端设备,所述第一终端设备用于执行如权利要求1-8任一所述的方法,所述第二终端设备用于执行如权利要求9-18任一所述的方法。
  22. 一种通信装置,其特征在于,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求1至8中任一项所述的方法,或者执行如权利要求9-18任一项所述的方法。
  23. 一种计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如权利要求1至8中任一项所述的方法被实现,或者使如权利要求9至18中任一项所述的方法被实现。
PCT/CN2022/122341 2022-09-28 2022-09-28 一种侧行链路定位方法及装置 WO2024065335A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202280003728.2A CN118104186A (zh) 2022-09-28 2022-09-28 一种侧行链路定位方法及装置
PCT/CN2022/122341 WO2024065335A1 (zh) 2022-09-28 2022-09-28 一种侧行链路定位方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/122341 WO2024065335A1 (zh) 2022-09-28 2022-09-28 一种侧行链路定位方法及装置

Publications (1)

Publication Number Publication Date
WO2024065335A1 true WO2024065335A1 (zh) 2024-04-04

Family

ID=90475297

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/122341 WO2024065335A1 (zh) 2022-09-28 2022-09-28 一种侧行链路定位方法及装置

Country Status (2)

Country Link
CN (1) CN118104186A (zh)
WO (1) WO2024065335A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114598986A (zh) * 2020-12-04 2022-06-07 维沃移动通信有限公司 副链路sl上的定位方法、装置及终端
US20220201774A1 (en) * 2020-12-17 2022-06-23 Qualcomm Incorporated Sidelink positioning reference signal configuration
US20220217674A1 (en) * 2021-01-06 2022-07-07 Qualcomm Incorporated Sidelink assisted positioning
WO2022152389A1 (en) * 2021-01-15 2022-07-21 Huawei Technologies Co., Ltd. Method and apparatus for sidelink positioning

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114598986A (zh) * 2020-12-04 2022-06-07 维沃移动通信有限公司 副链路sl上的定位方法、装置及终端
US20220201774A1 (en) * 2020-12-17 2022-06-23 Qualcomm Incorporated Sidelink positioning reference signal configuration
US20220217674A1 (en) * 2021-01-06 2022-07-07 Qualcomm Incorporated Sidelink assisted positioning
WO2022152389A1 (en) * 2021-01-15 2022-07-21 Huawei Technologies Co., Ltd. Method and apparatus for sidelink positioning

Also Published As

Publication number Publication date
CN118104186A (zh) 2024-05-28

Similar Documents

Publication Publication Date Title
CN110798833B (zh) 一种鉴权过程中验证用户设备标识的方法及装置
WO2022057736A1 (zh) 授权方法及装置
KR20180069074A (ko) 단말의 eUICC(embedded universal integrated circuit card)에 프로파일을 다운로드하는 방법 및 장치
EP3079391A1 (en) Establishing a device-to-device communication session
CN109587680B (zh) 参数的保护方法、设备和系统
US20230017001A1 (en) Vehicle control method, communications apparatus, and computer-readable storage medium
WO2024065335A1 (zh) 一种侧行链路定位方法及装置
WO2024065336A1 (zh) 一种侧行链路定位方法及装置
WO2024065339A1 (zh) 一种网络卫星覆盖数据的授权方法、设备及存储介质
WO2024082143A1 (zh) 一种设备业务角色的验证方法/装置/设备及存储介质
WO2024065706A1 (zh) 一种构建连接的方法及装置
WO2024065469A1 (zh) 一种直连链路建立方法、设备及存储介质
WO2023245520A1 (zh) 一种定位服务的直接通信方法及装置
WO2024092827A1 (zh) 一种测距方法及其装置
WO2024138581A1 (zh) 一种网络切片的授权方法、装置、设备及存储介质
WO2024065564A1 (zh) 一种api的调用方法、装置、设备及存储介质
WO2024065334A1 (zh) 一种用户设备ue的授权令牌的生成方法/装置/设备及存储介质
WO2024065549A1 (zh) 直连通信密钥生成方法及装置
WO2024065140A1 (zh) 一种用户设备ue的角色授权方法/装置/设备及存储介质
WO2024138390A1 (zh) 通信控制方法及装置
WO2024130561A1 (zh) 一种用户位置信息的可信确定方法及其装置
WO2024031724A1 (zh) 终端设备能力指示方法及装置
WO2024065131A1 (zh) 一种多路径传输方法/装置/设备及存储介质
WO2023221000A1 (zh) 一种核心网中ai功能的认证授权方法及其装置
WO2024145902A1 (zh) 密钥获取方法、装置、设备及芯片系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22959978

Country of ref document: EP

Kind code of ref document: A1