WO2024067337A1 - 终端鉴权方法、终端及网络侧设备 - Google Patents

终端鉴权方法、终端及网络侧设备 Download PDF

Info

Publication number
WO2024067337A1
WO2024067337A1 PCT/CN2023/120290 CN2023120290W WO2024067337A1 WO 2024067337 A1 WO2024067337 A1 WO 2024067337A1 CN 2023120290 W CN2023120290 W CN 2023120290W WO 2024067337 A1 WO2024067337 A1 WO 2024067337A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
request message
type
message
authentication method
Prior art date
Application number
PCT/CN2023/120290
Other languages
English (en)
French (fr)
Inventor
张宏平
潘翔
王文
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2024067337A1 publication Critical patent/WO2024067337A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Definitions

  • the present application belongs to the field of communication technology, and specifically relates to a terminal authentication method, a terminal and a network side device.
  • Sidelink (SL) communication refers to direct communication between user equipment (UE).
  • Sidelink is also called secondary link, side link or side link.
  • the reference signal of the Uu port the wireless interface between the UE and the base station
  • V2X vehicle to everything
  • the embodiments of the present application provide a terminal authentication method, a terminal and a network-side device, which can solve the problem of how to determine whether a UE participating in positioning is trustworthy.
  • a terminal authentication method comprising:
  • the first terminal sends a first request message to a target network device, where the first request message is used to request the target network device to register the first terminal as a first type of terminal, where the first type of terminal includes an anchor terminal or a positioning service terminal, where the anchor terminal is a terminal with a known location and participates in sending or measuring a side link positioning reference signal, and the positioning service terminal is a terminal that provides a side link positioning service function.
  • a terminal authentication method comprising:
  • the access mobility management function AMF receives a first request message from a first terminal, where the first request message is used to request registration of a first type of terminal for the first terminal, where the first type of terminal includes an anchor terminal or a positioning service terminal, where the anchor terminal is a terminal whose position is known and participates in sending or measuring a side link positioning reference signal, and the positioning service terminal is a terminal that provides a side link positioning service function;
  • the AMF determines whether the first terminal has authority for a first type of terminal based on the first request message.
  • a terminal authentication method including:
  • the location management function LMF receives a first request message from the first terminal or a second request message from the access mobility management function AMF, where the first request message or the second request message is used to request registration of a first type of terminal for the first terminal, where the first type of terminal includes an anchor terminal or a positioning service terminal, where the anchor terminal is a terminal whose location is known and participates in sending or measuring a side link positioning reference signal, and the positioning service terminal is a terminal that provides a side link positioning service function;
  • the LMF determines whether the first terminal has authority as a first type of terminal based on the first request message; or
  • the LMF When the LMF receives the second request message from the AMF, the LMF regards the first terminal as a first type terminal and saves the first information of the first terminal.
  • a terminal authentication method comprising:
  • the second terminal receives a first message from the first terminal;
  • the first message includes first information and a signature of the first terminal, and the first information is used to determine that the first terminal is a first type of terminal;
  • the first type of terminal includes an anchor terminal or a positioning service terminal, the anchor terminal is a terminal with a known position and participates in sending or measuring a side link positioning reference signal, and the positioning service terminal is a terminal that provides a side link positioning service function;
  • the second terminal determines, based on the first message, whether the first terminal has authority for a first-type terminal.
  • a terminal authentication device including:
  • a sending module is used to send a first request message to a target network device, wherein the first request message is used to request the target network device to register a first terminal as a first type of terminal, wherein the first type of terminal includes an anchor terminal or a positioning service terminal, wherein the anchor terminal is a terminal whose position is known and participates in sending or measuring a side link positioning reference signal, and the positioning service terminal is a terminal that provides a side link positioning service function.
  • a terminal authentication device including:
  • a receiving module configured to receive a first request message from a first terminal, wherein the first request message is used to request registration of a first type of terminal for the first terminal, wherein the first type of terminal includes an anchor terminal or a positioning service terminal, wherein the anchor terminal is a terminal whose position is known and which participates in sending or measuring a sidelink positioning reference signal, and the positioning service terminal is a terminal that provides a sidelink positioning service function;
  • a processing module is used to determine whether the first terminal has the authority of the first type of terminal based on the first request message.
  • a terminal authentication device comprising:
  • a receiving module configured to receive a first request message from a first terminal or a second request message from an access mobility management function AMF, wherein the first request message or the second request message is used to request registration of a first type of terminal for the first terminal, wherein the first type of terminal includes an anchor terminal or a positioning service terminal, wherein the anchor terminal is a terminal whose position is known and participates in sending or measuring a side link positioning reference signal, and the positioning service terminal is a terminal that provides a side link positioning service function;
  • a processing module configured to determine, upon receiving the first request message from the first terminal, whether the first terminal has authority as a first-type terminal based on the first request message;
  • the first terminal When receiving the second request message from the AMF, the first terminal is regarded as a first type terminal and the first information of the first terminal is saved.
  • a terminal authentication device comprising:
  • a receiving module configured to receive a first message from a first terminal; the first message includes first information and a signature of the first terminal, the first information being used to determine that the first terminal is a first type of terminal; the first type of terminal includes an anchor terminal or a positioning service terminal, the anchor terminal is a terminal whose position is known and participates in sending or measuring a sidelink positioning reference signal, and the positioning service terminal is a terminal that provides a sidelink positioning service function;
  • the processing module is used to determine whether the first terminal has the authority of the first type of terminal based on the first message.
  • a first terminal comprising a processor and a memory, wherein the memory stores a program or instruction that can be executed on the processor, and when the program or instruction is executed by the processor, the steps of the method described in the first aspect are implemented.
  • a first terminal comprising a processor and a communication interface, wherein the communication interface is used to send a first request message to a target network device, the first request message is used to request the target network device to register the first terminal as a first type of terminal, the first type of terminal includes an anchor terminal or a positioning service terminal, the anchor terminal is a terminal with a known location and participates in sending or measuring a side link positioning reference signal, and the positioning service terminal is a terminal that provides a side link positioning service function.
  • a network side device which includes a processor and a memory, wherein the memory stores programs or instructions that can be run on the processor, and when the program or instructions are executed by the processor, the steps of the method described in the second aspect are implemented.
  • a network side device including a processor and a communication interface, wherein the communication interface is used to receive a first request message from a first terminal, the first request message is used to request registration of a first type of terminal for the first terminal, the first type of terminal includes an anchor terminal or a positioning service terminal,
  • the anchor terminal is a terminal whose position is known and participates in sending or measuring a side link positioning reference signal;
  • the positioning service terminal is a terminal that provides a side link positioning service function;
  • the processor is used to determine whether the first terminal has the authority of a first type of terminal based on the first request message.
  • a network side device which includes a processor and a memory, wherein the memory stores programs or instructions that can be run on the processor, and when the program or instructions are executed by the processor, the steps of the method described in the third aspect are implemented.
  • a network side device including a processor and a communication interface, wherein the communication interface is used to receive a first request message from a first terminal or a second request message from an access mobility management function AMF, the first request message or the second request message is used to request registration of the first terminal as a first type terminal, the first type terminal includes an anchor terminal or a positioning service terminal, the anchor terminal is a terminal with a known location and participates in sending or measuring a side link positioning reference signal, and the positioning service terminal is a terminal that provides a side link positioning service function; the processor is used to, when the LMF receives the first request message from the first terminal, the LMF determines whether the first terminal has the authority of the first type terminal based on the first request message; or, when the LMF receives the second request message from the AMF, the LMF treats the first terminal as a first type terminal and saves the first information of the first terminal.
  • the communication interface is used to receive a first request message from a first terminal or a second request message from an access mobility management function A
  • a second terminal comprising a processor and a memory, wherein the memory stores a program or instruction that can be run on the processor, and when the program or instruction is executed by the processor, the steps of the method described in the third aspect are implemented.
  • a second terminal comprising a processor and a communication interface, wherein the communication interface is used to receive a first message from a first terminal; the first message comprises first information and a signature of the first terminal, and the first information is used to determine that the first terminal is a first type terminal; the first type terminal comprises an anchor terminal or a positioning service terminal, the anchor terminal is a terminal whose position is known and participates in sending or measuring a side link positioning reference signal, and the positioning service terminal is a terminal that provides a side link positioning service function; the processor is used to determine whether the first terminal has the authority of the first type terminal based on the first message.
  • a communication system comprising: a first terminal, a second terminal and a network side device, wherein the first terminal can be used to execute the steps of the terminal authentication method as described in the first aspect, the second terminal can be used to execute the steps of the terminal authentication method as described in the third aspect, and the network side device can be used to execute the steps of the terminal authentication method as described in the second aspect or the third aspect.
  • a readable storage medium on which a program or instruction is stored.
  • the steps of the method described in the first aspect are implemented, or the steps of the method described in the second aspect are implemented, or the steps of the method described in the third aspect are implemented, or the steps of the method described in the fourth aspect are implemented.
  • a chip comprising a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run a program or instructions to implement the method described in the first aspect, or the method described in the second aspect, or the method described in the third aspect, or the method described in the fourth aspect.
  • a computer program/program product is provided, which is stored in a storage medium and executed by at least one processor to implement the steps of the terminal authentication method as described in the first aspect, the second aspect, the third aspect or the fourth aspect.
  • the first terminal sends a first request message to the target network device, and the first request message is used to request the target network device to register the first terminal as a first type terminal.
  • the first type terminal includes an anchor terminal or a positioning service terminal.
  • FIG1 is a structural diagram of a wireless communication system applicable to an embodiment of the present application.
  • FIG2 is a schematic diagram of the system architecture of a terminal authentication method provided in an embodiment of the present application.
  • FIG3 is a protocol diagram of a terminal authentication method provided in an embodiment of the present application.
  • FIG4 is a flow chart of a terminal authentication method according to an embodiment of the present application.
  • FIG5 is a schematic diagram of one of the interactive flow charts of the terminal authentication method provided in an embodiment of the present application.
  • FIG6 is a second interactive flow diagram of the terminal authentication method provided in an embodiment of the present application.
  • FIG. 7 is a third interactive flow diagram of the terminal authentication method provided in an embodiment of the present application.
  • FIG8 is a fourth interactive flow diagram of the terminal authentication method provided in an embodiment of the present application.
  • FIG. 9 is a fifth interactive flow diagram of a terminal authentication method provided in an embodiment of the present application.
  • FIG. 10 is a second flow chart of a terminal authentication method according to an embodiment of the present application.
  • FIG. 11 is a flowchart of a terminal authentication method according to an embodiment of the present application.
  • FIG. 12 is a fourth flow chart of a terminal authentication method according to an embodiment of the present application.
  • FIG13 is a schematic diagram of a structure of a terminal authentication device according to an embodiment of the present application.
  • FIG. 14 is a second schematic diagram of the structure of the terminal authentication device provided in an embodiment of the present application.
  • 15 is a third schematic diagram of the structure of the terminal authentication device provided in an embodiment of the present application.
  • 16 is a fourth schematic diagram of the structure of the terminal authentication device provided in an embodiment of the present application.
  • FIG17 is a schematic diagram of the structure of a communication device provided in an embodiment of the present application.
  • FIG18 is a schematic diagram of the structure of a terminal provided in an embodiment of the present application.
  • FIG19 is a schematic diagram of the structure of a network side device according to an embodiment of the present application.
  • first, second, etc. in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It should be understood that the terms used in this way are interchangeable under appropriate circumstances, so that the embodiments of the present application can be implemented in an order other than those illustrated or described here, and the objects distinguished by “first” and “second” are generally of the same type, and the number of objects is not limited.
  • the first object can be one or more.
  • “and/or” in the specification and claims represents at least one of the connected objects, and the character “/" generally represents that the objects associated with each other are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • NR new radio
  • FIG1 shows a block diagram of a wireless communication system applicable to an embodiment of the present application.
  • the wireless communication system includes a terminal 11 and a network side device 12.
  • the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a handheld computer, a netbook, an ultra-mobile personal computer (ultra-mobile personal computer, UMPC), a mobile Internet device (Mobile Internet Device, MID), an augmented reality (augmented reality, AR)/virtual reality (virtual reality, VR) device, a robot, a wearable device (Wearable Device), a vehicle-mounted device (VUE), a pedestrian terminal (PUE), a smart home (a home appliance with wireless communication function, such as a refrigerator, a TV, a washing machine or furniture, etc.), a game console, a personal computer (personal computer, PC), a teller machine or a self-service machine and other
  • the network side device 12 may include an access network device or Core network equipment, wherein the access network equipment 12 may also be referred to as a radio access network equipment, a radio access network (RAN), a radio access network function or a radio access network unit.
  • the access network equipment 12 may include a base station, a WLAN access point or a WiFi node, etc.
  • the base station may be referred to as a node B, an evolved node B (eNB), an access point, a base transceiver station (BTS), a radio base station, a radio transceiver, a basic service set (BSS), an extended service set (ESS), a home B node, a home evolved B node, a transmitting and receiving point (TRP) or some other suitable term in the field, as long as the same technical effect is achieved, the base station is not limited to a specific technical vocabulary, it should be noted that in the embodiment of the present application, only the base station in the NR system is used as an example for introduction, and the specific type of the base station is not limited.
  • the core network equipment may include but is not limited to at least one of the following: core network node, core network function, mobility management entity (Mobility Management Entity, MME), access mobility management function (Access and Mobility Management Function, AMF), session management function (Session Management Function, SMF), user plane function (User Plane Function, UPF), policy control function (Policy Control Function, PCF), policy and charging rules function unit (Policy and Charging Rules Function, PCRF), edge application service discovery function (Edge Application Server Discovery Function, EASDF), unified data management (Unified Data Management, UDM), unified data storage (Unified Data Repository, UDR), home user server (Home Subscriber Server, HSS), centralized network configuration (CNC), network storage function (Network Repository Function, NRF), network exposure function (Network Exposure Function, NEF), local NEF (Local NEF, or L-NEF), binding support function (Binding Support Function, BSF), application function (Application Function, AF), etc. It should be noted that in
  • LTE Long Term Evolution
  • SL sidelink
  • secondary link side link
  • side link etc. It is used for direct data transmission between terminals without going through network equipment.
  • LTE SL is designed for specific public safety matters (such as emergency communications in disaster sites such as fires or earthquakes), or vehicle to everything (V2X) communications.
  • Vehicle to everything communications include various services, such as basic safety communications, advanced (autonomous) driving, platooning, sensor expansion, etc. Since LTE SL only supports broadcast communications, it is mainly used for basic safety communications.
  • Other advanced V2X services with strict Quality of Service (QoS) requirements in terms of latency, reliability, etc. will be supported by New Radio (NR) SL.
  • QoS Quality of Service
  • the 5G NR system can also support the SL interface for direct communication between terminals, and supports three transmission modes: broadcast, groupcast and unicast.
  • 3GPP needs to introduce SL positioning based on PC5 port in R18, that is, measuring the SL PRS of PC5 port for positioning.
  • FIG2 shows an architecture of SL positioning.
  • FIG2 shows an architecture of SL positioning.
  • the location service terminal is a terminal that provides the location service function.
  • the Location Server UE can be considered as a mandatory role in a SL positioning.
  • the Location Server UE receives a SL positioning request carrying the location service quality QoS or triggers the SL positioning demand itself, and then determines the positioning method used in the SL positioning, the positioning configuration information, and which terminals participate in the positioning as anchor terminals (anchor UE) based on the positioning QoS.
  • the Location Server UE can be a separate role (terminal), or it can also be a target terminal (target UE) (in this case, the Location Server UE locates itself.
  • the target UE also has the role of the Location Server UE) or the anchor terminal (for example, the Location Server UE assists in the transmission or measurement of the SL PRS) or the role of the reference terminal.
  • a terminal UE can act as a Location Server UE, and in another SL positioning process, this terminal may not act as a Location Server UE, for example, only as an anchor UE.
  • the positioning service function includes one or any combination of the following: determining a positioning method based on positioning QoS, determining positioning configuration information, and determining an anchor terminal participating in positioning.
  • Location Server UE plays the role of controlling the execution of SL positioning during a positioning process. It may also be called by other names, such as controlling terminal, which is not limited here.
  • target UE is the target terminal for positioning. Positioning requires obtaining the absolute position, relative position or range (ranging) of the terminal.
  • Anchor UE is a terminal that provides positioning assistance, such as sending or measuring SL PRS.
  • anchor UE is a terminal with a known location or a terminal that can obtain the location.
  • Anchor UE can also be called located terminal or auxiliary terminal.
  • Road Side Unit RSU
  • RSU Road Side Unit
  • the reference UE is a location reference terminal in relative positioning or ranging positioning.
  • the reference UE can be a separate terminal, one of the anchor UEs, or a Location Server UE.
  • the Location Server UE can also play the role of the anchor UE, in the above architecture, in some scenarios, there may not be a separate anchor UE and/or a separate reference terminal.
  • the Location Server UE and the target terminal may be the same terminal or different terminals.
  • SLPP Sidelink Positioning Protocol
  • PDCP Packet Data Convergence Protocol
  • SLPP can also be located in the upper layer of PC5 Radio Resource Control (RRC) or PC5-S).
  • RRC Radio Resource Control
  • LPP Long Term Evolution Positioning Protocol
  • the LPP protocol is used between the positioning server and the terminal in the positioning based on the Uu interface.
  • the SLPP protocol will be used for description in the future.
  • the Location Server UE receives a positioning request carrying positioning QoS and target terminal ID, or the Location Server UE itself is triggered and needs to locate the target UE or itself (that is, the Location Server UE is also the target UE), and then the Location Server UE identifies/determines the anchor UE involved in positioning and determines the positioning method based on information such as positioning QoS.
  • the Location Server UE uses the SL positioning protocol (such as the SLPP protocol in the above figure) to perform SL positioning to obtain the SL positioning result. Specifically, it interacts with the target UE and anchor UE through SL positioning protocol messages, including, for example, providing positioning assistance information (configuring the measurement of SL positioning reference signal (PRS)), requesting location information, receiving SL positioning measurements, etc.
  • PRS SL positioning reference signal
  • FIG4 is a flow chart of a terminal authentication method provided in an embodiment of the present application. As shown in FIG4, the method provided in this embodiment includes:
  • Step 101 A first terminal sends a first request message to a target network device, where the first request message is used to request the target network device to register the first terminal as a first type of terminal.
  • the first type of terminal includes an anchor terminal or a positioning service terminal.
  • the anchor terminal is a terminal whose location is known and participates in sending or measuring a side link positioning reference signal.
  • the positioning service terminal is a terminal that provides a side link positioning service function.
  • the first request message can be a registration request message, which is used to request the target network device to register a first type of terminal, that is, to register the first terminal.
  • the target network device needs to authenticate the first terminal to determine whether the first terminal has the authority of the first type of terminal, that is, whether it can be used as a first type of terminal. After the target network device determines that the first terminal is a first type of terminal, it registers the first terminal.
  • the first type of terminal includes an anchor terminal or a positioning service terminal, wherein the anchor terminal can be a terminal with a known location and participates in sending or measuring a side link positioning reference signal, and the positioning service terminal is a terminal that can provide side link positioning service functions.
  • the first terminal sends a first request message to the target network device, the first request message is used to request the target network device to register the first terminal as a first type of terminal, the first type of terminal includes an anchor terminal or a positioning service terminal, and after the target network device authenticates the first terminal, the first type of terminal is subsequently used.
  • the terminal participates in the SL process, which can ensure the credibility of the first terminal, prevent unauthorized terminals from impersonating first-type terminals, and improve the security of SL positioning.
  • the method further comprises:
  • the first terminal receives a first response message sent by the target network device, where the first response message is a response message corresponding to the first request message.
  • the target network device is an access mobility management function AMF
  • the first request message is a non-access layer NAS message
  • the target network device is a location management function LMF
  • the first request message is a positioning service (LoCation Service, LCS) message or a long-term evolution positioning protocol LPP message.
  • LCS Location Service
  • the AMF may authenticate the first type of terminal, and the LMF may also authenticate the first type of terminal;
  • the first response message can be an LCS message or an LPP message.
  • AMF performs authentication
  • LMF can save the information of the first terminal for subsequent possible SL positioning.
  • LMF sends a second response message corresponding to the second request message to AMF.
  • the AMF sends a first response message to the first terminal.
  • the first request message may be a registration request message of the NAS layer
  • the first response message may be a registration accept message (Registration Accept) of the NAS layer
  • the first response message may be carried by a container in the NAS signaling, for example, by a downlink NAS transport message (DL NAS TRANSPORT message, the DL NAS TRANSPORT message is a NAS message), the message includes a container (container), and the container corresponds to the above-mentioned first response message.
  • DL NAS TRANSPORT message the DL NAS TRANSPORT message is a NAS message
  • the message includes a container (container)
  • the container corresponds to the above-mentioned first response message.
  • step 101 may be implemented in the following manner:
  • the first terminal sends a first request message to the target network device through AMF, and the first request message is carried by a container in the NAS signaling.
  • the first terminal sends a NAS layer uplink NAS transmission message to the AMF, and the uplink NAS transmission includes a container, and the container corresponds to the first request message.
  • the first terminal sends a first request message to the AMF, which is forwarded by the AMF to the LMF.
  • the first request message may be carried by a container in the NAS signaling, for example, by a container in an uplink NAS transport message (UL NAS TRANSPORT, the UL NAS TRANSPORT message is a NAS message).
  • the first request message is a NAS layer registration request message.
  • the first request message includes at least one of the following:
  • location information may include, for example, longitude and latitude information
  • SL identification ID may include, for example, SL layer layer2ID, application layer Application Layer UE ID
  • SL positioning capability of the first terminal may include, for example, whether it supports sending SL-PRS, whether it supports measuring SL-PRS, supported SL positioning methods, etc.
  • the first terminal is the anchor UE, and the SL PRS transmission configuration information of the anchor UE (if it is an anchor UE, it can determine the SL PRS transmission configuration by itself); that is, the anchor UE sends the SL PRS on the resources indicated by the transmission configuration information.
  • the LMF authenticates the first terminal, and the method includes:
  • Step 1 The terminal sends a service request to AMF;
  • CM-IDLE the terminal initiates a service request and enters the connected state (CM-CONNECTED).
  • the connection management CM describes the signaling connection status between the terminal and the 5G core network node (AMF).
  • Step 2-3 the first terminal sends a first request message to the LMF
  • the first request message is used to register a first type of terminal with the LMF.
  • the first request message may include first information of the first terminal, where the first information of the first terminal includes one or more of the following:
  • the first terminal sends a first request message to the LMF, which may specifically include:
  • Step 2 The first terminal sends a NAS message (such as UL NAS TRANSPORT message) to the AMF, where the message includes a container corresponding to the first request message.
  • a NAS message such as UL NAS TRANSPORT message
  • Step 3 AMF submits the first request message in the above NAS message to LMF.
  • AMF can also submit the ID of the terminal to LMF.
  • the ID of the terminal can be a permanent equipment identifier (PEI) or a subscription permanent identifier (SUPI). It should be noted that the terminal ID here is determined by AMF, not by the terminal and included in the first registration request message, which ensures the credibility of the terminal ID.
  • PEI permanent equipment identifier
  • SUPI subscription permanent identifier
  • Step 4 LMF authenticates the first terminal and saves the first information of the first terminal
  • LMF authenticates the first terminal. For example, LMF pre-configures the IDs of terminals that can be used as first-type terminals. If the ID of the received terminal is in this pre-configured list, the authentication is successful. Alternatively, whether it is a first-type terminal or whether it has the authority to be a first-type terminal can be part of the contract information. The data are divided and stored in the unified data management (UDM). The LMF obtains from the UDM whether the first terminal UE has the authority to be a first type terminal.
  • UDM unified data management
  • the LMF After successful authentication, the LMF saves the first information of the first terminal for possible subsequent SL positioning.
  • Step 5-6 LMF sends a response message of the first request message to the first terminal
  • the LMF sends a response message to the first request message to the first terminal, which may include:
  • Step 5 LMF submits the first response message to AMF
  • Step 6 The AMF sends a NAS message (such as a DL NAS TRANSPORT message) to the first terminal, where the message includes a container corresponding to the first response message.
  • a NAS message such as a DL NAS TRANSPORT message
  • the first response message includes a key, which may be a private key of an asymmetric key.
  • the subsequent use of these first type terminals to participate in the SL process can prevent unauthenticated terminals from impersonating first type terminals, thereby improving the security of SL positioning.
  • the AMF authenticates the first terminal, and the method includes:
  • Step 1 The first terminal sends a first request message to the AMF, where the first request message is used to register a first type of terminal with the AMF.
  • the first request message may be a registration request message of the NAS layer.
  • the first terminal when the first terminal is turned on, it needs to register with the network side device, and the first terminal sends a NAS message (such as a Registration Request message) to the AMF.
  • a NAS message such as a Registration Request message
  • the Registration Request message includes first information of the first terminal, see the aforementioned embodiment.
  • Step 2 AMF obtains the contract information and authenticates the first terminal
  • Whether it is a first type of terminal or whether it has the authority to be a first type of terminal can be part of the contract information and stored in the UDM.
  • the AMF obtains the contract information of the UE from the UDM to authenticate the first terminal. Based on this, it is known whether the first terminal has the authority of the first type of UE.
  • the contract information can also include the location information of the terminal.
  • Step 3 If the first terminal has the authority of the first type of terminal, the AMF sends a second request message to the LMF, and the second request message is used to request registration of the first terminal as a first type of terminal.
  • the second request message may include the ID of the first terminal and/or the first information of the first terminal.
  • Step 4 LMF saves the first information of the first terminal for possible subsequent SL positioning
  • Step 5 LMF submits a second response message to AMF.
  • the second response message includes a key, which may be a private key of an asymmetric key.
  • Step 6 AMF sends a first response message to the first terminal.
  • the first response message may be a NAS message - Registration Accept message.
  • the Registration Accept message includes a key, which may be a private key of an asymmetric key.
  • the key may be a key sent by the LMF or a key determined by the AMF.
  • AMF authenticates the first type UE, and sends relevant information of the first terminal to LMF after successful authentication. After LMF obtains the authenticated first type terminal, it uses these first type terminals to participate in the SL process in the subsequent process, which can prevent unauthenticated terminals from impersonating first type terminals and improve the security of SL positioning.
  • the method further includes:
  • the first terminal generates a signature based on the key and the first information of the first terminal
  • the first terminal sends a first message to the second terminal, where the first message includes first information and a signature, and the first information is used to determine that the first terminal is a first type of terminal.
  • the first type of terminal is pre-configured with a private key of an asymmetric key, or obtains a private key of an asymmetric key from a network side device (see the embodiments shown in Figures 5 and 6).
  • the first terminal uses the private key to generate a signature for the first information, and the first information includes, for example, whether it is a first type of terminal, configuration information of the first type of terminal (such as SL PRS transmission configuration), etc.
  • the first terminal sends the first information and the signature, and the second terminal that receives the first information verifies the signature based on the public key to determine whether the first terminal is a first type of terminal.
  • the second terminal generates a new signature for the received first information based on the public key, and matches the received signature with the new signature. If the match is successful, it means that the authentication is successful and the first terminal is a first type of terminal.
  • the second terminal may be pre-configured with the public key of the asymmetric key, or obtain the public key of the asymmetric key from a network side device.
  • the public key and private key mentioned above are a pair of keys.
  • the public key or private key of the asymmetric key obtained from the network side device may be a public key or private key sent by the receiving AMF or access network device.
  • the second terminal can be the target terminal or third-party terminal of SL positioning (for example, the terminal verifies the positioning service terminal), or it can be the positioning service terminal of SL positioning (for example, the positioning service terminal verifies the anchor UE).
  • the first type of terminal uses a private key to generate a signature for the first information.
  • the first information includes information of the first type of terminal.
  • the information of the first type of terminal can be used to indicate that the terminal is a first type of terminal. That is to say, the second terminal that receives the information can consider the first terminal to be a first type of terminal after the signature authentication is successful, thereby improving the security of SL positioning.
  • the first terminal sends a first message to the second terminal, including:
  • the first terminal sends a first message to the second terminal through a sidelink unicast connection between the first terminal and the second terminal; or,
  • the first terminal broadcasts and sends a first message; or,
  • the first terminal After receiving the discovery request message broadcast by the second terminal, the first terminal sends a first message to the second terminal, where the first message is a discovery response message.
  • the first terminal sends the first information and the corresponding signature, as shown in FIG8 , and can be sent through an established SL unicast connection, or, as shown in FIG9 , can also be sent through broadcast, for example, through mode A or mode B of the discovery process.
  • FIG. 7 can be implemented in combination with FIG. 4 , FIG. 5 , and FIG. 6 , or can be implemented alone as an embodiment.
  • FIG10 is a second flow chart of the terminal authentication method provided in an embodiment of the present application. As shown in FIG10 , the method provided in this embodiment includes:
  • Step 201 The access mobility management function AMF receives a first request message from a first terminal, where the first request message is used to request registration of a first type of terminal for the first terminal.
  • the first type of terminal includes an anchor terminal or a positioning service terminal.
  • the anchor terminal is a terminal whose location is known and participates in sending or measuring a sidelink positioning reference signal.
  • the positioning service terminal is a terminal that provides a sidelink positioning service function.
  • Step 202 The AMF determines whether the first terminal has the authority of the first type of terminal based on the first request message.
  • the AMF determines, based on the first request message, whether the first terminal has authority for a first type of terminal, including:
  • the AMF obtains the subscription information of the first terminal
  • the AMF determines whether the first terminal has the authority of the first type terminal based on the subscription information of the first terminal and the information of the first terminal included in the first request message.
  • the first request message includes at least one of the following:
  • the first request message is a non-access stratum NAS layer registration request message.
  • the method further comprises:
  • the AMF sends a first response message to the first terminal.
  • the first response message includes a key.
  • the key is a private key of an asymmetric key.
  • the key is used by the first terminal to generate a signature.
  • the method further comprises:
  • the AMF determines that the first terminal has the authority of the first type of terminal, it sends a second request message to the location management function LMF, where the second request message is used to request registration of the first type of terminal for the first terminal;
  • the AMF receives a second response message from the LMF.
  • LMF For the registration requested by the second request message, LMF does not need to perform authentication, but only needs to save the relevant information.
  • the second request message includes at least one of the following: an identification ID of the first terminal, location information of the first terminal, a side link SL identification ID of the first terminal, a capability indication of a first type terminal, SL positioning capability of the first terminal, and transmission configuration information of an SL positioning reference signal PRS.
  • the second response message includes a key.
  • the key is a private key of an asymmetric key.
  • the key is used by the first terminal to generate a signature.
  • Step 301 LMF receives a first request message from a first terminal or a second request message from an access mobility management function AMF, where the first request message or the second request message is used to request registration of a first type of terminal for the first terminal.
  • the first type of terminal includes an anchor terminal or a positioning service terminal.
  • the anchor terminal is a terminal whose location is known and participates in sending or measuring a side link positioning reference signal.
  • the positioning service terminal is a terminal that provides a side link positioning service function.
  • Step 302 When the LMF receives a first request message from the first terminal, the LMF determines whether the first terminal has the authority of the first type of terminal based on the first request message; or
  • Step 303 When the LMF receives the second request message from the AMF, the LMF regards the first terminal as a first type terminal and saves the first information of the first terminal.
  • the LMF determines, based on the first request message, whether the first terminal has authority for a first type of terminal, including:
  • the LMF obtains the user identification of the first terminal from the AMF
  • the LMF obtains the subscription information of the first terminal based on the user identifier
  • the LMF determines whether the first terminal has authority as a first-type terminal based on the contract information of the first terminal.
  • the LMF determines, based on the first request message, whether the first terminal has authority for a first type of terminal, including:
  • the LMF obtains the user identification of the first terminal from the AMF
  • the LMF determines, based on the user identifier, whether a pre-configured first type of terminal includes the first terminal;
  • the preconfigured first-type terminals include the first terminal, it is determined that the first terminal has the authority of the first-type terminal.
  • the first request message or the second request message includes at least one of the following:
  • the first request message is a positioning service LCS message or a long term evolution positioning protocol LPP message.
  • the method further comprises:
  • the LMF In a case where the LMF receives the first request message from the first terminal, the LMF sends a first response message to the first terminal.
  • the first response message includes a key.
  • the key is a private key of an asymmetric key.
  • the key is used by the first terminal to generate a signature.
  • the method further comprises:
  • the LMF In a case where the LMF receives the second request message from the AMF, the LMF sends a second response message to the AMF.
  • the second request message includes at least one of the following: an identification ID of the first terminal, location information of the first terminal, a side link SL identification ID of the first terminal, a capability indication of a first type terminal, SL positioning capability of the first terminal, and transmission configuration information of an SL positioning reference signal PRS.
  • the second response message includes a key.
  • the key is a private key of an asymmetric key.
  • the key is used by the first terminal to generate a signature.
  • the method further comprises:
  • the LMF saves the first information of the first terminal as the first type terminal.
  • the first information of the first terminal includes at least one of the following:
  • the LMF receives a first request message from a first terminal, including:
  • the LMF receives a first request message from the first terminal sent by the AMF; the first request message is carried by a container in the NAS signaling;
  • the AMF sends a first response message to the first terminal, including:
  • the LMF sends the first response message to the first terminal through the AMF; the first response message is carried by a container in the NAS signaling.
  • FIG12 is a fourth flow chart of the terminal authentication method provided in an embodiment of the present application. As shown in FIG12 , the method provided in this embodiment includes:
  • Step 401 A second terminal receives a first message from a first terminal; the first message includes first information and a signature of the first terminal, and the first information is used to determine that the first terminal is a first type terminal; the first type terminal includes an anchor terminal or a positioning service terminal, the anchor terminal is a terminal with a known location and participates in sending or measuring a sidelink positioning reference signal, and the positioning service terminal is a terminal that provides a sidelink positioning service function;
  • Step 402 The second terminal determines whether the first terminal has the authority of the first type of terminal based on the first message.
  • the signature is generated by the first terminal based on the first information of the first terminal and a key from the target network device.
  • the signature is generated by the first terminal based on the first information of the first terminal and a preconfigured key.
  • the key is a private key of an asymmetric key.
  • the second terminal determining, based on the first message, whether the first terminal has authority of a first-type terminal includes:
  • the second terminal verifies the signature based on the public key of the asymmetric key and the first information, and determines whether the first terminal has the authority of the first type of terminal based on the verification result.
  • the second terminal receiving the first message from the first terminal includes:
  • the second terminal receives the first message sent by the first terminal through the side link unicast connection between the first terminal and the second terminal; or,
  • the second terminal receives the first message broadcasted by the first terminal; or,
  • the second terminal After the second terminal broadcasts a discovery solicitation message, the second terminal receives the first message corresponding to the discovery solicitation message sent by the first terminal, where the first message is a discovery response message.
  • the first information includes at least one of the following: an identification ID of the first terminal, location information of the first terminal, a side link SL identification ID of the first terminal, a capability indication of a first type terminal, SL positioning capability of the first terminal, and transmission configuration information of an SL positioning reference signal PRS.
  • the terminal authentication method provided in the embodiment of the present application can be executed by a terminal authentication device.
  • the terminal authentication device provided in the embodiment of the present application is described by taking the terminal authentication method executed by the terminal authentication device as an example.
  • FIG13 is one of the structural diagrams of the terminal authentication device provided by the present application. As shown in FIG13, the terminal authentication device provided by this embodiment includes:
  • the sending module 110 is used to send a first request message to a target network device, wherein the first request message is used to request the target network device to register a first terminal as a first type terminal, wherein the first type terminal includes An anchor terminal or positioning service terminal, the anchor terminal is a terminal with a known position and participates in sending or measuring a side link positioning reference signal, and the positioning service terminal is a terminal that provides a side link positioning service function.
  • the device further comprises:
  • the receiving module is used to receive a first response message sent by the target network device, where the first response message is a response message corresponding to the first request message.
  • the target network device is an access mobility management function AMF
  • the first request message is a non-access layer NAS message
  • the target network device is a location management function LMF
  • the first request message is a positioning service LCS message or a long term evolution positioning protocol LPP message.
  • the sending module 110 is specifically configured to:
  • the first request message is sent to the target network device through AMF, and the first request message is carried by a container in NAS signaling.
  • the sending module 110 is specifically configured to:
  • the first request message is a NAS layer registration request message.
  • the first request message includes at least one of the following:
  • the first response message includes a key.
  • the key is a private key of an asymmetric key.
  • the device further comprises:
  • a processing module configured to generate a signature based on the key and the first information of the first terminal
  • the sending module 110 is further used to: send a first message to the second terminal, where the first message includes the first information and the signature, and the first information is used to determine that the first terminal is a first type of terminal.
  • the sending module 110 is specifically configured to:
  • the first message After receiving the discovery request message broadcasted by the second terminal, the first message is sent to the second terminal, where the first message is a discovery response message.
  • the device of this embodiment can be used to execute the method of any one of the embodiments in the aforementioned first terminal side method embodiment. Its specific implementation process and technical effects are similar to those in the first terminal side method embodiment. For details, please refer to the detailed introduction in the first terminal side method embodiment, which will not be repeated here.
  • FIG14 is a second schematic diagram of the structure of the terminal authentication device provided by the present application.
  • the terminal authentication device provided by this embodiment includes:
  • the receiving module 210 is configured to receive a first request message from a first terminal, where the first request message is used to request registration of a first type of terminal for the first terminal, where the first type of terminal includes an anchor terminal or a positioning service terminal, where the anchor terminal is a terminal whose position is known and participates in sending or measuring a sidelink positioning reference signal, and the positioning service terminal is a terminal that provides a sidelink positioning service function;
  • the processing module 220 is configured to determine whether the first terminal has the authority of a first type of terminal based on the first request message.
  • processing module 220 is specifically configured to:
  • the first terminal Based on the subscription information of the first terminal and the information of the first terminal included in the first request message, it is determined whether the first terminal has the authority of the first type of terminal.
  • the first request message includes at least one of the following:
  • the first request message is a non-access stratum NAS layer registration request message.
  • the device further comprises:
  • a sending module is used to send a first response message to the first terminal.
  • the first response message includes a key.
  • the key is a private key of an asymmetric key.
  • the key is used by the first terminal to generate a signature.
  • the sending module is further used to:
  • the receiving module 210 is further configured to receive a second response message from the LMF.
  • LMF For the registration requested by the second request message, LMF does not need to perform authentication, but only needs to save the relevant information.
  • the second request message includes at least one of the following: an identification ID of the first terminal, location information of the first terminal, a side link SL identification ID of the first terminal, a capability indication of a first type terminal, SL positioning capability of the first terminal, and transmission configuration information of an SL positioning reference signal PRS.
  • the second response message includes a key.
  • the key is a private key of an asymmetric key.
  • the key is used by the first terminal to generate a signature.
  • the device of this embodiment can be used to execute the method of any of the embodiments in the aforementioned network side method embodiments. Its specific implementation process and technical effects are similar to those in the network side method embodiments. For details, please refer to the detailed introduction in the network side method embodiments, which will not be repeated here.
  • FIG15 is a third schematic diagram of the structure of the terminal authentication device provided by the present application. As shown in FIG15 , the terminal authentication device provided by this embodiment includes:
  • the receiving module 310 is configured to receive a first request message from a first terminal or a second request message from an access mobility management function AMF, where the first request message or the second request message is used to request registration of a first type of terminal for the first terminal, where the first type of terminal includes an anchor terminal or a positioning service terminal, where the anchor terminal is a terminal whose location is known and participates in sending or measuring a side link positioning reference signal, and the positioning service terminal is a terminal that provides a side link positioning service function;
  • a processing module 320 is configured to determine, when receiving the first request message from the first terminal, whether the first terminal has authority as a first type of terminal based on the first request message; or
  • the first terminal When receiving the second request message from the AMF, the first terminal is regarded as a first type terminal and the first information of the first terminal is saved.
  • processing module 320 is specifically configured to:
  • the first terminal Based on the subscription information of the first terminal, it is determined whether the first terminal has authority as a first-type terminal.
  • processing module 320 is specifically configured to:
  • the preconfigured first-type terminals include the first terminal, it is determined that the first terminal has the authority of the first-type terminal.
  • the first request message or the second request message includes at least one of the following:
  • the first request message is a positioning service LCS message or a long term evolution positioning protocol LPP message.
  • the device further comprises:
  • a sending module is used to send a first response message to the first terminal when receiving the first request message from the first terminal.
  • the first response message includes a key.
  • the key is a private key of an asymmetric key.
  • the key is used by the first terminal to generate a signature.
  • the sending module is further used to:
  • a second response message is sent to the AMF.
  • the second request message includes at least one of the following: an identification ID of the first terminal, location information of the first terminal, a side link SL identification ID of the first terminal, a capability indication of a first type terminal, SL positioning capability of the first terminal, and transmission configuration information of an SL positioning reference signal PRS.
  • the second response message includes a key.
  • the key is a private key of an asymmetric key.
  • the key is used by the first terminal to generate a signature.
  • processing module 320 is further configured to:
  • the LMF regards the first terminal as the first type of terminal and saves the first information of the first terminal.
  • the first information of the first terminal includes at least one of the following:
  • the receiving module 310 is specifically configured to:
  • the AMF Receiving a first request message from a first terminal sent by the AMF; the first request message is carried by a container in the NAS signaling;
  • the sending module is specifically used for:
  • the first response message is sent to the first terminal through the AMF; the first response message is carried by the container in the NAS signaling.
  • the device of this embodiment can be used to execute the method of any of the embodiments in the aforementioned network side method embodiments. Its specific implementation process and technical effects are similar to those in the network side method embodiments. For details, please refer to the detailed introduction in the network side method embodiments, which will not be repeated here.
  • FIG16 is a fourth structural diagram of the terminal authentication device provided by the present application. As shown in FIG16 , the terminal authentication device provided by this embodiment includes:
  • the receiving module 410 is configured to receive a first message from a first terminal; the first message includes first information and a signature of the first terminal, the first information being used to determine that the first terminal is a first type of terminal; the first type of terminal includes an anchor terminal or a positioning service terminal, the anchor terminal is a terminal with a known location and participates in sending the first message.
  • the processing module 420 is configured to determine, based on the first message, whether the first terminal has authority as a first-type terminal.
  • the signature is generated by the first terminal based on the first information of the first terminal and a key from the target network device.
  • the signature is generated by the first terminal based on the first information of the first terminal and a preconfigured key.
  • the key is a private key of an asymmetric key.
  • processing module 420 is specifically configured to:
  • the signature is verified based on the public key of the asymmetric key and the first information, and it is determined whether the first terminal has the authority of the first type of terminal based on the verification result.
  • the receiving module 410 is specifically configured to:
  • the second terminal After the second terminal broadcasts a discovery request message, the first message corresponding to the discovery request message sent by the first terminal is received, where the first message is a discovery response message.
  • the first information includes at least one of the following: an identification ID of the first terminal, location information of the first terminal, a side link SL identification ID of the first terminal, a capability indication of a first type terminal, SL positioning capability of the first terminal, and transmission configuration information of an SL positioning reference signal PRS.
  • the device of this embodiment can be used to execute the method of any one of the embodiments in the aforementioned second terminal side method embodiment. Its specific implementation process and technical effects are similar to those in the second terminal side method embodiment. For details, please refer to the detailed introduction in the second terminal side method embodiment, which will not be repeated here.
  • the terminal authentication device in the embodiment of the present application can be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip.
  • the electronic device can be a terminal, or it can be other devices other than a terminal.
  • the terminal can include but is not limited to the types of terminals 11 listed above, and other devices can be servers, network attached storage (NAS), etc., which are not specifically limited in the embodiment of the present application.
  • the terminal authentication device provided in the embodiment of the present application can implement the various processes implemented by the method embodiments of Figures 4 to 12 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the embodiment of the present application further provides a communication device 1700, including a processor 1701 and a memory 1702, wherein the memory 1702 stores a program or instruction that can be run on the processor 1701.
  • the communication device 1700 is a terminal
  • the program or instruction is executed by the processor 1701 to implement the above
  • the communication device 1700 is a network side device
  • the program or instruction is executed by the processor 1701 to implement the various steps of the above-mentioned terminal authentication method embodiment, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the embodiment of the present application also provides a first terminal, including a processor and a communication interface, the communication interface is used to send a first request message to a target network device, the first request message is used to request the target network device to register the first terminal as a first type of terminal, the first type of terminal includes an anchor terminal or a positioning service terminal, the anchor terminal is a terminal with a known location and participates in sending or measuring a side link positioning reference signal, and the positioning service terminal is a terminal that provides a side link positioning service function.
  • This terminal embodiment corresponds to the above-mentioned terminal side method embodiment, and each implementation process and implementation method of the above-mentioned method embodiment can be applied to the terminal embodiment and can achieve the same technical effect.
  • Figure 18 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
  • the terminal 1000 includes but is not limited to: a radio frequency unit 1001, a network module 1002, an audio output unit 1003, an input unit 1004, a sensor 1005, a display unit 1006, a user input unit 1007, an interface unit 1008, a memory 1009, and at least some of the components of a processor 1010.
  • the terminal 1000 may also include a power source (such as a battery) for supplying power to each component, and the power source may be logically connected to the processor 1010 through a power management system, so as to manage charging, discharging, and power consumption management through the power management system.
  • a power source such as a battery
  • the terminal structure shown in FIG18 does not constitute a limitation on the terminal, and the terminal may include more or fewer components than shown in the figure, or combine certain components, or arrange components differently, which will not be described in detail here.
  • the input unit 1004 may include a graphics processing unit (GPU) 10041 and a microphone 10042, and the graphics processor 10041 processes the image data of the static picture or video obtained by the image capture device (such as a camera) in the video capture mode or the image capture mode.
  • the display unit 1006 may include a display panel 10061, and the display panel 10061 may be configured in the form of a liquid crystal display, an organic light emitting diode, etc.
  • the user input unit 1007 includes at least one of a touch panel 10071 and other input devices 10072.
  • the touch panel 10071 is also called a touch screen.
  • the touch panel 10071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 10072 may include, but are not limited to, a physical keyboard, function keys (such as a volume control key, a switch key, etc.), a trackball, a mouse, and a joystick, which will not be repeated here.
  • the RF unit 1001 after receiving the downlink data from the network side device, the RF unit 1001 can transmit it to the processor 1010 for processing; in addition, the RF unit 1001 can send the uplink data to the network side device.
  • the RF unit 1001 includes but is not limited to an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, etc.
  • the memory 1009 can be used to store software programs or instructions and various data.
  • the memory 1009 can mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area for storing programs or instructions
  • the area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, an image playback function, etc.), etc.
  • the memory 1009 may include a volatile memory or a non-volatile memory, or the memory 1009 may include both volatile and non-volatile memories.
  • Non-volatile memory includes a high-speed random access memory and may also include a non-volatile memory, wherein the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
  • ROM read-only memory
  • PROM programmable read-only memory
  • EPROM erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • the volatile memory may be a random access memory (RAM), a static random access memory (SRAM), a dynamic random access memory (DRAM), a synchronous dynamic random access memory (SDRAM), a double data rate synchronous dynamic random access memory (DDRSDRAM), an enhanced synchronous dynamic random access memory (ESDRAM), a synchronous link dynamic random access memory (SLDRAM) and a direct memory bus random access memory (DRRAM).
  • RAM random access memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • DDRSDRAM double data rate synchronous dynamic random access memory
  • ESDRAM enhanced synchronous dynamic random access memory
  • SLDRAM synchronous link dynamic random access memory
  • DRRAM direct memory bus random access memory
  • the processor 1010 may include one or more processing units; optionally, the processor 1010 may integrate an application processor and a modem processor, wherein the application processor mainly processes operations related to an operating system, a user interface, and application programs or instructions, and the modem processor mainly processes wireless communication signals, such as a baseband processor. It is understandable that the modem processor may not be integrated into the processor 1010.
  • the radio frequency unit 1001 is used to send a first request message to the target network device, and the first request message is used to request the target network device to register a first terminal as a first type of terminal.
  • the first type of terminal includes an anchor terminal or a positioning service terminal.
  • the anchor terminal is a terminal with a known location and participates in sending or measuring a side link positioning reference signal.
  • the positioning service terminal is a terminal that provides a side link positioning service function.
  • the radio frequency unit 1001 is further used for:
  • a first response message sent by the target network device is received, where the first response message is a response message corresponding to the first request message.
  • the target network device is an access mobility management function AMF
  • the first request message is a non-access layer NAS message
  • the target network device is a location management function LMF
  • the first request message is a positioning service LCS message or a long term evolution positioning protocol LPP message.
  • the radio frequency unit 1001 is specifically used for:
  • the first request message is sent to the target network device through AMF, and the first request message is carried by a container in NAS signaling.
  • the radio frequency unit 1001 is specifically used for:
  • the first request message is a NAS layer registration request message.
  • the first request message includes at least one of the following:
  • the first response message includes a key.
  • the key is a private key of an asymmetric key.
  • the processor 1010 is configured to generate a signature based on the key and the first information of the first terminal;
  • the radio frequency unit 1001 is further used to: send a first message to the second terminal, where the first message includes the first information and the signature, and the first information is used to determine that the first terminal is a first type of terminal.
  • the radio frequency unit 1001 is specifically used for:
  • the first message After receiving the discovery request message broadcasted by the second terminal, the first message is sent to the second terminal, where the first message is a discovery response message.
  • the embodiment of the present application also provides a network side device, including a processor and a communication interface, the communication interface is used to receive a first request message from a first terminal, the first request message is used to request the first terminal to be registered as a first type of terminal, the first type of terminal includes an anchor terminal or a positioning service terminal, the anchor terminal is a terminal with a known location and participates in sending or measuring a side link positioning reference signal, the positioning service terminal is a terminal that provides a side link positioning service function; the processor is used to determine whether the first terminal has the authority of the first type of terminal based on the first request message.
  • This network side device embodiment corresponds to the above-mentioned network side device method embodiment, and each implementation process and implementation method of the above-mentioned method embodiment can be applied to this network side device embodiment, and can achieve the same technical effect.
  • An embodiment of the present application also provides a network side device, including a processor and a communication interface, the communication interface is used to receive a first request message from a first terminal or a second request message from an access mobility management function AMF, the first request message or the second request message is used to request registration of a first type terminal for the first terminal, the first type terminal includes an anchor terminal or a positioning service terminal, the anchor terminal is a terminal with a known location and participates in sending or measuring a side link positioning reference signal, the positioning service terminal is a terminal that provides a side link positioning service function; the processor is used to determine whether the first terminal has the authority of the first type terminal based on the first request message when receiving the first request message from the first terminal; or when receiving the second request message from the AMF, save the first information of the first terminal as a first type terminal.
  • This network side device embodiment is implemented in the same manner as the above-mentioned network side device method Corresponding to the example, each implementation process and implementation method of the above method embodiment can be applied to the network side
  • the embodiment of the present application further provides a network side device.
  • the network side device 2000 includes: a processor 2001, a network interface 2002 and a memory 2003.
  • the network interface 2002 is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the network side device 2000 of the embodiment of the present application also includes: instructions or programs stored in the memory 2003 and executable on the processor 2001.
  • the processor 2001 calls the instructions or programs in the memory 2003 to execute the methods executed by the modules shown in Figure 14 or Figure 15, and achieves the same technical effect. To avoid repetition, it will not be repeated here.
  • An embodiment of the present application also provides a readable storage medium, on which a program or instruction is stored.
  • a program or instruction is stored.
  • the program or instruction is executed by a processor, each process of the above-mentioned terminal authentication method embodiment is implemented, and the same technical effect can be achieved. To avoid repetition, it will not be repeated here.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium includes a computer readable storage medium, such as a computer read-only memory ROM, a random access memory RAM, a magnetic disk or an optical disk.
  • An embodiment of the present application further provides a chip, which includes a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the various processes of the above-mentioned terminal authentication method embodiment, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.
  • the embodiment of the present application further provides a computer program/program product, which is stored in a storage medium, and is executed by at least one processor to implement the various processes of the above-mentioned terminal authentication method embodiment, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • An embodiment of the present application also provides a communication system, including: a first terminal, a second terminal and a network side device, wherein the first terminal can be used to execute the steps of the terminal authentication method as described above, the second terminal can be used to execute the steps of the terminal authentication method as described above, and the network side device can be used to execute the steps of the terminal authentication method as described above.
  • the technical solution of the present application can be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), and includes a number of instructions for a terminal (which can be a mobile phone, computer, server, air conditioner, or network equipment, etc.) to execute the methods described in each embodiment of the present application.
  • a storage medium such as ROM/RAM, magnetic disk, optical disk
  • a terminal which can be a mobile phone, computer, server, air conditioner, or network equipment, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种终端鉴权方法、终端及网络侧设备,属于通信技术领域,本申请实施例的终端鉴权方法包括:第一终端向目标网络设备发送第一请求消息,第一请求消息用于向目标网络设备请求对第一终端进行第一类型终端的注册,第一类型终端包括锚点终端或定位服务终端(101),锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,定位服务终端是提供侧链路定位服务功能的终端。

Description

终端鉴权方法、终端及网络侧设备
相关申请的交叉引用
本申请要求享有于2022年9月26日提交的名称为“终端鉴权方法、终端及网络侧设备”的中国专利申请202211176984.X的优先权,该申请的全部内容通过引用并入本文中。
技术领域
本申请属于通信技术领域,具体涉及一种终端鉴权方法、终端及网络侧设备。
背景技术
侧链路(Sidelink,SL)通信是指用户设备(User Equipment,UE)之间直接进行通信,侧链路也称为副链路,边链路或旁链路等。目前除了基于Uu口(UE与基站之间的无线接口)的参考信号进行定位外,在车联网(vehicle to everything,V2X)等场景也存在基于PC5口(UE与UE之间的无线接口)进行定位的需求,比如当车辆不在移动网络的覆盖范围内时,可能需要进行侧链路定位。
在进行侧链路定位时,可能会利用其它UE进行辅助定位,但是并不能保证参与定位的UE是可信的,因此,如何确定参与定位的UE是可信的,是需要解决的技术问题。
发明内容
本申请实施例提供一种终端鉴权方法、终端及网络侧设备,能够解决如何确定参与定位的UE是可信的问题。
第一方面,提供了一种终端鉴权方法,包括:
第一终端向目标网络设备发送第一请求消息,所述第一请求消息用于向所述目标网络设备请求对第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端。
第二方面,提供了一种终端鉴权方法,包括:
接入移动管理功能AMF接收来自于第一终端的第一请求消息,所述第一请求消息用于请求对所述第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
所述AMF基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限。
第三方面,提供了一种终端鉴权方法,包括:
位置管理功能LMF接收来自于第一终端的第一请求消息或来自于接入移动管理功能AMF的第二请求消息,所述第一请求消息或所述第二请求消息用于请求对所述第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
在所述LMF接收来自于所述第一终端的所述第一请求消息的情况下,所述LMF基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限;或
在所述LMF接收来自于所述AMF的所述第二请求消息的情况下,所述LMF将所述第一终端作为第一类型终端,并保存所述第一终端的第一信息。
第四方面,提供了一种终端鉴权方法,包括:
第二终端接收来自于第一终端的第一消息;所述第一消息包括所述第一终端的第一信息和签名,所述第一信息用于确定所述第一终端为第一类型终端;所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
所述第二终端基于所述第一消息,确定所述第一终端是否具有第一类型终端的权限。
第五方面,提供了一种终端鉴权装置,包括:
发送模块,用于向目标网络设备发送第一请求消息,所述第一请求消息用于向所述目标网络设备请求对第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端。
第六方面,提供了一种终端鉴权装置,包括:
接收模块,用于接收来自于第一终端的第一请求消息,所述第一请求消息用于请求对所述第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
处理模块,用于基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限。
第七方面,提供了一种终端鉴权装置,包括:
接收模块,用于接收来自于第一终端的第一请求消息或来自于接入移动管理功能AMF的第二请求消息,所述第一请求消息或所述第二请求消息用于请求对所述第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
处理模块,用于在接收来自于所述第一终端的所述第一请求消息的情况下,基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限;或
在接收来自于所述AMF的所述第二请求消息的情况下,将所述第一终端作为第一类型终端,并保存所述第一终端的第一信息。
第八方面,提供了一种终端鉴权装置,包括:
接收模块,用于接收来自于第一终端的第一消息;所述第一消息包括所述第一终端的第一信息和签名,所述第一信息用于确定所述第一终端为第一类型终端;所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
处理模块,用于基于所述第一消息,确定所述第一终端是否具有第一类型终端的权限。
第九方面,提供了一种第一终端,该第一终端包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。
第十方面,提供了一种第一终端,包括处理器及通信接口,其中,所述通信接口用于向目标网络设备发送第一请求消息,所述第一请求消息用于向所述目标网络设备请求对第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端。
第十一方面,提供了一种网络侧设备,该网络侧设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第二方面所述的方法的步骤。
第十二方面,提供了一种网络侧设备,包括处理器及通信接口,其中,所述通信接口用于接收来自于第一终端的第一请求消息,所述第一请求消息用于请求对所述第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端, 所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;所述处理器用于基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限。
第十三方面,提供了一种网络侧设备,该网络侧设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第三方面所述的方法的步骤。
第十四方面,提供了一种网络侧设备,包括处理器及通信接口,其中,所述通信接口用于接收来自于第一终端的第一请求消息或来自于接入移动管理功能AMF的第二请求消息,所述第一请求消息或所述第二请求消息用于请求对所述第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;所述处理器用于在所述LMF接收来自于所述第一终端的所述第一请求消息的情况下,所述LMF基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限;或,在所述LMF接收来自于所述AMF的所述第二请求消息的情况下,所述LMF将所述第一终端作为第一类型终端,并保存所述第一终端的第一信息。
第十五方面,提供了一种第二终端,该第二终端包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第三方面所述的方法的步骤。
第十六方面,提供了一种第二终端,包括处理器及通信接口,其中,所述通信接口用于接收来自于第一终端的第一消息;所述第一消息包括所述第一终端的第一信息和签名,所述第一信息用于确定所述第一终端为第一类型终端;所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;所述处理器用于基于所述第一消息,确定所述第一终端是否具有第一类型终端的权限。
第十七方面,提供了一种通信系统,包括:第一终端、第二终端及网络侧设备,所述第一终端可用于执行如第一方面所述的终端鉴权方法的步骤,所述第二终端可用于执行如第三方面所述的终端鉴权方法的步骤,所述网络侧设备可用于执行如第二方面或第三方面所述的终端鉴权方法的步骤。
第十八方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤,或者实现如第二方面所述的方法的步骤,或者实现如第三方面所述的方法,或者实现如第四方面所述的方法的步骤。
第十九方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法,或者实现如第二方面所述的方法,或者实现如第三方面所述的方法,或者实现如第四方面所述的方法。
第二十方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现如第一方面、第二方面、第三方面或第四方面所述的终端鉴权方法的步骤。
在本申请实施例中,第一终端向目标网络设备发送第一请求消息,第一请求消息用于向目标网络设备请求对第一终端进行第一类型终端的注册,第一类型终端包括锚点终端或定位服务终端,在目标网络设备对第一终端进行鉴权之后,在后续使用该第一终端参与SL过程,可以保证第一终端的可信度,防止非鉴权的终端冒充第一类型终端,提高SL定位的安全性。
附图说明
图1是本申请实施例可应用的无线通信系统的结构图;
图2是本申请实施例提供的终端鉴权方法的系统架构示意图;
图3是本申请实施例提供的终端鉴权方法的协议示意图;
图4是本申请实施例提供的终端鉴权方法的流程示意图之一;
图5是本申请实施例提供的终端鉴权方法的交互流程示意图之一;
图6是本申请实施例提供的终端鉴权方法的交互流程示意图之二;
图7是本申请实施例提供的终端鉴权方法的交互流程示意图之三;
图8是本申请实施例提供的终端鉴权方法的交互流程示意图之四;
图9是本申请实施例提供的终端鉴权方法的交互流程示意图之五;
图10是本申请实施例提供的终端鉴权方法的流程示意图之二;
图11是本申请实施例提供的终端鉴权方法的流程示意图之三;
图12是本申请实施例提供的终端鉴权方法的流程示意图之四;
图13是本申请实施例提供的终端鉴权装置的结构示意图之一;
图14是本申请实施例提供的终端鉴权装置的结构示意图之二;
图15是本申请实施例提供的终端鉴权装置的结构示意图之三;
图16是本申请实施例提供的终端鉴权装置的结构示意图之四;
图17是本申请实施例提供的通信设备的结构示意图;
图18是本申请实施例提供的终端的结构示意图;
图19是本申请实施例的网络侧设备的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,如第6代(6th Generation,6G)通信系统。
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11和网络侧设备12。其中,终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴式设备(Wearable Device)、车载设备(VUE)、行人终端(PUE)、智能家居(具有无线通信功能的家居设备,如冰箱、电视、洗衣机或者家具等)、游戏机、个人计算机(personal computer,PC)、柜员机或者自助机等终端侧设备,可穿戴式设备包括:智能手表、智能手环、智能耳机、智能眼镜、智能首饰(智能手镯、智能手链、智能戒指、智能项链、智能脚镯、智能脚链等)、智能腕带、智能服装等。需要说明的是,在本申请实施例并不限定终端11的具体类型。网络侧设备12可以包括接入网设备或 核心网设备,其中,接入网设备12也可以称为无线接入网设备、无线接入网(Radio Access Network,RAN)、无线接入网功能或无线接入网单元。接入网设备12可以包括基站、WLAN接入点或WiFi节点等,基站可被称为节点B、演进节点B(eNB)、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、家用B节点、家用演进型B节点、发送接收点(Transmitting Receiving Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例进行介绍,并不限定基站的具体类型。核心网设备可以包含但不限于如下至少一项:核心网节点、核心网功能、移动管理实体(Mobility Management Entity,MME)、接入移动管理功能(Access and Mobility Management Function,AMF)、会话管理功能(Session Management Function,SMF)、用户平面功能(User Plane Function,UPF)、策略控制功能(Policy Control Function,PCF)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)、边缘应用服务发现功能(Edge Application Server Discovery Function,EASDF)、统一数据管理(Unified Data Management,UDM),统一数据仓储(Unified Data Repository,UDR)、归属用户服务器(Home Subscriber Server,HSS)、集中式网络配置(Centralized network configuration,CNC)、网络存储功能(Network Repository Function,NRF),网络开放功能(Network Exposure Function,NEF)、本地NEF(Local NEF,或L-NEF)、绑定支持功能(Binding Support Function,BSF)、应用功能(Application Function,AF)等。需要说明的是,在本申请实施例中仅以NR系统中的核心网设备为例进行介绍,并不限定核心网设备的具体类型。
首先,对本申请实施例涉及到的相关内容进行介绍:
长期演进(Long Term Evolution,LTE)系统支持侧链路(Sidelink,SL),侧链路也可以称为副链路、边链路等,用于终端之间不通过网络设备进行直接数据传输。
LTE SL的设计适用于特定的公共安全事务(如火灾场所或地震等灾难场所进行紧急通讯),或车联网(vehicle to everything,V2X)通信等。车联网通信包括各种业务,例如,基本安全类通信,高级(自动)驾驶,编队,传感器扩展等等。由于LTE SL只支持广播通信,因此主要用于基本安全类通信,其他在时延、可靠性等方面具有严格服务质量(Quality of Service,QoS)需求的高级V2X业务将通过新空口(New Radio,NR)SL支持。
5G NR系统也可以支持终端之间直接通信的SL接口,且支持广播(broadcast),组播(groupcast)和单播(unicast)三种传输方式。
目前除了基于Uu口(UE与基站之间的无线接口)的参考信号进行定位外,在V2X等场景也存在基于PC5口(UE与UE之间的无线接口)进行定位的需求,比如当车辆不在移动网络的覆盖范围内时,可能需要进行SL定位。
根据当前的标准讨论,3GPP在R18中需要引入基于PC5口的SL定位,即测量PC5口的SL PRS进行定位。
图2中式出了一种SL定位的架构,上述架构中:
定位服务终端(Location Server UE)是提供定位服务功能的终端,Location Server UE在一次SL定位中可以认为是一个必选的角色。Location Server UE接收携带定位服务质量QoS的SL定位请求或自身触发SL定位需求,然后基于定位QoS确定在SL定位中采用的定位方法,定位配置信息,哪些终端作为锚点终端(anchor UE)参与定位等。在一次SL定位过程中,Location Server UE可以是一个单独的角色(终端),也可以是兼具目标终端(target UE)(此时,Location Server UE定位自己。当然也可以说,target UE兼具Location Server UE的角色)或锚点终端(比如,Location Server UE辅助进行SL PRS的发送或测量)或参考终端的角色。在一次SL定位过程中,一个终端(UE)可以作为Location Server UE,在另一次SL定位过程中,这个终端可以不作为Location Server UE,比如只作为anchor UE。
需要说明的是,定位服务功能包括以下一项或任意项的组合:基于定位QoS确定定位方法,确定定位配置信息,确定参与定位的锚点终端。
需要说明的是,Location Server UE在一次定位过程中起到控制SL定位执行的作用,也可以有其他称呼,比如控制终端(controlling终端),这里不做限定。
target UE是定位的目标终端,定位需要获取该终端的绝对位置、相对位置或范围(ranging)。
锚点终端(anchor UE)是提供定位辅助的终端,比如,发送或测量SL PRS。对于绝对定位,anchor UE是位置已知的终端,或能获知位置的终端。Anchor终端可以有一个或多个,也可以没有单独的anchor UE,比如Location Server UE兼具anchor UE的角色。anchor UE也可以称之为located终端或辅助终端。通常,路侧单元(RoadSide Unit,RSU)可以作为anchor UE。
参考终端(Reference UE)是在相对定位或范围(ranging)定位时的位置参考终端。Reference UE可以是一个单独的终端,也可以是anchor UE中的一个或Location Server UE。
需要说明的是,由于Location Server UE也可以兼具anchor UE的角色,因此在上述架构中,在某些场景下,也可以没有单独的anchor UE和/或单独的参考终端。另外,Location Server UE可以与target终端是同一个终端,也可以是不同的终端。
针对SL定位,可以引入一个新的协议层,该协议层用于Location Server UE与target终端和anchor UE进行定位消息交互。例如图3中的侧链路定位协议(Sidelink Positioning Protocol,SLPP)层是新引入的用于SL定位的协议层,位于分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层的上一层(图3中SL定位协议栈只是一个示例,本申请实施例对此并补限定,比如SLPP也可以位于PC5无线资源控制(Radio Resource Control,RRC)或PC5-S的上一层)。
需要说明的是,也可以不引入新的协议层,而是重用长期演进定位协议(Long term evolution Positioning Protocol,LPP),目前基于Uu接口的定位中定位服务器与终端之间采用LPP协议,为了描述的方便,后续统一使用SLPP协议来进行描述。
在上述定位架构中,首先,Location Server UE接收到携带定位QoS和目标终端ID的定位请求,或Location Server UE自身触发,需要定位target UE或自己(即Location Server UE同时是target UE),然后Location Server UE根据定位QoS等信息识别/确定参与定位的anchor UE以及确定定位方法,紧接着,Location Server UE使用SL定位协议(比如上图中的SLPP协议)执行SL定位得到SL定位结果,具体的,与target UE、anchor UE交互SL定位协议消息,包括,比如,提供定位辅助信息(配置SL定位参考信号(Positioning Reference Signal,PRS)的测量),请求位置信息,接收SL定位测量等。
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的终端鉴权方法进行详细地说明。
图4是本申请实施例提供的终端鉴权方法的流程示意图之一。如图4所示,本实施例提供的方法,包括:
步骤101、第一终端向目标网络设备发送第一请求消息,第一请求消息用于向目标网络设备请求对第一终端进行第一类型终端的注册,第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端。
具体地,该第一请求消息可以是注册请求消息,用于向目标网络设备请求注册第一类型终端,即注册第一终端,目标网络设备需要对该第一终端进行鉴权,确定该第一终端是否具有第一类型终端的权限,即是否可以作为第一类型终端,目标网络设备确定第一终端为第一类型终端后,对该第一终端进行注册,第一类型终端包括锚点终端或定位服务终端,其中,锚点终端可以是位置已知的,且参与发送或测量侧链路定位参考信号的终端,定位服务终端是能够提供侧链路定位服务功能的终端。
本实施例的方法,第一终端向目标网络设备发送第一请求消息,第一请求消息用于向目标网络设备请求对第一终端进行第一类型终端的注册,第一类型终端包括锚点终端或定位服务终端,在目标网络设备对第一终端进行鉴权之后,在后续使用该第一 终端参与SL过程,可以保证第一终端的可信度,防止非鉴权的终端冒充第一类型终端,提高SL定位的安全性。
可选地,该方法还包括:
第一终端接收目标网络设备发送的第一响应消息,第一响应消息为第一请求消息对应的响应消息。
可选地,目标网络设备为接入移动管理功能AMF,第一请求消息为非接入层NAS消息,或,目标网络设备为位置管理功能LMF,第一请求消息为定位业务(LoCation Service,LCS)消息或长期演进定位协议LPP消息。
具体地,AMF可以对第一类型终端进行鉴权,LMF也可以对第一类型终端进行鉴权;
在LMF进行鉴权的情况下,如果第一终端具有第一类型终端的权限,LMF向第一终端发送第一请求消息的响应消息(这里称之为第一响应消息,消息名称不做限定)。该第一响应消息可以是LCS消息,也可以是LPP消息。
在AMF进行鉴权的情况下,如果第一终端具有第一类型终端的权限,AMF向LMF发送第二请求消息,该第二请求消息携带第一终端的信息。LMF可以保存该第一终端的信息,用于后续可能的SL定位。LMF向AMF发送该第二请求消息对应的第二响应消息。
可选地,AMF向第一终端发送第一响应消息。在AMF进行鉴权的情况下,第一请求消息可以是NAS层的注册请求消息,第一响应消息可以是NAS层的注册接受消息(Registration Accept);在LMF进行鉴权的情况下,第一响应消息可以通过NAS信令中的容器携带,例如通过下行NAS传输消息(DL NAS TRANSPORT消息,该DL NAS TRANSPORT消息为NAS消息),该消息中包括一个容器(container),该容器对应上述第一响应消息。
可选地,在所述目标网络设备为LMF的情况下,步骤101可以通过如下方式实现:
第一终端通过AMF向所述目标网络设备发送第一请求消息,第一请求消息通过NAS信令中的容器携带。
可选地,第一终端向AMF发送NAS层上行NAS传输消息,上行NAS传输包括容器,容器对应所述第一请求消息。
具体地,第一终端向AMF发送第一请求消息,由AMF转发给LMF,第一请求消息可以通过NAS信令中的容器携带,例如通过上行NAS传输消息(UL NAS TRANSPORT,该UL NAS TRANSPORT消息为NAS消息)中的容器携带。
可选地,在目标网络设备为AMF的情况下,第一请求消息为NAS层注册请求消息。
可选地,所述第一请求消息包括以下至少一项:
所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
具体地,位置信息,比如可以是经纬度信息;SL标识ID,比如可以是SL层layer2ID,应用层Application Layer UE ID;第一终端的SL定位能力,比如,可以包括,是否支持发送SL-PRS,是否支持测量SL-PRS,支持的SL定位方法等。
例如第一终端为anchor UE,anchor UE的SL PRS传输配置信息(如果是anchor UE可以自己确定SL PRS传输配置);即,anchor UE在传输配置信息指示的资源上发送SL PRS。
示例性地,如图5所示,该图5所示的方案中LMF对第一终端进行鉴权,该方法包括:
步骤1、终端向AMF发送业务请求;
例如终端处于空闲态(CM-IDLE),则终端发起业务请求(service request)进入连接态(CM-CONNECTED)。连接管理CM描述的是终端与5G核心网节点(AMF)的信令连接状态。
步骤2-3、第一终端向LMF发送第一请求消息;
具体地,该第一请求消息用于向LMF进行第一类型终端的注册。
可选地,第一请求消息可以包括第一终端的第一信息,第一终端的第一信息包括如下一项或多项:
第一终端的位置信息、第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
第一终端向LMF发送第一请求消息,具体地,可以包括:
步骤2:第一终端向AMF发送NAS消息(如UL NAS TRANSPORT消息),该消息中包括一个容器(container),该容器对应第一请求消息;
步骤3:AMF将上述NAS消息中的第一请求消息递交给LMF,可选地,除了第一请求消息,AMF还可以将该终端的ID递交给LMF。该终端的ID可以是永久设备标识符(Permanent Equipment Identifier,PEI),或用户永久标识符(Subscription Permanent Identifier,SUPI)。需要说明的是,这里的终端ID是由AMF确定的,而不是由终端确定并包含在第一注册请求消息的,这样保证了终端ID的可信性。
步骤4、LMF对第一终端进行鉴权,并保存第一终端的第一信息;
具体地,LMF对第一终端进行鉴权,比如LMF预配置了哪些终端的ID可以作为第一类型终端,如果接收到的终端的ID在这个预配置的列表中,则鉴权成功;或者,是否为第一类型终端或是否有权限作为第一类型终端的信息可以是签约信息的一部 分,存放在统一数据管理(Unified Data Management,UDM)里,LMF从UDM获取该第一终端UE是否有权限作为第一类型终端。
鉴权成功后,LMF保存该第一终端的第一信息,用于后续可能的SL定位。
步骤5-6、LMF向第一终端发送第一请求消息的响应消息;
具体地,LMF向第一终端发送第一请求消息的响应消息,可以包括:
步骤5:LMF向AMF递交第一响应消息;
步骤6:AMF向第一终端发送NAS消息(如DL NAS TRANSPORT消息),该消息中包括一个容器(container),该容器对应上述第一响应消息;
可选地,第一响应消息包括密钥,该密钥可以是非对称密钥的私钥。
在本实施例中,在LMF获取到经过鉴权的第一类型终端后,在后续使用这些第一类型终端参与SL过程,可以防止非鉴权的终端冒充第一类型终端,提高SL定位的安全性。
示例性地,如图6所示,该图6所示的方案中AMF对第一终端进行鉴权,该方法包括:
步骤1、第一终端向AMF发送第一请求消息,该第一请求消息用于向AMF进行第一类型终端的注册,第一请求消息可以是NAS层的注册请求消息;
比如第一终端开机时,需要向网络侧设备进行注册,第一终端向AMF发送NAS消息(例如注册请求(Registration Request)消息)。
可选的,Registration Request消息包括第一终端的第一信息,参见前述实施例。
步骤2、AMF获取签约信息,对第一终端进行鉴权;
是否为第一类型终端或是否有权限作为第一类型终端的信息可以是签约信息的一部分,存放在UDM里。AMF从UDM获取该UE的签约信息对第一终端进行鉴权。据此获知第一终端是否具有第一类型UE的权限。签约信息还可以包括终端的位置信息。
步骤3、如果第一终端具有第一类型终端的权限,AMF向LMF发送第二请求消息,第二请求消息用于请求对所述第一终端进行第一类型终端的注册。
可选地,此时第二请求消息可以包括第一终端的ID和/或第一终端的第一信息。
步骤4、LMF保存该第一终端的第一信息,用于后续可能的SL定位;
步骤5、LMF向AMF递交第二响应消息。
可选的,第二响应消息包括密钥,该密钥可以是非对称密钥的私钥。
步骤6、AMF向第一终端发送第一响应消息,第一响应消息可以是NAS消息-注册接受消息(Registration Accept)。
可选地,Registration Accept消息包括密钥,该密钥可以是非对称密钥的私钥。该密钥可以是LMF发来的密钥,也可以是AMF确定的密钥。
在本实施例中,AMF对第一类型UE进行鉴权,鉴权成功后发送第一终端的相关信息给LMF,在LMF获取到经过鉴权的第一类型终端后,在后续使用这些第一类型终端参与SL过程,可以防止非鉴权的终端冒充第一类型终端,提高SL定位的安全性。
可选地,如图7所示,该方法还包括:
第一终端基于密钥和第一终端的第一信息,生成签名;
第一终端向第二终端发送第一消息,第一消息包括第一信息和签名,第一信息用于确定第一终端为第一类型终端。
具体地,第一类型终端被预配置不对称密钥的私钥,或从网络侧设备处获取到不对称密钥的私钥(参见图5和图6所示的实施例)。第一终端采用该私钥对第一信息生成签名,第一信息例如包括:否是第一类型终端、第一类型终端的配置信息(比如SL PRS传输配置)等。第一终端将第一信息和签名进行发送,接收第一信息的第二终端基于公钥对签名进行验证,从而确定第一终端是否是第一类型终端。例如第二终端对接收到的第一信息基于公钥生成新的签名,将接收到的签名和新的签名进行匹配,若匹配成功,则说明鉴权成功,该第一终端为第一类型终端。
其中,第二终端可以被预配置不对称密钥的公钥,或者从网络侧设备处获取不对称密钥的公钥。
上述的公钥和私钥是一对配对的密钥。
上述从网络侧设备获取不对称密钥的公钥或私钥,可以是接收AMF或接入网设备发送的公钥或私钥。
其中,第二终端可以是SL定位的目标终端或第三方终端(比如,该终端验证定位服务终端),也可以是SL定位的定位服务终端(比如,该定位服务终端验证anchor UE)。
本实施例中,第一类型终端使用私钥对第一信息生成签名,第一信息包括第一类型终端的信息,第一类型终端的信息可以用于指示该终端是第一类型终端,也就是说,接收到该信息的第二终端在签名认证成功后可以认为该第一终端是第一类型终端,从而提高SL定位的安全性。
可选地,第一终端向第二终端发送第一消息,包括:
第一终端通过第一终端与第二终端之间的侧链路单播连接向第二终端发送第一消息;或,
第一终端广播发送第一消息;或,
在收到第二终端广播的发现恳求消息后,第一终端向第二终端发送第一消息,第一消息为发现响应消息。
具体地,第一终端发送第一信息及对应的签名,如图8所示,可以通过建立好的SL单播连接发送,或,如图9所示也可以通过广播发送,比如,可以通过发现(discovery)过程的模式mode A或mode B发送。
需要说明的是,图7所示的方法,可以结合图4、图5、图6一起实施,也可以作为一个实施例单独实施。
图10是本申请实施例提供的终端鉴权方法的流程示意图之二。如图10所示,本实施例提供的方法,包括:
步骤201、接入移动管理功能AMF接收来自于第一终端的第一请求消息,第一请求消息用于请求对第一终端进行第一类型终端的注册,第一类型终端包括锚点终端或定位服务终端,锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,定位服务终端是提供侧链路定位服务功能的终端;
步骤202、AMF基于第一请求消息确定第一终端是否具有第一类型终端的权限。
可选地,所述AMF基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限,包括:
所述AMF获取所述第一终端的签约信息;
所述AMF基于所述第一终端的签约信息,以及所述第一请求消息包括的所述第一终端的信息,确定所述第一终端是否具有第一类型终端的权限。
可选地,所述第一请求消息包括以下至少一项:
所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
可选地,所述第一请求消息为非接入层NAS层注册请求消息。
可选地,该方法还包括:
所述AMF向所述第一终端发送第一响应消息。
可选地,所述第一响应消息包括密钥。
可选地,所述密钥为非对称密钥的私钥。
可选地,所述密钥用于所述第一终端生成签名。
可选地,所述方法还包括:
若所述AMF确定所述第一终端具有第一类型终端的权限,则向位置管理功能LMF发送第二请求消息,所述第二请求消息用于请求对所述第一终端进行第一类型终端的注册;
所述AMF接收来自于所述LMF的第二响应消息。
该第二请求消息请求的注册,LMF无需执行鉴权,只需保存相关信息即可。
可选地,所述第二请求消息包括以下至少一项:所述第一终端的标识ID、所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
可选地,所述第二响应消息包括密钥。
可选地,所述密钥为非对称密钥的私钥。
可选地,所述密钥用于所述第一终端生成签名。
本实施例的方法,其具体实现过程与技术效果与第一终端侧方法实施例中类似,具体可以参见第一终端侧方法实施例中的详细介绍,此处不再赘述。
图11是本申请实施例提供的终端鉴权方法的流程示意图之三。如图11所示,本实施例提供的方法,包括:
步骤301、LMF接收来自于第一终端的第一请求消息或来自于接入移动管理功能AMF的第二请求消息,第一请求消息或第二请求消息用于请求对第一终端进行第一类型终端的注册,第一类型终端包括锚点终端或定位服务终端,锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,定位服务终端是提供侧链路定位服务功能的终端;
步骤302、在LMF接收来自于第一终端的第一请求消息的情况下,LMF基于第一请求消息确定第一终端是否具有第一类型终端的权限;或
步骤303、在LMF接收来自于AMF的第二请求消息的情况下,LMF将第一终端作为第一类型终端,并保存第一终端的第一信息。
可选地,所述LMF基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限,包括:
所述LMF从所述AMF获取所述第一终端的用户标识;
所述LMF基于所述用户标识获取所述第一终端的签约信息;
所述LMF基于所述第一终端的签约信息,确定所述第一终端是否具有第一类型终端的权限。
可选地,所述LMF基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限,包括:
所述LMF从所述AMF获取所述第一终端的用户标识;
所述LMF基于所述用户标识确定预配置的第一类型终端是否包括所述第一终端;
若所述预配置的第一类型终端包括所述第一终端,则确定所述第一终端具有第一类型终端的权限。
可选地,所述第一请求消息或所述第二请求消息包括以下至少一项:
所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
可选地,所述第一请求消息为定位业务LCS消息或长期演进定位协议LPP消息。
可选地,所述方法还包括:
在所述LMF接收来自于所述第一终端的所述第一请求消息的情况下,所述LMF向所述第一终端发送第一响应消息。
可选地,所述第一响应消息包括密钥。
可选地,所述密钥为非对称密钥的私钥。
可选地,所述密钥用于所述第一终端生成签名。
可选地,所述方法还包括:
在所述LMF接收来自于所述AMF的所述第二请求消息的情况下,所述LMF向所述AMF发送第二响应消息。
可选地,所述第二请求消息包括以下至少一项:所述第一终端的标识ID、所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
可选地,所述第二响应消息包括密钥。
可选地,所述密钥为非对称密钥的私钥。
可选地,所述密钥用于所述第一终端生成签名。
可选地,所述方法还包括:
在确定所述第一终端具有第一类型终端的权限的情况下,所述LMF将所述第一终端作为第一类型终端保存所述第一终端的第一信息。
可选地,所述第一终端的第一信息包括以下至少一项:
所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
可选地,所述LMF接收来自于第一终端的第一请求消息,包括:
所述LMF接收AMF发送的来自于第一终端的第一请求消息;所述第一请求消息通过NAS信令中的容器携带;
所述AMF向所述第一终端发送第一响应消息,包括:
所述LMF通过所述AMF向所述第一终端发送所述第一响应消息;所述第一响应消息通过NAS信令中的容器携带。
本实施例的方法,其具体实现过程与技术效果与第一终端侧方法实施例中类似,具体可以参见第一终端侧方法实施例中的详细介绍,此处不再赘述。
图12是本申请实施例提供的终端鉴权方法的流程示意图之四。如图12所示,本实施例提供的方法,包括:
步骤401、第二终端接收来自于第一终端的第一消息;第一消息包括第一终端的第一信息和签名,第一信息用于确定第一终端为第一类型终端;第一类型终端包括锚点终端或定位服务终端,锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
步骤402、第二终端基于第一消息,确定第一终端是否具有第一类型终端的权限。
可选地,所述签名为所述第一终端基于所述第一终端的第一信息和来自于目标网络设备的密钥生成的。
可选地,所述签名为所述第一终端基于所述第一终端的第一信息和预配置的密钥生成的。
可选地,所述密钥为非对称密钥的私钥。
可选地,所述第二终端基于所述第一消息,确定所述第一终端是否具有第一类型终端的权限,包括:
所述第二终端基于所述非对称密钥的公钥和所述第一信息,对所述签名进行验证,并基于验证结果确定所述第一终端是否具有第一类型终端的权限。
可选地,所述第二终端接收来自于所述第一终端的第一消息,包括:
所述第二终端接收所述第一终端通过所述第一终端与所述第二终端之间的侧链路单播连接发送的所述第一消息;或,
所述第二终端接收所述第一终端广播发送的所述第一消息;或,
在所述第二终端广播发现恳求消息后,所述第二终端接收所述第一终端发送的对应所述发现恳求消息的所述第一消息,所述第一消息为发现响应消息。
可选地,所述第一信息包括以下至少一项:所述第一终端的标识ID、所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
本实施例的方法,其具体实现过程与技术效果与第一终端侧方法实施例中类似,具体可以参见第一终端侧方法实施例中的详细介绍,此处不再赘述。
本申请实施例提供的终端鉴权方法,执行主体可以为终端鉴权装置。本申请实施例中以终端鉴权装置执行终端鉴权方法为例,说明本申请实施例提供的终端鉴权装置。
图13是本申请提供的终端鉴权装置的结构示意图之一。如图13所示,本实施例提供的终端鉴权装置,包括:
发送模块110,用于向目标网络设备发送第一请求消息,所述第一请求消息用于向所述目标网络设备请求对第一终端进行第一类型终端的注册,所述第一类型终端包括 锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端。
可选地,所述装置还包括:
接收模块,用于接收所述目标网络设备发送的第一响应消息,所述第一响应消息为所述第一请求消息对应的响应消息。
可选地,所述目标网络设备为接入移动管理功能AMF,所述第一请求消息为非接入层NAS消息,或,所述目标网络设备为位置管理功能LMF,所述第一请求消息为定位业务LCS消息或长期演进定位协议LPP消息。
可选地,在所述目标网络设备为LMF的情况下,所述发送模块110具体用于:
通过AMF向所述目标网络设备发送所述第一请求消息,所述第一请求消息通过NAS信令中的容器携带。
可选地,所述发送模块110具体用于:
向所述AMF发送NAS层上行NAS传输消息,所述上行NAS传输包括所述容器,所述容器对应所述第一请求消息。
可选地,在所述目标网络设备为AMF的情况下,所述第一请求消息为NAS层注册请求消息。
可选地,所述第一请求消息包括以下至少一项:
所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
可选地,所述第一响应消息包括密钥。
可选地,所述密钥为非对称密钥的私钥。
可选地,所述装置还包括:
处理模块,用于基于所述密钥和所述第一终端的第一信息,生成签名;
所述发送模块110还用于:向第二终端发送第一消息,所述第一消息包括所述第一信息和所述签名,所述第一信息用于确定所述第一终端为第一类型终端。
可选地,所述发送模块110具体用于:
通过所述第一终端与所述第二终端之间的侧链路单播连接向所述第二终端发送所述第一消息;或,
广播发送所述第一消息;或,
在收到所述第二终端广播的发现恳求消息后,向所述第二终端发送所述第一消息,所述第一消息为发现响应消息。
本实施例的装置,可以用于执行前述第一终端侧方法实施例中任一实施例的方法,其具体实现过程与技术效果与第一终端侧方法实施例中类似,具体可以参见第一终端侧方法实施例中的详细介绍,此处不再赘述。
图14是本申请提供的终端鉴权装置的结构示意图之二。如图14所示,本实施例提供的终端鉴权装置,包括:
接收模块210,用于接收来自于第一终端的第一请求消息,所述第一请求消息用于请求对所述第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
处理模块220,用于基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限。
可选地,所述处理模块220,具体用于:
获取所述第一终端的签约信息;
基于所述第一终端的签约信息,以及所述第一请求消息包括的所述第一终端的信息,确定所述第一终端是否具有第一类型终端的权限。
可选地,所述第一请求消息包括以下至少一项:
所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
可选地,所述第一请求消息为非接入层NAS层注册请求消息。
可选地,所述装置还包括:
发送模块,用于向所述第一终端发送第一响应消息。
可选地,所述第一响应消息包括密钥。
可选地,所述密钥为非对称密钥的私钥。
可选地,所述密钥用于所述第一终端生成签名。
可选地,所述发送模块,还用于:
若确定所述第一终端具有第一类型终端的权限,则向位置管理功能LMF发送第二请求消息,所述第二请求消息用于请求对所述第一终端进行第一类型终端的注册;
所述接收模块210,还用于接收来自于所述LMF的第二响应消息。
该第二请求消息请求的注册,LMF无需执行鉴权,只需保存相关信息即可。
可选地,所述第二请求消息包括以下至少一项:所述第一终端的标识ID、所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
可选地,所述第二响应消息包括密钥。
可选地,所述密钥为非对称密钥的私钥。
可选地,所述密钥用于所述第一终端生成签名。
本实施例的装置,可以用于执行前述网络侧方法实施例中任一实施例的方法,其具体实现过程与技术效果与网络侧方法实施例中类似,具体可以参见网络侧方法实施例中的详细介绍,此处不再赘述。
图15是本申请提供的终端鉴权装置的结构示意图之三。如图15所示,本实施例提供的终端鉴权装置,包括:
接收模块310,用于接收来自于第一终端的第一请求消息或来自于接入移动管理功能AMF的第二请求消息,所述第一请求消息或所述第二请求消息用于请求对所述第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
处理模块320,用于在接收来自于所述第一终端的所述第一请求消息的情况下,基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限;或
在接收来自于所述AMF的所述第二请求消息的情况下,将所述第一终端作为第一类型终端,并保存所述第一终端的第一信息。
可选地,所述处理模块320,具体用于:
从所述AMF获取所述第一终端的用户标识;
基于所述用户标识获取所述第一终端的签约信息;
基于所述第一终端的签约信息,确定所述第一终端是否具有第一类型终端的权限。
可选地,处理模块320,具体用于:
从所述AMF获取所述第一终端的用户标识;
基于所述用户标识确定预配置的第一类型终端是否包括所述第一终端;
若所述预配置的第一类型终端包括所述第一终端,则确定所述第一终端具有第一类型终端的权限。
可选地,所述第一请求消息或所述第二请求消息包括以下至少一项:
所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
可选地,所述第一请求消息为定位业务LCS消息或长期演进定位协议LPP消息。
可选地,所述装置还包括:
发送模块,用于在接收来自于所述第一终端的所述第一请求消息的情况下,向所述第一终端发送第一响应消息。
可选地,所述第一响应消息包括密钥。
可选地,所述密钥为非对称密钥的私钥。
可选地,所述密钥用于所述第一终端生成签名。
可选地,所述发送模块,还用于:
在接收来自于所述AMF的所述第二请求消息的情况下,向所述AMF发送第二响应消息。
可选地,所述第二请求消息包括以下至少一项:所述第一终端的标识ID、所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
可选地,所述第二响应消息包括密钥。
可选地,所述密钥为非对称密钥的私钥。
可选地,所述密钥用于所述第一终端生成签名。
可选地,所述处理模块320,还用于:
在确定所述第一终端具有第一类型终端的权限的情况下,所述LMF将所述第一终端作为第一类型终端,并保存所述第一终端的第一信息。
可选地,所述第一终端的第一信息包括以下至少一项:
所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
可选地,所述接收模块310,具体用于:
接收AMF发送的来自于第一终端的第一请求消息;所述第一请求消息通过NAS信令中的容器携带;
所述发送模块,具体用于:
通过所述AMF向所述第一终端发送所述第一响应消息;所述第一响应消息通过NAS信令中的容器携带。
本实施例的装置,可以用于执行前述网络侧方法实施例中任一实施例的方法,其具体实现过程与技术效果与网络侧方法实施例中类似,具体可以参见网络侧方法实施例中的详细介绍,此处不再赘述。
图16是本申请提供的终端鉴权装置的结构示意图之四。如图16所示,本实施例提供的终端鉴权装置,包括:
接收模块410,用于接收来自于第一终端的第一消息;所述第一消息包括所述第一终端的第一信息和签名,所述第一信息用于确定所述第一终端为第一类型终端;所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发 送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
处理模块420,用于基于所述第一消息,确定所述第一终端是否具有第一类型终端的权限。
可选地,所述签名为所述第一终端基于所述第一终端的第一信息和来自于目标网络设备的密钥生成的。
可选地,所述签名为所述第一终端基于所述第一终端的第一信息和预配置的密钥生成的。
可选地,所述密钥为非对称密钥的私钥。
可选地,所述处理模块420,具体用于:
基于所述非对称密钥的公钥和所述第一信息,对所述签名进行验证,并基于验证结果确定所述第一终端是否具有第一类型终端的权限。
可选地,所述接收模块410,具体用于:
接收所述第一终端通过所述第一终端与所述第二终端之间的侧链路单播连接发送的所述第一消息;或,
接收所述第一终端广播发送的所述第一消息;或,
在所述第二终端广播发现恳求消息后,接收所述第一终端发送的对应所述发现恳求消息的所述第一消息,所述第一消息为发现响应消息。
可选地,所述第一信息包括以下至少一项:所述第一终端的标识ID、所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
本实施例的装置,可以用于执行前述第二终端侧方法实施例中任一实施例的方法,其具体实现过程与技术效果与第二终端侧方法实施例中类似,具体可以参见第二终端侧方法实施例中的详细介绍,此处不再赘述。
本申请实施例中的终端鉴权装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,终端可以包括但不限于上述所列举的终端11的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。
本申请实施例提供的终端鉴权装置能够实现图4至图12的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
可选地,如图17所示,本申请实施例还提供一种通信设备1700,包括处理器1701和存储器1702,存储器1702上存储有可在所述处理器1701上运行的程序或指令,例如,该通信设备1700为终端时,该程序或指令被处理器1701执行时实现上述 终端鉴权方法实施例的各个步骤,且能达到相同的技术效果。该通信设备1700为网络侧设备时,该程序或指令被处理器1701执行时实现上述终端鉴权方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种第一终端,包括处理器和通信接口,通信接口用于向目标网络设备发送第一请求消息,所述第一请求消息用于向所述目标网络设备请求对第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端。该终端实施例与上述终端侧方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该终端实施例中,且能达到相同的技术效果。具体地,图18为实现本申请实施例的一种终端的硬件结构示意图。
该终端1000包括但不限于:射频单元1001、网络模块1002、音频输出单元1003、输入单元1004、传感器1005、显示单元1006、用户输入单元1007、接口单元1008、存储器1009、以及处理器1010等中的至少部分部件。
本领域技术人员可以理解,终端1000还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器1010逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图18中示出的终端结构并不构成对终端的限定,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
应理解的是,本申请实施例中,输入单元1004可以包括图形处理单元(Graphics Processing Unit,GPU)10041和麦克风10042,图形处理器10041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元1006可包括显示面板10061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板10061。用户输入单元1007包括触控面板10071以及其它输入设备10072中的至少一种。触控面板10071,也称为触摸屏。触控面板10071可包括触摸检测装置和触摸控制器两个部分。其它输入设备10072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
本申请实施例中,射频单元1001将接收来自网络侧设备的下行数据接收后,可以传输给处理器1010进行处理;另外,射频单元1001可以将上行的数据发送给向网络侧设备发送上行数据。通常,射频单元1001包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。
存储器1009可用于存储软件程序或指令以及各种数据。存储器1009可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储程序或指令 区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器1009可以包括易失性存储器或非易失性存储器,或者,存储器1009可以包括易失性和非易失性存储器两者。包括高速随机存取存储器,还可以包括非易失性存储器,其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器1009包括但不限于这些和任意其它适合类型的存储器例如至少一个磁盘存储器件、闪存器件、或其它非易失性固态存储器件。
处理器1010可包括一个或多个处理单元;可选的,处理器1010可集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序或指令等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器1010中。
其中,射频单元1001,用于向目标网络设备发送第一请求消息,所述第一请求消息用于向所述目标网络设备请求对第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端。
可选地,所述射频单元1001还用于:
接收所述目标网络设备发送的第一响应消息,所述第一响应消息为所述第一请求消息对应的响应消息。
可选地,所述目标网络设备为接入移动管理功能AMF,所述第一请求消息为非接入层NAS消息,或,所述目标网络设备为位置管理功能LMF,所述第一请求消息为定位业务LCS消息或长期演进定位协议LPP消息。
可选地,在所述目标网络设备为LMF的情况下,所述射频单元1001具体用于:
通过AMF向所述目标网络设备发送所述第一请求消息,所述第一请求消息通过NAS信令中的容器携带。
可选地,所述射频单元1001具体用于:
向所述AMF发送NAS层上行NAS传输消息,所述上行NAS传输包括所述容器,所述容器对应所述第一请求消息。
可选地,在所述目标网络设备为AMF的情况下,所述第一请求消息为NAS层注册请求消息。
可选地,所述第一请求消息包括以下至少一项:
所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
可选地,所述第一响应消息包括密钥。
可选地,所述密钥为非对称密钥的私钥。
可选地,处理器1010用于基于所述密钥和所述第一终端的第一信息,生成签名;
所述射频单元1001还用于:向第二终端发送第一消息,所述第一消息包括所述第一信息和所述签名,所述第一信息用于确定所述第一终端为第一类型终端。
可选地,所述射频单元1001具体用于:
通过所述第一终端与所述第二终端之间的侧链路单播连接向所述第二终端发送所述第一消息;或,
广播发送所述第一消息;或,
在收到所述第二终端广播的发现恳求消息后,向所述第二终端发送所述第一消息,所述第一消息为发现响应消息。
本申请实施例还提供一种网络侧设备,包括处理器和通信接口,通信接口用于接收来自于第一终端的第一请求消息,所述第一请求消息用于请求对所述第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;处理器用于基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限。该网络侧设备实施例与上述网络侧设备方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该网络侧设备实施例中,且能达到相同的技术效果。
本申请实施例还提供一种网络侧设备,包括处理器和通信接口,通信接口用于接收来自于第一终端的第一请求消息或来自于接入移动管理功能AMF的第二请求消息,所述第一请求消息或所述第二请求消息用于请求对所述第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;处理器用于在接收来自于所述第一终端的所述第一请求消息的情况下,基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限;或在接收来自于所述AMF的所述第二请求消息的情况下,将所述第一终端作为第一类型终端保存所述第一终端的第一信息。该网络侧设备实施例与上述网络侧设备方法实施 例对应,上述方法实施例的各个实施过程和实现方式均可适用于该网络侧设备实施例中,且能达到相同的技术效果。
具体地,本申请实施例还提供了一种网络侧设备。如图19所示,如图19所示,该网络侧设备2000包括:处理器2001、网络接口2002和存储器2003。其中,网络接口2002例如为通用公共无线接口(common public radio interface,CPRI)。
具体地,本申请实施例的网络侧设备2000还包括:存储在存储器2003上并可在处理器2001上运行的指令或程序,处理器2001调用存储器2003中的指令或程序执行图14或图15所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述终端鉴权方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述终端鉴权方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
本申请实施例另提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现上述终端鉴权方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供了一种通信系统,包括:第一终端、第二终端及网络侧设备,所述第一终端可用于执行如上所述的终端鉴权方法的步骤,所述第二终端可用于执行如上所述的终端鉴权方法的步骤,所述网络侧设备可用于执行如上所述的终端鉴权方法的步骤。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序 来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对相关技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (56)

  1. 一种终端鉴权方法,包括:
    第一终端向目标网络设备发送第一请求消息,所述第一请求消息用于向所述目标网络设备请求对第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端。
  2. 根据权利要求1所述的终端鉴权方法,所述方法还包括:
    所述第一终端接收所述目标网络设备发送的第一响应消息,所述第一响应消息为所述第一请求消息对应的响应消息。
  3. 根据权利要求1所述的终端鉴权方法,其中,所述目标网络设备为接入移动管理功能AMF,所述第一请求消息为非接入层NAS消息,或,所述目标网络设备为位置管理功能LMF,所述第一请求消息为定位业务LCS消息或长期演进定位协议LPP消息。
  4. 根据权利要求3所述的终端鉴权方法,其中,在所述目标网络设备为LMF的情况下,所述第一终端向目标网络设备发送第一请求消息,包括:
    所述第一终端通过AMF向所述目标网络设备发送所述第一请求消息,所述第一请求消息通过NAS信令中的容器携带。
  5. 根据权利要求4所述的终端鉴权方法,其中,所述第一终端通过AMF向所述目标网络设备发送所述第一请求消息,所述第一请求消息通过NAS信令中的容器携带,包括:所述第一终端向所述AMF发送NAS层上行NAS传输消息,所述上行NAS传输包括所述容器,所述容器对应所述第一请求消息。
  6. 根据权利要求3所述的终端鉴权方法,其中,
    在所述目标网络设备为AMF的情况下,所述第一请求消息为NAS层注册请求消息。
  7. 根据权利要求1所述的终端鉴权方法,其中,
    所述第一请求消息包括以下至少一项:
    所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
  8. 根据权利要求2所述的终端鉴权方法,其中,所述第一响应消息包括密钥。
  9. 根据权利要求8所述的终端鉴权方法,其中,所述密钥为非对称密钥的私钥。
  10. 根据权利要求9所述的终端鉴权方法,所述方法还包括:
    所述第一终端基于所述密钥和所述第一终端的第一信息,生成签名;
    所述第一终端向第二终端发送第一消息,所述第一消息包括所述第一信息和所述签名,所述第一信息用于确定所述第一终端为第一类型终端。
  11. 根据权利要求10所述的终端鉴权方法,其中,
    所述第一终端向第二终端发送第一消息,包括:
    所述第一终端通过所述第一终端与所述第二终端之间的侧链路单播连接向所述第二终端发送所述第一消息;或,
    所述第一终端广播发送所述第一消息;或,
    在收到所述第二终端广播的发现恳求消息后,所述第一终端向所述第二终端发送所述第一消息,所述第一消息为发现响应消息。
  12. 一种终端鉴权方法,包括:
    接入移动管理功能AMF接收来自于第一终端的第一请求消息,所述第一请求消息用于请求对所述第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
    所述AMF基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限。
  13. 根据权利要求12所述的终端鉴权方法,其中,所述AMF基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限,包括:
    所述AMF获取所述第一终端的签约信息;
    所述AMF基于所述第一终端的签约信息,以及所述第一请求消息包括的所述第一终端的信息,确定所述第一终端是否具有第一类型终端的权限。
  14. 根据权利要求12所述的终端鉴权方法,其中,
    所述第一请求消息包括以下至少一项:
    所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
  15. 根据权利要求12所述的终端鉴权方法,其中,
    所述第一请求消息为非接入层NAS层注册请求消息。
  16. 根据权利要求12所述的终端鉴权方法,所述方法还包括:
    所述AMF向所述第一终端发送第一响应消息。
  17. 根据权利要求16所述的终端鉴权方法,其中,
    所述第一响应消息包括密钥。
  18. 根据权利要求17所述的终端鉴权方法,其中,所述密钥为非对称密钥的私钥。
  19. 根据权利要求18所述的终端鉴权方法,其中,所述密钥用于所述第一终端生成签名。
  20. 根据权利要求12所述的终端鉴权方法,所述方法还包括:
    若所述AMF确定所述第一终端具有第一类型终端的权限,则向位置管理功能LMF发送第二请求消息,所述第二请求消息用于请求对所述第一终端进行第一类型终端的注册;
    所述AMF接收来自于所述LMF的第二响应消息。
  21. 根据权利要求20所述的终端鉴权方法,其中,
    所述第二请求消息包括以下至少一项:所述第一终端的标识ID、所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
  22. 根据权利要求20所述的终端鉴权方法,其中,
    所述第二响应消息包括密钥。
  23. 根据权利要求22所述的终端鉴权方法,其中,所述密钥为非对称密钥的私钥。
  24. 根据权利要求23所述的终端鉴权方法,其中,所述密钥用于所述第一终端生成签名。
  25. 一种终端鉴权方法,包括:
    位置管理功能LMF接收来自于第一终端的第一请求消息或来自于接入移动管理功能AMF的第二请求消息,所述第一请求消息或所述第二请求消息用于请求对所述第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
    在所述LMF接收来自于所述第一终端的所述第一请求消息的情况下,所述LMF基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限;或
    在所述LMF接收来自于所述AMF的所述第二请求消息的情况下,所述LMF将所述第一终端作为第一类型终端,并保存所述第一终端的第一信息。
  26. 根据权利要求25所述的终端鉴权方法,其中,所述LMF基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限,包括:
    所述LMF从所述AMF获取所述第一终端的用户标识;
    所述LMF基于所述用户标识获取所述第一终端的签约信息;
    所述LMF基于所述第一终端的签约信息,确定所述第一终端是否具有第一类型终端的权限。
  27. 根据权利要求25所述的终端鉴权方法,其中,所述LMF基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限,包括:
    所述LMF从所述AMF获取所述第一终端的用户标识;
    所述LMF基于所述用户标识确定预配置的第一类型终端是否包括所述第一终端;
    若所述预配置的第一类型终端包括所述第一终端,则确定所述第一终端具有第一类型终端的权限。
  28. 根据权利要求25-27任一项所述的终端鉴权方法,其中,
    所述第一请求消息或所述第二请求消息包括以下至少一项:
    所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
  29. 根据权利要求25-27任一项所述的终端鉴权方法,其中,
    所述第一请求消息为定位业务LCS消息或长期演进定位协议LPP消息。
  30. 根据权利要求25-27任一项所述的终端鉴权方法,所述方法还包括:
    在所述LMF接收来自于所述第一终端的所述第一请求消息的情况下,所述LMF向所述第一终端发送第一响应消息。
  31. 根据权利要求30所述的终端鉴权方法,其中,
    所述第一响应消息包括密钥。
  32. 根据权利要求31所述的终端鉴权方法,其中,所述密钥为非对称密钥的私钥。
  33. 根据权利要求32所述的终端鉴权方法,其中,所述密钥用于所述第一终端生成签名。
  34. 根据权利要求25所述的终端鉴权方法,所述方法还包括:
    在所述LMF接收来自于所述AMF的所述第二请求消息的情况下,所述LMF向所述AMF发送第二响应消息。
  35. 根据权利要求34所述的终端鉴权方法,其中,
    所述第二请求消息包括以下至少一项:所述第一终端的标识ID、所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
  36. 根据权利要求34所述的终端鉴权方法,其中,
    所述第二响应消息包括密钥。
  37. 根据权利要求36所述的终端鉴权方法,其中,所述密钥为非对称密钥的私钥。
  38. 根据权利要求37所述的终端鉴权方法,其中,所述密钥用于所述第一终端生成签名。
  39. 根据权利要求25-27任一项所述的终端鉴权方法,所述方法还包括:
    在确定所述第一终端具有第一类型终端的权限的情况下,所述LMF将所述第一终端作为第一类型终端,并保存所述第一终端的第一信息。
  40. 根据权利要求25或39所述的终端鉴权方法,其中,所述第一终端的第一信息包括以下至少一项:
    所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
  41. 根据权利要求26或27所述的方法,其中,所述LMF接收来自于第一终端的第一请求消息,包括:
    所述LMF接收AMF发送的来自于第一终端的第一请求消息;所述第一请求消息通过NAS信令中的容器携带;
    所述AMF向所述第一终端发送第一响应消息,包括:
    所述LMF通过所述AMF向所述第一终端发送所述第一响应消息;所述第一响应消息通过NAS信令中的容器携带。
  42. 一种终端鉴权方法,包括:
    第二终端接收来自于第一终端的第一消息;所述第一消息包括所述第一终端的第一信息和签名,所述第一信息用于确定所述第一终端为第一类型终端;所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
    所述第二终端基于所述第一消息,确定所述第一终端是否具有第一类型终端的权限。
  43. 根据权利要求42所述的终端鉴权方法,其中,所述签名为所述第一终端基于所述第一终端的第一信息和来自于目标网络设备的密钥生成的。
  44. 根据权利要求43所述的终端鉴权方法,其中,所述密钥为非对称密钥的私钥。
  45. 根据权利要求44所述的终端鉴权方法,其中,所述第二终端基于所述第一消息,确定所述第一终端是否具有第一类型终端的权限,包括:
    所述第二终端基于所述非对称密钥的公钥和所述第一信息,对所述签名进行验证,并基于验证结果确定所述第一终端是否具有第一类型终端的权限。
  46. 根据权利要求42-45任一项所述的终端鉴权方法,其中,所述第二终端接收来自于所述第一终端的第一消息,包括:
    所述第二终端接收所述第一终端通过所述第一终端与所述第二终端之间的侧链路单播连接发送的所述第一消息;或,
    所述第二终端接收所述第一终端广播发送的所述第一消息;或,
    在所述第二终端广播发现恳求消息后,所述第二终端接收所述第一终端发送的对应所述发现恳求消息的所述第一消息,所述第一消息为发现响应消息。
  47. 根据权利要求42-45任一项所述的终端鉴权方法,其中,
    所述第一信息包括以下至少一项:所述第一终端的标识ID、所述第一终端的位置信息、所述第一终端的侧链路SL标识ID、具有第一类型终端的能力指示、所述第一终端的SL定位能力、SL定位参考信号PRS的传输配置信息。
  48. 一种终端鉴权装置,包括:
    发送模块,用于向目标网络设备发送第一请求消息,所述第一请求消息用于向所述目标网络设备请求第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端。
  49. 一种终端鉴权装置,包括:
    接收模块,用于接收来自于第一终端的第一请求消息,所述第一请求消息用于请求对所述第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
    处理模块,用于基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限。
  50. 一种终端鉴权装置,包括:
    接收模块,用于接收来自于第一终端的第一请求消息或来自于接入移动管理功能AMF的第二请求消息,所述第一请求消息或所述第二请求消息用于请求对所述第一终端进行第一类型终端的注册,所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
    处理模块,用于在接收来自于所述第一终端的所述第一请求消息的情况下,基于所述第一请求消息确定所述第一终端是否具有第一类型终端的权限;或
    在接收来自于所述AMF的所述第二请求消息的情况下,将所述第一终端作为第一类型终端保存所述第一终端的第一信息。
  51. 一种终端鉴权装置,包括:
    接收模块,用于接收来自于第一终端的第一消息;所述第一消息包括所述第一终端的第一信息和签名,所述第一信息用于确定所述第一终端为第一类型终端;所述第一类型终端包括锚点终端或定位服务终端,所述锚点终端是位置已知的,且参与发送或测量侧链路定位参考信号的终端,所述定位服务终端是提供侧链路定位服务功能的终端;
    处理模块,用于基于所述第一消息,确定所述第一终端是否具有第一类型终端的权限。
  52. 一种终端,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至11任一项所述的终端鉴权方法的步骤。
  53. 一种网络侧设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求12至24任一项所述的终端鉴权方法的步骤。
  54. 一种网络侧设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求25至41任一项所述的终端鉴权方法的步骤。
  55. 一种第二终端,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求42至47任一项所述的终端鉴权方法的步骤。
  56. 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1至11任一项所述的终端鉴权方法,或者实现如权利要求12至24任一项所述的终端鉴权方法,或者实现如权利要求25至41任一项所述的终端鉴权方法,或者实现如权利要求42至47任一项所述的终端鉴权方法的步骤。
PCT/CN2023/120290 2022-09-26 2023-09-21 终端鉴权方法、终端及网络侧设备 WO2024067337A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211176984.X 2022-09-26
CN202211176984.XA CN117835239A (zh) 2022-09-26 2022-09-26 终端鉴权方法、终端及网络侧设备

Publications (1)

Publication Number Publication Date
WO2024067337A1 true WO2024067337A1 (zh) 2024-04-04

Family

ID=90476123

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/120290 WO2024067337A1 (zh) 2022-09-26 2023-09-21 终端鉴权方法、终端及网络侧设备

Country Status (2)

Country Link
CN (1) CN117835239A (zh)
WO (1) WO2024067337A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113302960A (zh) * 2019-01-21 2021-08-24 瑞典爱立信有限公司 用于无线通信网络中的认证和密钥管理的方法以及相关装置
CN113302951A (zh) * 2019-01-14 2021-08-24 苹果公司 5g系统中的车联万物pc5能力的管理
CN113383563A (zh) * 2019-01-29 2021-09-10 苹果公司 5gs中具有不同pc5 rat能力的v2x ue
WO2021175951A1 (en) * 2020-03-06 2021-09-10 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Remote ue control information establishment at a core network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113302951A (zh) * 2019-01-14 2021-08-24 苹果公司 5g系统中的车联万物pc5能力的管理
CN113302960A (zh) * 2019-01-21 2021-08-24 瑞典爱立信有限公司 用于无线通信网络中的认证和密钥管理的方法以及相关装置
CN113383563A (zh) * 2019-01-29 2021-09-10 苹果公司 5gs中具有不同pc5 rat能力的v2x ue
WO2021175951A1 (en) * 2020-03-06 2021-09-10 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Remote ue control information establishment at a core network

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
GUILLAUME SEBIRE, MEDIATEK INC.: "General: Clarification on Location Server UE and peer-to-peer operation .", 3GPP DRAFT; S2-2207117; TYPE PCR; FS_RANGING_SL, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. 3GPP SA 2, no. Online; 20220817 - 20220826, 30 August 2022 (2022-08-30), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052206806 *
XIAOMI: "Report of [AT119bis-e][423][POS] LS to SA2 on SL positioning terminology (Xiaomi)", 3GPP DRAFT; R2-2210909, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Online; 20221010 - 20221019, 21 October 2022 (2022-10-21), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052264197 *
YANG SHEN, XIAOMI: "Updates to terminologies.", 3GPP DRAFT; S2-2207118; TYPE PCR; FS_RANGING_SL, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. 3GPP SA 2, no. Online; 20220817 - 20220826, 30 August 2022 (2022-08-30), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052206807 *

Also Published As

Publication number Publication date
CN117835239A (zh) 2024-04-05

Similar Documents

Publication Publication Date Title
US11895495B2 (en) Enhanced security for access stratum transmission
WO2020067112A1 (ja) コアネットワーク装置、通信端末、通信システム、認証方法、及び通信方法
US20230096402A1 (en) Service obtaining method and apparatus, and communication device and readable storage medium
US20220225095A1 (en) External Authentication Method, Communication Apparatus, and Communication System
WO2018076553A1 (zh) 一种接入网络的方法及设备
WO2023071836A1 (zh) 一种通信方法及装置
WO2024067337A1 (zh) 终端鉴权方法、终端及网络侧设备
US11838825B2 (en) Method and system for delivering dedicated services restricted to a predefined service area
WO2023005898A1 (zh) 多终端联合会话管理方法、网络侧设备及终端
WO2024027546A1 (zh) 定位方法、装置及设备
WO2022257876A1 (zh) 密钥材料的处理方法、获取方法、信息传输方法及设备
WO2023212934A1 (zh) 一种中继通信方法、接入方法、装置及设备
WO2022257878A1 (zh) 密钥材料的发送方法、获取方法、信息传输方法及设备
WO2022268067A1 (zh) 定位方法、装置及相关设备
WO2024051630A1 (zh) 定位方法、装置、终端及网络侧设备
EP4380259A1 (en) Sensing device registration method and apparatus, and device
WO2024031549A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024031523A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023143411A1 (zh) 设备鉴权方法、装置及通信设备
WO2023185728A1 (zh) 业务处理方法、装置、终端、网络侧设备及可读存储介质
WO2024078589A1 (zh) 信息上报方法、装置、通信设备及存储介质
WO2024022163A1 (zh) 定位方法、终端及网络设备
WO2023241503A1 (zh) 隐私保护方法、装置、终端、节点及存储介质
WO2023143418A1 (zh) 设备鉴权方法、装置、终端及网络功能
WO2023131255A1 (zh) 重定向的方法、终端及网络侧设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23870569

Country of ref document: EP

Kind code of ref document: A1