WO2024083044A1 - Interception method and apparatus, and related device - Google Patents

Interception method and apparatus, and related device Download PDF

Info

Publication number
WO2024083044A1
WO2024083044A1 PCT/CN2023/124492 CN2023124492W WO2024083044A1 WO 2024083044 A1 WO2024083044 A1 WO 2024083044A1 CN 2023124492 W CN2023124492 W CN 2023124492W WO 2024083044 A1 WO2024083044 A1 WO 2024083044A1
Authority
WO
WIPO (PCT)
Prior art keywords
perception
terminal
node
message
data
Prior art date
Application number
PCT/CN2023/124492
Other languages
French (fr)
Chinese (zh)
Inventor
袁雁南
杨晓东
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2024083044A1 publication Critical patent/WO2024083044A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements

Definitions

  • the present application belongs to the field of communication technology, and specifically relates to a monitoring method, device and related equipment.
  • B5G Beyond5th-Generation
  • 6G 6th Generation
  • lawful interception is mainly aimed at the existing service scope of communication service providers (such as voice, data packets, messages and target positioning), and is mainly based on network layer interception or service layer interception on the network side.
  • the perception measurement and/or perception result calculation are completed on the UE side in the modes of self-transmission and self-reception of user equipment (UE), transmission and reception of perception between UEs, and transmission and reception of base stations by UEs, it is inconvenient to lawfully intercept the perception data of UEs because the data such as perception measurement and perception results may not be carried through the network, or may be carried in the mobile communication network as service layer data (which may be encrypted at the service layer).
  • service layer data which may be encrypted at the service layer
  • the embodiments of the present application provide a monitoring method, an apparatus and related equipment, which can solve the problem in the related art that it is inconvenient to legally monitor the perception data of the terminal.
  • a monitoring method which is applied to a first node, and the method includes:
  • the first node receives a first message, where the first message is used to indicate perception data of the intercepting terminal;
  • the first node acquires the perception data of the terminal according to the first message
  • the first node sends the perception data of the terminal to the second node.
  • a monitoring device which is applied to a first node and includes:
  • a first receiving module configured to receive a first message from a second node, wherein the first message is used to indicate perception data of a listening terminal;
  • An acquisition module configured to acquire the perception data of the terminal according to the first message
  • the first sending module is used to send the perception data of the terminal to the second node.
  • a monitoring method which is applied to a terminal, and the method includes:
  • the terminal receives a target message from the first node, where the target message includes a second message or a third message, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, where the first configuration information is configuration information used by the terminal for perception;
  • the terminal sends target information to the first node, where the target information includes the perception data or the first configuration information.
  • a monitoring device which is applied to a terminal, and the device includes:
  • a second receiving module is used to receive a target message from the first node, where the target message includes a second message or a third message, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, where the first configuration information is configuration information used by the terminal for perception;
  • the second sending module is used to send target information to the first node, where the target information includes the perception data or the first configuration information.
  • a monitoring method which is applied to a second node, and the method includes:
  • the second node sends a first message to the first node, where the first message is used to indicate the perception data of the intercepting terminal;
  • the second node receives the perception data of the terminal from the first node.
  • a monitoring device which is applied to a second node, and includes:
  • a third sending module configured to send a first message to the first node, where the first message is used to indicate the perception data of the listening terminal;
  • the third receiving module is used to receive the perception data of the terminal from the first node.
  • a first node which terminal includes a processor and a memory, wherein the memory stores a program or instruction that can be executed on the processor, and when the program or instruction is executed by the processor, the steps of the method described in the first aspect are implemented.
  • a first node comprising a processor and a communication interface, wherein the communication interface is used to receive a first message from a second node, the first message being used to indicate perception data of a listening terminal; the processor is used to obtain the perception data of the terminal according to the first message; and the communication interface is also used to send the perception data of the terminal to the second node.
  • a terminal comprising a processor and a memory, wherein the memory stores a program or instruction that can be run on the processor, and when the program or instruction is executed by the processor, the steps of the method described in the third aspect are implemented.
  • a terminal comprising a processor and a communication interface, wherein the communication interface is used to receive a target message from a first node, the target message comprising a second message or a third message, the second message is used to instruct the terminal to record perception data, the perception data is perception data generated by the terminal, and the third message is used to instruct
  • the terminal reports first configuration information, where the first configuration information is configuration information used by the terminal for perception; and sends target information to the first node, where the target information includes the perception data or the first configuration information.
  • a second node which includes a processor and a memory, wherein the memory stores a program or instruction that can be executed on the processor, and when the program or instruction is executed by the processor, the steps of the method described in the fifth aspect are implemented.
  • a second node comprising a processor and a communication interface, wherein the communication interface is used to send a first message to the first node, wherein the first message is used to indicate perception data of a listening terminal; and receive perception data of the terminal from the first node.
  • a lawful interception system comprising: a first node, a terminal and a second node, wherein the first node can be used to execute the steps of the interception method as described in the first aspect, the terminal can be used to execute the steps of the interception method as described in the third aspect, and the second node can be used to execute the steps of the interception method as described in the fifth aspect.
  • a readable storage medium on which a program or instruction is stored.
  • the program or instruction is executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method described in the third aspect are implemented, or the steps of the method described in the fifth aspect are implemented.
  • a chip comprising a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run a program or instructions to implement the steps of the method described in the first aspect, or to implement the steps of the method described in the third aspect, or to implement the steps of the method described in the fifth aspect.
  • a computer program/program product is provided, wherein the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the steps of the method described in the first aspect, or the steps of the method described in the third aspect, or the steps of the method described in the fifth aspect.
  • a first message is received by a first node, and the first message is used to indicate the perception data of the listening terminal; the first node obtains the perception data of the terminal according to the first message; the first node sends the perception data of the terminal to the second node, that is, the perception data of the terminal to be listened to is obtained through the first node and sent to the second node, so that the second node can more easily listen to the perception data of the terminal, thereby improving the convenience of the second node listening to the perception data of the terminal.
  • FIG1 is a block diagram of a wireless communication system to which an embodiment of the present application can be applied;
  • FIG2 is a schematic diagram of six sensing methods provided in an embodiment of the present application.
  • FIG3 is a schematic diagram of a lawful interception architecture provided in an embodiment of the present application.
  • FIG4 is a flow chart of a monitoring method provided in an embodiment of the present application.
  • FIG5 is a flow chart of another monitoring method provided in an embodiment of the present application.
  • FIG6 is a flow chart of another monitoring method provided in an embodiment of the present application.
  • FIG7 is a structural diagram of a listening device provided in an embodiment of the present application.
  • FIG8 is a structural diagram of another listening device provided in an embodiment of the present application.
  • FIG9 is a structural diagram of another listening device provided in an embodiment of the present application.
  • FIG10 is a structural diagram of a communication device provided in an embodiment of the present application.
  • FIG11 is a structural diagram of a first node provided in an embodiment of the present application.
  • FIG12 is a structural diagram of a terminal provided in an embodiment of the present application.
  • FIG. 13 is a structural diagram of a second node provided in an embodiment of the present application.
  • first, second, etc. in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It should be understood that the terms used in this way are interchangeable under appropriate circumstances, so that the embodiments of the present application can be implemented in an order other than those illustrated or described here, and the objects distinguished by “first” and “second” are generally of the same type, and the number of objects is not limited.
  • the first object can be one or more.
  • “and/or” in the specification and claims represents at least one of the connected objects, and the character “/" generally represents that the objects associated with each other are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • NR new radio
  • FIG1 shows a block diagram of a wireless communication system applicable to an embodiment of the present application.
  • the wireless communication system includes a terminal 11, a first node 12, and a second node 13.
  • the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a handheld computer, a netbook, an ultra-mobile personal computer (ultra-mobile personal computer, UMPC), a mobile Internet device (Mobile Internet Device, MID), an augmented reality (augmented reality, AR)/virtual reality (virtual reality, VR) device, a robot, a wearable device (Wearable Device), a vehicle user equipment (VUE), a pedestrian terminal (Pedestrian User Equipment, PUE), a smart home (home equipment with wireless communication function, such as a refrigerator, a television, a washing machine or furniture, etc.), a game console, a personal computer (personal
  • the terminal side devices include:
  • the first node 12 may include a network side device, and the network side device may include an access network device or a core network device or a service function of a communication service provider, etc., wherein the access network device may also be referred to as a wireless access network device, a wireless access network (Radio Access Network, RAN), a wireless access network function or a wireless access network unit.
  • the access network device may include a base station, a wireless local area network (Wireless Local Area Networks, WLAN) access point or a WiFi node, etc.
  • WLAN wireless Local Area Networks
  • the base station may be referred to as a node B, an evolved node B (eNB), an access point, a base transceiver station (Base Transceiver Station, BTS), a radio base station, a radio transceiver, a basic service set (Basic Service Set, BSS), an extended service set (Extended Service Set, ESS), a home B node, a home evolved B node, a transmission reception point (Transmission Reception Point, TRP) or other appropriate terms in the field, as long as the same technical effect is achieved, the base station is not limited to a specific technical vocabulary, and it should be noted that in the embodiment of the present application, only the base station in the NR system is used as an example for introduction, and the specific type of the base station is not limited.
  • the core network equipment may include but is not limited to at least one of the following: core network nodes, core network functions, mobility management entity (Mobility Management Entity, MME), access mobility management function (Access and Mobility Management Function, AMF), session management function (Session Management Function, SMF), user plane function (User Plane Function, UPF), policy control function (Policy Control Function, PCF), policy and charging rules function unit (Policy and Charging Rules Function, PCRF), edge application service discovery function (Edge Application Server Discovery ...
  • MME mobility management entity
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • SMF Session Management Function
  • UPF User Plane Function
  • Policy Control Function Policy Control Function
  • PCRF Policy and Charging Rules Function
  • edge application service discovery function Edge Application Server Discovery ...
  • UPF User Plane Function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF User Plane Function
  • UPF user plane function (User Plane Function, UPF)
  • user plane function User Plane Function
  • UPF user plane function (User Plane Function, UPF)
  • user ion, EASDF Unified Data Management
  • UDM Unified Data Repository
  • HSS Centralized network configuration
  • CNC Centralized network configuration
  • NEF Network Exposure Function
  • NEF Network Exposure Function
  • BEF Binding Support Function
  • AF Application Function
  • the service functions of the above-mentioned communication service provider may include but are not limited to IP Multimedia Subsystem (IMS), location service functions, etc.
  • the above-mentioned second node 13 may include but is not limited to a lawful interception node (for example, a law enforcement agency (Law Enforcement Agency, LEA), a law enforcement monitoring facility (Law Enforcement Monitoring Facility, LEMF), etc.) or a network function in the core network network function responsible for receiving messages from the lawful interception node, for example, AMF, IMS, etc. including a lawful interception point.
  • a lawful interception node for example, a law enforcement agency (Law Enforcement Agency, LEA), a law enforcement monitoring facility (Law Enforcement Monitoring Facility, LEMF), etc.
  • a network function in the core network network function responsible for receiving messages from the lawful interception node for example, AMF, IMS, etc. including a lawful interception point.
  • Communication and perception integration means realizing the integrated design of communication and perception functions through spectrum sharing and hardware sharing in the same system. While transmitting information, the system can sense information such as direction, distance, speed, etc. Events are detected, tracked, and identified. The communication system and the perception system complement each other to achieve overall performance improvements and bring a better service experience.
  • Perception capability refers to the ability of one or more devices with perception capabilities to perceive the direction, distance, speed and other information of target objects through the transmission and reception of wireless signals, or to detect, track, identify and image target objects, events or environments.
  • B5G Beyond 5G
  • 6G 6th Generation
  • Perception capability refers to the ability of one or more devices with perception capabilities to perceive the direction, distance, speed and other information of target objects through the transmission and reception of wireless signals, or to detect, track, identify and image target objects, events or environments.
  • the perception resolution will be significantly improved compared to centimeter waves, enabling 6G networks to provide more sophisticated perception services.
  • Typical perception functions and application scenarios are shown in Table 1.
  • perception of intelligent transportation, high-precision maps, etc. is usually expressed in terms of perception range, distance resolution, angle resolution, speed resolution, and latency
  • flight intrusion detection perception is usually expressed in terms of coverage height, perception accuracy, and perception latency
  • respiratory monitoring is expressed in terms of perception distance, perception real-time, perception resolution, and perception accuracy
  • indoor intrusion detection is expressed in terms of perception distance, perception real-time, detection probability, and false alarm probability
  • gesture/posture recognition is expressed in terms of perception distance, perception real-time, and perception accuracy.
  • the service request methods of the above-mentioned perception services are different. For example, in a service request based on a static area, a certain coordinate system is used to represent the geographical location area of the content to be perceived; in a service request based on a dynamic area, M meters around a certain UE is used to represent the geographical location range of the content to be perceived, where M is a positive number; in a continuous perception service request for a dynamic target, a target that has been detected and continuously tracked is used to represent the perception target of the content to be perceived.
  • the perception signal receiving node measures the received perception signal and reports the measurement result to the target node.
  • the target node is responsible for calculating the perception signal based on the perception measurement result.
  • the target node may be a sensing function.
  • lawful interception is mainly aimed at the existing service scope of communication service providers (such as voice, data packets, messages and target positioning), and adopts network layer based interception (network layer based interception) and service layer based interception (service layer based interception) to obtain the required intercepted user equipment (User Equipment, UE) data.
  • Network layer based interception is to obtain the required intercepted data from the interception point of the core network function (for example, AMF, SMF/UPF, etc.), and service layer based interception is to obtain the required intercepted data from the interception point of the service function (for example, IMS, location service, etc.) of the communication service provider.
  • the lawful interception architecture and functions in the related technology can be shown in Figure 3, which is used by the Communication Service Provider to meet the needs of lawful interception. It mainly includes detecting the target communication, obtaining intercept related information (IRI) or communication content (CC) from the target communication, and sending the intercept related information or communication content to the lawful interception node.
  • the interception point (POI) can be located at the required network function and service function, such as AMF, SMF/UPF, UDM, NRF, NEF, Short Message Service Function (SMSF), IMS, etc.
  • the lawful interception node sends a search warrant and the following information to the communication service provider (CSP), for example, the communication service provider's administration function (ADMF), which may include the lawful interception provisioning function (LIPF) and the lawful interception control function (LICF).
  • CSP communication service provider
  • ADMF administration function
  • LIPF lawful interception provisioning function
  • HIF lawful interception control function
  • the communication service provider provides the lawful interception data through the corresponding network function (i.e., POI) and passes it to the LEMF via the mediation and delivery function (MDF).
  • MDF mediation and delivery function
  • Target identifier used to identify the communications to be intercepted
  • Type of intercept used to indicate whether only IRI, only CC, or both IRI and CC are transmitted to the Law Enforcement Monitoring Facility (LEMF);
  • LEMF Law Enforcement Monitoring Facility
  • Service scoping used to identify the service to be intercepted (e.g., voice, packet, messaging, target location);
  • Filtering criteria used to provide additional information for interception, such as bandwidth optimization, etc.
  • LIID Used to associate issued search warrants (Warrant) and interception data (Interception Product).
  • the target identifier may include a Subscription Permanent Identifier (SUPI), a Permanent Equipment Identifier (PEI), or a Generic Public User Identifier (GPUI). Subscription Identifier, GPSI) etc.
  • SUPI Subscription Permanent Identifier
  • PEI Permanent Equipment Identifier
  • GPUI Generic Public User Identifier
  • the above-mentioned PEI is used for the 3rd Generation Partnership Project (3GPP) UE to enter the 5G system.
  • 3GPP 3rd Generation Partnership Project
  • the UE supports at least one 3GPP access technology (i.e., Next Generation Radio Access Network (NG-RAN)/5G, Evolved Universal Terrestrial Radio Access Network (E-UTRAN)/4G, UTRAN/3G, GSM/EDGE Radio Access Network (GSM EDGE Radio Access Network, GERAN)/EDGE/2.5G)
  • the UE must be assigned PEI in the format of International Mobile Equipment Identity (IMEI) or International Mobile Equipment Identity Software Version (MEISV).
  • IMEI International Mobile Equipment Identity
  • MEISV International Mobile Equipment Identity Software Version
  • the above GPSI can be used to handle 3GPP users in different data networks (DN) outside the 3GPP system.
  • the 3GPP system stores the association between the GPSI and the corresponding SUPI in the user data.
  • the GPSI can be a Mobile Station International Subscriber Directory Number (MSISDN), an external IP address, etc.
  • the current positioning services of mobile communication networks include three situations: 1) UE positioning itself, 2) external server/client application functions positioning UE, and 3) network elements positioning UE.
  • the UE location information is obtained based on uplink or downlink measurements through the interaction between the Location Management Function (LMF) and the base station and/or UE. Based on the above information, it can be found that the positioning service in the relevant technology is closely related to the target positioning UE, and the target UE positioning requires the target UE to cooperate in sending signals or measurements.
  • LMF Location Management Function
  • positioning-related interception For positioning-related interception, on the one hand, it is based on network layer interception, obtaining positioning messages related to a target UE (target UE) exchanged between UE and LMF, and between gNB and LMF from AMF, and on the other hand, it is based on service layer interception, including UE providing location report (mobile network cell ID, geographic coordinates, etc.) when performing a certain network service (for example, Voice over New Radio (VoNR)), and the lawful interception function calling LMF to obtain the target UE location information (the core is to override UE privacy).
  • VoIPNR Voice over New Radio
  • positioning interception may include positioning measurement data for the positioning target UE, UE location information data that can be provided by the network as tag data/auxiliary data for other interception data, and the lawful interception node calling the positioning service to obtain location data without UE authorization.
  • QoS Perceived Quality of Service
  • the above-mentioned perceived QoS includes at least one perceived performance indicator and corresponding information (such as numerical requirements, etc.) as shown in Table 2.
  • An optional classification method is to classify the perception measurement quantity into the following 4 categories (this description focuses on describing the measurement quantity, which can also be divided into 3 categories or unclassified, etc., and the 4 categories are only for illustration).
  • the following third-level measurement quantity and fourth-level measurement quantity may also be generally referred to as perception results
  • the following second-level measurement quantity and/or first-level measurement quantity may also be referred to as perception measurement data.
  • the first level of measurement quantity that is, the received signal/original channel information, including: the complex result of the received signal/channel response, amplitude/phase, I-channel/Q-channel and its operation results (operations include addition, subtraction, multiplication and division, matrix addition, subtraction, multiplication, matrix transposition, trigonometric relationship operations, square root operations and power operations, as well as the threshold detection results of the above operation results, maximum/minimum value extraction results, etc.; operations also include Fast Fourier Transform (FFT)/Inverse Fast Fourier Transform (IFFT), Discrete Fourier Transform (Discrete Fourier Transform, FFT), and Inverse Fast Fourier Transform (IFFT).
  • FFT Fast Fourier Transform
  • IFFT Discrete Fourier Transform
  • IFFT Inverse Fast Fourier Transform
  • DFT Fourier transform
  • IDFT inverse discrete Fourier transform
  • 2D-FFT two-dimensional Fourier transform
  • 3D-FFT three-dimensional Fourier transform
  • Second-level measurement quantity basic measurement quantity, including delay, Doppler, angle, signal strength, and their multi-dimensional combination representation
  • Level 3 measurement basic attributes/states, including distance, speed, angle/direction, radar cross-section (RCS), acceleration, etc.
  • the fourth level of measurement that is, advanced attributes/states, including: spatial position, target presence, trajectory, movement, expression, vital signs, quantity, imaging results, weather, air quality, shape, material, composition, etc.
  • the above-mentioned perception function node may include at least one of the following functions:
  • a perceptual measurement result i.e., a value of a perceptual measurement quantity
  • the perceptual measurement quantity is a first-level measurement quantity and/or a second-level measurement quantity.
  • the first-level measurement quantity generates a perception result (third-level measurement quantity) and responds to the perception service request.
  • this function is referred to as a basic perception function node;
  • this function is referred to as a derived sensing function node;
  • a sensing measurement result i.e., a value of a sensing measurement quantity
  • the sensing measurement quantity is a first-level measurement quantity and/or a second-level measurement quantity and/or a third-level measurement quantity
  • this function is referred to as a comprehensive sensing function node;
  • QoS perceived quality of service
  • the sensing signal sending or receiving node in the mobile communication system includes network equipment (such as base stations) and user equipment UE (such as mobile phones).
  • the sensing auxiliary node refers to the information used to provide sensing assistance, such as sensing information of other sensors, geographic location information, etc., which is used to improve the performance of wireless sensing;
  • the sensing link may include a Uu link (base station sending/UE receiving or base station receiving/UE sending), a sidelink (transmitting and receiving between UEs), an echo link (base station sending and receiving autonomously, UE sending and receiving autonomously), and a base station sending and receiving link (transmitting and receiving between base stations);
  • the sensing mode may include base station sending and UE receiving, UE sending and base station receiving, base station sending and receiving autonomously, transmitting and receiving between UEs, transmitting and receiving between base stations, and UE sending and receiving autonomously;
  • perception signal Determine a perception signal, where potential perception signals include reference signals and data signals, where the reference signal may be a communication reference signal or a perception-specific reference signal;
  • Potential perception resources include time-frequency resources not used in communication (such as guard bands), time-frequency resources used in shared communication (such as reference signals or data signals), and time-frequency resources dedicated to perception. Further, it is necessary to determine the configuration of the perception signal. Potential configurations include time, frequency, and spatial resource information of the perception signal. If it is determined that the node that perceives the time-frequency resource is not the sending node of the perception signal, then send the perception signal configuration to the node that sends the perception signal;
  • the potential configuration includes an indication of the perception signal to be measured, the number or time of the perception signal to be measured, an indication of reporting the measurement result, etc. If it is determined that the node for configuring the perception measurement quantity is not a receiving and measuring node of the perception signal, then send the perception measurement quantity configuration to the perception signal receiving node;
  • the perception function node After the network-side device determines the perception function node according to the geographical scope of the requested perception service and the geographical scope of the perception service provided by the perception function node, the perception function node needs to determine AMF in at least one of the following cases: 1) When the UE is a perception signal sending node, a perception signal receiving node or a perception auxiliary node, and the perception target is a certain UE, the perception function node selects AMF based on the required geographical area to be perceived, and the Tracking Area Identity (TAI) of the AMF requested from the NRF, and/or the AMF ID/location, etc.; 2) When the perception data needs to be transmitted via the AMF (for example, defined as a NAS message or the NAS layer as the transmission bearer protocol layer of the perception data), the perception function node selects AMF based on the geographical location information of the perception node for the required transmission data (such as TA, etc.), and the TAI of the AMF requested from the NRF, and/or the AMF ID
  • FIG. 4 is a flowchart of a monitoring method provided in an embodiment of the present application.
  • the method can be executed by a first node, as shown in FIG. 4 , and includes the following steps:
  • Step 401 A first node receives a first message, where the first message is used to indicate perception data of a monitoring terminal.
  • the above-mentioned first node may include but is not limited to a base station, SF, AMF, UDM, NRF, NEF, UPF, SMSF or IMS, etc.
  • the first node may receive the first message from a legal interception node (e.g., LEA, LEMF, etc.) or a network function (e.g., AMF, IMS, etc.) in a core network network function that is responsible for receiving legal interception node messages.
  • a legal interception node e.g., LEA, LEMF, etc.
  • a network function e.g., AMF, IMS, etc.
  • the above-mentioned first message is used to indicate the perception data of the listening terminal, wherein the above-mentioned terminal may be a terminal responsible for generating at least one of the perception measurement data and the perception result.
  • the terminal may directly use at least one of the perception measurement data and the perception result on the terminal side (that is, there is no need to send the perception measurement data or result on the terminal side to a node outside the terminal), or provide it to the application function through a transmission network, wherein the above-mentioned transmission network may be a 3GPP network or a non-3GPP network, such as a wired network, a WIFI network or a local area network.
  • the perception data of the above-mentioned terminal may include but is not limited to at least one of perception measurement data and perception results, wherein the above-mentioned perception measurement data may include at least one of the above-mentioned first-level measurement quantities and second-level measurement quantities, and the above-mentioned perception result may include at least one of the above-mentioned third-level measurement quantities and fourth-level measurement quantities, which are not repeated here.
  • Step 402 The first node obtains perception data of the terminal according to the first message.
  • the first node may receive perception data of the terminal from the terminal, or may generate perception data of the terminal based on configuration information and perception signals used by the terminal for perception, etc.
  • the perception data of the above-mentioned terminal can be understood as perception data related to the perception performed by the above-mentioned terminal.
  • the perception data of the above-mentioned terminal may include the perception data generated by the above-mentioned terminal when performing perception, or may include perception data generated by devices other than the above-mentioned terminal based on the configuration information used by the above-mentioned terminal when performing perception and the perception signal.
  • terminal A is the listening target, and the perception data of terminal A includes the perception data generated by terminal A (such as perception measurement data or perception results), or includes the perception data generated by the base station based on the configuration information used by terminal A when performing perception and the perception signal.
  • Step 403 The first node sends the perception data of the terminal to the second node.
  • the second node may include but is not limited to a lawful interception node (e.g., LEA, LEMF, etc.) or a network function in the core network network function responsible for receiving messages from the lawful interception node, such as AMF, IMS, etc.
  • a lawful interception node e.g., LEA, LEMF, etc.
  • the first node and the second node are different.
  • the second node may be a node different from AMF such as LEA or LEMF
  • the first node may be a base station, SF, UDM, NRF, NEF, UPF, SMSF or IMS, etc., which are nodes different from AMF.
  • the first node may receive the first message from the second node and obtain the perception data of the terminal.
  • the perception data of the terminal is sent to the second node.
  • the first node can obtain the first message from the LEMF, and send the perception data of the terminal to the LEMF when the perception data of the terminal is obtained; or, the first node can receive the above-mentioned first message from a node other than the second node, and send the perception data of the terminal to the second node when the perception data of the terminal is obtained.
  • the first node can receive the first message from the AMF, and send the perception data of the terminal to the LEMF when the perception data of the terminal is obtained.
  • the listening method provided in the embodiment of the present application can be understood as a legal listening method, in which a first message is received by a first node, and the first message is used to indicate the perception data of the listening terminal; the first node obtains the perception data of the terminal according to the first message; the first node sends the perception data of the terminal to the second node, so that the second node can more easily listen to the perception data of the terminal, thereby improving the convenience of the second node listening to the perception data of the terminal.
  • the first message includes a target identifier (Target identifier), and the target identifier is used to identify the terminal.
  • Target identifier a target identifier
  • the second node can quickly determine the interception target to be intercepted based on the target identifier, that is, the terminal identified by the target identifier.
  • the target identifier includes at least one of a temporary identifier of the terminal and a permanent identifier of the terminal.
  • the temporary identifier of the above-mentioned terminal may include, but is not limited to, a geographic location identifier (such as a GPS location identifier, etc.), a subscription concealed identifier (SUCI), a globally unique temporary identifier (GUTI), a RAN UE NGAP ID, an AMF UE NGAP ID, a temporary identifier within a wireless access network (such as a random access radio network temporary identifier (Random Access Radio Network Temporary Identifier, RA-RNTI), a temporary cell radio network temporary identifier (Temporary Cell Radio Network Temporary Identifier, etc.), a global unique temporary identifier (Globally Unique Temporary Identifier, G ...
  • the above-mentioned SUCI is a privacy protection identifier including a hidden SUPI.
  • the above-mentioned GUTI is called 5G GUTI in 5G.
  • the above RAN UE NGAP ID is used to uniquely identify the UE on the NG interface within the gNB. It should be unique within the logical NG-RAN node.
  • the corresponding one is the eNB UE S1 Application Protocol Identifier (eNB UE S1AP ID).
  • the above AMF UE NG Application Protocol Identifier (AMF UE NGAP ID) is used to identify the UE in the AMF.
  • the corresponding one is the MME UE S1 Application Protocol Identifier (MME UE S1AP ID).
  • the permanent identification of the terminal may include but is not limited to at least one of SUPI, PEI, GPSI (such as telephone number, etc.), IP Multimedia Private Identity (IMPI) and IP Multimedia Public Identity (IMPU).
  • IMPI IP Multimedia Private Identity
  • IMPU IP Multimedia Public Identity
  • the IMPI is used for registration, authentication, certification and billing of users accessing the IMS network, and is not used for call addressing and routing. It is a user identity defined by the home network operator and is globally unique, that is, one private identification (IMPI) corresponds to one physical terminal.
  • the format of the above IMPI is: username@domain, for example, +8618652476314@ims.sz.cn.
  • the above IMPU is used for routing Session Initialization Protocol (SIP) messages.
  • SIP Session Initialization Protocol
  • An IMS user can be assigned one or more public user identifiers (i.e., IMPUs).
  • the format of the public user identifier can be in the format of SIP URI or Tel URL.
  • the IMPU should first be registered. Among them, the format of the IMPU is: SIP URI, for example, "Sip:user1@ims.fj.chinamobile.com”; TEL URI, for example, "Tel:+8613904710100".
  • the first message further includes at least one of the following:
  • a listening mode including a first mode or a second mode
  • the first mode is used to instruct the terminal to report the perception data of the terminal
  • the second mode is used to instruct the first node to generate the perception data of the terminal
  • the type of intercept comprising at least one of the sensing related information and the sensing content
  • Filtering criteria include at least one of time information, geographic location information, and perceived performance indicators.
  • the above-mentioned listening method is used to indicate a method for obtaining listening data (i.e., the perception data of the terminal), wherein the above-mentioned listening method includes a first method or a second method, and the first method is used to indicate that the perception data of the terminal is reported through the terminal, for example, the terminal reports the perception data of the terminal to the first node according to the listening requirements (for example, the listening time length, data volume, filtering conditions, etc.); the above-mentioned second method is used to indicate the first node to generate the perception data of the terminal, for example, the first node generates the perception data of the terminal according to the configuration information and perception signal used by the terminal for perception.
  • the above-mentioned listening method includes a first method or a second method
  • the first method is used to indicate that the perception data of the terminal is reported through the terminal, for example, the terminal reports the perception data of the terminal to the first node according to the listening requirements (for example, the listening time length, data volume, filtering conditions
  • the above-mentioned interception type may include at least one of perception-related information and perception content.
  • the above-mentioned interception type only includes perception-related information, only perception-related information is intercepted; in the case where the above-mentioned interception type only includes perception content, only perception content is intercepted; in the case where the above-mentioned interception type includes perception-related information and perception content, perception-related information and perception content are intercepted at the same time.
  • the above-mentioned interception type may also include at least one of communication-related information and communication content, that is, in addition to the need to intercept at least one of perception-related information and perception content, it is also necessary to intercept at least one of communication-related information and communication content.
  • At least one of the above-mentioned perception-related information and perception content is for perception
  • at least one of the above-mentioned communication-related information and communication content is for communication, such as voice, data packets, messages, and target positioning.
  • the above-mentioned perception-related information and communication-related information can both be referred to as IRI
  • the above-mentioned perception content and communication content can both be referred to as CC
  • the above-mentioned listening types include only IRI (i.e., IRI only), only CC (i.e., CC only) or IRI and CC (i.e., both IRI and CC), wherein the above-mentioned IRI includes at least one of the perception-related information and the communication-related information, and the above-mentioned CC includes at least one of the perception content and the communication content.
  • the service range is used to indicate the service to be monitored, and the service range includes perception.
  • the service range may also include at least one of voice, data packet, message, and target positioning.
  • the above filter conditions are used to provide additional information for listening, for example, bandwidth optimization.
  • the above filter conditions include time At least one of information, geographic location information and perception performance indicators.
  • the perception performance indicators include at least one of the following: perception accuracy, perception resolution, and perception update frequency. The meanings of the above perception performance indicators can be found in Table 2 and are not described here.
  • the first node acquiring the perception data of the terminal according to the first message includes:
  • the first node sends a second message to the terminal, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal;
  • the first node receives the sensing data from the terminal.
  • the first node sends a second message to the terminal to instruct the terminal to record the perception data generated by the terminal.
  • the terminal receives the second message
  • the terminal records the perception data generated by the terminal based on the second message and sends it to the first node. This not only makes it more convenient to obtain the perception data of the terminal, but also ensures that the perception data of the terminal obtained is more accurate.
  • the second message includes at least one of the following:
  • first indication information used to instruct the terminal to record the perception data
  • second indication information used to indicate the amount of data recorded for the perception data
  • the third indication information is used to indicate the time length for recording the perception data
  • the fourth indication information is used to indicate a filtering condition for recording the perception data.
  • the second indication information is used to indicate the data volume of the perception data recorded.
  • the maximum storage size of the perception data is 1024 bytes, that is, a maximum of 1024 bytes of perception data is recorded.
  • the third indication information is used to indicate the time length for recording the perception data, for example, recording the perception data within time T (for example, 12:10 to 12:20 or between frame X and frame Y).
  • the fourth indication information is used to indicate the filtering conditions for recording the perception data, and is used to reduce the data volume of the perception data, thereby reducing the storage and/or transmission overhead on the UE side.
  • the filtering conditions for recording the perception data may include at least one of the perception target identifier, perception area information, and the receiving node identifier of the perception measurement data and/or perception results. For example, the perception data is recorded only when a certain perception target identifier is perceived, or the perception data is recorded only when it is within a certain perception area, or the receiving node identifier of the perception measurement data/perception result is recorded only when it is in a certain situation, etc.
  • the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
  • the first node acquiring the perception data of the terminal according to the first message includes:
  • the first node acquires first configuration information, where the first configuration information is configuration information used by the terminal for perception;
  • the first node determines the perception data of the terminal according to the first configuration information.
  • the first configuration information may be used to indicate the perception signal parameter configuration information (eg, time-frequency resource information, sequence and waveform parameters of the perception signal), perception measurement configuration, perception prior information, etc., which are perceived by the terminal.
  • the perception signal parameter configuration information eg, time-frequency resource information, sequence and waveform parameters of the perception signal
  • perception measurement configuration e.g., time-frequency resource information, sequence and waveform parameters of the perception signal
  • perception prior information e.g., time-frequency resource information, sequence and waveform parameters of the perception signal
  • the first node when the first node is a node that determines the first configuration information, the first node can directly obtain the first configuration information; when the first node is not a node that determines the first configuration information, the first node can obtain the first configuration information from the node that determines the first configuration information.
  • the first node may receive the perception signal based on the first configuration information, and generate the perception data of the terminal according to the received perception signal. It can be understood that the perception data of the terminal generated by the first node based on the first configuration information may be similar to the perception data generated by the terminal.
  • the first node may detect the perception data transmitted by the first node based on the first configuration information to obtain the perception data of the terminal.
  • the first configuration information is obtained through the first node, and the first configuration information is the configuration information used by the terminal for perception.
  • the perception data of the terminal is determined according to the first configuration information. In this way, while ensuring that the perception data of the terminal is detected, the operation of the terminal can be simplified and the resources and power of the terminal can be saved.
  • the first configuration information includes at least one of the following: waveform type, subcarrier spacing, guard interval, bandwidth, data burst duration, time domain interval, transmit power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-location (QCL) relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
  • waveform type subcarrier spacing, guard interval, bandwidth, data burst duration, time domain interval, transmit power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-location (QCL) relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
  • QCL quasi-co-location
  • the above-mentioned waveform types for example, Orthogonal Frequency Division Multiplexing (OFDM), Single Carrier Frequency Division Multiple Access (SC-FDMA), Orthogonal Time Frequency Space (OTFS), Frequency-Modulated Continuous Wave (FMCW), pulse signal, etc.
  • OFDM Orthogonal Frequency Division Multiplexing
  • SC-FDMA Single Carrier Frequency Division Multiple Access
  • OTFS Orthogonal Time Frequency Space
  • FMCW Frequency-Modulated Continuous Wave
  • pulse signal etc.
  • the above subcarrier spacing for example, the subcarrier spacing of the OFDM system is 30KHz.
  • the above-mentioned protection interval is the time interval from the moment when the signal ends to the moment when the latest echo signal of the signal is received; this parameter is proportional to the maximum perception distance; for example, it can be calculated by 2d max /c, d max is the maximum perception distance (belonging to the perception requirement), for example, for a self-transmitted and self-received perception signal, d max represents the maximum distance from the perception signal receiving and transmitting point to the signal transmitting point, and c is the speed of light; in some cases, the OFDM signal cyclic prefix (CP) can play the role of the minimum protection interval.
  • CP OFDM signal cyclic prefix
  • the above bandwidth is inversely proportional to the distance resolution and can be obtained by c/2/ ⁇ d, where ⁇ d is the distance resolution (which belongs to the perception requirement) and c is the speed of light.
  • the duration of the above-mentioned data burst can be inversely proportional to the rate resolution (belonging to the perception requirement).
  • This parameter is the time span of the perception signal, which is mainly used to calculate the Doppler frequency deviation; this parameter can be calculated by c/2/ ⁇ v/f c ; where ⁇ v is the velocity resolution; f c is the carrier frequency of the perception signal or the center frequency of the perception signal.
  • the above time domain interval can be calculated by c/2/f c /v range ); wherein v range is the maximum rate minus the minimum rate (belonging to the perception requirement); this parameter is the time interval between two adjacent perception signals.
  • the transmission power of the above-mentioned perception signal takes a value at intervals of 2dBm, for example, from -20dBm to 23dBm.
  • the above signal formats for example, SRS, DMRS, PRS, etc., or other predefined signals, and related sequence format and other information.
  • the above-mentioned signal direction for example, the direction of the perceived signal or beam information.
  • time resources for example, the time slot index where the perception signal is located or the symbol index of the time slot; wherein, the time resources are divided into two types, one is a one-time time resource, for example, one symbol sends an omnidirectional perception signal; the other is a non-one-time time resource, such as multiple groups of periodic time resources or discontinuous time resources (may include start time and end time), each group of periodic time resources sends a perception signal in the same direction, and different groups of periodic time resources have different beam directions.
  • the above-mentioned frequency resources for example, the center frequency of the perception signal, bandwidth, RB or subcarrier, reference point A (Point A), starting bandwidth position, etc.
  • the perception signal includes multiple resources, each resource is QCL with a synchronization signal block (Synchronization Signal and PBCH block, SSB), and the QCL includes Type A (Type A), Type B, Type C or Type D.
  • a synchronization signal block Synchronization Signal and PBCH block, SSB
  • Type A Type A
  • Type B Type B
  • Type C Type D
  • the above-mentioned perception measurement quantity configuration information can be used to configure the perception signal period and/or number corresponding to at least one perception measurement quantity and at least one perception measurement result (i.e., the measurement result of the perception measurement quantity).
  • the perception measurement quantity may include one or more of Doppler, delay, angle, and signal strength.
  • the above-mentioned perception measurement result corresponds to the perception signal period and/or number, which can specifically refer to that the perception measurement result is calculated based on several perception signals and/or several periodic perception signals.
  • the perception signal when the perception signal is a periodic signal, it can be represented by the perception signal period, that is, the perception measurement result is calculated based on N perception signals, and N is a positive integer; if the perception signal is non-periodic, it can be represented by several times of received perception signals, and several times are expressed with several times, facing different perception signal types; or it can also be a combination of the above situations.
  • the above-mentioned perception prior information is used when calculating the perception result based on the perception measurement.
  • the above-mentioned perception prior information may include the frequency range of the breathing, etc.
  • the transmission configuration information of the above-mentioned perception data for example, protocol data unit (PDU) session identifier (PDU session ID), QoS flow identifier (QoS flow ID), etc.
  • PDU protocol data unit
  • QoS flow ID QoS flow identifier
  • the first node acquiring the first configuration information includes:
  • the first node sends a third message to the terminal, where the third message is used to instruct the terminal to report the first configuration information;
  • the first node receives the first configuration information reported by the terminal.
  • the first node can send a third message to the terminal to instruct the terminal to report the first configuration information, so that the terminal can report the above-mentioned first configuration information to the first node when receiving the third message, and then the first node can receive the perception signal based on the above-mentioned first configuration information, and generate the perception data of the terminal based on the received perception signal.
  • the first configuration information can be determined by the terminal.
  • the first configuration information can be determined by the terminal.
  • the first node when the first configuration information is determined by the terminal, the first node sends a third message to the terminal to instruct the terminal to report the first configuration information, and receives the first configuration information reported by the terminal, which can improve the convenience of the first node in obtaining the first configuration information.
  • the first node acquiring the first configuration information includes:
  • the first node sends a fourth message to the first network side device, where the fourth message is used to instruct the first network side device to send the first configuration information;
  • the first node receives the first configuration information from the first network side device.
  • the first network side device may include a base station or a network function (AF), etc.
  • the first node may send a fourth message to the first network side device to instruct the first network side device to feed back the first configuration information, so that the first network side device may send the first configuration information to the first node after receiving the fourth message, and then the first node may receive a perception signal based on the first configuration information, and generate perception data of the terminal based on the received perception signal.
  • the first network side device may be a node that determines the first configuration information.
  • the first configuration information may be determined by the base station, that is, the first network side device may be the base station, or the first network side device may be a node that can obtain the first configuration information.
  • the first node can send a fourth message to the first network side device to instruct the first network side device to feedback the first configuration information and receive the first configuration information sent by the first network side device, thereby improving the convenience of the first node in obtaining the first configuration information.
  • FIG. 5 is a flowchart of a monitoring method provided in an embodiment of the present application.
  • the method can be executed by a terminal, as shown in FIG. 5 , and includes the following steps:
  • Step 501 The terminal receives a target message from a first node, where the target message includes a second message or a third message, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, where the first configuration information is the configuration information used by the terminal for perception.
  • Step 502 The terminal sends target information to the first node, where the target information includes the perception data or the first configuration information.
  • the terminal receives the second message from the first node, and sends the perception data to the first node based on the second message.
  • the perception data can be recorded based on the second message, and the recorded perception data can be sent to the first node.
  • the second message and the perception data can refer to the relevant description of the above embodiment, and will not be repeated here.
  • the terminal receives a third message from the first node, and can send first configuration information to the first node in response to the third message.
  • the third message and the first configuration information can refer to the relevant description of the above embodiment, which will not be repeated here.
  • the terminal in this embodiment may be responsible for generating at least one of the sensing measurement data and the sensing result.
  • the first node in this embodiment may include but is not limited to a base station, a SF, an AMF, a UDM, a NRF, a NEF, a UPF, a SMSF or an IMS.
  • the second message includes at least one of the following:
  • first indication information used to instruct the terminal to record the perception data
  • second indication information used to indicate the amount of data recorded for the perception data
  • the third indication information is used to indicate the time length for recording the perception data
  • the fourth indication information is used to indicate a filtering condition for recording the perception data.
  • the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
  • the first configuration information includes at least one of the following: waveform type, subcarrier spacing, protection interval, bandwidth, data burst duration, time domain interval, transmission power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-site QCL relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
  • FIG. 6 is a flowchart of a monitoring method provided in an embodiment of the present application.
  • the method can be executed by the second node, as shown in FIG. 6, including the following steps:
  • Step 601 A second node sends a first message to a first node, where the first message is used to indicate perception data of a monitoring terminal.
  • the above-mentioned first message and perception data can refer to the relevant description of the aforementioned embodiment, and will not be repeated here.
  • Step 602 The second node receives the perception data of the terminal from the first node.
  • the second node in this embodiment may include but is not limited to a lawful interception node (e.g., LEA, LEMF, etc.) or a network function in the core network network function responsible for receiving a lawful interception node message, such as AMF, IMS, etc.
  • the first node in this embodiment may include but is not limited to a base station, SF, AMF, UDM, NRF, NEF, UPF, SMSF or IMS, etc.
  • the terminal in this embodiment may be a terminal responsible for generating at least one of the perception measurement data and the perception result.
  • the first message includes a target identifier, and the target identifier is used to identify the terminal.
  • the first message further includes at least one of the following:
  • a listening mode including a first mode or a second mode
  • the first mode is used to instruct the terminal to report the perception data of the terminal
  • the second mode is used to instruct the first node to generate the perception data of the terminal
  • a listening type wherein the listening type includes at least one of sensing related information and sensing content;
  • Service scope the service scope including perception
  • the filtering condition includes at least one of time information, geographic location information, and a perceived performance indicator.
  • the perception performance indicator includes at least one of the following: perception accuracy, perception resolution, and perception update frequency.
  • the target identifier includes at least one of a temporary identifier of the terminal and a permanent identifier of the terminal.
  • the method further includes:
  • the second node receives the association relationship between the temporary identity and the permanent identity from the third node.
  • the third node may be a network function in the core network that is responsible for maintaining the permanent identification of the terminal, such as AMF, UDM or IMS, etc.
  • the third node needs to provide the association relationship between the temporary identification and the permanent identification to the second node, so that the second node can obtain the permanent identification corresponding to the temporary identification based on the association relationship, which makes it easier for the second node to identify the terminal to which the perception data corresponding to the temporary identification belongs, that is, the terminal identified by the permanent identification corresponding to the temporary identification.
  • the association relationship between the temporary identifier and the permanent identifier is the association relationship between the temporary identifier and the target identifier.
  • association relationship between the temporary identification and the permanent identification is indicated by an identity event, and the identity event includes:
  • the subscription permanent identifier being used to identify the terminal
  • An observed temporary identifier (Observed temporary identifier), wherein the observed temporary identifier is used when the interface of the first node interacts with the perception data of the terminal.
  • the subscription permanent identifier is used to identify the terminal responsible for generating at least one of the sensing measurement data and the sensing result, that is, the target to be monitored.
  • the temporary identifier observed above is used when the interfaces within the first node interact with each other to monitor the target's perception information (eg, perception request, perception response, perception report, etc.).
  • the network function may provide an identity event function (Identity Event Function) to generate an identity event report when it is detected that a temporary identity and a permanent identity are associated or disassociated, wherein the identity event report may include an identity event, and the above-mentioned identity event includes at least a subscription to a permanent identity and an observed temporary identity.
  • Identity Event Function Identity Event Function
  • the identification event further includes at least one of the following parameters:
  • a timestamp of an event which is used to indicate the time when the event occurs
  • a network function identifier used to indicate the network function that generated the identification event report
  • the geographical location information is used to indicate the geographical location of the terminal when the identification event is sent.
  • the geographic location of the above-mentioned terminal may include a tracking area identifier (Tracing Area Identity, TAI), a routing area (Routing Area, RA), a radio access network-based notification area (RAN-based Notification Area, RNA) or geographic location coordinates, etc.
  • TAI Tracking Area Identity
  • RA routing area
  • RAN-based Notification Area RNA
  • geographic location coordinates etc.
  • Example 1 The first node is a base station and the interception method is legal interception of terminal reporting of perception data
  • the interception method is that the UE reports the sensing data to the base station.
  • the interception method provided in this example includes the following steps:
  • Step a1 The base station receives a first message sent by a second node (such as LEA, AMF, etc.), where the first message includes an identifier of a target UE to be monitored, that is, a target identifier.
  • a second node such as LEA, AMF, etc.
  • the target UE is a UE responsible for generating perception measurement data and/or a UE responsible for producing perception results.
  • Step a2 The base station sends a second message to the UE according to the first message, where the second message is used to trigger the target UE to record the perception data.
  • Step a3 After receiving the second message, the target UE records the perception data and reports it to the base station at an appropriate time. For example, the base station instructs the terminal to report the perception data when it is idle. It is understandable that after the terminal reports the recorded perception data to the base station, it can delete the perception data immediately or save it for a period of time before deleting it.
  • Step a4 The base station sends scheduling information for recording and reporting the perception data according to the configuration information for recording the perception data for the target UE.
  • Step a5 The target UE reports the perception data based on the base station scheduling information.
  • Step a6 The base station receives the sensing data and sends it to a legal interception node (e.g., LEA, LEMF, etc.)
  • a legal interception node e.g., LEA, LEMF, etc.
  • the third node (such as AMF ⁇ UDM, etc.) needs to provide the association relationship between the temporary identifiers and permanent identifiers used by the base station.
  • Example 2 The first node is a base station and the reporting method is the lawful interception of the first node generating the UE's perception data
  • This example is directed to the perception lawful interception when the UE is responsible for generating perception measurement data and/or perception results, wherein when the first node is a base station (such as a gNB), the base station receives a wireless signal based on the obtained first configuration information and generates perception data (i.e., interception data).
  • the interception method provided in this example includes the following steps:
  • Step b1 The base station receives a first message sent by a second node (such as LEA, AMF, etc.), wherein the first message includes an identifier of a target UE to be intercepted, i.e., a target identifier.
  • a second node such as LEA, AMF, etc.
  • the target UE is a UE responsible for generating perception measurement data and/or a UE responsible for producing perception results.
  • Step b2 The base station obtains first configuration information of the target UE according to the first message, receives a perception signal according to the first configuration information, and generates perception data on the UE side based on the received perception signal.
  • the above-mentioned first configuration information can refer to the relevant description of the aforementioned embodiment, and will not be repeated here.
  • This step can be divided into the following cases according to the sensing mode and the sensing function that the UE is responsible for:
  • the UE When the perception mode is UE self-transmission or inter-UE transmission and reception, the UE is responsible for generating perception measurement data: the base station sends a third message to the UE (such as a self-transmission and self-reception UE, or a UE that determines the first configuration information through inter-UE transmission and reception) to instruct the terminal to report the first configuration information, and the first configuration information mainly includes the perception signal configuration and the perception measurement configuration.
  • the target UE sends a fifth message to report the first configuration information based on the instruction of the base station, and the base station receives the perception signal on the corresponding time and frequency resources based on the received first configuration information, and performs perception measurement, thereby generating perception measurement data similar to that on the target UE side.
  • Case 2 When the perception mode is UE self-transmission or inter-UE transmission and reception, the UE is responsible for generating the perception result: the base station sends a third message to the UE (such as a self-transmission and self-reception UE, or a UE that determines the first configuration information through inter-UE transmission and reception) to instruct the UE to report the first configuration information, and the first configuration information mainly includes the perception signal configuration, the perception measurement configuration and the perception prior information.
  • the UE such as a self-transmission and self-reception UE, or a UE that determines the first configuration information through inter-UE transmission and reception
  • the first configuration information mainly includes the perception signal configuration, the perception measurement configuration and the perception prior information.
  • the UE sends a fourth message to report the first configuration information based on the instruction of the base station, and the base station receives the perception signal on the corresponding time and frequency resources based on the received first configuration information, performs the perception measurement, and generates a perception result similar to the UE side based on the perception prior information.
  • Case 3 When the sensing mode is that the base station sends and the UE receives, the UE is responsible for generating sensing measurement data and/or sensing results: the base station responsible for sensing and listening (referred to as base station A) obtains the first configuration information from the base station that sends the sensing signal (referred to as base station B), and the first configuration information mainly includes the sensing signal configuration and the sensing measurement configuration. If the UE is responsible for generating the sensing result, sensing prior information is also required.
  • base station A the base station responsible for sensing and listening
  • base station B the base station that sends the sensing signal
  • the first configuration information mainly includes the sensing signal configuration and the sensing measurement configuration. If the UE is responsible for generating the sensing result, sensing prior information is also required.
  • the base station responsible for listening receives the sensing signal on the corresponding time and frequency resources based on the received first configuration information, and performs sensing measurement, thereby generating sensing measurement data similar to that on the UE side; or generating sensing results similar to those on the UE side based on the sensing prior information.
  • Case 4 When the perception method is that the base station receives and sends from the UE, the base station sends and receives by itself, or the base station sends and receives between base stations, the UE is responsible for generating the perception result: If the base station responsible for the perception measurement in the above method is the base station responsible for perception monitoring, the base station sends the perception measurement data to the target UE and instructs the target UE to report the perception prior information, and then the base station can generate a perception result similar to the UE side based on the perception prior information.
  • Step b3 The base station sends the sensing interception data to the lawful interception system
  • the third node (such as AMF ⁇ UDM, etc.) needs to provide the association relationship between the temporary identifiers and permanent identifiers used by the base station.
  • Example 3 The first node is the core network control plane function node's perception of lawful interception
  • This example is directed to the perception lawful interception when the UE is responsible for generating the perception measurement data and/or the perception result, wherein when the first node is a core network control plane function node (such as SF/AMF/NEF), the UE reports the perception data (i.e., interception data) to the core network control plane function node.
  • the interception method provided in this example includes the following steps:
  • Step c1 The core network control plane function node receives a first message sent by a second node (such as LEA, AMF, etc.).
  • the first message includes an identifier of a target UE to be intercepted, that is, a target identifier.
  • the target UE is a UE responsible for generating perception measurement data and/or a UE responsible for producing perception results.
  • Step c2 The core network control plane function node sends a second message to the target UE according to the first message, and the second message is used to trigger the UE to record the perception data.
  • the second message can be indicated by a protocol message between the core network control plane function node and the UE, for example, a perception protocol message between the SF and the UE, a non-access stratum (NAS) message between the AMF and the UE, etc.
  • the base station transparently transmits the second message.
  • Step c3 After receiving the second message, the UE records the perception data and reports it to the core network control plane function node at an appropriate time.
  • the UE requests uplink transmission resources from the base station based on local data storage conditions and other reasons, and reports the perception data to the core network control plane function node. It is understandable that after the UE reports the recorded perception data to the base station, it can delete the perception data immediately or delete it after saving it for a period of time.
  • Step c1 The core network control plane function node receives the sensing data and sends it to a legal interception node (eg, LEA, LEMF, etc.).
  • a legal interception node eg, LEA, LEMF, etc.
  • Example 4 The first node is the core network user plane function node's perception of lawful interception
  • the interception method includes the following steps:
  • the core network user plane function node receives a first message sent by a second node (such as LEA, AMF, etc.), wherein the first message includes an identifier of a target UE to be intercepted, i.e., a target identifier.
  • a target identifier i.e., a target identifier.
  • the target UE is a UE responsible for generating perception measurement data and/or a UE responsible for producing perception results.
  • Step d2 the core network user plane function node obtains the first configuration information of the target UE according to the first message, where the first configuration information refers to the transmission configuration information of the perception data, such as PDU session ID, QoS flow ID, IP triplet or IP quintuple, etc.
  • acquiring the first configuration information of the target UE includes:
  • the first configuration information is obtained from the UE.
  • the transmission configuration information of the perception data is determined by the target UE, then before the UPF obtains the first configuration information, it also includes a core network control plane function such as SMF instructing the target UE to report the first configuration information.
  • the target UE reports the first configuration information to the SMF based on the indication information, and the SMF provides the received first configuration information to the UPF.
  • Step d3 The core network user plane function node detects the perception data transmitted by the core network user plane node based on the acquired first configuration information to obtain the perception data of the target UE (for example, the perception data packet of the target UE is copied by software). or hardware spectrometry, etc.), that is, sensing measurement data and/or sensing results.
  • Step d4 The core network user plane function node sends the acquired perception data of the target UE to the legal interception node.
  • the monitoring method provided in the embodiment of the present application is a legal monitoring method based on terminal perception, and the terminal perception at least includes the terminal being responsible for generating perception measurement data and/or perception results.
  • This solution can solve the problem that it is difficult to perform legal monitoring when data such as perception measurements and perception results are not carried through the network, or when data such as business layer data (which may be encrypted at the business layer) is carried in the mobile communication network and transparently transmitted to external functions.
  • the monitoring method provided in the embodiment of the present application can be executed by a monitoring device, or a control module in the monitoring device for executing the monitoring method.
  • the monitoring device provided in the embodiment of the present application is described by taking the monitoring device executing the monitoring method as an example.
  • FIG. 7 is a structural diagram of a listening device provided in an embodiment of the present application.
  • the listening device is applied to a first node.
  • the listening device 700 includes:
  • a first receiving module 701 is configured to receive a first message from a second node, where the first message is used to indicate perception data of a listening terminal;
  • An acquisition module 702 is configured to acquire perception data of the terminal according to the first message
  • the first sending module 703 is configured to send the perception data of the terminal to the second node.
  • the first message includes a target identifier, and the target identifier is used to identify the terminal.
  • the first message further includes at least one of the following:
  • a listening mode including a first mode or a second mode
  • the first mode is used to instruct the terminal to report the perception data of the terminal
  • the second mode is used to instruct the first node to generate the perception data of the terminal
  • a listening type wherein the listening type includes at least one of sensing related information and sensing content;
  • Service scope the service scope including perception
  • the filtering condition includes at least one of time information, geographic location information, and a perceived performance indicator.
  • the perception performance indicator includes at least one of the following: perception accuracy, perception resolution, and perception update frequency.
  • the target identifier includes at least one of a temporary identifier of the terminal and a permanent identifier of the terminal.
  • the acquisition module is specifically configured to include:
  • the sensing data is received from the terminal.
  • the second message includes at least one of the following:
  • first indication information used to instruct the terminal to record the perception data
  • second indication information used to indicate the amount of data recorded for the perception data
  • the third indication information is used to indicate the time length for recording the perception data
  • the fourth indication information is used to indicate a filtering condition for recording the perception data.
  • the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
  • the acquisition module is specifically used for:
  • the first configuration information includes at least one of the following: waveform type, subcarrier spacing, protection interval, bandwidth, data burst duration, time domain interval, transmission power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-site QCL relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
  • the acquisition module is specifically used for:
  • the acquisition module is specifically used for:
  • the first configuration information is received from the first network side device.
  • the listening device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip.
  • the electronic device may be a network-side device, or may be a device other than a network-side device.
  • the network-side device may include but is not limited to the types of network-side devices listed above, and other devices may be servers, network attached storage (NAS), etc., which are not specifically limited in the embodiment of the present application.
  • the listening device provided in the embodiment of the present application can implement each process implemented by the method embodiment of Figure 4 and achieve the same technical effect. To avoid repetition, it will not be described here.
  • FIG. 8 is a structural diagram of a listening device provided in an embodiment of the present application.
  • the listening device is applied to a terminal.
  • the listening device 800 includes:
  • the second receiving module 801 is used to receive a target message from the first node, where the target message includes a second message or a third message, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, where the first configuration information is configuration information used by the terminal for perception;
  • the second sending module 802 is used to send target information to the first node, where the target information includes the perception data or the first configuration information.
  • the second message includes at least one of the following:
  • first indication information used to instruct the terminal to record the perception data
  • second indication information used to indicate the amount of data recorded for the perception data
  • the third indication information is used to indicate the time length for recording the perception data
  • the fourth indication information is used to indicate a filtering condition for recording the perception data.
  • the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
  • the first configuration information includes at least one of the following: waveform type, subcarrier spacing, protection interval, bandwidth, data burst duration, time domain interval, transmission power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-site QCL relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
  • the listening device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip.
  • the electronic device may be a network-side device, or may be a device other than a network-side device.
  • the network-side device may include but is not limited to the types of network-side devices listed above, and other devices may be servers, network attached storage (NAS), etc., which are not specifically limited in the embodiment of the present application.
  • the listening device provided in the embodiment of the present application can implement each process implemented by the method embodiment of Figure 5 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • FIG. 9 is a structural diagram of a listening device provided in an embodiment of the present application.
  • the listening device is applied to a second node.
  • the listening device 900 includes:
  • a third sending module configured to send a first message to the first node, where the first message is used to indicate the perception data of the listening terminal;
  • the third receiving module is used to receive the perception data of the terminal from the first node.
  • the first message includes a target identifier, and the target identifier is used to identify the terminal.
  • the first message further includes at least one of the following:
  • a listening mode including a first mode or a second mode
  • the first mode is used to instruct the terminal to report the perception data of the terminal
  • the second mode is used to instruct the first node to generate the perception data of the terminal
  • a listening type wherein the listening type includes at least one of sensing related information and sensing content;
  • Service scope the service scope including perception
  • the filtering condition includes at least one of time information, geographic location information, and a perceived performance indicator.
  • the perception performance indicator includes at least one of the following: perception accuracy, perception resolution, and perception update frequency.
  • the target identifier includes at least one of a temporary identifier of the terminal and a permanent identifier of the terminal.
  • the device further comprises:
  • the fourth receiving module is used to receive the association relationship between the temporary identifier and the permanent identifier from the third node when the first node only supports detecting the temporary identifier of the terminal.
  • the association relationship between the temporary identifier and the permanent identifier is indicated by an identification event, and the identification event includes:
  • a subscription permanent identifier wherein the subscription permanent identifier is used to identify the terminal
  • An observed temporary identifier where the observed temporary identifier is used when the interface of the first node interacts with the perception data of the terminal.
  • the identification event further includes at least one of the following parameters:
  • a timestamp of an identification event used to indicate the time when the identification event occurs
  • a network function identifier used to indicate the network function that generated the identification event report
  • the geographical location information is used to indicate the geographical location of the terminal when the identification event is sent.
  • the interception device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip.
  • the electronic device may be a network-side device or a lawful interception node, or may be a device other than a network-side device or a lawful interception node.
  • the network-side device may include but is not limited to the types of network-side devices listed above
  • the lawful interception node may include LEA, LEMF, etc.
  • other devices may be servers, network attached storage (NAS), etc., which are not specifically limited in the embodiment of the present application.
  • the listening device provided in the embodiment of the present application can implement each process implemented by the method embodiment of Figure 6 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • an embodiment of the present application further provides a communication device 1000, including a processor 1001 and a memory 1002, wherein the memory 1002 stores a program or instruction that can be run on the processor 1001.
  • the communication device 1000 is a first node
  • the program or instruction is executed by the processor 1001 to implement the various steps of the first node side listening method embodiment, and can achieve the same technical effect.
  • the communication device 1000 is a terminal
  • the program or instruction is executed by the processor 1001 to implement the various steps of the terminal side listening method embodiment, and can achieve the same technical effect.
  • the communication device 1000 is a second node
  • the program or instruction is executed by the processor 1001 to implement the various steps of the second node side listening method embodiment, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the embodiment of the present application also provides a first node, including a processor and a communication interface, the communication interface is used to receive a first message from a second node, the first message is used to indicate the perception data of the listening terminal; the processor is used to obtain the perception data of the terminal according to the first message; the communication interface is also used to send the perception data of the terminal to the second node.
  • the first node embodiment corresponds to the above-mentioned first node side method embodiment, and each implementation process and implementation method of the above-mentioned method embodiment can be applied to the first node embodiment, and can achieve the same technical effect.
  • the embodiment of the present application also provides a first node.
  • the first node 1100 includes: an antenna 1101, a radio frequency device 1102, a baseband device 1103, a processor 1104 and a memory 1105.
  • the antenna 1101 is connected to the radio frequency device 1102.
  • the radio frequency device 1102 receives information through the antenna 1101 and sends the received information to the baseband device 1103 for processing.
  • the baseband device 1103 processes the information to be sent and sends it to the radio frequency device 1102.
  • the radio frequency device 1102 processes the received information and sends it out through the antenna 1101.
  • the method performed by the first node in the above embodiment can be implemented in the baseband device 1103, and the baseband device 1103 includes Including baseband processor.
  • the baseband device 1103 may include, for example, at least one baseband board, on which multiple chips are arranged, as shown in Figure 11, one of which is, for example, a baseband processor, which is connected to the memory 1105 through a bus interface to call the program in the memory 1105 and execute the network device operations shown in the above method embodiment.
  • the first node may also include a network interface 1106, which is, for example, a common public radio interface (CPRI).
  • a network interface 1106 which is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the first node 1100 of the embodiment of the present application also includes: instructions or programs stored in the memory 1105 and executable on the processor 1104.
  • the processor 1104 calls the instructions or programs in the memory 1105 to execute the methods executed by the modules shown in Figure 7 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the embodiment of the present application also provides a terminal, including a processor and a communication interface, the communication interface is used to receive a target message from a first node, the target message includes a second message or a third message, the second message is used to instruct the terminal to record perception data, the perception data is the perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, the first configuration information is the configuration information used by the terminal for perception; send target information to the first node, the target information includes the perception data or the first configuration information.
  • This terminal embodiment corresponds to the above-mentioned terminal side method embodiment, and each implementation process and implementation method of the above-mentioned method embodiment can be applied to the terminal embodiment, and can achieve the same technical effect.
  • Figure 12 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
  • the terminal 1200 includes but is not limited to: a radio frequency unit 1201, a network module 1202, an audio output unit 1203, an input unit 1204, a sensor 1205, a display unit 1206, a user input unit 1207, an interface unit 1208, a memory 1209 and at least some of the components of the processor 1210.
  • the terminal 1200 may also include a power source (such as a battery) for supplying power to each component, and the power source may be logically connected to the processor 1210 through a power management system, so as to implement functions such as charging, discharging, and power consumption management through the power management system.
  • a power source such as a battery
  • the terminal structure shown in FIG12 does not constitute a limitation on the terminal, and the terminal may include more or fewer components than shown in the figure, or combine certain components, or arrange components differently, which will not be described in detail here.
  • the input unit 1204 may include a graphics processing unit (GPU) 12041 and a microphone 12042, and the graphics processor 12041 processes the image data of the static picture or video obtained by the image capture device (such as a camera) in the video capture mode or the image capture mode.
  • the display unit 1206 may include a display panel 12061, and the display panel 12061 may be configured in the form of a liquid crystal display, an organic light emitting diode, etc.
  • the user input unit 1207 includes a touch panel 12071 and at least one of other input devices 12072.
  • the touch panel 12071 is also called a touch screen.
  • the touch panel 12071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 12072 may include, but are not limited to, a physical keyboard, function keys (such as a volume control key, a switch key, etc.), a trackball, a mouse, and a joystick, which will not be repeated here.
  • the RF unit 1201 can transmit the data to the processor 1210 for processing; in addition, the RF unit 1201 can send uplink data to the network side device.
  • Unit 1201 includes but is not limited to an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the memory 1209 can be used to store software programs or instructions and various data.
  • the memory 1209 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instruction required for at least one function (such as a sound playback function, an image playback function, etc.), etc.
  • the memory 1209 may include a volatile memory or a non-volatile memory, or the memory 1209 may include both volatile and non-volatile memories.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
  • the volatile memory may be a random access memory (RAM), a static random access memory (SRAM), a dynamic random access memory (DRAM), a synchronous dynamic random access memory (SDRAM), a double data rate synchronous dynamic random access memory (DDRSDRAM), an enhanced synchronous dynamic random access memory (ESDRAM), a synchronous link dynamic random access memory (SLDRAM) and a direct memory bus random access memory (DRRAM).
  • the memory 1209 in the embodiment of the present application includes but is not limited to these and any other suitable types of memory.
  • the processor 1210 may include one or more processing units; optionally, the processor 1210 integrates an application processor and a modem processor, wherein the application processor mainly processes operations related to an operating system, a user interface, and application programs, and the modem processor mainly processes wireless communication signals, such as a baseband processor. It is understandable that the modem processor may not be integrated into the processor 1210.
  • the radio frequency unit 1201 is used to receive a target message from a first node, the target message includes a second message or a third message, the second message is used to instruct the terminal to record perception data, the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, and the first configuration information is the configuration information used by the terminal for perception; send target information to the first node, and the target information includes the perception data or the first configuration information.
  • the second message includes at least one of the following:
  • first indication information used to instruct the terminal to record the perception data
  • second indication information used to indicate the amount of data recorded for the perception data
  • the third indication information is used to indicate the time length for recording the perception data
  • the fourth indication information is used to indicate a filtering condition for recording the perception data.
  • the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
  • the first configuration information includes at least one of the following: waveform type, subcarrier spacing, protection interval, bandwidth, data burst duration, time domain interval, transmission power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-site QCL relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
  • the embodiment of the present application also provides a second node, including a processor and a communication interface, the communication interface is used for the second node to send a first message to the first node, the first message is used to indicate the perception data of the intercepted terminal; the second node receives the perception data of the terminal from the first node.
  • the second node embodiment corresponds to the above second node method embodiment, and each implementation process and implementation method of the above method embodiment can be applied to the second node embodiment, and can achieve the same technical effect.
  • the embodiment of the present application also provides a second node.
  • the second node 1300 includes: an antenna 1301, a radio frequency device 1302, a baseband device 1303, a processor 1304 and a memory 1305.
  • the antenna 1301 is connected to the radio frequency device 1302.
  • the radio frequency device 1302 receives information through the antenna 1301 and sends the received information to the baseband device 1303 for processing.
  • the baseband device 1303 processes the information to be sent and sends it to the radio frequency device 1302.
  • the radio frequency device 1302 processes the received information and sends it out through the antenna 1301.
  • the method executed by the second node in the above embodiment may be implemented in the baseband device 1303, which includes a baseband processor.
  • the baseband device 1303 may include, for example, at least one baseband board, on which multiple chips are arranged, as shown in Figure 13, one of which is, for example, a baseband processor, which is connected to the memory 1305 through a bus interface to call the program in the memory 1305 and execute the network device operations shown in the above method embodiment.
  • the second node may also include a network interface 1306, which is, for example, a common public radio interface (CPRI).
  • a network interface 1306, which is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the second node 1300 of the embodiment of the present application also includes: instructions or programs stored in the memory 1305 and executable on the processor 1304.
  • the processor 1304 calls the instructions or programs in the memory 1305 to execute the methods executed by the modules shown in Figure 7 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • An embodiment of the present application also provides a readable storage medium, on which a program or instruction is stored.
  • a program or instruction is stored.
  • the various processes of the above-mentioned listening method embodiment are implemented, or the various processes of the above-mentioned listening method embodiment are implemented, and the same technical effect can be achieved. To avoid repetition, it will not be repeated here.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium includes a computer readable storage medium, such as a computer read-only memory ROM, a random access memory RAM, a magnetic disk or an optical disk.
  • An embodiment of the present application further provides a chip, which includes a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the various processes of the above-mentioned first node-side listening method embodiment, or to implement the various processes of the above-mentioned terminal-side listening method embodiment, or to implement the various processes of the above-mentioned second node-side listening method embodiment and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.
  • the embodiment of the present application further provides a computer program/program product, wherein the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the first node side
  • the various processes of the listening method embodiment, or the various processes of the above-mentioned terminal side listening method embodiment, or the various processes of the above-mentioned second node side listening method embodiment can achieve the same technical effect. In order to avoid repetition, they will not be repeated here.
  • An embodiment of the present application also provides a lawful interception system, including: a first node, a terminal and a second node, the first node is used to execute the processes as shown in Figure 4 and the above-mentioned method embodiments, the terminal is used to execute the processes as shown in Figure 5 and the above-mentioned method embodiments, and the second node is used to execute the processes as shown in Figure 6 and the above-mentioned method embodiments, and the same technical effects can be achieved, which will not be described again here to avoid repetition.
  • the disclosed devices and methods can be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a logical function division. There may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed.
  • Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present disclosure may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present disclosure or the part that contributes to the prior art or the part of the technical solution, can be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for a computer device (which can be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in each embodiment of the present disclosure.
  • the aforementioned storage medium includes: various media that can store program codes, such as USB flash drives, mobile hard drives, ROM, RAM, magnetic disks, or optical disks.
  • the program can be stored in a computer-readable storage medium.
  • the storage medium can be a disk, Optical disk, Read-Only Memory (ROM) or Random Access Memory (RAM), etc.
  • the technical solution of the present application can be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, a magnetic disk, or an optical disk), and includes a number of instructions for enabling a terminal (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the methods described in each embodiment of the present application.
  • a storage medium such as ROM/RAM, a magnetic disk, or an optical disk
  • a terminal which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present application belongs to the technical field of communications. Disclosed are an interception method and apparatus, and a related device. The interception method in the embodiments of the present application comprises: a first node receiving a first message, wherein the first message is used for instructing the interception of perception data of a terminal; the first node acquiring the perception data of the terminal according to the first message; and the first node sending the perception data of the terminal to a second node.

Description

侦听方法、装置及相关设备Listening method, device and related equipment
相关申请的交叉引用CROSS-REFERENCE TO RELATED APPLICATIONS
本申请主张在2022年10月20日在中国提交的中国专利申请No.202211287945.7的优先权,其全部内容通过引用包含于此。This application claims priority to Chinese Patent Application No. 202211287945.7 filed in China on October 20, 2022, the entire contents of which are incorporated herein by reference.
技术领域Technical Field
本申请属于通信技术领域,具体涉及一种侦听方法、装置及相关设备。The present application belongs to the field of communication technology, and specifically relates to a monitoring method, device and related equipment.
背景技术Background technique
随着移动通信技术的发展,未来移动通信系统,例如,超5代移动通信(Beyond5th-Generation,B5G)系统或第6代(6th Generation,6G)通信系统,除了具备通信能力外,还将具备感知能力,即能够通过感知信号的发送和接收,来感知目标物体的方位、距离、速度等信息,或者对目标物体、事件或环境等进行检测、跟踪、识别、成像等。然而,相关技术中合法侦听主要面向通信服务提供商现有的服务范围(如语音、数据包、消息和目标定位),并且主要是在网络侧基于网络层侦听或基于服务层侦听,对于用户设备(User Equipment,UE)自发自收感知、UE间收发感知、基站发UE收等方式下感知测量和/或感知结果计算在UE侧完成的情况,由于感知测量和感知结果等数据可以不通过网络承载,或者以业务层数据(可能有业务层加密)承载在移动通信网络传输,从而导致合法侦听UE的感知数据较为不便。With the development of mobile communication technology, future mobile communication systems, such as Beyond5th-Generation (B5G) systems or 6th Generation (6G) communication systems, will have perception capabilities in addition to communication capabilities, that is, they will be able to perceive the direction, distance, speed and other information of target objects through the sending and receiving of perception signals, or detect, track, identify, image and so on target objects, events or environments. However, in the related art, lawful interception is mainly aimed at the existing service scope of communication service providers (such as voice, data packets, messages and target positioning), and is mainly based on network layer interception or service layer interception on the network side. For the case where the perception measurement and/or perception result calculation are completed on the UE side in the modes of self-transmission and self-reception of user equipment (UE), transmission and reception of perception between UEs, and transmission and reception of base stations by UEs, it is inconvenient to lawfully intercept the perception data of UEs because the data such as perception measurement and perception results may not be carried through the network, or may be carried in the mobile communication network as service layer data (which may be encrypted at the service layer).
发明内容Summary of the invention
本申请实施例提供一种侦听方法、装置及相关设备,能够解决相关技术中合法侦听终端的感知数据较为不便的问题。The embodiments of the present application provide a monitoring method, an apparatus and related equipment, which can solve the problem in the related art that it is inconvenient to legally monitor the perception data of the terminal.
第一方面,提供了一种侦听方法,应用于第一节点,该方法包括:In a first aspect, a monitoring method is provided, which is applied to a first node, and the method includes:
第一节点接收第一消息,所述第一消息用于指示侦听终端的感知数据;The first node receives a first message, where the first message is used to indicate perception data of the intercepting terminal;
所述第一节点根据所述第一消息获取所述终端的感知数据;The first node acquires the perception data of the terminal according to the first message;
所述第一节点向第二节点发送所述终端的感知数据。The first node sends the perception data of the terminal to the second node.
第二方面,提供了一种侦听装置,该装置应用于第一节点,该装置包括:In a second aspect, a monitoring device is provided, which is applied to a first node and includes:
第一接收模块,用于从第二节点接收第一消息,所述第一消息用于指示侦听终端的感知数据;A first receiving module, configured to receive a first message from a second node, wherein the first message is used to indicate perception data of a listening terminal;
获取模块,用于根据所述第一消息获取所述终端的感知数据; An acquisition module, configured to acquire the perception data of the terminal according to the first message;
第一发送模块,用于向所述第二节点发送所述终端的感知数据。The first sending module is used to send the perception data of the terminal to the second node.
第三方面,提供了一种侦听方法,应用于终端,该方法包括:In a third aspect, a monitoring method is provided, which is applied to a terminal, and the method includes:
终端从第一节点接收目标消息,所述目标消息包括第二消息或第三消息,所述第二消息用于指示所述终端记录感知数据,所述感知数据为所述终端生成的感知数据,所述第三消息用于指示所述终端上报第一配置信息,所述第一配置信息为所述终端进行感知时所使用的配置信息;The terminal receives a target message from the first node, where the target message includes a second message or a third message, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, where the first configuration information is configuration information used by the terminal for perception;
所述终端向所述第一节点发送目标信息,所述目标信息包括所述感知数据或所述第一配置信息。The terminal sends target information to the first node, where the target information includes the perception data or the first configuration information.
第四方面,提供了一种侦听装置,应用于终端,该装置包括:In a fourth aspect, a monitoring device is provided, which is applied to a terminal, and the device includes:
第二接收模块,用于从第一节点接收目标消息,所述目标消息包括第二消息或第三消息,所述第二消息用于指示所述终端记录感知数据,所述感知数据为所述终端生成的感知数据,所述第三消息用于指示所述终端上报第一配置信息,所述第一配置信息为所述终端进行感知时所使用的配置信息;A second receiving module is used to receive a target message from the first node, where the target message includes a second message or a third message, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, where the first configuration information is configuration information used by the terminal for perception;
第二发送模块,用于向所述第一节点发送目标信息,所述目标信息包括所述感知数据或所述第一配置信息。The second sending module is used to send target information to the first node, where the target information includes the perception data or the first configuration information.
第五方面,提供了一种侦听方法,应用于第二节点,该方法包括:In a fifth aspect, a monitoring method is provided, which is applied to a second node, and the method includes:
第二节点向第一节点发送第一消息,所述第一消息用于指示侦听终端的感知数据;The second node sends a first message to the first node, where the first message is used to indicate the perception data of the intercepting terminal;
所述第二节点从所述第一节点接收所述终端的感知数据。The second node receives the perception data of the terminal from the first node.
第六方面,提供了一种侦听装置,该装置应用于第二节点,该装置包括:In a sixth aspect, a monitoring device is provided, which is applied to a second node, and includes:
第三发送模块,用于向第一节点发送第一消息,所述第一消息用于指示侦听终端的感知数据;A third sending module, configured to send a first message to the first node, where the first message is used to indicate the perception data of the listening terminal;
第三接收模块,用于从所述第一节点接收所述终端的感知数据。The third receiving module is used to receive the perception data of the terminal from the first node.
第七方面,提供了一种第一节点,该终端包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。In a seventh aspect, a first node is provided, which terminal includes a processor and a memory, wherein the memory stores a program or instruction that can be executed on the processor, and when the program or instruction is executed by the processor, the steps of the method described in the first aspect are implemented.
第八方面,提供了一种第一节点,包括处理器及通信接口,其中,所述通信接口用于从第二节点接收第一消息,所述第一消息用于指示侦听终端的感知数据;所述处理器用于根据所述第一消息获取所述终端的感知数据;所述通信接口还用于向所述第二节点发送所述终端的感知数据。In the eighth aspect, a first node is provided, comprising a processor and a communication interface, wherein the communication interface is used to receive a first message from a second node, the first message being used to indicate perception data of a listening terminal; the processor is used to obtain the perception data of the terminal according to the first message; and the communication interface is also used to send the perception data of the terminal to the second node.
第九方面,提供了一种终端,该终端包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第三方面所述的方法的步骤。In a ninth aspect, a terminal is provided, comprising a processor and a memory, wherein the memory stores a program or instruction that can be run on the processor, and when the program or instruction is executed by the processor, the steps of the method described in the third aspect are implemented.
第十方面,提供了一种终端,包括处理器及通信接口,其中,所述通信接口用于从第一节点接收目标消息,所述目标消息包括第二消息或第三消息,所述第二消息用于指示所述终端记录感知数据,所述感知数据为所述终端生成的感知数据,所述第三消息用于指示 所述终端上报第一配置信息,所述第一配置信息为所述终端进行感知时所使用的配置信息;向所述第一节点发送目标信息,所述目标信息包括所述感知数据或所述第一配置信息。In a tenth aspect, a terminal is provided, comprising a processor and a communication interface, wherein the communication interface is used to receive a target message from a first node, the target message comprising a second message or a third message, the second message is used to instruct the terminal to record perception data, the perception data is perception data generated by the terminal, and the third message is used to instruct The terminal reports first configuration information, where the first configuration information is configuration information used by the terminal for perception; and sends target information to the first node, where the target information includes the perception data or the first configuration information.
第十一方面,提供了一种第二节点,该第二节点包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第五方面所述的方法的步骤。In the eleventh aspect, a second node is provided, which includes a processor and a memory, wherein the memory stores a program or instruction that can be executed on the processor, and when the program or instruction is executed by the processor, the steps of the method described in the fifth aspect are implemented.
第十二方面,提供了一种第二节点,包括处理器及通信接口,其中,所述通信接口用于向第一节点发送第一消息,所述第一消息用于指示侦听终端的感知数据;从所述第一节点接收所述终端的感知数据。In the twelfth aspect, a second node is provided, comprising a processor and a communication interface, wherein the communication interface is used to send a first message to the first node, wherein the first message is used to indicate perception data of a listening terminal; and receive perception data of the terminal from the first node.
第十三方面,提供了一种合法侦听系统,包括:第一节点、终端及第二节点,所述第一节点可用于执行如第一方面所述的侦听方法的步骤,所述终端可用于执行如第三方面所述的侦听方法的步骤,所述第二节点可用于执行如第五方面所述的侦听方法的步骤。In the thirteenth aspect, a lawful interception system is provided, comprising: a first node, a terminal and a second node, wherein the first node can be used to execute the steps of the interception method as described in the first aspect, the terminal can be used to execute the steps of the interception method as described in the third aspect, and the second node can be used to execute the steps of the interception method as described in the fifth aspect.
第十四方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤,或者实现如第三方面所述的方法的步骤,或者实现如第五方面所述的方法的步骤。In the fourteenth aspect, a readable storage medium is provided, on which a program or instruction is stored. When the program or instruction is executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method described in the third aspect are implemented, or the steps of the method described in the fifth aspect are implemented.
第十五方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法的步骤,或实现如第三方面所述的方法的步骤,或者实现如第五方面所述的方法的步骤。In the fifteenth aspect, a chip is provided, comprising a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run a program or instructions to implement the steps of the method described in the first aspect, or to implement the steps of the method described in the third aspect, or to implement the steps of the method described in the fifth aspect.
第十六方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现如第一方面所述的方法的步骤,或实现如第三方面所述的方法的步骤,或者实现如第五方面所述的方法的步骤。In the sixteenth aspect, a computer program/program product is provided, wherein the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the steps of the method described in the first aspect, or the steps of the method described in the third aspect, or the steps of the method described in the fifth aspect.
在本申请实施例中,通过第一节点接收第一消息,所述第一消息用于指示侦听终端的感知数据;所述第一节点根据所述第一消息获取所述终端的感知数据;所述第一节点向第二节点发送所述终端的感知数据,也即通过第一节点获取所需侦听的终端的感知数据并发送给第二节点,这样可以较为简便的实现第二节点对终端的感知数据的侦听,提高第二节点侦听终端的感知数据的便捷性。In an embodiment of the present application, a first message is received by a first node, and the first message is used to indicate the perception data of the listening terminal; the first node obtains the perception data of the terminal according to the first message; the first node sends the perception data of the terminal to the second node, that is, the perception data of the terminal to be listened to is obtained through the first node and sent to the second node, so that the second node can more easily listen to the perception data of the terminal, thereby improving the convenience of the second node listening to the perception data of the terminal.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1是本申请实施例可应用的一种无线通信系统的框图;FIG1 is a block diagram of a wireless communication system to which an embodiment of the present application can be applied;
图2是本申请实施例提供的六种感知方式的示意图;FIG2 is a schematic diagram of six sensing methods provided in an embodiment of the present application;
图3是本申请实施例提供的合法侦听架构的示意图;FIG3 is a schematic diagram of a lawful interception architecture provided in an embodiment of the present application;
图4是本申请实施例提供的一种侦听方法的流程图;FIG4 is a flow chart of a monitoring method provided in an embodiment of the present application;
图5是本申请实施例提供的另一种侦听方法的流程图;FIG5 is a flow chart of another monitoring method provided in an embodiment of the present application;
图6是本申请实施例提供的另一种侦听方法的流程图;FIG6 is a flow chart of another monitoring method provided in an embodiment of the present application;
图7是本申请实施例提供的一种侦听装置的结构图; FIG7 is a structural diagram of a listening device provided in an embodiment of the present application;
图8是本申请实施例提供的另一种侦听装置的结构图;FIG8 is a structural diagram of another listening device provided in an embodiment of the present application;
图9是本申请实施例提供的另一种侦听装置的结构图;FIG9 is a structural diagram of another listening device provided in an embodiment of the present application;
图10是本申请实施例提供的通信设备的结构图;FIG10 is a structural diagram of a communication device provided in an embodiment of the present application;
图11是本申请实施例提供的第一节点的结构图;FIG11 is a structural diagram of a first node provided in an embodiment of the present application;
图12是本申请实施例提供的终端的结构图;FIG12 is a structural diagram of a terminal provided in an embodiment of the present application;
图13是本申请实施例提供的第二节点的结构图。FIG. 13 is a structural diagram of a second node provided in an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。The following will be combined with the drawings in the embodiments of the present application to clearly describe the technical solutions in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in the present application, all other embodiments obtained by ordinary technicians in this field belong to the scope of protection of this application.
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。The terms "first", "second", etc. in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It should be understood that the terms used in this way are interchangeable under appropriate circumstances, so that the embodiments of the present application can be implemented in an order other than those illustrated or described here, and the objects distinguished by "first" and "second" are generally of the same type, and the number of objects is not limited. For example, the first object can be one or more. In addition, "and/or" in the specification and claims represents at least one of the connected objects, and the character "/" generally represents that the objects associated with each other are in an "or" relationship.
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,如第6代(6th Generation,6G)通信系统。It is worth noting that the technology described in the embodiments of the present application is not limited to the Long Term Evolution (LTE)/LTE-Advanced (LTE-A) system, but can also be used in other wireless communication systems, such as Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Orthogonal Frequency Division Multiple Access (OFDMA), Single-carrier Frequency Division Multiple Access (SC-FDMA) and other systems. The terms "system" and "network" in the embodiments of the present application are often used interchangeably, and the described technology can be used for the above-mentioned systems and radio technologies as well as other systems and radio technologies. The following description describes a new radio (NR) system for example purposes, and NR terms are used in most of the following descriptions, but these technologies can also be applied to applications other than NR system applications, such as the 6th Generation (6G) communication system.
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11、第一节点12和第二节点13。其中,终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴式设备(Wearable Device)、车载设备(Vehicle User Equipment,VUE)、行人终端(Pedestrian User Equipment,PUE)、智能家居(具有无线通信功能的家居设备,如冰箱、电视、洗衣机或者家具等)、游戏机、个人计算机(personal  computer,PC)、柜员机或者自助机等终端侧设备,可穿戴式设备包括:智能手表、智能手环、智能耳机、智能眼镜、智能首饰(智能手镯、智能手链、智能戒指、智能项链、智能脚镯、智能脚链等)、智能腕带、智能服装等。需要说明的是,在本申请实施例并不限定终端11的具体类型。FIG1 shows a block diagram of a wireless communication system applicable to an embodiment of the present application. The wireless communication system includes a terminal 11, a first node 12, and a second node 13. The terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a handheld computer, a netbook, an ultra-mobile personal computer (ultra-mobile personal computer, UMPC), a mobile Internet device (Mobile Internet Device, MID), an augmented reality (augmented reality, AR)/virtual reality (virtual reality, VR) device, a robot, a wearable device (Wearable Device), a vehicle user equipment (VUE), a pedestrian terminal (Pedestrian User Equipment, PUE), a smart home (home equipment with wireless communication function, such as a refrigerator, a television, a washing machine or furniture, etc.), a game console, a personal computer (personal The terminal side devices include: computer, PC), ATM or self-service machine, and wearable devices include: smart watches, smart bracelets, smart headphones, smart glasses, smart jewelry (smart bracelets, smart bracelets, smart rings, smart necklaces, smart anklets, smart anklets, etc.), smart wristbands, smart clothing, etc. It should be noted that the specific type of the terminal 11 is not limited in the embodiment of the present application.
上述第一节点12可以包括网络侧设备,网络侧设备可以包括接入网设备或核心网设备或通信服务提供商的服务功能等,其中,接入网设备也可以称为无线接入网设备、无线接入网(Radio Access Network,RAN)、无线接入网功能或无线接入网单元。接入网设备可以包括基站、无线局域网(Wireless Local Area Networks,WLAN)接入点或WiFi节点等,基站可被称为节点B、演进节点B(eNB)、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、家用B节点、家用演进型B节点、发送接收点(Transmission Reception Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例进行介绍,并不限定基站的具体类型。核心网设备可以包含但不限于如下至少一项:核心网节点、核心网功能、移动管理实体(Mobility Management Entity,MME)、接入移动管理功能(Access and Mobility Management Function,AMF)、会话管理功能(Session Management Function,SMF)、用户平面功能(User Plane Function,UPF)、策略控制功能(Policy Control Function,PCF)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)、边缘应用服务发现功能(Edge Application Server Discovery Function,EASDF)、统一数据管理(Unified Data Management,UDM),统一数据仓储(Unified Data Repository,UDR)、归属用户服务器(Home Subscriber Server,HSS)、集中式网络配置(Centralized network configuration,CNC)、网络存储功能(Network Repository Function,NRF),网络开放功能(Network Exposure Function,NEF)、本地NEF(Local NEF,或L-NEF)、绑定支持功能(Binding Support Function,BSF)、应用功能(Application Function,AF)等。需要说明的是,在本申请实施例中仅以NR系统中的核心网设备为例进行介绍,并不限定核心网设备的具体类型。上述通信服务提供商的服务功能可以包括但不限于IP多媒体子系统(IP Multimedia Subsystem,IMS)、定位服务(location service)功能等。上述第二节点13可以包括但不限于合法侦听节点(例如,执法机构(Law Enforcement Agency,LEA)、执法监听设备(Law Enforcement Monitoring Facility,LEMF)等)或者核心网网络功能中负责接收合法侦听节点消息的网络功能,例如,包括合法侦听点的AMF、IMS等。The first node 12 may include a network side device, and the network side device may include an access network device or a core network device or a service function of a communication service provider, etc., wherein the access network device may also be referred to as a wireless access network device, a wireless access network (Radio Access Network, RAN), a wireless access network function or a wireless access network unit. The access network device may include a base station, a wireless local area network (Wireless Local Area Networks, WLAN) access point or a WiFi node, etc. The base station may be referred to as a node B, an evolved node B (eNB), an access point, a base transceiver station (Base Transceiver Station, BTS), a radio base station, a radio transceiver, a basic service set (Basic Service Set, BSS), an extended service set (Extended Service Set, ESS), a home B node, a home evolved B node, a transmission reception point (Transmission Reception Point, TRP) or other appropriate terms in the field, as long as the same technical effect is achieved, the base station is not limited to a specific technical vocabulary, and it should be noted that in the embodiment of the present application, only the base station in the NR system is used as an example for introduction, and the specific type of the base station is not limited. The core network equipment may include but is not limited to at least one of the following: core network nodes, core network functions, mobility management entity (Mobility Management Entity, MME), access mobility management function (Access and Mobility Management Function, AMF), session management function (Session Management Function, SMF), user plane function (User Plane Function, UPF), policy control function (Policy Control Function, PCF), policy and charging rules function unit (Policy and Charging Rules Function, PCRF), edge application service discovery function (Edge Application Server Discovery ... user plane function (User Plane Function, UPF), user plane function (User Plane Function, UPF), user plane function (User Plane Function, UPF), user plane function (User Plane Function, UPF), user plane function (User Plane Function, UPF), user plane function (User Plane Function, UPF), user plane function (User Plane Function, UPF), user plane function (User Plane Function, UPF), user plane function (User Plane Function, UPF), user plane function (User Plane Function, UPF), user ion, EASDF), Unified Data Management (UDM), Unified Data Repository (UDR), Home Subscriber Server (HSS), Centralized network configuration (CNC), Network Repository Function (NRF), Network Exposure Function (NEF), Local NEF (or L-NEF), Binding Support Function (BSF), Application Function (AF), etc. It should be noted that in the embodiments of the present application, only the core network equipment in the NR system is introduced as an example, and the specific type of the core network equipment is not limited. The service functions of the above-mentioned communication service provider may include but are not limited to IP Multimedia Subsystem (IMS), location service functions, etc. The above-mentioned second node 13 may include but is not limited to a lawful interception node (for example, a law enforcement agency (Law Enforcement Agency, LEA), a law enforcement monitoring facility (Law Enforcement Monitoring Facility, LEMF), etc.) or a network function in the core network network function responsible for receiving messages from the lawful interception node, for example, AMF, IMS, etc. including a lawful interception point.
为了方便理解,以下对本申请实施例涉及的一些内容进行说明:For ease of understanding, some contents involved in the embodiments of the present application are described below:
一、通信感知一体化:1. Communication and perception integration:
通信感知一体化即在同一系统中通过频谱共享与硬件共享,实现通信、感知功能一体化设计,系统在进行信息传递的同时,能够感知方位、距离、速度等信息,对目标设备或 事件进行检测、跟踪、识别,通信系统与感知系统相辅相成,实现整体性能上的提升并带来更好的服务体验。Communication and perception integration means realizing the integrated design of communication and perception functions through spectrum sharing and hardware sharing in the same system. While transmitting information, the system can sense information such as direction, distance, speed, etc. Events are detected, tracked, and identified. The communication system and the perception system complement each other to achieve overall performance improvements and bring a better service experience.
未来移动通信系统,例如,超5代(Beyond 5G,B5G)移动通信系统或第6代(6th Generation,6G)通信系统等,除了具备通信能力外,还将具备感知能力。感知能力,即具备感知能力的一个或多个设备,能够通过无线信号的发送和接收,来感知目标物体的方位、距离、速度等信息,或者对目标物体、事件或环境等进行检测、跟踪、识别、成像等。未来随着毫米波、太赫兹等具备高频段大带宽能力的小基站在6G网络的部署,感知的分辨率相比厘米波将明显提升,从而使得6G网络能够提供更精细的感知服务。典型的感知功能与应用场景如表1所示。In addition to communication capabilities, future mobile communication systems, such as Beyond 5G (B5G) mobile communication systems or 6th Generation (6G) communication systems, will also have perception capabilities. Perception capability refers to the ability of one or more devices with perception capabilities to perceive the direction, distance, speed and other information of target objects through the transmission and reception of wireless signals, or to detect, track, identify and image target objects, events or environments. In the future, with the deployment of small base stations with high-frequency band and large bandwidth capabilities such as millimeter waves and terahertz in 6G networks, the perception resolution will be significantly improved compared to centimeter waves, enabling 6G networks to provide more sophisticated perception services. Typical perception functions and application scenarios are shown in Table 1.
上述感知业务的服务质量要求的表述各不相同,例如智能交通、高精地图等感知通常以感知范围、距离分辨率、角度分辨率、速度分辨率和时延等来表达;飞行入侵检测感知通常以覆盖高度、感知精度、感知时延来表达;呼吸监测以感知距离、感知实时性、感知分辨率和感知精度来表达;室内入侵检测以感知距离、感知实时性、检测概率和虚警概率来表达;手势/姿态识别以感知距离、感知实时性、感知精度来表达。The service quality requirements of the above-mentioned perception services are expressed differently. For example, perception of intelligent transportation, high-precision maps, etc. is usually expressed in terms of perception range, distance resolution, angle resolution, speed resolution, and latency; flight intrusion detection perception is usually expressed in terms of coverage height, perception accuracy, and perception latency; respiratory monitoring is expressed in terms of perception distance, perception real-time, perception resolution, and perception accuracy; indoor intrusion detection is expressed in terms of perception distance, perception real-time, detection probability, and false alarm probability; gesture/posture recognition is expressed in terms of perception distance, perception real-time, and perception accuracy.
上述感知业务的服务请求方式各不相同,例如基于静态区域的服务请求,以某个坐标系表示需感知内容的地理位置区域;基于动态区域的服务请求,以某个UE周围M米表示需要感知内容的地理位置范围,M为正数;某个动态目标的连续感知服务请求,以某个已检测和持续位置追踪的目标表示需要感知内容的感知目标。The service request methods of the above-mentioned perception services are different. For example, in a service request based on a static area, a certain coordinate system is used to represent the geographical location area of the content to be perceived; in a service request based on a dynamic area, M meters around a certain UE is used to represent the geographical location range of the content to be perceived, where M is a positive number; in a continuous perception service request for a dynamic target, a target that has been detected and continuously tracked is used to represent the perception target of the content to be perceived.
表1
Table 1
二、从无线链路划分的感知方式:2. Perception method based on wireless link classification:
如图2所示,根据感知信号发送和接收方式的不同,具体主要分为基站自发自收、基站间协作感知、终端发基站收、基站发终端收、终端自发自收以及终端间协作感知六种感知方式(即图中的1至6所指示的六种感知方式)。通常感知信号接收节点对所接收的感知信号进行测量,并上报测量结果给目标节点,目标节点负责基于感知测量结果计算感知 结果,示例性的,该目标节点可以是感知功能。As shown in Figure 2, according to the different ways of sending and receiving the perception signal, there are six perception modes, namely, base station self-transmission and self-reception, base station cooperative perception, terminal transmission and base station reception, base station transmission and terminal reception, terminal self-transmission and self-reception, and terminal cooperative perception (i.e., the six perception modes indicated by 1 to 6 in the figure). Usually, the perception signal receiving node measures the received perception signal and reports the measurement result to the target node. The target node is responsible for calculating the perception signal based on the perception measurement result. As a result, illustratively, the target node may be a sensing function.
三、合法侦听架构和功能:3. Lawful Interception Architecture and Functionality
相关技术中合法侦听主要面向通信服务提供商现有的服务范围(如语音、数据包、消息和目标定位),采用基于网络层侦听(network layer based interception)和基于服务层侦听(service layer based interception)获取所需侦听的用户设备(User Equipment,UE)的数据。network layer based interception是从核心网网络功能(例如,AMF,SMF/UPF等)的侦听点获取所需侦听的数据,service layer based interception是从通信服务提供商的服务功能(例如,IMS,location service等)的侦听点获取所需侦听数据。In the related technologies, lawful interception is mainly aimed at the existing service scope of communication service providers (such as voice, data packets, messages and target positioning), and adopts network layer based interception (network layer based interception) and service layer based interception (service layer based interception) to obtain the required intercepted user equipment (User Equipment, UE) data. Network layer based interception is to obtain the required intercepted data from the interception point of the core network function (for example, AMF, SMF/UPF, etc.), and service layer based interception is to obtain the required intercepted data from the interception point of the service function (for example, IMS, location service, etc.) of the communication service provider.
相关技术中的合法侦听(lawful interception)架构和功能可以如图3所示,用于通信服务提供商(Communication Service Provider)满足合法侦听的需求。主要包括检测目标通信,从目标通信中获取侦听相关信息(Intercept Related Information,IRI)或通信内容(Communication Content,CC),发送侦听相关信息或通信内容给合法侦听节点。根据所需侦听的内容,侦听点(Point Of Interception,POI)可以位于所需的网络功能和服务功能,例如,AMF,SMF/UPF,UDM,NRF,NEF,短信服务功能(Short Message Service Function,SMSF),IMS等。The lawful interception architecture and functions in the related technology can be shown in Figure 3, which is used by the Communication Service Provider to meet the needs of lawful interception. It mainly includes detecting the target communication, obtaining intercept related information (IRI) or communication content (CC) from the target communication, and sending the intercept related information or communication content to the lawful interception node. According to the content to be intercepted, the interception point (POI) can be located at the required network function and service function, such as AMF, SMF/UPF, UDM, NRF, NEF, Short Message Service Function (SMSF), IMS, etc.
如图3所示,合法侦听节点(如LEA)发送搜查令(Warrant)以及如下信息给通信服务提供商(Communication Service Provider,CSP),例如,通信服务提供商的管理功能(Administration Function,ADMF),该ADMF可以包括合法侦听提供功能(Lawful Interception Provisioning Function,LIPF)和合法侦听控制功能(Lawful Interception Control Function,LICF),通信服务提供商通过对应的网络功能(即POI)提供合法侦听数据并经由调解和交付功能(Mediation and Delivery Function,MDF)传递给LEMF。从如下信息列表可以看出合法侦听所侦听的服务范围主要包括语音、数据包、消息和目标定位。As shown in Figure 3, the lawful interception node (such as LEA) sends a search warrant and the following information to the communication service provider (CSP), for example, the communication service provider's administration function (ADMF), which may include the lawful interception provisioning function (LIPF) and the lawful interception control function (LICF). The communication service provider provides the lawful interception data through the corresponding network function (i.e., POI) and passes it to the LEMF via the mediation and delivery function (MDF). From the following information list, it can be seen that the service scope intercepted by the lawful interception mainly includes voice, data packets, messages and target positioning.
目标标识(Target identifier):用于标识被侦听的通信(used to identify the communications to be intercepted);Target identifier: used to identify the communications to be intercepted;
侦听类型(Type of intercept):用于指示是否是仅IRI(IRI only),或者仅CC(CC only),或者IRI和CC(both IRI and CC)传输给执法监听设备(Law Enforcement Monitoring Facility,LEMF);Type of intercept: used to indicate whether only IRI, only CC, or both IRI and CC are transmitted to the Law Enforcement Monitoring Facility (LEMF);
服务范围(Service scoping):用于标识将被侦听的服务(例如,语音,数据包,消息,目标位置);Service scoping: used to identify the service to be intercepted (e.g., voice, packet, messaging, target location);
过滤条件(Filtering criteria):用于为侦听提供额外的信息,例如,带宽优化等Filtering criteria: used to provide additional information for interception, such as bandwidth optimization, etc.
LEMF地址(LEMF address):用于传输侦听数据(Interception Product);LEMF address: used to transmit interception data (Interception Product);
合法侦听标识(Lawful Interception Identifier,LIID):用于关联已发布的搜查令(Warrant)和侦听数据(Interception Product)。Lawful Interception Identifier (LIID): Used to associate issued search warrants (Warrant) and interception data (Interception Product).
上述目标标识可以包括用户永久标识符(Subscription Permanent Identifier,SUPI)、永久设备标识符(Permanent Equipment Identifier,PEI)或通用公共用户标识(Generic Public  Subscription Identifier,GPSI)等。The target identifier may include a Subscription Permanent Identifier (SUPI), a Permanent Equipment Identifier (PEI), or a Generic Public User Identifier (GPUI). Subscription Identifier, GPSI) etc.
其中,上述PEI用来为第三代合作计划(3rd Generation Partnership Project,3GPP)UE进入5G系统,如果UE支持至少一种3GPP接入技术(即下一代无线接入网(Next Generation Radio Access Network,NG-RAN)/5G,演进的通用陆基无线接入网(Evolved Universal Terrestrial Radio Access Network,E-UTRAN)/4G,UTRAN/3G,GSM/EDGE无线接入网络(GSM EDGE Radio Access Network,GERAN)/EDGE/2.5G),则必须为UE分配国际移动设备识别码(International Mobile Equipment Identity,IMEI)或国际移动设备识别码软件版本(International Mobile Equipment Identity Software Version,MEISV)格式的PEI。Among them, the above-mentioned PEI is used for the 3rd Generation Partnership Project (3GPP) UE to enter the 5G system. If the UE supports at least one 3GPP access technology (i.e., Next Generation Radio Access Network (NG-RAN)/5G, Evolved Universal Terrestrial Radio Access Network (E-UTRAN)/4G, UTRAN/3G, GSM/EDGE Radio Access Network (GSM EDGE Radio Access Network, GERAN)/EDGE/2.5G), the UE must be assigned PEI in the format of International Mobile Equipment Identity (IMEI) or International Mobile Equipment Identity Software Version (MEISV).
上述GPSI可以用来处理3GPP系统外部不同数据网络(Data Network,DN)中的3GPP用户。3GPP系统在用户数据内存储GPSI和对应的SUPI之间的关联。GPSI可以是移动台国际用户号码(Mobile station International Subscriber Directory Number,MSISDN)、外部IP地址等。The above GPSI can be used to handle 3GPP users in different data networks (DN) outside the 3GPP system. The 3GPP system stores the association between the GPSI and the corresponding SUPI in the user data. The GPSI can be a Mobile Station International Subscriber Directory Number (MSISDN), an external IP address, etc.
四、移动通信网络的定位服务4. Positioning services in mobile communication networks
当前移动通信网络的定位服务包括三种情况:1)UE自己定位自己,2)外部服务器/客户端的应用功能定位UE,3)网络内部网元定位UE。网络内部定位流程上,通过定位管理功能(Location Management Function,LMF)与基站和/或UE之间的交互,基于上行或下行测量获得UE位置信息。根据上述信息,可以发现相关技术中定位服务是与目标定位UE紧密相关的,而且目标UE定位需要目标UE配合发送信号或测量。对于定位相关的侦听,一方面是基于网络层侦听(network layer based interception),从AMF上获取UE和LMF之间,以及gNB和LMF之间所交互的与某个目标UE(target UE)相关的定位消息,另一方面是基于服务层侦听(service layer based interception),包括UE在进行某一项网络服务时(例如,NR承载语音(Voice over New Radio,VoNR))提供位置报告(移动网络小区ID,地理坐标等),以及合法侦听功能调用LMF获得目标UE位置信息(核心是覆盖UE隐私(override UE privacy))。因此,定位侦听可包括对定位目标UE的定位测量数据、网络可提供的UE位置信息数据作为其它侦听数据的标签数据/辅助数据,以及合法侦听节点在无需UE授权情况下调用定位服务获取位置数据。The current positioning services of mobile communication networks include three situations: 1) UE positioning itself, 2) external server/client application functions positioning UE, and 3) network elements positioning UE. In the internal positioning process of the network, the UE location information is obtained based on uplink or downlink measurements through the interaction between the Location Management Function (LMF) and the base station and/or UE. Based on the above information, it can be found that the positioning service in the relevant technology is closely related to the target positioning UE, and the target UE positioning requires the target UE to cooperate in sending signals or measurements. For positioning-related interception, on the one hand, it is based on network layer interception, obtaining positioning messages related to a target UE (target UE) exchanged between UE and LMF, and between gNB and LMF from AMF, and on the other hand, it is based on service layer interception, including UE providing location report (mobile network cell ID, geographic coordinates, etc.) when performing a certain network service (for example, Voice over New Radio (VoNR)), and the lawful interception function calling LMF to obtain the target UE location information (the core is to override UE privacy). Therefore, positioning interception may include positioning measurement data for the positioning target UE, UE location information data that can be provided by the network as tag data/auxiliary data for other interception data, and the lawful interception node calling the positioning service to obtain location data without UE authorization.
五、感知服务质量(Quality of Service,QoS)5. Perceived Quality of Service (QoS)
上述感知QoS包括如表2中至少一项感知性能指标和对应的信息(如数值要求等)。The above-mentioned perceived QoS includes at least one perceived performance indicator and corresponding information (such as numerical requirements, etc.) as shown in Table 2.
表2感知性能指标及其对应

Table 2 Perception performance indicators and their corresponding

六、感知测量量6. Perceptual Measurement
一种可选的分类方式是将感知测量量分为以下4类(本说明侧重于说明测量量,也可以分为3类或不分类等,4类仅做示意)。根据感知测量量与感知业务的关系,下述第三级测量量和第四级测量量通常也可被称为感知结果,下述第二级测量量和/或第一级测量量也可被称为感知测量数据。An optional classification method is to classify the perception measurement quantity into the following 4 categories (this description focuses on describing the measurement quantity, which can also be divided into 3 categories or unclassified, etc., and the 4 categories are only for illustration). According to the relationship between the perception measurement quantity and the perception service, the following third-level measurement quantity and fourth-level measurement quantity may also be generally referred to as perception results, and the following second-level measurement quantity and/or first-level measurement quantity may also be referred to as perception measurement data.
第一级测量量:即接收信号/原始信道信息,包括:接收信号/信道响应复数结果,幅度/相位,I路/Q路及其运算结果(运算包括加减乘除、矩阵加减乘、矩阵转置、三角关系运算、平方根运算和幂次运算等,以及上述运算结果的门限检测结果、最大/最小值提取结果等;运算还包括快速傅里叶变换(Fast Fourier Transform,FFT)/快速傅里叶逆变换(Inverse Fast Fourier Transform,IFFT)、离散傅里叶变换(Discrete Fourier Transform,DFT)/离散傅里叶逆变换(Inverse Discrete Fourier Transform,IDFT)、二维傅里叶变换(Two-Dimensional Discrete Fourier Transform,2D-FFT)、三维傅里叶变换(Three-Dimensional Discrete Fourier Transform,3D-FFT)、匹配滤波、自相关运算、小波变换和数字滤波等,以及上述运算结果的门限检测结果、最大/最小值提取结果等);The first level of measurement quantity: that is, the received signal/original channel information, including: the complex result of the received signal/channel response, amplitude/phase, I-channel/Q-channel and its operation results (operations include addition, subtraction, multiplication and division, matrix addition, subtraction, multiplication, matrix transposition, trigonometric relationship operations, square root operations and power operations, as well as the threshold detection results of the above operation results, maximum/minimum value extraction results, etc.; operations also include Fast Fourier Transform (FFT)/Inverse Fast Fourier Transform (IFFT), Discrete Fourier Transform (Discrete Fourier Transform, FFT), and Inverse Fast Fourier Transform (IFFT). Fourier transform (DFT), inverse discrete Fourier transform (IDFT), two-dimensional Fourier transform (2D-FFT), three-dimensional Fourier transform (3D-FFT), matched filtering, autocorrelation operation, wavelet transform and digital filtering, as well as threshold detection results, maximum/minimum value extraction results of the above operation results, etc.);
第二级测量量:即基本测量量,包括:时延、多普勒、角度、信号强度,及其多维组合表示等;Second-level measurement quantity: basic measurement quantity, including delay, Doppler, angle, signal strength, and their multi-dimensional combination representation;
第三级测量量:即基本属性/状态,包括:距离、速度、角度/朝向、雷达截面积(Radar Cross-section,RCS)、加速度等;Level 3 measurement: basic attributes/states, including distance, speed, angle/direction, radar cross-section (RCS), acceleration, etc.
第四级测量量:即进阶属性/状态,包括:空间位置、目标是否存在、轨迹、动作、表情、生命体征、数量、成像结果、天气、空气质量、形状、材质、成分等。The fourth level of measurement: that is, advanced attributes/states, including: spatial position, target presence, trajectory, movement, expression, vital signs, quantity, imaging results, weather, air quality, shape, material, composition, etc.
七、感知功能(Sensing Function,SF)节点7. Sensing Function (SF) Node
上述感知功能节点可以包括如下至少一项功能:The above-mentioned perception function node may include at least one of the following functions:
接收感知服务请求,根据感知服务请求确定所需的感知测量量;receiving a sensing service request, and determining a required sensing measurement quantity according to the sensing service request;
接收感知测量结果(即感知测量量的值),其中感知测量量为第一级测量量和/或第二 级测量量,产生感知结果(第三级测量量),响应感知服务请求,在本申请中将这一功能称为基础感知功能节点;Receive a perceptual measurement result (i.e., a value of a perceptual measurement quantity), wherein the perceptual measurement quantity is a first-level measurement quantity and/or a second-level measurement quantity. The first-level measurement quantity generates a perception result (third-level measurement quantity) and responds to the perception service request. In this application, this function is referred to as a basic perception function node;
接收所述第三级测量量的感知测量结果,产生感知结果(第四级测量量),响应感知服务请求,在本申请中将这一功能从称为衍生感知功能节点;Receive the sensing measurement result of the third-level measurement quantity, generate a sensing result (fourth-level measurement quantity), and respond to the sensing service request. In this application, this function is referred to as a derived sensing function node;
接收感知测量结果(即感知测量量的值),其中感知测量量为第一级测量量和/或第二级测量量和/或第三级测量量,产生感知结果(第四级测量量),响应感知服务请求,在本申请中将这一功能称为综合感知功能节点;Receive a sensing measurement result (i.e., a value of a sensing measurement quantity), where the sensing measurement quantity is a first-level measurement quantity and/or a second-level measurement quantity and/or a third-level measurement quantity, generate a sensing result (a fourth-level measurement quantity), and respond to a sensing service request. In this application, this function is referred to as a comprehensive sensing function node;
感知服务质量(QoS)的控制,即面向感知服务质量要求,对感知相关节点的进行控制,从而满足感知服务QoS要求;The control of perceived quality of service (QoS) is to control the perception-related nodes in order to meet the perceived service QoS requirements;
确定感知信号发送或接收节点或感知辅助节点,移动通信系统中的感知信号发送或接收节点包括网络设备(如基站)和用户设备UE(如手机)。其中感知辅助节点指用于提供感知辅助的信息如其它传感器等的感知信息,地理位置信息等用于提升无线感知的性能;Determine the sensing signal sending or receiving node or sensing auxiliary node. The sensing signal sending or receiving node in the mobile communication system includes network equipment (such as base stations) and user equipment UE (such as mobile phones). The sensing auxiliary node refers to the information used to provide sensing assistance, such as sensing information of other sensors, geographic location information, etc., which is used to improve the performance of wireless sensing;
确定感知链路或感知方式,其中感知链路可以包括Uu链路(基站发/UE收或基站收/UE发),sidelink(UE间收发),回波链路(基站自发自收,UE自发自收),基站间收发链路(基站间收发);感知方式可以包括基站发UE收,UE发基站收,基站自发自收,UE间收发,基站间收发,UE自发自收;Determine a sensing link or sensing mode, where the sensing link may include a Uu link (base station sending/UE receiving or base station receiving/UE sending), a sidelink (transmitting and receiving between UEs), an echo link (base station sending and receiving autonomously, UE sending and receiving autonomously), and a base station sending and receiving link (transmitting and receiving between base stations); the sensing mode may include base station sending and UE receiving, UE sending and base station receiving, base station sending and receiving autonomously, transmitting and receiving between UEs, transmitting and receiving between base stations, and UE sending and receiving autonomously;
确定感知信号,潜在的感知信号包括参考信号和数据信号,其中参考信号可以为通信参考信号或感知专用参考信号;Determine a perception signal, where potential perception signals include reference signals and data signals, where the reference signal may be a communication reference signal or a perception-specific reference signal;
确定感知所使用的时频资源,潜在的感知资源包括通信中未使用的时频资源(如保护带),共用通信中已使用的时频资源(如参考信号或数据信号),感知专用的时频资源。进一步还需确定感知信号的配置,潜在的配置包括感知信号的时、频和空域资源信息。如果确定感知时频资源的节点不是感知信号的发送节点,那么向感知信号发送节点发送感知信号配置;Determine the time-frequency resources used for perception. Potential perception resources include time-frequency resources not used in communication (such as guard bands), time-frequency resources used in shared communication (such as reference signals or data signals), and time-frequency resources dedicated to perception. Further, it is necessary to determine the configuration of the perception signal. Potential configurations include time, frequency, and spatial resource information of the perception signal. If it is determined that the node that perceives the time-frequency resource is not the sending node of the perception signal, then send the perception signal configuration to the node that sends the perception signal;
确定感知测量量的配置,潜在的配置包括需测量的感知信号指示、需测量的感知信号数量或时间、测量结果的上报指示等。如果确定感知测量量配置的节点不是感知信号的接收和测量节点,那么向感知信号接收节点发送感知测量量配置;Determine the configuration of the perception measurement quantity, where the potential configuration includes an indication of the perception signal to be measured, the number or time of the perception signal to be measured, an indication of reporting the measurement result, etc. If it is determined that the node for configuring the perception measurement quantity is not a receiving and measuring node of the perception signal, then send the perception measurement quantity configuration to the perception signal receiving node;
确定和配置感知测量结果上报的传输通道,包括建立、修改或释放传输通道等;Determine and configure the transmission channel for reporting perception measurement results, including establishing, modifying or releasing the transmission channel;
确定AMF,当网络侧设备根据所请求感知服务的地理范围和感知功能节点所提供感知服务的地理范围确定了感知功能节点后,在如下至少一种情况下感知功能解节点需确定AMF:1)当UE为感知信号发送节点或感知信号接收节点或感知辅助节点时感知目标为某个UE时,感知功能节点基于所需感知的地理区域,以及根据从NRF请求的AMF的跟踪区域标识(Tracking Area Identity,TAI),和/或AMF标识(ID)/位置(location)等选择AMF;2)当感知数据需经AMF传输(例如定义为NAS消息或者NAS层作为感知数据的传输承载协议层)时,感知功能节点基于所需传输数据的感知节点地理位置信息(如TA等),以及根据从NRF请求的AMF的TAI,和/或AMF ID/location等选择AMF;3) 当感知目标是3GPP UE时,感知功能节点根据UE标识(如AMF UE下一代应用协议(Next Generation Application Protocol,NGAP)ID)等确定AMF。Determine AMF. After the network-side device determines the perception function node according to the geographical scope of the requested perception service and the geographical scope of the perception service provided by the perception function node, the perception function node needs to determine AMF in at least one of the following cases: 1) When the UE is a perception signal sending node, a perception signal receiving node or a perception auxiliary node, and the perception target is a certain UE, the perception function node selects AMF based on the required geographical area to be perceived, and the Tracking Area Identity (TAI) of the AMF requested from the NRF, and/or the AMF ID/location, etc.; 2) When the perception data needs to be transmitted via the AMF (for example, defined as a NAS message or the NAS layer as the transmission bearer protocol layer of the perception data), the perception function node selects AMF based on the geographical location information of the perception node for the required transmission data (such as TA, etc.), and the TAI of the AMF requested from the NRF, and/or the AMF ID/location, etc.; 3) When the perception target is a 3GPP UE, the perception function node determines the AMF based on the UE identifier (such as the AMF UE Next Generation Application Protocol (NGAP) ID).
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的侦听方法进行详细地说明。The following describes in detail the interception method provided in the embodiment of the present application through some embodiments and their application scenarios in combination with the accompanying drawings.
请参见图4,图4是本申请实施例提供的一种侦听方法的流程图,该方法可以由第一节点执行,如图4所示,包括以下步骤:Please refer to FIG. 4 , which is a flowchart of a monitoring method provided in an embodiment of the present application. The method can be executed by a first node, as shown in FIG. 4 , and includes the following steps:
步骤401、第一节点接收第一消息,所述第一消息用于指示侦听终端的感知数据。Step 401: A first node receives a first message, where the first message is used to indicate perception data of a monitoring terminal.
上述第一节点可以包括但不限于基站、SF、AMF、UDM、NRF、NEF、UPF、SMSF或IMS等。可选的,第一节点可以从合法侦听节点(例如,LEA、LEMF等)或者核心网网络功能中负责接收合法侦听节点消息的网络功能(例如,AMF、IMS等)接收第一消息。The above-mentioned first node may include but is not limited to a base station, SF, AMF, UDM, NRF, NEF, UPF, SMSF or IMS, etc. Optionally, the first node may receive the first message from a legal interception node (e.g., LEA, LEMF, etc.) or a network function (e.g., AMF, IMS, etc.) in a core network network function that is responsible for receiving legal interception node messages.
上述第一消息用于指示侦听终端的感知数据,其中,上述终端可以是负责生成感知测量数据和感知结果中的至少一项的终端。实际情况中,终端在负责感知测量数据和感知结果中的至少一项的计算后,可能在终端侧直接使用所述感知测量数据和感知结果中的至少一项(即不需要将终端侧的感知测量数据或结果发送给终端之外的节点),或者通过传输网络提供给应用功能,其中,上述传输网络可以是3GPP网络,也可以是非3GPP网络,例如,有线网络、WIFI网络或局域网等。The above-mentioned first message is used to indicate the perception data of the listening terminal, wherein the above-mentioned terminal may be a terminal responsible for generating at least one of the perception measurement data and the perception result. In actual situations, after the terminal is responsible for calculating at least one of the perception measurement data and the perception result, it may directly use at least one of the perception measurement data and the perception result on the terminal side (that is, there is no need to send the perception measurement data or result on the terminal side to a node outside the terminal), or provide it to the application function through a transmission network, wherein the above-mentioned transmission network may be a 3GPP network or a non-3GPP network, such as a wired network, a WIFI network or a local area network.
上述终端的感知数据可以包括但不限于感知测量数据和感知结果等中的至少一项,其中,上述感知测量数据可以包括上述第一级测量量和第二级测量量中的至少一项,上述感知结果可以包括上述第三级测量量和第四级测量量中的至少一项,在此不做赘述。The perception data of the above-mentioned terminal may include but is not limited to at least one of perception measurement data and perception results, wherein the above-mentioned perception measurement data may include at least one of the above-mentioned first-level measurement quantities and second-level measurement quantities, and the above-mentioned perception result may include at least one of the above-mentioned third-level measurement quantities and fourth-level measurement quantities, which are not repeated here.
步骤402、所述第一节点根据所述第一消息获取所述终端的感知数据。Step 402: The first node obtains perception data of the terminal according to the first message.
示例性的,第一节点可以从终端接收该终端的感知数据,或者可以基于上述终端进行感知所使用的配置信息和感知信号生成该终端的感知数据等。Exemplarily, the first node may receive perception data of the terminal from the terminal, or may generate perception data of the terminal based on configuration information and perception signals used by the terminal for perception, etc.
需要说明的是,上述终端的感知数据可以理解为与上述终端进行感知相关的感知数据,例如,上述终端的感知数据可以包括上述终端进行感知时所生成的感知数据,或者可以包括除上述终端之外的设备基于上述终端进行感知时所使用的配置信息以及感知信号所生成的感知数据,例如,终端A为侦听目标,终端A的感知数据包括终端A所生成的感知数据(如感知测量数据或感知结果),或者包括基站基于终端A进行感知时所使用的配置信息以及感知信号所生成的感知数据。It should be noted that the perception data of the above-mentioned terminal can be understood as perception data related to the perception performed by the above-mentioned terminal. For example, the perception data of the above-mentioned terminal may include the perception data generated by the above-mentioned terminal when performing perception, or may include perception data generated by devices other than the above-mentioned terminal based on the configuration information used by the above-mentioned terminal when performing perception and the perception signal. For example, terminal A is the listening target, and the perception data of terminal A includes the perception data generated by terminal A (such as perception measurement data or perception results), or includes the perception data generated by the base station based on the configuration information used by terminal A when performing perception and the perception signal.
步骤403、所述第一节点向第二节点发送所述终端的感知数据。Step 403: The first node sends the perception data of the terminal to the second node.
上述第二节点可以包括但不限于合法侦听节点(例如,LEA、LEMF等)或者核心网网络功能中负责接收合法侦听节点消息的网络功能,例如,AMF、IMS等。可以理解的是,上述第一节点和第二节点不同,例如,在第一节点为AMF的情况下,上述第二节点可以为LEA或者LEMF等不同于AMF的节点;在第二节点为AMF的情况下,上述第一节点可以为基站、SF、UDM、NRF、NEF、UPF、SMSF或IMS等等不同于AMF的节点。The second node may include but is not limited to a lawful interception node (e.g., LEA, LEMF, etc.) or a network function in the core network network function responsible for receiving messages from the lawful interception node, such as AMF, IMS, etc. It can be understood that the first node and the second node are different. For example, when the first node is AMF, the second node may be a node different from AMF such as LEA or LEMF; when the second node is AMF, the first node may be a base station, SF, UDM, NRF, NEF, UPF, SMSF or IMS, etc., which are nodes different from AMF.
可选的,第一节点可以从第二节点接收上述第一消息,并在获取到终端的感知数据的 情况下,向第二节点发送终端的感知数据,例如,第一节点可以从LEMF获取第一消息,并在获取到终端的感知数据的情况下向LEMF发送终端的感知数据;或者,第一节点可以从第二节点之外的节点接收上述第一消息,并在获取到终端的感知数据的情况下,向第二节点发送终端的感知数据,例如,第一节点可以从AMF接收第一消息,并在获取到终端的感知数据的情况下向LEMF发送终端的感知数据。Optionally, the first node may receive the first message from the second node and obtain the perception data of the terminal. In this case, the perception data of the terminal is sent to the second node. For example, the first node can obtain the first message from the LEMF, and send the perception data of the terminal to the LEMF when the perception data of the terminal is obtained; or, the first node can receive the above-mentioned first message from a node other than the second node, and send the perception data of the terminal to the second node when the perception data of the terminal is obtained. For example, the first node can receive the first message from the AMF, and send the perception data of the terminal to the LEMF when the perception data of the terminal is obtained.
本申请实施例提供的侦听方法可以理解为合法侦听方法,通过第一节点接收第一消息,所述第一消息用于指示侦听终端的感知数据;所述第一节点根据所述第一消息获取所述终端的感知数据;所述第一节点向第二节点发送所述终端的感知数据,这样可以较为简便的实现第二节点对终端的感知数据的侦听,提高第二节点侦听终端的感知数据的便捷性。The listening method provided in the embodiment of the present application can be understood as a legal listening method, in which a first message is received by a first node, and the first message is used to indicate the perception data of the listening terminal; the first node obtains the perception data of the terminal according to the first message; the first node sends the perception data of the terminal to the second node, so that the second node can more easily listen to the perception data of the terminal, thereby improving the convenience of the second node listening to the perception data of the terminal.
可选的,所述第一消息包括目标标识(Target identifier),所述目标标识用于标识所述终端。Optionally, the first message includes a target identifier (Target identifier), and the target identifier is used to identify the terminal.
本实施例中,通过直接在第一消息中携带用于标识所述终端的目标标识,这样第二节点基于目标标识可以快速确定所需侦听的侦听目标,即目标标识所标识的终端。In this embodiment, by directly carrying the target identifier for identifying the terminal in the first message, the second node can quickly determine the interception target to be intercepted based on the target identifier, that is, the terminal identified by the target identifier.
可选的,所述目标标识包括所述终端的临时标识和所述终端的永久标识中的至少一项。Optionally, the target identifier includes at least one of a temporary identifier of the terminal and a permanent identifier of the terminal.
示例性的,上述终端的临时标识可以包括但不限于地理位置标识(如GPS位置标识等)、用户隐藏标识符(Subscription Concealed Identifier,SUCI)、全局唯一的临时标识(Globally Unique Temporary Identifier,GUTI)、RAN UE NGAP ID、AMF UE NGAP ID、无线接入网内的临时标识(如随机接入无线网络临时标识(Random Access Radio Network Temporary Identifier,RA-RNTI),临时小区无线网络临时标识(Temporary Cell Radio Network Temporary Identifier,TC-RNTI),小区无线网络临时标识(Cell Radio Network Temporary Identifier,C-RNTI),配置调度无线网络临时标识(configured scheduling Radio Network Temporary Identifier,CS-RNTI),调制编码方案小区无线网络临时标识(Modulation Coding Scheme Cell Radio Network Temporary Identifier,MCS-C-RNTI)等)和临时移动用户标识(Temporary mobile subscriber Identifier,TMSI)等中的至少一项。其中,上述,SUCI是包含隐藏SUPI的保护隐私标识符。上述GUTI在5G中称为5G GUTI。上述RAN UE NGAP ID用于在gNB内的NG接口上唯一标识UE,在逻辑NG-RAN节点内应该是唯一的,在4G中与此对应的为eNB UE S1应用协议标识(eNB UE S1Application Protocol Identifier,eNB UE S1AP ID)。上述AMF UE NG应用协议标识(Application Protocol Identifier,AMF UE NGAP ID),用于在AMF中标识UE,在4G中与此对应的为MME UE S1应用协议标识(MME UE S1Application Protocol Identifier,MME UE S1AP ID)。Exemplarily, the temporary identifier of the above-mentioned terminal may include, but is not limited to, a geographic location identifier (such as a GPS location identifier, etc.), a subscription concealed identifier (SUCI), a globally unique temporary identifier (GUTI), a RAN UE NGAP ID, an AMF UE NGAP ID, a temporary identifier within a wireless access network (such as a random access radio network temporary identifier (Random Access Radio Network Temporary Identifier, RA-RNTI), a temporary cell radio network temporary identifier (Temporary Cell Radio Network Temporary Identifier, etc.), a global unique temporary identifier (Globally Unique Temporary Identifier, G ... global unique temporary identifier (Globally Unique Temporary Identifier, GUTI), a global unique temporary identifier (Globally Unique Temporary Identifier, tifier, TC-RNTI), Cell Radio Network Temporary Identifier (C-RNTI), configured scheduling Radio Network Temporary Identifier (CS-RNTI), modulation and coding scheme Cell Radio Network Temporary Identifier (Modulation Coding Scheme Cell Radio Network Temporary Identifier, MCS-C-RNTI), etc.) and temporary mobile user identity (Temporary mobile subscriber Identifier, TMSI). Among them, the above-mentioned SUCI is a privacy protection identifier including a hidden SUPI. The above-mentioned GUTI is called 5G GUTI in 5G. The above RAN UE NGAP ID is used to uniquely identify the UE on the NG interface within the gNB. It should be unique within the logical NG-RAN node. In 4G, the corresponding one is the eNB UE S1 Application Protocol Identifier (eNB UE S1AP ID). The above AMF UE NG Application Protocol Identifier (AMF UE NGAP ID) is used to identify the UE in the AMF. In 4G, the corresponding one is the MME UE S1 Application Protocol Identifier (MME UE S1AP ID).
示例性的,上述终端的永久标识可以包括但不限于SUPI、PEI、GPSI(如电话号码等)、IP多媒体私有标识(IP Multimedia Private Identity,IMPI)和IP多媒体公共标识(IP Multimedia Public Identity,IMPU)等中的至少一种。需要说明的是,上述IMPI用于用户接入IMS网络的注册,鉴权,认证和计费,不用于呼叫的寻址和路由,由归属网络运营商定义的用户身份标识,具有全球唯一性,即一个私有标识(即IMPI)对应一个物理终 端。上述IMPI的格式为:用户名@域,例如,+8618652476314@ims.sz.cn。上述IMPU用于会话初始协议(Session initialization Protocol,SIP)消息的路由,一个IMS用户可以分配一个或多个公有用户标识(即IMPU),公有用户标识的格式可以采用SIP URI或者Tel URL的格式。使用IMPU发起会话或作为会话终结者之前,IMPU首先应被注册。其中,IMPU的格式为:SIP URI,例如,“Sip:user1@ims.fj.chinamobile.com”;TEL URI,例如,“Tel:+8613904710100”。Exemplarily, the permanent identification of the terminal may include but is not limited to at least one of SUPI, PEI, GPSI (such as telephone number, etc.), IP Multimedia Private Identity (IMPI) and IP Multimedia Public Identity (IMPU). It should be noted that the IMPI is used for registration, authentication, certification and billing of users accessing the IMS network, and is not used for call addressing and routing. It is a user identity defined by the home network operator and is globally unique, that is, one private identification (IMPI) corresponds to one physical terminal. The format of the above IMPI is: username@domain, for example, +8618652476314@ims.sz.cn. The above IMPU is used for routing Session Initialization Protocol (SIP) messages. An IMS user can be assigned one or more public user identifiers (i.e., IMPUs). The format of the public user identifier can be in the format of SIP URI or Tel URL. Before using the IMPU to initiate a session or act as a session terminator, the IMPU should first be registered. Among them, the format of the IMPU is: SIP URI, for example, "Sip:user1@ims.fj.chinamobile.com"; TEL URI, for example, "Tel:+8613904710100".
可选的,所述第一消息还包括如下至少一项:Optionally, the first message further includes at least one of the following:
侦听方式,所述侦听方式包括第一方式或第二方式,所述第一方式用于指示通过所述终端上报所述终端的感知数据,所述第二方式用于指示所述第一节点生成所述终端的感知数据;A listening mode, the listening mode including a first mode or a second mode, the first mode is used to instruct the terminal to report the perception data of the terminal, and the second mode is used to instruct the first node to generate the perception data of the terminal;
侦听类型(Type of intercept),所述侦听类型包括感知相关信息和感知内容中的至少一项;a type of intercept, the type of intercept comprising at least one of the sensing related information and the sensing content;
服务范围(service scoping),所述服务范围包括感知;service scoping, including perception;
过滤条件(Filtering criteria),所述过滤条件包括时间信息、地理位置信息和感知性能指标中的至少一项。Filtering criteria, wherein the filtering criteria include at least one of time information, geographic location information, and perceived performance indicators.
上述侦听方式用于指示获取侦听数据(即终端的感知数据)的方式,其中,上述侦听方式包括第一方式或第二方式,第一方式用于指示通过终端上报该终端的感知数据,例如,终端根据侦听要求(例如,侦听的时间长度、数据量、过滤条件等)上报终端的感知数据给第一节点;上述第二方式用于指示所述第一节点生成所述终端的感知数据,例如,第一节点根据终端进行感知所使用的配置信息和感知信号生成终端的感知数据。The above-mentioned listening method is used to indicate a method for obtaining listening data (i.e., the perception data of the terminal), wherein the above-mentioned listening method includes a first method or a second method, and the first method is used to indicate that the perception data of the terminal is reported through the terminal, for example, the terminal reports the perception data of the terminal to the first node according to the listening requirements (for example, the listening time length, data volume, filtering conditions, etc.); the above-mentioned second method is used to indicate the first node to generate the perception data of the terminal, for example, the first node generates the perception data of the terminal according to the configuration information and perception signal used by the terminal for perception.
上述侦听类型可以包括感知相关信息和感知内容中的至少一项。其中,在上述侦听类型仅包括感知相关信息的情况下,仅侦听感知相关信息;在上述侦听类型仅包括感知内容的情况下,仅侦听感知内容;在上述侦听类型包括感知相关信息和感知内容的情况下,同时侦听感知相关信息和侦听感知内容。可选的,上述侦听类型还可以包括通信相关信息和通信内容中的至少一项,即除了需要侦听感知相关信息和感知内容中的至少一项之外,还需要侦听通信相关信息和通信内容中的至少一项。需要说明的是,上述感知相关信息和感知内容中的至少一项针对的是感知,上述通信相关信息和通信内容中的至少一项针对的是通信,例如,语音、数据包、消息和目标定位等。The above-mentioned interception type may include at least one of perception-related information and perception content. Wherein, in the case where the above-mentioned interception type only includes perception-related information, only perception-related information is intercepted; in the case where the above-mentioned interception type only includes perception content, only perception content is intercepted; in the case where the above-mentioned interception type includes perception-related information and perception content, perception-related information and perception content are intercepted at the same time. Optionally, the above-mentioned interception type may also include at least one of communication-related information and communication content, that is, in addition to the need to intercept at least one of perception-related information and perception content, it is also necessary to intercept at least one of communication-related information and communication content. It should be noted that at least one of the above-mentioned perception-related information and perception content is for perception, and at least one of the above-mentioned communication-related information and communication content is for communication, such as voice, data packets, messages, and target positioning.
在一些场景下,上述感知相关信息和通信相关信息均可以称为IRI,上述感知内容和通信内容均可以称为CC,也即上述侦听类型包括仅IRI(即IRI only)、仅CC(即CC only)或者IRI和CC(即both IRI and CC),其中,上述IRI包括感知相关信息和通信相关信息中的至少一项,上述CC包括感知内容和通信内容中的至少一项。In some scenarios, the above-mentioned perception-related information and communication-related information can both be referred to as IRI, and the above-mentioned perception content and communication content can both be referred to as CC, that is, the above-mentioned listening types include only IRI (i.e., IRI only), only CC (i.e., CC only) or IRI and CC (i.e., both IRI and CC), wherein the above-mentioned IRI includes at least one of the perception-related information and the communication-related information, and the above-mentioned CC includes at least one of the perception content and the communication content.
上述服务范围用于指示需侦听的服务,该服务范围包括感知。可选的,该服务范围还可以包括语音、数据包、消息和目标定位等中的至少一项。The service range is used to indicate the service to be monitored, and the service range includes perception. Optionally, the service range may also include at least one of voice, data packet, message, and target positioning.
上述过滤条件用于为侦听提供额外的信息,例如,带宽优化。上述过滤条件包括时间 信息、地理位置信息和感知性能指标中的至少一项。可选的,所述感知性能指标包括如下至少一项:感知精度,感知分辨率,感知更新频率。其中,上述感知性能指标的含义可以参见表2,在此不做赘述。The above filter conditions are used to provide additional information for listening, for example, bandwidth optimization. The above filter conditions include time At least one of information, geographic location information and perception performance indicators. Optionally, the perception performance indicators include at least one of the following: perception accuracy, perception resolution, and perception update frequency. The meanings of the above perception performance indicators can be found in Table 2 and are not described here.
可选的,所述第一节点根据所述第一消息获取所述终端的感知数据包括:Optionally, the first node acquiring the perception data of the terminal according to the first message includes:
所述第一节点向所述终端发送第二消息,所述第二消息用于指示所述终端记录感知数据,所述感知数据为所述终端生成的感知数据;The first node sends a second message to the terminal, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal;
所述第一节点从所述终端接收所述感知数据。The first node receives the sensing data from the terminal.
本实施例中,第一节点向所述终端发送第二消息,以指示终端记录该终端生成的感知数据,进而终端在接收到第二消息的情况下,基于第二消息记录其生成的感知数据并发送给第一节点,这样不仅使得获取终端的感知数据较为便捷,还可以保证获取的终端的感知数据较为准确。In this embodiment, the first node sends a second message to the terminal to instruct the terminal to record the perception data generated by the terminal. When the terminal receives the second message, the terminal records the perception data generated by the terminal based on the second message and sends it to the first node. This not only makes it more convenient to obtain the perception data of the terminal, but also ensures that the perception data of the terminal obtained is more accurate.
可选的,所述第二消息包括如下至少一项:Optionally, the second message includes at least one of the following:
第一指示信息,用于指示所述终端记录所述感知数据;first indication information, used to instruct the terminal to record the perception data;
第二指示信息,用于指示记录所述感知数据的数据量;second indication information, used to indicate the amount of data recorded for the perception data;
第三指示信息,用于指示记录所述感知数据的时间长度;The third indication information is used to indicate the time length for recording the perception data;
第四指示信息,用于指示记录所述感知数据的过滤条件。The fourth indication information is used to indicate a filtering condition for recording the perception data.
上述第二指示信息用于指示记录所述感知数据的数据量,例如,最大感知数据的存储大小为1024字节,即最多记录1024字节的感知数据。The second indication information is used to indicate the data volume of the perception data recorded. For example, the maximum storage size of the perception data is 1024 bytes, that is, a maximum of 1024 bytes of perception data is recorded.
上述第三指示信息用于指示记录所述感知数据的时间长度,例如,记录T时间内(例如,12:10~12:20或者帧X到帧Y之间)的感知数据。The third indication information is used to indicate the time length for recording the perception data, for example, recording the perception data within time T (for example, 12:10 to 12:20 or between frame X and frame Y).
上述第四指示信息用于指示记录所述感知数据的过滤条件,用于减少所述感知数据的数据量,从而降低UE侧存储和/或传输开销。可选的,上述记录所述感知数据的过滤条件可以包括感知目标标识、感知区域信息、感知测量数据和/或感知结果的接收节点标识中至少一项。例如,感知某一感知目标标识时才记录所述感知数据,或在某一感知区域内时才记录所述感知数据,或感知测量数据/感知结果的接收节点标识处于某一情况时才记录等。The fourth indication information is used to indicate the filtering conditions for recording the perception data, and is used to reduce the data volume of the perception data, thereby reducing the storage and/or transmission overhead on the UE side. Optionally, the filtering conditions for recording the perception data may include at least one of the perception target identifier, perception area information, and the receiving node identifier of the perception measurement data and/or perception results. For example, the perception data is recorded only when a certain perception target identifier is perceived, or the perception data is recorded only when it is within a certain perception area, or the receiving node identifier of the perception measurement data/perception result is recorded only when it is in a certain situation, etc.
可选的,记录所述感知数据的过滤条件包括如下至少一项:感知目标标识,感知区域信息,感知测量数据的接收节点标识,感知结果的接收节点标识。Optionally, the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
可选的,所述第一节点根据所述第一消息获取所述终端的感知数据包括:Optionally, the first node acquiring the perception data of the terminal according to the first message includes:
所述第一节点获取第一配置信息,所述第一配置信息为所述终端进行感知时所使用的配置信息;The first node acquires first configuration information, where the first configuration information is configuration information used by the terminal for perception;
所述第一节点根据所述第一配置信息确定所述终端的感知数据。The first node determines the perception data of the terminal according to the first configuration information.
示例性的,上述第一配置信息可以用于指示终端进行感知的感知信号参数配置信息(例如,时频资源信息、感知信号的序列、波形等参数)、感知测量配置、感知先验信息等。 Exemplarily, the first configuration information may be used to indicate the perception signal parameter configuration information (eg, time-frequency resource information, sequence and waveform parameters of the perception signal), perception measurement configuration, perception prior information, etc., which are perceived by the terminal.
示例性的,在上述第一节点为确定上述第一配置信息的节点的情况下,第一节点可以直接获知上述第一配置信息;在上述第一节点不为确定上述第一配置信息的节点的情况下,第一节点可以从确定上述第一配置信息的节点获取上述第一配置信息。Exemplarily, when the first node is a node that determines the first configuration information, the first node can directly obtain the first configuration information; when the first node is not a node that determines the first configuration information, the first node can obtain the first configuration information from the node that determines the first configuration information.
在一可选的实施方式中,在所述第一配置信息包括时频资源信息、感知信号的序列、波形等参数)、感知测量配置、感知先验信息等中的至少一项的情况下,第一节点可以基于第一配置信息接收感知信号,并根据所接收的感知信号生成所述终端的感知数据。可以理解的是,上述第一节点基于第一配置信息生成的终端的感知数据与终端生成的感知数据可以是相似的。In an optional implementation, when the first configuration information includes at least one of time-frequency resource information, parameters such as a sequence and waveform of a perception signal, perception measurement configuration, perception prior information, etc., the first node may receive the perception signal based on the first configuration information, and generate the perception data of the terminal according to the received perception signal. It can be understood that the perception data of the terminal generated by the first node based on the first configuration information may be similar to the perception data generated by the terminal.
在另一实施方式中,在所述第一配置信息包括感知数据的传输配置信息的情况下,第一节点可以基于第一配置信息检测经所述第一节点传输的感知数据,以获得所述终端的感知数据。In another embodiment, when the first configuration information includes transmission configuration information of perception data, the first node may detect the perception data transmitted by the first node based on the first configuration information to obtain the perception data of the terminal.
本实施例通过第一节点获取第一配置信息,所述第一配置信息为所述终端进行感知时所使用的配置信息,根据所述第一配置信息确定所述终端的感知数据,这样在保证侦听到终端的感知数据的同时,可以简化终端的操作,节省终端的资源和电量。In this embodiment, the first configuration information is obtained through the first node, and the first configuration information is the configuration information used by the terminal for perception. The perception data of the terminal is determined according to the first configuration information. In this way, while ensuring that the perception data of the terminal is detected, the operation of the terminal can be simplified and the resources and power of the terminal can be saved.
可选的,所述第一配置信息包括如下至少一项:波形类型,子载波间隔,保护间隔,带宽,数据突发burst持续时间,时域间隔,感知信号的发送功率,信号格式,信号方向,时间资源,频率资源,准共址(Quasi-Co-Location,QCL)关系,感知测量量配置信息,感知先验信息,感知数据的传输配置信息。Optionally, the first configuration information includes at least one of the following: waveform type, subcarrier spacing, guard interval, bandwidth, data burst duration, time domain interval, transmit power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-location (QCL) relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
其中,上述波形类型,例如,正交频分复用(Orthogonal Frequency Division Multiplexing,OFDM),单载波频分多址(Single Carrier Frequency Division Multiple Access,SC-FDMA),正交时频空间(Orthogonal Time Frequency Space,OTFS),调频连续波(Frequency-Modulated Continuous Wave,FMCW),脉冲信号等。Among them, the above-mentioned waveform types, for example, Orthogonal Frequency Division Multiplexing (OFDM), Single Carrier Frequency Division Multiple Access (SC-FDMA), Orthogonal Time Frequency Space (OTFS), Frequency-Modulated Continuous Wave (FMCW), pulse signal, etc.
上述子载波间隔,例如,OFDM系统的子载波间隔30KHz。The above subcarrier spacing, for example, the subcarrier spacing of the OFDM system is 30KHz.
上述保护间隔,例如,从信号结束发送时刻到该信号的最迟回波信号被接收的时刻之间的时间间隔;该参数正比于最大感知距离;例如,可以通过2dmax/c计算得到,dmax是最大感知距离(属于感知需求),例如对于自发自收的感知信号,dmax代表感知信号收发点到信号发射点的最大距离,c是光速;在某些情况下,OFDM信号循环前缀(Cyclic prefix,CP)可以起到最小保护间隔的作用。The above-mentioned protection interval, for example, is the time interval from the moment when the signal ends to the moment when the latest echo signal of the signal is received; this parameter is proportional to the maximum perception distance; for example, it can be calculated by 2d max /c, d max is the maximum perception distance (belonging to the perception requirement), for example, for a self-transmitted and self-received perception signal, d max represents the maximum distance from the perception signal receiving and transmitting point to the signal transmitting point, and c is the speed of light; in some cases, the OFDM signal cyclic prefix (CP) can play the role of the minimum protection interval.
上述带宽可以反比于距离分辨率,可以通过c/2/Δd得到,其中Δd是距离分辨率(属于感知需求),c是光速。The above bandwidth is inversely proportional to the distance resolution and can be obtained by c/2/Δd, where Δd is the distance resolution (which belongs to the perception requirement) and c is the speed of light.
上述数据突发(burst)持续时间可以反比于速率分辨率(属于感知需求),该参数是感知信号的时间跨度,主要为了计算多普勒频偏;该参数可通过c/2/Δv/fc计算得到;其中,Δv是速度分辨率;fc是感知信号的载频或者感知信号的中心频点。The duration of the above-mentioned data burst can be inversely proportional to the rate resolution (belonging to the perception requirement). This parameter is the time span of the perception signal, which is mainly used to calculate the Doppler frequency deviation; this parameter can be calculated by c/2/Δv/f c ; where Δv is the velocity resolution; f c is the carrier frequency of the perception signal or the center frequency of the perception signal.
上述时域间隔可通过c/2/fc/vrange)计算得到;其中,vrange是最大速率减去最小速度(属于感知需求);该参数是相邻的两个感知信号之间的时间间隔。 The above time domain interval can be calculated by c/2/f c /v range ); wherein v range is the maximum rate minus the minimum rate (belonging to the perception requirement); this parameter is the time interval between two adjacent perception signals.
应理解,上述“/”在以上各公式中标识除号。It should be understood that the above “/” represents a division sign in the above formulas.
上述感知信号的发送功率,例如从-20dBm到23dBm每隔2dBm取一个值。The transmission power of the above-mentioned perception signal takes a value at intervals of 2dBm, for example, from -20dBm to 23dBm.
上述信号格式,例如,SRS,DMRS,PRS等,或者其他预定义的信号,以及相关的序列格式等信息。The above signal formats, for example, SRS, DMRS, PRS, etc., or other predefined signals, and related sequence format and other information.
上述信号方向,例如,感知信号的方向或者波束信息。The above-mentioned signal direction, for example, the direction of the perceived signal or beam information.
上述时间资源,例如,感知信号所在的时隙索引或者时隙的符号索引;其中,时间资源分为两种,一种是一次性的时间资源,例如一个符号发送一个全向的感知信号;一种是非一次性的时间资源,例如多组周期性的时间资源或者不连续的时间资源(可包含开始时间和结束时间),每一组周期性的时间资源发送同一方向的感知信号,不同组的周期性时间资源上的波束方向不同。The above-mentioned time resources, for example, the time slot index where the perception signal is located or the symbol index of the time slot; wherein, the time resources are divided into two types, one is a one-time time resource, for example, one symbol sends an omnidirectional perception signal; the other is a non-one-time time resource, such as multiple groups of periodic time resources or discontinuous time resources (may include start time and end time), each group of periodic time resources sends a perception signal in the same direction, and different groups of periodic time resources have different beam directions.
上述频率资源,例如,感知信号的中心频点,带宽,RB或者子载波,参考点A(Point A),起始带宽位置等。The above-mentioned frequency resources, for example, the center frequency of the perception signal, bandwidth, RB or subcarrier, reference point A (Point A), starting bandwidth position, etc.
上述QCL关系,例如,感知信号包括多个资源,每个资源与一个同步信号块(Synchronization Signal and PBCH block,SSB)QCL,QCL包括类型A(Type A)、Type B、Type C或者Type D。The above-mentioned QCL relationship, for example, the perception signal includes multiple resources, each resource is QCL with a synchronization signal block (Synchronization Signal and PBCH block, SSB), and the QCL includes Type A (Type A), Type B, Type C or Type D.
上述感知测量量配置信息,可以用于配置至少一个感知测量量和至少一个感知测量结果(即感知测量量的测量结果)对应的感知信号周期和/或个数等。示例性,感知测量量可以包括多普勒、时延、角度和信号强度等中的一种或多种。上述感知测量结果对应感知信号周期和/或个数,可以具体指该感知测量结果是基于几个感知信号和/或几个周期的感知信号来计算得到,例如,当感知信号为周期性信号,那么可以用感知信号周期来表示,即感知测量结果基于N个感知信号来计算,N为正整数;如果感知信号是非周期的,那么可以用几次接收的感知信号来表示,几次同几个表达,面向不同的感知信号类型;或者也可以是上述情况的组合。The above-mentioned perception measurement quantity configuration information can be used to configure the perception signal period and/or number corresponding to at least one perception measurement quantity and at least one perception measurement result (i.e., the measurement result of the perception measurement quantity). Exemplarily, the perception measurement quantity may include one or more of Doppler, delay, angle, and signal strength. The above-mentioned perception measurement result corresponds to the perception signal period and/or number, which can specifically refer to that the perception measurement result is calculated based on several perception signals and/or several periodic perception signals. For example, when the perception signal is a periodic signal, it can be represented by the perception signal period, that is, the perception measurement result is calculated based on N perception signals, and N is a positive integer; if the perception signal is non-periodic, it can be represented by several times of received perception signals, and several times are expressed with several times, facing different perception signal types; or it can also be a combination of the above situations.
上述感知先验信息用于基于感知测量计算感知结果时使用,例如,感知结果为呼吸频率时,上述感知先验信息可以包括呼吸的频率范围等。The above-mentioned perception prior information is used when calculating the perception result based on the perception measurement. For example, when the perception result is the breathing frequency, the above-mentioned perception prior information may include the frequency range of the breathing, etc.
上述感知数据的传输配置信息,例如,协议数据单元(Protocol Data Unit,PDU)会话标识(PDU session ID)、QoS流标识(QoS flow ID)等。The transmission configuration information of the above-mentioned perception data, for example, protocol data unit (PDU) session identifier (PDU session ID), QoS flow identifier (QoS flow ID), etc.
可选的,所述第一节点获取第一配置信息包括:Optionally, the first node acquiring the first configuration information includes:
所述第一节点向所述终端发送第三消息,所述第三消息用于指示所述终端上报所述第一配置信息;The first node sends a third message to the terminal, where the third message is used to instruct the terminal to report the first configuration information;
所述第一节点接收所述终端上报的所述第一配置信息。The first node receives the first configuration information reported by the terminal.
本实施例中,第一节点可以向终端发送第三消息,以指示终端上报所述第一配置信息,这样终端可以在接收到第三消息的情况下上报上述第一配置信息给第一节点,进而第一节点可以基于上述第一配置信息进行感知信号接收,并基于接收的感知信号生成终端的感知数据。 In this embodiment, the first node can send a third message to the terminal to instruct the terminal to report the first configuration information, so that the terminal can report the above-mentioned first configuration information to the first node when receiving the third message, and then the first node can receive the perception signal based on the above-mentioned first configuration information, and generate the perception data of the terminal based on the received perception signal.
实际应用中,在一些场景下,上述第一配置信息可以由终端确定,例如,在终端自发自收或者终端间收发的感知方式下,可以由终端确定第一配置信息。可选的,本实施例可以在上述第一配置信息由终端确定的情况下,第一节点向所述终端发送第三消息,以指示终端上报所述第一配置信息,并接收所述终端上报的所述第一配置信息,这样可以提高第一节点获取第一配置信息的便捷性。In actual applications, in some scenarios, the first configuration information can be determined by the terminal. For example, in a perception mode of self-transmission and self-reception by the terminal or transmission and reception between terminals, the first configuration information can be determined by the terminal. Optionally, in this embodiment, when the first configuration information is determined by the terminal, the first node sends a third message to the terminal to instruct the terminal to report the first configuration information, and receives the first configuration information reported by the terminal, which can improve the convenience of the first node in obtaining the first configuration information.
可选的,所述第一节点获取第一配置信息包括:Optionally, the first node acquiring the first configuration information includes:
所述第一节点向第一网络侧设备发送第四消息,所述第四消息用于指示所述第一网络侧设备发送所述第一配置信息;The first node sends a fourth message to the first network side device, where the fourth message is used to instruct the first network side device to send the first configuration information;
所述第一节点从所述第一网络侧设备接收所述第一配置信息。The first node receives the first configuration information from the first network side device.
本实施例中,上述第一网络侧设备可以包括基站或网络功能(AF)等。具体的,第一节点可以向第一网络侧设备发送第四消息,以指示第一网络侧设备反馈所述第一配置信息,这样第一网络侧设备可以在接收到第四消息的情况下发送上述第一配置信息给第一节点,进而第一节点可以基于上述第一配置信息进行感知信号接收,并基于接收的感知信号生成终端的感知数据。其中,上述第一网络侧设备可以是确定上述第一配置信息的节点,例如,在基站发终端收或者终端发基站收等感知方式下,可以由基站确定第一配置信息,即上述第一网络侧设备可以为该基站,或者上述第一网络侧设备可以是可获取到上述第一配置信息的节点。In this embodiment, the first network side device may include a base station or a network function (AF), etc. Specifically, the first node may send a fourth message to the first network side device to instruct the first network side device to feed back the first configuration information, so that the first network side device may send the first configuration information to the first node after receiving the fourth message, and then the first node may receive a perception signal based on the first configuration information, and generate perception data of the terminal based on the received perception signal. Among them, the first network side device may be a node that determines the first configuration information. For example, in a perception mode such as a base station sending and a terminal receiving or a terminal sending and a base station receiving, the first configuration information may be determined by the base station, that is, the first network side device may be the base station, or the first network side device may be a node that can obtain the first configuration information.
可选的,可以在上述第一配置信息由第一网络侧设备确定的情况下,第一节点可以向第一网络侧设备发送第四消息,以指示第一网络侧设备反馈所述第一配置信息,并接收第一网络侧设备发送的第一配置信息,,这样可以提高第一节点获取第一配置信息的便捷性。Optionally, when the above-mentioned first configuration information is determined by the first network side device, the first node can send a fourth message to the first network side device to instruct the first network side device to feedback the first configuration information and receive the first configuration information sent by the first network side device, thereby improving the convenience of the first node in obtaining the first configuration information.
请参见图5,图5是本申请实施例提供的一种侦听方法的流程图,该方法可以由终端执行,如图5所示,包括以下步骤:Please refer to FIG. 5 , which is a flowchart of a monitoring method provided in an embodiment of the present application. The method can be executed by a terminal, as shown in FIG. 5 , and includes the following steps:
步骤501、终端从第一节点接收目标消息,所述目标消息包括第二消息或第三消息,所述第二消息用于指示所述终端记录感知数据,所述感知数据为所述终端生成的感知数据,所述第三消息用于指示所述终端上报第一配置信息,所述第一配置信息为所述终端进行感知时所使用的配置信息。Step 501: The terminal receives a target message from a first node, where the target message includes a second message or a third message, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, where the first configuration information is the configuration information used by the terminal for perception.
步骤502、所述终端向所述第一节点发送目标信息,所述目标信息包括所述感知数据或所述第一配置信息。Step 502: The terminal sends target information to the first node, where the target information includes the perception data or the first configuration information.
在一实施方式中,终端从第一节点接收第二消息,并基于第二消息向第一节点发送感知数据,例如,可以基于第二消息记录感知数据,并将所记录的感知数据发送给第一节点。其中,上述第二消息和感知数据可以参见前述实施例的相关说明,在此不做赘述。In one embodiment, the terminal receives the second message from the first node, and sends the perception data to the first node based on the second message. For example, the perception data can be recorded based on the second message, and the recorded perception data can be sent to the first node. The second message and the perception data can refer to the relevant description of the above embodiment, and will not be repeated here.
在另一实施方式中,终端从第一节点接收第三消息,并可以响应于第三消息向第一节点发送第一配置信息。其中,上述第三消息和第一配置信息可以参见前述实施例的相关说明,在此不做赘述。In another embodiment, the terminal receives a third message from the first node, and can send first configuration information to the first node in response to the third message. The third message and the first configuration information can refer to the relevant description of the above embodiment, which will not be repeated here.
需要说明的是,本实施例中的终端可以是负责生成感知测量数据和感知结果中的至少 一项的终端。本实施例中的第一节点可以包括但不限于基站、SF、AMF、UDM、NRF、NEF、UPF、SMSF或IMS等。It should be noted that the terminal in this embodiment may be responsible for generating at least one of the sensing measurement data and the sensing result. The first node in this embodiment may include but is not limited to a base station, a SF, an AMF, a UDM, a NRF, a NEF, a UPF, a SMSF or an IMS.
可选的,所述第二消息包括如下至少一项:Optionally, the second message includes at least one of the following:
第一指示信息,用于指示所述终端记录所述感知数据;first indication information, used to instruct the terminal to record the perception data;
第二指示信息,用于指示记录所述感知数据的数据量;second indication information, used to indicate the amount of data recorded for the perception data;
第三指示信息,用于指示记录所述感知数据的时间长度;The third indication information is used to indicate the time length for recording the perception data;
第四指示信息,用于指示记录所述感知数据的过滤条件。The fourth indication information is used to indicate a filtering condition for recording the perception data.
需要说明的是,该实施方式的实现方式可以参见图4所示的实施例的相关说明,此处不作赘述。It should be noted that the implementation method of this embodiment can refer to the relevant description of the embodiment shown in FIG. 4 , and will not be described in detail here.
可选的,记录所述感知数据的过滤条件包括如下至少一项:感知目标标识,感知区域信息,感知测量数据的接收节点标识,感知结果的接收节点标识。Optionally, the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
需要说明的是,该实施方式的实现方式可以参见图4所示的实施例的相关说明,此处不作赘述。It should be noted that the implementation method of this embodiment can refer to the relevant description of the embodiment shown in FIG. 4 , and will not be described in detail here.
可选的,所述第一配置信息包括如下至少一项:波形类型,子载波间隔,保护间隔,带宽,数据突发burst持续时间,时域间隔,感知信号的发送功率,信号格式,信号方向,时间资源,频率资源,准共址QCL关系,感知测量量配置信息,感知先验信息,感知数据的传输配置信息。Optionally, the first configuration information includes at least one of the following: waveform type, subcarrier spacing, protection interval, bandwidth, data burst duration, time domain interval, transmission power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-site QCL relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
需要说明的是,该实施方式的实现方式可以参见图4所示的实施例的相关说明,此处不作赘述。It should be noted that the implementation method of this embodiment can refer to the relevant description of the embodiment shown in FIG. 4 , and will not be described in detail here.
请参见图6,图6是本申请实施例提供的一种侦听方法的流程图,该方法可以由第二节点执行,如图6所示,包括以下步骤:Please refer to FIG. 6, which is a flowchart of a monitoring method provided in an embodiment of the present application. The method can be executed by the second node, as shown in FIG. 6, including the following steps:
步骤601、第二节点向第一节点发送第一消息,所述第一消息用于指示侦听终端的感知数据。Step 601: A second node sends a first message to a first node, where the first message is used to indicate perception data of a monitoring terminal.
其中,上述第一消息和感知数据可以参见前述实施例的相关说明,在此不做赘述。Among them, the above-mentioned first message and perception data can refer to the relevant description of the aforementioned embodiment, and will not be repeated here.
步骤602、所述第二节点从所述第一节点接收所述终端的感知数据。Step 602: The second node receives the perception data of the terminal from the first node.
需要说明的是,本实施例中的第二节点可以包括但不限于合法侦听节点(例如,LEA、LEMF等)或者核心网网络功能中负责接收合法侦听节点消息的网络功能,例如,AMF、IMS等。本实施例中的第一节点可以包括但不限于基站、SF、AMF、UDM、NRF、NEF、UPF、SMSF或IMS等。本实施例中的终端可以是负责生成感知测量数据和感知结果中的至少一项的终端。It should be noted that the second node in this embodiment may include but is not limited to a lawful interception node (e.g., LEA, LEMF, etc.) or a network function in the core network network function responsible for receiving a lawful interception node message, such as AMF, IMS, etc. The first node in this embodiment may include but is not limited to a base station, SF, AMF, UDM, NRF, NEF, UPF, SMSF or IMS, etc. The terminal in this embodiment may be a terminal responsible for generating at least one of the perception measurement data and the perception result.
可选的,所述第一消息包括目标标识,所述目标标识用于标识所述终端。Optionally, the first message includes a target identifier, and the target identifier is used to identify the terminal.
可选的,所述第一消息还包括如下至少一项:Optionally, the first message further includes at least one of the following:
侦听方式,所述侦听方式包括第一方式或第二方式,所述第一方式用于指示通过所述终端上报所述终端的感知数据,所述第二方式用于指示所述第一节点生成所述终端的感知数据; A listening mode, the listening mode including a first mode or a second mode, the first mode is used to instruct the terminal to report the perception data of the terminal, and the second mode is used to instruct the first node to generate the perception data of the terminal;
侦听类型,所述侦听类型包括感知相关信息和感知内容中的至少一项;A listening type, wherein the listening type includes at least one of sensing related information and sensing content;
服务范围,所述服务范围包括感知;Service scope, the service scope including perception;
过滤条件,所述过滤条件包括时间信息、地理位置信息和感知性能指标中的至少一项。The filtering condition includes at least one of time information, geographic location information, and a perceived performance indicator.
需要说明的是,该实施方式的实现方式可以参见图4所示的实施例的相关说明,此处不作赘述。It should be noted that the implementation method of this embodiment can refer to the relevant description of the embodiment shown in FIG. 4 , and will not be described in detail here.
可选的,所述感知性能指标包括如下至少一项:感知精度,感知分辨率,感知更新频率。Optionally, the perception performance indicator includes at least one of the following: perception accuracy, perception resolution, and perception update frequency.
需要说明的是,该实施方式的实现方式可以参见图4所示的实施例的相关说明,此处不作赘述。It should be noted that the implementation method of this embodiment can refer to the relevant description of the embodiment shown in FIG. 4 , and will not be described in detail here.
可选的,所述目标标识包括所述终端的临时标识和所述终端的永久标识中的至少一项。Optionally, the target identifier includes at least one of a temporary identifier of the terminal and a permanent identifier of the terminal.
需要说明的是,该实施方式的实现方式可以参见图4所示的实施例的相关说明,此处不作赘述。It should be noted that the implementation method of this embodiment can refer to the relevant description of the embodiment shown in FIG. 4 , and will not be described in detail here.
可选的,所述方法还包括:Optionally, the method further includes:
在所述第一节点仅支持检测所述终端的临时标识的情况下,所述第二节点从第三节点接收临时标识和永久标识之间的关联关系。In the case that the first node only supports detecting the temporary identity of the terminal, the second node receives the association relationship between the temporary identity and the permanent identity from the third node.
上述第三节点可以为核心网网络功能中负责维护终端的永久标识的网络功能,例如AMF、UDM或IMS等。实际应用中,如果上述第一节点仅能检测终端的临时标识,那么第三节点需提供临时标识与永久标识之间的关联关系给第二节点,这样第二节点基于上述关联关系可以获知临时标识对应的永久标识,这样便于第二节点识别上述临时标识所对应的感知数据所属的终端,即上述临时标识对应的永久标识所标识的终端。The third node may be a network function in the core network that is responsible for maintaining the permanent identification of the terminal, such as AMF, UDM or IMS, etc. In practical applications, if the first node can only detect the temporary identification of the terminal, the third node needs to provide the association relationship between the temporary identification and the permanent identification to the second node, so that the second node can obtain the permanent identification corresponding to the temporary identification based on the association relationship, which makes it easier for the second node to identify the terminal to which the perception data corresponding to the temporary identification belongs, that is, the terminal identified by the permanent identification corresponding to the temporary identification.
需要说明的是,在目标标识为终端的永久标识的情况下,上述临时标识和永久标识之间的关联关系即为临时标识和目标标识之间的关联关系。It should be noted that, in the case where the target identifier is the permanent identifier of the terminal, the association relationship between the temporary identifier and the permanent identifier is the association relationship between the temporary identifier and the target identifier.
可选的,所述临时标识和永久标识之间的关联关系通过标识事件(Identity Event)指示,所述标识事件包括:Optionally, the association relationship between the temporary identification and the permanent identification is indicated by an identity event, and the identity event includes:
订阅永久标识(Subscription permanent identifier),所述订阅永久标识用于识别所述终端;以及a subscription permanent identifier, the subscription permanent identifier being used to identify the terminal; and
观察的临时标识(Observed temporary identifier),所述观察的临时标识用于所述第一节点的接口交互所述终端的感知数据时使用。An observed temporary identifier (Observed temporary identifier), wherein the observed temporary identifier is used when the interface of the first node interacts with the perception data of the terminal.
本实施例中,上述订阅永久标识用于标识上述负责生成感知测量数据和感知结果中的至少一项的终端,即需要侦听的目标。In this embodiment, the subscription permanent identifier is used to identify the terminal responsible for generating at least one of the sensing measurement data and the sensing result, that is, the target to be monitored.
上述观察的临时标识用于第一节点内的接口之间交互所需侦听目标的感知信息(例如,感知请求、感知响应、感知报告等)时使用。The temporary identifier observed above is used when the interfaces within the first node interact with each other to monitor the target's perception information (eg, perception request, perception response, perception report, etc.).
示例性的,网络功能可以提供标识事件功能(Identity Event Function),在检测到临时标识和永久标识关联或去关联的情况下生成标识事件报告,其中,该标识事件报告可以包括标识事件,上述标识事件至少包括订阅永久标识和观察的临时标识。 Exemplarily, the network function may provide an identity event function (Identity Event Function) to generate an identity event report when it is detected that a temporary identity and a permanent identity are associated or disassociated, wherein the identity event report may include an identity event, and the above-mentioned identity event includes at least a subscription to a permanent identity and an observed temporary identity.
可选的,所述标识事件还包括如下至少一项参数:Optionally, the identification event further includes at least one of the following parameters:
标识事件的时间戳(time stamp of event),用于指示所述标识事件的发生时间;A timestamp of an event, which is used to indicate the time when the event occurs;
网络功能标识,用于指示生成标识事件报告的网络功能;A network function identifier, used to indicate the network function that generated the identification event report;
地理位置信息,用于指示所述标识事件发送时所述终端的地理位置。The geographical location information is used to indicate the geographical location of the terminal when the identification event is sent.
示例性的,上述终端的地理位置可以包括跟踪区域标识(Tracing Area Identity,TAI)、路由区域(Routing Area,RA)、基于无线接入网络的通知区域(RAN-based Notification Area,RNA)或地理位置坐标等。Exemplarily, the geographic location of the above-mentioned terminal may include a tracking area identifier (Tracing Area Identity, TAI), a routing area (Routing Area, RA), a radio access network-based notification area (RAN-based Notification Area, RNA) or geographic location coordinates, etc.
以下结合示例对本申请实施例进行说明:The following examples illustrate the embodiments of the present application:
示例一:第一节点是基站以及侦听方式是终端上报感知数据的合法侦听Example 1: The first node is a base station and the interception method is legal interception of terminal reporting of perception data
本示例面向UE(即终端)负责生成感知测量数据和/或感知结果时的感知合法侦听,其中,第一节点是基站(如gNB)时,侦听方式为UE上报感知数据给基站,具体的,本示例提供的侦听方法包括如下步骤:This example is for a UE (i.e., a terminal) responsible for generating sensing measurement data and/or sensing results for sensing lawful interception. When the first node is a base station (such as a gNB), the interception method is that the UE reports the sensing data to the base station. Specifically, the interception method provided in this example includes the following steps:
步骤a1、基站接收第二节点(如LEA、AMF等)发送的第一消息,所述第一消息包括所需侦听的目标UE的标识,即目标标识。Step a1: The base station receives a first message sent by a second node (such as LEA, AMF, etc.), where the first message includes an identifier of a target UE to be monitored, that is, a target identifier.
对于面向感知的合法侦听,上述目标UE为负责生成感知测量数据的UE和/或负责生产感知结果的UE。For perception-oriented lawful interception, the target UE is a UE responsible for generating perception measurement data and/or a UE responsible for producing perception results.
步骤a2、基站根据第一消息向UE发送第二消息,第二消息用于触发目标UE记录感知数据。Step a2: The base station sends a second message to the UE according to the first message, where the second message is used to trigger the target UE to record the perception data.
步骤a3、目标UE在接收到第二消息后,记录感知数据,并在合适时机上报给基站。例如,基站在空闲时指示终端上报所述感知数据。可以理解的是,终端将记录的感知数据上报给基站之后,可立即将该感知数据删除或保存一段时间后删除Step a3: After receiving the second message, the target UE records the perception data and reports it to the base station at an appropriate time. For example, the base station instructs the terminal to report the perception data when it is idle. It is understandable that after the terminal reports the recorded perception data to the base station, it can delete the perception data immediately or save it for a period of time before deleting it.
步骤a4、基站根据对目标UE记录感知数据的配置信息,发送感知数据记录上报的调度信息。Step a4: The base station sends scheduling information for recording and reporting the perception data according to the configuration information for recording the perception data for the target UE.
步骤a5、目标UE基于基站调度信息上报所述感知数据。Step a5: The target UE reports the perception data based on the base station scheduling information.
步骤a6、基站接收所述感知数据,并发送给合法侦听节点(例如,LEA、LEMF等)Step a6: The base station receives the sensing data and sends it to a legal interception node (e.g., LEA, LEMF, etc.)
需要说明的是,考虑3GPP网络使用临时标识替代永久标识以保障永久标识不被暴露在RAN相关的接口,因此第三节点(如AMF\UDM等)需提供基站所使用的临时标识和永久标识之间的关联关系。It should be noted that considering that the 3GPP network uses temporary identifiers instead of permanent identifiers to ensure that the permanent identifiers are not exposed to RAN-related interfaces, the third node (such as AMF\UDM, etc.) needs to provide the association relationship between the temporary identifiers and permanent identifiers used by the base station.
示例二:第一节点是基站以及上报方式为第一节点生成UE的感知数据的合法侦听Example 2: The first node is a base station and the reporting method is the lawful interception of the first node generating the UE's perception data
本示例面向UE负责生成感知测量数据和/或感知结果时的感知合法侦听,其中第一节点是基站(如gNB)时,基站基于获得的第一配置信息接收无线信号,并生成感知数据(即侦听数据)。具体的,本示例提供的侦听方法包括如下步骤:This example is directed to the perception lawful interception when the UE is responsible for generating perception measurement data and/or perception results, wherein when the first node is a base station (such as a gNB), the base station receives a wireless signal based on the obtained first configuration information and generates perception data (i.e., interception data). Specifically, the interception method provided in this example includes the following steps:
步骤b1、基站接收第二节点(如LEA、AMF等)发送的第一消息,所述第一消息包括所需侦听的目标UE的标识,即目标标识。对于面向感知的合法侦听,上述目标UE为负责生成感知测量数据的UE和/或负责生产感知结果的UE。 Step b1: The base station receives a first message sent by a second node (such as LEA, AMF, etc.), wherein the first message includes an identifier of a target UE to be intercepted, i.e., a target identifier. For lawful interception oriented to perception, the target UE is a UE responsible for generating perception measurement data and/or a UE responsible for producing perception results.
步骤b2、基站根据第一消息获取目标UE的第一配置信息,并根据第一配置信息接收感知信号,并基于接收的感知信号生成UE侧的感知数据。Step b2: The base station obtains first configuration information of the target UE according to the first message, receives a perception signal according to the first configuration information, and generates perception data on the UE side based on the received perception signal.
其中,上述第一配置信息可以参见前述实施例的相关描述,在此不做赘述。Among them, the above-mentioned first configuration information can refer to the relevant description of the aforementioned embodiment, and will not be repeated here.
对于该步骤,具体可以根据感知方式和UE负责的感知功能分为如下几种情况:This step can be divided into the following cases according to the sensing mode and the sensing function that the UE is responsible for:
情况一、感知方式为UE自发自收或UE间收发时,UE负责生成感知测量数据:基站向UE(如自发自收UE,或UE间收发确定第一配置信息的UE)发送第三消息指示所述终端上报第一配置信息,所述第一配置信息主要包括感知信号配置和感知测量配置。目标UE基于基站指示发送第五消息上报所述第一配置信息,基站基于接收的第一配置信息在对应的时间和频率资源上接收感知信号,并进行感知测量,从而生成与目标UE侧相似的感知测量数据。Case 1: When the perception mode is UE self-transmission or inter-UE transmission and reception, the UE is responsible for generating perception measurement data: the base station sends a third message to the UE (such as a self-transmission and self-reception UE, or a UE that determines the first configuration information through inter-UE transmission and reception) to instruct the terminal to report the first configuration information, and the first configuration information mainly includes the perception signal configuration and the perception measurement configuration. The target UE sends a fifth message to report the first configuration information based on the instruction of the base station, and the base station receives the perception signal on the corresponding time and frequency resources based on the received first configuration information, and performs perception measurement, thereby generating perception measurement data similar to that on the target UE side.
情况二、感知方式为UE自发自收或UE间收发时,UE负责生成感知结果:基站向UE(如自发自收UE,或UE间收发确定第一配置信息的UE)发送第三消息指示UE上报第一配置信息,所述第一配置信息主要包括感知信号配置、感知测量配置和感知先验信息。UE基于基站指示发送第四消息上报所述第一配置信息,基站基于接收的第一配置信息在对应的时间和频率资源上接收感知信号,并进行感知测量,并基于感知先验信息生成与UE侧相似的感知结果。Case 2: When the perception mode is UE self-transmission or inter-UE transmission and reception, the UE is responsible for generating the perception result: the base station sends a third message to the UE (such as a self-transmission and self-reception UE, or a UE that determines the first configuration information through inter-UE transmission and reception) to instruct the UE to report the first configuration information, and the first configuration information mainly includes the perception signal configuration, the perception measurement configuration and the perception prior information. The UE sends a fourth message to report the first configuration information based on the instruction of the base station, and the base station receives the perception signal on the corresponding time and frequency resources based on the received first configuration information, performs the perception measurement, and generates a perception result similar to the UE side based on the perception prior information.
情况三、感知方式为基站发UE收时,UE负责生成感知测量数据和/或感知结果:负责感知侦听的基站(称为基站A)从发送感知信号的基站(称为基站B)获取第一配置信息,所述第一配置信息主要包括感知信号配置和感知测量配置,如果UE负责生成感知结果那么还需要感知先验信息。负责侦听的基站基于接收的第一配置信息在对应的时间和频率资源上接收感知信号,并进行感知测量,从而生成与UE侧相似的感知测量数据;或者基于感知先验信息生成与UE侧相似的感知结果。Case 3: When the sensing mode is that the base station sends and the UE receives, the UE is responsible for generating sensing measurement data and/or sensing results: the base station responsible for sensing and listening (referred to as base station A) obtains the first configuration information from the base station that sends the sensing signal (referred to as base station B), and the first configuration information mainly includes the sensing signal configuration and the sensing measurement configuration. If the UE is responsible for generating the sensing result, sensing prior information is also required. The base station responsible for listening receives the sensing signal on the corresponding time and frequency resources based on the received first configuration information, and performs sensing measurement, thereby generating sensing measurement data similar to that on the UE side; or generating sensing results similar to those on the UE side based on the sensing prior information.
情况四、感知方式为基站收UE发、基站自发自收或基站间收发时,UE负责生成感知结果:假如上述方式中负责感知测量的基站就是负责感知侦听的基站,基站发送感知测量数据给目标UE,并指示目标UE上报感知先验信息,进而基站可以基于感知先验信息生成与UE侧相似的感知结果。Case 4: When the perception method is that the base station receives and sends from the UE, the base station sends and receives by itself, or the base station sends and receives between base stations, the UE is responsible for generating the perception result: If the base station responsible for the perception measurement in the above method is the base station responsible for perception monitoring, the base station sends the perception measurement data to the target UE and instructs the target UE to report the perception prior information, and then the base station can generate a perception result similar to the UE side based on the perception prior information.
步骤b3、基站发送所述感知侦听数据给合法侦听系统Step b3: The base station sends the sensing interception data to the lawful interception system
需要说明的是,考虑3GPP网络使用临时标识替代永久标识以保障永久标识不被暴露在RAN相关的接口,因此第三节点(如AMF\UDM等)需提供基站所使用的临时标识和永久标识之间的关联关系。It should be noted that considering that the 3GPP network uses temporary identifiers instead of permanent identifiers to ensure that the permanent identifiers are not exposed to RAN-related interfaces, the third node (such as AMF\UDM, etc.) needs to provide the association relationship between the temporary identifiers and permanent identifiers used by the base station.
示例三:第一节点是核心网控制面功能节点的感知合法侦听Example 3: The first node is the core network control plane function node's perception of lawful interception
本示例面向UE负责生成感知测量数据和/或感知结果时的感知合法侦听,其中第一节点是核心网控制面功能节点(如SF/AMF/NEF)时,UE上报所述感知数据(即侦听数据)给核心网控制面功能节点。具体的,本示例提供的侦听方法包括如下步骤:This example is directed to the perception lawful interception when the UE is responsible for generating the perception measurement data and/or the perception result, wherein when the first node is a core network control plane function node (such as SF/AMF/NEF), the UE reports the perception data (i.e., interception data) to the core network control plane function node. Specifically, the interception method provided in this example includes the following steps:
步骤c1、核心网控制面功能节点接收第二节点(如LEA、AMF等)发送的第一消息, 所述第一消息包括所需侦听的目标UE的标识,即目标标识。对于面向感知的合法侦听,上述目标UE为负责生成感知测量数据的UE和/或负责生产感知结果的UE。Step c1: The core network control plane function node receives a first message sent by a second node (such as LEA, AMF, etc.). The first message includes an identifier of a target UE to be intercepted, that is, a target identifier. For lawful interception oriented to perception, the target UE is a UE responsible for generating perception measurement data and/or a UE responsible for producing perception results.
步骤c2、核心网控制面功能节点根据第一消息向所述目标UE发送第二消息,第二消息用于触发UE记录感知数据。可选的,所述第二消息可通过核心网控制面功能节点与UE之间的协议消息指示,例如,SF与UE之间的感知协议消息,AMF与UE之间的非接入层(Non-access Stratum,NAS)消息等。其中,基站对所述第二消息进行透传。Step c2: The core network control plane function node sends a second message to the target UE according to the first message, and the second message is used to trigger the UE to record the perception data. Optionally, the second message can be indicated by a protocol message between the core network control plane function node and the UE, for example, a perception protocol message between the SF and the UE, a non-access stratum (NAS) message between the AMF and the UE, etc. The base station transparently transmits the second message.
步骤c3、UE在接收到第二消息后,记录感知数据,并在合适时机上报给核心网控制面功能节点。Step c3: After receiving the second message, the UE records the perception data and reports it to the core network control plane function node at an appropriate time.
例如,UE根据本地数据存储情况等原因向基站请求上行发送资源,上报所述感知数据给核心网控制面功能节点。可以理解的是,UE将记录的感知数据上报给基站之后,可立即将该感知数据删除或保存一段时间后删除。For example, the UE requests uplink transmission resources from the base station based on local data storage conditions and other reasons, and reports the perception data to the core network control plane function node. It is understandable that after the UE reports the recorded perception data to the base station, it can delete the perception data immediately or delete it after saving it for a period of time.
步骤c1、核心网控制面功能节点接收所述感知数据,并发送给合法侦听节点(例如,LEA、LEMF等)。Step c1: The core network control plane function node receives the sensing data and sends it to a legal interception node (eg, LEA, LEMF, etc.).
示例四:第一节点是核心网用户面功能节点的感知合法侦听Example 4: The first node is the core network user plane function node's perception of lawful interception
本示例面向UE负责生成感知测量数据和/或感知结果时的感知合法侦听,其中第一节点是核心网用户面功能节点(如UPF)时,并假设UE通过用户面提供所述感知测量数据和/或感知结果给AF,那么所述核心网用户面功能节点作为第一节点时可根据UE感知数据传输配置信息,获取所述感知数据,无需UE上报。具体的,本示例提供的侦听方法包括如下步骤:This example is for the perception lawful interception when the UE is responsible for generating the perception measurement data and/or perception results, where the first node is the core network user plane function node (such as UPF), and it is assumed that the UE provides the perception measurement data and/or perception results to the AF through the user plane, then the core network user plane function node as the first node can obtain the perception data according to the UE perception data transmission configuration information, without the need for UE reporting. Specifically, the interception method provided in this example includes the following steps:
步骤d1、核心网用户面功能节点接收第二节点(如LEA、AMF等)发送的第一消息,所述第一消息包括所需侦听的目标UE的标识,即目标标识。对于面向感知的合法侦听,上述目标UE为负责生成感知测量数据的UE和/或负责生产感知结果的UE。Step d1, the core network user plane function node receives a first message sent by a second node (such as LEA, AMF, etc.), wherein the first message includes an identifier of a target UE to be intercepted, i.e., a target identifier. For perception-oriented lawful interception, the target UE is a UE responsible for generating perception measurement data and/or a UE responsible for producing perception results.
步骤d2、核心网用户面功能节点根据第一消息获取所述目标UE的第一配置信息,所述第一配置信息指感知数据的传输配置信息,例如,PDU session ID、QoS flow ID、IP三元组或IP五元组等。Step d2, the core network user plane function node obtains the first configuration information of the target UE according to the first message, where the first configuration information refers to the transmission configuration information of the perception data, such as PDU session ID, QoS flow ID, IP triplet or IP quintuple, etc.
可选的,获取所述目标UE的第一配置信息包括:Optionally, acquiring the first configuration information of the target UE includes:
从SMF或PCF获取所述第一配置信息;Obtain the first configuration information from the SMF or PCF;
或者or
从UE获取所述第一配置信息。The first configuration information is obtained from the UE.
可选的,如果感知数据的传输配置信息由目标UE确定,那么在UPF获取第一配置信息之前还包括核心网控制面功能如SMF指示目标UE上报所述第一配置信息,目标UE基于所述指示信息上报所述第一配置信息给SMF,SMF将接收的所述第一配置信息提供给UPF。Optionally, if the transmission configuration information of the perception data is determined by the target UE, then before the UPF obtains the first configuration information, it also includes a core network control plane function such as SMF instructing the target UE to report the first configuration information. The target UE reports the first configuration information to the SMF based on the indication information, and the SMF provides the received first configuration information to the UPF.
步骤d3、核心网用户面功能节点基于获取的第一配置信息检测经所述核心网用户面节点传输的感知数据,以获得目标UE的感知数据(例如软件复制目标UE的感知数据包 或硬件分光等方式),即感知测量数据和/或感知结果。Step d3: The core network user plane function node detects the perception data transmitted by the core network user plane node based on the acquired first configuration information to obtain the perception data of the target UE (for example, the perception data packet of the target UE is copied by software). or hardware spectrometry, etc.), that is, sensing measurement data and/or sensing results.
步骤d4、核心网用户面功能节点将获得的目标UE的感知数据发送给合法侦听节点。Step d4: The core network user plane function node sends the acquired perception data of the target UE to the legal interception node.
综上可知,本申请实施例提供的侦听方法是基于终端感知的合法侦听方式,所述基于终端感知至少包括终端负责生成感知测量数据和/或感知结果,该方案可解决感知测量和感知结果等数据不通过网络承载,或者以业务层数据(可能有业务层加密)承载在移动通信网络透明传输给外部功能情况下,难以进行合法侦听的问题。In summary, the monitoring method provided in the embodiment of the present application is a legal monitoring method based on terminal perception, and the terminal perception at least includes the terminal being responsible for generating perception measurement data and/or perception results. This solution can solve the problem that it is difficult to perform legal monitoring when data such as perception measurements and perception results are not carried through the network, or when data such as business layer data (which may be encrypted at the business layer) is carried in the mobile communication network and transparently transmitted to external functions.
需要说明的是,本申请实施例提供的侦听方法,执行主体可以为侦听装置,或者,该侦听装置中的用于执行侦听方法的控制模块。本申请实施例中以侦听装置执行侦听方法为例,说明本申请实施例提供的侦听装置。It should be noted that the monitoring method provided in the embodiment of the present application can be executed by a monitoring device, or a control module in the monitoring device for executing the monitoring method. In the embodiment of the present application, the monitoring device provided in the embodiment of the present application is described by taking the monitoring device executing the monitoring method as an example.
请参见图7,图7是本申请实施例提供的一种侦听装置的结构图,该侦听装置应用于第一节点,如图7所示,侦听装置700包括:Please refer to FIG. 7 , which is a structural diagram of a listening device provided in an embodiment of the present application. The listening device is applied to a first node. As shown in FIG. 7 , the listening device 700 includes:
第一接收模块701,用于从第二节点接收第一消息,所述第一消息用于指示侦听终端的感知数据;A first receiving module 701 is configured to receive a first message from a second node, where the first message is used to indicate perception data of a listening terminal;
获取模块702,用于根据所述第一消息获取所述终端的感知数据;An acquisition module 702 is configured to acquire perception data of the terminal according to the first message;
第一发送模块703,用于向所述第二节点发送所述终端的感知数据。The first sending module 703 is configured to send the perception data of the terminal to the second node.
可选的,所述第一消息包括目标标识,所述目标标识用于标识所述终端。Optionally, the first message includes a target identifier, and the target identifier is used to identify the terminal.
可选的,所述第一消息还包括如下至少一项:Optionally, the first message further includes at least one of the following:
侦听方式,所述侦听方式包括第一方式或第二方式,所述第一方式用于指示通过所述终端上报所述终端的感知数据,所述第二方式用于指示所述第一节点生成所述终端的感知数据;A listening mode, the listening mode including a first mode or a second mode, the first mode is used to instruct the terminal to report the perception data of the terminal, and the second mode is used to instruct the first node to generate the perception data of the terminal;
侦听类型,所述侦听类型包括感知相关信息和感知内容中的至少一项;A listening type, wherein the listening type includes at least one of sensing related information and sensing content;
服务范围,所述服务范围包括感知;Service scope, the service scope including perception;
过滤条件,所述过滤条件包括时间信息、地理位置信息和感知性能指标中的至少一项。The filtering condition includes at least one of time information, geographic location information, and a perceived performance indicator.
可选的,所述感知性能指标包括如下至少一项:感知精度,感知分辨率,感知更新频率。Optionally, the perception performance indicator includes at least one of the following: perception accuracy, perception resolution, and perception update frequency.
可选的,所述目标标识包括所述终端的临时标识和所述终端的永久标识中的至少一项。Optionally, the target identifier includes at least one of a temporary identifier of the terminal and a permanent identifier of the terminal.
可选的,所述获取模块具体用于包括:Optionally, the acquisition module is specifically configured to include:
向所述终端发送第二消息,所述第二消息用于指示所述终端记录感知数据,所述感知数据为所述终端生成的感知数据;Sending a second message to the terminal, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal;
从所述终端接收所述感知数据。The sensing data is received from the terminal.
可选的,所述第二消息包括如下至少一项:Optionally, the second message includes at least one of the following:
第一指示信息,用于指示所述终端记录所述感知数据;first indication information, used to instruct the terminal to record the perception data;
第二指示信息,用于指示记录所述感知数据的数据量;second indication information, used to indicate the amount of data recorded for the perception data;
第三指示信息,用于指示记录所述感知数据的时间长度;The third indication information is used to indicate the time length for recording the perception data;
第四指示信息,用于指示记录所述感知数据的过滤条件。 The fourth indication information is used to indicate a filtering condition for recording the perception data.
可选的,记录所述感知数据的过滤条件包括如下至少一项:感知目标标识,感知区域信息,感知测量数据的接收节点标识,感知结果的接收节点标识。Optionally, the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
可选的,所述获取模块具体用于:Optionally, the acquisition module is specifically used for:
获取第一配置信息,所述第一配置信息为所述终端进行感知时所使用的配置信息;Acquire first configuration information, where the first configuration information is configuration information used by the terminal for perception;
根据所述第一配置信息确定所述终端的感知数据。Determine the perception data of the terminal according to the first configuration information.
可选的,所述第一配置信息包括如下至少一项:波形类型,子载波间隔,保护间隔,带宽,数据突发burst持续时间,时域间隔,感知信号的发送功率,信号格式,信号方向,时间资源,频率资源,准共址QCL关系,感知测量量配置信息,感知先验信息,感知数据的传输配置信息。Optionally, the first configuration information includes at least one of the following: waveform type, subcarrier spacing, protection interval, bandwidth, data burst duration, time domain interval, transmission power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-site QCL relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
可选的,所述获取模块具体用于:Optionally, the acquisition module is specifically used for:
向所述终端发送第三消息,所述第三消息用于指示所述终端上报所述第一配置信息;Sending a third message to the terminal, where the third message is used to instruct the terminal to report the first configuration information;
接收所述终端上报的所述第一配置信息。Receive the first configuration information reported by the terminal.
可选的,所述获取模块具体用于:Optionally, the acquisition module is specifically used for:
向第一网络侧设备发送第四消息,所述第四消息用于指示所述第一网络侧设备发送所述第一配置信息;Sending a fourth message to the first network side device, where the fourth message is used to instruct the first network side device to send the first configuration information;
从所述第一网络侧设备接收所述第一配置信息。The first configuration information is received from the first network side device.
本申请实施例中的侦听装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是网络侧设备,也可以为除网络侧设备之外的其他设备。示例性的,网络侧设备可以包括但不限于上述所列举的网络侧设备的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。The listening device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip. The electronic device may be a network-side device, or may be a device other than a network-side device. Exemplarily, the network-side device may include but is not limited to the types of network-side devices listed above, and other devices may be servers, network attached storage (NAS), etc., which are not specifically limited in the embodiment of the present application.
本申请实施例提供的侦听装置能够实现图4的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。The listening device provided in the embodiment of the present application can implement each process implemented by the method embodiment of Figure 4 and achieve the same technical effect. To avoid repetition, it will not be described here.
请参见图8,图8是本申请实施例提供的一种侦听装置的结构图,该侦听装置应用于终端,如图8所示,侦听装置800包括:Please refer to FIG. 8 , which is a structural diagram of a listening device provided in an embodiment of the present application. The listening device is applied to a terminal. As shown in FIG. 8 , the listening device 800 includes:
第二接收模块801,用于从第一节点接收目标消息,所述目标消息包括第二消息或第三消息,所述第二消息用于指示所述终端记录感知数据,所述感知数据为所述终端生成的感知数据,所述第三消息用于指示所述终端上报第一配置信息,所述第一配置信息为所述终端进行感知时所使用的配置信息;The second receiving module 801 is used to receive a target message from the first node, where the target message includes a second message or a third message, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, where the first configuration information is configuration information used by the terminal for perception;
第二发送模块802,用于向所述第一节点发送目标信息,所述目标信息包括所述感知数据或所述第一配置信息。The second sending module 802 is used to send target information to the first node, where the target information includes the perception data or the first configuration information.
可选的,所述第二消息包括如下至少一项:Optionally, the second message includes at least one of the following:
第一指示信息,用于指示所述终端记录所述感知数据;first indication information, used to instruct the terminal to record the perception data;
第二指示信息,用于指示记录所述感知数据的数据量;second indication information, used to indicate the amount of data recorded for the perception data;
第三指示信息,用于指示记录所述感知数据的时间长度; The third indication information is used to indicate the time length for recording the perception data;
第四指示信息,用于指示记录所述感知数据的过滤条件。The fourth indication information is used to indicate a filtering condition for recording the perception data.
可选的,记录所述感知数据的过滤条件包括如下至少一项:感知目标标识,感知区域信息,感知测量数据的接收节点标识,感知结果的接收节点标识。Optionally, the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
可选的,所述第一配置信息包括如下至少一项:波形类型,子载波间隔,保护间隔,带宽,数据突发burst持续时间,时域间隔,感知信号的发送功率,信号格式,信号方向,时间资源,频率资源,准共址QCL关系,感知测量量配置信息,感知先验信息,感知数据的传输配置信息。Optionally, the first configuration information includes at least one of the following: waveform type, subcarrier spacing, protection interval, bandwidth, data burst duration, time domain interval, transmission power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-site QCL relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
本申请实施例中的侦听装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是网络侧设备,也可以为除网络侧设备之外的其他设备。示例性的,网络侧设备可以包括但不限于上述所列举的网络侧设备的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。The listening device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip. The electronic device may be a network-side device, or may be a device other than a network-side device. Exemplarily, the network-side device may include but is not limited to the types of network-side devices listed above, and other devices may be servers, network attached storage (NAS), etc., which are not specifically limited in the embodiment of the present application.
本申请实施例提供的侦听装置能够实现图5的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。The listening device provided in the embodiment of the present application can implement each process implemented by the method embodiment of Figure 5 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
请参见图9,图9是本申请实施例提供的一种侦听装置的结构图,该侦听装置应用于第二节点,如图9所示,侦听装置900包括:Please refer to FIG. 9 , which is a structural diagram of a listening device provided in an embodiment of the present application. The listening device is applied to a second node. As shown in FIG. 9 , the listening device 900 includes:
第三发送模块,用于向第一节点发送第一消息,所述第一消息用于指示侦听终端的感知数据;A third sending module, configured to send a first message to the first node, where the first message is used to indicate the perception data of the listening terminal;
第三接收模块,用于从所述第一节点接收所述终端的感知数据。The third receiving module is used to receive the perception data of the terminal from the first node.
可选的,所述第一消息包括目标标识,所述目标标识用于标识所述终端。Optionally, the first message includes a target identifier, and the target identifier is used to identify the terminal.
可选的,所述第一消息还包括如下至少一项:Optionally, the first message further includes at least one of the following:
侦听方式,所述侦听方式包括第一方式或第二方式,所述第一方式用于指示通过所述终端上报所述终端的感知数据,所述第二方式用于指示所述第一节点生成所述终端的感知数据;A listening mode, the listening mode including a first mode or a second mode, the first mode is used to instruct the terminal to report the perception data of the terminal, and the second mode is used to instruct the first node to generate the perception data of the terminal;
侦听类型,所述侦听类型包括感知相关信息和感知内容中的至少一项;A listening type, wherein the listening type includes at least one of sensing related information and sensing content;
服务范围,所述服务范围包括感知;Service scope, the service scope including perception;
过滤条件,所述过滤条件包括时间信息、地理位置信息和感知性能指标中的至少一项。The filtering condition includes at least one of time information, geographic location information, and a perceived performance indicator.
可选的,所述感知性能指标包括如下至少一项:感知精度,感知分辨率,感知更新频率。Optionally, the perception performance indicator includes at least one of the following: perception accuracy, perception resolution, and perception update frequency.
可选的,所述目标标识包括所述终端的临时标识和所述终端的永久标识中的至少一项。Optionally, the target identifier includes at least one of a temporary identifier of the terminal and a permanent identifier of the terminal.
可选的,所述装置还包括:Optionally, the device further comprises:
第四接收模块,用于在所述第一节点仅支持检测所述终端的临时标识的情况下,从第三节点接收临时标识和永久标识之间的关联关系。The fourth receiving module is used to receive the association relationship between the temporary identifier and the permanent identifier from the third node when the first node only supports detecting the temporary identifier of the terminal.
可选的,所述临时标识和永久标识之间的关联关系通过标识事件指示,所述标识事件包括: Optionally, the association relationship between the temporary identifier and the permanent identifier is indicated by an identification event, and the identification event includes:
订阅永久标识,所述订阅永久标识用于识别所述终端;以及A subscription permanent identifier, wherein the subscription permanent identifier is used to identify the terminal; and
观察的临时标识,所述观察的临时标识用于所述第一节点的接口交互所述终端的感知数据时使用。An observed temporary identifier, where the observed temporary identifier is used when the interface of the first node interacts with the perception data of the terminal.
可选的,所述标识事件还包括如下至少一项参数:Optionally, the identification event further includes at least one of the following parameters:
标识事件的时间戳,用于指示所述标识事件的发生时间;A timestamp of an identification event, used to indicate the time when the identification event occurs;
网络功能标识,用于指示生成标识事件报告的网络功能;A network function identifier, used to indicate the network function that generated the identification event report;
地理位置信息,用于指示所述标识事件发送时所述终端的地理位置。The geographical location information is used to indicate the geographical location of the terminal when the identification event is sent.
本申请实施例中的侦听装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是网络侧设备或者合法侦听节点,也可以为除网络侧设备或者合法侦听节点之外的其他设备。示例性的,网络侧设备可以包括但不限于上述所列举的网络侧设备的类型,合法侦听节点可以包括LEA、LEMF等,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。The interception device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip. The electronic device may be a network-side device or a lawful interception node, or may be a device other than a network-side device or a lawful interception node. Exemplarily, the network-side device may include but is not limited to the types of network-side devices listed above, the lawful interception node may include LEA, LEMF, etc., and other devices may be servers, network attached storage (NAS), etc., which are not specifically limited in the embodiment of the present application.
本申请实施例提供的侦听装置能够实现图6的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。The listening device provided in the embodiment of the present application can implement each process implemented by the method embodiment of Figure 6 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
可选的,如图10所示,本申请实施例还提供一种通信设备1000,包括处理器1001和存储器1002,存储器1002上存储有可在所述处理器1001上运行的程序或指令,例如,该通信设备1000为第一节点时,该程序或指令被处理器1001执行时实现上述第一节点侧侦听方法实施例的各个步骤,且能达到相同的技术效果。该通信设备1000为终端时,该程序或指令被处理器1001执行时实现上述终端侧侦听方法实施例的各个步骤,且能达到相同的技术效果。该通信设备1000为第二节点时,该程序或指令被处理器1001执行时实现上述第二节点侧侦听方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。Optionally, as shown in FIG10 , an embodiment of the present application further provides a communication device 1000, including a processor 1001 and a memory 1002, wherein the memory 1002 stores a program or instruction that can be run on the processor 1001. For example, when the communication device 1000 is a first node, the program or instruction is executed by the processor 1001 to implement the various steps of the first node side listening method embodiment, and can achieve the same technical effect. When the communication device 1000 is a terminal, the program or instruction is executed by the processor 1001 to implement the various steps of the terminal side listening method embodiment, and can achieve the same technical effect. When the communication device 1000 is a second node, the program or instruction is executed by the processor 1001 to implement the various steps of the second node side listening method embodiment, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
本申请实施例还提供一种第一节点,包括处理器和通信接口,所述通信接口用于从第二节点接收第一消息,所述第一消息用于指示侦听终端的感知数据;所述处理器用于根据所述第一消息获取所述终端的感知数据;所述通信接口还用于向所述第二节点发送所述终端的感知数据。该第一节点实施例与上述第一节点侧方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该第一节点实施例中,且能达到相同的技术效果。The embodiment of the present application also provides a first node, including a processor and a communication interface, the communication interface is used to receive a first message from a second node, the first message is used to indicate the perception data of the listening terminal; the processor is used to obtain the perception data of the terminal according to the first message; the communication interface is also used to send the perception data of the terminal to the second node. The first node embodiment corresponds to the above-mentioned first node side method embodiment, and each implementation process and implementation method of the above-mentioned method embodiment can be applied to the first node embodiment, and can achieve the same technical effect.
具体地,本申请实施例还提供了一种第一节点。如图11所示,该第一节点1100包括:天线1101、射频装置1102、基带装置1103、处理器1104和存储器1105。天线1101与射频装置1102连接。在上行方向上,射频装置1102通过天线1101接收信息,将接收的信息发送给基带装置1103进行处理。在下行方向上,基带装置1103对要发送的信息进行处理,并发送给射频装置1102,射频装置1102对收到的信息进行处理后经过天线1101发送出去。Specifically, the embodiment of the present application also provides a first node. As shown in Figure 11, the first node 1100 includes: an antenna 1101, a radio frequency device 1102, a baseband device 1103, a processor 1104 and a memory 1105. The antenna 1101 is connected to the radio frequency device 1102. In the uplink direction, the radio frequency device 1102 receives information through the antenna 1101 and sends the received information to the baseband device 1103 for processing. In the downlink direction, the baseband device 1103 processes the information to be sent and sends it to the radio frequency device 1102. The radio frequency device 1102 processes the received information and sends it out through the antenna 1101.
以上实施例中第一节点执行的方法可以在基带装置1103中实现,该基带装置1103包 括基带处理器。The method performed by the first node in the above embodiment can be implemented in the baseband device 1103, and the baseband device 1103 includes Including baseband processor.
基带装置1103例如可以包括至少一个基带板,该基带板上设置有多个芯片,如图11所示,其中一个芯片例如为基带处理器,通过总线接口与存储器1105连接,以调用存储器1105中的程序,执行以上方法实施例中所示的网络设备操作。The baseband device 1103 may include, for example, at least one baseband board, on which multiple chips are arranged, as shown in Figure 11, one of which is, for example, a baseband processor, which is connected to the memory 1105 through a bus interface to call the program in the memory 1105 and execute the network device operations shown in the above method embodiment.
该第一节点还可以包括网络接口1106,该接口例如为通用公共无线接口(common public radio interface,CPRI)。The first node may also include a network interface 1106, which is, for example, a common public radio interface (CPRI).
具体地,本申请实施例的第一节点1100还包括:存储在存储器1105上并可在处理器1104上运行的指令或程序,处理器1104调用存储器1105中的指令或程序执行图7所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。Specifically, the first node 1100 of the embodiment of the present application also includes: instructions or programs stored in the memory 1105 and executable on the processor 1104. The processor 1104 calls the instructions or programs in the memory 1105 to execute the methods executed by the modules shown in Figure 7 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
本申请实施例还提供一种终端,包括处理器和通信接口,所述通信接口用于从第一节点接收目标消息,所述目标消息包括第二消息或第三消息,所述第二消息用于指示所述终端记录感知数据,所述感知数据为所述终端生成的感知数据,所述第三消息用于指示所述终端上报第一配置信息,所述第一配置信息为所述终端进行感知时所使用的配置信息;向所述第一节点发送目标信息,所述目标信息包括所述感知数据或所述第一配置信息。该终端实施例与上述终端侧方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该终端实施例中,且能达到相同的技术效果。具体地,图12为实现本申请实施例的一种终端的硬件结构示意图。The embodiment of the present application also provides a terminal, including a processor and a communication interface, the communication interface is used to receive a target message from a first node, the target message includes a second message or a third message, the second message is used to instruct the terminal to record perception data, the perception data is the perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, the first configuration information is the configuration information used by the terminal for perception; send target information to the first node, the target information includes the perception data or the first configuration information. This terminal embodiment corresponds to the above-mentioned terminal side method embodiment, and each implementation process and implementation method of the above-mentioned method embodiment can be applied to the terminal embodiment, and can achieve the same technical effect. Specifically, Figure 12 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
该终端1200包括但不限于:射频单元1201、网络模块1202、音频输出单元1203、输入单元1204、传感器1205、显示单元1206、用户输入单元1207、接口单元1208、存储器1209以及处理器1210等中的至少部分部件。The terminal 1200 includes but is not limited to: a radio frequency unit 1201, a network module 1202, an audio output unit 1203, an input unit 1204, a sensor 1205, a display unit 1206, a user input unit 1207, an interface unit 1208, a memory 1209 and at least some of the components of the processor 1210.
本领域技术人员可以理解,终端1200还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器1210逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图12中示出的终端结构并不构成对终端的限定,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。Those skilled in the art will appreciate that the terminal 1200 may also include a power source (such as a battery) for supplying power to each component, and the power source may be logically connected to the processor 1210 through a power management system, so as to implement functions such as charging, discharging, and power consumption management through the power management system. The terminal structure shown in FIG12 does not constitute a limitation on the terminal, and the terminal may include more or fewer components than shown in the figure, or combine certain components, or arrange components differently, which will not be described in detail here.
应理解的是,本申请实施例中,输入单元1204可以包括图形处理单元(Graphics Processing Unit,GPU)12041和麦克风12042,图形处理器12041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元1206可包括显示面板12061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板12061。用户输入单元1207包括触控面板12071以及其他输入设备12072中的至少一种。触控面板12071,也称为触摸屏。触控面板12071可包括触摸检测装置和触摸控制器两个部分。其他输入设备12072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。It should be understood that in the embodiment of the present application, the input unit 1204 may include a graphics processing unit (GPU) 12041 and a microphone 12042, and the graphics processor 12041 processes the image data of the static picture or video obtained by the image capture device (such as a camera) in the video capture mode or the image capture mode. The display unit 1206 may include a display panel 12061, and the display panel 12061 may be configured in the form of a liquid crystal display, an organic light emitting diode, etc. The user input unit 1207 includes a touch panel 12071 and at least one of other input devices 12072. The touch panel 12071 is also called a touch screen. The touch panel 12071 may include two parts: a touch detection device and a touch controller. Other input devices 12072 may include, but are not limited to, a physical keyboard, function keys (such as a volume control key, a switch key, etc.), a trackball, a mouse, and a joystick, which will not be repeated here.
本申请实施例中,射频单元1201接收来自网络侧设备的下行数据后,可以传输给处理器1210进行处理;另外,射频单元1201可以向网络侧设备发送上行数据。通常,射频 单元1201包括但不限于天线、放大器、收发信机、耦合器、低噪声放大器、双工器等。In the embodiment of the present application, after receiving downlink data from the network side device, the RF unit 1201 can transmit the data to the processor 1210 for processing; in addition, the RF unit 1201 can send uplink data to the network side device. Unit 1201 includes but is not limited to an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
存储器1209可用于存储软件程序或指令以及各种数据。存储器1209可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器1209可以包括易失性存储器或非易失性存储器,或者,存储器1209可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器1209包括但不限于这些和任意其它适合类型的存储器。The memory 1209 can be used to store software programs or instructions and various data. The memory 1209 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instruction required for at least one function (such as a sound playback function, an image playback function, etc.), etc. In addition, the memory 1209 may include a volatile memory or a non-volatile memory, or the memory 1209 may include both volatile and non-volatile memories. Among them, the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory. The volatile memory may be a random access memory (RAM), a static random access memory (SRAM), a dynamic random access memory (DRAM), a synchronous dynamic random access memory (SDRAM), a double data rate synchronous dynamic random access memory (DDRSDRAM), an enhanced synchronous dynamic random access memory (ESDRAM), a synchronous link dynamic random access memory (SLDRAM) and a direct memory bus random access memory (DRRAM). The memory 1209 in the embodiment of the present application includes but is not limited to these and any other suitable types of memory.
处理器1210可包括一个或多个处理单元;可选的,处理器1210集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器1210中。The processor 1210 may include one or more processing units; optionally, the processor 1210 integrates an application processor and a modem processor, wherein the application processor mainly processes operations related to an operating system, a user interface, and application programs, and the modem processor mainly processes wireless communication signals, such as a baseband processor. It is understandable that the modem processor may not be integrated into the processor 1210.
其中,射频单元1201,用于从第一节点接收目标消息,所述目标消息包括第二消息或第三消息,所述第二消息用于指示所述终端记录感知数据,所述感知数据为所述终端生成的感知数据,所述第三消息用于指示所述终端上报第一配置信息,所述第一配置信息为所述终端进行感知时所使用的配置信息;向所述第一节点发送目标信息,所述目标信息包括所述感知数据或所述第一配置信息。Among them, the radio frequency unit 1201 is used to receive a target message from a first node, the target message includes a second message or a third message, the second message is used to instruct the terminal to record perception data, the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, and the first configuration information is the configuration information used by the terminal for perception; send target information to the first node, and the target information includes the perception data or the first configuration information.
可选的,所述第二消息包括如下至少一项:Optionally, the second message includes at least one of the following:
第一指示信息,用于指示所述终端记录所述感知数据;first indication information, used to instruct the terminal to record the perception data;
第二指示信息,用于指示记录所述感知数据的数据量;second indication information, used to indicate the amount of data recorded for the perception data;
第三指示信息,用于指示记录所述感知数据的时间长度;The third indication information is used to indicate the time length for recording the perception data;
第四指示信息,用于指示记录所述感知数据的过滤条件。The fourth indication information is used to indicate a filtering condition for recording the perception data.
可选的,记录所述感知数据的过滤条件包括如下至少一项:感知目标标识,感知区域信息,感知测量数据的接收节点标识,感知结果的接收节点标识。Optionally, the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
可选的,所述第一配置信息包括如下至少一项:波形类型,子载波间隔,保护间隔,带宽,数据突发burst持续时间,时域间隔,感知信号的发送功率,信号格式,信号方向,时间资源,频率资源,准共址QCL关系,感知测量量配置信息,感知先验信息,感知数据的传输配置信息。 Optionally, the first configuration information includes at least one of the following: waveform type, subcarrier spacing, protection interval, bandwidth, data burst duration, time domain interval, transmission power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-site QCL relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
本申请实施例还提供一种第二节点,包括处理器和通信接口,通信接口用于第二节点向第一节点发送第一消息,所述第一消息用于指示侦听终端的感知数据;所述第二节点从所述第一节点接收所述终端的感知数据。该第二节点实施例与上述第二节点方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该第二节点实施例中,且能达到相同的技术效果。The embodiment of the present application also provides a second node, including a processor and a communication interface, the communication interface is used for the second node to send a first message to the first node, the first message is used to indicate the perception data of the intercepted terminal; the second node receives the perception data of the terminal from the first node. The second node embodiment corresponds to the above second node method embodiment, and each implementation process and implementation method of the above method embodiment can be applied to the second node embodiment, and can achieve the same technical effect.
具体地,本申请实施例还提供了一种第二节点。如图13所示,该第二节点1300包括:天线1301、射频装置1302、基带装置1303、处理器1304和存储器1305。天线1301与射频装置1302连接。在上行方向上,射频装置1302通过天线1301接收信息,将接收的信息发送给基带装置1303进行处理。在下行方向上,基带装置1303对要发送的信息进行处理,并发送给射频装置1302,射频装置1302对收到的信息进行处理后经过天线1301发送出去。Specifically, the embodiment of the present application also provides a second node. As shown in Figure 13, the second node 1300 includes: an antenna 1301, a radio frequency device 1302, a baseband device 1303, a processor 1304 and a memory 1305. The antenna 1301 is connected to the radio frequency device 1302. In the uplink direction, the radio frequency device 1302 receives information through the antenna 1301 and sends the received information to the baseband device 1303 for processing. In the downlink direction, the baseband device 1303 processes the information to be sent and sends it to the radio frequency device 1302. The radio frequency device 1302 processes the received information and sends it out through the antenna 1301.
以上实施例中第二节点执行的方法可以在基带装置1303中实现,该基带装置1303包括基带处理器。The method executed by the second node in the above embodiment may be implemented in the baseband device 1303, which includes a baseband processor.
基带装置1303例如可以包括至少一个基带板,该基带板上设置有多个芯片,如图13所示,其中一个芯片例如为基带处理器,通过总线接口与存储器1305连接,以调用存储器1305中的程序,执行以上方法实施例中所示的网络设备操作。The baseband device 1303 may include, for example, at least one baseband board, on which multiple chips are arranged, as shown in Figure 13, one of which is, for example, a baseband processor, which is connected to the memory 1305 through a bus interface to call the program in the memory 1305 and execute the network device operations shown in the above method embodiment.
该第二节点还可以包括网络接口1306,该接口例如为通用公共无线接口(common public radio interface,CPRI)。The second node may also include a network interface 1306, which is, for example, a common public radio interface (CPRI).
具体地,本申请实施例的第二节点1300还包括:存储在存储器1305上并可在处理器1304上运行的指令或程序,处理器1304调用存储器1305中的指令或程序执行图7所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。Specifically, the second node 1300 of the embodiment of the present application also includes: instructions or programs stored in the memory 1305 and executable on the processor 1304. The processor 1304 calls the instructions or programs in the memory 1305 to execute the methods executed by the modules shown in Figure 7 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述侦听方法实施例的各个过程,或者实现上述侦听方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。An embodiment of the present application also provides a readable storage medium, on which a program or instruction is stored. When the program or instruction is executed by a processor, the various processes of the above-mentioned listening method embodiment are implemented, or the various processes of the above-mentioned listening method embodiment are implemented, and the same technical effect can be achieved. To avoid repetition, it will not be repeated here.
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。The processor is the processor in the terminal described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a computer read-only memory ROM, a random access memory RAM, a magnetic disk or an optical disk.
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述第一节点侧侦听方法实施例的各个过程,或者实现上述终端侧侦听方法实施例的各个过程,或者实现上述第二节点侧侦听方法实施例的各个过程且能达到相同的技术效果,为避免重复,这里不再赘述。An embodiment of the present application further provides a chip, which includes a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the various processes of the above-mentioned first node-side listening method embodiment, or to implement the various processes of the above-mentioned terminal-side listening method embodiment, or to implement the various processes of the above-mentioned second node-side listening method embodiment and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。It should be understood that the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.
本申请实施例另提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现上述第一节点侧 侦听方法实施例的各个过程,或者实现上述终端侧侦听方法实施例的各个过程,或者实现上述第二节点侧侦听方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。The embodiment of the present application further provides a computer program/program product, wherein the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the first node side The various processes of the listening method embodiment, or the various processes of the above-mentioned terminal side listening method embodiment, or the various processes of the above-mentioned second node side listening method embodiment, can achieve the same technical effect. In order to avoid repetition, they will not be repeated here.
本申请实施例还提供了一种合法侦听系统,包括:第一节点、终端及第二节点,所述第一节点用于执行如图4及上述各个方法实施例的各个过程,所述终端用于执行如图5及上述各个方法实施例的各个过程,所述第二节点用于执行如图6及上述各个方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。An embodiment of the present application also provides a lawful interception system, including: a first node, a terminal and a second node, the first node is used to execute the processes as shown in Figure 4 and the above-mentioned method embodiments, the terminal is used to execute the processes as shown in Figure 5 and the above-mentioned method embodiments, and the second node is used to execute the processes as shown in Figure 6 and the above-mentioned method embodiments, and the same technical effects can be achieved, which will not be described again here to avoid repetition.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本公开的范围。Those of ordinary skill in the art will appreciate that the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein can be implemented in electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Professional and technical personnel can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this disclosure.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of description, the specific working processes of the systems, devices and units described above can refer to the corresponding processes in the aforementioned method embodiments and will not be repeated here.
在本申请所提供的实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the embodiments provided in the present application, it should be understood that the disclosed devices and methods can be implemented in other ways. For example, the device embodiments described above are only schematic. For example, the division of the units is only a logical function division. There may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed. Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本公开各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present disclosure may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本公开的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本公开各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。If the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present disclosure, or the part that contributes to the prior art or the part of the technical solution, can be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for a computer device (which can be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in each embodiment of the present disclosure. The aforementioned storage medium includes: various media that can store program codes, such as USB flash drives, mobile hard drives, ROM, RAM, magnetic disks, or optical disks.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来控制相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、 光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。Those skilled in the art can understand that all or part of the processes in the above-mentioned embodiments can be realized by controlling the relevant hardware through a computer program. The program can be stored in a computer-readable storage medium. When the program is executed, it can include the processes in the embodiments of the above-mentioned methods. The storage medium can be a disk, Optical disk, Read-Only Memory (ROM) or Random Access Memory (RAM), etc.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。It should be noted that, in this article, the terms "comprise", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, article or device including a series of elements includes not only those elements, but also other elements not explicitly listed, or also includes elements inherent to such process, method, article or device. In the absence of further restrictions, an element defined by the sentence "comprises one..." does not exclude the presence of other identical elements in the process, method, article or device including the element. In addition, it should be noted that the scope of the method and device in the embodiment of the present application is not limited to performing functions in the order shown or discussed, and may also include performing functions in a substantially simultaneous manner or in reverse order according to the functions involved, for example, the described method may be performed in an order different from that described, and various steps may also be added, omitted, or combined. In addition, the features described with reference to certain examples may be combined in other examples.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。Through the description of the above implementation methods, those skilled in the art can clearly understand that the above-mentioned embodiment methods can be implemented by means of software plus a necessary general hardware platform, and of course by hardware, but in many cases the former is a better implementation method. Based on such an understanding, the technical solution of the present application, or the part that contributes to the prior art, can be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, a magnetic disk, or an optical disk), and includes a number of instructions for enabling a terminal (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the methods described in each embodiment of the present application.
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。 The embodiments of the present application are described above in conjunction with the accompanying drawings, but the present application is not limited to the above-mentioned specific implementation methods. The above-mentioned specific implementation methods are merely illustrative and not restrictive. Under the guidance of the present application, ordinary technicians in this field can also make many forms without departing from the purpose of the present application and the scope of protection of the claims, all of which are within the protection of the present application.

Claims (31)

  1. 一种侦听方法,包括:A monitoring method, comprising:
    第一节点接收第一消息,所述第一消息用于指示侦听终端的感知数据;The first node receives a first message, where the first message is used to indicate perception data of the intercepting terminal;
    所述第一节点根据所述第一消息获取所述终端的感知数据;The first node acquires the perception data of the terminal according to the first message;
    所述第一节点向第二节点发送所述终端的感知数据。The first node sends the perception data of the terminal to the second node.
  2. 根据权利要求1所述的方法,其中,所述第一消息包括目标标识,所述目标标识用于标识所述终端。The method according to claim 1, wherein the first message includes a target identifier, and the target identifier is used to identify the terminal.
  3. 根据权利要求2所述的方法,其中,所述第一消息还包括如下至少一项:The method according to claim 2, wherein the first message further includes at least one of the following:
    侦听方式,所述侦听方式包括第一方式或第二方式,所述第一方式用于指示通过所述终端上报所述终端的感知数据,所述第二方式用于指示所述第一节点生成所述终端的感知数据;A listening mode, the listening mode including a first mode or a second mode, the first mode is used to instruct the terminal to report the perception data of the terminal, and the second mode is used to instruct the first node to generate the perception data of the terminal;
    侦听类型,所述侦听类型包括感知相关信息和感知内容中的至少一项;A listening type, wherein the listening type includes at least one of sensing related information and sensing content;
    服务范围,所述服务范围包括感知;Service scope, the service scope including perception;
    过滤条件,所述过滤条件包括时间信息、地理位置信息和感知性能指标中的至少一项。The filtering condition includes at least one of time information, geographic location information, and a perceived performance indicator.
  4. 根据权利要求3所述的方法,其中,所述感知性能指标包括如下至少一项:感知精度,感知分辨率,感知更新频率。The method according to claim 3, wherein the perceptual performance indicator comprises at least one of the following: perceptual accuracy, perceptual resolution, and perceptual update frequency.
  5. 根据权利要求2所述的方法,其中,所述目标标识包括所述终端的临时标识和所述终端的永久标识中的至少一项。The method according to claim 2, wherein the target identifier includes at least one of a temporary identifier of the terminal and a permanent identifier of the terminal.
  6. 根据权利要求1所述的方法,其中,所述第一节点根据所述第一消息获取所述终端的感知数据包括:The method according to claim 1, wherein the first node obtains the perception data of the terminal according to the first message comprises:
    所述第一节点向所述终端发送第二消息,所述第二消息用于指示所述终端记录感知数据,所述感知数据为所述终端生成的感知数据;The first node sends a second message to the terminal, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal;
    所述第一节点从所述终端接收所述感知数据。The first node receives the sensing data from the terminal.
  7. 根据权利要求6所述的方法,其中,所述第二消息包括如下至少一项:The method according to claim 6, wherein the second message includes at least one of the following:
    第一指示信息,用于指示所述终端记录所述感知数据;first indication information, used to instruct the terminal to record the perception data;
    第二指示信息,用于指示记录所述感知数据的数据量;second indication information, used to indicate the amount of data recorded for the perception data;
    第三指示信息,用于指示记录所述感知数据的时间长度;The third indication information is used to indicate the time length for recording the perception data;
    第四指示信息,用于指示记录所述感知数据的过滤条件。The fourth indication information is used to indicate a filtering condition for recording the perception data.
  8. 根据权利要求7所述的方法,其中,记录所述感知数据的过滤条件包括如下至少一项:感知目标标识,感知区域信息,感知测量数据的接收节点标识,感知结果的接收节点标识。The method according to claim 7, wherein the filtering condition for recording the perception data comprises at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
  9. 根据权利要求1所述的方法,其中,所述第一节点根据所述第一消息获取所述终端的感知数据包括:The method according to claim 1, wherein the first node obtains the perception data of the terminal according to the first message comprises:
    所述第一节点获取第一配置信息,所述第一配置信息为所述终端进行感知时所使用的 配置信息;The first node obtains first configuration information, where the first configuration information is used by the terminal for perception Configuration information;
    所述第一节点根据所述第一配置信息确定所述终端的感知数据。The first node determines the perception data of the terminal according to the first configuration information.
  10. 根据权利要求9所述的方法,其中,所述第一配置信息包括如下至少一项:波形类型,子载波间隔,保护间隔,带宽,数据突发burst持续时间,时域间隔,感知信号的发送功率,信号格式,信号方向,时间资源,频率资源,准共址QCL关系,感知测量量配置信息,感知先验信息,感知数据的传输配置信息。The method according to claim 9, wherein the first configuration information includes at least one of the following: waveform type, subcarrier spacing, guard interval, bandwidth, data burst duration, time domain interval, transmit power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-location QCL relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
  11. 根据权利要求9所述的方法,其中,所述第一节点获取第一配置信息包括:The method according to claim 9, wherein the first node acquiring the first configuration information comprises:
    所述第一节点向所述终端发送第三消息,所述第三消息用于指示所述终端上报所述第一配置信息;The first node sends a third message to the terminal, where the third message is used to instruct the terminal to report the first configuration information;
    所述第一节点接收所述终端上报的所述第一配置信息。The first node receives the first configuration information reported by the terminal.
  12. 根据权利要求9所述的方法,其中,所述第一节点获取第一配置信息包括:The method according to claim 9, wherein the first node acquiring the first configuration information comprises:
    所述第一节点向第一网络侧设备发送第四消息,所述第四消息用于指示所述第一网络侧设备发送所述第一配置信息;The first node sends a fourth message to the first network side device, where the fourth message is used to instruct the first network side device to send the first configuration information;
    所述第一节点从所述第一网络侧设备接收所述第一配置信息。The first node receives the first configuration information from the first network side device.
  13. 一种侦听方法,包括:A monitoring method, comprising:
    终端从第一节点接收目标消息,所述目标消息包括第二消息或第三消息,所述第二消息用于指示所述终端记录感知数据,所述感知数据为所述终端生成的感知数据,所述第三消息用于指示所述终端上报第一配置信息,所述第一配置信息为所述终端进行感知时所使用的配置信息;The terminal receives a target message from the first node, where the target message includes a second message or a third message, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, where the first configuration information is configuration information used by the terminal for perception;
    所述终端向所述第一节点发送目标信息,所述目标信息包括所述感知数据或所述第一配置信息。The terminal sends target information to the first node, where the target information includes the perception data or the first configuration information.
  14. 根据权利要求13所述的方法,其中,所述第二消息包括如下至少一项:The method according to claim 13, wherein the second message includes at least one of the following:
    第一指示信息,用于指示所述终端记录所述感知数据;first indication information, used to instruct the terminal to record the perception data;
    第二指示信息,用于指示记录所述感知数据的数据量;second indication information, used to indicate the amount of data recorded for the perception data;
    第三指示信息,用于指示记录所述感知数据的时间长度;The third indication information is used to indicate the time length for recording the perception data;
    第四指示信息,用于指示记录所述感知数据的过滤条件。The fourth indication information is used to indicate a filtering condition for recording the perception data.
  15. 根据权利要求14所述的方法,其中,记录所述感知数据的过滤条件包括如下至少一项:感知目标标识,感知区域信息,感知测量数据的接收节点标识,感知结果的接收节点标识。The method according to claim 14, wherein the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
  16. 根据权利要求13所述的方法,其中,所述第一配置信息包括如下至少一项:波形类型,子载波间隔,保护间隔,带宽,数据突发burst持续时间,时域间隔,感知信号的发送功率,信号格式,信号方向,时间资源,频率资源,准共址QCL关系,感知测量量配置信息,感知先验信息,感知数据的传输配置信息。The method according to claim 13, wherein the first configuration information includes at least one of the following: waveform type, subcarrier spacing, guard interval, bandwidth, data burst duration, time domain interval, transmit power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-site QCL relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
  17. 一种侦听方法,包括:A monitoring method, comprising:
    第二节点向第一节点发送第一消息,所述第一消息用于指示侦听终端的感知数据; The second node sends a first message to the first node, where the first message is used to indicate the perception data of the intercepting terminal;
    所述第二节点从所述第一节点接收所述终端的感知数据。The second node receives the perception data of the terminal from the first node.
  18. 根据权利要求17所述的方法,其中,所述第一消息包括目标标识,所述目标标识用于标识所述终端。The method according to claim 17, wherein the first message includes a target identifier, and the target identifier is used to identify the terminal.
  19. 根据权利要求18所述的方法,其中,所述第一消息还包括如下至少一项:The method according to claim 18, wherein the first message further includes at least one of the following:
    侦听方式,所述侦听方式包括第一方式或第二方式,所述第一方式用于指示通过所述终端上报所述终端的感知数据,所述第二方式用于指示所述第一节点生成所述终端的感知数据;A listening mode, the listening mode including a first mode or a second mode, the first mode is used to instruct the terminal to report the perception data of the terminal, and the second mode is used to instruct the first node to generate the perception data of the terminal;
    侦听类型,所述侦听类型包括感知相关信息和感知内容中的至少一项;A listening type, wherein the listening type includes at least one of sensing related information and sensing content;
    服务范围,所述服务范围包括感知;Service scope, the service scope including perception;
    过滤条件,所述过滤条件包括时间信息、地理位置信息和感知性能指标中的至少一项。The filtering condition includes at least one of time information, geographic location information, and a perceived performance indicator.
  20. 根据权利要求19所述的方法,其中,所述感知性能指标包括如下至少一项:感知精度,感知分辨率,感知更新频率。The method according to claim 19, wherein the perceptual performance indicator comprises at least one of the following: perceptual accuracy, perceptual resolution, and perceptual update frequency.
  21. 根据权利要求18所述的方法,其中,所述目标标识包括所述终端的临时标识和所述终端的永久标识中的至少一项。The method according to claim 18, wherein the target identifier comprises at least one of a temporary identifier of the terminal and a permanent identifier of the terminal.
  22. 根据权利要求18所述的方法,其中,所述方法还包括:The method according to claim 18, wherein the method further comprises:
    在所述第一节点仅支持检测所述终端的临时标识的情况下,所述第二节点从第三节点接收临时标识和永久标识之间的关联关系。In the case that the first node only supports detecting the temporary identity of the terminal, the second node receives the association relationship between the temporary identity and the permanent identity from the third node.
  23. 根据权利要求22所述的方法,其中,所述临时标识和永久标识之间的关联关系通过标识事件指示,所述标识事件包括:The method according to claim 22, wherein the association relationship between the temporary identification and the permanent identification is indicated by an identification event, and the identification event comprises:
    订阅永久标识,所述订阅永久标识用于识别所述终端;以及A subscription permanent identifier, wherein the subscription permanent identifier is used to identify the terminal; and
    观察的临时标识,所述观察的临时标识用于所述第一节点的接口交互所述终端的感知数据时使用。An observed temporary identifier, where the observed temporary identifier is used when the interface of the first node interacts with the perception data of the terminal.
  24. 根据权利要求23所述的方法,其中,所述标识事件还包括如下至少一项参数:The method according to claim 23, wherein the identification event further includes at least one of the following parameters:
    标识事件的时间戳,用于指示所述标识事件的发生时间;A timestamp of an identification event, used to indicate the time when the identification event occurs;
    网络功能标识,用于指示生成标识事件报告的网络功能;A network function identifier, used to indicate the network function that generated the identification event report;
    地理位置信息,用于指示所述标识事件发送时所述终端的地理位置。The geographical location information is used to indicate the geographical location of the terminal when the identification event is sent.
  25. 一种侦听装置,应用于第一节点,包括:A monitoring device, applied to a first node, comprising:
    第一接收模块,用于从第二节点接收第一消息,所述第一消息用于指示侦听终端的感知数据;A first receiving module, configured to receive a first message from a second node, wherein the first message is used to indicate perception data of a listening terminal;
    获取模块,用于根据所述第一消息获取所述终端的感知数据;An acquisition module, configured to acquire the perception data of the terminal according to the first message;
    第一发送模块,用于向所述第二节点发送所述终端的感知数据。The first sending module is used to send the perception data of the terminal to the second node.
  26. 一种侦听装置,应用于终端,包括:A monitoring device, applied to a terminal, comprising:
    第二接收模块,用于从第一节点接收目标消息,所述目标消息包括第二消息或第三消息,所述第二消息用于指示所述终端记录感知数据,所述感知数据为所述终端生成的感知数据,所述第三消息用于指示所述终端上报第一配置信息,所述第一配置信息为所述终端 进行感知时所使用的配置信息;The second receiving module is used to receive a target message from the first node, the target message includes a second message or a third message, the second message is used to instruct the terminal to record the perception data, the perception data is the perception data generated by the terminal, and the third message is used to instruct the terminal to report the first configuration information, the first configuration information is the terminal Configuration information used when performing perception;
    第二发送模块,用于向所述第一节点发送目标信息,所述目标信息包括所述感知数据或所述第一配置信息。The second sending module is used to send target information to the first node, where the target information includes the perception data or the first configuration information.
  27. 一种侦听装置,应用于第二节点,包括:A monitoring device, applied to a second node, comprising:
    第三发送模块,用于向第一节点发送第一消息,所述第一消息用于指示侦听终端的感知数据;A third sending module, configured to send a first message to the first node, where the first message is used to indicate the perception data of the listening terminal;
    第三接收模块,用于从所述第一节点接收所述终端的感知数据。The third receiving module is used to receive the perception data of the terminal from the first node.
  28. 一种第一节点,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,其中,所述程序或指令被所述处理器执行时实现如权利要求1至12任一项所述的侦听方法的步骤。A first node comprises a processor and a memory, wherein the memory stores a program or instruction that can be run on the processor, wherein the program or instruction, when executed by the processor, implements the steps of the monitoring method as described in any one of claims 1 to 12.
  29. 一种终端,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,其中,所述程序或指令被所述处理器执行时实现如权利要求13至16任一项所述的侦听方法的步骤。A terminal comprises a processor and a memory, wherein the memory stores a program or instruction that can be run on the processor, wherein the program or instruction, when executed by the processor, implements the steps of the interception method as described in any one of claims 13 to 16.
  30. 一种第二节点,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,其中,所述程序或指令被所述处理器执行时实现如权利要求17至24任一项所述的侦听方法的步骤。A second node comprises a processor and a memory, wherein the memory stores a program or instruction that can be run on the processor, wherein the program or instruction, when executed by the processor, implements the steps of the monitoring method as described in any one of claims 17 to 24.
  31. 一种可读存储介质,所述可读存储介质上存储程序或指令,其中,所述程序或指令被处理器执行时实现如权利要求1至12任一项所述的侦听方法的步骤,或者实现如权利要求13至16任一项所述的侦听方法的步骤,或者实现如权利要求17至24任一项所述的侦听方法的步骤。 A readable storage medium storing a program or instruction, wherein when the program or instruction is executed by a processor, the program or instruction implements the steps of the interception method according to any one of claims 1 to 12, or implements the steps of the interception method according to any one of claims 13 to 16, or implements the steps of the interception method according to any one of claims 17 to 24.
PCT/CN2023/124492 2022-10-20 2023-10-13 Interception method and apparatus, and related device WO2024083044A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211287945.7A CN117956476A (en) 2022-10-20 2022-10-20 Interception method, interception device and related equipment
CN202211287945.7 2022-10-20

Publications (1)

Publication Number Publication Date
WO2024083044A1 true WO2024083044A1 (en) 2024-04-25

Family

ID=90736911

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/124492 WO2024083044A1 (en) 2022-10-20 2023-10-13 Interception method and apparatus, and related device

Country Status (2)

Country Link
CN (1) CN117956476A (en)
WO (1) WO2024083044A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101325781A (en) * 2007-06-15 2008-12-17 华为技术有限公司 Lawful snooping method, system and network equipment
CN101523851A (en) * 2006-10-02 2009-09-02 艾利森电话股份有限公司 Lawful interception in wireline broadband networks
CN105744519A (en) * 2016-03-17 2016-07-06 北京佰才邦技术有限公司 Monitoring method, core network device and base station
WO2022100499A1 (en) * 2020-11-11 2022-05-19 华为技术有限公司 Sensing signal transmission method and apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101523851A (en) * 2006-10-02 2009-09-02 艾利森电话股份有限公司 Lawful interception in wireline broadband networks
CN101325781A (en) * 2007-06-15 2008-12-17 华为技术有限公司 Lawful snooping method, system and network equipment
CN105744519A (en) * 2016-03-17 2016-07-06 北京佰才邦技术有限公司 Monitoring method, core network device and base station
WO2022100499A1 (en) * 2020-11-11 2022-05-19 华为技术有限公司 Sensing signal transmission method and apparatus

Also Published As

Publication number Publication date
CN117956476A (en) 2024-04-30

Similar Documents

Publication Publication Date Title
US9810764B2 (en) Systems and methods for high precision indoor location tracking
EP2513758B1 (en) Location intelligence management system
WO2021155793A1 (en) Positioning method, terminal and network device
US9185520B2 (en) Enhanced location based services
CN109842924B (en) Position acquisition control method, user terminal and device
EP3542562B1 (en) User location monitoring in mobile edge environment
US20230134028A1 (en) METHOD AND APPARATUS OF POSITIONING BETWEEN UEs, COMMUNICATION DEVICE AND STORAGE MEDIUM
WO2023001243A1 (en) Sensing method and apparatus, terminal, and network device
US10986495B2 (en) Interception method and apparatus based on local breakout
WO2024083044A1 (en) Interception method and apparatus, and related device
WO2023001269A1 (en) Sensing method and apparatus, and network device
WO2023001183A1 (en) Communication sensing method, apparatus and device
WO2024083038A1 (en) Interception methods and apparatus, and related device
CN113973293B (en) Interception method and device
CN115499894A (en) Network slice adjusting method, device and equipment
CN109936590B (en) Information transmission method and device, computer storage medium and communication system
WO2016184186A1 (en) Distance measuring method, base station and computer storage medium
WO2024083045A1 (en) Authentication determination method and apparatus, authentication method and apparatus, and node
WO2023001184A1 (en) Sensing signal measurement method and apparatus, network device, and terminal
WO2024083040A1 (en) Sensing authentication method and apparatus, and node
WO2024032460A1 (en) Data collection method and apparatus and communication device
WO2023030327A1 (en) Perception service processing method and device
WO2023001179A1 (en) Communication sensing method, apparatus and device
WO2023001270A1 (en) Sensing method and apparatus, and network device
US20240196255A1 (en) Method and apparatus for measuring sensing signal, network device, and terminal