WO2024083044A1 - Procédé et appareil d'interception, et dispositif associé - Google Patents

Procédé et appareil d'interception, et dispositif associé Download PDF

Info

Publication number
WO2024083044A1
WO2024083044A1 PCT/CN2023/124492 CN2023124492W WO2024083044A1 WO 2024083044 A1 WO2024083044 A1 WO 2024083044A1 CN 2023124492 W CN2023124492 W CN 2023124492W WO 2024083044 A1 WO2024083044 A1 WO 2024083044A1
Authority
WO
WIPO (PCT)
Prior art keywords
perception
terminal
node
message
data
Prior art date
Application number
PCT/CN2023/124492
Other languages
English (en)
Chinese (zh)
Inventor
袁雁南
杨晓东
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2024083044A1 publication Critical patent/WO2024083044A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements

Definitions

  • the present application belongs to the field of communication technology, and specifically relates to a monitoring method, device and related equipment.
  • B5G Beyond5th-Generation
  • 6G 6th Generation
  • lawful interception is mainly aimed at the existing service scope of communication service providers (such as voice, data packets, messages and target positioning), and is mainly based on network layer interception or service layer interception on the network side.
  • the perception measurement and/or perception result calculation are completed on the UE side in the modes of self-transmission and self-reception of user equipment (UE), transmission and reception of perception between UEs, and transmission and reception of base stations by UEs, it is inconvenient to lawfully intercept the perception data of UEs because the data such as perception measurement and perception results may not be carried through the network, or may be carried in the mobile communication network as service layer data (which may be encrypted at the service layer).
  • service layer data which may be encrypted at the service layer
  • the embodiments of the present application provide a monitoring method, an apparatus and related equipment, which can solve the problem in the related art that it is inconvenient to legally monitor the perception data of the terminal.
  • a monitoring method which is applied to a first node, and the method includes:
  • the first node receives a first message, where the first message is used to indicate perception data of the intercepting terminal;
  • the first node acquires the perception data of the terminal according to the first message
  • the first node sends the perception data of the terminal to the second node.
  • a monitoring device which is applied to a first node and includes:
  • a first receiving module configured to receive a first message from a second node, wherein the first message is used to indicate perception data of a listening terminal;
  • An acquisition module configured to acquire the perception data of the terminal according to the first message
  • the first sending module is used to send the perception data of the terminal to the second node.
  • a monitoring method which is applied to a terminal, and the method includes:
  • the terminal receives a target message from the first node, where the target message includes a second message or a third message, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, where the first configuration information is configuration information used by the terminal for perception;
  • the terminal sends target information to the first node, where the target information includes the perception data or the first configuration information.
  • a monitoring device which is applied to a terminal, and the device includes:
  • a second receiving module is used to receive a target message from the first node, where the target message includes a second message or a third message, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, where the first configuration information is configuration information used by the terminal for perception;
  • the second sending module is used to send target information to the first node, where the target information includes the perception data or the first configuration information.
  • a monitoring method which is applied to a second node, and the method includes:
  • the second node sends a first message to the first node, where the first message is used to indicate the perception data of the intercepting terminal;
  • the second node receives the perception data of the terminal from the first node.
  • a monitoring device which is applied to a second node, and includes:
  • a third sending module configured to send a first message to the first node, where the first message is used to indicate the perception data of the listening terminal;
  • the third receiving module is used to receive the perception data of the terminal from the first node.
  • a first node which terminal includes a processor and a memory, wherein the memory stores a program or instruction that can be executed on the processor, and when the program or instruction is executed by the processor, the steps of the method described in the first aspect are implemented.
  • a first node comprising a processor and a communication interface, wherein the communication interface is used to receive a first message from a second node, the first message being used to indicate perception data of a listening terminal; the processor is used to obtain the perception data of the terminal according to the first message; and the communication interface is also used to send the perception data of the terminal to the second node.
  • a terminal comprising a processor and a memory, wherein the memory stores a program or instruction that can be run on the processor, and when the program or instruction is executed by the processor, the steps of the method described in the third aspect are implemented.
  • a terminal comprising a processor and a communication interface, wherein the communication interface is used to receive a target message from a first node, the target message comprising a second message or a third message, the second message is used to instruct the terminal to record perception data, the perception data is perception data generated by the terminal, and the third message is used to instruct
  • the terminal reports first configuration information, where the first configuration information is configuration information used by the terminal for perception; and sends target information to the first node, where the target information includes the perception data or the first configuration information.
  • a second node which includes a processor and a memory, wherein the memory stores a program or instruction that can be executed on the processor, and when the program or instruction is executed by the processor, the steps of the method described in the fifth aspect are implemented.
  • a second node comprising a processor and a communication interface, wherein the communication interface is used to send a first message to the first node, wherein the first message is used to indicate perception data of a listening terminal; and receive perception data of the terminal from the first node.
  • a lawful interception system comprising: a first node, a terminal and a second node, wherein the first node can be used to execute the steps of the interception method as described in the first aspect, the terminal can be used to execute the steps of the interception method as described in the third aspect, and the second node can be used to execute the steps of the interception method as described in the fifth aspect.
  • a readable storage medium on which a program or instruction is stored.
  • the program or instruction is executed by a processor, the steps of the method described in the first aspect are implemented, or the steps of the method described in the third aspect are implemented, or the steps of the method described in the fifth aspect are implemented.
  • a chip comprising a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run a program or instructions to implement the steps of the method described in the first aspect, or to implement the steps of the method described in the third aspect, or to implement the steps of the method described in the fifth aspect.
  • a computer program/program product is provided, wherein the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the steps of the method described in the first aspect, or the steps of the method described in the third aspect, or the steps of the method described in the fifth aspect.
  • a first message is received by a first node, and the first message is used to indicate the perception data of the listening terminal; the first node obtains the perception data of the terminal according to the first message; the first node sends the perception data of the terminal to the second node, that is, the perception data of the terminal to be listened to is obtained through the first node and sent to the second node, so that the second node can more easily listen to the perception data of the terminal, thereby improving the convenience of the second node listening to the perception data of the terminal.
  • FIG1 is a block diagram of a wireless communication system to which an embodiment of the present application can be applied;
  • FIG2 is a schematic diagram of six sensing methods provided in an embodiment of the present application.
  • FIG3 is a schematic diagram of a lawful interception architecture provided in an embodiment of the present application.
  • FIG4 is a flow chart of a monitoring method provided in an embodiment of the present application.
  • FIG5 is a flow chart of another monitoring method provided in an embodiment of the present application.
  • FIG6 is a flow chart of another monitoring method provided in an embodiment of the present application.
  • FIG7 is a structural diagram of a listening device provided in an embodiment of the present application.
  • FIG8 is a structural diagram of another listening device provided in an embodiment of the present application.
  • FIG9 is a structural diagram of another listening device provided in an embodiment of the present application.
  • FIG10 is a structural diagram of a communication device provided in an embodiment of the present application.
  • FIG11 is a structural diagram of a first node provided in an embodiment of the present application.
  • FIG12 is a structural diagram of a terminal provided in an embodiment of the present application.
  • FIG. 13 is a structural diagram of a second node provided in an embodiment of the present application.
  • first, second, etc. in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It should be understood that the terms used in this way are interchangeable under appropriate circumstances, so that the embodiments of the present application can be implemented in an order other than those illustrated or described here, and the objects distinguished by “first” and “second” are generally of the same type, and the number of objects is not limited.
  • the first object can be one or more.
  • “and/or” in the specification and claims represents at least one of the connected objects, and the character “/" generally represents that the objects associated with each other are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • NR new radio
  • FIG1 shows a block diagram of a wireless communication system applicable to an embodiment of the present application.
  • the wireless communication system includes a terminal 11, a first node 12, and a second node 13.
  • the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a handheld computer, a netbook, an ultra-mobile personal computer (ultra-mobile personal computer, UMPC), a mobile Internet device (Mobile Internet Device, MID), an augmented reality (augmented reality, AR)/virtual reality (virtual reality, VR) device, a robot, a wearable device (Wearable Device), a vehicle user equipment (VUE), a pedestrian terminal (Pedestrian User Equipment, PUE), a smart home (home equipment with wireless communication function, such as a refrigerator, a television, a washing machine or furniture, etc.), a game console, a personal computer (personal
  • the terminal side devices include:
  • the first node 12 may include a network side device, and the network side device may include an access network device or a core network device or a service function of a communication service provider, etc., wherein the access network device may also be referred to as a wireless access network device, a wireless access network (Radio Access Network, RAN), a wireless access network function or a wireless access network unit.
  • the access network device may include a base station, a wireless local area network (Wireless Local Area Networks, WLAN) access point or a WiFi node, etc.
  • WLAN wireless Local Area Networks
  • the base station may be referred to as a node B, an evolved node B (eNB), an access point, a base transceiver station (Base Transceiver Station, BTS), a radio base station, a radio transceiver, a basic service set (Basic Service Set, BSS), an extended service set (Extended Service Set, ESS), a home B node, a home evolved B node, a transmission reception point (Transmission Reception Point, TRP) or other appropriate terms in the field, as long as the same technical effect is achieved, the base station is not limited to a specific technical vocabulary, and it should be noted that in the embodiment of the present application, only the base station in the NR system is used as an example for introduction, and the specific type of the base station is not limited.
  • the core network equipment may include but is not limited to at least one of the following: core network nodes, core network functions, mobility management entity (Mobility Management Entity, MME), access mobility management function (Access and Mobility Management Function, AMF), session management function (Session Management Function, SMF), user plane function (User Plane Function, UPF), policy control function (Policy Control Function, PCF), policy and charging rules function unit (Policy and Charging Rules Function, PCRF), edge application service discovery function (Edge Application Server Discovery ...
  • MME mobility management entity
  • AMF Access and Mobility Management Function
  • SMF Session Management Function
  • SMF Session Management Function
  • UPF User Plane Function
  • Policy Control Function Policy Control Function
  • PCRF Policy and Charging Rules Function
  • edge application service discovery function Edge Application Server Discovery ...
  • UPF User Plane Function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF user plane function
  • UPF User Plane Function
  • UPF user plane function (User Plane Function, UPF)
  • user plane function User Plane Function
  • UPF user plane function (User Plane Function, UPF)
  • user ion, EASDF Unified Data Management
  • UDM Unified Data Repository
  • HSS Centralized network configuration
  • CNC Centralized network configuration
  • NEF Network Exposure Function
  • NEF Network Exposure Function
  • BEF Binding Support Function
  • AF Application Function
  • the service functions of the above-mentioned communication service provider may include but are not limited to IP Multimedia Subsystem (IMS), location service functions, etc.
  • the above-mentioned second node 13 may include but is not limited to a lawful interception node (for example, a law enforcement agency (Law Enforcement Agency, LEA), a law enforcement monitoring facility (Law Enforcement Monitoring Facility, LEMF), etc.) or a network function in the core network network function responsible for receiving messages from the lawful interception node, for example, AMF, IMS, etc. including a lawful interception point.
  • a lawful interception node for example, a law enforcement agency (Law Enforcement Agency, LEA), a law enforcement monitoring facility (Law Enforcement Monitoring Facility, LEMF), etc.
  • a network function in the core network network function responsible for receiving messages from the lawful interception node for example, AMF, IMS, etc. including a lawful interception point.
  • Communication and perception integration means realizing the integrated design of communication and perception functions through spectrum sharing and hardware sharing in the same system. While transmitting information, the system can sense information such as direction, distance, speed, etc. Events are detected, tracked, and identified. The communication system and the perception system complement each other to achieve overall performance improvements and bring a better service experience.
  • Perception capability refers to the ability of one or more devices with perception capabilities to perceive the direction, distance, speed and other information of target objects through the transmission and reception of wireless signals, or to detect, track, identify and image target objects, events or environments.
  • B5G Beyond 5G
  • 6G 6th Generation
  • Perception capability refers to the ability of one or more devices with perception capabilities to perceive the direction, distance, speed and other information of target objects through the transmission and reception of wireless signals, or to detect, track, identify and image target objects, events or environments.
  • the perception resolution will be significantly improved compared to centimeter waves, enabling 6G networks to provide more sophisticated perception services.
  • Typical perception functions and application scenarios are shown in Table 1.
  • perception of intelligent transportation, high-precision maps, etc. is usually expressed in terms of perception range, distance resolution, angle resolution, speed resolution, and latency
  • flight intrusion detection perception is usually expressed in terms of coverage height, perception accuracy, and perception latency
  • respiratory monitoring is expressed in terms of perception distance, perception real-time, perception resolution, and perception accuracy
  • indoor intrusion detection is expressed in terms of perception distance, perception real-time, detection probability, and false alarm probability
  • gesture/posture recognition is expressed in terms of perception distance, perception real-time, and perception accuracy.
  • the service request methods of the above-mentioned perception services are different. For example, in a service request based on a static area, a certain coordinate system is used to represent the geographical location area of the content to be perceived; in a service request based on a dynamic area, M meters around a certain UE is used to represent the geographical location range of the content to be perceived, where M is a positive number; in a continuous perception service request for a dynamic target, a target that has been detected and continuously tracked is used to represent the perception target of the content to be perceived.
  • the perception signal receiving node measures the received perception signal and reports the measurement result to the target node.
  • the target node is responsible for calculating the perception signal based on the perception measurement result.
  • the target node may be a sensing function.
  • lawful interception is mainly aimed at the existing service scope of communication service providers (such as voice, data packets, messages and target positioning), and adopts network layer based interception (network layer based interception) and service layer based interception (service layer based interception) to obtain the required intercepted user equipment (User Equipment, UE) data.
  • Network layer based interception is to obtain the required intercepted data from the interception point of the core network function (for example, AMF, SMF/UPF, etc.), and service layer based interception is to obtain the required intercepted data from the interception point of the service function (for example, IMS, location service, etc.) of the communication service provider.
  • the lawful interception architecture and functions in the related technology can be shown in Figure 3, which is used by the Communication Service Provider to meet the needs of lawful interception. It mainly includes detecting the target communication, obtaining intercept related information (IRI) or communication content (CC) from the target communication, and sending the intercept related information or communication content to the lawful interception node.
  • the interception point (POI) can be located at the required network function and service function, such as AMF, SMF/UPF, UDM, NRF, NEF, Short Message Service Function (SMSF), IMS, etc.
  • the lawful interception node sends a search warrant and the following information to the communication service provider (CSP), for example, the communication service provider's administration function (ADMF), which may include the lawful interception provisioning function (LIPF) and the lawful interception control function (LICF).
  • CSP communication service provider
  • ADMF administration function
  • LIPF lawful interception provisioning function
  • HIF lawful interception control function
  • the communication service provider provides the lawful interception data through the corresponding network function (i.e., POI) and passes it to the LEMF via the mediation and delivery function (MDF).
  • MDF mediation and delivery function
  • Target identifier used to identify the communications to be intercepted
  • Type of intercept used to indicate whether only IRI, only CC, or both IRI and CC are transmitted to the Law Enforcement Monitoring Facility (LEMF);
  • LEMF Law Enforcement Monitoring Facility
  • Service scoping used to identify the service to be intercepted (e.g., voice, packet, messaging, target location);
  • Filtering criteria used to provide additional information for interception, such as bandwidth optimization, etc.
  • LIID Used to associate issued search warrants (Warrant) and interception data (Interception Product).
  • the target identifier may include a Subscription Permanent Identifier (SUPI), a Permanent Equipment Identifier (PEI), or a Generic Public User Identifier (GPUI). Subscription Identifier, GPSI) etc.
  • SUPI Subscription Permanent Identifier
  • PEI Permanent Equipment Identifier
  • GPUI Generic Public User Identifier
  • the above-mentioned PEI is used for the 3rd Generation Partnership Project (3GPP) UE to enter the 5G system.
  • 3GPP 3rd Generation Partnership Project
  • the UE supports at least one 3GPP access technology (i.e., Next Generation Radio Access Network (NG-RAN)/5G, Evolved Universal Terrestrial Radio Access Network (E-UTRAN)/4G, UTRAN/3G, GSM/EDGE Radio Access Network (GSM EDGE Radio Access Network, GERAN)/EDGE/2.5G)
  • the UE must be assigned PEI in the format of International Mobile Equipment Identity (IMEI) or International Mobile Equipment Identity Software Version (MEISV).
  • IMEI International Mobile Equipment Identity
  • MEISV International Mobile Equipment Identity Software Version
  • the above GPSI can be used to handle 3GPP users in different data networks (DN) outside the 3GPP system.
  • the 3GPP system stores the association between the GPSI and the corresponding SUPI in the user data.
  • the GPSI can be a Mobile Station International Subscriber Directory Number (MSISDN), an external IP address, etc.
  • the current positioning services of mobile communication networks include three situations: 1) UE positioning itself, 2) external server/client application functions positioning UE, and 3) network elements positioning UE.
  • the UE location information is obtained based on uplink or downlink measurements through the interaction between the Location Management Function (LMF) and the base station and/or UE. Based on the above information, it can be found that the positioning service in the relevant technology is closely related to the target positioning UE, and the target UE positioning requires the target UE to cooperate in sending signals or measurements.
  • LMF Location Management Function
  • positioning-related interception For positioning-related interception, on the one hand, it is based on network layer interception, obtaining positioning messages related to a target UE (target UE) exchanged between UE and LMF, and between gNB and LMF from AMF, and on the other hand, it is based on service layer interception, including UE providing location report (mobile network cell ID, geographic coordinates, etc.) when performing a certain network service (for example, Voice over New Radio (VoNR)), and the lawful interception function calling LMF to obtain the target UE location information (the core is to override UE privacy).
  • VoIPNR Voice over New Radio
  • positioning interception may include positioning measurement data for the positioning target UE, UE location information data that can be provided by the network as tag data/auxiliary data for other interception data, and the lawful interception node calling the positioning service to obtain location data without UE authorization.
  • QoS Perceived Quality of Service
  • the above-mentioned perceived QoS includes at least one perceived performance indicator and corresponding information (such as numerical requirements, etc.) as shown in Table 2.
  • An optional classification method is to classify the perception measurement quantity into the following 4 categories (this description focuses on describing the measurement quantity, which can also be divided into 3 categories or unclassified, etc., and the 4 categories are only for illustration).
  • the following third-level measurement quantity and fourth-level measurement quantity may also be generally referred to as perception results
  • the following second-level measurement quantity and/or first-level measurement quantity may also be referred to as perception measurement data.
  • the first level of measurement quantity that is, the received signal/original channel information, including: the complex result of the received signal/channel response, amplitude/phase, I-channel/Q-channel and its operation results (operations include addition, subtraction, multiplication and division, matrix addition, subtraction, multiplication, matrix transposition, trigonometric relationship operations, square root operations and power operations, as well as the threshold detection results of the above operation results, maximum/minimum value extraction results, etc.; operations also include Fast Fourier Transform (FFT)/Inverse Fast Fourier Transform (IFFT), Discrete Fourier Transform (Discrete Fourier Transform, FFT), and Inverse Fast Fourier Transform (IFFT).
  • FFT Fast Fourier Transform
  • IFFT Discrete Fourier Transform
  • IFFT Inverse Fast Fourier Transform
  • DFT Fourier transform
  • IDFT inverse discrete Fourier transform
  • 2D-FFT two-dimensional Fourier transform
  • 3D-FFT three-dimensional Fourier transform
  • Second-level measurement quantity basic measurement quantity, including delay, Doppler, angle, signal strength, and their multi-dimensional combination representation
  • Level 3 measurement basic attributes/states, including distance, speed, angle/direction, radar cross-section (RCS), acceleration, etc.
  • the fourth level of measurement that is, advanced attributes/states, including: spatial position, target presence, trajectory, movement, expression, vital signs, quantity, imaging results, weather, air quality, shape, material, composition, etc.
  • the above-mentioned perception function node may include at least one of the following functions:
  • a perceptual measurement result i.e., a value of a perceptual measurement quantity
  • the perceptual measurement quantity is a first-level measurement quantity and/or a second-level measurement quantity.
  • the first-level measurement quantity generates a perception result (third-level measurement quantity) and responds to the perception service request.
  • this function is referred to as a basic perception function node;
  • this function is referred to as a derived sensing function node;
  • a sensing measurement result i.e., a value of a sensing measurement quantity
  • the sensing measurement quantity is a first-level measurement quantity and/or a second-level measurement quantity and/or a third-level measurement quantity
  • this function is referred to as a comprehensive sensing function node;
  • QoS perceived quality of service
  • the sensing signal sending or receiving node in the mobile communication system includes network equipment (such as base stations) and user equipment UE (such as mobile phones).
  • the sensing auxiliary node refers to the information used to provide sensing assistance, such as sensing information of other sensors, geographic location information, etc., which is used to improve the performance of wireless sensing;
  • the sensing link may include a Uu link (base station sending/UE receiving or base station receiving/UE sending), a sidelink (transmitting and receiving between UEs), an echo link (base station sending and receiving autonomously, UE sending and receiving autonomously), and a base station sending and receiving link (transmitting and receiving between base stations);
  • the sensing mode may include base station sending and UE receiving, UE sending and base station receiving, base station sending and receiving autonomously, transmitting and receiving between UEs, transmitting and receiving between base stations, and UE sending and receiving autonomously;
  • perception signal Determine a perception signal, where potential perception signals include reference signals and data signals, where the reference signal may be a communication reference signal or a perception-specific reference signal;
  • Potential perception resources include time-frequency resources not used in communication (such as guard bands), time-frequency resources used in shared communication (such as reference signals or data signals), and time-frequency resources dedicated to perception. Further, it is necessary to determine the configuration of the perception signal. Potential configurations include time, frequency, and spatial resource information of the perception signal. If it is determined that the node that perceives the time-frequency resource is not the sending node of the perception signal, then send the perception signal configuration to the node that sends the perception signal;
  • the potential configuration includes an indication of the perception signal to be measured, the number or time of the perception signal to be measured, an indication of reporting the measurement result, etc. If it is determined that the node for configuring the perception measurement quantity is not a receiving and measuring node of the perception signal, then send the perception measurement quantity configuration to the perception signal receiving node;
  • the perception function node After the network-side device determines the perception function node according to the geographical scope of the requested perception service and the geographical scope of the perception service provided by the perception function node, the perception function node needs to determine AMF in at least one of the following cases: 1) When the UE is a perception signal sending node, a perception signal receiving node or a perception auxiliary node, and the perception target is a certain UE, the perception function node selects AMF based on the required geographical area to be perceived, and the Tracking Area Identity (TAI) of the AMF requested from the NRF, and/or the AMF ID/location, etc.; 2) When the perception data needs to be transmitted via the AMF (for example, defined as a NAS message or the NAS layer as the transmission bearer protocol layer of the perception data), the perception function node selects AMF based on the geographical location information of the perception node for the required transmission data (such as TA, etc.), and the TAI of the AMF requested from the NRF, and/or the AMF ID
  • FIG. 4 is a flowchart of a monitoring method provided in an embodiment of the present application.
  • the method can be executed by a first node, as shown in FIG. 4 , and includes the following steps:
  • Step 401 A first node receives a first message, where the first message is used to indicate perception data of a monitoring terminal.
  • the above-mentioned first node may include but is not limited to a base station, SF, AMF, UDM, NRF, NEF, UPF, SMSF or IMS, etc.
  • the first node may receive the first message from a legal interception node (e.g., LEA, LEMF, etc.) or a network function (e.g., AMF, IMS, etc.) in a core network network function that is responsible for receiving legal interception node messages.
  • a legal interception node e.g., LEA, LEMF, etc.
  • a network function e.g., AMF, IMS, etc.
  • the above-mentioned first message is used to indicate the perception data of the listening terminal, wherein the above-mentioned terminal may be a terminal responsible for generating at least one of the perception measurement data and the perception result.
  • the terminal may directly use at least one of the perception measurement data and the perception result on the terminal side (that is, there is no need to send the perception measurement data or result on the terminal side to a node outside the terminal), or provide it to the application function through a transmission network, wherein the above-mentioned transmission network may be a 3GPP network or a non-3GPP network, such as a wired network, a WIFI network or a local area network.
  • the perception data of the above-mentioned terminal may include but is not limited to at least one of perception measurement data and perception results, wherein the above-mentioned perception measurement data may include at least one of the above-mentioned first-level measurement quantities and second-level measurement quantities, and the above-mentioned perception result may include at least one of the above-mentioned third-level measurement quantities and fourth-level measurement quantities, which are not repeated here.
  • Step 402 The first node obtains perception data of the terminal according to the first message.
  • the first node may receive perception data of the terminal from the terminal, or may generate perception data of the terminal based on configuration information and perception signals used by the terminal for perception, etc.
  • the perception data of the above-mentioned terminal can be understood as perception data related to the perception performed by the above-mentioned terminal.
  • the perception data of the above-mentioned terminal may include the perception data generated by the above-mentioned terminal when performing perception, or may include perception data generated by devices other than the above-mentioned terminal based on the configuration information used by the above-mentioned terminal when performing perception and the perception signal.
  • terminal A is the listening target, and the perception data of terminal A includes the perception data generated by terminal A (such as perception measurement data or perception results), or includes the perception data generated by the base station based on the configuration information used by terminal A when performing perception and the perception signal.
  • Step 403 The first node sends the perception data of the terminal to the second node.
  • the second node may include but is not limited to a lawful interception node (e.g., LEA, LEMF, etc.) or a network function in the core network network function responsible for receiving messages from the lawful interception node, such as AMF, IMS, etc.
  • a lawful interception node e.g., LEA, LEMF, etc.
  • the first node and the second node are different.
  • the second node may be a node different from AMF such as LEA or LEMF
  • the first node may be a base station, SF, UDM, NRF, NEF, UPF, SMSF or IMS, etc., which are nodes different from AMF.
  • the first node may receive the first message from the second node and obtain the perception data of the terminal.
  • the perception data of the terminal is sent to the second node.
  • the first node can obtain the first message from the LEMF, and send the perception data of the terminal to the LEMF when the perception data of the terminal is obtained; or, the first node can receive the above-mentioned first message from a node other than the second node, and send the perception data of the terminal to the second node when the perception data of the terminal is obtained.
  • the first node can receive the first message from the AMF, and send the perception data of the terminal to the LEMF when the perception data of the terminal is obtained.
  • the listening method provided in the embodiment of the present application can be understood as a legal listening method, in which a first message is received by a first node, and the first message is used to indicate the perception data of the listening terminal; the first node obtains the perception data of the terminal according to the first message; the first node sends the perception data of the terminal to the second node, so that the second node can more easily listen to the perception data of the terminal, thereby improving the convenience of the second node listening to the perception data of the terminal.
  • the first message includes a target identifier (Target identifier), and the target identifier is used to identify the terminal.
  • Target identifier a target identifier
  • the second node can quickly determine the interception target to be intercepted based on the target identifier, that is, the terminal identified by the target identifier.
  • the target identifier includes at least one of a temporary identifier of the terminal and a permanent identifier of the terminal.
  • the temporary identifier of the above-mentioned terminal may include, but is not limited to, a geographic location identifier (such as a GPS location identifier, etc.), a subscription concealed identifier (SUCI), a globally unique temporary identifier (GUTI), a RAN UE NGAP ID, an AMF UE NGAP ID, a temporary identifier within a wireless access network (such as a random access radio network temporary identifier (Random Access Radio Network Temporary Identifier, RA-RNTI), a temporary cell radio network temporary identifier (Temporary Cell Radio Network Temporary Identifier, etc.), a global unique temporary identifier (Globally Unique Temporary Identifier, G ...
  • the above-mentioned SUCI is a privacy protection identifier including a hidden SUPI.
  • the above-mentioned GUTI is called 5G GUTI in 5G.
  • the above RAN UE NGAP ID is used to uniquely identify the UE on the NG interface within the gNB. It should be unique within the logical NG-RAN node.
  • the corresponding one is the eNB UE S1 Application Protocol Identifier (eNB UE S1AP ID).
  • the above AMF UE NG Application Protocol Identifier (AMF UE NGAP ID) is used to identify the UE in the AMF.
  • the corresponding one is the MME UE S1 Application Protocol Identifier (MME UE S1AP ID).
  • the permanent identification of the terminal may include but is not limited to at least one of SUPI, PEI, GPSI (such as telephone number, etc.), IP Multimedia Private Identity (IMPI) and IP Multimedia Public Identity (IMPU).
  • IMPI IP Multimedia Private Identity
  • IMPU IP Multimedia Public Identity
  • the IMPI is used for registration, authentication, certification and billing of users accessing the IMS network, and is not used for call addressing and routing. It is a user identity defined by the home network operator and is globally unique, that is, one private identification (IMPI) corresponds to one physical terminal.
  • the format of the above IMPI is: username@domain, for example, +8618652476314@ims.sz.cn.
  • the above IMPU is used for routing Session Initialization Protocol (SIP) messages.
  • SIP Session Initialization Protocol
  • An IMS user can be assigned one or more public user identifiers (i.e., IMPUs).
  • the format of the public user identifier can be in the format of SIP URI or Tel URL.
  • the IMPU should first be registered. Among them, the format of the IMPU is: SIP URI, for example, "Sip:user1@ims.fj.chinamobile.com”; TEL URI, for example, "Tel:+8613904710100".
  • the first message further includes at least one of the following:
  • a listening mode including a first mode or a second mode
  • the first mode is used to instruct the terminal to report the perception data of the terminal
  • the second mode is used to instruct the first node to generate the perception data of the terminal
  • the type of intercept comprising at least one of the sensing related information and the sensing content
  • Filtering criteria include at least one of time information, geographic location information, and perceived performance indicators.
  • the above-mentioned listening method is used to indicate a method for obtaining listening data (i.e., the perception data of the terminal), wherein the above-mentioned listening method includes a first method or a second method, and the first method is used to indicate that the perception data of the terminal is reported through the terminal, for example, the terminal reports the perception data of the terminal to the first node according to the listening requirements (for example, the listening time length, data volume, filtering conditions, etc.); the above-mentioned second method is used to indicate the first node to generate the perception data of the terminal, for example, the first node generates the perception data of the terminal according to the configuration information and perception signal used by the terminal for perception.
  • the above-mentioned listening method includes a first method or a second method
  • the first method is used to indicate that the perception data of the terminal is reported through the terminal, for example, the terminal reports the perception data of the terminal to the first node according to the listening requirements (for example, the listening time length, data volume, filtering conditions
  • the above-mentioned interception type may include at least one of perception-related information and perception content.
  • the above-mentioned interception type only includes perception-related information, only perception-related information is intercepted; in the case where the above-mentioned interception type only includes perception content, only perception content is intercepted; in the case where the above-mentioned interception type includes perception-related information and perception content, perception-related information and perception content are intercepted at the same time.
  • the above-mentioned interception type may also include at least one of communication-related information and communication content, that is, in addition to the need to intercept at least one of perception-related information and perception content, it is also necessary to intercept at least one of communication-related information and communication content.
  • At least one of the above-mentioned perception-related information and perception content is for perception
  • at least one of the above-mentioned communication-related information and communication content is for communication, such as voice, data packets, messages, and target positioning.
  • the above-mentioned perception-related information and communication-related information can both be referred to as IRI
  • the above-mentioned perception content and communication content can both be referred to as CC
  • the above-mentioned listening types include only IRI (i.e., IRI only), only CC (i.e., CC only) or IRI and CC (i.e., both IRI and CC), wherein the above-mentioned IRI includes at least one of the perception-related information and the communication-related information, and the above-mentioned CC includes at least one of the perception content and the communication content.
  • the service range is used to indicate the service to be monitored, and the service range includes perception.
  • the service range may also include at least one of voice, data packet, message, and target positioning.
  • the above filter conditions are used to provide additional information for listening, for example, bandwidth optimization.
  • the above filter conditions include time At least one of information, geographic location information and perception performance indicators.
  • the perception performance indicators include at least one of the following: perception accuracy, perception resolution, and perception update frequency. The meanings of the above perception performance indicators can be found in Table 2 and are not described here.
  • the first node acquiring the perception data of the terminal according to the first message includes:
  • the first node sends a second message to the terminal, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal;
  • the first node receives the sensing data from the terminal.
  • the first node sends a second message to the terminal to instruct the terminal to record the perception data generated by the terminal.
  • the terminal receives the second message
  • the terminal records the perception data generated by the terminal based on the second message and sends it to the first node. This not only makes it more convenient to obtain the perception data of the terminal, but also ensures that the perception data of the terminal obtained is more accurate.
  • the second message includes at least one of the following:
  • first indication information used to instruct the terminal to record the perception data
  • second indication information used to indicate the amount of data recorded for the perception data
  • the third indication information is used to indicate the time length for recording the perception data
  • the fourth indication information is used to indicate a filtering condition for recording the perception data.
  • the second indication information is used to indicate the data volume of the perception data recorded.
  • the maximum storage size of the perception data is 1024 bytes, that is, a maximum of 1024 bytes of perception data is recorded.
  • the third indication information is used to indicate the time length for recording the perception data, for example, recording the perception data within time T (for example, 12:10 to 12:20 or between frame X and frame Y).
  • the fourth indication information is used to indicate the filtering conditions for recording the perception data, and is used to reduce the data volume of the perception data, thereby reducing the storage and/or transmission overhead on the UE side.
  • the filtering conditions for recording the perception data may include at least one of the perception target identifier, perception area information, and the receiving node identifier of the perception measurement data and/or perception results. For example, the perception data is recorded only when a certain perception target identifier is perceived, or the perception data is recorded only when it is within a certain perception area, or the receiving node identifier of the perception measurement data/perception result is recorded only when it is in a certain situation, etc.
  • the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
  • the first node acquiring the perception data of the terminal according to the first message includes:
  • the first node acquires first configuration information, where the first configuration information is configuration information used by the terminal for perception;
  • the first node determines the perception data of the terminal according to the first configuration information.
  • the first configuration information may be used to indicate the perception signal parameter configuration information (eg, time-frequency resource information, sequence and waveform parameters of the perception signal), perception measurement configuration, perception prior information, etc., which are perceived by the terminal.
  • the perception signal parameter configuration information eg, time-frequency resource information, sequence and waveform parameters of the perception signal
  • perception measurement configuration e.g., time-frequency resource information, sequence and waveform parameters of the perception signal
  • perception prior information e.g., time-frequency resource information, sequence and waveform parameters of the perception signal
  • the first node when the first node is a node that determines the first configuration information, the first node can directly obtain the first configuration information; when the first node is not a node that determines the first configuration information, the first node can obtain the first configuration information from the node that determines the first configuration information.
  • the first node may receive the perception signal based on the first configuration information, and generate the perception data of the terminal according to the received perception signal. It can be understood that the perception data of the terminal generated by the first node based on the first configuration information may be similar to the perception data generated by the terminal.
  • the first node may detect the perception data transmitted by the first node based on the first configuration information to obtain the perception data of the terminal.
  • the first configuration information is obtained through the first node, and the first configuration information is the configuration information used by the terminal for perception.
  • the perception data of the terminal is determined according to the first configuration information. In this way, while ensuring that the perception data of the terminal is detected, the operation of the terminal can be simplified and the resources and power of the terminal can be saved.
  • the first configuration information includes at least one of the following: waveform type, subcarrier spacing, guard interval, bandwidth, data burst duration, time domain interval, transmit power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-location (QCL) relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
  • waveform type subcarrier spacing, guard interval, bandwidth, data burst duration, time domain interval, transmit power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-location (QCL) relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
  • QCL quasi-co-location
  • the above-mentioned waveform types for example, Orthogonal Frequency Division Multiplexing (OFDM), Single Carrier Frequency Division Multiple Access (SC-FDMA), Orthogonal Time Frequency Space (OTFS), Frequency-Modulated Continuous Wave (FMCW), pulse signal, etc.
  • OFDM Orthogonal Frequency Division Multiplexing
  • SC-FDMA Single Carrier Frequency Division Multiple Access
  • OTFS Orthogonal Time Frequency Space
  • FMCW Frequency-Modulated Continuous Wave
  • pulse signal etc.
  • the above subcarrier spacing for example, the subcarrier spacing of the OFDM system is 30KHz.
  • the above-mentioned protection interval is the time interval from the moment when the signal ends to the moment when the latest echo signal of the signal is received; this parameter is proportional to the maximum perception distance; for example, it can be calculated by 2d max /c, d max is the maximum perception distance (belonging to the perception requirement), for example, for a self-transmitted and self-received perception signal, d max represents the maximum distance from the perception signal receiving and transmitting point to the signal transmitting point, and c is the speed of light; in some cases, the OFDM signal cyclic prefix (CP) can play the role of the minimum protection interval.
  • CP OFDM signal cyclic prefix
  • the above bandwidth is inversely proportional to the distance resolution and can be obtained by c/2/ ⁇ d, where ⁇ d is the distance resolution (which belongs to the perception requirement) and c is the speed of light.
  • the duration of the above-mentioned data burst can be inversely proportional to the rate resolution (belonging to the perception requirement).
  • This parameter is the time span of the perception signal, which is mainly used to calculate the Doppler frequency deviation; this parameter can be calculated by c/2/ ⁇ v/f c ; where ⁇ v is the velocity resolution; f c is the carrier frequency of the perception signal or the center frequency of the perception signal.
  • the above time domain interval can be calculated by c/2/f c /v range ); wherein v range is the maximum rate minus the minimum rate (belonging to the perception requirement); this parameter is the time interval between two adjacent perception signals.
  • the transmission power of the above-mentioned perception signal takes a value at intervals of 2dBm, for example, from -20dBm to 23dBm.
  • the above signal formats for example, SRS, DMRS, PRS, etc., or other predefined signals, and related sequence format and other information.
  • the above-mentioned signal direction for example, the direction of the perceived signal or beam information.
  • time resources for example, the time slot index where the perception signal is located or the symbol index of the time slot; wherein, the time resources are divided into two types, one is a one-time time resource, for example, one symbol sends an omnidirectional perception signal; the other is a non-one-time time resource, such as multiple groups of periodic time resources or discontinuous time resources (may include start time and end time), each group of periodic time resources sends a perception signal in the same direction, and different groups of periodic time resources have different beam directions.
  • the above-mentioned frequency resources for example, the center frequency of the perception signal, bandwidth, RB or subcarrier, reference point A (Point A), starting bandwidth position, etc.
  • the perception signal includes multiple resources, each resource is QCL with a synchronization signal block (Synchronization Signal and PBCH block, SSB), and the QCL includes Type A (Type A), Type B, Type C or Type D.
  • a synchronization signal block Synchronization Signal and PBCH block, SSB
  • Type A Type A
  • Type B Type B
  • Type C Type D
  • the above-mentioned perception measurement quantity configuration information can be used to configure the perception signal period and/or number corresponding to at least one perception measurement quantity and at least one perception measurement result (i.e., the measurement result of the perception measurement quantity).
  • the perception measurement quantity may include one or more of Doppler, delay, angle, and signal strength.
  • the above-mentioned perception measurement result corresponds to the perception signal period and/or number, which can specifically refer to that the perception measurement result is calculated based on several perception signals and/or several periodic perception signals.
  • the perception signal when the perception signal is a periodic signal, it can be represented by the perception signal period, that is, the perception measurement result is calculated based on N perception signals, and N is a positive integer; if the perception signal is non-periodic, it can be represented by several times of received perception signals, and several times are expressed with several times, facing different perception signal types; or it can also be a combination of the above situations.
  • the above-mentioned perception prior information is used when calculating the perception result based on the perception measurement.
  • the above-mentioned perception prior information may include the frequency range of the breathing, etc.
  • the transmission configuration information of the above-mentioned perception data for example, protocol data unit (PDU) session identifier (PDU session ID), QoS flow identifier (QoS flow ID), etc.
  • PDU protocol data unit
  • QoS flow ID QoS flow identifier
  • the first node acquiring the first configuration information includes:
  • the first node sends a third message to the terminal, where the third message is used to instruct the terminal to report the first configuration information;
  • the first node receives the first configuration information reported by the terminal.
  • the first node can send a third message to the terminal to instruct the terminal to report the first configuration information, so that the terminal can report the above-mentioned first configuration information to the first node when receiving the third message, and then the first node can receive the perception signal based on the above-mentioned first configuration information, and generate the perception data of the terminal based on the received perception signal.
  • the first configuration information can be determined by the terminal.
  • the first configuration information can be determined by the terminal.
  • the first node when the first configuration information is determined by the terminal, the first node sends a third message to the terminal to instruct the terminal to report the first configuration information, and receives the first configuration information reported by the terminal, which can improve the convenience of the first node in obtaining the first configuration information.
  • the first node acquiring the first configuration information includes:
  • the first node sends a fourth message to the first network side device, where the fourth message is used to instruct the first network side device to send the first configuration information;
  • the first node receives the first configuration information from the first network side device.
  • the first network side device may include a base station or a network function (AF), etc.
  • the first node may send a fourth message to the first network side device to instruct the first network side device to feed back the first configuration information, so that the first network side device may send the first configuration information to the first node after receiving the fourth message, and then the first node may receive a perception signal based on the first configuration information, and generate perception data of the terminal based on the received perception signal.
  • the first network side device may be a node that determines the first configuration information.
  • the first configuration information may be determined by the base station, that is, the first network side device may be the base station, or the first network side device may be a node that can obtain the first configuration information.
  • the first node can send a fourth message to the first network side device to instruct the first network side device to feedback the first configuration information and receive the first configuration information sent by the first network side device, thereby improving the convenience of the first node in obtaining the first configuration information.
  • FIG. 5 is a flowchart of a monitoring method provided in an embodiment of the present application.
  • the method can be executed by a terminal, as shown in FIG. 5 , and includes the following steps:
  • Step 501 The terminal receives a target message from a first node, where the target message includes a second message or a third message, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, where the first configuration information is the configuration information used by the terminal for perception.
  • Step 502 The terminal sends target information to the first node, where the target information includes the perception data or the first configuration information.
  • the terminal receives the second message from the first node, and sends the perception data to the first node based on the second message.
  • the perception data can be recorded based on the second message, and the recorded perception data can be sent to the first node.
  • the second message and the perception data can refer to the relevant description of the above embodiment, and will not be repeated here.
  • the terminal receives a third message from the first node, and can send first configuration information to the first node in response to the third message.
  • the third message and the first configuration information can refer to the relevant description of the above embodiment, which will not be repeated here.
  • the terminal in this embodiment may be responsible for generating at least one of the sensing measurement data and the sensing result.
  • the first node in this embodiment may include but is not limited to a base station, a SF, an AMF, a UDM, a NRF, a NEF, a UPF, a SMSF or an IMS.
  • the second message includes at least one of the following:
  • first indication information used to instruct the terminal to record the perception data
  • second indication information used to indicate the amount of data recorded for the perception data
  • the third indication information is used to indicate the time length for recording the perception data
  • the fourth indication information is used to indicate a filtering condition for recording the perception data.
  • the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
  • the first configuration information includes at least one of the following: waveform type, subcarrier spacing, protection interval, bandwidth, data burst duration, time domain interval, transmission power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-site QCL relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
  • FIG. 6 is a flowchart of a monitoring method provided in an embodiment of the present application.
  • the method can be executed by the second node, as shown in FIG. 6, including the following steps:
  • Step 601 A second node sends a first message to a first node, where the first message is used to indicate perception data of a monitoring terminal.
  • the above-mentioned first message and perception data can refer to the relevant description of the aforementioned embodiment, and will not be repeated here.
  • Step 602 The second node receives the perception data of the terminal from the first node.
  • the second node in this embodiment may include but is not limited to a lawful interception node (e.g., LEA, LEMF, etc.) or a network function in the core network network function responsible for receiving a lawful interception node message, such as AMF, IMS, etc.
  • the first node in this embodiment may include but is not limited to a base station, SF, AMF, UDM, NRF, NEF, UPF, SMSF or IMS, etc.
  • the terminal in this embodiment may be a terminal responsible for generating at least one of the perception measurement data and the perception result.
  • the first message includes a target identifier, and the target identifier is used to identify the terminal.
  • the first message further includes at least one of the following:
  • a listening mode including a first mode or a second mode
  • the first mode is used to instruct the terminal to report the perception data of the terminal
  • the second mode is used to instruct the first node to generate the perception data of the terminal
  • a listening type wherein the listening type includes at least one of sensing related information and sensing content;
  • Service scope the service scope including perception
  • the filtering condition includes at least one of time information, geographic location information, and a perceived performance indicator.
  • the perception performance indicator includes at least one of the following: perception accuracy, perception resolution, and perception update frequency.
  • the target identifier includes at least one of a temporary identifier of the terminal and a permanent identifier of the terminal.
  • the method further includes:
  • the second node receives the association relationship between the temporary identity and the permanent identity from the third node.
  • the third node may be a network function in the core network that is responsible for maintaining the permanent identification of the terminal, such as AMF, UDM or IMS, etc.
  • the third node needs to provide the association relationship between the temporary identification and the permanent identification to the second node, so that the second node can obtain the permanent identification corresponding to the temporary identification based on the association relationship, which makes it easier for the second node to identify the terminal to which the perception data corresponding to the temporary identification belongs, that is, the terminal identified by the permanent identification corresponding to the temporary identification.
  • the association relationship between the temporary identifier and the permanent identifier is the association relationship between the temporary identifier and the target identifier.
  • association relationship between the temporary identification and the permanent identification is indicated by an identity event, and the identity event includes:
  • the subscription permanent identifier being used to identify the terminal
  • An observed temporary identifier (Observed temporary identifier), wherein the observed temporary identifier is used when the interface of the first node interacts with the perception data of the terminal.
  • the subscription permanent identifier is used to identify the terminal responsible for generating at least one of the sensing measurement data and the sensing result, that is, the target to be monitored.
  • the temporary identifier observed above is used when the interfaces within the first node interact with each other to monitor the target's perception information (eg, perception request, perception response, perception report, etc.).
  • the network function may provide an identity event function (Identity Event Function) to generate an identity event report when it is detected that a temporary identity and a permanent identity are associated or disassociated, wherein the identity event report may include an identity event, and the above-mentioned identity event includes at least a subscription to a permanent identity and an observed temporary identity.
  • Identity Event Function Identity Event Function
  • the identification event further includes at least one of the following parameters:
  • a timestamp of an event which is used to indicate the time when the event occurs
  • a network function identifier used to indicate the network function that generated the identification event report
  • the geographical location information is used to indicate the geographical location of the terminal when the identification event is sent.
  • the geographic location of the above-mentioned terminal may include a tracking area identifier (Tracing Area Identity, TAI), a routing area (Routing Area, RA), a radio access network-based notification area (RAN-based Notification Area, RNA) or geographic location coordinates, etc.
  • TAI Tracking Area Identity
  • RA routing area
  • RAN-based Notification Area RNA
  • geographic location coordinates etc.
  • Example 1 The first node is a base station and the interception method is legal interception of terminal reporting of perception data
  • the interception method is that the UE reports the sensing data to the base station.
  • the interception method provided in this example includes the following steps:
  • Step a1 The base station receives a first message sent by a second node (such as LEA, AMF, etc.), where the first message includes an identifier of a target UE to be monitored, that is, a target identifier.
  • a second node such as LEA, AMF, etc.
  • the target UE is a UE responsible for generating perception measurement data and/or a UE responsible for producing perception results.
  • Step a2 The base station sends a second message to the UE according to the first message, where the second message is used to trigger the target UE to record the perception data.
  • Step a3 After receiving the second message, the target UE records the perception data and reports it to the base station at an appropriate time. For example, the base station instructs the terminal to report the perception data when it is idle. It is understandable that after the terminal reports the recorded perception data to the base station, it can delete the perception data immediately or save it for a period of time before deleting it.
  • Step a4 The base station sends scheduling information for recording and reporting the perception data according to the configuration information for recording the perception data for the target UE.
  • Step a5 The target UE reports the perception data based on the base station scheduling information.
  • Step a6 The base station receives the sensing data and sends it to a legal interception node (e.g., LEA, LEMF, etc.)
  • a legal interception node e.g., LEA, LEMF, etc.
  • the third node (such as AMF ⁇ UDM, etc.) needs to provide the association relationship between the temporary identifiers and permanent identifiers used by the base station.
  • Example 2 The first node is a base station and the reporting method is the lawful interception of the first node generating the UE's perception data
  • This example is directed to the perception lawful interception when the UE is responsible for generating perception measurement data and/or perception results, wherein when the first node is a base station (such as a gNB), the base station receives a wireless signal based on the obtained first configuration information and generates perception data (i.e., interception data).
  • the interception method provided in this example includes the following steps:
  • Step b1 The base station receives a first message sent by a second node (such as LEA, AMF, etc.), wherein the first message includes an identifier of a target UE to be intercepted, i.e., a target identifier.
  • a second node such as LEA, AMF, etc.
  • the target UE is a UE responsible for generating perception measurement data and/or a UE responsible for producing perception results.
  • Step b2 The base station obtains first configuration information of the target UE according to the first message, receives a perception signal according to the first configuration information, and generates perception data on the UE side based on the received perception signal.
  • the above-mentioned first configuration information can refer to the relevant description of the aforementioned embodiment, and will not be repeated here.
  • This step can be divided into the following cases according to the sensing mode and the sensing function that the UE is responsible for:
  • the UE When the perception mode is UE self-transmission or inter-UE transmission and reception, the UE is responsible for generating perception measurement data: the base station sends a third message to the UE (such as a self-transmission and self-reception UE, or a UE that determines the first configuration information through inter-UE transmission and reception) to instruct the terminal to report the first configuration information, and the first configuration information mainly includes the perception signal configuration and the perception measurement configuration.
  • the target UE sends a fifth message to report the first configuration information based on the instruction of the base station, and the base station receives the perception signal on the corresponding time and frequency resources based on the received first configuration information, and performs perception measurement, thereby generating perception measurement data similar to that on the target UE side.
  • Case 2 When the perception mode is UE self-transmission or inter-UE transmission and reception, the UE is responsible for generating the perception result: the base station sends a third message to the UE (such as a self-transmission and self-reception UE, or a UE that determines the first configuration information through inter-UE transmission and reception) to instruct the UE to report the first configuration information, and the first configuration information mainly includes the perception signal configuration, the perception measurement configuration and the perception prior information.
  • the UE such as a self-transmission and self-reception UE, or a UE that determines the first configuration information through inter-UE transmission and reception
  • the first configuration information mainly includes the perception signal configuration, the perception measurement configuration and the perception prior information.
  • the UE sends a fourth message to report the first configuration information based on the instruction of the base station, and the base station receives the perception signal on the corresponding time and frequency resources based on the received first configuration information, performs the perception measurement, and generates a perception result similar to the UE side based on the perception prior information.
  • Case 3 When the sensing mode is that the base station sends and the UE receives, the UE is responsible for generating sensing measurement data and/or sensing results: the base station responsible for sensing and listening (referred to as base station A) obtains the first configuration information from the base station that sends the sensing signal (referred to as base station B), and the first configuration information mainly includes the sensing signal configuration and the sensing measurement configuration. If the UE is responsible for generating the sensing result, sensing prior information is also required.
  • base station A the base station responsible for sensing and listening
  • base station B the base station that sends the sensing signal
  • the first configuration information mainly includes the sensing signal configuration and the sensing measurement configuration. If the UE is responsible for generating the sensing result, sensing prior information is also required.
  • the base station responsible for listening receives the sensing signal on the corresponding time and frequency resources based on the received first configuration information, and performs sensing measurement, thereby generating sensing measurement data similar to that on the UE side; or generating sensing results similar to those on the UE side based on the sensing prior information.
  • Case 4 When the perception method is that the base station receives and sends from the UE, the base station sends and receives by itself, or the base station sends and receives between base stations, the UE is responsible for generating the perception result: If the base station responsible for the perception measurement in the above method is the base station responsible for perception monitoring, the base station sends the perception measurement data to the target UE and instructs the target UE to report the perception prior information, and then the base station can generate a perception result similar to the UE side based on the perception prior information.
  • Step b3 The base station sends the sensing interception data to the lawful interception system
  • the third node (such as AMF ⁇ UDM, etc.) needs to provide the association relationship between the temporary identifiers and permanent identifiers used by the base station.
  • Example 3 The first node is the core network control plane function node's perception of lawful interception
  • This example is directed to the perception lawful interception when the UE is responsible for generating the perception measurement data and/or the perception result, wherein when the first node is a core network control plane function node (such as SF/AMF/NEF), the UE reports the perception data (i.e., interception data) to the core network control plane function node.
  • the interception method provided in this example includes the following steps:
  • Step c1 The core network control plane function node receives a first message sent by a second node (such as LEA, AMF, etc.).
  • the first message includes an identifier of a target UE to be intercepted, that is, a target identifier.
  • the target UE is a UE responsible for generating perception measurement data and/or a UE responsible for producing perception results.
  • Step c2 The core network control plane function node sends a second message to the target UE according to the first message, and the second message is used to trigger the UE to record the perception data.
  • the second message can be indicated by a protocol message between the core network control plane function node and the UE, for example, a perception protocol message between the SF and the UE, a non-access stratum (NAS) message between the AMF and the UE, etc.
  • the base station transparently transmits the second message.
  • Step c3 After receiving the second message, the UE records the perception data and reports it to the core network control plane function node at an appropriate time.
  • the UE requests uplink transmission resources from the base station based on local data storage conditions and other reasons, and reports the perception data to the core network control plane function node. It is understandable that after the UE reports the recorded perception data to the base station, it can delete the perception data immediately or delete it after saving it for a period of time.
  • Step c1 The core network control plane function node receives the sensing data and sends it to a legal interception node (eg, LEA, LEMF, etc.).
  • a legal interception node eg, LEA, LEMF, etc.
  • Example 4 The first node is the core network user plane function node's perception of lawful interception
  • the interception method includes the following steps:
  • the core network user plane function node receives a first message sent by a second node (such as LEA, AMF, etc.), wherein the first message includes an identifier of a target UE to be intercepted, i.e., a target identifier.
  • a target identifier i.e., a target identifier.
  • the target UE is a UE responsible for generating perception measurement data and/or a UE responsible for producing perception results.
  • Step d2 the core network user plane function node obtains the first configuration information of the target UE according to the first message, where the first configuration information refers to the transmission configuration information of the perception data, such as PDU session ID, QoS flow ID, IP triplet or IP quintuple, etc.
  • acquiring the first configuration information of the target UE includes:
  • the first configuration information is obtained from the UE.
  • the transmission configuration information of the perception data is determined by the target UE, then before the UPF obtains the first configuration information, it also includes a core network control plane function such as SMF instructing the target UE to report the first configuration information.
  • the target UE reports the first configuration information to the SMF based on the indication information, and the SMF provides the received first configuration information to the UPF.
  • Step d3 The core network user plane function node detects the perception data transmitted by the core network user plane node based on the acquired first configuration information to obtain the perception data of the target UE (for example, the perception data packet of the target UE is copied by software). or hardware spectrometry, etc.), that is, sensing measurement data and/or sensing results.
  • Step d4 The core network user plane function node sends the acquired perception data of the target UE to the legal interception node.
  • the monitoring method provided in the embodiment of the present application is a legal monitoring method based on terminal perception, and the terminal perception at least includes the terminal being responsible for generating perception measurement data and/or perception results.
  • This solution can solve the problem that it is difficult to perform legal monitoring when data such as perception measurements and perception results are not carried through the network, or when data such as business layer data (which may be encrypted at the business layer) is carried in the mobile communication network and transparently transmitted to external functions.
  • the monitoring method provided in the embodiment of the present application can be executed by a monitoring device, or a control module in the monitoring device for executing the monitoring method.
  • the monitoring device provided in the embodiment of the present application is described by taking the monitoring device executing the monitoring method as an example.
  • FIG. 7 is a structural diagram of a listening device provided in an embodiment of the present application.
  • the listening device is applied to a first node.
  • the listening device 700 includes:
  • a first receiving module 701 is configured to receive a first message from a second node, where the first message is used to indicate perception data of a listening terminal;
  • An acquisition module 702 is configured to acquire perception data of the terminal according to the first message
  • the first sending module 703 is configured to send the perception data of the terminal to the second node.
  • the first message includes a target identifier, and the target identifier is used to identify the terminal.
  • the first message further includes at least one of the following:
  • a listening mode including a first mode or a second mode
  • the first mode is used to instruct the terminal to report the perception data of the terminal
  • the second mode is used to instruct the first node to generate the perception data of the terminal
  • a listening type wherein the listening type includes at least one of sensing related information and sensing content;
  • Service scope the service scope including perception
  • the filtering condition includes at least one of time information, geographic location information, and a perceived performance indicator.
  • the perception performance indicator includes at least one of the following: perception accuracy, perception resolution, and perception update frequency.
  • the target identifier includes at least one of a temporary identifier of the terminal and a permanent identifier of the terminal.
  • the acquisition module is specifically configured to include:
  • the sensing data is received from the terminal.
  • the second message includes at least one of the following:
  • first indication information used to instruct the terminal to record the perception data
  • second indication information used to indicate the amount of data recorded for the perception data
  • the third indication information is used to indicate the time length for recording the perception data
  • the fourth indication information is used to indicate a filtering condition for recording the perception data.
  • the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
  • the acquisition module is specifically used for:
  • the first configuration information includes at least one of the following: waveform type, subcarrier spacing, protection interval, bandwidth, data burst duration, time domain interval, transmission power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-site QCL relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
  • the acquisition module is specifically used for:
  • the acquisition module is specifically used for:
  • the first configuration information is received from the first network side device.
  • the listening device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip.
  • the electronic device may be a network-side device, or may be a device other than a network-side device.
  • the network-side device may include but is not limited to the types of network-side devices listed above, and other devices may be servers, network attached storage (NAS), etc., which are not specifically limited in the embodiment of the present application.
  • the listening device provided in the embodiment of the present application can implement each process implemented by the method embodiment of Figure 4 and achieve the same technical effect. To avoid repetition, it will not be described here.
  • FIG. 8 is a structural diagram of a listening device provided in an embodiment of the present application.
  • the listening device is applied to a terminal.
  • the listening device 800 includes:
  • the second receiving module 801 is used to receive a target message from the first node, where the target message includes a second message or a third message, where the second message is used to instruct the terminal to record perception data, where the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, where the first configuration information is configuration information used by the terminal for perception;
  • the second sending module 802 is used to send target information to the first node, where the target information includes the perception data or the first configuration information.
  • the second message includes at least one of the following:
  • first indication information used to instruct the terminal to record the perception data
  • second indication information used to indicate the amount of data recorded for the perception data
  • the third indication information is used to indicate the time length for recording the perception data
  • the fourth indication information is used to indicate a filtering condition for recording the perception data.
  • the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
  • the first configuration information includes at least one of the following: waveform type, subcarrier spacing, protection interval, bandwidth, data burst duration, time domain interval, transmission power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-site QCL relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
  • the listening device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip.
  • the electronic device may be a network-side device, or may be a device other than a network-side device.
  • the network-side device may include but is not limited to the types of network-side devices listed above, and other devices may be servers, network attached storage (NAS), etc., which are not specifically limited in the embodiment of the present application.
  • the listening device provided in the embodiment of the present application can implement each process implemented by the method embodiment of Figure 5 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • FIG. 9 is a structural diagram of a listening device provided in an embodiment of the present application.
  • the listening device is applied to a second node.
  • the listening device 900 includes:
  • a third sending module configured to send a first message to the first node, where the first message is used to indicate the perception data of the listening terminal;
  • the third receiving module is used to receive the perception data of the terminal from the first node.
  • the first message includes a target identifier, and the target identifier is used to identify the terminal.
  • the first message further includes at least one of the following:
  • a listening mode including a first mode or a second mode
  • the first mode is used to instruct the terminal to report the perception data of the terminal
  • the second mode is used to instruct the first node to generate the perception data of the terminal
  • a listening type wherein the listening type includes at least one of sensing related information and sensing content;
  • Service scope the service scope including perception
  • the filtering condition includes at least one of time information, geographic location information, and a perceived performance indicator.
  • the perception performance indicator includes at least one of the following: perception accuracy, perception resolution, and perception update frequency.
  • the target identifier includes at least one of a temporary identifier of the terminal and a permanent identifier of the terminal.
  • the device further comprises:
  • the fourth receiving module is used to receive the association relationship between the temporary identifier and the permanent identifier from the third node when the first node only supports detecting the temporary identifier of the terminal.
  • the association relationship between the temporary identifier and the permanent identifier is indicated by an identification event, and the identification event includes:
  • a subscription permanent identifier wherein the subscription permanent identifier is used to identify the terminal
  • An observed temporary identifier where the observed temporary identifier is used when the interface of the first node interacts with the perception data of the terminal.
  • the identification event further includes at least one of the following parameters:
  • a timestamp of an identification event used to indicate the time when the identification event occurs
  • a network function identifier used to indicate the network function that generated the identification event report
  • the geographical location information is used to indicate the geographical location of the terminal when the identification event is sent.
  • the interception device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip.
  • the electronic device may be a network-side device or a lawful interception node, or may be a device other than a network-side device or a lawful interception node.
  • the network-side device may include but is not limited to the types of network-side devices listed above
  • the lawful interception node may include LEA, LEMF, etc.
  • other devices may be servers, network attached storage (NAS), etc., which are not specifically limited in the embodiment of the present application.
  • the listening device provided in the embodiment of the present application can implement each process implemented by the method embodiment of Figure 6 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • an embodiment of the present application further provides a communication device 1000, including a processor 1001 and a memory 1002, wherein the memory 1002 stores a program or instruction that can be run on the processor 1001.
  • the communication device 1000 is a first node
  • the program or instruction is executed by the processor 1001 to implement the various steps of the first node side listening method embodiment, and can achieve the same technical effect.
  • the communication device 1000 is a terminal
  • the program or instruction is executed by the processor 1001 to implement the various steps of the terminal side listening method embodiment, and can achieve the same technical effect.
  • the communication device 1000 is a second node
  • the program or instruction is executed by the processor 1001 to implement the various steps of the second node side listening method embodiment, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the embodiment of the present application also provides a first node, including a processor and a communication interface, the communication interface is used to receive a first message from a second node, the first message is used to indicate the perception data of the listening terminal; the processor is used to obtain the perception data of the terminal according to the first message; the communication interface is also used to send the perception data of the terminal to the second node.
  • the first node embodiment corresponds to the above-mentioned first node side method embodiment, and each implementation process and implementation method of the above-mentioned method embodiment can be applied to the first node embodiment, and can achieve the same technical effect.
  • the embodiment of the present application also provides a first node.
  • the first node 1100 includes: an antenna 1101, a radio frequency device 1102, a baseband device 1103, a processor 1104 and a memory 1105.
  • the antenna 1101 is connected to the radio frequency device 1102.
  • the radio frequency device 1102 receives information through the antenna 1101 and sends the received information to the baseband device 1103 for processing.
  • the baseband device 1103 processes the information to be sent and sends it to the radio frequency device 1102.
  • the radio frequency device 1102 processes the received information and sends it out through the antenna 1101.
  • the method performed by the first node in the above embodiment can be implemented in the baseband device 1103, and the baseband device 1103 includes Including baseband processor.
  • the baseband device 1103 may include, for example, at least one baseband board, on which multiple chips are arranged, as shown in Figure 11, one of which is, for example, a baseband processor, which is connected to the memory 1105 through a bus interface to call the program in the memory 1105 and execute the network device operations shown in the above method embodiment.
  • the first node may also include a network interface 1106, which is, for example, a common public radio interface (CPRI).
  • a network interface 1106 which is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the first node 1100 of the embodiment of the present application also includes: instructions or programs stored in the memory 1105 and executable on the processor 1104.
  • the processor 1104 calls the instructions or programs in the memory 1105 to execute the methods executed by the modules shown in Figure 7 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the embodiment of the present application also provides a terminal, including a processor and a communication interface, the communication interface is used to receive a target message from a first node, the target message includes a second message or a third message, the second message is used to instruct the terminal to record perception data, the perception data is the perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, the first configuration information is the configuration information used by the terminal for perception; send target information to the first node, the target information includes the perception data or the first configuration information.
  • This terminal embodiment corresponds to the above-mentioned terminal side method embodiment, and each implementation process and implementation method of the above-mentioned method embodiment can be applied to the terminal embodiment, and can achieve the same technical effect.
  • Figure 12 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
  • the terminal 1200 includes but is not limited to: a radio frequency unit 1201, a network module 1202, an audio output unit 1203, an input unit 1204, a sensor 1205, a display unit 1206, a user input unit 1207, an interface unit 1208, a memory 1209 and at least some of the components of the processor 1210.
  • the terminal 1200 may also include a power source (such as a battery) for supplying power to each component, and the power source may be logically connected to the processor 1210 through a power management system, so as to implement functions such as charging, discharging, and power consumption management through the power management system.
  • a power source such as a battery
  • the terminal structure shown in FIG12 does not constitute a limitation on the terminal, and the terminal may include more or fewer components than shown in the figure, or combine certain components, or arrange components differently, which will not be described in detail here.
  • the input unit 1204 may include a graphics processing unit (GPU) 12041 and a microphone 12042, and the graphics processor 12041 processes the image data of the static picture or video obtained by the image capture device (such as a camera) in the video capture mode or the image capture mode.
  • the display unit 1206 may include a display panel 12061, and the display panel 12061 may be configured in the form of a liquid crystal display, an organic light emitting diode, etc.
  • the user input unit 1207 includes a touch panel 12071 and at least one of other input devices 12072.
  • the touch panel 12071 is also called a touch screen.
  • the touch panel 12071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 12072 may include, but are not limited to, a physical keyboard, function keys (such as a volume control key, a switch key, etc.), a trackball, a mouse, and a joystick, which will not be repeated here.
  • the RF unit 1201 can transmit the data to the processor 1210 for processing; in addition, the RF unit 1201 can send uplink data to the network side device.
  • Unit 1201 includes but is not limited to an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the memory 1209 can be used to store software programs or instructions and various data.
  • the memory 1209 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instruction required for at least one function (such as a sound playback function, an image playback function, etc.), etc.
  • the memory 1209 may include a volatile memory or a non-volatile memory, or the memory 1209 may include both volatile and non-volatile memories.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
  • the volatile memory may be a random access memory (RAM), a static random access memory (SRAM), a dynamic random access memory (DRAM), a synchronous dynamic random access memory (SDRAM), a double data rate synchronous dynamic random access memory (DDRSDRAM), an enhanced synchronous dynamic random access memory (ESDRAM), a synchronous link dynamic random access memory (SLDRAM) and a direct memory bus random access memory (DRRAM).
  • the memory 1209 in the embodiment of the present application includes but is not limited to these and any other suitable types of memory.
  • the processor 1210 may include one or more processing units; optionally, the processor 1210 integrates an application processor and a modem processor, wherein the application processor mainly processes operations related to an operating system, a user interface, and application programs, and the modem processor mainly processes wireless communication signals, such as a baseband processor. It is understandable that the modem processor may not be integrated into the processor 1210.
  • the radio frequency unit 1201 is used to receive a target message from a first node, the target message includes a second message or a third message, the second message is used to instruct the terminal to record perception data, the perception data is perception data generated by the terminal, and the third message is used to instruct the terminal to report first configuration information, and the first configuration information is the configuration information used by the terminal for perception; send target information to the first node, and the target information includes the perception data or the first configuration information.
  • the second message includes at least one of the following:
  • first indication information used to instruct the terminal to record the perception data
  • second indication information used to indicate the amount of data recorded for the perception data
  • the third indication information is used to indicate the time length for recording the perception data
  • the fourth indication information is used to indicate a filtering condition for recording the perception data.
  • the filtering condition for recording the perception data includes at least one of the following: a perception target identifier, perception area information, a receiving node identifier of the perception measurement data, and a receiving node identifier of the perception result.
  • the first configuration information includes at least one of the following: waveform type, subcarrier spacing, protection interval, bandwidth, data burst duration, time domain interval, transmission power of perception signal, signal format, signal direction, time resources, frequency resources, quasi-co-site QCL relationship, perception measurement quantity configuration information, perception prior information, and transmission configuration information of perception data.
  • the embodiment of the present application also provides a second node, including a processor and a communication interface, the communication interface is used for the second node to send a first message to the first node, the first message is used to indicate the perception data of the intercepted terminal; the second node receives the perception data of the terminal from the first node.
  • the second node embodiment corresponds to the above second node method embodiment, and each implementation process and implementation method of the above method embodiment can be applied to the second node embodiment, and can achieve the same technical effect.
  • the embodiment of the present application also provides a second node.
  • the second node 1300 includes: an antenna 1301, a radio frequency device 1302, a baseband device 1303, a processor 1304 and a memory 1305.
  • the antenna 1301 is connected to the radio frequency device 1302.
  • the radio frequency device 1302 receives information through the antenna 1301 and sends the received information to the baseband device 1303 for processing.
  • the baseband device 1303 processes the information to be sent and sends it to the radio frequency device 1302.
  • the radio frequency device 1302 processes the received information and sends it out through the antenna 1301.
  • the method executed by the second node in the above embodiment may be implemented in the baseband device 1303, which includes a baseband processor.
  • the baseband device 1303 may include, for example, at least one baseband board, on which multiple chips are arranged, as shown in Figure 13, one of which is, for example, a baseband processor, which is connected to the memory 1305 through a bus interface to call the program in the memory 1305 and execute the network device operations shown in the above method embodiment.
  • the second node may also include a network interface 1306, which is, for example, a common public radio interface (CPRI).
  • a network interface 1306, which is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the second node 1300 of the embodiment of the present application also includes: instructions or programs stored in the memory 1305 and executable on the processor 1304.
  • the processor 1304 calls the instructions or programs in the memory 1305 to execute the methods executed by the modules shown in Figure 7 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • An embodiment of the present application also provides a readable storage medium, on which a program or instruction is stored.
  • a program or instruction is stored.
  • the various processes of the above-mentioned listening method embodiment are implemented, or the various processes of the above-mentioned listening method embodiment are implemented, and the same technical effect can be achieved. To avoid repetition, it will not be repeated here.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium includes a computer readable storage medium, such as a computer read-only memory ROM, a random access memory RAM, a magnetic disk or an optical disk.
  • An embodiment of the present application further provides a chip, which includes a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the various processes of the above-mentioned first node-side listening method embodiment, or to implement the various processes of the above-mentioned terminal-side listening method embodiment, or to implement the various processes of the above-mentioned second node-side listening method embodiment and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.
  • the embodiment of the present application further provides a computer program/program product, wherein the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the first node side
  • the various processes of the listening method embodiment, or the various processes of the above-mentioned terminal side listening method embodiment, or the various processes of the above-mentioned second node side listening method embodiment can achieve the same technical effect. In order to avoid repetition, they will not be repeated here.
  • An embodiment of the present application also provides a lawful interception system, including: a first node, a terminal and a second node, the first node is used to execute the processes as shown in Figure 4 and the above-mentioned method embodiments, the terminal is used to execute the processes as shown in Figure 5 and the above-mentioned method embodiments, and the second node is used to execute the processes as shown in Figure 6 and the above-mentioned method embodiments, and the same technical effects can be achieved, which will not be described again here to avoid repetition.
  • the disclosed devices and methods can be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a logical function division. There may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed.
  • Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present disclosure may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present disclosure or the part that contributes to the prior art or the part of the technical solution, can be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for a computer device (which can be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in each embodiment of the present disclosure.
  • the aforementioned storage medium includes: various media that can store program codes, such as USB flash drives, mobile hard drives, ROM, RAM, magnetic disks, or optical disks.
  • the program can be stored in a computer-readable storage medium.
  • the storage medium can be a disk, Optical disk, Read-Only Memory (ROM) or Random Access Memory (RAM), etc.
  • the technical solution of the present application can be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, a magnetic disk, or an optical disk), and includes a number of instructions for enabling a terminal (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the methods described in each embodiment of the present application.
  • a storage medium such as ROM/RAM, a magnetic disk, or an optical disk
  • a terminal which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande appartient au domaine technique des communications. Sont divulgués un procédé et un appareil d'interception, ainsi qu'un dispositif associé. Selon les modes de réalisation de la présente demande, le procédé d'interception comprend les étapes suivantes : un premier nœud reçoit un premier message, le premier message servant à demander l'interception des données de perception d'un terminal ; le premier nœud acquiert les données de perception du terminal selon le premier message ; et le premier nœud envoie les données de perception du terminal à un second nœud.
PCT/CN2023/124492 2022-10-20 2023-10-13 Procédé et appareil d'interception, et dispositif associé WO2024083044A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211287945.7A CN117956476A (zh) 2022-10-20 2022-10-20 侦听方法、装置及相关设备
CN202211287945.7 2022-10-20

Publications (1)

Publication Number Publication Date
WO2024083044A1 true WO2024083044A1 (fr) 2024-04-25

Family

ID=90736911

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/124492 WO2024083044A1 (fr) 2022-10-20 2023-10-13 Procédé et appareil d'interception, et dispositif associé

Country Status (2)

Country Link
CN (1) CN117956476A (fr)
WO (1) WO2024083044A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101325781A (zh) * 2007-06-15 2008-12-17 华为技术有限公司 一种合法监听方法、系统和网络设备
CN101523851A (zh) * 2006-10-02 2009-09-02 艾利森电话股份有限公司 有线线路宽带网络中的合法侦听
CN105744519A (zh) * 2016-03-17 2016-07-06 北京佰才邦技术有限公司 一种侦听方法、核心网设备和基站
WO2022100499A1 (fr) * 2020-11-11 2022-05-19 华为技术有限公司 Procédé et appareil de transmission de signal de détection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101523851A (zh) * 2006-10-02 2009-09-02 艾利森电话股份有限公司 有线线路宽带网络中的合法侦听
CN101325781A (zh) * 2007-06-15 2008-12-17 华为技术有限公司 一种合法监听方法、系统和网络设备
CN105744519A (zh) * 2016-03-17 2016-07-06 北京佰才邦技术有限公司 一种侦听方法、核心网设备和基站
WO2022100499A1 (fr) * 2020-11-11 2022-05-19 华为技术有限公司 Procédé et appareil de transmission de signal de détection

Also Published As

Publication number Publication date
CN117956476A (zh) 2024-04-30

Similar Documents

Publication Publication Date Title
WO2021155793A1 (fr) Procédé de positionnement, terminal et dispositif réseau
EP2513758B1 (fr) Système de gestion de renseignements de localisation
US20150091757A1 (en) Systems and Methods for High Precision Indoor Location Tracking
WO2023001184A1 (fr) Procédé et appareil de mesure de signal de détection, dispositif de réseau et terminal
US11172460B2 (en) User location monitoring in mobile edge environment
US9185520B2 (en) Enhanced location based services
WO2023001179A1 (fr) Procédé, appareil et dispositif de détection de communication
WO2023001270A1 (fr) Procédé et appareil de détection, et dispositif de réseau
WO2023001269A1 (fr) Procédé et appareil de détection, et dispositif de réseau
WO2023001243A1 (fr) Procédé et appareil de détection, terminal et dispositif de réseau
WO2023001183A1 (fr) Procédé, appareil et dispositif de détection de communication
US20230134028A1 (en) METHOD AND APPARATUS OF POSITIONING BETWEEN UEs, COMMUNICATION DEVICE AND STORAGE MEDIUM
US10986495B2 (en) Interception method and apparatus based on local breakout
US20240236924A1 (en) Sensing-based positioning method and apparatus, and communication device
WO2024083044A1 (fr) Procédé et appareil d'interception, et dispositif associé
WO2022268067A1 (fr) Procédés et appareil de positionnement, et dispositif électronique
WO2024083038A1 (fr) Procédés et appareil d'interception, et dispositif associé
CN113973293B (zh) 一种侦听方法及装置
CN115499894A (zh) 网络切片调整方法、装置及设备
CN109936590B (zh) 信息传输方法及装置、计算机存储介质、通信系统
WO2016184186A1 (fr) Procédé de mesure de distance, station de base et support de stockage informatique
WO2024083045A1 (fr) Procédé et appareil de détermination d'authentification, procédé et appareil d'authentification, et noeud
WO2024083040A1 (fr) Procédé et appareil d'authentification de détection, et nœud
WO2024032460A1 (fr) Procédé et appareil de collecte de données et dispositif de communication
WO2023030327A1 (fr) Procédé et dispositif de traitement de service de perception

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23879035

Country of ref document: EP

Kind code of ref document: A1