WO2024092573A1 - 信息处理方法及装置、通信设备及存储介质 - Google Patents

信息处理方法及装置、通信设备及存储介质 Download PDF

Info

Publication number
WO2024092573A1
WO2024092573A1 PCT/CN2022/129344 CN2022129344W WO2024092573A1 WO 2024092573 A1 WO2024092573 A1 WO 2024092573A1 CN 2022129344 W CN2022129344 W CN 2022129344W WO 2024092573 A1 WO2024092573 A1 WO 2024092573A1
Authority
WO
WIPO (PCT)
Prior art keywords
role
message
request message
information
play
Prior art date
Application number
PCT/CN2022/129344
Other languages
English (en)
French (fr)
Inventor
陆伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN202280004815.XA priority Critical patent/CN118285143A/zh
Priority to PCT/CN2022/129344 priority patent/WO2024092573A1/zh
Publication of WO2024092573A1 publication Critical patent/WO2024092573A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Definitions

  • the present disclosure relates to the field of wireless communication technology but is not limited to the field of wireless communication technology, and in particular to an information processing method and apparatus, a communication device and a storage medium.
  • UEs may be involved in ranging/sidelink (SL) positioning services. These types of UEs may include SL reference user equipment (UE), target UE, auxiliary UE, positioning UE, SL positioning server UE, and SL positioning client UE.
  • UE SL reference user equipment
  • target UE target UE
  • auxiliary UE positioning UE
  • SL positioning server UE SL positioning client UE
  • Embodiments of the present disclosure provide an information processing method and apparatus, a communication device, and a storage medium.
  • a first aspect of an embodiment of the present disclosure provides an information processing method, wherein the method is performed by a first user equipment UE, and the method includes:
  • the first UE is authorized to act as the first role
  • the first response message is an acceptance message
  • the acceptance message includes: a first key corresponding to the first role; wherein the first key is used for mutual discovery between the first UE and other UEs.
  • a second aspect of an embodiment of the present disclosure provides an information processing method, which is executed by a network device, and the method includes:
  • the first request message includes: first role information; wherein the first role information is used to indicate a first role played by the first UE in a predetermined service;
  • Verify according to the first role information, whether the first UE can serve as the first role in the predetermined service, and obtain a first verification result
  • an acceptance message is returned to the first UE, wherein the acceptance message includes: a first key generated according to the first role information; wherein the first key is used for mutual discovery between the first UE and other UEs.
  • a third aspect of the embodiments of the present disclosure provides an information processing method, which is performed by a second user equipment UE, wherein the method includes:
  • a broadcast notification message wherein the notification message includes: second role information, wherein the second role information indicates a second role that the second UE can play in a predetermined service, wherein the notification message is used for security protection of a second key corresponding to the second role; the second key is: sent by the network device to verify that the second UE is authorized to play the second role in the predetermined service.
  • a fourth aspect of the embodiments of the present disclosure provides an information processing method, which is performed by a third user equipment UE, wherein the method includes:
  • the notification message comprising: second role information, wherein the second role information indicates a second role that the second UE can play in a predetermined service;
  • the second verification result of the notification message it is determined whether the second UE can play the second role in the predetermined service.
  • a fourth aspect of the embodiments of the present disclosure provides an information processing method, which is performed by a third user equipment UE, wherein the method includes:
  • the notification message comprising: second role information, wherein the second role information indicates a second role that the second UE can play in a predetermined service;
  • the second verification result of the notification message it is determined whether the second UE can play the second role in the predetermined service.
  • a fifth aspect of the embodiments of the present disclosure provides an information processing method, which is executed by a fourth user equipment UE.
  • the method includes:
  • the third request message includes: third role information, wherein the third role information is used to indicate a third role played by the fifth UE in the scheduled service;
  • a third response message is received to the third request message, wherein the third request message is returned by the fifth UE based on a verification result of the third request message based on a third key corresponding to the third role.
  • a sixth aspect of the embodiments of the present disclosure provides an information processing method, wherein the method is performed by a fifth user equipment UE, and the method includes:
  • the third request message includes: third role information, wherein the third role information is used to indicate a third role played by the fifth UE in a preset service;
  • a third response message is sent to the fourth UE.
  • a seventh aspect of the embodiments of the present disclosure provides an information processing device, wherein the device includes:
  • a first sending module is configured to send a first request message to a network device, wherein the first request message includes: first role information; wherein the first role information is used to indicate a first role played by the first UE in a predetermined service; the first role information is used for the network device to verify whether the first UE can play the first role in the predetermined service;
  • a first receiving module is configured to receive a first response message returned by the network device based on the first request message; wherein the first response message is at least used to indicate whether the first UE is authorized to play the first role;
  • the first UE is authorized to act as the first role
  • the first response message is an acceptance message
  • the acceptance message includes: a first key corresponding to the first role; wherein the first key is used for mutual discovery between the first UE and other UEs.
  • An eighth aspect of the embodiments of the present disclosure provides an information processing device, wherein the device includes:
  • a second receiving module is configured to receive a first request message from a first user equipment UE, wherein the first request message includes: first role information; wherein the first role information is used to indicate a first role played by the first UE in a predetermined service;
  • a first verification module is configured to verify, according to the first role information, whether the first UE can play the first role in the predetermined service, and obtain a first verification result;
  • the second sending module is configured to return an acceptance message to the first UE in response to the first verification result indicating that the first UE is authorized to act as the first role, wherein the acceptance message includes: a first key generated according to the first role information; wherein the first key is used for mutual discovery between the first UE and other UEs.
  • a ninth aspect of the embodiments of the present disclosure provides an information processing device, wherein the device includes:
  • the broadcast module is configured to broadcast a notification message, wherein the notification message includes: second role information, wherein the second role information indicates a second role that the second UE can play in a predetermined service, wherein the notification message is used for security protection of a second key corresponding to the second role; the second key is: the network device verifies that the second UE is authorized to play the second role in the predetermined service and sends it.
  • a tenth aspect of the present disclosure provides an information processing device, the device comprising:
  • a third receiving module is configured to receive a notification message broadcast by the second UE; the notification message includes: second role information, wherein the second role information indicates a second role that the second UE can play in a predetermined service;
  • a second verification module configured to verify the security of the notification message using a second key corresponding to the second role
  • the determination module is configured to determine whether the second UE can play the second role in the predetermined service according to the second verification result of the notification message.
  • an information processing device comprising:
  • a fourth sending module configured to send a third request message, wherein the third request message includes: third role information, wherein the third role information is used to indicate a third role played by the fifth UE in the predetermined service;
  • the fourth receiving module is configured to receive a third response message to the third request message, wherein the third request message is returned by the fifth UE based on a verification result of the third request message based on a third key corresponding to the third role.
  • a twelfth aspect of the embodiments of the present disclosure provides an information processing device, wherein the device includes:
  • a fifth receiving module is configured to receive a third request message sent by a fourth UE, wherein the third request message includes: third role information, wherein the third role information is used to indicate a third role played by the fifth UE in a preset service;
  • a third verification module is configured to verify the third request message based on a third key corresponding to the third role
  • the fifth sending module is configured to send a third response message to the fourth UE according to the verification result of the third request message.
  • a thirteenth aspect of an embodiment of the present disclosure provides a communication device, comprising a processor, a transceiver, a memory, and an executable program stored in the memory and capable of being run by the processor, wherein when the processor runs the executable program, the processor executes the information processing method provided in any of the first to sixth aspects described above.
  • a fourteenth aspect of an embodiment of the present disclosure provides a computer storage medium, which stores an executable program; after the executable program is executed by a processor, it can implement the information processing method provided in any of the first to sixth aspects.
  • the UE will provide the network device with first role information, and the first role information indicates the first role that the UE can play in the scheduled service. If the UE is authorized to play the first role in the scheduled service, it will receive the first key generated by the network device according to the first role information.
  • the first UE uses the first key to discover each other with other UEs, which can not only achieve mutual discovery, but also ensure that the discovered UE is authorized by the network device to play the corresponding role, thereby reducing security issues caused by illegal UEs deceiving the roles they can play, and improving the security of the UE in the scheduled service.
  • FIG1 is a schematic structural diagram of a wireless communication system according to an exemplary embodiment
  • FIG2A is a schematic flow chart of an information processing method according to an exemplary embodiment
  • FIG2B is a schematic flow chart of an information processing method according to an exemplary embodiment
  • FIG3A is a schematic flow chart of an information processing method according to an exemplary embodiment
  • FIG3B is a schematic flow chart of an information processing method according to an exemplary embodiment
  • FIG4 is a flow chart of an information processing method according to an exemplary embodiment
  • FIG5 is a flow chart of an information processing method according to an exemplary embodiment
  • FIG6A is a schematic flow chart of an information processing method according to an exemplary embodiment
  • FIG6B is a schematic flow chart of an information processing method according to an exemplary embodiment
  • FIG7 is a flow chart of an information processing method according to an exemplary embodiment
  • FIG8A is a flow chart showing an information processing method according to an exemplary embodiment
  • FIG8B is a flow chart of an information processing method according to an exemplary embodiment
  • FIG9 is a schematic diagram showing the structure of an information processing device according to an exemplary embodiment
  • FIG10 is a schematic diagram showing the structure of an information processing device according to an exemplary embodiment
  • FIG11 is a schematic diagram showing the structure of an information processing device according to an exemplary embodiment
  • FIG12 is a schematic diagram showing the structure of an information processing device according to an exemplary embodiment
  • FIG13 is a schematic diagram showing the structure of an information processing device according to an exemplary embodiment
  • FIG14 is a schematic diagram showing the structure of an information processing device according to an exemplary embodiment
  • FIG15 is a schematic diagram showing the structure of a UE according to an exemplary embodiment
  • Fig. 16 is a schematic diagram showing the structure of a communication device according to an exemplary embodiment.
  • first, second, third, etc. may be used to describe various information in the disclosed embodiments, these information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • the first information may also be referred to as the second information, and similarly, the second information may also be referred to as the first information.
  • the words as used herein may be interpreted as when or when or in response to determination.
  • the wireless communication system is a communication system based on cellular mobile communication technology, and the wireless communication system may include: a plurality of UEs 11 and a plurality of access devices 12.
  • UE 11 can be a device that provides voice and/or data connectivity to users.
  • UE 11 can communicate with one or more core networks via a radio access network (RAN).
  • RAN radio access network
  • UE 11 can be an Internet of Things UE, such as a sensor device, a mobile phone (or a cellular phone), and a computer with an Internet of Things UE.
  • it can be a fixed, portable, pocket-sized, handheld, computer-built-in, or vehicle-mounted device.
  • a station STA
  • a subscriber unit a subscriber station, a mobile station, a mobile station, a mobile station, a remote station, an access point, a remote UE (remote terminal), an access UE (access terminal), a user device (user terminal), a user agent, a user device, or a user UE (user equipment, UE).
  • UE 11 can also be a device of an unmanned aerial vehicle.
  • UE 11 can also be a vehicle-mounted device, for example, it can be a driving computer with wireless communication function, or a wireless communication device connected to an external driving computer.
  • UE 11 may also be a roadside device, for example, a street light, traffic light or other roadside device with wireless communication function.
  • the access device 12 may be a network-side device in a wireless communication system.
  • the wireless communication system may be a fourth generation mobile communication technology (4G) system, also known as a long term evolution (LTE) system; or, the wireless communication system may be a 5G system, also known as a new radio (NR) system or a 5G NR system.
  • 4G fourth generation mobile communication technology
  • 5G also known as a new radio (NR) system or a 5G NR system.
  • NR new radio
  • the wireless communication system may be a next generation system of the 5G system.
  • the access network in the 5G system may be called NG-RAN (New Generation-Radio Access Network).
  • an MTC system may be called NG-RAN (New Generation-Radio Access Network).
  • the access device 12 can be an evolved access device (eNB) adopted in a 4G system.
  • the access device 12 can also be an access device (gNB) adopting a centralized distributed architecture in a 5G system.
  • the access device 12 adopts a centralized distributed architecture it usually includes a centralized unit (central unit, CU) and at least two distributed units (distributed units, DU).
  • the centralized unit is provided with a packet data convergence protocol (Packet Data Convergence Protocol, PDCP) layer, a radio link layer control protocol (Radio Link Control, RLC) layer, and a media access control (Media Access Control, MAC) layer protocol stack;
  • the distributed unit is provided with a physical (Physical, PHY) layer protocol stack.
  • the embodiment of the present disclosure does not limit the specific implementation method of the access device 12.
  • a wireless connection can be established between the access device 12 and the UE 11 through a wireless air interface.
  • the wireless air interface is a wireless air interface based on the fourth generation mobile communication network technology (4G) standard; or, the wireless air interface is a wireless air interface based on the fifth generation mobile communication network technology (5G) standard, for example, the wireless air interface is a new air interface; or, the wireless air interface can also be a wireless air interface based on the next generation mobile communication network technology standard of 5G.
  • Each UE with ranging function has specific capabilities and can play specific roles based on its capabilities. It plays a different role from other UEs in ranging/SL positioning services. If it is not authorized to play a specific role during the discovery process, there may be mutual deception between UEs, resulting in service violations.
  • the UE may provide erroneous positioning information to the reference UE and/or the target UE.
  • the UE When a UE that is not allowed to act as a server is discovered, if the UE participates in ranging/SL positioning services, the UE will obtain location information of other UEs that it may not be allowed to obtain or may provide erroneous calculation results to the reference UE and/or the target UE.
  • the UE When the UE is not allowed to play the role of a client UE, the UE will request ranging from a ranging server or other UEs, so as to obtain location information of other UEs that it may not be allowed to obtain.
  • a UE cannot play a specific role but does play a specific role, there may be security issues, such as obtaining the location information of other UEs that it is not allowed to obtain, providing wrong measurement results and/or providing wrong calculation results, which ultimately leads to abnormal ranging results. Even in message transmission, due to the transmission of illegal information such as viruses, other information security and UE usage security risks may be involved.
  • an embodiment of the present disclosure provides an information processing method, which is performed by a first UE and includes:
  • S1110 Send a first request message to a network device, wherein the first request message includes: first role information; wherein the first role information is used to indicate a first role played by the first UE in a predetermined service; and the first role information is used for the network device to verify whether the first UE can play the first role in the predetermined service;
  • S1120 Receive a first response message returned by the network device based on the first request message; wherein, the first response message is at least used to indicate whether the first UE is authorized to act as the first role; the first UE is authorized to act as the first role, the first response message is an acceptance message, and the acceptance message includes: a first key corresponding to the first role; wherein, the first key is used for mutual discovery between the first UE and other UEs.
  • the first UE may be a terminal of any form.
  • the first UE may be a mobile phone, a tablet computer, a wearable device, a vehicle-mounted device, a smart home device, a smart office device, and/or various UEs with wireless communication functions.
  • the first UE may be any UE participating in any predetermined service.
  • the predetermined service may be a ranging/SL positioning service.
  • the network device may be a core network device, which includes but is not limited to: a proximity key management function entity (PKMF) and/or a direct discovery name management function (DDNMF).
  • PKMF proximity key management function entity
  • DDNMF direct discovery name management function
  • the first role information may indicate a role that can be played in the predetermined service.
  • a UE may play one or more roles in the predetermined service.
  • the roles involved in the predetermined business may include but are not limited to at least one of the following:
  • Reference UE used to provide a location reference for the object under test
  • Target UE which is the object to be measured
  • An assisting UE used to assist position measurement between a reference UE and a target UE
  • a positioning UE is used to determine the absolute position of a target UE by using its own absolute position, for example, the absolute position includes but is not limited to: longitude and latitude, etc.;
  • the positioning server UE is used to calculate the ranging or positioning results
  • Positioning client used to request ranging or positioning results.
  • a UE may play one or more roles.
  • the first request message will carry the first role information, so after receiving the first role information, the network device will verify whether the first UE can play the first role in the reserved service.
  • the first role information may include: a role code or a character string indicating the first role, etc.
  • the network device stores information about the roles that the first UE can play, and the network device can locally verify the first role played locally by the first UE.
  • the network device may determine whether the first UE is authorized to play the first role based on the subscription data of the first UE.
  • the contract data may be stored in a network device such as a user data management (UDM) or a ranging application server, and the network device may request the contract data from a second network device such as the UDM or the ranging application server.
  • a network device such as a user data management (UDM) or a ranging application server
  • the first request message may be any message sent by the first UE to the network device.
  • the first request message includes but is not limited to a discovery request message.
  • the first request message may also include identification information of the first UE.
  • the identification information of the first UE may include but is not limited to: a user information identifier (User Info Identifier).
  • the user information identifier may uniquely identify the first UE.
  • the first request message may further include: a service code of the scheduled service.
  • the first request message may include: a message required by the network device to verify whether the first UE can play the first role in the predetermined service.
  • the first UE After sending the first request message, the first UE will continue to receive a response message to the first request message (ie, the first response message).
  • the network device may generate a first key corresponding to the first role.
  • the first key is generated according to the first role.
  • the first key is generated using the first role information as an input parameter.
  • the first key can be generated according to the first role information and the service code of the predetermined service.
  • the key generation algorithms of different roles are different. Thus, even if the service code of the predetermined service is used as an input parameter, different first keys will be generated.
  • the first response message may include an acceptance message, which, on the one hand, indicates that the network device authorizes the first UE to play the first role.
  • the acceptance message may include the first key, which may be used for a subsequent security mechanism for mutual discovery between the first UE and other UEs (e.g., the second UE).
  • the first key may include but is not limited to a discovery key. Since the first key in the present application corresponds to the first role. In this way, if there are N roles in the scheduled service, N sets of discovery keys will be generated.
  • the discovery key can be used at least for integrity protection when the first UE and the second UE discover each other. Since the first key corresponds to the first role, in the subsequent mutual discovery process of the UE, not only can the security of the discovery process be guaranteed by the first key, but once the security verification is passed, the verification that the first UE can play the role is simultaneously realized, thereby reducing the participation of illegal UEs in the scheduled service in roles that they cannot play, thereby reducing the security issues caused by the participation of illegal UEs in the scheduled service.
  • the first response message if the first response message includes at least one set of first keys, it means that the first response message may be an acceptance message.
  • the first request message may only carry the first role information of one role, so that if the first UE is authorized to play the first role, the acceptance message will carry a first key.
  • the first request message will carry the first role information of the multiple first roles, so that the first response message can carry multiple sets of first keys.
  • the network device may not return a response message to the first UE, so that the first UE will not receive the first key and thus cannot participate in the mutual discovery between the second UEs.
  • an embodiment of the present disclosure provides an information processing method, which is performed by a first UE and includes:
  • S1210 Send a first request message to a network device, wherein the first request message includes: first role information; wherein the first role information is used to indicate a first role played by the first UE in a predetermined service; and the first role information is used for the network device to verify whether the first UE can play the first role in the predetermined service;
  • S1220 Receive a rejection message returned when the first UE is not authorized to play the first role.
  • the network device may also return a rejection message (Reject Message) to the first UE. After the first UE receives the rejection message, it knows that it cannot participate in the scheduled service as the first role.
  • the rejection message may include: a rejection reason. The rejection reason informs the first UE of the reason for being denied authorization and the issuance of the first key.
  • a first request message may carry first role information of multiple UEs that the first UE expects to play
  • the first UE will receive a rejection message, or receive a response message, which may include one or more first keys of the first role that is authorized to play, and the rejection reason corresponding to the first role that is not authorized to play.
  • the scheduled service includes a ranging/direct link SL positioning service; the first request message also includes: a ranging/direct link SL positioning service code (Ranging Service Code, RSC).
  • RSC Ranging Service Code
  • the scheduled service is not limited to the ranging/direct link SL positioning service.
  • the scheduled service may also include: other proximity services (ProSe).
  • an embodiment of the present disclosure provides an information processing method, which is executed by a network device and includes:
  • S2110 Receive a first request message from a first user equipment UE, where the first request message includes: first role information; wherein the first role information is used to indicate a first role played by the first UE in a predetermined service;
  • S2120 Verify, according to the first role information, whether the first UE can serve as the first role in the predetermined service, and obtain a first verification result;
  • S2130 In response to the first verification result indicating that the first UE is authorized to act as the first role, return an acceptance message to the first UE, wherein the acceptance message includes: a first key generated according to the first role information; wherein the first key is used for mutual discovery between the first UE and other UEs.
  • the network device may be a core network device, which includes but is not limited to a DDNMF, a PKMF or a policy control function PCF.
  • the first request message may be forwarded or transparently transmitted by an access network device such as a base station.
  • the first request message includes: identification information of the first UE, and the identification information of the first UE can be used by the network device to verify the authorization of the first UE.
  • the first request message may include information of the first role requested and/or expected to be played by the first UE (first role information), so whether the first UE can be authorized to play the first role can be verified.
  • the first key may be generated in advance according to the role information of the role included in the predetermined service, or may be generated after receiving the first request message.
  • the network device can generate a first key corresponding to the role.
  • the first key can be a discovery key.
  • an acceptance message will be sent to the first UE, and the acceptance message may include: a first key generated according to the first role information.
  • the first key is used to ensure security between the first UE and the second UE when they discover each other, and can also be used by the second UE to verify whether the first UE can play its declared role in the predetermined service.
  • returning the first response message to the first UE according to the first verification result includes:
  • a rejection message is returned to the first UE.
  • verifying whether the first UE can play the first role in the predetermined service according to the first role information to obtain a first verification result includes:
  • S2121 Send a second request message to a second network device, wherein the second request message includes: a first identifier of the first UE and the first role information;
  • S2122 Receive a second response message returned based on the second request message; wherein the second response message indicates that the first UE can play the first role in the scheduled service, or indicates that the first UE cannot play the first role in the scheduled service.
  • the second network device may be a UDM or a server of a predetermined service.
  • the network device can locally verify whether the first UE is authorized to play the first role.
  • the method further comprises:
  • the first key corresponding to each role in the scheduled service is updated regularly or irregularly according to the fresh value or the parameter updated by the algorithm, so as to reduce the security problem caused by repeated and/or long-term use of the first key generated according to the same role information.
  • an embodiment of the present disclosure provides an information processing method, which is performed by a second user equipment UE, wherein the method includes:
  • S3110 Broadcast a notification message, wherein the notification message includes: second role information, wherein the second role information indicates a second role that the second UE can play in a scheduled service, wherein the notification message is used for security protection of a second key corresponding to the second role; the second key is: the network device verifies that the second UE is authorized to play the second role in the scheduled service and sends it.
  • the notification message includes: second role information, wherein the second role information indicates a second role that the second UE can play in a scheduled service, wherein the notification message is used for security protection of a second key corresponding to the second role; the second key is: the network device verifies that the second UE is authorized to play the second role in the scheduled service and sends it.
  • the second UE may be any communication device that has obtained the second key corresponding to the second role it plays from the network device.
  • the second UE may be one of the aforementioned first UEs.
  • the second UE sends an announce message on the broadcast channel of the SL.
  • the announce message may include the second role information of the second role that the second UE is willing, expects or can play.
  • the notification message will be protected by the second key generated according to the second role information.
  • the security protection includes but is not limited to: integrity protection.
  • the second key is used to perform integrity protection on the entire notification message.
  • the second UE cycle After other UEs in the second UE cycle hear the pass message, they determine the key for verifying the integrity of the notification message through the second role information carried in the plain text of the notification message and perform verification. If the integrity verification passes, it can be considered that the second UE participating in the scheduled service has been discovered and the second role that the second UE can play is known.
  • the second key may be: generated by the network device according to the second role information.
  • the second key may also be written into the protocol or pre-configured in the legal UE and generated according to the second role information.
  • the second UE uses model A to achieve mutual discovery between itself and other UEs.
  • the predetermined service is a ranging/direct link SL positioning service; the notification message also includes: a ranging/direct link SL positioning service code RSC.
  • an embodiment of the present disclosure provides an information processing method, which is performed by a third user equipment UE, wherein the method includes:
  • S4110 Receive a notification message broadcast by a second UE; the notification message includes: second role information, wherein the second role information indicates a second role that the second UE can play in a predetermined service;
  • S4130 Determine, based on a second verification result of the notification message, whether the second UE can play the second role in the scheduled service.
  • the third UE may be the aforementioned first UE.
  • model A is used to implement mutual discovery between UEs. In this way, the third UE will monitor the announcement message on the broadcast channel.
  • the notification message will carry the second role information in plain text, which may include at least a role code.
  • the security of the notification message can be verified based on the second key generated based on the second role information and preferentially obtained from the network device or pre-configured or agreed upon in a protocol.
  • the S4120 may include:
  • the integrity of the notification message is verified using the second key.
  • the second verification result includes: verification passed and/or verification failed. For example, the notification message is integrity verified using the second key. If the verification determines that the notification message is complete, the verification is considered to be passed (or successful), otherwise the verification fails.
  • the S4130 may include:
  • the second verification result indicates that the notification message passes the verification, it is determined that the second UE can play the second role in the predetermined service
  • the second verification result indicates that the notification message fails the verification, it is determined that the second UE cannot play the second role in the scheduled service.
  • the method further comprises:
  • the identification information of the second UE and the second role information will be stored to facilitate the subsequent performance of the scheduled service with the second UE.
  • the identification information of the second UE may include, but is not limited to: any information that can uniquely identify the UE, such as the layer 2 and/or layer 3 identification of the second UE.
  • the method further comprises:
  • the notification message is discarded, that is, the notification message sent by the second UE is ignored.
  • the predetermined service is a ranging/direct link SL positioning service; the notification message also includes: a ranging/direct link SL positioning service code RSC.
  • the predetermined service is not limited to the ranging/SL positioning service.
  • determining, according to a verification result of the notification message, whether the second UE can play the second role in the predetermined service includes:
  • an embodiment of the present disclosure provides an information processing method, which is performed by a fourth user equipment UE.
  • the method includes:
  • S5110 Send a third request message, wherein the third request message includes: third role information, wherein the third role information is used to indicate a third role played by the fifth UE in the scheduled service;
  • S5120 Receive a third response message to the third request message, wherein the third request message is returned by the fifth UE based on a verification result of the third request message based on a third key corresponding to the third role.
  • the fourth UE will use Model B to discover each other with other devices.
  • the fourth UE carries the role information of the role it wants to discover (ie, the third role information).
  • the fourth UE can perform the preset service by itself, but can only play some roles at a time and needs the assistance of UEs with other roles.
  • the third role information can be carried in plain text in the third request message, and other UEs can only successfully verify the third request message after receiving it and obtaining the third key generated according to the third role information.
  • the fourth UE receives the third response message returned by the fifth UE, it can be considered that the fifth UE is discovered and it is determined that the fifth UE has the authority to play the third role.
  • an embodiment of the present disclosure provides an information processing method, which is executed by a fourth user equipment UE.
  • the method includes:
  • S5210 Send a third request message, wherein the third request message includes: third role information, wherein the third role information is used to indicate a third role played by the fifth UE in the scheduled service;
  • S5220 Receive a third response message to the third request message, wherein the third request message is returned by the fifth UE based on a verification result of the third request message based on a third key corresponding to the third role.
  • the third response message carries the role information (eg, fourth role information) provided by the fifth UE indicating the role that the fifth UE can play in the predetermined service.
  • the role information eg, fourth role information
  • the fourth role information must include the third role information.
  • the third response message will be sent on a broadcast channel, for example, an SL channel, so that the fourth UE will monitor multiple third response messages.
  • the third role information is carried in plain text in the third response message, and the fourth UE can determine whether the currently received response message is the response message it wants to receive based on the plain text role information.
  • the third key is used to verify the integrity of the third response message. After the third response message passes the integrity verification, it means that the fifth UE is the UE that the fourth UE wants to discover and can play the third role.
  • the third request message fails to pass the security verification of the third key by the fifth device, and the third response message is a rejection message.
  • the third response message is a rejection message, it means that the fourth UE may not have found a UE that can play the third role.
  • the method further comprises:
  • the fourth UE has failed to find a UE that can play the third role.
  • the predetermined service is a ranging/direct link SL positioning service
  • the third request message includes: the ranging/direct link SL positioning service code RSC.
  • the third request message includes: fourth role information of the fourth UE in the predetermined service.
  • the third request message also includes role information (eg, fourth role information) indicating that the fourth UE itself can play the fourth role, then after the third request message passes security verification, the fifth UE considers that the fourth UE capable of playing the fourth role has been found.
  • role information eg, fourth role information
  • the security verification at least includes: integrity verification.
  • the embodiment of the present disclosure further provides an information processing method, which is executed by a fifth user equipment UE, and the method includes:
  • S6110 Receive a third request message sent by a fourth UE, wherein the third request message includes: third role information, wherein the third role information is used to indicate a third role played by the fifth UE in a preset service;
  • S6120 Verify the third request message based on a third key corresponding to the third role
  • S6130 Send a third response message to the fourth UE according to the verification result of the third request message.
  • the fifth UE can listen to the third request message on the broadcast channel, and the third request message carries the third role information in plain text. In this way, the fifth UE uses the third key generated according to the third role information to verify the security of the third request message, exemplarily, at least verifies the integrity of the third request message, and then returns a third response message to the fourth UE based on the verification result.
  • the sending a third response message to the fourth UE according to the verification result of the third request message includes:
  • sending a third response message to the fourth UE according to the verification result of the third request message includes: sending a rejection message to the fourth UE in response to the third request message failing security verification.
  • no message may be returned to the fourth UE.
  • the predetermined service may include a ranging/SL positioning service.
  • the third request message may also include: a ranging/SL positioning service code (Ranging sidelink positioning Service Code, RSC).
  • RSC Ranging sidelink positioning Service Code
  • the ranging/SL positioning server or UDM authorizes the UE by checking the service agreement or UE subscription. If the UE role is authorized, in addition to the services requested by the UE, the discovery key generation function (such as PKMF/DDNMF) also generates discovery keys by associating the keys with the roles authorized by the UE. If the UE role is not authorized, the discovery key generation function (such as PKMF/DDNMF) will not generate discovery keys for the UE.
  • the discovery key generation function such as PKMF/DDNMF
  • the UE then obtains the discovery key from the network and protects the broadcast discovery message using the discovery key associated with the requested service and the UE's authorized role.
  • the peer UE When a peer UE receives a discovery message, and the role declared in the discovery message is the role that the peer UE wants to discover, the peer UE will use the discovery key associated with the declared/authorized role to verify the received discovery message. In this way, a misbehaving UE claiming an unauthorized role (a role that is different from the authorized role associated with the discovery key) cannot deceive the peer UE, and the peer UE will not be able to use the discovery key associated with the unauthorized role to verify the discovery message.
  • the remote UE uses model A to discover roles that other terminals can play, it may include:
  • Steps 1 to 6 refer to the announcement UE (A-UE):
  • a-UE sends a discovery request message, including the ranging relay service code (RSC) and the role that the UE wants to play in the ranging service (e.g. target UE).
  • the discovery request message may also include the role it wants to discover (e.g. Reference UE).
  • the 5G DDNMF/PKMF of A-UE sends an authorization request (Authorization Request) to the ranging/SL positioning server or the UDM of A-UE to announce the authorization, which includes the relay service code (RSC) and the role that A-UE (Target UE) wants to play in the ranging service, as well as the role that A-UE (Target UE) wants to discover (such as Reference UE).
  • Authorization Request an authorization request
  • RSC relay service code
  • the ranging/SL positioning server checks the service agreement or the A-UE's UDM checks the A-UE's subscription to determine whether the A-UE is allowed to play the role (of the target UE).
  • the ranging/SL positioning server or the UDM of the A-UE returns an authorization response to the 5G DDNMF/PKMF, which contains the role of the authorized A-UE (target UE).
  • A-UE's 5G DDNMF/PKMF/PCF When A-UE is authorized to play the role it requested (target UE), A-UE's 5G DDNMF/PKMF/PCF generates a discovery key by associating RSC and A-UE's authorized role (target UE), and stores the discovery key in RSC and A-UE's authorized role (target UE). If A-UE's 5G DDNMF/PKMF/PCF is not authorized to play the role it requested, A-UE's 5G DDNMF/PKMF/PCF does not generate a discovery key and rejects A-UE's discovery request.
  • the 5G DDNMF/PKMF/PCF of A-UE returns the A-UE authorization role (target UE) and the discovery key in the discovery response.
  • A-UE stores the discovery key in the RSC and its authorization role (target UE).
  • Steps 7 to 17 are for monitoring UE (M-UE):
  • the M-UE sends a discovery request message, which contains the Relay Service Code (RSC) and the role it wants to play in the ranging service (e.g. Reference UE) and the role it expects to discover (e.g. Target UE).
  • RSC Relay Service Code
  • the 5G DDNMF/PKMF/PCF of M-UE sends an authorization request to the ranging/SL positioning server or the UDM of M-UE, which includes the relay service code (RSC) and the role that M-UE (Reference UE) wants to play in the ranging service, as well as the role that M-UE wants to discover (such as the target UE).
  • RSC relay service code
  • M-UE Reference UE
  • the ranging/SL positioning server checks the service agreement or the M-UE's UDM checks the M-UE's subscription to determine whether the M-UE is allowed to play the role of reference UE.
  • the ranging/SL positioning server or the UDM of the M-UE shall return an authorization response to the 5G DDNMF/PKMF/PCF containing the authorized role of the M-UE (reference UE).
  • the 5G DDNMF/PKMF of the M-UE contacts the 5G DDNMF/PKMF/PCF of a-UE (the target UE that the M-UE expects to discover) by sending a Monitor Request message.
  • A-UE s 5G DDNMF/PKMF/PCF sends an authorization request to the ranging/SL positioning server or UDM, which contains the authorization roles of M-UE and A-UE.
  • the ranging/SL positioning server or UDM checks whether the authorized roles of M-UE and a-UE in the requested service match (for example, for a ranging service between two UEs, whether the roles are Target UE and Reference UE).
  • the ranging/SL positioning server or UDM returns an authorization response (Authorization Response) to indicate whether the authorization is successful.
  • the 5G DDNMF/PKMF/PCF of A-UE retrieves the corresponding Discovery key stored on RSC and A-UE-role (Target UE).
  • the 5G DDNMF/PKMF/PCF of a-UE responds to the 5G DDNMF/PKMF/PCF of M-UE and sends a Monitor Response message including RSC, a-UE role (target UE) and corresponding discovery key.
  • the 5G DDNMF/PKMF of the M-UE returns the M-UE authorized role (reference UE) and the discovery key in the discovery response.
  • the M-UE stores the discovery key together with the RSC and the role that the M-UE expects to discover (target UE).
  • A-UE announces the start.
  • A-UE forms an announcement message containing the RSC and its declared role (target UE).
  • A-UE protects the message using the discovery key.
  • the M-UE listens to the Announce message and checks the RSC and the declared Role in the Announce message. The M-UE then retrieves the discovery key stored in the RSC and the role declared by the A-UE (target UE). The M-UE verifies the Announce message using the retrieved discovery key.
  • UE-1 which is authorized as a positioning UE, claims to be the target UE in an announcement message, which is protected by the discovery key associated with the authorized role (i.e., positioning UE).
  • M-UE which is in the reference UE role
  • UE-2 will receive the message from UE-1 and recognize that UE-1 is in the target UE role.
  • UE-2 will then verify the received message using the discovery key associated with the role it expects to discover (i.e., target UE). Since the keys used by UE-1 and UE-2 are not the same, the verification fails. In this way, a misbehaving UE cannot deceive the peer UE through an unauthorized role.
  • the remote UE uses model B to discover the roles that other terminals can play, it may include:
  • Steps 1 to 17 are the same or similar to the operations of Model A in Section 2.2.1:
  • the discoverer forms a request message containing the RSC, its claimed role (reference UE) and the discoverer's intended role (target UE).
  • the R-UE then protects the request message using the discovery key associated with the RSC and intended role (target UE).
  • the discoverer listens to the request message and checks the RSC, the claimed role (reference UE) and the expected role (target UE) in the message. The E-UE then retrieves the discovery key stored along with the RSC and the role expected by the R-UE (target UE). The E-UE uses the retrieved discovery key to authenticate the request message.
  • the E-UE If the authentication is successful, the E-UE returns a response message to the discoverer, which contains the RSC that the R-UE expects to discover and its authorized role. The E-UE then uses the discovery key stored with the RSC and its authorized role (target UE) to protect the response message.
  • the R-UE receives the response message and checks the RSC and the authorized role of the E-UE (target UE) in the message. The R-UE then retrieves the discovery key stored together with the RSC and the role of the E-UE (target UE). The R-UE uses the retrieved discovery key to authenticate the request message.
  • UE-1 which is authorized as a positioning UE, claims to be a reference UE and expects to discover the target UE in a request message, which is protected by the discovery key associated with its authorized role (i.e., positioning UE).
  • UE-2 which is in the role of target UE, receives the message from UE-1 and recognizes that UE-1 is in the role of reference UE and expects to discover the target UE.
  • UE-2 will then use the discovery key associated with the intended role (i.e., target UE) to verify the received message. Since the keys used by UE-1 and UE-2 are different, the verification will fail. In this way, a misbehaving UE cannot deceive the peer UE with an unauthorized role.
  • an embodiment of the present disclosure provides an information processing device, wherein the device includes:
  • the first sending module 110 is configured to send a first request message to the network device, wherein the first request message includes: first role information; wherein the first role information is used to indicate the first role played by the first UE in the predetermined service; the first role information is used for the network device to verify whether the first UE can play the first role in the predetermined service;
  • the first receiving module 120 is configured to receive a first response message returned by the network device based on the first request message; wherein the first response message is at least used to indicate whether the first UE is authorized to play the first role;
  • the first UE is authorized to act as the first role
  • the first response message is an acceptance message
  • the acceptance message includes: a first key corresponding to the first role; wherein the first key is used for mutual discovery between the first UE and other UEs.
  • the information processing device may include a first UE.
  • the first sending module 110 and the first receiving module 120 may be program modules; after the program is executed by the processor, the above operations can be implemented.
  • the first sending and first receiving modules 120 may be soft-hard combination modules; the soft-hard combination modules include but are not limited to various programmable arrays; the programmable arrays include but are not limited to field programmable arrays and/or complex programmable arrays.
  • the first sending module 110 and the first receiving module 120 may be pure hardware modules; the pure hardware modules include but are not limited to application-specific integrated circuits.
  • the first UE is not authorized to play the first role, and the first response message is: a rejection message.
  • the predetermined service includes a ranging/direct link SL positioning service
  • the first request message also includes: ranging/direct link SL positioning service code RSC.
  • the security protection of the ranging/SL positioning service discovery process will reuse the security mechanisms defined for ProSe/V2X services as much as possible. It is assumed that the roles that the UE (e.g. positioning UE, reference UE) is allowed to play in the ranging/SL positioning service can be registered in the UE subscription or specific ranging/SL positioning service protocol. This means that both the UDM and the ranging/SL positioning server can be candidate functions for authorizing the UE role for the requested ranging/SL positioning service.
  • an embodiment of the present disclosure provides an information processing device, wherein the device includes:
  • the second receiving module 210 is configured to receive a first request message from a first user equipment UE, wherein the first request message includes: first role information; wherein the first role information is used to indicate a first role played by the first UE in a predetermined service;
  • a first verification module 220 is configured to verify whether the first UE can play the first role in the predetermined service according to the first role information, and obtain a first verification result;
  • the second sending module 230 is configured to return an acceptance message to the first UE in response to the first verification result indicating that the first UE is authorized to act as the first role, wherein the acceptance message includes: a first key generated according to the first role information; wherein the first key is used for mutual discovery between the first UE and other UEs.
  • the information processing apparatus may include a network device.
  • the second receiving module 210, the first verification module 220 and the second sending module 230 may be program modules; after the program is executed by the processor, the above operations can be implemented.
  • the second receiving module 210, the first verification module 220 and the second sending module 230 may be a combination of soft and hard modules; the soft and hard modules include but are not limited to various programmable arrays; the programmable arrays include but are not limited to field programmable arrays and/or complex programmable arrays.
  • the second receiving module 210, the first verification module 220 and the second sending module 230 may be pure hardware modules; the pure hardware modules include but are not limited to application specific integrated circuits.
  • the predetermined service includes: ranging/direct link SL positioning service; the notification message also includes: ranging/direct link SL positioning service code RSC.
  • an embodiment of the present disclosure provides an information processing device, wherein the device includes:
  • the broadcast module 310 is configured to broadcast a notification message, wherein the notification message includes: second role information, wherein the second role information indicates a second role that the second UE can play in a predetermined service, wherein the notification message is used for security protection of a second key corresponding to the second role; the second key is: the network device verifies that the second UE is authorized to play the second role in the predetermined service and sends it.
  • the information processing device may include a second UE.
  • the information processing device further includes: a storage module.
  • the storage module is connected to the broadcast module 310 and can be used to store notification messages.
  • the broadcast module 310 may be a program module; after the program is executed by a processor, the above operations can be implemented.
  • the broadcast module 310 may be a soft-hard combination module; the soft-hard combination module includes but is not limited to various programmable arrays; the programmable array includes but is not limited to a field programmable array and/or a complex programmable array.
  • the broadcast module 310 may be a pure hardware module; the pure hardware module includes but is not limited to a dedicated integrated circuit.
  • the predetermined service includes: ranging/direct link SL positioning service; the notification message also includes: ranging/direct link SL positioning service code RSC.
  • an information processing device comprising:
  • the third receiving module 410 is configured to receive a notification message broadcast by the second UE; the notification message includes: second role information, wherein the second role information indicates a second role that the second UE can play in a predetermined service;
  • a second verification module 420 is configured to verify the security of the notification message using a second key corresponding to the second role
  • the determination module 430 is configured to determine whether the second UE can play the second role in the predetermined service according to the second verification result of the notification message.
  • the information processing device may be a third UE.
  • the third receiving module 410, the second verification module 420 and the determination module 430 may be program modules; after the program is executed by the processor, the above operations can be implemented.
  • the third receiving module 410, the second verification module 420 and the determination module 430 may be a combination of soft and hard modules; the combination of soft and hard modules include but are not limited to various programmable arrays; the programmable arrays include but are not limited to field programmable arrays and/or complex programmable arrays.
  • the third receiving module 410, the second verification module 420 and the determination module 430 may be pure hardware modules; the pure hardware modules include but are not limited to application specific integrated circuits.
  • the predetermined service is a ranging/direct link SL positioning service; the notification message also includes: a ranging/direct link SL positioning service code RSC.
  • the determination module 430 is configured to determine that the second UE cannot play the second role in the predetermined service in response to the second verification result indicating that the notification message fails the security verification;
  • an information processing device comprising:
  • the fourth sending module 510 is configured to send a third request message, wherein the third request message includes: third role information, wherein the third role information is used to indicate a third role played by the fifth UE in the predetermined service;
  • the fourth receiving module 520 is configured to receive a third response message to the third request message, wherein the third request message is returned by the fifth UE based on a verification result of the third request message based on a third key corresponding to the third role.
  • the information processing device may be a fourth UE.
  • the fourth sending module 510 and the fourth receiving module 520 may be program modules; after the program is executed by the processor, the above operations can be implemented.
  • the fourth sending module 510 and the fourth receiving module 520 may be soft-hard combination modules; the soft-hard combination modules include but are not limited to various programmable arrays; the programmable arrays include but are not limited to field programmable arrays and/or complex programmable arrays.
  • the fourth sending module 510 and the fourth receiving module 520 may be pure hardware modules; the pure hardware modules include but are not limited to application specific integrated circuits.
  • the apparatus further comprises:
  • a third verification module is configured to verify the third response message using a third key
  • the storage module is configured to store the identification information of the fifth UE and the third role information when the third response message passes the security verification.
  • the third request message fails to pass the security verification of the third key by the fifth device, and the third response message is a rejection message.
  • the predetermined service is a ranging/direct link SL positioning service
  • the third request message includes: the ranging/direct link SL positioning service code RSC.
  • the third request message includes: fourth role information of the role played by the fourth UE in the predetermined service.
  • an embodiment of the present disclosure provides an information processing device, wherein the device includes:
  • the fifth receiving module 610 is configured to receive a third request message sent by a fourth UE, wherein the third request message includes: third role information, wherein the third role information is used to indicate a third role played by the fifth UE in a preset service;
  • a third verification module 620 configured to verify the third request message based on a third key corresponding to the third role
  • the fifth sending module 630 is configured to send a third response message to the fourth UE according to the verification result of the third request message.
  • the information processing device provided by the embodiment of the present disclosure may be the fifth UE.
  • the fifth receiving module 610, the third verification module 620 and the fifth sending module 630 may be program modules; after the program is executed by the processor, the above operations can be implemented.
  • the fifth receiving module 610, the third verification module 620 and the fifth sending module 630 may be a combination of soft and hard modules; the combination of soft and hard modules include but are not limited to various programmable arrays; the programmable arrays include but are not limited to field programmable arrays and/or complex programmable arrays.
  • the fifth receiving module 610, the third verification module 620 and the fifth sending module 630 may be pure hardware modules; the pure hardware modules include but are not limited to application-specific integrated circuits.
  • the sending a third response message to the fourth UE according to the verification result of the third request message includes:
  • the fifth sending module 630 is further configured to send a rejection message to the fourth UE in response to the third request message failing security verification.
  • the present disclosure provides a communication device, including:
  • a memory for storing processor-executable instructions
  • the processor is configured to execute the information processing method provided by any of the aforementioned technical solutions.
  • the processor may include various types of storage media, which are non-transitory computer storage media that can continue to remember information stored thereon after the communication device loses power.
  • the communication device includes: UE or network device.
  • the UE may be any one of the first UE to the fifth UE mentioned above.
  • the processor can be connected to the memory via a bus, etc., and is used to read an executable program stored in the memory, for example, at least one of the methods shown in Figures 2A, 2B, 3A, 3B, 4, 5, 6A, 6B, 7, 8A and 8B.
  • FIG15 is a block diagram of a UE 800 according to an exemplary embodiment.
  • the UE 800 may be a mobile phone, a computer, a digital broadcast user equipment, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, etc.
  • UE 800 may include one or more of the following components: a processing component 802 , a memory 804 , a power component 806 , a multimedia component 808 , an audio component 810 , an input/output (I/O) interface 812 , a sensor component 814 , and a communication component 816 .
  • the processing component 802 generally controls the overall operation of the UE 800, such as operations associated with display, phone calls, data communications, camera operations, and recording operations.
  • the processing component 802 may include one or more processors 820 to execute instructions to generate all or part of the steps of the above-described method.
  • the processing component 802 may include one or more modules to facilitate interaction between the processing component 802 and other components.
  • the processing component 802 may include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
  • the memory 804 is configured to store various types of data to support operations on the UE 800. Examples of such data include instructions for any application or method operating on the UE 800, contact data, phone book data, messages, pictures, videos, etc.
  • the memory 804 may be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic disk, or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EPROM erasable programmable read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory flash memory
  • flash memory magnetic disk, or optical disk.
  • the power component 806 provides power to various components of the UE 800.
  • the power component 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to the UE 800.
  • the multimedia component 808 includes a screen that provides an output interface between the UE 800 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundaries of the touch or slide action, but also detect the duration and pressure associated with the touch or slide operation.
  • the multimedia component 808 includes a front camera and/or a rear camera. When the UE 800 is in an operating mode, such as a shooting mode or a video mode, the front camera and/or the rear camera may receive external multimedia data. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
  • the audio component 810 is configured to output and/or input audio signals.
  • the audio component 810 includes a microphone (MIC), and when the UE 800 is in an operating mode, such as a call mode, a recording mode, and a speech recognition mode, the microphone is configured to receive an external audio signal.
  • the received audio signal may be further stored in the memory 804 or sent via the communication component 816.
  • the audio component 810 also includes a speaker for outputting an audio signal.
  • I/O interface 812 provides an interface between processing component 802 and peripheral interface modules, such as keyboards, click wheels, buttons, etc. These buttons may include but are not limited to: home button, volume button, start button, and lock button.
  • the sensor assembly 814 includes one or more sensors for providing various aspects of status assessment for the UE 800.
  • the sensor assembly 814 can detect the open/closed state of the device 800, the relative positioning of components, such as the display and keypad of the UE 800, the sensor assembly 814 can also detect the position change of the UE 800 or a component of the UE 800, the presence or absence of user contact with the UE 800, the UE 800 orientation or acceleration/deceleration and the temperature change of the UE 800.
  • the sensor assembly 814 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • the sensor assembly 814 can also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor assembly 814 can also include an accelerometer, a gyroscope sensor, a magnetic sensor, a pressure sensor or a temperature sensor.
  • the communication component 816 is configured to facilitate wired or wireless communication between the UE 800 and other devices.
  • the UE 800 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
  • the communication component 816 receives a broadcast signal or broadcast-related information from an external broadcast management system via a broadcast channel.
  • the communication component 816 also includes a near field communication (NFC) module to facilitate short-range communication.
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • UE 800 may be implemented by one or more application-specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic components to perform the above methods.
  • ASICs application-specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGAs field programmable gate arrays
  • controllers microcontrollers, microprocessors, or other electronic components to perform the above methods.
  • a non-transitory computer-readable storage medium including instructions is also provided, such as a memory 804 including instructions, and the above instructions can be executed by the processor 820 of the UE 800 to generate the above method.
  • the non-transitory computer-readable storage medium can be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, etc.
  • an embodiment of the present disclosure shows a structure of an access device.
  • the communication device 900 can be provided as a network side device.
  • the communication device can be various network elements such as the aforementioned access network element and/or network function.
  • the communication device 900 includes a processing component 922, which further includes one or more processors, and a memory resource represented by a memory 932 for storing instructions executable by the processing component 922, such as an application.
  • the application stored in the memory 932 may include one or more modules, each corresponding to a set of instructions.
  • the processing component 922 is configured to execute instructions to perform any of the aforementioned methods applied to the access device, such as Figures 2A, 2B, 3A, 3B, 4, 5, 6A, 6B, 7, 8A, and 8B.
  • the communication device 900 may also include a power supply component 926 configured to perform power management of the communication device 900, a wired or wireless network interface 950 configured to connect the communication device 900 to a network, and an input/output (I/O) interface 958.
  • the communication device 900 may operate based on an operating system stored in the memory 932, such as Windows Server TM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开实施例提供一种信息处理方法及装置、通信设备及存储介质。由第一用户设备UE执行,所述方法包括:向网络设备发送第一请求消息,其中,所述第一请求消息包括:第一角色信息;其中,所述第一角色信息,用于指示所述第一UE在预定业务中充当的第一角色;所述第一角色信息,用于供所述网络设备验证所述第一UE是否能够在所述预定业务充当所述第一角色;接收所述网络设备基于所述第一请求消息返回的第一响应消息;其中,所述第一响应消息,至少用于指示所述第一UE是否被授权充当所述第一角色;所述第一UE被授权充当所述第一角色,所述第一响应消息为接受消息,且所述接受消息包括:与第一角色对应的第一密钥;其中,所述第一密钥,用于所述第一UE和其他UE之间的相互发现。

Description

信息处理方法及装置、通信设备及存储介质 技术领域
本公开涉及无线通信技术领域但不限于无线通信技术领域,尤其涉及一种信息处理方法及装置、通信设备及存储介质。
背景技术
在测距(Ranging)/直连链路(SideLink,SL)定位业务中可能涉及不同类型的UE。这些类型的UE可包括SL参考用户设备(User Equipment,UE)、目标UE、辅助UE、定位UE、SL定位服务器UE、SL定位客户端UE。
然而在相关技术中,基于测距/SL定位业务存在安全问题。即测距/SL定位业务的安全问题是需要进一步解决的问题。
发明内容
本公开实施例提供一种信息处理方法及装置、通信设备及存储介质。
本公开实施例第一方面提供一种信息处理方法,其中,由第一用户设备UE执行,所述方法包括:
向网络设备发送第一请求消息,其中,所述第一请求消息包括:第一角色信息;其中,所述第一角色信息,用于指示所述第一UE在预定业务中充当的第一角色;所述第一角色信息,用于供所述网络设备验证所述第一UE是否能够在所述预定业务充当所述第一角色;
接收所述网络设备基于所述第一请求消息返回的第一响应消息;其中,所述第一响应消息,至少用于指示所述第一UE是否被授权充当所述第一角色;
所述第一UE被授权充当所述第一角色,所述第一响应消息为接受消息,且所述接受消息包括:与第一角色对应的第一密钥;其中,所述第一密钥,用于所述第一UE和其他UE之间的相互发现。
本公开实施例第二方面提供一种信息处理方法,其中,由网络设备执行,所述方法包括:
接收第一用户设备UE的第一请求消息,其中,所述第一请求消息包括:第一角色信息;其中,所述第一角色信息,用于指示所述第一UE在预定业务中充当的第一角色;
根据所述第一角色信息,验证所述第一UE是否能够在所述预定业务充当所述第一角色,得到第一验证结果;
响应于所述第一验证结果表明所述第一UE被授权充当所述第一角色,向所述第一UE返回接受消息,其中,所述接受消息包括:根据所述第一角色信息生成的第一密钥;其中,所述第一密钥, 用于所述第一UE和其他UE之间的相互发现。
本公开实施例第三方面提供一种信息处理方法,由第二用户设备UE执行,其中,所述方法包括:
广播通告消息,其中,所述通告消息包括:第二角色信息,其中,所述第二角色信息,指示所述第二UE能够在预定业务中扮演的第二角色,其中,所述通告消息,用于与所述第二角色对应的第二密钥进行安全性保护;所述第二密钥为:所述网络设备验证所述第二UE被授权在预定业务充当所述第二角色发送的。
本公开实施例第四方面提供一种信息处理方法,由第三用户设备UE执行,其中,所述方法包括:
接收第二UE广播的通告消息;所述通告消息包括:第二角色信息,其中,所述第二角色信息,指示所述第二UE能够在预定业务中扮演的第二角色;
使用与所述第二角色对应的第二密钥,验证所述通告消息的安全性;
根据所述通告消息的第二验证结果,确定所述第二UE是否能够在预定业务中充当所述第二角色。
本公开实施例第四方面提供一种信息处理方法,由第三用户设备UE执行,其中,所述方法包括:
接收第二UE广播的通告消息;所述通告消息包括:第二角色信息,其中,所述第二角色信息,指示所述第二UE能够在预定业务中扮演的第二角色;
使用与所述第二角色对应的第二密钥,验证所述通告消息的安全性;
根据所述通告消息的第二验证结果,确定所述第二UE是否能够在预定业务中充当所述第二角色。
本公开实施例第五方面提供一种信息处理方法,由第四用户设备UE执行,所述方法包括:
发送第三请求消息,其中,所述第三请求消息包括:第三角色信息,其中,所述第三角色信息,用于指示第五UE在预定业务中充当的第三角色;
接收所述第三请求消息的第三响应消息,其中,所述第三请求消息是:第五UE在基于与所述第三角色对应的第三密钥对所述第三请求消息的验证结果返回的。
本公开实施例第六方面提供一种信息处理方法,其中,由第五用户设备UE执行,所述方法包括:
接收第四UE发送的第三请求消息,其中,所述第三请求消息包括:第三角色信息,其中,所述第三角色信息,用于指示所述第五UE在预设业务中充当的第三角色;
基于与所述第三角色对应的第三密钥验证所述第三请求消息;
根据所述第三请求消息的验证结果,向所述第四UE发送第三响应消息。
本公开实施例第七方面提供一种信息处理装置,其中,所述装置包括:
第一发送模块,被配置为向网络设备发送第一请求消息,其中,所述第一请求消息包括:第一 角色信息;其中,所述第一角色信息,用于指示所述第一UE在预定业务中充当的第一角色;所述第一角色信息,用于供所述网络设备验证所述第一UE是否能够在所述预定业务充当所述第一角色;
第一接收模块,被配置为接收所述网络设备基于所述第一请求消息返回的第一响应消息;其中,所述第一响应消息,至少用于指示所述第一UE是否被授权充当所述第一角色;
所述第一UE被授权充当所述第一角色,所述第一响应消息为接受消息,且所述接受消息包括:与第一角色对应的第一密钥;其中,所述第一密钥,用于所述第一UE和其他UE之间的相互发现。
本公开实施例第八方面提供一种信息处理装置,其中,所述装置包括:
第二接收模块,被配置为接收第一用户设备UE的第一请求消息,其中,所述第一请求消息包括:第一角色信息;其中,所述第一角色信息,用于指示所述第一UE在预定业务中充当的第一角色;
第一验证模块,被配置为根据所述第一角色信息,验证所述第一UE是否能够在所述预定业务充当所述第一角色,得到第一验证结果;
第二发送模块,被配置为响应于所述第一验证结果表明所述第一UE被授权充当所述第一角色,向所述第一UE返回接受消息,其中,所述接受消息包括:根据所述第一角色信息生成的第一密钥;其中,所述第一密钥,用于所述第一UE和其他UE之间的相互发现。
本公开实施例第九方面提供一种信息处理装置,其中,所述装置包括:
广播模块,被配置为广播通告消息,其中,所述通告消息包括:第二角色信息,其中,所述第二角色信息,指示所述第二UE能够在预定业务中扮演的第二角色,其中,所述通告消息,用于与所述第二角色对应的第二密钥进行安全性保护;所述第二密钥为:所述网络设备验证所述第二UE被授权在预定业务充当所述第二角色发送的。
本公开实施例第十方面提供一种信息处理装置,所述装置包括:
第三接收模块,被配置为接收第二UE广播的通告消息;所述通告消息包括:第二角色信息,其中,所述第二角色信息,指示所述第二UE能够在预定业务中扮演的第二角色;
第二验证模块,被配置为使用与所述第二角色对应的第二密钥,验证所述通告消息的安全性;
确定模块,被配置为根据所述通告消息的第二验证结果,确定所述第二UE是否能够在预定业务中充当所述第二角色。
本公开实施例第十一方面提供一种信息处理装置,所述装置包括:
第四发送模块,被配置为发送第三请求消息,其中,所述第三请求消息包括:第三角色信息,其中,所述第三角色信息,用于指示第五UE在预定业务中充当的第三角色;
第四接收模块,被配置为接收所述第三请求消息的第三响应消息,其中,所述第三请求消息是:第五UE在基于与所述第三角色对应的第三密钥对所述第三请求消息的验证结果返回的。
本公开实施例第十二方面提供一种信息处理装置,其中,所述装置包括:
第五接收模块,被配置为接收第四UE发送的第三请求消息,其中,所述第三请求消息包括:第三角色信息,其中,所述第三角色信息,用于指示所述第五UE在预设业务中充当的第三角色;
第三验证模块,被配置为基于与所述第三角色对应的第三密钥验证所述第三请求消息;
第五发送模块,被配置为根据所述第三请求消息的验证结果,向所述第四UE发送第三响应消息。
本公开实施例第十三方面提供一种通信设备,包括处理器、收发器、存储器及存储在存储器上并能够有所述处理器运行的可执行程序,其中,所述处理器运行所述可执行程序时执行如前述第一方面至第六方面任意方面提供的信息处理方法。
本公开实施例第十四方面提供一种计算机存储介质,所述计算机存储介质存储有可执行程序;所述可执行程序被处理器执行后,能够实现前述第一方面至第六方面任意方面提供的信息处理方法。
本公开实施例提供的技术方案,UE会向网络设备提供第一角色信息,该第一角色信息指示所述UE在预定业务中能够充当的第一角色,若UE被授权在预定业务中充当第一角色,则会收到网络设备根据第一角色信息生成的第一密钥。第一UE使用该第一密钥和其他UE相互发现,不仅可以实现相互发现,而且可以确保所发现UE被网络设备授权充当对应的角色,从而减少因为非法UE对自身所能充当角色的欺骗导致的安全性问题,提升了UE的预定业务中的安全性。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开实施例。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开实施例,并与说明书一起用于解释本公开实施例的原理。
图1是根据一示例性实施例示出的一种无线通信系统的结构示意图;
图2A是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图2B是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图3A是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图3B是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图4是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图5是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图6A是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图6B是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图7是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图8A是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图8B是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图9是根据一示例性实施例示出的一种信息处理装置的结构示意图;
图10是根据一示例性实施例示出的一种信息处理装置的结构示意图;
图11是根据一示例性实施例示出的一种信息处理装置的结构示意图;
图12是根据一示例性实施例示出的一种信息处理装置的结构示意图;
图13是根据一示例性实施例示出的一种信息处理装置的结构示意图;
图14是根据一示例性实施例示出的一种信息处理装置的结构示意图;
图15是根据一示例性实施例示出的一种UE的结构示意图;
图16是根据一示例性实施例示出的一种通信设备的结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开实施例相一致的所有实施方式。相反,它们仅是本公开实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开所使用的单数形式的一种、所述和该也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语和/或是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语如果可以被解释成为在……时或当……时或响应于确定。
请参考图2,其示出了本公开实施例提供的一种无线通信系统的结构示意图。如图所示,无线通信系统是基于蜂窝移动通信技术的通信系统,该无线通信系统可以包括:若干个UE 11以及若干个接入设备12。
其中,UE 11可以是指向用户提供语音和/或数据连通性的设备。UE 11可以经无线接入网(Radio Access Network,RAN)与一个或多个核心网进行通信,UE 11可以是物联网UE,如传感器设备、移动电话(或称为蜂窝电话)和具有物联网UE的计算机,例如,可以是固定式、便携式、袖珍式、手持式、计算机内置的或者车载的装置。例如,站(Station,STA)、订户单元(subscriber unit)、订户站(subscriber station)、移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点、远程UE(remote terminal)、接入UE(access terminal)、用户装置(user terminal)、用户代理(user agent)、用户设备(user device)、或用户UE(user equipment,UE)。或者,UE 11也可以是无人飞行器的设备。或者,UE 11也可以是车载设备,比如,可以是具有无线通信功能的行车电脑,或者是外接行车电脑的无线通信设备。或者,UE 11也可以是路边设备,比如,可以是具有无线通信功能的路灯、信号灯或者其它路边设备等。
接入设备12可以是无线通信系统中的网络侧设备。其中,该无线通信系统可以是第四代移动通信技术(the 4th generation mobile communication,4G)系统,又称长期演进(Long Term Evolution, LTE)系统;或者,该无线通信系统也可以是5G系统,又称新空口(new radio,NR)系统或5G NR系统。或者,该无线通信系统也可以是5G系统的再下一代系统。其中,5G系统中的接入网可以称为NG-RAN(New Generation-Radio Access Network,新一代无线接入网)。或者,MTC系统。
其中,接入设备12可以是4G系统中采用的演进型接入设备(eNB)。或者,接入设备12也可以是5G系统中采用集中分布式架构的接入设备(gNB)。当接入设备12采用集中分布式架构时,通常包括集中单元(central unit,CU)和至少两个分布单元(distributed unit,DU)。集中单元中设置有分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层、无线链路层控制协议(Radio Link Control,RLC)层、媒体访问控制(Media Access Control,MAC)层的协议栈;分布单元中设置有物理(Physical,PHY)层协议栈,本公开实施例对接入设备12的具体实现方式不加以限定。
接入设备12和UE 11之间可以通过无线空口建立无线连接。在不同的实施方式中,该无线空口是基于第四代移动通信网络技术(4G)标准的无线空口;或者,该无线空口是基于第五代移动通信网络技术(5G)标准的无线空口,比如该无线空口是新空口;或者,该无线空口也可以是基于5G的更下一代移动通信网络技术标准的无线空口。
每一种具有测距功能的UE都有特定的能力且基于其能力可以充当特定的角色。在测距/SL定位业务中发挥着不同于其他UE的作用。如果在发现过程中没有被授权担当特定角色从而可能存在UE之间的相互欺骗,从而导致业务违规。
示例性地,当一个不允许充当辅助UE时,若该UE参与测距/SL定位业务时该UE可能会向参考UE和/或目标UE提供错误的定位信息。
当不允许扮演服务器的UE被发现时,若该UE参与测距/SL定位业务时,该UE会获取其可能不允许获得的其他UE的位置信息或可能会向参考UE和/或目标UE提供错误的计算结果。
当不被允许扮演客户端角色UE时,该UE会向测距服务器或者其他UE请求测距等,从而获取其可能本不允许获得的其他UE的位置信息。
而用于一个UE不能充当特定角色确充当了特定角色,则可能存在安全性问题,例如,获取了其本不允许获得的其他UE的位置信息、提供了错误的测量结果和/或提供了错误的计算结果,最终导致测距结果异常。甚至在消息传输中由于病毒等非法信息的传输,还可能涉及其他信息安全和UE的使用安全风险。
如图2A所示,本公开实施例提供一种信息处理方法,其中,由第一UE执行,所述方法包括:
S1110:向网络设备发送第一请求消息,其中,所述第一请求消息包括:第一角色信息;其中,所述第一角色信息,用于指示所述第一UE在预定业务中充当的第一角色;所述第一角色信息,用于供所述网络设备验证所述第一UE是否能够在所述预定业务充当所述第一角色;
S1120:接收所述网络设备基于所述第一请求消息返回的第一响应消息;其中,所述第一响应消息,至少用于指示所述第一UE是否被授权充当所述第一角色;所述第一UE被授权充当所述第一角色,所述第一响应消息为接受消息,且所述接受消息包括:与第一角色对应的第一密钥;其中,所述第一密钥,用于所述第一UE和其他UE之间的相互发现。
所述第一UE可为任意形态的终端。示例性地,所述第一UE可为手机、平板电脑、可穿戴式设备、车载设备、智能家居设备、智能办公设备和/或各种具有无线通信功能的UE。
在本公开实施例中,第一UE可为任意参与预定业务的任意UE。该预定业务可为测距/SL定位业务。
在本公开实施例中,所述网络设备可为核心网设备,该核心网设备包括但不限于:接近密钥管理功能实体(proximity key management function entity,PKMF)和/或直接发现名称管理功能(direct discovery name management function,,DDNMF)。
所述第一角色信息可指示所述预定业务中可以充当的角色,一个UE可以在预定业务充当一种或多种角色。
示例性地,在所述预定业务涉及的角色可包括但不限于以下至少之一:
参考UE,用于提供被测对象的位置参考;
目标UE,为被测对象;
辅助UE,用于在参考UE与目标UE之间辅助位置测量;
定位UE,用于通过自身的绝对位置确定目标UE的绝对位置,例如,该绝对位置包括但不限于:经纬度等;
定位服务器UE,用于计算测距或定位结果;
定位客户端,用于请求测距或定位结果。
在具体实现时,一个UE可以充当其中一个或多个角色。
在所述第一请求消息中会携带所述第一角色信息,如此,网络设备接收到第一角色信息之后,会验证第一UE是否能够在预定业务中充当第一角色。
示例性地,所述第一角色信息可包括:指示所述第一角色的角色代码或字符串等。
例如,网络设备存储有第一UE能够充当角色的信息,则网络设备可以本地验证第一UE本地充当的第一角色。
再例如,所述网络设备可根据第一UE的签约数据,确定所述第一UE是否被授权充当所述第一角色。
所述签约数据可存储在用户数据管理(User Data Management,UDM)或测距应用服务器等网络设备中,则所述网络设备可以向UDM或测距应用服务器等第二网络设备请求所述签约数据。
所述第一请求消息可为:所述第一UE发送给所述网络设备的任意消息。示例性地,所述第一请求消息包括但不限于发现请求消息(Discovery Request message)。
在所述第一请求消息还可包括所述第一UE的标识信息。该第一UE的标识信息可包括但不限于:用户信息标识(User Info Identifier)。该用户信息标识可唯一标识所述第一UE。
在一些实施例中,所述第一请求消息还可包括:所述预定业务的业务码。
总之,第一请求消息可包括:网络设备验证所述第一UE是否可以在预定业务充当第一角色所需的消息。
在发送所述第一请求消息之后,第一UE会继续接收所述第一请求消息的响应消息(即所述第一响应消息)。
示例性地,若所述网络设备被授权充当预定业务充当的第一角色时,则网络设备可能会生成与第一角色对应的第一密钥。
在一些实施例中,所述第一密钥是根据所述第一角色生成的。示例性地,所述第一密钥是以所述第一角色信息为输入参数生成的。在一些实施例中,所述第一密钥可根据第一角色信息和所述预定业务的业务码生成的。
在另一个实施例中,不同角色的密钥生成算法不同,如此,即便均以预定业务的业务码为输入参数,也会成不同的第一密钥。
所述第一响应消息可包括接受消息,该接收消息一方面指示网络设备授权第一UE充当所述第一角色。另一方面,该接受消息会包括所述第一密钥,该密钥可用于后续第一UE和其他UE(例如,第二UE)之间的相互发现的安全机制。
所述第一密钥可包括但不限于发现密钥。由于本申请中的第一密钥是和第一角色对应的。如此,在预定业务中存在N种角色,则会生成N套发现密钥。该发现密钥可至少用于第一UE和第二UE之间相互发现时的完整性保护。由于第一密钥是与第一角色对应的,因此,后续在UE相互发现过程中,不仅可以通过第一密钥进行发现过程中的安全性保证,且若一旦通过安全性验证,则同步实现了第一UE可以充当角色的验证,从而减少了非法UE以自身不能充当的角色参与预定业务,从而减少了非法UE参与预定业务导致的安全性问题。
在一个实施例中,若第一响应消息包含至少一套第一密钥,则说明该第一响应消息可为接受消息。
若一个UE能够在预定业务中充当多个第一角色,一种实现方式是:第一请求消息可仅携带一个角色的第一角色信息,如此,若第一UE被授权充当该第一角色,则接受消息会携带一个第一密钥。
若一个UE能够在预定业务充当多个第一角色,另一种实现方式是:第一请求消息将携带多个第一角色的第一角色信息,如此,则第一响应消息可携带有多套第一密钥。
在一个实施例中,所述第一UE未被授权第一角色,则所述网络设备可不向第一UE返回响应消息,如此,第一UE会接收不到第一密钥,从而无法参与第二UE之间的相互发现。
如图2B所示,本公开实施例提供一种信息处理方法,其中,由第一UE执行,所述方法包括:
S1210:向网络设备发送第一请求消息,其中,所述第一请求消息包括:第一角色信息;其中,所述第一角色信息,用于指示所述第一UE在预定业务中充当的第一角色;所述第一角色信息,用于供所述网络设备验证所述第一UE是否能够在所述预定业务充当所述第一角色;
S1220:接收所述第一UE未被授权充当所述第一角色时返回的拒绝消息。
若网络设备确定所述第一UE未被授权充当第一角色,网络设备也可以向第一UE返回拒绝消息(Reject Message),该拒绝消息被第一UE接收到之后,就知道自身不能够以第一角色参与预定业务。 在一个实施例中,所述拒绝消息可包括:拒绝原因。该拒绝原因告知第一UE被拒绝授权和下发第一密钥的原因。
若一个第一请求消息可携带第一UE期望充当的多个UE的第一角色信息,在一个实施例中,若一个第一角色未被授权,则第一UE将收到的拒绝消息,或者,接收到一个响应消息,该响应消息可包括被授权充当的第一角色的一个或多个第一密钥,而未被授权充当的第一角色对应的拒绝原因。
当然以上仅仅是举例说明,具体实现不局限于上述举例。
在一些实施例中,所述预定业务包括测距/直连链路SL定位业务;所述第一请求消息还包括:测距/直连链路SL定位业务码(Ranging Service Code,RSC)。
在一个实施例中,所述预定业务不局限于测距/直连链路SL定位业务,示例性地,所述预定业务还可包括:其他接近业务(Proximity Services,ProSe)。
此处仅仅是对预定业务的举例,具体实现不局限于上述举例。
如图3A所示,本公开实施例提供一种信息处理方法,其中,由网络设备执行,所述方法包括:
S2110:接收第一用户设备UE的第一请求消息,所述第一请求消息包括:第一角色信息;其中,所述第一角色信息,用于指示所述第一UE在预定业务中充当的第一角色;
S2120:根据所述第一角色信息,验证所述第一UE是否能够在所述预定业务充当所述第一角色,得到第一验证结果;
S2130:响应于所述第一验证结果表明所述第一UE被授权充当所述第一角色,向所述第一UE返回接受消息,其中,所述接受消息包括:根据所述第一角色信息生成的第一密钥;其中,所述第一密钥,用于所述第一UE和其他UE之间的相互发现。
该网络设备可为核心网设备,该核心网设备包括但不限于DDNMF、PKMF或者策略控制功能PCF。
该第一请求消息可为基站等接入网设备转发或者透传的。
在本公开实施例中,所述第一请求消息包括:第一UE的标识信息,该第一UE的标识信息可以供网络设备对第一UE进行授权的验证。与此同时,第一请求消息可包括第一UE请求和/或期望充当的第一角色的信息(第一角色信息),因此可以对第一UE是否可以充当第一角色的授权验证。
在本公开实施例中,所述第一密钥可为预先根据预定业务所包含角色的角色信息生成的,也可以是在接收到所述第一请求消息之后生成的。
总之在本公开实施例中,如预定业务中有多种角色,则网络设备可以生成对应角色的第一密钥。该第一密钥可为发现密钥。
若通过验证发现所述第一UE被授权其请求或者期望充当(或扮演)的第一角色,则会向第一UE发送接受消息,该接受消息可包括:根据第一角色信息生成的第一密钥。
该第一密钥用于所述第一UE和第二UE相互发现时之间的安全性保证,还可以验证供第二UE验证所述第一UE是否可以在预定业务中充当其声明的角色。
在一些实施例中,所述根据所述第一验证结果,向所述第一UE返回所述第一响应消息,包括:
响应于所述第一验证结果表明所述第一UE未授权充当所述第一角色,向所述第一UE返回拒绝消息。
示例性地,,如图3B所示,所述根据所述第一角色信息,验证所述第一UE是否能够在所述预定业务充当所述第一角色,得到第一验证结果,包括:
S2121:向第二网络设备发送第二请求消息,其中,所述第二请求消息包括:所述第一UE的第一标识和所述第一角色信息;
S2122:接收基于所述第二请求消息返回的第二响应消息;其中,所述第二响应消息,指示所述第一UE能够在所述预定业务中充当所述第一角色,或者,指示所述第一UE不能够在所述预定业务中充当所述第一角色。
所述第二网络设备可为UDM或者预定业务的服务器。
又示例性地,若所述网络设备本地存储所述第一UE的签约数据等,则网络设备可以及本地验证所述第一UE是否被授权充当所述第一角色。
在一个实施例中,所述方法还包括:
根据新鲜值或者根据算法更新后的参数,定期或者不定期更新预定业务中各个角色对应的第一密钥。如此,减少根据同一个角色信息生成的第一密钥被反复使用和/或长时间使用出现的安全性问题。
如图4所示,本公开实施例提供一种信息处理方法,由第二用户设备UE执行,其中,所述方法包括:
S3110:广播通告消息,其中,所述通告消息包括:第二角色信息,其中,所述第二角色信息,指示所述第二UE能够在预定业务中扮演的第二角色,其中,所述通告消息,用于与所述第二角色对应的第二密钥进行安全性保护;所述第二密钥为:所述网络设备验证所述第二UE被授权在预定业务充当所述第二角色发送的。
在本公开实施例中,所述第二UE可为任意从网络设备获取到了与其充当的第二角色对应的第二密钥的任意通信设备。示例性地,该第二UE可为前述第一UE中的一个。
在本公开实施例中,第二UE会在SL的广播信道上发送通告消息(announce message)。该通告消息可包括第二UE自身愿意或者期望或者能够充当的第二角色的第二角色信息。
该通告消息会采用根据所述第二角色信息生成的第二密钥进行安全性保护。
在本公开实施例中,所述安全性保护包括但不限于:完整性保护。
例如,使用所述第二密钥对所述通告消息整个进行完整性保护。
位于第二UE周期的其他UE监听到所述通过消息之后,将通过通告消息明文携带的第二角色信息,确定出验证所述通告消息完整性的密钥,并进行验证。若通过完整性验证,则可认为发现了参与预定业务的第二UE,并知晓了第二UE能够充当的第二角色。
该第二密钥可为:网络设备根据所述第二角色信息生成的。第二密钥也可以是写入协议或者预先配置在合法UE中且根据第二角色信息生成的。
在本公开实施例中,所述第二UE使用模型A实现自身和其他UE之间的相互发现。
在一些实施例中,所述预定业务为测距/直连链路SL定位业务;所述通告消息还包括:测距/直连链路SL定位业务码RSC。
如图5所示,本公开实施例提供一种信息处理方法,由第三用户设备UE执行,其中,所述方法包括:
S4110:接收第二UE广播的通告消息;所述通告消息包括:第二角色信息,其中,所述第二角色信息,指示所述第二UE能够在预定业务中扮演的第二角色;
S4120:使用与所述第二角色对应的第二密钥,验证所述通告消息的安全性;
S4130:根据所述通告消息的第二验证结果,确定所述第二UE是否能够在预定业务中充当所述第二角色。
在本公开实施例中,第三UE可为前述的第一UE。在本公开实施例中使用模型A实现UE之前的相互发现。如此第三UE会在广播信道上监听通告消息。
该通告消息会携带明文的第二角色信息。该第二角色信息可至少包括角色代码等。
由于通告消息会明文携带第二角色信息,因此可以根据从网络设备或者预先配置或者根据协议约定等方式优先获取的且根据第二角色信息生成的第二密钥验证所述通告消息的安全性。
在一些实施例中,所述S4120可包括:
使用所述第二密钥验证所述通告消息的完整性。
所述第二验证结果包括:验证通过和/或验证失败两种。例如,通过第二密钥对所述通告消息进行完整性验证,若验证确定通告消息完整,则可认为验证通过(或说验证成功),否则验证失败。
示例性地,所述S4130可包括:
所述第二验证结果表明通告消息通过验证,则确定第二UE可以在预定业务中充当第二角色;
和/或,
所述第二验证结果表明通告消息未通过验证,则确定第二UE不可以在预定业务中充当第二角色。
在一些实施例中,所述方法还包括:
若确定所述第二UE可以在预定业务中充当第二角色,则会存储所述第二UE的标识信息以及所述第二角色信息,方便后续可以和第二UE进行所述预定业务。
所述第二UE的标识信息可包括但不限于:第二UE的层2和/或层3标识等可以唯一标识UE的任意信息。
在一些实施例中,所述方法还包括:
若确定所述第二UE不可以在预定业务充当第二角色,则丢弃所述通告消息,即忽略所述第二UE发送的通告消息。
在一些实施例中,所述预定业务为测距/直连链路SL定位业务;所述通告消息还包括:测距/直连链路SL定位业务码RSC。
在一些实施例中,所述预定业务不局限于所述测距/SL定位业务。
在一些实施例中,所述根据所述通告消息的验证结果,确定所述第二UE是否能够在预定业务中充当所述第二角色,包括:
响应于所述第二验证结果表明所述通告消息未通过所述安全性验证,确定所述第二UE不能在预定业务中充当所述第二角色;
或者,
响应于所述第二验证结果表明所述通告消息通过所述安全性验证,确定所述第二UE能够在预定业务中充当所述第二角色。
如图6A所示,本公开实施例提供一种信息处理方法,由第四用户设备UE执行,所述方法包括:
S5110:发送第三请求消息,其中,所述第三请求消息包括:第三角色信息,其中,所述第三角色信息,用于指示第五UE在预定业务中充当的第三角色;
S5120:接收所述第三请求消息的第三响应消息,其中,所述第三请求消息是:第五UE在基于与所述第三角色对应的第三密钥对所述第三请求消息的验证结果返回的。
在一些实施例中,第四UE将使用模型B和其他设备之间相互发现。
在一些实施例中,第四UE会携带自己想要发现角色的角色信息(即第三角色信息)。
例如,第四UE自身可以执行预设业务,但是一次性只能充当部分角色,需要其他角色的UE辅助。所述第三角色信息可明文携带在第三请求消息中,后续其他UE接收到之后只有获取到根据所述第三角色信息生成的第三密钥才能对第三请求消息验证成功。
若第四UE接收到第五UE返回的第三响应消息,则可认为发现了第五UE且确定所述第五UE具有充当所述第三角色的权限。
如图6B所示,本公开实施例提供一种信息处理方法,由第四用户设备UE执行,所述方法包括:
S5210:发送第三请求消息,其中,所述第三请求消息包括:第三角色信息,其中,所述第三角色信息,用于指示第五UE在预定业务中充当的第三角色;
S5220:接收所述第三请求消息的第三响应消息,其中,所述第三请求消息是:第五UE在基于与所述第三角色对应的第三密钥对所述第三请求消息的验证结果返回的。
S5230:利用第三密钥验证所述第三响应消息;
S5240:在所述第三响应消息通过安全性验证,存储所述第五UE的标识信息和所述第三角色信息。
在本公开实施例中,所述第三响应消息会携带第五UE提供的自身可以在预定业务中充当角色的角色信息(例如,第四角色信息)。
在一个实施例中,由于第五UE是基于第三请求消息返回的,若第五UE能够充当第三角色才会返回所述第三响应消息,因此,所述第四角色信息一定包含第三角色信息。
进一步地,第三响应消息会在广播信道,例如,SL信道上发送,如此,第四UE将监听到多个第三响应消息。第三角色信息明文携带在第三响应消息中,则第四UE可以根据明文的角色信息,确定当前接收的响应消息是否是自身想要接收的响应消息。
并使用第三密钥验证第三响应消息,若第三响应消息验证成功,例如,使用第三密钥对第三响应消息进行完整性验证,在第三响应消息通过完整性验证之后,则说明第五UE就是第四UE要发现的且能够充当第三角色的UE。
在一些实施例中,所述第三请求消息未通过所述第五设备通过所述第三密钥的安全性验证,所述第三响应消息为拒绝消息。
若第三响应消息为拒绝消息,则说明第四UE可能没有发现可以充当第三角色的UE。
在另一个实施例中,所述方法还包括:
在所述第三请求消息发送后的预设时长内未接收到第三响应消息,可认为第四UE发现能够充当第三角色的UE失败。
在一个实施例中,所述预定业务为测距/直连链路SL定位业务;所述第三请求消息包括:所述测距/直连链路SL定位业务码RSC。
在一个实施例中,所述第三请求消息包括:所述第四UE在预定业务充当角色的第四角色信息。
若第三请求消息还包括第四UE自身能够充当第四角色的角色信息(例如第四角色信息),如此,第五UE在第三请求消息通过安全性验证之后,则认为发现了能够充当第四角色的第四UE。
在本公开实施例中,所述安全性验证均至少包括:完整性验证。
如图7所示,本公开实施例还提供一种信息处理方法,其中,由第五用户设备UE执行,所述方法包括:
S6110:接收第四UE发送的第三请求消息,其中,所述第三请求消息包括:第三角色信息,其中,所述第三角色信息,用于指示所述第五UE在预设业务中充当的第三角色;
S6120:基于与所述第三角色对应的第三密钥验证所述第三请求消息;
S6130:根据所述第三请求消息的验证结果,向所述第四UE发送第三响应消息。
该第五UE可在广播信道上监听所述第三请求消息,第三请求消息携带有明文的第三角色信息是,如此,第五UE使用根据第三角色信息生成的第三密钥验证第三请求消息的安全性,示例性地,至少验证第三请求消息的完整性,然后根据验证结果向第四UE返回第三响应消息。
示例性地,所述根据所述第三请求消息的验证结果,向所述第四UE发送第三响应消息,包括:
响应于所述第三请求消息通过安全性验证,向所述第四UE发送接受消息,所述接受消息包括:所述第三角色信息且用第三进行所述接受消息的安全保护。
在一个实施例中,所述根据所述第三请求消息的验证结果,向所述第四UE发送第三响应消息,包括:响应于所述第三请求消息未通过安全性验证,向所述第四UE发送拒绝消息。
在另一些实施例中,若第三请求消息未通过安全性验证,也可以不向第四UE返回任何消息。
在本公开实施例中,所述预定业务可包括测距/SL定位业务。其中,所述第三请求消息还可包括: 测距/SL定位业务码(Ranging sidelink positioning Service Code,RSC)。
测距/SL定位服务器或UDM通过检查服务协议或UE订阅来对UE进行授权。如果UE角色被授权,除了UE请求的业务外,发现密钥生成功能(如PKMF/DDNMF)还通过将密钥与UE授权的角色关联生成发现密钥。如果UE角色未被授权,则发现密钥生成功能(如PKMF/DDNMF)将不会为UE生成发现密钥。
然后,UE从网络获取发现密钥,并使用与所请求的服务和UE的授权角色相关联的发现密钥保护广播发现消息。当对端UE收到发现消息,且发现消息中声明的角色是对端UE想要发现的角色时,对端UE将使用与声明的/授权的角色相关联的发现密钥来验证收到的发现消息。通过这种方式,行为不当的UE声称一个未经授权的角色(一个不同于与发现键相关联的被授权角色的角色)就不能欺骗对端UE,对端UE将不能使用与未经授权角色相关联的发现密钥来验证发现消息。
当远端UE采用模型A发现其他终端可充当的角色时,可包括:
步骤1~6参考公告UE(A-UE):
1.a-UE发送一个发现请求消息,包含测距中继业务码(RSC)和该UE想在测距服务中扮演的角色(例如目标UE)。可选地,该发现请求消息还可包含它希望发现的角色(例如Reference UE)。
2.A-UE的5G DDNMF/PKMF向测距/SL定位服务器或A-UE的UDM发送授权请求(Authorization Request)进行公告授权,其中包含中继业务码(RSC)和A-UE(Target UE)希望在测距服务中扮演的角色,以及A-UE(Target UE)希望发现的角色(如Reference UE)。
3.测距/SL定位服务器检查服务协议或A-UE的UDM检查A-UE的订阅,以确定A-UE是否被允许扮演(目标UE的)角色。
4.如果A-UE被允许在其请求的服务中扮演角色(目标UE),则测距/SL定位服务器或A-UE的UDM向5G DDNMF/PKMF返回一个授权响应,其中包含已授权的A-UE(目标UE)的角色。
5.当A-UE被授权扮演其请求的角色(目标UE)时,A-UE的5G DDNMF/PKMF/PCF通过关联RSC和A-UE授权角色(目标UE)生成发现密钥,并将发现密钥存储在RSC和A-UE授权角色(目标UE)中。如果A-UE的5G DDNMF/PKMF/PCF未被授权扮演其请求的角色,则A-UE的5G DDNMF/PKMF/PCF不生成发现密钥,拒绝A-UE的发现请求。
6.A-UE的5G DDNMF/PKMF/PCF在发现响应中返回A-UE授权角色(目标UE)和发现密钥。A-UE将发现密钥存储在RSC及其授权角色(目标UE)中。
步骤7~17针对监控UE(M-UE):
7.M-UE发送一个发现请求消息,其中包含中继业务码(RSC)和它想在测距服务中扮演的角色(例如Reference UE)和它期望发现的角色(例如Target UE)。
8.M-UE的5G DDNMF/PKMF/PCF向测距/SL定位服务器或M-UE的UDM发送授权请求,其 中包含中继业务码(RSC)和M-UE(Reference UE)希望在测距服务中扮演的角色,以及M-UE希望发现的角色(例如目标UE)。
9.测距/SL定位服务器检查服务协议或M-UE的UDM检查M-UE的订阅,以确定M-UE是否被允许扮演参考UE的角色。
10.如果M-UE被允许在其请求的服务中扮演角色(参考UE),测距/SL定位服务器或M-UE的UDM将向5G DDNMF/PKMF/PCF返回一个授权响应,其中包含M-UE(参考UE)的授权角色。
11.如果M-UE被授权扮演它请求扮演的角色(参考UE),M-UE的5G DDNMF/PKMF通过发送Monitor Request消息联系a-UE(M-UE期望发现的目标UE)的5G DDNMF/PKMF/PCF。
12.A-UE的5G DDNMF/PKMF/PCF向测距/SL定位服务器或UDM发送授权请求,其中包含M-UE和A-UE的授权角色。
13.测距/SL定位服务器或UDM会检查请求服务中M-UE和a-UE的授权角色是否匹配(例如,对于两个UE之间的测距服务,角色是否为Target UE和Reference UE)。
14.测距/SL定位服务器或UDM返回授权响应(Authorization Response),表示授权是否成功。
15.如果向测距/SL定位服务器或UDM授权成功,则A-UE的5G DDNMF/PKMF/PCF检索存储在RSC和A-UE-role(Target UE)上的对应Discovery key。
16.a-UE的5G DDNMF/PKMF/PCF响应M-UE的5G DDNMF/PKMF/PCF,并发送Monitor Response消息,包括RSC、a-UE角色(目标UE)和相应的发现密钥。
17.M-UE的5G DDNMF/PKMF在发现响应中返回M-UE授权角色(参考UE)和发现密钥。M-UE将发现键与RSC和M-UE期望发现的角色(目标UE)一起存储。
步骤18~19发生在PC5上:
18.A-UE宣布开始。A-UE形成包含RSC及其声明角色(目标UE)的公告消息,A-UE使用发现键保护消息。
19.M-UE监听公告消息并检查公告消息中的RSC和声明的Role。然后M-UE检索存储在RSC和A-UE声明的角色(目标UE)中的发现键。M-UE使用检索到的发现键验证公告消息。
值得注意的是:
被授权为定位UE的UE-1(a-UE)在公告消息中声称自己是目标UE,该消息受到与被授权角色(即定位UE)关联的发现键的保护。当参考UE角色的UE-2(M-UE)正在监视来自目标UE的消息时,它将收到来自UE-1的消息,并识别UE-1处于目标UE角色。然后UE-2将使用与它期望发现的角色(即目标UE)相关联的发现键来验证接收到的消息。由于UE-1和UE-2使用的密钥不相同,验证失败。这样,行为不端的UE就无法通过未授权的角色欺骗对端UE。
当远端UE采用模型B发现其他终端可充当的角色时,可包括:
步骤1~17与第2.2.1节中模型A的操作相同或类似:
步骤18~20发生在PC5上:
18.发现者(R-UE)形成包含RSC、其声称的角色(参考UE)和发现者的预期角色(目标UE) 的请求消息。R-UE然后使用与RSC和预期角色(目标UE)相关联的发现密钥来保护请求消息。
发现者(E-UE)监听请求消息,并检查消息中的RSC、声称的角色(参考UE)和预期的角色(目标UE)。E-UE然后检索与RSC和R-UE期望的角色一起存储的发现密钥(目标UE)。E-UE使用检索到的发现密钥来验证请求消息。
20.如果验证成功,E-UE向发现者返回响应消息,该消息包含R-UE期望发现的RSC及其授权角色。E-UE然后使用与RSC及其授权角色(目标UE)一起存储的发现密钥来保护响应消息。
21.R-UE接收响应消息,并检查消息中的RSC和E-UE(目标UE)的授权角色。R-UE然后检索与RSC和E-UE(目标UE)的角色一起存储的发现密钥。R-UE使用检索到的发现密钥来验证请求消息。
值得注意的是:被授权为定位UE的UE-1(R-UE)声称自己是参考UE,并期望在请求消息中发现目标UE,该请求消息由与其授权角色(即定位UE)相关联的发现密钥保护。当处于目标UE角色的UE-2(E-UE)接收到来自UE-1的消息并且识别出UE-1处于参考UE角色并且期望发现目标UE时。然后,UE-2将使用与预期角色(即目标UE)相关联的发现密钥来验证所接收的消息。由于UE-1和UE-2使用的密钥不同,验证将失败。以这种方式,行为不当的UE不能用未授权的角色欺骗对端UE。
如图9所示,本公开实施例提供一种信息处理装置,其中,所述装置包括:
第一发送模块110,被配置为向网络设备发送第一请求消息,其中,所述第一请求消息包括:第一角色信息;其中,所述第一角色信息,用于指示所述第一UE在预定业务中充当的第一角色;所述第一角色信息,用于供所述网络设备验证所述第一UE是否能够在所述预定业务充当所述第一角色;
第一接收模块120,被配置为接收所述网络设备基于所述第一请求消息返回的第一响应消息;其中,所述第一响应消息,至少用于指示所述第一UE是否被授权充当所述第一角色;
所述第一UE被授权充当所述第一角色,所述第一响应消息为接受消息,且所述接受消息包括:与第一角色对应的第一密钥;其中,所述第一密钥,用于所述第一UE和其他UE之间的相互发现。
该信息处理装置可包括第一UE。
在一些实施例中,第一发送模块110以及第一接收模块120可为程序模块;所述程序被处理器执行之后,能够实现上述操作。
在另一些实施例中,所述第一发送以及第一接收模块120可为软硬结合模块;所述软硬结合模块包括但不限于各种可编程阵列;所述可编程阵列包括但不限于现场可编程阵列和/或复杂可编程阵列。
在还有一些实施例中,所述第一发送模块110以及所述第一接收模块120可为纯硬件模块;所 述纯硬件模块包括但不限于专用集成电路。
在一些实施例中,所述第一UE未被授权充当所述第一角色,所述第一响应消息为:拒绝消息。
在一些实施例中,所述预定业务包括测距/直连链路SL定位业务;
所述第一请求消息还包括:测距/直连链路SL定位业务码RSC。
测距/SL定位业务发现过程的安全保护将尽可能重用为ProSe/V2X服务定义的安全机制。假设UE(例如定位UE、参考UE)在测距/SL定位业务中被允许扮演的角色可以在UE订阅或特定的测/SL定位业务协议中注册。这意味着,UDM和测距/SL定位服务器都可以成为为所请求的测距/SL定位业务授权UE角色的候选功能。
如图10所示,本公开实施例提供一种信息处理装置,其中,所述装置包括:
第二接收模块210,被配置为接收第一用户设备UE的第一请求消息,其中,所述第一请求消息包括:第一角色信息;其中,所述第一角色信息,用于指示所述第一UE在预定业务中充当的第一角色;
第一验证模块220,被配置为根据所述第一角色信息,验证所述第一UE是否能够在所述预定业务充当所述第一角色,得到第一验证结果;
第二发送模块230,被配置为响应于所述第一验证结果表明所述第一UE被授权充当所述第一角色,向所述第一UE返回接受消息,其中,所述接受消息包括:根据所述第一角色信息生成的第一密钥;其中,所述第一密钥,用于所述第一UE和其他UE之间的相互发现。
该信息处理装置可包括网络设备。
在一些实施例中,第二接收模块210、第一验证模块220以及第二发送模块230可为程序模块;所述程序被处理器执行之后,能够实现上述操作。
在另一些实施例中,第二接收模块210、第一验证模块220以及第二发送模块230可为软硬结合模块;所述软硬结合模块包括但不限于各种可编程阵列;所述可编程阵列包括但不限于现场可编程阵列和/或复杂可编程阵列。
在还有一些实施例中,第二接收模块210、第一验证模块220以及第二发送模块230可为纯硬件模块;所述纯硬件模块包括但不限于专用集成电路。
在一些实施例中,所述预定业务包括:测距/直连链路SL定位业务;所述通告消息还包括:测距/直连链路SL定位业务码RSC。
如图11所示,本公开实施例提供一种信息处理装置,其中,所述装置包括:
广播模块310,被配置为广播通告消息,其中,所述通告消息包括:第二角色信息,其中,所述第二角色信息,指示所述第二UE能够在预定业务中扮演的第二角色,其中,所述通告消息,用于与所述第二角色对应的第二密钥进行安全性保护;所述第二密钥为:所述网络设备验证所述第二UE被授权在预定业务充当所述第二角色发送的。
该信息处理装置可包括第二UE。
在一些实施例中,所述信息处理装置还包括:存储模块。存储模块与所述广播模块310连接,可用于存储通告消息。
在一些实施例中,所述广播模块310可为程序模块;所述程序被处理器执行之后,能够实现上述操作。
在另一些实施例中,所述广播模块310可为软硬结合模块;所述软硬结合模块包括但不限于各种可编程阵列;所述可编程阵列包括但不限于现场可编程阵列和/或复杂可编程阵列。
在还有一些实施例中,所述广播模块310可为纯硬件模块;所述纯硬件模块包括但不限于专用集成电路。
在一些实施例中,所述预定业务包括:测距/直连链路SL定位业务;所述通告消息还包括:测距/直连链路SL定位业务码RSC。
如图12所示,本公开实施例提供一种信息处理装置,所述装置包括:
第三接收模块410,被配置为接收第二UE广播的通告消息;所述通告消息包括:第二角色信息,其中,所述第二角色信息,指示所述第二UE能够在预定业务中扮演的第二角色;
第二验证模块420,被配置为使用与所述第二角色对应的第二密钥,验证所述通告消息的安全性;
确定模块430,被配置为根据所述通告消息的第二验证结果,确定所述第二UE是否能够在预定业务中充当所述第二角色。
在一些实施例中,该信息处理装置可为第三UE。
在一些实施例中,所述第三接收模块410、第二验证模块420以及确定模块430可为程序模块;所述程序被处理器执行之后,能够实现上述操作。
在另一些实施例中,所述第三接收模块410、第二验证模块420以及确定模块430可为软硬结合模块;所述软硬结合模块包括但不限于各种可编程阵列;所述可编程阵列包括但不限于现场可编程阵列和/或复杂可编程阵列。
在还有一些实施例中,所述第三接收模块410、第二验证模块420以及确定模块430可为纯硬件模块;所述纯硬件模块包括但不限于专用集成电路。
在一些实施例中,所述预定业务为测距/直连链路SL定位业务;所述通告消息还包括:测距/直连链路SL定位业务码RSC。
在一些实施例中,所述确定模块430,被配置为响应于所述第二验证结果表明所述通告消息未通过所述安全性验证,确定所述第二UE不能在预定业务中充当所述第二角色;
或者,
响应于所述第二验证结果表明所述通告消息通过所述安全性验证,确定所述第二UE能够在预定业务中充当所述第二角色。
如图13所示,本公开实施例提供一种信息处理装置,所述装置包括:
第四发送模块510,被配置为发送第三请求消息,其中,所述第三请求消息包括:第三角色信息,其中,所述第三角色信息,用于指示第五UE在预定业务中充当的第三角色;
第四接收模块520,被配置为接收所述第三请求消息的第三响应消息,其中,所述第三请求消息是:第五UE在基于与所述第三角色对应的第三密钥对所述第三请求消息的验证结果返回的。
该信息处理装置可为第四UE。
在一些实施例中,所述第四发送模块510以及第四接收模块520可为程序模块;所述程序被处理器执行之后,能够实现上述操作。
在另一些实施例中,所述第四发送模块510以及第四接收模块520可为软硬结合模块;所述软硬结合模块包括但不限于各种可编程阵列;所述可编程阵列包括但不限于现场可编程阵列和/或复杂可编程阵列。
在还有一些实施例中,所述第四发送模块510以及第四接收模块520可为纯硬件模块;所述纯硬件模块包括但不限于专用集成电路。
在一些实施例中,所述装置还包括:
第三验证模块,被配置为利用第三密钥验证所述第三响应消息;
存储模块,被配置为在所述第三响应消息通过安全性验证,存储所述第五UE的标识信息和所述第三角色信息。
在一些实施例中,所述第三请求消息未通过所述第五设备通过所述第三密钥的安全性验证,所述第三响应消息为拒绝消息。
在一些实施例中,所述预定业务为测距/直连链路SL定位业务;所述第三请求消息包括:所述测距/直连链路SL定位业务码RSC。
在一些实施例中,所述第三请求消息包括:所述第四UE在预定业务充当角色的第四角色信息。
如图14所示,本公开实施例提供一种信息处理装置,其中,所述装置包括:
第五接收模块610,被配置为接收第四UE发送的第三请求消息,其中,所述第三请求消息包括:第三角色信息,其中,所述第三角色信息,用于指示所述第五UE在预设业务中充当的第三角色;
第三验证模块620,被配置为基于与所述第三角色对应的第三密钥验证所述第三请求消息;
第五发送模块630,被配置为根据所述第三请求消息的验证结果,向所述第四UE发送第三响应消息。
本公开实施例提供的信息处理装置可为第五UE。
在一些实施例中,所述第五接收模块610、第三验证模块620以及第五发送模块630可为程序模块;所述程序被处理器执行之后,能够实现上述操作。
在另一些实施例中,所述第五接收模块610、第三验证模块620以及第五发送模块630可为软硬结合模块;所述软硬结合模块包括但不限于各种可编程阵列;所述可编程阵列包括但不限于现场可编程阵列和/或复杂可编程阵列。
在还有一些实施例中,所述第五接收模块610、第三验证模块620以及第五发送模块630可为 纯硬件模块;所述纯硬件模块包括但不限于专用集成电路。
在一些实施例中,所述根据所述第三请求消息的验证结果,向所述第四UE发送第三响应消息,包括:
响应于所述第三请求消息通过安全性验证,向所述第四UE发送接受消息,所述接受消息包括:所述第三角色信息且用第三进行所述接受消息的安全保护。
在一些实施例中,所述第五发送模块630,还被配置为响应于所述第三请求消息未通过安全性验证,向所述第四UE发送拒绝消息。
本公开实施例提供一种通信设备,包括:
用于存储处理器可执行指令的存储器;
处理器,分别存储器连接;
其中,处理器被配置为执行前述任意技术方案提供的信息处理方法。
处理器可包括各种类型的存储介质,该存储介质为非临时性计算机存储介质,在通信设备掉电之后能够继续记忆存储其上的信息。
这里,所述通信设备包括:UE或者网络设备。该UE可为前述第一UE至第五UE的任意一个。
所述处理器可以通过总线等与存储器连接,用于读取存储器上存储的可执行程序,例如,如图2A、图2B、图3A、图3B、图4、图5、图6A、图6B、图7、图8A以及图8B所示的方法的至少其中之一。
图15是根据一示例性实施例示出的一种UE 800的框图。例如,UE 800可以是移动电话,计算机,数字广播用户设备,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图15,UE 800可以包括以下一个或多个组件:处理组件802,存储器804,电源组件806,多媒体组件808,音频组件810,输入/输出(I/O)的接口812,传感器组件814,以及通信组件816。
处理组件802通常控制UE 800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以生成上述的方法的全部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。
存储器804被配置为存储各种类型的数据以支持在UE 800的操作。这些数据的示例包括用于在UE 800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件806为UE 800的各种组件提供电力。电源组件806可以包括电源管理系统,一个或多个电源,及其他与为UE 800生成、管理和分配电力相关联的组件。
多媒体组件808包括在所述UE 800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当UE 800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当UE 800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。
I/O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件814包括一个或多个传感器,用于为UE 800提供各个方面的状态评估。例如,传感器组件814可以检测到设备800的打开/关闭状态,组件的相对定位,例如所述组件为UE 800的显示器和小键盘,传感器组件814还可以检测UE 800或UE 800一个组件的位置改变,用户与UE 800接触的存在或不存在,UE 800方位或加速/减速和UE 800的温度变化。传感器组件814可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件816被配置为便于UE 800和其他设备之间有线或无线方式的通信。UE 800可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,UE 800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器804,上述指令可由UE 800的处理器820执行以生成上述方法。例如,所述非临时性计算机 可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
如图16所示,本公开一实施例示出一种接入设备的结构。例如,通信设备900可以被提供为一网络侧设备。该通信设备可为前述的接入网元和/或网络功能等各种网元。
参照图16,通信设备900包括处理组件922,其进一步包括一个或多个处理器,以及由存储器932所代表的存储器资源,用于存储可由处理组件922的执行的指令,例如应用程序。存储器932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件922被配置为执行指令,以执行上述方法前述应用在所述接入设备的任意方法,例如,图2A、图2B、图3A、图3B、图4、图5、图6A、图6B、图7、图8A以及图8B。
通信设备900还可以包括一个电源组件926被配置为执行通信设备900的电源管理,一个有线或无线网络接口950被配置为将通信设备900连接到网络,和一个输入输出(I/O)接口958。通信设备900可以操作基于存储在存储器932的操作系统,例如Windows Server TM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本公开实施例的其它实施方案。本公开旨在涵盖本公开实施例的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开实施例的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开实施例的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开实施例并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开实施例的范围仅由所附的权利要求来限制。

Claims (25)

  1. 一种信息处理方法,其中,由第一用户设备UE执行,所述方法包括:
    向网络设备发送第一请求消息,其中,所述第一请求消息包括:第一角色信息;其中,所述第一角色信息,用于指示所述第一UE在预定业务中充当的第一角色;所述第一角色信息,用于供所述网络设备验证所述第一UE是否能够在所述预定业务充当所述第一角色;
    接收所述网络设备基于所述第一请求消息返回的第一响应消息;其中,所述第一响应消息,至少用于指示所述第一UE是否被授权充当所述第一角色;
    响应于所述第一UE被授权充当所述第一角色,所述第一响应消息为接受消息,且所述接受消息包括:与第一角色对应的第一密钥;其中,所述第一密钥,用于所述第一UE和其他UE之间的相互发现。
  2. 根据权利要求1所述的方法,其中,
    响应于所述第一UE未被授权充当所述第一角色,所述第一响应消息为:拒绝消息。
  3. 根据权利要求1或2所述的方法,其中,所述预定业务包括测距或直连链路SL定位业务;
    所述第一请求消息还包括:测距/直连链路SL定位业务码RSC。
  4. 一种信息处理方法,其中,由网络设备执行,所述方法包括:
    接收第一用户设备UE的第一请求消息,其中,所述第一请求消息包括:第一角色信息;其中,所述第一角色信息,用于指示所述第一UE在预定业务中充当的第一角色;
    根据所述第一角色信息,验证所述第一UE是否能够在所述预定业务充当所述第一角色,得到第一验证结果;
    响应于所述第一验证结果表明所述第一UE被授权充当所述第一角色,向所述第一UE返回接受消息,其中,所述接受消息包括:根据所述第一角色信息生成的第一密钥;其中,所述第一密钥,用于所述第一UE和其他UE之间的相互发现。
  5. 一种信息处理方法,由第二用户设备UE执行,其中,所述方法包括:
    广播通告消息,其中,所述通告消息包括:第二角色信息,其中,所述第二角色信息,指示所述第二UE能够在预定业务中扮演的第二角色,其中,所述通告消息,用于与所述第二角色对应的第二密钥进行安全性保护;所述第二密钥为:所述网络设备验证所述第二UE被授权在预定业务充当所述第二角色发送的。
  6. 根据权利要求5所述的方法,其中,所述预定业务包括:测距/直连链路SL定位业务;
    所述通告消息还包括:测距/直连链路SL定位业务码RSC。
  7. 一种信息处理方法,由第三用户设备UE执行,其中,所述方法包括:
    接收第二UE广播的通告消息;所述通告消息包括:第二角色信息,其中,所述第二角色信息,指示所述第二UE能够在预定业务中扮演的第二角色;
    使用与所述第二角色对应的第二密钥,验证所述通告消息的安全性;
    根据所述通告消息的第二验证结果,确定所述第二UE是否能够在预定业务中充当所述第二角色。
  8. 根据权利要求7所述的方法,其中,所述预定业务为测距或直连链路SL定位业务;所述通告消息还包括:测距或直连链路SL定位业务码RSC。
  9. 根据权利要求7或8所述的方法,其中,所述根据所述通告消息的验证结果,确定所述第二UE是否能够在预定业务中充当所述第二角色,包括:
    响应于所述第二验证结果表明所述通告消息未通过所述安全性验证,确定所述第二UE不能在预定业务中充当所述第二角色;
    或者,
    响应于所述第二验证结果表明所述通告消息通过所述安全性验证,确定所述第二UE能够在预定业务中充当所述第二角色。
  10. 一种信息处理方法,由第四用户设备UE执行,所述方法包括:
    发送第三请求消息,其中,所述第三请求消息包括:第三角色信息,其中,所述第三角色信息,用于指示第五UE在预定业务中充当的第三角色;
    接收所述第三请求消息的第三响应消息,其中,所述第三请求消息是:第五UE在基于与所述第三角色对应的第三密钥对所述第三请求消息的验证结果返回的。
  11. 根据权利要求10所述的方法,其中,所述方法还包括:
    利用第三密钥验证所述第三响应消息;
    在所述第三响应消息通过安全性验证,存储所述第五UE的标识信息和所述第三角色信息。
  12. 根据权利要求10或11所述的方法,其中,所述第三请求消息未通过所述第五设备通过所述第三密钥的安全性验证,所述第三响应消息为拒绝消息。
  13. 根据权利要求10至12任一项所述的方法,其中,所述预定业务为测距或直连链路SL定位业务;所述第三请求消息包括:所述测距或直连链路SL定位业务码RSC。
  14. 根据权利要求10所述的方法,其中,所述第三请求消息包括:所述第四UE在预定业务充当角色的第四角色信息。
  15. 一种信息处理方法,其中,由第五用户设备UE执行,所述方法包括:
    接收第四UE发送的第三请求消息,其中,所述第三请求消息包括:第三角色信息,其中,所述第三角色信息,用于指示所述第五UE在预设业务中充当的第三角色;
    基于与所述第三角色对应的第三密钥验证所述第三请求消息;
    根据所述第三请求消息的验证结果,向所述第四UE发送第三响应消息。
  16. 根据权利要求15所述的方法,其中,所述根据所述第三请求消息的验证结果,向所述第四UE发送第三响应消息,包括:
    响应于所述第三请求消息通过安全性验证,向所述第四UE发送接受消息,所述接受消息包括:所述第三角色信息且用第三进行所述接受消息的安全保护。
  17. 根据权利要求15或16所述的方法,其中,所述根据所述第三请求消息的验证结果,向所述第四UE发送第三响应消息,包括:
    响应于所述第三请求消息未通过安全性验证,向所述第四UE发送拒绝消息。
  18. 一种信息处理装置,其中,所述装置包括:
    第一发送模块,被配置为向网络设备发送第一请求消息,其中,所述第一请求消息包括:第一角色信息;其中,所述第一角色信息,用于指示所述第一UE在预定业务中充当的第一角色;所述第一角色信息,用于供所述网络设备验证所述第一UE是否能够在所述预定业务充当所述第一角色;
    第一接收模块,被配置为接收所述网络设备基于所述第一请求消息返回的第一响应消息;其中,所述第一响应消息,至少用于指示所述第一UE是否被授权充当所述第一角色;
    响应于所述第一UE被授权充当所述第一角色,所述第一响应消息为接受消息,且所述接受消息包括:与第一角色对应的第一密钥;其中,所述第一密钥,用于所述第一UE和其他UE之间的相互发现。
  19. 一种信息处理装置,其中,所述装置包括:
    第二接收模块,被配置为接收第一用户设备UE的第一请求消息,其中,所述第一请求消息包括:第一角色信息;其中,所述第一角色信息,用于指示所述第一UE在预定业务中充当的第一角色;
    第一验证模块,被配置为根据所述第一角色信息,验证所述第一UE是否能够在所述预定业务充当所述第一角色,得到第一验证结果;
    第二发送模块,被配置为响应于所述第一验证结果表明所述第一UE被授权充当所述第一角色,向所述第一UE返回接受消息,其中,所述接受消息包括:根据所述第一角色信息生成的第一密钥;其中,所述第一密钥,用于所述第一UE和其他UE之间的相互发现。
  20. 一种信息处理装置,其中,所述装置包括:
    广播模块,被配置为广播通告消息,其中,所述通告消息包括:第二角色信息,其中,所述第二角色信息,指示所述第二UE能够在预定业务中扮演的第二角色,其中,所述通告消息,用于与所述第二角色对应的第二密钥进行安全性保护;所述第二密钥为:所述网络设备验证所述第二UE被授权在预定业务充当所述第二角色发送的。
  21. 一种信息处理装置,所述装置包括:
    第三接收模块,被配置为接收第二UE广播的通告消息;所述通告消息包括:第二角色信息,其中,所述第二角色信息,指示所述第二UE能够在预定业务中扮演的第二角色;
    第二验证模块,被配置为使用与所述第二角色对应的第二密钥,验证所述通告消息的安全性;
    确定模块,被配置为根据所述通告消息的第二验证结果,确定所述第二UE是否能够在预定业务中充当所述第二角色。
  22. 一种信息处理装置,所述装置包括:
    第四发送模块,被配置为发送第三请求消息,其中,所述第三请求消息包括:第三角色信息,其中,所述第三角色信息,用于指示第五UE在预定业务中充当的第三角色;
    第四接收模块,被配置为接收所述第三请求消息的第三响应消息,其中,所述第三请求消息是:第五UE在基于与所述第三角色对应的第三密钥对所述第三请求消息的验证结果返回的。
  23. 一种信息处理装置,其中,所述装置包括:
    第五接收模块,被配置为接收第四UE发送的第三请求消息,其中,所述第三请求消息包括:第三角色信息,其中,所述第三角色信息,用于指示所述第五UE在预设业务中充当的第三角色;
    第三验证模块,被配置为基于与所述第三角色对应的第三密钥验证所述第三请求消息;
    第五发送模块,被配置为根据所述第三请求消息的验证结果,向所述第四UE发送第三响应消息。
  24. 一种通信设备,包括处理器、收发器、存储器及存储在存储器上并能够有所述处理器运行的可执行程序,其中,所述处理器运行所述可执行程序时执行如权利要求1至3、4、5至6、7至9、10至14、或15至17任一项提供的方法。
  25. 一种计算机存储介质,所述计算机存储介质存储有可执行程序;所述可执行程序被处理器执行后,能够实现如权利要求1至3、4、5至6、7至9、10至14、或15至17任一项提供的方法。
PCT/CN2022/129344 2022-11-02 2022-11-02 信息处理方法及装置、通信设备及存储介质 WO2024092573A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202280004815.XA CN118285143A (zh) 2022-11-02 2022-11-02 信息处理方法及装置、通信设备及存储介质
PCT/CN2022/129344 WO2024092573A1 (zh) 2022-11-02 2022-11-02 信息处理方法及装置、通信设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/129344 WO2024092573A1 (zh) 2022-11-02 2022-11-02 信息处理方法及装置、通信设备及存储介质

Publications (1)

Publication Number Publication Date
WO2024092573A1 true WO2024092573A1 (zh) 2024-05-10

Family

ID=90929248

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/129344 WO2024092573A1 (zh) 2022-11-02 2022-11-02 信息处理方法及装置、通信设备及存储介质

Country Status (2)

Country Link
CN (1) CN118285143A (zh)
WO (1) WO2024092573A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112055354A (zh) * 2019-06-06 2020-12-08 中兴通讯股份有限公司 业务呼叫处理方法及装置
US20210195549A1 (en) * 2019-12-20 2021-06-24 EMC IP Holding Company LLC Crowdsourcing and organizing multiple devices to perform an activity
CN113228761A (zh) * 2018-12-21 2021-08-06 三星电子株式会社 在uwb网络中对测距发起器和响应器的控制
CN113455020A (zh) * 2019-02-19 2021-09-28 皇家飞利浦有限公司 用于受信距离测量的系统
WO2022178789A1 (zh) * 2021-02-25 2022-09-01 北京小米移动软件有限公司 测距方法、装置、终端设备及存储介质
CN115152285A (zh) * 2022-05-16 2022-10-04 北京小米移动软件有限公司 用于在通信系统中执行直连链路定位/测距过程的方法和网络系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113228761A (zh) * 2018-12-21 2021-08-06 三星电子株式会社 在uwb网络中对测距发起器和响应器的控制
CN113455020A (zh) * 2019-02-19 2021-09-28 皇家飞利浦有限公司 用于受信距离测量的系统
CN112055354A (zh) * 2019-06-06 2020-12-08 中兴通讯股份有限公司 业务呼叫处理方法及装置
US20210195549A1 (en) * 2019-12-20 2021-06-24 EMC IP Holding Company LLC Crowdsourcing and organizing multiple devices to perform an activity
WO2022178789A1 (zh) * 2021-02-25 2022-09-01 北京小米移动软件有限公司 测距方法、装置、终端设备及存储介质
CN115152285A (zh) * 2022-05-16 2022-10-04 北京小米移动软件有限公司 用于在通信系统中执行直连链路定位/测距过程的方法和网络系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on Security Aspects of Ranging Based Services and Sidelink Positioning (Release 18)", 3GPP STANDARD; TECHNICAL REPORT; 3GPP TR 33.893, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, no. V0.3.0, 24 October 2022 (2022-10-24), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, pages 1 - 32, XP052211760 *

Also Published As

Publication number Publication date
CN118285143A (zh) 2024-07-02

Similar Documents

Publication Publication Date Title
US20170163626A1 (en) Method and device for network access of a smart terminal device
WO2024021142A1 (zh) 应用程序接口api认证方法、装置、通信设备及存储介质
WO2024092573A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2022222005A1 (zh) 通信设备检测方法、装置、通信设备和存储介质
WO2024197756A1 (zh) 信息处理方法、装置、通信设备及存储介质
WO2024145947A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024031523A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024031549A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024192638A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024031565A1 (zh) 信息处理方法以及装置、通信设备及存储介质
WO2024145948A1 (zh) 授权方法、装置、通信设备及存储介质
WO2024092735A1 (zh) 通信控制方法、系统及装置、通信设备及存储介质
WO2024197490A1 (zh) 信息处理方法、系统及装置、通信设备及存储介质
WO2024113326A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024065312A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023230924A1 (zh) 认证方法、装置、通信设备和存储介质
WO2024031390A1 (zh) 个人物联网信息更新方法、装置、通信设备及存储介质
WO2023231018A1 (zh) 个人物联网pin基元凭证配置方法、装置、通信设备及存储介质
WO2023240574A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024092801A1 (zh) 认证方法、装置、通信设备及存储介质
WO2023216259A1 (zh) 卫星覆盖信息确定方法、装置、通信设备和存储介质
WO2024164357A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023000139A1 (zh) 传输凭证的方法、装置、通信设备及存储介质
WO2024036495A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023142093A1 (zh) Ue发现消息保护方法、装置、通信设备及存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 202280004815.X

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22963888

Country of ref document: EP

Kind code of ref document: A1