WO2024098937A1 - Communication method, communication apparatus, and storage medium - Google Patents

Communication method, communication apparatus, and storage medium Download PDF

Info

Publication number
WO2024098937A1
WO2024098937A1 PCT/CN2023/117772 CN2023117772W WO2024098937A1 WO 2024098937 A1 WO2024098937 A1 WO 2024098937A1 CN 2023117772 W CN2023117772 W CN 2023117772W WO 2024098937 A1 WO2024098937 A1 WO 2024098937A1
Authority
WO
WIPO (PCT)
Prior art keywords
relay
service
user equipment
user
ranging
Prior art date
Application number
PCT/CN2023/117772
Other languages
French (fr)
Chinese (zh)
Inventor
雷骜
吴义壮
李�赫
郭龙华
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2024098937A1 publication Critical patent/WO2024098937A1/en

Links

Definitions

  • the present application relates to the field of communication technology, and in particular to a communication method, a communication device, and a storage medium.
  • Proximity-based services (ProSe) communication also known as short-range service communication, is a typical service scenario in end-to-end (D2D) communication, which allows direct communication between user equipment (UE).
  • D2D end-to-end
  • UE user equipment
  • a UE-to-UE relay communication connection can be established through a relay device to achieve ProSe communication between the source UE and the target UE.
  • the present application provides a communication method, a communication device, and a storage medium, which can provide better security control for user equipment using side chain communication services.
  • the present application provides a communication method, the method comprising: a first user device obtains a security policy, wherein the security policy is used to indicate whether to use end-to-end security protection for a side chain communication service, and the end-to-end security protection is implemented between two user devices corresponding to the side chain communication service; the first user device determines to perform a first operation according to the security policy, wherein the first operation is used to establish a side chain communication service between the first user device and a second user device.
  • the first user device is a user device that needs to use the sidelink communication service;
  • the sidelink communication service is a communication service between two user devices based on the sidelink, for example, it can be a ProSe communication service or a ranging and positioning service;
  • the security policy is used to indicate whether to use end-to-end security protection for the sidelink communication service.
  • the first user device determines the first operation to be performed based on the security policy it obtains, and the first operation is used to establish a sidelink communication service between the first user device (i.e., the source UE) and the second user device (i.e., the target UE).
  • the first user device determines, according to the security policy, that the first operation to be performed is an operation that can support end-to-end security protection between the first user device and the second user device; when the security policy indicates that end-to-end security protection is not used for the side chain communication service, the first operation is an operation that does not support end-to-end security protection between the first user device and the second user device; when the security policy indicates that end-to-end security protection is preferentially used for the side chain communication service, the first operation is an operation that preferentially supports end-to-end security protection between the first user device and the second user device.
  • the first user device will perform different operations according to the instructions of different security policies, and different operations have different levels of support for end-to-end security protection (support, non-support or priority support), thereby achieving better and more flexible security control for the first user device.
  • the above-mentioned security policy indicates the use of end-to-end security protection for the side chain communication service
  • the first operation includes: the first user device receives a message from at least one relay device, wherein the message of at least one relay device includes a relay service identifier of a layer 2 relay service; the first user device establishes a connection with a first relay device among the at least one relay device, wherein the message of the first relay device received by the first user device includes the relay service identifier of the layer 2 relay service, and the above-mentioned link is used to send service data of the side chain communication service between the first user device and the second user device.
  • the sidelink communication service specifically refers to the ProSe communication service (or ProSe relay communication service).
  • the ProSe relay communication service it can be implemented based on a layer 2 relay mechanism or a layer 3 relay mechanism.
  • the former can support end-to-end security protection for the two UEs corresponding to the ProSe relay communication service, while the latter does not support end-to-end security protection for the two UEs corresponding to the ProSe relay communication service.
  • the first user device determines that the first operation to be executed needs to support the implementation of end-to-end security protection in the ProSe relay communication service between the first user device and the second user device, that is, the first user device determines to implement the ProSe relay communication service based on the layer 2 relay mechanism, thereby executing the layer 2 relay mechanism.
  • the corresponding operation includes: the first user equipment establishes a connection with the second user equipment through the layer 2 relay device, and then implements the ProSe relay communication service between the first user equipment and the second user equipment based on the connection.
  • the security policy indicates that end-to-end security protection should not be used for the side chain communication service
  • the first operation includes: the first user device receives a message from at least one relay device, wherein the message of at least one relay device includes a relay service identifier of a layer-3 relay service; the first user device establishes a relay connection with a first relay device among the at least one relay device, wherein the message of the first relay device received by the first user device includes the relay service identifier of the layer-3 relay service, and the relay link is used to send service data of the side chain communication service between the first user device and the second user device.
  • the side chain communication service specifically refers to the ProSe communication service (or the ProSe relay communication service).
  • the ProSe relay communication service it can be implemented based on the layer 2 relay mechanism or the layer 3 relay mechanism.
  • the former can support end-to-end security protection for the two UEs corresponding to the ProSe relay communication service, and the latter does not support end-to-end security protection for the two UEs corresponding to the ProSe relay communication service.
  • the first operation determined to be executed by the first user device does not need to support end-to-end security protection in the ProSe relay communication service between the first user device and the second user device, that is, the first user device determines to implement the ProSe relay communication service based on the layer 3 relay mechanism, thereby executing the corresponding operation of the layer 3 relay mechanism, including: the first user device establishes a relay connection with the second user device through the layer 3 relay device, and then implements the ProSe relay communication service between the first user device and the second user device based on the relay connection.
  • the security policy includes a relay service identifier of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service.
  • the security policy includes a relay service flag of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service, so that the function of configuring the relay service identifier to the first user equipment can be implemented through the security policy.
  • the security policy when the security policy only includes a relay service identifier of a layer 2 relay service, the security policy indicates that the relay service identifier of the layer 2 relay service is used to discover the relay device required in the ProSe relay communication service, thereby indirectly indicating that end-to-end security protection is to be used for the ProSe relay communication service; when the security policy only includes a relay service identifier of a layer 3 relay service, the security policy indicates that the relay service identifier of the layer 3 relay service is used to discover the relay device required in the ProSe relay communication service, thereby indirectly indicating that end-to-end security protection is not used for the ProSe relay communication service.
  • the security policy includes priority information, which is used to indicate that the relay service identifier of the layer 2 relay service needs to be used first, or the priority information is used to indicate that the relay service identifier of the layer 3 relay mechanism needs to be used first.
  • the security policy includes priority information, so that whether to use end-to-end security protection for the side chain communication service can be indicated according to the priority information.
  • the security policy indirectly indicates that the end-to-end security protection should be used first for the side chain communication service.
  • the security policy indicates the use of end-to-end security protection for the side chain communication service
  • the first operation includes: the first user device sends a first ranging request to the second user device through a link with the second user device, wherein the first ranging request indicates measuring the distance and/or angle between the second user device and the auxiliary device, and the ranging result of the first ranging request is used to determine the distance and/or angle between the first user device and the second user device.
  • the sidelink communication service specifically refers to the ranging and positioning service (or indirect sidelink positioning service).
  • the indirect sidelink positioning service is based on the auxiliary device to realize the ranging/positioning between the source UE and the target UE. It can have different implementation schemes, including the first indirect ranging scheme and the second indirect ranging scheme.
  • the first indirect ranging scheme requires the source UE to send a ranging request to the target UE through the connection between it and the target UE, and then the source UE receives the ranging result between the auxiliary device and the target UE sent by the target UE.
  • the second indirect ranging scheme requires the source UE to send a ranging request to the auxiliary UE, and then the source UE receives the ranging result between the auxiliary device and the target UE sent by the auxiliary device. Since the ranging result is not sent through the auxiliary device, it does not support end-to-end security protection between the first user equipment and the second user equipment.
  • the first user equipment determines that the first operation to be executed needs to support end-to-end security protection in the indirect ranging and positioning service between the first user equipment and the second user equipment, that is, the first user equipment determines to use the first indirect ranging scheme to implement the indirect ranging and positioning service between it and the second user equipment, and then determines to execute the relevant actions of the source UE in the first indirect ranging scheme, including: the first user equipment sends a first ranging request to the second user equipment through the link between the first user equipment and the second user equipment to instruct the second user equipment to measure the distance and/or angle between the second user equipment and the auxiliary device, and then the first user equipment receives the ranging result between the second user equipment and the auxiliary device sent by the second user equipment through the above link, so that the distance between the first user equipment and the second user equipment can be determined. distance and/or angle.
  • the method before the first user equipment sends the first ranging request to the second user equipment through the link with the second user equipment, the method also includes: the first user equipment determines whether a link can be established with the second user equipment; when the first user equipment determines that a link can be established with the second user equipment, the first user equipment sends the first ranging request to the second user equipment through the link with the second user equipment.
  • the first indirect ranging scheme requires that a link can be established between the first user device and the second user device. Therefore, before the first user device sends the first ranging request to the second user device through the link with the second user device, the first user device needs to determine whether it can establish a link with the second user device. In the case where the first user device determines that a link can be established with the second user device, the first user device sends the first ranging request to the second user device through the link with the second user device. In the case where the first user device determines that it is not available to establish a link with the second user device, the first indirect ranging scheme cannot be continued, and the first indirect ranging scheme fails.
  • the security policy indicates that end-to-end security protection is not used for the side chain communication service
  • the first operation includes: the first user device sends a second ranging request to the auxiliary device through a direct link with the auxiliary device, wherein the second ranging request indicates measuring the distance and/or angle between the second user device and the auxiliary device, and the ranging result of the second ranging request is used to determine the distance and/or angle between the first user device and the second user device.
  • the sidelink communication service specifically refers to the ranging and positioning service (or indirect sidelink positioning service). If the security policy obtained by the first user device indicates that end-to-end security protection is not used for the sidelink communication service, the first user device determines that the first operation to be performed does not need to support end-to-end security protection in the indirect ranging and positioning service between the first user device and the second user device, that is, the first user device determines to use the second indirect ranging scheme to implement the indirect ranging and positioning service between it and the second user device, and then determines to perform the relevant actions of the source UE in the second indirect ranging scheme, including: the first user device sends a second ranging request to the auxiliary device through a direct link between the auxiliary device to instruct the auxiliary device to measure the distance and/or angle between the second user device and the auxiliary device, and then the first user device receives the ranging result between the second user device and the auxiliary device sent by the auxiliary device through the above-mentioned direct link, so that the distance and/
  • the first user equipment obtains the security policy, which may include: the first user equipment receives the security policy from a core network element.
  • the first user equipment can obtain the security policy from the core network element, that is, the security policy is not directly configured on the first user equipment.
  • the first user equipment can obtain the security policy from the core network element when/before the side chain communication service needs to be executed, and the first user equipment can also store the obtained security policy locally for future use when the security policy is directly obtained from the local, and no longer needs to be obtained from the core network element.
  • the core network element is one or more of a policy management network element, a direct communication discovery name management network element, an access management network element or a data management network element.
  • the security policy is determined by the above-mentioned core network element according to the user information of the first user device, wherein the user information includes one or more of the user identifier, user group identifier, geographic location, and network location of the first user device.
  • the core network element may determine a security policy for the first user equipment according to one or more user information related to the first user equipment.
  • the user information may be from the first user equipment, or from the core network element or other equipment.
  • the method before the first user equipment receives the security policy from the core network element, the method further includes: the first user equipment sends the above user information to the core network element.
  • the first user equipment may actively send user information to the core network element so that the core network element may determine a security policy for the first user equipment according to the user information.
  • the first user equipment obtains a security policy, including: the first user equipment obtains the security policy stored in the first user equipment.
  • the security policy may be pre-stored on the first user device, may be directly pre-configured on the first user device, or may be previously obtained from a core network element and stored locally.
  • the first user device may directly obtain the security policy locally to determine subsequent operations.
  • the present application provides another communication method, which includes: a first network device receives a request message sent by a first user device, wherein the request message includes first user information of the first user device; the first network device determines a security policy based on the first user information, wherein the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service, and the end-to-end security protection is implemented between two user devices corresponding to the side chain communication service; the first network device sends the security policy to the first user device.
  • the first network device is responsible for sending a security policy to the user device, and the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service.
  • the first network device receives a request message from the first user device, it can determine the corresponding security policy for the first user device based on the first user information carried in the request message, and then send it to the first user device, so that the first user device can determine the operation it adopts when establishing the policy communication service based on the security policy, realizing flexible control of the end-to-end security of the user device on the network side.
  • the side chain communication service is a proximity service communication service based on a relay device, or the side chain communication service is a ranging and positioning service based on an auxiliary device.
  • the side chain communication service can be a ProSe relay communication service or an indirect ranging and positioning service.
  • the side chain communication service is a proximity service communication service based on a relay device
  • the security policy includes a relay service identifier of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service.
  • the security policy sent by the first network device to the first user device may include one or more of the relay service identifier of the layer 2 relay service and the relay service identifier of the layer 3 relay service. Therefore, the first network device can implement the function of configuring the relay service identifier to the first user device through the security policy. It is also possible to indirectly indicate whether to use end-to-end security protection for the side chain communication service based on the type of relay service identifier carried in the security policy.
  • the security policy when the security policy only includes the relay service identifier of the layer 2 relay service, the security policy indicates that the relay service identifier of the layer 2 relay service is used to discover the relay device required in the ProSe relay communication service, thereby indirectly indicating that end-to-end security protection is to be used for the ProSe relay communication service; when the security policy only includes the relay service identifier of the layer 3 relay service, the security policy indicates that the relay service identifier of the layer 3 relay service is used to discover the relay device required in the ProSe relay communication service, thereby indirectly indicating that end-to-end security protection is not used for the ProSe relay communication service.
  • the side chain communication service is a proximity service communication service based on a relay device
  • the security policy includes priority information, wherein the priority information is used to indicate that the relay service identifier of the layer 2 relay service needs to be used first, or the priority information is used to indicate that the relay service identifier of the layer 3 relay service needs to be used first.
  • the security policy includes priority information, so that the first user device can be indicated whether to use end-to-end security protection for the side-link communication service it is to perform based on the priority information in the security policy.
  • the security policy indirectly indicates that end-to-end security protection should be used first for the side-link communication service.
  • the security policy indirectly indicates that end-to-end security protection should not be used first for the side-link communication service, that is, the layer 3 relay mechanism that does not support end-to-end security should be used first to establish the ProSe relay communication service.
  • the first network device is one or more of a policy management network element, a direct communication discovery name management network element, an access management network element, or a data management network element.
  • the first user information includes one or more of a user identifier, a user group identifier, a geographic location, and a network location of the first user device.
  • the first user equipment may send one or more types of user information to the first network equipment, so that the first network equipment determines a security policy for the first user equipment based on the above information.
  • the first network device determines a security policy based on first user information, including: the first network device obtains second user information, wherein the second user information includes one or more of a user identifier, a user group identifier, a geographic location, and a network location of the first user device; the first network device determines the security policy based on the first user information and the second user information.
  • the first network device in addition to receiving the first user information uploaded by the first user device, can also obtain the second user information, and then determine the security policy for the first user device based on the first user information and the second user device.
  • the information used to determine the security policy can have two parts, one part comes from the first user device, and the other part comes from other devices (the first network device or the second network device).
  • the second user information is obtained by the first network device from the second network device, wherein the second network device is one or more of an application server, an application function network element, a policy management network element, a direct communication discovery name management network element, an access management network element or a data management network element.
  • the present application provides a communication device, comprising a unit or module for executing any implementation scheme in the first aspect.
  • the present application provides a communication device, comprising a unit or module for executing any implementation scheme in the second aspect above.
  • the present application embodiment provides a communication device, including a processor and a memory; the processor and the memory may be connected to each other via a bus or may be integrated together.
  • the processor is used to read the program code stored in the memory so that the device executes the method of any one of the embodiments of the first aspect or the second aspect above.
  • an embodiment of the present application provides a chip or a chip system, comprising: a processor for executing a method of any embodiment of the first aspect or the second aspect above.
  • an embodiment of the present application provides a computer-readable storage medium; the computer-readable storage medium is used to store an implementation code of the method of any embodiment of the first aspect or the second aspect above.
  • an embodiment of the present application provides a computer program (product), which includes program instructions.
  • the computer program product When executed, it is used to execute the method of any one of the embodiments of the first aspect or the second aspect above.
  • FIG1 is a schematic diagram of the architecture of a 5G mobile communication system provided in an embodiment of the present application.
  • FIG2 is a schematic diagram of a scenario of UE-to-UE relay communication provided in an embodiment of the present application
  • FIG3 is a schematic diagram of a process for establishing ProSe communication provided in an embodiment of the present application.
  • FIG4 is a schematic diagram of a protocol stack of a layer 2 relay mechanism provided in an embodiment of the present application.
  • FIG5 is a schematic diagram of a protocol stack of a layer 3 relay mechanism provided in an embodiment of the present application.
  • FIG6 is a schematic diagram of a ranging scenario provided in an embodiment of the present application.
  • FIG7 is a schematic diagram of a side chain positioning scenario provided in an embodiment of the present application.
  • FIG8 is a schematic diagram of a flow chart of a first indirect ranging solution provided in an embodiment of the present application.
  • FIG9 is a schematic diagram of a flow chart of a second indirect ranging solution provided in an embodiment of the present application.
  • FIG10 is a flow chart of a communication method provided in an embodiment of the present application.
  • FIG11 is a flow chart of another communication method provided in an embodiment of the present application.
  • FIG12 is a schematic diagram of a flow chart of a security policy acquisition method provided in an embodiment of the present application.
  • FIG13 is a flow chart of another security policy acquisition method provided in an embodiment of the present application.
  • FIG14 is a schematic diagram of the structure of a communication device provided in an embodiment of the present application.
  • FIG15 is a schematic diagram of the structure of another communication device provided in an embodiment of the present application.
  • FIG16 is a schematic diagram of the structure of another communication device provided in an embodiment of the present application.
  • the user equipment (UE) in the embodiments of the present application may refer to a mobile phone, a smart terminal, a vehicle-mounted terminal, a vehicle-mounted device, a drone, a wearable device, a multimedia device or a streaming media device, etc. It may also refer to an access network device, such as a base station, a relay station, an access point, a vehicle-mounted device, and a network side device, etc.
  • an access network device such as a base station, a relay station, an access point, a vehicle-mounted device, and a network side device, etc.
  • the embodiments of the present application do not make specific limitations on this.
  • 5G system 5G system, 5GS
  • FIG 1 is a schematic diagram of the 5GS architecture.
  • the 5GS defined by the 3rd Generation Partnership Project (3GPP) includes: an access network (AN) and a core network (CN), and may also include terminals.
  • 3GPP 3rd Generation Partnership Project
  • the above-mentioned terminal may be a terminal with a transceiver function, or a chip or chip system that can be set in the terminal.
  • the terminal may also be called a user equipment (UE), an access terminal, a subscriber unit, a user station, a mobile station (MS), a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, a wireless communication device, a user agent or a user device, etc.
  • the terminal in the embodiment of the present application may be a mobile phone, a cellular phone, a smart phone, a tablet computer, a wireless data card, a personal digital assistant (PDA), a wireless modem, a handheld device, a laptop computer, a machine type communication (MTC) terminal, a computer with a wireless transceiver function, a virtual reality (VR) terminal, an augmented reality (A
  • the terminal of the present application may also be a vehicle-mounted module, a vehicle-mounted module group, a vehicle-mounted component, a vehicle-mounted chip or a vehicle-mounted unit built into a vehicle as one or more components or units.
  • AN is used to implement access-related functions, and can provide network access functions for authorized users in a specific area, and can determine transmission links of different qualities to transmit user data according to the user level, business requirements, etc.
  • AN forwards control signals and user data between the terminal and CN.
  • AN can include: access network equipment, also known as radio access network (RAN) equipment.
  • RAN radio access network
  • CN is mainly responsible for maintaining the subscription data of the mobile network and providing terminal with session management, mobility management, policy management, and security authentication functions.
  • CN mainly includes the following: user plane function (UPF), authentication server function (AUSF), access and mobility management function (AMF), session management function (SMF), network slice selection function (NSSF), network exposure function (NEF), network repository function (NRF), policy control function (PCF), unified data management (UDM), unified data storage (UDR), and application function (AF).
  • UPF user plane function
  • AUSF authentication server function
  • AMF access and mobility management function
  • SMF session management function
  • NSSF network slice selection function
  • NEF network exposure function
  • NRF network repository function
  • PCF policy control function
  • UDM unified data management
  • UDR application function
  • AF application function
  • the UE accesses the 5G network through the RAN device, and the UE communicates with the AMF through the N1 interface (referred to as N1); the RAN communicates with the AMF through the N2 interface (referred to as N2); the RAN communicates with the UPF through the N3 interface (referred to as N3); the SMF communicates with the UPF through the N4 interface (referred to as N4), and the UPF accesses the data network (DN) through the N6 interface (referred to as N6).
  • the control plane functions such as AUSF, AMF, SMF, NSSF, NEF, NRF, PCF, UDM, UDR or AF shown in Figure 1 interact using service-oriented interfaces.
  • the service-oriented interface provided by AUSF includes Nausf; the service-oriented interface provided by AMF includes Namf; the service-oriented interface provided by SMF includes Nsmf; the service-oriented interface provided by NSSF includes Nnssf; the service-oriented interface provided by NEF includes Nnef; the service-oriented interface provided by NRF includes Nnrf; the service-oriented interface provided by PCF includes Npcf; the service-oriented interface provided by UDM includes Nudm; the service-oriented interface provided by UDR includes Nudr; the service-oriented interface provided by AF includes Naf.
  • the RAN device may be a device that provides access to the UE.
  • the RAN device may include: a next-generation mobile communication system, such as an access network device of 6G, such as a 6G base station, or in the next-generation mobile communication system, the network device may also have other naming methods, which are all included in the protection scope of the embodiments of the present application, and the present application does not make any restrictions on this.
  • the RAN device may also include 5G, such as a gNB in a new radio (NR) system, or one or a group of antenna panels (including multiple antenna panels) of a base station in 5G, or a network node constituting a gNB, a transmission point (transmission and reception point, TRP or transmission point, TP) or a transmission measurement function (transmission measurement function, TMF), such as a baseband unit (building base band unit, BBU), or a centralized unit (centralized unit, CU) or a distributed unit (distributed unit, DU), an RSU with base station function, or a wired access gateway, or a 5G core network.
  • 5G such as a gNB in a new radio (NR) system, or one or a group of antenna panels (including multiple antenna panels) of a base station in 5G, or a network node constituting a gNB, a transmission point (transmission and reception point, TRP or transmission point, TP) or a transmission measurement function (
  • RAN equipment may also include access points (APs) in wireless fidelity (WiFi) systems, wireless relay nodes, wireless backhaul nodes, various forms of macro base stations, micro base stations (also called small stations), relay stations, access points, wearable devices, vehicle-mounted devices, and so on.
  • APs access points
  • WiFi wireless fidelity
  • wireless relay nodes wireless backhaul nodes
  • various forms of macro base stations such as Wi-Fi
  • micro base stations also called small stations
  • relay stations such as access points, wearable devices, vehicle-mounted devices, and so on.
  • UPF is mainly responsible for user data processing (including forwarding, receiving, billing, etc.).
  • UPF can receive user data from the data network (DN) and forward the user data to the UE through the access network equipment.
  • UPF can also receive user data from the UE through the access network equipment and forward the user data to the DN.
  • DN refers to the operator network that provides data transmission services to users.
  • IP Internet protocol
  • IMS multimedia service
  • DN can be an operator's external network or a network controlled by an operator, used to provide business services to the UE.
  • PDU protocol data unit
  • the UPF directly connected to the DN through N6 is also called the protocol data unit session anchor (PSA).
  • PSA protocol data unit session anchor
  • AUSF is mainly used to perform security authentication of UE.
  • AMF is mainly used for mobility management in mobile networks, such as user location update, user network registration, user switching, etc.
  • SMF is mainly used for session management in mobile networks, such as session establishment, modification, and release.
  • Specific functions include allocating Internet Protocol (IP) addresses to users and selecting UPFs that provide data packet forwarding functions.
  • IP Internet Protocol
  • PCF mainly supports providing a unified policy framework to control network behavior, provides policy rules to the control layer network functions, and is responsible for obtaining user subscription information related to policy decisions.
  • PCF can provide policies to AMF, SMF, etc., such as quality of service (QoS) policy, slice selection policy, etc.
  • QoS quality of service
  • PCF can provide a UE with proximity services (ProSe) function with a policy for ProSe service use, and PCF can also provide a UE with ranging/positioning service function with a policy for ranging/positioning service use.
  • ProSe proximity services
  • PCF can also provide a UE with ranging/positioning service function with a policy for ranging/positioning service use.
  • NSSF is mainly used to select network slices for UE.
  • NEF is mainly used to support the opening of capabilities and events.
  • NEF can open some capabilities of the 5G network to third-party applications through the application program interface (API).
  • API application program interface
  • Third-party applications obtain some capabilities of the 5G network by calling the API provided by NEF through AF, so that third-party applications can control certain behaviors of the 5G network and UE.
  • UDM is mainly used to store user data, such as contract data, authentication/authorization data, etc.
  • UDR is mainly used to store structured data, which may include contract data and policy data, externally exposed structured data, and application-related data.
  • AF mainly supports interaction with CN to provide services, such as influencing data routing decisions, policy control functions, or providing some third-party services to the network side.
  • UPF can be expressed as UPF network element
  • AMF can be expressed as AMF network element
  • SMF can be expressed as SMF network element
  • PCF can be expressed as PCF network element, and so on, without limitation.
  • D2D device-to-device
  • D2D communication allows UEs to communicate directly with each other, for example, through the PC5 interface (the link that the UE directly connects through the PC5 interface is also called the sidelink (SL)), which can realize the information transmission of the data plane and the control plane. In this way, users can share spectrum resources with other cell users under the control of the cell network, effectively improving the utilization rate of spectrum resources.
  • D2D communication includes: one-to-many communication and one-to-one communication.
  • One-to-many communication usually corresponds to multicast and broadcast communication, and one-to-one communication usually corresponds to unicast communication. In one-to-one communication, if the sending UE and the receiving UE are in a close range, they can communicate directly after discovering each other.
  • Proximity-based services (ProSe) communications are Proximity-based services (ProSe) communications:
  • ProSe communication also known as short-range service communication, is a typical service scenario in D2D communication.
  • ProSe communication can include proximity service direct communication (referred to as ProSe direct communication), proximity service UE-to-UE relay communication (referred to as ProSe U2U relay communication), and proximity service UE-to-network relay communication (referred to as ProSe U2N relay communication).
  • ProSe direct communication proximity service direct communication
  • ProSe U2U relay communication proximity service UE-to-UE relay communication
  • ProSe U2N relay communication proximity service UE-to-network relay communication
  • ProSe U2N relay communication when the source UE (source UE) needs to transmit data with the target UE (target UE) through ProSe communication, if the source UE cannot establish a ProSe direct communication link to the target UE due to reasons such as too far distance or weak signal strength, the source UE can establish a UE-to-UE relay communication connection (referred to as U2U relay connection) with the target UE through the assistance of a UE-to-UE relay (referred to as a relay UE), thereby realizing ProSe U2U relay communication.
  • U2U relay connection UE-to-UE relay communication connection
  • ProSe U2U relay communication is hereinafter referred to as ProSe relay communication.
  • FIG. 3 is a schematic diagram of a process for establishing ProSe communication provided by the present application, including the following steps:
  • S301 ProSe UE obtains ProSe parameters.
  • ProSe parameters are parameters used to implement ProSe communication.
  • ProSe parameters may include ProSe policy.
  • ProSe policy may be used to indicate a mechanism (referred to as access mechanism) for source UE to access target UE through relay UE, and access mechanism may include at least one of the following: layer 2 (also referred to as layer 2, layer 2, L2) relay mechanism (L2relay), layer 3 (also referred to as layer 3, layer3, L3) relay mechanism (L3relay).
  • layer 2 relay mechanism may also be referred to as layer 2 relay mechanism or layer 2 relay service
  • the layer 3 relay mechanism may also be referred to as layer 3 relay mechanism or layer 3 relay service.
  • FIG4 is a schematic diagram of the protocol stack of the layer 2 relay mechanism, wherein the protocol layers involved include: Internet protocol (internet protocol, IP) protocol layer, service data adaptation protocol (service data adaptation protocol, SDAP) layer, packet data convergence protocol
  • IP Internet protocol
  • SDAP service data adaptation protocol
  • the relay mechanism of layer 2 is a mechanism for the source UE to access the target UE through the relay device of layer 2.
  • the security between the source UE and the target UE is end-to-end (E2E) and is established between the PDCP layer of the source UE and the PDCP layer of the target UE.
  • E2E end-to-end
  • the relay device determines how to forward the information of the source UE to the target UE based on the information in the ADAPT layer, and will not parse the PDCP layer (responsible for encrypting the upper layer information, etc.). Therefore, the relay device transparently transmits the PDCP layer of the source UE and the target UE and the upper layer information of the PDCP layer, such as the control plane signaling for the unicast connection between the source UE and the target UE or the user plane data of PC5 unicast. It should be additionally explained that, in the layer 2 relay mechanism, the source UE and the relay UE can establish a direct link, the relay UE and the target UE can establish a direct link, and the source UE and the target UE can establish a direct link.
  • Figure 5 is a schematic diagram of the protocol stack of the layer 3 relay mechanism.
  • the layer 3 relay mechanism is a mechanism for the source UE to access the target UE through the layer 3 relay device.
  • the security between the source UE and the target UE is established in segments, including the security from the PDCP layer of the source UE to the PDCP layer of the relay device, and the security from the PDCP layer of the relay device to the PDCP layer of the target UE.
  • the relay device needs to parse the PDCP layer to determine how to forward control plane signaling and user plane data to the target UE.
  • the source UE and the relay UE can establish a direct link, and the relay UE and the target UE can establish a direct link, but the source UE and the target UE can only establish a link, not a direct link. It can be seen that both the layer 2 relay mechanism and the layer 3 relay mechanism require the source UE and the relay UE, and the relay UE and the target UE to establish direct links. However, compared with the layer 3 relay mechanism, the layer 2 relay mechanism also needs to establish additional direct links between the source UE and the target UE.
  • the layer 2 relay mechanism to implement the ProSe relay communication service requires more direct links to be established, and the overall link establishment speed will be slower, the time from triggering the ProSe relay communication service to establishing the ProSe relay communication will be longer, the efficiency will be lower, and more resources of the user equipment will be occupied.
  • the source UE can be called the source UE of the 5G ProSe layer 2 relay mechanism, the ProSe layer 2 source UE, or the layer 2 source UE.
  • the source UE can be called the source UE of the 5G ProSe layer 3 relay mechanism, the ProSe layer 3 source UE, or the layer 3 source UE.
  • the relay device in the layer 2 relay mechanism, can be called the relay UE of the 5G ProSe layer 2 relay mechanism, the ProSe layer 2 relay UE, or the layer 2 relay UE.
  • the relay device in the layer 3 relay mechanism, can be called the relay UE of the 5G ProSe layer 3 relay mechanism, the ProSe layer 3 relay UE, or the layer 3 relay UE.
  • the ProSe policy may be used to indicate a mechanism for establishing a PC5 connection (referred to as a PC5 connection mechanism) and the above-mentioned access mechanism.
  • the ProSe policy may include a relay service code (RSC), which may be used to indicate a PC5 connection mechanism and an access mechanism.
  • the relay service code may also be referred to as a relay service identifier.
  • the ProSe parameters obtained by the ProSe UE may have different sources.
  • the ProSe UE may obtain the ProSe parameters from the PCF, which are recorded as ProSe parameters 1.
  • the ProSe UE may send a 5G ProSe policy configuration request message to the AMF, and the 5G ProSe policy configuration request message may include information indicating the UE-to-UE relay communication capability (ability) of 5G ProSe, for example, the ProSe UE has the relay communication capability as a source UE or target UE of layer 2, and/or, the ProSe UE has the relay communication capability as a source UE or target UE of layer 3.
  • the ProSe UE has the relay communication capability as a source UE or target UE of layer 2, which means that the UE supports the use of the relay mechanism of layer 2 to communicate with another ProSe UE through the relay UE.
  • the ProSe UE has the relay communication capability as a source UE or target UE of layer 3, which means that the UE supports the use of the relay mechanism of layer 3 to communicate with another ProSe UE through the relay UE.
  • the ProSe UE has the relay communication capability as a layer 2 relay UE, and/or the ProSe UE has the relay communication capability as a layer 3 relay UE.
  • the relay communication capability of the ProSe UE as a layer 2 relay UE means that the UE supports the use of the layer 2 relay mechanism to relay the communication between the source UE and the target UE.
  • the relay communication capability of the ProSe UE as a layer 3 relay UE means that the UE supports the use of the layer 3 relay mechanism to relay the communication between the source UE and the target UE.
  • the AMF can obtain the ProSe subscription information of the ProSe UE from the UDM, and determine whether the ProSe UE has the UE-to-UE relay communication capability of 5G ProSe according to the ProSe subscription information of the ProSe UE. In this way, the AMF can send a 5G ProSe policy configuration request message to the sending PCF, so that the PCF sends the ProSe policy to the ProSe UE through the UE configuration update (UCU) process.
  • UCU UE configuration update
  • the ProSe UE can obtain the ProSe parameters from the ProSe application server, which are recorded as ProSe parameters 2.
  • ProSe UE can also obtain ProSe parameters from the universal integrated circuit card (UICC) of ProSe UE, which is recorded as ProSe parameter 3.
  • UICC universal integrated circuit card
  • the ProSe UE can also obtain ProSe parameters from the ProSe UE's mobile equipment (ME), which is recorded as ProSe parameter 4.
  • ME mobile equipment
  • ProSe parameters from different sources may have different priorities.
  • the use priorities of ProSe parameters are from high to low: ProSe parameter 1, ProSe parameter 2, ProSe parameter 3, and ProSe parameter 4.
  • the ProSe UE may determine which ProSe parameter to use according to the use priorities of the ProSe parameters from high to low, and record it as the target ProSe parameter. In this case, the ProSe UE can determine which PC5 connection mechanism and access mechanism to use based on the target ProSe parameters.
  • S302 ProSe UE performs ProSe discovery.
  • ProSe discovery is used for mutual discovery between source UE and relay UE, or between relay UE and target UE.
  • TS 23.304 defines two discovery modes of ProSe discovery, including: model A and model B.
  • the interacting UEs include: announcing UE and monitoring UE.
  • the announcing UE can actively broadcast a discovery request for discovering specific ProSe services (such as video chat, AR, VR).
  • the monitoring UE can actively monitor the discovery request for discovering specific ProSe services. In this way, after receiving the discovery request broadcast by the announcing UE, the monitoring UE can determine whether the specific ProSe service indicated in the discovery request broadcast by the announcing UE meets its own needs, thereby determining whether to continue the subsequent process.
  • the announcing UE in the ProSe discovery scenario may be a relay UE, and the listening UE may be a source UE.
  • the relay UE may broadcast a discovery announcing message, and the discovery broadcast message may include the RSC supported by the relay UE.
  • the source UE may determine whether the RSC included in the discovery broadcast message is the RSC required for ProSe communication (assuming that RSC1 is required). If the discovery broadcast message carries RSC1, the source UE determines that RSC1 is the RSC required for the ProSe communication to be implemented by itself, and then continues to perform subsequent steps for the relay device. If the discovery broadcast message carries RSC2, the source UE determines that RSC2 is not the RSC required for ProSe communication, and then does not perform subsequent steps for the relay device.
  • the interacting UEs include: discoveree UE and discoverer UE. After obtaining the ProSe parameters, the discoverer UE can actively broadcast a discovery request for discovering a specific ProSe service. After obtaining the ProSe parameters, the discoverer UE can actively listen to the discovery request for discovering a specific ProSe service. In this way, after receiving the discovery request broadcast by the discoverer UE, the discoverer UE can determine whether it has discovered the specific ProSe service indicated in the request. If the discoverer UE supports the ProSe service indicated in the discovery broadcast message, the discoverer UE responds to the discovery request broadcast by the discoverer UE, otherwise, the discoverer UE does not respond to the discovery request broadcast by the discoverer UE. If the discoverer UE receives a response from the discoverer UE, the discoverer UE can continue to perform subsequent steps, otherwise the process ends.
  • the discoverer UE may be a relay UE, and the discoverer UE may be a source UE or a target UE.
  • the source UE or the target UE may broadcast a discovery request message, and the discovery request message may include the RSC required for ProSe communication, assuming it is RSC1 or RSC4.
  • the relay UE may determine whether the relay UE supports RSC1 or RSC4. If the relay UE determines that it supports RSC1 or RSC4, the relay UE may respond to the source UE or the target UE and send a discovery response message to indicate that the relay UE supports RSC1 or RSC4, otherwise, the relay UE does not respond to the source UE or the target UE.
  • the source UE or the target UE if the source UE or the target UE receives the discovery response message, it may continue to execute the subsequent steps, otherwise, the process ends.
  • the source UE establishes a UE-to-UE relay connection with the target UE via the relay UE.
  • the source UE can establish a PC5 connection with the relay UE through the PC5 connection mechanism, the relay UE can establish a PC5 connection with the target UE through the PC5 connection mechanism, and then the source UE can establish a PC5 connection with the target UE through the PC5 connection mechanism.
  • the specific implementation principle can refer to the relevant introduction in step S301, which is not repeated here.
  • the source UE can establish a PC5 connection with the relay UE through the PC5 connection mechanism, and the relay UE can establish a PC5 connection with the target UE through the PC5 connection mechanism.
  • the source UE performs Prose U2U relay communication with the target UE through the relay UE.
  • the source UE can use the aforementioned access mechanism to perform Prose U2U relay communication with the target UE through the relay UE.
  • the specific implementation principle can be found in the previous introduction and will not be repeated here.
  • the ranging service (or ranging service) and the sidelink positioning service (or sidelink positioning service) are two services commonly used between UEs.
  • the ranging service can be used to determine the angle and/or distance between two UEs.
  • UE1 can receive a ranging service request from a core network element (network function, NF), an application server (application server, AS), an application function (application function, AF) or a third-party UE (3rd party UE or 3rd UE), which indicates that the distance and/or angle (or direction) between UE1 and UE2 needs to be measured and calculated, and then UE1 (as the source UE) performs the ranging service with UE2 (as the target UE) based on the request, thereby obtaining the corresponding ranging result.
  • UE1 in addition to the ranging service request sent by other nodes to trigger UE1 to perform the ranging service, UE1 can also actively generate/trigger the ranging demand and then perform the ranging service with UE2.
  • the sidelink positioning service can be used to calculate the location of the target UE.
  • the sidelink specifically refers to the link between UEs that is not connected through a network, but directly connected through the PC5 interface between UEs.
  • the sidelink positioning service is implemented based on the sidelink. Taking Figure 7 as an example, assuming that UE1 is the source UE and UE2 is the target UE, UE1 performs ranging service on UE2 to obtain the corresponding ranging result, which may include measurement data and/or The calculation results (angle and/or position calculation results) calculated based on the measurement data.
  • the location management function (LMF) obtains the location of UE1 and the ranging results of UE1 and UE2, and then calculates the location of UE2. It can be understood that the sidelink positioning service depends on the results of the ranging service.
  • the ranging service and the sidechain positioning service are collectively referred to as the ranging positioning service.
  • the ranging positioning service mentioned below may refer to the ranging service, the sidechain positioning service, or both.
  • the ranging positioning service may include direct ranging positioning and indirect ranging positioning.
  • Direct ranging positioning refers to the ranging positioning service that can be performed directly between the source UE and the target UE without the help of auxiliary equipment.
  • the source UE in the ranging positioning service scenario is the party that needs to measure the distance and/or angle of the target UE relative to itself, and the target UE is the party being measured in the ranging positioning service.
  • the source UE needs to measure the distance, angle (direction) and/or position of the target UE.
  • Indirect ranging and positioning refers to the ranging and positioning service that requires the use of auxiliary equipment to perform ranging and/or positioning between the source UE and the target UE.
  • the auxiliary equipment is responsible for providing auxiliary ranging functions in the indirect ranging service between the source UE and the target UE.
  • the ranging result between the source UE and the target UE can be determined based on the ranging result between the source UE and the auxiliary equipment and the ranging result between the auxiliary equipment and the target UE.
  • the source UE cannot perform direct ranging and positioning on the target UE.
  • only indirect ranging and positioning can be used to obtain the ranging result between the source UE and the target UE to realize the ranging and positioning service.
  • Scheme 1 a first indirect ranging scheme
  • Scheme 2 a second indirect ranging scheme
  • FIG8 is a schematic diagram of the process of the first indirect ranging solution provided by the present application, which may include the following steps:
  • the UE needs to go through the registration, authorization, policy acquisition and other processes related to the ranging and positioning service before it can have the ability and right to implement the ranging and positioning service.
  • the UE can obtain the authorization of the ranging and positioning service (can be authorized as a source UE or a target UE), the policy used by the ranging and positioning service, etc. from the PCF.
  • the authorization of the ranging and positioning service can be authorized as a source UE or a target UE
  • the policy used by the ranging and positioning service etc.
  • both UE1 and UE2 can obtain the authorization of the ranging and positioning service and the policy of the ranging and positioning service from the PCF, thereby having the ranging and positioning service function.
  • UE1 is authorized as the source UE and UE2 is authorized as the target UE.
  • UE1 can discover UE2 through the discovery process, and then establish a link with UE2.
  • the discovery mode adopted can be, for example, mode A or mode B (see the previous introduction), without specific limitation.
  • the link between UE1 and UE2 can be a direct link, such as a PC5 direct link, or a U2U relay communication link implemented through a relay device.
  • the discovery and selection of the above-mentioned relay device are not specifically limited here, and please refer to the relevant introduction in the previous article.
  • UE1 also discovers one or more auxiliary devices through the discovery process, then selects an auxiliary device from the one or more auxiliary devices, and establishes a PC5 connection with the selected auxiliary device (called the target auxiliary device), so that the ranging service can be performed between UE1 and the target auxiliary device.
  • UE2 also establishes a PC5 connection with the target auxiliary device, so that the ranging service can be performed between UE2 and the target auxiliary device.
  • the PC5 link established between UE2 and the target auxiliary device can be a direct link or a link established through UE-to-UE relay (for details, please refer to the description in 3. Proximity-based services (ProSe) communication above).
  • the auxiliary device is a device that can provide an auxiliary ranging function in the indirect ranging and positioning service between UE1 and UE2.
  • the embodiment of the present application does not specifically limit the method of discovering and selecting the auxiliary device.
  • UE1 may discover one or more auxiliary devices by executing the discovery process, and it can select a target auxiliary device from them, and send the information of the target auxiliary device to UE2 through the link between UE1 and UE2.
  • the target auxiliary device can be the device that is first discovered by UE1 among the one or more auxiliary devices, or the target auxiliary device can be the device with the best signal strength between UE1 and UE2 among the one or more auxiliary devices.
  • UE1 and UE2 respectively establish PC5 connections with the target auxiliary device, and then the indirect ranging service between UE1 and UE2 can be realized through the target auxiliary device.
  • S803 UE1 sends a ranging request to UE2.
  • step S803 UE1 discovers UE2 through the discovery process and establishes a PC5 connection with UE2. Therefore, in step S803, UE1 can send a ranging request to UE2 through the PC5 connection, wherein the ranging request is used to instruct UE2 to perform a ranging service on the auxiliary device to obtain a ranging result between UE2 and the auxiliary device.
  • S804 UE1 and the auxiliary device perform a ranging service.
  • UE1 can perform a ranging service on the auxiliary device, so that UE1 can obtain corresponding measurement data.
  • UE1 performs calculations based on the measurement data, and then obtains the ranging calculation results between UE1 and the auxiliary device (including the calculation results of the distance and/or angle between UE1 and the auxiliary device).
  • the measurement data is not the measurement result of the angle or distance, but the data generated in the ranging service process, which is used for distance or angle calculation, and further calculation is required based on the measurement data to obtain the final angle or distance measurement result.
  • a ranging service is performed between UE1 and an auxiliary device.
  • UE1 can send ranging information to the auxiliary device at the first moment, and the auxiliary device determines that the ranging information is received at the second moment. Then the auxiliary device sends a feedback message to UE1 at the third moment.
  • the feedback message carries the timestamp of the third moment.
  • the UE1 determines that the feedback message is received at the fourth moment, and then the distance between UE1 and the auxiliary device can be calculated based on the measurement data at the first moment, the second moment, the third moment and the fourth moment. It should be understood that the ranging process in the above example is only an example and does not constitute a specific limitation. There may be other specific ranging methods.
  • S805 UE2 and the auxiliary device perform ranging service.
  • UE2 can perform a ranging service on the auxiliary device, so that UE2 can obtain a corresponding ranging result, and the ranging result may include measurement data and/or a ranging calculation result calculated based on the measurement data.
  • UE2 can calculate based on the obtained measurement data to obtain the distance and/or angle between UE2 and the auxiliary device, and UE2 may not perform calculations on its own after obtaining the measurement data.
  • step S804 can be performed before step S805, step S804 can also be performed in parallel with step S805, and step S804 can also be performed after step S805.
  • S806 UE2 sends the ranging result between UE2 and the auxiliary device to UE1.
  • UE2 sends the above ranging result through the link between UE2 and UE1, rather than sending the above ranging result to UE1 through the auxiliary device.
  • the ranging result between UE2 and the auxiliary device may include at least one of the following: measurement data between UE2 and the auxiliary device, and a ranging calculation result (ie, an angle and/or distance calculation result) calculated based on the measurement data between UE2 and the auxiliary device.
  • a ranging calculation result ie, an angle and/or distance calculation result
  • UE2 can directly send the measurement data obtained in step S805 to UE1 through the link established between UE1 and UE2, and then UE1 calculates the angle and/or distance between UE2 and the auxiliary device based on the above measurement data.
  • UE2 can also calculate the angle and/or distance between UE2 and the auxiliary device based on the measurement data it obtains, and then send the calculation result to UE1 through the link between UE1 and UE2, so that UE1 does not need to perform the above calculation again.
  • step S804 may be executed before step S806; step S804 may be executed in parallel with step S806; step S804 may be executed after step S806, that is, UE1 may start the ranging service between UE1 and the auxiliary device only after receiving the ranging result between UE2 and the auxiliary device.
  • step S805 UE1 can obtain the ranging result between UE1 and the auxiliary device by performing the ranging service with the auxiliary device, and in step S806, UE1 receives the ranging result between UE2 and the auxiliary device. Based on the above two ranging results, UE1 can calculate the ranging result between UE1 and UE2.
  • FIG. 9 is a schematic diagram of the process of the second indirect ranging solution provided by the present application, which may include the following steps:
  • the source UE can discover one or more auxiliary devices through the discovery process, and then select an auxiliary device from the one or more auxiliary devices, and subsequently use the selected auxiliary device to implement the indirect ranging and positioning service between the source UE and the target UE.
  • the auxiliary device is a device that can provide an assisted ranging function in the indirect ranging and positioning service between the source UE and the target UE.
  • the auxiliary device can establish a PC5 connection with the source UE and the target UE2 respectively, and then implement assisted ranging based on the above connection.
  • the second indirect ranging scheme there may be a direct link or no direct link between the source UE and the target UE, and there may be a connection established based on a relay device (referred to as UE-to-UE relay connection) or no UE-to-UE relay connection between the source UE and the target UE.
  • UE-to-UE relay connection a relay device
  • the source UE and the target UE neither interact through a direct link, such as transmitting indirect ranging related information (including ranging requests, ranging results, etc.), nor through a link established by a UE-to-UE relay.
  • the embodiments of the present application do not specifically limit the method for discovering and selecting auxiliary devices.
  • S902-S903 The source UE establishes a PC5 connection with the auxiliary device, and sends a ranging request to the auxiliary device through the PC5 connection.
  • the ranging request is used to instruct the auxiliary device to perform a ranging service on the target UE.
  • the auxiliary device may choose to authenticate it to determine whether UE1 is authorized to perform the ranging service. If the auxiliary device determines that the source UE is authorized to perform the ranging service, the auxiliary device responds to the ranging request of the source UE. Continue to execute the subsequent steps. If the auxiliary device determines that the source UE is not authorized to perform the ranging service, the subsequent steps are not executed.
  • step S904 is an optional step, that is, the auxiliary device may authenticate the source UE and then execute the subsequent ranging service, or the auxiliary device may directly execute the subsequent steps without authenticating the source UE.
  • the auxiliary device performs a ranging service with the target UE.
  • the auxiliary device based on the PC5 connection established between the auxiliary device and the target UE, performs a ranging service on the target UE, so that the auxiliary device can obtain a ranging result between the auxiliary device and the target UE.
  • the ranging result may include measurement data and/or a ranging calculation result calculated based on the measurement data.
  • the auxiliary device may perform calculations based on the obtained measurement data to obtain a ranging calculation result of the distance and/or angle between the auxiliary device and the target UE. After obtaining the measurement data, the auxiliary device may not perform calculations.
  • S906 The source UE and the auxiliary device perform a ranging service.
  • the source UE can perform a ranging service on the auxiliary device, so that the source UE can obtain corresponding measurement data.
  • the source UE performs calculations based on the measurement data, and then obtains the ranging calculation results between the source UE and the auxiliary device (including the calculation results of the distance and/or angle between the source UE and the auxiliary device).
  • step S906 can be executed before step S905, step S906 can also be executed in parallel with step S905, and step S906 can also be executed after step S906.
  • the auxiliary device sends the ranging result between the auxiliary device and the target UE to the source UE.
  • the ranging result between the auxiliary device and the target UE may include at least one of the following: measurement data between the auxiliary device and the target UE, and a ranging calculation result (including angle and/or distance calculation results) calculated based on the measurement data between the target UE and the auxiliary device.
  • the auxiliary device can send the above-mentioned measurement data obtained by it directly to the source UE through the link between the source UE and the auxiliary device, and then the source UE calculates the angle and/or distance between the auxiliary device and the target UE based on the above-mentioned measurement data.
  • the auxiliary device can also calculate the angle and/or distance between the auxiliary device and the target UE based on the measurement data obtained by it, and then send the calculation result to the source UE through the link between the source UE and the auxiliary device, so that the source UE does not need to perform the above-mentioned calculation again.
  • step S905 may be executed before step S907; step S905 may also be executed in parallel with step S907; step S905 may also be executed after step S907, that is, the source UE may start to execute the ranging service between the source UE and the auxiliary device after receiving the ranging result between the auxiliary device and the target UE, so as to obtain the ranging result between the source UE and the auxiliary device.
  • the source UE calculates the ranging result between the source UE and the target UE.
  • the source UE can obtain the ranging result between the source UE and the auxiliary device by performing the ranging service with the auxiliary device, and in step S907, the source UE receives the ranging result between the auxiliary device and the target UE sent by the auxiliary device. Then, in step S908, the source UE can calculate the ranging result between the source UE and the target UE based on the above two ranging results.
  • the source UE needs to obtain the ranging result between the source UE and the auxiliary device (recorded as the first ranging result), as well as the ranging result between the auxiliary UE and the target UE (recorded as the second ranging result).
  • the ranging result between the source UE and the target UE can be calculated by combining the first ranging result and the second ranging result.
  • the target UE can receive a ranging request from the source UE, and then actively perform a ranging service on the auxiliary device according to the ranging request of the source UE, so that the target UE obtains a second ranging result. Then, the target UE can directly send the second ranging result to the source UE based on the connection between the target UE and the source UE without passing through the auxiliary device, and the auxiliary device will not obtain the second ranging result at this time.
  • the ranging result is location-related information, which is usually privacy-sensitive information.
  • the indirect ranging scheme requires the assistance of an auxiliary device, there may be a risk of privacy leakage at the auxiliary device for UE1 and UE2. Because the auxiliary device in scheme one does not obtain the second ranging result, in the spacing ranging service scenario of scheme one, there will be no problem of privacy data leakage, and end-to-end security can be guaranteed in the indirect ranging service between the source UE and the target UE.
  • the source UE since there is no connection established between the source UE and the target UE (cannot be established or has not been established), the source UE chooses to send a ranging request to the auxiliary device to instruct the auxiliary device to perform a ranging service on the target UE.
  • the source UE can also choose to use scheme 2 to send the above-mentioned ranging request to the auxiliary device.
  • the auxiliary device actively performs a ranging service on the target UE based on the ranging request sent by the source UE, so that the auxiliary device can obtain a second ranging result.
  • the auxiliary device sends the second ranging result to the source UE based on the connection between it and the source UE. It can be understood that because the auxiliary device in scheme 2 can obtain the second ranging result, there is a risk of privacy data leakage at the auxiliary device in the spacing ranging service scenario of scheme 2, so end-to-end security cannot be guaranteed in the indirect ranging service between the source UE and the target UE.
  • FIG. 10 is a flow chart of a communication method provided in an embodiment of the present application, which is used in a ProSe service scenario and may include the following steps:
  • S1001 A first user device obtains a security policy.
  • the first user equipment is a user equipment with ProSe function.
  • an application for providing/requiring the use of ProSe function may be installed on the first user equipment, and the first user equipment completes the authorization, parameter/policy acquisition and other processes related to ProSe to the PCF, so that the first user equipment has ProSe function.
  • the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service.
  • the side chain communication service is a communication service implemented based on the side chain.
  • the side chain communication service refers to the ProSe communication service based on the relay device, that is, the ProSe relay communication service.
  • the end-to-end security protection for such services as ProSe relay communication is implemented between the two user devices corresponding to the ProSe communication service, that is, the source UE and the target UE in the same ProSe communication service. End-to-end security protection is implemented between the source UE and the target UE.
  • ProSe relay communication can be implemented based on a layer 2 relay mechanism or a layer 3 relay mechanism.
  • the layer 2 relay device in the layer 2 relay mechanism will not parse the PDCP layer (responsible for encrypting the upper layer information, etc.), it will transparently transmit the PDCP layer of the source UE and the target UE and the upper layer information of the PDCP layer, so that the security between the source UE and the target UE can be established end-to-end between the PDCP layer of the source UE and the PDCP layer of the target UE, thereby supporting end-to-end security protection for the ProSe relay communication service.
  • the layer 3 relay device in the layer 3 relay mechanism needs to parse the PDCP layer, end-to-end security cannot be established between the source UE and the target UE, thereby failing to support end-to-end security protection in the ProSe relay communication service.
  • the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service, and can be further used to indicate whether to use the layer 2 relay mechanism to establish ProSe relay communication (or to indicate whether to use the layer 3 relay mechanism to establish ProSe relay communication).
  • the first user equipment may determine to use a layer 2 relay mechanism to implement ProSe relay communication between the first user equipment itself and other user equipments according to the security policy.
  • the first user device can determine to use the layer 3 relay mechanism to implement ProSe relay communication between the first user device itself and other user devices according to the security policy. If the security policy indicates that end-to-end security protection is used preferentially for ProSe relay communication, the first user device can determine to use the layer 2 relay mechanism preferentially to implement ProSe relay communication between the first user device itself and other user devices according to the security policy, and if it is determined that the layer 2 relay mechanism cannot be used, the layer 3 relay mechanism is used to implement ProSe relay communication between the first user device itself and other user devices. It should be noted that the embodiment of the present application does not specifically limit the situation where the layer 2 relay mechanism cannot be used. For example, the first user device does not find any layer 2 relay device within a certain period of time, so the first user device determines that the layer 2 relay mechanism cannot be used, and then tries the layer 3 relay mechanism.
  • the first user device can determine, based on the security policy, to use the layer 3 relay mechanism to implement ProSe relay communication between the first user device itself and other user devices. If it is determined that the layer 3 relay mechanism cannot be used, the layer 2 relay mechanism is used to implement ProSe relay communication between the first user device and other user devices. It should be noted that the embodiment of the present application does not specifically limit the situation where the layer 3 relay mechanism cannot be used. For example, the first user device does not find any layer 3 relay device within a certain period of time, so the first user device determines that the layer 3 relay mechanism cannot be used, and then tries the layer 2 relay mechanism.
  • the security policy acquired by the first user equipment is stored on the first user equipment.
  • a user device may consist of a mobile equipment (ME) and a universal integrated circuit card (UICC), and the security policy may be pre-configured in the mobile equipment or pre-configured on the UICC card.
  • ME mobile equipment
  • UICC universal integrated circuit card
  • UICC is a general term for smart cards with defined physical characteristics. It is a component of user equipment and is mainly used to store user information, authentication keys, short messages, payment methods and other information. It can be used by the network to identify the customer identity, store information, register with the network, etc.
  • a variety of logical modules/applications (applications) can be included in the UICC, such as the subscriber identity module (SIM), the universal subscriber identity module (USIM), the IP multimedia service identity module (ISIM), etc.
  • SIM subscriber identity module
  • USIM universal subscriber identity module
  • ISIM IP multimedia service identity module
  • the logical modules/applications in the UICC can exist alone or in multiple at the same time.
  • the above security policy is pre-configured in the UICC, and can be pre-configured in any of the above logical modules/applications.
  • the security policy may come from a core network element, which may be one or more of a policy management element (PCF), a direct discovery name management function (DDNMF), an access management element (AMF), or a data management element (UDM/UDR).
  • PCF policy management element
  • DDNMF direct discovery name management function
  • AMF access management element
  • UDM/UDR data management element
  • the first user device may actively send a request message to the core network element, and the request message may carry user information, and then receive the security policy sent by the core network element.
  • the above user The information may include one or more of a user identifier (eg, a user permanent identifier (SUbscription Permanent Identifier, SUPI)) corresponding to the first user equipment, a user group identifier, a geographic location, and a network location.
  • SUPI user permanent identifier
  • step S1001 can be executed before step S1002, can be executed in parallel with step S1002, or can be executed between step S1002 and step S1003, that is, after the first user equipment triggers the relay communication demand, the first user equipment obtains the security policy.
  • S1002 The first user equipment triggers a ProSe relay communication requirement.
  • the embodiment of the present application does not specifically limit how the first user equipment triggers the ProSe relay communication requirement.
  • the first user equipment may receive a request from other devices, thereby triggering a ProSe relay communication requirement.
  • the other devices may be NF, AS, AF or 3rd UE, etc., which are not specifically limited.
  • the above request may be a request that explicitly indicates to perform ProSe relay communication with the second user equipment (ie, the target UE), so the first user equipment may directly trigger the ProSe relay communication requirement according to the received request.
  • the above request may also be a request to instruct to perform ProSe communication with the second user equipment (it does not specify whether it is ProSe direct communication or ProSe relay communication), so the first user equipment may first choose to perform ProSe direct communication with the second user equipment based on the instruction of the request.
  • the first user equipment finds that the conditions for ProSe direct communication with the target UE are not met, for example, the target UE is outside the signal range of the source UE, or the communication quality between the source UE and the target UE is not good enough, etc.
  • the first user equipment determines that it cannot perform ProSe direct communication with the target UE, thereby triggering the need to perform ProSe communication with the target UE through the relay device, that is, triggering the ProSe relay communication demand.
  • the first user equipment may also trigger the ProSe relay communication requirement by itself.
  • the user performs a certain specific operation on the first user device (for example, the user clicks a video chat button on an APP related to the ProSe service installed on the first user device), thereby triggering the ProSe communication demand/relay communication demand of the first user device.
  • the first user device may also trigger the ProSe relay communication demand after selecting to perform ProSe direct communication but failing.
  • the first user equipment determines to perform a first operation according to a security policy, where the first operation is used to establish a ProSe relay communication service between the first user equipment and the second user equipment.
  • the security policy is used to indicate whether to perform end-to-end security protection on the ProSe relay communication service.
  • the first user equipment determines whether to use end-to-end security protection for the ProSe relay communication service to be executed by itself according to the security policy.
  • the security policy indicates that end-to-end security protection is to be used for ProSe relay communication, and the first user equipment determines to perform a first operation according to the security policy, then the first operation needs to support end-to-end security protection between the first user equipment and the second user equipment.
  • the first operation at this time includes: receiving a message from at least one relay device; then, the first user equipment establishes a connection with a first relay device among the at least one relay device, wherein the first relay device is one of the at least one relay device and can be selected by the first user equipment according to certain conditions (for the selection of the relay device, please refer to the relevant introduction in the previous text), and the message from the first relay device received by the first user equipment includes a relay service identifier of the layer 2 relay service, and the above link is used to send service data of the ProSe relay communication service between the first user equipment and the second user equipment.
  • the messages of at least one relay device received by the first user device include the relay service identifier of the layer 2 relay service, or the messages of at least one relay device received by the first user device include the relay service identifier of the layer 2 relay service and the relay service identifier of the layer 3 relay service, that is, the first user device can choose to only receive messages from the layer 2 relay device, or it can accept messages from both the layer 2 relay device and the layer 3 relay device, but it will only select the layer 2 relay device to establish the ProSe relay communication between the first user device and the second user device.
  • the first user equipment determines to use end-to-end security protection for ProSe relay communication according to the security policy, it means to use the layer 2 relay mechanism to establish ProSe relay communication with the second user equipment, thereby determining to perform actions corresponding to the establishment of the layer 2 relay service, including: using the relay service code of the layer 2 relay service, discovering the layer 2 relay device, establishing a connection with the layer 2 relay device, etc.
  • the first user equipment will only select a relay device from the layer 2 relay devices, thereby establishing a U2U relay connection between the first user equipment and the second user equipment, and then based on the U2U relay connection, the ProSe relay communication service between the first user equipment and the second user equipment is implemented, and end-to-end security protection between the first user equipment and the second user equipment can be implemented.
  • the first user equipment determines to perform a first operation according to the security policy, and the first operation does not need to support end-to-end security protection between the first user equipment and the second user equipment.
  • the first operation includes: receiving a message from at least one relay device; then, the first user device establishes a connection with a first relay device among the at least one relay device, wherein the first relay device is a relay device among the at least one device and can be selected by the first user device according to certain conditions, and the message from the first relay device received by the first user device includes a relay service identifier of a layer 3 relay service; the above link is used to send service data of a ProSe relay communication service between the first user device and the second user device.
  • the layer 3 relay mechanism can be used to establish ProSe relay communication with the second user equipment, thereby determining to perform actions corresponding to the establishment of the layer 3 relay service, including: using the relay service code of the layer 3 relay service, discovering the layer 3 relay device, establishing a connection with the layer 3 relay device, etc.
  • the first user equipment will only select a relay device from the layer 3 relay devices, thereby establishing a U2U relay connection between the first user equipment and the second user equipment, and then based on the U2U relay connection, the ProSe relay communication service between the first user equipment and the second user equipment is realized, but the end-to-end security protection between the first user equipment and the second user equipment cannot be realized.
  • the messages of at least one relay device received by the first user equipment all include the relay service identifier of the layer 3 relay service, or the messages of at least one relay device received by the first user equipment include the relay service identifier of the layer 2 relay service and the relay service identifier of the layer 3 relay service, that is, the first user equipment can choose to only receive messages from the layer 3 relay device, or it can accept messages from both the layer 2 relay device and the layer 3 relay device, but it will only select the layer 3 relay device to establish the ProSe relay communication between the first user equipment and the second user equipment.
  • the first operation includes: receiving a message from at least one relay device; then, the first user equipment establishes a relay connection with a first relay device among the at least one relay device, wherein the message of the first relay device received by the first user equipment includes the relay service identifier of the layer 2 relay service, and the first relay device is one of the at least one relay device, and can
  • the first user device makes a selection according to certain conditions (for the selection of relay devices, please refer to the relevant introduction above).
  • the first user device determines that it is impossible to establish a link with the relay device corresponding to the relay service identifier of any layer 2 relay service
  • the first user device establishes a connection with the second relay device in the at least one relay device, wherein the message of the second relay device received by the first user device includes the relay service identifier of the layer 3 relay service
  • the second relay device is one of the at least one relay device, which can be selected by the first user device according to certain conditions (for the selection of relay devices, please refer to the relevant introduction above).
  • the above link is used to send service data of the ProSe relay communication service between the first user device and the second user device.
  • the first user equipment determines, according to the security policy, that it is necessary to give priority to end-to-end security protection for ProSe relay communication, it means that it is necessary to give priority to using the layer 2 relay mechanism to establish ProSe relay communication with the second user equipment, thereby determining to first perform actions corresponding to the establishment of the layer 2 relay service, including: using the relay service code of the layer 2 relay service, discovering the layer 2 relay device, establishing a connection with the layer 2 relay device, etc.
  • the first user equipment determines to use the layer 3 relay mechanism to establish ProSe relay communication with the second user equipment, thereby determining to perform actions corresponding to the establishment of the layer 3 relay service, including: using the relay service code of the layer 3 relay service, discovering the layer 3 relay device, establishing a connection with the layer 3 relay device, etc.
  • the first user equipment preferentially selects a relay device from the layer 2 relay devices, and selects a layer 3 relay device when the layer 2 relay device cannot be selected, thereby establishing a U2U relay connection between the first user equipment and the second user equipment, and then implementing the ProSe relay communication service between the first user equipment and the second user equipment based on the U2U relay connection.
  • This method can preferentially implement end-to-end security protection between the first user equipment and the second user equipment, but also ensures the link between the first user equipment and the second user equipment when end-to-end security protection cannot be performed, so as to implement the ProSe relay communication service between the first user equipment and the second user equipment.
  • the first operation at this time includes: receiving a message from at least one relay device; then, the first user equipment establishes a relay connection with a first relay device among the at least one relay device, wherein the message of the first relay device received by the first user equipment includes a relay service identifier of a layer 3 relay service, and the first relay device is a relay device among the at least one relay device.
  • the first user device is selected according to certain conditions (for the selection of relay devices, please refer to the relevant introduction above). Further, if the first user device determines that it is impossible to establish a link with the relay device corresponding to the relay service identifier of any layer 3 relay service, the first user device establishes a connection with the second relay device in the at least one relay device, wherein the message of the second relay device received by the first user device includes the relay service identifier of the layer 2 relay service, and the second relay device is one of the at least one relay device, which can be selected by the first user device according to certain conditions (for the selection of relay devices, please refer to the relevant introduction above).
  • the above link is used to send service data of the ProSe relay communication service between the first user device and the second user device.
  • the first user equipment determines according to the security policy that it is preferred not to use end-to-end security protection for ProSe relay communication, it means that it is preferred to use the layer 3 relay mechanism to establish ProSe relay communication with the second user equipment, thereby determining to first execute the layer 3 relay service. Establish corresponding actions.
  • the first user equipment determines that it is impossible to use the layer 3 relay mechanism to establish ProSe relay communication with the second user equipment, the first user equipment determines to use the layer 2 relay mechanism to establish ProSe relay communication with the second user equipment, thereby determining to perform actions corresponding to the establishment of the layer 3 relay service.
  • the first user equipment preferentially selects a relay device from the layer 3 relay devices, and then selects the layer 2 relay device when the layer 3 relay device cannot be selected, thereby establishing a U2U relay connection between the first user equipment and the second user equipment, and then implementing the ProSe relay communication service between the first user equipment and the second user equipment based on the U2U relay connection.
  • this method gives priority to the use of the layer 3 relay mechanism, which may be due to considerations such as service startup efficiency and resource occupation, but also turns to the use of the layer 2 relay mechanism when the layer 3 relay mechanism cannot be used to implement the ProSe relay communication service between the first user equipment and the second user equipment.
  • the security policy may be explicit instruction information.
  • the security policy may be explicit indication information, indicating that end-to-end security protection must be used for the ProSe relay communication service, or indicating that a layer 2 relay mechanism must be used in the ProSe relay communication service, or indicating that a relay service identifier of a layer 2 relay service must be used to discover the relay device required in the ProSe relay communication service.
  • the security policy may be clear indication information, indicating not to use end-to-end security protection for the ProSe relay communication service, or indicating not to use the layer 2 relay mechanism in the ProSe relay communication service, or indicating that the layer 3 relay mechanism must be used in the ProSe relay communication service, or indicating that the relay service identifier of the layer 3 relay service must be used to discover the relay device required in the ProSe relay communication service.
  • the security policy may be clear indication information, indicating that end-to-end security protection is given priority for the ProSe relay communication service, or indicating that the layer 2 relay mechanism is given priority in the ProSe relay communication service, or indicating that the relay service identifier of the layer 2 relay service is given priority to discover the relay device required in the ProSe relay communication service.
  • the security policy includes a relay service identifier of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service.
  • the relay service identifier of a layer 2 relay service may be a relay service code of a layer 2 relay service, used to indicate a layer 2 relay mechanism
  • the relay service identifier of a layer 3 relay service may be a relay service code of a layer 3 relay service, used to indicate a layer 3 relay mechanism.
  • the security policy indicates that the ProSe relay communication service is end-to-end securely protected, that is, the layer 2 relay mechanism is used to establish the ProSe relay communication, and the layer 2 relay service identifier is used to discover the layer 2 relay device.
  • the security policy indicates that the ProSe relay communication service is end-to-end securely protected, that is, the layer 3 relay mechanism is used to establish the ProSe relay communication, and the layer 3 relay service identifier is used to discover the layer 3 relay device.
  • the security policy includes priority information.
  • the security policy at this time is to indicate that the ProSe relay communication service is to be end-to-end securely protected, that is, it is to use the layer 2 relay mechanism to establish the ProSe relay communication.
  • the security policy at this time is to indicate that the ProSe relay communication service is not to be end-to-end securely protected, that is, it is to use the layer 3 relay mechanism to establish the ProSe relay communication.
  • the security policy at this time is to indicate that no end-to-end security protection is performed on the ProSe relay communication service, that is, it is necessary to use the layer 3 relay mechanism to establish the ProSe relay communication.
  • the security policy at this time is to indicate that end-to-end security protection is performed on the ProSe relay communication service, that is, it is necessary to use the layer 2 relay mechanism to establish the ProSe relay communication.
  • the security policy when the security policy includes priority information, the security policy may also include a relay service identifier of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service.
  • the specific form of the priority information in the security policy is not limited in the embodiments of the present application.
  • the priority information may be the order between the relay service identifier of the layer 2 relay service and the relay service identifier of the layer 3 relay service, and the relay service identifier in the previous order needs to be used first.
  • the priority information may be clear indication information indicating that the relay service identifier of the layer 2 relay service or the relay service identifier of the layer 3 relay service needs to be used first.
  • FIG. 11 is a flow chart of another communication method provided in an embodiment of the present application, which is used in a ranging and positioning service scenario and may include the following steps:
  • S1101 A first user equipment obtains a security policy.
  • the first user equipment is a user equipment with ranging and positioning service functions.
  • an application for providing ranging and positioning service functions may be installed on the first user equipment, and the first user equipment completes authorization, parameter/policy acquisition and other processes related to ranging and positioning services to the PCF, so that the first user equipment has the ranging and positioning service functions.
  • the above security policy is used to indicate whether to use end-to-end security protection for the side chain communication service.
  • the side chain communication service refers to the ranging and positioning service based on the auxiliary device, that is, the indirect ranging and positioning service.
  • the end-to-end security protection for such services as indirect ranging and positioning is implemented between the two user devices corresponding to the indirect ranging and positioning service, that is, the end-to-end security protection is implemented between the source UE and the target UE in the same ranging and positioning service.
  • the indirect ranging and positioning service can be implemented through Scheme 1 and Scheme 2 (see the previous introduction for details).
  • auxiliary device in Scheme 1 Since the auxiliary device in Scheme 1 will not obtain the ranging result between the auxiliary device and the target UE (privacy-sensitive information for the source UE and the target UE), there is no risk of privacy leakage by the auxiliary device, so Scheme 1 supports end-to-end security protection for indirect ranging and positioning services. Since the auxiliary device in Scheme 2 will obtain the ranging result between the auxiliary device and the target UE, the ranging result may be leaked at the auxiliary device, and there is a security risk of privacy leakage, so Scheme 2 does not support end-to-end security protection for indirect ranging and positioning services.
  • the security policy is used to indicate whether to use end-to-end security protection for the indirect ranging positioning service, and can be further used to indicate whether to use Solution 1/Solution 2 for the indirect ranging positioning service. If the security policy obtained by the first user device indicates that end-to-end security protection is used for the indirect ranging positioning service, the first user device can determine to use Solution 1 to implement the indirect ranging positioning service between the first user device and other user devices according to the security policy. If the security policy indicates that end-to-end security protection is not used for the indirect ranging positioning service, the first user device can determine to use Solution 2 to implement the indirect ranging positioning service between the first user device and other user devices according to the security policy.
  • the first user device can determine to use Solution 1 preferentially to implement the indirect ranging positioning service between the first user device and other user devices according to the security policy, and if it is determined that Solution 1 cannot implement the indirect ranging positioning service, Solution 2 is used to implement it.
  • the security policy acquired by the first user equipment is stored on the first user equipment.
  • the specific content of this embodiment can be found in the relevant introduction in step S1001, which will not be repeated here.
  • the security policy may be from a core network element, and the core network element may be one or more of a policy management element, a direct communication discovery name management element, an access management element, or a data management element.
  • the core network element may be one or more of a policy management element, a direct communication discovery name management element, an access management element, or a data management element.
  • step S1101 can be executed before step S1102, can be executed in parallel with step S1102, or can be executed between step S1102 and step S1103.
  • the first user equipment triggers an indirect ranging and positioning service demand.
  • the embodiment of the present application does not specifically limit how the first user equipment triggers the indirect ranging and positioning service demand.
  • the first user equipment may receive a request from other equipment, thereby triggering an indirect ranging and positioning service requirement.
  • the other equipment may be NF, AS, AF or 3rd UE, etc., without specific limitation.
  • the request may be a request for explicitly instructing to perform an indirect ranging and positioning service with the second user equipment (ie, the target UE), so the first user equipment may directly trigger the indirect ranging and positioning service demand according to the received request.
  • the second user equipment ie, the target UE
  • the above request may also be an indication of the need to perform ranging and positioning services with the second user equipment (it does not specify whether it is direct ranging or indirect ranging), so the first user equipment can first choose to perform direct ranging and positioning services with the second user equipment based on the indication of the request.
  • the first user equipment finds that the conditions for direct ranging and positioning services are not met with the target UE, for example, the target UE is outside the signal range of the source UE, or the communication quality between the source UE and the target UE is not good enough, the source UE and the target UE cannot establish a PC5 link, etc.
  • the first user equipment determines that it cannot perform direct ranging and positioning with the target UE, thereby triggering the service demand for indirect ranging and positioning with the target UE through the auxiliary device, that is, triggering the indirect ranging and positioning service demand.
  • the first user equipment may also trigger the indirect ranging and positioning service demand by itself.
  • the user performs a certain specific operation on the first user device (for example, the user clicks the ranging button on an APP related to the ranging and positioning service installed on the first user device), thereby triggering the ranging and positioning service demand/indirect ranging and positioning service demand of the first user device.
  • the first user device may also be trying to perform direct ranging and positioning but failed. Afterwards, the demand for indirect ranging and positioning services was triggered.
  • the first user equipment determines to execute a first operation according to a security policy, where the first operation is used to establish an indirect ranging and positioning service between the first user equipment and the second user equipment.
  • the security policy is used to indicate whether to use end-to-end security protection for the indirect ranging positioning service.
  • the first user equipment determines whether to use end-to-end security protection for the indirect ranging positioning service to be executed by itself according to the security policy.
  • the first operation at this time includes: the first user device sends a first ranging request to the second user device through a link with the second user device, wherein the first ranging request indicates the measurement of the distance and/or angle between the second user device and the auxiliary device, and the ranging result of the first ranging request is used to determine the distance and/or angle between the first user device and the second user device.
  • the link between the first user device and the second user device includes a PC5 direct link and/or a link through a U2U relay.
  • the first user equipment determines to use end-to-end security protection for the indirect ranging positioning service according to the security policy, it means that the first user equipment will use solution one to implement the indirect ranging positioning service between it and the second user equipment, so as to determine that the first user equipment will perform the action corresponding to the source UE in solution one (see the embodiment of Figure 8 for details), including at least one of the following: establishing a link with the target UE (i.e., the second user equipment), sending a first ranging request to the target UE through the above link, receiving the ranging result between the target UE and the auxiliary device sent by the target UE, and so on.
  • the target UE i.e., the second user equipment
  • the first user equipment will send a first ranging request to the second user equipment through the link between it and the second user equipment to instruct the second user equipment to perform the ranging service on the auxiliary device, and the first user equipment can then receive the ranging result between the second user equipment and the auxiliary device sent by the second user equipment through the above link, and then determine the ranging result between the first user equipment and the second user equipment, and complete the indirect ranging positioning service between the first user equipment and the second user equipment.
  • the ranging result is not sent via the auxiliary device, thereby avoiding the risk of privacy leakage and realizing end-to-end security protection between the first user equipment and the second user equipment.
  • the first operation at this time includes: the first user equipment sends a second ranging request to the auxiliary device through a direct link with the auxiliary device, wherein the second ranging request indicates measuring the distance and/or angle between the second user equipment and the auxiliary device, and the ranging result of the second ranging request is used to determine the distance and/or angle between the first user equipment and the second user equipment.
  • the first user equipment determines not to use end-to-end security protection for the indirect ranging positioning service according to the security policy, it means that the first user equipment will use solution 2 (see the embodiment of FIG. 9 for details) to implement the indirect ranging positioning service between it and the second user equipment, thereby determining that the first user equipment will perform the action corresponding to the source UE in solution 2, including at least one of the following: establishing a link with the auxiliary device, sending a second ranging request to the auxiliary device through the above link, receiving the ranging result between the target UE and the auxiliary device sent by the auxiliary UE, etc.
  • the first user equipment will send the second ranging request to the auxiliary device through the link between it and the auxiliary device to instruct the auxiliary device to perform the ranging service on the second user equipment, instead of instructing the second user equipment to perform the ranging service on the auxiliary device; accordingly, the first user equipment can receive the ranging result between the auxiliary device and the second user equipment sent by the auxiliary device through the above link, and then determine the ranging result between the first user equipment and the second user equipment, and complete the indirect ranging positioning service between the first user equipment and the second user equipment. It can be understood that the ranging result between the auxiliary device and the second user device needs to be sent to the first user device via the auxiliary device. For the first user device and the second user device that perform indirect ranging services, there will be a risk of privacy leakage at the auxiliary device, and end-to-end security protection between the first user device and the second user device cannot be achieved.
  • the first operation includes: the first user equipment sends a first ranging request to the second user equipment through a link with the second user equipment, wherein the first ranging request indicates measuring the distance and/or angle between the second user equipment and the auxiliary equipment, and the ranging result of the first ranging request is used to determine the distance and/or angle between the first user equipment and the second user equipment.
  • the first user equipment uses solution two again to send a second ranging request to the auxiliary equipment, and the second ranging request indicates measuring the distance and/or angle between the auxiliary equipment and the second user equipment, thereby realizing the indirect ranging positioning service between the first user equipment and the second user equipment.
  • the first user equipment determines to give priority to end-to-end security protection for the indirect ranging positioning service according to the security policy, it means that the first user equipment should give priority to using solution one to implement the indirect ranging positioning service between it and the second user equipment, so that the first user equipment determines to give priority to executing the action corresponding to the source UE in solution one (see the above introduction).
  • the first user equipment determines that solution one fails to execute, the first user equipment then executes the action corresponding to the source UE in solution two (see the above introduction) to implement the indirect ranging positioning service between the first user equipment and the second user equipment.
  • this method chooses to use scheme 1 first to achieve end-to-end security protection between the first user equipment and the second user equipment as much as possible, and when end-to-end security protection between the first user equipment and the second user equipment cannot be achieved, the indirect ranging positioning service between the first user equipment and the second user equipment can still be achieved through scheme 2.
  • the first user equipment before the first user equipment sends the first ranging request to the second user equipment through the link with the second user equipment, the first user equipment needs to first determine whether it can establish a link with the second user equipment; when the first user equipment determines that it can establish a link with the second user equipment, the first user equipment then sends the first ranging request to the second user equipment through the link between the first user equipment and the second user equipment.
  • the source UE in scheme one needs to send a ranging request to the target UE, and the target UE needs to send the ranging result between the target UE and the auxiliary device to the source UE, scheme one requires a link to be established between the source UE and the target UE. Therefore, after the first user equipment determines to use end-to-end security protection for the indirect ranging positioning service between it and the second user equipment according to the security policy, the first user equipment needs to first determine whether a link can be established between the first user equipment and the second user equipment.
  • a link can be established between the first user equipment and the second user equipment, and there may be the following situations: a link has been established between the first user equipment and the second user equipment; a link has not been established between the first user equipment and the second user equipment but the link establishment condition is met. If a link is not established between the first user equipment and the second user equipment but the link establishment condition is met, the first user equipment establishes a link with the second user equipment.
  • the link between the first user equipment and the second user equipment can be a direct link (such as a PC5 link) or a U2U relay link based on a relay device, which is not specifically limited in the embodiments of the present application.
  • the first user equipment determines that a link can be established between it and the second user equipment, the first user equipment determines that solution one can be used for indirect ranging and positioning services, and then sends a first ranging request to the second user equipment through the link between the first user equipment and the second user equipment. If a link cannot be established between the first user equipment and the second user equipment, the first user equipment determines that solution one cannot be used any more, that is, the first user equipment fails to use solution one for indirect ranging and positioning services.
  • the security policy may be explicit instruction information.
  • the security policy may be clear indication information, the specific content of which indicates the use of end-to-end security protection for the indirect ranging positioning service, or indicates the selection of sending a ranging request to the target UE in the indirect ranging positioning service to obtain the ranging result between the auxiliary device and the target UE.
  • the security policy may be clear indication information, the specific content of which indicates not to use end-to-end security protection for the indirect ranging positioning service, or indicates to select to send a ranging request to the auxiliary device in the indirect ranging positioning service to obtain the ranging result between the auxiliary device and the target UE.
  • the security policy may be clear indication information, the specific content of which indicates that end-to-end security protection is preferentially used for indirect ranging and positioning services, or indicates that in the indirect ranging and positioning services, a ranging request is preferentially sent to the auxiliary device to obtain the ranging result between the auxiliary device and the target UE.
  • the communication method provided in this embodiment performs security control on the user equipment based on the security policy.
  • the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service;
  • the side chain communication service is a communication service between two user equipments based on the side chain, for example, it can be a ProSe communication service or a ranging and positioning service.
  • the user equipment can obtain the security policy from the local storage or from the core network element.
  • the first user device determines the first operation to be performed based on the security policy it obtains: if the security policy indicates that end-to-end security protection is used for the side chain communication service, the first operation is an operation that can support end-to-end security protection between the first user device and the second user device; if the security policy indicates that end-to-end security protection is not used for the side chain communication service, the first operation is an operation that does not support end-to-end security protection between the first user device and the second user device; if the security policy indicates that end-to-end security protection is used preferentially for the side chain communication service, the first operation is an operation that preferentially supports end-to-end security protection between the first user device and the second user device.
  • the following is an example of how the UE obtains a security policy from a core network element in conjunction with FIG. 12 and FIG. 13 .
  • FIG. 12 is a flowchart of a security policy acquisition method provided in an embodiment of the present application, which may include the following steps:
  • S1201 AS/AF configures E2E security requirements to the core network.
  • the AS and AF are application servers and application functions, respectively.
  • AS/AF corresponds to a specific side chain communication service.
  • the side chain communication service can be a ProSe communication service (including a ProSe relay communication service) or a It is a ranging and positioning service (including indirect ranging and positioning service).
  • the above AS/AF can be an application server/application function network element of the APP of the side chain communication service, or it can be an application server/application function network element deployed by the network operator specifically serving the side chain communication service.
  • AS/AF can formulate corresponding E2E security requirements for side chain communication services as needed, and then configure the E2E security requirements to the core network.
  • E2E security requirements can be formulated in a variety of different ways.
  • the AS/AF may formulate a unified E2E security requirement for the same type of sidelink communication service.
  • the sidelink communication service may be a ProSe communication service or a ranging and positioning service.
  • the unified E2E security requirement refers to the E2E security requirement that all UEs uniformly follow when using the sidelink communication service.
  • E2E security requirements may include the following options (in actual applications, only two of the options may be provided, and the content of each option is only for example):
  • Option B Prioritize E2E security (or try to ensure E2E security as much as possible).
  • the AS/AF can select one of the three options as the unified E2E security requirement of the ProSe communication service. If option A is selected, it means that all ProSe communication services must ensure E2E security, that is, any two UEs must ensure E2E security between them when performing ProSe communication services. If option B is selected, it means that all ProSe communication services try to ensure E2E security, that is, any two UEs try to ensure E2E security between them when performing ProSe communication services, but if E2E security cannot be guaranteed according to real-time communication conditions (for example, the ProSe communication method that ensures E2E security cannot be performed), it is acceptable not to ensure E2E security of the ProSe communication service. If option C is selected, it means that all ProSe communication services do not need to ensure E2E security, that is, any two UEs do not need to ensure E2E security between them when performing ProSe communication services.
  • the AS/AF may formulate different E2E security requirements for the same type of side-chain communication services. Different E2E security requirements may be formulated for different users/user groups under the same type of side-chain communication services, and different E2E security requirements may also be formulated for different geographic locations/network locations. When executing such side-chain communication services, the UE needs to follow the corresponding E2E security requirements. It should be noted that in addition to specifying corresponding security policies based on granularity such as users, user groups, geographic locations, and network locations, there may be other ways of specifying, which are not specifically limited in this application.
  • the E2E security requirement specified by AS/AF for a user group of the ProSe application is option A. Therefore, for any user in the user group, the UE corresponding to the user needs to follow option A when executing the side chain communication service, that is, E2E security must be guaranteed when executing the side chain communication service.
  • the E2E security requirement specified by the AS/AF for a specific geographic location is option B. Therefore, for the UE in the specific geographic location, it needs to follow option B when executing the side chain communication service, that is, it is required to ensure E2E security as much as possible when executing the side chain communication service.
  • the AS/AF may configure external service parameters to the core network, where the external service parameters include the above-mentioned E2E security requirements.
  • E2E security requirements can be specified based on a variety of considerations (for example, security, resource occupancy, efficiency, etc.). Taking the ProSe relay communication service as an example, if the security requirements are particularly high, then option A can be selected, that is, E2E security must be guaranteed. For another example, if the security requirements are not particularly strict, and it is expected to ensure E2E security, but a solution that does not ensure E2E security is also acceptable, then option B can be selected, that is, E2E security is prioritized. For another example, if the security requirements are not particularly strict, but the service implementation speed and resource occupancy are more important, then option C can be selected, that is, E2E security is not guaranteed.
  • considerations for example, security, resource occupancy, efficiency, etc.
  • the ProSe relay communication solution that does not guarantee E2E security is implemented based on the layer 3 relay mechanism. Compared with the layer 2 relay mechanism, it occupies less resources, and the time from triggering the ProSe service requirements to establishing the ProSe relay communication will be shorter and more efficient.
  • option D may be set: E2E security is not guaranteed first (higher efficiency). Therefore, if efficiency is a priority, option D may be selected, which prioritizes the startup efficiency of the ProSe relay communication service by sacrificing E2E security.
  • the layer 3 relay mechanism is used first to implement the ProSe relay communication service, and when the layer 3 relay mechanism fails, the layer 2 relay mechanism is used to implement the ProSe relay communication service.
  • NEF sends the E2E security requirements from AS/AF to UDR for storage.
  • the UDR may store the E2E security requirements in application-specific data.
  • E2E security requirements formulated by AS/AF are described in terms of external service parameters (such as external user ID, external user group ID, and geographic location information).
  • AS/AF specifies corresponding E2E security requirements for different external user IDs/external user group IDs/geographic locations.
  • the NEF when it receives the E2E security requirement from the AS/AF, it can replace the external service parameters in the E2E security requirement with the corresponding internal service parameters in the network. For example, the NEF can determine the corresponding SUPI according to the external user identity, determine the corresponding internal group identity according to the external group identity, and determine the corresponding network internal location information (such as tracking area) according to the geographical location. (tracking area, TA) or registration area (registration area, RA)), thereby replacing all these external service parameters in the security policy with corresponding internal service parameters. After completing the above replacement, NEF sends the E2E security requirements to UDR for storage.
  • tracking area tracking area
  • RA registration area
  • the NEF may determine corresponding internal service parameters according to the E2E security requirements sent by the AS/AF, and then send the E2E security requirements and the internal service parameters together to the UDR for storage.
  • the E2E security requirements can also be configured by default on the core network elements (PCF, 5GDDNMF or UDR) instead of coming from AS/AF.
  • S1203 The UE sends a policy request to the core network.
  • the above policy request indicates that the policy of the side chain communication service is to be obtained.
  • the UE obtains the policy of the side chain communication service from the PCF.
  • the side chain communication service can be a ProSe communication service, that is, the UE requests the core network element to obtain the ProSe policy to be used by the ProSe communication service; the side chain communication service can also be a ranging and positioning service, that is, the UE requests the core network element to obtain the policy to be used by the ranging and positioning service.
  • the policy request may indicate all policies (including security policies) to be used for obtaining the side chain communication service, or the policy request may indicate only the security policy to be used for obtaining the side chain communication service.
  • the policy request sent by the UE is passed to the PCF via the AMF.
  • the PCF determines a security policy for the UE and sends the security policy to the UE.
  • the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service.
  • the PCF can determine the policy used by the side chain communication service for the UE according to the data stored in the UDR (including determining the corresponding security policy for the UE according to the E2E security requirements stored in the UDR), and then send these policies together to the UE. It should be understood that the security policy determined by the PCF is delivered to the UE via the AMF.
  • the PCF may determine a corresponding security policy for the UE according to the E2E security requirements stored in the UDR, and then send the security policy to the UE.
  • the PCF obtains the E2E security requirements from the UDR in the above manner to determine the security policy; if the E2E security requirements are configured on the PCF, the PCF can directly determine the security policy based on the locally stored E2E security requirements.
  • the security policy determined by the PCF for the UE must be able to instruct the UE to (must) use end-to-end security protection for the ProSe relay communication service.
  • the specific content of the security policy may be clear indication information, including at least one of the following: (must) use end-to-end security protection for the ProSe relay communication service; (must) use the layer 2 relay mechanism in the ProSe relay communication service; (must) use the relay service identifier of the layer 2 relay service to discover the relay device required in the ProSe relay communication service.
  • the security policy may not be clear indication information.
  • the security policy may include the relay service identifier of the layer 2 relay service but not the relay service identifier of the layer 3 relay service. Therefore, the security policy can also play the same indication role, indicating the use of end-to-end security protection for the ProSe relay communication service.
  • the security policy determined by the PCF for the UE must be able to instruct the UE to give priority to end-to-end security protection for the ProSe relay communication service.
  • the specific content of the security policy may be clear indication information, including at least one of the following: giving priority to end-to-end security protection in the ProSe relay communication service; giving priority to the layer 2 relay mechanism in the ProSe relay communication service; giving priority to the relay service identifier of the layer 2 relay service to discover the relay device required in the ProSe relay communication service.
  • the security policy service may not be clear indication information, and the security policy may include priority information, which is used to indicate that the relay service identifier of the layer 2 relay service is used first, so the security policy can also play the same indication role, indicating that the end-to-end security protection is used first for the ProSe relay communication service. It should be noted that when the security policy contains the above-mentioned priority information, the security policy may also include the relay service identifier of the layer 2 relay service and/or the relay service identifier of the layer 3 relay service, so the PCF can also configure the above-mentioned relay service identifier to the UE by sending the security policy to the UE.
  • the security policy determined by the PCF for the UE must be able to instruct the UE not to use end-to-end security protection for the ProSe relay communication service, or to indicate that end-to-end security protection is not used for the side chain communication service.
  • the specific content of the security policy may be clear indication information, including at least one of the following: not using end-to-end security protection for the ProSe relay communication service; not using the layer 2 relay mechanism in the ProSe relay communication service; using the layer 3 relay mechanism in the ProSe relay communication service; using the relay service identifier of the layer 3 relay service to discover the relay device required in the ProSe relay communication service.
  • the security policy may not be clear indication information.
  • the security policy may include the relay service identifier of the layer 3 relay service but not the relay service identifier of the layer 2 relay service. Therefore, the security policy may also play the same indication role, indicating that end-to-end security protection is not used for the ProSe relay communication service.
  • the security policy determined by the PCF for the UE must be able to instruct the UE not to use end-to-end security protection for the ProSe relay communication service.
  • the specific content of the security policy may be clear indication information, including at least one of the following: not to use end-to-end security protection in the ProSe relay communication service; to give priority to the use of the layer 3 relay mechanism in the ProSe relay communication service; to give priority to the use of the relay service identifier of the layer 3 relay service to discover the relay device required in the ProSe relay communication service.
  • the security policy service may not be clear indication information.
  • the security policy may include priority information, and the priority information is used to indicate that the relay service identifier of the layer 3 relay service is used first. Therefore, the security policy can also play the same indication role, indicating that the ProSe relay communication service is not used first. End-to-end security protection.
  • the security policy determined by the PCF for the UE must be able to instruct the UE to (must) use end-to-end security protection for the indirect ranging and positioning service.
  • the specific content of the security policy can be clear instruction information, which can include at least one of the following: (must) use end-to-end security protection for the indirect ranging and positioning service; (must) use scheme 1 in the indirect ranging and positioning service; send a ranging request to the target UE in the indirect ranging and positioning service to obtain the ranging result between the auxiliary device and the target UE.
  • the security policy determined by the PCF for the UE must be able to instruct the UE to give priority to end-to-end security protection for the indirect ranging positioning service.
  • the specific content of the security policy can be clear instruction information, which can include at least one of the following: give priority to end-to-end security protection for the indirect ranging positioning service; give priority to scheme 1 in the indirect ranging positioning service; give priority to sending a ranging request to the target UE in the indirect ranging positioning service to obtain the ranging result between the auxiliary device and the target UE.
  • the security policy determined by the PCF for the UE must be able to instruct the UE not to use end-to-end security protection for the indirect ranging positioning service.
  • the specific content of the security policy can be clear instruction information, which can include at least one of the following: not using end-to-end security protection for the indirect ranging positioning service; not using solution one in the indirect ranging positioning service; using solution two in the indirect ranging positioning service; sending a ranging request to the auxiliary device in the indirect ranging positioning service to obtain the ranging result between the auxiliary device and the target UE.
  • the PCF may determine a security policy based on the first user information carried in the policy request of the UE, wherein the first user information may include one or more of the following information: user identifier (such as SUPI), user group identifier (such as an internal group identifier), geographic location, network location, etc.
  • user identifier such as SUPI
  • user group identifier such as an internal group identifier
  • the policy request sent by the UE carries SUPI information, and the PCF determines the security policy based on whether the E2E security requirement corresponding to the user identified by the SUPI is stored locally. If yes, the PCF determines the security policy based on the E2E security requirement and then sends the security policy to the UE.
  • the PCF obtains the second user information, and then determines the security policy according to the second user information and the first user information carried in the policy request.
  • the second user information may include one or more of the following information: user identification (such as SUPI), user group identification (such as internal group identification), geographic location, network location, etc.
  • the second user information is obtained from the second network device, and the second network device may be one or more of an application server, an application function network element, a direct communication discovery name management network element, an access management network element, or a data management network element.
  • the policy request sent by the UE carries SUPI and user group identification information.
  • the PCF determines whether the user data stored in the UDR includes the SUPI. If so, it continues to determine the security policy for it.
  • the PCF finds that the E2E security requirement corresponding to the user group identifier is stored in the UDR, so it determines the security policy based on the E2E security requirement, and then sends the security policy to the UE.
  • the policy request sent by the UE carries SUPI.
  • AMF forwards the policy request to PCF, it also obtains the UE's location information (such as TA or RA information) and sends it to PCF.
  • PCF determines whether the user data stored in the UDR includes the SUPI. If so, it continues to determine the security policy for it.
  • PCF finds that the E2E security requirements corresponding to the location information are stored in the UDR, so it determines the security policy based on the E2E security requirements, and then sends the security policy to the UE.
  • the UE can store the security policy locally after receiving it, so that the security policy can be used when the UE triggers the side chain communication service demand later. If the current UE has triggered the side chain communication service demand, it can determine to perform corresponding operations according to the security policy after receiving the security policy from the core network element. For the specific content of the UE performing the corresponding operation according to the determination, please refer to the relevant introduction in Figure 10 and/or Figure 11, which will not be repeated here.
  • FIG. 13 is a flowchart of another security policy acquisition method provided in an embodiment of the present application, which may include the following steps:
  • S1301 The UE registers with the PCF to obtain authorization for the side chain communication service.
  • the side chain communication service is a ProSe communication service (including a ProSe relay communication service) or a ranging and positioning service (including an indirect ranging and positioning service).
  • the UE obtains authorization for the ranging and positioning service from the PCF, and can be authorized as one or more of the source UE, auxiliary UE, and target UE in the ranging and positioning service, or the UE obtains authorization for the ProSe service from the PCF, and can be authorized as one or more of the source UE, relay UE, and target UE in the ranging and positioning service.
  • S1302 The UE requests the DDNMF network element to obtain discovery parameters.
  • the UE when it wants to perform a discovery process, it can send a discovery request to the DDNMF to obtain the discovery parameters needed to be used in the discovery process.
  • the discovery request carries the first user information
  • the first user information includes one or more of the following information: user identification (such as SUPI), user group identification (such as internal group identification), geographic location, network location, etc.
  • DDNMF requests PCF to obtain E2E security requirements corresponding to the UE.
  • the DDNMF may send a request message to the PCF to request to obtain the E2E security requirements corresponding to the UE, and then determine the security policy for the UE according to the E2E security requirements corresponding to the UE.
  • the request message includes part or all of the first user information described in step S1302.
  • the DDNMF after obtaining the discovery request sent by the UE, obtains the first user information corresponding to the UE from the core network. Specifically, the DDNMF may use the SUPI information of the UE to obtain the first user information corresponding to the UE from the AMF or UDR.
  • the PCF determines the E2E security requirements corresponding to the UE, and sends the E2E security requirements corresponding to the UE to the DDNMF.
  • the E2E security requirements are configured on the PCF, so the PCF can determine the security requirements corresponding to the UE according to the locally stored E2E security requirements.
  • the E2E security requirements are stored on the UDR, so the PCF can determine the E2E security requirements corresponding to the UE based on the data stored in the UDR (including the E2E security requirements).
  • the E2E security requirements stored on the UDR can be configured by default or configured by AS/AF. For details, please refer to the relevant introduction in steps S1201 to S1202 in Figure 12, which will not be repeated here.
  • DDNMF determines security policies and discovery parameters for the UE.
  • a security policy can be determined for the UE according to the E2E security requirements.
  • a security policy can be determined for the UE according to the E2E security requirements.
  • the PCF may further determine the security policy required by the UE, and then send the security policy to the DDNMF. At this time, the DDNMF only needs to determine the discovery parameters.
  • DDNMF sends security policy and discovery parameters to the UE.
  • the UE can execute the corresponding discovery process according to the discovery parameters. If the current UE has not triggered the side chain communication service demand, the UE can store the security policy locally after receiving it, so that the UE can use the security policy when it triggers the side chain communication service demand later. If the current UE has triggered the side chain communication service demand, it can determine to perform corresponding operations according to the security policy after receiving the security policy from the core network element. For the specific content of the UE determining to perform corresponding operations, please refer to the relevant introduction in Figure 10 and/or Figure 11, which will not be repeated here.
  • the method for obtaining the security policy in Figure 12 relies on the process of UE obtaining the policy from PCF
  • the method for obtaining the security policy in Figure 13 relies on the process of UE obtaining discovery parameters from DDNMF, that is, the security policy can be obtained at different times, and the embodiment of the present application does not make specific limitations.
  • the security policy acquisition method of Figure 12 can rely on the process of the user device obtaining the policy of the side chain communication service from the PCF, that is, when the user device requests the policy used by the side chain communication service from the PCF, the PCF can determine the security policy for the user device, and then send the security policy and other policies used by the side chain communication service to the user device, thereby realizing the issuance of the security policy and the issuance of other side chain communication side chains.
  • the security policy acquisition method of Figure 13 can rely on the process of the user device obtaining discovery parameters from the DDNMF, that is, the user device will send a discovery request to the DDNMF to obtain the discovery parameters during the execution of the discovery process.
  • the DDNMF can carry the security policy in the reply message of the discovery request, thereby realizing the issuance of the security policy to the user device.
  • the user device can also directly request the core network network element to obtain the security policy, so that the core network network element receives the corresponding security policy.
  • the security policy corresponding to the user equipment can be pre-configured on the core network element, or it can be generated by the core network element according to the AS/AF configuration E2E security requirements.
  • the above core network element can refer to one or more of PCF, DDNMF, AMF, UDM, and UDR.
  • AS/AF can configure unified E2E security requirements for the same type of side-link communication services, or it can configure more refined E2E security requirements under the same type of side-link communication services. For example, it can formulate corresponding E2E security requirements based on granularity such as users, user groups, geographic locations, and network locations. E2E security requirements.
  • the core network element can determine a security policy for the user device based on one or more user information, wherein the above user information can all come from the user device, can all come from the core network element, or can be partly from the user device and partly from the core network element, which is not specifically limited in the embodiments of the present application.
  • the present application divides the functional modules of the communication device according to the above method embodiment.
  • each functional module can be divided according to each function, or two or more functions can be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of modules in the present application is schematic and is only a logical function division. There may be other division methods in actual implementation.
  • the communication device of the embodiment of the present application will be described in detail below with reference to Figures 14 to 16 as examples.
  • Figure 14 is a structural diagram of a communication device 1400 provided in an embodiment of the present application, including an acquisition module 1401 and a processing module 1402.
  • the acquisition module 1401 is used to acquire a security policy, wherein the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service, and the end-to-end security protection is implemented between two user devices (or apparatuses) corresponding to the side chain communication service.
  • the processing module 1402 is used to determine to execute a first operation according to a security policy, wherein the first operation is used to establish a side chain communication service between the communication device 1400 and a second user equipment.
  • the above security policy indicates the use of end-to-end security protection for the side chain communication service
  • the first operation includes: the communication device 1400 receives a message from at least one relay device, wherein the message of at least one relay device includes a relay service identifier of a layer 2 relay service; the communication device 1400 establishes a connection with a first relay device among the at least one relay device, wherein the message of the first relay device received by the communication device 1400 includes the service identifier of the layer 2 relay service, and the above link is used to send service data of the side chain communication service between the communication device 1400 and the second user device.
  • the security policy indicates that end-to-end security protection is not used for the side chain communication service
  • the first operation includes: the communication device 1400 receives a message from at least one relay device, wherein the message of the at least one relay device includes a relay service identifier of a layer 3 relay service; the communication device 1400 establishes a relay connection with a first relay device among the at least one relay device, wherein the message of the first relay device received by the communication device 1400 includes a relay service identifier of a layer 3 relay service, and the relay link is used to send service data of the side chain communication service between the communication device 1400 and the second user device.
  • the security policy includes a relay service identifier of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service.
  • the security policy includes priority information, where the priority information is used to indicate that the relay service identifier of the layer 2 relay service needs to be used preferentially.
  • the security policy indicates the use of end-to-end security protection for the side chain communication service
  • the first operation includes: the communication device 1400 sends a first ranging request to the second user equipment through a link with the second user equipment, wherein the first ranging request indicates measuring the distance and/or angle between the second user equipment and the auxiliary device, and the ranging result of the first ranging request is used to determine the distance and/or angle between the communication device 1400 and the second user equipment.
  • the processing module 1402 before the communication device 1400 sends the first ranging request to the second user equipment through the link with the second user equipment, the processing module 1402 is further used to determine whether the communication device 1400 can establish a link with the second user equipment; when the communication device 1400 determines that a link can be established with the second user equipment, the processing module 1402 is further used to send the first ranging request to the second user equipment through the link with the second user equipment.
  • the security policy indicates that end-to-end security protection is not used for the side chain communication service
  • the first operation includes: the communication device 1400 sends a second ranging request to the auxiliary device through a direct link with the auxiliary device, wherein the second ranging request indicates measuring the distance and/or angle between the second user equipment and the auxiliary device, and the ranging result of the second ranging request is used to determine the distance and/or angle between the communication device 1400 and the second user equipment.
  • the communication device 1400 acquires the security policy, which may include: the communication device 1400 receives the security policy from a core network element.
  • the core network element is one or more of a policy management network element, a direct communication discovery name management network element, an access management network element or a data management network element.
  • the security policy is determined by the core network element according to the user information of the communication device 1400, wherein the user information includes one or more of the user identification, user group identification, geographic location, and network location of the communication device 1400.
  • the method before the communication device 1400 receives the security policy from the core network element, the method further includes: the communication device 1400 sends the above user information to the core network element.
  • the communication device 1400 acquires the security policy, including: the communication device 1400 acquires the security policy stored in the communication device 1400 .
  • the above-mentioned communication device 1400 can correspond to the first user equipment in Figures 10, 11, 12 and/or 13, and is specifically used to implement any embodiment of the communication method of Figures 10 and/or 11. Please refer to the above description for details and no further details will be given here.
  • FIG 15 is a structural diagram of another communication device 1500 provided in an embodiment of the present application, including a transceiver module 1501 and a processing module 1502.
  • the transceiver module 1501 is used to receive a request message sent by a first user equipment, wherein the request message includes first user information of the first user equipment.
  • the processing module 1502 is used to determine a security policy based on the first user information, wherein the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service, and the end-to-end security protection is implemented between the two user devices corresponding to the side chain communication service; the communication device 1500 sends the security policy to the first user device.
  • the side chain communication service is a proximity service communication service based on a relay device, or the side chain communication service is a ranging and positioning service based on an auxiliary device.
  • the side chain communication service is a proximity service communication service based on a relay device
  • the security policy includes a relay service identifier of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service.
  • the side chain communication service is a proximity service communication service based on a relay device
  • the security policy includes priority information, wherein the priority information is used to indicate that the relay service identifier of the layer 2 relay service needs to be used first, or the priority information is used to indicate that the relay service identifier of the layer 3 relay service needs to be used first.
  • the communication device 1500 is one or more of a policy management network element, a direct communication discovery name management network element, an access management network element or a data management network element.
  • the first user information includes one or more of a user identifier, a user group identifier, a geographical location, and a network location of the first user device.
  • the processing module 1502 is also used to obtain second user information, wherein the second user information includes one or more of a user identifier, a user group identifier, a geographic location, and a network location of the first user device; the processing module 1502 is also used to determine the security policy based on the first user information and the second user information.
  • the second user information is obtained by the communication device 1500 from a second network device, wherein the second network device is one or more of an application server, an application function network element, a policy management network element, a direct communication discovery name management network element, an access management network element or a data management network element.
  • the second network device is one or more of an application server, an application function network element, a policy management network element, a direct communication discovery name management network element, an access management network element or a data management network element.
  • the above-mentioned communication device 1400 can correspond to the core network element in Figures 10 and/or 11, and can also correspond to the first network device in Figures 12 and/or 13. It is specifically used to implement any embodiment of the method on the first network device side of Figures 12 and/or 13. Please refer to the above description for details and no further details will be given here.
  • FIG 16 is a structural diagram of another communication device 1600 provided in an embodiment of the present application.
  • the communication device 1600 includes a processor 1601, a memory 1602 and a communication interface 1603.
  • the communication device 1600 is specifically used to implement any embodiment of the communication method of Figure 10 or Figure 11, or to implement any embodiment of the first network device side in the security policy acquisition method of Figure 12 or Figure 13.
  • the processor 1601, the memory 1602 and the communication interface 1603 can be connected to each other through an internal bus 1604, and communication can also be achieved through other means such as wireless transmission.
  • the connection through the bus 1604 is taken as an example.
  • the bus 1604 can be a peripheral component interconnect standard (PCI) bus, an extended industry standard architecture (EISA) bus, a unified bus (Ubus or UB), a computer express link (CXL) bus, a cache coherent interconnect for accelerators (CCIX) bus, etc.
  • PCI peripheral component interconnect standard
  • EISA extended industry standard architecture
  • Ubus or UB unified bus
  • CXL computer express link
  • CCIX cache coherent interconnect for accelerators
  • the bus 1604 can be divided into an address bus, a data bus, a control bus, etc.
  • FIG16 only uses one thick line, but does not mean that there is only one bus or one type of bus.
  • the processor 1601 may be composed of at least one general-purpose processor, such as a central processing unit (CPU), or a combination of a CPU and a hardware chip.
  • the hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD), or a combination thereof.
  • the PLD may be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a generic array logic (GAL), or any combination thereof.
  • the processor 1601 executes various types of digital storage instructions, such as software or firmware programs stored in the memory 1602, which enables the communication device 1600 to provide a variety of services.
  • the memory 1602 is used to store program codes, and the execution is controlled by the processor 1601.
  • the memory 1602 may include a volatile memory (volatile memory), such as a random access memory (RAM); the memory 1602 may also include a non-volatile memory (non-volatile memory), such as a read-only memory (ROM), a flash memory, a hard disk drive (HDD) or a solid-state drive (SSD); the memory 1602 may also include a combination of the above types.
  • the memory 1602 may store program codes, specifically including program codes for executing any embodiment of the communication method of FIG. 10 or FIG. 11, and may also include program codes for implementing any embodiment of the first network device side in the security policy acquisition method of FIG. 12 or FIG. 13, which will not be described in detail here.
  • the communication interface 1603 may be a wired interface (e.g., an Ethernet interface) or a wireless interface (e.g., a cellular network interface or a wireless LAN interface), or may be an internal interface (e.g., a high-speed serial computer expansion bus (peripheral component interconnect express, PCIe) bus interface).
  • the wired interface or the wireless interface is used to communicate with other devices or modules.
  • this embodiment can be implemented by a general physical server, for example, an ARM server or an X86 server, or it can be implemented by a virtual machine based on a general physical server combined with NFV technology.
  • a virtual machine refers to a complete computer system with complete hardware system functions and running in a completely isolated environment simulated by software, which is not specifically limited in this application.
  • the communication device 1600 shown in FIG. 16 can also be a server cluster composed of at least one server, which is not specifically limited in this application.
  • the communication device 1600 can also be a host, a laptop, a desktop computer, a smart phone, and other devices, which are not specifically limited.
  • FIG. 16 is only a possible implementation of the embodiment of the present application.
  • the communication device 1600 may also include more or fewer components, and the present application does not make specific limitations.
  • An embodiment of the present application further provides a computer-readable storage medium, in which instructions are stored.
  • the computer-readable storage medium is executed on a processor, the method of any embodiment of FIG. 10 or FIG. 11 is implemented.
  • An embodiment of the present application also provides a computer-readable storage medium, in which instructions are stored.
  • the computer-readable storage medium is executed on a processor, the method of any embodiment of FIG. 12 or FIG. 13 is implemented.
  • the embodiment of the present application further provides a computer program product.
  • the computer program product runs on a processor, the method of any embodiment of FIG. 10 or FIG. 11 is implemented.
  • the embodiment of the present application also provides a computer program product.
  • the computer program product runs on a processor, the method of any embodiment of FIG. 12 or FIG. 13 is implemented.
  • An embodiment of the present application also provides a chip or a chip system, including: a processor, used to execute the method in any of the aforementioned embodiments (such as Figures 10, 11, 12, and 13).
  • the storage medium can be a disk, an optical disk, a read-only memory (ROM) or a random access memory (RAM), etc.

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed in the present application are a communication method, a communication apparatus, and a storage medium. The method comprises: a first user equipment acquiring a security policy, wherein the security policy is used for indicating whether to use end-to-end security protection for a sidelink communication service, and the end-to-end security protection is implemented between two user equipments corresponding to the sidelink communication service; and then, the first user equipment determining, according to the security policy, to execute a first operation, wherein the first operation is used for establishing a sidelink communication service between the first user equipment and a second user equipment. In the embodiments of the present application, on the basis of a security policy, a user equipment, which uses a sidelink communication service, can be provided with better security control.

Description

通信方法、通信装置、及存储介质Communication method, communication device, and storage medium
本申请要求于2022年11月07日提交中国专利局、申请号为202211383863.2、申请名称为“通信方法、通信装置、及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to the Chinese patent application filed with the China Patent Office on November 7, 2022, with application number 202211383863.2 and application name “Communication Method, Communication Device, and Storage Medium”, all contents of which are incorporated by reference in this application.
技术领域Technical Field
本申请涉及通信技术领域,尤其涉及一种通信方法、通信装置、及存储介质。The present application relates to the field of communication technology, and in particular to a communication method, a communication device, and a storage medium.
背景技术Background technique
临近业务(proximity-based services,ProSe)通信又称为近距离业务通信,是端到端(end to end,D2D)通信中的一种典型业务场景,它允许用户设备(user equipment,UE)之间直接进行通信。当源UE与目标UE无法通过二者之间的直连链接实现ProSe通信时,可以通过中继设备建立UE至UE中继通信连接,从而实现源UE与目标UE之间的ProSe通信。Proximity-based services (ProSe) communication, also known as short-range service communication, is a typical service scenario in end-to-end (D2D) communication, which allows direct communication between user equipment (UE). When the source UE and the target UE cannot achieve ProSe communication through a direct link between the two, a UE-to-UE relay communication connection can be established through a relay device to achieve ProSe communication between the source UE and the target UE.
目前,UE至UE中继通信具有多种不同的实现方案,包括基于层二的中继通信和基于层三的中继通信。然而上述不同方案在安全性上有所差异,因此,如何为用户设备提供更好的安全控制成为亟待解决的问题。Currently, there are many different implementation schemes for UE-to-UE relay communication, including layer 2-based relay communication and layer 3-based relay communication. However, the above different schemes differ in security, so how to provide better security control for user equipment has become an urgent problem to be solved.
发明内容Summary of the invention
本申请提供一种通信方法、通信装置、及存储介质,能够为使用侧链通信业务的用户设备提供更好的安全控制。The present application provides a communication method, a communication device, and a storage medium, which can provide better security control for user equipment using side chain communication services.
第一方面,本申请提供了一种通信方法,该方法包括:第一用户设备获取安全策略,其中,安全策略用于指示是否对侧链通信业务使用端到端的安全保护,端到端的安全保护实施在侧链通信业务对应的两个用户设备之间;第一用户设备根据安全策略确定执行第一操作,其中,第一操作用于建立第一用户设备与第二用户设备之间的侧链通信业务。In a first aspect, the present application provides a communication method, the method comprising: a first user device obtains a security policy, wherein the security policy is used to indicate whether to use end-to-end security protection for a side chain communication service, and the end-to-end security protection is implemented between two user devices corresponding to the side chain communication service; the first user device determines to perform a first operation according to the security policy, wherein the first operation is used to establish a side chain communication service between the first user device and a second user device.
在本方案中,基于安全策略来对第一用户设备进行安全控制。其中,第一用户设备为需要使用侧链通信业务的用户设备;侧链通信业务为基于侧链(sidelink)实现的两个用户设备之间的通信业务,例如可以是ProSe通信业务,也可以是测距定位业务;安全策略用于指示是否对侧链通信业务使用端到端的安全保护。第一用户设备根据其获取的安全策略确定所要执行的第一操作,第一操作用于建立第一用户设备(即源UE)与第二用户设备(即目标UE)之间的侧链通信业务。In this solution, security control is performed on the first user device based on the security policy. The first user device is a user device that needs to use the sidelink communication service; the sidelink communication service is a communication service between two user devices based on the sidelink, for example, it can be a ProSe communication service or a ranging and positioning service; the security policy is used to indicate whether to use end-to-end security protection for the sidelink communication service. The first user device determines the first operation to be performed based on the security policy it obtains, and the first operation is used to establish a sidelink communication service between the first user device (i.e., the source UE) and the second user device (i.e., the target UE).
当安全策略指示对侧链通信业务使用端到端的安全保护时,第一用户设备根据该安全策略确定要执行的第一操作为能够支持在第一用户设备与第二用户设备之间实现端到端的安全保护的操作;当安全策略指示不对侧链通信业务使用端到端的安全保护时,第一操作为不支持在第一用户设备与第二用户设备之间实现端到端的安全保护的操作;当安全策略指示优先对侧链通信业务使用端到端的安全保护时,第一操作为优先支持在第一用户设备与第二用户设备之间实现端到端的安全保护的操作。When the security policy indicates that end-to-end security protection is used for the side chain communication service, the first user device determines, according to the security policy, that the first operation to be performed is an operation that can support end-to-end security protection between the first user device and the second user device; when the security policy indicates that end-to-end security protection is not used for the side chain communication service, the first operation is an operation that does not support end-to-end security protection between the first user device and the second user device; when the security policy indicates that end-to-end security protection is preferentially used for the side chain communication service, the first operation is an operation that preferentially supports end-to-end security protection between the first user device and the second user device.
也就是说,第一用户设备根据不同安全策略的指示将会执行不同的操作,且不同的操作对端到端的安全保护具有不同的支持程度(支持、不支持或优先支持),从而为第一用户设备实现更好、更灵活的安全控制。That is to say, the first user device will perform different operations according to the instructions of different security policies, and different operations have different levels of support for end-to-end security protection (support, non-support or priority support), thereby achieving better and more flexible security control for the first user device.
基于第一方面,在可能的实施方案中,上述安全策略指示对侧链通信业务使用端到端的安全保护,第一操作包括:第一用户设备接收来自至少一个中继设备的消息,其中,至少一个中继设备的消息均包括层二中继业务的中继服务标识;第一用户设备与至少一个中继设备中的第一中继设备建立连接,其中,第一用户设备接收到的第一中继设备的消息包括层二中继业务的中继服务标识,上述链接用于发送第一用户设备与第二用户设备之间的侧链通信业务的业务数据。Based on the first aspect, in a possible implementation scheme, the above-mentioned security policy indicates the use of end-to-end security protection for the side chain communication service, and the first operation includes: the first user device receives a message from at least one relay device, wherein the message of at least one relay device includes a relay service identifier of a layer 2 relay service; the first user device establishes a connection with a first relay device among the at least one relay device, wherein the message of the first relay device received by the first user device includes the relay service identifier of the layer 2 relay service, and the above-mentioned link is used to send service data of the side chain communication service between the first user device and the second user device.
在本方案中,侧链通信业务具体指ProSe通信业务(或者说ProSe中继通信业务)。对于ProSe中继通信业务,它可以基于层二中继机制,也可以基于层三中继机制来实现,前者能够支持为ProSe中继通信业务对应的两个UE提供端到端的安全保护,后者不支持为ProSe中继通信业务对应的两个UE提供端到端的安全保护。若第一用户设备获取的安全策略指示对侧链通信业务使用端到端的安全保护,则第一用户设备确定执行的第一操作需要支持在第一用户设备和第二用户设备之间的ProSe中继通信业务中实现端到端的安全保护,即第一用户设备确定要基于层二中继机制来实现ProSe中继通信业务,从而执行层二中继机 制相应的操作,包括:第一用户设备通过层二中继设备与第二用户设备建立连接,进而基于该连接实现第一用户设备与第二用户设备之间的ProSe中继通信业务。In this solution, the sidelink communication service specifically refers to the ProSe communication service (or ProSe relay communication service). For the ProSe relay communication service, it can be implemented based on a layer 2 relay mechanism or a layer 3 relay mechanism. The former can support end-to-end security protection for the two UEs corresponding to the ProSe relay communication service, while the latter does not support end-to-end security protection for the two UEs corresponding to the ProSe relay communication service. If the security policy obtained by the first user device indicates the use of end-to-end security protection for the sidelink communication service, the first user device determines that the first operation to be executed needs to support the implementation of end-to-end security protection in the ProSe relay communication service between the first user device and the second user device, that is, the first user device determines to implement the ProSe relay communication service based on the layer 2 relay mechanism, thereby executing the layer 2 relay mechanism. The corresponding operation includes: the first user equipment establishes a connection with the second user equipment through the layer 2 relay device, and then implements the ProSe relay communication service between the first user equipment and the second user equipment based on the connection.
基于第一方面,在可能的实施方案中,安全策略指示不对侧链通信业务使用端到端的安全保护,第一操作包括:第一用户设备接收来自至少一个中继设备的消息,其中,至少一个中继设备的消息均包括层三中继业务的中继服务标识;第一用户设备与至少一个中继设备中的第一中继设备建立中继连接,其中,第一用户设备接收到的第一中继设备的消息包括层三中继业务的中继服务标识,中继链接用于发送第一用户设备与第二用户设备之间的侧链通信业务的业务数据。Based on the first aspect, in a possible implementation scheme, the security policy indicates that end-to-end security protection should not be used for the side chain communication service, and the first operation includes: the first user device receives a message from at least one relay device, wherein the message of at least one relay device includes a relay service identifier of a layer-3 relay service; the first user device establishes a relay connection with a first relay device among the at least one relay device, wherein the message of the first relay device received by the first user device includes the relay service identifier of the layer-3 relay service, and the relay link is used to send service data of the side chain communication service between the first user device and the second user device.
在本方案中,侧链通信业务具体指ProSe通信业务(或者说ProSe中继通信业务)。对于ProSe中继通信业务,它可以基于层二中继机制,也可以基于层三中继机制来实现,前者能够支持为ProSe中继通信业务对应的两个UE提供端到端的安全保护,后者不支持为ProSe中继通信业务对应的两个UE提供端到端的安全保护。若第一用户设备获取的安全策略指示不对侧链通信业务使用端到端的安全保护,则第一用户设备确定执行的第一操作不需要支持在第一用户设备和第二用户设备之间的ProSe中继通信业务中实现端到端的安全保护,即第一用户设备确定基于层三中继机制来实现ProSe中继通信业务,从而执行层三中继机制相应的操作,包括:第一用户设备通过层三中继设备与第二用户设备建立中继连接,进而基于该中继连接实现第一用户设备与第二用户设备之间的ProSe中继通信业务。In this solution, the side chain communication service specifically refers to the ProSe communication service (or the ProSe relay communication service). For the ProSe relay communication service, it can be implemented based on the layer 2 relay mechanism or the layer 3 relay mechanism. The former can support end-to-end security protection for the two UEs corresponding to the ProSe relay communication service, and the latter does not support end-to-end security protection for the two UEs corresponding to the ProSe relay communication service. If the security policy obtained by the first user device indicates that end-to-end security protection is not used for the side chain communication service, the first operation determined to be executed by the first user device does not need to support end-to-end security protection in the ProSe relay communication service between the first user device and the second user device, that is, the first user device determines to implement the ProSe relay communication service based on the layer 3 relay mechanism, thereby executing the corresponding operation of the layer 3 relay mechanism, including: the first user device establishes a relay connection with the second user device through the layer 3 relay device, and then implements the ProSe relay communication service between the first user device and the second user device based on the relay connection.
基于第一方面,在可能的实施方案中,安全策略包括层二中继业务的中继服务标识和/或层三中继业务的中继服务标识。Based on the first aspect, in a possible implementation scheme, the security policy includes a relay service identifier of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service.
在本方案中,安全策略包括层二中继业务的中继服务标志和/或层三中继业务的中继服务标识,于是可以通过安全策略实现向第一用户设备配置中继服务标识的功能。并且,还可以基于安全策略中携带的中继服务标识的类型来间接指示是否要对侧链通信业务使用端到端的安全保护。例如,假设安全策略中仅包括中继服务标识,当安全策略中仅包括层二中继业务的中继服务标识时,该安全策略便是指示使用层二中继业务的中继服务标识来发现ProSe中继通信业务中所需的中继设备,从而间接指示了对ProSe中继通信业务要使用端到端的安全保护;当安全策略中仅包括层三中继业务的中继服务标识时,该安全策略便是指示使用层三中继业务的中继服务标识来发现ProSe中继通信业务中所需的中继设备,从而间接指示了不对ProSe中继通信业务使用端到端的安全保护。In this solution, the security policy includes a relay service flag of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service, so that the function of configuring the relay service identifier to the first user equipment can be implemented through the security policy. In addition, it is also possible to indirectly indicate whether to use end-to-end security protection for the side chain communication service based on the type of relay service identifier carried in the security policy. For example, assuming that the security policy only includes a relay service identifier, when the security policy only includes a relay service identifier of a layer 2 relay service, the security policy indicates that the relay service identifier of the layer 2 relay service is used to discover the relay device required in the ProSe relay communication service, thereby indirectly indicating that end-to-end security protection is to be used for the ProSe relay communication service; when the security policy only includes a relay service identifier of a layer 3 relay service, the security policy indicates that the relay service identifier of the layer 3 relay service is used to discover the relay device required in the ProSe relay communication service, thereby indirectly indicating that end-to-end security protection is not used for the ProSe relay communication service.
基于第一方面,在可能的实施方案中,安全策略包括优先级信息,该优先级信息用于指示层二中继业务的中继服务标识需要被优先使用,或者,该优先级信息用于指示层三中继机制的中继服务标识需要被优先使用。Based on the first aspect, in a possible implementation scheme, the security policy includes priority information, which is used to indicate that the relay service identifier of the layer 2 relay service needs to be used first, or the priority information is used to indicate that the relay service identifier of the layer 3 relay mechanism needs to be used first.
在本方案中,安全策略中包括优先级信息,从而可以根据优先级信息来指示是否要对侧链通信业务使用端到端的安全保护。在该优先级信息指示层二中继业务的中继服务标识需要被优先使用的情况下,该安全策略即间接指示了要对侧链通信业务优先使用端到端的安全保护。In this solution, the security policy includes priority information, so that whether to use end-to-end security protection for the side chain communication service can be indicated according to the priority information. When the priority information indicates that the relay service identifier of the layer 2 relay service needs to be used first, the security policy indirectly indicates that the end-to-end security protection should be used first for the side chain communication service.
基于第一方面,在可能的实施方案中,安全策略指示对侧链通信业务使用端到端的安全保护,第一操作包括:第一用户设备通过与第二用户设备的链接向第二用户设备发送第一测距请求,其中,第一测距请求指示测量第二用户设备与辅助设备的距离和/或角度,第一测距请求的测距结果用于确定第一用户设备与第二用户设备的距离和/或角度。Based on the first aspect, in a possible implementation scheme, the security policy indicates the use of end-to-end security protection for the side chain communication service, and the first operation includes: the first user device sends a first ranging request to the second user device through a link with the second user device, wherein the first ranging request indicates measuring the distance and/or angle between the second user device and the auxiliary device, and the ranging result of the first ranging request is used to determine the distance and/or angle between the first user device and the second user device.
在本方案中,侧链通信业务具体指测距定位业务(或者说间接侧链定位业务)。应理解,间接侧链定位业务是基于辅助设备来实现源UE与目标UE之间的测距/定位的,它可以有不同的实现方案,包括第一间接测距方案和第二间接测距方案,具体请参见说明书具体实施例部分的介绍。其中,第一间接测距方案要求源UE通过其与目标UE之间的连接向目标UE发送测距请求,进而源UE接收目标UE发送的辅助设备和目标UE之间的测距结果,由于测距结果不经过辅助设备发送,因此可以支持在第一用户设备和第二用户设备之间实现端到端的安全保护。第二间接测距方案要求源UE向辅助UE发送测距请求,进而源UE接收辅助设备发送的辅助设备和目标UE之间的测距结果,由于测距结果不经过辅助设备发送,因此不支持在第一用户设备和第二用户设备之间实现端到端的安全保护。若第一用户设备获取的安全策略指示对侧链通信业务使用端到端的安全保护,则第一用户设备确定执行的第一操作需要支持在第一用户设备和第二用户设备之间的间接测距定位业务中实现端到端的安全保护,即第一用户设备确定使用第一间接测距方案来实现其与第二用户设备之间的间接测距定位业务,进而确定执行第一间接测距方案中的源UE的相关动作,包括:第一用户设备通过与第二用户设备之间的链接向第二用户设备发送第一测距请求,以指示第二用户设备测量第二用户设备与辅助设备之间的距离和/或角度,然后第一用户设备接收第二用户设备通过上述链接发送的第二用户设备与辅助设备之间的测距结果,从而可以确定第一用户设备与第二用户设备之间 的距离和/或角度。In this solution, the sidelink communication service specifically refers to the ranging and positioning service (or indirect sidelink positioning service). It should be understood that the indirect sidelink positioning service is based on the auxiliary device to realize the ranging/positioning between the source UE and the target UE. It can have different implementation schemes, including the first indirect ranging scheme and the second indirect ranging scheme. For details, please refer to the introduction of the specific embodiments of the specification. Among them, the first indirect ranging scheme requires the source UE to send a ranging request to the target UE through the connection between it and the target UE, and then the source UE receives the ranging result between the auxiliary device and the target UE sent by the target UE. Since the ranging result is not sent through the auxiliary device, it can support end-to-end security protection between the first user equipment and the second user equipment. The second indirect ranging scheme requires the source UE to send a ranging request to the auxiliary UE, and then the source UE receives the ranging result between the auxiliary device and the target UE sent by the auxiliary device. Since the ranging result is not sent through the auxiliary device, it does not support end-to-end security protection between the first user equipment and the second user equipment. If the security policy obtained by the first user equipment indicates the use of end-to-end security protection for the sidelink communication service, the first user equipment determines that the first operation to be executed needs to support end-to-end security protection in the indirect ranging and positioning service between the first user equipment and the second user equipment, that is, the first user equipment determines to use the first indirect ranging scheme to implement the indirect ranging and positioning service between it and the second user equipment, and then determines to execute the relevant actions of the source UE in the first indirect ranging scheme, including: the first user equipment sends a first ranging request to the second user equipment through the link between the first user equipment and the second user equipment to instruct the second user equipment to measure the distance and/or angle between the second user equipment and the auxiliary device, and then the first user equipment receives the ranging result between the second user equipment and the auxiliary device sent by the second user equipment through the above link, so that the distance between the first user equipment and the second user equipment can be determined. distance and/or angle.
基于第一方面,在可能的实施方案中,在第一用户设备通过与第二用户设备的链接向第二用户设备发送第一测距请求之前,方法还包括:第一用户设备确定是否可以与第二用户设备建立链接;在第一用户设备确定可以与第二用户设备建立链接的情况下,第一用户设备通过与第二用户设备的链接向第二用户设备发送第一测距请求。Based on the first aspect, in a possible implementation scheme, before the first user equipment sends the first ranging request to the second user equipment through the link with the second user equipment, the method also includes: the first user equipment determines whether a link can be established with the second user equipment; when the first user equipment determines that a link can be established with the second user equipment, the first user equipment sends the first ranging request to the second user equipment through the link with the second user equipment.
可以理解,由于第一间接测距方案中的第一用户设备和第二用户设备需要通过它们之间的链接传递测距请求及测距结果,并且测距结果不经过辅助设备发送,因此第一间接测距方案要求第一用户设备和第二用户设备之间能够建立链接。于是,在第一用户设备通过与第二用户设备的链接向第二用户设备发送第一测距请求之前,第一用户设备需要确定其是否可以与第二用户设备建立链接。在第一用户设备确定可以与第二用户设备建立链接的情况下,第一用户设备通过与第二用户设备的链接向第二用户设备发送第一测距请求。在第一用户设备确定不可用与第二用户设备建立链接的情况下,则无法继续执行第一间接测距方案,第一间接测距方案执行失败。It can be understood that since the first user device and the second user device in the first indirect ranging scheme need to transmit the ranging request and the ranging result through the link between them, and the ranging result is not sent through the auxiliary device, the first indirect ranging scheme requires that a link can be established between the first user device and the second user device. Therefore, before the first user device sends the first ranging request to the second user device through the link with the second user device, the first user device needs to determine whether it can establish a link with the second user device. In the case where the first user device determines that a link can be established with the second user device, the first user device sends the first ranging request to the second user device through the link with the second user device. In the case where the first user device determines that it is not available to establish a link with the second user device, the first indirect ranging scheme cannot be continued, and the first indirect ranging scheme fails.
基于第一方面,在可能的实施方案中,安全策略指示不对侧链通信业务使用端到端的安全保护,第一操作包括:第一用户设备通过与辅助设备的直连链接向辅助设备发送第二测距请求,其中,第二测距请求指示测量第二用户设备与辅助设备的距离和/或角度,第二测距请求的测距结果用于确定第一用户设备与第二用户设备的距离和/或角度。Based on the first aspect, in a possible implementation scheme, the security policy indicates that end-to-end security protection is not used for the side chain communication service, and the first operation includes: the first user device sends a second ranging request to the auxiliary device through a direct link with the auxiliary device, wherein the second ranging request indicates measuring the distance and/or angle between the second user device and the auxiliary device, and the ranging result of the second ranging request is used to determine the distance and/or angle between the first user device and the second user device.
在本方案中,侧链通信业务具体指测距定位业务(或者说间接侧链定位业务)。若第一用户设备获取的安全策略指示不对侧链通信业务使用端到端的安全保护,则第一用户设备确定执行的第一操作不需要支持在第一用户设备和第二用户设备之间的间接测距定位业务中实现端到端的安全保护,即第一用户设备确定使用第二间接测距方案来实现其与第二用户设备之间的间接测距定位业务,进而确定执行第二间接测距方案中的源UE的相关动作,包括:第一用户设备通过与辅助设备之间的直连链接向辅助设备发送第二测距请求,以指示辅助设备测量第二用户设备与辅助设备之间的距离和/或角度,然后第一用户设备接收辅助设备通过上述直连链接发送的第二用户设备与辅助设备之间的测距结果,从而可以确定第一用户设备与第二用户设备之间的距离和/或角度。In this solution, the sidelink communication service specifically refers to the ranging and positioning service (or indirect sidelink positioning service). If the security policy obtained by the first user device indicates that end-to-end security protection is not used for the sidelink communication service, the first user device determines that the first operation to be performed does not need to support end-to-end security protection in the indirect ranging and positioning service between the first user device and the second user device, that is, the first user device determines to use the second indirect ranging scheme to implement the indirect ranging and positioning service between it and the second user device, and then determines to perform the relevant actions of the source UE in the second indirect ranging scheme, including: the first user device sends a second ranging request to the auxiliary device through a direct link between the auxiliary device to instruct the auxiliary device to measure the distance and/or angle between the second user device and the auxiliary device, and then the first user device receives the ranging result between the second user device and the auxiliary device sent by the auxiliary device through the above-mentioned direct link, so that the distance and/or angle between the first user device and the second user device can be determined.
基于第一方面,在可能的实施方案中,第一用户设备获取安全策略,可以包括:第一用户设备接收来自核心网网元的所述安全策略。Based on the first aspect, in a possible implementation scheme, the first user equipment obtains the security policy, which may include: the first user equipment receives the security policy from a core network element.
在本方案中,第一用户设备可以从核心网网元获取安全策略,即安全策略不是直接配置在第一用户设备上的。第一用户设备可以在需要执行侧链通信业务时/之前,向核心网网元获取安全策略,第一用户设备还可以把获得的安全策略存储在本地,以供未来有需要时直接从本地获取安全策略来使用,不再需要从核心网网元获取。In this solution, the first user equipment can obtain the security policy from the core network element, that is, the security policy is not directly configured on the first user equipment. The first user equipment can obtain the security policy from the core network element when/before the side chain communication service needs to be executed, and the first user equipment can also store the obtained security policy locally for future use when the security policy is directly obtained from the local, and no longer needs to be obtained from the core network element.
基于第一方面,在可能的实施方案中,上述核心网网元是策略管理网元、直连通信发现名称管理网元、接入管理网元或数据管理网元中的一项或多项。Based on the first aspect, in a possible implementation scheme, the core network element is one or more of a policy management network element, a direct communication discovery name management network element, an access management network element or a data management network element.
基于第一方面,在可能的实施方案中,安全策略是上述核心网网元根据第一用户设备的用户信息确定的,其中,该用户信息包括第一用户设备的用户标识、用户组标识、地理位置、网络位置中的一项或多项。Based on the first aspect, in a possible implementation scheme, the security policy is determined by the above-mentioned core network element according to the user information of the first user device, wherein the user information includes one or more of the user identifier, user group identifier, geographic location, and network location of the first user device.
也就是说,核心网网元可以根据与第一用户设备相关的一种或多种用户信息,来为第一用户设备确定安全策略。这些用户信息可以是来自第一用户设备的,也可以是来自该核心网网元或其他设备的。That is, the core network element may determine a security policy for the first user equipment according to one or more user information related to the first user equipment. The user information may be from the first user equipment, or from the core network element or other equipment.
基于第一方面,在可能的实施方案中,在第一用户设备接收来自核心网网元的安全策略之前,该方法还包括:第一用户设备向核心网网元发送上述用户信息。Based on the first aspect, in a possible implementation scheme, before the first user equipment receives the security policy from the core network element, the method further includes: the first user equipment sends the above user information to the core network element.
也就是说,第一用户设备可以主动向核心网网元发送用户信息,以便核心网网元根据该用户信息为其确定安全策略。That is to say, the first user equipment may actively send user information to the core network element so that the core network element may determine a security policy for the first user equipment according to the user information.
基于第一方面,在可能的实施方案中,第一用户设备获取安全策略,包括:第一用户设备获取在第一用户设备中存储的所述安全策略。Based on the first aspect, in a possible implementation scheme, the first user equipment obtains a security policy, including: the first user equipment obtains the security policy stored in the first user equipment.
也就是说,安全策略可以是预先存储在第一用户设备上的,可以是直接预配置在第一用户设备上的,也可以是之前从核心网网元获取而存储在本地的。第一用户设备在需要执行侧链通信业务时,便可以直接从本地获取安全策略以确定后续操作。That is, the security policy may be pre-stored on the first user device, may be directly pre-configured on the first user device, or may be previously obtained from a core network element and stored locally. When the first user device needs to perform a side chain communication service, it may directly obtain the security policy locally to determine subsequent operations.
第二方面,本申请提供另一种通信方法,该方法包括:第一网络设备接收第一用户设备发送的请求消息,其中,请求消息包括第一用户设备的第一用户信息;第一网络设备根据第一用户信息确定安全策略,其中,安全策略用于指示是否对侧链通信业务使用端到端的安全保护,端到端的安全保护实施在侧链通信业务对应的两个用户设备之间;第一网络设备向第一用户设备发送安全策略。 In a second aspect, the present application provides another communication method, which includes: a first network device receives a request message sent by a first user device, wherein the request message includes first user information of the first user device; the first network device determines a security policy based on the first user information, wherein the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service, and the end-to-end security protection is implemented between two user devices corresponding to the side chain communication service; the first network device sends the security policy to the first user device.
在本方案中,第一网络设备负责向用户设备发送安全策略,安全策略用于指示是否对侧链通信业务使用端到端的安全保护。当第一网络设备接收到来自第一用户设备的请求消息时,它可以根据该请求消息中携带的第一用户信息为第一用户设备确定相应的安全策略,进而发送至第一用户设备,从而第一用户设备可以根据该安全策略确定其在建立策略通信业务时采用的操作,实现了网络侧对用户设备端到端安全的灵活控制。In this solution, the first network device is responsible for sending a security policy to the user device, and the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service. When the first network device receives a request message from the first user device, it can determine the corresponding security policy for the first user device based on the first user information carried in the request message, and then send it to the first user device, so that the first user device can determine the operation it adopts when establishing the policy communication service based on the security policy, realizing flexible control of the end-to-end security of the user device on the network side.
基于第二方面,在可能的实施方案中,侧链通信业务为基于中继设备的临近服务通信业务,或者,所述侧链通信业务为基于辅助设备的测距定位业务。Based on the second aspect, in a possible implementation scheme, the side chain communication service is a proximity service communication service based on a relay device, or the side chain communication service is a ranging and positioning service based on an auxiliary device.
也就是说,侧链通信业务可以是ProSe中继通信业务,也可以是间接测距定位业务。That is to say, the side chain communication service can be a ProSe relay communication service or an indirect ranging and positioning service.
基于第二方面,在可能的实施方案中,侧链通信业务为基于中继设备的临近服务通信业务,该安全策略包括层二中继业务的中继服务标识和/或层三中继业务的中继服务标识。Based on the second aspect, in a possible implementation scheme, the side chain communication service is a proximity service communication service based on a relay device, and the security policy includes a relay service identifier of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service.
也就是说,在侧链通信业务为ProSe中继通信业务的情况下,第一网络设备发送至第一用户设备的安全策略中可以包括层二中继业务的中继服务标识和层三中继业务的中继服务标识中的一种或多种,因此,第一网络设备通过安全策略可以实现向第一用户设备配置中继服务标识的功能。还可以基于安全策略中携带的中继服务标识的类型,来间接指示是否要对侧链通信业务使用端到端的安全保护。例如,假设安全策略中仅包括中继服务标识,当安全策略中仅包括层二中继业务的中继服务标识时,该安全策略便是指示使用层二中继业务的中继服务标识来发现ProSe中继通信业务中所需的中继设备,从而间接指示了对ProSe中继通信业务要使用端到端的安全保护;当安全策略中仅包括层三中继业务的中继服务标识时,该安全策略便是指示使用层三中继业务的中继服务标识来发现ProSe中继通信业务中所需的中继设备,从而间接指示了不对ProSe中继通信业务使用端到端的安全保护。That is to say, in the case where the side chain communication service is a ProSe relay communication service, the security policy sent by the first network device to the first user device may include one or more of the relay service identifier of the layer 2 relay service and the relay service identifier of the layer 3 relay service. Therefore, the first network device can implement the function of configuring the relay service identifier to the first user device through the security policy. It is also possible to indirectly indicate whether to use end-to-end security protection for the side chain communication service based on the type of relay service identifier carried in the security policy. For example, assuming that the security policy only includes the relay service identifier, when the security policy only includes the relay service identifier of the layer 2 relay service, the security policy indicates that the relay service identifier of the layer 2 relay service is used to discover the relay device required in the ProSe relay communication service, thereby indirectly indicating that end-to-end security protection is to be used for the ProSe relay communication service; when the security policy only includes the relay service identifier of the layer 3 relay service, the security policy indicates that the relay service identifier of the layer 3 relay service is used to discover the relay device required in the ProSe relay communication service, thereby indirectly indicating that end-to-end security protection is not used for the ProSe relay communication service.
基于第二方面,在可能的实施方案中,侧链通信业务为基于中继设备的临近服务通信业务,所述安全策略包括优先级信息,其中,优先级信息用于指示层二中继业务的中继服务标识需要被优先使用,或者,优先级信息用于指示层三中继业务的中继服务标识需要被优先使用。Based on the second aspect, in a possible implementation scheme, the side chain communication service is a proximity service communication service based on a relay device, and the security policy includes priority information, wherein the priority information is used to indicate that the relay service identifier of the layer 2 relay service needs to be used first, or the priority information is used to indicate that the relay service identifier of the layer 3 relay service needs to be used first.
在本方案中,安全策略包括优先级信息,从而可以根据安全策略中的优先级信息来指示第一用户设备是否要对它所要执行侧链通信业务使用端到端的安全保护。在上述优先级信息指示层二中继业务的中继服务标识需要被优先使用的情况下,该安全策略即间接指示了要对侧链通信业务优先使用端到端的安全保护。在上述优先级信息指示层三中继业务的中继服务标识需要被优先使用的情况下,该安全策略即间接指示了对侧链通信业务不优先使用端到端的安全保护,即优先使用不支持端到端安全的层三中继机制来建立ProSe中继通信业务。In the present solution, the security policy includes priority information, so that the first user device can be indicated whether to use end-to-end security protection for the side-link communication service it is to perform based on the priority information in the security policy. When the above priority information indicates that the relay service identifier of the layer 2 relay service needs to be used first, the security policy indirectly indicates that end-to-end security protection should be used first for the side-link communication service. When the above priority information indicates that the relay service identifier of the layer 3 relay service needs to be used first, the security policy indirectly indicates that end-to-end security protection should not be used first for the side-link communication service, that is, the layer 3 relay mechanism that does not support end-to-end security should be used first to establish the ProSe relay communication service.
基于第二方面,在可能的实施方案中,第一网络设备是策略管理网元、直连通信发现名称管理网元、接入管理网元或数据管理网元中的一项或多项。Based on the second aspect, in a possible implementation scheme, the first network device is one or more of a policy management network element, a direct communication discovery name management network element, an access management network element, or a data management network element.
基于第二方面,在可能的实施方案中,第一用户信息包括第一用户设备的用户标识、用户组标识、地理位置、网络位置中的一项或多项。Based on the second aspect, in a possible implementation scheme, the first user information includes one or more of a user identifier, a user group identifier, a geographic location, and a network location of the first user device.
也就是说,第一用户设备可以向第一网络设备发送一种或多种用户信息,以便第一网络设备基于上述信息为第一用户设备确定安全策略。That is, the first user equipment may send one or more types of user information to the first network equipment, so that the first network equipment determines a security policy for the first user equipment based on the above information.
基于第二方面,在可能的实施方案中,第一网络设备根据第一用户信息确定安全策略,包括:所述第一网络设备获取第二用户信息,其中,所述第二用户信息包括所述第一用户设备的用户标识、用户组标识、地理位置、网络位置中的一项或多项;所述第一网络设备根据所述第一用户信息和所述第二用户信息确定所述安全策略。Based on the second aspect, in a possible implementation scheme, the first network device determines a security policy based on first user information, including: the first network device obtains second user information, wherein the second user information includes one or more of a user identifier, a user group identifier, a geographic location, and a network location of the first user device; the first network device determines the security policy based on the first user information and the second user information.
在本方案中,除了接收第一用户设备上传的第一用户信息,第一网络设备还可以获取第二用户信息,然后基于第一用户信息和第二用户设备来为第一用户设备确定安全策略。也就是说,用于确定安全策略的信息可以有两部分,一部分来自第一用户设备,另一部分来自于其他设备(第一网络设备或者第二网络设备)。In this solution, in addition to receiving the first user information uploaded by the first user device, the first network device can also obtain the second user information, and then determine the security policy for the first user device based on the first user information and the second user device. In other words, the information used to determine the security policy can have two parts, one part comes from the first user device, and the other part comes from other devices (the first network device or the second network device).
基于第二方面,在可能的实施方案中,第二用户信息是第一网络设备从第二网络设备获取,其中,第二网络设备是应用服务器、应用功能网元、策略管理网元、直连通信发现名称管理网元、接入管理网元或数据管理网元中的一项或多项。Based on the second aspect, in a possible implementation scheme, the second user information is obtained by the first network device from the second network device, wherein the second network device is one or more of an application server, an application function network element, a policy management network element, a direct communication discovery name management network element, an access management network element or a data management network element.
第三方面,本申请提供一种通信装置,该装置包括用于执行上述第一方面中的任一实施方案的单元或模块。In a third aspect, the present application provides a communication device, comprising a unit or module for executing any implementation scheme in the first aspect.
第四方面,本申请提供一种通信装置,该装置包括用于执行上述第二方面中的任一实施方案的单元或模块。 In a fourth aspect, the present application provides a communication device, comprising a unit or module for executing any implementation scheme in the second aspect above.
第五方面,本申请实施方案提供了一种通信装置,包括处理器和存储器;处理器和存储器可通过总线相互连接,也可以集成在一起。该处理器用于读取存储器中存储的程序代码,以使得该设备执行上述第一方面或第二方面中任一实施方案的方法。In a fifth aspect, the present application embodiment provides a communication device, including a processor and a memory; the processor and the memory may be connected to each other via a bus or may be integrated together. The processor is used to read the program code stored in the memory so that the device executes the method of any one of the embodiments of the first aspect or the second aspect above.
第六方面,本申请实施方案提供一种芯片或芯片系统,包括:处理器,用于执行上述第一方面或第二方面中任一实施方案的方法。In a sixth aspect, an embodiment of the present application provides a chip or a chip system, comprising: a processor for executing a method of any embodiment of the first aspect or the second aspect above.
第七方面,本申请实施方案提供一种计算机可读存储介质;该计算机可读存储介质用于存储上述第一方面或第二方面中的任一实施方案的方法的实现代码。In a seventh aspect, an embodiment of the present application provides a computer-readable storage medium; the computer-readable storage medium is used to store an implementation code of the method of any embodiment of the first aspect or the second aspect above.
第八方面,本申请实施方案提供了一种计算机程序(产品),该计算机程序(产品)包括程序指令,当该计算机程序产品被执行时,用于执行上述第一方面或第二方面中的任一实施方案的方法。In an eighth aspect, an embodiment of the present application provides a computer program (product), which includes program instructions. When the computer program product is executed, it is used to execute the method of any one of the embodiments of the first aspect or the second aspect above.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings required for use in the description of the embodiments will be briefly introduced below. Obviously, the drawings described below are only some embodiments of the present application. For ordinary technicians in this field, other drawings can be obtained based on these drawings without paying any creative work.
图1是本申请实施例中提供的一种5G移动通信系统的架构示意图;FIG1 is a schematic diagram of the architecture of a 5G mobile communication system provided in an embodiment of the present application;
图2是本申请实施例中提供的一种UE至UE中继通信的场景示意图;FIG2 is a schematic diagram of a scenario of UE-to-UE relay communication provided in an embodiment of the present application;
图3是本申请实施例中提供的一种建立ProSe通信的流程示意图;FIG3 is a schematic diagram of a process for establishing ProSe communication provided in an embodiment of the present application;
图4是本申请实施例中提供的一种层2的中继机制的协议栈的示意图;FIG4 is a schematic diagram of a protocol stack of a layer 2 relay mechanism provided in an embodiment of the present application;
图5是本申请实施例中提供的一种层3的中继机制的协议栈的示意图;FIG5 is a schematic diagram of a protocol stack of a layer 3 relay mechanism provided in an embodiment of the present application;
图6是本申请实施例中提供的一种测距场景的示意图;FIG6 is a schematic diagram of a ranging scenario provided in an embodiment of the present application;
图7是本申请实施例中提供的一种侧链定位场景的示意图;FIG7 is a schematic diagram of a side chain positioning scenario provided in an embodiment of the present application;
图8是本申请实施例中提供的第一间接测距方案的流程示意图;FIG8 is a schematic diagram of a flow chart of a first indirect ranging solution provided in an embodiment of the present application;
图9是本申请实施例中提供的第二间接测距方案的流程示意图;FIG9 is a schematic diagram of a flow chart of a second indirect ranging solution provided in an embodiment of the present application;
图10是本申请实施例中提供的一种通信方法的流程示意图;FIG10 is a flow chart of a communication method provided in an embodiment of the present application;
图11是本申请实施例中提供的另一种通信方法的流程示意图;FIG11 is a flow chart of another communication method provided in an embodiment of the present application;
图12是本申请实施例中提供的一种安全策略获取方法的流程示意图;FIG12 is a schematic diagram of a flow chart of a security policy acquisition method provided in an embodiment of the present application;
图13是本申请实施例中提供的另一种安全策略获取方法的流程示意图;FIG13 is a flow chart of another security policy acquisition method provided in an embodiment of the present application;
图14是本申请实施例中提供的一种通信装置的结构示意图;FIG14 is a schematic diagram of the structure of a communication device provided in an embodiment of the present application;
图15是本申请实施例中提供的另一种通信装置的结构示意图;FIG15 is a schematic diagram of the structure of another communication device provided in an embodiment of the present application;
图16是本申请实施例中提供的另一种通信装置的结构示意图。FIG16 is a schematic diagram of the structure of another communication device provided in an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本申请的一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The following will be combined with the drawings in the embodiments of the present application to clearly and completely describe the technical solutions in the embodiments of the present application. Obviously, the described embodiments are only part of the embodiments of the present application, not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by ordinary technicians in this field without creative work are within the scope of protection of this application.
需要说明的是,在本申请实施例中使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本申请。在本申请实施例和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指包含一个或多个相关联的列出项目的任意或所有可能组合。It should be noted that the terms used in the embodiments of the present application are only for the purpose of describing specific embodiments, and are not intended to limit the present application. The singular forms of "a", "said" and "the" used in the embodiments of the present application and the appended claims are also intended to include plural forms, unless the context clearly indicates other meanings. It should also be understood that the term "and/or" used herein refers to any or all possible combinations of one or more associated listed items.
还需要说明的是,本申请实施例中的用户设备(user equipment,UE)可以指手机、智能终端、车载终端、车载设备、无人机、可穿戴设备、多媒体设备或流媒体设备等,还可以指接入网设备,例如可以是基站、中继站、接入点、车载设备以及网络侧设备等,本申请实施例对此不做具体限定。It should also be noted that the user equipment (UE) in the embodiments of the present application may refer to a mobile phone, a smart terminal, a vehicle-mounted terminal, a vehicle-mounted device, a drone, a wearable device, a multimedia device or a streaming media device, etc. It may also refer to an access network device, such as a base station, a relay station, an access point, a vehicle-mounted device, and a network side device, etc. The embodiments of the present application do not make specific limitations on this.
为了便于理解本申请实施例的技术方案,下面先对本申请实施例中涉及的部分技术术语及应用场景进行介绍。In order to facilitate understanding of the technical solutions of the embodiments of the present application, some technical terms and application scenarios involved in the embodiments of the present application are first introduced below.
1、第五代(5th generation,5G)移动通信系统(简称5G系统(5G system,5GS)):1. Fifth generation (5G) mobile communication system (referred to as 5G system (5G system, 5GS)):
请参见图1,图1为5GS的架构示意图,第三代合作伙伴计划(3rd generation partnership project,3GPP)定义的5GS包括:接入网(access network,AN)和核心网(core network,CN),还可以包括终端。 Please refer to Figure 1, which is a schematic diagram of the 5GS architecture. The 5GS defined by the 3rd Generation Partnership Project (3GPP) includes: an access network (AN) and a core network (CN), and may also include terminals.
上述终端可以为具有收发功能的终端,或为可设置于该终端的芯片或芯片系统。该终端也可以称为用户设备(user equipment,UE)、接入终端、用户单元(subscriber unit)、用户站、移动站(mobile station,MS)、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置等。本申请实施例中的终端可以是手机(mobile phone)、蜂窝电话(cellular phone)、智能电话(smart phone)、平板电脑(Pad)、无线数据卡、个人数字助理电脑(personal digital assistant,PDA)、无线调制解调器(modem)、手持设备(handset)、膝上型电脑(laptop computer)、机器类型通信(machine type communication,MTC)终端、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端、增强现实(augmented reality,AR)终端、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、无人机(uncrewed aerial vehicle)、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、车载终端、车载设备、具有终端功能的路边单元(road side unit,RSU)、可穿戴设备、多媒体设备、流媒体设备等。本申请的终端还可以是作为一个或多个部件或者单元而内置于车辆的车载模块、车载模组、车载部件、车载芯片或者车载单元。The above-mentioned terminal may be a terminal with a transceiver function, or a chip or chip system that can be set in the terminal. The terminal may also be called a user equipment (UE), an access terminal, a subscriber unit, a user station, a mobile station (MS), a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, a wireless communication device, a user agent or a user device, etc. The terminal in the embodiment of the present application may be a mobile phone, a cellular phone, a smart phone, a tablet computer, a wireless data card, a personal digital assistant (PDA), a wireless modem, a handheld device, a laptop computer, a machine type communication (MTC) terminal, a computer with a wireless transceiver function, a virtual reality (VR) terminal, an augmented reality (A The terminal of the present application may also be a vehicle-mounted module, a vehicle-mounted module group, a vehicle-mounted component, a vehicle-mounted chip or a vehicle-mounted unit built into a vehicle as one or more components or units.
上述AN用于实现接入有关的功能,可以为特定区域的授权用户提供入网功能,并能够根据用户的级别,业务的需求等确定不同质量的传输链路以传输用户数据。AN在终端与CN之间转发控制信号和用户数据。AN可以包括:接入网设备,也可以称为无线接入网设备(radio access network,RAN)设备。CN主要负责维护移动网络的签约数据,为终端提供会话管理、移动性管理、策略管理以及安全认证等功能。CN主要包括如下:用户面功能(user plane function,UPF)、鉴权服务器功能(authentication server function,AUSF)、接入和移动性管理功能(access and mobility management function,AMF)、会话管理功能(session management function,SMF)、网络切片选择功能(network slice selection function,NSSF)、网络开放功能(network exposure function,NEF)、网络存储功能(network repository function,NRF)、策略控制功能(policy control function,PCF)、统一数据管理(unified data management,UDM)、统一数据存储(unified data repository,UDR)、以及应用功能(application function,AF)。The above-mentioned AN is used to implement access-related functions, and can provide network access functions for authorized users in a specific area, and can determine transmission links of different qualities to transmit user data according to the user level, business requirements, etc. AN forwards control signals and user data between the terminal and CN. AN can include: access network equipment, also known as radio access network (RAN) equipment. CN is mainly responsible for maintaining the subscription data of the mobile network and providing terminal with session management, mobility management, policy management, and security authentication functions. CN mainly includes the following: user plane function (UPF), authentication server function (AUSF), access and mobility management function (AMF), session management function (SMF), network slice selection function (NSSF), network exposure function (NEF), network repository function (NRF), policy control function (PCF), unified data management (UDM), unified data storage (UDR), and application function (AF).
如图1所示,UE通过RAN设备接入5G网络,UE通过N1接口(简称N1)与AMF通信;RAN通过N2接口(简称N2)与AMF通信;RAN通过N3接口(简称N3)与UPF通信;SMF通过N4接口(简称N4)与UPF通信,UPF通过N6接口(简称N6)接入数据网络(data network,DN)。此外,图1所示的AUSF、AMF、SMF、NSSF、NEF、NRF、PCF、UDM、UDR或者AF等控制面功能采用服务化接口进行交互。比如,AUSF对外提供的服务化接口包括Nausf;AMF对外提供的服务化接口包括Namf;SMF对外提供的服务化接口包括Nsmf;NSSF对外提供的服务化接口包括Nnssf;NEF对外提供的服务化接口包括Nnef;NRF对外提供的服务化接口包括Nnrf;PCF对外提供的服务化接口包括Npcf;UDM对外提供的服务化接口包括Nudm;UDR对外提供的服务化接口包括Nudr;AF对外提供的服务化接口包括Naf。As shown in Figure 1, the UE accesses the 5G network through the RAN device, and the UE communicates with the AMF through the N1 interface (referred to as N1); the RAN communicates with the AMF through the N2 interface (referred to as N2); the RAN communicates with the UPF through the N3 interface (referred to as N3); the SMF communicates with the UPF through the N4 interface (referred to as N4), and the UPF accesses the data network (DN) through the N6 interface (referred to as N6). In addition, the control plane functions such as AUSF, AMF, SMF, NSSF, NEF, NRF, PCF, UDM, UDR or AF shown in Figure 1 interact using service-oriented interfaces. For example, the service-oriented interface provided by AUSF includes Nausf; the service-oriented interface provided by AMF includes Namf; the service-oriented interface provided by SMF includes Nsmf; the service-oriented interface provided by NSSF includes Nnssf; the service-oriented interface provided by NEF includes Nnef; the service-oriented interface provided by NRF includes Nnrf; the service-oriented interface provided by PCF includes Npcf; the service-oriented interface provided by UDM includes Nudm; the service-oriented interface provided by UDR includes Nudr; the service-oriented interface provided by AF includes Naf.
RAN设备可以是为UE提供接入的设备。例如,RAN设备可以包括:下一代移动通信系统,例如6G的接入网设备,例如6G基站,或者在下一代移动通信系统中,该网络设备也可以有其他命名方式,其均涵盖在本申请实施例的保护范围以内,本申请对此不做任何限定。或者,RAN设备也可以包括5G,如新空口(new radio,NR)系统中的gNB,或,5G中的基站的一个或一组(包括多个天线面板)天线面板,或者,还可以为构成gNB、传输点(transmission and reception point,TRP或者transmission point,TP)或传输测量功能(transmission measurement function,TMF)的网络节点,如基带单元(building base band unit,BBU),或,集中单元(centralized unit,CU)或分布单元(distributed unit,DU)、具有基站功能的RSU,或者有线接入网关,或者5G的核心网。或者,RAN设备还可以包括无线保真(wireless fidelity,WiFi)系统中的接入点(access point,AP),无线中继节点、无线回传节点、各种形式的宏基站、微基站(也称为小站)、中继站、接入点、可穿戴设备、车载设备等等。The RAN device may be a device that provides access to the UE. For example, the RAN device may include: a next-generation mobile communication system, such as an access network device of 6G, such as a 6G base station, or in the next-generation mobile communication system, the network device may also have other naming methods, which are all included in the protection scope of the embodiments of the present application, and the present application does not make any restrictions on this. Alternatively, the RAN device may also include 5G, such as a gNB in a new radio (NR) system, or one or a group of antenna panels (including multiple antenna panels) of a base station in 5G, or a network node constituting a gNB, a transmission point (transmission and reception point, TRP or transmission point, TP) or a transmission measurement function (transmission measurement function, TMF), such as a baseband unit (building base band unit, BBU), or a centralized unit (centralized unit, CU) or a distributed unit (distributed unit, DU), an RSU with base station function, or a wired access gateway, or a 5G core network. Alternatively, RAN equipment may also include access points (APs) in wireless fidelity (WiFi) systems, wireless relay nodes, wireless backhaul nodes, various forms of macro base stations, micro base stations (also called small stations), relay stations, access points, wearable devices, vehicle-mounted devices, and so on.
UPF主要负责用户数据处理(包括转发、接收、计费等)。例如,UPF可以接收来自数据网络(data network,DN)的用户数据,通过接入网设备向UE转发该用户数据。UPF也可以通过接入网设备接收来自UE的用户数据,并向DN转发该用户数据。DN指的是为用户提供数据传输服务的运营商网络。例如网际互连协议(internet protocol,IP)、多媒体业务(IP multi-media srvice,IMS)、互联网(internet)等。DN可以为运营商外部网络,也可以为运营商控制的网络,用于向UE提供业务服务。在协议数据单元(protocol data unit,PDU)会话中,通过N6与DN直接相连的UPF,也称为协议数据单元会话锚点(protocol data unit Session Anchor,PSA)。UPF is mainly responsible for user data processing (including forwarding, receiving, billing, etc.). For example, UPF can receive user data from the data network (DN) and forward the user data to the UE through the access network equipment. UPF can also receive user data from the UE through the access network equipment and forward the user data to the DN. DN refers to the operator network that provides data transmission services to users. For example, Internet protocol (IP), multimedia service (IMS), Internet, etc. DN can be an operator's external network or a network controlled by an operator, used to provide business services to the UE. In the protocol data unit (PDU) session, the UPF directly connected to the DN through N6 is also called the protocol data unit session anchor (PSA).
AUSF主要用于执行UE的安全认证。 AUSF is mainly used to perform security authentication of UE.
AMF主要用于移动网络中的移动性管理。例如用户位置更新、用户注册网络、用户切换等。AMF is mainly used for mobility management in mobile networks, such as user location update, user network registration, user switching, etc.
SMF主要用于移动网络中的会话管理。例如会话建立、修改、释放。具体功能例如为用户分配互联网协议(internet protocol,IP)地址,选择提供数据包转发功能的UPF等。SMF is mainly used for session management in mobile networks, such as session establishment, modification, and release. Specific functions include allocating Internet Protocol (IP) addresses to users and selecting UPFs that provide data packet forwarding functions.
PCF主要支持提供统一的策略框架来控制网络行为,提供策略规则给控制层网络功能,同时负责获取与策略决策相关的用户签约信息。PCF可以向AMF、SMF等提供策略,如服务质量(quality of service,QoS)策略、切片选择策略等。在一些实施例中,PCF可以为具有临近服务(proximity services,ProSe)功能的UE提供ProSe服务使用的策略,PCF也可以为具有测距/定位服务功能的UE提供测距/定位服务使用的策略。PCF mainly supports providing a unified policy framework to control network behavior, provides policy rules to the control layer network functions, and is responsible for obtaining user subscription information related to policy decisions. PCF can provide policies to AMF, SMF, etc., such as quality of service (QoS) policy, slice selection policy, etc. In some embodiments, PCF can provide a UE with proximity services (ProSe) function with a policy for ProSe service use, and PCF can also provide a UE with ranging/positioning service function with a policy for ranging/positioning service use.
NSSF主要用于为UE选择网络切片。NSSF is mainly used to select network slices for UE.
NEF主要用于支持能力和事件的开放。例如,NEF可以将5G网络的一些能力通过应用程序接口(application program interface,API)开放给第三方应用,第三方应用通过AF调用NEF提供的API获得5G网络的一些能力,使得第三方应用可以对5G网络和UE的某些行为进行控制。NEF is mainly used to support the opening of capabilities and events. For example, NEF can open some capabilities of the 5G network to third-party applications through the application program interface (API). Third-party applications obtain some capabilities of the 5G network by calling the API provided by NEF through AF, so that third-party applications can control certain behaviors of the 5G network and UE.
UDM主要用于存储用户数据,例如签约数据、鉴权/授权数据等。UDM is mainly used to store user data, such as contract data, authentication/authorization data, etc.
UDR主要用于存储结构化数据,存储的内容可以包括签约数据和策略数据、对外暴露的结构化数据和应用相关的数据等。UDR is mainly used to store structured data, which may include contract data and policy data, externally exposed structured data, and application-related data.
AF主要支持与CN交互来提供服务,例如影响数据路由决策、策略控制功能或者向网络侧提供第三方的一些服务。AF mainly supports interaction with CN to provide services, such as influencing data routing decisions, policy control functions, or providing some third-party services to the network side.
可以理解,本申请实施例提到的功能也可以表述为功能网元或功能实体,例如UPF可以表述为UPF网元、AMF可以表述为AMF网元、SMF可以表述为SMF网元、PCF可以表述为PCF网元等等,以此类推,不做限定。It can be understood that the functions mentioned in the embodiments of the present application can also be expressed as functional network elements or functional entities. For example, UPF can be expressed as UPF network element, AMF can be expressed as AMF network element, SMF can be expressed as SMF network element, PCF can be expressed as PCF network element, and so on, without limitation.
2、近距离通信:2. Short distance communication:
随着移动通信的高速发展,新业务类型,如视频聊天、虚拟现实(virtual reality,VR)、增强现实(augmented AR)等数据业务的普遍应用,提高了用户对带宽的需求。对此,近距离通信,例如设备到设备(device-to-device,D2D)通信是一种解决方案。With the rapid development of mobile communications, the widespread application of new business types, such as video chat, virtual reality (VR), augmented reality (AR) and other data services, has increased users' demand for bandwidth. In this regard, short-range communication, such as device-to-device (D2D) communication, is a solution.
D2D通信允许UE之间直接进行通信,例如通过PC5接口进行通信(UE直接通过PC5接口进行直连的链路也称为侧链(sidelink,SL)),可以实现数据面和控制面的信息传输。这样,用户在小区(cell)网络的控制下便可与其他小区用户共享频谱资源,有效提高频谱资源的利用率。D2D通信包括:一对多通信(one to many communication),以及一对一通信(one to one communication)。一对多通信通常对应于组播和广播通信,一对一通信通常对应于单播通信。在一对一通信中,若发送方UE与接收方UE在近距离范围内,通过相互发现后可以直接通信。D2D communication allows UEs to communicate directly with each other, for example, through the PC5 interface (the link that the UE directly connects through the PC5 interface is also called the sidelink (SL)), which can realize the information transmission of the data plane and the control plane. In this way, users can share spectrum resources with other cell users under the control of the cell network, effectively improving the utilization rate of spectrum resources. D2D communication includes: one-to-many communication and one-to-one communication. One-to-many communication usually corresponds to multicast and broadcast communication, and one-to-one communication usually corresponds to unicast communication. In one-to-one communication, if the sending UE and the receiving UE are in a close range, they can communicate directly after discovering each other.
3、临近业务(proximity-based services,ProSe)通信:3. Proximity-based services (ProSe) communications:
ProSe通信又称为近距离业务通信,是D2D通信中的一种典型业务场景。ProSe通信可以包含临近业务直接通信(简称ProSe直接通信)、临近业务UE到UE中继通信(简称ProSe U2U中继通信)和临近业务UE到网络中继通信(简称ProSe U2N中继通信)。以ProSe U2N中继通信场景为例,如图2所示,在源UE(source UE)需要与目标UE(target UE)进行ProSe通信传输数据的情况下,如果源UE因为距离过远或信号强度弱等原因无法建立到目标UE的ProSe直接通信链接,则源UE可以通过UE到UE中继(UE-to-UE relay)(记为中继UE)的辅助,与目标UE建立UE到UE中继通信连接(简称U2U中继连接),从而可以实现ProSe U2U中继通信。为了便于描述,ProSe U2U中继通信后文简称为ProSe中继通信。ProSe communication, also known as short-range service communication, is a typical service scenario in D2D communication. ProSe communication can include proximity service direct communication (referred to as ProSe direct communication), proximity service UE-to-UE relay communication (referred to as ProSe U2U relay communication), and proximity service UE-to-network relay communication (referred to as ProSe U2N relay communication). Taking the ProSe U2N relay communication scenario as an example, as shown in Figure 2, when the source UE (source UE) needs to transmit data with the target UE (target UE) through ProSe communication, if the source UE cannot establish a ProSe direct communication link to the target UE due to reasons such as too far distance or weak signal strength, the source UE can establish a UE-to-UE relay communication connection (referred to as U2U relay connection) with the target UE through the assistance of a UE-to-UE relay (referred to as a relay UE), thereby realizing ProSe U2U relay communication. For the sake of ease of description, ProSe U2U relay communication is hereinafter referred to as ProSe relay communication.
请参见图3,图3为本申请提供的一种建立ProSe通信的流程示意图,包括如下步骤:Please refer to FIG. 3 , which is a schematic diagram of a process for establishing ProSe communication provided by the present application, including the following steps:
S301:ProSe UE获取ProSe参数。S301: ProSe UE obtains ProSe parameters.
ProSe参数为用于实现ProSe通信的参数。ProSe参数可以包括ProSe策略(ProSe policy)。ProSe策略可用于指示源UE通过中继UE接入目标UE的机制(简称接入机制),接入机制可以包括如下至少一项:层二(也可称为层2、layer 2、L2)的中继机制(L2relay)、层三(也可称为层3、layer3、L3)的中继机制(L3relay)。应理解,在本申请实施例中,层2的中继机制也可以称作层2中继机制或层2中继业务,层3的中继机制也可以称作层3中继机制或层3中继业务。ProSe parameters are parameters used to implement ProSe communication. ProSe parameters may include ProSe policy. ProSe policy may be used to indicate a mechanism (referred to as access mechanism) for source UE to access target UE through relay UE, and access mechanism may include at least one of the following: layer 2 (also referred to as layer 2, layer 2, L2) relay mechanism (L2relay), layer 3 (also referred to as layer 3, layer3, L3) relay mechanism (L3relay). It should be understood that in the embodiment of the present application, the layer 2 relay mechanism may also be referred to as layer 2 relay mechanism or layer 2 relay service, and the layer 3 relay mechanism may also be referred to as layer 3 relay mechanism or layer 3 relay service.
如图4所示,图4为层2的中继机制的协议栈的示意图,其中涉及的协议层包括:因特网协议(internet protocol,IP)协议层、业务数据适配协议(service data adaptation protocol,SDAP)层、分组数据汇聚协 议(packet data convergence protocol,PDCP)层、适配层(adaptation layer,Adapt)、无线链路层控制协议(radio link control,RLC)层、媒体介入控制层(media access control,MAC)层和物理层(physical layer,PHY)层。层2的中继机制是源UE通过层2的中继设备接入目标UE的机制。此时,源UE和目标UE之间的安全为端到端(end-to-end,E2E)的建立在源UE的PDCP层和目标UE的PDCP层之间。中继设备基于ADAPT层中的信息确定如何将源UE的信息转发给目标UE,而不会解析PDCP层(负责对上层信息进行加密等功能),因此中继设备透传源UE和目标UE的PDCP层及PDCP层的上层信息,如源UE与目标UE的单播连接建立控制面信令或PC5单播的用户面数据等。需要额外说明的是,在层2的中继机制中,源UE和中继UE可以建立直连链接,中继UE和目标UE可以建立直连链接,源UE和目标UE可建立直连链接。As shown in FIG4 , FIG4 is a schematic diagram of the protocol stack of the layer 2 relay mechanism, wherein the protocol layers involved include: Internet protocol (internet protocol, IP) protocol layer, service data adaptation protocol (service data adaptation protocol, SDAP) layer, packet data convergence protocol The relay mechanism of layer 2 is a mechanism for the source UE to access the target UE through the relay device of layer 2. At this time, the security between the source UE and the target UE is end-to-end (E2E) and is established between the PDCP layer of the source UE and the PDCP layer of the target UE. The relay device determines how to forward the information of the source UE to the target UE based on the information in the ADAPT layer, and will not parse the PDCP layer (responsible for encrypting the upper layer information, etc.). Therefore, the relay device transparently transmits the PDCP layer of the source UE and the target UE and the upper layer information of the PDCP layer, such as the control plane signaling for the unicast connection between the source UE and the target UE or the user plane data of PC5 unicast. It should be additionally explained that, in the layer 2 relay mechanism, the source UE and the relay UE can establish a direct link, the relay UE and the target UE can establish a direct link, and the source UE and the target UE can establish a direct link.
如图5所示,图5为层3的中继机制的协议栈的示意图,层3的中继机制是源UE通过层3的中继设备接入目标UE的机制。此时,源UE和目标UE之间的安全为分段建立,包括从源UE的PDCP层到中继设备的PDCP层的安全,以及从中继设备的PDCP层到目标UE的PDCP层的安全。中继设备需要解析PDCP层,以确定如何向目标UE转发控制面信令和用户面数据。需要额外说明的是,在层3的中继机制中,源UE和中继UE可以建立直连链接,中继UE和目标UE可以建立直连链接,但源UE和目标UE仅可建立链接,而非直连链接。可以看出,层2的中继机制和层3的中继机制都要求源UE和中继UE、中继UE和目标UE建立直连链接,但是相对于层3的中继机制,层2的中继机制还要额外建立源UE和目标UE的直连链接,因此,相对于采用层3的中继机制实现ProSe中继通信业务,采用层2的中继机制来实现ProSe中继通信业务需要建立更多的直连链接,整体的链接建立速度会更慢、从触发ProSe中继通信业务到建立起ProSe中继通信的时间会更长、效率更低,并且会占用用户设备更多的资源。需要说明的是,在层2的中继机制中,源UE可以称为5G ProSe层2的中继机制的源UE、ProSe层2源UE或层2源UE。类似的,在层3的中继机制中,源UE可以称为5G ProSe层3的中继机制的源UE、ProSe层3源UE或层3源UE。同理,在层2的中继机制中,中继设备(中继UE)可以称为5G ProSe层2的中继机制的中继UE、ProSe层2的中继UE、或层2的中继UE。类似的,在层3的中继机制中,中继设备(中继UE)可以称为5G ProSe层3的中继机制的中继UE、ProSe层3的中继UE、或层3的中继UE。As shown in Figure 5, Figure 5 is a schematic diagram of the protocol stack of the layer 3 relay mechanism. The layer 3 relay mechanism is a mechanism for the source UE to access the target UE through the layer 3 relay device. At this time, the security between the source UE and the target UE is established in segments, including the security from the PDCP layer of the source UE to the PDCP layer of the relay device, and the security from the PDCP layer of the relay device to the PDCP layer of the target UE. The relay device needs to parse the PDCP layer to determine how to forward control plane signaling and user plane data to the target UE. It should be additionally explained that in the layer 3 relay mechanism, the source UE and the relay UE can establish a direct link, and the relay UE and the target UE can establish a direct link, but the source UE and the target UE can only establish a link, not a direct link. It can be seen that both the layer 2 relay mechanism and the layer 3 relay mechanism require the source UE and the relay UE, and the relay UE and the target UE to establish direct links. However, compared with the layer 3 relay mechanism, the layer 2 relay mechanism also needs to establish additional direct links between the source UE and the target UE. Therefore, compared with the layer 3 relay mechanism to implement the ProSe relay communication service, the layer 2 relay mechanism to implement the ProSe relay communication service requires more direct links to be established, and the overall link establishment speed will be slower, the time from triggering the ProSe relay communication service to establishing the ProSe relay communication will be longer, the efficiency will be lower, and more resources of the user equipment will be occupied. It should be noted that in the layer 2 relay mechanism, the source UE can be called the source UE of the 5G ProSe layer 2 relay mechanism, the ProSe layer 2 source UE, or the layer 2 source UE. Similarly, in the layer 3 relay mechanism, the source UE can be called the source UE of the 5G ProSe layer 3 relay mechanism, the ProSe layer 3 source UE, or the layer 3 source UE. Similarly, in the layer 2 relay mechanism, the relay device (relay UE) can be called the relay UE of the 5G ProSe layer 2 relay mechanism, the ProSe layer 2 relay UE, or the layer 2 relay UE. Similarly, in the layer 3 relay mechanism, the relay device (relay UE) can be called the relay UE of the 5G ProSe layer 3 relay mechanism, the ProSe layer 3 relay UE, or the layer 3 relay UE.
ProSe策略可用于指示建立PC5连接的机制(记为PC5连接机制),以及上述接入机制。例如,ProSe策略可以包括中继服务代码(relay service code,RSC),RSC可以用于指示PC5连接机制和接入机制。其中,中继服务代码也可称作中继服务标识。The ProSe policy may be used to indicate a mechanism for establishing a PC5 connection (referred to as a PC5 connection mechanism) and the above-mentioned access mechanism. For example, the ProSe policy may include a relay service code (RSC), which may be used to indicate a PC5 connection mechanism and an access mechanism. The relay service code may also be referred to as a relay service identifier.
可选的,ProSe UE获取的ProSe参数可以有不同来源。例如,ProSe UE可以从PCF获取ProSe参数,记为ProSe参数1。针对ProSe策略,ProSe UE可以向AMF发送5G ProSe策略配置请求(5G ProSe provisioning request)消息,5G ProSe策略配置请求消息可以包括指示5G ProSe的UE至UE中继通信能力(ability)的信息,例如,ProSe UE有作为层2的源UE或目标UE的中继通信能力,和/或,ProSe UE有作为层3的源UE或目标UE的中继通信能力。ProSe UE有作为层2的源UE或目标UE的中继通信能力是指:该UE支持采用层2的中继机制与另一ProSe UE通过中继UE进行通信。ProSe UE有作为层3的源UE或目标UE的中继通信能力是指:该UE支持采用层3的中继机制与另一ProSe UE通过中继UE进行通信。再如,ProSe UE有作为层2的中继UE的中继通信能力,和/或,ProSe UE有作为层3的中继UE的中继通信能力。ProSe UE有作为层2的中继UE的中继通信能力是指:该UE支持采用层2的中继机制中继源UE与目标UE之间的通信。ProSe UE有作为层3的中继UE的中继通信能力是指:该UE支持采用层3的中继机制中继源UE与目标UE之间的通信。AMF可以从UDM获取ProSe UE的ProSe签约信息,并根据ProSe UE的ProSe签约信息,确定该ProSe UE(是否)有5G ProSe的UE至UE中继通信能力。如此,AMF可以向发送PCF发送5G ProSe策略配置请求消息,从而让PCF通过UE配置更新(UE configuration update,UCU)流程向ProSe UE发送ProSe策略。Optionally, the ProSe parameters obtained by the ProSe UE may have different sources. For example, the ProSe UE may obtain the ProSe parameters from the PCF, which are recorded as ProSe parameters 1. For the ProSe policy, the ProSe UE may send a 5G ProSe policy configuration request message to the AMF, and the 5G ProSe policy configuration request message may include information indicating the UE-to-UE relay communication capability (ability) of 5G ProSe, for example, the ProSe UE has the relay communication capability as a source UE or target UE of layer 2, and/or, the ProSe UE has the relay communication capability as a source UE or target UE of layer 3. The ProSe UE has the relay communication capability as a source UE or target UE of layer 2, which means that the UE supports the use of the relay mechanism of layer 2 to communicate with another ProSe UE through the relay UE. The ProSe UE has the relay communication capability as a source UE or target UE of layer 3, which means that the UE supports the use of the relay mechanism of layer 3 to communicate with another ProSe UE through the relay UE. For another example, the ProSe UE has the relay communication capability as a layer 2 relay UE, and/or the ProSe UE has the relay communication capability as a layer 3 relay UE. The relay communication capability of the ProSe UE as a layer 2 relay UE means that the UE supports the use of the layer 2 relay mechanism to relay the communication between the source UE and the target UE. The relay communication capability of the ProSe UE as a layer 3 relay UE means that the UE supports the use of the layer 3 relay mechanism to relay the communication between the source UE and the target UE. The AMF can obtain the ProSe subscription information of the ProSe UE from the UDM, and determine whether the ProSe UE has the UE-to-UE relay communication capability of 5G ProSe according to the ProSe subscription information of the ProSe UE. In this way, the AMF can send a 5G ProSe policy configuration request message to the sending PCF, so that the PCF sends the ProSe policy to the ProSe UE through the UE configuration update (UCU) process.
ProSe UE可以从ProSe应用服务器获取ProSe参数,记为ProSe参数2。The ProSe UE can obtain the ProSe parameters from the ProSe application server, which are recorded as ProSe parameters 2.
ProSe UE也可以从ProSe UE的通用集成电路卡(universal integrated circuit card,UICC)获取ProSe参数,记为ProSe参数3。ProSe UE can also obtain ProSe parameters from the universal integrated circuit card (UICC) of ProSe UE, which is recorded as ProSe parameter 3.
ProSe UE还可以从ProSe UE的移动设备(mobile equipment,ME)获取ProSe参数,记为ProSe参数4。The ProSe UE can also obtain ProSe parameters from the ProSe UE's mobile equipment (ME), which is recorded as ProSe parameter 4.
可选的,不同来源的ProSe参数可以具有不同的优先级。例如,ProSe参数的使用优先级从高到低依次为:ProSe参数1、ProSe参数2、ProSe参数3、以及ProSe参数4。ProSe UE可以根据ProSe参数的使用优先级从高至低的顺序,确定使用哪一种ProSe参数,记为目标ProSe参数。在需要进行ProSe通信的 情况下,ProSe UE可以根据目标ProSe参数,确定使用哪一种PC5连接机制和接入机制。Optionally, ProSe parameters from different sources may have different priorities. For example, the use priorities of ProSe parameters are from high to low: ProSe parameter 1, ProSe parameter 2, ProSe parameter 3, and ProSe parameter 4. The ProSe UE may determine which ProSe parameter to use according to the use priorities of the ProSe parameters from high to low, and record it as the target ProSe parameter. In this case, the ProSe UE can determine which PC5 connection mechanism and access mechanism to use based on the target ProSe parameters.
S302:ProSe UE执行ProSe发现。S302: ProSe UE performs ProSe discovery.
ProSe发现用于源UE与中继UE之间相互发现,或中继UE与目标UE之间相互发现。TS 23.304定义了ProSe发现的2种发现模式,包括:模式A(model A)和模式B(model B)。ProSe discovery is used for mutual discovery between source UE and relay UE, or between relay UE and target UE. TS 23.304 defines two discovery modes of ProSe discovery, including: model A and model B.
在模式A中,交互的UE包括:播报方UE(announcing UE)和监听方UE(monitoring UE)。播报方UE在获得ProSe参数后,可以主动广播用于发现特定ProSe业务(如视频聊天、AR、VR)的发现请求。监听方UE在获得ProSe参数后,可以主动监听用于发现特定ProSe业务的发现请求。如此,监听方UE在接收到播报方UE广播的发现请求后,可以确定播报方UE广播的发现请求中所指示的特定ProSe业务是否符合自身的需求,从而确定是否继续后续流程。In mode A, the interacting UEs include: announcing UE and monitoring UE. After obtaining the ProSe parameters, the announcing UE can actively broadcast a discovery request for discovering specific ProSe services (such as video chat, AR, VR). After obtaining the ProSe parameters, the monitoring UE can actively monitor the discovery request for discovering specific ProSe services. In this way, after receiving the discovery request broadcast by the announcing UE, the monitoring UE can determine whether the specific ProSe service indicated in the discovery request broadcast by the announcing UE meets its own needs, thereby determining whether to continue the subsequent process.
在模式A中,ProSe发现场景下的播报方UE可以是中继UE,监听方UE可以是源UE。中继UE可以广播发现广播(discovery announcing)消息,发现广播消息可以包括中继UE支持的RSC。源UE接收到发现广播消息后,可以确定发现广播消息中包括的RSC是否为ProSe通信需要使用的RSC(假设需要使用的是RSC1)。如果发现广播消息中携带的是RSC1,源UE确定RSC1是它自身要实现的ProSe通信所需要使用的RSC,则针对该中继设备继续执行后续步骤。如果发现广播消息中携带的是RSC2,源UE确定RSC2不是ProSe通信所需要使用的RSC,则不针对该中继设备执行后续步骤。In mode A, the announcing UE in the ProSe discovery scenario may be a relay UE, and the listening UE may be a source UE. The relay UE may broadcast a discovery announcing message, and the discovery broadcast message may include the RSC supported by the relay UE. After receiving the discovery broadcast message, the source UE may determine whether the RSC included in the discovery broadcast message is the RSC required for ProSe communication (assuming that RSC1 is required). If the discovery broadcast message carries RSC1, the source UE determines that RSC1 is the RSC required for the ProSe communication to be implemented by itself, and then continues to perform subsequent steps for the relay device. If the discovery broadcast message carries RSC2, the source UE determines that RSC2 is not the RSC required for ProSe communication, and then does not perform subsequent steps for the relay device.
在模式B中,交互的UE包括:发现者UE(discoveree UE)和被发现者UE(discoverer UE)。发现者UE在获得ProSe参数后,可以主动广播用于发现特定ProSe业务的发现请求。被发现者UE在获得ProSe参数后,可以主动监听用于发现特定ProSe业务的发现请求。如此,被发现者UE在接收到发现者UE广播的发现请求后,可以确定自身是否发现请求中指示的特定ProSe业务。如果被发现者UE支持发现广播消息中指示的ProSe业务,则被发现者UE响应发现者UE广播的发现请求,否则,被发现者UE不响应发现者UE广播的发现请求。如果发现者UE接收到来自被发现者UE的响应,则发现者UE可以继续执行后续步骤,否则流程结束。In mode B, the interacting UEs include: discoveree UE and discoverer UE. After obtaining the ProSe parameters, the discoverer UE can actively broadcast a discovery request for discovering a specific ProSe service. After obtaining the ProSe parameters, the discoverer UE can actively listen to the discovery request for discovering a specific ProSe service. In this way, after receiving the discovery request broadcast by the discoverer UE, the discoverer UE can determine whether it has discovered the specific ProSe service indicated in the request. If the discoverer UE supports the ProSe service indicated in the discovery broadcast message, the discoverer UE responds to the discovery request broadcast by the discoverer UE, otherwise, the discoverer UE does not respond to the discovery request broadcast by the discoverer UE. If the discoverer UE receives a response from the discoverer UE, the discoverer UE can continue to perform subsequent steps, otherwise the process ends.
在模式B中,被发现者UE可以是中继UE,发现者UE可以是源UE或目标UE。源UE或目标UE可以广播发现请求(discovery request)消息,发现请求消息可以包括ProSe通信需要使用的RSC,假设是RSC1或RSC4。中继UE接收到发现请求消息后,可以确定中继UE是否支持RSC1或RSC4。如果中继UE确定支持RSC1或RSC4,则中继UE可以响应源UE或目标UE,发送发现响应(discovery response)消息,用以指示中继UE支持RSC1或RSC4,否则,中继UE不向源UE或目标UE做出响应。对于源UE或目标UE而言,如果源UE或目标UE接收到发现响应消息,则可以继续执行后续步骤,否则,流程结束。In mode B, the discoverer UE may be a relay UE, and the discoverer UE may be a source UE or a target UE. The source UE or the target UE may broadcast a discovery request message, and the discovery request message may include the RSC required for ProSe communication, assuming it is RSC1 or RSC4. After receiving the discovery request message, the relay UE may determine whether the relay UE supports RSC1 or RSC4. If the relay UE determines that it supports RSC1 or RSC4, the relay UE may respond to the source UE or the target UE and send a discovery response message to indicate that the relay UE supports RSC1 or RSC4, otherwise, the relay UE does not respond to the source UE or the target UE. For the source UE or the target UE, if the source UE or the target UE receives the discovery response message, it may continue to execute the subsequent steps, otherwise, the process ends.
S303:源UE通过中继UE与目标UE建立UE至UE中继连接。S303: The source UE establishes a UE-to-UE relay connection with the target UE via the relay UE.
在层2的中继机制中,源UE可以通过PC5连接机制与中继UE建立PC5连接,中继UE可以通过PC5连接机制与目标UE建立PC5连接,然后源UE可以通过PC5连接机制与目标UE建立PC5连接。具体实现原理可以参考步骤S301中的相关介绍,此处不赘述。在层3的中继机制中,源UE可以通过PC5连接机制与中继UE建立PC5连接,中继UE可以通过PC5连接机制与目标UE建立PC5连接。In the relay mechanism of layer 2, the source UE can establish a PC5 connection with the relay UE through the PC5 connection mechanism, the relay UE can establish a PC5 connection with the target UE through the PC5 connection mechanism, and then the source UE can establish a PC5 connection with the target UE through the PC5 connection mechanism. The specific implementation principle can refer to the relevant introduction in step S301, which is not repeated here. In the relay mechanism of layer 3, the source UE can establish a PC5 connection with the relay UE through the PC5 connection mechanism, and the relay UE can establish a PC5 connection with the target UE through the PC5 connection mechanism.
S304:源UE通过中继UE与目标UE进行Prose U2U中继通信。S304: The source UE performs Prose U2U relay communication with the target UE through the relay UE.
具体的,源UE可以使用前述的接入机制,通过中继UE与目标UE进行Prose U2U中继通信,具体实现原理可以参考前文相关介绍,这里不再赘述。Specifically, the source UE can use the aforementioned access mechanism to perform Prose U2U relay communication with the target UE through the relay UE. The specific implementation principle can be found in the previous introduction and will not be repeated here.
4、测距业务(ranging services)与侧链定位业务(SL positioning services):4. Ranging services and SL positioning services:
测距业务(或者说测距服务)和侧链定位业务(或者说侧链定位服务)是两种常用于UE间的服务。The ranging service (or ranging service) and the sidelink positioning service (or sidelink positioning service) are two services commonly used between UEs.
测距业务可以用来确定两个UE之间的角度和/或距离。以图6为例,UE1可以接收来自核心网网元(network function,NF)、应用服务器(application server,AS)、应用功能(application function,AF)或第三方UE(3rd party UE或3rd UE)的测距业务请求,该请求指示需要进行UE1和UE2之间距离和/或角度(或者说方向)的测量和计算,然后UE1(作为源UE)基于该请求与UE2(作为目标UE)执行测距业务,从而获得相应的测距结果。可以理解的是,除了由其他节点发送的测距业务请求而触发UE1去执行测距业务之外,UE1也可以主动产生/触发测距需求,然后与UE2进行测距业务。The ranging service can be used to determine the angle and/or distance between two UEs. Taking Figure 6 as an example, UE1 can receive a ranging service request from a core network element (network function, NF), an application server (application server, AS), an application function (application function, AF) or a third-party UE (3rd party UE or 3rd UE), which indicates that the distance and/or angle (or direction) between UE1 and UE2 needs to be measured and calculated, and then UE1 (as the source UE) performs the ranging service with UE2 (as the target UE) based on the request, thereby obtaining the corresponding ranging result. It can be understood that in addition to the ranging service request sent by other nodes to trigger UE1 to perform the ranging service, UE1 can also actively generate/trigger the ranging demand and then perform the ranging service with UE2.
侧链定位服务可以用来计算目标UE的位置。其中,侧链专指UE与UE之间不通过网络链接,而通过UE与UE之间的PC5接口进行直连的链路,侧链定位服务是基于侧链实现的。以图7为例,假设UE1为源UE,UE2为目标UE,UE1对UE2进行测距业务得到相应的测距结果,例如可以包括测量数据和/或 根据测量数据计算得到的计算结果(角度和/或位置的计算结果)。位置管理功能(location management function,LMF)获取UE1的位置和UE1与UE2的测距结果,进而可以计算得到UE2的位置。可以理解的是,侧链定位服务依赖于测距业务的结果。The sidelink positioning service can be used to calculate the location of the target UE. The sidelink specifically refers to the link between UEs that is not connected through a network, but directly connected through the PC5 interface between UEs. The sidelink positioning service is implemented based on the sidelink. Taking Figure 7 as an example, assuming that UE1 is the source UE and UE2 is the target UE, UE1 performs ranging service on UE2 to obtain the corresponding ranging result, which may include measurement data and/or The calculation results (angle and/or position calculation results) calculated based on the measurement data. The location management function (LMF) obtains the location of UE1 and the ranging results of UE1 and UE2, and then calculates the location of UE2. It can be understood that the sidelink positioning service depends on the results of the ranging service.
需要说明的是,本申请实施例中将测距业务和侧链定位服务统称为测距定位业务,后文中出现的测距定位业务既可以指测距业务,也可以指侧链定位业务,还可以同时指代这两者。在测距定位业务中,可以包含直接测距定位和间接测距定位两种场景。It should be noted that in the embodiments of the present application, the ranging service and the sidechain positioning service are collectively referred to as the ranging positioning service. The ranging positioning service mentioned below may refer to the ranging service, the sidechain positioning service, or both. The ranging positioning service may include direct ranging positioning and indirect ranging positioning.
直接测距定位是指在源UE和目标UE之间不借助辅助设备,即可直接进行的测距定位业务。其中,测距定位业务场景下的源UE为需要测量目标UE相对于自身的距离和/或角度的一方,目标UE为在测距定位业务中被测量的一方,源UE需要测量目标UE的距离、角度(方向)和/或位置。Direct ranging positioning refers to the ranging positioning service that can be performed directly between the source UE and the target UE without the help of auxiliary equipment. Among them, the source UE in the ranging positioning service scenario is the party that needs to measure the distance and/or angle of the target UE relative to itself, and the target UE is the party being measured in the ranging positioning service. The source UE needs to measure the distance, angle (direction) and/or position of the target UE.
间接测距定位是指需要借助辅助设备,来进行源UE和目标UE之间的测距和/或定位的测距定位业务。其中,辅助设备负责在源UE和目标UE之间的间接测距业务中提供辅助测距功能,源UE和目标UE之间的测距结果,可以根据源UE和辅助设备之间的测距结果以及辅助设备和目标UE之间的测距结果而确定出来。例如,在源UE和目标UE之间需要进行测距定位业务的情况下,如果目标UE处于源UE的信号覆盖范围之外或者是二者之间的通信信号不好,则源UE不能对目标UE进行直接测距定位,此时只能使用间接测距定位来获得源UE与目标UE之间的测距结果,实现测距定位业务。Indirect ranging and positioning refers to the ranging and positioning service that requires the use of auxiliary equipment to perform ranging and/or positioning between the source UE and the target UE. Among them, the auxiliary equipment is responsible for providing auxiliary ranging functions in the indirect ranging service between the source UE and the target UE. The ranging result between the source UE and the target UE can be determined based on the ranging result between the source UE and the auxiliary equipment and the ranging result between the auxiliary equipment and the target UE. For example, in the case where a ranging and positioning service is required between the source UE and the target UE, if the target UE is outside the signal coverage of the source UE or the communication signal between the two is not good, the source UE cannot perform direct ranging and positioning on the target UE. At this time, only indirect ranging and positioning can be used to obtain the ranging result between the source UE and the target UE to realize the ranging and positioning service.
间接测距定位业务可以有多种不同方案,包括第一间接测距方案(简称方案一)和第二间接测距方案(简称方案二),下面分别进行介绍。There are many different schemes for indirect ranging positioning services, including a first indirect ranging scheme (referred to as Scheme 1) and a second indirect ranging scheme (referred to as Scheme 2), which are introduced below.
请参见图8,图8是本申请提供的第一间接测距方案的流程示意图,可以包括如下步骤:Please refer to FIG8 , which is a schematic diagram of the process of the first indirect ranging solution provided by the present application, which may include the following steps:
S801:授权及获取测距定位业务的策略。S801: Authorization and acquisition of ranging and positioning service strategies.
应理解,UE需要经过与测距定位业务相关的注册、授权、策略获取等流程之后,才能够具备实现测距定位业务的能力和权利。具体的,UE可以从PCF获取测距定位业务的授权(可以被授权为源UE或者是目标UE)、测距定位业务使用的策略等。例如,如图8所示,UE1和UE2均可以从PCF获得测距定位业务的授权和测距定位业务的策略,从而具备测距定位业务功能,这里假设UE1被授权为源UE,UE2被授权为目标UE。It should be understood that the UE needs to go through the registration, authorization, policy acquisition and other processes related to the ranging and positioning service before it can have the ability and right to implement the ranging and positioning service. Specifically, the UE can obtain the authorization of the ranging and positioning service (can be authorized as a source UE or a target UE), the policy used by the ranging and positioning service, etc. from the PCF. For example, as shown in Figure 8, both UE1 and UE2 can obtain the authorization of the ranging and positioning service and the policy of the ranging and positioning service from the PCF, thereby having the ranging and positioning service function. Here, it is assumed that UE1 is authorized as the source UE and UE2 is authorized as the target UE.
S802:设备发现。S802: Device discovery.
具体的,UE1可以通过发现流程发现UE2,然后与UE2建立链接。采用的发现模式例如可以是模式A,也可以是模式B(可参见前文介绍),不具体限定。UE1与UE2之间的链接可以是直连链接,例如PC5直连链接,也可以是通过中继设备实现的U2U中继通信链接。关于上述中继设备的发现和选择此处不做具体限定,可以参见前文相关介绍。Specifically, UE1 can discover UE2 through the discovery process, and then establish a link with UE2. The discovery mode adopted can be, for example, mode A or mode B (see the previous introduction), without specific limitation. The link between UE1 and UE2 can be a direct link, such as a PC5 direct link, or a U2U relay communication link implemented through a relay device. The discovery and selection of the above-mentioned relay device are not specifically limited here, and please refer to the relevant introduction in the previous article.
UE1还通过发现流程发现一个或多个辅助设备,然后在上述一个或多个辅助设备中选择一个辅助设备,并与选中的辅助设备(称目标辅助设备)建立PC5连接,从而使得UE1与目标辅助设备之间可以执行测距业务。UE2也与目标辅助设备建立PC5连接,从而使得UE2和目标辅助设备之间可以执行测距业务。需要额外说明的是,UE2和目标辅助设备之间建立的PC5链接可以是直连链接,也可以是通过UE到UE中继建立的链接(具体可参考上述3、临近业务(proximity-based services,ProSe)通信中的描述)。UE1 also discovers one or more auxiliary devices through the discovery process, then selects an auxiliary device from the one or more auxiliary devices, and establishes a PC5 connection with the selected auxiliary device (called the target auxiliary device), so that the ranging service can be performed between UE1 and the target auxiliary device. UE2 also establishes a PC5 connection with the target auxiliary device, so that the ranging service can be performed between UE2 and the target auxiliary device. It should be additionally noted that the PC5 link established between UE2 and the target auxiliary device can be a direct link or a link established through UE-to-UE relay (for details, please refer to the description in 3. Proximity-based services (ProSe) communication above).
其中,辅助设备为可以在UE1和UE2之间的间接测距定位业务中提供辅助测距功能的设备。关于辅助设备的发现和选择方式,本申请实施例不做具体限定。The auxiliary device is a device that can provide an auxiliary ranging function in the indirect ranging and positioning service between UE1 and UE2. The embodiment of the present application does not specifically limit the method of discovering and selecting the auxiliary device.
例如,UE1通过执行发现流程可能会发现一个或多个辅助设备,它可以从中选择一个目标辅助设备,并将目标辅助设备的信息通过UE1和UE2之间的链接发送至UE2。目标辅助设备可以是上述一个或多个辅助设备中最先被UE1发现的设备,或者,目标辅助设备可以是上述一个或多个辅助设备中与UE1和UE2之间信号强度最好的设备。UE1和UE2分别与目标辅助设备建立PC5连接,进而可以通过该目标辅助设备实现UE1和UE2之间的间接测距业务。For example, UE1 may discover one or more auxiliary devices by executing the discovery process, and it can select a target auxiliary device from them, and send the information of the target auxiliary device to UE2 through the link between UE1 and UE2. The target auxiliary device can be the device that is first discovered by UE1 among the one or more auxiliary devices, or the target auxiliary device can be the device with the best signal strength between UE1 and UE2 among the one or more auxiliary devices. UE1 and UE2 respectively establish PC5 connections with the target auxiliary device, and then the indirect ranging service between UE1 and UE2 can be realized through the target auxiliary device.
S803:UE1向UE2发送测距请求。S803: UE1 sends a ranging request to UE2.
由步骤S802中的介绍可知,UE1通过发现流程发现UE2,并与UE2建立了PC5连接。于是在步骤S803中,UE1可以通过上述PC5连接向UE2发送测距请求,其中,该测距请求用于指示UE2对辅助设备执行测距业务,以得到UE2与辅助设备之间的测距结果。As can be seen from the introduction in step S802, UE1 discovers UE2 through the discovery process and establishes a PC5 connection with UE2. Therefore, in step S803, UE1 can send a ranging request to UE2 through the PC5 connection, wherein the ranging request is used to instruct UE2 to perform a ranging service on the auxiliary device to obtain a ranging result between UE2 and the auxiliary device.
S804:UE1与辅助设备执行测距业务。S804: UE1 and the auxiliary device perform a ranging service.
具体的,基于UE1与辅助设备之间建立的PC5连接,UE1可以对辅助设备执行测距业务,从而UE1可以得到相应的测量数据。UE1基于该测量数据进行计算,进而可以得到UE1和辅助设备之间的测距计算结果(包括UE1和辅助设备之间的距离和/或角度的计算结果)。 Specifically, based on the PC5 connection established between UE1 and the auxiliary device, UE1 can perform a ranging service on the auxiliary device, so that UE1 can obtain corresponding measurement data. UE1 performs calculations based on the measurement data, and then obtains the ranging calculation results between UE1 and the auxiliary device (including the calculation results of the distance and/or angle between UE1 and the auxiliary device).
需要说明的是,测量数据并不是角度或距离的测量结果,而是在测距业务过程中所产生的数据,其用于距离或角度计算,需要根据测量数据做进一步计算才能得到最终的角度或距离的测量结果。例如,UE1与辅助设备之间执行测距业务,UE1可以在第一时刻将测距信息发送给辅助设备,辅助设备确定在第二时刻收到该测距信息,然后辅助设备在第三时刻向UE1发送反馈消息,该反馈消息中携带第三时刻的时间戳,UE1确确定在第四时刻收到该反馈消息,进而可以基于第一时刻、第二时刻、第三时刻和第四时刻这些测量数据,计算出UE1和辅助设备之间的距离。应理解,上述例子中的测距过程仅作为示例,不构成具体限定,还可以有其他的具体测距方式。It should be noted that the measurement data is not the measurement result of the angle or distance, but the data generated in the ranging service process, which is used for distance or angle calculation, and further calculation is required based on the measurement data to obtain the final angle or distance measurement result. For example, a ranging service is performed between UE1 and an auxiliary device. UE1 can send ranging information to the auxiliary device at the first moment, and the auxiliary device determines that the ranging information is received at the second moment. Then the auxiliary device sends a feedback message to UE1 at the third moment. The feedback message carries the timestamp of the third moment. UE1 determines that the feedback message is received at the fourth moment, and then the distance between UE1 and the auxiliary device can be calculated based on the measurement data at the first moment, the second moment, the third moment and the fourth moment. It should be understood that the ranging process in the above example is only an example and does not constitute a specific limitation. There may be other specific ranging methods.
S805:UE2与辅助设备执行测距业务。S805: UE2 and the auxiliary device perform ranging service.
具体的,基于UE2与辅助设备之间建立的PC5连接,UE2可以对辅助设备执行测距业务,从而UE2可以得到相应的测距结果,测距结果可以包括测量数据和/或根据测量数据计算得到的测距计算结果。也就是说,UE2可以根据获得的测量数据进行计算,得到UE2与辅助设备之间的距离和/或角度,UE2在获得测量数据之后,也可以不自行进行计算。Specifically, based on the PC5 connection established between UE2 and the auxiliary device, UE2 can perform a ranging service on the auxiliary device, so that UE2 can obtain a corresponding ranging result, and the ranging result may include measurement data and/or a ranging calculation result calculated based on the measurement data. In other words, UE2 can calculate based on the obtained measurement data to obtain the distance and/or angle between UE2 and the auxiliary device, and UE2 may not perform calculations on its own after obtaining the measurement data.
需要说明的是,因为UE2与辅助设备之间的测距业务以及UE1与辅助设备之间的测距业务可以分别进行,所以上述步骤S804和步骤S805之间的先后执行顺序没有限定。例如,步骤S804可以在步骤S805之前执行,步骤S804也可以与步骤S805并行执行,步骤S804还可以在步骤S805之后执行。It should be noted that, because the ranging service between UE2 and the auxiliary device and the ranging service between UE1 and the auxiliary device can be performed separately, there is no limitation on the execution order of the above step S804 and step S805. For example, step S804 can be performed before step S805, step S804 can also be performed in parallel with step S805, and step S804 can also be performed after step S805.
S806:UE2向UE1发送UE2与辅助设备之间的测距结果。S806: UE2 sends the ranging result between UE2 and the auxiliary device to UE1.
需要说明的是,UE2通过与UE1之间的链接发送上述测距结果,而非通过辅助设备将上述测距结果发送给UE1。It should be noted that UE2 sends the above ranging result through the link between UE2 and UE1, rather than sending the above ranging result to UE1 through the auxiliary device.
其中,UE2与辅助设备之间的测距结果可以包括以下至少一项:UE2与辅助设备之间的测量数据、基于UE2与辅助设备之间的测量数据计算得到的测距计算结果(即角度和/或距离的计算结果)。The ranging result between UE2 and the auxiliary device may include at least one of the following: measurement data between UE2 and the auxiliary device, and a ranging calculation result (ie, an angle and/or distance calculation result) calculated based on the measurement data between UE2 and the auxiliary device.
例如,UE2可以将步骤S805中获得的测量数据,直接通过UE1和UE2之间建立链接发送给UE1,然后由UE1根据上述测量数据计算出UE2和辅助设备之间的角度和/或距离。再如,UE2也可以基于其得到的测量数据,自行计算出UE2和辅助设备之间的角度和/或距离,然后通过UE1和UE2之间的链接将计算的结果发送给UE1,于是UE1不需要再进行上述计算。For example, UE2 can directly send the measurement data obtained in step S805 to UE1 through the link established between UE1 and UE2, and then UE1 calculates the angle and/or distance between UE2 and the auxiliary device based on the above measurement data. For another example, UE2 can also calculate the angle and/or distance between UE2 and the auxiliary device based on the measurement data it obtains, and then send the calculation result to UE1 through the link between UE1 and UE2, so that UE1 does not need to perform the above calculation again.
需要说明的是,上述步骤S804和步骤S806之间的先后执行顺序没有限定。例如,步骤S804可以在步骤S806之前执行;步骤S804也可以与步骤S806并行执行;步骤S804也可以在步骤S806之后执行,即UE1可以在接收到UE2和辅助设备之间的测距结果后,才开始执行UE1和辅助设备之间的测距业务。It should be noted that there is no limitation on the order in which the above steps S804 and S806 are executed. For example, step S804 may be executed before step S806; step S804 may be executed in parallel with step S806; step S804 may be executed after step S806, that is, UE1 may start the ranging service between UE1 and the auxiliary device only after receiving the ranging result between UE2 and the auxiliary device.
S807:UE1计算UE1与UE2之间的测距结果。S807: UE1 calculates the ranging result between UE1 and UE2.
具体的,在步骤S805中,UE1通过与辅助设备执行测距业务,可以得到UE1与辅助设备之间的测距结果,并且在步骤S806中,UE1接收到了UE2与辅助设备之间的测距结果,UE1基于上述两项测距结果,即可计算得到UE1与UE2之间的测距结果。Specifically, in step S805, UE1 can obtain the ranging result between UE1 and the auxiliary device by performing the ranging service with the auxiliary device, and in step S806, UE1 receives the ranging result between UE2 and the auxiliary device. Based on the above two ranging results, UE1 can calculate the ranging result between UE1 and UE2.
请参见图9,图9是本申请提供的第二间接测距方案的流程示意图,可以包括如下步骤:Please refer to FIG. 9, which is a schematic diagram of the process of the second indirect ranging solution provided by the present application, which may include the following steps:
S901:辅助设备发现。S901: Auxiliary device discovery.
具体的,源UE可以通过发现流程发现一个或多个辅助设备,然后在上述一个或多个辅助设备之间选择一个辅助设备,后续将借助选择的这个辅助设备实现源UE与目标UE之间的间接测距定位业务。其中,辅助设备为可以在源UE和目标UE之间的间接测距定位业务中提供辅助测距功能的设备,辅助设备可以分别与源UE和目UE2之间建立PC5连接,进而基于上述连接实现辅助测距。Specifically, the source UE can discover one or more auxiliary devices through the discovery process, and then select an auxiliary device from the one or more auxiliary devices, and subsequently use the selected auxiliary device to implement the indirect ranging and positioning service between the source UE and the target UE. Among them, the auxiliary device is a device that can provide an assisted ranging function in the indirect ranging and positioning service between the source UE and the target UE. The auxiliary device can establish a PC5 connection with the source UE and the target UE2 respectively, and then implement assisted ranging based on the above connection.
需要说明的是,在第二间接测距方案中,源UE和目标UE之间可以有直连链接,也可以没有直连链接,源UE和目标UE之间可以有基于中继设备而建立的连接(简称UE到UE中继连接),也可以没有UE到UE中继连接。在第二间接测距方案中,源UE和目标UE既不通过直连的链接交互,例如传递间接测距相关信息(包括测距请求、测距结果等),也不通过UE到UE中继建立的链接交互。关于辅助设备的发现和选择方式,本申请实施例不做具体限定。It should be noted that in the second indirect ranging scheme, there may be a direct link or no direct link between the source UE and the target UE, and there may be a connection established based on a relay device (referred to as UE-to-UE relay connection) or no UE-to-UE relay connection between the source UE and the target UE. In the second indirect ranging scheme, the source UE and the target UE neither interact through a direct link, such as transmitting indirect ranging related information (including ranging requests, ranging results, etc.), nor through a link established by a UE-to-UE relay. The embodiments of the present application do not specifically limit the method for discovering and selecting auxiliary devices.
还需要说明的是,在此步骤之前同样也有UE的授权和策略获取步骤,具体请参见S801,此处不赘述。It should also be noted that before this step, there are also UE authorization and policy acquisition steps. Please refer to S801 for details, which will not be repeated here.
S902-S903:源UE与辅助设备建立PC5连接,并通过该PC5连接向辅助设备发送测距请求。S902-S903: The source UE establishes a PC5 connection with the auxiliary device, and sends a ranging request to the auxiliary device through the PC5 connection.
其中,上述测距请求用于指示辅助设备对目标UE执行测距业务。The ranging request is used to instruct the auxiliary device to perform a ranging service on the target UE.
S904:鉴权流程。S904: Authentication process.
具体的,辅助设备在接收到来自源UE的测距请求之后,可以选择对其进行鉴权,以确定UE1是否有权进行测距业务。如果辅助设备确定源UE有权进行测距业务,则辅助设备对源UE的测距请求做出响应, 继续执行后续步骤。如果辅助设备确定源UE无权进行测距业务,则不执行后续步骤。Specifically, after receiving the ranging request from the source UE, the auxiliary device may choose to authenticate it to determine whether UE1 is authorized to perform the ranging service. If the auxiliary device determines that the source UE is authorized to perform the ranging service, the auxiliary device responds to the ranging request of the source UE. Continue to execute the subsequent steps. If the auxiliary device determines that the source UE is not authorized to perform the ranging service, the subsequent steps are not executed.
需要说明的是,步骤S904作为可选步骤,即辅助设备可以对源UE进行鉴权并通过后,再执行后续测距业务,或者是,辅助设备不对源UE进行鉴权而直接执行后续步骤。It should be noted that step S904 is an optional step, that is, the auxiliary device may authenticate the source UE and then execute the subsequent ranging service, or the auxiliary device may directly execute the subsequent steps without authenticating the source UE.
S905:辅助设备与目标UE执行测距业务。S905: The auxiliary device performs a ranging service with the target UE.
具体的,基于辅助设备与目标UE之间建立的PC5连接,辅助设备对目标UE执行测距业务,从而辅助设备可以得到辅助设备与目标UE之间的测距结果。其中,测距结果可以包括测量数据和/或根据测量数据计算得到的测距计算结果。也就是说,辅助设备可以根据获得的测量数据进行计算,从而得到辅助设备与目标UE之间的距离和/或角度的测距计算结果。辅助设备在获得测量数据之后,也可以不进行计算。Specifically, based on the PC5 connection established between the auxiliary device and the target UE, the auxiliary device performs a ranging service on the target UE, so that the auxiliary device can obtain a ranging result between the auxiliary device and the target UE. The ranging result may include measurement data and/or a ranging calculation result calculated based on the measurement data. In other words, the auxiliary device may perform calculations based on the obtained measurement data to obtain a ranging calculation result of the distance and/or angle between the auxiliary device and the target UE. After obtaining the measurement data, the auxiliary device may not perform calculations.
S906:源UE与辅助设备执行测距业务。S906: The source UE and the auxiliary device perform a ranging service.
具体的,基于源UE与辅助设备之间建立的PC5连接,源UE可以对辅助设备执行测距业务,从而源UE可以得到相应的测量数据。源UE基于该测量数据进行计算,进而可以得到源UE和辅助设备之间的测距计算结果(包括源UE和辅助设备之间的距离和/或角度的计算结果)。Specifically, based on the PC5 connection established between the source UE and the auxiliary device, the source UE can perform a ranging service on the auxiliary device, so that the source UE can obtain corresponding measurement data. The source UE performs calculations based on the measurement data, and then obtains the ranging calculation results between the source UE and the auxiliary device (including the calculation results of the distance and/or angle between the source UE and the auxiliary device).
需要说明的是,因为源UE与辅助设备之间的测距业务以及辅助设备与目标UE之间的测距业务可以分别进行,所以上述步骤S905和步骤S906之间的先后执行顺序没有限定。例如,步骤S906可以在步骤S905之前执行,步骤S906也可以与步骤S905并行执行,步骤S906还可以在步骤S906之后执行。It should be noted that, because the ranging service between the source UE and the auxiliary device and the ranging service between the auxiliary device and the target UE can be performed separately, there is no limitation on the execution order of the above step S905 and step S906. For example, step S906 can be executed before step S905, step S906 can also be executed in parallel with step S905, and step S906 can also be executed after step S906.
S907:辅助设备向源UE发送辅助设备与目标UE的测距结果。S907: The auxiliary device sends the ranging result between the auxiliary device and the target UE to the source UE.
其中,辅助设备与目标UE之间的测距结果可以包括以下至少一项:辅助设备与目标UE之间的测量数据、基于目标UE与辅助设备之间的测量数据计算得到的测距计算结果(包括角度和/或距离的计算结果)。Among them, the ranging result between the auxiliary device and the target UE may include at least one of the following: measurement data between the auxiliary device and the target UE, and a ranging calculation result (including angle and/or distance calculation results) calculated based on the measurement data between the target UE and the auxiliary device.
例如,辅助设备可以将其得到的上述测量数据,直接通过源UE和辅助设备之间的链接发送给源UE,然后由源UE根据上述测量数据计算出辅助设备和目标UE之间的角度和/或距离。再如,辅助设备也可以基于其得到的测量数据,自行计算出辅助设备和目标UE之间的角度和/或距离,然后通过源UE和辅助设备之间的链接将计算结果发送给源UE,于是源UE不需要再执行上述计算。For example, the auxiliary device can send the above-mentioned measurement data obtained by it directly to the source UE through the link between the source UE and the auxiliary device, and then the source UE calculates the angle and/or distance between the auxiliary device and the target UE based on the above-mentioned measurement data. For another example, the auxiliary device can also calculate the angle and/or distance between the auxiliary device and the target UE based on the measurement data obtained by it, and then send the calculation result to the source UE through the link between the source UE and the auxiliary device, so that the source UE does not need to perform the above-mentioned calculation again.
需要说明的是,上述步骤S907和步骤S905之间的先后执行顺序没有限定。例如,步骤S905可以在步骤S907之前执行;步骤S905也可以与步骤S907并行执行;步骤S905也可以在步骤S907之后执行,即源UE可以在接收到辅助设备与目标UE之间的测距结果后,才开始执行源UE和辅助设备之间的测距业务,以得到源UE和辅助设备之间的测距结果。It should be noted that there is no limitation on the order in which the above steps S907 and S905 are executed. For example, step S905 may be executed before step S907; step S905 may also be executed in parallel with step S907; step S905 may also be executed after step S907, that is, the source UE may start to execute the ranging service between the source UE and the auxiliary device after receiving the ranging result between the auxiliary device and the target UE, so as to obtain the ranging result between the source UE and the auxiliary device.
S908:源UE计算源UE与目标UE之间的测距结果。S908: The source UE calculates the ranging result between the source UE and the target UE.
具体的,在步骤S906中,源UE通过与辅助设备执行测距业务,可以得到源UE与辅助设备之间的测距结果,并且在步骤S907,源UE接收到了辅助设备发来的辅助设备与目标UE之间的测距结果。于是在步骤S908,源UE基于上述两项测距结果,即可计算得到源UE与目标UE之间的测距结果。Specifically, in step S906, the source UE can obtain the ranging result between the source UE and the auxiliary device by performing the ranging service with the auxiliary device, and in step S907, the source UE receives the ranging result between the auxiliary device and the target UE sent by the auxiliary device. Then, in step S908, the source UE can calculate the ranging result between the source UE and the target UE based on the above two ranging results.
由前文介绍可知,在源UE与目标UE的间接测距定位场景中,源UE需要得到源UE与辅助设备之间的测距结果(记为第一测距结果),以及辅助UE与目标UE之间的测距结果(记为第二测距结果),综合第一测距结果和第二测距结果才能计算得出源UE和目标UE之间的测距结果。As can be seen from the previous introduction, in the indirect ranging positioning scenario between the source UE and the target UE, the source UE needs to obtain the ranging result between the source UE and the auxiliary device (recorded as the first ranging result), as well as the ranging result between the auxiliary UE and the target UE (recorded as the second ranging result). The ranging result between the source UE and the target UE can be calculated by combining the first ranging result and the second ranging result.
对于上述方案一,由于目标UE与源UE之间建立有连接,因此目标UE可以接收来自源UE的测距请求,进而根据源UE的测距请求主动对辅助设备执行测距业务,从而目标UE得到第二测距结果。然后,目标UE可以基于目标UE与源UE之间的连接,直接将第二测距结果发给源UE,而不经过辅助设备,此时辅助设备不会得到第二测距结果。可以理解,测距结果是位置相关信息,该信息通常为隐私敏感信息,由于间接测距方案是需要借助辅助设备的,所以对于UE1和UE2来说,在辅助设备处可能存在隐私泄露的风险。因为方案一中的辅助设备并不会得到第二测距结果,所以在方案一的间距测距业务场景下,并不会存在上述隐私数据泄露的问题,进而能够在源UE与目标UE之间的间接测距业务中,保证端到端的安全。For the above-mentioned scheme one, since a connection is established between the target UE and the source UE, the target UE can receive a ranging request from the source UE, and then actively perform a ranging service on the auxiliary device according to the ranging request of the source UE, so that the target UE obtains a second ranging result. Then, the target UE can directly send the second ranging result to the source UE based on the connection between the target UE and the source UE without passing through the auxiliary device, and the auxiliary device will not obtain the second ranging result at this time. It can be understood that the ranging result is location-related information, which is usually privacy-sensitive information. Since the indirect ranging scheme requires the assistance of an auxiliary device, there may be a risk of privacy leakage at the auxiliary device for UE1 and UE2. Because the auxiliary device in scheme one does not obtain the second ranging result, in the spacing ranging service scenario of scheme one, there will be no problem of privacy data leakage, and end-to-end security can be guaranteed in the indirect ranging service between the source UE and the target UE.
对于上述方案二,由于源UE和目标UE之间没有建立连接(不能建立或还未建立),所以源UE选择将测距请求发送至辅助设备,以指示辅助设备对目标UE进行测距业务。或者,即使源UE和目标UE之间建立有连接,源UE也可以选择使用方案二,向辅助设备发送上述测距请求。辅助设备基于源UE发送的从测距请求,主动对目标UE执行测距业务,从而辅助设备可以得到第二测距结果。然后,辅助设备基于其与源UE之间的连接,将第二测距结果发送给源UE。可以理解的是,因为方案二中的辅助设备能够得到第二测距结果,所以在方案二的间距测距业务场景下,在辅助设备处存在隐私数据泄露的风险,于是在源UE与目标UE之间的间接测距业务中无法保证端到端的安全。 For the above-mentioned scheme 2, since there is no connection established between the source UE and the target UE (cannot be established or has not been established), the source UE chooses to send a ranging request to the auxiliary device to instruct the auxiliary device to perform a ranging service on the target UE. Alternatively, even if a connection is established between the source UE and the target UE, the source UE can also choose to use scheme 2 to send the above-mentioned ranging request to the auxiliary device. The auxiliary device actively performs a ranging service on the target UE based on the ranging request sent by the source UE, so that the auxiliary device can obtain a second ranging result. Then, the auxiliary device sends the second ranging result to the source UE based on the connection between it and the source UE. It can be understood that because the auxiliary device in scheme 2 can obtain the second ranging result, there is a risk of privacy data leakage at the auxiliary device in the spacing ranging service scenario of scheme 2, so end-to-end security cannot be guaranteed in the indirect ranging service between the source UE and the target UE.
基于上述内容,下面介绍本申请提供的通信方法的第一实施例。Based on the above content, the first embodiment of the communication method provided by the present application is introduced below.
请参见图10,图10是本申请实施例中提供的一种通信方法的流程示意图,用于ProSe服务场景,可以包括如下步骤:Please refer to FIG. 10 , which is a flow chart of a communication method provided in an embodiment of the present application, which is used in a ProSe service scenario and may include the following steps:
S1001:第一用户设备获取安全策略。S1001: A first user device obtains a security policy.
其中,第一用户设备是具有ProSe功能的用户设备。例如,第一用户设备上可以安装有用于提供/需要使用ProSe功能的应用程序(application),并且第一用户设备向PCF完成了与Prose相关的授权、参数/策略获取等流程,从而使得第一用户设备具备ProSe功能。The first user equipment is a user equipment with ProSe function. For example, an application for providing/requiring the use of ProSe function may be installed on the first user equipment, and the first user equipment completes the authorization, parameter/policy acquisition and other processes related to ProSe to the PCF, so that the first user equipment has ProSe function.
其中,安全策略用于指示是否对侧链通信业务使用端到端的安全保护。侧链通信业务为基于侧链实现的通信业务。在本实施例中,侧链通信业务指的是基于中继设备的ProSe通信业务,即ProSe中继通信业务,针对ProSe中继通信这类业务的端到端的安全保护实施在ProSe通信业务对应的两个用户设备之间,即在同一ProSe通信业务中的源UE和目标UE之间实施端到端的安全保护。由前文介绍可知,ProSe中继通信可以基于层二中继机制或层三中继机制来实现。层二中继机制中的层2中继设备不会解析PDCP层(负责对上层信息执行加密等工作),它会透传源UE和目标UE的PDCP层及PDCP层的上层信息,于是,源UE和目标UE之间的安全可以端到端的建立在源UE的PDCP层和目标UE的PDCP层之间,从而支持为ProSe中继通信业务提供端到端的安全保护。由于层三中继机制中的层3中继设备需要解析PDCP层,因此无法在源UE和目标UE之间建立端到端的安全,从而无法支持在ProSe中继通信业务中实现端到端的安全保护。Among them, the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service. The side chain communication service is a communication service implemented based on the side chain. In this embodiment, the side chain communication service refers to the ProSe communication service based on the relay device, that is, the ProSe relay communication service. The end-to-end security protection for such services as ProSe relay communication is implemented between the two user devices corresponding to the ProSe communication service, that is, the source UE and the target UE in the same ProSe communication service. End-to-end security protection is implemented between the source UE and the target UE. As can be seen from the previous introduction, ProSe relay communication can be implemented based on a layer 2 relay mechanism or a layer 3 relay mechanism. The layer 2 relay device in the layer 2 relay mechanism will not parse the PDCP layer (responsible for encrypting the upper layer information, etc.), it will transparently transmit the PDCP layer of the source UE and the target UE and the upper layer information of the PDCP layer, so that the security between the source UE and the target UE can be established end-to-end between the PDCP layer of the source UE and the PDCP layer of the target UE, thereby supporting end-to-end security protection for the ProSe relay communication service. Since the layer 3 relay device in the layer 3 relay mechanism needs to parse the PDCP layer, end-to-end security cannot be established between the source UE and the target UE, thereby failing to support end-to-end security protection in the ProSe relay communication service.
因此,在ProSe中继通信场景中,安全策略用于指示是否对侧链通信业务使用端到端的安全保护,进一步可用于指示是否使用层二中继机制来建立ProSe中继通信(或者说是指示是否使用层三中继机制来建立ProSe中继通信)。Therefore, in the ProSe relay communication scenario, the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service, and can be further used to indicate whether to use the layer 2 relay mechanism to establish ProSe relay communication (or to indicate whether to use the layer 3 relay mechanism to establish ProSe relay communication).
若第一用户设备获取的安全策略指示对ProSe中继通信使用端到端的安全保护,则第一用户设备根据该安全策略,可以确定使用层二中继机制来实现第一用户设备自身与其他用户设备之间的ProSe中继通信。If the security policy acquired by the first user equipment indicates to use end-to-end security protection for ProSe relay communication, the first user equipment may determine to use a layer 2 relay mechanism to implement ProSe relay communication between the first user equipment itself and other user equipments according to the security policy.
若安全策略指示不对ProSe中继通信使用端到端的安全保护,则第一用户设备根据该安全策略,可以确定使用层三中继机制来实现第一用户设备自身与其他用户设备之间的ProSe中继通信。若安全策略指示优先对ProSe中继通信使用端到端的安全保护,则第一用户设备根据该安全策略,可以确定优先使用层二中继机制来实现第一用户设备自身与其他用户设备之间的ProSe中继通信,在确定无法使用层二中继机制的情况下,再使用层三中继机制来实现第一用户设备自身与其他用户设备之间的ProSe中继通信。需要说明的是,本申请实施例对无法使用层二中继机制的情况不做具体限定,例如,第一用户设备在一定时间内未发现任何层2中继设备,于是第一用户设备确定无法使用层二中继机制,转而去尝试层三中继机制。If the security policy indicates that end-to-end security protection is not used for ProSe relay communication, the first user device can determine to use the layer 3 relay mechanism to implement ProSe relay communication between the first user device itself and other user devices according to the security policy. If the security policy indicates that end-to-end security protection is used preferentially for ProSe relay communication, the first user device can determine to use the layer 2 relay mechanism preferentially to implement ProSe relay communication between the first user device itself and other user devices according to the security policy, and if it is determined that the layer 2 relay mechanism cannot be used, the layer 3 relay mechanism is used to implement ProSe relay communication between the first user device itself and other user devices. It should be noted that the embodiment of the present application does not specifically limit the situation where the layer 2 relay mechanism cannot be used. For example, the first user device does not find any layer 2 relay device within a certain period of time, so the first user device determines that the layer 2 relay mechanism cannot be used, and then tries the layer 3 relay mechanism.
若安全策略指示优先对ProSe中继通信不使用端到端的安全保护(可能是出于效率、资源占用等因素的考虑),则第一用户设备根据该安全策略,可以确定优先使用层三中继机制来实现第一用户设备自身与其他用户设备之间的ProSe中继通信,在确定无法使用层三中继机制的情况下,再使用层二中继机制来实现第一用户设备与其他用户设备之间的ProSe中继通信。需要说明的是,本申请实施例对无法使用层三中继机制的情况不做具体限定,例如,第一用户设备在一定时间内未发现任何层3中继设备,于是第一用户设备确定无法使用层三中继机制,转而去尝试层二中继机制。If the security policy indicates that end-to-end security protection is not used for ProSe relay communication (perhaps due to efficiency, resource occupation and other factors), the first user device can determine, based on the security policy, to use the layer 3 relay mechanism to implement ProSe relay communication between the first user device itself and other user devices. If it is determined that the layer 3 relay mechanism cannot be used, the layer 2 relay mechanism is used to implement ProSe relay communication between the first user device and other user devices. It should be noted that the embodiment of the present application does not specifically limit the situation where the layer 3 relay mechanism cannot be used. For example, the first user device does not find any layer 3 relay device within a certain period of time, so the first user device determines that the layer 3 relay mechanism cannot be used, and then tries the layer 2 relay mechanism.
在一种可能的实施例中,第一用户设备获取的安全策略是存储在第一用户设备上的。In a possible embodiment, the security policy acquired by the first user equipment is stored on the first user equipment.
例如,用户设备可以由一台移动设备(mobile equipment,ME)和通用集成电路卡(universal circuit card,UICC)组成,安全策略可以是预配置在该移动设备中的,也可以是预配置在该UICC卡上的。For example, a user device may consist of a mobile equipment (ME) and a universal integrated circuit card (UICC), and the security policy may be pre-configured in the mobile equipment or pre-configured on the UICC card.
应理解,UICC是定义了物理特性的智能卡的总称,是用户设备的一个组成部分,主要用于存储用户信息、鉴权密钥、短消、付费方式等信息,它可供网络对客户身份进行识别、存储信息、注册网络等。在UICC中可以包括多种逻辑模块/应用(application),如用户标识模块(subscriber identity module,SIM)、通用用户标识(universal subscriber identity module,USIM)、IP多媒体业务标识模块(IP multi media service identity module,ISIM)等等,UICC中的逻辑模块/应用可以单独存在,也可以多个同时存在。上述安全策略预配置在UICC中,可以是预配置在上述任意逻辑模块/应用中。It should be understood that UICC is a general term for smart cards with defined physical characteristics. It is a component of user equipment and is mainly used to store user information, authentication keys, short messages, payment methods and other information. It can be used by the network to identify the customer identity, store information, register with the network, etc. A variety of logical modules/applications (applications) can be included in the UICC, such as the subscriber identity module (SIM), the universal subscriber identity module (USIM), the IP multimedia service identity module (ISIM), etc. The logical modules/applications in the UICC can exist alone or in multiple at the same time. The above security policy is pre-configured in the UICC, and can be pre-configured in any of the above logical modules/applications.
在另一种可能的实施例中,安全策略可以是来自核心网网元的,所述核心网网元可以是策略管理网元(PCF)、直连通信发现名称管理网元(direct discovery name management function,DDNMF)、接入管理网元(AMF)或数据管理网元(UDM/UDR)中的一项或多项。例如,第一用户设备主动可以向核心网网元发送请求消息,请求消息中可以携带用户信息,进而接收核心网网元发送的安全策略。可选的,上述用户 信息可以包括第一用户设备对应的用户标识(例如用户永久标识符(SUbscription Permanent Identifier,SUPI))、用户组标识、地理位置、网络位置中的一项或多项。In another possible embodiment, the security policy may come from a core network element, which may be one or more of a policy management element (PCF), a direct discovery name management function (DDNMF), an access management element (AMF), or a data management element (UDM/UDR). For example, the first user device may actively send a request message to the core network element, and the request message may carry user information, and then receive the security policy sent by the core network element. Optionally, the above user The information may include one or more of a user identifier (eg, a user permanent identifier (SUbscription Permanent Identifier, SUPI)) corresponding to the first user equipment, a user group identifier, a geographic location, and a network location.
关于第一用户设备如何从核心网网元获取安全策略、核心网网元如何为第一用户设备确定相应的安全策略,将在后文中的图12和图13进行具体介绍,此处不赘述。How the first user equipment obtains the security policy from the core network element and how the core network element determines the corresponding security policy for the first user equipment will be specifically introduced in Figures 12 and 13 later in the text and will not be repeated here.
需要说明的是,本申请实施例对步骤S1001的执行顺序不做具体限制,只要保障在步骤S1003之前执行即可。例如,步骤S1001可以在步骤S1002之前执行,也可以与步骤S1002并行执行,还可以在步骤S1002和步骤S1003之间执行,即在第一用户设备触发中继通信需求之后,第一用户设备才去获取安全策略。It should be noted that the embodiment of the present application does not impose any specific restrictions on the execution order of step S1001, as long as it is executed before step S1003. For example, step S1001 can be executed before step S1002, can be executed in parallel with step S1002, or can be executed between step S1002 and step S1003, that is, after the first user equipment triggers the relay communication demand, the first user equipment obtains the security policy.
S1002:第一用户设备触发ProSe中继通信需求。S1002: The first user equipment triggers a ProSe relay communication requirement.
需要说明的是,关于第一用户设备是如何触发ProSe中继通信需求的,本申请实施例对此不做具体限定。It should be noted that the embodiment of the present application does not specifically limit how the first user equipment triggers the ProSe relay communication requirement.
在一些可能的实施例中,第一用户设备可以接收来自其他设备的请求,从而触发ProSe中继通信需求。上述其他设备可以是NF、AS、AF或3rd UE等,不具体限定。In some possible embodiments, the first user equipment may receive a request from other devices, thereby triggering a ProSe relay communication requirement. The other devices may be NF, AS, AF or 3rd UE, etc., which are not specifically limited.
上述请求可以是明确指示与第二用户设备(即目标UE)进行ProSe中继通信的请求,于是第一用户设备根据接收到的上述请求可以直接触发ProSe中继通信需求。The above request may be a request that explicitly indicates to perform ProSe relay communication with the second user equipment (ie, the target UE), so the first user equipment may directly trigger the ProSe relay communication requirement according to the received request.
上述请求也可以是指示与第二用户设备执行ProSe通信的请求(并未指定是ProSe直接通信还是ProSe中继通信),于是第一用户设备基于该请求的指示,可以先选择与第二用户设备进行ProSe直接通信。但是,第一用户设备发现与目标UE之间不满足ProSe直接通信的条件,例如,目标UE处于源UE的信号范围之外,或者源UE与目标UE之间的通信质量不够好等等。此时第一用户设备确定自身无法与目标UE进行ProSe直接通信,从而触发了通过中继设备与目标UE进行ProSe通信的需求,即触发ProSe中继通信需求。The above request may also be a request to instruct to perform ProSe communication with the second user equipment (it does not specify whether it is ProSe direct communication or ProSe relay communication), so the first user equipment may first choose to perform ProSe direct communication with the second user equipment based on the instruction of the request. However, the first user equipment finds that the conditions for ProSe direct communication with the target UE are not met, for example, the target UE is outside the signal range of the source UE, or the communication quality between the source UE and the target UE is not good enough, etc. At this time, the first user equipment determines that it cannot perform ProSe direct communication with the target UE, thereby triggering the need to perform ProSe communication with the target UE through the relay device, that is, triggering the ProSe relay communication demand.
在另一些可能的实施例中,第一用户设备也可以是自身触发ProSe中继通信需求的。In some other possible embodiments, the first user equipment may also trigger the ProSe relay communication requirement by itself.
例如,用户在第一用户设备上执行了某种特定操作(比如,用户在第一用户设备安装的某个与ProSe服务相关的APP上,点击了视频聊天按钮),从而触发了第一用户设备的ProSe通信需求/中继通信需求。应理解,若触发的是ProSe通信需求,第一用户设备也可以是在选择执行ProSe直接通信但却失败之后,进而触发了ProSe中继通信需求。For example, the user performs a certain specific operation on the first user device (for example, the user clicks a video chat button on an APP related to the ProSe service installed on the first user device), thereby triggering the ProSe communication demand/relay communication demand of the first user device. It should be understood that if the ProSe communication demand is triggered, the first user device may also trigger the ProSe relay communication demand after selecting to perform ProSe direct communication but failing.
S1003:第一用户设备根据安全策略确定执行第一操作,第一操作用于建立第一用户设备与第二用户设备之间的ProSe中继通信业务。S1003: The first user equipment determines to perform a first operation according to a security policy, where the first operation is used to establish a ProSe relay communication service between the first user equipment and the second user equipment.
由前述步骤S1001中的介绍可知,安全策略用于指示是否对ProSe中继通信业务进行端到端的安全保护。第一用户设备根据该安全策略,即确定是否要对自身所要执行的ProSe中继通信业务使用端到端的安全保护。As described in step S1001, the security policy is used to indicate whether to perform end-to-end security protection on the ProSe relay communication service. The first user equipment determines whether to use end-to-end security protection for the ProSe relay communication service to be executed by itself according to the security policy.
若安全策略指示对ProSe中继通信要使用端到端的安全保护,第一用户设备根据该安全策略确定执行第一操作,则该第一操作需要支持在第一用户设备和第二用户设备之间实现端到端的安全保护,此时的第一操作包括:接收来自至少一个中继设备的消息;然后,第一用户设备与所述至少一个中继设备中的第一中继设备建立连接,其中,该第一中继设备为所述至少一个中继设备中的一个中继设备,可以由第一用户设备根据一定条件进行选择(关于中继设备的选择请参见前文相关介绍),第一用户设备接收到的第一中继设备的消息中包括层二中继业务的中继服务标识,上述链接用于发送第一用户设备与第二用户设备之间的ProSe中继通信业务的业务数据。需要说明的是,第一用户设备接收的至少一个中继设备的消息都包括层二中继业务的中继服务标识,或者,第一用户设备接收的至少一个中继设备的消息包括层二中继业务的中继服务标识和层三中继业务的中继服务标识,即第一用户设备可以选择只接收层二中继设备的消息,也可以是层二中继设备和层三中继设备的消息都接受,但是它只会选择层二中继设备来建立第一用户设备与第二用户设备之间的ProSe中继通信。If the security policy indicates that end-to-end security protection is to be used for ProSe relay communication, and the first user equipment determines to perform a first operation according to the security policy, then the first operation needs to support end-to-end security protection between the first user equipment and the second user equipment. The first operation at this time includes: receiving a message from at least one relay device; then, the first user equipment establishes a connection with a first relay device among the at least one relay device, wherein the first relay device is one of the at least one relay device and can be selected by the first user equipment according to certain conditions (for the selection of the relay device, please refer to the relevant introduction in the previous text), and the message from the first relay device received by the first user equipment includes a relay service identifier of the layer 2 relay service, and the above link is used to send service data of the ProSe relay communication service between the first user equipment and the second user equipment. It should be noted that the messages of at least one relay device received by the first user device include the relay service identifier of the layer 2 relay service, or the messages of at least one relay device received by the first user device include the relay service identifier of the layer 2 relay service and the relay service identifier of the layer 3 relay service, that is, the first user device can choose to only receive messages from the layer 2 relay device, or it can accept messages from both the layer 2 relay device and the layer 3 relay device, but it will only select the layer 2 relay device to establish the ProSe relay communication between the first user device and the second user device.
也就是说,当第一用户设备根据安全策略确定要对ProSe中继通信使用端到端的安全保护时,就表示要使用层二中继机制与第二用户设备建立ProSe中继通信,从而确定要执行与层2中继业务建立相对应的动作,包括:使用层2中继业务的中继服务代码、发现层2中继设备、与层2中继设备建立连接,等等。也就是说,第一用户设备只会从层2的中继设备中去选择中继设备,从而建立起第一用户设备到第二用户设备之间的U2U中继连接,进而基于该U2U中继连接实现第一用户设备与第二用户设备之间的ProSe中继通信业务,并且能够实现第一用户设备与第二用户设备之间的端到端的安全保护。That is, when the first user equipment determines to use end-to-end security protection for ProSe relay communication according to the security policy, it means to use the layer 2 relay mechanism to establish ProSe relay communication with the second user equipment, thereby determining to perform actions corresponding to the establishment of the layer 2 relay service, including: using the relay service code of the layer 2 relay service, discovering the layer 2 relay device, establishing a connection with the layer 2 relay device, etc. In other words, the first user equipment will only select a relay device from the layer 2 relay devices, thereby establishing a U2U relay connection between the first user equipment and the second user equipment, and then based on the U2U relay connection, the ProSe relay communication service between the first user equipment and the second user equipment is implemented, and end-to-end security protection between the first user equipment and the second user equipment can be implemented.
若安全策略指示不对ProSe中继通信使用端到端的安全保护,则第一用户设备根据该安全策略确定执行第一操作,则该第一操作不需要支持在第一用户设备和第二用户设备之间实施端到端的安全保护,此时 第一操作的包括:接收来自至少一个中继设备的消息;然后,第一用户设备与所述至少一个中继设备中的第一中继设备建立连接,其中,该第一中继设备为所述至少一个设备中的一个中继设备,可以由第一用户设备根据一定条件进行选择,第一用户设备接收到的第一中继设备的消息中包括层三中继业务的中继服务标识;上述链接用于发送第一用户设备与第二用户设备之间的ProSe中继通信业务的业务数据。If the security policy indicates that end-to-end security protection is not used for ProSe relay communication, the first user equipment determines to perform a first operation according to the security policy, and the first operation does not need to support end-to-end security protection between the first user equipment and the second user equipment. The first operation includes: receiving a message from at least one relay device; then, the first user device establishes a connection with a first relay device among the at least one relay device, wherein the first relay device is a relay device among the at least one device and can be selected by the first user device according to certain conditions, and the message from the first relay device received by the first user device includes a relay service identifier of a layer 3 relay service; the above link is used to send service data of a ProSe relay communication service between the first user device and the second user device.
也就是说,当第一用户设备根据安全策略确定不需要对ProSe中继通信使用端到端的安全保护时,就表示可以使用层三中继机制与第二用户设备建立ProSe中继通信,从而确定要执行与层3中继业务建立相对应的动作,包括:使用层3中继业务的中继服务代码、发现层3中继设备、与层3中继设备建立连接,等等。也就是说,第一用户设备只会从层3的中继设备中去选择中继设备,从而建立起第一用户设备到第二用户设备之间的U2U中继连接,进而基于该U2U中继连接实现第一用户设备与第二用户设备之间的ProSe中继通信业务,但不能实现第一用户设备与第二用户设备之间的端到端的安全保护。需要说明的是,第一用户设备接收的至少一个中继设备的消息都包括层三中继业务的中继服务标识,或者,第一用户设备接收的至少一个中继设备的消息包括层二中继业务的中继服务标识和层三中继业务的中继服务标识,即第一用户设备可以选择只接收层三中继设备的消息,也可以是层二中继设备和层三中继设备的消息都接受,但是它只会选择层三中继设备来建立第一用户设备与第二用户设备之间的ProSe中继通信。若安全策略指示优先对ProSe中继通信使用端到端的安全保护,第一用户设备根据该安全策略确定执行第一操作,则该第一操作需要优先支持在第一用户设备和第二用户设备之间实现端到端的安全保护,此时的第一操作包括:接收来自至少一个中继设备的消息;然后,第一用户设备与所述至少一个中继设备中的第一中继设备建立中继连接,其中,第一用户设备接收到的该第一中继设备的消息中包括层二中继业务的中继服务标识,该第一中继设备为所述至少一个中继设备中的一个中继设备,可以由第一用户设备根据一定条件进行选择(关于中继设备的选择请参见前文相关介绍),进一步的,如果第一用户设备确定无法与任何层二中继业务的中继服务标识对应的中继设备建立链接,则第一用户设备与所述至少一个中继设备中的第二中继设备建立连接,其中,第一用户设备接收到的该第二中继设备的消息中包括层三中继业务的中继服务标识,该第二中继设备为所述至少一个中继设备中的一个中继设备,可以由第一用户设备根据一定条件进行选择(关于中继设备的选择请参见前文相关介绍)。上述链接用于发送第一用户设备与第二用户设备之间的ProSe中继通信业务的业务数据。That is, when the first user equipment determines according to the security policy that it is not necessary to use end-to-end security protection for ProSe relay communication, it means that the layer 3 relay mechanism can be used to establish ProSe relay communication with the second user equipment, thereby determining to perform actions corresponding to the establishment of the layer 3 relay service, including: using the relay service code of the layer 3 relay service, discovering the layer 3 relay device, establishing a connection with the layer 3 relay device, etc. In other words, the first user equipment will only select a relay device from the layer 3 relay devices, thereby establishing a U2U relay connection between the first user equipment and the second user equipment, and then based on the U2U relay connection, the ProSe relay communication service between the first user equipment and the second user equipment is realized, but the end-to-end security protection between the first user equipment and the second user equipment cannot be realized. It should be noted that the messages of at least one relay device received by the first user equipment all include the relay service identifier of the layer 3 relay service, or the messages of at least one relay device received by the first user equipment include the relay service identifier of the layer 2 relay service and the relay service identifier of the layer 3 relay service, that is, the first user equipment can choose to only receive messages from the layer 3 relay device, or it can accept messages from both the layer 2 relay device and the layer 3 relay device, but it will only select the layer 3 relay device to establish the ProSe relay communication between the first user equipment and the second user equipment. If the security policy indicates that end-to-end security protection is preferentially used for ProSe relay communication, and the first user equipment determines to perform the first operation according to the security policy, then the first operation needs to preferentially support end-to-end security protection between the first user equipment and the second user equipment. At this time, the first operation includes: receiving a message from at least one relay device; then, the first user equipment establishes a relay connection with a first relay device among the at least one relay device, wherein the message of the first relay device received by the first user equipment includes the relay service identifier of the layer 2 relay service, and the first relay device is one of the at least one relay device, and can The first user device makes a selection according to certain conditions (for the selection of relay devices, please refer to the relevant introduction above). Further, if the first user device determines that it is impossible to establish a link with the relay device corresponding to the relay service identifier of any layer 2 relay service, the first user device establishes a connection with the second relay device in the at least one relay device, wherein the message of the second relay device received by the first user device includes the relay service identifier of the layer 3 relay service, and the second relay device is one of the at least one relay device, which can be selected by the first user device according to certain conditions (for the selection of relay devices, please refer to the relevant introduction above). The above link is used to send service data of the ProSe relay communication service between the first user device and the second user device.
也就是说,当第一用户设备根据安全策略确定要优先对ProSe中继通信使用端到端的安全保护时,就表示要优先使用层二中继机制与第二用户设备建立ProSe中继通信,从而确定要先执行与层2中继业务建立相对应的动作,包括:使用层2中继业务的中继服务代码、发现层2中继设备、与层2中继设备建立连接,等等。而当第一用户设备确定无法使用层二中继机制与第二用户设备建立ProSe中继通信时,第一用户设备确定使用层三中继机制与第二用户设备建立ProSe中继通信,从而确定要执行与层3中继业务建立相对应的动作,包括:使用层3中继业务的中继服务代码、发现层3中继设备、与层3中继设备建立连接,等等。也就是说,第一用户设备优先从层2的中继设备中去选择中继设备,在无法选择到层2的中继设备时再去选择层3的中继设备,从而建立起第一用户设备到第二用户设备之间的U2U中继连接,进而基于该U2U中继连接实现第一用户设备与第二用户设备之间的ProSe中继通信业务。此种方法可以优先实现第一用户设备与第二用户设备之间的端到端的安全保护,但也在无法进行端到端的安全保护时保证第一用户设备与第二用户设备之间的链接,以实现第一用户设备与第二用户设备之间的ProSe中继通信业务。That is, when the first user equipment determines, according to the security policy, that it is necessary to give priority to end-to-end security protection for ProSe relay communication, it means that it is necessary to give priority to using the layer 2 relay mechanism to establish ProSe relay communication with the second user equipment, thereby determining to first perform actions corresponding to the establishment of the layer 2 relay service, including: using the relay service code of the layer 2 relay service, discovering the layer 2 relay device, establishing a connection with the layer 2 relay device, etc. When the first user equipment determines that it is impossible to use the layer 2 relay mechanism to establish ProSe relay communication with the second user equipment, the first user equipment determines to use the layer 3 relay mechanism to establish ProSe relay communication with the second user equipment, thereby determining to perform actions corresponding to the establishment of the layer 3 relay service, including: using the relay service code of the layer 3 relay service, discovering the layer 3 relay device, establishing a connection with the layer 3 relay device, etc. That is to say, the first user equipment preferentially selects a relay device from the layer 2 relay devices, and selects a layer 3 relay device when the layer 2 relay device cannot be selected, thereby establishing a U2U relay connection between the first user equipment and the second user equipment, and then implementing the ProSe relay communication service between the first user equipment and the second user equipment based on the U2U relay connection. This method can preferentially implement end-to-end security protection between the first user equipment and the second user equipment, but also ensures the link between the first user equipment and the second user equipment when end-to-end security protection cannot be performed, so as to implement the ProSe relay communication service between the first user equipment and the second user equipment.
若安全策略指示优先对ProSe中继通信不使用端到端的安全保护,第一用户设备根据该安全策略确定执行第一操作,则该第一操作需要优先支持在第一用户设备和第二用户设备之间不使用端到端的安全保护,此时的第一操作包括:接收来自至少一个中继设备的消息;然后,第一用户设备与所述至少一个中继设备中的第一中继设备建立中继连接,其中,第一用户设备接收到的该第一中继设备的消息中包括层三中继业务的中继服务标识,该第一中继设备为所述至少一个中继设备中的一个中继设备,可以由第一用户设备根据一定条件进行选择(关于中继设备的选择请参见前文相关介绍),进一步的,如果第一用户设备确定无法与任何层三中继业务的中继服务标识对应的中继设备建立链接,则第一用户设备与所述至少一个中继设备中的第二中继设备建立连接,其中,第一用户设备接收到的该第二中继设备的消息中包括层二中继业务的中继服务标识,该第二中继设备为所述至少一个中继设备中的一个中继设备,可以由第一用户设备根据一定条件进行选择(关于中继设备的选择请参见前文相关介绍)。上述链接用于发送第一用户设备与第二用户设备之间的ProSe中继通信业务的业务数据。If the security policy indicates that end-to-end security protection is not used for ProSe relay communication, and the first user equipment determines to perform a first operation according to the security policy, then the first operation needs to preferentially support not using end-to-end security protection between the first user equipment and the second user equipment. The first operation at this time includes: receiving a message from at least one relay device; then, the first user equipment establishes a relay connection with a first relay device among the at least one relay device, wherein the message of the first relay device received by the first user equipment includes a relay service identifier of a layer 3 relay service, and the first relay device is a relay device among the at least one relay device. The first user device is selected according to certain conditions (for the selection of relay devices, please refer to the relevant introduction above). Further, if the first user device determines that it is impossible to establish a link with the relay device corresponding to the relay service identifier of any layer 3 relay service, the first user device establishes a connection with the second relay device in the at least one relay device, wherein the message of the second relay device received by the first user device includes the relay service identifier of the layer 2 relay service, and the second relay device is one of the at least one relay device, which can be selected by the first user device according to certain conditions (for the selection of relay devices, please refer to the relevant introduction above). The above link is used to send service data of the ProSe relay communication service between the first user device and the second user device.
也就是说,当第一用户设备根据安全策略确定要优先对ProSe中继通信不使用端到端的安全保护时,就表示要优先使用层三中继机制与第二用户设备建立ProSe中继通信,从而确定要先执行与层3中继业务 建立相对应的动作。而当第一用户设备确定无法使用层三中继机制与第二用户设备建立ProSe中继通信时,第一用户设备确定使用层二中继机制与第二用户设备建立ProSe中继通信,从而确定要执行与层3中继业务建立相对应的动作。也就是说,第一用户设备优先从层3的中继设备中去选择中继设备,在无法选择到层3的中继设备时再去选择层2的中继设备,从而建立起第一用户设备到第二用户设备之间的U2U中继连接,进而基于该U2U中继连接实现第一用户设备与第二用户设备之间的ProSe中继通信业务。应理解,此种方法优先选择使用层3中继机制,可能是出于业务启动效率、资源占用等方面的考虑,但也在无法使用层3中继机制时转而去使用层2中继机制,以实现第一用户设备与第二用户设备之间的ProSe中继通信业务。That is, when the first user equipment determines according to the security policy that it is preferred not to use end-to-end security protection for ProSe relay communication, it means that it is preferred to use the layer 3 relay mechanism to establish ProSe relay communication with the second user equipment, thereby determining to first execute the layer 3 relay service. Establish corresponding actions. When the first user equipment determines that it is impossible to use the layer 3 relay mechanism to establish ProSe relay communication with the second user equipment, the first user equipment determines to use the layer 2 relay mechanism to establish ProSe relay communication with the second user equipment, thereby determining to perform actions corresponding to the establishment of the layer 3 relay service. That is, the first user equipment preferentially selects a relay device from the layer 3 relay devices, and then selects the layer 2 relay device when the layer 3 relay device cannot be selected, thereby establishing a U2U relay connection between the first user equipment and the second user equipment, and then implementing the ProSe relay communication service between the first user equipment and the second user equipment based on the U2U relay connection. It should be understood that this method gives priority to the use of the layer 3 relay mechanism, which may be due to considerations such as service startup efficiency and resource occupation, but also turns to the use of the layer 2 relay mechanism when the layer 3 relay mechanism cannot be used to implement the ProSe relay communication service between the first user equipment and the second user equipment.
下面对安全策略的形式进行介绍。The following is an introduction to the form of security policies.
在一种可能的实施例中,安全策略可以是明确的指示信息。In a possible embodiment, the security policy may be explicit instruction information.
例如,安全策略可以是明确的指示信息,指示对ProSe中继通信业务必须使用端到端的安全保护,或者是指示在ProSe中继通信业务中必须使用层2中继机制,或者是指示必须使用层二中继业务的中继服务标识来发现ProSe中继通信业务中所需的中继设备。For example, the security policy may be explicit indication information, indicating that end-to-end security protection must be used for the ProSe relay communication service, or indicating that a layer 2 relay mechanism must be used in the ProSe relay communication service, or indicating that a relay service identifier of a layer 2 relay service must be used to discover the relay device required in the ProSe relay communication service.
再如,安全策略可以是明确的指示信息,指示不对ProSe中继通信业务使用端到端的安全保护,或者是指示在ProSe中继通信业务中不使用层2中继机制,或者是指示在ProSe中继通信业务中必须使用层3中继机制,或者是指示必须使用层三中继业务的中继服务标识来发现ProSe中继通信业务中所需的中继设备。For another example, the security policy may be clear indication information, indicating not to use end-to-end security protection for the ProSe relay communication service, or indicating not to use the layer 2 relay mechanism in the ProSe relay communication service, or indicating that the layer 3 relay mechanism must be used in the ProSe relay communication service, or indicating that the relay service identifier of the layer 3 relay service must be used to discover the relay device required in the ProSe relay communication service.
再如,安全策略可以是明确的指示信息,指示对ProSe中继通信业务优先使用端到端的安全保护,或者是指示在ProSe中继通信业务中优先使用层2中继机制,或者是指示优先使用层二中继业务的中继服务标识来发现ProSe中继通信业务中所需的中继设备。For another example, the security policy may be clear indication information, indicating that end-to-end security protection is given priority for the ProSe relay communication service, or indicating that the layer 2 relay mechanism is given priority in the ProSe relay communication service, or indicating that the relay service identifier of the layer 2 relay service is given priority to discover the relay device required in the ProSe relay communication service.
在另一种可能的实施例中,安全策略包括层二中继业务的中继服务标识和/或层三中继业务的中继服务标识。In another possible embodiment, the security policy includes a relay service identifier of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service.
例如,层二中继业务的中继服务标识可以是层二中继业务的中继服务代码,用于指示层二的中继机制;层三中继业务的中继服务标识可以是层三中继业务的中继服务代码,用于指示层三的中继机制。For example, the relay service identifier of a layer 2 relay service may be a relay service code of a layer 2 relay service, used to indicate a layer 2 relay mechanism; the relay service identifier of a layer 3 relay service may be a relay service code of a layer 3 relay service, used to indicate a layer 3 relay mechanism.
在安全策略仅包括层二中继业务的中继服务标识的情况下,该安全策略便是指示对ProSe中继通信业务进行端到端的安全保护,即表示要使用层2的中继机制来建立ProSe中继通信,使用层二的中继服务标识来发现层2中继设备。在安全策略仅包括层三中继业务的中继服务标识的情况下,该安全策略便是指示对ProSe中继通信业务进行端到端的安全保护,即表示要使用层3的中继机制来建立ProSe中继通信,使用层三的中继服务标识来发现层3中继设备。In the case where the security policy only includes the relay service identifier of the layer 2 relay service, the security policy indicates that the ProSe relay communication service is end-to-end securely protected, that is, the layer 2 relay mechanism is used to establish the ProSe relay communication, and the layer 2 relay service identifier is used to discover the layer 2 relay device. In the case where the security policy only includes the relay service identifier of the layer 3 relay service, the security policy indicates that the ProSe relay communication service is end-to-end securely protected, that is, the layer 3 relay mechanism is used to establish the ProSe relay communication, and the layer 3 relay service identifier is used to discover the layer 3 relay device.
在另一种可能的实施例中,安全策略包括优先级信息。In another possible embodiment, the security policy includes priority information.
若上述优先级信息用于指示层二中继业务的中继服务标识需要被优先使用,并且此时第一用户设备还未曾使用层二中继业务来建立其所要实现的ProSe中继通信(即第一用户设备和第二用户设备之间的ProSe中继通信),则此时的安全策略便是指示对ProSe中继通信业务进行端到端的安全保护,即表示要使用层2的中继机制来建立ProSe中继通信。若上述优先级信息用于指示层二中继业务的中继服务标识需要被优先使用,并且此时第一用户设备使用层二中继业务实现ProSe中继通信失败,则此时的安全策略便是指示不对ProSe中继通信业务进行端到端的安全保护,即表示要使用层3的中继机制来建立ProSe中继通信。If the above priority information is used to indicate that the relay service identifier of the layer 2 relay service needs to be used first, and at this time the first user equipment has not used the layer 2 relay service to establish the ProSe relay communication it wants to implement (i.e., the ProSe relay communication between the first user equipment and the second user equipment), then the security policy at this time is to indicate that the ProSe relay communication service is to be end-to-end securely protected, that is, it is to use the layer 2 relay mechanism to establish the ProSe relay communication. If the above priority information is used to indicate that the relay service identifier of the layer 2 relay service needs to be used first, and at this time the first user equipment fails to implement the ProSe relay communication using the layer 2 relay service, then the security policy at this time is to indicate that the ProSe relay communication service is not to be end-to-end securely protected, that is, it is to use the layer 3 relay mechanism to establish the ProSe relay communication.
若上述优先级信息用于指示层三中继业务的中继服务标识需要被优先使用,并且此时第一用户设备还未层使用层三中继业务来建立其所要实现的ProSe中继通信(即第一用户设备和第二用户设备之间的ProSe中继通信),则此时的安全策略便是指示不对ProSe中继通信业务进行端到端的安全保护,即表示要使用层3的中继机制来建立ProSe中继通信。若该优先级信息用于指示层三中继业务的中继服务标识需要被优先使用,并且此时第一用户设备使用层三中继业务实现ProSe中继通信失败,则此时的安全策略便是指示对ProSe中继通信业务进行端到端的安全保护,即表示要使用层2的中继机制来建立ProSe中继通信。If the above priority information is used to indicate that the relay service identifier of the layer 3 relay service needs to be used first, and at this time the first user equipment has not yet used the layer 3 relay service to establish the ProSe relay communication it wants to implement (i.e., the ProSe relay communication between the first user equipment and the second user equipment), then the security policy at this time is to indicate that no end-to-end security protection is performed on the ProSe relay communication service, that is, it is necessary to use the layer 3 relay mechanism to establish the ProSe relay communication. If the priority information is used to indicate that the relay service identifier of the layer 3 relay service needs to be used first, and at this time the first user equipment fails to implement the ProSe relay communication using the layer 3 relay service, then the security policy at this time is to indicate that end-to-end security protection is performed on the ProSe relay communication service, that is, it is necessary to use the layer 2 relay mechanism to establish the ProSe relay communication.
需要说明的是,在安全策略包括优先级信息的情况下,安全策略中也可以包括层二中继业务的中继服务标识和/或层三中继业务的中继服务标识。It should be noted that, when the security policy includes priority information, the security policy may also include a relay service identifier of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service.
还需要说明的是,关于安全策略中的优先级信息的具体形式,本申请实施例不做限定。例如,优先级信息可以是层二中继业务的中继服务标识和层三中继业务的中继服务标识之间的排序,排序在前的中继服务标识需要被优先使用。再如,优先级信息可以是明确的指示信息,指示层二中继业务的中继服务标识或层三中继业务的中继服务标识需要被优先使用。 It should also be noted that the specific form of the priority information in the security policy is not limited in the embodiments of the present application. For example, the priority information may be the order between the relay service identifier of the layer 2 relay service and the relay service identifier of the layer 3 relay service, and the relay service identifier in the previous order needs to be used first. For another example, the priority information may be clear indication information indicating that the relay service identifier of the layer 2 relay service or the relay service identifier of the layer 3 relay service needs to be used first.
下面介绍本申请提供的通信方法的第二实施例。The second embodiment of the communication method provided by the present application is introduced below.
请参见图11,图11是本申请实施例中提供的另一种通信方法的流程示意图,用于测距定位业务场景,可以包括如下步骤:Please refer to FIG. 11, which is a flow chart of another communication method provided in an embodiment of the present application, which is used in a ranging and positioning service scenario and may include the following steps:
S1101:第一用户设备获取安全策略。S1101: A first user equipment obtains a security policy.
其中,第一用户设备是具有测距定位业务功能的用户设备。例如,第一用户设备上可以安装有用于提供测距定位业务功能的应用程序,并且第一用户设备向PCF完成了与测距定位业务相关的授权、参数/策略获取等流程,从而使得第一用户设备具备测距定位业务的功能。The first user equipment is a user equipment with ranging and positioning service functions. For example, an application for providing ranging and positioning service functions may be installed on the first user equipment, and the first user equipment completes authorization, parameter/policy acquisition and other processes related to ranging and positioning services to the PCF, so that the first user equipment has the ranging and positioning service functions.
其中,上述安全策略用于指示是否对侧链通信业务使用端到端的安全保护。The above security policy is used to indicate whether to use end-to-end security protection for the side chain communication service.
在本实施例中,侧链通信业务是指基于辅助设备的测距定位业务,即间接测距定位业务。应理解,针对间接测距定位这类业务的端到端的安全保护是实施在间接测距定位业务对应的两个用户设备之间的,即在同一测距定位业务中的源UE和目标UE之间实施端到端的安全保护。由前文介绍可知,间接测距定位业务可以通过方案一和方案二(具体请参见前文介绍)来实现。由于方案一中的辅助设备不会得到辅助设备和目标UE之间的测距结果(对于源UE和目标UE来说是隐私敏感信息),不存在被辅助设备泄露隐私的风险,因此方案一支持为间接测距定位业务提供端到端的安全保护。由于方案二中的辅助设备会得到辅助设备和目标UE之间的测距结果,该测距结果有可能在辅助设备处被泄露,存在隐私泄露的安全隐患,因此方案二不支持为间接测距定位业务提供端到端的安全保护。In this embodiment, the side chain communication service refers to the ranging and positioning service based on the auxiliary device, that is, the indirect ranging and positioning service. It should be understood that the end-to-end security protection for such services as indirect ranging and positioning is implemented between the two user devices corresponding to the indirect ranging and positioning service, that is, the end-to-end security protection is implemented between the source UE and the target UE in the same ranging and positioning service. As can be seen from the previous introduction, the indirect ranging and positioning service can be implemented through Scheme 1 and Scheme 2 (see the previous introduction for details). Since the auxiliary device in Scheme 1 will not obtain the ranging result between the auxiliary device and the target UE (privacy-sensitive information for the source UE and the target UE), there is no risk of privacy leakage by the auxiliary device, so Scheme 1 supports end-to-end security protection for indirect ranging and positioning services. Since the auxiliary device in Scheme 2 will obtain the ranging result between the auxiliary device and the target UE, the ranging result may be leaked at the auxiliary device, and there is a security risk of privacy leakage, so Scheme 2 does not support end-to-end security protection for indirect ranging and positioning services.
因此,在间接测距定位场景中,安全策略用于指示是否对间接测距定位业务使用端到端的安全保护,进一步可用于指示是否使用方案一/方案二来进行间接测距定位业务。若第一用户设备获取的安全策略指示对间接测距定位业务使用端到端的安全保护,则第一用户设备根据该安全策略,可以确定使用方案一来实现第一用户设备与其他用户设备之间的间接测距定位业务。若安全策略指示不对间接测距定位业务使用端到端的安全保护,则第一用户设备根据该安全策略,可以确定使用方案二来实现第一用户设备与其他用户设备之间的间接测距定位业务。若安全策略指示优先对间接测距定位业务使用端到端的安全保护,则第一用户设备根据该安全策略,可以确定优先使用方案一来实现第一用户设备与其他用户设备之间的间接测距定位业务,在确定无法方案一实现间接测距定位业务的情况下,再使用方案二来实现。Therefore, in the indirect ranging positioning scenario, the security policy is used to indicate whether to use end-to-end security protection for the indirect ranging positioning service, and can be further used to indicate whether to use Solution 1/Solution 2 for the indirect ranging positioning service. If the security policy obtained by the first user device indicates that end-to-end security protection is used for the indirect ranging positioning service, the first user device can determine to use Solution 1 to implement the indirect ranging positioning service between the first user device and other user devices according to the security policy. If the security policy indicates that end-to-end security protection is not used for the indirect ranging positioning service, the first user device can determine to use Solution 2 to implement the indirect ranging positioning service between the first user device and other user devices according to the security policy. If the security policy indicates that end-to-end security protection is used preferentially for the indirect ranging positioning service, the first user device can determine to use Solution 1 preferentially to implement the indirect ranging positioning service between the first user device and other user devices according to the security policy, and if it is determined that Solution 1 cannot implement the indirect ranging positioning service, Solution 2 is used to implement it.
在一种可能的实施例中,第一用户设备获取的安全策略是存储在第一用户设备上的。此实施例的具体内容可以参见步骤S1001中的相关介绍,这里不重复。In a possible embodiment, the security policy acquired by the first user equipment is stored on the first user equipment. The specific content of this embodiment can be found in the relevant introduction in step S1001, which will not be repeated here.
在另一种可能的实施例中,安全策略可以是来自核心网网元的,所述核心网网元可以是策略管理网元、直连通信发现名称管理网元、接入管理网元或数据管理网元中的一项或多项。此实施例的具体内容也请参见步骤S1001中的相关介绍,这里不重复。In another possible embodiment, the security policy may be from a core network element, and the core network element may be one or more of a policy management element, a direct communication discovery name management element, an access management element, or a data management element. For the specific content of this embodiment, please refer to the relevant introduction in step S1001, which is not repeated here.
需要说明的是,本申请实施例对步骤S1101的执行顺序不做具体限制,只要保障在步骤S1103之前执行即可。例如,步骤S1101可以在步骤S1102之前执行,也可以与步骤S1102并行执行,还可以在步骤S1102和步骤S1103之间执行。It should be noted that the embodiment of the present application does not impose any specific restrictions on the execution order of step S1101, as long as it is executed before step S1103. For example, step S1101 can be executed before step S1102, can be executed in parallel with step S1102, or can be executed between step S1102 and step S1103.
S1102:第一用户设备触发间接测距定位业务需求。S1102: The first user equipment triggers an indirect ranging and positioning service demand.
需要说明的是,关于第一用户设备是如何触发间接测距定位业务需求的,本申请实施例对此不做具体限定。It should be noted that the embodiment of the present application does not specifically limit how the first user equipment triggers the indirect ranging and positioning service demand.
在一些可能的实施例中,第一用户设备可以接收来自其他设备的请求,从而触发间接测距定位业务需求。上述其他设备可以是NF、AS、AF或3rd UE等,不具体限定。In some possible embodiments, the first user equipment may receive a request from other equipment, thereby triggering an indirect ranging and positioning service requirement. The other equipment may be NF, AS, AF or 3rd UE, etc., without specific limitation.
上述请求可以是明确指示与第二用户设备(即目标UE)进行间接测距定位业务的请求,于是第一用户设备根据接收到的上述请求可以直接触发间接测距定位业务需求。The request may be a request for explicitly instructing to perform an indirect ranging and positioning service with the second user equipment (ie, the target UE), so the first user equipment may directly trigger the indirect ranging and positioning service demand according to the received request.
上述请求也可以是指示与第二用户设备执行测距定位业务需求(并未指定是直接测距定位还是间接测距定位),于是第一用户设备基于该请求的指示,可以先选择与第二用户设备进行直接测距定位业务。但是,第一用户设备发现与目标UE之间不满足直接测距定位业务的条件,例如,目标UE处于源UE的信号范围之外,或者源UE与目标UE之间的通信质量不够好、源UE与目标UE无法建立PC5链接等等。此时第一用户设备确定自身无法与目标UE进行直接测距定位,从而触发了通过辅助设备与目标UE进行间接测距定位的业务需求,即触发间接测距定位业务需求。The above request may also be an indication of the need to perform ranging and positioning services with the second user equipment (it does not specify whether it is direct ranging or indirect ranging), so the first user equipment can first choose to perform direct ranging and positioning services with the second user equipment based on the indication of the request. However, the first user equipment finds that the conditions for direct ranging and positioning services are not met with the target UE, for example, the target UE is outside the signal range of the source UE, or the communication quality between the source UE and the target UE is not good enough, the source UE and the target UE cannot establish a PC5 link, etc. At this time, the first user equipment determines that it cannot perform direct ranging and positioning with the target UE, thereby triggering the service demand for indirect ranging and positioning with the target UE through the auxiliary device, that is, triggering the indirect ranging and positioning service demand.
在另一些可能的实施例中,第一用户设备也可以是自身触发间接测距定位业务需求的。In some other possible embodiments, the first user equipment may also trigger the indirect ranging and positioning service demand by itself.
例如,用户在第一用户设备上执行了某种特定操作(比如,用户在第一用户设备安装的某个与测距定位业务相关的APP上,点击了测距按钮),从而触发了第一用户设备的测距定位业务需求/间接测距定位业务需求。应理解,若触发的是测距定位业务需求,第一用户设备也可以是在尝试执行直接测距定位却失败 之后,进而触发了间接测距定位业务需求。For example, the user performs a certain specific operation on the first user device (for example, the user clicks the ranging button on an APP related to the ranging and positioning service installed on the first user device), thereby triggering the ranging and positioning service demand/indirect ranging and positioning service demand of the first user device. It should be understood that if the ranging and positioning service demand is triggered, the first user device may also be trying to perform direct ranging and positioning but failed. Afterwards, the demand for indirect ranging and positioning services was triggered.
S1103:第一用户设备根据安全策略确定执行第一操作,第一操作用于建立第一用户设备与第二用户设备之间的间接测距定位业务。S1103: The first user equipment determines to execute a first operation according to a security policy, where the first operation is used to establish an indirect ranging and positioning service between the first user equipment and the second user equipment.
由前述步骤S1101中的介绍可知,安全策略用于指示是否对间接测距定位业务使用端到端的安全保护。第一用户设备根据该安全策略,即确定是否要对自身所要执行的间接测距定位业务使用端到端的安全保护。As described in step S1101, the security policy is used to indicate whether to use end-to-end security protection for the indirect ranging positioning service. The first user equipment determines whether to use end-to-end security protection for the indirect ranging positioning service to be executed by itself according to the security policy.
若安全策略指示对间接测距定位业务使用端到端的安全保护,第一用户设备根据该安全策略确定执行第一操作,则该第一操作需要支持在第一用户设备和第二用户设备之间实现端到端的安全保护,此时的第一操作包括:第一用户设备通过与第二用户设备的链接向第二用户设备发送第一测距请求,其中,所述第一测距请求指示测量第二用户设备与辅助设备的距离和/或角度,第一测距请求的测距结果用于确定第一用户设备与第二用户设备的距离和/或角度。需要说明的是,第一用户设备与第二用户设备的链接包括PC5直连链接和/或通过U2U中继进行的链接。If the security policy indicates the use of end-to-end security protection for the indirect ranging positioning service, and the first user device determines to perform the first operation according to the security policy, then the first operation needs to support end-to-end security protection between the first user device and the second user device. The first operation at this time includes: the first user device sends a first ranging request to the second user device through a link with the second user device, wherein the first ranging request indicates the measurement of the distance and/or angle between the second user device and the auxiliary device, and the ranging result of the first ranging request is used to determine the distance and/or angle between the first user device and the second user device. It should be noted that the link between the first user device and the second user device includes a PC5 direct link and/or a link through a U2U relay.
也就是说,当第一用户设备根据安全策略确定要对间接测距定位业务使用端到端的安全保护时,就表示第一用户设备要使用方案一来实现其与第二用户设备之间的间接测距定位业务,从而确定第一用户设备要执行方案一(具体见图8实施例)中的源UE相对应的动作,包括以下至少一项:与目标UE(即第二用户设备)建立链接、通过上述链接向目标UE发送第一测距请求、接收目标UE发送的目标UE与辅助设备之间的测距结果,等等。也就是说,第一用户设备会通过其与第二用户设备之间的链接向第二用户设备发送第一测距请求,以指示第二用户设备对辅助设备进行测距业务,第一用户设备进而可以通过上述链接接收第二用户设备发送的第二用户设备与辅助设备之间的测距结果,进而可以确定第一用户设备与第二用户设备的测距结果,完成了第一用户设备和第二用户设备之间的间接测距定位业务。可以理解,此时测距结果不经由辅助设备发送,从而避免了隐私泄露风险,实现了第一用户设备和第二用户设备之间的端到端的安全保护。That is to say, when the first user equipment determines to use end-to-end security protection for the indirect ranging positioning service according to the security policy, it means that the first user equipment will use solution one to implement the indirect ranging positioning service between it and the second user equipment, so as to determine that the first user equipment will perform the action corresponding to the source UE in solution one (see the embodiment of Figure 8 for details), including at least one of the following: establishing a link with the target UE (i.e., the second user equipment), sending a first ranging request to the target UE through the above link, receiving the ranging result between the target UE and the auxiliary device sent by the target UE, and so on. That is to say, the first user equipment will send a first ranging request to the second user equipment through the link between it and the second user equipment to instruct the second user equipment to perform the ranging service on the auxiliary device, and the first user equipment can then receive the ranging result between the second user equipment and the auxiliary device sent by the second user equipment through the above link, and then determine the ranging result between the first user equipment and the second user equipment, and complete the indirect ranging positioning service between the first user equipment and the second user equipment. It can be understood that at this time, the ranging result is not sent via the auxiliary device, thereby avoiding the risk of privacy leakage and realizing end-to-end security protection between the first user equipment and the second user equipment.
若安全策略指示不对间接测距定位业使用端到端的安全保护,第一用户设备根据该安全策略确定执行第一操作,则该第一操作不需要支持在第一用户设备和第二用户设备之间实现端到端的安全保护,此时的第一操作包括:第一用户设备通过与辅助设备的直连链接向辅助设备发送第二测距请求,其中,第二测距请求指示测量第二用户设备与辅助设备的距离和/或角度,第二测距请求的测距结果用于确定第一用户设备与第二用户设备的距离和/或角度。If the security policy indicates that end-to-end security protection is not used for the indirect ranging positioning industry, and the first user equipment determines to perform the first operation according to the security policy, then the first operation does not need to support end-to-end security protection between the first user equipment and the second user equipment. The first operation at this time includes: the first user equipment sends a second ranging request to the auxiliary device through a direct link with the auxiliary device, wherein the second ranging request indicates measuring the distance and/or angle between the second user equipment and the auxiliary device, and the ranging result of the second ranging request is used to determine the distance and/or angle between the first user equipment and the second user equipment.
也就是说,当第一用户设备根据安全策略确定不对间接测距定位业务使用端到端的安全保护时,就表示第一用户设备要使用方案二(具体见图9实施例)来实现其与第二用户设备之间的间接测距定位业务,从而确定第一用户设备要执行方案二中的源UE相对应的动作,包括以下至少一项:与辅助设备建立链接、通过上述链接向辅助设备发送第二测距请求、接收辅助UE发送的目标UE与辅助设备之间的测距结果,等等。也就是说,第一用户设备会通过其与辅助设备之间的链接向辅助设备发送第二测距请求,以指示辅助设备对第二用户设备执行测距业务,而不是去指示第二用户设备对辅助设备进行测距业务;相应的,第一用户设备可以通过上述链接接收到辅助设备发送的辅助设备与第二用户设备之间的测距结果,进而可以确定第一用户设备与第二用户设备的测距结果,完成了第一用户设备和第二用户设备之间的间接测距定位业务。可以理解,辅助设备与第二用户设备之间的测距结果需要经由辅助设备发送至第一用户设备,对于执行间接测距业务的第一用户设备和第二用户设备来说,在辅助设备处会存在隐私泄露风险,也就无法实现第一用户设备和第二用户设备之间的端到端的安全保护。That is, when the first user equipment determines not to use end-to-end security protection for the indirect ranging positioning service according to the security policy, it means that the first user equipment will use solution 2 (see the embodiment of FIG. 9 for details) to implement the indirect ranging positioning service between it and the second user equipment, thereby determining that the first user equipment will perform the action corresponding to the source UE in solution 2, including at least one of the following: establishing a link with the auxiliary device, sending a second ranging request to the auxiliary device through the above link, receiving the ranging result between the target UE and the auxiliary device sent by the auxiliary UE, etc. That is, the first user equipment will send the second ranging request to the auxiliary device through the link between it and the auxiliary device to instruct the auxiliary device to perform the ranging service on the second user equipment, instead of instructing the second user equipment to perform the ranging service on the auxiliary device; accordingly, the first user equipment can receive the ranging result between the auxiliary device and the second user equipment sent by the auxiliary device through the above link, and then determine the ranging result between the first user equipment and the second user equipment, and complete the indirect ranging positioning service between the first user equipment and the second user equipment. It can be understood that the ranging result between the auxiliary device and the second user device needs to be sent to the first user device via the auxiliary device. For the first user device and the second user device that perform indirect ranging services, there will be a risk of privacy leakage at the auxiliary device, and end-to-end security protection between the first user device and the second user device cannot be achieved.
若安全策略指示优先对间接测距定位业务使用端到端的安全保护,第一用户设备根据该安全策略确定执行第一操作,则该第一操作需要优先支持在第一用户设备和第二用户设备之间实现端到端的安全保护,此时的第一操作包括:第一用户设备通过与第二用户设备的链接向第二用户设备发送第一测距请求,其中,所述第一测距请求指示测量第二用户设备与辅助设备的距离和/或角度,第一测距请求的测距结果用于确定第一用户设备与第二用户设备的距离和/或角度,进一步的,如果第一用户设备执行方案一失败(例如,第一用户设备与第二用户设备之间无法建立链接,导致第一用户设备无法向第二用户设备发送第一测距请求),则第一用户设备再使用方案二,向辅助设备发送第二测距请求,所述第二测距请求指示测量辅助设备与第二用户设备之间的距离和/或角度,进而实现第一用户设备与第二用户设备之间的间接测距定位业务。If the security policy indicates that end-to-end security protection is preferentially used for the indirect ranging positioning service, and the first user equipment determines to perform the first operation according to the security policy, then the first operation needs to preferentially support end-to-end security protection between the first user equipment and the second user equipment. At this time, the first operation includes: the first user equipment sends a first ranging request to the second user equipment through a link with the second user equipment, wherein the first ranging request indicates measuring the distance and/or angle between the second user equipment and the auxiliary equipment, and the ranging result of the first ranging request is used to determine the distance and/or angle between the first user equipment and the second user equipment. Further, if the first user equipment fails to execute solution one (for example, a link cannot be established between the first user equipment and the second user equipment, resulting in the first user equipment being unable to send the first ranging request to the second user equipment), the first user equipment uses solution two again to send a second ranging request to the auxiliary equipment, and the second ranging request indicates measuring the distance and/or angle between the auxiliary equipment and the second user equipment, thereby realizing the indirect ranging positioning service between the first user equipment and the second user equipment.
也就是说,当第一用户设备根据安全策略确定要优先对间接测距定位业务使用端到端的安全保护时,就表示第一用户设备要优先使用方案一来实现其与第二用户设备之间的间接测距定位业务,从而第一用户设备确定要优先执行方案一中的源UE对应的动作(参见前文介绍)。而在第一用户设备确定方案一执行失败时,第一用户设备再执行方案二中的源UE对应的动作(参见前文介绍),以实现第一用户设备与第二用 户设备之间的间接测距定位业务。可以理解,此种方法选择优先使用方案一,以尽量实现第一用户设备与第二用户设备之间的端到端的安全保护,而在无法实现第一用户设备与第二用户设备之间的端到端的安全保护的情况下,仍可以通过方案二实现第一用户设备与第二用户设备之间的间接测距定位业务。That is to say, when the first user equipment determines to give priority to end-to-end security protection for the indirect ranging positioning service according to the security policy, it means that the first user equipment should give priority to using solution one to implement the indirect ranging positioning service between it and the second user equipment, so that the first user equipment determines to give priority to executing the action corresponding to the source UE in solution one (see the above introduction). When the first user equipment determines that solution one fails to execute, the first user equipment then executes the action corresponding to the source UE in solution two (see the above introduction) to implement the indirect ranging positioning service between the first user equipment and the second user equipment. It can be understood that this method chooses to use scheme 1 first to achieve end-to-end security protection between the first user equipment and the second user equipment as much as possible, and when end-to-end security protection between the first user equipment and the second user equipment cannot be achieved, the indirect ranging positioning service between the first user equipment and the second user equipment can still be achieved through scheme 2.
在可能的实施例中,在第一用户设备通过与第二用户设备的链接向第二用户设备发送第一测距请求之前,第一用户设备需要先确定其是否可以与第二用户设备之间建立链接;在第一用户设备确定可以与第二用户设备建立链接的情况下,第一用户设备再通过与第二用户设备之间的链接向第二用户设备发送第一测距请求。In a possible embodiment, before the first user equipment sends the first ranging request to the second user equipment through the link with the second user equipment, the first user equipment needs to first determine whether it can establish a link with the second user equipment; when the first user equipment determines that it can establish a link with the second user equipment, the first user equipment then sends the first ranging request to the second user equipment through the link between the first user equipment and the second user equipment.
可以理解的是,由于方案一中的源UE需要向目标UE发送测距请求,并且目标UE需要向源UE发送目标UE与辅助设备之间的测距结果,因此,方案一要求源UE和目标UE之间建立链接。于是,在第一用户设备根据安全策略确定对其与第二用户设备之间的间接测距定位业务使用端到端的安全保护之后,第一用户设备需要先确定第一用户设备与第二用户设备之间是否可以建立链接。第一用户设备与第二用户设备之间可以建立链接,可以有以下几种情况:第一用户设备与第二用户设备之间已经建立有链接;第一用户设备与第二用户设备之间还未建立链接但满足链接建立条件。若第一用户设备与第二用户设备之间未建立链接但满足链接建立条件,则第一用户设备与第二用户设备建立链接。其中,第一用户设备与第二用户设备之间的链接,可以是直连链接(例如PC5链接),也可以是基于中继设备实现的U2U中继链接,本申请实施例不做具体限定。It can be understood that since the source UE in scheme one needs to send a ranging request to the target UE, and the target UE needs to send the ranging result between the target UE and the auxiliary device to the source UE, scheme one requires a link to be established between the source UE and the target UE. Therefore, after the first user equipment determines to use end-to-end security protection for the indirect ranging positioning service between it and the second user equipment according to the security policy, the first user equipment needs to first determine whether a link can be established between the first user equipment and the second user equipment. A link can be established between the first user equipment and the second user equipment, and there may be the following situations: a link has been established between the first user equipment and the second user equipment; a link has not been established between the first user equipment and the second user equipment but the link establishment condition is met. If a link is not established between the first user equipment and the second user equipment but the link establishment condition is met, the first user equipment establishes a link with the second user equipment. Among them, the link between the first user equipment and the second user equipment can be a direct link (such as a PC5 link) or a U2U relay link based on a relay device, which is not specifically limited in the embodiments of the present application.
如果第一用户设备确定其与第二用户设备之间可以建立链接,则第一用户设备确定可以使用方案一进行间接测距定位业务,进而通过第一用户设备与第二用户设备之间的链接,向第二用户设备发送第一测距请求。如果第一用户设备与第二用户设备之间无法建立链接,则第一用户设备确定无法继续使用方案一,即第一用户设备使用方案一进行间接测距定位业务失败。If the first user equipment determines that a link can be established between it and the second user equipment, the first user equipment determines that solution one can be used for indirect ranging and positioning services, and then sends a first ranging request to the second user equipment through the link between the first user equipment and the second user equipment. If a link cannot be established between the first user equipment and the second user equipment, the first user equipment determines that solution one cannot be used any more, that is, the first user equipment fails to use solution one for indirect ranging and positioning services.
下面对安全策略的形式进行介绍。The following is an introduction to the form of security policies.
在一种可能的实施例中,安全策略可以是明确的指示信息。In a possible embodiment, the security policy may be explicit instruction information.
例如,安全策略可以是明确的指示信息,该信息的具体内容指示对间接测距定位业务使用端到端的安全保护,或者是指示在间接测距定位业务中选择对目标UE发送测距请求以获取辅助设备与目标UE之间的测距结果。For example, the security policy may be clear indication information, the specific content of which indicates the use of end-to-end security protection for the indirect ranging positioning service, or indicates the selection of sending a ranging request to the target UE in the indirect ranging positioning service to obtain the ranging result between the auxiliary device and the target UE.
再如,安全策略可以是明确的指示信息,该信息的具体内容指示对间接测距定位业务不使用端到端的安全保护,或者是指示在间接测距定位业务中选择对辅助设备发送测距请求以获取辅助设备与目标UE之间的测距结果。For another example, the security policy may be clear indication information, the specific content of which indicates not to use end-to-end security protection for the indirect ranging positioning service, or indicates to select to send a ranging request to the auxiliary device in the indirect ranging positioning service to obtain the ranging result between the auxiliary device and the target UE.
再如,安全策略可以是明确的指示信息,该信息的具体内容指示对间接测距定位业务优先使用端到端的安全保护,或者是指示在间接测距定位业务中优先选择对辅助设备发送测距请求以获取辅助设备与目标UE之间的测距结果。For another example, the security policy may be clear indication information, the specific content of which indicates that end-to-end security protection is preferentially used for indirect ranging and positioning services, or indicates that in the indirect ranging and positioning services, a ranging request is preferentially sent to the auxiliary device to obtain the ranging result between the auxiliary device and the target UE.
综上所述,本实施例提供的通信方法基于安全策略对用户设备进行安全控制。其中,安全策略用于指示是否对侧链通信业务使用端到端的安全保护;侧链通信业务为基于侧链实现的两个用户设备之间的通信业务,例如可以是ProSe通信业务,也可以是测距定位业务。用户设备可以从本地存储获取安全策略,也可以从核心网网元获取安全策略。In summary, the communication method provided in this embodiment performs security control on the user equipment based on the security policy. Among them, the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service; the side chain communication service is a communication service between two user equipments based on the side chain, for example, it can be a ProSe communication service or a ranging and positioning service. The user equipment can obtain the security policy from the local storage or from the core network element.
用户设备在不同安全策略的指示下所执行的操作有所差异,体现在对端到端的安全保护具有不同的支持程度(包括支持、不支持、优先支持等),可以为用户设备提供更好地、更灵活的安全控制机制。例如,第一用户设备根据其获取的安全策略确定所要执行的第一操作:若安全策略指示对侧链通信业务使用端到端的安全保护时,则第一操作为能够支持在第一用户设备与第二用户设备之间实现端到端的安全保护的操作;若安全策略指示不对侧链通信业务使用端到端的安全保护时,则第一操作为不支持在第一用户设备与第二用户设备之间实现端到端的安全保护的操作;若安全策略指示优先对侧链通信业务使用端到端的安全保护时,则第一操作为优先支持在第一用户设备与第二用户设备之间实现端到端的安全保护的操作。The operations performed by user devices under the instructions of different security policies are different, which is reflected in different levels of support for end-to-end security protection (including support, non-support, priority support, etc.), which can provide better and more flexible security control mechanisms for user devices. For example, the first user device determines the first operation to be performed based on the security policy it obtains: if the security policy indicates that end-to-end security protection is used for the side chain communication service, the first operation is an operation that can support end-to-end security protection between the first user device and the second user device; if the security policy indicates that end-to-end security protection is not used for the side chain communication service, the first operation is an operation that does not support end-to-end security protection between the first user device and the second user device; if the security policy indicates that end-to-end security protection is used preferentially for the side chain communication service, the first operation is an operation that preferentially supports end-to-end security protection between the first user device and the second user device.
下面结合图12和图13,对UE从核心网网元获取安全策略的方式进行举例说明。The following is an example of how the UE obtains a security policy from a core network element in conjunction with FIG. 12 and FIG. 13 .
请参见图12,图12是本申请实施例提供的一种安全策略获取方法的流程示意图,可以包括如下步骤:Please refer to FIG. 12 , which is a flowchart of a security policy acquisition method provided in an embodiment of the present application, which may include the following steps:
S1201:AS/AF向核心网配置E2E安全需求。S1201: AS/AF configures E2E security requirements to the core network.
其中,上述AS、AF分别为应用服务器(APP server)和应用功能(application function)。AS/AF与特定的侧链通信业务对应,例如,侧链通信业务可以是ProSe通信业务(包括ProSe中继通信业务),也可以 是测距定位业务(包括间接测距定位业务)。上述AS/AF可以是侧链通信业务的APP的应用服务器/应用功能网元,也可以是网络运营商部署的专门服务于该侧链通信业务的应用服务器/应用功能网元。The AS and AF are application servers and application functions, respectively. AS/AF corresponds to a specific side chain communication service. For example, the side chain communication service can be a ProSe communication service (including a ProSe relay communication service) or a It is a ranging and positioning service (including indirect ranging and positioning service). The above AS/AF can be an application server/application function network element of the APP of the side chain communication service, or it can be an application server/application function network element deployed by the network operator specifically serving the side chain communication service.
具体的,AS/AF可以根据需要为侧链通信业务制定相应的E2E安全需求,然后向核心网配置E2E安全需求,E2E安全需求可以有多种不同的制定方式。Specifically, AS/AF can formulate corresponding E2E security requirements for side chain communication services as needed, and then configure the E2E security requirements to the core network. E2E security requirements can be formulated in a variety of different ways.
在一种可能的实施例中,AS/AF可以为同一类侧链通信业务制定的统一的E2E安全需求。其中,侧链通信业务的类别可以是ProSe通信业务,也可以是测距定位业务。统一的E2E安全需求是指所有UE在使用该类侧链通信业务时都统一遵循的E2E安全需求。In a possible embodiment, the AS/AF may formulate a unified E2E security requirement for the same type of sidelink communication service. The sidelink communication service may be a ProSe communication service or a ranging and positioning service. The unified E2E security requirement refers to the E2E security requirement that all UEs uniformly follow when using the sidelink communication service.
例如,E2E安全需求可以包括如下选项(实际应用中也可以只提供其中两个选项,各选项的内容仅作为示例):For example, E2E security requirements may include the following options (in actual applications, only two of the options may be provided, and the content of each option is only for example):
选项A:必须保证E2E安全。Option A: E2E security must be guaranteed.
选项B:优先保证E2E安全(或者说是尽量保证E2E安全)。Option B: Prioritize E2E security (or try to ensure E2E security as much as possible).
选项C:不保证E2E安全。Option C: E2E security is not guaranteed.
以ProSe通信业务这一类侧链通信业务为例,AS/AF可以在上述三个选择中选择一个,以作为ProSe通信业务统一的E2E安全需求。如果选择的是选项A,则表明所有的ProSe通信业务都必须要保证E2E安全,即任意两个UE在执行ProSe通信业务时都必须要保证它们之间的E2E安全。如果选择的是选项B,则表明所有的ProSe通信业务都尽量保证E2E安全,即任意两个UE在执行ProSe通信业务时尽量保证它们之间的E2E安全,但如果根据实时通信条件(例如保证E2E安全的ProSe通信方式无法执行)无法保证E2E安全的话,不保证ProSe通信业务的E2E安全也可以接受。如果选择的是选项C,则表明所有的ProSe通信业务都不需要保证E2E安全,即任意两个UE在执行ProSe通信业务时无需保证它们之间的E2E安全。Taking the ProSe communication service as an example, the AS/AF can select one of the three options as the unified E2E security requirement of the ProSe communication service. If option A is selected, it means that all ProSe communication services must ensure E2E security, that is, any two UEs must ensure E2E security between them when performing ProSe communication services. If option B is selected, it means that all ProSe communication services try to ensure E2E security, that is, any two UEs try to ensure E2E security between them when performing ProSe communication services, but if E2E security cannot be guaranteed according to real-time communication conditions (for example, the ProSe communication method that ensures E2E security cannot be performed), it is acceptable not to ensure E2E security of the ProSe communication service. If option C is selected, it means that all ProSe communication services do not need to ensure E2E security, that is, any two UEs do not need to ensure E2E security between them when performing ProSe communication services.
在又一种可能的实施例中,AS/AF可以为同一类侧链通信业务制定不同的E2E安全需求。可以为同一类侧链通信业务下的不同用户/不同用户组制定不同的E2E安全需求,也可以针对不同的地理位置/网络位置制定不同的E2E安全需求,UE在执行该类侧链通信业务时,需要遵循相应的E2E安全需求。需要说明的是,除了根据用户、用户组、地理位置、网络位置等粒度指定相应的安全策略,还可以有其他的指定方式,本申请不做具体限定。In another possible embodiment, the AS/AF may formulate different E2E security requirements for the same type of side-chain communication services. Different E2E security requirements may be formulated for different users/user groups under the same type of side-chain communication services, and different E2E security requirements may also be formulated for different geographic locations/network locations. When executing such side-chain communication services, the UE needs to follow the corresponding E2E security requirements. It should be noted that in addition to specifying corresponding security policies based on granularity such as users, user groups, geographic locations, and network locations, there may be other ways of specifying, which are not specifically limited in this application.
例如,AS/AF为ProSe应用的某个用户组指定的E2E安全需求为选项A,因此,对于该用户组中的任一用户,该用户对应的UE在执行侧链通信业务时需要遵循选项A,即在执行侧链通信业务时要求必须保证E2E安全。For example, the E2E security requirement specified by AS/AF for a user group of the ProSe application is option A. Therefore, for any user in the user group, the UE corresponding to the user needs to follow option A when executing the side chain communication service, that is, E2E security must be guaranteed when executing the side chain communication service.
再如,AS/AF为某个特定地理位置指定的E2E安全需求为选项B,因此,对于处在该特定地理位置中的UE,其在执行侧链通信业务时需要遵循选项B,即在执行侧链通信业务时要求尽量保证E2E安全。For another example, the E2E security requirement specified by the AS/AF for a specific geographic location is option B. Therefore, for the UE in the specific geographic location, it needs to follow option B when executing the side chain communication service, that is, it is required to ensure E2E security as much as possible when executing the side chain communication service.
在可能的实施例中,AS/AF可以向核心网配置外部服务参数,该外部服务参数包括上述E2E安全需求。In a possible embodiment, the AS/AF may configure external service parameters to the core network, where the external service parameters include the above-mentioned E2E security requirements.
需要说明的是,可以基于多种考虑因素(例如:安全性、资源占用、效率等)来指定E2E安全需求。以ProSe中继通信业务为例,如果对安全性要求特别高,那么可以选择选项A,即要求必须保证E2E安全。再如,如果对安全性要求不是特别严格,期望保证E2E安全,但不保证E2E安全的方案也可以接受,那么可以选择选项B,即优先保证E2E安全。再如,如果对安全性要求不是特别严格,而对业务实现速度、资源占用情况更加看重,那么可以选择选项C,即不保证E2E安全。应理解,不保证E2E安全的ProSe中继通信方案是基于层三中继机制实现的,相对于层二中继机制它的资源占用更少、从触发ProSe业务需求到建立起ProSe中继通信的时间会更短、效率更高。It should be noted that E2E security requirements can be specified based on a variety of considerations (for example, security, resource occupancy, efficiency, etc.). Taking the ProSe relay communication service as an example, if the security requirements are particularly high, then option A can be selected, that is, E2E security must be guaranteed. For another example, if the security requirements are not particularly strict, and it is expected to ensure E2E security, but a solution that does not ensure E2E security is also acceptable, then option B can be selected, that is, E2E security is prioritized. For another example, if the security requirements are not particularly strict, but the service implementation speed and resource occupancy are more important, then option C can be selected, that is, E2E security is not guaranteed. It should be understood that the ProSe relay communication solution that does not guarantee E2E security is implemented based on the layer 3 relay mechanism. Compared with the layer 2 relay mechanism, it occupies less resources, and the time from triggering the ProSe service requirements to establishing the ProSe relay communication will be shorter and more efficient.
在可能的实施例中,还可以设置选项D:优先不保证E2E安全(效率更高)。于是,如果优先考虑的是效率问题,那么可以选择该选项D,该选择通过牺牲E2E安全来优先保证ProSe中继通信业务的启动效率。根据选项D指定的安全策略要求:优先使用层三中继机制来实现ProSe中继通信业务,在层三中继机制失败时,再使用层二中继机制来实现ProSe中继通信业务。In a possible embodiment, option D may be set: E2E security is not guaranteed first (higher efficiency). Therefore, if efficiency is a priority, option D may be selected, which prioritizes the startup efficiency of the ProSe relay communication service by sacrificing E2E security. According to the security policy requirements specified in option D: the layer 3 relay mechanism is used first to implement the ProSe relay communication service, and when the layer 3 relay mechanism fails, the layer 2 relay mechanism is used to implement the ProSe relay communication service.
S1202:NEF将来自AS/AF的E2E安全需求发送至UDR进行存储。S1202: NEF sends the E2E security requirements from AS/AF to UDR for storage.
具体的,UDR可以将E2E安全需求存储在应用特定数据中。Specifically, the UDR may store the E2E security requirements in application-specific data.
需要说明的是,对于核心网网元来说,AS/AF所制定的E2E安全需求是以外部服务参数(如外部用户标识、外部用户组标识、地理位置信息)来进行描述的,例如,AS/AF针对不同的外部用户标识/外部用户组标识/地理位置指定了相应的E2E安全需求。It should be noted that for core network elements, the E2E security requirements formulated by AS/AF are described in terms of external service parameters (such as external user ID, external user group ID, and geographic location information). For example, AS/AF specifies corresponding E2E security requirements for different external user IDs/external user group IDs/geographic locations.
因此,在一种可能的实施例中,NEF在接收到来自AS/AF的E2E安全需求时,可以将该E2E安全需求中的外部服务参数替换为网络内部对应的内部服务参数。例如,NEF可以根据外部用户标识确定对应的SUPI,根据外部组标识确定对应的内部组标识,根据地理位置确定对应的网络内部位置信息(例如跟踪区 (tracking area,TA)或者注册区(registration area,RA)),从而将安全策略中的这些外部服务参数全都替换成相应的内部服务参数。在完成上述替换之后,NEF再将E2E安全需求发送至UDR进行存储。Therefore, in a possible embodiment, when the NEF receives the E2E security requirement from the AS/AF, it can replace the external service parameters in the E2E security requirement with the corresponding internal service parameters in the network. For example, the NEF can determine the corresponding SUPI according to the external user identity, determine the corresponding internal group identity according to the external group identity, and determine the corresponding network internal location information (such as tracking area) according to the geographical location. (tracking area, TA) or registration area (registration area, RA)), thereby replacing all these external service parameters in the security policy with corresponding internal service parameters. After completing the above replacement, NEF sends the E2E security requirements to UDR for storage.
在另一种可能的实施例中,NEF可以根据AS/AF发送的E2E安全需求确定相应的内部服务参数,然后将E2E安全需求和内部服务参数一起发送至UDR进行存储。In another possible embodiment, the NEF may determine corresponding internal service parameters according to the E2E security requirements sent by the AS/AF, and then send the E2E security requirements and the internal service parameters together to the UDR for storage.
在可能的实施例中,E2E安全需求还可以是默认配置在核心网网元(PCF,5GDDNMF或UDR)上的,而不是来自AS/AF。In a possible embodiment, the E2E security requirements can also be configured by default on the core network elements (PCF, 5GDDNMF or UDR) instead of coming from AS/AF.
S1203:UE向核心网发送策略请求。S1203: The UE sends a policy request to the core network.
其中,上述策略请求表示要获取侧链通信业务的策略。在本实施例中UE从PCF获取侧链通信业务的策略。侧链通信业务可以是ProSe通信业务,即UE向核心网网元请求获取ProSe通信业务所要使用的ProSe策略;侧链通信业务也可以是测距定位业务,即UE向核心网网元请求获取测距定位业务所要使用的策略。The above policy request indicates that the policy of the side chain communication service is to be obtained. In this embodiment, the UE obtains the policy of the side chain communication service from the PCF. The side chain communication service can be a ProSe communication service, that is, the UE requests the core network element to obtain the ProSe policy to be used by the ProSe communication service; the side chain communication service can also be a ranging and positioning service, that is, the UE requests the core network element to obtain the policy to be used by the ranging and positioning service.
可选的,上述策略请求可以指示获取侧链通信业务所要使用的所有策略(包括安全策略),上述策略请求也可以仅仅指示获取侧链通信业务所要使用的安全策略。Optionally, the policy request may indicate all policies (including security policies) to be used for obtaining the side chain communication service, or the policy request may indicate only the security policy to be used for obtaining the side chain communication service.
应理解,UE发送的策略请求是经过AMF传递至PCF的。It should be understood that the policy request sent by the UE is passed to the PCF via the AMF.
S1204-S1205:PCF为UE确定安全策略,向UE发送安全策略。S1204-S1205: The PCF determines a security policy for the UE and sends the security policy to the UE.
其中,安全策略用于指示是否对侧链通信业务使用端到端的安全保护。Among them, the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service.
在UE发送的上述策略请求指示获取侧链通信业务所要使用的所有策略(包括安全策略)的情况下,PCF可以根据UDR中存储的数据为UE确定侧链通信业务所使用的策略(包括根据UDR中存储的E2E安全需求为UE确定相应的安全策略),然后将这些策略一起发送给UE。应理解,PCF确定的安全策略是经过AMF传递至UE的。In the case where the above-mentioned policy request sent by the UE indicates the acquisition of all policies (including security policies) to be used for the side chain communication service, the PCF can determine the policy used by the side chain communication service for the UE according to the data stored in the UDR (including determining the corresponding security policy for the UE according to the E2E security requirements stored in the UDR), and then send these policies together to the UE. It should be understood that the security policy determined by the PCF is delivered to the UE via the AMF.
在UE发送的上述策略请求仅指示获取安全策略的情况下,PCF可以根据UDR中存储的E2E安全需求,为UE确定相应的安全策略,进而将安全策略发送给UE。In the case where the above policy request sent by the UE only indicates obtaining a security policy, the PCF may determine a corresponding security policy for the UE according to the E2E security requirements stored in the UDR, and then send the security policy to the UE.
应理解,如果E2E安全需求是存储在UDR上的,则PCF按照上述方式从UDR获取E2E安全需求以确定安全策略;如果E2E安全需求是配置在PCF上的,PCF可以直接根据本地存储E2E安全需求确定安全策略。It should be understood that if the E2E security requirements are stored on the UDR, the PCF obtains the E2E security requirements from the UDR in the above manner to determine the security policy; if the E2E security requirements are configured on the PCF, the PCF can directly determine the security policy based on the locally stored E2E security requirements.
以侧链通信业务是ProSe中继通信业务为例,如果PCF根据UDR中存储的数据确定UE对应的E2E安全需求为步骤S1201中的选项A,则PCF为UE确定的安全策略要能够指示UE对ProSe中继通信业务(必须)使用端到端的安全保护。此时,该安全策略的具体内容可以是明确的指示信息,包括如下至少一项:对ProSe中继通信业务(必须)使用端到端的安全保护;在ProSe中继通信业务中(必须)使用层二中继机制;(必须)使用层二中继业务的中继服务标识来发现ProSe中继通信业务中所需的中继设备。安全策略也可以不是明确的指示信息,安全策略中可以包括层二中继业务的中继服务标识,而不包括层三中继业务的中继服务标识,于是该安全策略也可以起到同样的指示作用,指示对ProSe中继通信业务使用端到端的安全保护。Taking the side chain communication service as the ProSe relay communication service as an example, if the PCF determines that the E2E security requirement corresponding to the UE is option A in step S1201 based on the data stored in the UDR, the security policy determined by the PCF for the UE must be able to instruct the UE to (must) use end-to-end security protection for the ProSe relay communication service. At this time, the specific content of the security policy may be clear indication information, including at least one of the following: (must) use end-to-end security protection for the ProSe relay communication service; (must) use the layer 2 relay mechanism in the ProSe relay communication service; (must) use the relay service identifier of the layer 2 relay service to discover the relay device required in the ProSe relay communication service. The security policy may not be clear indication information. The security policy may include the relay service identifier of the layer 2 relay service but not the relay service identifier of the layer 3 relay service. Therefore, the security policy can also play the same indication role, indicating the use of end-to-end security protection for the ProSe relay communication service.
如果确定UE对应的E2E安全需求为步骤S1201中的选项B,则PCF为UE确定的安全策略要能够指示UE对ProSe中继通信业务优先使用端到端的安全保护。此时,该安全策略的具体内容可以是明确的指示信息,包括如下至少一项:在ProSe中继通信业务中优先使用端到端的安全保护;在ProSe中继通信业务中优先使用层二中继机制;优先使用层二中继业务的中继服务标识来发现ProSe中继通信业务中所需的中继设备。安全策略业务可以不是明确的指示信息,安全策略中可以包括优先级信息,优先级信息用于指示优先使用层二中继业务的中继服务标识,于是该安全策略也可以起到同样的指示作用,指示对ProSe中继通信业务优先使用端到端的安全保护。需要说明的是,在安全策略中包含上述优先级信息的情况下,安全策略中还可以包括层二中继业务的中继服务标识和/或层三中继业务的中继服务标识,于是PCF通过向UE发送该安全策略,还可以起到向UE配置上述中继服务标识的作用。If it is determined that the E2E security requirement corresponding to the UE is option B in step S1201, the security policy determined by the PCF for the UE must be able to instruct the UE to give priority to end-to-end security protection for the ProSe relay communication service. At this time, the specific content of the security policy may be clear indication information, including at least one of the following: giving priority to end-to-end security protection in the ProSe relay communication service; giving priority to the layer 2 relay mechanism in the ProSe relay communication service; giving priority to the relay service identifier of the layer 2 relay service to discover the relay device required in the ProSe relay communication service. The security policy service may not be clear indication information, and the security policy may include priority information, which is used to indicate that the relay service identifier of the layer 2 relay service is used first, so the security policy can also play the same indication role, indicating that the end-to-end security protection is used first for the ProSe relay communication service. It should be noted that when the security policy contains the above-mentioned priority information, the security policy may also include the relay service identifier of the layer 2 relay service and/or the relay service identifier of the layer 3 relay service, so the PCF can also configure the above-mentioned relay service identifier to the UE by sending the security policy to the UE.
如果PCF根据UDR中存储的数据确定UE对应的E2E安全需求为步骤S1201中的选项C,则PCF为UE确定的安全策略要能够指示UE对ProSe中继通信业务不使用端到端的安全保护,或者说是指示不对侧链通信业务不使用端到端的安全保护。此时,该安全策略的具体内容可以是明确的指示信息,包括如下至少一项:对ProSe中继通信业务不使用端到端的安全保护;在ProSe中继通信业务中不使用层二中继机制;在ProSe中继通信业务中使用层三中继机制;使用层三中继业务的中继服务标识来发现ProSe中继通信业务中所需的中继设备。安全策略也可以不是明确的指示信息,安全策略中可以包括层三中继业务的中继服务标识,而不包括层二中继业务的中继服务标识,于是该安全策略也可以起到同样的指示作用,指示对ProSe中继通信业务不使用端到端的安全保护。 If the PCF determines that the E2E security requirement corresponding to the UE is option C in step S1201 based on the data stored in the UDR, the security policy determined by the PCF for the UE must be able to instruct the UE not to use end-to-end security protection for the ProSe relay communication service, or to indicate that end-to-end security protection is not used for the side chain communication service. At this time, the specific content of the security policy may be clear indication information, including at least one of the following: not using end-to-end security protection for the ProSe relay communication service; not using the layer 2 relay mechanism in the ProSe relay communication service; using the layer 3 relay mechanism in the ProSe relay communication service; using the relay service identifier of the layer 3 relay service to discover the relay device required in the ProSe relay communication service. The security policy may not be clear indication information. The security policy may include the relay service identifier of the layer 3 relay service but not the relay service identifier of the layer 2 relay service. Therefore, the security policy may also play the same indication role, indicating that end-to-end security protection is not used for the ProSe relay communication service.
如果确定UE对应的E2E安全需求为步骤S1201中的选项D,则PCF为UE确定的安全策略要能够指示UE对ProSe中继通信业务优先不使用端到端的安全保护。此时,该安全策略的具体内容可以是明确的指示信息,包括如下至少一项:在ProSe中继通信业务中优先不使用端到端的安全保护;在ProSe中继通信业务中优先使用层三中继机制;优先使用层三中继业务的中继服务标识来发现ProSe中继通信业务中所需的中继设备。安全策略业务也可以不是明确的指示信息,此时安全策略中可以包括优先级信息,优先级信息用于指示优先使用层三中继业务的中继服务标识,于是该安全策略也可以起到同样的指示作用,指示对ProSe中继通信业务优先不使用端到端的安全保护。If it is determined that the E2E security requirement corresponding to the UE is option D in step S1201, the security policy determined by the PCF for the UE must be able to instruct the UE not to use end-to-end security protection for the ProSe relay communication service. At this time, the specific content of the security policy may be clear indication information, including at least one of the following: not to use end-to-end security protection in the ProSe relay communication service; to give priority to the use of the layer 3 relay mechanism in the ProSe relay communication service; to give priority to the use of the relay service identifier of the layer 3 relay service to discover the relay device required in the ProSe relay communication service. The security policy service may not be clear indication information. At this time, the security policy may include priority information, and the priority information is used to indicate that the relay service identifier of the layer 3 relay service is used first. Therefore, the security policy can also play the same indication role, indicating that the ProSe relay communication service is not used first. End-to-end security protection.
再以侧链通信业务是间接测距定位业务为例,如果PCF根据UDR中存储的数据确定UE对应的安全需求为步骤S1201中的选项A,则PCF为UE确定的安全策略要能够指示UE对间接测距定位业务(必须)使用端到端的安全保护。此时,该安全策略的具体内容可以是明确的指示信息,可以包括如下至少一项:对间接测距定位业务(必须)使用端到端的安全保护;在间接测距定位业务中(必须)使用方案一;在间接测距定位业务中向目标UE发送测距请求,以获取辅助设备与目标UE之间的测距结果。Taking the side chain communication service as an indirect ranging and positioning service as an example, if the PCF determines that the security requirement corresponding to the UE is option A in step S1201 based on the data stored in the UDR, the security policy determined by the PCF for the UE must be able to instruct the UE to (must) use end-to-end security protection for the indirect ranging and positioning service. At this time, the specific content of the security policy can be clear instruction information, which can include at least one of the following: (must) use end-to-end security protection for the indirect ranging and positioning service; (must) use scheme 1 in the indirect ranging and positioning service; send a ranging request to the target UE in the indirect ranging and positioning service to obtain the ranging result between the auxiliary device and the target UE.
如果PCF根据UDR中存储的数据确定UE对应的安全需求为步骤S1201中的选项B,则PCF为UE确定的安全策略要能够指示UE对间接测距定位业务优先使用端到端的安全保护。此时,该安全策略的具体内容可以是明确的指示信息,可以包括如下至少一项:对间接测距定位业务优先使用端到端的安全保护;在间接测距定位业务中优先使用方案一;在间接测距定位业务中优先向目标UE发送测距请求,以获取辅助设备与目标UE之间的测距结果。If the PCF determines that the security requirement corresponding to the UE is option B in step S1201 based on the data stored in the UDR, the security policy determined by the PCF for the UE must be able to instruct the UE to give priority to end-to-end security protection for the indirect ranging positioning service. At this time, the specific content of the security policy can be clear instruction information, which can include at least one of the following: give priority to end-to-end security protection for the indirect ranging positioning service; give priority to scheme 1 in the indirect ranging positioning service; give priority to sending a ranging request to the target UE in the indirect ranging positioning service to obtain the ranging result between the auxiliary device and the target UE.
如果PCF根据UDR中存储的数据确定UE对应的安全需求为步骤S1201中的选项C,则PCF为UE确定的安全策略要能够指示UE对间接测距定位业务不使用端到端的安全保护。此时,该安全策略的具体内容可以是明确的指示信息,可以包括如下至少一项:对间接测距定位业务不使用端到端的安全保护;在间接测距定位业务中不使用方案一;在间接测距定位业务中使用方案二;在间接测距定位业务中向辅助设备发送测距请求以获取辅助设备与目标UE之间的测距结果。If the PCF determines that the security requirement corresponding to the UE is option C in step S1201 based on the data stored in the UDR, the security policy determined by the PCF for the UE must be able to instruct the UE not to use end-to-end security protection for the indirect ranging positioning service. At this time, the specific content of the security policy can be clear instruction information, which can include at least one of the following: not using end-to-end security protection for the indirect ranging positioning service; not using solution one in the indirect ranging positioning service; using solution two in the indirect ranging positioning service; sending a ranging request to the auxiliary device in the indirect ranging positioning service to obtain the ranging result between the auxiliary device and the target UE.
需要说明的是,上述两个示例中的明确的指示信息的具体内容,仅作为示例不构成限定,在实际应用中可以适当调整,只要能够表达同样的意思即可。It should be noted that the specific content of the explicit indication information in the above two examples is only for example and does not constitute a limitation, and can be appropriately adjusted in actual applications as long as the same meaning can be expressed.
在可能的实施例中,PCF可以根据UE的策略请求中携带的第一用户信息确定安全策略,其中,第一用户信息可以包括如下信息中的一项或多项:用户标识(如SUPI)、用户组标识(例如内部组标识)、地理位置、网络位置等。In a possible embodiment, the PCF may determine a security policy based on the first user information carried in the policy request of the UE, wherein the first user information may include one or more of the following information: user identifier (such as SUPI), user group identifier (such as an internal group identifier), geographic location, network location, etc.
例如,UE发送的策略请求中携带SUPI信息,PCF再根据本地是否存储有该SUPI标识的用户所对应的E2E安全需求,如果有,则根据该E2E安全需求确定安全策略,进而将安全策略发送至UE。For example, the policy request sent by the UE carries SUPI information, and the PCF determines the security policy based on whether the E2E security requirement corresponding to the user identified by the SUPI is stored locally. If yes, the PCF determines the security policy based on the E2E security requirement and then sends the security policy to the UE.
在可能的实施例中,PCF获取第二用户信息,然后根据第二用户信息以及策略请求中携带的第一用户信息确定安全策略。其中,第二用户信息可以包括如下信息中的一项或多项:用户标识(如SUPI)、用户组标识(例如内部组标识)、地理位置、网络位置等。第二用户信息是从第二网络设备获取的,第二网络设备可以是应用服务器、应用功能网元、直连通信发现名称管理网元、接入管理网元或数据管理网元中的一项或多项。In a possible embodiment, the PCF obtains the second user information, and then determines the security policy according to the second user information and the first user information carried in the policy request. The second user information may include one or more of the following information: user identification (such as SUPI), user group identification (such as internal group identification), geographic location, network location, etc. The second user information is obtained from the second network device, and the second network device may be one or more of an application server, an application function network element, a direct communication discovery name management network element, an access management network element, or a data management network element.
例如,UE发送的策略请求中携带SUPI及用户组标识信息,PCF确定UDR中存储的用户数据是否包括该SUPI,如果有则继续为其确定安全策略;PCF发现UDR中存储有该用户组标识对应的E2E安全需求,于是根据该E2E安全需求确定安全策略,进而将安全策略发送至UE。For example, the policy request sent by the UE carries SUPI and user group identification information. The PCF determines whether the user data stored in the UDR includes the SUPI. If so, it continues to determine the security policy for it. The PCF finds that the E2E security requirement corresponding to the user group identifier is stored in the UDR, so it determines the security policy based on the E2E security requirement, and then sends the security policy to the UE.
再例如,UE发送的策略请求中携带SUPI,AMF在向PCF转发该策略请求的时候同时获取到UE的位置信息(例如TA或RA信息)并发送给PCF,PCF确定UDR中存储的用户数据是否包括该SUPI,如果有则继续为其确定安全策略;PCF发现UDR中存储有该位置信息对应的E2E安全需求,于是根据该E2E安全需求确定安全策略,进而将安全策略发送至UE。For another example, the policy request sent by the UE carries SUPI. When AMF forwards the policy request to PCF, it also obtains the UE's location information (such as TA or RA information) and sends it to PCF. PCF determines whether the user data stored in the UDR includes the SUPI. If so, it continues to determine the security policy for it. PCF finds that the E2E security requirements corresponding to the location information are stored in the UDR, so it determines the security policy based on the E2E security requirements, and then sends the security policy to the UE.
可选的,若当前UE还未触发侧链通信业务需求,则UE接收到安全策略后可以将其存储在本地,以便在UE之后触发侧链通信业务需求时使用该安全策略。若当前UE已经触发侧链通信业务需求,则可以在接收到来自核心网网元的安全策略之后,根据该安全策略确定执行相应的操作。关于UE根据确定执行相应操作的具体内容,请参见图10和/或图11中的相关介绍,这里不重复。Optionally, if the current UE has not yet triggered the side chain communication service demand, the UE can store the security policy locally after receiving it, so that the security policy can be used when the UE triggers the side chain communication service demand later. If the current UE has triggered the side chain communication service demand, it can determine to perform corresponding operations according to the security policy after receiving the security policy from the core network element. For the specific content of the UE performing the corresponding operation according to the determination, please refer to the relevant introduction in Figure 10 and/or Figure 11, which will not be repeated here.
请参见图13,图13是本申请实施例提供的另一种安全策略获取方法的流程示意图,可以包括如下步骤:Please refer to FIG. 13 , which is a flowchart of another security policy acquisition method provided in an embodiment of the present application, which may include the following steps:
S1301:UE向PCF进行注册以获取侧链通信业务的授权。 S1301: The UE registers with the PCF to obtain authorization for the side chain communication service.
其中,侧链通信业务为ProSe通信业务(包括ProSe中继通信业务)或者测距定位业务(包括间接测距定位业务)。例如,UE从PCF获取测距定位业务的授权,可以被授权为测距定位业务中的源UE、辅助UE、目标UE中的一种或多种,或者,UE从PCF获取ProSe服务的授权,可以被授权为测距定位业务中的源UE、中继UE、目标UE中的一种或多种。The side chain communication service is a ProSe communication service (including a ProSe relay communication service) or a ranging and positioning service (including an indirect ranging and positioning service). For example, the UE obtains authorization for the ranging and positioning service from the PCF, and can be authorized as one or more of the source UE, auxiliary UE, and target UE in the ranging and positioning service, or the UE obtains authorization for the ProSe service from the PCF, and can be authorized as one or more of the source UE, relay UE, and target UE in the ranging and positioning service.
S1302:UE向DDNMF网元请求获取发现参数。S1302: The UE requests the DDNMF network element to obtain discovery parameters.
应理解,当UE要执行发现流程时,可以向DDNMF发送发现请求(discovery request)以获取发现流程中需要使用的发现参数。It should be understood that when the UE wants to perform a discovery process, it can send a discovery request to the DDNMF to obtain the discovery parameters needed to be used in the discovery process.
在可能的实施例中,上述发现请求携带第一用户信息,第一用户信息包括如下信息中的一项或多项:用户标识(如SUPI)、用户组标识(例如内部组标识)、地理位置、网络位置等。In a possible embodiment, the discovery request carries the first user information, and the first user information includes one or more of the following information: user identification (such as SUPI), user group identification (such as internal group identification), geographic location, network location, etc.
S1303:DDNMF向PCF请求获取UE对应的E2E安全需求。S1303: DDNMF requests PCF to obtain E2E security requirements corresponding to the UE.
具体的,DDNMF在收到UE发送的上述发现请求后,可以向PCF发送请求消息,以请求获取该UE对应的E2E安全需求,进而可以根据UE对应的E2E安全需求为UE确定安全策略。其中,请求消息包含步骤S1302中所述的第一用户信息中的部分或全部信息。Specifically, after receiving the above discovery request sent by the UE, the DDNMF may send a request message to the PCF to request to obtain the E2E security requirements corresponding to the UE, and then determine the security policy for the UE according to the E2E security requirements corresponding to the UE. The request message includes part or all of the first user information described in step S1302.
在另一种可能的实施例中,DDNMF在获取到UE发送的发现请求后,从核心网获取到UE对应的第一用户信息。具体的,DDNMF可以使用UE的SUPI信息从AMF或UDR中获取UE对应的第一用户信息。In another possible embodiment, after obtaining the discovery request sent by the UE, the DDNMF obtains the first user information corresponding to the UE from the core network. Specifically, the DDNMF may use the SUPI information of the UE to obtain the first user information corresponding to the UE from the AMF or UDR.
S1304-S1305:PCF确定UE对应的E2E安全需求,并向DDNMF发送UE对应的E2E安全需求。S1304-S1305: The PCF determines the E2E security requirements corresponding to the UE, and sends the E2E security requirements corresponding to the UE to the DDNMF.
在可能的实施例中,E2E安全需求是配置在PCF上的,于是PCF可以根据本地存储的E2E安全需求确定该UE对应的安全需求。In a possible embodiment, the E2E security requirements are configured on the PCF, so the PCF can determine the security requirements corresponding to the UE according to the locally stored E2E security requirements.
在可能的实施例中,E2E安全需求存储在UDR上,于是PCF可以根据UDR中存储的数据(包括E2E安全需求)确定该UE对应的E2E安全需求。需要说明的是,UDR上的存储的E2E安全需求可以是默认配置的,也可以是AS/AF配置的,具体请参见图12中的步骤S1201至S1202中的相关介绍,这里不赘述。In a possible embodiment, the E2E security requirements are stored on the UDR, so the PCF can determine the E2E security requirements corresponding to the UE based on the data stored in the UDR (including the E2E security requirements). It should be noted that the E2E security requirements stored on the UDR can be configured by default or configured by AS/AF. For details, please refer to the relevant introduction in steps S1201 to S1202 in Figure 12, which will not be repeated here.
S1306:DDNMF为UE确定安全策略和发现参数。S1306: DDNMF determines security policies and discovery parameters for the UE.
具体的,当DDNMF从PCF获得UE对应的E2E安全需求后,可以根据该E2E安全需求为UE确定安全策略。关于如何根据E2E安全需求确定安全策略,请参见步骤S1204中的相关介绍,这里不赘述。Specifically, after the DDNMF obtains the E2E security requirements corresponding to the UE from the PCF, a security policy can be determined for the UE according to the E2E security requirements. For how to determine the security policy according to the E2E security requirements, please refer to the relevant introduction in step S1204, which will not be repeated here.
在可能的实施例中,PCF在确定UE对应的E2E安全需求后,可以进一步确定UE所需的安全策略,然后将安全策略发送给DDNMF,此时DDNMF只需要确定发现参数。In a possible embodiment, after determining the E2E security requirements corresponding to the UE, the PCF may further determine the security policy required by the UE, and then send the security policy to the DDNMF. At this time, the DDNMF only needs to determine the discovery parameters.
S1307:DDNMF向UE发送安全策略及发现参数。S1307: DDNMF sends security policy and discovery parameters to the UE.
可以理解,在UE接收到安全发现参数后,即可根据该发现参数执行相应的发现流程。若当前UE还未触发侧链通信业务需求,则UE接收到安全策略后可以将其存储在本地,以便在UE之后触发侧链通信业务需求时使用该安全策略。若当前UE已经触发侧链通信业务需求,则可以在接收到来自核心网网元的安全策略之后,根据该安全策略确定执行相应的操作。关于UE根据确定执行相应操作的具体内容,请参见图10和/或图11中的相关介绍,这里不重复。It can be understood that after the UE receives the security discovery parameters, it can execute the corresponding discovery process according to the discovery parameters. If the current UE has not triggered the side chain communication service demand, the UE can store the security policy locally after receiving it, so that the UE can use the security policy when it triggers the side chain communication service demand later. If the current UE has triggered the side chain communication service demand, it can determine to perform corresponding operations according to the security policy after receiving the security policy from the core network element. For the specific content of the UE determining to perform corresponding operations, please refer to the relevant introduction in Figure 10 and/or Figure 11, which will not be repeated here.
需要说明的是,图12中获取安全策略的方法依托于UE向PCF获取策略的流程,而图13中获取安全策略依托于UE向DDNMF获取发现参数的流程,即安全策略可以在不同时机获取,本申请实施例不做具体限定。It should be noted that the method for obtaining the security policy in Figure 12 relies on the process of UE obtaining the policy from PCF, while the method for obtaining the security policy in Figure 13 relies on the process of UE obtaining discovery parameters from DDNMF, that is, the security policy can be obtained at different times, and the embodiment of the present application does not make specific limitations.
综上所述,用户设备从核心网网元获取安全策略可以有多种不同的实现方式,上述图12和图13示例性地给出了两种实现方式。其中,图12的安全策略获取方法可以依赖于用户设备向PCF获取侧链通信业务的策略的流程,即在用户设备向PCF请求侧链通信业务使用的策略时,PCF就可以为用户设备确定安全策略,然后将安全策略及其他侧链通信业务使用的策略一并发送至用户设备,从而实现安全策略的下发以及其他侧链通信侧链的下发。图13的安全策略获取方法可以依赖于用户设备向DDNMF获取发现参数的过程,即用户设备在执行发现流程的过程中会向DDNMF发送发现请求以获取发现参数,此时DDNMF就可以在该发现请求的回复消息中携带安全策略,从而实现向用户设备下发安全策略。当然,用户设备也可以直接向核心网网元请求获取安全策略,从而核心网网元接收到相应的安全策略。In summary, there are many different ways for the user device to obtain security policies from the core network network element. The above Figures 12 and 13 exemplify two implementation methods. Among them, the security policy acquisition method of Figure 12 can rely on the process of the user device obtaining the policy of the side chain communication service from the PCF, that is, when the user device requests the policy used by the side chain communication service from the PCF, the PCF can determine the security policy for the user device, and then send the security policy and other policies used by the side chain communication service to the user device, thereby realizing the issuance of the security policy and the issuance of other side chain communication side chains. The security policy acquisition method of Figure 13 can rely on the process of the user device obtaining discovery parameters from the DDNMF, that is, the user device will send a discovery request to the DDNMF to obtain the discovery parameters during the execution of the discovery process. At this time, the DDNMF can carry the security policy in the reply message of the discovery request, thereby realizing the issuance of the security policy to the user device. Of course, the user device can also directly request the core network network element to obtain the security policy, so that the core network network element receives the corresponding security policy.
用户设备对应的安全策略可以是预配置在核心网网元上的,也可以是核心网网元根据AS/AF配置E2E安全需求而生成的。其中,上述核心网网元可以指PCF、DDNMF、AMF、UDM、UDR中的一项或多项。可选的,AS/AF可以为同一类侧链通信业务配置统一的E2E安全需求,也可以在同一类侧链通信业务下配置更加精细的E2E安全需求,例如,可以基于用户、用户组、地理位置、网络位置等粒度来制定相应的 E2E安全需求。核心网网元可以基于一种或多种用户信息为用户设备确定安全策略,其中,上述用户信息可以全都来自用户设备,也可以全都来自核心网网元,还可以是部分来自用户设备、部分来自核心网网元,本申请实施例不做具体限定。The security policy corresponding to the user equipment can be pre-configured on the core network element, or it can be generated by the core network element according to the AS/AF configuration E2E security requirements. The above core network element can refer to one or more of PCF, DDNMF, AMF, UDM, and UDR. Optionally, AS/AF can configure unified E2E security requirements for the same type of side-link communication services, or it can configure more refined E2E security requirements under the same type of side-link communication services. For example, it can formulate corresponding E2E security requirements based on granularity such as users, user groups, geographic locations, and network locations. E2E security requirements. The core network element can determine a security policy for the user device based on one or more user information, wherein the above user information can all come from the user device, can all come from the core network element, or can be partly from the user device and partly from the core network element, which is not specifically limited in the embodiments of the present application.
下面介绍本申请实施例提供的通信装置。The following describes a communication device provided in an embodiment of the present application.
本申请根据上述方法实施例对通信装置进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时还可以有另外的划分方式。下面将结合图14至图16为例详细描述本申请实施例的通信装置。The present application divides the functional modules of the communication device according to the above method embodiment. For example, each functional module can be divided according to each function, or two or more functions can be integrated into one module. The above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of modules in the present application is schematic and is only a logical function division. There may be other division methods in actual implementation. The communication device of the embodiment of the present application will be described in detail below with reference to Figures 14 to 16 as examples.
请参见图14,图14是本申请实施例中提供的一种通信装置1400的结构示意图,包括获取模块1401和处理模块1402。Please refer to Figure 14, which is a structural diagram of a communication device 1400 provided in an embodiment of the present application, including an acquisition module 1401 and a processing module 1402.
获取模块1401用于获取安全策略,其中,安全策略用于指示是否对侧链通信业务使用端到端的安全保护,端到端的安全保护实施在侧链通信业务对应的两个用户设备(或者说装置)之间。The acquisition module 1401 is used to acquire a security policy, wherein the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service, and the end-to-end security protection is implemented between two user devices (or apparatuses) corresponding to the side chain communication service.
处理模块1402用于根据安全策略确定执行第一操作,其中,第一操作用于建立通信装置1400与第二用户设备之间的侧链通信业务。The processing module 1402 is used to determine to execute a first operation according to a security policy, wherein the first operation is used to establish a side chain communication service between the communication device 1400 and a second user equipment.
在可能的实施例中,上述安全策略指示对侧链通信业务使用端到端的安全保护,第一操作包括:通信装置1400接收来自至少一个中继设备的消息,其中,至少一个中继设备的消息均包括层二中继业务的中继服务标识;通信装置1400与至少一个中继设备中的第一中继设备建立连接,其中,通信装置1400接收到的第一中继设备的消息包括层二中继业务的服务标识,上述链接用于发送通信装置1400与第二用户设备之间的侧链通信业务的业务数据。In a possible embodiment, the above security policy indicates the use of end-to-end security protection for the side chain communication service, and the first operation includes: the communication device 1400 receives a message from at least one relay device, wherein the message of at least one relay device includes a relay service identifier of a layer 2 relay service; the communication device 1400 establishes a connection with a first relay device among the at least one relay device, wherein the message of the first relay device received by the communication device 1400 includes the service identifier of the layer 2 relay service, and the above link is used to send service data of the side chain communication service between the communication device 1400 and the second user device.
在可能的实施例中,安全策略指示不对侧链通信业务使用端到端的安全保护,第一操作包括:通信装置1400接收来自至少一个中继设备的消息,其中,至少一个中继设备的消息均包括层三中继业务的中继服务标识;通信装置1400与至少一个中继设备中的第一中继设备建立中继连接,其中,通信装置1400接收到的第一中继设备的消息包括层三中继业务的中继服务标识,中继链接用于发送通信装置1400与第二用户设备之间的侧链通信业务的业务数据。In a possible embodiment, the security policy indicates that end-to-end security protection is not used for the side chain communication service, and the first operation includes: the communication device 1400 receives a message from at least one relay device, wherein the message of the at least one relay device includes a relay service identifier of a layer 3 relay service; the communication device 1400 establishes a relay connection with a first relay device among the at least one relay device, wherein the message of the first relay device received by the communication device 1400 includes a relay service identifier of a layer 3 relay service, and the relay link is used to send service data of the side chain communication service between the communication device 1400 and the second user device.
在可能的实施例中,安全策略包括层二中继业务的中继服务标识和/或层三中继业务的中继服务标识。In a possible embodiment, the security policy includes a relay service identifier of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service.
在可能的实施例中,安全策略包括优先级信息,该优先级信息用于指示层二中继业务的中继服务标识需要被优先使用。In a possible embodiment, the security policy includes priority information, where the priority information is used to indicate that the relay service identifier of the layer 2 relay service needs to be used preferentially.
在可能的实施例中,安全策略指示对侧链通信业务使用端到端的安全保护,第一操作包括:通信装置1400通过与第二用户设备的链接向第二用户设备发送第一测距请求,其中,第一测距请求指示测量第二用户设备与辅助设备的距离和/或角度,第一测距请求的测距结果用于确定通信装置1400与第二用户设备的距离和/或角度。In a possible embodiment, the security policy indicates the use of end-to-end security protection for the side chain communication service, and the first operation includes: the communication device 1400 sends a first ranging request to the second user equipment through a link with the second user equipment, wherein the first ranging request indicates measuring the distance and/or angle between the second user equipment and the auxiliary device, and the ranging result of the first ranging request is used to determine the distance and/or angle between the communication device 1400 and the second user equipment.
在可能的实施例中,在通信装置1400通过与第二用户设备的链接向第二用户设备发送第一测距请求之前,处理模块1402还用于确定通信装置1400是否可以与第二用户设备建立链接;在通信装置1400确定可以与第二用户设备建立链接的情况下,处理模块1402还用于通过与第二用户设备的链接向第二用户设备发送第一测距请求。In a possible embodiment, before the communication device 1400 sends the first ranging request to the second user equipment through the link with the second user equipment, the processing module 1402 is further used to determine whether the communication device 1400 can establish a link with the second user equipment; when the communication device 1400 determines that a link can be established with the second user equipment, the processing module 1402 is further used to send the first ranging request to the second user equipment through the link with the second user equipment.
在可能的实施例中,安全策略指示不对侧链通信业务使用端到端的安全保护,第一操作包括:通信装置1400通过与辅助设备的直连链接向辅助设备发送第二测距请求,其中,第二测距请求指示测量第二用户设备与辅助设备的距离和/或角度,第二测距请求的测距结果用于确定通信装置1400与第二用户设备的距离和/或角度。In a possible embodiment, the security policy indicates that end-to-end security protection is not used for the side chain communication service, and the first operation includes: the communication device 1400 sends a second ranging request to the auxiliary device through a direct link with the auxiliary device, wherein the second ranging request indicates measuring the distance and/or angle between the second user equipment and the auxiliary device, and the ranging result of the second ranging request is used to determine the distance and/or angle between the communication device 1400 and the second user equipment.
在可能的实施例中,通信装置1400获取安全策略,可以包括:通信装置1400接收来自核心网网元的所述安全策略。In a possible embodiment, the communication device 1400 acquires the security policy, which may include: the communication device 1400 receives the security policy from a core network element.
在可能的实施例中,上述核心网网元是策略管理网元、直连通信发现名称管理网元、接入管理网元或数据管理网元中的一项或多项。In a possible embodiment, the core network element is one or more of a policy management network element, a direct communication discovery name management network element, an access management network element or a data management network element.
在可能的实施例中,安全策略是上述核心网网元根据通信装置1400的用户信息确定的,其中,该用户信息包括通信装置1400的用户标识、用户组标识、地理位置、网络位置中的一项或多项。In a possible embodiment, the security policy is determined by the core network element according to the user information of the communication device 1400, wherein the user information includes one or more of the user identification, user group identification, geographic location, and network location of the communication device 1400.
在可能的实施例中,在通信装置1400接收来自核心网网元的安全策略之前,该方法还包括:通信装置1400向核心网网元发送上述用户信息。 In a possible embodiment, before the communication device 1400 receives the security policy from the core network element, the method further includes: the communication device 1400 sends the above user information to the core network element.
在可能的实施例中,通信装置1400获取安全策略,包括:通信装置1400获取在通信装置1400中存储的所述安全策略。In a possible embodiment, the communication device 1400 acquires the security policy, including: the communication device 1400 acquires the security policy stored in the communication device 1400 .
需要说明的是,上述通信装置1400可以对应于图10、图11、图12和/或图13中的第一用户设备,具体用于实现图10和/或图11的通信方法的任意实施例,具体请参见上文描述,这里不赘述。It should be noted that the above-mentioned communication device 1400 can correspond to the first user equipment in Figures 10, 11, 12 and/or 13, and is specifically used to implement any embodiment of the communication method of Figures 10 and/or 11. Please refer to the above description for details and no further details will be given here.
请参见图15,图15是本申请实施例中提供的另一种通信装置1500的结构示意图,包括收发模块1501和处理模块1502。Please refer to Figure 15, which is a structural diagram of another communication device 1500 provided in an embodiment of the present application, including a transceiver module 1501 and a processing module 1502.
收发模块1501用于接收第一用户设备发送的请求消息,其中,请求消息包括第一用户设备的第一用户信息。The transceiver module 1501 is used to receive a request message sent by a first user equipment, wherein the request message includes first user information of the first user equipment.
处理模块1502用于根据第一用户信息确定安全策略,其中,安全策略用于指示是否对侧链通信业务使用端到端的安全保护,端到端的安全保护实施在侧链通信业务对应的两个用户设备之间;通信装置1500向第一用户设备发送安全策略。The processing module 1502 is used to determine a security policy based on the first user information, wherein the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service, and the end-to-end security protection is implemented between the two user devices corresponding to the side chain communication service; the communication device 1500 sends the security policy to the first user device.
在可能的实施例中,侧链通信业务为基于中继设备的临近服务通信业务,或者,所述侧链通信业务为基于辅助设备的测距定位业务。In a possible embodiment, the side chain communication service is a proximity service communication service based on a relay device, or the side chain communication service is a ranging and positioning service based on an auxiliary device.
在可能的实施例中,侧链通信业务为基于中继设备的临近服务通信业务,该安全策略包括层二中继业务的中继服务标识和/或层三中继业务的中继服务标识。In a possible embodiment, the side chain communication service is a proximity service communication service based on a relay device, and the security policy includes a relay service identifier of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service.
在可能的实施例中,侧链通信业务为基于中继设备的临近服务通信业务,所述安全策略包括优先级信息,其中,优先级信息用于指示层二中继业务的中继服务标识需要被优先使用,或者,优先级信息用于指示层三中继业务的中继服务标识需要被优先使用。In a possible embodiment, the side chain communication service is a proximity service communication service based on a relay device, and the security policy includes priority information, wherein the priority information is used to indicate that the relay service identifier of the layer 2 relay service needs to be used first, or the priority information is used to indicate that the relay service identifier of the layer 3 relay service needs to be used first.
在可能的实施例中,通信装置1500是策略管理网元、直连通信发现名称管理网元、接入管理网元或数据管理网元中的一项或多项。In a possible embodiment, the communication device 1500 is one or more of a policy management network element, a direct communication discovery name management network element, an access management network element or a data management network element.
在可能的实施例中,第一用户信息包括第一用户设备的用户标识、用户组标识、地理位置、网络位置中的一项或多项。In a possible embodiment, the first user information includes one or more of a user identifier, a user group identifier, a geographical location, and a network location of the first user device.
在可能的实施例中,处理模块1502还用于获取第二用户信息,其中,所述第二用户信息包括所述第一用户设备的用户标识、用户组标识、地理位置、网络位置中的一项或多项;处理模块1502还用于根据所述第一用户信息和所述第二用户信息确定所述安全策略。In a possible embodiment, the processing module 1502 is also used to obtain second user information, wherein the second user information includes one or more of a user identifier, a user group identifier, a geographic location, and a network location of the first user device; the processing module 1502 is also used to determine the security policy based on the first user information and the second user information.
在可能的实施例中,第二用户信息是通信装置1500从第二网络设备获取,其中,第二网络设备是应用服务器、应用功能网元、策略管理网元、直连通信发现名称管理网元、接入管理网元或数据管理网元中的一项或多项。In a possible embodiment, the second user information is obtained by the communication device 1500 from a second network device, wherein the second network device is one or more of an application server, an application function network element, a policy management network element, a direct communication discovery name management network element, an access management network element or a data management network element.
需要说明的是,上述通信装置1400可以对应于图10和/或图11中的核心网网元,还可以对应于图12和/或图13中的第一网络设备,具体用于实现图12和/或图13的第一网络设备侧的方法的任意实施例,具体请参见上文描述,这里不赘述。It should be noted that the above-mentioned communication device 1400 can correspond to the core network element in Figures 10 and/or 11, and can also correspond to the first network device in Figures 12 and/or 13. It is specifically used to implement any embodiment of the method on the first network device side of Figures 12 and/or 13. Please refer to the above description for details and no further details will be given here.
参见图16,图16是本申请实施例提供的另一种通信装置1600的结构示意图。Refer to Figure 16, which is a structural diagram of another communication device 1600 provided in an embodiment of the present application.
通信装置1600包括处理器1601、存储器1602以及通信接口1603,通信装置1600具体用于实现图10或图11的通信方法中的任一实施例,或者用于实现图12或图13的安全策略获取方法中的第一网络设备侧的任一实施例。其中,处理器1601、存储器1602以及通信接口1603可以通过内部总线1604相互连接,也可通过无线传输等其他手段实现通信。本申请实施例以通过总线1604连接为例,总线1604可以是外设部件互连标准(peripheral component interconnect,PCI)总线、扩展工业标准结构(extended industry standard architecture,EISA)总线、统一总线(unified bus,Ubus或UB)、计算机快速链接(compute express link,CXL)总线、缓存一致互联协议(cache coherent interconnect for accelerators,CCIX)总线等。总线1604可以分为地址总线、数据总线、控制总线等。为便于表示,图16中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The communication device 1600 includes a processor 1601, a memory 1602 and a communication interface 1603. The communication device 1600 is specifically used to implement any embodiment of the communication method of Figure 10 or Figure 11, or to implement any embodiment of the first network device side in the security policy acquisition method of Figure 12 or Figure 13. Among them, the processor 1601, the memory 1602 and the communication interface 1603 can be connected to each other through an internal bus 1604, and communication can also be achieved through other means such as wireless transmission. In the embodiment of the present application, the connection through the bus 1604 is taken as an example. The bus 1604 can be a peripheral component interconnect standard (PCI) bus, an extended industry standard architecture (EISA) bus, a unified bus (Ubus or UB), a computer express link (CXL) bus, a cache coherent interconnect for accelerators (CCIX) bus, etc. The bus 1604 can be divided into an address bus, a data bus, a control bus, etc. For ease of representation, FIG16 only uses one thick line, but does not mean that there is only one bus or one type of bus.
处理器1601可以由至少一个通用处理器构成,例如中央处理器(central processing unit,CPU),或者CPU和硬件芯片的组合。上述硬件芯片可以是专用集成电路(application-specific integrated circuit,ASIC)、可编程逻辑器件(programmable logic device,PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(complex programmable logic device,CPLD)、现场可编程逻辑门阵列(field-programmable gate array,FPGA)、通用阵列逻辑(generic array logic,GAL)或其任意组合。处理器1601执行各种类型的数字存储指令,例如存储在存储器1602中的软件或者固件程序,它能使通信装置1600提供多种服务。 The processor 1601 may be composed of at least one general-purpose processor, such as a central processing unit (CPU), or a combination of a CPU and a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD), or a combination thereof. The PLD may be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a generic array logic (GAL), or any combination thereof. The processor 1601 executes various types of digital storage instructions, such as software or firmware programs stored in the memory 1602, which enables the communication device 1600 to provide a variety of services.
存储器1602用于存储程序代码,并由处理器1601来控制执行。存储器1602可以包括易失性存储器(volatile memory),例如随机存取存储器(random access memory,RAM);存储器1602也可以包括非易失性存储器(non-volatile memory),例如只读存储器(read-only memory,ROM)、快闪存储器(flash memory)、硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD);存储器1602还可以包括上述种类的组合。存储器1602可以存储有程序代码,具体可以包括用于执行图10或图11的通信方法中的任一实施例的程序代码,也可以包括用于实现图12或图13的安全策略获取方法中的第一网络设备侧的任一实施例的程序代码,这里不再进行赘述。The memory 1602 is used to store program codes, and the execution is controlled by the processor 1601. The memory 1602 may include a volatile memory (volatile memory), such as a random access memory (RAM); the memory 1602 may also include a non-volatile memory (non-volatile memory), such as a read-only memory (ROM), a flash memory, a hard disk drive (HDD) or a solid-state drive (SSD); the memory 1602 may also include a combination of the above types. The memory 1602 may store program codes, specifically including program codes for executing any embodiment of the communication method of FIG. 10 or FIG. 11, and may also include program codes for implementing any embodiment of the first network device side in the security policy acquisition method of FIG. 12 or FIG. 13, which will not be described in detail here.
通信接口1603可以为有线接口(例如以太网接口)或无线接口(例如蜂窝网络接口或使用无线局域网接口),可以为内部接口(例如高速串行计算机扩展总线(peripheral component interconnect express,PCIe)总线接口)。有线接口或无线接口用于与其他设备或模块进行通信。The communication interface 1603 may be a wired interface (e.g., an Ethernet interface) or a wireless interface (e.g., a cellular network interface or a wireless LAN interface), or may be an internal interface (e.g., a high-speed serial computer expansion bus (peripheral component interconnect express, PCIe) bus interface). The wired interface or the wireless interface is used to communicate with other devices or modules.
需要说明的是,本实施例可以是通用的物理服务器实现的,例如,ARM服务器或者X86服务器,也可以是基于通用的物理服务器结合NFV技术实现的虚拟机实现的,虚拟机指通过软件模拟的具有完整硬件系统功能的、运行在一个完全隔离环境中的完整计算机系统,本申请不作具体限定。应理解,图16所示的通信装置1600还可以是至少一个服务器构成的服务器集群,本申请不作具体限定。通信装置1600还可以是主机、笔记本电脑、台式电脑、智能手机等设备,不具体限定。It should be noted that this embodiment can be implemented by a general physical server, for example, an ARM server or an X86 server, or it can be implemented by a virtual machine based on a general physical server combined with NFV technology. A virtual machine refers to a complete computer system with complete hardware system functions and running in a completely isolated environment simulated by software, which is not specifically limited in this application. It should be understood that the communication device 1600 shown in FIG. 16 can also be a server cluster composed of at least one server, which is not specifically limited in this application. The communication device 1600 can also be a host, a laptop, a desktop computer, a smart phone, and other devices, which are not specifically limited.
还需要说明的,图16仅仅是本申请实施例的一种可能的实现方式,在实际的应用中,通信装置1600还可以包括更多或更少的部件,本申请不作具体限制。关于本申请实施例中未出示或未描述的内容,可参见图10或图11的通信方法的实施例中的相关阐述及图12或图13的安全策略获取方法的实施例,这里不再赘述。It should also be noted that FIG. 16 is only a possible implementation of the embodiment of the present application. In practical applications, the communication device 1600 may also include more or fewer components, and the present application does not make specific limitations. For the contents not shown or described in the embodiments of the present application, please refer to the relevant description in the embodiment of the communication method of FIG. 10 or FIG. 11 and the embodiment of the security policy acquisition method of FIG. 12 or FIG. 13, which will not be repeated here.
本申请实施例还提供一种计算机可读存储介质,计算机可读存储介质中存储有指令,当其在处理器上运行时,图10或图11的任一实施例的方法得以实现。An embodiment of the present application further provides a computer-readable storage medium, in which instructions are stored. When the computer-readable storage medium is executed on a processor, the method of any embodiment of FIG. 10 or FIG. 11 is implemented.
本申请实施例还提供一种计算机可读存储介质,计算机可读存储介质中存储有指令,当其在处理器上运行时,图12或图13的任一实施例的方法得以实现。An embodiment of the present application also provides a computer-readable storage medium, in which instructions are stored. When the computer-readable storage medium is executed on a processor, the method of any embodiment of FIG. 12 or FIG. 13 is implemented.
本申请实施例还提供一种计算机程序产品,当计算机程序产品在处理器上运行时,图10或图11的任一实施例的方法得以实现。The embodiment of the present application further provides a computer program product. When the computer program product runs on a processor, the method of any embodiment of FIG. 10 or FIG. 11 is implemented.
本申请实施例还提供一种计算机程序产品,当计算机程序产品在处理器上运行时,图12或图13的任一实施例的方法得以实现。The embodiment of the present application also provides a computer program product. When the computer program product runs on a processor, the method of any embodiment of FIG. 12 or FIG. 13 is implemented.
本申请实施例还提供一种芯片或芯片系统,包括:处理器,用于执行前述任一实施例中的方法(如图10、图11、图12、图13)。An embodiment of the present application also provides a chip or a chip system, including: a processor, used to execute the method in any of the aforementioned embodiments (such as Figures 10, 11, 12, and 13).
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(read-only memory,ROM)或随机存储记忆体(random access memory,RAM)等。Those skilled in the art can understand that all or part of the processes in the above-mentioned embodiments can be implemented by instructing the relevant hardware through a computer program, and the program can be stored in a computer-readable storage medium, and when the program is executed, it can include the processes of the embodiments of the above-mentioned methods. The storage medium can be a disk, an optical disk, a read-only memory (ROM) or a random access memory (RAM), etc.
以上所揭露的仅为本申请一种较佳实施例而已,当然不能以此来限定本申请之权利范围,本领域普通技术人员可以理解实现上述实施例的全部或部分流程,并依本申请权利要求所作的等同变化,仍属于发明所涵盖的范围。 What is disclosed above is only a preferred embodiment of the present application, and it certainly cannot be used to limit the scope of rights of the present application. Ordinary technicians in this field can understand that all or part of the processes of implementing the above embodiment and equivalent changes made according to the claims of the present application are still within the scope of the invention.

Claims (27)

  1. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method comprises:
    第一用户设备获取安全策略,其中,所述安全策略用于指示是否对侧链通信业务使用端到端的安全保护,所述端到端的安全保护实施在所述侧链通信业务对应的两个用户设备之间;The first user equipment obtains a security policy, wherein the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service, and the end-to-end security protection is implemented between two user equipments corresponding to the side chain communication service;
    所述第一用户设备根据所述安全策略确定执行第一操作,其中,所述第一操作用于建立所述第一用户设备与第二用户设备之间的所述侧链通信业务。The first user equipment determines to perform a first operation according to the security policy, wherein the first operation is used to establish the side chain communication service between the first user equipment and the second user equipment.
  2. 根据权利要求1所述的方法,其特征在于,所述安全策略指示对所述侧链通信业务使用所述端到端的安全保护,所述第一操作包括:The method according to claim 1, characterized in that the security policy indicates the use of the end-to-end security protection for the side chain communication service, and the first operation comprises:
    所述第一用户设备接收来自至少一个中继设备的消息;The first user equipment receives a message from at least one relay device;
    所述第一用户设备与所述至少一个中继设备中的第一中继设备建立连接,其中,所述第一用户设备接收到的所述第一中继设备的消息包括层二中继业务的中继服务标识,所述链接用于发送所述第一用户设备与所述第二用户设备之间的所述侧链通信业务的业务数据。The first user device establishes a connection with a first relay device among the at least one relay device, wherein the message from the first relay device received by the first user device includes a relay service identifier of a layer 2 relay service, and the link is used to send service data of the side chain communication service between the first user device and the second user device.
  3. 根据权利要求1所述的方法,其特征在于,所述安全策略指示不对所述侧链通信业务使用所述端到端的安全保护,所述第一操作包括:The method according to claim 1, characterized in that the security policy indicates that the end-to-end security protection is not used for the side chain communication service, and the first operation comprises:
    所述第一用户设备接收来自至少一个中继设备的消息;The first user equipment receives a message from at least one relay device;
    所述第一用户设备与所述至少一个中继设备中的第一中继设备建立连接,其中,所述第一用户设备接收到的所述第一中继设备的消息包括层三中继业务的中继服务标识,所述链接用于发送所述第一用户设备与所述第二用户设备之间的所述侧链通信业务的业务数据。The first user device establishes a connection with a first relay device among the at least one relay device, wherein the message from the first relay device received by the first user device includes a relay service identifier of a layer 3 relay service, and the link is used to send service data of the side chain communication service between the first user device and the second user device.
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,所述安全策略包括所述层二中继业务的中继服务标识和/或所述层三中继业务的中继服务标识。The method according to any one of claims 1 to 3 is characterized in that the security policy includes the relay service identifier of the layer 2 relay service and/or the relay service identifier of the layer 3 relay service.
  5. 根据权利要求1至4所述的方法,其特征在于,所述安全策略包括优先级信息,所述优先级信息用于指示所述层二中继业务的中继服务标识需要被优先使用。The method according to claims 1 to 4 is characterized in that the security policy includes priority information, and the priority information is used to indicate that the relay service identifier of the layer 2 relay service needs to be used preferentially.
  6. 根据权利要求1所述的方法,其特征在于,所述安全策略指示对所述侧链通信业务使用所述端到端的安全保护,所述第一操作包括:The method according to claim 1, characterized in that the security policy indicates the use of the end-to-end security protection for the side chain communication service, and the first operation comprises:
    所述第一用户设备通过与所述第二用户设备的链接向所述第二用户设备发送第一测距请求,其中,所述第一测距请求指示测量所述第二用户设备与辅助设备的距离和/或角度,所述第一测距请求的测距结果用于确定所述第一用户设备与所述第二用户设备的距离和/或角度。The first user equipment sends a first ranging request to the second user equipment through a link with the second user equipment, wherein the first ranging request indicates measuring the distance and/or angle between the second user equipment and the auxiliary device, and the ranging result of the first ranging request is used to determine the distance and/or angle between the first user equipment and the second user equipment.
  7. 根据权利要求6所述的方法,其特征在于,在所述第一用户设备通过与所述第二用户设备的链接向所述第二用户设备发送第一测距请求之前,所述方法还包括:The method according to claim 6, characterized in that before the first user equipment sends the first ranging request to the second user equipment through the link with the second user equipment, the method further comprises:
    所述第一用户设备确定是否可以与所述第二用户设备建立链接;Determining, by the first user equipment, whether a link can be established with the second user equipment;
    在所述第一用户设备确定可以与所述第二用户设备建立链接的情况下,所述第一用户设备通过与所述第二用户设备的链接向所述第二用户设备发送所述第一测距请求。In a case where the first user equipment determines that a link can be established with the second user equipment, the first user equipment sends the first ranging request to the second user equipment through the link with the second user equipment.
  8. 根据权利要求1所述的方法,其特征在于,所述安全策略指示不对所述侧链通信业务使用所述端到端的安全保护,所述第一操作包括:The method according to claim 1, characterized in that the security policy indicates that the end-to-end security protection is not used for the side chain communication service, and the first operation comprises:
    所述第一用户设备通过与辅助设备的直连链接向所述辅助设备发送第二测距请求,其中,所述第二测距请求指示测量所述第二用户设备与所述辅助设备的距离和/或角度,所述第二测距请求的测距结果用于确定所述第一用户设备与所述第二用户设备的距离和/或角度。The first user equipment sends a second ranging request to the auxiliary equipment through a direct link with the auxiliary equipment, wherein the second ranging request indicates measuring the distance and/or angle between the second user equipment and the auxiliary equipment, and the ranging result of the second ranging request is used to determine the distance and/or angle between the first user equipment and the second user equipment.
  9. 根据权利要求1至8中任一项所述的方法,其特征在于,所述第一用户设备获取安全策略,包括:The method according to any one of claims 1 to 8, characterized in that the first user equipment obtains the security policy, comprising:
    所述第一用户设备接收来自核心网网元的所述安全策略。The first user equipment receives the security policy from a core network element.
  10. 根据权利要求9所述的方法,其特征在于,所述核心网网元是策略管理网元、直连通信发现名称 管理网元、接入管理网元或数据管理网元中的一项或多项。The method according to claim 9 is characterized in that the core network element is a policy management network element, a direct communication discovery name One or more of a management network element, an access management network element, or a data management network element.
  11. 根据权利要求9或10所述的方法,其特征在于,所述安全策略是所述核心网网元根据所述第一用户设备的用户信息确定的,其中,所述用户信息包括所述第一用户设备的用户标识、用户组标识、地理位置、网络位置中的一项或多项。The method according to claim 9 or 10 is characterized in that the security policy is determined by the core network element based on user information of the first user equipment, wherein the user information includes one or more of a user identifier, a user group identifier, a geographic location, and a network location of the first user equipment.
  12. 根据权利要求11所述的方法,其特征在于,在所述第一用户设备接收来自核心网网元的所述安全策略之前,所述方法还包括:The method according to claim 11, characterized in that before the first user equipment receives the security policy from the core network element, the method further comprises:
    所述第一用户设备向所述核心网网元发送所述用户信息。The first user equipment sends the user information to the core network element.
  13. 根据权利要求1至8中任一项所述的方法,其特征在于,所述第一用户设备获取安全策略,包括:The method according to any one of claims 1 to 8, characterized in that the first user equipment obtains the security policy, comprising:
    所述第一用户设备获取在所述第一用户设备中存储的所述安全策略。The first user equipment obtains the security policy stored in the first user equipment.
  14. 一种通信方法,其特征在于,所述方法包括:A communication method, characterized in that the method comprises:
    第一网络设备接收第一用户设备发送的请求消息,其中,所述请求消息包括所述第一用户设备的第一用户信息;The first network device receives a request message sent by a first user equipment, wherein the request message includes first user information of the first user equipment;
    所述第一网络设备根据所述第一用户信息确定安全策略,其中,所述安全策略用于指示是否对侧链通信业务使用端到端的安全保护,所述端到端的安全保护实施在所述侧链通信业务对应的两个用户设备之间;The first network device determines a security policy according to the first user information, wherein the security policy is used to indicate whether to use end-to-end security protection for the side chain communication service, and the end-to-end security protection is implemented between two user devices corresponding to the side chain communication service;
    所述第一网络设备向所述第一用户设备发送所述安全策略。The first network device sends the security policy to the first user equipment.
  15. 根据权利要求14所述的方法,其特征在于,所述侧链通信业务为基于中继设备的临近服务通信业务,或者,所述侧链通信业务为基于辅助设备的测距定位业务。The method according to claim 14 is characterized in that the side chain communication service is a proximity service communication service based on a relay device, or the side chain communication service is a ranging and positioning service based on an auxiliary device.
  16. 根据权利要求14所述的方法,其特征在于,所述侧链通信业务为基于中继设备的临近服务通信业务,所述安全策略包括层二中继业务的中继服务标识和/或层三中继业务的中继服务标识。The method according to claim 14 is characterized in that the side chain communication service is a proximity service communication service based on a relay device, and the security policy includes a relay service identifier of a layer 2 relay service and/or a relay service identifier of a layer 3 relay service.
  17. 根据权利要求14或16所述的方法,其特征在于,所述侧链通信业务为基于中继设备的临近服务通信业务,所述安全策略包括优先级信息,其中,所述优先级信息用于指示所述层二中继业务的中继服务标识需要被优先使用,或者,所述优先级信息用于指示所述层三中继业务的中继服务标识需要被优先使用。The method according to claim 14 or 16 is characterized in that the side chain communication service is a proximity service communication service based on a relay device, and the security policy includes priority information, wherein the priority information is used to indicate that the relay service identifier of the layer 2 relay service needs to be used first, or the priority information is used to indicate that the relay service identifier of the layer 3 relay service needs to be used first.
  18. 根据权利要求14至17中任一项所述的方法,其特征在于,所述第一网络设备是策略管理网元、直连通信发现名称管理网元、接入管理网元或数据管理网元中的一项或多项。The method according to any one of claims 14 to 17 is characterized in that the first network device is one or more of a policy management network element, a direct communication discovery name management network element, an access management network element or a data management network element.
  19. 根据权利要求14至18中任一项所述的方法,其特征在于,所述第一用户信息包括所述第一用户设备的用户标识、用户组标识、地理位置、网络位置中的一项或多项。The method according to any one of claims 14 to 18 is characterized in that the first user information includes one or more of a user identifier, a user group identifier, a geographic location, and a network location of the first user device.
  20. 根据权利要求14至19中任一项所述的方法,其特征在于,所述第一网络设备根据所述第一用户信息确定安全策略,包括:The method according to any one of claims 14 to 19, wherein the first network device determines a security policy according to the first user information, comprising:
    所述第一网络设备获取第二用户信息,其中,所述第二用户信息包括所述第一用户设备的用户标识、用户组标识、地理位置、网络位置中的一项或多项;The first network device acquires second user information, wherein the second user information includes one or more of a user identifier, a user group identifier, a geographic location, and a network location of the first user device;
    所述第一网络设备根据所述第一用户信息和所述第二用户信息确定所述安全策略。The first network device determines the security policy according to the first user information and the second user information.
  21. 根据权利要求20所述的方法,其特征在于,所述第二用户信息是所述第一网络设备从第二网络设备获取,其中,所述第二网络设备是应用服务器、应用功能网元、策略管理网元、直连通信发现名称管理网元、接入管理网元或数据管理网元中的一项或多项。The method according to claim 20 is characterized in that the second user information is obtained by the first network device from the second network device, wherein the second network device is one or more of an application server, an application function network element, a policy management network element, a direct communication discovery name management network element, an access management network element or a data management network element.
  22. 一种通信装置,其特征在于,包括用于执行如权利要求1-13任一项所述的方法的单元或模块。A communication device, characterized in that it comprises a unit or module for executing the method according to any one of claims 1 to 13.
  23. 一种通信装置,其特征在于,包括用于执行如权利要求14-21任一项所述的方法的单元或模块。 A communication device, characterized in that it comprises a unit or module for executing the method according to any one of claims 14-21.
  24. 一种通信装置,其特征在于,包括处理器和存储器;A communication device, comprising a processor and a memory;
    所述存储器用于存储计算机执行指令;The memory is used to store computer-executable instructions;
    所述处理器用于执行所述计算机执行指令,以使权利要求1-13任一项所述的方法被执行;或者,以使权利要求14-21任一项所述的方法被执行。The processor is used to execute the computer-executable instructions so that the method described in any one of claims 1 to 13 is executed; or so that the method described in any one of claims 14 to 21 is executed.
  25. 一种芯片,其特征在于,包括处理器,以使权利要求1-13任一项所述的方法被执行;或者,以使权利要求14-21任一项所述的方法被执行。A chip, characterized in that it comprises a processor so that the method described in any one of claims 1 to 13 is executed; or so that the method described in any one of claims 14 to 21 is executed.
  26. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质用于存储计算机程序,当所述计算机程序被执行时,权利要求1-13任一项所述的方法被执行;或者,权利要求14-21任一项所述的方法被执行。A computer-readable storage medium, characterized in that the computer-readable storage medium is used to store a computer program, and when the computer program is executed, the method described in any one of claims 1 to 13 is executed; or, the method described in any one of claims 14 to 21 is executed.
  27. 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机程序或计算机代码,当所述计算机程序或所述计算机代码在计算机上运行时,权利要求1-13任一项所述的方法被执行;或者,权利要求14-21任一项所述的方法被执行。 A computer program product, characterized in that the computer program product comprises a computer program or a computer code, and when the computer program or the computer code is run on a computer, the method described in any one of claims 1 to 13 is executed; or the method described in any one of claims 14 to 21 is executed.
PCT/CN2023/117772 2022-11-07 2023-09-08 Communication method, communication apparatus, and storage medium WO2024098937A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211383863.2A CN117998361A (en) 2022-11-07 2022-11-07 Communication method, communication device, and storage medium
CN202211383863.2 2022-11-07

Publications (1)

Publication Number Publication Date
WO2024098937A1 true WO2024098937A1 (en) 2024-05-16

Family

ID=90887694

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/117772 WO2024098937A1 (en) 2022-11-07 2023-09-08 Communication method, communication apparatus, and storage medium

Country Status (2)

Country Link
CN (1) CN117998361A (en)
WO (1) WO2024098937A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111417092A (en) * 2019-01-04 2020-07-14 华硕电脑股份有限公司 Method and apparatus for supporting single one-to-one side link communication link vehicle networking services
CN113630738A (en) * 2020-04-21 2021-11-09 华为技术有限公司 Sidelink communication method and device
WO2022014870A1 (en) * 2020-07-15 2022-01-20 엘지전자 주식회사 Relay communication
WO2022042437A1 (en) * 2020-08-23 2022-03-03 Qualcomm Incorporated Layer 2 relay initial configuration
US20220303862A1 (en) * 2020-10-22 2022-09-22 Apple Inc. Layer 2 ue to ue data forwarding

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111417092A (en) * 2019-01-04 2020-07-14 华硕电脑股份有限公司 Method and apparatus for supporting single one-to-one side link communication link vehicle networking services
CN113630738A (en) * 2020-04-21 2021-11-09 华为技术有限公司 Sidelink communication method and device
WO2022014870A1 (en) * 2020-07-15 2022-01-20 엘지전자 주식회사 Relay communication
WO2022042437A1 (en) * 2020-08-23 2022-03-03 Qualcomm Incorporated Layer 2 relay initial configuration
US20220303862A1 (en) * 2020-10-22 2022-09-22 Apple Inc. Layer 2 ue to ue data forwarding

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
QUALCOMM INCORPORATED, AT&T, ERICSSON, SAMSUNG: "Solution to support end-to-end security for Layer-3 UE-to-Network Relay", 3GPP DRAFT; S2-2004282, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. e-meeting ;20200601 - 20200612, 22 May 2020 (2020-05-22), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051890412 *

Also Published As

Publication number Publication date
CN117998361A (en) 2024-05-07

Similar Documents

Publication Publication Date Title
JP7041212B2 (en) Connecting to a virtualized mobile core network
JP2022525167A (en) Dynamic network capacity configuration
JP2023120188A (en) Method of managing connection to local area data network (ladn) in 5g network
US11172405B2 (en) Method for checking change in wireless connection type of terminal in third-party application server
KR20200109303A (en) Enhanced NEF functionality, MEC and 5G integration
CN113630749B (en) Method and device for acquiring edge service
JP2017076994A (en) Connection manager for wireless communication device
US20220217611A1 (en) Service Configuration Method, Communication Apparatus, and Communication System
JP2021518684A (en) Devices and methods for access traffic steering, switching, and / or split operation
WO2021136211A1 (en) Method and device for determining authorization result
CN113746585B (en) Time service method and communication device
CN113055879B (en) User identification access method and communication device
US20230164591A1 (en) Communication method and apparatus
WO2022017285A1 (en) Packet forwarding method, apparatus and system
US20240023013A1 (en) Methods and Apparatus for Service Assurance for Time-Restricted Short-Lived Networks
WO2022199451A1 (en) Session switching method and apparatus
US11758593B2 (en) Method and system for policy and subscription influenced always-on PDU sessions
US20230018378A1 (en) Parameter configuration method, apparatus and system, device and storage medium
WO2023087965A1 (en) Communication method and apparatus
WO2024098937A1 (en) Communication method, communication apparatus, and storage medium
WO2022170798A1 (en) Strategy determining method and communication apparatus
WO2024001897A1 (en) Communication method and apparatus
WO2021138784A1 (en) Network access method, apparatus and system
WO2023143212A1 (en) Communication method and apparatus
WO2023061207A1 (en) Communication method, communication apparatus, and communication system