CN113396600B - Information verification method, device, equipment and storage medium - Google Patents

Information verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN113396600B
CN113396600B CN201980091289.3A CN201980091289A CN113396600B CN 113396600 B CN113396600 B CN 113396600B CN 201980091289 A CN201980091289 A CN 201980091289A CN 113396600 B CN113396600 B CN 113396600B
Authority
CN
China
Prior art keywords
information
application
verification
network element
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201980091289.3A
Other languages
Chinese (zh)
Other versions
CN113396600A (en
Inventor
***
杨皓睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Publication of CN113396600A publication Critical patent/CN113396600A/en
Application granted granted Critical
Publication of CN113396600B publication Critical patent/CN113396600B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management

Abstract

The embodiment of the application provides an information verification method, an information verification device, information verification equipment and a storage medium, and relates to the technical field of communication. The method comprises the following steps: and sending an information verification request to a network function network element, wherein the information verification request carries first application information of a first application needing to be verified, and determining whether to execute a message event of a discovery message of the first application according to a verification result received from the network function network element, wherein the network function network element is a fifth generation 5G core network element, so that the information verification in a 5G system is realized.

Description

Information verification method, device, equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to an information verification method, apparatus, device, and storage medium.
Background
With the rapid development of 5G (Fifth Generation) communication technology, direct connection communication services of D2D (Device to Device) gradually get attention, and the direct connection communication services of D2D mainly aim at some applications with high requirements on service quality such as speed and time delay.
In the process of establishing D2D for a certain application, a terminal device may discover other terminal devices that are nearby and use the same application by sending discovery messages or listening to discovery messages. Before this, it is necessary to verify whether the application is able to trigger a message event related to a discovery message, including sending the discovery message or listening to the discovery message. Currently, in non-5G systems, it is generally necessary to verify, by the ProSe function network element, whether the application allows triggering of the message event related to the discovery message.
However, in the 5G communication system, the ProSe function network element is replaced by a part of network elements in the communication network architecture, and therefore, a method for solving the problem of verification for discovery messages in the 5G system is needed.
Disclosure of Invention
The embodiment of the application provides an information verification method, an information verification device, information verification equipment and a storage medium, which can be used for solving the problem of verification aiming at discovery messages in a 5G system. The technical scheme is as follows:
in one aspect, an information verification method is provided, and is applied to a terminal device, and the method includes:
sending an information verification request to a network function network element, wherein the information verification request carries first application information of a first application needing to be verified; and determining whether to execute a message event of the discovery message for the first application according to a verification result received from the network function network element, wherein the network function network element is a fifth generation 5G core network element.
On the other hand, an information verification method is provided, which is applied to a network function network element, where the network function network element is a 5G core network element, and the method includes:
receiving an information verification request, wherein the information verification request carries first application information of a first application needing to be verified; and sending a verification result of the first application information to terminal equipment, wherein the verification result is used for indicating whether the first application can trigger a message event of a discovery message.
In another aspect, an information verification method is provided, which is applied to a terminal device, and includes:
verifying the first application to be verified based on the application verification information; determining whether to execute a message event of a discovery message for the first application according to a verification result; the application verification information is sent by the network function network element in advance, and the network function network element is a 5G core network element.
On the other hand, an information verification method is provided, which is applied to a network function network element, where the network function network element is a 5G core network element, and the method includes:
sending application verification information to a terminal device, wherein the application verification information is used for the terminal device to determine whether to execute a message event of a discovery message of a first application based on first application information verification of the first application needing verification.
In another aspect, an information verification apparatus is provided, which is applied in a terminal device, and includes:
the first sending module is used for sending an information verification request to a network function network element, wherein the information verification request carries first application information of a first application needing to be verified; a determining module, configured to determine whether to execute a message event of the discovery message for the first application according to a verification result received from the network function network element, where the network function network element is a fifth-generation 5G core network element.
On the other hand, an information verification apparatus is provided, which is applied to a network functional network element, where the network functional network element is a 5G core network element, and the apparatus includes:
the receiving module is used for receiving an information verification request, wherein the information verification request carries first application information of a first application needing to be verified; and a second sending module, configured to send a verification result of the first application information to a terminal device, where the verification result is used to indicate whether the first application can trigger a message event of a discovery message.
In another aspect, an information verification apparatus is provided, which is applied to a terminal device, and includes:
the verification module is used for verifying the first application to be verified based on the application verification information; the execution module is used for determining whether to execute the message event of the discovery message of the first application according to the verification result; the application verification information is sent by the network function network element in advance, and the network function network element is a 5G core network element.
On the other hand, an information verification apparatus is provided, which is applied to a network function network element, where the network function network element is a 5G core network element, and the apparatus includes:
a third sending module, configured to send application verification information to a terminal device, where the application verification information is used for the terminal device to determine whether to execute a message event of a discovery message for a first application based on first application information verification of the first application that needs to be verified.
In another aspect, a terminal device is provided, which includes a processor and a memory, where the memory stores at least one instruction for execution by the processor to implement the steps of any one of the methods in the terminal device side in the present application.
In another aspect, a network function network element is provided, which includes a processor and a memory, where the memory stores at least one instruction for execution by the processor to implement the steps of any one of the methods at the network function network element side in the present application.
In another aspect, a computer-readable storage medium is provided, which has instructions stored thereon, and when executed by a processor, the instructions implement the steps of any one of the methods of the present application on the side of a terminal device.
In another aspect, a computer-readable storage medium is provided, on which instructions are stored, which when executed by a processor implement the steps of any of the methods in the present application on the side of a terminal device.
The beneficial effects brought by the technical scheme provided by the embodiment of the application at least comprise:
the terminal equipment sends the first application information of the first application needing to be verified to a network function network element, the network function network element verifies whether the first application can trigger the message event of the discovery message or not, and feeds back the verification result to the terminal equipment, and the terminal equipment determines whether to execute the message event of the discovery message of the first application or not according to the fed-back verification result, so that the information verification in the 5G system is realized.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic diagram of a services network architecture provided by an exemplary embodiment of the present application;
FIG. 2 is a flow chart of a method of information verification provided by an exemplary embodiment of the present application;
fig. 3 is a schematic diagram of an internal structure of a terminal device according to an exemplary embodiment of the present application;
fig. 4 is a schematic diagram of an internal structure of a terminal device according to another exemplary embodiment of the present application;
FIG. 5 is a flow chart of a method of information verification provided by another exemplary embodiment of the present application;
FIG. 6 is a schematic structural diagram of an information verification device according to an exemplary embodiment of the present application;
fig. 7 is a schematic structural diagram of an information verification apparatus according to another exemplary embodiment of the present application;
fig. 8 is a schematic structural diagram of an information verification apparatus according to another exemplary embodiment of the present application;
fig. 9 is a schematic structural diagram of an information verification apparatus according to another exemplary embodiment of the present application;
fig. 10 is a schematic structural diagram of an apparatus provided in another exemplary embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Before describing the information verification method provided by the embodiment of the present application in detail, a brief description is first given to an implementation environment related to the embodiment of the present application.
The information verification method provided by the embodiment of the application is applied to a service-oriented communication network architecture, and the interface protocol defined in the service-oriented communication network architecture provides more possibility for third-party service development. Referring to fig. 1, fig. 1 is a schematic diagram illustrating a communication network architecture that may be applied to a car networking service using D2D technology, according to an example embodiment.
The communication Network architecture may include, but is not limited to, PCF (Policy Control Function) Network elements, UDM (User Data Manager) Network elements, AMF (Access and Mobility Management Function) Network elements, AF (Application Function) Network elements, NEF (Network export Function) Network elements, SMF (Session Management Function) Network elements, NG-RAN (New Generation-Radio Access Network, radio Access Network), and UE (User Equipment).
In the communication network architecture, the AMF may directly communicate with the PCF and the SMF, respectively, the AMF may directly communicate with the UE, the PCF may directly communicate with the UDM, the UDM may directly communicate with the AF, and the UDM may be provided with a UDR (Unified Data storage). The NG-RAN is respectively connected with the UE through a Uu interface, and the plurality of UEs are connected through a PC5 interface. Two adjacent UE can be in direct communication through a PC5 interface, and each UE is provided with a D2D direct connection layer. Each UE may have installed therein at least one application capable of triggering a message event of a discovery message, which may be referred to as a V2X application in some embodiments.
It should be noted that, the above is only described by taking the communication Network architecture as an example, in another embodiment, the communication Network architecture may further include other Network elements, for example, the communication Network architecture may further include an UPF (User Plane Function) Network element, an NRF (Network Function Repository Function) Network element, and the like, which is not limited in this embodiment of the present application.
In this embodiment, the AMF may be referred to as a mobility management network element, the policy control function network element and the session management function network element may be collectively referred to as a network function network element, and further, the network function network element is a 5G core network element, and the AF may be referred to as an application server.
After the communication network architecture related to the embodiments of the present application is described, the information verification method provided by the embodiments of the present application will be described in detail with reference to the accompanying drawings.
Referring to fig. 2, fig. 2 is a flowchart illustrating an information verification method according to an exemplary embodiment, where the information verification method may be applied to the communication network architecture shown in fig. 1, and the method may include the following implementation steps:
step 201: the terminal equipment sends an information verification request to a network function network element, wherein the information verification request carries first application information of a first application needing to be verified.
The first Application information may be used to uniquely identify the first Application, and for example, the first Application information may be identified by an OS (Operating System) ID (Identification) and an APP (Application) ID; alternatively, the first application information may also be a predefined character string, and the like, which is not limited in this embodiment of the application.
As an example, when a certain service related to a first application needs to establish direct communication, a terminal device needs to be able to discover other terminal devices nearby in which the first application is installed, and for this purpose, a discovery message may be sent or a discovery message may be listened to. Before sending or listening, it is also necessary to verify whether the first application is capable of triggering a message event related to a discovery message, the message event including sending the discovery message or listening to the discovery message, i.e. whether the first application is capable of triggering a terminal device to send the discovery message or listen to the discovery message. As an example, the terminal device may send an information verification request carrying information of the first application that needs to be verified to the network function network element.
In a possible implementation manner, a specific implementation of sending, by the terminal device, the information verification request to the network function network element may include: and the terminal equipment packages the information verification request into a first transparent container, adds the first transparent container into a non-access stratum (NAS) message, sends the NAS message to a mobility management network element, and forwards the first transparent container to the network function network element by the mobility management network element.
Since a communication connection is established between the terminal device and a mobility management element (AMF) on the network side, and the mobility management element is connected to a network function element, in order to send the information authentication request to the network function element, the terminal device may send the information authentication request to a Non Access Stratum (NAS), and the NAS layer encapsulates the authentication request message into a first transparent container, encapsulates the first transparent container into a NAS message, and sends the NAS message to the mobility management element. The mobility management network element may directly forward the first transparent container to a network function network element without parsing after receiving the first transparent container.
It should be noted that, since the terminal device encapsulates the information verification request into the first transparent container and adds the first transparent container to the NAS message, the mobility management network element may not need to decode the content in the first transparent container, thereby reducing the operation burden of the mobility management network element.
As another example, the terminal device encapsulates the information verification request into an NAS message and sends the NAS message to the mobility management network element, and the mobility management network element parses the information verification request from the NAS message and forwards the information verification request to the network function network element.
In this implementation, the terminal device transmits the information verification request to the NAS layer, the NAS layer directly encapsulates the information verification request into an NAS message and then sends the NAS message to the mobility management network element, in this case, the mobility management network element parses the NAS message to parse the information verification request, and then sends the obtained information verification request to the network function network element.
It is worth mentioning that, in this implementation manner, since the terminal device is not required to perform the operation of encapsulating the information verification request into the first transparent container, but is directly encapsulated into the NAS message, the power consumption of the terminal device can be reduced.
As an example, the information verification request may further include group information indicating a group in which the first application is located; and/or, the information verification request may further include terminal device information of the terminal device; and/or the information verification request may also include user information.
Wherein the group identification can be used to uniquely identify a group. As an example, for the same application, if sessions of the same direct communication service are established among a plurality of terminal devices for the application, the plurality of terminal devices may be considered to belong to the same group, for example, to be grouped in a game. The terminal devices in the same group may be from the same PLMN (Public Land Mobile Network) or from different PLMNs. For example, a group includes 5 terminal devices, 3 of which may be terminal devices in PLMN1, 2 of which may be terminal devices in PLMN2, the terminal devices of 3 PLMNs 1 may communicate directly on the PC5 interface using D2D technology, and the terminal devices of 3 PLMNs 1 may also communicate with the terminal devices of 2 PLMNs 2 using a network. In some embodiments, in addition to requiring authentication of the first application, the group in which the first application resides may be authenticated to determine whether the group allows for message events that trigger discovery messages, and thus, the information authentication request may also include group information.
The terminal device information is used to uniquely identify the terminal device, and may be, for example, a GPSI (general Public subscriber Identifier). In some embodiments, a part of specific terminal devices may be limited to be capable of triggering a message event of a discovery message, so that the terminal device installed with the first application may be verified while verifying the first application, that is, the terminal device information may be carried in the information verification request to check whether the terminal device where the first application is located is capable of triggering a message event of a discovery message.
The user information may be used to uniquely identify a user in an application, and for example, the user information may be a user account. In some embodiments, the user account logged in to the first application may also be verified, that is, whether the user information allows a message event triggering a discovery message may be verified, and thus, the information verification request may carry the user information.
The information verification request is used to instruct the network functional network element to perform verification based on the first application information and the application verification information, and the specific implementation is as follows.
Step 202: the network function network element receives the information verification request.
Step 203: the network functional network element obtains application authentication information.
Wherein the application authentication information includes second application information of a second application capable of triggering a message event of the discovery message.
The second application is an application authorized to trigger a message event of the discovery message, and in the application authentication information, the authorized second application may include one or more applications, that is, the application authentication information includes at least one piece of second application information.
As an example, the application verification information further includes group information of a group in which the second application information is located, wherein each second application information is associated with at least one group information or each group information is associated with at least one second application information; and/or the application verification information further comprises terminal equipment information of terminal equipment used for installing the second application; and/or, the application authentication information further includes user information for logging in the second application.
As described above, in addition to the first application may be authenticated, at least one of group information, terminal device information, and user information related to the first application may need to be authenticated, and correspondingly, the application authentication information may include at least one of group information, terminal device information, and user information related to an authorized second application.
The association relationship between the second application information and the group information may include two types, one type is that the second application information is associated with at least one group information, that is, each group in at least one group related to the second application allows a message event that triggers a discovery message; another is that a certain group of information is associated with at least one second application information, i.e. each of the at least one second application within the certain group is allowed to trigger a message event of the discovery message.
As an example, the specific implementation of the network function network element obtaining the application verification information may include: and the network functional network element acquires the application verification information from the local.
The network function network element may locally store the application authentication information, and the locally stored application authentication information may be pulled from the user data management network element in advance.
As an example, the specific implementation of the network function network element obtaining the application verification information may further include: the network function network element obtains the application verification information from the user data management network element, and the application verification information in the user data management network element is sent by the application server in advance.
When the application authentication information is not locally stored in the network functional network element, the application authentication information may be pulled from the user data management network element. As an example, when the network function network element is a session management function network element, the session management function network element pulls the application authentication information from the user data management network element through the policy control function network element, that is, the policy control function network element needs to forward the application authentication information pulled from the user data management network element to the session management function network element at this time.
The origin of the application authentication information in the user data managing network element is briefly described here. In some embodiments, the application server may send application authentication information that can be applied to the discovery process performed on the PC5 to the user data managing network element, and further, the application server may send the application authentication information to the NEF, which sends the application authentication information to the user data managing network element. The user data management network element receives and stores the application authentication information sent from the application server, and further, the user data management network element can also store the application authentication information into the UDR.
Step 204: the network function network element performs authentication based on the first application information and the application authentication information.
Since the application authentication information includes the second application information of the second application capable of triggering the message event of the discovery message, the network function network element may detect, during the authentication process, whether the second application information in the application authentication information includes the first application information, if so, the authentication is passed, i.e., it indicates that the first application is capable of triggering the message event of the discovery message, and if not, the authentication is failed, i.e., it indicates that the first application is not capable of triggering the message event of the discovery message.
Further, when the information verification request further includes a group identifier, the group identifier needs to be verified, that is, whether the application verification information includes the group identifier in the information verification request is queried, and if the application verification information includes the group identifier, the verification is passed, and if the application verification information does not include the group identifier, the verification is not passed.
Further, when the information verification request further includes a terminal device identifier, the terminal device identifier also needs to be verified, that is, whether the application verification information includes the terminal device identifier in the information verification request is queried, if so, the verification is passed, and if not, the verification is not passed.
Further, when the information verification request further includes a user identifier, the user identifier also needs to be verified, that is, whether the application verification information includes the user identifier in the information verification request is queried, and if the application verification information includes the user identifier in the information verification request, the verification is passed, and if the application verification information does not include the user identifier, the verification is not passed.
That is, the application authentication information may correspond to information to be authenticated carried in the information authentication request, and when the application authentication information further includes a group identifier, it indicates that it is necessary to verify whether the first application can perform a discovery process on the PC5 interface, and also to verify whether a group corresponding to the group identifier allows the discovery process on the PC5 interface. Similarly, when the application authentication information includes the terminal device identifier, it indicates that it is necessary to verify not only whether the first application can perform the discovery process on the PC5 interface, but also whether the terminal device in which the first application is installed can perform the discovery process on the PC5 interface, and so on.
Step 205: sending a verification result of the first application information to the terminal equipment, wherein the verification result is used for indicating whether the first application can trigger a message event of a discovery message
And after the verification is finished, the network functional network element sends the verification result to the terminal equipment. Wherein the verification result may include a verification success message indicating that the first application is capable of performing the discovery process on the PC5 interface or a verification failure message indicating that the first application is not capable of performing the discovery process on the PC5 interface. Further, when the verification result includes the verification success message, the verification result may further include an application code, and the application code may be used by the terminal device for a secure transmission mechanism in a subsequent direct connection communication process. Further, when the verification result includes a verification failure message, the verification result further includes a failure reason, for example, the failure reason may include that the application is not allowed, the group is not allowed, or the terminal device is not allowed.
As an example, the specific implementation that the network function network element sends the verification result of the first application information to the terminal device may include the following two possible implementation manners:
the first implementation mode comprises the following steps: and the network function network element encapsulates the verification result into a second transparent container and sends the second transparent container to a mobility management network element, and the mobility management network element encapsulates the second transparent container into an NAS message and forwards the NAS message to the terminal equipment.
That is, in this implementation manner, the network function network element may perform an encapsulation operation on the verification result, that is, encapsulate the verification result into the second transparent container, and then send the second transparent container to the mobility management network element. After receiving the second transparent container, the mobility management network element may send the second transparent container to the NAS layer, and encapsulate the second transparent container in an NAS message by using the NAS layer, and send the NAS message to the terminal device. As an example, the mobility management network element may send the second transparent container to the terminal device via a UE configuration update message.
The second implementation mode comprises the following steps: and the network function network element sends the verification result to a mobility management network element, and the mobility management network element encapsulates the verification result into an NAS message and forwards the NAS message to the terminal equipment.
In this implementation, the network function element does not process the verification result, but directly sends the verification result to the mobility management element, and the mobility management element encapsulates the verification result into an NAS message and forwards the NAS message to the terminal device. As an example, after receiving the verification result, the mobility management network element may send the verification result to the NAS layer, and encapsulate the verification result into an NAS message by the NAS layer and forward the NAS message to the terminal device. Exemplarily, the mobility management network element may send the verification result to the terminal device through a UE configuration update message.
Step 206: the terminal device determines whether to execute a message event of the discovery message for the first application according to a verification result received from the network function network element.
And the terminal equipment receives a verification result fed back by the network function network element, wherein the verification result is used for indicating whether the first application can trigger a message event of a discovery message. As described above, since the network functional network element may send the verification result to the terminal device in different manners, correspondingly, the terminal device obtains the verification result in different manners, which may specifically include:
in the first case: in the first case of step 201, the terminal device receives the NAS message through the NAS layer, reads the second transparent container from the NAS message, and interprets the second transparent container to obtain the verification result.
In the second case: for the second case in step 202, the terminal device receives the NAS message through the NAS layer, and parses the NAS message, so as to obtain the verification result.
As an example, the terminal device may further receive the verification result through the D2D direct connection layer, and further, may feed back the verification result to the application layer.
The terminal device decides whether to execute the message event related to the discovery message according to the message included in the verification result, and it is understood that the message event related to the discovery message is executed when the verification result includes a verification success message, and the message event related to the discovery message is not executed when the verification result does not include a verification success message.
Next, for the case that the verification is successful, the operations performed by the terminal device are described as follows:
before introducing the operation executed by the terminal device, the layers included inside the terminal device and the inter-layer relationship are simply introduced. Referring to fig. 3, the terminal device may include an application layer, a D2D direct connection layer, and an access layer, where the interlayer relationship among the application layer, the D2D direct connection layer, and the access layer is as shown in fig. 3, where the access layer may directly transfer information with the application layer, that is, the D2D direct connection layer is not required to forward the information.
As an example, when the message event includes sending a discovery message, if the verification result includes a verification success message, the terminal device builds a discovery message through the D2D direct connection layer, and transfers the discovery message to the access layer; the terminal device adds the first application information as additional information of the discovery message through the access layer, and sends the added discovery message.
That is to say, when sending the discovery message, if it is determined that the first application can trigger sending the discovery message through verification, the terminal device builds the discovery message through the D2D direct connection layer, and then sends the discovery message to the access layer of the terminal device, and indicates that the message type is the discovery message. After receiving the discovery message, the access layer of the terminal device sets the first application information as additional information of the discovery message, for example, the first application information and the discovery message may be packaged, and then the access layer sends the packaged data to the terminal device on the receiving side. The first application information packaged by the access stratum of the terminal device may be preconfigured or sent by the application layer.
As an example, the message event includes an interception discovery message, and if the verification result includes a verification success message, the terminal device receives, through the access layer, the discovery message added with additional information, and detects whether first application information in the additional information is application information of an application that needs to be intercepted. And when the terminal equipment determines that the first application information is the application information of the application needing monitoring through the access layer, transmitting the first application information to the application layer or transmitting the first application information to the application layer through the D2D direct connection layer.
Corresponding to the sending end, when the terminal device is used as the terminal device of the receiving side, after being authorized to monitor the discovery message, the terminal device sends and receives the discovery message through the access layer. When receiving the discovery message, the access layer obtains the additional information of the discovery message, that is, obtains the first application information, and the access layer may determine whether the first application information is the application information of the application that needs to be monitored according to the preconfigured application detection information. If so, the access layer may directly send the first application information to the access layer, or the access layer sends the first application information to the D2D direct connection layer, and the D2D direct connection layer forwards the first application information to the application layer.
The preconfigured application detection information may be from an application layer, a D2D direct connection layer, or may also be from a network side. The specific implementation from the network side may refer to that the network function network element configures the application detection information for the terminal device, where the application detection information may be the same as the application verification information, or may be a subset of the application verification information. Further, the network function element may pull the application detection information from a user data management element.
Of course, the above is only described by taking the case that the additional information includes the first application information as an example, in another embodiment, the additional information may further include group information and the like, in this case, the application detection information in the terminal device at the receiving side further includes group information and the like of a group that needs to be monitored, at this time, it is further required to determine whether the group information in the additional information is the group information of the group that needs to be monitored, and after determining that the group information is the group information of the group that needs to be monitored, it is further required to feed back the group information to the application layer, and detailed description thereof is not repeated here.
As an example, if the message event includes sending a discovery message, if the verification result includes a verification success message, the terminal device constructs the discovery message through a D2D direct connection layer and then transmits the discovery message to an access layer, where the discovery message includes the first application information, and the terminal device sends the discovery message through the access layer.
If the message event includes sending a discovery message, the terminal device is a terminal device of a sending side. After the terminal device determines that the verification is passed, when the discovery message is built through the D2D direct connection layer, the first application information may be added to the discovery message, and then the discovery message including the first application information is sent through the access layer. Further, when the discovery message is constructed, in addition to the construction based on the first application information, the construction may be performed based on at least one of a group identifier, a terminal device identifier, and a user identifier.
As an example, if the message event includes a monitoring discovery message, if the verification result includes a verification success message, the terminal device receives the discovery message through the access layer, transmits the discovery message to the D2D direct connection layer, analyzes the discovery message through the D2D direct connection layer, and transmits the first application information to the application layer when it is determined that the first application information obtained after the analysis is application information of an application that needs monitoring.
That is, as shown in fig. 4, if the terminal device is a terminal device at a receiving end, after the discovery message is authorized to be monitored, the discovery message is received and sent through an access layer. Upon receiving the discovery message, the discovery message is passed to a D2D direct connection layer, and the D2D direct connection layer parses the discovery message to parse the first application information in the discovery message. Then, the D2D direct connection layer detects whether the first application information in the discovery message is application information of an application that needs to be monitored, as described above, the D2D direct connection layer may determine whether the first application information is application information of an application that needs to be monitored according to preconfigured application detection information. When the terminal device determines that the first application information in the discovery message is the application information of the application needing monitoring through the D2D direct connection layer, the first application information is transmitted to the application layer, and therefore the terminal device achieves a discovery process.
Further, the terminal device receives a discovery message through the access layer, detects whether first application information in the discovery message is application information of an application needing monitoring, transmits the first application information to the D2D direct connection layer when the terminal device determines that the first application information is the application information of the application needing monitoring through the access layer, and transmits the first application information to the application layer through the D2D direct connection layer.
That is to say, if the terminal device is a terminal device that receives information, after the discovery message is authorized to be monitored, the discovery message is received through the access stratum, and then it is detected through the access stratum whether the first application information in the discovery message is application information of an application that needs to be monitored. Similarly, the access stratum may determine whether the first application is application information of an application that needs to be monitored according to the preconfigured application detection information. The preconfigured information may be from an application layer, a direct connection layer, or from a network side. When the access layer determines that the first application is the application needing monitoring, the first application information is transmitted to the D2D direct connection layer and transmitted to the application layer by the D2D direct connection layer, or the access layer directly transmits the first application information to the application layer.
Further, the verification result includes configuration information of a timer, and the configuration information is used for indicating that the verification result is valid all the time in the running time period of the timer.
The configuration information may include a timing duration of the timer. That is to say, after the end of the verification, the network function network element may configure a timer for the terminal device, as an example, the network function network element may decide whether to configure the timer according to a local policy, and further, the network function network element may configure the timer according to the auxiliary information of the application server, that is, the auxiliary information may include configuration information of the timer. During the timer running period, the terminal device may use the verification result all the time, for example, the message event of the discovery message triggered multiple times by the same application or group does not need to be verified. Once the timer expires, the terminal device needs to reinitiate the authentication process.
As an example, the starting time of the timer includes at least one of:
(1) The time when the configuration information of the timer is received.
That is to say, the terminal device starts the timer once receiving the configuration information, and the running duration of the timer is the timing duration in the configuration information. It is understood that, since the configuration information of the timer is included in the verification result, it can also be understood that, when the verification result is received, the terminal device starts the timer.
(2) The time at which the restart timer command is received.
The restart timer command may be indicated by the network side, that is, in some cases, the terminal device may be required to restart the timer due to factors such as a change of the verification result, and the network side may issue a restart timer instruction at this time, and accordingly, the terminal device starts the timer.
(3) A time when the updated verification result is received.
When the verification result changes, which indicates that the current verification result has failed, in this case, the timer may be started, which is equivalent to performing timing anew.
It should be noted that, the above is only described by taking an example of configuring a timer by a network function network element, and in another embodiment, the timer may also be configured for the terminal device by a user data management network element according to a local policy or auxiliary information of an application server, which is not limited in this embodiment of the present application.
In the embodiment of the application, the terminal device sends first application information of a first application needing to be verified to a network function network element, the network function network element verifies whether the first application can trigger a message event of a discovery message, and feeds back a verification result to the terminal device, and the terminal device determines whether to execute the message event of the discovery message of the first application according to the fed-back verification result, so that information verification in a 5G system is realized.
In another embodiment, the terminal device may further perform authentication on the first application by using preconfigured application authentication information, and then details the implementation manner. Referring to fig. 5, fig. 5 is a flowchart illustrating an information verification method according to another embodiment, which may be applied to the communication network architecture shown in fig. 1, and the method may include the following implementation steps:
step 501: and the network function network element sends application verification information to the terminal equipment.
The application verification information comprises second application information of a second application capable of triggering a message event of the discovery message, and the message event is used for verifying whether the first application can trigger the discovery message or not by the terminal equipment based on the first application information of the first application needing verification, and comprises the steps of sending the discovery message and monitoring the discovery message.
Wherein the second application information of the second application may be used to uniquely identify the second application, and may be exemplarily identified by an OS ID and an APP ID; alternatively, the second application information may also be a predefined character string, which is not limited in this embodiment of the present application,
the second application is an application authorized to trigger a message event of the discovery message, and in the application authentication information, the authorized second application may include one or more, that is, the application authentication information includes at least one second application information.
As an example, the application verification information further includes group information of a group in which the second application information is located, wherein each second application information is associated with at least one group information or each group information is associated with at least one second application information; and/or the application verification information further comprises terminal equipment information of terminal equipment used for installing the second application; and/or the application authentication information further comprises user information for logging in the second application.
The association relationship between the second application information and the group information may include two types, one type is that the second application information is associated with at least one group information, that is, each group in at least one group related to the second application allows a message event that triggers a discovery message; another is that a certain group of information is associated with at least one second application information, i.e. each of the at least one second application within the certain group is allowed to trigger a message event of the discovery message.
As an example, the network function network element encapsulates the application authentication information into a third transparent container and sends the third transparent container to the mobility management network element, and the mobility management network element adds the third transparent container to the NAS message and forwards the NAS message to the terminal device.
That is, in this implementation manner, the network function element may perform an encapsulation operation on the application authentication information, that is, encapsulate the application authentication information into the third transparent container, and then send the third transparent container to the mobility management element. After receiving the third transparent container, the mobility management network element may send the third transparent container to the NAS layer, and encapsulate the third transparent container in an NAS message by using the NAS layer, and send the NAS message to the terminal device.
As an example, the network function network element sends the application authentication information to the mobility management network element, and the application authentication information is encapsulated in an NAS message by the mobility management network element and then forwarded to the terminal device.
In this implementation, the network functional network element does not process the application authentication information, but directly sends the application authentication information to the mobility management network element, and the mobility management network element encapsulates the application authentication information into an NAS message and forwards the NAS message to the terminal device. As an example, after receiving the verification result, the mobility management network element may send the application verification information to the NAS layer, and encapsulate the application verification information into an NAS message by the NAS layer and forward the NAS message to the terminal device.
Further, when the terminal device is in a connected state with the mobility management network element, the mobility management network element may send the application verification information to the terminal device through a UE configuration update message.
Further, when the terminal device and the mobility management network element are in an unconnected state, that is, the terminal device is in an idle state, the mobility management network element may send the application verification information to the terminal device in the following manner: and receiving a service request or a registration request sent by the terminal equipment, wherein the service request or the registration request carries the capability information of the terminal equipment for executing the message event of the discovery message. If it is determined based on the capability information that the terminal device has the capability of performing the message event of the discovery message, the application authentication information is sent to the terminal device via a service response or a registration response, and if it is determined based on the capability information that the terminal device does not have the capability of performing the message event of the discovery message, a rejection message may be sent to the terminal device, which may carry a rejection reason.
Further, if the network function network element does not provide the application authentication information to the terminal device, it may be expressed as any one of the following cases: all applications can trigger a message event of a discovery message, or all applications cannot trigger a message event of a discovery message, or historical application verification information configured at the time closest to the current time is determined as application verification information, that is, the historical application verification information configured at the last time is adopted.
Further, for the network function network element, before sending the application verification information to the terminal device, the application verification information needs to be obtained, and the specific implementation of obtaining may include:
in the first case: and the network function network element acquires the application verification information from the local.
The network function network element may locally store the application authentication information, and the locally stored application authentication information may be pulled from the user data management network element in advance.
In the second case: the network function network element obtains the application verification information from the user data management network element, and the application verification information in the user data management network element is sent by the application server in advance.
When the application authentication information is not locally stored in the network functional network element, the application authentication information may be pulled from the user data management network element. As an example, when the network function network element is a session management function network element, the session management function network element pulls the application verification information from the user data management network element through a policy control function network element, that is, the policy control function network element needs to forward the application verification information pulled from the user data management network element to the session management function network element at this time. Further, if the user data managing network element does not have application authentication information, the application authentication information may not be provided.
The origin of the application authentication information in the user data managing network element is briefly described here. In some embodiments, the application server may send application authentication information that can be applied to the discovery process performed on the PC5 to the user data managing network element, and further, the application server may send the application authentication information to the NEF, which sends the application authentication information to the user data managing network element. The user data management network element receives and stores the application authentication information sent from the application server, and further, the user data management network element can also store the application authentication information into the UDR.
Step 502: the terminal device receives and stores the application authentication information.
As an example, the specific implementation that the terminal device receives the application verification information may include: and the terminal equipment receives a UE configuration updating message sent by the mobility management network element, wherein the UE configuration updating message carries application verification information.
As an example, the specific implementation that the terminal device receives the application verification information may further include: the terminal equipment sends a service request or a registration request to the mobility management network element, wherein the service request or the registration request carries the capability information of the terminal equipment for executing the message event of the discovery message, the terminal equipment receives a service response or a registration response sent by the mobility management network element, the service response or the registration response carries the application verification information, and the application verification information is sent by the mobility management network element after the mobility management network element determines that the terminal equipment has the capability of executing the message event of the discovery message based on the capability information.
Further, for the terminal device, when the terminal device does not receive the application verification information, it is determined that all applications can trigger a message event of the discovery message; or, when the terminal device does not receive the application verification information sent by the network function network element, determining that all applications cannot trigger a message event of a discovery message; or, determining the preconfigured authentication information as application authentication information; or, determining the historical application verification information configured at the time closest to the current time as the application verification information, that is, determining the historical application verification information configured at the last time as the application verification information.
It should be noted that, the above describes a process of configuring application authentication information for a terminal device by a network function network element, and based on the above implementation, when the terminal device authenticates first application information that needs to be authenticated, the terminal device may perform authentication according to the application authentication information that is configured in advance.
Step 503: and the terminal equipment verifies the first application to be verified based on the application verification information.
When the first application needs to be verified, the terminal device may acquire application verification information and first application information of the first application that needs to be verified.
As an example, the first application needs to be verified when a certain service related to the first application is activated at the application layer or when there is a specific set-up in the first application. As an example, the application layer of the terminal device may send the first application information of the first application to the D2D direct connection layer.
Step 504: and the terminal equipment determines whether to execute the message event of the discovery message of the first application according to the verification result.
That is, the terminal device verifies whether the first application can trigger the message event of the discovery message based on the first application information and the application verification information.
As an example, the terminal device may be authenticated through a D2D direct layer. Illustratively, the D2D direct layer of the terminal device verifies whether the first application information is authorized to trigger a message event of the discovery message based on the application verification information. Further, the D2D direct layer of the terminal device verifies, based on the application verification information, whether the first application information and the group identity are authorized to trigger a message event of the discovery message. Further, the D2D direct layer of the terminal device verifies the first application information and the group identity and whether the terminal device is authorized to trigger a message event of the discovery message based on the application verification information. Further, the D2D direct layer of the terminal device verifies the first application information and whether the terminal device is authorized to trigger a message event of a discovery message based on the application verification information, and so on.
The terminal equipment determines whether to execute the message event related to the discovery message according to the verification result, and can understand that when the verification is passed, the message event related to the discovery message is executed, and when the verification is not passed, the message event related to the discovery message is not executed.
In addition, for the operation executed by the terminal device in the case that the verification is successful, reference may be made to step 203 in the embodiment of fig. 2 described above, and details are not repeated here.
In this embodiment of the present application, when the terminal device needs to verify the first application, the application verification information preconfigured by the network function network element may be obtained, and since the application verification information includes the second application information of the second application that can trigger the message event of the discovery message, the terminal device may verify whether the first application can trigger the message event of the discovery message based on the first application information and the application verification information, thereby implementing information verification in the 5G system.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an information verification apparatus according to an exemplary embodiment, where the apparatus may include:
a first sending module 610, configured to send an information verification request to a network function network element, where the information verification request carries first application information of a first application that needs to be verified;
a determining module 620, configured to determine whether to execute a message event of the discovery message for the first application according to a verification result received from the network function network element, where the network function network element is a fifth generation 5G core network element.
In one possible implementation manner of the present application, the message event includes sending a discovery message or listening to a discovery message.
In a possible implementation manner of the present application, the first sending module 610 is configured to: and encapsulating the information verification request into a first transparent container, adding the first transparent container into a non-access stratum (NAS) message, sending the NAS message to a mobility management network element, and forwarding the first transparent container to the network function network element by the mobility management network element.
In a possible implementation manner of the present application, the first sending module 610 is configured to: and encapsulating the information verification request into an NAS message and sending the NAS message to a mobility management network element, and analyzing the information verification request from the NAS message by the mobility management network element and then forwarding the information verification request to the network function network element.
In a possible implementation manner of the present application, the information verification request includes group information, where the group information is used to indicate a group in which the first application is located; and/or the information verification request comprises terminal equipment information of the terminal equipment; and/or the information verification request comprises user information.
In a possible implementation manner of the present application, the application verification information includes group information of a group in which the second application information is located, where each piece of the second application information is associated with at least one piece of group information or each piece of the group information is associated with at least one piece of second application information, and the second application information refers to application information of the second application that can trigger a message event of the discovery message; and/or the application verification information comprises terminal equipment information of terminal equipment for installing the second application; and/or the application authentication information comprises user information for logging in the second application.
In a possible implementation manner of the present application, the verification result includes configuration information of a timer, and the configuration information is used to indicate that the verification result is valid all the time within an operation time period of the timer.
In a possible implementation manner of the present application, the starting time of the timer includes at least one of the following:
the time when the configuration information of the timer is received; or, the time when the restart timer command is received; or the time when the updated verification result is received.
In a possible implementation manner of the present application, the terminal device includes a D2D direct connection layer and an access layer, and when the message event includes sending a discovery message, the determining module 620 is further configured to: if the verification result comprises a verification success message, constructing a discovery message through the D2D direct connection layer, and transmitting the discovery message to the access layer; and adding the first application information as the additional information of the discovery message through the access layer, and sending the added discovery message.
In a possible implementation manner of the present application, the terminal device includes an application layer, a D2D direct connection layer, and an access layer, the message event includes a discovery monitoring message, and the determining module 620 is further configured to: receiving a discovery message added with additional information through the access layer, and detecting whether first application information in the additional information is application information of an application needing monitoring; and when the first application information is determined to be the application information of the application needing monitoring through the access layer, transmitting the first application information to the application layer or transmitting the first application information to the application layer through the D2D direct connection layer.
In a possible implementation manner of the present application, the terminal device includes an application layer, a D2D direct connection layer, and an access layer; the message event comprises a listening discovery message, and the determining module 620 is further configured to: receiving a discovery message through the access layer, and transmitting the discovery message to the D2D direct connection layer, wherein the discovery message comprises the first application information; analyzing the discovery message through the D2D direct connection layer; and when the first application information obtained after analysis is determined to be the application information of the application needing monitoring through the D2D direct connection layer, transmitting the first application information to the application layer.
In a possible implementation manner of the present application, the network function network element is a policy control function network element or a session management function network element.
In the embodiment of the application, the terminal device sends the first application information of the first application needing to be verified to the network function network element, the network function network element verifies whether the first application can trigger the message event of the discovery message, and feeds back the verification result to the terminal device, and the terminal device determines whether to execute the message event of the discovery message of the first application according to the fed-back verification result, so that the information verification in the 5G system is realized.
Referring to fig. 7, fig. 7 is a schematic structural diagram illustrating an information verification apparatus according to another exemplary embodiment, where the apparatus may include:
a receiving module 710, configured to receive an information verification request, where the information verification request carries first application information of a first application that needs to be verified;
a second sending module 720, configured to send a verification result of the first application information to the terminal device, where the verification result is used to indicate whether the first application can trigger a message event of the discovery message.
In one possible implementation manner of the present application, the message event includes sending a discovery message or listening for a discovery message.
In a possible implementation manner of this application, the second sending module 720 is further configured to:
acquiring application verification information;
and performing verification based on the first application information and the application verification information.
In a possible implementation manner of this application, the second sending module 720 is further configured to:
acquiring the application verification information from the local; alternatively, the first and second liquid crystal display panels may be,
and acquiring the application verification information from the user data management network element, wherein the application verification information in the user data management network element is sent by the application server in advance.
In a possible implementation manner of the present application, the second sending module 720 is configured to:
and packaging the verification result into a second transparent container, sending the second transparent container to a mobility management network element, packaging the second transparent container into an NAS message by the mobility management network element, and then forwarding the NAS message to the terminal equipment.
In a possible implementation manner of the present application, the second sending module 720 is configured to:
and sending the verification result to a mobility management network element, and encapsulating the verification result into an NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
In a possible implementation manner of the present application, the network function element is a policy control function element or a session management function element.
In a possible implementation manner of the present application, the application verification information includes group information of a group in which the second application information is located, where each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application that can trigger a message event of the discovery message; and/or the application verification information comprises terminal equipment information of terminal equipment for installing the second application; and/or the application authentication information comprises user information for logging in the second application.
In the embodiment of the application, the terminal device sends the first application information of the first application needing to be verified to the network function network element, the network function network element verifies whether the first application can trigger the message event of the discovery message, and feeds back the verification result to the terminal device, and the terminal device determines whether to execute the message event of the discovery message of the first application according to the fed-back verification result, so that the information verification in the 5G system is realized.
Referring to fig. 8, fig. 8 is a schematic structural diagram illustrating an information verification apparatus according to another exemplary embodiment, where the apparatus may include:
a verification module 810, configured to verify a first application to be verified based on the application verification information;
an executing module 820, configured to determine whether to execute a message event of a discovery message for the first application according to a verification result;
the application verification information is sent by the network function network element in advance, and the network function network element is a 5G core network element.
In one possible implementation manner of the present application, the message event includes sending a discovery message or listening to a discovery message.
In a possible implementation manner of this application, the execution module 820 is further configured to: and receiving a UE configuration updating message sent by a mobility management network element, wherein the UE configuration updating message carries the application verification information.
In a possible implementation manner of this application, the execution module 820 is further configured to: sending a service request or a registration request to a mobility management network element, wherein the service request or the registration request carries the capability information of the terminal equipment executing the message event of the discovery message; and receiving a service response or a registration response sent by the mobility management network element, wherein the service response or the registration response carries the application verification information, and the application verification information is sent by the mobility management network element after the mobility management network element determines that the terminal equipment has the capability of executing the message event of the discovery message based on the capability information.
In a possible implementation manner of the present application, the application verification information includes group information of a group in which the second application information is located, where each piece of the second application information is associated with at least one piece of group information or each piece of the group information is associated with at least one piece of second application information, and the second application information refers to application information of the second application that can trigger a message event of the discovery message; and/or the application verification information comprises terminal equipment information of terminal equipment for installing the second application; and/or the application authentication information comprises user information for logging in the second application.
In a possible implementation manner of this application, the execution module 820 is further configured to: when the application verification information is not received, determining that all applications can trigger message events of discovery messages; or when the application verification information is not received, determining that all applications cannot trigger a message event of the discovery message; or when the application verification information is not received, determining the preconfigured verification information as the application verification information; or when the application verification information is not received, determining historical application verification information configured at the time closest to the current time as the application verification information.
In a possible implementation manner of this application, the terminal device includes a D2D direct connection layer and an access layer, and when the message event includes sending a discovery message, the executing module 820 is further configured to:
if the verification result comprises a verification success message, constructing a discovery message through the D2D direct connection layer, and transmitting the discovery message to the access layer;
and adding the first application information as additional information of the discovery message through the access layer, and sending the added discovery message.
In a possible implementation manner of the present application, the terminal device includes an application layer, a D2D direct connection layer, and an access layer, the message event includes a discovery monitoring message, and the executing module 820 is further configured to:
receiving a discovery message added with additional information through the access layer, and detecting whether first application information in the additional information is application information of an application needing monitoring; and when the first application information is determined to be the application information of the application needing monitoring through the access layer, transmitting the first application information to the application layer or transmitting the first application information to the application layer through the D2D direct connection layer.
In a possible implementation manner of the present application, the network function network element is a policy control function network element or a session management function network element.
In this embodiment of the present application, when the terminal device needs to verify the first application, the application verification information preconfigured by the network function network element may be obtained, and since the application verification information includes the second application information of the second application that can trigger the message event of the discovery message, the terminal device may verify whether the first application can trigger the message event of the discovery message based on the first application information and the application verification information, thereby implementing information verification in the 5G system.
Referring to fig. 9, fig. 9 is a schematic structural diagram of an information verification apparatus according to another exemplary embodiment, where the apparatus may include:
a third sending module 910, configured to send application authentication information to a terminal device, where the application authentication information is used for the terminal device to determine whether to execute a message event of a discovery message for a first application that needs to be authenticated based on first application information authentication of the first application.
In one possible implementation manner of the present application, the message event includes sending a discovery message or listening for a discovery message.
In a possible implementation manner of this application, the third sending module 910 is further configured to: and acquiring the application verification information from the user data management network element, wherein the application verification information in the user data management network element is sent by the application server in advance.
In a possible implementation manner of this application, the third sending module 910 is further configured to: and packaging the application verification information into a third transparent container and then sending the third transparent container to a mobility management network element, and adding the third transparent container to the NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
In a possible implementation manner of the present application, the third sending module 910 is further configured to: and sending the application verification information to a mobility management network element, and packaging the application verification information into an NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
In a possible implementation manner of the present application, the application verification information includes group information of a group in which the second application information is located, where each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application that can trigger a message event of the discovery message; and/or the application verification information comprises terminal equipment information of terminal equipment used for installing the second application; and/or the application authentication information comprises user information for logging in the second application.
In this embodiment of the present application, when the terminal device needs to verify the first application, the application verification information preconfigured by the network function network element may be obtained, and since the application verification information includes the second application information of the second application that can trigger the message event of the discovery message, the terminal device may verify whether the first application can trigger the message event of the discovery message based on the first application information and the application verification information, thereby implementing information verification in the 5G system.
Referring to fig. 10, it shows a schematic structural diagram of an apparatus provided in an exemplary embodiment of the present application, where the apparatus may be the terminal apparatus or the network functional network element, and includes: a processor 1001, a receiver 1002, a transmitter 1003, a memory 1004, and a bus 1005.
The processor 1001 includes one or more processing cores, and the processor 1001 executes various functional applications and information processing by running software programs and modules.
The receiver 1002 and the transmitter 1003 may be implemented as one communication component, which may be a piece of communication chip.
The memory 1004 is connected to the processor 1001 through a bus 1005.
The memory 1004 may be used to store at least one instruction, which the processor 1001 is configured to execute in order to implement the various steps performed by the apparatus in the various method embodiments described above.
Further, memory 1004 may be implemented by any type or combination of volatile or non-volatile storage devices, including, but not limited to: magnetic or optical disks, electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), static Random Access Memory (SRAM), read-only memory (ROM), magnetic memory, flash memory, programmable read-only memory (PROM).
The present application provides a computer-readable storage medium, in which at least one instruction is stored, and the at least one instruction is loaded and executed by the processor to implement the method provided by the above-mentioned method embodiments.
The present application also provides a computer program product, which when run on a computer causes the computer to perform the methods provided by the various method embodiments described above.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (63)

1. An information verification method is applied to terminal equipment, and is characterized by comprising the following steps:
sending an information verification request to a network function network element, wherein the information verification request carries first application information of a first application to be verified so as to request the network function network element to verify based on the first application information and the application verification information;
determining whether to execute a message event of a discovery message for the first application according to a verification result received from the network function network element, wherein the network function network element is a fifth generation 5G core network element,
the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the gas,
the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the gas,
the application authentication information includes user information for logging in the second application.
2. The method of claim 1, wherein the message event comprises sending a discovery message or listening for a discovery message.
3. The method of claim 1 or 2, wherein said sending an information verification request to a network function network element comprises:
and encapsulating the information verification request into a first transparent container, adding the first transparent container into a non-access stratum (NAS) message, sending the first transparent container to a mobility management network element, and forwarding the first transparent container to the network function network element by the mobility management network element.
4. The method of claim 1 or 2, wherein said sending an information verification request to a network function network element comprises:
and encapsulating the information verification request into an NAS message and sending the NAS message to a mobility management network element, and analyzing the information verification request from the NAS message by the mobility management network element and then forwarding the information verification request to the network function network element.
5. The method of claim 1,
the information verification request comprises group information, and the group information is used for indicating a group where the first application is located; and/or the presence of a gas in the gas,
the information verification request comprises terminal equipment information of the terminal equipment; and/or the presence of a gas in the atmosphere,
the information verification request includes user information.
6. The method according to claim 1 or 2, wherein the verification result comprises configuration information of a timer, the configuration information indicating that the verification result is valid for a running period of the timer.
7. The method of claim 6, wherein the starting time of the timer comprises at least one of:
the time when the configuration information of the timer is received; alternatively, the first and second liquid crystal display panels may be,
the time when a restart timer command is received; alternatively, the first and second liquid crystal display panels may be,
a time when the updated verification result is received.
8. The method of claim 1, wherein the terminal device comprises a D2D direct layer and an access layer, and when the message event comprises sending a discovery message, the method further comprises:
if the verification result comprises a verification success message, constructing a discovery message through the D2D direct connection layer, and transmitting the discovery message to the access layer;
and adding the first application information as the additional information of the discovery message through the access layer, and sending the added discovery message.
9. The method of claim 1, wherein the terminal device comprises an application layer, a D2D direct layer, and an access layer, wherein the message event comprises a listening discovery message, the method further comprising:
receiving a discovery message added with additional information through the access layer, and detecting whether first application information in the additional information is application information of an application needing monitoring;
and when the first application information is determined to be the application information of the application needing monitoring through the access layer, transmitting the first application information to the application layer or transmitting the first application information to the application layer through the D2D direct connection layer.
10. The method of claim 1, wherein the terminal device comprises an application layer, a D2D direct layer, and an access layer; the message event comprises a snoop discovery message, the method further comprising:
receiving a discovery message through the access layer, and transmitting the discovery message to the D2D direct connection layer, wherein the discovery message comprises the first application information;
analyzing the discovery message through the D2D direct connection layer;
and when the first application information obtained after analysis is determined to be the application information of the application needing monitoring through the D2D direct connection layer, transmitting the first application information to the application layer.
11. The method of claim 1, wherein the network function network element is a policy control function network element or a session management function network element.
12. An information verification method is applied to a network function network element, wherein the network function network element is a 5G core network element, and the method comprises the following steps:
receiving an information verification request, wherein the information verification request carries first application information of a first application needing to be verified;
sending a verification result of the first application information to a terminal device, wherein the verification result is used for indicating whether the first application can trigger a message event of a discovery message,
the method further comprises the following steps: acquiring application verification information; performing authentication based on the first application information and the application authentication information,
the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the gas,
the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the gas,
the application authentication information includes user information for logging in to the second application.
13. The method of claim 12, wherein the message event comprises sending a discovery message or listening for a discovery message.
14. The method of claim 12, wherein the obtaining application authentication information comprises:
acquiring the application verification information from the local; alternatively, the first and second liquid crystal display panels may be,
and acquiring the application verification information from the user data management network element, wherein the application verification information in the user data management network element is sent in advance by an application server.
15. The method of claim 12, wherein the sending the verification result of the first application information to the terminal device comprises:
and packaging the verification result into a second transparent container, sending the second transparent container to a mobility management network element, packaging the second transparent container into an NAS message by the mobility management network element, and then forwarding the NAS message to the terminal equipment.
16. The method of claim 12, wherein the sending the verification result of the first application information to a terminal device comprises:
and sending the verification result to a mobility management network element, and encapsulating the verification result into an NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
17. The method of any one of claims 12-16, wherein the network function network element is a policy control function network element or a session management function network element.
18. An information verification method is applied to terminal equipment, and is characterized by comprising the following steps:
verifying the first application to be verified based on the application verification information;
determining whether to execute a message event of a discovery message for the first application according to a verification result;
wherein the application authentication information is sent by a network function network element in advance, the network function network element is a 5G core network element,
the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the gas,
the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the atmosphere,
the application authentication information includes user information for logging in to the second application.
19. The method of claim 18, wherein the message event comprises sending a discovery message or listening for a discovery message.
20. The method of claim 18, wherein the method further comprises:
and receiving a UE configuration updating message sent by a mobility management network element, wherein the UE configuration updating message carries the application verification information.
21. The method of claim 18, wherein the method further comprises:
sending a service request or a registration request to a mobility management network element, wherein the service request or the registration request carries the capability information of the terminal equipment for executing the message event of the discovery message;
and receiving a service response or a registration response sent by the mobility management network element, wherein the service response or the registration response carries the application verification information, and the application verification information is sent by the mobility management network element after the mobility management network element determines that the terminal equipment has the capability of executing the message event of the discovery message based on the capability information.
22. The method of claim 18, wherein the method further comprises:
when the application verification information is not received, determining that all applications can trigger message events of discovery messages; alternatively, the first and second electrodes may be,
when the application verification information is not received, determining that all applications cannot trigger a message event of a discovery message; alternatively, the first and second electrodes may be,
when the application verification information is not received, determining the preconfigured verification information as the application verification information; alternatively, the first and second electrodes may be,
and when the application verification information is not received, determining the historical application verification information configured at the time closest to the current time as the application verification information.
23. The method of claim 18, wherein the terminal device comprises a D2D direct layer and an access layer, and when the message event comprises sending a discovery message, the method further comprises:
if the verification result comprises a verification success message, constructing a discovery message through the D2D direct connection layer, and transmitting the discovery message to the access layer;
and adding the first application information of the first application to be verified as the additional information of the discovery message through the access layer, and sending the added discovery message.
24. The method of claim 18, wherein the terminal device comprises an application layer, a D2D direct layer, and an access layer, wherein the message event comprises a listening discovery message, the method further comprising:
receiving a discovery message added with additional information through the access layer, and detecting whether first application information in the additional information is application information of an application needing monitoring;
and when the first application information is determined to be the application information of the application needing monitoring through the access layer, transmitting the first application information to the application layer or transmitting the first application information to the application layer through the D2D direct connection layer.
25. The method of any one of claims 18-23, wherein the network function network element is a policy control function network element or a session management function network element.
26. An information verification method is applied to a network function network element, wherein the network function network element is a 5G core network element, and the method comprises the following steps:
transmitting application authentication information to a terminal device, the application authentication information being used for the terminal device to determine whether to execute a message event of a discovery message for a first application requiring authentication based on first application information authentication of the first application,
the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the atmosphere,
the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the gas,
the application authentication information includes user information for logging in the second application.
27. The method of claim 26, wherein the message event comprises sending a discovery message or listening for a discovery message.
28. The method of claim 26, wherein the method further comprises:
and acquiring the application verification information from the user data management network element, wherein the application verification information in the user data management network element is sent in advance by an application server.
29. The method of claim 26, wherein said sending application authentication information to the terminal device comprises:
and packaging the application verification information into a third transparent container and sending the third transparent container to a mobility management network element, and adding the third transparent container to NAS information by the mobility management network element and then forwarding the NAS information to the terminal equipment.
30. The method of claim 26, wherein sending application authentication information to a terminal device comprises:
and sending the application verification information to a mobility management network element, and packaging the application verification information into an NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
31. An information verification apparatus applied to a terminal device, the apparatus comprising:
a first sending module, configured to send an information verification request to a network function network element, where the information verification request carries first application information of a first application that needs to be verified, so as to request the network function network element to perform verification based on the first application information and application verification information;
a determining module, configured to determine whether to execute a message event of the discovery message for the first application according to a verification result received from the network function network element, where the network function network element is a fifth generation 5G core network element,
the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the atmosphere,
the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the atmosphere,
the application authentication information includes user information for logging in to the second application.
32. The apparatus of claim 31, wherein the message event comprises sending a discovery message or listening for a discovery message.
33. The apparatus of claim 31 or 32, wherein the first transmitting module is to:
and encapsulating the information verification request into a first transparent container, adding the first transparent container into a non-access stratum (NAS) message, sending the NAS message to a mobility management network element, and forwarding the first transparent container to the network function network element by the mobility management network element.
34. The apparatus of claim 31 or 32, wherein the first transmitting module is to:
and encapsulating the information verification request into an NAS message and sending the NAS message to a mobility management network element, and analyzing the information verification request from the NAS message by the mobility management network element and then forwarding the information verification request to the network function network element.
35. The apparatus of claim 31,
the information verification request comprises group information, and the group information is used for indicating a group where the first application is located; and/or the presence of a gas in the atmosphere,
the information verification request comprises terminal equipment information of the terminal equipment; and/or the presence of a gas in the atmosphere,
the information verification request includes user information.
36. The apparatus according to claim 31 or 32, wherein the verification result comprises configuration information of a timer, the configuration information indicating that the verification result is valid for a running time period of the timer.
37. The apparatus as recited in claim 36, wherein said timer's starting time comprises at least one of:
the time when the configuration information of the timer is received; alternatively, the first and second electrodes may be,
the time when a restart timer command is received; alternatively, the first and second liquid crystal display panels may be,
a time when the updated verification result is received.
38. The apparatus of claim 31, wherein the terminal device comprises a D2D direct layer and an access layer, and wherein when the message event comprises sending a discovery message, the determining module is further to:
if the verification result comprises a verification success message, constructing a discovery message through the D2D direct connection layer, and transmitting the discovery message to the access layer;
and adding the first application information as the additional information of the discovery message through the access layer, and sending the added discovery message.
39. The apparatus of claim 31, wherein the terminal device comprises an application layer, a D2D direct layer, and an access layer, wherein the message event comprises a snoop discovery message, and wherein the determining module is further configured to:
receiving a discovery message added with additional information through the access layer, and detecting whether first application information in the additional information is application information of an application needing monitoring;
and when the first application information is determined to be the application information of the application needing monitoring through the access layer, transmitting the first application information to the application layer or transmitting the first application information to the application layer through the D2D direct connection layer.
40. The apparatus of claim 31, wherein the terminal device comprises an application layer, a D2D direct layer, and an access layer; the message event comprises a snoop discovery message, the determination module is further configured to:
receiving discovery messages through the access layer, and transmitting the discovery messages to the D2D direct connection layer, wherein the discovery messages comprise the first application information;
analyzing the discovery message through the D2D direct connection layer;
and when the first application information obtained after analysis is determined to be the application information of the application needing monitoring through the D2D direct connection layer, transmitting the first application information to the application layer.
41. The apparatus of claim 31, wherein the network function network element is a policy control function network element or a session management function network element.
42. An information verification device is applied to a network function network element, wherein the network function network element is a 5G core network element, and the device comprises:
the receiving module is used for receiving an information verification request, wherein the information verification request carries first application information of a first application needing to be verified;
a second sending module, configured to send a verification result of the first application information to a terminal device, where the verification result is used to indicate whether the first application can trigger a message event of a discovery message,
the second sending module is further configured to: acquiring application verification information; performing authentication based on the first application information and the application authentication information,
the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the gas,
the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the gas,
the application authentication information includes user information for logging in to the second application.
43. The apparatus of claim 42, wherein the message event comprises sending a discovery message or listening for a discovery message.
44. The apparatus of claim 42, wherein the second sending module is further for:
acquiring the application verification information from the local; alternatively, the first and second electrodes may be,
and acquiring the application verification information from the user data management network element, wherein the application verification information in the user data management network element is sent in advance by an application server.
45. The apparatus of claim 42, wherein the second sending module is to:
and encapsulating the verification result into a second transparent container and sending the second transparent container to a mobility management network element, and encapsulating the second transparent container into an NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
46. The apparatus of claim 42, wherein the second sending module is to:
and sending the verification result to a mobility management network element, and encapsulating the verification result into an NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
47. The apparatus of any one of claims 42-46, wherein the network function network element is a policy control function network element or a session management function network element.
48. An information verification apparatus applied to a terminal device, the apparatus comprising:
the verification module is used for verifying the first application to be verified based on the application verification information;
an execution module, configured to determine whether to execute a message event of a discovery message for the first application according to a verification result;
wherein the application authentication information is sent by a network function network element in advance, the network function network element is a 5G core network element,
the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the gas,
the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the gas,
the application authentication information includes user information for logging in the second application.
49. The apparatus of claim 48, wherein the message event comprises sending a discovery message or listening for a discovery message.
50. The apparatus of claim 48, wherein the execution module is further to:
and receiving a UE configuration update message sent by a mobility management network element, wherein the UE configuration update message carries the application verification information.
51. The apparatus of claim 48, wherein the execution module is further to:
sending a service request or a registration request to a mobility management network element, wherein the service request or the registration request carries the capability information of the terminal equipment executing the message event of the discovery message;
and receiving a service response or a registration response sent by the mobility management network element, wherein the service response or the registration response carries the application verification information, and the application verification information is sent by the mobility management network element after the mobility management network element determines that the terminal equipment has the capability of executing the message event of the discovery message based on the capability information.
52. The apparatus of claim 48, wherein the execution module is further to:
when the application verification information is not received, determining that all applications can trigger message events of discovery messages; alternatively, the first and second electrodes may be,
when the application verification information is not received, determining that all applications cannot trigger a message event of a discovery message; alternatively, the first and second electrodes may be,
when the application verification information is not received, determining the preconfigured verification information as the application verification information; alternatively, the first and second liquid crystal display panels may be,
and when the application verification information is not received, determining the historical application verification information configured at the time closest to the current time as the application verification information.
53. The apparatus of claim 48, wherein the terminal device comprises a D2D direct layer and an access layer, and wherein when the message event comprises sending a discovery message, the execution module is further to:
if the verification result comprises a verification success message, constructing a discovery message through the D2D direct connection layer, and transmitting the discovery message to the access layer;
and adding the first application information of the first application to be verified as the additional information of the discovery message through the access layer, and sending the added discovery message.
54. The apparatus of claim 48, wherein the terminal device comprises an application layer, a D2D direct layer, and an access layer, wherein the message event comprises a snoop discovery message, and wherein the execution module is further configured to:
receiving a discovery message added with additional information through the access layer, and detecting whether first application information in the additional information is application information of an application needing monitoring;
and when the first application information is determined to be the application information of the application needing monitoring through the access layer, transmitting the first application information to the application layer or transmitting the first application information to the application layer through the D2D direct connection layer.
55. The apparatus according to any of claims 48-54, wherein the network function network element is a policy control function network element or a session management function network element.
56. An information verification apparatus, applied to a network function network element, wherein the network function network element is a 5G core network element, the apparatus comprising:
a third sending module, configured to send application authentication information to a terminal device, where the application authentication information is used for the terminal device to determine whether to execute a message event of a discovery message for a first application that needs to be authenticated based on first application information authentication of the first application,
the application verification information comprises group information of a group where the second application information is located, wherein each piece of second application information is associated with at least one piece of group information or each piece of group information is associated with at least one piece of second application information, and the second application information refers to application information of a second application capable of triggering a message event of the discovery message; and/or the presence of a gas in the atmosphere,
the application verification information comprises terminal equipment information of terminal equipment used for installing a second application; and/or the presence of a gas in the atmosphere,
the application authentication information includes user information for logging in to the second application.
57. The apparatus of claim 56, wherein the message event comprises sending a discovery message or listening for a discovery message.
58. The apparatus of claim 56, wherein the third sending module is further for:
and acquiring the application verification information from the user data management network element, wherein the application verification information in the user data management network element is sent in advance by an application server.
59. The apparatus of claim 56, wherein the third sending module is further for:
and packaging the application verification information into a third transparent container and then sending the third transparent container to a mobility management network element, and adding the third transparent container to the NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
60. The apparatus of claim 56, wherein the third sending module is further configured to:
and sending the application verification information to a mobility management network element, and packaging the application verification information into an NAS message by the mobility management network element and then forwarding the NAS message to the terminal equipment.
61. A terminal device, comprising a processor and a memory, the memory storing at least one instruction for execution by the processor to perform the method of any one of claims 1-11 or the method of any one of claims 18-25.
62. A network functional network element comprising a processor and a memory, said memory storing at least one instruction for execution by said processor to implement the method of any of claims 12-17 or to implement the method of any of claims 26-30.
63. A computer readable storage medium having instructions stored thereon, wherein the instructions, when executed by a processor, implement the method of any one of claims 1-11, or implement the method of any one of claims 12-17, or implement the method of any one of claims 18-25, or implement the method of any one of claims 26-30.
CN201980091289.3A 2019-08-12 2019-08-12 Information verification method, device, equipment and storage medium Active CN113396600B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/100208 WO2021026726A1 (en) 2019-08-12 2019-08-12 Information verification method, device, apparatus and storage medium

Publications (2)

Publication Number Publication Date
CN113396600A CN113396600A (en) 2021-09-14
CN113396600B true CN113396600B (en) 2022-11-29

Family

ID=74570253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980091289.3A Active CN113396600B (en) 2019-08-12 2019-08-12 Information verification method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN113396600B (en)
WO (1) WO2021026726A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023212930A1 (en) * 2022-05-06 2023-11-09 北京小米移动软件有限公司 Communication method and apparatus, and device and storage medium
WO2024020752A1 (en) * 2022-07-25 2024-02-01 北京小米移动软件有限公司 Artificial intelligence (ai)-based method for providing service, apparatus, device and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109511115A (en) * 2017-09-14 2019-03-22 华为技术有限公司 A kind of authorization method and network element
WO2019095128A1 (en) * 2017-11-15 2019-05-23 Nokia Technologies Oy Authorization of applications for direct discovery

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8849203B2 (en) * 2012-06-27 2014-09-30 Alcatel Lucent Discovering proximity devices in broadband networks
CN104066070B (en) * 2013-03-20 2018-10-26 中兴通讯股份有限公司 Terminal registration method, terminal find method, terminal and device
CN104168664B (en) * 2013-05-20 2017-12-15 华为终端(东莞)有限公司 It was found that method and device
CN104581685B (en) * 2013-10-18 2018-12-14 电信科学技术研究院 It was found that the method for sending and receiving and transmission and receiving device of signal
CN106470382A (en) * 2015-08-14 2017-03-01 中兴通讯股份有限公司 Authority checking method, configuration information method of reseptance, device, base station and terminal
US11812497B2 (en) * 2017-03-10 2023-11-07 Apple Inc. Technology coordination for device-to-device discovery

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109511115A (en) * 2017-09-14 2019-03-22 华为技术有限公司 A kind of authorization method and network element
WO2019095128A1 (en) * 2017-11-15 2019-05-23 Nokia Technologies Oy Authorization of applications for direct discovery

Also Published As

Publication number Publication date
WO2021026726A1 (en) 2021-02-18
CN113396600A (en) 2021-09-14

Similar Documents

Publication Publication Date Title
CN110446201B (en) Communication module, communication method and system for realizing eSIM remote configuration
US10257800B2 (en) Method and apparatus for authenticating access authorization in wireless communication system
US10506432B2 (en) Method and apparatus for authenticating access authority for specific resource in wireless communication system
US9769801B2 (en) Method and apparatus for updating information regarding specific resource in wireless communication system
US10715965B2 (en) Report-based control of repeated multicast data transmission
CN108833122A (en) Awakening method, device and the storage medium of vehicle-carrying communication controller
CN111542081B (en) Communication switching method and device and Internet of things communication module
CN113396600B (en) Information verification method, device, equipment and storage medium
JP7043497B2 (en) Methods and equipment for installing and managing eSIM profiles
US9438603B2 (en) Method for managing access right of terminal to resource by server in wireless communication system, and device for same
EP2916616A2 (en) M2m gateway device and applying method thereof
WO2018196463A1 (en) Method and apparatus for network access, storage medium, and processor
CN107548054B (en) Master-slave equipment switching method of eSIM card, slave equipment and eSIM card management server
CN103476025B (en) Progress management method, progress management system and mobile terminal
WO2018032573A1 (en) Data processing method, apparatus, server and terminal
CN110045969A (en) Application program installation method, server, system, equipment and storage medium
CN113596792A (en) Binding method and device of electronic equipment, storage medium and electronic device
US20170127472A1 (en) Method and wireless device for controlling disconnection of a wireless device in a wi-fi direct group of a wireless network
CN110545253B (en) Information processing method, device, equipment and computer readable storage medium
US20130039322A1 (en) Method and device for controlling channel transmission
CN103441876B (en) A kind of based on DHCP protocol and the network device management method of snmp protocol and system
US20150229513A1 (en) Systems and methods for efficient remote security panel configuration and management
CN112291749A (en) Method and device for awakening T-Box, T-Box and server
CN112532663A (en) Gateway login method and device
CN106936798B (en) Service authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant