WO2024065336A1 - 一种侧行链路定位方法及装置 - Google Patents

一种侧行链路定位方法及装置 Download PDF

Info

Publication number
WO2024065336A1
WO2024065336A1 PCT/CN2022/122342 CN2022122342W WO2024065336A1 WO 2024065336 A1 WO2024065336 A1 WO 2024065336A1 CN 2022122342 W CN2022122342 W CN 2022122342W WO 2024065336 A1 WO2024065336 A1 WO 2024065336A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
token
sidelink
positioning
network element
Prior art date
Application number
PCT/CN2022/122342
Other languages
English (en)
French (fr)
Inventor
商正仪
陆伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN202280003735.2A priority Critical patent/CN118104187A/zh
Priority to PCT/CN2022/122342 priority patent/WO2024065336A1/zh
Publication of WO2024065336A1 publication Critical patent/WO2024065336A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator

Definitions

  • the present disclosure relates to the field of communication technology, and in particular to a sidelink positioning method and device.
  • Ranging and sidelink positioning services refer to determining the distance between two terminal devices (also called user equipment, UE) and/or the direction from one terminal device to another terminal device through a direct communication connection.
  • the fifth generation mobile communication technology (5G) system can provide ranging and sidelink (SL) positioning services.
  • the existing ranging and sidelink positioning services fail to protect the privacy of terminal devices.
  • the embodiments of the present disclosure provide a sidelink positioning method and device.
  • an embodiment of the present disclosure provides a sidelink positioning method, which is performed by a first terminal device, and the method includes:
  • the measurement result is sent to the first network element.
  • the first terminal device after receiving the first token sent by the second terminal device, the first terminal device can first determine whether to perform the sidelink positioning service with the second terminal device according to the first token, and after determining to perform the sidelink positioning service with the second terminal device, establish a sidelink with the second terminal device, perform sidelink positioning measurement, and send the measurement result to the first network element. Therefore, before performing sidelink positioning, the target terminal device first performs role authorization verification on the positioning terminal device according to the first token, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • an embodiment of the present disclosure provides a sidelink positioning method, which is performed by a second terminal device, and the method includes:
  • an embodiment of the present disclosure provides a communication device, including:
  • a transceiver module configured to receive a first token sent by a second terminal device, wherein the first token is used to characterize a role of the second terminal device in the sidelink positioning service;
  • a processing module configured to establish a side link with the second terminal device when determining to perform the side link positioning service with the second terminal device according to the first token
  • the processing module is further used to perform sidelink positioning measurements
  • the transceiver module is further configured to send the measurement result to the first network element.
  • an embodiment of the present disclosure provides another communication device, including:
  • a transceiver module configured to send a first token to a first terminal device, wherein the first token is used to characterize a role of the second terminal device in the sidelink positioning service, and the role of the second terminal device in the sidelink positioning service is used by the first terminal device to determine whether to perform the sidelink positioning service with the second terminal device;
  • a processing module used for establishing a side link with the first terminal device
  • the processing module is also used to perform side link positioning measurements through the side link.
  • an embodiment of the present disclosure provides a communication device, which includes a processor.
  • the processor calls a computer program in a memory, the method described in the first aspect is executed.
  • an embodiment of the present disclosure provides a communication device, which includes a processor.
  • the processor calls a computer program in a memory, the method described in the second aspect is executed.
  • an embodiment of the present disclosure provides a communication device, which includes a processor and a memory, in which a computer program is stored; the processor executes the computer program stored in the memory so that the communication device executes the method described in the first aspect above.
  • an embodiment of the present disclosure provides a communication device, which includes a processor and a memory, in which a computer program is stored; the processor executes the computer program stored in the memory so that the communication device executes the method described in the second aspect above.
  • an embodiment of the present disclosure provides a communication device, which includes a processor and an interface circuit, wherein the interface circuit is used to receive code instructions and transmit them to the processor, and the processor is used to run the code instructions to enable the device to execute the method described in the first aspect above.
  • an embodiment of the present disclosure provides a communication device, which includes a processor and an interface circuit, wherein the interface circuit is used to receive code instructions and transmit them to the processor, and the processor is used to run the code instructions to enable the device to execute the method described in the second aspect above.
  • an embodiment of the present disclosure provides a side link positioning system, the system comprising the communication device described in the third aspect and the communication device described in the fourth aspect, or the system comprising the communication device described in the fifth aspect and the communication device described in the sixth aspect, or the system comprising the communication device described in the seventh aspect and the communication device described in the eighth aspect, or the system comprising the communication device described in the ninth aspect and the communication device described in the tenth aspect.
  • an embodiment of the present invention provides a computer-readable storage medium for storing instructions for the above-mentioned terminal device, and when the instructions are executed, the terminal device executes the method described in the first aspect.
  • an embodiment of the present invention provides a readable storage medium for storing instructions used by the above-mentioned network device, and when the instructions are executed, the network device executes the method described in the above-mentioned second aspect.
  • the present disclosure further provides a computer program product comprising a computer program, which, when executed on a computer, enables the computer to execute the method described in the first aspect above.
  • the present disclosure further provides a computer program product comprising a computer program, which, when executed on a computer, enables the computer to execute the method described in the second aspect above.
  • the present disclosure provides a chip system, which includes at least one processor and an interface, and is used to support a terminal device to implement the functions involved in the first aspect, for example, determining or processing at least one of the data and information involved in the above method.
  • the chip system also includes a memory, and the memory is used to store computer programs and data necessary for the terminal device.
  • the chip system can be composed of a chip, or it can include a chip and other discrete devices.
  • the present disclosure provides a chip system, which includes at least one processor and an interface, and is used to support a network device to implement the functions involved in the second aspect, for example, determining or processing at least one of the data and information involved in the above method.
  • the chip system also includes a memory, and the memory is used to store computer programs and data necessary for the network device.
  • the chip system can be composed of a chip, or it can include a chip and other discrete devices.
  • the present disclosure provides a computer program, which, when executed on a computer, enables the computer to execute the method described in the first aspect.
  • the present disclosure provides a computer program which, when executed on a computer, enables the computer to execute the method described in the second aspect.
  • FIG1 is a schematic diagram of the architecture of a communication system provided by an embodiment of the present disclosure.
  • FIG2 is a schematic diagram of a flow chart of a sidelink positioning method provided by an embodiment of the present disclosure
  • FIG3 is a schematic flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG4 is a schematic diagram of a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG5 is a schematic flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG. 6 is a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG7 is a schematic flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG8 is a schematic flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG9 is an interactive schematic diagram of a sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG10 is an interactive schematic diagram of another sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG11 is an interactive schematic diagram of another sidelink positioning method provided by an embodiment of the present disclosure.
  • FIG12 is a schematic diagram of the structure of a communication device provided in an embodiment of the present disclosure.
  • FIG13 is a schematic diagram of the structure of another communication device provided in an embodiment of the present disclosure.
  • FIG. 14 is a schematic diagram of the structure of a chip provided in an embodiment of the present disclosure.
  • Located UE is a terminal device that can execute Uu interface-based positioning procedures and/or SL positioning.
  • the positioned terminal device can assist the terminal device that needs to be located to perform sidelink measurements.
  • the target UE is the terminal device whose position needs to be determined, that is, it needs to be located through sidelink positioning.
  • Sidelink positioning service also known as sidelink positioning service or ranging service, refers to determining the distance between two UEs and/or the direction from one UE to another UE through a direct communication connection.
  • the token in the present disclosure is at least used to characterize the role of the terminal device in the sidelink positioning service.
  • the token of the positioning terminal device can at least characterize the role of the terminal device in the sidelink positioning service as a positioning terminal device
  • the token of the target terminal device can at least characterize the role of the terminal device in the sidelink positioning service as a terminal device that needs to be positioned.
  • FIG. 1 is a schematic diagram of the architecture of a communication system provided by an embodiment of the present disclosure.
  • the communication system may include, but is not limited to, a network device and a terminal device.
  • the number and form of devices shown in FIG. 1 are only used for example and do not constitute a limitation on the embodiment of the present disclosure. In actual applications, two or more network devices and two or more terminal devices may be included.
  • the communication system shown in FIG. 1 includes, for example, a network device 11, a positioning terminal device 12, and a target terminal device 13.
  • LTE long term evolution
  • 5G fifth generation
  • NR 5G new radio
  • the network device in the embodiments of the present disclosure is an entity on the network side for transmitting or receiving signals.
  • eNB evolved NodeB
  • TRP transmission point
  • gNB next generation NodeB
  • WiFi wireless fidelity
  • the embodiments of the present disclosure do not limit the specific technology and specific device form adopted by the network device.
  • the network device provided in the embodiments of the present disclosure may be composed of a central unit (CU) and a distributed unit (DU), wherein the CU may also be referred to as a control unit.
  • CU central unit
  • DU distributed unit
  • the CU-DU structure may be used to split the protocol layer of a network device, such as a base station, and the functions of some protocol layers are placed in the CU for centralized control, and the functions of the remaining part or all of the protocol layers are distributed in the DU, and the DU is centrally controlled by the CU.
  • a network device such as a base station
  • the terminal device 12 or 13 in the disclosed embodiment is an entity for receiving or transmitting signals on the user side, such as a mobile phone.
  • the terminal device may also be referred to as a terminal device (terminal), a user equipment (UE), a mobile station (MS), a mobile terminal device (MT), etc.
  • the terminal device may be a car with communication function, a smart car, a mobile phone (mobile phone), a wearable device, a tablet computer (Pad), a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device in industrial control (industrial control), a wireless terminal device in self-driving, a wireless terminal device in remote medical surgery, a wireless terminal device in smart grid (smart grid), a wireless terminal device in transportation safety (transportation safety), a wireless terminal device in a smart city (smart city), a wireless terminal device in a smart home (smart home), etc.
  • the embodiments of the present disclosure do not limit the specific technology and specific device form adopted by the terminal device.
  • the communication system described in the embodiment of the present disclosure is for the purpose of more clearly illustrating the technical solution of the embodiment of the present disclosure, and does not constitute a limitation on the technical solution provided by the embodiment of the present disclosure.
  • a person skilled in the art can know that with the evolution of the system architecture and the emergence of new business scenarios, the technical solution provided by the embodiment of the present disclosure is also applicable to similar technical problems.
  • the target terminal device 12 can implement the method shown in any embodiment of Figures 2 to 6 of the present disclosure.
  • the positioning terminal device 13 can implement the method described in Figures 7 to 8 of the present disclosure.
  • the communication system described in the embodiment of the present disclosure is for the purpose of more clearly illustrating the technical solution of the embodiment of the present disclosure, and does not constitute a limitation on the technical solution provided by the embodiment of the present disclosure.
  • a person of ordinary skill in the art can know that with the evolution of the system architecture and the emergence of new business scenarios, the technical solution provided by the embodiment of the present disclosure is also applicable to similar technical problems.
  • a side-link positioning method is proposed. Before starting the side-link positioning service, the target terminal device first checks the authorization of the positioning terminal device, and starts the side-link positioning service after the authorization is passed, thereby protecting the privacy of the positioning terminal device during the side-link positioning process and improving the security of the side-link positioning service.
  • Figure 2 is a schematic diagram of a flow chart of a sidelink positioning method provided by an embodiment of the present disclosure.
  • the method provided by this embodiment can be executed by a first terminal device. As shown in Figure 2, the method can include but is not limited to the following steps:
  • Step 201 Receive a first token sent by a second terminal device.
  • the first token is used to characterize the role of the second terminal device (such as a positioning terminal device) in the sidelink positioning service, and the role of the second terminal device in the sidelink positioning service is used by the first terminal device (such as a target terminal device) to determine whether to perform sidelink positioning service with the second terminal device.
  • the second terminal device such as a positioning terminal device
  • the first terminal device such as a target terminal device
  • the first token is a token used to characterize the role (positioning terminal device) of the second terminal device in the sidelink positioning service process. That is, the first token can characterize that the second terminal device can use the sidelink positioning service and its role in the service is a positioning terminal device.
  • the token can be provided by the second network element.
  • the second network element can be any one of the following: gateway mobile location center (GMLC), direct discovery name management function (DDNMF) network element, proximity services key management function (ProSe PKMF) network element, and ranging application server (ranging App server) network element.
  • GMLC gateway mobile location center
  • DDNMF direct discovery name management function
  • ProSe PKMF proximity services key management function
  • ranging App server ranging App server
  • the first terminal device may also receive a first ranging service code (RSC) sent by the second terminal device.
  • the first RSC is used to characterize the version or type of ranging/sidelink positioning service currently supported by the second terminal device.
  • the first RSC may be pre-configured in the second terminal device, or requested by the second terminal device to the second network element and provided by the second network element.
  • the second terminal device can request the first RSC and the first token from the second network element. After receiving the first RSC and the first token returned by the second network element, the second terminal device can send the first RSC and the first token to the first terminal device for verification when performing side link positioning.
  • Step 202 When it is determined according to the first token that the sidelink positioning service is to be performed with the second terminal device, a sidelink is established with the second terminal device.
  • the target terminal device after receiving the first token sent by the second terminal device, can verify the role information of the second terminal device represented by the first token in the sidelink positioning service, such as verifying whether the second terminal device is a positioning terminal device in the sidelink positioning service, and whether the role of the second terminal device at the current moment is still a positioning terminal device, etc. Then, based on the role information of the second terminal device represented by the first token, determine whether to perform the sidelink positioning service with the second terminal device. For example, if the second terminal device represented by the first token is not a positioning terminal device, then it can be determined that the sidelink positioning service cannot be performed with the second terminal device.
  • the first terminal device may also verify the accuracy of the first RSC to determine whether the sidelink positioning service supported by the second terminal device is the same as the sidelink positioning service supported by the first terminal device.
  • Step 203 perform sidelink positioning measurements.
  • Step 204 Send the measurement result to the first network element.
  • the first terminal device can establish a side link between the two and perform side link positioning measurements based on the side link.
  • the side link may be a PC5 link or a SR5 link, or may be other links, which is not limited in the present disclosure.
  • the measurement result may include a relative distance and/or a relative angle between the second terminal device and the first terminal device, etc., which is not limited in the present disclosure.
  • the first network element may be any one of the following: a positioning management function (LMF) network element, an access and mobility management function (AMF) network element, and a gateway mobile location center (GMLC).
  • LMF positioning management function
  • AMF access and mobility management function
  • GMLC gateway mobile location center
  • the target terminal device after the target terminal device determines the side link measurement result between it and the positioning terminal device, it can send the measurement result to the relevant core network node, so that the core network node can process the terminal device's service based on the location information of the target terminal device.
  • the first terminal device after receiving the first token sent by the second terminal device, the first terminal device can first determine whether to perform the sidelink positioning service with the second terminal device according to the first token, and after determining that it is possible, perform the sidelink positioning measurement with the second terminal device, and send the measurement result to the first network element. Therefore, before performing the sidelink positioning, the target terminal device first performs authorization verification on the role of the positioning terminal device, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • Figure 3 is a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • the method provided by this embodiment can be executed by a first terminal device. As shown in Figure 3, the method can include but is not limited to the following steps:
  • Step 301 Send a third request to a second network element, where the third request is used to request information for establishing a side link.
  • the second network element can be any one of the following: GMLC, direct discovery name management function (DDNMF) network element, proximity services key management function (ProSe PKMF) network element, and ranging application server (ranging App server) network element.
  • DDNMF direct discovery name management function
  • ProSe PKMF proximity services key management function
  • ranging App server ranging App server
  • the first terminal device may send the second request to the second network element when accessing the network; or, the first terminal device may send the second request to the second network element when necessary.
  • the first terminal device may periodically send the second request to the second network element; or, the first terminal device may send the second request to the second network element before each sidelink positioning to request the latest information that can be used to establish the sidelink. This disclosure does not limit this.
  • Step 302 Receive information sent by the second network element for establishing a side link, wherein the information for establishing the side link includes at least one of the following: security parameters for a discovery phase, a second token, and a validity period key corresponding to the second token.
  • the security parameter used in the discovery phase is a parameter used to protect the security of the terminal device in the discovery phase.
  • the security parameter may be a key, or other parameters including a key, which is not limited in the present disclosure.
  • the security parameters used in the discovery phase may be obtained by the first terminal device after requesting the second network element; or, they may be actively configured by the second network element after the first terminal device accesses the network, which is not limited in the present disclosure.
  • the second token can represent that the first terminal device can use the sidelink positioning service and its role in the service is a target terminal device.
  • the validity period corresponding to the second token is used to represent the period during which the second token can be used.
  • As the terminal device moves, its role in the sidelink positioning service may change.
  • terminal device A can execute the Uu interface-based positioning program and provide SL positioning services for other terminal devices during time period T1, so it can serve as a positioning terminal device in the sidelink positioning service; while in time period T2, since it cannot execute the Uu interface-based positioning program, it cannot serve as a positioning terminal device during time period T2. Therefore, for terminal device A, the corresponding second token is different in time periods T1 and T2.
  • the second token in order to prevent the token corresponding to the terminal device from being maliciously tampered with, can be generated by the second network element after encrypting information such as the role of the first terminal device.
  • the key contained in the information for establishing the side link is the encryption key used by the second network element when generating the second token, or is a decryption key used in association with the encryption key.
  • the information sent by the second network element for establishing the sidelink may not include the validity period of the second token, but the validity period of the second token and other information may be integrated into the second token. That is, the second network element may encrypt the validity period of the second token and the role of the first terminal device and other information to generate the second token. After that, after receiving the information sent by the second network element for establishing the sidelink, the first terminal device decrypts the second token with the key to determine the validity period corresponding to the second token.
  • the information used to establish the side link may also include a second RSC.
  • Step 303 Receive a first token sent by the second terminal device.
  • step 303 can refer to the detailed description of any embodiment of the present disclosure, and will not be repeated here.
  • Step 304 Use the key to verify whether the first token is within the validity period and whether the terminal device type corresponding to the first token is a positioning terminal device.
  • the first terminal device may also compare the first RSC with the second RSC.
  • the second RSC in the first terminal device should be the same as the first RSC in the second terminal device. Therefore, after determining the first RSC sent by the second terminal device, the first terminal device can compare the two.
  • the first RSC is the same as the second RSC, it means that the distance measurement service currently used by the second terminal device is the same as the distance measurement service currently used by the first terminal device, so that the first terminal device can verify the first token again. Otherwise, the first terminal device can determine that it is currently unable to perform the distance measurement service with the second terminal device.
  • the first terminal device may use the key to decrypt the first token to obtain the validity period corresponding to the first token and the type of the second terminal device. And according to the validity period corresponding to the first token, determine whether the first token is within the validity period. If the first token is within the validity period and the second terminal device is a positioning terminal device, then it can be considered that the verification is passed, otherwise it can be confirmed that the verification is not passed.
  • Step 305 In response to the verification being successful, a sidelink establishment request is sent to the second terminal device.
  • the first terminal device verifies the first RSC and the first token, it can be determined that side link positioning measurement can be performed with the second terminal device, so that the first terminal device can initiate the side link establishment process, that is, send a side link establishment request to the second terminal device.
  • the side link establishment request may also include a second token so that the second terminal device can verify the second token, thereby further ensuring the reliability and security of the side link.
  • Step 306 Receive a response message returned by the second terminal device, wherein the response message includes the first token.
  • the second terminal device in order to avoid the first token corresponding to the second terminal device becoming invalid after the discovery process, can also return the first token again in the response message after receiving the side link establishment request sent by the first terminal device, so that the first terminal device can verify the first token again.
  • Step 307 Verify the first token using the key.
  • Step 308 In response to the first token being within the validity period and the second terminal device being a positioning terminal device, a side link is established with the second terminal device.
  • the first token is verified using the key, including decrypting the first token using the key to determine whether the information contained in the first token is complete and whether various information of the second terminal device can be obtained by decrypting the first token. For example, by decrypting the first token, the corresponding validity period and the role information of the second terminal device in the sidelink positioning process can be determined.
  • the first token is within the validity period and the second terminal device is a positioning terminal device, then a side link with the second terminal device can be established.
  • the current side link positioning process can be terminated, or the first terminal device can indicate the determined result to the first network element, etc.
  • the present disclosure does not limit this.
  • Step 309 perform sidelink positioning measurements.
  • Step 310 Send the measurement result to the first network element.
  • the first terminal device first sends a second request to the second network element to request a second token and a key, etc., and then after receiving the first token sent by the second terminal device, the first token can be verified. If the verification is successful, a sidelink establishment request is sent to the second terminal device, and the corresponding second token is sent to the second terminal device to authenticate the identity with the second terminal device again. After the identity authentication is successful, a sidelink is established with the second terminal device, and sidelink measurement is performed. After the measurement result is obtained, the measurement result is sent to the first network element. Therefore, before starting the sidelink positioning and before establishing the sidelink, each other's roles are authorized and verified through the interactive token, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • Figure 4 is a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • the method provided by this embodiment can be executed by a first terminal device. As shown in Figure 4, the method can include but is not limited to the following steps:
  • Step 401 Send a third request to a second network element, where the third request is used to request information for establishing a side link.
  • Step 402 Receive information sent by the second network element for establishing a side link, wherein the information for establishing the side link includes at least one of the following: security parameters for a discovery phase, a second token, and a validity period and a key corresponding to the second token.
  • Step 403 Receive a first request sent by the first network element, where the first request is used to request a sidelink positioning service with the second terminal device.
  • Step 404 Execute a first discovery process according to the identifier of the second terminal device.
  • the first network element after receiving a sidelink positioning service request sent by other network elements, such as a network function (NF) network element or an application function (AF) network element, the first network element can send a first request to a target terminal device, i.e., the first terminal device, to request the first terminal device, i.e., the target terminal device, to perform sidelink positioning based on the second terminal device.
  • NF network function
  • AF application function
  • the first request may be a ranging request or a sidelink positioning request, which is not limited in the present disclosure.
  • the first discovery process may be a discovery process based on discovery model B.
  • the first terminal device may run discovery model B to send a discovery message to the second terminal device to instruct the second terminal device to provide a sidelink service for it.
  • the first terminal device after receiving the first request sent by the first network element, when the first terminal device determines that it needs to perform sidelink measurement with the second terminal device, it can first determine whether the corresponding second token is still within the validity period. If the second token has expired, that is, the first terminal device can no longer be used as a target terminal device, then the sidelink positioning service process can be terminated, or an indication of the expiration of the second token can be returned to the first network element.
  • the discovery model B can be run.
  • Step 405 Receive a first message returned by the second terminal device, where the first message includes a first token.
  • the first message may be a discovery response message. That is, after the second terminal device intercepts the discovery message sent by the first terminal device and authorizes the identity authentication of the first terminal device, it may return a discovery response message to the first terminal device, so as to send its corresponding first RSC and first token to the first terminal device through the discovery response message.
  • the first terminal device may verify the first message using the security parameters used in the discovery phase; in response to successful verification, the first token included in the first message may be acquired.
  • the security parameter used in the discovery phase is a parameter used to protect the security of the terminal device in the discovery phase.
  • the security parameter may be a key, or other parameters including a key, which is not limited in the present disclosure.
  • the first message may also include a first RSC.
  • Step 406 Determine whether to perform a sidelink positioning service with the second terminal device based on the first token.
  • the process can be terminated.
  • Step 407 When it is determined to perform the sidelink positioning service with the second terminal device, a sidelink establishment request is sent to the second terminal device.
  • Step 408 Receive a response message returned by the second terminal device, wherein the response message includes the first token.
  • Step 409 Verify the first token using the key.
  • Step 410 In response to the first token being within the validity period and the second terminal device being a positioning terminal device, a side link is established with the second terminal device.
  • Step 411 perform sidelink positioning measurements.
  • Step 412 Send the measurement result to the first network element.
  • the first terminal device first sends a second request to the second network element to request a second token and a key, etc., and then after receiving the first request sent by the first network element, the first discovery process is performed based on the identifier of the second terminal device in the first request, and after receiving the first token sent by the second terminal device, the first token can be verified. If the verification is successful, a sidelink establishment request is sent to the second terminal device, and its corresponding second token is sent to the second terminal device to perform identity authentication with the second terminal device again. After the identity authentication is successful, a sidelink is established with the second terminal device to perform sidelink measurement, and the measurement result is sent to the first network element after the measurement result is obtained. Therefore, before starting the sidelink positioning and before establishing the sidelink, token interaction is performed to authenticate each other's roles, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • Figure 5 is a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • the method provided by this embodiment can be executed by a first terminal device. As shown in Figure 5, the method can include but is not limited to the following steps:
  • Step 501 Send a third request to a second network element, where the third request is used to request information for establishing a side link.
  • Step 502 Receive information sent by the second network element for establishing a side link, wherein the information for establishing the side link includes at least one of the following: security parameters for a discovery phase, a second token, and a validity period and a key corresponding to the second token.
  • Step 503 receiving a second request sent by the first network element, where the second request is used to request discovery and positioning of a terminal device.
  • Step 504 Execute a second discovery process according to the second request, where the second discovery process is used to monitor neighboring terminal devices.
  • Step 505 intercept a second message sent by a second terminal device, where the second message includes a first token.
  • the first network element after receiving a sidelink positioning service request sent by other network elements, such as a network function (NF) network element or an application function (AF) network element, the first network element can send a first request to a target terminal device, i.e., the first terminal device, to request the first terminal device, i.e., the target terminal device, to perform sidelink positioning based on the second terminal device.
  • NF network function
  • AF application function
  • the second request may be a positioning terminal device discovery request or a side link positioning capability negotiation request, which is not limited in the present disclosure.
  • the second discovery process may be a discovery process based on the discovery model A.
  • the first terminal device may run the discovery model A to listen to the second message, that is, the discovery message, sent by the neighboring terminal device.
  • the first terminal device after receiving the second request sent by the first network element, when the first terminal device determines that it needs to perform sidelink measurement with the second terminal device, it can first determine whether the corresponding second token is still within the validity period. If the second token has expired, that is, the first terminal device can no longer be used as a target terminal device, then the sidelink positioning service process can be terminated, or an indication of the invalidity of the second token can be returned to the first network element.
  • the discovery model A can be executed.
  • the first terminal device may verify the second message using the security parameters used in the discovery phase; in response to successful verification, the first RSC and the first token included in the second message may be obtained.
  • Step 506 Determine whether to perform a sidelink positioning service with the second terminal device based on the first token.
  • Step 507 When it is determined to perform the sidelink positioning service with the second terminal device, a sidelink establishment request is sent to the second terminal device.
  • Step 508 Receive a response message returned by the second terminal device, wherein the response message includes the first token.
  • Step 509 Verify the first token using the key.
  • Step 510 In response to the first token being within the validity period and the second terminal device being a positioning terminal device, a side link is established with the second terminal device.
  • Step 511 perform sidelink positioning measurements with the second terminal device.
  • Step 512 Send the measurement result to the first network element.
  • the first terminal device first sends a second request to the second network element to request a second token and a key, etc., and then after receiving the first request sent by the first network element, the second discovery process is performed according to the identifier of the second terminal device in the first request, and after receiving the first token sent by the second terminal device, the first token and the first RSC are verified. If the verification is successful, a sidelink establishment request is sent to the second terminal device, and its corresponding second token is sent to the second terminal device to perform identity authentication with the second terminal device again. After the identity authentication is successful, a sidelink is established with the second terminal device to perform sidelink measurement, and the measurement result is sent to the first network element after the measurement result is obtained. Therefore, before starting the sidelink positioning and before establishing the sidelink, token interaction is performed to authenticate each other's roles, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • Figure 6 is a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • the method provided by this embodiment can be executed by a first terminal device. As shown in Figure 6, the method can include but is not limited to the following steps:
  • Step 601 Send a third request to a second network element, where the third request is used to request information for establishing a side link.
  • Step 602 Receive information sent by the second network element for establishing a side link, wherein the information for establishing the side link includes at least one of the following: security parameters for a discovery phase, a second token, and a validity period and a key corresponding to the second token.
  • Step 603 in response to the first terminal device having a positioning requirement, executing the first discovery process or the second discovery process, obtaining a third message sent by the second terminal device, the third message including the first RSC and the first token.
  • the third message may be a discovery response message; if the first terminal device executes the second discovery process, the third message may be a discovery message.
  • the specific implementation method of using security parameters to verify the third message to obtain the first RSC and the first token can refer to the description of the process of parsing the first message or the second message in any embodiment of the present disclosure, and will not be repeated here.
  • Step 604 comparing the first RSC with the second RSC.
  • Step 605 when the first RSC is the same as the second RSC, use the key to verify whether the first token is within the validity period and whether the terminal device type corresponding to the first token is a positioning terminal device.
  • Step 606 In response to the verification being successful, a sidelink establishment request is sent to the second terminal device.
  • Step 607 Receive a response message returned by the second terminal device, wherein the response message includes the first token.
  • Step 608 Verify the first token using the key.
  • Step 609 In response to the first token being within the validity period and the second terminal device being a positioning terminal device, a side link is established with the second terminal device.
  • Step 610 perform sidelink positioning measurements.
  • Step 611 Send the measurement result to the first network element.
  • the first terminal device first sends a second request to the second network element to request a second token and a key, etc., and then, when there is a positioning demand, executes the first discovery process or the second discovery process to obtain the first token and the first RSC of the second terminal device, and then verifies the first token and the first RSC. If the verification is successful, a sidelink establishment request is sent to the second terminal device, and its corresponding second token is sent to the second terminal device to perform identity authentication with the second terminal device again. After the identity authentication is successful, a sidelink is established with the second terminal device to perform sidelink measurement, and the measurement result is sent to the first network element after the measurement result is obtained.
  • the terminal device before starting the sidelink positioning and before establishing the sidelink, the terminal device first performs token interaction to authenticate each other's roles, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • Figure 7 is a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure.
  • the method provided by this embodiment can be executed by a second terminal device. As shown in Figure 7, the method can include but is not limited to the following steps:
  • Step 701 Send a first token to a first terminal device.
  • the first token is used to characterize the role of the second terminal device in the sidelink positioning service, and the role of the second terminal device in the sidelink positioning service is used by the first terminal device to determine whether to perform the sidelink positioning service with the second terminal device.
  • the second terminal device may also send the first RSC to the first terminal device.
  • the first terminal device is a target terminal device in the sidelink positioning service.
  • the specific meanings of the first RSC and the first token can refer to the detailed description of any embodiment of the present disclosure, which will not be repeated here.
  • the second terminal device can execute the second discovery process, that is, run the discovery model A, to send the first token to the first terminal device in the form of a broadcast message.
  • the second terminal device may also send the first token to the first terminal device when it overhears a message broadcast by the first terminal device based on the first discovery process (ie, discovery model B), which is not limited in the present disclosure.
  • discovery model B the first discovery process
  • the second terminal device can determine whether it meets the requirements of the first terminal device based on its own capability information, and send the first token to the first terminal device if it determines that its capabilities meet the requirements of the first terminal device.
  • the second terminal device sends the first token to the first terminal device (eg, the target terminal device) so that the target terminal device can verify and authorize the role of the second terminal device based on the first token before performing sidelink positioning.
  • the first terminal device eg, the target terminal device
  • Step 702 Establish a side link with the first terminal device.
  • the side link may be a PC5 link, or an SR5 link, or may be other side link, which is not limited in the present disclosure.
  • Step 703 perform sidelink positioning measurements.
  • the second terminal device first sends the first token to the first terminal device so that the first terminal device can perform authorization verification on the role of the second terminal device, and then establishes a side link with the first terminal device and performs side link positioning measurement. Therefore, before performing side link positioning, the first token is first sent to the target terminal device for role authorization verification, thereby ensuring the privacy security of the terminal device during the side link positioning process and improving the security of the side link positioning service.
  • Figure 8 is a flow chart of another sidelink positioning method provided by an embodiment of the present disclosure, and the method is performed by a second terminal device. As shown in Figure 8, the method may include but is not limited to the following steps:
  • Step 801 Send a request to a second network element, wherein the request is used to request information for establishing a side link.
  • Step 802 Receive information sent by the second network element for establishing a side link, wherein the information for establishing the side link includes security parameters for a discovery phase, a first token, and a validity period and a key corresponding to the first token.
  • the second terminal device may send a request to the second network element when accessing the network or when necessary, so as to request the second network element for information required for establishing the sidelink.
  • the second terminal device may periodically send a request to the second network element; or the second terminal device may also send a request to the second network element before performing sidelink positioning each time, to request the latest information that can be used to establish the sidelink.
  • the second network element in this embodiment includes any one of the following items: a gateway mobile location center GMLC, a direct discovery name management function DDNMF network element, a proximity service ProSe key management function PKMF network element, and a ranging application server ranging App server network element.
  • Step 803 Execute a second discovery process and send a first token to the first terminal device.
  • the second terminal device may first determine whether the first token is within the validity period. If the first token has expired, the sidelink positioning process may be terminated. If the first token is still within the validity period, it means that the role of the second terminal device in the sidelink positioning service is still a positioning terminal device, so the second discovery process may be executed.
  • the second terminal device may also encrypt the first token using the security parameters used in the discovery phase, that is, encrypt the discovery message using the security parameters used in the discovery phase, wherein the discovery message includes the first token.
  • the first terminal device may parse the discovery message using the security parameters used in the discovery phase to obtain the first token.
  • the discovery message may also include the first RSC.
  • Step 804 Receive a sidelink establishment request sent by the first terminal device, wherein the sidelink establishment request includes a second token.
  • the first terminal device can verify the first RSC and the first token. After the verification is passed, the first terminal device can start to establish a side link with the second terminal device, that is, send a side link establishment request to the second terminal device.
  • Step 805 Verify the second token using the key.
  • the second terminal device verifies the second token using the key, including decrypting the second token using the key to determine whether the information contained in the second token is complete and whether various information of the first terminal device can be obtained by decrypting the second token. For example, by decrypting the second token, the validity period corresponding to the second token and the role information of the first terminal device in the sidelink positioning process can be determined.
  • a side link with the first terminal device can be established.
  • the first terminal device is not the target terminal device, for example, the first terminal device is also a positioning terminal device, then the current sidelink positioning process can be terminated, or a verification failure message can be sent to the first terminal device, and the first terminal device will indicate the determined result to the first network element, etc.
  • the present disclosure does not limit this.
  • Step 806 In response to the second token being within the validity period and the first terminal device being the target terminal device, a response message is returned to the first terminal device, wherein the response message includes the first token.
  • the second terminal device in order to avoid the first token corresponding to the second terminal device becoming invalid after the discovery process, when the second terminal device receives the side link establishment request sent by the first terminal device and determines, based on the second token, that the first terminal is the target terminal device and the second token is still valid, it can also return the first token again in the response message, so that the first terminal device can verify the first token again.
  • Step 807 Establish a side link with the first terminal device.
  • Step 808 perform sidelink positioning measurements.
  • the second terminal device first sends a request to the second network element to request the information required for establishing the side link, and then can send the first token to the first terminal device by executing the discovery process, so that the first terminal device can authenticate the identity of the second terminal device, and then after receiving the side link establishment request sent by the first terminal device, it interacts and verifies the token with the first terminal device, and after the verification is passed, it establishes a side link with the first terminal device and performs side link positioning measurement. Therefore, before performing side link positioning and establishing the side link, role authorization verification is performed through the interactive token, thereby ensuring the privacy security of the terminal device during the side link positioning process and improving the security of the side link positioning service.
  • Figure 9 is an interactive schematic diagram of a sidelink positioning method provided by an embodiment of the present disclosure. As shown in Figure 9, the method may include but is not limited to the following steps:
  • Step 900 the target terminal device and the positioning terminal device request from the second network element to obtain security parameters, tokens and keys used in the discovery phase.
  • Step 901 AMF receives a sidelink positioning service request.
  • the service request includes the identifier of the target terminal device.
  • AMF can receive ranging/sidelink positioning service requests from any NF or AF. After receiving the sidelink positioning service request, AMF can select an LMF according to the identification of the target terminal device.
  • Step 902 the AMF sends a sidelink positioning service request to the selected LMF, which includes the identifier of the target terminal device.
  • Step 903 LMF sends a first request including at least one positioning terminal device identifier to the target terminal device to trigger the target terminal device to perform a sidelink positioning process.
  • Step 904 The target terminal device executes a second discovery process to obtain a first RSC and a first token of the positioning terminal device.
  • Step 905 The target terminal device verifies the first RSC and the first token.
  • Step 906 In response to the verification being successful, a side link is established with the positioning terminal device.
  • the positioning terminal device and the target terminal device may exchange tokens with each other during the process of establishing the side link to perform verification and authorization again.
  • Step 907 perform sidelink positioning measurements.
  • Step 908 The target terminal device sends the sidelink measurement result to the LMF.
  • Step 909 LMF sends the measurement result to AMF.
  • Step 910 AMF reports the location of the target terminal device.
  • the target terminal device and the positioning terminal device before performing sidelink positioning, the target terminal device and the positioning terminal device first perform identity verification and authorization through an interactive token, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • Figure 10 is an interactive schematic diagram of another sidelink positioning method provided by an embodiment of the present disclosure. As shown in Figure 10, the method may include but is not limited to the following steps:
  • Step 1000 the target terminal device and the positioning terminal device request from the second network element to obtain security parameters, tokens and keys used in the discovery phase.
  • Step 1001 AMF receives a sidelink positioning service request.
  • the service request includes the identifier of the target terminal device.
  • AMF can receive ranging/sidelink positioning service requests from any NF or AF. After receiving the sidelink positioning service request, AMF can select an LMF according to the identification of the target terminal device.
  • Step 1002 AMF sends a sidelink positioning service request to the selected LMF.
  • Step 1003 LMF sends a positioning terminal device discovery request to the target terminal device.
  • the LMF may also send a sidelink positioning capability negotiation request to the target terminal device.
  • Step 1004 The target terminal device performs a first discovery process to obtain a first RSC and a first token of the positioning terminal device.
  • Step 1005 In response to successful verification of the first RSC and the first token, the target terminal device returns a response message to the LMF, wherein the response message includes an identifier of the positioning terminal device.
  • the target terminal device may also send the sidelink positioning capability of itself and/or the positioning terminal device to LMF.
  • Step 1006 LMF sends a sidelink positioning request to the target terminal device.
  • Step 1007 The target terminal device establishes a sidelink with the positioning terminal device to perform sidelink positioning measurements.
  • the target terminal device and the positioning terminal device may also perform token interaction and authorization verification during the process of establishing the side link.
  • Step 1008 The target terminal device sends the side link measurement result to the LMF.
  • Step 1009 LMF sends the measurement result to AMF.
  • Step 1010 AMF reports the location of the target terminal device.
  • the target terminal device and the positioning terminal device before performing sidelink positioning, the target terminal device and the positioning terminal device first perform identity verification and authorization through an interactive token, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • Figure 11 is an interactive schematic diagram of another sidelink positioning method provided by an embodiment of the present disclosure. As shown in Figure 11, the method may include but is not limited to the following steps:
  • Step 1100 the target terminal device and the positioning terminal device request from the second network element to obtain security parameters, tokens and keys used in the discovery phase.
  • Step 1101 The target terminal device has a positioning requirement and executes a first discovery process or a second discovery process to obtain a first RSC and a first token of the positioning terminal device.
  • Step 1102 In response to successful verification of the first RSC and the first token, the target terminal device sends a MO-LR request to the LMF, including an identifier of the positioning terminal device.
  • the Mobile Originated Location Request represents the positioning request, which is initiated by the target terminal device.
  • Step 1103 LMF starts positioning of the positioning terminal device.
  • Step 1104 LMF sends a sidelink positioning request to the target terminal device.
  • Step 1105 The target terminal device establishes a sidelink with the positioning terminal device to perform sidelink positioning measurements.
  • the target terminal device and the positioning terminal device may also perform token interaction and authorization verification during the process of establishing the side link.
  • Step 1106 The target terminal device sends the side link measurement result to the LMF.
  • Step 1107 LMF will determine the location of the target terminal device based on the side link measurement results and the location of the positioning terminal device.
  • Step 1108 LMF sends the location of the target terminal device to the target terminal device.
  • the target terminal device and the positioning terminal device before performing sidelink positioning, the target terminal device and the positioning terminal device first perform identity verification and authorization through an interactive token, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • the communication device 1200 shown in Figure 12 may include a transceiver module 1201 and a processing module 1202.
  • the transceiver module 1201 may include a sending module and/or a receiving module, the sending module is used to implement a sending function, the receiving module is used to implement a receiving function, and the transceiver module 1201 may implement a sending function and/or a receiving function.
  • the communication device 1200 can be a terminal device, or can be a device in the terminal device, or can be a device that can be used in conjunction with the terminal device.
  • the communication device 1200 is at the first terminal device side, wherein:
  • the transceiver module 1201 is configured to receive a first token sent by a second terminal device, where the first token is used to characterize a role of the second terminal device in the sidelink positioning service;
  • the processing module 1202 is configured to establish a side link with the second terminal device when it is determined according to the first token to perform the side link positioning service with the second terminal device;
  • the processing module 1202 is further configured to perform sidelink positioning measurements
  • the transceiver module 1201 is further configured to send the measurement result to the first network element.
  • the transceiver module 1201 is further used for:
  • the transceiver module 1201 is further used to: receive a second request sent by the first network element, where the second request is used to request discovery of a positioning terminal device;
  • the processing module 1202 is further configured to execute a second discovery process, wherein the second discovery process is configured to monitor neighboring terminal devices;
  • the processing module 1202 is further configured to intercept a second message sent by the second terminal device, wherein the second message includes the first token.
  • the above-mentioned transceiver module 1201 is also used to: in response to the first terminal device having a positioning requirement, execute a first discovery process or a second discovery process, and obtain a third message sent by the second terminal device, wherein the third message includes the first token.
  • processing module 1202 is further configured to:
  • a first token included in the first message, the second message or the third message is obtained.
  • the upper transceiver module 1201 is further used for:
  • the information for establishing the side link includes at least one of the following:
  • Security parameters used in the discovery phase a second token, and the validity period and key corresponding to the second token.
  • processing module 1202 is further used to:
  • the terminal device type corresponding to the first token is a positioning terminal device.
  • the transceiver module 1201 is further used for:
  • the processing module 1202 is further used for:
  • a side link is established with the second terminal device.
  • the first network element is any one of the following: a positioning management function LMF network element, an access and mobility management function network element AMF, and a gateway mobile location center GMLC;
  • the second network element is any one of the following: GMLC, direct discovery name management function DDNMF network element, proximity service ProSe key management function PKMF network element, and ranging application server ranging App server network element.
  • the first terminal device after receiving the first token sent by the second terminal device, the first terminal device can first verify the first token, and after the verification is passed, perform sidelink positioning measurement with the second terminal device, and send the measurement result to the first network element. Therefore, before performing sidelink positioning, the target terminal device first performs authorization verification on its role according to the first token sent by the positioning terminal device, thereby ensuring the privacy security of the terminal device during the sidelink positioning process and improving the security of the sidelink positioning service.
  • the communication device 1200 is at the second terminal device side, wherein:
  • the transceiver module 1201 is used to send a first token to the first terminal device, where the first token is used to characterize the role of the second terminal device in the sidelink positioning service, and the role of the second terminal device in the sidelink positioning service is used by the first terminal device to determine whether to perform the sidelink positioning service with the second terminal device;
  • the processing module 1202 is used to establish a side link with the first terminal device
  • the processing module 1202 is also used to perform sidelink positioning measurements.
  • the transceiver module 1201 is further used for:
  • a message is returned to the first terminal device, wherein the message includes the first token.
  • processing module 1202 is further configured to:
  • the transceiver module 1201 is further used for:
  • a second discovery process is performed to broadcast the first token.
  • processing module 1202 is further configured to encrypt the first token using security parameters used in the discovery phase.
  • the transceiver module 1201 is also used for the transceiver module 1201 .
  • the information for establishing the side link includes at least one of the following:
  • Security parameters used in the discovery phase the first token, and the validity period and key corresponding to the first token.
  • the transceiver module 1201 is further used for:
  • the transceiver module 1201 is further used for:
  • the processing module 1202 is further used for:
  • the second network element is any one of the following: gateway mobile location center GMLC, direct discovery name management function DDNMF network element, proximity service ProSe key management function PKMF network element, and ranging application server ranging App server network element.
  • the second terminal device first sends the first token to the first terminal device so that the first terminal device performs authorization verification on the identity of the second terminal device, and then establishes a side link with the first terminal device and performs side link positioning measurement. Therefore, before performing side link positioning, the first token is first sent to the target terminal device to perform role authorization verification, thereby ensuring the privacy security of the terminal device during the side link positioning process and improving the security of the side link positioning service.
  • the communication device 1300 can be a terminal device, or a chip, a chip system, or a processor that supports the terminal device to implement the above method.
  • the device can be used to implement the method described in the above method embodiment, and the details can be referred to the description in the above method embodiment.
  • the communication device 1300 may include one or more processors 1301.
  • the processor 1301 may be a general-purpose processor or a dedicated processor, etc.
  • it may be a baseband processor or a central processing unit.
  • the baseband processor may be used to process the communication protocol and communication data
  • the central processing unit may be used to control the communication device (such as a base station, a baseband chip, a terminal device, a terminal device chip, a DU or a CU, etc.), execute a computer program, and process the data of the computer program.
  • the communication device 1300 may further include one or more memories 1302, on which a computer program 1304 may be stored, and the processor 1301 executes the computer program 1304 so that the communication device 1300 performs the method described in the above method embodiment.
  • data may also be stored in the memory 1302.
  • the communication device 1300 and the memory 1302 may be provided separately or integrated together.
  • the communication device 1300 may further include a transceiver 1305 and an antenna 1306.
  • the transceiver 1305 may be referred to as a transceiver unit, a transceiver, or a transceiver circuit, etc., for implementing a transceiver function.
  • the transceiver 1205 may include a receiver and a transmitter, the receiver may be referred to as a receiver or a receiving circuit, etc., for implementing a receiving function; the transmitter may be referred to as a transmitter or a transmitting circuit, etc., for implementing a transmitting function.
  • the communication device 1300 may further include one or more interface circuits 1307.
  • the interface circuit 1307 is used to receive code instructions and transmit them to the processor 1301.
  • the processor 1301 runs the code instructions to enable the communication device 1300 to perform the method described in the above method embodiment.
  • the transceiver 1305 in the communication device 1300 may be used to execute the transceiver steps in the above figures, and the processor 1301 may be used to execute the processing steps in the above figures.
  • the processor 1301 may include a transceiver for implementing the receiving and sending functions.
  • the transceiver may be a transceiver circuit, an interface, or an interface circuit.
  • the transceiver circuit, interface, or interface circuit for implementing the receiving and sending functions may be separate or integrated.
  • the above-mentioned transceiver circuit, interface, or interface circuit may be used for reading and writing code/data, or the above-mentioned transceiver circuit, interface, or interface circuit may be used for transmitting or delivering signals.
  • the processor 1301 may store a computer program 1303, which runs on the processor 1301 and enables the communication device 1300 to perform the method described in the above method embodiment.
  • the computer program 1303 may be fixed in the processor 1301, in which case the processor 1301 may be implemented by hardware.
  • the communication device 1300 may include a circuit that can implement the functions of sending or receiving or communicating in the aforementioned method embodiments.
  • the processor and transceiver described in the present disclosure may be implemented in an integrated circuit (IC), an analog IC, a radio frequency integrated circuit RFIC, a mixed signal IC, an application specific integrated circuit (ASIC), a printed circuit board (PCB), an electronic device, etc.
  • the processor and transceiver may also be manufactured using various IC process technologies, such as complementary metal oxide semiconductor (CMOS), N-type metal oxide semiconductor (NMOS), P-type metal oxide semiconductor (positive channel metal oxide semiconductor, PMOS), bipolar junction transistor (BJT), bipolar CMOS (BiCMOS), silicon germanium (SiGe), gallium arsenide (GaAs), etc.
  • CMOS complementary metal oxide semiconductor
  • NMOS N-type metal oxide semiconductor
  • PMOS P-type metal oxide semiconductor
  • BJT bipolar junction transistor
  • BiCMOS bipolar CMOS
  • SiGe silicon germanium
  • GaAs gallium arsenide
  • the communication device described in the above embodiments may be a network device or an intelligent relay, but the scope of the communication device described in the present disclosure is not limited thereto, and the structure of the communication device may not be limited by FIG. 13.
  • the communication device may be an independent device or may be part of a larger device.
  • the communication device may be:
  • the IC set may also include a storage component for storing data and computer programs;
  • ASIC such as modem
  • the communication device can be a chip or a chip system
  • the communication device can be a chip or a chip system
  • the schematic diagram of the chip structure shown in Figure 14 includes a processor 1401 and an interface 1402.
  • the number of processors 1401 can be one or more, and the number of interfaces 1402 can be multiple.
  • the chip further includes a memory 1403, and the memory 1403 is used to store necessary computer programs and data.
  • the present disclosure also provides a readable storage medium having instructions stored thereon, which implement the functions of any of the above method embodiments when executed by a computer.
  • the present disclosure also provides a computer program product, which implements the functions of any of the above method embodiments when executed by a computer.
  • the computer program product includes one or more computer programs.
  • the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
  • the computer program can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer program can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
  • the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center that includes one or more available media integrated.
  • the available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a high-density digital video disc (DVD)), or a semiconductor medium (e.g., a solid state disk (SSD)), etc.
  • a magnetic medium e.g., a floppy disk, a hard disk, a magnetic tape
  • an optical medium e.g., a high-density digital video disc (DVD)
  • DVD high-density digital video disc
  • SSD solid state disk
  • At least one in the present disclosure may also be described as one or more, and a plurality may be two, three, four or more, which is not limited in the present disclosure.
  • the technical features in the technical feature are distinguished by “first”, “second”, “third”, “A”, “B”, “C” and “D”, etc., and there is no order of precedence or size between the technical features described by the "first”, “second”, “third”, “A”, “B”, “C” and “D”.
  • the corresponding relationships shown in the tables in the present disclosure can be configured or predefined.
  • the values of the information in each table are only examples and can be configured as other values, which are not limited by the present disclosure.
  • the corresponding relationships shown in some rows may not be configured.
  • appropriate deformation adjustments can be made based on the above table, such as splitting, merging, etc.
  • the names of the parameters shown in the titles of the above tables can also use other names that can be understood by the communication device, and the values or representations of the parameters can also be other values or representations that can be understood by the communication device.
  • other data structures can also be used, such as arrays, queues, containers, stacks, linear lists, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables or hash tables.
  • the predefined in the present disclosure may be understood as defined, predefined, stored, pre-stored, pre-negotiated, pre-configured, solidified, or pre-burned.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开实施例公开了一种侧行链路定位方法及装置, 可应用于通信技术领域, 由第一终端设备执行的方法包括: 接收第二终端设备发送的第一令牌, 第一令牌用于表征第二终端设备在侧行链路定位服务的角色, 第二终端设备在侧行链路定位服务的角色用于第一终端设备确定是否与第二终端设备进行侧行链路定位服务; 对所述第一令牌进行验证; 响应于验证通过, 建立与第二终端设备间的侧行链路; 执行侧行链路定位测量; 将所述测量结果发送给第一网元. 由此, 在进行侧行链路定位前, 首先根据第一令牌对定位终端设备进行角色授权验证, 从而保证了侧行链路定位过程中终端设备的隐私安全, 提高了侧行链路定位服务的安全性.

Description

一种侧行链路定位方法及装置 技术领域
本公开涉及通信技术领域,尤其涉及一种侧行链路定位方法及装置。
背景技术
测距、侧行链路定位服务是指通过直接通信连接,确定两个终端设备(也称为用户终端,User Equipment,简称UE))之间的距离和/或从一个终端设备到另一个终端设备的方向。第五代移动通信技术(5th Generation Mobile Communication Technology,简称5G)***能够提供测距、侧行链路(sidelink,sl)定位等服务。现有的测距、侧行链路定位服务中,未能保护终端设备的隐私。
发明内容
本公开实施例提供一种侧行链路定位方法及装置。
第一方面,本公开实施例提供一种侧行链路定位方法,该方法由第一终端设备执行,方法包括:
接收第二终端设备发送的第一令牌,所述第一令牌用于表征所述第二终端设备在所述侧行链路定位服务的角色;
当根据所述第一令牌确定与所述第二终端设备进行所述侧行链路定位服务时,建立与所述第二终端设备间的侧行链路;
执行侧行链路定位测量;
将测量结果发送给第一网元。
本公开中,第一终端设备在接收到第二终端设备发送的第一令牌后,可以首先根据第一令牌确定是否与所述第二终端设备进行所述侧行链路定位服务,在确定与第二终端设备进行侧行链路定位服务后,再建立与第二终端设备间的侧行链路,并执行侧行链路定位测量,将测量结果发送给第一网元。由此,在进行侧行链路定位前,目标终端设备首先根据第一令牌对定位终端设备进行角色授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
第二方面,本公开实施例提供一种侧行链路定位方法,该方法由第二终端设备执行,方法包括:
向第一终端设备发送第一令牌,所述第一令牌用于表征所述第二终端设备在所述侧行链路定位服务的角色,所述第二终端设备在所述侧行链路定位服务的角色用于所述第一终端设备确定是否与所述第二终端设备进行所述侧行链路定位服务;
建立与所述第一终端设备间的侧行链路;
执行侧行链路定位测量。
第三方面,本公开实施例提供一种通信装置,包括:
收发模块,用于接收第二终端设备发送的第一令牌,所述第一令牌用于表征所述第二终端设备在所述侧行链路定位服务的角色;
处理模块,用于当根据所述第一令牌确定与所述第二终端设备进行所述侧行链路定位服务时,建立与所述第二终端设备间的侧行链路;
所述处理模块,还用于执行侧行链路定位测量;
所述收发模块,还用于将所述测量结果发送给第一网元。
第四方面,本公开实施例提供另一种通信装置,包括:
收发模块,用于向第一终端设备发送第一令牌,所述第一令牌用于表征所述第二终端设备在所述侧行链路定位服务的角色,所述第二终端设备在所述侧行链路定位服务的角色用于所述第一终端设备确定是否与所述第二终端设备进行所述侧行链路定位服务;
处理模块,用于建立与所述第一终端设备间的侧行链路;
所述处理模块,还用于通过所述侧行链路,执行侧行链路定位测量。
第五方面,本公开实施例提供一种通信装置,该通信装置包括处理器,当该处理器调用存储器中的计算机程序时,执行上述第一方面所述的方法。
第六方面,本公开实施例提供一种通信装置,该通信装置包括处理器,当该处理器调用存储器中的计算机程序时,执行上述第二方面所述的方法。
第七方面,本公开实施例提供一种通信装置,该通信装置包括处理器和存储器,该存储器中存储有计算机程序;所述处理器执行该存储器所存储的计算机程序,以使该通信装置执行上述第一方面所述的 方法。
第八方面,本公开实施例提供一种通信装置,该通信装置包括处理器和存储器,该存储器中存储有计算机程序;所述处理器执行该存储器所存储的计算机程序,以使该通信装置执行上述第二方面所述的方法。
第九方面,本公开实施例提供一种通信装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第一方面所述的方法。
第十方面,本公开实施例提供一种通信装置,该装置包括处理器和接口电路,该接口电路用于接收代码指令并传输至该处理器,该处理器用于运行所述代码指令以使该装置执行上述第二方面所述的方法。
第十一方面,本公开实施例提供一种侧行链路定位***,该***包括第三方面所述的通信装置以及第四方面所述的通信装置,或者,该***包括第五方面所述的通信装置以及第六方面所述的通信装置,或者,该***包括第七方面所述的通信装置以及第八方面所述的通信装置,或者,该***包括第九方面所述的通信装置以及第十方面所述的通信装置。
第十二方面,本发明实施例提供一种计算机可读存储介质,用于储存为上述终端设备所用的指令,当所述指令被执行时,使所述终端设备执行上述第一方面所述的方法。
第十三方面,本发明实施例提供一种可读存储介质,用于储存为上述网络设备所用的指令,当所述指令被执行时,使所述网络设备执行上述第二方面所述的方法。
第十四方面,本公开还提供一种包括计算机程序的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第一方面所述的方法。
第十五方面,本公开还提供一种包括计算机程序的计算机程序产品,当其在计算机上运行时,使得计算机执行上述第二方面所述的方法。
第十六方面,本公开提供一种芯片***,该芯片***包括至少一个处理器和接口,用于支持终端设备实现第一方面所涉及的功能,例如,确定或处理上述方法中所涉及的数据和信息中的至少一种。在一种可能的设计中,所述芯片***还包括存储器,所述存储器,用于保存终端设备必要的计算机程序和数据。该芯片***,可以由芯片构成,也可以包括芯片和其他分立器件。
第十七方面,本公开提供一种芯片***,该芯片***包括至少一个处理器和接口,用于支持网络设备实现第二方面所涉及的功能,例如,确定或处理上述方法中所涉及的数据和信息中的至少一种。在一种可能的设计中,所述芯片***还包括存储器,所述存储器,用于保存网络设备必要的计算机程序和数据。该芯片***,可以由芯片构成,也可以包括芯片和其他分立器件。
第十八方面,本公开提供一种计算机程序,当其在计算机上运行时,使得计算机执行上述第一方面所述的方法。
第十九方面,本公开提供一种计算机程序,当其在计算机上运行时,使得计算机执行上述第二方面所述的方法。
附图说明
为了更清楚地说明本公开实施例或背景技术中的技术方案,下面将对本公开实施例或背景技术中所需要使用的附图进行说明。
图1是本公开实施例提供的一种通信***的架构示意图;
图2是本公开实施例提供的一种侧行链路定位方法的流程示意图;
图3是本公开实施例提供的另一种侧行链路定位方法的流程示意图;
图4是本公开实施例提供的另一种侧行链路定位方法的流程示意图;
图5是本公开实施例提供的另一种侧行链路定位方法的流程示意图;
图6是本公开实施例提供的另一种侧行链路定位方法的流程示意图
图7是本公开实施例提供的又一种侧行链路定位方法的流程示意图;
图8是本公开实施例提供的又一种侧行链路定位方法的流程示意图;
图9是本公开实施例提供的一种侧行链路定位方法的交互示意图;
图10是本公开实施例提供的另一种侧行链路定位方法的交互示意图;
图11是本公开实施例提供的又一种侧行链路定位方法的交互示意图;
图12是本公开实施例提供的一种通信装置的结构示意图;
图13是本公开实施例提供的另一种通信装置的结构示意图;
图14是本公开实施例提供的一种芯片的结构示意图。
具体实施方式
为了便于理解,首先介绍本公开涉及的术语。
1、定位终端设备(Located user equipment,Located UE)
Located UE为可以执行基于Uu接口的定位程序和/或SL定位的终端设备,在侧行链路定位服务中定位终端设备可以辅助需要定位的终端设备进行侧行链路测量。
2、目标终端设备(target UE)
target UE为需要确定其位置,也就是需要通过侧行链路定位对其进行定位的终端设备。
3、侧行链路定位服务
侧行链路定位服务,又称侧链定位服务或测距服务,是指通过直接通信连接,确定两个UE之间的距离和/或从一个UE到另一UE的方向。
4、令牌
本公开中的令牌,至少用于表征终端设备在侧行链路定位服务的角色,比如定位终端设备的令牌,至少可以表征终端设备在侧行链路定位服务中的角色为定位终端设备,目标终端设备的令牌至少可以表征终端设备在侧行链路定位服务中的角色为需要对其进行定位的终端设备。
为了更好的理解本公开实施例公开的一种迁移的方法,下面首先对本公开实施例适用的通信***进行描述。
请参见图1,图1为本公开实施例提供的一种通信***的架构示意图。该通信***可包括但不限于一个网络设备和一个终端设备,图1所示的设备数量和形态仅用于举例并不构成对本公开实施例的限定,实际应用中可以包括两个或两个以上的网络设备,两个或两个以上的终端设备。图1所示的通信***以包括1个网络设备11、一个定位终端设备12为例和一个目标终端设备13。
需要说明的是,本公开实施例的技术方案可以应用于各种通信***。例如:长期演进(long term evolution,LTE)***、第五代(5th generation,5G)移动通信***、5G新空口(new radio,NR)***,或者其他未来的新型移动通信***等。
本公开实施例中的网络设备是网络侧的一种用于发射或接收信号的实体。例如,演进型基站(evolved NodeB,eNB)、传输点(transmission reception point,TRP)、NR***中的下一代基站(next generation NodeB,gNB)、其他未来移动通信***中的基站或无线保真(wireless fidelity,WiFi)***中的接入节点等。本公开的实施例对网络设备所采用的具体技术和具体设备形态不做限定。本公开实施例提供的网络设备可以是由集中单元(central unit,CU)与分布式单元(distributed unit,DU)组成的,其中,CU也可以称为控制单元(control unit),采用CU-DU的结构可以将网络设备,例如基站的协议层拆分开,部分协议层的功能放在CU集中控制,剩下部分或全部协议层的功能分布在DU中,由CU集中控制DU。
本公开实施例中的终端设备12或13为用户侧的一种用于接收或发射信号的实体,如手机。终端设备也可以称为终端设备(terminal)、用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端设备(mobile terminal,MT)等。终端设备可以是具备通信功能的汽车、智能汽车、手机(mobile phone)、穿戴式设备、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端设备、无人驾驶(self-driving)中的无线终端设备、远程手术(remote medical surgery)中的无线终端设备、智能电网(smart grid)中的无线终端设备、运输安全(transportation safety)中的无线终端设备、智慧城市(smart city)中的无线终端设备、智慧家庭(smart home)中的无线终端设备等等。本公开的实施例对终端设备所采用的具体技术和具体设备形态不做限定。
可以理解的是,本公开实施例描述的通信***是为了更加清楚的说明本公开实施例的技术方案,并不构成对于本公开实施例提供的技术方案的限定,本领域普通技术人员可知,随着***架构的演变和新业务场景的出现,本公开实施例提供的技术方案对于类似的技术问题,同样适用。
本***中,目标终端设备12可以实现本公开图2至图6任一实施例所示的方法,另外,定位终端设备13可以实现本公开图7至图8所述的方法。
可以理解的是,本公开实施例描述的通信***是为了更加清楚的说明本公开实施例的技术方案,并 不构成对于本公开实施例提供的技术方案的限定,本领域普通技术人员可知,随着***架构的演变和新业务场景的出现,本公开实施例提供的技术方案对于类似的技术问题,同样适用。
本公开中,主要针对现有的侧行链路定位服务未能保护终端设备的隐私,提出一种侧行链路定位方法,在启动侧行链路定位服务前,目标终端设备首先检查定位终端设备的授权,并在授权通过后,再启动侧行链路定位服务,从而在侧行链路定位过程中保护定位终端设备的隐私安全,提高了侧行链路定位服务的安全性。
下面结合各流程图,对本公开实施例提供的侧行链路定位方法进行详细的说明。
请参见图2,图2是本公开实施例提供的一种侧行链路定位方法的流程示意图。本实施例提供的方法,可以由第一终端设备执行。如图2所示,该方法可以包括但不限于如下步骤:
步骤201,接收第二终端设备发送的第一令牌。
其中,第一令牌用于表征第二终端设备(例如定位终端设备)在侧行链路定位服务的角色,第二终端设备在侧行链路定位服务的角色用于第一终端设备(例如目标终端设备)确定是否与第二终端设备进行侧行链路定位服务。
也就是说,第一令牌,为用于表征第二终端设备的在侧行链路定位服务过程中的角色(定位终端设备)的令牌。也就是说,第一令牌,可以表征第二终端设备可以使用侧行链路定位服务、且其在该服务中的角色为定位终端设备。该令牌可以由第二网元提供。
可选的,第二网元,可以为以下任一项:网关移动位置中心(gateway mobile location center,GMLC),直接发现名称管理功能(direct discovery name management function,DDNMF)网元,邻近服务密钥管理功能(Proximity Services key management function,ProSe PKMF)网元,及测距应用服务器(ranging App server)网元。
可选的,第一终端设备还可以接收第二终端设备发送的第一测距服务代码(ranging service code,RSC)。其中,第一RSC用于表征第二终端设备当前支持的测距/侧行链路定位服务的版本或类型。第一RSC可以为预先配置在第二终端设备中的,或由第二终端设备向第二网元请求,并由第二网元提供的。
本公开中,第二终端设备可以向第二网元请求第一RSC及第一令牌,第二终端设备在收到第二网元返回的第一RSC及第一令牌后,在进行侧行链路定位时,即可将第一RSC及第一令牌发送给第一终端设备以进行验证。
步骤202,当根据第一令牌确定与所述第二终端设备进行所述侧行链路定位服务时,建立与所述第二终端设备间的侧行链路。
本公开中,目标终端设备在接收到第二终端设备发送的第一令牌后,可以对第一令牌表征的第二终端设备在侧行链路定位服务中的角色信息进行验证,比如验证第二终端设备在侧行链路定位服务中是否为定位终端设备,及第二终端设备当前时刻的角色是否仍为定位终端设备等等。之后根据第一令牌表征的第二终端设备的角色信息,确定是否与第二终端设备进行侧行链路定位服务。比如,若第一令牌表征的第二终端设备非定位终端设备,那么就可以确定不能与第二终端设备进行侧行链路定位服务。
可选的,若第二终端设备也发送了第一RSC,那么第一终端设备还可以对第一RSC的准确性进行验证,以确定第二终端设备支持的侧行链路定位服务与第一终端设备支持的侧行链路定位服务是否相同。
步骤203,执行侧行链路定位测量。
步骤204,将测量结果发送给第一网元。
本公开中,第一终端设备在对第一令牌在验证通过后,即可建立二者间的侧行链路,并基于侧行链路执行侧行链路定位测量。
可选的,侧行链路可以为PC5链路,或者SR5链路,侧行链路还可以为其他链路,本公开对此不做限定。
可选的,测量结果,可以包括第二终端设备与第一终端设备间的相对距离、和/或相对角度等等,本公开对此不做限定。
可选的,第一网元,可能为以下任一项:定位管理功能(location management function,LMF)网元,接入和移动管理功能(access and mobility management function,AMF)网元,及网关移动位置中心(gateway mobile location center,GMLC)。
本公开中目标终端设备在确定了其与定位终端设备间的侧行链路测量结果后,即可将测量结果发送给相关的核心网节点,从而核心网节点即可基于目标终端设备的位置信息,对终端设备的业务进行处理。
本公开中,第一终端设备在接收到第二终端设备发送的第一令牌后,可以首先根据第一令牌确定是 否与第二终端设备进行侧行链路定位服务,在确定可以后,再与第二终端设备执行侧行链路定位测量,并将测量结果发送给第一网元。由此,在进行侧行链路定位前,目标终端设备首先对定位终端设备的角色进行授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图3,图3是本公开实施例提供的另一种侧行链路定位方法的流程示意图。本实施例提供的方法,可以由第一终端设备执行。如图3所示,该方法可以包括但不限于如下步骤:
步骤301,向第二网元发送第三请求,第三请求用于请求建立侧行链路的信息。
可选的,第二网元可以为以下任一项:GMLC,直接发现名称管理功能(direct discovery name management function,DDNMF)网元,邻近服务密钥管理功能(Proximity Services key management function,ProSe PKMF)网元,及测距应用服务器(ranging App server)网元。
可选的,第一终端设备可以在接入网络时,就向第二网元发送第二请求;或者,也可以在有需要时,再向第二网元发送第二请求。例如第一终端设备可以周期性的向第二网元发送第二请求;或者第一终端设备也可以在每次进行侧行链路定位前,先向第二网元发送第二请求,来请求最新的可以用于建立侧行链路的信息。本公开对此不做限定。
步骤302,接收第二网元发送的用于建立侧行链路的信息,其中,用于建立侧行链路的信息中包括以下至少之一:用于发现阶段的安全参数、第二令牌、第二令牌对应的有效期限密钥。
其中,用于发现阶段的安全参数,为在发现阶段对终端设备的安全性进行保护的参数。该安全参数,可能为密钥,或者包含密钥在内的其他参数,本公开对此不做限定。
可选的,用于发现阶段的安全参数,可以为第一终端设备向第二网元请求后获得的;或者,也可以为第一终端设备接入网络后,由第二网元主动下发配置的,本公开对此不做限定。
第二令牌,可以表征第一终端设备可以使用侧行链路定位服务、且其在该服务中的角色为目标终端设备。第二令牌对应的有效期限,用于表征该第二令牌可以使用的期限。随着终端设备的移动,其在侧行链路定位服务中的角色可能会变化。比如终端设备A在时段T1内,可以执行基于Uu接口的定位程序及可以为其他终端设备提供SL定位服务,则其在侧行链路定位服务中可以作为定位终端设备角色;而在时段T2内,由于无法执行基于Uu接口的定位程序,因此其在T2时段内,无法作为定位终端设备,那么终端设备A,在时段T1和T2时,对应的第二令牌就不同。
本公开中,为了防止终端设备对应的令牌被恶意篡改,第二令牌,可以为第二网元将第一终端设备的角色等信息加密后生成的。用于建立侧行链路的信息中包含的密钥为第二网元生成第二令牌时使用的加密密钥,或者,为与加密密钥关联使用的解密密钥。
可选的,第二网元发送的用于建立侧行链路的信息中,可能未包含第二令牌的有效期限,而将第二令牌的有效期限等信息融合在第二令牌中。即第二网元可以将第二令牌的有效期限及第一终端设备的角色等信息,加密后生成第二令牌。之后,第一终端设备在接收到第二网元发送的用于建立侧行链路的信息后,用密钥对第二令牌进行解密,即可确定第二令牌对应的有效期限。
可选的,用于建立侧行链路的信息中,还可能包括第二RSC。
步骤303,接收第二终端设备发送的第一令牌。
其中,上述步骤303的具体实现过程,可以参照本公开任一实施例的详细描述,此处不再赘述。
步骤304,利用密钥,对第一令牌是否处于有效期限内、及第一令牌对应的终端设备类型是否为定位终端设备进行验证。
可选的,若第二终端设备还向第一终端设备发送了第一RSC,那么第一终端设备还可以将第一RSC与第二RSC进行比对。
由于第一RSC为当前测距服务对应的代码,因此,第一终端设备中的第二RSC与第二终端设备中的第一RSC应该相同,因此,第一终端设备在确定了第二终端设备发送的第一RSC后,即可将二者进行比对。
若第一RSC与第二RSC相同,则说明第二终端设备当前使用的测距服务与第一终端设备当前使用的测距服务相同,从而第一终端设备可以再对第一令牌进行验证。否则,第一终端设备则可以确定当前无法与第二终端设备进行该测距服务。
可选的,第一终端设备可以利用密钥对第一令牌进行解密,以获取第一令牌对应的有效期限及第二终端设备的类型。并根据第一令牌对应的有效期限,确定第一令牌是否处于有效期限内。若第一令牌处于有效期限内、且第二终端设备为定位终端设备,那么就可以认为验证通过,否则则可以确认验证不通 过。
步骤305,响应于验证通过,向第二终端设备发送侧行链路建立请求。
本公开中,第一终端设备对第一RSC及第一令牌进行验证通过后,则可以确定可以与第二终端设备进行侧行链路定位测量,从而第一终端设备即可启动侧行链路建立过程,即向第二终端设备发送侧行链路建立请求。
可选的,为了避免在执行了发现模型B对应的或模型A对应的发现过程后,第一终端设备对应的第二令牌已过期,侧行链路建立请求中,还可以包括第二令牌,以使第二终端设备对第二令牌进行验证,从而进一步保证了侧行链路的可靠性和安全性。
步骤306,接收第二终端设备返回的响应消息,其中,响应消息中包括第一令牌。
本公开中,为了避免第二终端设备对应的第一令牌在发现过程过后已失效,第二终端设备在收到第一终端设备发送的侧行链路建立请求后,还可以在响应消息中再次返回第一令牌,以使第一终端设备对第一令牌再次进行验证。
步骤307,利用密钥对第一令牌进行验证。
步骤308,响应于第一令牌处于有效期限内、且第二终端设备为定位终端设备,建立与第二终端设备间的侧行链路。
可选的,利用密钥对第一令牌进行验证,包括利用密钥对第一令牌进行解密,以确定第一令牌中包含的信息是否完整,及是否可以通过解密第一令牌获取第二终端设备的各种信息。比如,通过解密第一令牌,可以确定对应的有效期限及第二终端设备在侧行链路定位过程中的角色信息等。
可选的,若第一令牌处于有效期限内、且第二终端设备为定位终端设备,那么就可以建立与第二终端设备间的侧行链路。
可选的,若第一令牌已失效,和/或第二终端设备非定位终端设备,比如第二终端设备也为目标终端设备,那么就可以结束当前的侧行链路定位过程,或者由第一终端设备将确定的结果指示给第一网元等,本公开对此不做限定。
步骤309,执行侧行链路定位测量。
步骤310,将测量结果发送给第一网元。
上述步骤309至310的具体实现过程,可以参照本公开任一实施例的详细描述,此处不再赘述。
本公开中,第一终端设备首先向第二网元发送第二请求,以请求第二令牌及密钥等,之后在接收到第二终端设备发送的第一令牌后,可对第一令牌进行验证,若验证通过,则向第二终端设备发送侧行链路建立请求,并将其对应的第二令牌发送给第二终端设备,以与第二终端设备再次进行身份认证,在身份认证通过后,再建立与第二终端设备间的侧行链路,进行侧行链路测量,并在得到测量结果后将测量结果发送给第一网元。由此,在启动侧行链路定位前、及建立侧行链路前,均通过交互令牌对彼此的角色进行了授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图4,图4是本公开实施例提供的另一种侧行链路定位方法的流程示意图。本实施例提供的方法,可以由第一终端设备执行。如图4所示,该方法可以包括但不限于如下步骤:
步骤401,向第二网元发送第三请求,第三请求用于请求建立侧行链路的信息。
步骤402,接收第二网元发送的用于建立侧行链路的信息,其中,用于建立侧行链路的信息中包括以下至少之一:用于发现阶段的安全参数、第二令牌、第二令牌对应的有效期限及密钥。
步骤403,接收第一网元发送的第一请求,第一请求用于请求与第二终端设备的侧行链路定位服务。
步骤404,根据第二终端设备的标识执行第一发现过程。
本公开中,第一网元在收到其它网元,比如网络功能(network function,NF)网元、或应用功能(application function,AF)网元发送的侧行链路定位服务请求后,可以向目标终端设备即第一终端设备发送第一请求,以请求第一终端设备即目标终端设备基于第二终端设备进行侧行链路定位。
可选的,第一请求,可以为测距请求(ranging request),或侧行链路定位请求(sidelink positioning request),本公开对此不做限定。
可选的,第一发现过程,可以为基于发现模型B的发现过程。第一终端设备可以运行发现模型B,以向第二终端设备发送发现消息,来指示第二终端设备为其提供侧行链路服务。
可选的,第一终端设备在接收到第一网元发送的第一请求后,确定需要与第二终端设备进行侧行链路测量时,可以首先确定其对应的第二令牌是否仍处于有效期限内。若第二令牌已过期,也就是说第一终端设备已经无法作为目标终端设备使用,那么就可以结束该侧链定位服务过程,或者向第一网元返回第二令牌失效的指示。
或者,若第二令牌仍处于有效期限内,也就是说第一终端设备仍可作为目标终端设备使用,那么就可以运行发现模型B。
步骤405,接收第二终端设备返回的第一消息,第一消息中包括第一令牌。
本公开中,第一消息,可以为发现响应消息。也就是说,第二终端设备在侦听到第一终端设备发送的发现消息,并对第一终端设备的身份验证授权后,可以向第一终端设备返回发现响应消息,以将其对应的第一RSC及第一令牌通过发现响应消息发送给第一终端设备。
可选的,第一终端设备可以利用用于发现阶段的安全参数对第一消息进行验证;响应于通过验证,则可以获取第一消息中包含的第一令牌。
其中,用于发现阶段的安全参数,为在发现阶段对终端设备的安全性进行保护的参数。该安全参数,可能为密钥,或者包含密钥在内的其他参数,本公开对此不做限定。
可选的,第一消息中还可以包括第一RSC。
步骤406,根据第一令牌确定是否与第二终端设备进行侧行链路定位服务。
需要说明的是,当根据第一令牌确定不与第二终端设备进行侧行链路定位服务时,则可以结束该过程。
步骤407,当确定与第二终端设备进行侧行链路定位服务时,向第二终端设备发送侧行链路建立请求。
步骤408,接收第二终端设备返回的响应消息,其中,响应消息中包括第一令牌。
步骤409,利用密钥对第一令牌进行验证。
步骤410,响应于第一令牌处于有效期限内、且第二终端设备为定位终端设备,建立与第二终端设备间的侧行链路。
步骤411,执行侧行链路定位测量。
步骤412,将测量结果发送给第一网元。
上述步骤406至412的具体实现过程,可以参照本公开任一实施例的详细描述,此处不再赘述。
本公开中,第一终端设备首先向第二网元发送第二请求,以请求第二令牌及密钥等,之后在接收第一网元发送的第一请求后,基于第一请求中的第二终端设备的标识执行第一发现过程,并且在接收到第二终端设备发送的第一令牌后,即可对第一令牌进行验证,若验证通过,则向第二终端设备发送侧行链路建立请求,并将其对应的第二令牌发送给第二终端设备,以与第二终端设备再次进行身份认证,在身份认证通过后,再建立与第二终端设备间的侧行链路,以进行侧行链路测量,并在得到测量结果后将测量结果发送给第一网元。由此,在启动侧行链路定位前、及建立侧行链路前,均进行了令牌交互,以对彼此角色进行授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图5,图5是本公开实施例提供的另一种侧行链路定位方法的流程示意图。本实施例提供的方法,可以由第一终端设备执行。如图5所示,该方法可以包括但不限于如下步骤:
步骤501,向第二网元发送第三请求,第三请求用于请求建立侧行链路的信息。
步骤502,接收第二网元发送的用于建立侧行链路的信息,其中,用于建立侧行链路的信息中包括以下至少之一:用于发现阶段的安全参数、第二令牌、第二令牌对应的有效期限及密钥。
其中,上述步骤501至步骤502的具体实现过程,可以参照本公开任一实施例的详细描述,此处不再赘述。
步骤503,接收到第一网元发送的第二请求,第二请求用于请求发现定位终端设备。
步骤504,根据第二请求,执行第二发现过程,第二发现过程用于侦听邻近终端设备。
步骤505,侦听到第二终端设备发送的第二消息,第二消息中包括第一令牌。
本公开中,第一网元在收到其它网元,比如网络功能(network function,NF)网元、或应用功能(application function,AF)网元发送的侧行链路定位服务请求后,可以向目标终端设备即第一终端设备发送第一请求,以请求第一终端设备即目标终端设备基于第二终端设备进行侧行链路定位。
可选的,第二请求,可以为定位终端设备发现请求或侧行链路定位能力协商请求,本公开对此不做限定。
可选的,第二发现过程,可以为基于发现模型A的发现过程。第一终端设备可以运行发现模型A,以侦听邻近终端设备发送的第二消息,也就是发现消息。
可选的,第一终端设备在接收到第一网元发送的第二请求后,确定需要与第二终端设备进行侧行链路测量时,可以首先确定其对应的第二令牌是否仍处于有效期限内。若第二令牌已过期,即第一终端设备已经无法作为目标终端设备使用,那么就可以结束该侧链定位服务过程,或者向第一网元返回第二令牌失效的指示。
或者,若第二令牌仍处于有效期限内,即第一终端设备仍可作为目标终端设备使用,那么就可以运行发现模型A。
可选的,第一终端设备可以利用用于发现阶段的安全参数对第二消息进行验证;响应于通过验证,则可以获取第二消息中包含的第一RSC及第一令牌。
步骤506,根据第一令牌确定是否与第二终端设备进行侧行链路定位服务。
步骤507,当确定与第二终端设备进行侧行链路定位服务时,向第二终端设备发送侧行链路建立请求。
步骤508,接收第二终端设备返回的响应消息,其中,响应消息中包括第一令牌。
步骤509,利用密钥对第一令牌进行验证。
步骤510,响应于第一令牌处于有效期限内、且第二终端设备为定位终端设备,建立与第二终端设备间的侧行链路。
步骤511,与第二终端设备执行侧行链路定位测量。
步骤512,将测量结果发送给第一网元。
上述步骤506至512的具体实现过程,可以参照本公开任一实施例的详细描述,此处不再赘述。
本公开中,第一终端设备首先向第二网元发送第二请求,以请求第二令牌及密钥等,之后在接收第一网元发送的第一请求后,根据第一请求中的第二终端设备的标识执行第二发现过程,并且在接收到第二终端设备发送的第一令牌后,对第一令牌及第一RSC进行验证,若验证通过,则向第二终端设备发送侧行链路建立请求,并将其对应的第二令牌发送给第二终端设备,以与第二终端设备再次进行身份认证,在身份认证通过后,再建立与第二终端设备间的侧行链路,以进行侧行链路测量,并在得到测量结果后将测量结果发送给第一网元。由此,在启动侧行链路定位前、及建立侧行链路前,均进行令牌交互以对彼此的角色进行授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图6,图6是本公开实施例提供的另一种侧行链路定位方法的流程示意图。本实施例提供的方法,可以由第一终端设备执行。如图6所示,该方法可以包括但不限于如下步骤:
步骤601,向第二网元发送第三请求,第三请求用于请求建立侧行链路的信息。
步骤602,接收第二网元发送的用于建立侧行链路的信息,其中,用于建立侧行链路的信息中包括以下至少之一:用于发现阶段的安全参数、第二令牌、第二令牌对应的有效期限及密钥。
其中,上述步骤601至步骤602的具体实现过程,可以参照本公开任一实施例的详细描述,此处不再赘述。
步骤603,响应于第一终端设备有定位需求,执行第一发现过程或第二发现过程,获取第二终端设备发送的第三消息,第三消息中包括第一RSC及第一令牌。
需要说明的是,若第一终端设备执行了第一发现过程,则第三消息可为发现响应消息;若第一终端设备执行了第二发现过程,则第三消息可以为发现消息。
其中,利用安全参数对第三消息进行验证以获取第一RSC及第一令牌的具体实现方式,可以参照本公开任一实施例对第一消息或第二消息进行解析的过程的描述,此处不再赘述。
步骤604,将第一RSC与第二RSC进行比对。
步骤605,在第一RSC与第二RSC相同的情况下,利用密钥,对第一令牌是否处于有效期限内、及第一令牌对应的终端设备类型是否为定位终端设备进行验证。
步骤606,响应于验证通过,向第二终端设备发送侧行链路建立请求。
步骤607,接收第二终端设备返回的响应消息,其中,响应消息中包括第一令牌。
步骤608,利用密钥对第一令牌进行验证。
步骤609,响应于第一令牌处于有效期限内、且第二终端设备为定位终端设备,建立与第二终端设备间的侧行链路。
步骤610,执行侧行链路定位测量。
步骤611,将测量结果发送给第一网元。
上述步骤604至611的具体实现过程,可以参照本公开任一实施例的详细描述,此处不再赘述。
本公开中,第一终端设备首先向第二网元发送第二请求,以请求第二令牌及密钥等,之后在有定位需求时,执行第一发现过程或第二发现过程,获取第二终端设备的第一令牌及第一RSC,之后对第一令牌及第一RSC进行验证,若验证通过,则向第二终端设备发送侧行链路建立请求,并将其对应的第二令牌发送给第二终端设备,以与第二终端设备再次进行身份认证,在身份认证通过后,再建立与第二终端设备间的侧行链路,以进行侧行链路测量,并在得到测量结果后将测量结果发送给第一网元。由此,终端设备在启动侧行链路定位前、及建立侧行链路前,先进行令牌交互以对彼此的角色进行授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图7,图7是本公开实施例提供的又一种侧行链路定位方法的流程示意图。本实施例提供的方法,可以由第二终端设备执行执行。如图7所示,该方法可以包括但不限于如下步骤:
步骤701,向第一终端设备发送第一令牌。
其中,第一令牌用于表征第二终端设备在所述侧行链路定位服务的角色,第二终端设备在侧行链路定位服务的角色用于第一终端设备确定是否与第二终端设备进行侧行链路定位服务。
可选的,第二终端设备也可以向第一终端设备发送第一RSC。
其中,第一终端设备为侧行链路定位服务中的目标终端设备,第一RSC及第一令牌的具体含义,可以参照本公开任一实施例的详细描述,此处不再赘述。可选的,本公开中,第二终端设备可以通过执行第二发现过程,即运行发现模型A,以通过广播消息的形式,将第一令牌发送给第一终端设备。
或者,第二终端设备也可以在侦听到第一终端设备基于第一发现过程(即发现模型B)广播的消息的情况下,向第一终端设备发送第一令牌,本公开对此不做限定。
可选的,由于第一终端设备基于第一发现过程广播的消息中,可能包括第一终端设备的侧行链路定位需求信息,第二终端设备可以根据其自身的能力信息,确定是否满足第一终端设备的需求,在确定其能力满足第一终端设备的需求的情况下,再向第一终端设备发送第一令牌。
本公开中,第二终端设备通过将第一令牌发送给第一终端设备(例如目标终端设备),以使目标终端设备在执行侧行链路定位前,可以先基于第一令牌,对第二终端设备的角色进行验证授权。
步骤702,建立与第一终端设备间的侧行链路。
可选的,侧行链路可以为PC5链路,或者SR5链路,或者也可以为其他的侧链链路,本公开对此不做限定。
步骤703,执行侧行链路定位测量。
上述步骤702与步骤703的具体实现过程,可以参照本公开任一实施例的详细描述,此处不再赘述。
本公开中,第二终端设备首先向第一终端设备发送第一令牌,以使第一终端设备对第二终端设备的角色进行授权验证,之后再与第一终端设备建立侧行链路,并进行侧行链路定位测量。由此,在进行侧行链路定位前,首先将第一令牌发送给目标终端设备以进行角色授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图8,图8是本公开实施例提供的另一种侧行链路定位方法的流程示意图,该方法由第二终端设备执行。如图8所示,该方法可以包括但不限于如下步骤:
步骤801,向第二网元发送请求,所述请求用于请求建立侧行链路的信息。
步骤802,接收第二网元发送的用于建立侧行链路的信息,其中,用于建立侧行链路的信息中包括用于发现阶段的安全参数、第一令牌、所述第一令牌对应的有效期限及密钥。
本公开中,第二终端设备可以在接入网络时,或者在需要时,向第二网元发送请求,以向第二网元请求建立侧行链路时需要用的信息。比如,第二终端设备可以周期性的向第二网元发送请求;或者第二终端设备也可以在每次进行侧行链路定位前,先向第二网元发送请求,来请求最新的可以用于建立侧行链路的信息。
可选的,本实施例中的第二网元包括以下任一项:网关移动位置中心GMLC,直接发现名称管理功能DDNMF网元,邻近服务ProSe密钥管理功能PKMF网元,及测距应用服务器ranging App server网元。
其中,第二网元发送的用于建立侧行链路的信息中各参数的作用及意义,可以参照本公开任一实施例的详细描述,此处不再赘述。
步骤803,执行第二发现过程,向第一终端设备发送第一令牌。
可选的,第二终端设备在执行第二发现过程前,可以首先确定第一令牌是否处于有效期限内。若第一令牌已过期,则可以结束该侧行链路定位过程。若第一令牌仍在有效期限内,则说明第二终端设备在侧行链路定位服务中的角色仍为定位终端设备,从而可执行第二发现过程。
可选的,第二终端设备,还可以利用用于发现阶段的安全参数,对第一令牌进行加密,也就是说,利用用于发现阶段的安全参数,对发现消息进行加密,其中,发现消息中包含第一令牌。之后,第一终端设备在侦听到发现消息后,可利用用于发现阶段的安全参数,对发现消息进行解析,以获取第一令牌。
可选的,发现消息中还可以包括第一RSC。
步骤804,接收第一终端设备发送的侧行链路建立请求,其中,侧行链路建立请求中包括第二令牌。
本公开中,第二终端在将第一RSC及第一令牌发送给第一终端设备后,第一终端设备即可对第一RSC及第一令牌进行验证,在验证通过后,第一终端设备即可启动建立与第二终端设备间的侧行链路,即向第二终端设备发送侧行链路建立请求。
步骤805,利用密钥对第二令牌进行验证。
可选的,第二终端设备,利用密钥对第二令牌进行验证,包括利用密钥对第二令牌进行解密,以确定第二令牌中包含的信息是否完整,及是否可以通过解密第二令牌获取第一终端设备的各种信息。比如,通过解密第二令牌,可以确定第二令牌对应的有效期限及第一终端设备在侧行链路定位过程中的角色信息等。
可选的,若第二令牌处于有效期限内、且第一终端设备为目标终端设备,那么就可以建立与第一终端设备间的侧行链路。
可选的,若第一令牌已失效,和/或第一终端设备非目标终端设备,比如第一终端设备也为定位终端设备,那么就可以结束当前的侧行链路定位过程,或者向第一终端设备发送验证失败消息,由第一终端设备将确定的结果指示给第一网元等,本公开对此不做限定。
步骤806,响应于第二令牌处于有效期限内、且第一终端设备为目标终端设备,向第一终端设备返回响应消息,其中,所述响应消息中包括第一令牌。
本公开中,为了避免第二终端设备对应的第一令牌在发现过程过后已失效,第二终端设备在收到第一终端设备发送的侧行链路建立请求,并根据第二令牌,确定第一终端为目标终端设备、且第二令牌仍有效时,还可以在响应消息中再次返回第一令牌,以使第一终端设备对第一令牌再次进行验证。
步骤807,建立与第一终端设备间的侧行链路。
步骤808,执行侧行链路定位测量。
其中,上述步骤807及步骤808的具体实现形式,可以参照本公开任一实施例的详细描述,此处不再赘述。
本公开中,第二终端设备首先向第二网元发送请求,以请求在建立侧行链路时需要的信息,之后可通过执行发现过程,向第一终端设备发送第一令牌,以使第一终端设备对第二终端设备的身份进行授权验证,之后在接收到第一终端设备发送的侧行链路建立请求后,再与第一终端设备进行令牌的交互和验证,并在验证通过后再与第一终端设备建立侧行链路,并进行侧行链路定位测量。由此,在进行侧行链路定位及建立侧行链路前,均通过交互令牌进行了角色授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图9,图9是本公开实施例提供的一种侧行链路定位方法的交互示意图。如图9所示,该方法可以包括但不限于如下步骤:
步骤900(图中未示出),目标终端设备及定位终端设备从第二网元请求获取用于发现阶段的安全参数、令牌及密钥。
步骤901,AMF接收侧行链路定位服务请求。
其中,该服务请求中包含目标终端设备的标识。
其中,AMF可以从任何NF或AF接收测距/侧链定位服务请求。AMF在接收到侧行链路定位服务请求 后,即可根据目标终端设备的标识,选择一个LMF。
步骤902,AMF向选定的LMF发送侧行链路定位服务请求,其中包括目标终端设备的标识。
步骤903,LMF向目标终端设备发送包含至少一个定位终端设备标识的第一请求,以触发目标终端设备执行侧行链路定位过程。
步骤904,目标终端设备执行第二发现过程,以获取定位终端设备的第一RSC和第一令牌。
步骤905,目标终端设备对第一RSC和第一令牌进行验证。
步骤906,响应于验证通过,建立与定位终端设备间的侧行链路。
可选的,定位终端设备与目标终端设备在建立侧行链路的过程中,还可以互相交互令牌,以再次进行验证授权。
步骤907,执行侧行链路定位测量。
步骤908,目标终端设备向LMF发送侧行链路测量结果。
步骤909,LMF将测量结果发送给AMF。
步骤910,AMF报告目标终端设备的位置。
本公开中,在进行侧行链路定位前,目标终端设备与定位终端设备首先通过交互令牌进行身份的验证授权,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图10,图10是本公开实施例提供的另一种侧行链路定位方法的交互示意图。如图10所示,该方法可以包括但不限于如下步骤:
步骤1000(图中未示出),目标终端设备及定位终端设备从第二网元请求获取用于发现阶段的安全参数、令牌及密钥。
步骤1001,AMF接收侧行链路定位服务请求。
其中,该服务请求中包含目标终端设备的标识。
其中,AMF可以从任何NF或AF接收测距/侧链定位服务请求。AMF在接收到到侧行链路定位服务请求后,即可根据目标终端设备的标识,选择一个LMF。
步骤1002,AMF向选定的LMF发送侧行链路定位服务请求。
其中,包括目标终端设备的标识。
步骤1003,LMF向目标终端设备发送定位终端设备发现请求。
可选的,LMF还可以向目标终端设备发送侧行链路定位能力协商请求。
步骤1004,目标终端设备执行第一发现过程,以获取定位终端设备的第一RSC和第一令牌。
步骤1005,响应于对第一RSC和第一令牌的验证通过,目标终端设备向LMF返回响应消息,其中,响应消息中包括定位终端设备的标识。
可选的,若LMF发送给目标终端设备的为侧行链路定位能力协商请求,那么目标终端设备还可以将其自身的和/或定位终端设备的侧行链路定位能力发送给LMF。
步骤1006,LMF向目标终端设备发送侧行链路定位请求。
步骤1007,目标终端设备建立与定位终端设备间的侧行链路,以执行侧行链路定位测量。
可选的,目标终端设备与定位终端设备还可以在建立侧行链路的过程中进行令牌的交互和授权验证。
步骤1008,目标终端设备将侧行链路测量结果发送给LMF。
步骤1009,LMF将测量结果发送给AMF。
步骤1010,AMF报告目标终端设备的位置。
本公开中,在进行侧行链路定位前,目标终端设备与定位终端设备首先通过交互令牌进行身份的验证授权,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图11,图11是本公开实施例提供的又一种侧行链路定位方法的交互示意图。如图11所示,该方法可以包括但不限于如下步骤:
步骤1100(图中未示出),目标终端设备及定位终端设备从第二网元请求获取用于发现阶段的安全参数、令牌及密钥。
步骤1101,目标终端设备有定位需求,执行第一发现过程或第二发现过程,以获取定位终端设备的第一RSC及第一令牌。
步骤1102,响应于对第一RSC及第一令牌验证通过,目标终端设备向LMF发送MO-LR请求,包括 定位终端设备的标识。
其中,移动终端发起的定位请求(Mobile Originated Location Request,MO-LR)表征该定位请求,为目标终端设备发起的。
步骤1103,LMF启动定位终端设备的定位。
步骤1104,LMF向目标终端设备发送侧行链路定位请求。
步骤1105,目标终端设备建立与定位终端设备间的侧行链路,以执行侧行链路定位测量。
可选的,目标终端设备与定位终端设备还可以在建立侧行链路的过程中进行令牌的交互和授权验证。
步骤1106,目标终端设备将侧行链路测量结果发送给LMF。
步骤1107,LMF将根据侧行链路测量结果及定位终端设备的位置,确定目标终端设备的位置。
步骤1108,LMF将目标终端设备的位置,发送给目标终端设备。
本公开中,在进行侧行链路定位前,目标终端设备与定位终端设备首先通过交互令牌进行身份的验证授权,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图12,图12为本公开实施例提供的一种通信装置的结构示意图。图12所示的通信装置1200可包括收发模块1201和处理模块1202。收发模块1201可包括发送模块和/或接收模块,发送模块用于实现发送功能,接收模块用于实现接收功能,收发模块1201可以实现发送功能和/或接收功能。
可以理解的是,通信装置1200可以是终端设备,或者,也可以是终端设备中的装置,或者,还可以是能够与终端设备匹配使用的装置。
通信装置1200在第一终端设备侧,其中:
收发模块1201,用于接收第二终端设备发送的第一令牌,所述第一令牌用于表征所述第二终端设备在所述侧行链路定位服务的角色;
处理模块1202,用于当根据所述第一令牌确定与所述第二终端设备进行所述侧行链路定位服务时,建立与所述第二终端设备间的侧行链路;
所述处理模块1202,还用于执行侧行链路定位测量;
所述收发模块1201,还用于将测量结果发送给第一网元。
可选的,上述收发模块1201,还用于:
接收所述第一网元发送的第一请求,所述第一请求用于请求与所述第二终端设备的侧行链路定位服务;
根据所述第二终端设备的标识执行第一发现过程;
接收所述第二终端设备返回的第一消息,所述第二消息中包括第一令牌。
可选的,上述收发模块1201,还用于:接收所述第一网元发送的第二请求,,所述第二请求用于请求发现定位终端设备;
所述处理模块1202,还用于执行第二发现过程,所述第二发现过程用于侦听邻近终端设备;
上述处理模块1202,还用于侦听到所述第二终端设备发送的第二消息,所述第二消息中包括第一令牌。
可选的,上述收发模块1201,还用于:响应于所述第一终端设备有定位需求,执行第一发现过程或第二发现过程,获取所述第二终端设备发送的第三消息,其中所述第三消息中包括所述第一令牌。
可选的,上述处理模块1202,还用于:
利用用于发现阶段的安全参数对所述第一消息、第二消息或第三消息进行验证;
响应于通过验证,获取所述第一消息、第二消息或第三消息中包含的第一令牌。
可选的,上收发模块1201,还用于:
向第二网元发送第三请求,第三请求用于请求建立侧行链路的信息;
接收所述第二网元发送的用于建立侧行链路的信息,其中,所述用于建立侧行链路的信息中包括以下至少之一:
用于发现阶段的安全参数、第二令牌、所述第二令牌对应的有效期限及密钥。
可选的,上述处理模块1202,还用于:
利用所述密钥,确定所述第一令牌处于有效期限内、及所述第一令牌对应的终端设备类型为定位终端设备。
可选的,上述收发模块1201,还用于:
向所述第二终端设备发送侧行链路建立请求,其中,所述建立请求中包括所述第二令牌;
接收所述第二终端设备返回的响应消息,其中,所述响应消息中包括所述第一令牌;
上述处理模块1202,还用于:
利用所述密钥,对所述第一令牌进行验证;
响应于所述第一令牌处于有效期限内、且所述第二终端设备为定位终端设备,建立与所述第二终端设备间的侧行链路。
可选的,所述第一网元为以下任一项:定位管理功能LMF网元,接入和移动管理功能网元AMF,及网关移动位置中心GMLC;
所述第二网元为以下任一项:GMLC,直接发现名称管理功能DDNMF网元,邻近服务ProSe密钥管理功能PKMF网元,及测距应用服务器ranging App server网元。
本公开中,第一终端设备在接收到第二终端设备发送的第一令牌后,可以首先对第一令牌进行验证,在验证通过后,再与第二终端设备执行侧行链路定位测量,并将测量结果发送给第一网元。由此,在进行侧行链路定位前,目标终端设备首先根据定位终端设备发送的第一令牌对其角色进行授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
或者,通信装置1200在第二终端设备侧,其中:
收发模块1201,用于向第一终端设备发送第一令牌,所述第一令牌用于表征所述第二终端设备在所述侧行链路定位服务的角色,所述第二终端设备在所述侧行链路定位服务的角色用于所述第一终端设备确定是否与所述第二终端设备进行所述侧行链路定位服务;
处理模块1202,用于建立与所述第一终端设备间的侧行链路;
所述处理模块1202,还用于执行侧行链路定位测量。
可选的,上述收发模块1201,还用于:
侦听到所述第一终端设备基于第一发现过程广播的消息;
向所述第一终端设备返回消息,所述消息中包括所述第一令牌。
可选的,处理模块1202,还用于:
确定所述第二终端设备的能力满足所述第一终端设备的侧行链路定位需求。
可选的,上述收发模块1201,还用于:
执行第二发现过程,广播所述第一令牌。
可选的,上述处理模块1202,还用于利用用于发现阶段的安全参数,对所述第一令牌进行加密。
可选的,上述收发模块1201,还用于
向第二网元发送请求,所述请求用于请求建立侧行链路的信息;
接收所述第二网元发送的用于建立侧行链路的信息,其中,所述用于建立侧行链路的信息中包括以下至少之一:
用于发现阶段的安全参数、所述第一令牌、所述第一令牌对应的有效期限及密钥。
可选的,上述收发模块1201,还用于:
响应于所述第一令牌处于有效期限内,向第一终端设备发送第一令牌。
可选的,上述收发模块1201,还用于:
接收所述第一终端设备发送的侧行链路建立请求,其中,所述侧行链路建立请求中包括第二令牌;
上述处理模块1202,还用于:
利用所述密钥对所述第二令牌进行验证;
响应于所述第二令牌处于有效期限内、且所述第一终端设备为目标终端设备,向所述第一终端设备返回响应消息,其中,所述响应消息中包括所述第一令牌;
建立与所述第一终端设备间的侧行链路。
可选的,所述第二网元为以下任一项:网关移动位置中心GMLC,直接发现名称管理功能DDNMF网元,邻近服务ProSe密钥管理功能PKMF网元,及测距应用服务器ranging App server网元。
本公开中,第二终端设备首先向第一终端设备发送第一令牌,以使第一终端设备对第二终端设备的身份进行授权验证,之后再与第一终端设备建立侧行链路,并进行侧行链路定位测量。由此,在进行侧行链路定位前,首先将第一令牌发送给目标终端设备,以进行角色授权验证,从而保证了侧行链路定位过程中终端设备的隐私安全,提高了侧行链路定位服务的安全性。
请参见图13,图13是本公开实施例提供的另一种通信装置的结构示意图。通信装置1300可以是终端设备,也可以是支持终端设备实现上述方法的芯片、芯片***、或处理器等。该装置可用于实现上述方法实施例中描述的方法,具体可以参见上述方法实施例中的说明。
通信装置1300可以包括一个或多个处理器1301。处理器1301可以是通用处理器或者专用处理器等。例如可以是基带处理器或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对通信装置(如,基站、基带芯片,终端设备、终端设备芯片,DU或CU等)进行控制,执行计算机程序,处理计算机程序的数据。
可选的,通信装置1300中还可以包括一个或多个存储器1302,其上可以存有计算机程序1304,处理器1301执行所述计算机程序1304,以使得通信装置1300执行上述方法实施例中描述的方法。可选的,所述存储器1302中还可以存储有数据。通信装置1300和存储器1302可以单独设置,也可以集成在一起。
可选的,通信装置1300还可以包括收发器1305、天线1306。收发器1305可以称为收发单元、收发机、或收发电路等,用于实现收发功能。收发器1205可以包括接收器和发送器,接收器可以称为接收机或接收电路等,用于实现接收功能;发送器可以称为发送机或发送电路等,用于实现发送功能。
可选的,通信装置1300中还可以包括一个或多个接口电路1307。接口电路1307用于接收代码指令并传输至处理器1301。处理器1301运行所述代码指令以使通信装置1300执行上述方法实施例中描述的方法。
通信装置1300中的收发器1305可用于执行上述各图中的收发步骤,处理器1301可用于执行上述各图中的处理步骤。
在一种实现方式中,处理器1301中可以包括用于实现接收和发送功能的收发器。例如该收发器可以是收发电路,或者是接口,或者是接口电路。用于实现接收和发送功能的收发电路、接口或接口电路可以是分开的,也可以集成在一起。上述收发电路、接口或接口电路可以用于代码/数据的读写,或者,上述收发电路、接口或接口电路可以用于信号的传输或传递。
在一种实现方式中,处理器1301可以存有计算机程序1303,计算机程序1303在处理器1301上运行,可使得通信装置1300执行上述方法实施例中描述的方法。计算机程序1303可能固化在处理器1301中,该种情况下,处理器1301可能由硬件实现。
在一种实现方式中,通信装置1300可以包括电路,所述电路可以实现前述方法实施例中发送或接收或者通信的功能。本公开中描述的处理器和收发器可实现在集成电路(integrated circuit,IC)、模拟IC、射频集成电路RFIC、混合信号IC、专用集成电路(application specific integrated circuit,ASIC)、印刷电路板(printed circuit board,PCB)、电子设备等上。该处理器和收发器也可以用各种IC工艺技术来制造,例如互补金属氧化物半导体(complementary metal oxide semiconductor,CMOS)、N型金属氧化物半导体(nMetal-oxide-semiconductor,NMOS)、P型金属氧化物半导体(positive channel metal oxide semiconductor,PMOS)、双极结型晶体管(bipolar junction transistor,BJT)、双极CMOS(BiCMOS)、硅锗(SiGe)、砷化镓(GaAs)等。
以上实施例描述中的通信装置可以是网络设备或者智能中继,但本公开中描述的通信装置的范围并不限于此,而且通信装置的结构可以不受图13的限制。通信装置可以是独立的设备或者可以是较大设备的一部分。例如所述通信装置可以是:
(1)独立的集成电路IC,或芯片,或,芯片***或子***;
(2)具有一个或多个IC的集合,可选的,该IC集合也可以包括用于存储数据,计算机程序的存储部件;
(3)ASIC,例如调制解调器(Modem);
(4)可嵌入在其他设备内的模块;
(5)接收机、终端设备、智能终端设备、蜂窝电话、无线设备、手持机、移动单元、车载设备、网络设备、云设备、人工智能设备等等;
(6)其他等等。
对于通信装置可以是芯片或芯片***的情况,可参见图14所示的芯片的结构示意图。图14所示的芯片包括处理器1401和接口1402。其中,处理器1401的数量可以是一个或多个,接口1402的数量可以是多个。
对于芯片用于实现本公开实施例中终端设备的功能的情况。
可选的,芯片还包括存储器1403,存储器1403用于存储必要的计算机程序和数据。
本领域技术人员还可以了解到本公开实施例列出的各种说明性逻辑块(illustrative logical block)和步骤(step)可以通过电子硬件、电脑软件,或两者的结合进行实现。这样的功能是通过硬件还是软件来实现取决于特定的应用和整个***的设计要求。本领域技术人员可以对于每种特定的应用,可以使用各种方法实现所述的功能,但这种实现不应被理解为超出本公开实施例保护的范围。
本公开还提供一种可读存储介质,其上存储有指令,该指令被计算机执行时实现上述任一方法实施例的功能。
本公开还提供一种计算机程序产品,该计算机程序产品被计算机执行时实现上述任一方法实施例的功能。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序。在计算机上加载和执行所述计算机程序时,全部或部分地产生按照本公开实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机程序可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以理解:本公开中涉及的第一、第二等各种数字编号仅为描述方便进行的区分,并不用来限制本公开实施例的范围,也表示先后顺序。
本公开中的至少一个还可以描述为一个或多个,多个可以是两个、三个、四个或者更多个,本公开不做限制。在本公开实施例中,对于一种技术特征,通过“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”等区分该种技术特征中的技术特征,该“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”描述的技术特征间无先后顺序或者大小顺序。
本公开中各表所示的对应关系可以被配置,也可以是预定义的。各表中的信息的取值仅仅是举例,可以配置为其他值,本公开并不限定。在配置信息与各参数的对应关系时,并不一定要求必须配置各表中示意出的所有对应关系。例如,本公开中的表格中,某些行示出的对应关系也可以不配置。又例如,可以基于上述表格做适当的变形调整,例如,拆分,合并等等。上述各表中标题示出参数的名称也可以采用通信装置可理解的其他名称,其参数的取值或表示方式也可以通信装置可理解的其他取值或表示方式。上述各表在实现时,也可以采用其他的数据结构,例如可以采用数组、队列、容器、栈、线性表、指针、链表、树、图、结构体、类、堆、散列表或哈希表等。
本公开中的预定义可以理解为定义、预先定义、存储、预存储、预协商、预配置、固化、或预烧制。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本公开的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的***、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
以上所述,仅为本公开的具体实施方式,但本公开的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本公开揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本公开的保护范围之内。因此,本公开的保护范围应以所述权利要求的保护范围为准。

Claims (23)

  1. 一种侧行链路定位方法,其特征在于,所述方法由第一终端设备执行,所述方法包括:
    接收第二终端设备发送的第一令牌,所述第一令牌用于表征所述第二终端设备在所述侧行链路定位服务的角色;
    当根据所述第一令牌确定与所述第二终端设备进行所述侧行链路定位服务时,建立与所述第二终端设备间的侧行链路;
    执行侧行链路定位测量;
    将测量结果发送给第一网元。
  2. 如权利要求1所述的方法,其特征在于,所述接收第二终端设备发送的第一令牌,包括:
    接收所述第一网元发送的第一请求,所述第一请求用于请求与所述第二终端设备的侧行链路定位服务;
    根据所述第二终端设备的标识执行第一发现过程;
    接收所述第二终端设备返回的第一消息,所述第一消息中包括所述第一令牌。
  3. 如权利要求1所述的方法,其特征在于,所述接收第二终端设备发送的第一令牌,包括:
    接收所述第一网元发送的第二请求,所述第二请求用于请求发现定位终端设备;
    根据所述第二请求,执行第二发现过程,所述第二发现过程用于侦听邻近终端设备;
    侦听到所述第二终端设备发送的第二消息,所述第二消息包括所述第一令牌。
  4. 如权利要求1所述的方法,其特征在于,所述接收第二终端设备发送的第一令牌,包括:
    响应于所述第一终端设备有定位需求,执行第一发现过程或第二发现过程,获取所述第二终端设备发送的第三消息所述第三消息中包括,所述第一令牌。
  5. 如权利要求2-4任一所述的方法,其特征在于,所述接收第二终端设备发送的第一令牌,包括:
    利用用于发现阶段的安全参数对所述第一消息、第二消息或第三消息进行验证;
    响应于通过验证,获取所述第一消息、第二消息或第三消息中包含的第一令牌。
  6. 如权利要求1-5任一所述的方法,其特征在于,还包括:
    向第二网元发送第三请求,所述第三请求用于请求建立侧行链路的信息;
    接收所述第二网元发送的用于建立侧行链路的信息,其中,所述用于建立侧行链路的信息中包括以下至少之一:
    用于发现阶段的安全参数、第二令牌、所述第二令牌对应的有效期限及密钥。
  7. 如权利要求6所述的方法,其特征在于,所述根据所述第一令牌确定与所述第二终端设备进行所述侧行链路定位服务,包括:
    利用所述密钥,确定所述第一令牌处于有效期限内、及所述第一令牌对应的终端设备类型为定位终端设备。
  8. 如权利要求6所述的方法,其特征在于,所述建立与所述第二终端设备间的侧行链路,包括:
    向所述第二终端设备发送侧行链路建立请求;
    接收所述第二终端设备返回的响应消息,其中,所述响应消息中包括所述第一令牌;
    利用所述密钥,对所述第一令牌进行验证;
    响应于所述第一令牌处于有效期限内、且所述第二终端设备为定位终端设备,建立与所述第二终端设备间的侧行链路。
  9. 如权利要求6所述的方法,其特征在于,
    所述第一网元为以下任一项:定位管理功能LMF网元,接入管理功能网元AMF,及网关移动位置中心GMLC;
    所述第二网元为以下任一项:GMLC,直接发现名称管理功能DDNMF网元,邻近服务ProSe密钥管理功能PKMF网元,及测距应用服务器ranging App server网元。
  10. 一种侧行链路定位方法,其特征在于,所述方法由第二终端设备执行,所述方法包括:
    向第一终端设备发送第一令牌,所述第一令牌用于表征所述第二终端设备在所述侧行链路定位服务的角色,所述第二终端设备在所述侧行链路定位服务的角色用于所述第一终端设备确定是否与所述第二终端设备进行所述侧行链路定位服务;
    建立与所述第一终端设备间的侧行链路;
    执行侧行链路定位测量。
  11. 如权利要求10所述的方法,其特征在于,所述向第一终端设备发送第一令牌,包括:
    侦听到所述第一终端设备基于第一发现过程广播的消息;
    向所述第一终端设备返回消息,所述消息中包括所述第一令牌。
  12. 如权利要求11所述的方法,其特征在于,在所述向所述第一终端设备返回消息之前,还包括:
    确定所述第二终端设备的能力满足所述第一终端设备的侧行链路定位需求。
  13. 如权利要求10所述的方法,其特征在于,所述向第一终端设备发送第一令牌,包括:
    执行第二发现过程,广播所述第一令牌。
  14. 如权利要求10-13任一所述的方法,其特征在于,在所述向第一终端设备发送第一令牌之前,还包括:
    利用用于发现阶段的安全参数,对所述第一令牌进行加密。
  15. 如权利要求10-14任一所述的方法,其特征在于,还包括:
    向第二网元发送请求,所述请求用于请求建立侧行链路的信息;
    接收所述第二网元发送的用于建立侧行链路的信息,其中,所述用于建立侧行链路的信息中包括以下至少之一:
    用于发现阶段的安全参数、所述第一令牌、所述第一令牌对应的有效期限及密钥。
  16. 如权利要求15所述的方法,其特征在于,在所述向第一终端设备发送第一令牌之前,还包括:
    确定所述第一令牌处于有效期限内。
  17. 如权利要求15所述的方法,其特征在于,所述建立与所述第一终端设备间的侧行链路,包括:
    接收所述第一终端设备发送的侧行链路建立请求,其中,所述侧行链路建立请求中包括第二令牌;
    利用所述密钥对所述第二令牌进行验证;
    响应于所述第二令牌处于有效期限内、且所述第一终端设备为目标终端设备,向所述第一终端设备返回响应消息,其中,所述响应消息中包括所述第一令牌;
    建立与所述第一终端设备间的侧行链路。
  18. 如权利要求15所述的方法,其特征在于,
    所述第二网元为以下任一项:网关移动位置中心GMLC,直接发现名称管理功能DDNMF网元,邻近服务ProSe密钥管理功能PKMF网元,及测距应用服ranging App server网元。
  19. 一种通信装置,其特征在于,包括:
    收发模块,用于接收第二终端设备发送的第一令牌,所述第一令牌用于表征所述第二终端设备在所述侧行链路定位服务的角色;
    处理模块,用于当根据所述第一令牌确定与所述第二终端设备进行所述侧行链路定位服务时,建立与所述第二终端设备间的侧行链路;
    所述处理模块,还用于执行侧行链路定位测量;
    所述收发模块,还用于将测量结果发送给第一网元。
  20. 一种通信装置,其特征在于,包括:
    收发模块,用于向第一终端设备发送第一令牌,所述第一令牌用于表征所述第二终端设备在所述侧行链路定位服务的角色,所述第二终端设备在所述侧行链路定位服务的角色用于所述第一终端设备确定是否与所述第二终端设备进行所述侧行链路定位服务;
    处理模块,用于建立与所述第一终端设备间的侧行链路;
    所述处理模块,还用于执行侧行链路定位测量。
  21. 一种通信***,其特征在于,所述通信***包括第一终端设备及第二终端设备,所述第一终端设备用于执行如权利要求1-9任一所述的方法,所述第二终端设备用于执行如权利要求10-18任一所述的方法。
  22. 一种通信装置,其特征在于,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求1至9中任一项所述的方法,或者执行如权利要求10-18任一项所述的方法。
  23. 一种计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如权利要求1至9中任一项所述的方法被实现,或者使如权利要求10至18中任一项所述的方法被实现。
PCT/CN2022/122342 2022-09-28 2022-09-28 一种侧行链路定位方法及装置 WO2024065336A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202280003735.2A CN118104187A (zh) 2022-09-28 2022-09-28 一种侧行链路定位方法及装置
PCT/CN2022/122342 WO2024065336A1 (zh) 2022-09-28 2022-09-28 一种侧行链路定位方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/122342 WO2024065336A1 (zh) 2022-09-28 2022-09-28 一种侧行链路定位方法及装置

Publications (1)

Publication Number Publication Date
WO2024065336A1 true WO2024065336A1 (zh) 2024-04-04

Family

ID=90475313

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/122342 WO2024065336A1 (zh) 2022-09-28 2022-09-28 一种侧行链路定位方法及装置

Country Status (2)

Country Link
CN (1) CN118104187A (zh)
WO (1) WO2024065336A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220240206A1 (en) * 2021-01-28 2022-07-28 Qualcomm Incorporated Timing advance (ta) handling for sidelink (sl)-assisted positioning
CN114867099A (zh) * 2021-01-18 2022-08-05 大唐移动通信设备有限公司 一种定位方法及装置
CN115087089A (zh) * 2021-03-10 2022-09-20 大唐移动通信设备有限公司 相对定位授权方法、装置、终端及目标设备

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114867099A (zh) * 2021-01-18 2022-08-05 大唐移动通信设备有限公司 一种定位方法及装置
US20220240206A1 (en) * 2021-01-28 2022-07-28 Qualcomm Incorporated Timing advance (ta) handling for sidelink (sl)-assisted positioning
CN115087089A (zh) * 2021-03-10 2022-09-20 大唐移动通信设备有限公司 相对定位授权方法、装置、终端及目标设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on Architecture Enhancement to support Ranging based services and sidelink positioning (Release 18)", 3GPP DRAFT; 23700-86-030, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, 24 May 2022 (2022-05-24), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052159045 *

Also Published As

Publication number Publication date
CN118104187A (zh) 2024-05-28

Similar Documents

Publication Publication Date Title
JP6203985B1 (ja) 認証証明のセキュアプロビジョニング
KR101692171B1 (ko) 장치간의 통신 세션을 확립하기 위한 방법
WO2022057736A1 (zh) 授权方法及装置
EP3691316A1 (en) Parameter protection method, device and system
CN113543126B (zh) 密钥获取方法及装置
JP2021528872A (ja) 端末情報の配信方法及び関連製品
US20220303763A1 (en) Communication method, apparatus, and system
WO2024065336A1 (zh) 一种侧行链路定位方法及装置
US20230017001A1 (en) Vehicle control method, communications apparatus, and computer-readable storage medium
WO2024065335A1 (zh) 一种侧行链路定位方法及装置
WO2024065339A1 (zh) 一种网络卫星覆盖数据的授权方法、设备及存储介质
WO2024082143A1 (zh) 一种设备业务角色的验证方法/装置/设备及存储介质
WO2024065469A1 (zh) 一种直连链路建立方法、设备及存储介质
WO2024092827A1 (zh) 一种测距方法及其装置
WO2024065706A1 (zh) 一种构建连接的方法及装置
WO2024065549A1 (zh) 直连通信密钥生成方法及装置
WO2023245520A1 (zh) 一种定位服务的直接通信方法及装置
WO2024130561A1 (zh) 一种用户位置信息的可信确定方法及其装置
WO2024065140A1 (zh) 一种用户设备ue的角色授权方法/装置/设备及存储介质
WO2024065564A1 (zh) 一种api的调用方法、装置、设备及存储介质
WO2024092826A1 (zh) 身份验证方法及装置
WO2024065334A1 (zh) 一种用户设备ue的授权令牌的生成方法/装置/设备及存储介质
WO2023221000A1 (zh) 一种核心网中ai功能的认证授权方法及其装置
WO2024098219A1 (zh) 一种密钥分发方法、装置、设备及存储介质
WO2024031724A1 (zh) 终端设备能力指示方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22959979

Country of ref document: EP

Kind code of ref document: A1