WO2024060037A1 - Data sensing method, and core network system, core network element and chip - Google Patents
Data sensing method, and core network system, core network element and chip Download PDFInfo
- Publication number
- WO2024060037A1 WO2024060037A1 PCT/CN2022/120016 CN2022120016W WO2024060037A1 WO 2024060037 A1 WO2024060037 A1 WO 2024060037A1 CN 2022120016 W CN2022120016 W CN 2022120016W WO 2024060037 A1 WO2024060037 A1 WO 2024060037A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- sensing
- terminal
- sensed
- information
- target data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- the present disclosure relates to the field of communication technology, specifically, to a data sensing method, a core network system, a core network element and a chip.
- Wireless sensing technology aims to obtain information about remote objects and their properties without requiring physical contact.
- the data sensed by the object to be sensed can be used for analysis to obtain meaningful information about the object to be sensed or its surrounding environment, which can be used to assist radio resource management, interference suppression, beam management, mobility, etc., in order to facilitate operation in multiple cells.
- Benefits are provided by markets and verticals such as smart transportation, aviation, enterprise, smart cities, smart homes, factories, consumer applications, and the public sector.
- the present disclosure provides a data sensing method, device, core network system, core network element, storage medium and chip.
- a data sensing method is provided and applied to a core network.
- the method includes:
- Receive second information sent by the terminal to be sensed where the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to instruct the sensing requester to perform target data sensing on the terminal to be sensed. permissions.
- a data sensing method is provided, applied to a terminal to be sensed, and the method includes:
- Second information is sent to the core network, where the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- a core network system includes a first network element, a policy control function network element, and an access and mobility management function network element, wherein:
- the first network element is used to determine the first information and the second identification of the terminal to be sensed, and send the first information and the second identification to the policy control function network element;
- the policy control function network element is used to send the first information and the second identifier to the access and mobility management function network element;
- the access and mobility management function network element is configured to send the first information to the terminal corresponding to the second identification, and receive the second information sent by the terminal to be sensed, where the second information includes
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- a core network element is provided.
- the core network element is connected to a policy control function network element in the core network.
- the core network element is used to determine the first information and the third information. two identities, and sends the first information to the terminal to be sensed corresponding to the second identity through the policy control function network element, and the first information is used for the terminal to be sensed to determine the result of sensing privacy verification.
- a data sensing device applied to a core network, and the device includes:
- the first sending module is configured to send first information to the terminal to be sensed, the first information being used by the terminal to be sensed to determine the result of the sensing privacy verification;
- a first receiving module configured to receive second information sent by the terminal to be sensed, where the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to indicate that the sensing requester has The permission of the terminal to be sensed to sense target data.
- a data sensing device applied to a terminal to be sensed, and the device includes:
- the third receiving module is configured to receive the first information sent by the core network
- a determining module configured to determine a result of the perceptual privacy verification in response to the first information
- the third sending module is configured to send second information to the core network, where the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to indicate that the sensing requester is aware of the need for sensing.
- the terminal has permission to sense target data.
- a data sensing device including:
- Memory used to store instructions executable by the processor
- the processor is configured to perform the steps of the data sensing method provided by the first aspect of the present disclosure.
- a data sensing device including:
- Memory used to store instructions executable by the processor
- the processor is configured to perform the steps of the data sensing method provided in the second aspect of the present disclosure.
- a computer-readable storage medium on which computer program instructions are stored.
- the steps of the data sensing method provided by the first aspect of the present disclosure are implemented. .
- a computer-readable storage medium on which computer program instructions are stored.
- the steps of the data sensing method provided by the second aspect of the present disclosure are implemented. .
- a chip including: a processor and an interface; the processor is used to read instructions to execute the steps of the data sensing method provided in the first aspect of the present disclosure,
- a chip including: a processor and an interface; the processor is configured to read instructions to execute the steps of the data sensing method provided in the second aspect of the disclosure.
- first information for determining the result of the perceptual privacy verification is sent to the terminal to be sensed through the core network, and second information including the result of the perceptual privacy verification is received through the core network. Since the result of the sensing privacy verification is used to indicate the sensing requester's authority to sense the target data of the terminal to be sensed, the terminal to be sensed can perform sensing authority verification on the sensing requester, and then decide whether to agree to the sensing requester to treat the sensing terminal. Perceiving target data, through the process of authority verification, can protect the sensing data transmission process of the terminal to be sensed and improve the security of the terminal to be sensed.
- FIG. 1 is a schematic diagram of a communication system according to an exemplary embodiment.
- Figure 2 is a schematic diagram of another communication system according to an exemplary embodiment.
- Figure 3 is a flow chart of a data sensing method according to an exemplary embodiment.
- Figure 4 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 5 is a flow chart of another data sensing method according to an exemplary embodiment.
- Figure 6 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 7 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 8 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 9 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 10 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 11 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 12 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 13 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 14 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 15 shows a core network system according to an exemplary embodiment.
- Figure 16 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 17 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 18 is a block diagram of a data sensing device according to an exemplary embodiment.
- Figure 19 is a block diagram of a data sensing device according to an exemplary embodiment.
- Figure 20 is a block diagram of a data sensing device according to an exemplary embodiment.
- Figure 21 is a block diagram of a data sensing device according to an exemplary embodiment.
- plural refers to two or more than two, and other quantifiers are similar; “at least one of the following”, “one or more” “Item (items)” or similar expressions refer to any combination of these items (items), including any combination of single items (items) or plural items (items).
- one or more items in a, b, or c can mean: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c can be single, It can also be multiple; "and/or" is an association relationship that describes associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A exists alone, A and B exist simultaneously, alone There are three cases of B, where A and B can be singular or plural.
- the technical solutions of the embodiments of this application can be applied to various communication systems.
- the communication system may include one or more of a 4G (the 4th Generation, fourth generation) communication system, a 5G (the 5th Generation, the fifth generation) communication system, and other future wireless communication systems (such as 6G).
- the communication system may also include Public Land Mobile Network (PLMN) network, non-terrestrial network communication system, Device-to-Device (D2D) communication system, Machine to Machine (Machine to Machine) , M2M) communication system, Internet of Things (IoT) communication system, Vehicle-to-Everything (V2X) communication system or one or more of other communication systems.
- PLMN Public Land Mobile Network
- D2D Device-to-Device
- M2M Machine to Machine
- IoT Internet of Things
- V2X Vehicle-to-Everything
- FIG. 1 is a schematic diagram of a communication system according to an exemplary embodiment.
- the communication system may include a terminal to be sensed 101, a core network 102, and a sensing requesting terminal 103.
- the communication system can be used to support 4G (the4th Generation, fourth generation) network access technology, such as Long Term Evolution (LTE) access technology, or 5G (the 5th Generation, fifth generation) network access Technology, such as New Radio Access Technology (New RAT), or other future wireless communication technologies.
- LTE Long Term Evolution
- 5G the 5th Generation, fifth generation network access Technology, such as New Radio Access Technology (New RAT), or other future wireless communication technologies.
- the number of the above-mentioned terminals 101 to be sensed or the terminals 103 to be sensed may be one or more.
- the number of terminals 101 to be sensed or the number of sensing requesting terminals 103 in the communication system shown in Figure 1 is only This is an example of the adaptability of an embodiment, and this disclosure does not limit
- the terminal to be sensed 101 or the sensing requesting terminal 103 in Figure 1 can be an electronic device that provides voice or data connectivity, for example, it can also be called user equipment (User Equipment, UE), subscriber unit (Subscriber Unit), mobile station (Mobile Station), station (Station), terminal equipment, etc.
- the terminal may include a smartphone, a smart wearable device, a smart speaker, a smart tablet, a wireless modem (modem), a wireless local loop (Wireless Local Loop, WLL) station, or a PDA (Personal Digital Assistant). , CPE (Customer Premise Equipment, customer terminal equipment), etc.
- devices that can access the communication system, communicate with the base station of the communication system, or communicate with other objects through the communication system can be terminals in the embodiments of the present disclosure, for example, in intelligent transportation terminals and cars, household equipment in smart homes, power meter reading instruments in smart grids, voltage monitoring instruments, environmental monitoring instruments, video monitoring instruments in smart security networks, cash registers, etc.
- Fig. 2 is a schematic diagram of another communication system according to an exemplary embodiment.
- the communication system may include a sensing request terminal 201, a first network element (Sensing Application Function, SAF) 202, a policy control function network element (Policy Control Function, PCF) 203, a session management function network element (Session Management Function, SMF) 204, a user plane function network element (User Plane Function, UPF) 205, an access and mobility management function network element (Access and Mobility Management Function, AMF) 206, a radio access network (Radio Access Network, RAN) 207 and a terminal to be sensed 208.
- SAF Signal Application Function
- PCF Policy Control Function
- SMF Session Management Function
- UPF User Plane Function
- UPF Access and Mobility Management Function
- AMF Access and Mobility Management Function
- the data awareness method of the embodiment of the present disclosure can be applied to the following scenarios, for example:
- Real-time environmental monitoring Use the perceived wireless signals to reconstruct the environmental map to further improve positioning accuracy and empower environment-related applications, such as dynamic 3D map-assisted driving, pedestrian traffic statistics, intrusion and a series of real-time monitoring-related application detection and traffic detection. wait.
- environment-related applications such as dynamic 3D map-assisted driving, pedestrian traffic statistics, intrusion and a series of real-time monitoring-related application detection and traffic detection. wait.
- Self-driving cars/drones Self-driving car/drone applications have some common functional requirements. For example, self-driving cars/drones should support Detect and Avoid (DAA) to avoid obstacles. At the same time, autonomous vehicles/drone should have the ability to monitor path information, such as choosing routes and obeying traffic rules. Therefore, using the sensed data can help complete obstacle avoidance and monitor path information.
- DAA Detect and Avoid
- Air pollution monitoring The quality of the received wireless signal exhibits different attenuation characteristics with changes in air humidity, air particulate matter (PM) concentration, carrier frequency, etc. Therefore, the sensed data can be used to help detect weather or air quality.
- PM air particulate matter
- the type of perception data of the terminal to be perceived may be different.
- the sensing data can be the location and channel environment of the terminal to be sensed, which can be used to help narrow the beam scanning range and shorten the beam training time.
- the sensing data can be the position, speed, motion trajectory and channel environment of the terminal to be sensed for beam prediction, which can reduce the overhead of beam measurement and the delay of beam tracking.
- the sensing data can be attributes of the terminal to be sensed (direction, size, shape, etc.) and the channel environment can be used to improve the performance of channel estimation.
- the sensing data may also be data such as the trajectory of the terminal to be sensed.
- the sensing data may be data perceived by the terminal to be sensed itself, or data received by the terminal to be sensed from the external environment.
- Figure 3 shows a data sensing method according to an exemplary embodiment, which can be applied to the core network in the above communication system. As shown in Figure 3, the method may include:
- S310 Send first information to the terminal to be perceived, where the first information is used by the terminal to be perceived to determine a result of the perceived privacy verification.
- S320 Receive the second information sent by the terminal to be sensed.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the terminal to be sensed can be understood as a terminal that sends sensing data.
- the terminal to be sensed can obtain sensing data in various ways. For example, it can detect through its own sensor to obtain sensing data, or it can combine the detected data with a processor to process the sensing data to obtain sensing data. It can also obtain sensing data from other sources. The device receives the sensing data.
- the sensing requester can be understood as a terminal that requests sensing data from the terminal to be sensed.
- the sensing requester can be the core network itself or other terminals connected to the core network.
- the target data can be understood as a certain type of sensing data that the sensing requester requests from the terminal to be sensed according to the scene needs.
- the permission of the sensing requester to sense the target data of the terminal to be sensed may include the terminal to be sensed agreeing to the sensing requester to sense the target data, that is, the sensing requester can obtain the target data from the terminal to be sensed through the core network, and the terminal to be sensed refuses
- the sensing requester senses the target data, that is, the sensing requester cannot obtain the target data from the terminal to be sensed through the core network.
- the information used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed includes information indicating that the sensing requester is allowed to perform target data sensing on the terminal to be sensed, and information indicating the rejection of the sensing requestor to perform target data sensing on the terminal to be sensed.
- the second information may include multiple fields. These multiple fields may be used to fill in information indicating that the sensing requester agrees to perform target data sensing on the terminal to be sensed, and to represent rejecting the sensing request according to the actual situation. Information about the party to sense the target data of the terminal to be sensed, information representing the reason why the sensing requester refuses to sense the target data to the terminal to be sensed, the identification of the device that agrees to sense the target data to the terminal to be sensed, and the refusal to sense the terminal to sense the target data. The identification of the device.
- the information representing the refusal of the sensing requester to sense the target data of the terminal to be sensed, and the information characterizing the reason for refusing the sensing requester to sense the target data of the terminal to be sensed can be filled in different fields of the second information at the same time. in the field.
- the perceptual privacy verification result determined by the terminal to be sensed may be determined by the terminal to be sensed itself based on the first information, or may be determined by the terminal to be sensed receiving a triggering operation of the user's input operation control of the perceptual privacy verification result. Generated.
- the first information may include a first identification of the sensing requester (for example, it may be a core network or a sensing requesting terminal connected to the core network), information characterizing the type of target data to be sensed, and Perceived privacy verification instructions.
- a first identification of the sensing requester for example, it may be a core network or a sensing requesting terminal connected to the core network
- information characterizing the type of target data to be sensed for example, it may be a core network or a sensing requesting terminal connected to the core network
- Perceived privacy verification instructions for example, it may be a core network or a sensing requesting terminal connected to the core network.
- the first information for determining the result of the perceptual privacy verification can be sent to the terminal to be sensed through the core network, and the second information including the result of the perceptual privacy verification can be received through the core network. Since the result of the sensing privacy verification is used to indicate the sensing requester's permission to sense the target data of the terminal to be sensed, the terminal to be sensed can verify the sensing authority of the sensing requester and then decide whether to agree to the sensing requester to sense the target data of the terminal to be sensed. Through the process of permission verification, the sensing data transmission process of the terminal to be sensed can be protected and the security of the terminal to be sensed can be improved.
- FIG4 is a data perception method according to an exemplary embodiment.
- the data perception method is applied to a core network, as shown in FIG4 , and the method may include:
- S410 Send the first information to the terminal to be sensed.
- the first information is used by the terminal to be sensed to determine the result of sensing privacy verification.
- step S410 in this embodiment is the same as the above-mentioned step S310, and reference can be made to the above-mentioned step S310, which will not be described again here.
- S420 Receive the second information sent by the terminal to be sensed.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- S430 Receive the sensed target data sent by the terminal to be sensed.
- the target data is sent when the sensing requester agrees to sense the target data of the terminal to be sensed.
- the terminal to be sensed can send the sensed target data to the core network, so that the core network can receive the target data to be sensed.
- Sensed target data sent by the terminal if the result of the sensing privacy verification is that the sensing requester agrees to perform target data sensing on the terminal to be sensed, the terminal to be sensed can send the sensed target data to the core network, so that the core network can receive the target data to be sensed. Sensed target data sent by the terminal.
- the core network may send the target data to the sensing requester.
- step S430 the process of receiving the sensed target data sent by the terminal to be sensed may be performed simultaneously with the process of receiving the second information sent by the terminal to be sensed in step S420, that is, the target The data can be carried in the second message. That is to say, after the core network sends the first information to the terminal to be sensed, if the terminal to be sensed determines that it agrees with the sensing requester to sense the target data of the terminal to be sensed, the terminal to be sensed can carry the result of the sensing privacy verification and the target data at the same time. In the second information, it is sent to the core network together.
- the process of receiving the sensed target data sent by the terminal to be sensed in step S430 and the process of receiving the second information sent by the terminal to be sensed in step S420 may also be executed independently one after another.
- the terminal to be sensed may actively send the sensed target data to the core network.
- the core network may send a message for requesting target data to the terminal to be sensed, so that the terminal to be sensed can respond to the message for requesting target data after receiving the message for requesting target data. , sending the perceived target data to the core network.
- the terminal to be sensed can then send the target data to the core network after agreeing to the sensing requester to sense the target data of the terminal to be sensed, thereby protecting the sensing data transmission process of the terminal to be sensed and improving the security of the terminal to be sensed.
- Figure 5 illustrates a data sensing method according to an exemplary embodiment. This data sensing method is applied to the core network, and the sensing requester is the sensing requesting terminal connected to the core network. As shown in Figure 5, this method may include:
- S510 Receive the sensing request sent by the sensing requesting terminal.
- S530 Receive the second information sent by the terminal to be sensed.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the sensing requesting terminal when it needs to obtain sensing data, it can send a sensing request to the core network. After receiving the sensing request sent by the sensing requesting terminal, the core network can respond to the sensing request and send a third sensing request to the terminal to be sensed. After receiving the first information, the second information sent by the terminal to be sensed can be received.
- the process of sending the first information to the terminal to be sensed in step S520 and the process of receiving the second information sent by the terminal to be sensed in step S530 can refer to the foregoing embodiments and will not be described again here.
- the method may also include the step of receiving the sensed target data sent by the terminal to be sensed.
- the step of receiving the sensed target data sent by the terminal to be sensed please refer to the foregoing embodiments and will not be described again here.
- the core network can send the first information to the terminal to be sensed when receiving the sensing request sent by the sensing requesting terminal.
- Figure 6 shows a data sensing method according to an exemplary embodiment.
- the data sensing method is applied to the core network.
- the sensing requester is a sensing requesting terminal connected to the core network.
- the sensing request includes the first identification of the sensing requesting terminal, the second identification of the terminal to be sensed and the type of target data to be sensed.
- Information as shown in Figure 6, the method may include:
- S610 Receive the sensing request sent by the sensing requesting terminal.
- S620 In response to the sensing request, generate sensing privacy verification instruction information.
- S630 Send the first identifier, information characterizing the type of target data to be sensed, and sensing privacy verification instruction information as first information to the terminal corresponding to the second identifier.
- S640 Receive the second information sent by the terminal to be sensed.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- step S610 and step S640 reference may be made to the foregoing embodiments and will not be described again here.
- the sensing request includes the first identity of the sensing requesting terminal, the second identity of the terminal to be sensed, and information characterizing the type of target data to be sensed, but does not include sensing privacy verification indication information, so that the core network receives
- the sensing request sent by the sensing requesting terminal understands that the sensing requesting terminal wants to obtain sensing data from the terminal to be sensed. Therefore, sensing privacy verification indication information can be generated first, and then the first identifier represents the type of target data to be sensed.
- the information and the perceptual privacy verification instruction information are sent as the first information to the terminal corresponding to the second identification to instruct the terminal to be sensed to perform the perceptual privacy verification and return the second information.
- the first identifier may be a Generic Public Subscription Identifier (GPSI).
- GPSI Generic Public Subscription Identifier
- the second identification may be a user permanent identifier (SUbscription Permanent Identifier, SUPI).
- SUPI user Permanent Identifier
- the method may also include the step of receiving the sensed target data sent by the terminal to be sensed.
- the step of receiving the sensed target data sent by the terminal to be sensed please refer to the foregoing embodiments and will not be described again here.
- the sensing requesting terminal does not need to send a sensing request carrying sensing privacy verification indication information, that is, the sensing privacy verification indication information can be generated by the core network in response to the sensing request.
- Figure 7 shows a data sensing method according to an exemplary embodiment.
- the data sensing method is applied to the core network.
- the sensing requester is a sensing requesting terminal connected to the core network.
- the sensing request includes the first identification of the sensing requesting terminal, the second identification of the terminal to be sensed, and the type of target data to be sensed. information and perceived privacy verification indication information, as shown in Figure 7.
- the method may include:
- S710 Receive the sensing request sent by the sensing requesting terminal.
- S720 Send the first identifier, information characterizing the type of target data to be sensed, and sensing privacy verification instruction information as first information to the terminal corresponding to the second identifier.
- S730 Receive the second information sent by the terminal to be sensed.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- step S710 and step S730 reference may be made to the foregoing embodiments and will not be described again here.
- the method may also include the step of receiving the sensed target data sent by the terminal to be sensed.
- the step of receiving the sensed target data sent by the terminal to be sensed please refer to the foregoing embodiments and will not be described again here.
- the sensing request terminal can send a sensing request carrying sensing privacy verification indication information, that is, the sensing privacy verification indication information can be sent by the sensing requesting terminal.
- Figure 8 illustrates a data sensing method according to an exemplary embodiment.
- the data sensing method is applied to the core network.
- the sensing requester is a sensing requesting terminal connected to the core network.
- the sensing request includes the first identification of the sensing requesting terminal, the second identification of the terminal to be sensed and the type of target data to be sensed.
- Information as shown in Figure 8, the method may include:
- S810 Receive the sensing request sent by the sensing requesting terminal.
- S820 In response to the perception request, send first information to the terminal to be perceived.
- S830 Receive the second information sent by the terminal to be sensed.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the sensing response includes the sensed target data, information representing the rejection of the sensing requesting terminal to sense the target data by the sensing terminal to be sensed, and the reason for rejecting the sensing requesting terminal to sense the target data of the sensing terminal to be sensed. At least one of the information, target data, is sent under the condition that the sensing requester agrees to perform target data sensing on the terminal to be sensed.
- steps S810 to S830 reference may be made to the foregoing embodiments and will not be described again here.
- the core network can send a sensing response to the sensing requesting party. Therefore, the sensing response can include the sensed target data, indicating that the sensing requesting terminal rejects the sensing requesting terminal. Information about the target data sensing by the to-be-sensing terminal, and at least one of the information representing the reason for rejecting the sensing requesting terminal to sense the target data by the to-be-sensing terminal.
- the target data is a situation in which the sensing requesting party agrees to the sensing requester to sense the target data by the to-be-sensing terminal. Sent below.
- the sensing response may include multiple fields. These multiple fields may be used to fill in the sensed target data according to the actual situation, to represent the information that rejects the sensing request terminal and to sense the target data of the to-be-sensed terminal. Information about the reasons why the sensing requesting terminal rejects target data sensing by the sensing terminal.
- the core network receives the target data sent by the terminal to be sensed, the target data can be filled in the corresponding field of the sensing response and sent to the sensing requesting terminal.
- the second information received by the core network is information indicating that the sensing requester refuses to sense the target data of the terminal to be sensed
- the information indicating that the sensing requester refuses to sense the target data of the terminal to be sensed can be filled into the corresponding field of the sensing response, and is sent to the sensing requesting terminal
- the second information also includes information representing the reason for rejecting the sensing requesting party to perform target data sensing on the to-be-sensing terminal
- the core network may also express the reason for rejecting the sensing requesting party to perform target data sensing on the to-be-sensing terminal.
- the information, as well as the information representing the reason why the sensing requester refuses to sense the target data by the sensing terminal are filled in the corresponding fields of the sensing response and sent to the sensing requesting terminal.
- the core network can return a sensing response to the sensing request terminal to inform the result of the sensing request.
- Figure 9 illustrates a data sensing method according to an exemplary embodiment. This data awareness method is applied to the core network.
- the core network includes the first network element, the policy control function network element, and the access and mobility management function network element. As shown in Figure 9, the method may include:
- S910 Determine the first information and the second identification of the terminal to be sensed through the first network element.
- the first information may include a first identification of the sensing requester (for example, it may be a core network or a sensing requesting terminal connected to the core network), information characterizing the type of target data to be sensed, and a sensing privacy verification indication. information.
- the first network element when the sensing requester is the core network, can obtain the first identifier corresponding to the core network, information characterizing the type of target data to be sensed, and sensing privacy verification indication information from the core network related equipment. , thereby determining the obtained first identification, information characterizing the type of target data to be sensed, and sensing privacy verification indication information as the first information.
- the first network element can also directly obtain the second identifier from relevant functional equipment of the core network.
- the sensing requester is a sensing requesting terminal connected to the core network
- the detailed description of the first network element determining the first information and the second identification of the terminal to be sensed can refer to the foregoing embodiments, which will not be discussed here. Again.
- the first network element can be understood as a newly added network element in the core network.
- it can be named a sensing application function network element.
- S920 Send the first information and the second identification to the policy control function network element through the first network element.
- the first request may be sent to the policy control function network element through the first network element, where the first request includes the first information and the second identification.
- the first request is a newly added request in this embodiment of the present disclosure.
- the first information may include a first identity of the sensing requesting terminal, information characterizing the type of target data to be sensed, and sensing privacy verification indication information. Therefore, the first request may include a first identity, characterizing the target to be sensed. Information about the type of data and perceived privacy verification instructions.
- S930 Send the first information and the second identification to the access and mobility management function network element through the policy control function network element.
- a second request may be sent to the access and mobility management function network element through the policy control function network element, where the second request includes the second identifier and the first information.
- the second request may be a Namf_Communication_N1N2MessageTransfer request, the Namf_Communication_N1N2MessageTransfer request includes the second identifier and the N1 message, and the N1 message includes the first information.
- S940 Send the first information to the terminal corresponding to the second identification through the access and mobility management function network element.
- a notification message may be sent to the terminal corresponding to the second identity through the access and mobility management function network element, where the notification message includes the first information.
- the notification message may be a non-access notification (NAS Notification) message, and the non-access notification message includes the first information.
- NAS Notification non-access notification
- S950 Receive the second information sent by the terminal to be sensed.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the first information and the second identification of the terminal to be sensed may be determined first through the first network element. After the first information and the second identification of the terminal to be sensed are determined, the first information may be determined through the first network element. The information and the second identification are sent to the policy control function network element, and then the first information and the second identification are sent to the access and mobility management function network element through the policy control function network element, and then the access and mobility management function network element can be The mobility management function network element sends the first information to the terminal corresponding to the second identification.
- step S950 receiving the second information sent by the terminal to be sensed, may include the following steps:
- the access and mobility management function network element receives the second information sent by the terminal to be sensed; the access and mobility management function network element sends the second information to the policy control function network element, and the policy control function network element sends the second information to the policy control function network element.
- the second information is sent to the first network element.
- the notification message response sent by the terminal to be sensed may be received through the access and mobility management function network element, where the notification message response includes the second information.
- the notification message response may be, for example, a non-access notification (NAS Notification) response, and the non-access notification response includes the second information.
- NAS Notification non-access notification
- a second request response may be sent to the policy control function network element through the access and mobility management function network element, where the second request response includes the second information.
- the second request response may be, for example, a Namf_Communication_N1N2MessageTransfer response, and the Namf_Communication_N1N2MessageTransfer response includes the second information.
- the first request response may be sent to the first network element through the policy control function network element.
- the first request response may include the second information.
- the first request response may be, for example, a sensing policy control response (Npcf_SensingPolicyControl Response).
- the sensing policy control response includes the second information.
- the perception policy control response is a newly added response message.
- Figure 10 shows a data sensing method according to an exemplary embodiment, which can be applied to the terminal to be sensed in the above communication system. As shown in Figure 10, the method may include:
- S1010 Receive the first information sent by the core network.
- S1030 Send second information to the core network.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the terminal to be sensed can receive the first information sent by the core network, then respond to the first information, determine the result of the sensing privacy verification, and then send the second information to the core network. Since the result of the sensing privacy verification is used to indicate the sensing requester's permission to sense the target data of the terminal to be sensed, the terminal to be sensed can verify the sensing authority of the sensing requester and then decide whether to agree to the sensing requester to sense the target data of the terminal to be sensed. Through the process of permission verification, the sensing data transmission process of the terminal to be sensed can be protected and the security of the terminal to be sensed can be improved.
- Figure 11 illustrates a data sensing method according to an exemplary embodiment.
- the data sensing method is applied to the terminal to be sensed, as shown in Figure 11.
- the method may include:
- S1130 Send second information to the core network.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- S1140 Send the sensed target data to the core network.
- the target data is sent when the sensing requester agrees to sense the target data of the terminal to be sensed.
- the terminal to be sensed can send the sensed target data to the core network, so that the core network can receive the target data to be sensed.
- Sensed target data sent by the terminal if the result of the sensing privacy verification is that the sensing requester agrees to perform target data sensing on the terminal to be sensed, the terminal to be sensed can send the sensed target data to the core network, so that the core network can receive the target data to be sensed. Sensed target data sent by the terminal.
- the core network may send the target data to the sensing requester.
- the terminal to be sensed agrees with the sensing requester to sense the target data of the terminal to be sensed, and then sends the target data to the core network, thereby protecting the sensing data transmission process of the terminal to be sensed and improving the security of the terminal to be sensed.
- the process of sending the perceived target data to the core network in step S1140 may be performed simultaneously with the process of sending the second information to the core network in step S1130. That is, the target data may be carried in in the second message. That is to say, the terminal to be sensed can simultaneously carry the result of sensing privacy verification and the target data in the second information, and send them to the core network together.
- the process of sending the second information to the core network in step S1130 and the process of sending the sensed target data to the core network in step S1140 may also be executed independently one after another.
- the terminal to be sensed may actively send the sensed target data to the core network.
- the core network may send a message for requesting target data to the terminal to be sensed, so that the terminal to be sensed can respond to the message for requesting target data after receiving the message for requesting target data. , sending the perceived target data to the core network. Therefore, please refer to FIG. 12 , which illustrates a data sensing method according to an exemplary embodiment.
- the data sensing method is applied to the terminal to be sensed, as shown in Figure 12.
- the method may include:
- S1210 Receive the first information sent by the core network.
- S1130 Send second information to the core network.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- S1250 In response to the sensing request sent by the core network, the sensed target data is sent to the core network.
- the target data is sent when the sensing requester agrees to sense the target data of the terminal to be sensed.
- the sensing request sent by the core network may be generated by the core network itself. For example, it may be generated by the core network after receiving the second information to agree that the sensing requester performs target data sensing on the terminal to be sensed.
- the sensing request may also be generated by the core network. The sensing request sent by the party again.
- FIG. 13 is a data sensing method according to an exemplary embodiment.
- the data sensing method is applied to a terminal to be sensed. As shown in FIG. 13 , the method may include:
- S1310 Receive the first information sent by the core network.
- S1320 In response to the first information, display an input operation control for the result of the privacy-aware verification.
- S1330 Receive a trigger operation of the input operation control for the result of perceptual privacy verification, and determine the result of perceptual privacy verification.
- S1340 Send second information to the core network.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the terminal to be sensed after receiving the first information, can display the input operation control for the result of the sensing privacy verification to the operator, such as the user of the terminal to be sensed, so that the operator can trigger the input operation control according to the situation.
- the terminal to be sensed can determine the result of the sensing privacy verification based on the operator's triggering operation.
- the first identification in response to the first information, may also be displayed.
- the input operation control includes a selection control indicating that the sensing requester agrees to perform target data sensing on the sensing terminal to be sensed, a selection control indicating a rejection of the sensing requesting party to perform target data sensing on the sensing terminal to be sensed, and a selection control indicating a rejection of the sensing requesting party to perform target data sensing on the sensing terminal to be sensed.
- At least one of an input control for a reason for data sensing an input control representing the identity of a device that agrees to perform target data sensing on the to-be-sensored terminal, and an input control that rejects the identity of a device that refuses to perform target data sensing on the to-be-sensored terminal.
- the operator of the terminal to be sensed can determine the permission of the sensing requester to sense the target data of the terminal to be sensed.
- the terminal to be sensed after receiving the first information sent by the core network, the terminal to be sensed can also directly determine the result of the sensing privacy verification according to the preset policy, and then send the second information to the core network.
- Figure 14 shows a data sensing method according to an exemplary embodiment. This data sensing method is applied to the terminal to be sensed.
- the core network includes access and mobility management function network elements, as shown in Figure 14. This method may include:
- S1410 Receive the first information sent by the access and mobility management function network element.
- the terminal to be sensed may receive a non-access notification (NAS Notification) message sent by the access and mobility management function network element, where the non-access notification message includes the first information.
- NAS Notification non-access notification
- S1430 Send second information to the access and mobility management function network element.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the terminal to be sensed may send a non-access notification (NAS Notification) response to the access and mobility management function network element, and the non-access notification response includes the second information.
- NAS Notification non-access notification
- FIG15 is a core network system 1500 according to an exemplary embodiment.
- the core network system 1500 includes a first network element 1510, a policy control function network element 1520, and an access and mobility management function network element 1530. Among them:
- the first network element 1510 is used to determine the first information and the second identification of the terminal to be sensed, and send the first information and the second identification to the policy control function network element;
- the policy control function network element 1520 is used to send the first information and the second identification to the access and mobility management function network element;
- the access and mobility management function network element 1530 is configured to send the first information to the terminal corresponding to the second identification, and receive the second information sent by the terminal to be sensed.
- the second information includes the result of the perceived privacy verification, and the perceived privacy verification The result is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the access and mobility management function network element 1530 is also used to send the second information to the policy control function network element;
- the policy control function network element is further used to send the second information to the first network element.
- the sensing requester is a sensing requesting terminal connected to the core network system 1500.
- the first network element 1510 is also used to send a sensing response to the sensing requesting terminal.
- the sensing response includes the sensed target data, indicating the rejection of sensing.
- the target data is obtained by agreeing to the sensing requester to perform target data sensing on the to-be-sensed terminal. Sent under circumstances.
- a core network element is also shown.
- the core network element may be the first network element in Figure 15.
- the core network element is consistent with the policy in the core network.
- the control function network element is connected.
- the core network element is used to determine the first information and the second identification, and sends the first information to the terminal to be sensed corresponding to the second identification through the policy control function network element.
- the first information is used by the terminal to be sensed to determine the result of sensing privacy verification.
- the process of the core network element sending the first information to the terminal to be sensed corresponding to the second identification through the policy control function element can refer to the relevant descriptions in the previous embodiments, for example , the first information and the second identification may be sent to the policy control function network element first, and then the first information and the second identification may be sent to the policy control function network element through the policy control function network element.
- the access and mobility management function network element then sends the first information to the terminal corresponding to the second identification through the access and mobility management function network element.
- the core network element may also receive second information and a sensing response from the terminal to be sensed.
- second information received by the core network element from the terminal to be sensed and the sensing response please refer to the foregoing embodiments and will not be described again here.
- Figure 16 illustrates a data sensing method according to an exemplary embodiment.
- the data awareness method may include:
- the sensing request terminal sends a sensing request to the core network.
- the sensing request includes a first identity of the sensing requesting terminal, a second identity of the terminal to be sensed, and information characterizing the type of target data to be sensed.
- S1620 The core network determines the first information and the second identifier according to the sensing request.
- the first information includes a first identification, information characterizing the type of target data to be sensed, and sensing privacy verification indication information.
- S1630 The core network sends the first information to the terminal to be sensed corresponding to the second identification.
- the terminal to be sensed responds to the first information and determines the result of the sensing privacy verification.
- S1650 The terminal to be sensed sends the second information to the core network.
- the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- S1660 The core network sends a sensing response to the sensing requesting terminal.
- the sensing response is sensed target data
- the target data is sent when the sensing requester agrees to perform target data sensing on the terminal to be sensed.
- the sensing response is information indicating that the sensing requesting terminal rejects the target data sensing of the terminal to be sensed.
- the sensing response is information representing the refusal of the sensing requesting terminal to perform target data sensing on the to-be-sensed terminal, and information characterizing the reason for rejecting the sensing requesting terminal to perform target data sensing on the to-be-sensing terminal.
- Fig. 17 is a data perception method according to an exemplary embodiment. As shown in Fig. 17, the data perception method may include:
- the sensing request terminal sends a sensing request to the first network element.
- the sensing request includes a first identity of the sensing requesting terminal, a second identity of the terminal to be sensed, and information characterizing the type of target data to be sensed.
- S1720 The first network element sends a sensing policy control request to the policy control function network element.
- the sensing policy control request includes a first identifier, a second identifier, information characterizing the type of target data to be sensed, and sensing privacy verification indication information.
- the policy control function network element sends a Namf_Communication_N1N2MessageTransfer request to the access and mobility management function network element.
- the Namf_Communication_N1N2MessageTransfer request includes a second identifier and an N1 message.
- the N1 message includes a first identifier, information characterizing the type of target data to be sensed, and sensing privacy verification indication information.
- the access and mobility management function network element sends a non-access notification message to the terminal to be sensed corresponding to the second identification.
- the non-access notification message includes the N1 message.
- the sensing terminal sends a non-access notification response to the access and mobility management function network element.
- the non-access notification response includes the result of perceptual privacy verification.
- S1760 The access and mobility management function network element sends a Namf_Communication_N1N2MessageTransfer response to the policy control function network element.
- the Namf_Communication_N1N2MessageTransfer response includes the results of privacy-aware verification.
- the policy control function network element sends a sensing policy control response to the first network element.
- the perceptual policy control response includes the result of perceptual privacy verification.
- S1780 The first network element sends the sensing privacy verification result to the sensing requesting terminal.
- Figure 18 is a block diagram of a data sensing device 1800 according to an exemplary embodiment.
- the data sensing device can be applied to the core network.
- the device 1800 can include:
- the first sending module 1810 is configured to send first information to the terminal to be sensed, where the first information is used for the terminal to be sensed to determine the result of sensing privacy verification.
- the first receiving module 1810 is configured to receive second information sent by the terminal to be sensed, where the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to indicate that the sensing requester has Describes the permission of the terminal to be sensed to sense target data.
- apparatus 1800 further includes:
- the second receiving module is configured to receive the sensed target data sent by the terminal to be sensed, where the target data is sent under the condition that the sensing requester agrees to perform target data sensing on the terminal to be sensed.
- the sensing requester is a sensing requesting terminal connected to the core network.
- the first sending module 1810 includes:
- the receiving submodule is configured to receive the sensing request sent by the sensing requesting terminal.
- the first sending sub-module is configured to send the first information to the terminal to be sensed in response to the sensing request.
- the sensing request includes the first identity of the sensing requesting terminal, the second identity of the terminal to be sensed, and information characterizing the type of target data to be sensed.
- the first sending submodule is also configured to generate sensing privacy verification indication information in response to the sensing request; using the first identification, the information characterizing the type of target data to be sensed, and the sensing privacy verification indication information as the first information, Sent to the terminal corresponding to the second identification.
- apparatus 1800 further includes:
- the second sending module is configured to send a sensing response to the sensing requesting terminal, where the sensing response includes the sensed target data, information representing the refusal of the sensing requesting terminal to sense the target data of the terminal to be sensed, and At least one of the information representing the reasons for refusing the sensing requesting terminal to sense the target data of the terminal to be sensed, the target data being agreed to by the sensing requesting party to sense the target data of the terminal to be sensed. Sent under circumstances.
- the core network includes a first network element, a policy control function network element, and an access and mobility management function network element.
- the first sending module 1810 includes:
- a determining submodule configured to determine the first information and the second identification of the terminal to be sensed through the first network element
- a second sending submodule is configured to send the first information and the second identifier to the policy control function network element through the first network element;
- the third sending submodule is configured to send the first information and the second identification to the access and mobility management function network element through the policy control function network element;
- the fourth sending sub-module is configured to send the first information to the terminal corresponding to the second identification through the access and mobility management function network element.
- the second sending sub-module is further configured to send a first request to the policy control function network element through the first network element, where the first request includes the first information and the Second identification.
- the third sending submodule is further configured to send a Namf_Communication_N1N2MessageTransfer request to the access and mobility management function network element through the policy control function network element, the Namf_Communication_N1N2MessageTransfer request includes the second identifier and the N1 message, and the N1 message includes the first information.
- the fourth sending sub-module is further configured to send a non-access notification message to the terminal corresponding to the second identification through the access and mobility management function network element, and the non-access notification message including the first information.
- the information indicating the permission of the sensing requester to perform target data sensing on the terminal to be sensed includes indicating that the sensing requester agrees to the sensing requester to perform target data sensing on the terminal to be sensed.
- Figure 19 is a block diagram of a data sensing device 1900 according to an exemplary embodiment.
- the data sensing device can be applied to a terminal to be sensed.
- the device 1900 can include:
- the third receiving module 1910 is configured to receive first information sent by the core network
- the determining module 1920 is configured to determine the result of the perceptual privacy verification in response to the first information
- the third sending module 1930 is configured to send second information to the core network, where the second information includes the result of the perceptual privacy verification, and the result of the perceptual privacy verification is used to instruct the perceptual requester to The permission of the sensing terminal to sense target data.
- apparatus 1900 further includes:
- the fourth sending module is configured to send the sensed target data to the core network, where the target data is sent under the condition that the sensing requester agrees to perform target data sensing on the terminal to be sensed.
- the fourth sending module is further configured to receive a sensing request sent by the core network; in response to the sensing request, send the sensed target data to the core network.
- the determining module 1920 is further configured to, in response to the first information, display an input operation control for the result of the privacy-aware verification; receive a triggering operation for the input operation control for the result of the privacy-aware verification, and determine The result of said perceived privacy verification.
- the input operation control includes at least one of a selection control representing the consent of the perception requester to perform target data perception on the terminal to be perceived, a selection control representing the refusal of the perception requester to perform target data perception on the terminal to be perceived, an input control representing the reason for refusal of the perception requester to perform target data perception on the terminal to be perceived, an input control representing the identification of a device that agrees to perform target data perception on the terminal to be perceived, and an input control representing the identification of a device that refuses to perform target data perception on the terminal to be perceived.
- the core network includes an access and mobility management function network element
- the third receiving module 1910 is also configured to receive the first information sent by the access and mobility management function network element.
- the core network includes an access and mobility management function network element
- the third sending module 1930 is further configured to send the second information to the access and mobility management function network element.
- FIG 20 is a block diagram of a data sensing device according to an exemplary embodiment.
- the data sensing device 2000 may be the core network in the communication system shown in Figure 1 .
- the apparatus 2000 may include one or more of the following components: a processing component 2002, a memory 2004, and a communication component 2006.
- the processing component 2002 may be used to control the overall operations of the device 2000, such as operations associated with display, data communications, camera operations, and recording operations.
- the processing component 2002 may include one or more processors 2020 to execute instructions to complete all or part of the steps of the above-mentioned data sensing method.
- processing component 2002 may include one or more modules that facilitate interaction between processing component 2002 and other components.
- processing component 2002 may include a multimedia module to facilitate interaction between the multimedia component and processing component 2002.
- Memory 2004 is configured to store various types of data to support operations at device 2000. Examples of such data include instructions for any application or method operating on device 2000, contact data, phonebook data, messages, pictures, videos, etc.
- Memory 2004 may be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EEPROM), Programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
- SRAM static random access memory
- EEPROM electrically erasable programmable read-only memory
- EEPROM erasable programmable read-only memory
- EPROM Programmable read-only memory
- PROM programmable read-only memory
- ROM read-only memory
- magnetic memory flash memory, magnetic or optical disk.
- Communication component 2006 is configured to facilitate wired or wireless communication between apparatus 2000 and other devices.
- the device 2000 can access a wireless network based on communication standards, such as Wi-Fi, 2G, 3G, 4G, 5G, 6G, NB-IOT, eMTC, etc., or a combination thereof.
- the communication component 2006 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
- the communications component 2006 also includes a near field communications (NFC) module to facilitate short-range communications.
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- Figure 21 is a block diagram of a data sensing device according to an exemplary embodiment.
- the data sensing device 2100 may be a terminal to be sensed in the communication system shown in FIG. 1 , and the terminal to be sensed may be, for example, a mobile phone, a camera, a notebook, a tablet computer, a smart wearable device, etc.
- data sensing device 2100 may include one or more of the following components: processing component 2102, memory 2104, power supply component 2106, multimedia component 2108, audio component 2110, input/output interface 2112, sensor component 2114, and communication component 2116 .
- the processing component 2102 generally controls the overall operations of the data sensing device 2100, such as operations associated with display, phone calls, data communications, camera operations, and recording operations.
- the processing component 2102 may include one or more processors 2120 to execute instructions to complete all or part of the steps of the above method. Additionally, processing component 2102 may include one or more modules that facilitate interaction between processing component 2102 and other components. For example, processing component 2102 may include a multimedia module to facilitate interaction between multimedia component 2108 and processing component 2102.
- Memory 2104 is configured to store various types of data to support operations at data-aware device 2100 . Examples of such data include instructions for any application or method operating on the data-aware device 2100, contact data, phonebook data, messages, pictures, videos, etc.
- Memory 2104 may be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EEPROM), Programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
- SRAM static random access memory
- EEPROM electrically erasable programmable read-only memory
- EEPROM erasable programmable read-only memory
- EPROM Programmable read-only memory
- PROM programmable read-only memory
- ROM read-only memory
- magnetic memory flash memory, magnetic or optical disk.
- Power supply component 2106 provides power to various components of data sensing device 2100.
- Power supply components 2106 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to data sensing device 2100 .
- Multimedia component 2108 includes a screen that provides an output interface between the data sensing device 2100 and the user.
- the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide action.
- multimedia component 2108 includes a front-facing camera and/or a rear-facing camera.
- the front camera and/or the rear camera may receive external multimedia data.
- Each front-facing camera and rear-facing camera can be a fixed optical lens system or have a focal length and optical zoom capabilities.
- Audio component 2110 is configured to output and/or input audio signals.
- audio component 2110 includes a microphone (MIC) configured to receive external audio signals when data sensing device 2100 is in operating modes, such as call mode, recording mode, and voice recognition mode. The received audio signal may be further stored in memory 2104 or sent via communication component 2116 .
- audio component 2110 also includes a speaker for outputting audio signals.
- the input/output interface 2112 provides an interface between the processing component 2102 and a peripheral interface module.
- the peripheral interface module may be a keyboard, a click wheel, a button, etc. These buttons may include, but are not limited to: Home button, Volume buttons, Start button, and Lock button.
- Sensor component 2114 includes one or more sensors that provide various aspects of status assessment for data sensing device 2100 .
- the sensor component 2114 can detect the open/closed state of the data sensing device 2100, the relative positioning of components, such as the display and keypad of the data sensing device 2100, and the sensor component 2114 can also detect the data sensing device 2100 or data. Changes in position of a component of the sensing device 2100, presence or absence of user contact with the data sensing device 2100, orientation or acceleration/deceleration of the data sensing device 2100 and temperature changes of the data sensing device 2100.
- Sensor assembly 2114 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
- Sensor assembly 2114 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
- the sensor component 2114 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
- the communication component 2116 is configured to facilitate wired or wireless communication between the data sensing device 2100 and other devices.
- the data sensing device 2100 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
- the communication component 2116 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
- the communications component 2116 also includes a near field communications (NFC) module to facilitate short-range communications.
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- the apparatus 2000 or the apparatus 2100 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), A field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation is used to perform the above data sensing method.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGA field programmable gate array
- controller microcontroller, microprocessor or other electronic component implementation is used to perform the above data sensing method.
- the above-mentioned device 2000 or device 2100 may be an independent electronic device or a part of an independent electronic device.
- the electronic device may be an integrated circuit (Integrated Circuit, IC) or a chip, where the integrated circuit It can be one IC or a collection of multiple ICs; the chip can include but is not limited to the following types: GPU (Graphics Processing Unit, graphics processor), CPU (Central Processing Unit, central processing unit), FPGA (Field Programmable) Gate Array, programmable logic array), DSP (Digital Signal Processor, digital signal processor), ASIC (Application Specific Integrated Circuit, application specific integrated circuit), SOC (System on Chip, SoC, system on a chip or system-level chip), etc.
- GPU Graphics Processing Unit, graphics processor
- CPU Central Processing Unit, central processing unit
- FPGA Field Programmable
- DSP Digital Signal Processor
- ASIC Application Specific Integrated Circuit
- SOC System on Chip, SoC, system on a chip or system-level chip
- the above integrated circuit or chip can be used to execute executable instructions (or codes) to implement the above data sensing method.
- the executable instructions can be stored in the integrated circuit or chip, or can be obtained from other devices or devices.
- the integrated circuit or chip includes a processor, a memory, and an interface for communicating with other devices.
- the executable instructions can be stored in the processor, and when the executable instructions are executed by the processor, the above-mentioned data sensing method is implemented; or, the integrated circuit or chip can receive the executable instructions through the interface and transmit them to the processor for execution. , to implement the above data-aware method.
- the present disclosure also provides a computer-readable storage medium on which computer program instructions are stored.
- the program instructions are executed by a processor, the steps of the data sensing method provided by the present disclosure are implemented.
- the computer-readable storage medium may be a non-transitory computer-readable storage medium including instructions, for example, it may be the above-mentioned memory 2004 or 2104 including instructions, and the instructions may be executed by the processor 2020 or the device 2100 of the device 2000
- the processor 2120 executes to complete the above data sensing method.
- the non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
- a computer program product comprising a computer program executable by a programmable device, the computer program having a function for performing the above when executed by the programmable device.
- the code portion of the data-aware approach is also provided, the computer program product comprising a computer program executable by a programmable device, the computer program having a function for performing the above when executed by the programmable device.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
本公开涉及通信技术领域,具体地,涉及一种数据感知方法、核心网系统、核心网网元及芯片。The present disclosure relates to the field of communication technology, specifically, to a data sensing method, a core network system, a core network element and a chip.
无线感知技术旨在获取有关远程对象及其特性的信息,而无需物理接触。可以利用待感知对象感知的数据进行分析,从而获得有关待感知对象或者其周围环境的有意义的信息,用于辅助无线电资源管理、干扰抑制、波束管理、移动性等,以便于在多个细分市场和垂直领域,例如智能交通、航空、企业、智慧城市、智能家居、工厂、消费应用、和公共部门等领域带来好处。Wireless sensing technology aims to obtain information about remote objects and their properties without requiring physical contact. The data sensed by the object to be sensed can be used for analysis to obtain meaningful information about the object to be sensed or its surrounding environment, which can be used to assist radio resource management, interference suppression, beam management, mobility, etc., in order to facilitate operation in multiple cells. Benefits are provided by markets and verticals such as smart transportation, aviation, enterprise, smart cities, smart homes, factories, consumer applications, and the public sector.
然而,相关技术中的数据感知方法存在待感知对象安全性低的问题。However, data sensing methods in related technologies have the problem of low security of objects to be sensed.
发明内容Summary of the invention
为克服相关技术中存在的上述问题,本公开提供一种数据感知方法、装置、核心网系统、核心网网元、存储介质及芯片。In order to overcome the above problems existing in related technologies, the present disclosure provides a data sensing method, device, core network system, core network element, storage medium and chip.
根据本公开实施例的第一方面,提供一种数据感知方法,应用于核心网,所述方法包括:According to a first aspect of an embodiment of the present disclosure, a data sensing method is provided and applied to a core network. The method includes:
向待感知终端发送第一信息,所述第一信息用于所述待感知终端确定感知隐私验证的结果;Send first information to the terminal to be sensed, the first information being used by the terminal to be sensed to determine the result of the sensing privacy verification;
接收所述待感知终端发送的第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。Receive second information sent by the terminal to be sensed, where the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to instruct the sensing requester to perform target data sensing on the terminal to be sensed. permissions.
根据本公开实施例的第二方面,提供一种数据感知方法,应用于待感知终端,所述方法包括:According to a second aspect of an embodiment of the present disclosure, a data sensing method is provided, applied to a terminal to be sensed, and the method includes:
接收核心网发送的第一信息;Receive the first information sent by the core network;
响应于所述第一信息,确定感知隐私验证的结果;In response to the first information, determining a result of the perceptual privacy verification;
向所述核心网发送第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。Second information is sent to the core network, where the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
根据本公开实施例的第三方面,提供一种核心网系统,所述系统包括第一网元、策略控制功能网元以及接入与移动性管理功能网元,其中:According to a third aspect of an embodiment of the present disclosure, a core network system is provided, the system includes a first network element, a policy control function network element, and an access and mobility management function network element, wherein:
所述第一网元,用于确定第一信息以及待感知终端的第二标识,并将所述第一信息以及所述第二标识发送给所述策略控制功能网元;The first network element is used to determine the first information and the second identification of the terminal to be sensed, and send the first information and the second identification to the policy control function network element;
所述策略控制功能网元,用于将所述第一信息以及所述第二标识发送给所述接入与移动性管理功能网元;The policy control function network element is used to send the first information and the second identifier to the access and mobility management function network element;
所述接入与移动性管理功能网元,用于将所述第一信息发送给所述第二标识对应的终端,以及接收所述待感知终端发送的第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。The access and mobility management function network element is configured to send the first information to the terminal corresponding to the second identification, and receive the second information sent by the terminal to be sensed, where the second information includes The result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
根据本公开实施例的第四方面,提供一种核心网网元,所述核心网网元与核心网中的策略控制功能网元连接,所述核心网网元用于确定第一信息以及第二标识,并通过所述策略控制功能网元将所述第一信息发送给所述第二标识对应的待感知终端,所述第一信息用于所述待感知终端确定感知隐私验证的结果。According to a fourth aspect of an embodiment of the present disclosure, a core network element is provided. The core network element is connected to a policy control function network element in the core network. The core network element is used to determine the first information and the third information. two identities, and sends the first information to the terminal to be sensed corresponding to the second identity through the policy control function network element, and the first information is used for the terminal to be sensed to determine the result of sensing privacy verification.
根据本公开实施例的第五方面,提供一种数据感知装置,应用于核心网,所述装置包括:According to a fifth aspect of the embodiment of the present disclosure, a data sensing device is provided, applied to a core network, and the device includes:
第一发送模块,被配置为向待感知终端发送第一信息,所述第一信息用于所述待感知终端确定感知隐私验证的结果;The first sending module is configured to send first information to the terminal to be sensed, the first information being used by the terminal to be sensed to determine the result of the sensing privacy verification;
第一接收模块,被配置为接收所述待感知终端发送的第二信息,所述第二信息包括所述 感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。A first receiving module configured to receive second information sent by the terminal to be sensed, where the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to indicate that the sensing requester has The permission of the terminal to be sensed to sense target data.
根据本公开实施例的第六方面,提供一种数据感知装置,应用于待感知终端,所述装置包括:According to a sixth aspect of an embodiment of the present disclosure, a data sensing device is provided, applied to a terminal to be sensed, and the device includes:
第三接收模块,被配置为接收核心网发送的第一信息;The third receiving module is configured to receive the first information sent by the core network;
确定模块,被配置为响应于所述第一信息,确定感知隐私验证的结果;a determining module configured to determine a result of the perceptual privacy verification in response to the first information;
第三发送模块,被配置为向所述核心网发送第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。The third sending module is configured to send second information to the core network, where the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to indicate that the sensing requester is aware of the need for sensing. The terminal has permission to sense target data.
根据本公开实施例的第七方面,提供一种数据感知装置,包括:According to a seventh aspect of the embodiment of the present disclosure, a data sensing device is provided, including:
处理器;processor;
用于存储处理器可执行指令的存储器;Memory used to store instructions executable by the processor;
其中,所述处理器被配置为执行本公开第一方面所提供的数据感知方法的步骤。Wherein, the processor is configured to perform the steps of the data sensing method provided by the first aspect of the present disclosure.
根据本公开实施例的第八方面,提供一种数据感知装置,包括:According to an eighth aspect of the embodiment of the present disclosure, a data sensing device is provided, including:
处理器;processor;
用于存储处理器可执行指令的存储器;Memory used to store instructions executable by the processor;
其中,所述处理器被配置为执行本公开第二方面所提供的数据感知方法的步骤。Wherein, the processor is configured to perform the steps of the data sensing method provided in the second aspect of the present disclosure.
根据本公开实施例的第九方面,提供一种计算机可读存储介质,其上存储有计算机程序指令,该计算机程序指令被处理器执行时实现本公开第一方面所提供的数据感知方法的步骤。According to a ninth aspect of the embodiment of the present disclosure, there is provided a computer-readable storage medium on which computer program instructions are stored. When the computer program instructions are executed by a processor, the steps of the data sensing method provided by the first aspect of the present disclosure are implemented. .
根据本公开实施例的第十方面,提供一种计算机可读存储介质,其上存储有计算机程序指令,该计算机程序指令被处理器执行时实现本公开第二方面所提供的数据感知方法的步骤。According to a tenth aspect of the embodiment of the present disclosure, there is provided a computer-readable storage medium on which computer program instructions are stored. When the computer program instructions are executed by a processor, the steps of the data sensing method provided by the second aspect of the present disclosure are implemented. .
根据本公开实施例的第十一方面,提供一种芯片,包括:处理器和接口;所述处理器用于读取指令以执行本公开第一方面所提供的数据感知方法的步骤,According to an eleventh aspect of the embodiment of the present disclosure, a chip is provided, including: a processor and an interface; the processor is used to read instructions to execute the steps of the data sensing method provided in the first aspect of the present disclosure,
根据本公开实施例的第十二方面,提供一种芯片,包括:处理器和接口;所述处理器用于读取指令以执行本公开第二方面所提供的数据感知方法的步骤。According to a twelfth aspect of an embodiment of the disclosure, a chip is provided, including: a processor and an interface; the processor is configured to read instructions to execute the steps of the data sensing method provided in the second aspect of the disclosure.
在上述技术方案中,通过核心网向待感知终端发送用于确定感知隐私验证的结果第一信息,以及通过核心网接收包括所述感知隐私验证的结果的第二信息。由于感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限,因此,待感知终端可以对感知请求方进行感知权限验证,再决定是否同意感知请求方对待感知终端进行目标数据的感知,通过权限验证的过程,可以保护待感知终端的感知数据传输过程,提高待感知终端的安全性。In the above technical solution, first information for determining the result of the perceptual privacy verification is sent to the terminal to be sensed through the core network, and second information including the result of the perceptual privacy verification is received through the core network. Since the result of the sensing privacy verification is used to indicate the sensing requester's authority to sense the target data of the terminal to be sensed, the terminal to be sensed can perform sensing authority verification on the sensing requester, and then decide whether to agree to the sensing requester to treat the sensing terminal. Perceiving target data, through the process of authority verification, can protect the sensing data transmission process of the terminal to be sensed and improve the security of the terminal to be sensed.
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。It should be understood that the foregoing general description and the following detailed description are exemplary and explanatory only, and do not limit the present disclosure.
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
图1是根据一示例性实施例示出的一种通信系统的示意图。FIG. 1 is a schematic diagram of a communication system according to an exemplary embodiment.
图2是根据一示例性实施例示出的另一种通信系统的示意图。Figure 2 is a schematic diagram of another communication system according to an exemplary embodiment.
图3是根据一示例性实施例示出的一种数据感知方法的流程图。Figure 3 is a flow chart of a data sensing method according to an exemplary embodiment.
图4是根据一示例性实施例示出的另一种数据感知方法的流程图。Figure 4 is a flowchart of another data sensing method according to an exemplary embodiment.
图5是根据一示例性实施例示出的另一种数据感知方法的流程图。Figure 5 is a flow chart of another data sensing method according to an exemplary embodiment.
图6是根据一示例性实施例示出的另一种数据感知方法的流程图。Figure 6 is a flowchart of another data sensing method according to an exemplary embodiment.
图7是根据一示例性实施例示出的另一种数据感知方法的流程图。Figure 7 is a flowchart of another data sensing method according to an exemplary embodiment.
图8是根据一示例性实施例示出的另一种数据感知方法的流程图。Figure 8 is a flowchart of another data sensing method according to an exemplary embodiment.
图9是根据一示例性实施例示出的另一种数据感知方法的流程图。Figure 9 is a flowchart of another data sensing method according to an exemplary embodiment.
图10是根据一示例性实施例示出的另一种数据感知方法的流程图。Figure 10 is a flowchart of another data sensing method according to an exemplary embodiment.
图11是根据一示例性实施例示出的另一种数据感知方法的流程图。Figure 11 is a flowchart of another data sensing method according to an exemplary embodiment.
图12是根据一示例性实施例示出的另一种数据感知方法的流程图。Figure 12 is a flowchart of another data sensing method according to an exemplary embodiment.
图13是根据一示例性实施例示出的另一种数据感知方法的流程图。Figure 13 is a flowchart of another data sensing method according to an exemplary embodiment.
图14是根据一示例性实施例示出的另一种数据感知方法的流程图。Figure 14 is a flowchart of another data sensing method according to an exemplary embodiment.
图15是根据一示例性实施例示出的一种核心网系统。Figure 15 shows a core network system according to an exemplary embodiment.
图16是根据一示例性实施例示出的另一种数据感知方法的流程图。Figure 16 is a flowchart of another data sensing method according to an exemplary embodiment.
图17是根据一示例性实施例示出的另一种数据感知方法的流程图。Figure 17 is a flowchart of another data sensing method according to an exemplary embodiment.
图18是根据一示例性实施例示出的一种数据感知装置的框图。Figure 18 is a block diagram of a data sensing device according to an exemplary embodiment.
图19是根据一示例性实施例示出的一种数据感知装置的框图。Figure 19 is a block diagram of a data sensing device according to an exemplary embodiment.
图20是根据一示例性实施例示出的一种数据感知装置的框图。Figure 20 is a block diagram of a data sensing device according to an exemplary embodiment.
图21是根据一示例性实施例示出的一种数据感知装置的框图。Figure 21 is a block diagram of a data sensing device according to an exemplary embodiment.
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. When the following description refers to the drawings, the same numbers in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with aspects of the disclosure as detailed in the appended claims.
需要说明的是,本公开中所有获取信号、信息或数据的动作都是在遵照所在地国家相应的数据保护法规政策的前提下,并获得由相应装置所有者给予授权的情况下进行的。It should be noted that all actions to obtain signals, information or data in this disclosure are performed under the premise of complying with the corresponding data protection regulations and policies of the country where the location is located, and with authorization from the owner of the corresponding device.
在本公开的描述中,使用的术语如“第一”、“第二”等是用于区别类似的对象,而不必理解为特定的顺序或先后次序。另外,在未作相反说明的情况下,在参考附图的描述中,不同附图中的同一标记表示相同的要素。In the description of the present disclosure, terms such as “first”, “second”, etc. are used to distinguish similar objects and do not necessarily mean a specific order or sequence. In addition, in the description with reference to the drawings, the same reference numerals in different drawings represent the same elements unless otherwise specified.
在本公开的描述中,除非另有说明,“多个”是指两个或多于两个,其它量词与之类似;“以下至少一项(个)”、“一项(个)或多项(个)”或其类似表达,是指的这些项(个)中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的一项(个)或多项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个;“和/或”是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。In the description of this disclosure, unless otherwise stated, "plurality" refers to two or more than two, and other quantifiers are similar; "at least one of the following", "one or more" "Item (items)" or similar expressions refer to any combination of these items (items), including any combination of single items (items) or plural items (items). For example, one or more items in a, b, or c can mean: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c can be single, It can also be multiple; "and/or" is an association relationship that describes associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A exists alone, A and B exist simultaneously, alone There are three cases of B, where A and B can be singular or plural.
在本公开实施例中尽管在附图中以特定的顺序描述操作,但是不应将其理解为要求按照所示的特定顺序或是串行顺序来执行这些操作,或是要求执行全部所示的操作以得到期望的结果。在特定环境中,多任务和并行处理可能是有利的。此外,通过同一条消息发送多个信息也是有利的。Although operations are described in a specific order in the drawings in the embodiments of the present disclosure, this should not be construed as requiring that these operations be performed in the specific order shown or in serial order, or that all of the operations shown are performed. Operate to get the desired results. In certain circumstances, multitasking and parallel processing may be advantageous. Additionally, it is advantageous to send multiple messages via the same message.
下面先介绍本公开实施例的实施环境。The implementation environment of the embodiments of the present disclosure is first introduced below.
本申请实施例的技术方案可以应用于各种通信系统。该通信系统可以包括4G(the 4th Generation,第四代)通信系统、5G(the 5th Generation,第五代)通信系统、和其他未来的无线通信系统(比如6G)中的一种或多种。该通信系统也可以包括陆上公用移动通信网(Public Land Mobile Network,PLMN)网络、非地面网络通信系统、设备到设备(Device-to-Device,D2D)通信系统、机器到机器(Machine to Machine,M2M)通信系统、物联网(Internet of Things,IoT)通信系统、车联网(Vehicle-to-Everything,V2X)通信系统或者其他通信系统中的一种或多种。The technical solutions of the embodiments of this application can be applied to various communication systems. The communication system may include one or more of a 4G (the 4th Generation, fourth generation) communication system, a 5G (the 5th Generation, the fifth generation) communication system, and other future wireless communication systems (such as 6G). The communication system may also include Public Land Mobile Network (PLMN) network, non-terrestrial network communication system, Device-to-Device (D2D) communication system, Machine to Machine (Machine to Machine) , M2M) communication system, Internet of Things (IoT) communication system, Vehicle-to-Everything (V2X) communication system or one or more of other communication systems.
图1是根据一示例性实施例示出的一种通信系统的示意图。如图1所示,该通信系统可以包括待感知终端101、核心网102以及感知请求终端103。该通信系统可以用于支持4G(the4th Generation,第四代)网络接入技术,例如长期演进(Long Term Evolution,LTE)接入技术,或者,5G(the 5th Generation,第五代)网络接入技术,如新型无线入技术(New Radio Access Technology,New RAT),或者,其他未来的无线通信技术。需要说明的是,在该通信系统中,上述待感知终端101或者感知请求终端103的数量均可以为一个或多个,图1所示通信系统的待感知终端101或者感知请求终端103的数量仅为一种实施例的适应性举例,本公开对此不做限定。FIG. 1 is a schematic diagram of a communication system according to an exemplary embodiment. As shown in Figure 1, the communication system may include a terminal to be sensed 101, a
图1中的待感知终端101或者感知请求终端103可以是一种提供语音或者数据连通性的电子设备,例如也可以称为用户设备(User Equipment,UE),用户单元(Subscriber Unit),移动台(Mobile Station),站台(Station),终端设备等。示例地,该终端可以包括智能手机、智能可穿戴设备、智能音箱、智能平板、无线调制解调器(modem)、无线本地环路(Wireless Local Loop,WLL)台、PDA(Personal Digital Assistant,个人数字助理)、CPE(Customer Premise Equipment,客户终端设备)等。随着无线通信技术的发展,可以接入通信系统、可以与通信系统的基站进行通信,或者通过通信系统与其它物体进行通信的设备都可以是本公开实施例中的终端,例如,智能交通中的终端和汽车、智能家居中的家用设备、智能电网中的电力抄表仪器、电压监测仪器、环境监测仪器、智能安全网络中的视频监测仪器、收款机等。The terminal to be sensed 101 or the
图2是根据一示例性实施例示出的另一种通信系统的示意图。如图2所示,该通信系统可以包括感知请求终端201、第一网元(Sensing Application Function,SAF)202、策略控制功能网元(Policy Control Function,PCF)203、会话管理功能网元(Session Management Function,SMF)204、用户面功能网元(User Plane Function,UPF)205、接入与移动性管理功能网元(Access and Mobility Management Function,AMF)206、无线接入网(Radio Access Network,RAN)207以及待感知终端208。Fig. 2 is a schematic diagram of another communication system according to an exemplary embodiment. As shown in Fig. 2, the communication system may include a
需要说明的是,在图2所示的通信系统中,可以只有部分设备参与到本公开实施例的数据感知方法中。It should be noted that in the communication system shown in Figure 2, only some devices may participate in the data sensing method of the embodiment of the present disclosure.
下面对本公开实施例中的数据感知方法的一些应用常见进行介绍。本公开实施例的数据感知方法可以应用于例如以下一些场景:Some common applications of the data sensing method in the embodiments of the present disclosure are introduced below. The data awareness method of the embodiment of the present disclosure can be applied to the following scenarios, for example:
环境实时监控:利用感知到的无线信号重构环境地图,进一步提升定位精度,赋能环境相关应用,如实现动态3D地图辅助驾驶、行人流量统计、入侵等一系列实时监控相关应用检测、流量检测等。Real-time environmental monitoring: Use the perceived wireless signals to reconstruct the environmental map to further improve positioning accuracy and empower environment-related applications, such as dynamic 3D map-assisted driving, pedestrian traffic statistics, intrusion and a series of real-time monitoring-related application detection and traffic detection. wait.
自动驾驶汽车/无人机:自动驾驶汽车/无人机应用有一些共同的功能需求。例如,自动驾驶汽车/无人机应支持检测和避免(Detect and Avoid,DAA)以避开障碍物。同时,自主车辆/无人机应具备监控路径信息的能力,如选择路线,遵守交通规则。因此,利用感知到的数据可以帮助完成避障以及监控路径信息等。Self-driving cars/drones: Self-driving car/drone applications have some common functional requirements. For example, self-driving cars/drones should support Detect and Avoid (DAA) to avoid obstacles. At the same time, autonomous vehicles/drone should have the ability to monitor path information, such as choosing routes and obeying traffic rules. Therefore, using the sensed data can help complete obstacle avoidance and monitor path information.
空气污染监测:接收到的无线信号质量随空气湿度、空气颗粒物(PM)浓度、载波频率等变化呈现不同的衰减特性,因此,利用感知到的数据可帮助天气或空气质量检测。Air pollution monitoring: The quality of the received wireless signal exhibits different attenuation characteristics with changes in air humidity, air particulate matter (PM) concentration, carrier frequency, etc. Therefore, the sensed data can be used to help detect weather or air quality.
室内保健和入侵检测。利用感知到的数据可实现呼吸频率估计、呼吸深度估计、呼吸暂停检测、老年人生命体征监测和室内入侵检测。Indoor health care and intrusion detection. Leveraging sensed data enables respiratory rate estimation, breathing depth estimation, apnea detection, vital sign monitoring for the elderly, and indoor intrusion detection.
需要说明的是,在不同的场景需求下,待感知终端的感知数据的类型可以是不同的。It should be noted that, under different scenario requirements, the type of perception data of the terminal to be perceived may be different.
例如,感知数据可以是待感知终端的位置和信道环境,可以用于帮助缩小波束扫描范围,缩短波束训练时间。For example, the sensing data can be the location and channel environment of the terminal to be sensed, which can be used to help narrow the beam scanning range and shorten the beam training time.
又例如,感知数据可以是待感知终端的位置、速度、运动轨迹和信道环境进行波束预测,可以减少波束测量的开销和波束跟踪的延迟。For another example, the sensing data can be the position, speed, motion trajectory and channel environment of the terminal to be sensed for beam prediction, which can reduce the overhead of beam measurement and the delay of beam tracking.
又例如,感知数据可以是待感知终端的属性(方向、大小、形状等)和信道环境可以用于提高信道估计的性能。For another example, the sensing data can be attributes of the terminal to be sensed (direction, size, shape, etc.) and the channel environment can be used to improve the performance of channel estimation.
除了上述示例之外,感知数据还可以是待感知终端的轨迹等数据。In addition to the above examples, the sensing data may also be data such as the trajectory of the terminal to be sensed.
需要说明的是,感知数据可以是待感知终端自身感知到的数据,也可以是待感知终端从外部环境接收到的数据。It should be noted that the sensing data may be data perceived by the terminal to be sensed itself, or data received by the terminal to be sensed from the external environment.
图3是根据一示例性实施例示出的一种数据感知方法,可以应用于上述通信系统中的核心网。如图3所示,该方法可以包括:Figure 3 shows a data sensing method according to an exemplary embodiment, which can be applied to the core network in the above communication system. As shown in Figure 3, the method may include:
S310,向待感知终端发送第一信息,第一信息用于待感知终端确定感知隐私验证的结果。S310: Send first information to the terminal to be perceived, where the first information is used by the terminal to be perceived to determine a result of the perceived privacy verification.
S320,接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。S320: Receive the second information sent by the terminal to be sensed. The second information includes the result of the sensing privacy verification. The result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
结合前述内容可知,本公开实施例中,待感知终端可以理解为发送感知数据的终端。其中,待感知终端获取感知数据可以有多种方式,例如可以通过自身的传感器进行检测,从而得到感知数据,或者可以结合处理器对检测得到的数据进行处理,从而获得感知数据,还可以从其他设备接收得到感知数据。Based on the foregoing content, it can be seen that in the embodiment of the present disclosure, the terminal to be sensed can be understood as a terminal that sends sensing data. Among them, the terminal to be sensed can obtain sensing data in various ways. For example, it can detect through its own sensor to obtain sensing data, or it can combine the detected data with a processor to process the sensing data to obtain sensing data. It can also obtain sensing data from other sources. The device receives the sensing data.
此外,感知请求方可以理解为向待感知终端请求感知数据的终端。其中,感知请求方可以是核心网本身,也可以是与核心网连接的其它终端。In addition, the sensing requester can be understood as a terminal that requests sensing data from the terminal to be sensed. Among them, the sensing requester can be the core network itself or other terminals connected to the core network.
其中,目标数据可以理解为感知请求方根据场景需要向待感知终端请求的某个类型的感知数据。Among them, the target data can be understood as a certain type of sensing data that the sensing requester requests from the terminal to be sensed according to the scene needs.
其中,感知请求方对待感知终端进行目标数据感知的权限可以包括待感知终端同意感知请求方进行目标数据感知,也即感知请求方能够通过核心网从待感知终端获得目标数据,以及待感知终端拒绝感知请求方进行目标数据的感知,也即感知请求方不能够通过核心网从待感知终端获得目标数据。Among them, the permission of the sensing requester to sense the target data of the terminal to be sensed may include the terminal to be sensed agreeing to the sensing requester to sense the target data, that is, the sensing requester can obtain the target data from the terminal to be sensed through the core network, and the terminal to be sensed refuses The sensing requester senses the target data, that is, the sensing requester cannot obtain the target data from the terminal to be sensed through the core network.
在一些实施方式中,用于指示感知请求方对待感知终端进行目标数据感知的权限的信息包括,表征同意感知请求方对待感知终端进行目标数据感知的信息,表征拒绝感知请求方对待感知终端进行目标数据感知的信息,表征拒绝感知请求方对待感知终端进行目标数据感知的原因的信息,同意对待感知终端进行目标数据感知的设备的标识,以及拒绝对待感知终端进行目标数据感知的设备的标识中的至少一者。In some embodiments, the information used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed includes information indicating that the sensing requester is allowed to perform target data sensing on the terminal to be sensed, and information indicating the rejection of the sensing requestor to perform target data sensing on the terminal to be sensed. Data sensing information, information representing the reason why the sensing requester refuses to sense the target data of the terminal to be sensed, the identification of the device that agrees to sense the target data of the terminal to be sensed, and the identification of the device that refuses to sense the target data of the terminal to be sensed. At least one.
其中,同意对待感知终端进行目标数据感知的设备的标识可以有多个,拒绝对待感知终端进行目标数据感知的设备的标识也可以有多个。There may be multiple identifiers of devices that agree to perform target data sensing on the terminal to be sensed, and there may also be multiple identifiers of devices that refuse to sense the target data on the terminal to be sensed.
本公开实施例中,在第二信息中,可以包括多个字段,这多个字段可以根据实际情况,分别用于填充表征同意感知请求方对待感知终端进行目标数据感知的信息,表征拒绝感知请求方对待感知终端进行目标数据感知的信息,表征拒绝感知请求方对待感知终端进行目标数据感知的原因的信息,同意对待感知终端进行目标数据感知的设备的标识,以及拒绝对待感知终端进行目标数据感知的设备的标识。In the embodiment of the present disclosure, the second information may include multiple fields. These multiple fields may be used to fill in information indicating that the sensing requester agrees to perform target data sensing on the terminal to be sensed, and to represent rejecting the sensing request according to the actual situation. Information about the party to sense the target data of the terminal to be sensed, information representing the reason why the sensing requester refuses to sense the target data to the terminal to be sensed, the identification of the device that agrees to sense the target data to the terminal to be sensed, and the refusal to sense the terminal to sense the target data. The identification of the device.
例如,在一些情况下,表征拒绝感知请求方对待感知终端进行目标数据感知的信息,以及表征拒绝感知请求方对待感知终端进行目标数据感知的原因的信息,可以同时填充到第二信息的不同的字段中。For example, in some cases, the information representing the refusal of the sensing requester to sense the target data of the terminal to be sensed, and the information characterizing the reason for refusing the sensing requester to sense the target data of the terminal to be sensed, can be filled in different fields of the second information at the same time. in the field.
需要说明的是,待感知终端确定的感知隐私验证的结果可以是待感知终端自身根据第一信息确定的,也可以是待感知终端接收用户对感知隐私验证的结果的输入操作控件的触发操作而生成的。It should be noted that the perceptual privacy verification result determined by the terminal to be sensed may be determined by the terminal to be sensed itself based on the first information, or may be determined by the terminal to be sensed receiving a triggering operation of the user's input operation control of the perceptual privacy verification result. Generated.
在一些实施方式中,第一信息可以包括感知请求方(例如,可以是核心网,也可以是与核心网连接的感知请求终端)的第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息。In some embodiments, the first information may include a first identification of the sensing requester (for example, it may be a core network or a sensing requesting terminal connected to the core network), information characterizing the type of target data to be sensed, and Perceived privacy verification instructions.
采用上述方法,可以通过核心网向待感知终端发送用于确定感知隐私验证的结果第一信息,以及通过核心网接收包括感知隐私验证的结果的第二信息。由于感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限,因此,待感知终端可以对感知请求方进行感知权限验证,再决定是否同意感知请求方对待感知终端进行目标数据的感知,通过权限验证的过程,可以保护待感知终端的感知数据传输过程,提高待感知终端的安全性。Using the above method, the first information for determining the result of the perceptual privacy verification can be sent to the terminal to be sensed through the core network, and the second information including the result of the perceptual privacy verification can be received through the core network. Since the result of the sensing privacy verification is used to indicate the sensing requester's permission to sense the target data of the terminal to be sensed, the terminal to be sensed can verify the sensing authority of the sensing requester and then decide whether to agree to the sensing requester to sense the target data of the terminal to be sensed. Through the process of permission verification, the sensing data transmission process of the terminal to be sensed can be protected and the security of the terminal to be sensed can be improved.
图4是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于核心网,如图4所示,该方法可以包括:FIG4 is a data perception method according to an exemplary embodiment. The data perception method is applied to a core network, as shown in FIG4 , and the method may include:
S410,向待感知终端发送第一信息,第一信息用于待感知终端确定感知隐私验证的结果。S410. Send the first information to the terminal to be sensed. The first information is used by the terminal to be sensed to determine the result of sensing privacy verification.
其中,本实施例中步骤S410,与上述步骤S310中相同,可以参照上述步骤S310,此处不再赘述。Among them, step S410 in this embodiment is the same as the above-mentioned step S310, and reference can be made to the above-mentioned step S310, which will not be described again here.
S420,接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。S420: Receive the second information sent by the terminal to be sensed. The second information includes the result of the sensing privacy verification. The result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
S430,接收待感知终端发送的感知到的目标数据,目标数据是在同意感知请求方对待感知终端进行目标数据感知的情况下发送的。S430: Receive the sensed target data sent by the terminal to be sensed. The target data is sent when the sensing requester agrees to sense the target data of the terminal to be sensed.
本公开实施例中,如果感知隐私验证的结果为同意感知请求方对待感知终端进行目标数据感知,则待感知终端可以向核心网发送感知到的目标数据,从而,核心网便能够接收到待感知终端发送的感知到的目标数据。In this disclosed embodiment, if the result of the sensing privacy verification is that the sensing requester agrees to perform target data sensing on the terminal to be sensed, the terminal to be sensed can send the sensed target data to the core network, so that the core network can receive the target data to be sensed. Sensed target data sent by the terminal.
在一些实施方式中,核心网在接收到待感知终端发送的感知到的目标数据之后,可以将目标数据发送给感知请求方。In some implementations, after receiving the sensed target data sent by the terminal to be sensed, the core network may send the target data to the sensing requester.
在一些实施方式中,步骤S430中,接收待感知终端发送的感知到的目标数据的过程,可以是与步骤S420中,接收待感知终端发送的第二信息的过程同时执行的,也即,目标数据可以携带在第二信息中。也就是说,核心网在向待感知终端发送第一信息之后,若待感知终端确定同意感知请求方对待感知终端进行目标数据感知,则待感知终端可以同时将感知隐私验证的结果以及目标数据携带在第二信息中,一起发送给核心网。In some embodiments, in step S430, the process of receiving the sensed target data sent by the terminal to be sensed may be performed simultaneously with the process of receiving the second information sent by the terminal to be sensed in step S420, that is, the target The data can be carried in the second message. That is to say, after the core network sends the first information to the terminal to be sensed, if the terminal to be sensed determines that it agrees with the sensing requester to sense the target data of the terminal to be sensed, the terminal to be sensed can carry the result of the sensing privacy verification and the target data at the same time. In the second information, it is sent to the core network together.
在另一些实施方式中,步骤S430中,接收待感知终端发送的感知到的目标数据的过程,与步骤S420中,接收待感知终端发送的第二信息的过程也可以是先后独立执行的。在这种情况下,在一些实施方式中,待感知终端可以是主动向核心网发送感知到的目标数据。在另一些实施方式中,核心网可以向待感知终端发送用于请求目标数据的消息,从而待感知终端在接收到用于请求目标数据的消息之后,便可以响应于用于请求目标数据的消息,向核心网发送感知到的目标数据。In other embodiments, the process of receiving the sensed target data sent by the terminal to be sensed in step S430 and the process of receiving the second information sent by the terminal to be sensed in step S420 may also be executed independently one after another. In this case, in some embodiments, the terminal to be sensed may actively send the sensed target data to the core network. In other embodiments, the core network may send a message for requesting target data to the terminal to be sensed, so that the terminal to be sensed can respond to the message for requesting target data after receiving the message for requesting target data. , sending the perceived target data to the core network.
采用上述方法,待感知终端在同意感知请求方对待感知终端进行目标数据感知的情况下,再向核心网发送目标数据,从而可以保护待感知终端的感知数据传输过程,提高待感知终端的安全性。Using the above method, the terminal to be sensed can then send the target data to the core network after agreeing to the sensing requester to sense the target data of the terminal to be sensed, thereby protecting the sensing data transmission process of the terminal to be sensed and improving the security of the terminal to be sensed. .
图5是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于核心网,感知请求方为与核心网连接的感知请求终端,如图5所示,该方法可以包括:Figure 5 illustrates a data sensing method according to an exemplary embodiment. This data sensing method is applied to the core network, and the sensing requester is the sensing requesting terminal connected to the core network. As shown in Figure 5, this method may include:
S510,接收感知请求终端发送的感知请求。S510: Receive the sensing request sent by the sensing requesting terminal.
S520,响应于感知请求,向待感知终端发送第一信息。S520. In response to the sensing request, send the first information to the terminal to be sensed.
S530,接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。S530. Receive the second information sent by the terminal to be sensed. The second information includes the result of the sensing privacy verification. The result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
本公开实施例中,感知请求终端在需要获取感知数据的时候,可以向核心网发送感知请求,核心网在接收感知请求终端发送的感知请求之后,可以响应于感知请求,向待感知终端发送第一信息,接着,便可以接收待感知终端发送的第二信息。In the embodiment of the present disclosure, when the sensing requesting terminal needs to obtain sensing data, it can send a sensing request to the core network. After receiving the sensing request sent by the sensing requesting terminal, the core network can respond to the sensing request and send a third sensing request to the terminal to be sensed. After receiving the first information, the second information sent by the terminal to be sensed can be received.
其中,步骤S520中,向待感知终端发送第一信息的过程,以及步骤S530中,接收待感知终端发送的第二信息的过程可以参考前述实施例,此处不再赘述。Among them, the process of sending the first information to the terminal to be sensed in step S520 and the process of receiving the second information sent by the terminal to be sensed in step S530 can refer to the foregoing embodiments and will not be described again here.
此外,在一些实施方式中,该方法还可以包括接收待感知终端发送的感知到的目标数据的步骤,该步骤的详细描述可以参考前述实施例此处不再赘述。In addition, in some embodiments, the method may also include the step of receiving the sensed target data sent by the terminal to be sensed. For a detailed description of this step, please refer to the foregoing embodiments and will not be described again here.
采用上述方法,核心网可以在接收感知请求终端发送的感知请求的情况下,向待感知终端发送第一信息。Using the above method, the core network can send the first information to the terminal to be sensed when receiving the sensing request sent by the sensing requesting terminal.
图6是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于核心网,感知请求方为与核心网连接的感知请求终端,感知请求包括感知请求终端的第一标识、待感知终端的第二标识以及表征待感知的目标数据的类型的信息,如图6所示,该方法可以包括:Figure 6 shows a data sensing method according to an exemplary embodiment. The data sensing method is applied to the core network. The sensing requester is a sensing requesting terminal connected to the core network. The sensing request includes the first identification of the sensing requesting terminal, the second identification of the terminal to be sensed and the type of target data to be sensed. Information, as shown in Figure 6, the method may include:
S610,接收感知请求终端发送的感知请求。S610: Receive the sensing request sent by the sensing requesting terminal.
S620,响应于感知请求,生成感知隐私验证指示信息。S620: In response to the sensing request, generate sensing privacy verification instruction information.
S630,将第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息作为第一信息,发送到第二标识对应的终端。S630: Send the first identifier, information characterizing the type of target data to be sensed, and sensing privacy verification instruction information as first information to the terminal corresponding to the second identifier.
S640,接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私 验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。S640. Receive the second information sent by the terminal to be sensed. The second information includes the result of the sensing privacy verification. The result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
其中,步骤S610以及步骤S640的详细描述可以参考前述实施例,此处不再赘述。For detailed descriptions of step S610 and step S640, reference may be made to the foregoing embodiments and will not be described again here.
本公开实施例中,感知请求包括感知请求终端的第一标识、待感知终端的第二标识以及表征待感知的目标数据的类型的信息,而不包括感知隐私验证指示信息,从而核心网在接收感知请求终端发送的感知请求,了解到感知请求终端想要向待感知终端获取感知数据,因此,可以先生成感知隐私验证指示信息,接着,再将第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息作为第一信息,发送到第二标识对应的终端,以指示待感知终端进行感知隐私验证,并返回第二信息。In the embodiment of the present disclosure, the sensing request includes the first identity of the sensing requesting terminal, the second identity of the terminal to be sensed, and information characterizing the type of target data to be sensed, but does not include sensing privacy verification indication information, so that the core network receives The sensing request sent by the sensing requesting terminal understands that the sensing requesting terminal wants to obtain sensing data from the terminal to be sensed. Therefore, sensing privacy verification indication information can be generated first, and then the first identifier represents the type of target data to be sensed. The information and the perceptual privacy verification instruction information are sent as the first information to the terminal corresponding to the second identification to instruct the terminal to be sensed to perform the perceptual privacy verification and return the second information.
可选地,第一标识可以是通用公共用户标识符(Generic Public Subscription Identifier,GPSI)。Optionally, the first identifier may be a Generic Public Subscription Identifier (GPSI).
可选地,第二标识可以是用户永久标识符(SUbscription Permanent Identifier,SUPI)。Optionally, the second identification may be a user permanent identifier (SUbscription Permanent Identifier, SUPI).
此外,在一些实施方式中,该方法还可以包括接收待感知终端发送的感知到的目标数据的步骤,该步骤的详细描述可以参考前述实施例此处不再赘述。In addition, in some embodiments, the method may also include the step of receiving the sensed target data sent by the terminal to be sensed. For a detailed description of this step, please refer to the foregoing embodiments and will not be described again here.
采用上述方法,感知请求终端不必发送携带感知隐私验证指示信息的感知请求,也即感知隐私验证指示信息可以由核心网响应于感知请求生成。Using the above method, the sensing requesting terminal does not need to send a sensing request carrying sensing privacy verification indication information, that is, the sensing privacy verification indication information can be generated by the core network in response to the sensing request.
图7是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于核心网,感知请求方为与核心网连接的感知请求终端,感知请求包括感知请求终端的第一标识、待感知终端的第二标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息,如图7所示,该方法可以包括:Figure 7 shows a data sensing method according to an exemplary embodiment. The data sensing method is applied to the core network. The sensing requester is a sensing requesting terminal connected to the core network. The sensing request includes the first identification of the sensing requesting terminal, the second identification of the terminal to be sensed, and the type of target data to be sensed. information and perceived privacy verification indication information, as shown in Figure 7. The method may include:
S710,接收感知请求终端发送的感知请求。S710: Receive the sensing request sent by the sensing requesting terminal.
S720,将第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息作为第一信息,发送到第二标识对应的终端。S720: Send the first identifier, information characterizing the type of target data to be sensed, and sensing privacy verification instruction information as first information to the terminal corresponding to the second identifier.
S730,接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。S730. Receive the second information sent by the terminal to be sensed. The second information includes the result of the sensing privacy verification. The result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
其中,步骤S710以及步骤S730的详细描述可以参考前述实施例,此处不再赘述。For detailed descriptions of step S710 and step S730, reference may be made to the foregoing embodiments and will not be described again here.
此外,在一些实施方式中,该方法还可以包括接收待感知终端发送的感知到的目标数据的步骤,该步骤的详细描述可以参考前述实施例此处不再赘述。In addition, in some embodiments, the method may also include the step of receiving the sensed target data sent by the terminal to be sensed. For a detailed description of this step, please refer to the foregoing embodiments and will not be described again here.
采用上述方法,感知请求终端可以发送携带感知隐私验证指示信息的感知请求,也即感知隐私验证指示信息可以由感知请求终端发送。Using the above method, the sensing request terminal can send a sensing request carrying sensing privacy verification indication information, that is, the sensing privacy verification indication information can be sent by the sensing requesting terminal.
图8是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于核心网,感知请求方为与核心网连接的感知请求终端,感知请求包括感知请求终端的第一标识、待感知终端的第二标识以及表征待感知的目标数据的类型的信息,如图8所示,该方法可以包括:Figure 8 illustrates a data sensing method according to an exemplary embodiment. The data sensing method is applied to the core network. The sensing requester is a sensing requesting terminal connected to the core network. The sensing request includes the first identification of the sensing requesting terminal, the second identification of the terminal to be sensed and the type of target data to be sensed. Information, as shown in Figure 8, the method may include:
S810,接收感知请求终端发送的感知请求。S810: Receive the sensing request sent by the sensing requesting terminal.
S820,响应于感知请求,向待感知终端发送第一信息。S820: In response to the perception request, send first information to the terminal to be perceived.
S830,接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。S830. Receive the second information sent by the terminal to be sensed. The second information includes the result of the sensing privacy verification. The result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
S840,向感知请求终端发送感知响应,感知响应包括感知到的目标数据,表征拒绝感知请求终端对待感知终端进行目标数据感知的信息,以及表征拒绝感知请求终端对待感知终端进行目标数据感知的原因的信息中的至少一者,目标数据是在同意感知请求方对待感知终端进行目标数据感知的情况下发送的。S840. Send a sensing response to the sensing requesting terminal. The sensing response includes the sensed target data, information representing the rejection of the sensing requesting terminal to sense the target data by the sensing terminal to be sensed, and the reason for rejecting the sensing requesting terminal to sense the target data of the sensing terminal to be sensed. At least one of the information, target data, is sent under the condition that the sensing requester agrees to perform target data sensing on the terminal to be sensed.
其中,步骤S810至步骤S830的详细描述可以参考前述实施例,此处不再赘述。For detailed descriptions of steps S810 to S830, reference may be made to the foregoing embodiments and will not be described again here.
本公开实施例中,无论待感知终端是否同意感知请求终端对目标数据进行感知,核心网均可以向感知请求方发送感知响应,从而,感知响应可以包括感知到的目标数据,表征拒绝感知请求终端对待感知终端进行目标数据感知的信息,以及表征拒绝感知请求终端对待感知终端进行目标数据感知的原因的信息中的至少一者,目标数据是在同意感知请求方对待感知终端进行目标数据感知的情况下发送的。In the embodiment of the present disclosure, regardless of whether the terminal to be sensed agrees with the sensing requesting terminal to sense the target data, the core network can send a sensing response to the sensing requesting party. Therefore, the sensing response can include the sensed target data, indicating that the sensing requesting terminal rejects the sensing requesting terminal. Information about the target data sensing by the to-be-sensing terminal, and at least one of the information representing the reason for rejecting the sensing requesting terminal to sense the target data by the to-be-sensing terminal. The target data is a situation in which the sensing requesting party agrees to the sensing requester to sense the target data by the to-be-sensing terminal. Sent below.
本公开实施例中,感知响应可以包括多个字段,这多个字段可以根据实际情况,分别用于填充感知到的目标数据,表征拒绝感知请求终端对待感知终端进行目标数据感知的信息,以及表征拒绝感知请求终端对待感知终端进行目标数据感知的原因的信息。In the embodiment of the present disclosure, the sensing response may include multiple fields. These multiple fields may be used to fill in the sensed target data according to the actual situation, to represent the information that rejects the sensing request terminal and to sense the target data of the to-be-sensed terminal. Information about the reasons why the sensing requesting terminal rejects target data sensing by the sensing terminal.
也就是说,若核心网接收到了待感知终端发送的目标数据,则可以将目标数据填充到感知响应相应字段,并发送给感知请求终端。That is to say, if the core network receives the target data sent by the terminal to be sensed, the target data can be filled in the corresponding field of the sensing response and sent to the sensing requesting terminal.
若核心网接收到的第二信息为表征拒绝感知请求方对待感知终端进行目标数据感知的信息,则可以将表征拒绝感知请求方对待感知终端进行目标数据感知的信息填充到感知响应相应字段,并发送给感知请求终端,并且,如果第二信息还包括表征拒绝感知请求方对待感知终端进行目标数据感知的原因的信息的话,则核心网还可以将表征拒绝感知请求方对待感知终端进行目标数据感知的信息,以及表征拒绝感知请求方对待感知终端进行目标数据感知的原因的信息,一同填充到感知响应相应字段,并发送给感知请求终端。If the second information received by the core network is information indicating that the sensing requester refuses to sense the target data of the terminal to be sensed, the information indicating that the sensing requester refuses to sense the target data of the terminal to be sensed can be filled into the corresponding field of the sensing response, and is sent to the sensing requesting terminal, and if the second information also includes information representing the reason for rejecting the sensing requesting party to perform target data sensing on the to-be-sensing terminal, the core network may also express the reason for rejecting the sensing requesting party to perform target data sensing on the to-be-sensing terminal. The information, as well as the information representing the reason why the sensing requester refuses to sense the target data by the sensing terminal, are filled in the corresponding fields of the sensing response and sent to the sensing requesting terminal.
采用上述方法,核心网可以向感知请求终端返回感知响应,以告知感知请求的结果。Using the above method, the core network can return a sensing response to the sensing request terminal to inform the result of the sensing request.
图9是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于核心网,核心网包括第一网元、策略控制功能网元以及接入与移动性管理功能网元,如图9所示,该方法可以包括:Figure 9 illustrates a data sensing method according to an exemplary embodiment. This data awareness method is applied to the core network. The core network includes the first network element, the policy control function network element, and the access and mobility management function network element. As shown in Figure 9, the method may include:
S910,通过第一网元确定第一信息以及待感知终端的第二标识。S910: Determine the first information and the second identification of the terminal to be sensed through the first network element.
其中,第一信息可以包括感知请求方(例如,可以是核心网,也可以是与核心网连接的感知请求终端)的第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息。The first information may include a first identification of the sensing requester (for example, it may be a core network or a sensing requesting terminal connected to the core network), information characterizing the type of target data to be sensed, and a sensing privacy verification indication. information.
在一些实施方式中,当感知请求方为核心网时,第一网元可以从核心网相关设备获取核心网对应的第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息,从而将获取的第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息确定为第一信息。此外,第一网元还可以从核心网相关功能设备直接获取第二标识。In some embodiments, when the sensing requester is the core network, the first network element can obtain the first identifier corresponding to the core network, information characterizing the type of target data to be sensed, and sensing privacy verification indication information from the core network related equipment. , thereby determining the obtained first identification, information characterizing the type of target data to be sensed, and sensing privacy verification indication information as the first information. In addition, the first network element can also directly obtain the second identifier from relevant functional equipment of the core network.
在另一些实施方式中,当感知请求方为与核心网连接的感知请求终端时,第一网元确定第一信息以及待感知终端的第二标识的详细描述可以参考前述实施例,此处不再赘述。In other embodiments, when the sensing requester is a sensing requesting terminal connected to the core network, the detailed description of the first network element determining the first information and the second identification of the terminal to be sensed can refer to the foregoing embodiments, which will not be discussed here. Again.
需要说明的是,第一网元可以理解为在核心网中新增的网元,示例性地,可以命名为感知应用功能网元。It should be noted that the first network element can be understood as a newly added network element in the core network. For example, it can be named a sensing application function network element.
S920,通过第一网元将第一信息以及第二标识发送给策略控制功能网元。S920: Send the first information and the second identification to the policy control function network element through the first network element.
在一些实施方式中,可以通过第一网元向策略控制功能网元发送第一请求,第一请求包括第一信息以及第二标识。需要说明的是,第一请求是本公开实施例中新增加的请求。例如,可以是新增的Npcf_SensingPolicyControl Request,感知策略控制请求。可选地,第一信息可以包括感知请求终端的第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息,从而,第一请求可以包括第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息。In some implementations, the first request may be sent to the policy control function network element through the first network element, where the first request includes the first information and the second identification. It should be noted that the first request is a newly added request in this embodiment of the present disclosure. For example, it can be the newly added Npcf_SensingPolicyControl Request, sensing policy control request. Optionally, the first information may include a first identity of the sensing requesting terminal, information characterizing the type of target data to be sensed, and sensing privacy verification indication information. Therefore, the first request may include a first identity, characterizing the target to be sensed. Information about the type of data and perceived privacy verification instructions.
S930,通过策略控制功能网元将第一信息以及第二标识发送给接入与移动性管理功能网元。S930: Send the first information and the second identification to the access and mobility management function network element through the policy control function network element.
在一些实施方式中,可以通过策略控制功能网元向接入与移动性管理功能网元发送第二请求,第二请求包括所述第二标识以及所述第一信息。可选地,第二请求可以是Namf_Communication_N1N2MessageTransfer请求,Namf_Communication_N1N2MessageTransfer请求包括第二标识以及N1消息,N1消息包括第一信息。In some implementations, a second request may be sent to the access and mobility management function network element through the policy control function network element, where the second request includes the second identifier and the first information. Optionally, the second request may be a Namf_Communication_N1N2MessageTransfer request, the Namf_Communication_N1N2MessageTransfer request includes the second identifier and the N1 message, and the N1 message includes the first information.
S940,通过接入与移动性管理功能网元将第一信息发送给第二标识对应的终端。S940: Send the first information to the terminal corresponding to the second identification through the access and mobility management function network element.
在一些实施方式中,可以通过接入与移动性管理功能网元向第二标识对应的终端发送通知消息,该通知消息包括第一信息。可选地,通知消息可以是非接入通知(NAS Notification)消息,非接入通知消息包括第一信息。In some implementations, a notification message may be sent to the terminal corresponding to the second identity through the access and mobility management function network element, where the notification message includes the first information. Optionally, the notification message may be a non-access notification (NAS Notification) message, and the non-access notification message includes the first information.
S950,接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私 验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。S950: Receive the second information sent by the terminal to be sensed. The second information includes the result of the sensing privacy verification. The result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
本公开实施例中,可以先通过第一网元确定第一信息以及待感知终端的第二标识,在确定第一信息以及待感知终端的第二标识之后,可以通过第一网元将第一信息以及第二标识发送给策略控制功能网元,接着,再通过策略控制功能网元将第一信息以及第二标识发送给接入与移动性管理功能网元,然后,便可以通过接入与移动性管理功能网元将第一信息发送给第二标识对应的终端。In the embodiment of the present disclosure, the first information and the second identification of the terminal to be sensed may be determined first through the first network element. After the first information and the second identification of the terminal to be sensed are determined, the first information may be determined through the first network element. The information and the second identification are sent to the policy control function network element, and then the first information and the second identification are sent to the access and mobility management function network element through the policy control function network element, and then the access and mobility management function network element can be The mobility management function network element sends the first information to the terminal corresponding to the second identification.
在一些实施方式中,步骤S950,接收待感知终端发送的第二信息,可以包括以下步骤:In some implementations, step S950, receiving the second information sent by the terminal to be sensed, may include the following steps:
通过接入与移动性管理功能网元接收待感知终端发送的第二信息;通过接入与移动性管理功能网元将第二信息发送给策略控制功能网元,通过策略控制功能网元将第二信息发送给第一网元。The access and mobility management function network element receives the second information sent by the terminal to be sensed; the access and mobility management function network element sends the second information to the policy control function network element, and the policy control function network element sends the second information to the policy control function network element. The second information is sent to the first network element.
可选地,可以通过接入与移动性管理功能网元接收待感知终端发送的通知消息响应,通知消息响应包括第二信息。可选地,通知消息响应例如可以是非接入通知(NAS Notification)响应,非接入通知响应包括第二信息。Optionally, the notification message response sent by the terminal to be sensed may be received through the access and mobility management function network element, where the notification message response includes the second information. Optionally, the notification message response may be, for example, a non-access notification (NAS Notification) response, and the non-access notification response includes the second information.
可选地,可以通过接入与移动性管理功能网元向策略控制功能网元发送第二请求响应,第二请求响应包括第二信息。可选地,第二请求响应例如可以是Namf_Communication_N1N2MessageTransfer响应,Namf_Communication_N1N2MessageTransfer响应包括第二信息。Optionally, a second request response may be sent to the policy control function network element through the access and mobility management function network element, where the second request response includes the second information. Optionally, the second request response may be, for example, a Namf_Communication_N1N2MessageTransfer response, and the Namf_Communication_N1N2MessageTransfer response includes the second information.
可选地,可以通过策略控制功能网元向第一网元发送第一请求响应,第一请求响应包括第二信息,可选地,第一请求响应例如可以是感知策略控制响应(Npcf_SensingPolicyControl Response),感知策略控制响应包括第二信息。其中,感知策略控制响应是新增加的响应消息。Optionally, the first request response may be sent to the first network element through the policy control function network element. The first request response may include the second information. Optionally, the first request response may be, for example, a sensing policy control response (Npcf_SensingPolicyControl Response). , the sensing policy control response includes the second information. Among them, the perception policy control response is a newly added response message.
图10是根据一示例性实施例示出的一种数据感知方法,可以应用于上述通信系统中的待感知终端。如图10所示,该方法可以包括:Figure 10 shows a data sensing method according to an exemplary embodiment, which can be applied to the terminal to be sensed in the above communication system. As shown in Figure 10, the method may include:
S1010,接收核心网发送的第一信息。S1010: Receive the first information sent by the core network.
S1020,响应于第一信息,确定感知隐私验证的结果。S1020. In response to the first information, determine the result of the perceptual privacy verification.
S1030,向核心网发送第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。S1030. Send second information to the core network. The second information includes the result of the sensing privacy verification. The result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
采用上述方法,待感知终端可以接收核心网发送的第一信息,接着响应于第一信息,确定感知隐私验证的结果,接着向核心网发送第二信息。由于感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限,因此,待感知终端可以对感知请求方进行感知权限验证,再决定是否同意感知请求方对待感知终端进行目标数据的感知,通过权限验证的过程,可以保护待感知终端的感知数据传输过程,提高待感知终端的安全性。Using the above method, the terminal to be sensed can receive the first information sent by the core network, then respond to the first information, determine the result of the sensing privacy verification, and then send the second information to the core network. Since the result of the sensing privacy verification is used to indicate the sensing requester's permission to sense the target data of the terminal to be sensed, the terminal to be sensed can verify the sensing authority of the sensing requester and then decide whether to agree to the sensing requester to sense the target data of the terminal to be sensed. Through the process of permission verification, the sensing data transmission process of the terminal to be sensed can be protected and the security of the terminal to be sensed can be improved.
图11是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于待感知终端,如图11所示,该方法可以包括:Figure 11 illustrates a data sensing method according to an exemplary embodiment. The data sensing method is applied to the terminal to be sensed, as shown in Figure 11. The method may include:
S1110,接收核心网发送的第一信息。S1110, receiving first information sent by the core network.
S1120,响应于第一信息,确定感知隐私验证的结果。S1120. In response to the first information, determine the result of the perceptual privacy verification.
S1130,向核心网发送第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。S1130. Send second information to the core network. The second information includes the result of the sensing privacy verification. The result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
S1140,向核心网发送感知到的目标数据,目标数据是在同意感知请求方对待感知终端进行目标数据感知的情况下发送的。S1140. Send the sensed target data to the core network. The target data is sent when the sensing requester agrees to sense the target data of the terminal to be sensed.
本公开实施例中,如果感知隐私验证的结果为同意感知请求方对待感知终端进行目标数据感知,则待感知终端可以向核心网发送感知到的目标数据,从而,核心网便能够接收到待感知终端发送的感知到的目标数据。In this disclosed embodiment, if the result of the sensing privacy verification is that the sensing requester agrees to perform target data sensing on the terminal to be sensed, the terminal to be sensed can send the sensed target data to the core network, so that the core network can receive the target data to be sensed. Sensed target data sent by the terminal.
在一些实施方式中,核心网在接收到待感知终端发送的感知到的目标数据之后,可以将目标数据发送给感知请求方。In some implementations, after receiving the sensed target data sent by the terminal to be sensed, the core network may send the target data to the sensing requester.
采用上述方法,待感知终端在同意感知请求方对待感知终端进行目标数据感知的情况下, 再向核心网发送目标数据,从而可以保护待感知终端的感知数据传输过程,提高待感知终端的安全性。Using the above method, the terminal to be sensed agrees with the sensing requester to sense the target data of the terminal to be sensed, and then sends the target data to the core network, thereby protecting the sensing data transmission process of the terminal to be sensed and improving the security of the terminal to be sensed. .
在一些实施方式中,步骤S1140中,向核心网发送感知到的目标数据的过程,可以是与步骤S1130中,向核心网发送第二信息的过程同时执行的,也即,目标数据可以携带在第二信息中。也就是说,待感知终端可以同时将感知隐私验证的结果以及目标数据携带在第二信息中,一起发送给核心网。In some embodiments, the process of sending the perceived target data to the core network in step S1140 may be performed simultaneously with the process of sending the second information to the core network in step S1130. That is, the target data may be carried in in the second message. That is to say, the terminal to be sensed can simultaneously carry the result of sensing privacy verification and the target data in the second information, and send them to the core network together.
在另一些实施方式中,步骤S1130中,向核心网发送第二信息的过程,与步骤S1140中,向核心网发送感知到的目标数据的过程,也可以是先后独立执行的。在这种情况下,在一些实施方式中,待感知终端可以是主动向核心网发送感知到的目标数据。在另一些实施方式中,核心网可以向待感知终端发送用于请求目标数据的消息,从而待感知终端在接收到用于请求目标数据的消息之后,便可以响应于用于请求目标数据的消息,向核心网发送感知到的目标数据。因此,请参考图12,图12是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于待感知终端,如图12所示,该方法可以包括:In other embodiments, the process of sending the second information to the core network in step S1130 and the process of sending the sensed target data to the core network in step S1140 may also be executed independently one after another. In this case, in some embodiments, the terminal to be sensed may actively send the sensed target data to the core network. In other embodiments, the core network may send a message for requesting target data to the terminal to be sensed, so that the terminal to be sensed can respond to the message for requesting target data after receiving the message for requesting target data. , sending the perceived target data to the core network. Therefore, please refer to FIG. 12 , which illustrates a data sensing method according to an exemplary embodiment. The data sensing method is applied to the terminal to be sensed, as shown in Figure 12. The method may include:
S1210,接收核心网发送的第一信息。S1210: Receive the first information sent by the core network.
S1220,响应于第一信息,确定感知隐私验证的结果。S1220. In response to the first information, determine the result of the perceptual privacy verification.
S1130,向核心网发送第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。S1130. Send second information to the core network. The second information includes the result of the sensing privacy verification. The result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
S1240,接收核心网发送的感知请求。S1240, receiving a perception request sent by the core network.
S1250,响应于核心网发送的感知请求,向核心网发送感知到的目标数据,目标数据是在同意感知请求方对待感知终端进行目标数据感知的情况下发送的。S1250: In response to the sensing request sent by the core network, the sensed target data is sent to the core network. The target data is sent when the sensing requester agrees to sense the target data of the terminal to be sensed.
其中,核心网发送的感知请求可以是核心网自己生成的,例如,可以是核心网在接收到第二信息为同意感知请求方对待感知终端进行目标数据感知的情况下生成的,也可以感知请求方再次发送的感知请求。The sensing request sent by the core network may be generated by the core network itself. For example, it may be generated by the core network after receiving the second information to agree that the sensing requester performs target data sensing on the terminal to be sensed. The sensing request may also be generated by the core network. The sensing request sent by the party again.
图13是根据一示例性实施例示出的一种数据感知方法,该数据感知方法应用于待感知终端,如图13所示,该方法可以包括:FIG. 13 is a data sensing method according to an exemplary embodiment. The data sensing method is applied to a terminal to be sensed. As shown in FIG. 13 , the method may include:
S1310,接收核心网发送的第一信息。S1310: Receive the first information sent by the core network.
S1320,响应于第一信息,展示对感知隐私验证的结果的输入操作控件。S1320: In response to the first information, display an input operation control for the result of the privacy-aware verification.
S1330,接收对感知隐私验证的结果的输入操作控件的触发操作,确定感知隐私验证的结果。S1330: Receive a trigger operation of the input operation control for the result of perceptual privacy verification, and determine the result of perceptual privacy verification.
S1340,向核心网发送第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。S1340. Send second information to the core network. The second information includes the result of the sensing privacy verification. The result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
本公开实施例中,待感知终端在接收到第一信息之后,可以向操作者,例如待感知终端的用户展示对感知隐私验证的结果的输入操作控件,从而,操作者可以根据情况触发对输入操作控件的操作,进而待感知终端便能够根据操作者的触发操作,确定感知隐私验证的结果。In the embodiment of the present disclosure, after receiving the first information, the terminal to be sensed can display the input operation control for the result of the sensing privacy verification to the operator, such as the user of the terminal to be sensed, so that the operator can trigger the input operation control according to the situation. By operating the control, the terminal to be sensed can determine the result of the sensing privacy verification based on the operator's triggering operation.
在一些实施方式中,为了便于操作者了解感知请求终端,响应于第一信息,还可以展示第一标识。In some implementations, in order to facilitate the operator to understand the sensing requesting terminal, in response to the first information, the first identification may also be displayed.
可选地,输入操作控件包括表征同意感知请求方对待感知终端进行目标数据感知的选择控件,表征拒绝感知请求方对待感知终端进行目标数据感知的选择控件,表征拒绝感知请求方对待感知终端进行目标数据感知的原因的输入控件,表征同意对待感知终端进行目标数据感知的设备的标识的输入控件,以及拒绝对待感知终端进行目标数据感知的设备的标识的输入控件中的至少一者。Optionally, the input operation control includes a selection control indicating that the sensing requester agrees to perform target data sensing on the sensing terminal to be sensed, a selection control indicating a rejection of the sensing requesting party to perform target data sensing on the sensing terminal to be sensed, and a selection control indicating a rejection of the sensing requesting party to perform target data sensing on the sensing terminal to be sensed. At least one of an input control for a reason for data sensing, an input control representing the identity of a device that agrees to perform target data sensing on the to-be-sensored terminal, and an input control that rejects the identity of a device that refuses to perform target data sensing on the to-be-sensored terminal.
采用上述方法,可以由待感知终端的操作者决定感知请求方对待感知终端进行目标数据感知的权限。Using the above method, the operator of the terminal to be sensed can determine the permission of the sensing requester to sense the target data of the terminal to be sensed.
在一些实施方式中,待感知终端在接收到核心网发送的第一信息之后,也可以根据预设策略直接确定感知隐私验证的结果,进而向核心网发送第二信息。In some embodiments, after receiving the first information sent by the core network, the terminal to be sensed can also directly determine the result of the sensing privacy verification according to the preset policy, and then send the second information to the core network.
图14是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于待感知 终端,核心网包括接入与移动性管理功能网元,如图14所示,该方法可以包括:Figure 14 shows a data sensing method according to an exemplary embodiment. This data sensing method is applied to the terminal to be sensed. The core network includes access and mobility management function network elements, as shown in Figure 14. This method may include:
S1410,接收接入与移动性管理功能网元发送的第一信息。S1410: Receive the first information sent by the access and mobility management function network element.
可选地,待感知终端可以接收接入与移动性管理功能网元发送的非接入通知(NAS Notification)消息,非接入通知消息包括第一信息。Optionally, the terminal to be sensed may receive a non-access notification (NAS Notification) message sent by the access and mobility management function network element, where the non-access notification message includes the first information.
S1420,响应于第一信息,确定感知隐私验证的结果。S1420. In response to the first information, determine the result of the perceptual privacy verification.
S1430,向接入与移动性管理功能网元发送第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。S1430. Send second information to the access and mobility management function network element. The second information includes the result of the sensing privacy verification. The result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
可选地,待感知终端可以向接入与移动性管理功能网元发送非接入通知(NAS Notification)响应,非接入通知响应包括第二信息。Optionally, the terminal to be sensed may send a non-access notification (NAS Notification) response to the access and mobility management function network element, and the non-access notification response includes the second information.
图15是根据一示例性实施例示出的一种核心网系统1500,如图15所示,该核心网系统1500包括第一网元1510、策略控制功能网元1520以及接入与移动性管理功能网元1530。其中:FIG15 is a
第一网元1510,用于确定第一信息以及待感知终端的第二标识,并将第一信息以及第二标识发送给策略控制功能网元;The
策略控制功能网元1520,用于将第一信息以及第二标识发送给接入与移动性管理功能网元;The policy control
接入与移动性管理功能网元1530,用于将第一信息发送给第二标识对应的终端,以及接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。The access and mobility management
在一些实施方式中,接入与移动性管理功能网元1530,还用于将第二信息发送给策略控制功能网元;In some embodiments, the access and mobility management
策略控制功能网元,还用于将第二信息发送给第一网元。The policy control function network element is further used to send the second information to the first network element.
在一些实施方式中,感知请求方为与核心网系统1500连接的感知请求终端,第一网元1510,还用于向感知请求终端发送感知响应,感知响应包括感知到的目标数据,表征拒绝感知请求终端对待感知终端进行目标数据感知的信息,以及表征拒绝感知请求终端对待感知终端进行目标数据感知的原因的信息中的至少一者,目标数据是在同意感知请求方对待感知终端进行目标数据感知的情况下发送的。In some embodiments, the sensing requester is a sensing requesting terminal connected to the
此外,根据本公开另一示例性实施例,还示出了一种核心网网元,该核心网网元可以是图15中的第一网元,该核心网网元与核心网中的策略控制功能网元连接,所述核心网网元用于确定第一信息以及第二标识,并通过所述策略控制功能网元将所述第一信息发送给所述第二标识对应的待感知终端,所述第一信息用于所述待感知终端确定感知隐私验证的结果。In addition, according to another exemplary embodiment of the present disclosure, a core network element is also shown. The core network element may be the first network element in Figure 15. The core network element is consistent with the policy in the core network. The control function network element is connected. The core network element is used to determine the first information and the second identification, and sends the first information to the terminal to be sensed corresponding to the second identification through the policy control function network element. , the first information is used by the terminal to be sensed to determine the result of sensing privacy verification.
在一些实施方式中,该核心网网元通过所述策略控制功能网元将所述第一信息发送给所述第二标识对应的待感知终端的过程,可以参考前述实施例中相关描述,例如,可以先将所述第一信息以及所述第二标识发送给所述策略控制功能网元,再通过所述策略控制功能网元将所述第一信息以及所述第二标识发送给所述接入与移动性管理功能网元,然后再通过所述接入与移动性管理功能网元将所述第一信息发送给所述第二标识对应的终端。In some embodiments, the process of the core network element sending the first information to the terminal to be sensed corresponding to the second identification through the policy control function element can refer to the relevant descriptions in the previous embodiments, for example , the first information and the second identification may be sent to the policy control function network element first, and then the first information and the second identification may be sent to the policy control function network element through the policy control function network element. The access and mobility management function network element then sends the first information to the terminal corresponding to the second identification through the access and mobility management function network element.
此外,在一些实施方式中,该核心网网元还可以接收到来自于待感知终端的第二信息以及感知响应。其中,该核心网网元接收到来自于待感知终端的第二信息以及感知响应的详细描述可以参考前述实施例,此处不再赘述。In addition, in some implementations, the core network element may also receive second information and a sensing response from the terminal to be sensed. For a detailed description of the second information received by the core network element from the terminal to be sensed and the sensing response, please refer to the foregoing embodiments and will not be described again here.
图16是根据一示例性实施例示出的一种数据感知方法。如图16所示,该数据感知方法可以包括:Figure 16 illustrates a data sensing method according to an exemplary embodiment. As shown in Figure 16, the data awareness method may include:
S1610,感知请求终端向核心网发送感知请求。S1610: The sensing request terminal sends a sensing request to the core network.
在一些实施方式中,感知请求包括感知请求终端的第一标识、待感知终端的第二标识以及表征待感知的目标数据的类型的信息。In some implementations, the sensing request includes a first identity of the sensing requesting terminal, a second identity of the terminal to be sensed, and information characterizing the type of target data to be sensed.
S1620,核心网根据感知请求确定第一信息以及第二标识。S1620: The core network determines the first information and the second identifier according to the sensing request.
在一些实施方式中,第一信息包括第一标识、表征待感知的目标数据的类型的信息以及 感知隐私验证指示信息。In some embodiments, the first information includes a first identification, information characterizing the type of target data to be sensed, and sensing privacy verification indication information.
S1630,核心网向第二标识对应的待感知终端发送第一信息。S1630: The core network sends the first information to the terminal to be sensed corresponding to the second identification.
S1640,待感知终端响应于第一信息,确定感知隐私验证的结果。S1640: The terminal to be sensed responds to the first information and determines the result of the sensing privacy verification.
S1650,待感知终端向核心网发送第二信息。S1650: The terminal to be sensed sends the second information to the core network.
其中,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。The second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
S1660,核心网向感知请求终端发送感知响应。S1660: The core network sends a sensing response to the sensing requesting terminal.
在一些实施方式中,感知响应为感知到的目标数据,目标数据是在同意感知请求方对待感知终端进行目标数据感知的情况下发送的。In some implementations, the sensing response is sensed target data, and the target data is sent when the sensing requester agrees to perform target data sensing on the terminal to be sensed.
在另一些实施方式中,感知响应为表征拒绝感知请求终端对待感知终端进行目标数据感知的信息。In other embodiments, the sensing response is information indicating that the sensing requesting terminal rejects the target data sensing of the terminal to be sensed.
在另一些实施方式中,感知响应为表征拒绝感知请求终端对待感知终端进行目标数据感知的信息,以及表征拒绝感知请求终端对待感知终端进行目标数据感知的原因的信息。In other embodiments, the sensing response is information representing the refusal of the sensing requesting terminal to perform target data sensing on the to-be-sensed terminal, and information characterizing the reason for rejecting the sensing requesting terminal to perform target data sensing on the to-be-sensing terminal.
图17是根据一示例性实施例示出的一种数据感知方法。如图17所示,该数据感知方法可以包括:Fig. 17 is a data perception method according to an exemplary embodiment. As shown in Fig. 17, the data perception method may include:
S1710,感知请求终端向第一网元发送感知请求。S1710: The sensing request terminal sends a sensing request to the first network element.
其中,感知请求包括感知请求终端的第一标识、待感知终端的第二标识以及表征待感知的目标数据的类型的信息。The sensing request includes a first identity of the sensing requesting terminal, a second identity of the terminal to be sensed, and information characterizing the type of target data to be sensed.
S1720,第一网元向策略控制功能网元发送感知策略控制请求。S1720: The first network element sends a sensing policy control request to the policy control function network element.
其中,感知策略控制请求包括第一标识、第二标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息。The sensing policy control request includes a first identifier, a second identifier, information characterizing the type of target data to be sensed, and sensing privacy verification indication information.
S1730,策略控制功能网元向接入与移动性管理功能网元发送Namf_Communication_N1N2MessageTransfer请求。S1730: The policy control function network element sends a Namf_Communication_N1N2MessageTransfer request to the access and mobility management function network element.
其中,Namf_Communication_N1N2MessageTransfer请求包括第二标识以及N1消息,N1消息包括第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息。The Namf_Communication_N1N2MessageTransfer request includes a second identifier and an N1 message. The N1 message includes a first identifier, information characterizing the type of target data to be sensed, and sensing privacy verification indication information.
S1740,接入与移动性管理功能网元向第二标识对应的待感知终端发送非接入通知消息。S1740: The access and mobility management function network element sends a non-access notification message to the terminal to be sensed corresponding to the second identification.
其中,非接入通知消息包括N1消息。The non-access notification message includes the N1 message.
S1750,待感知终端向接入与移动性管理功能网元发送非接入通知响应。S1750, the sensing terminal sends a non-access notification response to the access and mobility management function network element.
其中,非接入通知响应包括感知隐私验证的结果。Among them, the non-access notification response includes the result of perceptual privacy verification.
S1760,接入与移动性管理功能网元向策略控制功能网元发送Namf_Communication_N1N2MessageTransfer响应。S1760: The access and mobility management function network element sends a Namf_Communication_N1N2MessageTransfer response to the policy control function network element.
其中,Namf_Communication_N1N2MessageTransfer响应包括感知隐私验证的结果。Among them, the Namf_Communication_N1N2MessageTransfer response includes the results of privacy-aware verification.
S1770,策略控制功能网元向第一网元发送感知策略控制响应。S1770: The policy control function network element sends a sensing policy control response to the first network element.
其中,感知策略控制响应包括感知隐私验证的结果。Among them, the perceptual policy control response includes the result of perceptual privacy verification.
S1780,第一网元将感知隐私验证的结果发生给感知请求终端。S1780: The first network element sends the sensing privacy verification result to the sensing requesting terminal.
图18是根据一示例性实施例示出的一种数据感知装置1800的框图,该数据感知装置可以应用于核心网,如图18所示,该装置1800可以包括:Figure 18 is a block diagram of a
第一发送模块1810,被配置为向待感知终端发送第一信息,所述第一信息用于所述待感知终端确定感知隐私验证的结果。The
第一接收模块1810,被配置为接收所述待感知终端发送的第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。The
在一些实施例中,装置1800还包括:In some embodiments,
第二接收模块,被配置为接收所述待感知终端发送的感知到的目标数据,所述目标数据是在同意所述感知请求方对所述待感知终端进行目标数据感知的情况下发送的。The second receiving module is configured to receive the sensed target data sent by the terminal to be sensed, where the target data is sent under the condition that the sensing requester agrees to perform target data sensing on the terminal to be sensed.
在一些实施例中,所述感知请求方为与所述核心网连接的感知请求终端,第一发送模块 1810,包括:In some embodiments, the sensing requester is a sensing requesting terminal connected to the core network. The
接收子模块,被配置为接收所述感知请求终端发送的感知请求。The receiving submodule is configured to receive the sensing request sent by the sensing requesting terminal.
第一发送子模块,被配置为响应于所述感知请求,向所述待感知终端发送所述第一信息。The first sending sub-module is configured to send the first information to the terminal to be sensed in response to the sensing request.
在一些实施例中,所述感知请求包括所述感知请求终端的第一标识、所述待感知终端的第二标识以及表征待感知的目标数据的类型的信息,第一发送子模块,还被配置为响应于所述感知请求,生成感知隐私验证指示信息;将所述第一标识、所述表征待感知的目标数据的类型的信息以及所述感知隐私验证指示信息作为所述第一信息,发送到所述第二标识对应的终端。In some embodiments, the sensing request includes the first identity of the sensing requesting terminal, the second identity of the terminal to be sensed, and information characterizing the type of target data to be sensed. The first sending submodule is also configured to generate sensing privacy verification indication information in response to the sensing request; using the first identification, the information characterizing the type of target data to be sensed, and the sensing privacy verification indication information as the first information, Sent to the terminal corresponding to the second identification.
在一些实施例中,装置1800还包括:In some embodiments,
第二发送模块,被配置为向所述感知请求终端发送感知响应,所述感知响应包括感知到的目标数据,表征拒绝所述感知请求终端对所述待感知终端进行目标数据感知的信息,以及表征拒绝所述感知请求终端对所述待感知终端进行目标数据感知的原因的信息中的至少一者,所述目标数据是在同意所述感知请求方对所述待感知终端进行目标数据感知的情况下发送的。The second sending module is configured to send a sensing response to the sensing requesting terminal, where the sensing response includes the sensed target data, information representing the refusal of the sensing requesting terminal to sense the target data of the terminal to be sensed, and At least one of the information representing the reasons for refusing the sensing requesting terminal to sense the target data of the terminal to be sensed, the target data being agreed to by the sensing requesting party to sense the target data of the terminal to be sensed. Sent under circumstances.
在一些实施例中,所述核心网包括第一网元、策略控制功能网元以及接入与移动性管理功能网元,第一发送模块1810包括:In some embodiments, the core network includes a first network element, a policy control function network element, and an access and mobility management function network element. The
确定子模块,被配置为通过所述第一网元确定第一信息以及所述待感知终端的第二标识;a determining submodule configured to determine the first information and the second identification of the terminal to be sensed through the first network element;
第二发送子模块,被配置为通过所述第一网元将所述第一信息以及所述第二标识发送给所述策略控制功能网元;A second sending submodule is configured to send the first information and the second identifier to the policy control function network element through the first network element;
第三发送子模块,被配置为通过所述策略控制功能网元将所述第一信息以及所述第二标识发送给所述接入与移动性管理功能网元;The third sending submodule is configured to send the first information and the second identification to the access and mobility management function network element through the policy control function network element;
第四发送子模块,被配置为通过所述接入与移动性管理功能网元将所述第一信息发送给所述第二标识对应的终端。The fourth sending sub-module is configured to send the first information to the terminal corresponding to the second identification through the access and mobility management function network element.
在一些实施例中,第二发送子模块,还被配置为通过所述第一网元向所述策略控制功能网元发送第一请求,所述第一请求包括所述第一信息以及所述第二标识。In some embodiments, the second sending sub-module is further configured to send a first request to the policy control function network element through the first network element, where the first request includes the first information and the Second identification.
在一些实施例中,第三发送子模块,还被配置为通过所述策略控制功能网元向所述接入与移动性管理功能网元发送Namf_Communication_N1N2MessageTransfer请求,所述Namf_Communication_N1N2MessageTransfer请求包括所述第二标识以及N1消息,所述N1消息包括所述第一信息。In some embodiments, the third sending submodule is further configured to send a Namf_Communication_N1N2MessageTransfer request to the access and mobility management function network element through the policy control function network element, the Namf_Communication_N1N2MessageTransfer request includes the second identifier and the N1 message, and the N1 message includes the first information.
在一些实施例中,第四发送子模块,还被配置为通过所述接入与移动性管理功能网元向所述第二标识对应的终端发送非接入通知消息,所述非接入通知包括所述第一信息。In some embodiments, the fourth sending sub-module is further configured to send a non-access notification message to the terminal corresponding to the second identification through the access and mobility management function network element, and the non-access notification message including the first information.
在一些实施方式中,所述用于指示所述感知请求方对所述待感知终端进行目标数据感知的权限的信息包括,表征同意所述感知请求方对所述待感知终端进行目标数据感知的信息,表征拒绝所述感知请求方对所述待感知终端进行目标数据感知的信息,表征拒绝所述感知请求方对所述待感知终端进行目标数据感知的原因的信息,同意对所述待感知终端进行目标数据感知的设备的标识,以及拒绝对所述待感知终端进行目标数据感知的设备的标识中的至少一者。In some embodiments, the information indicating the permission of the sensing requester to perform target data sensing on the terminal to be sensed includes indicating that the sensing requester agrees to the sensing requester to perform target data sensing on the terminal to be sensed. Information, indicating the reason why the sensing requester refuses to sense the target data of the terminal to be sensed, information indicating the reason why the sensing requester refuses to sense the target data of the terminal to be sensed, and agreeing to sense the target data of the terminal to be sensed. At least one of the identification of the device for the terminal to perform target data sensing, and the identification of the device for refusing to perform target data sensing on the terminal to be sensed.
图19是根据一示例性实施例示出的一种数据感知装置1900的框图,该数据感知装置可以应用于待感知终端,如图19所示,该装置1900可以包括:Figure 19 is a block diagram of a
第三接收模块1910,被配置为接收核心网发送的第一信息;The
确定模块1920,被配置为响应于所述第一信息,确定感知隐私验证的结果;The determining
第三发送模块1930,被配置为向所述核心网发送第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。The
在一些实施方式中,装置1900还包括:In some embodiments,
第四发送模块,被配置为向核心网发送感知到的目标数据,所述目标数据是在同意所述感知请求方对所述待感知终端进行目标数据感知的情况下发送的。The fourth sending module is configured to send the sensed target data to the core network, where the target data is sent under the condition that the sensing requester agrees to perform target data sensing on the terminal to be sensed.
在一些实施方式中,第四发送模块,还被配置为接收所述核心网发送的感知请求;响应于所述感知请求,向核心网发送感知到的目标数据。In some implementations, the fourth sending module is further configured to receive a sensing request sent by the core network; in response to the sensing request, send the sensed target data to the core network.
在一些实施方式中,确定模块1920,还被配置为响应于所述第一信息,展示对感知隐私验证的结果的输入操作控件;接收对感知隐私验证的结果的输入操作控件的触发操作,确定所述感知隐私验证的结果。In some embodiments, the determining
在一些实施方式中,所述输入操作控件包括表征同意所述感知请求方对所述待感知终端进行目标数据感知的选择控件,表征拒绝所述感知请求方对所述待感知终端进行目标数据感知的选择控件,表征拒绝所述感知请求方对所述待感知终端进行目标数据感知的原因的输入控件,表征同意对所述待感知终端进行目标数据感知的设备的标识的输入控件,以及拒绝对所述待感知终端进行目标数据感知的设备的标识的输入控件中的至少一者。In some embodiments, the input operation control includes at least one of a selection control representing the consent of the perception requester to perform target data perception on the terminal to be perceived, a selection control representing the refusal of the perception requester to perform target data perception on the terminal to be perceived, an input control representing the reason for refusal of the perception requester to perform target data perception on the terminal to be perceived, an input control representing the identification of a device that agrees to perform target data perception on the terminal to be perceived, and an input control representing the identification of a device that refuses to perform target data perception on the terminal to be perceived.
在一些实施方式中,所述核心网包括接入与移动性管理功能网元,第三接收模块1910,还被配置为接收所述接入与移动性管理功能网元发送的所述第一信息。In some embodiments, the core network includes an access and mobility management function network element, and the
在一些实施方式中,所述核心网包括接入与移动性管理功能网元,第三发送模块1930,还被配置为向所述接入与移动性管理功能网元发送所述第二信息。In some embodiments, the core network includes an access and mobility management function network element, and the
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。Regarding the devices in the above embodiments, the specific manner in which each module performs operations has been described in detail in the embodiments related to the method, and will not be described in detail here.
图20是根据一示例性实施例示出的一种数据感知装置的框图。该数据感知装置2000可以是图1所示通信系统中的核心网。参照图20,该装置2000可以包括以下一个或多个组件:处理组件2002,存储器2004,以及通信组件2006。Figure 20 is a block diagram of a data sensing device according to an exemplary embodiment. The
处理组件2002可以用于控制该装置2000的整体操作,诸如与显示,数据通信,相机操作和记录操作相关联的操作。处理组件2002可以包括一个或多个处理器2020来执行指令,以完成上述的数据感知方法的全部或部分步骤。此外,处理组件2002可以包括一个或多个模块,便于处理组件2002和其他组件之间的交互。例如,处理组件2002可以包括多媒体模块,以方便多媒体组件和处理组件2002之间的交互。The
存储器2004被配置为存储各种类型的数据以支持在装置2000的操作。这些数据的示例包括用于在装置2000上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器2004可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
通信组件2006被配置为便于装置2000和其他设备之间有线或无线方式的通信。装置2000可以接入基于通信标准的无线网络,例如Wi-Fi,2G、3G、4G、5G、6G、NB-IOT、eMTC等,或它们的组合。在一个示例性实施例中,通信组件2006经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件2006还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
图21是根据一示例性实施例示出的一种数据感知装置的框图。例如,数据感知装置2100可以是图1所示通信系统中的待感知终端,该待感知终端例如可以是手机、相机、笔记本、平板电脑以及智能可穿戴设备等。Figure 21 is a block diagram of a data sensing device according to an exemplary embodiment. For example, the
参照图21,数据感知装置2100可以包括以下一个或多个组件:处理组件2102,存储器2104,电源组件2106,多媒体组件2108,音频组件2110,输入/输出接口2112,传感器组件2114,以及通信组件2116。Referring to Figure 21,
处理组件2102通常控制数据感知装置2100的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件2102可以包括一个或多个处理器2120来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件2102可以包括一个或多个模块,便于处理组件2102和其他组件之间的交互。例如,处理组件2102可以包括多媒体 模块,以方便多媒体组件2108和处理组件2102之间的交互。The
存储器2104被配置为存储各种类型的数据以支持在数据感知装置2100的操作。这些数据的示例包括用于在数据感知装置2100上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器2104可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件2106为数据感知装置2100的各种组件提供电力。电源组件2106可以包括电源管理系统,一个或多个电源,及其他与为数据感知装置2100生成、管理和分配电力相关联的组件。
多媒体组件2108包括在所述数据感知装置2100和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件2108包括一个前置摄像头和/或后置摄像头。当数据感知装置2100处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件2110被配置为输出和/或输入音频信号。例如,音频组件2110包括一个麦克风(MIC),当数据感知装置2100处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器2104或经由通信组件2116发送。在一些实施例中,音频组件2110还包括一个扬声器,用于输出音频信号。
输入/输出接口2112为处理组件2102和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。The input/
传感器组件2114包括一个或多个传感器,用于为数据感知装置2100提供各个方面的状态评估。例如,传感器组件2114可以检测到数据感知装置2100的打开/关闭状态,组件的相对定位,例如所述组件为数据感知装置2100的显示器和小键盘,传感器组件2114还可以检测数据感知装置2100或数据感知装置2100一个组件的位置改变,用户与数据感知装置2100接触的存在或不存在,数据感知装置2100方位或加速/减速和数据感知装置2100的温度变化。传感器组件2114可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件2114还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件2114还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件2116被配置为便于数据感知装置2100和其他设备之间有线或无线方式的通信。数据感知装置2100可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件2116经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件2116还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。The
在示例性实施例中,装置2000或者装置2100可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述数据感知方法。In an exemplary embodiment, the
上述装置2000或者装置2100可以是独立的电子设备,也可以是独立电子设备的一部分, 例如在一种实施例中,该电子设备可以是集成电路(Integrated Circuit,IC)或芯片,其中该集成电路可以是一个IC,也可以是多个IC的集合;该芯片可以包括但不限于以下种类:GPU(Graphics Processing Unit,图形处理器)、CPU(Central Processing Unit,中央处理器)、FPGA(Field Programmable Gate Array,可编程逻辑阵列)、DSP(Digital Signal Processor,数字信号处理器)、ASIC(Application Specific Integrated Circuit,专用集成电路)、SOC(System on Chip,SoC,片上系统或系统级芯片)等。上述的集成电路或芯片中可以用于执行可执行指令(或代码),以实现上述数据感知方法。其中该可执行指令可以存储在该集成电路或芯片中,也可以从其他的装置或设备获取,例如该集成电路或芯片中包括处理器、存储器,以及用于与其他的装置通信的接口。该可执行指令可以存储于该处理器中,当该可执行指令被处理器执行时实现上述数据感知方法;或者,该集成电路或芯片可以通过该接口接收可执行指令并传输给该处理器执行,以实现上述数据感知方法。The above-mentioned
在示例性实施例中,本公开还提供了一种计算机可读存储介质,其上存储有计算机程序指令,该程序指令被处理器执行时实现本公开提供的数据感知方法的步骤。示例地,该计算机可读存储介质可以是一种包括指令的非临时性计算机可读存储介质,例如,可以是包括指令的上述存储器2004或者2104,上述指令可由装置2000的处理器2020或者装置2100的处理器2120执行以完成上述数据感知方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。In an exemplary embodiment, the present disclosure also provides a computer-readable storage medium on which computer program instructions are stored. When the program instructions are executed by a processor, the steps of the data sensing method provided by the present disclosure are implemented. For example, the computer-readable storage medium may be a non-transitory computer-readable storage medium including instructions, for example, it may be the above-mentioned
在另一示例性实施例中,还提供一种计算机程序产品,该计算机程序产品包含能够由可编程的装置执行的计算机程序,该计算机程序具有当由该可编程的装置执行时用于执行上述数据感知方法的代码部分。In another exemplary embodiment, a computer program product is also provided, the computer program product comprising a computer program executable by a programmable device, the computer program having a function for performing the above when executed by the programmable device. The code portion of the data-aware approach.
本领域技术人员在考虑说明书及实践本公开后,将容易想到本公开的其它实施方案。本申请旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。Other embodiments of the disclosure will be readily apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This application is intended to cover any variations, uses, or adaptations of the disclosure that follow the general principles of the disclosure and include common knowledge or customary technical means in the technical field that are not disclosed in the disclosure. . It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。It is to be understood that the present disclosure is not limited to the precise structures described above and illustrated in the accompanying drawings, and various modifications and changes may be made without departing from the scope thereof. The scope of the disclosure is limited only by the appended claims.
Claims (25)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202280003266.4A CN115669023B (en) | 2022-09-20 | 2022-09-20 | Data perception method, core network system, core network element and chip |
| PCT/CN2022/120016 WO2024060037A1 (en) | 2022-09-20 | 2022-09-20 | Data sensing method, and core network system, core network element and chip |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2022/120016 WO2024060037A1 (en) | 2022-09-20 | 2022-09-20 | Data sensing method, and core network system, core network element and chip |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024060037A1 true WO2024060037A1 (en) | 2024-03-28 |
Family
ID=85022833
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2022/120016 Ceased WO2024060037A1 (en) | 2022-09-20 | 2022-09-20 | Data sensing method, and core network system, core network element and chip |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN115669023B (en) |
| WO (1) | WO2024060037A1 (en) |
Families Citing this family (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2024065125A1 (en) * | 2022-09-26 | 2024-04-04 | 北京小米移动软件有限公司 | Sensing implementation method and apparatus, communication device, and storage medium |
| CN118714553A (en) * | 2023-03-27 | 2024-09-27 | 华为技术有限公司 | Communication method and communication device |
| CN120958856A (en) * | 2023-04-07 | 2025-11-14 | Oppo广东移动通信有限公司 | Perceptual authorization method and apparatus |
| WO2024250129A1 (en) * | 2023-06-05 | 2024-12-12 | Oppo广东移动通信有限公司 | Communication method, terminal device, and core network element |
| CN116506845B (en) * | 2023-06-19 | 2023-09-15 | 暨南大学 | A privacy-protecting Internet of Vehicles crowd intelligence sensing and motivation method and system |
| CN119233190A (en) * | 2023-06-28 | 2024-12-31 | 维沃软件技术有限公司 | Perception processing method, device, communication equipment and readable storage medium |
| CN120238908A (en) * | 2023-12-29 | 2025-07-01 | 维沃移动通信有限公司 | Perception method, perception device, communication equipment and readable storage medium |
| CN120711387A (en) * | 2024-03-26 | 2025-09-26 | 维沃移动通信有限公司 | Authorization method, perception request method, device, terminal and equipment for perception service |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190037448A1 (en) * | 2017-09-27 | 2019-01-31 | Intel IP Corporation | Solution for vehicle-to-everything (v2x) communication authorization in 5g system |
| US20210258793A1 (en) * | 2020-02-17 | 2021-08-19 | Samsung Electronics Co., Ltd. | Method and apparatus for handling security policies in v2x communication system |
| WO2021231165A1 (en) * | 2020-05-12 | 2021-11-18 | Qualcomm Incorporated | Providing security credentials to an unmanned aerial vehicle |
| CN113676898A (en) * | 2020-04-30 | 2021-11-19 | 华为技术有限公司 | Determining security protection methods, systems and devices |
Family Cites Families (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10311426B2 (en) * | 2013-02-05 | 2019-06-04 | Visa International Service Association | Integrated communications network for transactions |
| CN104751031A (en) * | 2013-12-31 | 2015-07-01 | 中国移动通信集团公司 | Information interaction control method and device |
| JP2017041033A (en) * | 2015-08-18 | 2017-02-23 | 株式会社リコー | System, information processing method, information processing apparatus, and program |
| US10560840B2 (en) * | 2016-03-18 | 2020-02-11 | Wipro Limited | System and method for providing dynamic, adaptive and composite privacy and security for IoT communication |
| CN108377495B (en) * | 2016-10-31 | 2021-10-15 | 华为技术有限公司 | A data transmission method, related equipment and system |
| CN108076461B (en) * | 2016-11-18 | 2020-09-18 | 华为技术有限公司 | Authentication method, base station, user equipment and core network element |
| CN107749836B (en) * | 2017-09-15 | 2020-07-31 | 江苏大学 | Mobile sensing system and mobile sensing method for user privacy protection and data reliability |
| CN109819485B (en) * | 2017-11-21 | 2020-11-27 | 华为技术有限公司 | A communication method, device and system |
| CN110418395B (en) * | 2018-04-28 | 2021-07-16 | 华为技术有限公司 | Capability opening method, related device, system and medium |
| CN109558895A (en) * | 2018-11-07 | 2019-04-02 | 广州慧睿思通信息科技有限公司 | A kind of campus administration method, system and medium based on Intellisense |
| CN110247906A (en) * | 2019-06-10 | 2019-09-17 | 平安科技(深圳)有限公司 | A kind of method for monitoring network and device, equipment, storage medium |
| CN114424600B (en) * | 2019-09-30 | 2024-03-26 | 华为技术有限公司 | Communication method, device, system and storage medium |
| CN110825810B (en) * | 2019-10-28 | 2023-05-19 | 天津理工大学 | A double privacy protection method based on blockchain group intelligence perception |
| CN111083142A (en) * | 2019-12-17 | 2020-04-28 | 杭州海康威视数字技术股份有限公司 | Data access method, system and equipment applied to Internet of things |
| CN111461852A (en) * | 2020-03-27 | 2020-07-28 | 财付通支付科技有限公司 | A blockchain-based data processing method, device and readable storage medium |
| CN113573298B (en) * | 2020-04-10 | 2022-05-24 | 华为技术有限公司 | A communication method and device |
| CN113114548B (en) * | 2020-07-07 | 2022-10-14 | 德能森智能科技(成都)有限公司 | Terminal management method and system based on privacy management |
| CN114071791B (en) * | 2020-08-06 | 2024-01-26 | 北京佰才邦技术股份有限公司 | User plane function information reporting method, access network equipment and core network equipment |
| CN112398859B (en) * | 2020-11-17 | 2022-02-18 | 珠海大横琴科技发展有限公司 | Security control method, device, server and storage medium based on regional Internet of things platform |
| WO2022110184A1 (en) * | 2020-11-30 | 2022-06-02 | 华为技术有限公司 | Communication method, apparatus and system |
| CN114037407B (en) * | 2021-10-19 | 2025-10-31 | 深圳市万集科技有限公司 | Accident investigation method, device, server, investigation terminal and storage medium |
| CN113873462A (en) * | 2021-11-02 | 2021-12-31 | 中国联合网络通信集团有限公司 | Communication sensing service communication method, network element, system, equipment and medium |
| CN115037552B (en) * | 2022-06-29 | 2024-09-13 | 北京大甜绵白糖科技有限公司 | Authentication method, device, equipment and storage medium |
-
2022
- 2022-09-20 WO PCT/CN2022/120016 patent/WO2024060037A1/en not_active Ceased
- 2022-09-20 CN CN202280003266.4A patent/CN115669023B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190037448A1 (en) * | 2017-09-27 | 2019-01-31 | Intel IP Corporation | Solution for vehicle-to-everything (v2x) communication authorization in 5g system |
| US20210258793A1 (en) * | 2020-02-17 | 2021-08-19 | Samsung Electronics Co., Ltd. | Method and apparatus for handling security policies in v2x communication system |
| CN113676898A (en) * | 2020-04-30 | 2021-11-19 | 华为技术有限公司 | Determining security protection methods, systems and devices |
| WO2021231165A1 (en) * | 2020-05-12 | 2021-11-18 | Qualcomm Incorporated | Providing security credentials to an unmanned aerial vehicle |
Also Published As
| Publication number | Publication date |
|---|---|
| CN115669023B (en) | 2025-06-24 |
| CN115669023A (en) | 2023-01-31 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN115669023B (en) | Data perception method, core network system, core network element and chip | |
| KR102579275B1 (en) | Locating electronic devices and associated wireless accessories | |
| CN116097689A (en) | Perception realization method, device, communication device and storage medium | |
| US10523639B2 (en) | Privacy preserving wearable computing device | |
| EP2981116B1 (en) | Method and apparatus for accessing wi-fi network and computer program product | |
| EP4498714A1 (en) | Information processing method and apparatus, communication device, and storage medium | |
| US20240371252A1 (en) | Separation Alerts for Notification While Traveling | |
| CN115516934A (en) | Registration method of equipment perception capability, application method and device of equipment perception | |
| US20220124646A1 (en) | Method and apparatus for sending synchronization signal | |
| US20170223532A1 (en) | Method and apparatus for accessing wireless local area network | |
| WO2019148317A1 (en) | Uav service supporting method and device | |
| CN117136600A (en) | Information processing method and device, communication equipment and storage medium | |
| CN105049219B (en) | Flow booking method and system, mobile terminal and server | |
| US10123208B2 (en) | Method and device for controlling access | |
| WO2023245589A1 (en) | Positioning model determination method and apparatus | |
| WO2024011413A1 (en) | Information processing method and device, communication equipment, and storage medium | |
| WO2023178532A1 (en) | Processing method and apparatus for communication and sensing service, communication device, and storage medium | |
| WO2024138758A1 (en) | Sensing information acquisition method and apparatus | |
| WO2024031582A1 (en) | Communication method and apparatus, storage medium, and chip | |
| WO2023178533A1 (en) | Processing method and apparatus for communication and sensing service, communication device and storage medium | |
| US20250324386A1 (en) | Ranging/sidelink positioning method and apparatus | |
| CN110896567A (en) | Data transmission method and device based on WIFI | |
| HK40083048A (en) | Method, apparatus, device, and storage medium for safety confirmation of charging device | |
| CN115795447A (en) | Method, device and equipment for confirming safety of charging equipment and storage medium | |
| WO2024087124A1 (en) | Communication method and apparatus, user equipment, communication system, and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22959049 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWG | Wipo information: grant in national office |
Ref document number: 202280003266.4 Country of ref document: CN |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 22959049 Country of ref document: EP Kind code of ref document: A1 |