WO2024060037A1 - 数据感知方法、核心网系统、核心网网元及芯片 - Google Patents
数据感知方法、核心网系统、核心网网元及芯片 Download PDFInfo
- Publication number
- WO2024060037A1 WO2024060037A1 PCT/CN2022/120016 CN2022120016W WO2024060037A1 WO 2024060037 A1 WO2024060037 A1 WO 2024060037A1 CN 2022120016 W CN2022120016 W CN 2022120016W WO 2024060037 A1 WO2024060037 A1 WO 2024060037A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- sensing
- terminal
- sensed
- information
- target data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- the present disclosure relates to the field of communication technology, specifically, to a data sensing method, a core network system, a core network element and a chip.
- Wireless sensing technology aims to obtain information about remote objects and their properties without requiring physical contact.
- the data sensed by the object to be sensed can be used for analysis to obtain meaningful information about the object to be sensed or its surrounding environment, which can be used to assist radio resource management, interference suppression, beam management, mobility, etc., in order to facilitate operation in multiple cells.
- Benefits are provided by markets and verticals such as smart transportation, aviation, enterprise, smart cities, smart homes, factories, consumer applications, and the public sector.
- the present disclosure provides a data sensing method, device, core network system, core network element, storage medium and chip.
- a data sensing method is provided and applied to a core network.
- the method includes:
- Receive second information sent by the terminal to be sensed where the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to instruct the sensing requester to perform target data sensing on the terminal to be sensed. permissions.
- a data sensing method is provided, applied to a terminal to be sensed, and the method includes:
- Second information is sent to the core network, where the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- a core network system includes a first network element, a policy control function network element, and an access and mobility management function network element, wherein:
- the first network element is used to determine the first information and the second identification of the terminal to be sensed, and send the first information and the second identification to the policy control function network element;
- the policy control function network element is used to send the first information and the second identifier to the access and mobility management function network element;
- the access and mobility management function network element is configured to send the first information to the terminal corresponding to the second identification, and receive the second information sent by the terminal to be sensed, where the second information includes
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- a core network element is provided.
- the core network element is connected to a policy control function network element in the core network.
- the core network element is used to determine the first information and the third information. two identities, and sends the first information to the terminal to be sensed corresponding to the second identity through the policy control function network element, and the first information is used for the terminal to be sensed to determine the result of sensing privacy verification.
- a data sensing device applied to a core network, and the device includes:
- the first sending module is configured to send first information to the terminal to be sensed, the first information being used by the terminal to be sensed to determine the result of the sensing privacy verification;
- a first receiving module configured to receive second information sent by the terminal to be sensed, where the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to indicate that the sensing requester has The permission of the terminal to be sensed to sense target data.
- a data sensing device applied to a terminal to be sensed, and the device includes:
- the third receiving module is configured to receive the first information sent by the core network
- a determining module configured to determine a result of the perceptual privacy verification in response to the first information
- the third sending module is configured to send second information to the core network, where the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to indicate that the sensing requester is aware of the need for sensing.
- the terminal has permission to sense target data.
- a data sensing device including:
- Memory used to store instructions executable by the processor
- the processor is configured to perform the steps of the data sensing method provided by the first aspect of the present disclosure.
- a data sensing device including:
- Memory used to store instructions executable by the processor
- the processor is configured to perform the steps of the data sensing method provided in the second aspect of the present disclosure.
- a computer-readable storage medium on which computer program instructions are stored.
- the steps of the data sensing method provided by the first aspect of the present disclosure are implemented. .
- a computer-readable storage medium on which computer program instructions are stored.
- the steps of the data sensing method provided by the second aspect of the present disclosure are implemented. .
- a chip including: a processor and an interface; the processor is used to read instructions to execute the steps of the data sensing method provided in the first aspect of the present disclosure,
- a chip including: a processor and an interface; the processor is configured to read instructions to execute the steps of the data sensing method provided in the second aspect of the disclosure.
- first information for determining the result of the perceptual privacy verification is sent to the terminal to be sensed through the core network, and second information including the result of the perceptual privacy verification is received through the core network. Since the result of the sensing privacy verification is used to indicate the sensing requester's authority to sense the target data of the terminal to be sensed, the terminal to be sensed can perform sensing authority verification on the sensing requester, and then decide whether to agree to the sensing requester to treat the sensing terminal. Perceiving target data, through the process of authority verification, can protect the sensing data transmission process of the terminal to be sensed and improve the security of the terminal to be sensed.
- FIG. 1 is a schematic diagram of a communication system according to an exemplary embodiment.
- Figure 2 is a schematic diagram of another communication system according to an exemplary embodiment.
- Figure 3 is a flow chart of a data sensing method according to an exemplary embodiment.
- Figure 4 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 5 is a flow chart of another data sensing method according to an exemplary embodiment.
- Figure 6 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 7 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 8 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 9 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 10 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 11 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 12 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 13 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 14 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 15 shows a core network system according to an exemplary embodiment.
- Figure 16 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 17 is a flowchart of another data sensing method according to an exemplary embodiment.
- Figure 18 is a block diagram of a data sensing device according to an exemplary embodiment.
- Figure 19 is a block diagram of a data sensing device according to an exemplary embodiment.
- Figure 20 is a block diagram of a data sensing device according to an exemplary embodiment.
- Figure 21 is a block diagram of a data sensing device according to an exemplary embodiment.
- plural refers to two or more than two, and other quantifiers are similar; “at least one of the following”, “one or more” “Item (items)” or similar expressions refer to any combination of these items (items), including any combination of single items (items) or plural items (items).
- one or more items in a, b, or c can mean: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c can be single, It can also be multiple; "and/or" is an association relationship that describes associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A exists alone, A and B exist simultaneously, alone There are three cases of B, where A and B can be singular or plural.
- the technical solutions of the embodiments of this application can be applied to various communication systems.
- the communication system may include one or more of a 4G (the 4th Generation, fourth generation) communication system, a 5G (the 5th Generation, the fifth generation) communication system, and other future wireless communication systems (such as 6G).
- the communication system may also include Public Land Mobile Network (PLMN) network, non-terrestrial network communication system, Device-to-Device (D2D) communication system, Machine to Machine (Machine to Machine) , M2M) communication system, Internet of Things (IoT) communication system, Vehicle-to-Everything (V2X) communication system or one or more of other communication systems.
- PLMN Public Land Mobile Network
- D2D Device-to-Device
- M2M Machine to Machine
- IoT Internet of Things
- V2X Vehicle-to-Everything
- FIG. 1 is a schematic diagram of a communication system according to an exemplary embodiment.
- the communication system may include a terminal to be sensed 101, a core network 102, and a sensing requesting terminal 103.
- the communication system can be used to support 4G (the4th Generation, fourth generation) network access technology, such as Long Term Evolution (LTE) access technology, or 5G (the 5th Generation, fifth generation) network access Technology, such as New Radio Access Technology (New RAT), or other future wireless communication technologies.
- LTE Long Term Evolution
- 5G the 5th Generation, fifth generation network access Technology, such as New Radio Access Technology (New RAT), or other future wireless communication technologies.
- the number of the above-mentioned terminals 101 to be sensed or the terminals 103 to be sensed may be one or more.
- the number of terminals 101 to be sensed or the number of sensing requesting terminals 103 in the communication system shown in Figure 1 is only This is an example of the adaptability of an embodiment, and this disclosure does not limit
- the terminal to be sensed 101 or the sensing requesting terminal 103 in Figure 1 can be an electronic device that provides voice or data connectivity, for example, it can also be called user equipment (User Equipment, UE), subscriber unit (Subscriber Unit), mobile station (Mobile Station), station (Station), terminal equipment, etc.
- the terminal may include a smartphone, a smart wearable device, a smart speaker, a smart tablet, a wireless modem (modem), a wireless local loop (Wireless Local Loop, WLL) station, or a PDA (Personal Digital Assistant). , CPE (Customer Premise Equipment, customer terminal equipment), etc.
- devices that can access the communication system, communicate with the base station of the communication system, or communicate with other objects through the communication system can be terminals in the embodiments of the present disclosure, for example, in intelligent transportation terminals and cars, household equipment in smart homes, power meter reading instruments in smart grids, voltage monitoring instruments, environmental monitoring instruments, video monitoring instruments in smart security networks, cash registers, etc.
- Fig. 2 is a schematic diagram of another communication system according to an exemplary embodiment.
- the communication system may include a sensing request terminal 201, a first network element (Sensing Application Function, SAF) 202, a policy control function network element (Policy Control Function, PCF) 203, a session management function network element (Session Management Function, SMF) 204, a user plane function network element (User Plane Function, UPF) 205, an access and mobility management function network element (Access and Mobility Management Function, AMF) 206, a radio access network (Radio Access Network, RAN) 207 and a terminal to be sensed 208.
- SAF Signal Application Function
- PCF Policy Control Function
- SMF Session Management Function
- UPF User Plane Function
- UPF Access and Mobility Management Function
- AMF Access and Mobility Management Function
- the data awareness method of the embodiment of the present disclosure can be applied to the following scenarios, for example:
- Real-time environmental monitoring Use the perceived wireless signals to reconstruct the environmental map to further improve positioning accuracy and empower environment-related applications, such as dynamic 3D map-assisted driving, pedestrian traffic statistics, intrusion and a series of real-time monitoring-related application detection and traffic detection. wait.
- environment-related applications such as dynamic 3D map-assisted driving, pedestrian traffic statistics, intrusion and a series of real-time monitoring-related application detection and traffic detection. wait.
- Self-driving cars/drones Self-driving car/drone applications have some common functional requirements. For example, self-driving cars/drones should support Detect and Avoid (DAA) to avoid obstacles. At the same time, autonomous vehicles/drone should have the ability to monitor path information, such as choosing routes and obeying traffic rules. Therefore, using the sensed data can help complete obstacle avoidance and monitor path information.
- DAA Detect and Avoid
- Air pollution monitoring The quality of the received wireless signal exhibits different attenuation characteristics with changes in air humidity, air particulate matter (PM) concentration, carrier frequency, etc. Therefore, the sensed data can be used to help detect weather or air quality.
- PM air particulate matter
- the type of perception data of the terminal to be perceived may be different.
- the sensing data can be the location and channel environment of the terminal to be sensed, which can be used to help narrow the beam scanning range and shorten the beam training time.
- the sensing data can be the position, speed, motion trajectory and channel environment of the terminal to be sensed for beam prediction, which can reduce the overhead of beam measurement and the delay of beam tracking.
- the sensing data can be attributes of the terminal to be sensed (direction, size, shape, etc.) and the channel environment can be used to improve the performance of channel estimation.
- the sensing data may also be data such as the trajectory of the terminal to be sensed.
- the sensing data may be data perceived by the terminal to be sensed itself, or data received by the terminal to be sensed from the external environment.
- Figure 3 shows a data sensing method according to an exemplary embodiment, which can be applied to the core network in the above communication system. As shown in Figure 3, the method may include:
- S310 Send first information to the terminal to be perceived, where the first information is used by the terminal to be perceived to determine a result of the perceived privacy verification.
- S320 Receive the second information sent by the terminal to be sensed.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the terminal to be sensed can be understood as a terminal that sends sensing data.
- the terminal to be sensed can obtain sensing data in various ways. For example, it can detect through its own sensor to obtain sensing data, or it can combine the detected data with a processor to process the sensing data to obtain sensing data. It can also obtain sensing data from other sources. The device receives the sensing data.
- the sensing requester can be understood as a terminal that requests sensing data from the terminal to be sensed.
- the sensing requester can be the core network itself or other terminals connected to the core network.
- the target data can be understood as a certain type of sensing data that the sensing requester requests from the terminal to be sensed according to the scene needs.
- the permission of the sensing requester to sense the target data of the terminal to be sensed may include the terminal to be sensed agreeing to the sensing requester to sense the target data, that is, the sensing requester can obtain the target data from the terminal to be sensed through the core network, and the terminal to be sensed refuses
- the sensing requester senses the target data, that is, the sensing requester cannot obtain the target data from the terminal to be sensed through the core network.
- the information used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed includes information indicating that the sensing requester is allowed to perform target data sensing on the terminal to be sensed, and information indicating the rejection of the sensing requestor to perform target data sensing on the terminal to be sensed.
- the second information may include multiple fields. These multiple fields may be used to fill in information indicating that the sensing requester agrees to perform target data sensing on the terminal to be sensed, and to represent rejecting the sensing request according to the actual situation. Information about the party to sense the target data of the terminal to be sensed, information representing the reason why the sensing requester refuses to sense the target data to the terminal to be sensed, the identification of the device that agrees to sense the target data to the terminal to be sensed, and the refusal to sense the terminal to sense the target data. The identification of the device.
- the information representing the refusal of the sensing requester to sense the target data of the terminal to be sensed, and the information characterizing the reason for refusing the sensing requester to sense the target data of the terminal to be sensed can be filled in different fields of the second information at the same time. in the field.
- the perceptual privacy verification result determined by the terminal to be sensed may be determined by the terminal to be sensed itself based on the first information, or may be determined by the terminal to be sensed receiving a triggering operation of the user's input operation control of the perceptual privacy verification result. Generated.
- the first information may include a first identification of the sensing requester (for example, it may be a core network or a sensing requesting terminal connected to the core network), information characterizing the type of target data to be sensed, and Perceived privacy verification instructions.
- a first identification of the sensing requester for example, it may be a core network or a sensing requesting terminal connected to the core network
- information characterizing the type of target data to be sensed for example, it may be a core network or a sensing requesting terminal connected to the core network
- Perceived privacy verification instructions for example, it may be a core network or a sensing requesting terminal connected to the core network.
- the first information for determining the result of the perceptual privacy verification can be sent to the terminal to be sensed through the core network, and the second information including the result of the perceptual privacy verification can be received through the core network. Since the result of the sensing privacy verification is used to indicate the sensing requester's permission to sense the target data of the terminal to be sensed, the terminal to be sensed can verify the sensing authority of the sensing requester and then decide whether to agree to the sensing requester to sense the target data of the terminal to be sensed. Through the process of permission verification, the sensing data transmission process of the terminal to be sensed can be protected and the security of the terminal to be sensed can be improved.
- FIG4 is a data perception method according to an exemplary embodiment.
- the data perception method is applied to a core network, as shown in FIG4 , and the method may include:
- S410 Send the first information to the terminal to be sensed.
- the first information is used by the terminal to be sensed to determine the result of sensing privacy verification.
- step S410 in this embodiment is the same as the above-mentioned step S310, and reference can be made to the above-mentioned step S310, which will not be described again here.
- S420 Receive the second information sent by the terminal to be sensed.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- S430 Receive the sensed target data sent by the terminal to be sensed.
- the target data is sent when the sensing requester agrees to sense the target data of the terminal to be sensed.
- the terminal to be sensed can send the sensed target data to the core network, so that the core network can receive the target data to be sensed.
- Sensed target data sent by the terminal if the result of the sensing privacy verification is that the sensing requester agrees to perform target data sensing on the terminal to be sensed, the terminal to be sensed can send the sensed target data to the core network, so that the core network can receive the target data to be sensed. Sensed target data sent by the terminal.
- the core network may send the target data to the sensing requester.
- step S430 the process of receiving the sensed target data sent by the terminal to be sensed may be performed simultaneously with the process of receiving the second information sent by the terminal to be sensed in step S420, that is, the target The data can be carried in the second message. That is to say, after the core network sends the first information to the terminal to be sensed, if the terminal to be sensed determines that it agrees with the sensing requester to sense the target data of the terminal to be sensed, the terminal to be sensed can carry the result of the sensing privacy verification and the target data at the same time. In the second information, it is sent to the core network together.
- the process of receiving the sensed target data sent by the terminal to be sensed in step S430 and the process of receiving the second information sent by the terminal to be sensed in step S420 may also be executed independently one after another.
- the terminal to be sensed may actively send the sensed target data to the core network.
- the core network may send a message for requesting target data to the terminal to be sensed, so that the terminal to be sensed can respond to the message for requesting target data after receiving the message for requesting target data. , sending the perceived target data to the core network.
- the terminal to be sensed can then send the target data to the core network after agreeing to the sensing requester to sense the target data of the terminal to be sensed, thereby protecting the sensing data transmission process of the terminal to be sensed and improving the security of the terminal to be sensed.
- Figure 5 illustrates a data sensing method according to an exemplary embodiment. This data sensing method is applied to the core network, and the sensing requester is the sensing requesting terminal connected to the core network. As shown in Figure 5, this method may include:
- S510 Receive the sensing request sent by the sensing requesting terminal.
- S530 Receive the second information sent by the terminal to be sensed.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the sensing requesting terminal when it needs to obtain sensing data, it can send a sensing request to the core network. After receiving the sensing request sent by the sensing requesting terminal, the core network can respond to the sensing request and send a third sensing request to the terminal to be sensed. After receiving the first information, the second information sent by the terminal to be sensed can be received.
- the process of sending the first information to the terminal to be sensed in step S520 and the process of receiving the second information sent by the terminal to be sensed in step S530 can refer to the foregoing embodiments and will not be described again here.
- the method may also include the step of receiving the sensed target data sent by the terminal to be sensed.
- the step of receiving the sensed target data sent by the terminal to be sensed please refer to the foregoing embodiments and will not be described again here.
- the core network can send the first information to the terminal to be sensed when receiving the sensing request sent by the sensing requesting terminal.
- Figure 6 shows a data sensing method according to an exemplary embodiment.
- the data sensing method is applied to the core network.
- the sensing requester is a sensing requesting terminal connected to the core network.
- the sensing request includes the first identification of the sensing requesting terminal, the second identification of the terminal to be sensed and the type of target data to be sensed.
- Information as shown in Figure 6, the method may include:
- S610 Receive the sensing request sent by the sensing requesting terminal.
- S620 In response to the sensing request, generate sensing privacy verification instruction information.
- S630 Send the first identifier, information characterizing the type of target data to be sensed, and sensing privacy verification instruction information as first information to the terminal corresponding to the second identifier.
- S640 Receive the second information sent by the terminal to be sensed.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- step S610 and step S640 reference may be made to the foregoing embodiments and will not be described again here.
- the sensing request includes the first identity of the sensing requesting terminal, the second identity of the terminal to be sensed, and information characterizing the type of target data to be sensed, but does not include sensing privacy verification indication information, so that the core network receives
- the sensing request sent by the sensing requesting terminal understands that the sensing requesting terminal wants to obtain sensing data from the terminal to be sensed. Therefore, sensing privacy verification indication information can be generated first, and then the first identifier represents the type of target data to be sensed.
- the information and the perceptual privacy verification instruction information are sent as the first information to the terminal corresponding to the second identification to instruct the terminal to be sensed to perform the perceptual privacy verification and return the second information.
- the first identifier may be a Generic Public Subscription Identifier (GPSI).
- GPSI Generic Public Subscription Identifier
- the second identification may be a user permanent identifier (SUbscription Permanent Identifier, SUPI).
- SUPI user Permanent Identifier
- the method may also include the step of receiving the sensed target data sent by the terminal to be sensed.
- the step of receiving the sensed target data sent by the terminal to be sensed please refer to the foregoing embodiments and will not be described again here.
- the sensing requesting terminal does not need to send a sensing request carrying sensing privacy verification indication information, that is, the sensing privacy verification indication information can be generated by the core network in response to the sensing request.
- Figure 7 shows a data sensing method according to an exemplary embodiment.
- the data sensing method is applied to the core network.
- the sensing requester is a sensing requesting terminal connected to the core network.
- the sensing request includes the first identification of the sensing requesting terminal, the second identification of the terminal to be sensed, and the type of target data to be sensed. information and perceived privacy verification indication information, as shown in Figure 7.
- the method may include:
- S710 Receive the sensing request sent by the sensing requesting terminal.
- S720 Send the first identifier, information characterizing the type of target data to be sensed, and sensing privacy verification instruction information as first information to the terminal corresponding to the second identifier.
- S730 Receive the second information sent by the terminal to be sensed.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- step S710 and step S730 reference may be made to the foregoing embodiments and will not be described again here.
- the method may also include the step of receiving the sensed target data sent by the terminal to be sensed.
- the step of receiving the sensed target data sent by the terminal to be sensed please refer to the foregoing embodiments and will not be described again here.
- the sensing request terminal can send a sensing request carrying sensing privacy verification indication information, that is, the sensing privacy verification indication information can be sent by the sensing requesting terminal.
- Figure 8 illustrates a data sensing method according to an exemplary embodiment.
- the data sensing method is applied to the core network.
- the sensing requester is a sensing requesting terminal connected to the core network.
- the sensing request includes the first identification of the sensing requesting terminal, the second identification of the terminal to be sensed and the type of target data to be sensed.
- Information as shown in Figure 8, the method may include:
- S810 Receive the sensing request sent by the sensing requesting terminal.
- S820 In response to the perception request, send first information to the terminal to be perceived.
- S830 Receive the second information sent by the terminal to be sensed.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the sensing response includes the sensed target data, information representing the rejection of the sensing requesting terminal to sense the target data by the sensing terminal to be sensed, and the reason for rejecting the sensing requesting terminal to sense the target data of the sensing terminal to be sensed. At least one of the information, target data, is sent under the condition that the sensing requester agrees to perform target data sensing on the terminal to be sensed.
- steps S810 to S830 reference may be made to the foregoing embodiments and will not be described again here.
- the core network can send a sensing response to the sensing requesting party. Therefore, the sensing response can include the sensed target data, indicating that the sensing requesting terminal rejects the sensing requesting terminal. Information about the target data sensing by the to-be-sensing terminal, and at least one of the information representing the reason for rejecting the sensing requesting terminal to sense the target data by the to-be-sensing terminal.
- the target data is a situation in which the sensing requesting party agrees to the sensing requester to sense the target data by the to-be-sensing terminal. Sent below.
- the sensing response may include multiple fields. These multiple fields may be used to fill in the sensed target data according to the actual situation, to represent the information that rejects the sensing request terminal and to sense the target data of the to-be-sensed terminal. Information about the reasons why the sensing requesting terminal rejects target data sensing by the sensing terminal.
- the core network receives the target data sent by the terminal to be sensed, the target data can be filled in the corresponding field of the sensing response and sent to the sensing requesting terminal.
- the second information received by the core network is information indicating that the sensing requester refuses to sense the target data of the terminal to be sensed
- the information indicating that the sensing requester refuses to sense the target data of the terminal to be sensed can be filled into the corresponding field of the sensing response, and is sent to the sensing requesting terminal
- the second information also includes information representing the reason for rejecting the sensing requesting party to perform target data sensing on the to-be-sensing terminal
- the core network may also express the reason for rejecting the sensing requesting party to perform target data sensing on the to-be-sensing terminal.
- the information, as well as the information representing the reason why the sensing requester refuses to sense the target data by the sensing terminal are filled in the corresponding fields of the sensing response and sent to the sensing requesting terminal.
- the core network can return a sensing response to the sensing request terminal to inform the result of the sensing request.
- Figure 9 illustrates a data sensing method according to an exemplary embodiment. This data awareness method is applied to the core network.
- the core network includes the first network element, the policy control function network element, and the access and mobility management function network element. As shown in Figure 9, the method may include:
- S910 Determine the first information and the second identification of the terminal to be sensed through the first network element.
- the first information may include a first identification of the sensing requester (for example, it may be a core network or a sensing requesting terminal connected to the core network), information characterizing the type of target data to be sensed, and a sensing privacy verification indication. information.
- the first network element when the sensing requester is the core network, can obtain the first identifier corresponding to the core network, information characterizing the type of target data to be sensed, and sensing privacy verification indication information from the core network related equipment. , thereby determining the obtained first identification, information characterizing the type of target data to be sensed, and sensing privacy verification indication information as the first information.
- the first network element can also directly obtain the second identifier from relevant functional equipment of the core network.
- the sensing requester is a sensing requesting terminal connected to the core network
- the detailed description of the first network element determining the first information and the second identification of the terminal to be sensed can refer to the foregoing embodiments, which will not be discussed here. Again.
- the first network element can be understood as a newly added network element in the core network.
- it can be named a sensing application function network element.
- S920 Send the first information and the second identification to the policy control function network element through the first network element.
- the first request may be sent to the policy control function network element through the first network element, where the first request includes the first information and the second identification.
- the first request is a newly added request in this embodiment of the present disclosure.
- the first information may include a first identity of the sensing requesting terminal, information characterizing the type of target data to be sensed, and sensing privacy verification indication information. Therefore, the first request may include a first identity, characterizing the target to be sensed. Information about the type of data and perceived privacy verification instructions.
- S930 Send the first information and the second identification to the access and mobility management function network element through the policy control function network element.
- a second request may be sent to the access and mobility management function network element through the policy control function network element, where the second request includes the second identifier and the first information.
- the second request may be a Namf_Communication_N1N2MessageTransfer request, the Namf_Communication_N1N2MessageTransfer request includes the second identifier and the N1 message, and the N1 message includes the first information.
- S940 Send the first information to the terminal corresponding to the second identification through the access and mobility management function network element.
- a notification message may be sent to the terminal corresponding to the second identity through the access and mobility management function network element, where the notification message includes the first information.
- the notification message may be a non-access notification (NAS Notification) message, and the non-access notification message includes the first information.
- NAS Notification non-access notification
- S950 Receive the second information sent by the terminal to be sensed.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the first information and the second identification of the terminal to be sensed may be determined first through the first network element. After the first information and the second identification of the terminal to be sensed are determined, the first information may be determined through the first network element. The information and the second identification are sent to the policy control function network element, and then the first information and the second identification are sent to the access and mobility management function network element through the policy control function network element, and then the access and mobility management function network element can be The mobility management function network element sends the first information to the terminal corresponding to the second identification.
- step S950 receiving the second information sent by the terminal to be sensed, may include the following steps:
- the access and mobility management function network element receives the second information sent by the terminal to be sensed; the access and mobility management function network element sends the second information to the policy control function network element, and the policy control function network element sends the second information to the policy control function network element.
- the second information is sent to the first network element.
- the notification message response sent by the terminal to be sensed may be received through the access and mobility management function network element, where the notification message response includes the second information.
- the notification message response may be, for example, a non-access notification (NAS Notification) response, and the non-access notification response includes the second information.
- NAS Notification non-access notification
- a second request response may be sent to the policy control function network element through the access and mobility management function network element, where the second request response includes the second information.
- the second request response may be, for example, a Namf_Communication_N1N2MessageTransfer response, and the Namf_Communication_N1N2MessageTransfer response includes the second information.
- the first request response may be sent to the first network element through the policy control function network element.
- the first request response may include the second information.
- the first request response may be, for example, a sensing policy control response (Npcf_SensingPolicyControl Response).
- the sensing policy control response includes the second information.
- the perception policy control response is a newly added response message.
- Figure 10 shows a data sensing method according to an exemplary embodiment, which can be applied to the terminal to be sensed in the above communication system. As shown in Figure 10, the method may include:
- S1010 Receive the first information sent by the core network.
- S1030 Send second information to the core network.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the terminal to be sensed can receive the first information sent by the core network, then respond to the first information, determine the result of the sensing privacy verification, and then send the second information to the core network. Since the result of the sensing privacy verification is used to indicate the sensing requester's permission to sense the target data of the terminal to be sensed, the terminal to be sensed can verify the sensing authority of the sensing requester and then decide whether to agree to the sensing requester to sense the target data of the terminal to be sensed. Through the process of permission verification, the sensing data transmission process of the terminal to be sensed can be protected and the security of the terminal to be sensed can be improved.
- Figure 11 illustrates a data sensing method according to an exemplary embodiment.
- the data sensing method is applied to the terminal to be sensed, as shown in Figure 11.
- the method may include:
- S1130 Send second information to the core network.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- S1140 Send the sensed target data to the core network.
- the target data is sent when the sensing requester agrees to sense the target data of the terminal to be sensed.
- the terminal to be sensed can send the sensed target data to the core network, so that the core network can receive the target data to be sensed.
- Sensed target data sent by the terminal if the result of the sensing privacy verification is that the sensing requester agrees to perform target data sensing on the terminal to be sensed, the terminal to be sensed can send the sensed target data to the core network, so that the core network can receive the target data to be sensed. Sensed target data sent by the terminal.
- the core network may send the target data to the sensing requester.
- the terminal to be sensed agrees with the sensing requester to sense the target data of the terminal to be sensed, and then sends the target data to the core network, thereby protecting the sensing data transmission process of the terminal to be sensed and improving the security of the terminal to be sensed.
- the process of sending the perceived target data to the core network in step S1140 may be performed simultaneously with the process of sending the second information to the core network in step S1130. That is, the target data may be carried in in the second message. That is to say, the terminal to be sensed can simultaneously carry the result of sensing privacy verification and the target data in the second information, and send them to the core network together.
- the process of sending the second information to the core network in step S1130 and the process of sending the sensed target data to the core network in step S1140 may also be executed independently one after another.
- the terminal to be sensed may actively send the sensed target data to the core network.
- the core network may send a message for requesting target data to the terminal to be sensed, so that the terminal to be sensed can respond to the message for requesting target data after receiving the message for requesting target data. , sending the perceived target data to the core network. Therefore, please refer to FIG. 12 , which illustrates a data sensing method according to an exemplary embodiment.
- the data sensing method is applied to the terminal to be sensed, as shown in Figure 12.
- the method may include:
- S1210 Receive the first information sent by the core network.
- S1130 Send second information to the core network.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- S1250 In response to the sensing request sent by the core network, the sensed target data is sent to the core network.
- the target data is sent when the sensing requester agrees to sense the target data of the terminal to be sensed.
- the sensing request sent by the core network may be generated by the core network itself. For example, it may be generated by the core network after receiving the second information to agree that the sensing requester performs target data sensing on the terminal to be sensed.
- the sensing request may also be generated by the core network. The sensing request sent by the party again.
- FIG. 13 is a data sensing method according to an exemplary embodiment.
- the data sensing method is applied to a terminal to be sensed. As shown in FIG. 13 , the method may include:
- S1310 Receive the first information sent by the core network.
- S1320 In response to the first information, display an input operation control for the result of the privacy-aware verification.
- S1330 Receive a trigger operation of the input operation control for the result of perceptual privacy verification, and determine the result of perceptual privacy verification.
- S1340 Send second information to the core network.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the terminal to be sensed after receiving the first information, can display the input operation control for the result of the sensing privacy verification to the operator, such as the user of the terminal to be sensed, so that the operator can trigger the input operation control according to the situation.
- the terminal to be sensed can determine the result of the sensing privacy verification based on the operator's triggering operation.
- the first identification in response to the first information, may also be displayed.
- the input operation control includes a selection control indicating that the sensing requester agrees to perform target data sensing on the sensing terminal to be sensed, a selection control indicating a rejection of the sensing requesting party to perform target data sensing on the sensing terminal to be sensed, and a selection control indicating a rejection of the sensing requesting party to perform target data sensing on the sensing terminal to be sensed.
- At least one of an input control for a reason for data sensing an input control representing the identity of a device that agrees to perform target data sensing on the to-be-sensored terminal, and an input control that rejects the identity of a device that refuses to perform target data sensing on the to-be-sensored terminal.
- the operator of the terminal to be sensed can determine the permission of the sensing requester to sense the target data of the terminal to be sensed.
- the terminal to be sensed after receiving the first information sent by the core network, the terminal to be sensed can also directly determine the result of the sensing privacy verification according to the preset policy, and then send the second information to the core network.
- Figure 14 shows a data sensing method according to an exemplary embodiment. This data sensing method is applied to the terminal to be sensed.
- the core network includes access and mobility management function network elements, as shown in Figure 14. This method may include:
- S1410 Receive the first information sent by the access and mobility management function network element.
- the terminal to be sensed may receive a non-access notification (NAS Notification) message sent by the access and mobility management function network element, where the non-access notification message includes the first information.
- NAS Notification non-access notification
- S1430 Send second information to the access and mobility management function network element.
- the second information includes the result of the sensing privacy verification.
- the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the terminal to be sensed may send a non-access notification (NAS Notification) response to the access and mobility management function network element, and the non-access notification response includes the second information.
- NAS Notification non-access notification
- FIG15 is a core network system 1500 according to an exemplary embodiment.
- the core network system 1500 includes a first network element 1510, a policy control function network element 1520, and an access and mobility management function network element 1530. Among them:
- the first network element 1510 is used to determine the first information and the second identification of the terminal to be sensed, and send the first information and the second identification to the policy control function network element;
- the policy control function network element 1520 is used to send the first information and the second identification to the access and mobility management function network element;
- the access and mobility management function network element 1530 is configured to send the first information to the terminal corresponding to the second identification, and receive the second information sent by the terminal to be sensed.
- the second information includes the result of the perceived privacy verification, and the perceived privacy verification The result is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- the access and mobility management function network element 1530 is also used to send the second information to the policy control function network element;
- the policy control function network element is further used to send the second information to the first network element.
- the sensing requester is a sensing requesting terminal connected to the core network system 1500.
- the first network element 1510 is also used to send a sensing response to the sensing requesting terminal.
- the sensing response includes the sensed target data, indicating the rejection of sensing.
- the target data is obtained by agreeing to the sensing requester to perform target data sensing on the to-be-sensed terminal. Sent under circumstances.
- a core network element is also shown.
- the core network element may be the first network element in Figure 15.
- the core network element is consistent with the policy in the core network.
- the control function network element is connected.
- the core network element is used to determine the first information and the second identification, and sends the first information to the terminal to be sensed corresponding to the second identification through the policy control function network element.
- the first information is used by the terminal to be sensed to determine the result of sensing privacy verification.
- the process of the core network element sending the first information to the terminal to be sensed corresponding to the second identification through the policy control function element can refer to the relevant descriptions in the previous embodiments, for example , the first information and the second identification may be sent to the policy control function network element first, and then the first information and the second identification may be sent to the policy control function network element through the policy control function network element.
- the access and mobility management function network element then sends the first information to the terminal corresponding to the second identification through the access and mobility management function network element.
- the core network element may also receive second information and a sensing response from the terminal to be sensed.
- second information received by the core network element from the terminal to be sensed and the sensing response please refer to the foregoing embodiments and will not be described again here.
- Figure 16 illustrates a data sensing method according to an exemplary embodiment.
- the data awareness method may include:
- the sensing request terminal sends a sensing request to the core network.
- the sensing request includes a first identity of the sensing requesting terminal, a second identity of the terminal to be sensed, and information characterizing the type of target data to be sensed.
- S1620 The core network determines the first information and the second identifier according to the sensing request.
- the first information includes a first identification, information characterizing the type of target data to be sensed, and sensing privacy verification indication information.
- S1630 The core network sends the first information to the terminal to be sensed corresponding to the second identification.
- the terminal to be sensed responds to the first information and determines the result of the sensing privacy verification.
- S1650 The terminal to be sensed sends the second information to the core network.
- the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to indicate the permission of the sensing requester to perform target data sensing on the terminal to be sensed.
- S1660 The core network sends a sensing response to the sensing requesting terminal.
- the sensing response is sensed target data
- the target data is sent when the sensing requester agrees to perform target data sensing on the terminal to be sensed.
- the sensing response is information indicating that the sensing requesting terminal rejects the target data sensing of the terminal to be sensed.
- the sensing response is information representing the refusal of the sensing requesting terminal to perform target data sensing on the to-be-sensed terminal, and information characterizing the reason for rejecting the sensing requesting terminal to perform target data sensing on the to-be-sensing terminal.
- Fig. 17 is a data perception method according to an exemplary embodiment. As shown in Fig. 17, the data perception method may include:
- the sensing request terminal sends a sensing request to the first network element.
- the sensing request includes a first identity of the sensing requesting terminal, a second identity of the terminal to be sensed, and information characterizing the type of target data to be sensed.
- S1720 The first network element sends a sensing policy control request to the policy control function network element.
- the sensing policy control request includes a first identifier, a second identifier, information characterizing the type of target data to be sensed, and sensing privacy verification indication information.
- the policy control function network element sends a Namf_Communication_N1N2MessageTransfer request to the access and mobility management function network element.
- the Namf_Communication_N1N2MessageTransfer request includes a second identifier and an N1 message.
- the N1 message includes a first identifier, information characterizing the type of target data to be sensed, and sensing privacy verification indication information.
- the access and mobility management function network element sends a non-access notification message to the terminal to be sensed corresponding to the second identification.
- the non-access notification message includes the N1 message.
- the sensing terminal sends a non-access notification response to the access and mobility management function network element.
- the non-access notification response includes the result of perceptual privacy verification.
- S1760 The access and mobility management function network element sends a Namf_Communication_N1N2MessageTransfer response to the policy control function network element.
- the Namf_Communication_N1N2MessageTransfer response includes the results of privacy-aware verification.
- the policy control function network element sends a sensing policy control response to the first network element.
- the perceptual policy control response includes the result of perceptual privacy verification.
- S1780 The first network element sends the sensing privacy verification result to the sensing requesting terminal.
- Figure 18 is a block diagram of a data sensing device 1800 according to an exemplary embodiment.
- the data sensing device can be applied to the core network.
- the device 1800 can include:
- the first sending module 1810 is configured to send first information to the terminal to be sensed, where the first information is used for the terminal to be sensed to determine the result of sensing privacy verification.
- the first receiving module 1810 is configured to receive second information sent by the terminal to be sensed, where the second information includes the result of the sensing privacy verification, and the result of the sensing privacy verification is used to indicate that the sensing requester has Describes the permission of the terminal to be sensed to sense target data.
- apparatus 1800 further includes:
- the second receiving module is configured to receive the sensed target data sent by the terminal to be sensed, where the target data is sent under the condition that the sensing requester agrees to perform target data sensing on the terminal to be sensed.
- the sensing requester is a sensing requesting terminal connected to the core network.
- the first sending module 1810 includes:
- the receiving submodule is configured to receive the sensing request sent by the sensing requesting terminal.
- the first sending sub-module is configured to send the first information to the terminal to be sensed in response to the sensing request.
- the sensing request includes the first identity of the sensing requesting terminal, the second identity of the terminal to be sensed, and information characterizing the type of target data to be sensed.
- the first sending submodule is also configured to generate sensing privacy verification indication information in response to the sensing request; using the first identification, the information characterizing the type of target data to be sensed, and the sensing privacy verification indication information as the first information, Sent to the terminal corresponding to the second identification.
- apparatus 1800 further includes:
- the second sending module is configured to send a sensing response to the sensing requesting terminal, where the sensing response includes the sensed target data, information representing the refusal of the sensing requesting terminal to sense the target data of the terminal to be sensed, and At least one of the information representing the reasons for refusing the sensing requesting terminal to sense the target data of the terminal to be sensed, the target data being agreed to by the sensing requesting party to sense the target data of the terminal to be sensed. Sent under circumstances.
- the core network includes a first network element, a policy control function network element, and an access and mobility management function network element.
- the first sending module 1810 includes:
- a determining submodule configured to determine the first information and the second identification of the terminal to be sensed through the first network element
- a second sending submodule is configured to send the first information and the second identifier to the policy control function network element through the first network element;
- the third sending submodule is configured to send the first information and the second identification to the access and mobility management function network element through the policy control function network element;
- the fourth sending sub-module is configured to send the first information to the terminal corresponding to the second identification through the access and mobility management function network element.
- the second sending sub-module is further configured to send a first request to the policy control function network element through the first network element, where the first request includes the first information and the Second identification.
- the third sending submodule is further configured to send a Namf_Communication_N1N2MessageTransfer request to the access and mobility management function network element through the policy control function network element, the Namf_Communication_N1N2MessageTransfer request includes the second identifier and the N1 message, and the N1 message includes the first information.
- the fourth sending sub-module is further configured to send a non-access notification message to the terminal corresponding to the second identification through the access and mobility management function network element, and the non-access notification message including the first information.
- the information indicating the permission of the sensing requester to perform target data sensing on the terminal to be sensed includes indicating that the sensing requester agrees to the sensing requester to perform target data sensing on the terminal to be sensed.
- Figure 19 is a block diagram of a data sensing device 1900 according to an exemplary embodiment.
- the data sensing device can be applied to a terminal to be sensed.
- the device 1900 can include:
- the third receiving module 1910 is configured to receive first information sent by the core network
- the determining module 1920 is configured to determine the result of the perceptual privacy verification in response to the first information
- the third sending module 1930 is configured to send second information to the core network, where the second information includes the result of the perceptual privacy verification, and the result of the perceptual privacy verification is used to instruct the perceptual requester to The permission of the sensing terminal to sense target data.
- apparatus 1900 further includes:
- the fourth sending module is configured to send the sensed target data to the core network, where the target data is sent under the condition that the sensing requester agrees to perform target data sensing on the terminal to be sensed.
- the fourth sending module is further configured to receive a sensing request sent by the core network; in response to the sensing request, send the sensed target data to the core network.
- the determining module 1920 is further configured to, in response to the first information, display an input operation control for the result of the privacy-aware verification; receive a triggering operation for the input operation control for the result of the privacy-aware verification, and determine The result of said perceived privacy verification.
- the input operation control includes at least one of a selection control representing the consent of the perception requester to perform target data perception on the terminal to be perceived, a selection control representing the refusal of the perception requester to perform target data perception on the terminal to be perceived, an input control representing the reason for refusal of the perception requester to perform target data perception on the terminal to be perceived, an input control representing the identification of a device that agrees to perform target data perception on the terminal to be perceived, and an input control representing the identification of a device that refuses to perform target data perception on the terminal to be perceived.
- the core network includes an access and mobility management function network element
- the third receiving module 1910 is also configured to receive the first information sent by the access and mobility management function network element.
- the core network includes an access and mobility management function network element
- the third sending module 1930 is further configured to send the second information to the access and mobility management function network element.
- FIG 20 is a block diagram of a data sensing device according to an exemplary embodiment.
- the data sensing device 2000 may be the core network in the communication system shown in Figure 1 .
- the apparatus 2000 may include one or more of the following components: a processing component 2002, a memory 2004, and a communication component 2006.
- the processing component 2002 may be used to control the overall operations of the device 2000, such as operations associated with display, data communications, camera operations, and recording operations.
- the processing component 2002 may include one or more processors 2020 to execute instructions to complete all or part of the steps of the above-mentioned data sensing method.
- processing component 2002 may include one or more modules that facilitate interaction between processing component 2002 and other components.
- processing component 2002 may include a multimedia module to facilitate interaction between the multimedia component and processing component 2002.
- Memory 2004 is configured to store various types of data to support operations at device 2000. Examples of such data include instructions for any application or method operating on device 2000, contact data, phonebook data, messages, pictures, videos, etc.
- Memory 2004 may be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EEPROM), Programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
- SRAM static random access memory
- EEPROM electrically erasable programmable read-only memory
- EEPROM erasable programmable read-only memory
- EPROM Programmable read-only memory
- PROM programmable read-only memory
- ROM read-only memory
- magnetic memory flash memory, magnetic or optical disk.
- Communication component 2006 is configured to facilitate wired or wireless communication between apparatus 2000 and other devices.
- the device 2000 can access a wireless network based on communication standards, such as Wi-Fi, 2G, 3G, 4G, 5G, 6G, NB-IOT, eMTC, etc., or a combination thereof.
- the communication component 2006 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
- the communications component 2006 also includes a near field communications (NFC) module to facilitate short-range communications.
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- Figure 21 is a block diagram of a data sensing device according to an exemplary embodiment.
- the data sensing device 2100 may be a terminal to be sensed in the communication system shown in FIG. 1 , and the terminal to be sensed may be, for example, a mobile phone, a camera, a notebook, a tablet computer, a smart wearable device, etc.
- data sensing device 2100 may include one or more of the following components: processing component 2102, memory 2104, power supply component 2106, multimedia component 2108, audio component 2110, input/output interface 2112, sensor component 2114, and communication component 2116 .
- the processing component 2102 generally controls the overall operations of the data sensing device 2100, such as operations associated with display, phone calls, data communications, camera operations, and recording operations.
- the processing component 2102 may include one or more processors 2120 to execute instructions to complete all or part of the steps of the above method. Additionally, processing component 2102 may include one or more modules that facilitate interaction between processing component 2102 and other components. For example, processing component 2102 may include a multimedia module to facilitate interaction between multimedia component 2108 and processing component 2102.
- Memory 2104 is configured to store various types of data to support operations at data-aware device 2100 . Examples of such data include instructions for any application or method operating on the data-aware device 2100, contact data, phonebook data, messages, pictures, videos, etc.
- Memory 2104 may be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EEPROM), Programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
- SRAM static random access memory
- EEPROM electrically erasable programmable read-only memory
- EEPROM erasable programmable read-only memory
- EPROM Programmable read-only memory
- PROM programmable read-only memory
- ROM read-only memory
- magnetic memory flash memory, magnetic or optical disk.
- Power supply component 2106 provides power to various components of data sensing device 2100.
- Power supply components 2106 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to data sensing device 2100 .
- Multimedia component 2108 includes a screen that provides an output interface between the data sensing device 2100 and the user.
- the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide action.
- multimedia component 2108 includes a front-facing camera and/or a rear-facing camera.
- the front camera and/or the rear camera may receive external multimedia data.
- Each front-facing camera and rear-facing camera can be a fixed optical lens system or have a focal length and optical zoom capabilities.
- Audio component 2110 is configured to output and/or input audio signals.
- audio component 2110 includes a microphone (MIC) configured to receive external audio signals when data sensing device 2100 is in operating modes, such as call mode, recording mode, and voice recognition mode. The received audio signal may be further stored in memory 2104 or sent via communication component 2116 .
- audio component 2110 also includes a speaker for outputting audio signals.
- the input/output interface 2112 provides an interface between the processing component 2102 and a peripheral interface module.
- the peripheral interface module may be a keyboard, a click wheel, a button, etc. These buttons may include, but are not limited to: Home button, Volume buttons, Start button, and Lock button.
- Sensor component 2114 includes one or more sensors that provide various aspects of status assessment for data sensing device 2100 .
- the sensor component 2114 can detect the open/closed state of the data sensing device 2100, the relative positioning of components, such as the display and keypad of the data sensing device 2100, and the sensor component 2114 can also detect the data sensing device 2100 or data. Changes in position of a component of the sensing device 2100, presence or absence of user contact with the data sensing device 2100, orientation or acceleration/deceleration of the data sensing device 2100 and temperature changes of the data sensing device 2100.
- Sensor assembly 2114 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
- Sensor assembly 2114 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
- the sensor component 2114 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
- the communication component 2116 is configured to facilitate wired or wireless communication between the data sensing device 2100 and other devices.
- the data sensing device 2100 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
- the communication component 2116 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
- the communications component 2116 also includes a near field communications (NFC) module to facilitate short-range communications.
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- the apparatus 2000 or the apparatus 2100 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), A field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation is used to perform the above data sensing method.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGA field programmable gate array
- controller microcontroller, microprocessor or other electronic component implementation is used to perform the above data sensing method.
- the above-mentioned device 2000 or device 2100 may be an independent electronic device or a part of an independent electronic device.
- the electronic device may be an integrated circuit (Integrated Circuit, IC) or a chip, where the integrated circuit It can be one IC or a collection of multiple ICs; the chip can include but is not limited to the following types: GPU (Graphics Processing Unit, graphics processor), CPU (Central Processing Unit, central processing unit), FPGA (Field Programmable) Gate Array, programmable logic array), DSP (Digital Signal Processor, digital signal processor), ASIC (Application Specific Integrated Circuit, application specific integrated circuit), SOC (System on Chip, SoC, system on a chip or system-level chip), etc.
- GPU Graphics Processing Unit, graphics processor
- CPU Central Processing Unit, central processing unit
- FPGA Field Programmable
- DSP Digital Signal Processor
- ASIC Application Specific Integrated Circuit
- SOC System on Chip, SoC, system on a chip or system-level chip
- the above integrated circuit or chip can be used to execute executable instructions (or codes) to implement the above data sensing method.
- the executable instructions can be stored in the integrated circuit or chip, or can be obtained from other devices or devices.
- the integrated circuit or chip includes a processor, a memory, and an interface for communicating with other devices.
- the executable instructions can be stored in the processor, and when the executable instructions are executed by the processor, the above-mentioned data sensing method is implemented; or, the integrated circuit or chip can receive the executable instructions through the interface and transmit them to the processor for execution. , to implement the above data-aware method.
- the present disclosure also provides a computer-readable storage medium on which computer program instructions are stored.
- the program instructions are executed by a processor, the steps of the data sensing method provided by the present disclosure are implemented.
- the computer-readable storage medium may be a non-transitory computer-readable storage medium including instructions, for example, it may be the above-mentioned memory 2004 or 2104 including instructions, and the instructions may be executed by the processor 2020 or the device 2100 of the device 2000
- the processor 2120 executes to complete the above data sensing method.
- the non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
- a computer program product comprising a computer program executable by a programmable device, the computer program having a function for performing the above when executed by the programmable device.
- the code portion of the data-aware approach is also provided, the computer program product comprising a computer program executable by a programmable device, the computer program having a function for performing the above when executed by the programmable device.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本公开涉及一种数据感知方法、核心网系统、核心网网元及芯片。该方法包括:向待感知终端发送第一信息,所述第一信息用于所述待感知终端确定感知隐私验证的结果;接收所述待感知终端发送的第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。采用该方法可以提高待感知终端的安全性。
Description
本公开涉及通信技术领域,具体地,涉及一种数据感知方法、核心网系统、核心网网元及芯片。
无线感知技术旨在获取有关远程对象及其特性的信息,而无需物理接触。可以利用待感知对象感知的数据进行分析,从而获得有关待感知对象或者其周围环境的有意义的信息,用于辅助无线电资源管理、干扰抑制、波束管理、移动性等,以便于在多个细分市场和垂直领域,例如智能交通、航空、企业、智慧城市、智能家居、工厂、消费应用、和公共部门等领域带来好处。
然而,相关技术中的数据感知方法存在待感知对象安全性低的问题。
发明内容
为克服相关技术中存在的上述问题,本公开提供一种数据感知方法、装置、核心网系统、核心网网元、存储介质及芯片。
根据本公开实施例的第一方面,提供一种数据感知方法,应用于核心网,所述方法包括:
向待感知终端发送第一信息,所述第一信息用于所述待感知终端确定感知隐私验证的结果;
接收所述待感知终端发送的第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。
根据本公开实施例的第二方面,提供一种数据感知方法,应用于待感知终端,所述方法包括:
接收核心网发送的第一信息;
响应于所述第一信息,确定感知隐私验证的结果;
向所述核心网发送第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。
根据本公开实施例的第三方面,提供一种核心网系统,所述系统包括第一网元、策略控制功能网元以及接入与移动性管理功能网元,其中:
所述第一网元,用于确定第一信息以及待感知终端的第二标识,并将所述第一信息以及所述第二标识发送给所述策略控制功能网元;
所述策略控制功能网元,用于将所述第一信息以及所述第二标识发送给所述接入与移动性管理功能网元;
所述接入与移动性管理功能网元,用于将所述第一信息发送给所述第二标识对应的终端,以及接收所述待感知终端发送的第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。
根据本公开实施例的第四方面,提供一种核心网网元,所述核心网网元与核心网中的策略控制功能网元连接,所述核心网网元用于确定第一信息以及第二标识,并通过所述策略控制功能网元将所述第一信息发送给所述第二标识对应的待感知终端,所述第一信息用于所述待感知终端确定感知隐私验证的结果。
根据本公开实施例的第五方面,提供一种数据感知装置,应用于核心网,所述装置包括:
第一发送模块,被配置为向待感知终端发送第一信息,所述第一信息用于所述待感知终端确定感知隐私验证的结果;
第一接收模块,被配置为接收所述待感知终端发送的第二信息,所述第二信息包括所述 感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。
根据本公开实施例的第六方面,提供一种数据感知装置,应用于待感知终端,所述装置包括:
第三接收模块,被配置为接收核心网发送的第一信息;
确定模块,被配置为响应于所述第一信息,确定感知隐私验证的结果;
第三发送模块,被配置为向所述核心网发送第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。
根据本公开实施例的第七方面,提供一种数据感知装置,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为执行本公开第一方面所提供的数据感知方法的步骤。
根据本公开实施例的第八方面,提供一种数据感知装置,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为执行本公开第二方面所提供的数据感知方法的步骤。
根据本公开实施例的第九方面,提供一种计算机可读存储介质,其上存储有计算机程序指令,该计算机程序指令被处理器执行时实现本公开第一方面所提供的数据感知方法的步骤。
根据本公开实施例的第十方面,提供一种计算机可读存储介质,其上存储有计算机程序指令,该计算机程序指令被处理器执行时实现本公开第二方面所提供的数据感知方法的步骤。
根据本公开实施例的第十一方面,提供一种芯片,包括:处理器和接口;所述处理器用于读取指令以执行本公开第一方面所提供的数据感知方法的步骤,
根据本公开实施例的第十二方面,提供一种芯片,包括:处理器和接口;所述处理器用于读取指令以执行本公开第二方面所提供的数据感知方法的步骤。
在上述技术方案中,通过核心网向待感知终端发送用于确定感知隐私验证的结果第一信息,以及通过核心网接收包括所述感知隐私验证的结果的第二信息。由于感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限,因此,待感知终端可以对感知请求方进行感知权限验证,再决定是否同意感知请求方对待感知终端进行目标数据的感知,通过权限验证的过程,可以保护待感知终端的感知数据传输过程,提高待感知终端的安全性。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。
图1是根据一示例性实施例示出的一种通信系统的示意图。
图2是根据一示例性实施例示出的另一种通信系统的示意图。
图3是根据一示例性实施例示出的一种数据感知方法的流程图。
图4是根据一示例性实施例示出的另一种数据感知方法的流程图。
图5是根据一示例性实施例示出的另一种数据感知方法的流程图。
图6是根据一示例性实施例示出的另一种数据感知方法的流程图。
图7是根据一示例性实施例示出的另一种数据感知方法的流程图。
图8是根据一示例性实施例示出的另一种数据感知方法的流程图。
图9是根据一示例性实施例示出的另一种数据感知方法的流程图。
图10是根据一示例性实施例示出的另一种数据感知方法的流程图。
图11是根据一示例性实施例示出的另一种数据感知方法的流程图。
图12是根据一示例性实施例示出的另一种数据感知方法的流程图。
图13是根据一示例性实施例示出的另一种数据感知方法的流程图。
图14是根据一示例性实施例示出的另一种数据感知方法的流程图。
图15是根据一示例性实施例示出的一种核心网系统。
图16是根据一示例性实施例示出的另一种数据感知方法的流程图。
图17是根据一示例性实施例示出的另一种数据感知方法的流程图。
图18是根据一示例性实施例示出的一种数据感知装置的框图。
图19是根据一示例性实施例示出的一种数据感知装置的框图。
图20是根据一示例性实施例示出的一种数据感知装置的框图。
图21是根据一示例性实施例示出的一种数据感知装置的框图。
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。
需要说明的是,本公开中所有获取信号、信息或数据的动作都是在遵照所在地国家相应的数据保护法规政策的前提下,并获得由相应装置所有者给予授权的情况下进行的。
在本公开的描述中,使用的术语如“第一”、“第二”等是用于区别类似的对象,而不必理解为特定的顺序或先后次序。另外,在未作相反说明的情况下,在参考附图的描述中,不同附图中的同一标记表示相同的要素。
在本公开的描述中,除非另有说明,“多个”是指两个或多于两个,其它量词与之类似;“以下至少一项(个)”、“一项(个)或多项(个)”或其类似表达,是指的这些项(个)中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的一项(个)或多项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个;“和/或”是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。
在本公开实施例中尽管在附图中以特定的顺序描述操作,但是不应将其理解为要求按照所示的特定顺序或是串行顺序来执行这些操作,或是要求执行全部所示的操作以得到期望的结果。在特定环境中,多任务和并行处理可能是有利的。此外,通过同一条消息发送多个信息也是有利的。
下面先介绍本公开实施例的实施环境。
本申请实施例的技术方案可以应用于各种通信系统。该通信系统可以包括4G(the 4th Generation,第四代)通信系统、5G(the 5th Generation,第五代)通信系统、和其他未来的无线通信系统(比如6G)中的一种或多种。该通信系统也可以包括陆上公用移动通信网(Public Land Mobile Network,PLMN)网络、非地面网络通信系统、设备到设备(Device-to-Device,D2D)通信系统、机器到机器(Machine to Machine,M2M)通信系统、物联网(Internet of Things,IoT)通信系统、车联网(Vehicle-to-Everything,V2X)通信系统或者其他通信系统中的一种或多种。
图1是根据一示例性实施例示出的一种通信系统的示意图。如图1所示,该通信系统可以包括待感知终端101、核心网102以及感知请求终端103。该通信系统可以用于支持4G(the4th Generation,第四代)网络接入技术,例如长期演进(Long Term Evolution,LTE)接入技术,或者,5G(the 5th Generation,第五代)网络接入技术,如新型无线入技术(New Radio Access Technology,New RAT),或者,其他未来的无线通信技术。需要说明的是,在该通信系统中,上述待感知终端101或者感知请求终端103的数量均可以为一个或多个,图1所示通信系统的待感知终端101或者感知请求终端103的数量仅为一种实施例的适应性举例,本公开对此不做限定。
图1中的待感知终端101或者感知请求终端103可以是一种提供语音或者数据连通性的电子设备,例如也可以称为用户设备(User Equipment,UE),用户单元(Subscriber Unit),移动台(Mobile Station),站台(Station),终端设备等。示例地,该终端可以包括智能手机、智能可穿戴设备、智能音箱、智能平板、无线调制解调器(modem)、无线本地环路(Wireless Local Loop,WLL)台、PDA(Personal Digital Assistant,个人数字助理)、CPE(Customer Premise Equipment,客户终端设备)等。随着无线通信技术的发展,可以接入通信系统、可以与通信系统的基站进行通信,或者通过通信系统与其它物体进行通信的设备都可以是本公开实施例中的终端,例如,智能交通中的终端和汽车、智能家居中的家用设备、智能电网中的电力抄表仪器、电压监测仪器、环境监测仪器、智能安全网络中的视频监测仪器、收款机等。
图2是根据一示例性实施例示出的另一种通信系统的示意图。如图2所示,该通信系统可以包括感知请求终端201、第一网元(Sensing Application Function,SAF)202、策略控制功能网元(Policy Control Function,PCF)203、会话管理功能网元(Session Management Function,SMF)204、用户面功能网元(User Plane Function,UPF)205、接入与移动性管理功能网元(Access and Mobility Management Function,AMF)206、无线接入网(Radio Access Network,RAN)207以及待感知终端208。
需要说明的是,在图2所示的通信系统中,可以只有部分设备参与到本公开实施例的数据感知方法中。
下面对本公开实施例中的数据感知方法的一些应用常见进行介绍。本公开实施例的数据感知方法可以应用于例如以下一些场景:
环境实时监控:利用感知到的无线信号重构环境地图,进一步提升定位精度,赋能环境相关应用,如实现动态3D地图辅助驾驶、行人流量统计、入侵等一系列实时监控相关应用检测、流量检测等。
自动驾驶汽车/无人机:自动驾驶汽车/无人机应用有一些共同的功能需求。例如,自动驾驶汽车/无人机应支持检测和避免(Detect and Avoid,DAA)以避开障碍物。同时,自主车辆/无人机应具备监控路径信息的能力,如选择路线,遵守交通规则。因此,利用感知到的数据可以帮助完成避障以及监控路径信息等。
空气污染监测:接收到的无线信号质量随空气湿度、空气颗粒物(PM)浓度、载波频率等变化呈现不同的衰减特性,因此,利用感知到的数据可帮助天气或空气质量检测。
室内保健和入侵检测。利用感知到的数据可实现呼吸频率估计、呼吸深度估计、呼吸暂停检测、老年人生命体征监测和室内入侵检测。
需要说明的是,在不同的场景需求下,待感知终端的感知数据的类型可以是不同的。
例如,感知数据可以是待感知终端的位置和信道环境,可以用于帮助缩小波束扫描范围,缩短波束训练时间。
又例如,感知数据可以是待感知终端的位置、速度、运动轨迹和信道环境进行波束预测,可以减少波束测量的开销和波束跟踪的延迟。
又例如,感知数据可以是待感知终端的属性(方向、大小、形状等)和信道环境可以用于提高信道估计的性能。
除了上述示例之外,感知数据还可以是待感知终端的轨迹等数据。
需要说明的是,感知数据可以是待感知终端自身感知到的数据,也可以是待感知终端从外部环境接收到的数据。
图3是根据一示例性实施例示出的一种数据感知方法,可以应用于上述通信系统中的核心网。如图3所示,该方法可以包括:
S310,向待感知终端发送第一信息,第一信息用于待感知终端确定感知隐私验证的结果。
S320,接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。
结合前述内容可知,本公开实施例中,待感知终端可以理解为发送感知数据的终端。其中,待感知终端获取感知数据可以有多种方式,例如可以通过自身的传感器进行检测,从而得到感知数据,或者可以结合处理器对检测得到的数据进行处理,从而获得感知数据,还可以从其他设备接收得到感知数据。
此外,感知请求方可以理解为向待感知终端请求感知数据的终端。其中,感知请求方可以是核心网本身,也可以是与核心网连接的其它终端。
其中,目标数据可以理解为感知请求方根据场景需要向待感知终端请求的某个类型的感知数据。
其中,感知请求方对待感知终端进行目标数据感知的权限可以包括待感知终端同意感知请求方进行目标数据感知,也即感知请求方能够通过核心网从待感知终端获得目标数据,以及待感知终端拒绝感知请求方进行目标数据的感知,也即感知请求方不能够通过核心网从待感知终端获得目标数据。
在一些实施方式中,用于指示感知请求方对待感知终端进行目标数据感知的权限的信息包括,表征同意感知请求方对待感知终端进行目标数据感知的信息,表征拒绝感知请求方对待感知终端进行目标数据感知的信息,表征拒绝感知请求方对待感知终端进行目标数据感知的原因的信息,同意对待感知终端进行目标数据感知的设备的标识,以及拒绝对待感知终端进行目标数据感知的设备的标识中的至少一者。
其中,同意对待感知终端进行目标数据感知的设备的标识可以有多个,拒绝对待感知终端进行目标数据感知的设备的标识也可以有多个。
本公开实施例中,在第二信息中,可以包括多个字段,这多个字段可以根据实际情况,分别用于填充表征同意感知请求方对待感知终端进行目标数据感知的信息,表征拒绝感知请求方对待感知终端进行目标数据感知的信息,表征拒绝感知请求方对待感知终端进行目标数据感知的原因的信息,同意对待感知终端进行目标数据感知的设备的标识,以及拒绝对待感知终端进行目标数据感知的设备的标识。
例如,在一些情况下,表征拒绝感知请求方对待感知终端进行目标数据感知的信息,以及表征拒绝感知请求方对待感知终端进行目标数据感知的原因的信息,可以同时填充到第二信息的不同的字段中。
需要说明的是,待感知终端确定的感知隐私验证的结果可以是待感知终端自身根据第一信息确定的,也可以是待感知终端接收用户对感知隐私验证的结果的输入操作控件的触发操作而生成的。
在一些实施方式中,第一信息可以包括感知请求方(例如,可以是核心网,也可以是与核心网连接的感知请求终端)的第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息。
采用上述方法,可以通过核心网向待感知终端发送用于确定感知隐私验证的结果第一信息,以及通过核心网接收包括感知隐私验证的结果的第二信息。由于感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限,因此,待感知终端可以对感知请求方进行感知权限验证,再决定是否同意感知请求方对待感知终端进行目标数据的感知,通过权限验证的过程,可以保护待感知终端的感知数据传输过程,提高待感知终端的安全性。
图4是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于核心网,如图4所示,该方法可以包括:
S410,向待感知终端发送第一信息,第一信息用于待感知终端确定感知隐私验证的结果。
其中,本实施例中步骤S410,与上述步骤S310中相同,可以参照上述步骤S310,此处不再赘述。
S420,接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。
S430,接收待感知终端发送的感知到的目标数据,目标数据是在同意感知请求方对待感知终端进行目标数据感知的情况下发送的。
本公开实施例中,如果感知隐私验证的结果为同意感知请求方对待感知终端进行目标数据感知,则待感知终端可以向核心网发送感知到的目标数据,从而,核心网便能够接收到待感知终端发送的感知到的目标数据。
在一些实施方式中,核心网在接收到待感知终端发送的感知到的目标数据之后,可以将目标数据发送给感知请求方。
在一些实施方式中,步骤S430中,接收待感知终端发送的感知到的目标数据的过程,可以是与步骤S420中,接收待感知终端发送的第二信息的过程同时执行的,也即,目标数据可以携带在第二信息中。也就是说,核心网在向待感知终端发送第一信息之后,若待感知终端确定同意感知请求方对待感知终端进行目标数据感知,则待感知终端可以同时将感知隐私验证的结果以及目标数据携带在第二信息中,一起发送给核心网。
在另一些实施方式中,步骤S430中,接收待感知终端发送的感知到的目标数据的过程,与步骤S420中,接收待感知终端发送的第二信息的过程也可以是先后独立执行的。在这种情况下,在一些实施方式中,待感知终端可以是主动向核心网发送感知到的目标数据。在另一些实施方式中,核心网可以向待感知终端发送用于请求目标数据的消息,从而待感知终端在接收到用于请求目标数据的消息之后,便可以响应于用于请求目标数据的消息,向核心网发送感知到的目标数据。
采用上述方法,待感知终端在同意感知请求方对待感知终端进行目标数据感知的情况下,再向核心网发送目标数据,从而可以保护待感知终端的感知数据传输过程,提高待感知终端的安全性。
图5是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于核心网,感知请求方为与核心网连接的感知请求终端,如图5所示,该方法可以包括:
S510,接收感知请求终端发送的感知请求。
S520,响应于感知请求,向待感知终端发送第一信息。
S530,接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。
本公开实施例中,感知请求终端在需要获取感知数据的时候,可以向核心网发送感知请求,核心网在接收感知请求终端发送的感知请求之后,可以响应于感知请求,向待感知终端发送第一信息,接着,便可以接收待感知终端发送的第二信息。
其中,步骤S520中,向待感知终端发送第一信息的过程,以及步骤S530中,接收待感知终端发送的第二信息的过程可以参考前述实施例,此处不再赘述。
此外,在一些实施方式中,该方法还可以包括接收待感知终端发送的感知到的目标数据的步骤,该步骤的详细描述可以参考前述实施例此处不再赘述。
采用上述方法,核心网可以在接收感知请求终端发送的感知请求的情况下,向待感知终端发送第一信息。
图6是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于核心网,感知请求方为与核心网连接的感知请求终端,感知请求包括感知请求终端的第一标识、待感知终端的第二标识以及表征待感知的目标数据的类型的信息,如图6所示,该方法可以包括:
S610,接收感知请求终端发送的感知请求。
S620,响应于感知请求,生成感知隐私验证指示信息。
S630,将第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息作为第一信息,发送到第二标识对应的终端。
S640,接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私 验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。
其中,步骤S610以及步骤S640的详细描述可以参考前述实施例,此处不再赘述。
本公开实施例中,感知请求包括感知请求终端的第一标识、待感知终端的第二标识以及表征待感知的目标数据的类型的信息,而不包括感知隐私验证指示信息,从而核心网在接收感知请求终端发送的感知请求,了解到感知请求终端想要向待感知终端获取感知数据,因此,可以先生成感知隐私验证指示信息,接着,再将第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息作为第一信息,发送到第二标识对应的终端,以指示待感知终端进行感知隐私验证,并返回第二信息。
可选地,第一标识可以是通用公共用户标识符(Generic Public Subscription Identifier,GPSI)。
可选地,第二标识可以是用户永久标识符(SUbscription Permanent Identifier,SUPI)。
此外,在一些实施方式中,该方法还可以包括接收待感知终端发送的感知到的目标数据的步骤,该步骤的详细描述可以参考前述实施例此处不再赘述。
采用上述方法,感知请求终端不必发送携带感知隐私验证指示信息的感知请求,也即感知隐私验证指示信息可以由核心网响应于感知请求生成。
图7是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于核心网,感知请求方为与核心网连接的感知请求终端,感知请求包括感知请求终端的第一标识、待感知终端的第二标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息,如图7所示,该方法可以包括:
S710,接收感知请求终端发送的感知请求。
S720,将第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息作为第一信息,发送到第二标识对应的终端。
S730,接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。
其中,步骤S710以及步骤S730的详细描述可以参考前述实施例,此处不再赘述。
此外,在一些实施方式中,该方法还可以包括接收待感知终端发送的感知到的目标数据的步骤,该步骤的详细描述可以参考前述实施例此处不再赘述。
采用上述方法,感知请求终端可以发送携带感知隐私验证指示信息的感知请求,也即感知隐私验证指示信息可以由感知请求终端发送。
图8是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于核心网,感知请求方为与核心网连接的感知请求终端,感知请求包括感知请求终端的第一标识、待感知终端的第二标识以及表征待感知的目标数据的类型的信息,如图8所示,该方法可以包括:
S810,接收感知请求终端发送的感知请求。
S820,响应于感知请求,向待感知终端发送第一信息。
S830,接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。
S840,向感知请求终端发送感知响应,感知响应包括感知到的目标数据,表征拒绝感知请求终端对待感知终端进行目标数据感知的信息,以及表征拒绝感知请求终端对待感知终端进行目标数据感知的原因的信息中的至少一者,目标数据是在同意感知请求方对待感知终端进行目标数据感知的情况下发送的。
其中,步骤S810至步骤S830的详细描述可以参考前述实施例,此处不再赘述。
本公开实施例中,无论待感知终端是否同意感知请求终端对目标数据进行感知,核心网均可以向感知请求方发送感知响应,从而,感知响应可以包括感知到的目标数据,表征拒绝感知请求终端对待感知终端进行目标数据感知的信息,以及表征拒绝感知请求终端对待感知终端进行目标数据感知的原因的信息中的至少一者,目标数据是在同意感知请求方对待感知终端进行目标数据感知的情况下发送的。
本公开实施例中,感知响应可以包括多个字段,这多个字段可以根据实际情况,分别用于填充感知到的目标数据,表征拒绝感知请求终端对待感知终端进行目标数据感知的信息,以及表征拒绝感知请求终端对待感知终端进行目标数据感知的原因的信息。
也就是说,若核心网接收到了待感知终端发送的目标数据,则可以将目标数据填充到感知响应相应字段,并发送给感知请求终端。
若核心网接收到的第二信息为表征拒绝感知请求方对待感知终端进行目标数据感知的信息,则可以将表征拒绝感知请求方对待感知终端进行目标数据感知的信息填充到感知响应相应字段,并发送给感知请求终端,并且,如果第二信息还包括表征拒绝感知请求方对待感知终端进行目标数据感知的原因的信息的话,则核心网还可以将表征拒绝感知请求方对待感知终端进行目标数据感知的信息,以及表征拒绝感知请求方对待感知终端进行目标数据感知的原因的信息,一同填充到感知响应相应字段,并发送给感知请求终端。
采用上述方法,核心网可以向感知请求终端返回感知响应,以告知感知请求的结果。
图9是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于核心网,核心网包括第一网元、策略控制功能网元以及接入与移动性管理功能网元,如图9所示,该方法可以包括:
S910,通过第一网元确定第一信息以及待感知终端的第二标识。
其中,第一信息可以包括感知请求方(例如,可以是核心网,也可以是与核心网连接的感知请求终端)的第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息。
在一些实施方式中,当感知请求方为核心网时,第一网元可以从核心网相关设备获取核心网对应的第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息,从而将获取的第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息确定为第一信息。此外,第一网元还可以从核心网相关功能设备直接获取第二标识。
在另一些实施方式中,当感知请求方为与核心网连接的感知请求终端时,第一网元确定第一信息以及待感知终端的第二标识的详细描述可以参考前述实施例,此处不再赘述。
需要说明的是,第一网元可以理解为在核心网中新增的网元,示例性地,可以命名为感知应用功能网元。
S920,通过第一网元将第一信息以及第二标识发送给策略控制功能网元。
在一些实施方式中,可以通过第一网元向策略控制功能网元发送第一请求,第一请求包括第一信息以及第二标识。需要说明的是,第一请求是本公开实施例中新增加的请求。例如,可以是新增的Npcf_SensingPolicyControl Request,感知策略控制请求。可选地,第一信息可以包括感知请求终端的第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息,从而,第一请求可以包括第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息。
S930,通过策略控制功能网元将第一信息以及第二标识发送给接入与移动性管理功能网元。
在一些实施方式中,可以通过策略控制功能网元向接入与移动性管理功能网元发送第二请求,第二请求包括所述第二标识以及所述第一信息。可选地,第二请求可以是Namf_Communication_N1N2MessageTransfer请求,Namf_Communication_N1N2MessageTransfer请求包括第二标识以及N1消息,N1消息包括第一信息。
S940,通过接入与移动性管理功能网元将第一信息发送给第二标识对应的终端。
在一些实施方式中,可以通过接入与移动性管理功能网元向第二标识对应的终端发送通知消息,该通知消息包括第一信息。可选地,通知消息可以是非接入通知(NAS Notification)消息,非接入通知消息包括第一信息。
S950,接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私 验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。
本公开实施例中,可以先通过第一网元确定第一信息以及待感知终端的第二标识,在确定第一信息以及待感知终端的第二标识之后,可以通过第一网元将第一信息以及第二标识发送给策略控制功能网元,接着,再通过策略控制功能网元将第一信息以及第二标识发送给接入与移动性管理功能网元,然后,便可以通过接入与移动性管理功能网元将第一信息发送给第二标识对应的终端。
在一些实施方式中,步骤S950,接收待感知终端发送的第二信息,可以包括以下步骤:
通过接入与移动性管理功能网元接收待感知终端发送的第二信息;通过接入与移动性管理功能网元将第二信息发送给策略控制功能网元,通过策略控制功能网元将第二信息发送给第一网元。
可选地,可以通过接入与移动性管理功能网元接收待感知终端发送的通知消息响应,通知消息响应包括第二信息。可选地,通知消息响应例如可以是非接入通知(NAS Notification)响应,非接入通知响应包括第二信息。
可选地,可以通过接入与移动性管理功能网元向策略控制功能网元发送第二请求响应,第二请求响应包括第二信息。可选地,第二请求响应例如可以是Namf_Communication_N1N2MessageTransfer响应,Namf_Communication_N1N2MessageTransfer响应包括第二信息。
可选地,可以通过策略控制功能网元向第一网元发送第一请求响应,第一请求响应包括第二信息,可选地,第一请求响应例如可以是感知策略控制响应(Npcf_SensingPolicyControl Response),感知策略控制响应包括第二信息。其中,感知策略控制响应是新增加的响应消息。
图10是根据一示例性实施例示出的一种数据感知方法,可以应用于上述通信系统中的待感知终端。如图10所示,该方法可以包括:
S1010,接收核心网发送的第一信息。
S1020,响应于第一信息,确定感知隐私验证的结果。
S1030,向核心网发送第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。
采用上述方法,待感知终端可以接收核心网发送的第一信息,接着响应于第一信息,确定感知隐私验证的结果,接着向核心网发送第二信息。由于感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限,因此,待感知终端可以对感知请求方进行感知权限验证,再决定是否同意感知请求方对待感知终端进行目标数据的感知,通过权限验证的过程,可以保护待感知终端的感知数据传输过程,提高待感知终端的安全性。
图11是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于待感知终端,如图11所示,该方法可以包括:
S1110,接收核心网发送的第一信息。
S1120,响应于第一信息,确定感知隐私验证的结果。
S1130,向核心网发送第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。
S1140,向核心网发送感知到的目标数据,目标数据是在同意感知请求方对待感知终端进行目标数据感知的情况下发送的。
本公开实施例中,如果感知隐私验证的结果为同意感知请求方对待感知终端进行目标数据感知,则待感知终端可以向核心网发送感知到的目标数据,从而,核心网便能够接收到待感知终端发送的感知到的目标数据。
在一些实施方式中,核心网在接收到待感知终端发送的感知到的目标数据之后,可以将目标数据发送给感知请求方。
采用上述方法,待感知终端在同意感知请求方对待感知终端进行目标数据感知的情况下, 再向核心网发送目标数据,从而可以保护待感知终端的感知数据传输过程,提高待感知终端的安全性。
在一些实施方式中,步骤S1140中,向核心网发送感知到的目标数据的过程,可以是与步骤S1130中,向核心网发送第二信息的过程同时执行的,也即,目标数据可以携带在第二信息中。也就是说,待感知终端可以同时将感知隐私验证的结果以及目标数据携带在第二信息中,一起发送给核心网。
在另一些实施方式中,步骤S1130中,向核心网发送第二信息的过程,与步骤S1140中,向核心网发送感知到的目标数据的过程,也可以是先后独立执行的。在这种情况下,在一些实施方式中,待感知终端可以是主动向核心网发送感知到的目标数据。在另一些实施方式中,核心网可以向待感知终端发送用于请求目标数据的消息,从而待感知终端在接收到用于请求目标数据的消息之后,便可以响应于用于请求目标数据的消息,向核心网发送感知到的目标数据。因此,请参考图12,图12是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于待感知终端,如图12所示,该方法可以包括:
S1210,接收核心网发送的第一信息。
S1220,响应于第一信息,确定感知隐私验证的结果。
S1130,向核心网发送第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。
S1240,接收核心网发送的感知请求。
S1250,响应于核心网发送的感知请求,向核心网发送感知到的目标数据,目标数据是在同意感知请求方对待感知终端进行目标数据感知的情况下发送的。
其中,核心网发送的感知请求可以是核心网自己生成的,例如,可以是核心网在接收到第二信息为同意感知请求方对待感知终端进行目标数据感知的情况下生成的,也可以感知请求方再次发送的感知请求。
图13是根据一示例性实施例示出的一种数据感知方法,该数据感知方法应用于待感知终端,如图13所示,该方法可以包括:
S1310,接收核心网发送的第一信息。
S1320,响应于第一信息,展示对感知隐私验证的结果的输入操作控件。
S1330,接收对感知隐私验证的结果的输入操作控件的触发操作,确定感知隐私验证的结果。
S1340,向核心网发送第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。
本公开实施例中,待感知终端在接收到第一信息之后,可以向操作者,例如待感知终端的用户展示对感知隐私验证的结果的输入操作控件,从而,操作者可以根据情况触发对输入操作控件的操作,进而待感知终端便能够根据操作者的触发操作,确定感知隐私验证的结果。
在一些实施方式中,为了便于操作者了解感知请求终端,响应于第一信息,还可以展示第一标识。
可选地,输入操作控件包括表征同意感知请求方对待感知终端进行目标数据感知的选择控件,表征拒绝感知请求方对待感知终端进行目标数据感知的选择控件,表征拒绝感知请求方对待感知终端进行目标数据感知的原因的输入控件,表征同意对待感知终端进行目标数据感知的设备的标识的输入控件,以及拒绝对待感知终端进行目标数据感知的设备的标识的输入控件中的至少一者。
采用上述方法,可以由待感知终端的操作者决定感知请求方对待感知终端进行目标数据感知的权限。
在一些实施方式中,待感知终端在接收到核心网发送的第一信息之后,也可以根据预设策略直接确定感知隐私验证的结果,进而向核心网发送第二信息。
图14是根据一示例性实施例示出的一种数据感知方法。该数据感知方法应用于待感知 终端,核心网包括接入与移动性管理功能网元,如图14所示,该方法可以包括:
S1410,接收接入与移动性管理功能网元发送的第一信息。
可选地,待感知终端可以接收接入与移动性管理功能网元发送的非接入通知(NAS Notification)消息,非接入通知消息包括第一信息。
S1420,响应于第一信息,确定感知隐私验证的结果。
S1430,向接入与移动性管理功能网元发送第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。
可选地,待感知终端可以向接入与移动性管理功能网元发送非接入通知(NAS Notification)响应,非接入通知响应包括第二信息。
图15是根据一示例性实施例示出的一种核心网系统1500,如图15所示,该核心网系统1500包括第一网元1510、策略控制功能网元1520以及接入与移动性管理功能网元1530。其中:
第一网元1510,用于确定第一信息以及待感知终端的第二标识,并将第一信息以及第二标识发送给策略控制功能网元;
策略控制功能网元1520,用于将第一信息以及第二标识发送给接入与移动性管理功能网元;
接入与移动性管理功能网元1530,用于将第一信息发送给第二标识对应的终端,以及接收待感知终端发送的第二信息,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。
在一些实施方式中,接入与移动性管理功能网元1530,还用于将第二信息发送给策略控制功能网元;
策略控制功能网元,还用于将第二信息发送给第一网元。
在一些实施方式中,感知请求方为与核心网系统1500连接的感知请求终端,第一网元1510,还用于向感知请求终端发送感知响应,感知响应包括感知到的目标数据,表征拒绝感知请求终端对待感知终端进行目标数据感知的信息,以及表征拒绝感知请求终端对待感知终端进行目标数据感知的原因的信息中的至少一者,目标数据是在同意感知请求方对待感知终端进行目标数据感知的情况下发送的。
此外,根据本公开另一示例性实施例,还示出了一种核心网网元,该核心网网元可以是图15中的第一网元,该核心网网元与核心网中的策略控制功能网元连接,所述核心网网元用于确定第一信息以及第二标识,并通过所述策略控制功能网元将所述第一信息发送给所述第二标识对应的待感知终端,所述第一信息用于所述待感知终端确定感知隐私验证的结果。
在一些实施方式中,该核心网网元通过所述策略控制功能网元将所述第一信息发送给所述第二标识对应的待感知终端的过程,可以参考前述实施例中相关描述,例如,可以先将所述第一信息以及所述第二标识发送给所述策略控制功能网元,再通过所述策略控制功能网元将所述第一信息以及所述第二标识发送给所述接入与移动性管理功能网元,然后再通过所述接入与移动性管理功能网元将所述第一信息发送给所述第二标识对应的终端。
此外,在一些实施方式中,该核心网网元还可以接收到来自于待感知终端的第二信息以及感知响应。其中,该核心网网元接收到来自于待感知终端的第二信息以及感知响应的详细描述可以参考前述实施例,此处不再赘述。
图16是根据一示例性实施例示出的一种数据感知方法。如图16所示,该数据感知方法可以包括:
S1610,感知请求终端向核心网发送感知请求。
在一些实施方式中,感知请求包括感知请求终端的第一标识、待感知终端的第二标识以及表征待感知的目标数据的类型的信息。
S1620,核心网根据感知请求确定第一信息以及第二标识。
在一些实施方式中,第一信息包括第一标识、表征待感知的目标数据的类型的信息以及 感知隐私验证指示信息。
S1630,核心网向第二标识对应的待感知终端发送第一信息。
S1640,待感知终端响应于第一信息,确定感知隐私验证的结果。
S1650,待感知终端向核心网发送第二信息。
其中,第二信息包括感知隐私验证的结果,感知隐私验证的结果用于指示感知请求方对待感知终端进行目标数据感知的权限。
S1660,核心网向感知请求终端发送感知响应。
在一些实施方式中,感知响应为感知到的目标数据,目标数据是在同意感知请求方对待感知终端进行目标数据感知的情况下发送的。
在另一些实施方式中,感知响应为表征拒绝感知请求终端对待感知终端进行目标数据感知的信息。
在另一些实施方式中,感知响应为表征拒绝感知请求终端对待感知终端进行目标数据感知的信息,以及表征拒绝感知请求终端对待感知终端进行目标数据感知的原因的信息。
图17是根据一示例性实施例示出的一种数据感知方法。如图17所示,该数据感知方法可以包括:
S1710,感知请求终端向第一网元发送感知请求。
其中,感知请求包括感知请求终端的第一标识、待感知终端的第二标识以及表征待感知的目标数据的类型的信息。
S1720,第一网元向策略控制功能网元发送感知策略控制请求。
其中,感知策略控制请求包括第一标识、第二标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息。
S1730,策略控制功能网元向接入与移动性管理功能网元发送Namf_Communication_N1N2MessageTransfer请求。
其中,Namf_Communication_N1N2MessageTransfer请求包括第二标识以及N1消息,N1消息包括第一标识、表征待感知的目标数据的类型的信息以及感知隐私验证指示信息。
S1740,接入与移动性管理功能网元向第二标识对应的待感知终端发送非接入通知消息。
其中,非接入通知消息包括N1消息。
S1750,待感知终端向接入与移动性管理功能网元发送非接入通知响应。
其中,非接入通知响应包括感知隐私验证的结果。
S1760,接入与移动性管理功能网元向策略控制功能网元发送Namf_Communication_N1N2MessageTransfer响应。
其中,Namf_Communication_N1N2MessageTransfer响应包括感知隐私验证的结果。
S1770,策略控制功能网元向第一网元发送感知策略控制响应。
其中,感知策略控制响应包括感知隐私验证的结果。
S1780,第一网元将感知隐私验证的结果发生给感知请求终端。
图18是根据一示例性实施例示出的一种数据感知装置1800的框图,该数据感知装置可以应用于核心网,如图18所示,该装置1800可以包括:
第一发送模块1810,被配置为向待感知终端发送第一信息,所述第一信息用于所述待感知终端确定感知隐私验证的结果。
第一接收模块1810,被配置为接收所述待感知终端发送的第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。
在一些实施例中,装置1800还包括:
第二接收模块,被配置为接收所述待感知终端发送的感知到的目标数据,所述目标数据是在同意所述感知请求方对所述待感知终端进行目标数据感知的情况下发送的。
在一些实施例中,所述感知请求方为与所述核心网连接的感知请求终端,第一发送模块 1810,包括:
接收子模块,被配置为接收所述感知请求终端发送的感知请求。
第一发送子模块,被配置为响应于所述感知请求,向所述待感知终端发送所述第一信息。
在一些实施例中,所述感知请求包括所述感知请求终端的第一标识、所述待感知终端的第二标识以及表征待感知的目标数据的类型的信息,第一发送子模块,还被配置为响应于所述感知请求,生成感知隐私验证指示信息;将所述第一标识、所述表征待感知的目标数据的类型的信息以及所述感知隐私验证指示信息作为所述第一信息,发送到所述第二标识对应的终端。
在一些实施例中,装置1800还包括:
第二发送模块,被配置为向所述感知请求终端发送感知响应,所述感知响应包括感知到的目标数据,表征拒绝所述感知请求终端对所述待感知终端进行目标数据感知的信息,以及表征拒绝所述感知请求终端对所述待感知终端进行目标数据感知的原因的信息中的至少一者,所述目标数据是在同意所述感知请求方对所述待感知终端进行目标数据感知的情况下发送的。
在一些实施例中,所述核心网包括第一网元、策略控制功能网元以及接入与移动性管理功能网元,第一发送模块1810包括:
确定子模块,被配置为通过所述第一网元确定第一信息以及所述待感知终端的第二标识;
第二发送子模块,被配置为通过所述第一网元将所述第一信息以及所述第二标识发送给所述策略控制功能网元;
第三发送子模块,被配置为通过所述策略控制功能网元将所述第一信息以及所述第二标识发送给所述接入与移动性管理功能网元;
第四发送子模块,被配置为通过所述接入与移动性管理功能网元将所述第一信息发送给所述第二标识对应的终端。
在一些实施例中,第二发送子模块,还被配置为通过所述第一网元向所述策略控制功能网元发送第一请求,所述第一请求包括所述第一信息以及所述第二标识。
在一些实施例中,第三发送子模块,还被配置为通过所述策略控制功能网元向所述接入与移动性管理功能网元发送Namf_Communication_N1N2MessageTransfer请求,所述Namf_Communication_N1N2MessageTransfer请求包括所述第二标识以及N1消息,所述N1消息包括所述第一信息。
在一些实施例中,第四发送子模块,还被配置为通过所述接入与移动性管理功能网元向所述第二标识对应的终端发送非接入通知消息,所述非接入通知包括所述第一信息。
在一些实施方式中,所述用于指示所述感知请求方对所述待感知终端进行目标数据感知的权限的信息包括,表征同意所述感知请求方对所述待感知终端进行目标数据感知的信息,表征拒绝所述感知请求方对所述待感知终端进行目标数据感知的信息,表征拒绝所述感知请求方对所述待感知终端进行目标数据感知的原因的信息,同意对所述待感知终端进行目标数据感知的设备的标识,以及拒绝对所述待感知终端进行目标数据感知的设备的标识中的至少一者。
图19是根据一示例性实施例示出的一种数据感知装置1900的框图,该数据感知装置可以应用于待感知终端,如图19所示,该装置1900可以包括:
第三接收模块1910,被配置为接收核心网发送的第一信息;
确定模块1920,被配置为响应于所述第一信息,确定感知隐私验证的结果;
第三发送模块1930,被配置为向所述核心网发送第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。
在一些实施方式中,装置1900还包括:
第四发送模块,被配置为向核心网发送感知到的目标数据,所述目标数据是在同意所述感知请求方对所述待感知终端进行目标数据感知的情况下发送的。
在一些实施方式中,第四发送模块,还被配置为接收所述核心网发送的感知请求;响应于所述感知请求,向核心网发送感知到的目标数据。
在一些实施方式中,确定模块1920,还被配置为响应于所述第一信息,展示对感知隐私验证的结果的输入操作控件;接收对感知隐私验证的结果的输入操作控件的触发操作,确定所述感知隐私验证的结果。
在一些实施方式中,所述输入操作控件包括表征同意所述感知请求方对所述待感知终端进行目标数据感知的选择控件,表征拒绝所述感知请求方对所述待感知终端进行目标数据感知的选择控件,表征拒绝所述感知请求方对所述待感知终端进行目标数据感知的原因的输入控件,表征同意对所述待感知终端进行目标数据感知的设备的标识的输入控件,以及拒绝对所述待感知终端进行目标数据感知的设备的标识的输入控件中的至少一者。
在一些实施方式中,所述核心网包括接入与移动性管理功能网元,第三接收模块1910,还被配置为接收所述接入与移动性管理功能网元发送的所述第一信息。
在一些实施方式中,所述核心网包括接入与移动性管理功能网元,第三发送模块1930,还被配置为向所述接入与移动性管理功能网元发送所述第二信息。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
图20是根据一示例性实施例示出的一种数据感知装置的框图。该数据感知装置2000可以是图1所示通信系统中的核心网。参照图20,该装置2000可以包括以下一个或多个组件:处理组件2002,存储器2004,以及通信组件2006。
处理组件2002可以用于控制该装置2000的整体操作,诸如与显示,数据通信,相机操作和记录操作相关联的操作。处理组件2002可以包括一个或多个处理器2020来执行指令,以完成上述的数据感知方法的全部或部分步骤。此外,处理组件2002可以包括一个或多个模块,便于处理组件2002和其他组件之间的交互。例如,处理组件2002可以包括多媒体模块,以方便多媒体组件和处理组件2002之间的交互。
存储器2004被配置为存储各种类型的数据以支持在装置2000的操作。这些数据的示例包括用于在装置2000上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器2004可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
通信组件2006被配置为便于装置2000和其他设备之间有线或无线方式的通信。装置2000可以接入基于通信标准的无线网络,例如Wi-Fi,2G、3G、4G、5G、6G、NB-IOT、eMTC等,或它们的组合。在一个示例性实施例中,通信组件2006经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件2006还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
图21是根据一示例性实施例示出的一种数据感知装置的框图。例如,数据感知装置2100可以是图1所示通信系统中的待感知终端,该待感知终端例如可以是手机、相机、笔记本、平板电脑以及智能可穿戴设备等。
参照图21,数据感知装置2100可以包括以下一个或多个组件:处理组件2102,存储器2104,电源组件2106,多媒体组件2108,音频组件2110,输入/输出接口2112,传感器组件2114,以及通信组件2116。
处理组件2102通常控制数据感知装置2100的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件2102可以包括一个或多个处理器2120来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件2102可以包括一个或多个模块,便于处理组件2102和其他组件之间的交互。例如,处理组件2102可以包括多媒体 模块,以方便多媒体组件2108和处理组件2102之间的交互。
存储器2104被配置为存储各种类型的数据以支持在数据感知装置2100的操作。这些数据的示例包括用于在数据感知装置2100上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器2104可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件2106为数据感知装置2100的各种组件提供电力。电源组件2106可以包括电源管理系统,一个或多个电源,及其他与为数据感知装置2100生成、管理和分配电力相关联的组件。
多媒体组件2108包括在所述数据感知装置2100和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件2108包括一个前置摄像头和/或后置摄像头。当数据感知装置2100处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件2110被配置为输出和/或输入音频信号。例如,音频组件2110包括一个麦克风(MIC),当数据感知装置2100处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器2104或经由通信组件2116发送。在一些实施例中,音频组件2110还包括一个扬声器,用于输出音频信号。
输入/输出接口2112为处理组件2102和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件2114包括一个或多个传感器,用于为数据感知装置2100提供各个方面的状态评估。例如,传感器组件2114可以检测到数据感知装置2100的打开/关闭状态,组件的相对定位,例如所述组件为数据感知装置2100的显示器和小键盘,传感器组件2114还可以检测数据感知装置2100或数据感知装置2100一个组件的位置改变,用户与数据感知装置2100接触的存在或不存在,数据感知装置2100方位或加速/减速和数据感知装置2100的温度变化。传感器组件2114可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件2114还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件2114还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件2116被配置为便于数据感知装置2100和其他设备之间有线或无线方式的通信。数据感知装置2100可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件2116经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件2116还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,装置2000或者装置2100可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述数据感知方法。
上述装置2000或者装置2100可以是独立的电子设备,也可以是独立电子设备的一部分, 例如在一种实施例中,该电子设备可以是集成电路(Integrated Circuit,IC)或芯片,其中该集成电路可以是一个IC,也可以是多个IC的集合;该芯片可以包括但不限于以下种类:GPU(Graphics Processing Unit,图形处理器)、CPU(Central Processing Unit,中央处理器)、FPGA(Field Programmable Gate Array,可编程逻辑阵列)、DSP(Digital Signal Processor,数字信号处理器)、ASIC(Application Specific Integrated Circuit,专用集成电路)、SOC(System on Chip,SoC,片上系统或系统级芯片)等。上述的集成电路或芯片中可以用于执行可执行指令(或代码),以实现上述数据感知方法。其中该可执行指令可以存储在该集成电路或芯片中,也可以从其他的装置或设备获取,例如该集成电路或芯片中包括处理器、存储器,以及用于与其他的装置通信的接口。该可执行指令可以存储于该处理器中,当该可执行指令被处理器执行时实现上述数据感知方法;或者,该集成电路或芯片可以通过该接口接收可执行指令并传输给该处理器执行,以实现上述数据感知方法。
在示例性实施例中,本公开还提供了一种计算机可读存储介质,其上存储有计算机程序指令,该程序指令被处理器执行时实现本公开提供的数据感知方法的步骤。示例地,该计算机可读存储介质可以是一种包括指令的非临时性计算机可读存储介质,例如,可以是包括指令的上述存储器2004或者2104,上述指令可由装置2000的处理器2020或者装置2100的处理器2120执行以完成上述数据感知方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
在另一示例性实施例中,还提供一种计算机程序产品,该计算机程序产品包含能够由可编程的装置执行的计算机程序,该计算机程序具有当由该可编程的装置执行时用于执行上述数据感知方法的代码部分。
本领域技术人员在考虑说明书及实践本公开后,将容易想到本公开的其它实施方案。本申请旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。
Claims (25)
- 一种数据感知方法,其特征在于,应用于核心网,所述方法包括:向待感知终端发送第一信息,所述第一信息用于所述待感知终端确定感知隐私验证的结果;接收所述待感知终端发送的第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:接收所述待感知终端发送的感知到的目标数据,所述目标数据是在同意所述感知请求方对所述待感知终端进行目标数据感知的情况下发送的。
- 根据权利要求1所述的方法,其特征在于,所述感知请求方为与所述核心网连接的感知请求终端,所述向待感知终端发送第一信息,包括:接收所述感知请求终端发送的感知请求;响应于所述感知请求,向所述待感知终端发送所述第一信息。
- 根据权利要求3所述的方法,其特征在于,所述感知请求包括所述感知请求终端的第一标识、所述待感知终端的第二标识以及表征待感知的目标数据的类型的信息,所述响应于所述感知请求,向所述待感知终端发送所述第一信息,包括:响应于所述感知请求,生成感知隐私验证指示信息;将所述第一标识、所述表征待感知的目标数据的类型的信息以及所述感知隐私验证指示信息作为所述第一信息,发送到所述第二标识对应的终端。
- 根据权利要求3所述的方法,其特征在于,所述方法还包括:向所述感知请求终端发送感知响应,所述感知响应包括感知到的目标数据,表征拒绝所述感知请求终端对所述待感知终端进行目标数据感知的信息,以及表征拒绝所述感知请求终端对所述待感知终端进行目标数据感知的原因的信息中的至少一者,所述目标数据是在同意所述感知请求方对所述待感知终端进行目标数据感知的情况下发送的。
- 根据权利要求1所述的方法,其特征在于,所述核心网包括第一网元、策略控制功能网元以及接入与移动性管理功能网元,所述向待感知终端发送第一信息,包括:通过所述第一网元确定第一信息以及所述待感知终端的第二标识;通过所述第一网元将所述第一信息以及所述第二标识发送给所述策略控制功能网元;通过所述策略控制功能网元将所述第一信息以及所述第二标识发送给所述接入与移动性管理功能网元;通过所述接入与移动性管理功能网元将所述第一信息发送给所述第二标识对应的终端。
- 根据权利要求6所述的方法,其特征在于,所述通过第一网元将所述第一信息以及所述第二标识发送给所述策略控制功能网元,包括:通过所述第一网元向所述策略控制功能网元发送第一请求,所述第一请求包括所述第一信息以及所述第二标识。
- 根据权利要求6所述的方法,其特征在于,所述通过策略控制功能网元将所述第一信息以及所述第二标识发送给所述接入与移动性管理功能网元,包括:通过所述策略控制功能网元向所述接入与移动性管理功能网元发送第二请求,所述第二 请求包括所述第二标识以及所述第一信息。
- 根据权利要求6所述的方法,其特征在于,所述通过接入与移动性管理功能网元将所述第一信息发送给所述第二标识对应的终端,包括:通过所述接入与移动性管理功能网元向所述第二标识对应的终端发送通知消息,所述通知包括所述第一信息。
- 根据权利要求1-9任一项所述的方法,其特征在于,所述用于指示所述感知请求方对所述待感知终端进行目标数据感知的权限的信息包括,表征同意所述感知请求方对所述待感知终端进行目标数据感知的信息,表征拒绝所述感知请求方对所述待感知终端进行目标数据感知的信息,表征拒绝所述感知请求方对所述待感知终端进行目标数据感知的原因的信息,同意对所述待感知终端进行目标数据感知的设备的标识,以及拒绝对所述待感知终端进行目标数据感知的设备的标识中的至少一者。
- 一种数据感知方法,其特征在于,应用于待感知终端,所述方法包括:接收核心网发送的第一信息;响应于所述第一信息,确定感知隐私验证的结果;向所述核心网发送第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。
- 根据权利要求11所述的方法,其特征在于,所述方法还包括:向核心网发送感知到的目标数据,所述目标数据是在同意所述感知请求方对所述待感知终端进行目标数据感知的情况下发送的。
- 根据权利要求12所述的方法,其特征在于,所述向核心网发送感知到的目标数据,包括:接收所述核心网发送的感知请求;响应于所述感知请求,向核心网发送感知到的目标数据。
- 根据权利要求11所述的方法,其特征在于,所述响应于所述第一信息,确定感知隐私验证的结果,包括:响应于所述第一信息,展示对感知隐私验证的结果的输入操作控件;接收对感知隐私验证的结果的输入操作控件的触发操作,确定所述感知隐私验证的结果。
- 根据权利要求14所述的方法,其特征在于,所述输入操作控件包括表征同意所述感知请求方对所述待感知终端进行目标数据感知的选择控件,表征拒绝所述感知请求方对所述待感知终端进行目标数据感知的选择控件,表征拒绝所述感知请求方对所述待感知终端进行目标数据感知的原因的输入控件,表征同意对所述待感知终端进行目标数据感知的设备的标识的输入控件,以及拒绝对所述待感知终端进行目标数据感知的设备的标识的输入控件中的至少一者。
- 根据权利要求11所述的方法,其特征在于,所述核心网包括接入与移动性管理功能网元,所述接收核心网发送的第一信息,包括:接收所述接入与移动性管理功能网元发送的所述第一信息。
- 根据权利要求11所述的方法,其特征在于,所述核心网包括接入与移动性管理功能网元,所述向所述核心网发送第二信息,包括:向所述接入与移动性管理功能网元发送所述第二信息。
- 一种核心网系统,其特征在于,所述系统包括第一网元、策略控制功能网元以及接入与移动性管理功能网元,其中:所述第一网元,用于确定第一信息以及待感知终端的第二标识,并将所述第一信息以及所述第二标识发送给所述策略控制功能网元;所述策略控制功能网元,用于将所述第一信息以及所述第二标识发送给所述接入与移动性管理功能网元;所述接入与移动性管理功能网元,用于将所述第一信息发送给所述第二标识对应的终端,以及接收所述待感知终端发送的第二信息,所述第二信息包括所述感知隐私验证的结果,所述感知隐私验证的结果用于指示感知请求方对所述待感知终端进行目标数据感知的权限。
- 根据权利要求18所述的系统,其特征在于,所述接入与移动性管理功能网元,还用于将所述第二信息发送给所述策略控制功能网元;所述策略控制功能网元,还用于将所述第二信息发送给所述第一网元。
- 根据权利要求19所述的系统,其特征在于,所述感知请求方为与所述核心网系统连接的感知请求终端,所述第一网元,还用于向所述感知请求终端发送感知响应,所述感知响应包括感知到的目标数据,表征拒绝所述感知请求终端对所述待感知终端进行目标数据感知的信息,以及表征拒绝所述感知请求终端对所述待感知终端进行目标数据感知的原因的信息中的至少一者,所述目标数据是在同意所述感知请求方对所述待感知终端进行目标数据感知的情况下发送的。
- 根据权利要求18所述的系统,其特征在于,所述感知请求方为与所述核心网连接的感知请求终端,所述第一网元,用于接收与所述核心网连接的感知请求终端发送的感知请求,并根据所述感知请求,确定所述第一信息以及所述待感知终端的第二标识。
- 根据权利要求18-21任一项所述的系统,其特征在于,所述用于指示所述感知请求方对所述待感知终端进行目标数据感知的权限的信息包括,表征同意所述感知请求方对所述待感知终端进行目标数据感知的信息,表征拒绝所述感知请求方对所述待感知终端进行目标数据感知的信息,表征拒绝所述感知请求方对所述待感知终端进行目标数据感知的原因的信息,同意对所述待感知终端进行目标数据感知的设备的标识,以及拒绝对所述待感知终端进行目标数据感知的设备的标识中的至少一者。
- 一种核心网网元,其特征在于,所述核心网网元与核心网中的策略控制功能网元连接,所述核心网网元用于确定第一信息以及第二标识,并通过所述策略控制功能网元将所述第一信息发送给所述第二标识对应的待感知终端,所述第一信息用于所述待感知终端确定感知隐私验证的结果。
- 一种数据感知装置,其特征在于,所述装置包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为执行权利要求1至10中任一项所述方法的步骤,或者,所述处理器被配置为执行权利要求11至17中任一项所述方法的步骤。
- 一种芯片,其特征在于,包括处理器和接口;所述处理器用于读取指令以执行权利要求1至10中任一项所述方法的步骤,或者,所述处理器用于读取指令以执行权利要求11 至17中任一项所述方法的步骤。
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202280003266.4A CN115669023B (zh) | 2022-09-20 | 2022-09-20 | 数据感知方法、核心网系统、核心网网元及芯片 |
| PCT/CN2022/120016 WO2024060037A1 (zh) | 2022-09-20 | 2022-09-20 | 数据感知方法、核心网系统、核心网网元及芯片 |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2022/120016 WO2024060037A1 (zh) | 2022-09-20 | 2022-09-20 | 数据感知方法、核心网系统、核心网网元及芯片 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024060037A1 true WO2024060037A1 (zh) | 2024-03-28 |
Family
ID=85022833
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2022/120016 Ceased WO2024060037A1 (zh) | 2022-09-20 | 2022-09-20 | 数据感知方法、核心网系统、核心网网元及芯片 |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN115669023B (zh) |
| WO (1) | WO2024060037A1 (zh) |
Families Citing this family (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP4597942A1 (en) * | 2022-09-26 | 2025-08-06 | Beijing Xiaomi Mobile Software Co., Ltd. | Sensing implementation method and apparatus, communication device, and storage medium |
| CN118714553A (zh) * | 2023-03-27 | 2024-09-27 | 华为技术有限公司 | 通信方法和通信装置 |
| CN120958856A (zh) * | 2023-04-07 | 2025-11-14 | Oppo广东移动通信有限公司 | 感知授权方法和设备 |
| WO2024250129A1 (zh) * | 2023-06-05 | 2024-12-12 | Oppo广东移动通信有限公司 | 用于通信的方法、终端设备以及核心网网元 |
| CN116506845B (zh) * | 2023-06-19 | 2023-09-15 | 暨南大学 | 一种隐私保护的车联网群智感知激励方法及系统 |
| CN119233190A (zh) * | 2023-06-28 | 2024-12-31 | 维沃软件技术有限公司 | 感知处理方法、装置、通信设备及可读存储介质 |
| CN120238908A (zh) * | 2023-12-29 | 2025-07-01 | 维沃移动通信有限公司 | 感知方法、感知装置、通信设备及可读存储介质 |
| CN120711387A (zh) * | 2024-03-26 | 2025-09-26 | 维沃移动通信有限公司 | 感知服务的授权方法、感知请求方法、装置、终端及设备 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190037448A1 (en) * | 2017-09-27 | 2019-01-31 | Intel IP Corporation | Solution for vehicle-to-everything (v2x) communication authorization in 5g system |
| US20210258793A1 (en) * | 2020-02-17 | 2021-08-19 | Samsung Electronics Co., Ltd. | Method and apparatus for handling security policies in v2x communication system |
| WO2021231165A1 (en) * | 2020-05-12 | 2021-11-18 | Qualcomm Incorporated | Providing security credentials to an unmanned aerial vehicle |
| CN113676898A (zh) * | 2020-04-30 | 2021-11-19 | 华为技术有限公司 | 确定安全保护方法、系统及装置 |
Family Cites Families (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2014124043A1 (en) * | 2013-02-05 | 2014-08-14 | Visa International Service Association | Integrated communications network for transactions |
| CN104751031A (zh) * | 2013-12-31 | 2015-07-01 | 中国移动通信集团公司 | 一种信息交互控制方法及装置 |
| JP2017041033A (ja) * | 2015-08-18 | 2017-02-23 | 株式会社リコー | システム、情報処理方法、情報処理装置およびプログラム |
| US10560840B2 (en) * | 2016-03-18 | 2020-02-11 | Wipro Limited | System and method for providing dynamic, adaptive and composite privacy and security for IoT communication |
| CN108377495B (zh) * | 2016-10-31 | 2021-10-15 | 华为技术有限公司 | 一种数据传输方法、相关设备及系统 |
| CN108076461B (zh) * | 2016-11-18 | 2020-09-18 | 华为技术有限公司 | 一种鉴权方法、基站、用户设备和核心网网元 |
| CN107749836B (zh) * | 2017-09-15 | 2020-07-31 | 江苏大学 | 面向用户隐私保护与数据可靠性的移动感知系统及其移动感知方法 |
| CN109819485B (zh) * | 2017-11-21 | 2020-11-27 | 华为技术有限公司 | 一种通信方法、装置及系统 |
| CN110418395B (zh) * | 2018-04-28 | 2021-07-16 | 华为技术有限公司 | 能力开放方法、相关装置、系统及介质 |
| CN109558895A (zh) * | 2018-11-07 | 2019-04-02 | 广州慧睿思通信息科技有限公司 | 一种基于智能感知的校园管理方法、系统及介质 |
| CN110247906A (zh) * | 2019-06-10 | 2019-09-17 | 平安科技(深圳)有限公司 | 一种网络监控方法及装置、设备、存储介质 |
| CN114424600B (zh) * | 2019-09-30 | 2024-03-26 | 华为技术有限公司 | 一种通信方法、设备、系统及存储介质 |
| CN110825810B (zh) * | 2019-10-28 | 2023-05-19 | 天津理工大学 | 一种基于区块链的群智感知双重隐私保护方法 |
| CN111083142A (zh) * | 2019-12-17 | 2020-04-28 | 杭州海康威视数字技术股份有限公司 | 应用于物联网的数据访问方法及系统、设备 |
| CN111461852A (zh) * | 2020-03-27 | 2020-07-28 | 财付通支付科技有限公司 | 一种基于区块链的数据处理方法、装置及可读存储介质 |
| CN113573298B (zh) * | 2020-04-10 | 2022-05-24 | 华为技术有限公司 | 一种通信方法及装置 |
| CN112422637B (zh) * | 2020-07-07 | 2022-10-14 | 德能森智能科技(成都)有限公司 | 一种基于隐私管理的家居管理系统及疫情管理系统 |
| CN114071791B (zh) * | 2020-08-06 | 2024-01-26 | 北京佰才邦技术股份有限公司 | 用户面功能信息上报方法、接入网设备及核心网设备 |
| CN112398859B (zh) * | 2020-11-17 | 2022-02-18 | 珠海大横琴科技发展有限公司 | 一种基于区域物联网平台的安全控制方法、装置、服务器和存储介质 |
| WO2022110184A1 (zh) * | 2020-11-30 | 2022-06-02 | 华为技术有限公司 | 一种通信方法、装置及系统 |
| CN114037407B (zh) * | 2021-10-19 | 2025-10-31 | 深圳市万集科技有限公司 | 事故协查方法、装置、服务器、协查终端及存储介质 |
| CN113873462A (zh) * | 2021-11-02 | 2021-12-31 | 中国联合网络通信集团有限公司 | 通信感知业务通信方法、网元、系统、设备及介质 |
| CN115037552B (zh) * | 2022-06-29 | 2024-09-13 | 北京大甜绵白糖科技有限公司 | 鉴权方法、装置、设备及存储介质 |
-
2022
- 2022-09-20 CN CN202280003266.4A patent/CN115669023B/zh active Active
- 2022-09-20 WO PCT/CN2022/120016 patent/WO2024060037A1/zh not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190037448A1 (en) * | 2017-09-27 | 2019-01-31 | Intel IP Corporation | Solution for vehicle-to-everything (v2x) communication authorization in 5g system |
| US20210258793A1 (en) * | 2020-02-17 | 2021-08-19 | Samsung Electronics Co., Ltd. | Method and apparatus for handling security policies in v2x communication system |
| CN113676898A (zh) * | 2020-04-30 | 2021-11-19 | 华为技术有限公司 | 确定安全保护方法、系统及装置 |
| WO2021231165A1 (en) * | 2020-05-12 | 2021-11-18 | Qualcomm Incorporated | Providing security credentials to an unmanned aerial vehicle |
Also Published As
| Publication number | Publication date |
|---|---|
| CN115669023B (zh) | 2025-06-24 |
| CN115669023A (zh) | 2023-01-31 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN115669023B (zh) | 数据感知方法、核心网系统、核心网网元及芯片 | |
| KR102804367B1 (ko) | 전자 디바이스들 및 연관된 무선 액세서리들의 위치파악 | |
| CN116097689A (zh) | 感知实现方法、装置、通信设备及存储介质 | |
| US10523639B2 (en) | Privacy preserving wearable computing device | |
| EP4498714A1 (en) | Information processing method and apparatus, communication device, and storage medium | |
| US10356615B2 (en) | Method and apparatus for accessing wireless local area network | |
| EP4503779A1 (en) | Information processing method and apparatus, communication device, and storage medium | |
| EP2981116B1 (en) | Method and apparatus for accessing wi-fi network and computer program product | |
| US20240371252A1 (en) | Separation Alerts for Notification While Traveling | |
| KR20240004874A (ko) | 액세서리들의 그룹들의 페어링 | |
| US20220124646A1 (en) | Method and apparatus for sending synchronization signal | |
| WO2019148317A1 (zh) | 无人机服务的支持方法及装置 | |
| CN105049219B (zh) | 流量订购方法和系统、移动终端及服务器 | |
| CN113986092B (zh) | 消息显示方法和装置 | |
| US10123208B2 (en) | Method and device for controlling access | |
| CN117397258A (zh) | 信息处理方法及装置、通信设备及存储介质 | |
| WO2024011413A1 (zh) | 一种信息处理方法、装置、通信设备及存储介质 | |
| WO2023178532A1 (zh) | 通感业务的处理方法、装置、通信设备及存储介质 | |
| WO2024138758A1 (zh) | 感知信息的获取方法、装置 | |
| WO2024031582A1 (zh) | 通信方法、装置、存储介质及芯片 | |
| WO2023178533A1 (zh) | 通感业务的处理方法、装置、通信设备及存储介质 | |
| US20250324386A1 (en) | Ranging/sidelink positioning method and apparatus | |
| CN110896567A (zh) | 基于wifi的数据传输方法及设备 | |
| HK40083048A (zh) | 充电设备的安全性确认方法、装置、设备及存储介质 | |
| CN115795447A (zh) | 充电设备的安全性确认方法、装置、设备及存储介质 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22959049 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWG | Wipo information: grant in national office |
Ref document number: 202280003266.4 Country of ref document: CN |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 22959049 Country of ref document: EP Kind code of ref document: A1 |