Embodiment
Hereinafter also describe in conjunction with the embodiments the present invention in detail with reference to accompanying drawing.Need to prove, in the situation that do not conflict, embodiment and the feature among the embodiment among the application can make up mutually.
Consider in the correlation technique, existing D2D discovery scheme is not suitable for the technical problems such as scene that privacy is had relatively high expectations, and provides relevant solution below in conjunction with embodiment, the existing detailed description in detail.
Embodiment 1
Fig. 1 is the discover method flow chart according to the terminal of the embodiment of the invention 1.As shown in Figure 1, the method comprises:
Step S102, network side entity distributes the Radio Resource in the appointed area, and wherein, Radio Resource is for carrying out terminal to the needed resource of terminal D 2D discovery procedure;
Step S104, after first terminal in the appointed area is initiated D2D discovery procedure to adjacent end according to Radio Resource, network side entity receives and comes from the discovery signals that adjacent end reports, wherein, discovery signals is the discovery signals that comes from first terminal that adjacent end receives, and discovery signals is corresponding with first terminal;
Step S106, network side entity determine first terminal discovery adjacent end, and/or adjacent end is found first terminal according to the authentication information of first terminal and adjacent end and the corresponding relation of discovery signals and first terminal.
By above-mentioned processing procedure, owing to can carry out the process that D2D finds by the network side entity control terminal, and carry out the judgement that D2D sends by network side entity, therefore, guaranteed the privacy of D2D discovery procedure.
In this enforcement, the first terminal in the appointed area is initiated according to Radio Resource before the D2D discovery procedure to adjacent end, and network side entity is that first terminal distributes and carries out D2D and find employed discovery signals by above-mentioned Radio Resource.
In the present embodiment, before network side entity is first terminal distribution discovery signals, network side entity obtains authentication information, wherein, comprise in the authentication information: whether the terminal in the appointed area has is carried out authority information that D2D finds and in the appointed area, the end message that can carry out the D2D discovery procedure with designated terminal.
In the present embodiment, the network side entity basis is to the authentication information of first terminal and adjacent end and the corresponding relation of discovery signals and first terminal, determine first terminal discovery adjacent end, and/or after the adjacent end discovery first terminal, network side entity sends application layer message or the application layer sign ID of first terminal to adjacent end; And/or network side entity sends the application layer message of adjacent end or application layer sign ID to first terminal
Appointed area in the present embodiment can be the combined coverage areas of the zone in the network side entity coverage or network side entity and other network side entity.
Network side entity in the present embodiment can include but not limited to base station, Mobility Management Entity (Mobile Management Entity is referred to as MME).
Above-mentioned network side entity basis is to the authentication information of first terminal and adjacent end and the corresponding relation of discovery signals and first terminal, determine first terminal discovery adjacent end, and/or adjacent end discovery first terminal, can include but not limited to following processing procedure::
The MME entity will send to the base station to the authentication information of the terminal in the appointed area;
The base station is carried out authentication according to authentication information to first terminal and adjacent end, and determines first terminal discovery adjacent end according to authenticating result and corresponding relation, and/or adjacent end is found first terminal.
Network side entity is according to the authentication information of first terminal and adjacent end and the corresponding relation of discovery signals and first terminal, determines that first terminal finds adjacent end, and/or adjacent end finds first terminal, can be by one of following process implementation:
(1) the MME entity will send to the base station to the authentication information of the terminal in the appointed area; The base station is carried out authentication according to authentication information to first terminal and adjacent end, and determines first terminal discovery adjacent end according to authenticating result and corresponding relation, and/or adjacent end is found first terminal; Perhaps
(2) the MME entity will send to the base station to the authenticating result of the terminal in the appointed area; First terminal discovery adjacent end is determined according to authenticating result and corresponding relation in the base station, and/or adjacent end is found first terminal.
A kind of discovery device of terminal also is provided in the present embodiment, and this device is arranged in network side entity, is used for realizing above-described embodiment and preferred implementation, has carried out repeating no more of explanation, and the below describes the module that relates in this device.As used below, the combination of software and/or the hardware of predetermined function can be realized in term " module ".Although the described device of following examples is preferably realized with software, hardware, perhaps the realization of the combination of software and hardware also may and be conceived.Fig. 2 is the structured flowchart according to the discovery device of the terminal of the embodiment of the invention 1.As shown in Figure 2, this device comprises:
Distribution module 20 is connected toreceiver module 22, is used for distributing the Radio Resource in the appointed area, and wherein, Radio Resource is for carrying out terminal to the needed resource of terminal D 2D discovery procedure;
Receiver module 22, be connected todetermination module 24, after being used for first terminal in the appointed area and initiating D2D discovery procedure to adjacent end according to Radio Resource, network side entity receives and comes from the discovery signals that adjacent end reports, wherein, discovery signals is the discovery signals that comes from first terminal that adjacent end receives, and discovery signals is corresponding with first terminal;
Determination module 24 is used for determine first terminal discovery adjacent end, and/or adjacent end being found first terminal according to the authentication information of first terminal and adjacent end and the corresponding relation of discovery signals and first terminal.
By the function that above-mentioned modules is realized, realized equally carrying out the process that D2D finds by the network side entity control terminal, and carried out the judgement that D2D sends by network side entity, therefore, also can guarantee the privacy of D2D discovery procedure.
In the present embodiment,distribution module 20, also being used for by Radio Resource is that first terminal distributes and carries out D2D and find employed discovery signals, wherein, discovery signals is corresponding with first terminal.
Preferably, as shown in Figure 3, said apparatus can also comprise:delivery module 26 is used for sending application layer message or the application layer sign ID of first terminal to adjacent end; And/or send the application layer message of adjacent end or application layer sign ID to first terminal.
Embodiment 2
The present embodiment is corresponding with embodiment 1, in end side corresponding improvement has been carried out in the D2D discovery procedure.Fig. 4 is the flow chart according to the discovery processing method of the terminal of the embodiment of the invention 2.As shown in Figure 4, the method comprises:
Step S402, first terminal obtain and carry out the needed Radio Resource of D2D discovery procedure, and wherein, Radio Resource is for the resource in the appointed area of being distributed by network side entity and for carrying out terminal to the needed resource of terminal D 2D discovery procedure;
Step S404, first terminal is according to the D2D discovery procedure of the Radio Resource initiation of obtaining to adjacent end;
Step S406, first terminal sends discovery signals to adjacent end, wherein, discovery signals is corresponding with first terminal, wherein, the corresponding relation of discovery signals and first terminal with network side entity the authentication information of first terminal and adjacent end is determined first terminal discovery adjacent end as network side entity jointly, and/or adjacent end is found the foundation of first terminal.
A kind of discovery processing unit of terminal also is provided in the present embodiment, and this device is arranged in first terminal, is used for realizing said method, and as shown in Figure 5, this device comprises:
Acquisition module 50, be connected toinitiation module 52, be used for obtaining carrying out the needed Radio Resource of D2D discovery procedure, wherein, Radio Resource is for the resource in the appointed area of being distributed by network side entity and for carrying out terminal to the needed resource of terminal D 2D discovery procedure;
Initiation module 52 is connected to sendingmodule 54, is used for according to the discovery procedure of the Radio Resource initiation of obtaining to adjacent end;
Sendingmodule 54, be used for sending discovery signals to adjacent end, wherein, discovery signals is corresponding with first terminal, wherein, the corresponding relation of discovery signals and first terminal with network side entity the authentication information of first terminal and adjacent end is determined first terminal discovery adjacent end as network side entity jointly, and/or adjacent end is found the foundation of first terminal.
In order to understand better above-described embodiment 1 and embodiment 2, describe in detail below in conjunction with embodiment 3 and embodiment 4.
The present embodiment proposes a kind of D2D discovery technique, can find the D2D equipment that closes on can fully guarantee user's privacy in the D2D discovery procedure, and can realize the control that network side is found D2D.
For achieving the above object, a kind of D2D discover method that the present embodiment provides comprises following treatment step:
Step 1, the Radio Resource that the base station assigns discovery signals is relevant.The Radio Resource that the base station broadcast discovery signals is relevant.Discovery signals can be the known wireless signal of LTE, also can be newly-designed wireless signal.
Step 2, want to carry out the terminal equipment (being called source terminal equipment) that D2D finds, if be not registered to network before, then be registered to network, the base station is configured terminal equipment, terminal equipment sends employed discovery signals according to the configuration of base station, and discovery signals is within the Radio Resource scope of broadcasting.
Wherein, during endpoint registration eNB, carry the information such as application layer id of oneself.
Wherein, eNB(or MME when terminal equipment is registered) can obtain the D2D log-on message of terminal, and eNB obtains the unique identification of terminal in network.
Wherein, if terminal equipment does not have D2D to find power, then eNB is regardless of allotting existing signal.
Step 3 is checked through the terminal equipment (being called target terminal equipment) of discovery signals, if be not registered to before network, then is registered to network, reports the discovery signals that measures to the base station.The base station is according to the log-on message of discovery signals and terminal equipment, and the D2D that finishes terminal equipment finds, and notice is to terminal equipment.
Wherein, during endpoint registration eNB, carry the information such as application layer id of oneself.
Wherein, eNB(or MME when terminal equipment is registered) can obtain the D2D log-on message of terminal, and eNB obtains the unique identification of terminal in network.
Wherein, if terminal equipment does not have D2D to find power, then stop the flow process of back.
Wherein, which target terminal equipment eNB knows according to the corresponding relation of discovery signals and terminal equipment, has received the discovery signals of source terminal equipment.
Wherein, perhaps at target terminal equipment, received after the discovery signals of source terminal equipment, known the D2D authentication information of terminal equipment, and the whole network unique identification of target device.Judge the power of D2D by this sign.
Wherein, eNB is according to the authentication information of device end, which source terminal equipment of having judged which target terminal device discovery.
Wherein, can be according to the symmetry of wireless channel, think if target terminal equipment can be received the signal of source terminal equipment, then source terminal equipment also can be received the wireless signal of target terminal equipment, eNB judges according to the authentication information of device end which target terminal equipment is which source terminal equipment found.
Wherein, if source device can be found target device, eNB passes to source terminal equipment with information such as target terminal equipment application layer id.
Wherein, if target device can be found source device, eNB passes to target terminal equipment with information such as source terminal equipment application layer id.
Embodiment 4
In the present embodiment, can adopt topological structure as shown in Figure 6, the reciprocal process of each entity can be participated in the treatment step among Fig. 7 in Fig. 6.The overall flow that D2D finds comprises as shown in Figure 7,
Step S702, base station assigns is being carried out D2D employed Radio Resource when finding at wireless terminal, and broadcasts.
In the present embodiment, can only be distributed in the interior Radio Resource of this base station scope in a base station, and broadcast the Radio Resource in this base station scope, also can be several base stations united, form a D2D and find the zone, several base stations can be joined together to carry out resource and be distributed.Employed Radio Resource in this D2D finds the zone is broadcasted in each base station.
Step S704, wireless terminal and eNB finish D2D user's device discovery jointly.
So-called device discovery just refers to that eNB finds that two wireless terminal devices are within the scope that D2D finds.Be the discovery signals that eNB discovery target wireless terminals has been received the source wireless terminal, namely finishing equipment is found, this part has specific descriptions in Fig. 8-11 part.
When carrying out device discovery, if wireless terminal is in the idle attitude, then wireless terminal adheres to, and is registered to network, enters connected state, if wireless terminal would have been connected state, then need not this process
The user that step S706, eNB and MME or eNB self finish D2D user finds.
So-called user finds, is eNB according to the result of device discovery, and the authentication that D2D finds judges, determines that a wireless terminal device found another wireless terminal device.This part has description in Figure 12 (a, b, c) part.
Describe in detail below in conjunction with Fig. 8-17.
MME obtains the D2D authentication information, must judge whether wireless terminal has the right to carry out to carry out before the D2D discovery at network side.From the node that sends, two kinds of basic thinkings are arranged, a kind of is that authentication information is dealt into MME, a kind of is that authentication information further is dealt into eNB.From the time point of authentication, two kinds of thinkings also can be arranged, can have two kinds to process thinking, a kind of is when UE adheres to, MME obtains the D2D authentication information of wireless terminal, and also having a kind of is the D2D authentication information that carries out obtaining in the D2D device discovery procedure wireless terminal at wireless terminal.
The below obtains the D2D authentication information when UE adheres to, but authentication information is not issued to eNB, this situation as shown in Figure 8, wherein dotted line represents identically with existing procedure, solid line represents the place different with existing procedure.In attaching process, MME obtains the D2D authentication information of wireless terminal in authentication and obtaining in the data procedures from HSS, and this flow process can be identical with the authorizing procedure of present LTE, and difference is in the authentication information that obtains, many authentication informations of D2D.Also can obtain by independent message the authentication information of D2D.The D2D authentication information must comprise following content, and whether this wireless terminal has the power of carrying out D2Ddiscovery.The D2D terminal finds that relation table, this table comprise which other wireless terminal this wireless terminal can be found by, can not be found by for which wireless terminal.Which other wireless terminal this wireless terminal can find, can not find which wireless terminal.
The below is in the D2D device discovery procedure, MME obtains the D2D authentication information, but authentication information is not issued to eNB, this situation as shown in Figure 9, in device discovery procedure, UE can send out message to MME, and showing needs MME to obtain the D2D authentication information, MME sends out message to HSS afterwards, obtains the D2D authentication information of wireless terminal.The content that this information comprises is with above-mentioned identical.MME returns message to UE, shows to obtain authentication information.
The below obtains the D2D authentication information when UE adheres to, authentication information further is issued to eNB, and this situation such as Figure 10 show, wherein dotted line represents identically with existing procedure, and solid line represents the place different with existing procedure.It is identical with flow process among Fig. 8 that MME obtains the flow process of D2D authentication message, after MME receives the D2D authentication information, can after existing attachment flow in a certain message in the D2D authentication information is issued eNB, for example, set up in the request message at present initial context, carry authentication information.Also can transmit authentication information with a special message, the authentication information that MME passes to eNB comprises, whether this wireless terminal has the power of carrying out D2D discovery, the D2D terminal can be found that also relation table pass to eNB.When authentication message was passed to eNB, wireless terminal sign that also can the whole network is unique was passed to eNB.
The below is in the D2D device discovery procedure, MME obtains the D2D authentication information, and authentication information is issued to UE, it is identical with flow process among Fig. 9 that MME obtains the flow process of D2D authentication message, after MME receives the D2D authentication information, as shown in figure 11, MME returns authentication and finishes message, simultaneously along band authentication message is passed to eNB, the authentication information that MME passes to eNB comprises, whether this wireless terminal has the power of carrying out D2D discovery.Also D2D terminal discovery relation table can be passed to eNB.When authentication message was passed to eNB, wireless terminal sign that also can the whole network is unique was passed to eNB.
Below explanation wireless terminal finishing equipment discovery procedure.
Want to carry out the wireless terminal that D2D finds, send out D2D to eNB and find request message (or signaling) (D2D Discovery request), carry out D2D if eNB in attaching process, adheres to former and find, can send out request message (or signaling).If MME does not also have authentication information, can carry out flow process shown in Figure 9, in the D2D device discovery procedure, MME obtains the D2D authentication information.MME or eNB are according to authentication information, judge whether UE can carry out D2D and find, if cannot carrying out D2D, UE finds, then stop D2D and find flow process, if can carrying out D2D, UE finds (if MME authentication, then to notify UE authenticating result), then eNB sends out message (or signaling) indication wireless terminal, according to the requirement generation D2D discovery signals of eNB.Wireless terminal produces the D2D discovery signals according to the indication of eNB.
In the present embodiment, with this terminal, namely initiate the terminal that D2D finds, be called source UE.Discovery signals and source UE have definite one-one relationship within the specific limits.Support the UE of D2D function can carry out the detection of D2D discovery signals always, the terminal that detects the D2D discovery signals is called object UE.After object UE detects the D2D discovery signals, if be not registered to network, then carry out attach operation, its process is shown in Fig. 8-11.Carried out adhering to and register the operation after, object UE reports the identity information of its D2D discovery signals that detects, object UE also can report the metrical information of D2D discovery signals simultaneously.If the authentication information of this UE is found (method for authenticating is the same) for carrying out D2D, then eNB receives after the identity information of the D2D discovery signals that object UE reports, distribute to which source UE according to this D2D discovery signals, be the corresponding relation of discovery signals and source UE, judge the discovery signals which source UE is object UE received.This process is device discovery procedure, if the authentication information of this UE is for carrying out the D2D discovery, then eNB stops following flow process.Shown in Figure 12 a, according to the symmetric relation of wireless channel, can think if object UE is sent out discovery signals, source UE also can receive the discovery signals of object UE.Be that source UE and object UE have all been finished device discovery each other, shown in Figure 12 b, can only think that also object UE found source UE, can allow afterwards object UE send out discovery signals, if source UE can receive discovery signals, then finished the device discovery of source UE to object UE.Shown in Figure 12 c, as long as open the D2D function, wireless terminal just sends discovery signals.When a UE will find other UE, then report the discovery signals of oneself receiving to eNB, allow eNB judge that this wireless terminal received the discovery signals which wireless terminal sends.
Below describe the flow process that the wireless terminal completing user is found in detail.
ENB is after finishing equipment is found, two kinds of possible processing methods are arranged, a kind of D2D of being is that terminal discovery relational result or terminal discovery relation table have been passed to eNB, does the judgement that the user finds by eNB, and a kind of is that the terminal relation table is done the judgement that the user finds in the MME side by MME.The below discusses respectively.
First method, as shown in figure 13, the content of terminal discovery table is that this UE finds that UE, and this UE can be found by that UE, for example, the terminal of UE1 finds that relation table comprises following content, and UE1 can find UE2, and UE1 can be found by UE2, UE1 can find UE3, UE1 can be found by UE3, until UE1 can find UEn, UEn can be found by UE1.UE is marked (for example GUTI) by a unique sign of the whole network.This sign can be passed to eNB in authentication process before, also can by the message of a special use, carry out passing to eNB before user's discovery.In first method, the terminal relation table passes to the eNB side.This table can be passed to eNB when authentication, also can pass to eNB by special message.ENB looks into the terminal relation table according to the device discovery result, does as judging according to terminal discovery table, to object UE, can be found by source UE if source UE can find object UE and object UE, and then source UE can find object UE; If source UE can find object UE and object UE and cannot be found by source UE, then source UE cannot find object UE; If source UE cannot find object UE and object UE and can be found by source UE, then source UE cannot find object UE; If source UE cannot find object UE and object UE and cannot be found by source UE, then source UE cannot find object UE.To source UE, if can finding source UE and source UE, object UE can be found by object UE, then object UE can be found source UE; If object UE can find source UE and source UE and cannot be found by object UE, then object UE cannot be found source UE; If object UE cannot find source UE and source UE and can be found by object UE, then object UE cannot be found source UE; If object UE cannot find source UE and source UE and cannot be found by object UE, then object UE cannot be found source UE.After completing user was found, the user found that the result will report MME.The eNB completing user reports eNB to the result after finding.
Second method, as shown in figure 14, eNB passes to MME with the UE sign of the UE of two associations in the device discovery, MME finds terminal according to terminal discovery table and finds relational result, and passing to eNB, eNB carries out the user according to the described method of first method and finds flow process, and the result is passed to MME.
The third method, as shown in figure 15, the terminal relation table is in the MME side, the MME completing user is found, at this moment, can make a decision at a MME, also can make a decision at two MME, shown in determination methods is identical with the method that makes a decision at eNB, if MME corresponding to two UE might appear in two MME that UE is corresponding different, can be that MME is when obtaining authentication message this moment, can obtain whole relation tables, do authentication at a MME like this and get final product.Also can be two MME when authentication, only obtain the part authentication information, can pass through message this moment, obtains the judgement information of user discovery, judges information can be whether can find between two UE, found result also can be the terminal relation table.MME can pass to eNB with the result after finishing user's discovery.
Below describe terminal in detail and know that the user finds result's flow process.
ENB or eNB and MME find that according to the user result sets up corresponding radio bearer.
ENB can according to the specific design of upper layer application protocol, set up corresponding radio bearer after completing user is found, for example in the process that source UE initiating equipment is found, can carry out the multiplexing of message, namely carry the message of application layer on the device discovery messages, this message portable application layer id.When the completing user discovery, and after confirming to find, namely set up the bearer path of source UE and object UE, this message is issued object UE.Operation is afterwards finished by application layer.
After completing user is found, several different methods can be arranged with notification terminal as a result.Can allow and set up the method that chain of command carries between two UE, allow application layer carry out next step operation, as shown in figure 16, UE1 can carry the information of application layer when sending D2D discovery request (also can be other message), if confirm that UE2 can find UE1, set up the chain of command carrying at eNB, with application layer messages, be given to UE2, allow UE2 process.UE2 is (also can be other message) when reporting the identity information of D2D, also can carry the request message of application layer, after confirming that UE1 can find UE2, application layer messages can be given to UE1, allows UE1 process.
Also can adopt as shown in figure 17 method, the identify label of the UE of MME or eNB or special its discovery of D2D server notification UE, for example application layer id, or telephone number is logical.Application layer id can carry out in the D2D discovery procedure notice message at UE and tell eNB.ENB does related with the whole network unique identification of the UE that carries out using when the user finds application layer id.After completing user is found, application layer id is passed to the other side, for example UE1 has found UE2, then the application layer id with UE2 passes to UE1.Notice UE1 has found UE2, also can be the whole network unique identification that a user needs, for example also can be with the telephone number notice UE1 of UE2.Telephone number (also can be general the whole network unique identification) can be reported up by UE when D2D finds, also can be that MME or D2D client server are according to this telephone number of acquisition of information of UE.
Above-described embodiment carries out D2D by base station and core net control UE to be found, and carries out final D2D by base station and core net and find to judge, has protected the privacy of user in carrying out the D2D discovery procedure.Guaranteed simultaneously the control that network side is found D2D.
In another embodiment, also provide a kind of software, this software be used for to be carried out the technical scheme that above-described embodiment and preferred implementation are described.
In another embodiment, also provide a kind of storage medium, stored above-mentioned software in this storage medium, this storage medium includes but not limited to: CD, floppy disk, hard disk, scratch pad memory etc.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with general calculation element, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the storage device and be carried out by calculation element, and in some cases, can carry out step shown or that describe with the order that is different from herein, perhaps they are made into respectively each integrated circuit modules, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
Be the preferred embodiments of the present invention only below, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.