优先权声明以及相关专利申请Priority claim and related patent applications
本专利申请要求提交于2013年12月27日的美国专利申请序列No.14/141,843的优先权利益,所述专利申请要求提交于2013年5月31的美国临时专利申请No.61/829,968的优先权利益,上述专利申请中的每个全文以引用方式并入本文。This patent application claims the benefit of priority to U.S. patent application serial no. 14/141,843 filed on December 27, 2013, which claims the benefit of priority to U.S. provisional patent application no. 61/829,968 filed on May 31, 2013, each of which is incorporated herein by reference in its entirety.
背景技术Background Art
邻近应用和服务(ProSe)代表快速增长的社交和技术趋势,这对蜂窝无线/移动宽带技术的演进具有重大影响。这些服务可基于对两个设备或两个用户彼此接近并因此可以能够直接彼此通信的意识。Proximity Applications and Services (ProSe) represent a rapidly growing social and technological trend that has a significant impact on the evolution of cellular wireless/mobile broadband technologies. These services may be based on the awareness that two devices or two users are in proximity to each other and may therefore be able to communicate directly with each other.
综述Overview
本申请论述了用于提供设备到设备(D2D)发现隐私的装置和方法以及其他方面。在示例中,一种方法可包括发送来自第一用户设备(UE)的第一临时标识和第一发现信息,所述发现信息授权所述第一UE的发现;以及接收来自第二UE的请求,以使用与所述第二UE相关联的第二临时标识加入具有所述第一UE的设备到设备网络。The present application discusses, among other aspects, apparatus and methods for providing device-to-device (D2D) discovery privacy. In an example, a method may include sending a first temporary identity and first discovery information from a first user equipment (UE), the discovery information authorizing discovery of the first UE; and receiving a request from a second UE to join a device-to-device network with the first UE using a second temporary identity associated with the second UE.
本综述旨在提供对本专利申请的主题的一般概述。这并不意味着提供本发明唯一的或详尽的解释。所包括的具体说明提供关于本专利申请的进一步信息。This summary is intended to provide a general overview of the subject matter of this patent application. It is not intended to provide a sole or exhaustive explanation of the invention. The included detailed description provides further information about this patent application.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
附图未必按比例绘制,图中,相同标号可描述不同视图中的类似部件。具有不同字母后缀的相同标号可表示类似部件的不同实例。附图以举例而非限制的方式一般性地示出在本文中论述的各种实施例。The accompanying drawings are not necessarily drawn to scale. In the drawings, like reference numerals may describe similar components in different views. Like reference numerals with different letter suffixes may represent different instances of similar components. The accompanying drawings generally illustrate various embodiments discussed herein by way of example and not limitation.
图1一般性地示出包括D2D用户的示例性无线系统。FIG1 generally illustrates an exemplary wireless system including D2D users.
图2示出使用临时ID提供D2D发现隐私的示例性方法。FIG2 illustrates an exemplary method for providing D2D discovery privacy using a temporary ID.
图3一般性地示出在采用邻近服务的同时提供隐私的方法,其中邻近服务由网络资源或元件辅助。FIG3 generally illustrates a method for providing privacy while employing proximity services facilitated by network resources or elements.
图4一般性地示出当采用由网络资源或元件辅助的邻近服务时提供隐私的方法。FIG4 generally illustrates a method for providing privacy when employing proximity services facilitated by network resources or elements.
图5为示出在其上执行本文论述的任何一种或多种技术(例如,方法)的示例性移动设备的框图。5 is a block diagram illustrating an exemplary mobile device upon which any one or more of the techniques (eg, methodologies) discussed herein may be performed.
图6示出示例性机器的框图。FIG6 shows a block diagram of an exemplary machine.
图7示出根据一些实施例的示例性机器700(例如,UE)的功能性框图。FIG7 illustrates a functional block diagram of an exemplary machine 700 (eg, a UE) in accordance with some embodiments.
具体实施方式DETAILED DESCRIPTION
在某些无线协议中,已对D2D通信尝试一些形式的标准化。例如,邻近服务(ProSe),诸如3GPP(第三代合作伙伴计划)邻近服务,可包括如在TS 22.101中定义的关于发现功能的以下方面:In some wireless protocols, some forms of standardization have been attempted for D2D communications. For example, Proximity Services (ProSe), such as 3GPP (3rd Generation Partnership Project) Proximity Services, may include the following aspects regarding discovery functionality as defined in TS 22.101:
根据运营商策略和用户选择,两个能够ProSe的设备(有时也称作用户设备或“UE”)可以是可确定的;例如,使用直接无线电信号或者经由运营商网络;Depending on operator policy and user choice, two ProSe-capable devices (sometimes also referred to as user equipment or "UE") may be determinable; for example, using direct radio signals or via an operator network;
发现能够ProSe的UE可确定另一个能够ProSe的UE是否是对其感兴趣的。如果需要通过在发现能够ProSe的UE上的一个或多个授权应用来获悉能够ProSe的UE的接近度,则该能够ProSe的UE对发现能够ProSe的UE是感兴趣的;A discovering ProSe capable UE may determine whether another ProSe capable UE is of interest to it. A ProSe capable UE is interested in discovering a ProSe capable UE if the proximity of the ProSe capable UE is required to be known by one or more authorized applications on the discovering ProSe capable UE.
符合用户和运营商设置的是,能够ProSe的UE可以能够通过接近该能够ProSe的UE的其他能够ProSe的UE而被发现,其中接近是被能够ProSe的UE所明确允许的。Consistent with user and operator settings, a ProSe-capable UE may be discoverable by other ProSe-capable UEs that are in proximity to the ProSe-capable UE, where the proximity is explicitly allowed by the ProSe-capable UE.
能够ProSe的UE可通过相同或不同的PLMN来服务,包括当漫游时。A ProSe-capable UE may be served by the same or different PLMNs, including when roaming.
对于ProSe发现的全部要求也可应用于当ProSe发现所涉及的能够ProSe的UE中的一者或两者在VPLMN中漫游时。All requirements for ProSe discovery may also apply when one or both of the ProSe-capable UEs involved in the ProSe discovery are roaming in a VPLMN.
在能够ProSe的UE上,ProSe可支持大量应用的同时操作,这确保了3GPP系统只对通过3GPP运营商授权的应用提供ProSe发现的邻近信息。On a ProSe-capable UE, ProSe can support the simultaneous operation of a large number of applications, which ensures that the 3GPP system only provides ProSe-discovered proximity information to applications authorized by the 3GPP operator.
ProSe系统可以允许发现权限的同时授予和撤销。The ProSe system may allow for the simultaneous granting and revocation of discovery permissions.
图1一般性地示出与传统蜂窝用户一起操作并共存的示例性无线系统100,该无线系统100包括D2D用户(几个典型标记的101)。与现有的传统LTE网络基础设施不同,D2D用户101不一定需要经由中央协调器(eNodeB)102来通信。在某些示例中,D2D用户101可直接与彼此通信,或者通过其他D2D用户的跳转103来通信。当D2D通信与移动宽带系统共享相同的资源时,某些功能仍可通过移动宽带网络的eNodeB 102来控制并协调,诸如当集中操控提供更多的益处时。FIG1 generally illustrates an exemplary wireless system 100 that operates and coexists with traditional cellular users, including D2D users (several typically labeled 101). Unlike existing traditional LTE network infrastructure, D2D users 101 do not necessarily need to communicate via a central coordinator (eNodeB) 102. In some examples, D2D users 101 can communicate directly with each other or through hops 103 from other D2D users. While D2D communications share the same resources as a mobile broadband system, certain functions can still be controlled and coordinated by the mobile broadband network's eNodeB 102, such as when centralized control offers greater benefits.
在某些示例中,接近度感测方法可经由网络通过监控与特定单元的UE连系/关联或使用基于位置的服务和协议来实施。除这些传统方法之外,可对D2D协调器的功能添加基于功能性的新的接近度。例如,可在设备发现信令用于辅助D2D集群组织和D2D链路建立的D2D传输区域内分配特定的设备发现区。为了该目的,可在D2D传输区域中引入特定的发现信号传输间隔。另外,接近度可基于D2D链路质量的测量来感测。In some examples, proximity sensing methods can be implemented via the network by monitoring UE connections/associations with a specific cell or using location-based services and protocols. In addition to these traditional methods, new proximity-based functionality can be added to the D2D coordinator's functionality. For example, specific device discovery zones can be allocated within the D2D transmission area, where device discovery signaling is used to assist in D2D cluster organization and D2D link establishment. For this purpose, specific discovery signal transmission intervals can be introduced within the D2D transmission area. Furthermore, proximity can be sensed based on measurements of D2D link quality.
除D2D通信系统的上述方面之外,本发明人已经认识到在通过使用临时ID发现功能期间,提供UE的永久标识(ID)的隐私的方法和装置。在某些示例中,隐私可在发现功能期间提供,诸如ProSe发现功能,同时也实现上面列出的全部服务。本说明书经常参考ProSe发现功能,但应当理解,本主题的某些方面通过其他D2D协议和发现活动是可能的。在某些示例中,可对每个D2D UE分配临时ID。在某些示例中,可将临时ID分配给对UE可用的每个D2D应用。在一些示例中,临时ID可以经常或频繁地改变。在一些示例中,临时ID可诸如通过UE自身公布或通过网络资源公布,而无需展示UE或用户的永久ID。In addition to the above aspects of the D2D communication system, the inventors have recognized methods and apparatus for providing privacy of a UE's permanent identification (ID) during discovery functionality using a temporary ID. In some examples, privacy can be provided during discovery functionality, such as ProSe discovery functionality, while also enabling all of the services listed above. This specification often refers to ProSe discovery functionality, but it should be understood that certain aspects of the present subject matter are possible through other D2D protocols and discovery activities. In some examples, a temporary ID can be assigned to each D2D UE. In some examples, a temporary ID can be assigned to each D2D application available to the UE. In some examples, the temporary ID can change frequently or often. In some examples, the temporary ID can be published, such as by the UE itself or by a network resource, without having to display the UE's or user's permanent ID.
在某些示例中,临时ID可在UE网络资源中随机生成并被发送给UE。在一些示例中,可使用在UE上运行并且同时在网络资源上运行的排列算法来生成临时ID。在某些示例中,UE或在UE上运行的应用可请求解析所发现的UE的临时ID。在某些示例中,请求可由网络资源来服务。在一些示例中,使用与请求UE或请求应用的直接通信,所发现的UE可对请求提供服务。在某些示例中,可用所发现的UE或所发现的应用的永久身份来应答请求。在一些示例中,仅仅当请求UE或应用已被授权时,才可使用所发现的UE或所发现的应用的永久身份来应答请求。In some examples, a temporary ID may be randomly generated in a UE network resource and sent to the UE. In some examples, a permutation algorithm running on the UE and simultaneously running on the network resource may be used to generate the temporary ID. In some examples, the UE or an application running on the UE may request resolution of the temporary ID of the discovered UE. In some examples, the request may be serviced by the network resource. In some examples, the discovered UE may service the request using direct communication with the requesting UE or requesting application. In some examples, the request may be answered using the permanent identity of the discovered UE or discovered application. In some examples, the request may be answered using the permanent identity of the discovered UE or discovered application only if the requesting UE or application is authorized.
在某些示例中,本主题对能够D2D的设备提供一层用户隐私保护。如果没有该保护,则D2D通信服务(诸如ProSe服务)将展示用户ID,并且在一些情况下,将共同展示用户ID和用户的UE的当前位置信息。如此,在没有另外的隐私保护的情况下,接近度服务(诸如ProSe服务)对于用户的身份信息可以是威胁(例如,身份威胁)也是物理威胁,因为其可提供用户的位置信息。一些隐私解决方案可在应用层中实施,但在开放移动操作系统中的应用通常不能被信任以提供隐私保护或者不能被信赖以提供充足的隐私保护。本主题提供系统级的隐私保护。在某些示例中,可提供系统级隐私保护。在一些示例中,系统级的隐私系统不对应用传递ProSe发现信息。另外,ProSe发现数据被加密,使得未授权应用不能对信息解密。In some examples, the present subject matter provides a layer of user privacy protection for D2D-capable devices. Without this protection, D2D communication services (such as ProSe services) will display the user ID and, in some cases, will display the user ID together with the current location information of the user's UE. Thus, without additional privacy protection, proximity services (such as ProSe services) can be a threat (e.g., an identity threat) as well as a physical threat to the user's identity information because they can provide the user's location information. Some privacy solutions can be implemented at the application layer, but applications in open mobile operating systems cannot generally be trusted to provide privacy protection or cannot be trusted to provide adequate privacy protection. The present subject matter provides system-level privacy protection. In some examples, system-level privacy protection can be provided. In some examples, the system-level privacy system does not pass ProSe discovery information to applications. In addition, ProSe discovery data is encrypted so that unauthorized applications cannot decrypt the information.
在某些示例中,隐私保护可包括永久用户ID,诸如电子邮件地址或特定应用的电子邮件地址(例如,john.doe@facebook.com),与临时ID(例如,34ff8e108a23cc)之间的分配。在一些示例中,临时ID的解析可展示永久ID。在某些示例中,临时ID的解析可通过网络或网络资源完成。在一些示例中,临时ID的解析可在已授权UE处完成,诸如在能够发现的UE或者接收包括临时ID的发现信息的已授权UE处完成。在一些示例中,在临时ID的有效时间(例如,对于临时ID保持相同的时间)内,UE一旦被发现则可被识别。In some examples, privacy protection can include an assignment between a permanent user ID, such as an email address or an application-specific email address (e.g., john.doe@facebook.com), and a temporary ID (e.g., 34ff8e108a23cc). In some examples, resolution of the temporary ID can reveal the permanent ID. In some examples, resolution of the temporary ID can be performed by a network or network resource. In some examples, resolution of the temporary ID can be performed at an authorized UE, such as at a discoverable UE or an authorized UE that receives discovery information including the temporary ID. In some examples, the UE can be identified once discovered within the validity period of the temporary ID (e.g., the time that the temporary ID remains the same).
在某些示例中,在临时ID已经改变之后,发现者UE不能识别与新临时ID相关联的UE,并且可请求新临时ID的新解析。在一些示例中,如果特定用户、应用或UE的授权被撤销,则临时ID可改变,并且由撤销用户、应用或UE发出的每个请求可被拒绝。在某些示例中,分配临时ID以对邻近服务用户提供隐私可以是尤其有利的,其中发现信息可自动被UE广播,而无需网络来辅助发现功能。In some examples, after the temporary ID has changed, the discoverer UE cannot identify the UE associated with the new temporary ID and may request a new resolution of the new temporary ID. In some examples, if the authorization of a particular user, application, or UE is revoked, the temporary ID may change and each request issued by the revoking user, application, or UE may be denied. In some examples, allocating a temporary ID to provide privacy to proximity service users may be particularly advantageous, where discovery information may be automatically broadcast by the UE without the network assisting with the discovery function.
如上所述,在一些示例中,用户的临时ID与永久ID之间的分配可存储在UE处。在其中通过网络辅助ProSe发现的一些示例中,UE的临时ID与永久ID之间的分配可存储在网络资源上。在一些示例中,为改变临时ID,分配消息在网络与UE之间是可交换的。在一些示例中,可使用同步(例如,基于时间的)排列算法来生成临时ID分配。在示例中,该系统的排列函数可使用预共享密钥将当前日期/时间加密。应理解,在不脱离本主题范围的情况下,存在其他可能的排列函数。在某些示例中,该基于时间的排列函数可显著减小UE与网络之间消息的数量。接下来的段落描述用于对邻近服务的用户提供隐私保护的系统的例示性示例。As described above, in some examples, the assignment between a user's temporary ID and permanent ID may be stored at the UE. In some examples where ProSe discovery is assisted by the network, the assignment between the UE's temporary ID and permanent ID may be stored on a network resource. In some examples, assignment messages may be exchanged between the network and the UE to change the temporary ID. In some examples, a synchronous (e.g., time-based) permutation algorithm may be used to generate the temporary ID assignment. In an example, the permutation function of the system may encrypt the current date/time using a pre-shared key. It should be understood that other possible permutation functions exist without departing from the scope of the present subject matter. In some examples, this time-based permutation function may significantly reduce the number of messages between the UE and the network. The following paragraphs describe illustrative examples of a system for providing privacy protection for users of proximity services.
图2示出使用临时ID提供D2D发现隐私的示例性方法200。Alice的UE是由运营商A提供的ProSe的订户。Bob的UE是由运营商B提供的ProSe的订户。David也是由运营商B提供的ProSe的订户。Alice、Bob和Dave通过不同的应用使用ProSe。他们对于这些不同的应用使用不同的永久ID。例如,Dave喜欢玩象棋并且他使用被称作“象棋玩伴(chess-pal)”的ProSe功能应用。他对附近每个象棋玩伴用户进行授权,以使他作为潜在的象棋玩家而被发现。Dave对于这个应用的永久身份是“dave72@chesspal.com”。Alice、Bob和Dave也属于或者在社交网站(诸如Facebook)上注册。他们的永久ID为“alice@facebook.com”、“bob@facebook.com”和“dave@facebook.com”。Alice和Bob是好友,并且他们对彼此授权以便用他们的Facebook身份发现彼此,无论他们何时接近彼此。Alice和Dave也是好友,并且因此他们对彼此授权以便用他们的Facebook身份发现彼此,同样无论他们何时彼此接近。Bob和Dave不知道彼此,并且他们没有对彼此授权以发现彼此。如果可以通过发现功能展示Dave的永久身份(dave@facebook.com),那么Bob将能够发现并确认Dave,即使Bob未被授权这样做。如果将所述永久身份绑定到另一个永久身份,那么Bob甚至不能发现Dave,但是Alice将能够发现他,即使在Dave可能已经撤销她的授权之后。因此,在某些示例中,可将每个永久身份(例如,Facebook和chess-pal)分配给临时ID。对于本例,所述ID在下面的表中列出。FIG2 illustrates an exemplary method 200 for providing D2D discovery privacy using temporary IDs. Alice's UE is a ProSe subscriber provided by operator A. Bob's UE is a ProSe subscriber provided by operator B. David is also a ProSe subscriber provided by operator B. Alice, Bob, and Dave use ProSe for different applications. They use different permanent IDs for these different applications. For example, Dave enjoys playing chess and uses a ProSe-enabled application called "chess-pal." He authorizes each nearby chess-pal user to be discovered as a potential chess player. Dave's permanent identity for this application is "dave72@chesspal.com." Alice, Bob, and Dave also belong to or are registered on a social networking site such as Facebook. Their permanent IDs are "alice@facebook.com," "bob@facebook.com," and "dave@facebook.com." Alice and Bob are friends and have authorized each other to be discovered using their Facebook identities whenever they are near each other. Alice and Dave are also good friends, and therefore they authorize each other to find each other with their Facebook identities, equally whenever they are near each other. Bob and Dave do not know each other, and they do not authorize each other to find each other. If Dave's permanent identity (dave@facebook.com) can be displayed through the discovery function, Bob will be able to find and confirm Dave, even if Bob is not authorized to do so. If the permanent identity is bound to another permanent identity, Bob cannot even find Dave, but Alice will be able to find him, even after Dave may have revoked her authorization. Therefore, in some examples, each permanent identity (for example, Facebook and chess-pal) can be assigned to a temporary ID. For this example, the IDs are listed in the table below.
在本例中,头两个字母可标志应用的类型。SM可指示临时ID为用于社交媒体(如Facebook或google+)的ID。GA可指示临时ID为用于游戏(如chess-pal或WoW)的ID。临时ID的另一个示例可以只用别名替换ID的个人永久部分,诸如OJFXGUOIJCS3PKM5@facebook.com。在这种情况下,特定的应用可被指示,并且关于该应用的用户在附近的信息被展示,但用户的身份仍然未知。在另一个示例中,可使用用户设置来确定使用哪个格式进行发现。In this example, the first two letters may indicate the type of application. SM may indicate that the temporary ID is an ID for social media (such as Facebook or Google+). GA may indicate that the temporary ID is an ID for gaming (such as chess-pal or WoW). Another example of a temporary ID might simply replace the personal, permanent portion of the ID with an alias, such as OJFXGUOIJCS3PKM5@facebook.com. In this case, a specific application can be indicated, and information about the user of that application in the vicinity is displayed, but the user's identity remains unknown. In another example, user settings can be used to determine which format to use for discovery.
在某些示例中,D2D发现可如下进行:In some examples, D2D discovery may proceed as follows:
所有邻近服务功能UE发送它们的临时ID。在201处,Alice的UE广播“SM-OJFXGUOIJCS3PKM5”。在202处,Bob的UE广播“SM-D62321VQT8INCNMT”。Dave的UE广播“SM-BPO74QJMTFEAK6H0,GA-9IPGPJB7E91703AW”。Dave发送能够使他被发现的临时ID。如果Alice和Bob接近彼此,那么他们的UE接收来自另一个UE的信标。由于Alice的未知临时ID是用于社交媒体的ID,因此能够在Bob的UE上运行的Facebook应用的ProSe可在203处发送请求消息,该请求消息请求解析Alice的临时ID。在某些示例中,安全能够就绪(例如,数字签名)以确保由运营商授权的用户和应用来发送请求。在一些示例中,请求还可包含解析数(例如,3456)。在204处,Alice的UE可接收请求。在一些示例中,Alice可用她的UE来解析她的临时ID,而无需知道谁发出请求。在一些示例中,在205处,Alice可在解析或拒绝解析请求之前尝试确认请求者。该确认方法可包括但不限于发送询问在她的位置处或邻近她的位置有谁的文本消息,在周围寻找并尝试确认她可能知道的人,诸如她的好友Bob,并且然后验证他发送了包括使用解析数的请求。如果被询问(不管是在线还是离线),Bob可确认他发送了带有解析数的请求。在某些示例中,Alice可授权解析。在206处,Alice的UE可解析她的临时ID,并且在207处,Alice的UE可将她的永久ID发送给Bob的UE。在某些示例中,可使用D2D通信来发送Alice的永久ID。在一些示例中,永久ID信息可受保护,诸如通过加密,使得Alice的永久ID保密,除了对在Bob的UE上运行的应用之外。All Proximity Service Function UEs send their temporary IDs. At 201, Alice's UE broadcasts "SM-OJFXGUOIJCS3PKM5". At 202, Bob's UE broadcasts "SM-D62321VQT8INCNMT". Dave's UE broadcasts "SM-BPO74QJMTFEAK6H0, GA-9IPGPJB7E91703AW". Dave sends a temporary ID that enables him to be discovered. If Alice and Bob are close to each other, their UEs receive a beacon from the other UE. Since Alice's unknown temporary ID is an ID for social media, the ProSe of the Facebook application running on Bob's UE can send a request message at 203 requesting the resolution of Alice's temporary ID. In some examples, security can be in place (e.g., digital signature) to ensure that the request is sent by the user and application authorized by the operator. In some examples, the request may also include a resolution number (e.g., 3456). At 204, Alice's UE may receive the request. In some examples, Alice can use her UE to resolve her temporary ID without knowing who made the request. In some examples, at 205, Alice may attempt to confirm the requester before resolving or rejecting the resolution request. This confirmation method may include, but is not limited to, sending a text message asking who is at or near her location, looking around and trying to confirm someone she may know, such as her friend Bob, and then verifying that he sent the request including the resolution number. If asked (whether online or offline), Bob may confirm that he sent the request with the resolution number. In some examples, Alice may authorize the resolution. At 206, Alice's UE may resolve her temporary ID, and at 207, Alice's UE may send her permanent ID to Bob's UE. In some examples, Alice's permanent ID may be sent using D2D communication. In some examples, the permanent ID information may be protected, such as by encryption, so that Alice's permanent ID is kept secret except to applications running on Bob's UE.
在某些示例中,如果在Bob的UE上运行的社交媒体应用被Alice的UE发现,则类似的授权方法可发生。在某些示例中,在Bob和Alice对彼此的社交媒体应用交叉授权之后,Bob的永久ID与临时ID之间的分配可存储在Alice的UE中。同样,Alice的永久ID与临时ID之间的分配可存储在Bob的UE中,诸如在208处。只要临时ID保持相同,Bob和Alice就可以发现彼此。如此,将来无论Bob的UE何时在附近,Alice的Facebook应用都可以提示她,并且反之亦然。In some examples, a similar authorization method can occur if a social media application running on Bob's UE is discovered by Alice's UE. In some examples, after Bob and Alice cross-authorize each other's social media applications, the assignment between Bob's permanent ID and the temporary ID can be stored in Alice's UE. Similarly, the assignment between Alice's permanent ID and the temporary ID can be stored in Bob's UE, such as at 208. As long as the temporary ID remains the same, Bob and Alice can discover each other. In this way, whenever Bob's UE is nearby in the future, Alice's Facebook application can alert her, and vice versa.
图3一般性地示出在采用邻近服务的同时提供隐私的方法300,其中邻近服务由网络资源或元件辅助。在301处,网络可将包括临时ID的临时ID分配给Alice的UE和Bob的UE。在302处,Alice的UE可广播包括她的社交媒体临时ID的发现信息。在303处,Bob的UE可广播包括他的社交媒体临时ID的发现信息。在304处,Bob的UE可请求从网络资源或实体解析Alice的临时ID。在305处,网络可检查Bob的UE是否被授权解析Alice的临时ID。为响应先前的请求,或者由于Bob或他的临时ID在Alice提供给网络的列表上,该列表可允许网络提供Alice的临时ID的自动解析以响应来自Bob的UE的请求,Alice可在之前对网络授权以便为Bob解析她的临时ID。在306处,如果Bob是应用的已授权用户,并且Alice已授权Bob发现她,则网络可将Alice的永久ID发送给Bob的UE。如果Bob不是应用的已授权用户,则网络可拒绝Bob的解析请求。在某些示例中,如果Bob未被Alice授权以解析Alice的临时ID,则Alice可让网络拒绝Bob的解析请求。在一些示例中,如果Bob未被Alice授权以解析Alice的临时ID,则Alice可在线询问,诸如通过电子邮件或文本消息,或离线询问,诸如通过在周围查找以获知Bob的身份,并且然后授权网络以解析她的临时ID或拒绝Bob的解析请求。Figure 3 generally illustrates a method 300 for providing privacy while employing proximity-based services, where proximity-based services are facilitated by network resources or elements. At 301, the network may assign temporary IDs, including temporary IDs, to Alice's UE and Bob's UE. At 302, Alice's UE may broadcast discovery information including her temporary social media ID. At 303, Bob's UE may broadcast discovery information including his temporary social media ID. At 304, Bob's UE may request resolution of Alice's temporary ID from a network resource or entity. At 305, the network may check whether Bob's UE is authorized to resolve Alice's temporary ID. Alice may have previously authorized the network to resolve her temporary ID for Bob, either in response to a previous request or because Bob or his temporary ID is on a list provided by Alice to the network that allows the network to automatically resolve Alice's temporary ID in response to a request from Bob's UE. At 306, if Bob is an authorized user of the application and Alice has authorized Bob to discover her, the network may send Alice's permanent ID to Bob's UE. If Bob is not an authorized user of the application, the network can deny Bob's resolution request. In some examples, if Bob is not authorized by Alice to resolve Alice's temporary ID, Alice can have the network deny Bob's resolution request. In some examples, if Bob is not authorized by Alice to resolve Alice's temporary ID, Alice can inquire online, such as via email or text message, or offline, such as by looking around, to learn Bob's identity, and then authorize the network to resolve her temporary ID or deny Bob's resolution request.
在307处,Alice的UE可发送请求以解析Bob的临时社交媒体ID。在308处,网络可检查Alice的UE是否被授权解析Bob的社交媒体临时ID。在某些示例中,如果网络不能发现对Alice的请求的授权,则网络可拒绝该请求,或者网络可经由Bob的UE提示Bob接受或拒绝该请求。在309处,一旦被授权,如果尚未授权,网络可将Bob的永久ID发送给Alice的UE。At 307, Alice's UE may send a request to resolve Bob's temporary social media ID. At 308, the network may check whether Alice's UE is authorized to resolve Bob's temporary social media ID. In some examples, if the network cannot find authorization for Alice's request, the network may deny the request, or the network may prompt Bob via Bob's UE to accept or deny the request. At 309, once authorized, the network may send Bob's permanent ID to Alice's UE, if not already authorized.
图4一般性地示出在采用邻近服务的同时提供隐私的方法400,其中邻近服务由网络资源或元件辅助。在某些示例中,网络可分配临时ID并且可执行临时ID与永久ID之间的解析。在某些示例中,该隐私功能性可通过被称作ProSe-服务器(ProSe-Sever)的新网络资源或实体提供。在一些示例中,隐私功能性可在现有网络元件或资源中被实施为逻辑实体。在401处,网络可对Alice的UE和Dave的UE分配临时ID。在402处,当UE接近彼此时,Alice可授权网络以便为Dave的UE解析她的临时ID。在某些示例中,在403处,所述授权可存储在网络资源或实体上。在404处,Alice和Dave分手,并且在405处,Alice可撤销她对Dave发现她的接近的授权。在406处,在某些示例中,授权可被从网络删除。在407处,为响应授权的撤销,可通过网络改变或替换Alice的临时ID。在408处,如果Dave的UE接收新的未知临时ID,他不能解析该临时ID也不能认出Alice。在409处,Dave的UE可传输请求以解析临时ID。在410处,网络可检查授权,并且由于不存在授权,则在411处网络可拒绝请求。在一些示例中,网络可对Alice的UE提供指示对她临时ID解析的请求的通知,并且允许Alice决定是否要授权解析或拒绝请求。FIG4 generally illustrates a method 400 for providing privacy while employing proximity services, where proximity services are facilitated by network resources or elements. In some examples, the network may assign a temporary ID and perform resolution between the temporary ID and a permanent ID. In some examples, this privacy functionality may be provided by a new network resource or entity referred to as a ProSe server. In some examples, the privacy functionality may be implemented as a logical entity within existing network elements or resources. At 401, the network may assign temporary IDs to Alice's UE and Dave's UE. At 402, when the UEs are in proximity to each other, Alice may authorize the network to resolve her temporary ID for Dave's UE. In some examples, at 403, the authorization may be stored on the network resource or entity. At 404, Alice and Dave part ways, and at 405, Alice may revoke her authorization for Dave to discover her proximity. At 406, in some examples, the authorization may be deleted from the network. At 407, in response to the revocation of the authorization, Alice's temporary ID may be changed or replaced by the network. At 408, if Dave's UE receives a new, unknown temporary ID, he cannot resolve the temporary ID and cannot recognize Alice. At 409, Dave's UE may transmit a request to resolve the temporary ID. At 410, the network may check for authorization, and since authorization is not present, the network may deny the request at 411. In some examples, the network may provide a notification to Alice's UE indicating the request for her temporary ID resolution and allow Alice to decide whether to authorize the resolution or deny the request.
在某些示例中并且参考图3和图4,如果Bob的UE接收Alice的新临时ID或替代临时ID,那么从Bob的UE发送到Alice的UE的请求可被授权,因为来自Bob的UE的请求仍被Alice授权。在某些示例中,从Bob的UE到Alice的UE的请求可被解析,而无需Alice部分的互动。在一些示例中,Alice的新临时ID或替换临时ID可被发送给先前已授权的UE,使得可通过所述已授权UE识别Alice的发现信息。新临时ID可经由网络、经由D2D通信或经由网络通信与D2D通信的组合而被发送给已授权UE。In some examples, and with reference to Figures 3 and 4, if Bob's UE receives Alice's new or replacement temporary ID, then requests sent from Bob's UE to Alice's UE can be authorized because the requests from Bob's UE are still authorized by Alice. In some examples, requests from Bob's UE to Alice's UE can be resolved without interaction on Alice's part. In some examples, Alice's new or replacement temporary ID can be sent to previously authorized UEs so that Alice's discovery information can be identified by the authorized UEs. The new temporary ID can be sent to the authorized UEs via the network, via D2D communication, or via a combination of network and D2D communication.
图5是示出可在其上执行本文所述的任何一种或多种技术(例如,方法)的示例性移动设备500的框图。移动设备500可包括处理器510。处理器510可为适用于移动设备的多种不同类型的可商购获得的处理器中的任一种,例如,XScale架构微处理器、无内部互锁流水级的微处理器(MIPS)架构处理器或另一种类型的处理器。处理器510通常可访问存储器520,诸如随机存取存储器(RAM)、闪存存储器或其他类型的存储器。存储器520可适于存储操作系统(OS)530以及应用程序540。OS 530或应用程序540可包括存储在计算机可读介质(例如,存储器520)上的可致使移动设备500的处理器510执行本文所述的任何一种或多种技术的指令。处理器510可直接或经由中间硬件耦合到显示器550或耦合到一或多个输入/输出(I/O)设备560,诸如键盘、触控板传感器、麦克风等。类似地,在示例性实施例中,处理器510可耦合到与天线590连接的收发器570。收发器570可经配置经由天线590传输并接收蜂窝网络信号、无线数据信号或其他类型的信息,这取决于移动设备500的性质。另外,在一些配置中,GPS接收器580也可利用天线590接收GPS信号。FIG5 is a block diagram illustrating an exemplary mobile device 500 on which any one or more of the techniques (e.g., methods) described herein may be performed. Mobile device 500 may include a processor 510. Processor 510 may be any of a variety of different types of commercially available processors suitable for mobile devices, such as an XScale architecture microprocessor, a microprocessor with no internal interlocked pipeline stages (MIPS) architecture processor, or another type of processor. Processor 510 generally has access to memory 520, such as random access memory (RAM), flash memory, or other types of memory. Memory 520 may be suitable for storing an operating system (OS) 530 and applications 540. OS 530 or applications 540 may include instructions stored on a computer-readable medium (e.g., memory 520) that cause processor 510 of mobile device 500 to perform any one or more of the techniques described herein. Processor 510 may be coupled directly or via intermediary hardware to a display 550 or to one or more input/output (I/O) devices 560, such as a keyboard, a touchpad sensor, a microphone, and the like. Similarly, in an exemplary embodiment, the processor 510 may be coupled to a transceiver 570 connected to an antenna 590. The transceiver 570 may be configured to transmit and receive cellular network signals, wireless data signals, or other types of information via the antenna 590, depending on the nature of the mobile device 500. Additionally, in some configurations, the GPS receiver 580 may also utilize the antenna 590 to receive GPS signals.
图6示出可在其上执行本文所述的任何一种或多种技术(例如,方法)的示例性机器600的框图。在另选的实施例中,机器600可作为独立式设备操作,或者可连接到(例如,联网到)其他机器。在联网部署中,机器600可以服务器、客户机的能力操作,或者同时在服务器-客户端网络环境中操作。在示例中,机器600可在对等(P2P)(或其他分布式)网络环境中充当对等机。机器600可为个人计算机(PC)、平板PC、个人数字助理(PDA)、移动电话、网络设备或能够执行指定该机器应采取的操作的指令(按顺序或其他)的任何机器。另外,虽然只示出单个机器,但术语“机器”也应被认为是包括单独或联合执行一组(或多组)指令以执行本文所述的任何一种或多种方法(诸如云计算)、软件即服务或其他计算机集群配置的机器的任何集合。6 shows a block diagram of an exemplary machine 600 on which any one or more of the techniques (e.g., methods) described herein may be performed. In alternative embodiments, the machine 600 may operate as a standalone device or may be connected (e.g., networked) to other machines. In a networked deployment, the machine 600 may operate in the capacity of a server, a client, or both in a server-client network environment. In an example, the machine 600 may act as a peer in a peer-to-peer (P2P) (or other distributed) network environment. The machine 600 may be a personal computer (PC), a tablet PC, a personal digital assistant (PDA), a mobile phone, a network appliance, or any machine capable of executing instructions (sequentially or otherwise) specifying the actions that the machine should take. Further, while a single machine is shown, the term "machine" shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methods described herein (such as cloud computing), software as a service, or other computer cluster configurations.
如本文所述的示例可包括或者可在逻辑或许多部件、模块或机制上操作。模块是能够执行指定操作的有形实体,并且可以特定方式进行配置或布置。在示例中,可以指定方式将电路作为模块来布置(例如,在内部或者相对于外部实体,诸如其他电路)。在示例中,一或多个计算机系统(例如,单机、客户端或服务器计算机系统)或者一或多个硬件处理器中的全部或部分可通过固件或软件(例如,指令、应用部分或应用)被配置为操作以执行指定操作的模块。在示例中,软件可驻留(1)在非暂时性计算机可读介质上或(2)在传输信号中。在示例中,软件在通过模块的底层硬件执行时致使硬件执行指定操作。Examples as described herein may include or may operate on logic or a number of components, modules, or mechanisms. A module is a tangible entity that is capable of performing a specified operation and may be configured or arranged in a particular manner. In an example, a circuit may be arranged as a module in a specified manner (e.g., internally or relative to an external entity, such as another circuit). In an example, all or part of one or more computer systems (e.g., a stand-alone, client, or server computer system) or one or more hardware processors may be configured as a module that operates to perform a specified operation via firmware or software (e.g., instructions, application portions, or applications). In an example, the software may reside (1) on a non-transitory computer-readable medium or (2) in a transmission signal. In an example, the software, when executed by the underlying hardware of the module, causes the hardware to perform the specified operation.
因此,术语“模块”被理解为涵盖有形实体,是以物理方式构造且被具体配置(例如,硬连线)或临时(例如,短暂地)配置成(例如,被编程)以指定方式操作或者执行本文所述操作的部分或全部的实体。当考虑其中模块为临时配置的示例时,不需要在任何时刻实例化所述模块中的每个。例如,当模块包括使用软件配置的通用硬件处理器时,该通用硬件处理器可在不同时间被配置为相应不同模块。软件可相应地配置硬件处理器,例如,以构成一个时间实例的特定模块并且以构造不同时间实例的不同模块。Thus, the term "module" is understood to encompass a tangible entity that is physically constructed and specifically configured (e.g., hardwired) or temporarily (e.g., transiently) configured (e.g., programmed) to operate in a specified manner or to perform some or all of the operations described herein. When considering examples where a module is temporarily configured, it is not necessary to instantiate each of the modules at any one time. For example, when a module comprises a general-purpose hardware processor configured using software, the general-purpose hardware processor can be configured as correspondingly different modules at different times. The software can configure the hardware processor accordingly, for example, to constitute a particular module at one instance in time and to constitute a different module at a different instance in time.
机器(例如,计算机系统)600可包括硬件处理器602(例如,处理单元、图形处理单元(GPU)、硬件处理器内核或它们的任意组合)、主存储器604和静态存储器606,上述中的一些或全部可经由链路608(例如,总线、链路、互连等)彼此通信。机器600还可包括显示设备610、输入设备612(例如,键盘)和用户界面(UI)导航设备614(例如,鼠标)。在示例中,显示设备610、输入设备诶612和UI导航设备614可为触控屏显示器。机器600可另外包括大容量存储器(例如,驱动单元)616、信号生成设备618(例如,扬声器)、网络接口设备620和一或多个传感器621,诸如全球定位系统(GPS)传感器、相机、录像机、指南针、加速计或其他传感器。机器600可包括输出控制器628,诸如串行(例如,通用串行总线(USB),并行或其他有线或无线(例如,红外(IR)))连接,以传输或控制一或多个外设(例如,打印机、读卡器等)。Machine (e.g., computer system) 600 may include a hardware processor 602 (e.g., a processing unit, a graphics processing unit (GPU), a hardware processor core, or any combination thereof), main memory 604, and static memory 606, some or all of which may communicate with each other via a link 608 (e.g., a bus, a link, an interconnect, etc.). Machine 600 may also include a display device 610, an input device 612 (e.g., a keyboard), and a user interface (UI) navigation device 614 (e.g., a mouse). In an example, display device 610, input device 612, and UI navigation device 614 may be a touchscreen display. Machine 600 may also include mass storage (e.g., a drive unit) 616, a signal generating device 618 (e.g., a speaker), a network interface device 620, and one or more sensors 621, such as a global positioning system (GPS) sensor, a camera, a video recorder, a compass, an accelerometer, or other sensors. The machine 600 may include an output controller 628, such as a serial (e.g., Universal Serial Bus (USB), parallel or other wired or wireless (e.g., infrared (IR))) connection to transmit or control one or more peripheral devices (e.g., printer, card reader, etc.).
大容量存储器616可包括机器可读介质622,其上存储有具体实施或供本文所述任何一种或多种技术使用的一或多组数据结构或指令624(例如,软件)。在通过机器600执行指令624的期间,指令624也可驻留(完全或至少部分)在主存储器604内、在静态存储器606内或在硬件处理器602内。在示例中,硬件处理器602、主存储器604、静态存储器606或大容量存储器616中的一个或它们的任何组合可构成机器可读介质。The mass storage 616 may include a machine-readable medium 622 on which is stored one or more sets of data structures or instructions 624 (e.g., software) embodying or used by any one or more of the techniques described herein. The instructions 624 may also reside (completely or at least partially) within the main memory 604, within the static storage 606, or within the hardware processor 602 during execution of the instructions 624 by the machine 600. In an example, one or any combination of the hardware processor 602, the main memory 604, the static storage 606, or the mass storage 616 may constitute a machine-readable medium.
虽然机器可读介质622被示为单个介质,但术语“机器可读介质”可包括被配置成存储一或多个指令624的单个介质或多个介质(例如,集中式或分布式数据库,和/或相关联的高速缓存或服务器)。Although the machine-readable medium 622 is illustrated as a single medium, the term “machine-readable medium” may include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches or servers) configured to store one or more instructions 624.
术语“机器可读介质”可包括能够存储、编码或实施通过机器600执行的指令并且致使机器600执行本公开的任何一种或多种技术的任何有形介质,或能够存储、编码或实施供此类指令使用或与此类指令相关联的数据结构的任何有形介质。非限制性的机器可读介质示例可包括固态存储器以及光和磁介质。机器可读介质的具体示例可包括:非易失性存储器,诸如半导体存储器设备(例如,电可编程只读存储器(EPROM)、电可擦除可编程只读存储器(EEPROM))和闪存设备;磁盘,诸如内部硬盘和可移动盘;磁光盘;以及CD-ROM和DVD-ROM盘。The term "machine-readable medium" may include any tangible medium that can store, encode, or embody instructions for execution by the machine 600 and cause the machine 600 to perform any one or more of the techniques of this disclosure, or any tangible medium that can store, encode, or embody data structures for use with or associated with such instructions. Non-limiting examples of machine-readable media may include solid-state memory and optical and magnetic media. Specific examples of machine-readable media may include: non-volatile memory, such as semiconductor memory devices (e.g., electrically programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM)) and flash memory devices; magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
指令624还可通过通信网络626使用传输介质经由网络接口设备620使用许多传输协议(例如,帧中继、因特网协议(IP)、传输控制协议(TCP)、用户数据报协议(UDP)、超文本传输协议(HTTP)等)中的任一种传输协议来传输或接收。术语“传输介质”应被认为是包括能够存储、编码或实施通过机器600执行的指令并包括数字或模拟通信信号的任何无形介质或其他无形介质,以促进该软件的通信。The instructions 624 may also be transmitted or received via the network interface device 620 using a transmission medium over the communication network 626 using any of a number of transmission protocols (e.g., Frame Relay, Internet Protocol (IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Hypertext Transfer Protocol (HTTP), etc.). The term "transmission medium" shall be taken to include any intangible medium that can store, encode, or embody the instructions to be executed by the machine 600 and includes digital or analog communication signals or other intangible media to facilitate communication of the software.
实施例可在硬件、固件和软件中的一个或它们的组合中实施。实施例也可实施为存储在计算机可读存储设备上的指令,该指令可通过至少一个处理器读取或执行以执行本文所述操作。计算机可读存储设备可包括用于以机器(例如,计算机)可读的形式来存储信息的任何非暂时性机制。例如,计算机可读存储设备可包括只读存储器(ROM)、随机存取存储器(RAM)、磁盘存储介质、光存储介质、闪存设备以及其他存储设备和介质。Embodiments may be implemented in one or a combination of hardware, firmware, and software. Embodiments may also be implemented as instructions stored on a computer-readable storage device, which may be read or executed by at least one processor to perform the operations described herein. A computer-readable storage device may include any non-transitory mechanism for storing information in a form readable by a machine (e.g., a computer). For example, a computer-readable storage device may include read-only memory (ROM), random access memory (RAM), magnetic disk storage media, optical storage media, flash memory devices, and other storage devices and media.
图7示出根据一些实施例的示例性机器700(例如,UE)的功能性框图。UE 700可包括物理层电路702,该物理层电路702用于使用一或多个天线701而向并从eNB传输并接收信号。UE 700还可包括处理电路706,其可包括频道估算器。UE 700还可包括存储器708。处理电路可经配置确定在下面论述的若干不同反馈值以便传输到eNB。处理电路还可包括媒体访问控制(MAC)层704。FIG7 illustrates a functional block diagram of an exemplary machine 700 (e.g., a UE) in accordance with some embodiments. UE 700 may include physical layer circuitry 702 for transmitting and receiving signals to and from an eNB using one or more antennas 701. UE 700 may also include processing circuitry 706, which may include a channel estimator. UE 700 may also include memory 708. The processing circuitry may be configured to determine several different feedback values, discussed below, for transmission to the eNB. The processing circuitry may also include a medium access control (MAC) layer 704.
在一些实施例中,UE 700可包括键盘、显示器、非易失性存储器端口、多个天线、图形处理器、应用处理器、扬声器和其他移动设备元件中的一或多个。所述显示器可为LCD屏,包括触控屏。In some embodiments, the UE 700 may include one or more of a keyboard, a display, a non-volatile memory port, multiple antennas, a graphics processor, an application processor, a speaker, and other mobile device components. The display may be an LCD screen, including a touch screen.
被UE 700使用的所述一或多个天线701可包括一或多个双向或全向天线,包括例如双极天线、单级天线、贴片天线、环形天线、微带天线或适用于传输RF信号的其他类型的天线。在一些实施例中,可使用具有多个孔径的单个天线,而不是两个或更多个天线。在这些实施例中,每个孔径可被视为单独的天线。在一些多输入多输出(MIMO)实施例中,天线可以被有效地分开,以利用可在每个天线和发射站的天线之间产生的空间多样性和不同的频道特性。在一些MIMO实施例中,天线可以最高至波长的1/10或更大的距离隔开。The one or more antennas 701 used by the UE 700 may include one or more bidirectional or omnidirectional antennas, including, for example, dipole antennas, monopole antennas, patch antennas, loop antennas, microstrip antennas, or other types of antennas suitable for transmitting RF signals. In some embodiments, a single antenna with multiple apertures may be used instead of two or more antennas. In these embodiments, each aperture may be considered a separate antenna. In some multiple-input multiple-output (MIMO) embodiments, the antennas may be effectively separated to take advantage of the spatial diversity and different channel characteristics that can be generated between each antenna and the antennas of the transmitting station. In some MIMO embodiments, the antennas may be separated by distances of up to 1/10 of a wavelength or more.
虽然UE 700被示为具有若干独立的功能性元件,但所述功能性元件中的一或多个可组合并且可通过软件配置元件(诸如包括数字信号处理器(DSP)的处理元件)和/或其他硬件元件的组合来实施。例如,一些元件可包括一或多个微处理器、DSP、专用集成电路(ASIC)、射频集成电路(RFIC)以及用于执行至少本文所述功能的各种硬件和逻辑电路的组合。在一些实施例中,所述功能性元件可指在一或多个处理元件上操作的一或多个过程。Although UE 700 is shown as having several independent functional elements, one or more of the functional elements may be combined and may be implemented by a combination of software-configured elements (such as processing elements including digital signal processors (DSPs)) and/or other hardware elements. For example, some elements may include one or more microprocessors, DSPs, application-specific integrated circuits (ASICs), radio-frequency integrated circuits (RFICs), and combinations of various hardware and logic circuits for performing at least the functions described herein. In some embodiments, the functional elements may refer to one or more processes operating on one or more processing elements.
实施例可在硬件、固件和软件中的一个或它们的组合中实施。实施例可也实施为存储在计算机可读存储介质上的指令,其可被至少一个处理器读取并执行以执行本文所述操作。计算机可读存储介质可包括用于以机器(例如,计算机)可读的形式来存储信息的任何非暂时性机制。例如,计算机可读存储介质可包括只读存储器(ROM)、随机存取存储器(RAM)、磁盘存储介质、光存储介质、闪存设备以及其他存储设备和介质。在这些实施例中,UE 700的一或多个处理器可通过指令来配置以执行本文所述操作。Embodiments may be implemented in one or a combination of hardware, firmware, and software. Embodiments may also be implemented as instructions stored on a computer-readable storage medium, which can be read and executed by at least one processor to perform the operations described herein. A computer-readable storage medium may include any non-transitory mechanism for storing information in a machine (e.g., computer) readable form. For example, a computer-readable storage medium may include a read-only memory (ROM), a random access memory (RAM), a magnetic disk storage medium, an optical storage medium, a flash memory device, and other storage devices and media. In these embodiments, one or more processors of the UE 700 may be configured by the instructions to perform the operations described herein.
在一些实施例中,UE 700可经配置根据OFDMA通信技术通过多载波通信信道来接收OFDM通信信号。所述OFDM信号可包括多个正交子载波。在一些宽带多载波实施例中,eNB(包括宏eNB和微微eNB)可为宽带无线接入(BWA)网络通信网(诸如,全球微波互连接入(WIMAX)通信网络或第三代合作伙伴计划(3GPP)通用陆地无线电接入网络(UTRAN)长期演进(LTE)或长期演进(LTE)通信网络)的一部分,但本文所述的发明主题的范围并不限制于该方面。在这些宽带多载波实施例中,UE 700和eNB可经配置根据正交频分多址(OFDMA)技术进行通信。所述UTRAN LTE标准包括用于UTRAN LTE的第三代合作伙伴计划(3GPP)标准,版本8,2008年3月,以及版本10,2010年12月,包括它们的变型和演进。In some embodiments, UE 700 may be configured to receive OFDM communication signals over a multi-carrier communication channel in accordance with OFDMA communication techniques. The OFDM signals may include multiple orthogonal subcarriers. In some broadband multi-carrier embodiments, the eNB (including macro eNBs and pico eNBs) may be part of a broadband wireless access (BWA) network communication network (such as a Worldwide Interoperability for Microwave Access (WIMAX) communication network or a Third Generation Partnership Project (3GPP) Universal Terrestrial Radio Access Network (UTRAN) Long Term Evolution (LTE) or LTE communication network), although the scope of the subject matter described herein is not limited in this respect. In these broadband multi-carrier embodiments, UE 700 and the eNB may be configured to communicate in accordance with Orthogonal Frequency Division Multiple Access (OFDMA) techniques. The UTRAN LTE standards include the Third Generation Partnership Project (3GPP) standards for UTRAN LTE, Release 8, March 2008, and Release 10, December 2010, including variations and evolutions thereof.
在一些LTE实施例中,无线资源的基本单位是物理资源块(PRB)。PRB可包括频域上12个子载波x时域上0.5ms。PRB可被成对分配(在时域中)。在这些实施例中,PRB可包括多个资源元件(RE)。RE可包括一个子载波x一个符号。In some LTE embodiments, the basic unit of radio resources is a physical resource block (PRB). A PRB may include 12 subcarriers in the frequency domain x 0.5 ms in the time domain. PRBs may be allocated in pairs (in the time domain). In these embodiments, a PRB may include multiple resource elements (REs). An RE may include one subcarrier x one symbol.
两种类型的参考信号可通过eNB传输,包括解调参考信号(DM-RS)、信道状态信息参考信号(CIS-RS)和/或共同参考信号(CRS)。DM-RS可被UE用于数据解调。参考信号可在预定的PRB中传输。Two types of reference signals can be transmitted by the eNB: the demodulation reference signal (DM-RS), the channel state information reference signal (CIS-RS), and/or the common reference signal (CRS). The DM-RS can be used by the UE for data demodulation. The reference signals can be transmitted in predetermined PRBs.
在一些实施例中,OFDMA技术可为使用不同的上行和下行频谱的频域双工(FDD)技术,或为使用相同的上行和下行频谱的时域双工(TDD)技术。In some embodiments, the OFDMA technology may be a frequency domain duplexing (FDD) technology using different uplink and downlink frequency spectra, or a time domain duplexing (TDD) technology using the same uplink and downlink frequency spectra.
在一些其他实施例中,UE 700和eNB可经配置传输信号,所述信号是使用一种或多种其他调制技术传输的,所述其他调制技术为诸如扩频调制(例如,直接序列码分多址(DS-CDMA)和/或调频码分多址(FH-CDMA)、时分多路复用(TDM)调制、和/或频分多路复用(FDM)调制),但所述实施例的范围并不限于该方面。In some other embodiments, UE 700 and eNB may be configured to transmit signals that are transmitted using one or more other modulation techniques, such as spread spectrum modulation (e.g., direct sequence code division multiple access (DS-CDMA) and/or frequency modulation code division multiple access (FH-CDMA), time division multiplexing (TDM) modulation, and/or frequency division multiplexing (FDM) modulation), but the scope of the embodiments is not limited in this respect.
在一些实施例中,UE 700可为便携式无线通信设备的一部分,所述便携式无线通信设备为诸如PDA、具有无线通信能力的膝上型或便携式计算机、网络本、无线电话、无线耳机、寻呼机、即时消息收发设备、数字相机、接入点、电视、医疗设备(例如,心律监视器、血压监视器等)或可以无线方式接收和/或传输信息的其他设备。In some embodiments, UE 700 may be part of a portable wireless communication device, such as a PDA, a laptop or portable computer with wireless communication capabilities, a netbook, a wireless telephone, a wireless headset, a pager, an instant messaging device, a digital camera, an access point, a television, a medical device (e.g., a heart rhythm monitor, a blood pressure monitor, etc.), or other device that can receive and/or transmit information wirelessly.
在一些LTE实施例中,UE 700可计算若干不同的反馈值,这些反馈值可用于执行闭环空间复用传输模式下的信道适配。这些反馈值可包括信道质量指示符(CQI),秩指示符(RI)和预编码矩阵指示符(PMI)。通过CQI,发射器选择若干调制字母和码率组合中的一个。RI通知发射器当前MIMO信道的可用传输层的数量,并且PMI指示在发射器处应用的预编码矩阵(取决于发射天线的数量)的码本索引。由eNB使用的码率可基于CQI。PMI可为由UE计算并报告给eNB的矢量。在一些实施例中,UE可传输包含CQI/PMI或RI的格式2、2a或2b的物理上行控制信道(PUCCH)。In some LTE embodiments, the UE 700 may calculate several different feedback values that can be used to perform channel adaptation in a closed-loop spatial multiplexing transmission mode. These feedback values may include a channel quality indicator (CQI), a rank indicator (RI), and a precoding matrix indicator (PMI). Using the CQI, the transmitter selects one of several modulation alphabet and code rate combinations. The RI informs the transmitter of the number of available transmission layers for the current MIMO channel, and the PMI indicates the codebook index of the precoding matrix (depending on the number of transmit antennas) applied at the transmitter. The code rate used by the eNB may be based on the CQI. The PMI may be a vector calculated by the UE and reported to the eNB. In some embodiments, the UE may transmit a physical uplink control channel (PUCCH) of format 2, 2a, or 2b containing the CQI/PMI or RI.
在这些实施例中,CQI可为如UE 700经历的下行移动无线电信道质量的指示。CQI允许UE 700对eNB建议最佳调制方案和编码率以用于给定的无线电链路质量,使得所得的传输块错误率将不超过特定值,诸如10%。在一些实施例中,UE可报告宽频带CQI值,其指系统带宽的信道质量。UE还可报告可通过更高层配置的特定数量的资源块的每个子频带的子频带CQI值。整组子频带可覆盖系统带宽。就空间复用而言,可报告每码字的CQI。In these embodiments, the CQI may be an indication of the downlink mobile radio channel quality as experienced by UE 700. The CQI allows UE 700 to recommend to the eNB the optimal modulation scheme and coding rate to use for a given radio link quality, such that the resulting transport block error rate does not exceed a specified value, such as 10%. In some embodiments, the UE may report a wideband CQI value, which refers to the channel quality across the system bandwidth. The UE may also report a subband CQI value for each subband of a specific number of resource blocks, which may be configured by higher layers. The entire set of subbands may cover the system bandwidth. In the case of spatial multiplexing, a CQI may be reported per codeword.
在一些实施例中,PMI可指示将被eNB针对给定无线电条件使用的最佳预编码矩阵。PMI值指的是码本表。网络对由PMI报告表示的资源块的数量进行配置。在一些实施例中,为覆盖系统带宽,可提供多个PMI报告。也可提供PMI报告用于闭环空间复用、多用户MIMO和闭环秩1预编码MIMO模式。In some embodiments, the PMI may indicate the optimal precoding matrix to be used by the eNB for given radio conditions. The PMI value refers to the codebook table. The network configures the number of resource blocks represented by the PMI report. In some embodiments, multiple PMI reports may be provided to cover the system bandwidth. PMI reports may also be provided for closed-loop spatial multiplexing, multi-user MIMO, and closed-loop rank-1 precoding MIMO modes.
在一些协作多点(CoMP)实施例中,网络可被配置用于联合传输到UE,其中两个或更多个协作/协调点(诸如远端射频模组(RRH))联合地传输。在这些实施例中,联合传输可为MIMO传输,并且协作点被配置成执行联合波束形成。In some coordinated multi-point (CoMP) embodiments, the network can be configured for joint transmission to a UE, where two or more coordinating/coordinating points, such as remote radio heads (RRHs), transmit jointly. In these embodiments, the joint transmission can be a MIMO transmission, and the coordinating points are configured to perform joint beamforming.
本文所述的示例性实施例可通过所有类型的无线网络接入提供商使用,所述提供商包括但不限于希望增大手机卸载比率以避免成本并增大性能的移动宽带提供商、希望扩展他们在顾客住宅或企业之外的覆盖足迹的固定宽带提供商、希望经由接入消费者或场地拥有者而将接入网络货币化的无线网络接入提供商、希望通过无线网络提供无线网络(例如,因特网)接入或数字服务(例如,位置服务、广告、娱乐等)的公共场地、以及期望简化来客因特网接入或使用个人设备办公(BYOD)接入的教育或非盈利企业。The exemplary embodiments described herein may be used by all types of wireless network access providers, including but not limited to mobile broadband providers that wish to increase handset offload rates to avoid costs and increase performance, fixed broadband providers that wish to expand their coverage footprint beyond customer homes or businesses, wireless network access providers that wish to monetize access networks via access consumers or venue owners, public venues that wish to provide wireless network (e.g., Internet) access or digital services (e.g., location services, advertising, entertainment, etc.) over a wireless network, and educational or non-profit businesses that wish to simplify Internet access or bring-your-own-device (BYOD) access for their guests.
补充注释Supplementary Notes
上面的具体实施方式包括对附图的参考,附图构成具体实施方式的一部分。附图以例证的方式示出可在其中实践本发明的具体实施例。这些实施例在本文中也被称作“示例”。本文中提及的所有出版物、专利和专利文件以全文引用的方式纳入本说明书,如同逐一通过引证的方式纳入一般。如果本说明书与引证纳入的文件之间有不一致的用法,引证纳入的文件中的用法应被理解为对本说明书中用法的补充;如果出现矛盾的情况,应以本说明书中的用法为准。The above detailed description includes references to the accompanying drawings, which form a part of the detailed description. The accompanying drawings show, by way of illustration, specific embodiments in which the invention may be practiced. These embodiments are also referred to herein as "examples." All publications, patents, and patent documents mentioned herein are incorporated by reference in their entirety into this specification, as if individually incorporated by reference. If there is a discrepancy between the usages of this specification and the documents incorporated by reference, the usages in the documents incorporated by reference shall be understood to supplement the usages in this specification; in the event of a conflict, the usages in this specification shall prevail.
像通常专利文件中一样,本文中术语“一”或“一个”用于包括一个或多于一个,独立于任何其他实例或“至少一个”或“一或多个”的使用。在本文中,术语“或”用于指示非排他性的,使得“A或B”包括“A而不是B”、“B而不是A”和“A和B”,除非另外指明。在所附权利要求中,术语“包括”和“其中”被用作相应术语“包括”和“其中”的纯英语等价物。另外,在下面的权利要求中,术语“包括”和“包括了”是开放性的,即,包括除权利要求中在该术语之后所列出的那些元素之外的元素的系统、设备、物品或方法仍被认为是落入该权利要求的范围之内。另外,在下面的权利要求中,术语“第一”、“第二”和“第三”等仅仅用于标记,而非旨在对它们的对象强加数值要求。As is common in patent documents, the terms "a" or "an" are used herein to include one or more than one, independent of any other instance or use of "at least one" or "one or more." The term "or" is used herein to indicate non-exclusivity, such that "A or B" includes "A but not B," "B but not A," and "A and B," unless otherwise indicated. In the appended claims, the terms "include" and "in which" are used as the plain English equivalents of the respective terms "including" and "in which." In addition, in the claims that follow, the terms "include" and "comprising" are open-ended, that is, systems, devices, articles, or methods that include elements other than those listed after the term in the claim are still considered to fall within the scope of the claim. In addition, in the claims that follow, the terms "first," "second," and "third," etc., are used merely as labels and are not intended to impose numerical requirements on their objects.
上述说明是例示性的而非限制性的。例如,上述示例(或其一或多个方面)可彼此组合使用。可使用其他实施例,诸如通过本领域普通技术人员在回顾上述说明之后使用。另外,在上述具体实施方式中,为旨在未要求的公开特征对于任何权利要求都是必须的。相反,发明主题可存在于比所公开的具体实施例的全部特征少的状态。因此,下面的权利要求据此引入到具体实施方式中,其中每条权利要求独立地代表单独的实施例。本发明的范围应参考所附权利要求以及这些权利要求所提供的等同物的全部范围来确定。The above description is illustrative and non-restrictive. For example, the above examples (or one or more aspects thereof) may be used in combination with each other. Other embodiments may be used, such as by one of ordinary skill in the art after reviewing the above description. In addition, in the above detailed description, disclosed features that are not intended to be required are essential to any claim. On the contrary, the subject matter of the invention may exist in a state with fewer than all the features of the disclosed specific embodiments. Therefore, the following claims are hereby introduced into the detailed description, wherein each claim independently represents a separate embodiment. The scope of the invention should be determined with reference to the appended claims and the full scope of equivalents provided by these claims.
| Application Number | Priority Date | Filing Date | Title | 
|---|---|---|---|
| US201361829968P | 2013-05-31 | 2013-05-31 | |
| US61/829,968 | 2013-05-31 | ||
| US14/141,843US9559761B2 (en) | 2013-05-31 | 2013-12-27 | Proximity-based services discovery privacy | 
| US14/141,843 | 2013-12-27 | ||
| PCT/US2014/039313WO2014193749A1 (en) | 2013-05-31 | 2014-05-23 | Proximity-based services discovery privacy | 
| Publication Number | Publication Date | 
|---|---|
| HK1217857A1 HK1217857A1 (en) | 2017-01-20 | 
| HK1217857Btrue HK1217857B (en) | 2020-03-13 | 
| Publication | Publication Date | Title | 
|---|---|---|
| EP3005758B1 (en) | Proximity-based services discovery privacy | |
| US9883388B2 (en) | Ephemeral identity for device and service discovery | |
| TWI596973B (en) | Identifiers for proximity services | |
| US11251968B2 (en) | Network access privacy | |
| US9288756B2 (en) | Systems and methods for device-to-device communication in the absence of network coverage | |
| US9510194B2 (en) | Open and encrypted wireless network access | |
| KR101836434B1 (en) | Secure wireless location interface protocol | |
| KR20230054421A (en) | Privacy of Repeater Selection in Cellular Sliced Networks | |
| US9294278B2 (en) | Method for wireless local area network (WLAN)-based peer to peer (P2P) communication and apparatus for same | |
| HK1217857B (en) | Proximity-based services discovery privacy | |
| US12445833B2 (en) | Privacy of relay selection in cellular sliced networks |