Method, terminal and network equipment for updating identification information

文档序号:53384 发布日期:2021-09-28 浏览:32次 中文

阅读说明:本技术 一种更新标识信息的方法、终端和网络设备 (Method, terminal and network equipment for updating identification information ) 是由 王文 康艳超 谢振华 于 2020-03-24 设计创作,主要内容包括:本发明实施例公开了一种更新标识信息的方法、终端和网络设备,用以避免PC5单播连接的发起端被跟踪和识别。所述方法包括:向第二终端发送第一终端的第二源层二标识,其中,所述第二源层二标识与直接链路建立请求消息所使用的第一源层二标识不同,能够避免PC5单播连接的发起端被跟踪和识别。(The embodiment of the invention discloses a method, a terminal and network equipment for updating identification information, which are used for preventing an initiating terminal of a PC5 unicast connection from being tracked and identified. The method comprises the following steps: sending the second source layer two identity of the first terminal to the second terminal, wherein the second source layer two identity is different from the first source layer two identity used by the direct link setup request message, can avoid the origin of the PC5 unicast connection from being tracked and identified.)

1. A method of updating identity information, the method being performed by a first terminal, the method comprising:

and sending a second source layer second identification of the first terminal to the second terminal, wherein the second source layer second identification is different from the first source layer second identification used by the direct link establishment request message.

2. The method of claim 1, wherein the second source layer two identity is carried in a direct link security mode complete message or a direct link authentication reply message, and after the sending the second source layer two identity to the second terminal, the method further comprises:

completing the PC5 unicast link establishment process based on the second source layer two identification.

3. The method of claim 2, wherein completing the PC5 unicast link establishment procedure based on the second source layer two identification comprises:

and receiving a direct link security mode command message or a direct link establishment acceptance message sent by the second terminal, wherein a destination layer two identifier used by the direct link security mode command message or the direct link establishment acceptance message is the second source layer two identifier.

4. The method of claim 3, wherein the second source layer two identifier is carried in the direct link security mode command message or a direct link setup accept message.

5. The method as claimed in claim 3, wherein an information element corresponding to the second source layer two id is added to the direct link security mode complete message or the direct link authentication reply message.

6. The method of claim 1, wherein after said sending the second source layer two identification to the second terminal, the method further comprises:

in the event that the received direct link security mode command message does not have the second source layer two identification as the destination layer two identification, the PC5 unicast link establishment procedure is terminated.

7. The method of claim 1, wherein after said sending the second source layer two identification to the second terminal, the method further comprises:

initiating a PC5 unicast link release process under the condition that the second source layer two identification is not taken as the destination layer two identification in the received direct link establishment receiving message;

or

And under the condition that the second source layer two identifier is not taken as the destination layer two identifier in the received direct link establishment receiving message, initiating a PC5 unicast link identifier updating process, and carrying the second source layer two identifier in a direct link identifier updating request message.

8. The method of claim 7, wherein the direct link release request message carries a cause value for release, wherein the cause value for release indicates a reason for: the identification is not updated.

9. The method of claim 1, wherein said sending a second source layer two identification to a second terminal comprises:

after the establishment of the unicast link of the PC5 is completed, initiating an update process of the unicast link identifier of the PC5, and sending the second source layer second identifier carried in a direct link identifier update request message to the second terminal.

10. A method of updating identity information, the method being performed by a second terminal, the method comprising:

and receiving a second source layer second identifier of the first terminal, wherein the second source layer second identifier is different from the first source layer second identifier used by the direct link establishment request message.

11. The method of claim 10, wherein the second destination layer two identity is carried in a direct link security mode complete message or a direct link authentication reply message, and after the receiving of the second destination layer two identity of the first terminal sent by the first terminal, the method further comprises:

completing the PC5 unicast link establishment process based on the second source layer two identification.

12. The method of claim 11 wherein completing a PC5 unicast link establishment procedure based on the second source layer two identification comprises:

updating the destination layer two identifier stored in the unicast link text into the second source layer two identifier;

and sending a PC5 unicast link message according to the second source layer two identifier.

13. The method of claim 12, wherein sending a PC5 unicast link message based on the second source layer two identification comprises:

and taking the second source layer second identifier as a destination layer second identifier to send a direct link security mode command message or a direct link establishment acceptance message to the first terminal.

14. The method of claim 13, wherein the second source layer two identifier is carried in the direct link security mode command message or a direct link setup accept message.

15. The method as claimed in claim 13, wherein an information element corresponding to the second source layer two id is added to the direct link security mode complete message or the direct link authentication reply message.

16. The method of claim 10, wherein said receiving a second source layer two identification of the first terminal sent by the first terminal comprises:

and after the PC5 unicast link establishment process is completed, receiving the second source layer two identification sent by the first terminal.

17. The method of claim 16, wherein the second source layer two identity is carried in a direct link identity update request message.

18. A mobile terminal, comprising:

and the processing module is used for sending a second source layer second identifier of the first terminal to the second terminal, wherein the second source layer second identifier is different from the first source layer second identifier used by the direct link establishment request message.

19. A mobile terminal, comprising:

and the execution module is used for receiving a second source layer second identifier of the first terminal, which is sent by the first terminal, wherein the second source layer second identifier is different from the first source layer second identifier used by the direct link establishment request message.

20. A terminal, comprising: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method of updating identification information according to any one of claims 1 to 9; or implementing the steps of a method of updating identification information according to any of claims 10 to 17.

21. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the method of updating identification information according to any one of claims 1 to 9; or implementing the steps of a method of updating identification information according to any of claims 10 to 17.

Technical Field

The embodiment of the invention relates to the field of communication, in particular to a method, a terminal and network equipment for updating identification information.

Background

In the process of establishing the unicast connection of the PC5, the first terminal serving as an originating terminal sends a direct link establishment request message in a broadcast manner, where the direct link establishment request message carries a source layer two identifier (source L2ID) of the first terminal. And if the second terminal serving as the receiving end accepts the establishment of the communication link of the PC5, replying a direct link acceptance message to the first terminal, wherein the Destination layer two identifier (Destination L2ID) used by the direct link acceptance message is the source layer two identifier of the first terminal.

Because the direct link establishment request message of the first terminal is sent in a broadcast manner, the source layer two identifier of the first terminal is directly exposed to other User Equipment (UE) or third-party Equipment, and for a sending-end UE with a privatized configuration, there is a risk of being tracked and identified.

Disclosure of Invention

An object of the embodiments of the present invention is to provide a method, a terminal and a network device for updating identification information, so as to prevent the originating end of the unicast connection of the PC5 from being tracked and identified.

In a first aspect, a method for updating identification information is provided, where the method is performed by a first terminal, and the method includes: and sending a second source layer second identification of the first terminal to the second terminal, wherein the second source layer second identification is different from the first source layer second identification used by the direct link establishment request message.

In a second aspect, a method for updating identification information is provided, the method being performed by a second terminal, and the method comprising: and receiving a second source layer second identifier of the first terminal, wherein the second source layer second identifier is different from the first source layer second identifier used by the direct link establishment request message.

In a third aspect, a terminal is provided, which includes: and the processing module is used for sending a second source layer second identifier of the first terminal to the second terminal, wherein the second source layer second identifier is different from the first source layer second identifier used by the direct link establishment request message.

In a fourth aspect, a mobile terminal is provided, comprising: and the execution module is used for receiving a second source layer second identifier of the first terminal, which is sent by the first terminal, wherein the second source layer second identifier is different from the first source layer second identifier used by the direct link establishment request message.

In a fifth aspect, a terminal is provided, the terminal comprising a processor, a memory and a computer program stored on the memory and being executable on the processor, the computer program, when executed by the processor, implementing the steps of the method of updating identification information according to the first or second aspect.

A sixth aspect provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the method of updating identification information according to the first or second aspect.

According to the method, the terminal and the network device for updating the identification information provided by the embodiment of the invention, the second source layer two identification of the first terminal is sent to the second terminal, wherein the second source layer two identification is different from the first source layer two identification used by the direct link establishment request message, so that the starting end of the unicast connection of the PC5 can be prevented from being tracked and identified.

Drawings

The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:

FIG. 1 is a schematic flow chart diagram of a method of updating identification information in accordance with one embodiment of the present invention;

FIG. 2 is a schematic flow chart diagram of a method of updating identification information in accordance with another embodiment of the present invention;

FIG. 3 is a schematic flow chart diagram of a method of updating identification information in accordance with another embodiment of the present invention;

FIG. 4 is a schematic flow chart diagram of a method of updating identification information in accordance with another embodiment of the present invention;

fig. 5 is a schematic structural diagram of a terminal according to an embodiment of the present invention;

fig. 6 is a schematic configuration diagram of a terminal according to another embodiment of the present invention;

fig. 7 is a schematic configuration diagram of a terminal according to another embodiment of the present invention.

Detailed Description

In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application. "and/or" in various embodiments of the present specification means at least one of front and rear.

It should be understood that the technical solutions of the embodiments of the present invention can be applied to various communication systems, for example: a Long Term Evolution (LTE) System, an LTE Frequency Division Duplex (FDD) System, an LTE Time Division Duplex (TDD) System, a Universal Mobile Telecommunications System (UMTS) or Worldwide Interoperability for Microwave Access (WiMAX) communication System, a 5G System, a New Radio (NR) System, or a subsequent Evolution communication System.

In the embodiment of the present invention, a Terminal may include, but is not limited to, a Mobile Station (MS), a Mobile Terminal (Mobile Terminal), a Mobile phone (Mobile Telephone), a User Equipment (User Equipment, UE), a handset (handset), a portable device (portable Equipment), a vehicle (vehicle), etc., and the Terminal may communicate with one or more core networks through a Radio Access Network (RAN), for example, the Terminal may be a Mobile phone (or referred to as a "cellular" phone), a computer with a wireless communication function, and the Terminal may also be a portable, pocket, handheld, computer-embedded or vehicle-mounted Mobile device.

In the embodiment of the present invention, the network device is an apparatus deployed in a radio access network to provide a terminal with a wireless communication function. The network device may be a base station, and the base station may include various macro base stations, micro base stations, relay stations, access points, and the like. In systems employing different radio access technologies, the names of devices having a base station function may differ. For example, in an LTE network, called an Evolved node B (eNB or eNodeB), in a third Generation (3G) network, called a node B (node B), or a network device in a later Evolved communication system, etc., although the words are not limiting.

As shown in fig. 1, an embodiment of the present invention provides a method 100 for updating identification information, which may be performed by a terminal device, in other words, by software or hardware installed in the terminal device, and includes the following steps:

s112: and the first terminal sends the second source layer second identification of the first terminal to the second terminal.

Before this step, in the process of establishing the unicast connection of the PC5, the first terminal serving as an originating terminal sends a direct link establishment request message in a broadcast manner, where the direct link establishment request message carries the first source layer two identifier of the first terminal. Therefore, the first source layer second identification of the first terminal is directly exposed to other UE or third-party equipment, and the first terminal is in risk of being tracked and identified.

In this step, the second source layer two identifier is different from the first source layer two identifier used in the direct link establishment request message, so that the source layer two identifier of the first terminal is updated.

In addition, the direct link establishment request message may also be referred to as a direct communication request message, the source layer two identifier may also be referred to as a layer two identifier, and the first and second identifiers are only for convenience of distinction and do not play a practical role in limitation.

S122: and the second terminal receives a second source layer second identifier of the first terminal, which is sent by the first terminal.

Wherein the second destination layer two identifier is different from the first source layer two identifier used by the direct link setup request message.

Therefore, according to the method for updating identifier information provided by the embodiment of the present invention, by sending the second source layer two identifier of the first terminal to the second terminal, where the second source layer two identifier is different from the first source layer two identifier used in the direct link establishment request message, the source layer two identifier of the PC5 unicast connection initiator can be updated, and the initiator of the PC5 unicast connection is prevented from being tracked and identified.

As shown in fig. 2, an embodiment of the present invention provides a method 200 for updating identification information, which may be performed by a terminal device, in other words, by software or hardware installed in the terminal device, and includes the following steps:

s212: and the first terminal sends the second source layer second identification of the first terminal to the second terminal.

Before this step, in the process of establishing the unicast connection of the PC5, the first terminal serving as an originating terminal sends a direct link establishment request message in a broadcast manner, where the direct link establishment request message carries the first source layer two identifier of the first terminal, and receives a direct link authentication request message sent by the second terminal. Therefore, the first source layer second identification of the first terminal is directly exposed to other UE or third-party equipment, and the first terminal is in risk of being tracked and identified. And then, the first terminal sends a direct link authentication reply message to the second terminal and receives a direct link security mode command message sent by the second terminal.

In one implementation manner, in this step, the first terminal sends a direct link security mode completion message to the second terminal, where the second source layer two identifier is carried in the direct link security mode completion message, and the second source layer two identifier is different from the first source layer two identifier used in the direct link establishment request message, so that the source layer two identifier of the first terminal is updated.

In an implementation manner, an information element corresponding to the second source layer two identifier may be added to the direct link security mode completion message. In other words, an information element corresponding to the second source layer two identifier may be added to the direct link security mode complete message. For example, an information element "layer two identifier (layer-2 ID)" is added to the content of the direct link security mode complete message, and the presence form is "Optional", the format is "type value", the length is 24 bits (bit), and the like.

S222: and the second terminal receives a second source layer second identifier of the first terminal, which is sent by the first terminal.

And the second terminal receives the direct link security mode completion message sent by the first terminal, thereby receiving the second source layer second identification of the first terminal.

S224: and the second terminal updates the destination layer two identifier stored in the unicast link text into the second source layer two identifier, and sends the PC5 unicast link message according to the second source layer two identifier.

In one implementation, the second terminal sends a direct link setup accept message to the first terminal with the second source layer second identifier as a destination layer second identifier. In one implementation, the direct link setup accept message carries the second source layer two identifier. The direct link setup accept message may also be called a direct communication accept message, etc.

S214: the first terminal receives the PC5 unicast link message.

In one implementation manner, the first terminal receives a direct link setup accept message sent by the second terminal, where a destination layer two identifier used by the direct link setup accept message is the second source layer two identifier. Thus, the first terminal and the second terminal complete the subsequent PC5 unicast link establishment procedure based on the updated second source layer two identification.

In another implementation, the PC5 unicast link release procedure is initiated in the event that the second source layer two identification is not included as the destination layer two identification in the received direct link setup accept message. In one implementation manner, the direct link release request message carries a release cause value, where the release cause value indicates a reason for: the identification is not updated.

In yet another implementation, in the case that the second source layer two identifier is not used as the destination layer two identifier in the received direct link setup accept message, the PC5 unicast link identifier update procedure is initiated, and the second source layer two identifier is carried in the direct link identifier update request message.

Therefore, according to the method for updating identifier information provided by the embodiment of the present invention, by sending the second source layer two identifier of the first terminal to the second terminal, where the second source layer two identifier is different from the first source layer two identifier used in the direct link establishment request message, the source layer two identifier of the PC5 unicast connection initiator can be updated, and the initiator of the PC5 unicast connection is prevented from being tracked and identified.

In the method for updating identifier information provided in the embodiment of the present invention, the PC5 unicast link release process is initiated when the second source layer two identifier is not used as the destination layer two identifier in the received direct link establishment accept message, so that the PC5 unicast link connection is released when the source layer two identifier of the PC5 unicast connection initiator is not updated, and the initiator of the PC5 unicast connection is prevented from being tracked and identified.

In the method for updating identifier information provided in the embodiment of the present invention, the update process of the PC5 unicast link identifier is initiated when the second source layer two identifier is not used as the destination layer two identifier in the received direct link establishment acceptance message, and the second source layer two identifier is carried in the direct link identifier update request message, so that the source layer two identifier of the PC5 unicast connection initiating terminal can be updated, and the initiating terminal of the PC5 unicast connection is prevented from being tracked and identified.

As shown in fig. 3, an embodiment of the present invention provides a method 300 for updating identification information, which may be performed by a terminal device, in other words, by software or hardware installed in the terminal device, and includes the following steps:

s312: and the first terminal sends the second source layer second identification of the first terminal to the second terminal.

Before this step, in the process of establishing the unicast connection of the PC5, the first terminal serving as an originating terminal sends a direct link establishment request message in a broadcast manner, where the direct link establishment request message carries the first source layer two identifier of the first terminal, and receives a direct link authentication request message sent by the second terminal. Therefore, the first source layer second identification of the first terminal is directly exposed to other UE or third-party equipment, and the first terminal is in risk of being tracked and identified.

In one implementation manner, in this step, the first terminal sends a direct link authentication reply message to the second terminal, the second source layer two identifier is carried in the direct link authentication reply message, and the second source layer two identifier is different from the first source layer two identifier used in the direct link establishment request message, so that the source layer two identifier of the first terminal is updated.

In an implementation manner, an information element corresponding to the second source layer two identifier may be added to the direct link authentication reply message. In other words, an information element corresponding to the second source layer two identity may be added to the direct link authentication reply message. For example, an information element "layer two identification (layer-2 ID)" is added, the presence form is "Optional", the format is "type value", the length is 24 bits (bit), and the like.

S322: and the second terminal receives a second source layer second identifier of the first terminal, which is sent by the first terminal.

And the second terminal receives the direct link authentication reply message sent by the first terminal, thereby receiving the second source layer second identification of the first terminal.

S324: and the second terminal updates the destination layer two identifier stored in the unicast link text into the second source layer two identifier, and sends the PC5 unicast link message according to the second source layer two identifier.

In one implementation, the second terminal sends a direct link security mode command message to the first terminal using the second source layer second identifier as a destination layer second identifier.

In one implementation, the direct link security mode command message carries the second source layer two identifier.

S314: the first terminal receives the PC5 unicast link message.

In one implementation manner, the first terminal receives a direct link security mode command message sent by the second terminal, where a destination layer two identifier used by the direct link security mode command message is the second source layer two identifier. Then, in an implementation manner, the first terminal sends a direct link security mode completion message to the second terminal, and receives a direct link setup acceptance message sent by the second terminal. Thus, the first terminal and the second terminal complete the subsequent PC5 unicast link establishment procedure based on the updated second source layer two identification.

In another implementation, the first terminal terminates the PC5 unicast link establishment procedure in the event that the received direct link security mode command message does not have the second source layer two identification as the destination layer two identification.

Therefore, according to the method for updating identifier information provided by the embodiment of the present invention, by sending the second source layer two identifier of the first terminal to the second terminal, where the second source layer two identifier is different from the first source layer two identifier used in the direct link establishment request message, the source layer two identifier of the PC5 unicast connection initiator can be updated, and the initiator of the PC5 unicast connection is prevented from being tracked and identified.

In the method for updating identifier information provided in the embodiment of the present invention, after the second source layer two identifier is sent to the second terminal, the establishment of the PC5 unicast link is completed based on the second source layer two identifier, and the second source layer two identifier is carried in the direct link security mode completion message or the direct link authentication reply message, so that the PC5 unicast link can be established and the originating end of the PC5 unicast connection can be prevented from being tracked and identified.

In the method for updating identifier information provided in the embodiment of the present invention, the establishment process of the PC5 unicast link is terminated when the received direct link security mode command message does not use the second source layer two identifier as the destination layer two identifier, so that the originating end of the PC5 unicast connection is prevented from being tracked and identified when the source layer two identifier of the originating end of the PC5 unicast connection is not updated.

As shown in fig. 4, an embodiment of the present invention provides a method 400 for updating identification information, which may be performed by a terminal device, in other words, by software or hardware installed in the terminal device, and includes the following steps:

s412: after the establishment of the unicast link of the PC5 is completed or the direct link establishment acceptance message is received, the first terminal immediately initiates an update process of the unicast link identifier of the PC5, and sends the second source layer second identifier carried in the direct link identifier update request message to the second terminal.

The PC5 unicast link establishment procedure may include: the first terminal serving as an initiating terminal sends a direct link establishment request message in a broadcast mode, wherein the direct link establishment request message carries a first source layer two identifier of the first terminal, and receives a direct link authentication request message sent by a second terminal. The first terminal sends a direct link authentication reply message to the second terminal and receives a direct link security mode command message sent by the second terminal. The first terminal sends a direct link security mode completion message to the second terminal and receives a direct link establishment acceptance message sent by the second terminal.

After that, namely after the first terminal receives the direct link establishment acceptance message of the second terminal, the first terminal immediately initiates a unicast link identifier updating process of the PC5, and sends the second source layer second identifier carried in the direct link identifier updating request message to the second terminal. The second source layer second identifier is different from the first source layer second identifier used by the direct link establishment request message, thereby updating the source layer second identifier of the first terminal.

In one implementation, the direct link identifier update request message includes an information element corresponding to the second source layer two identifier. In other words, an information element corresponding to the second source layer two identity may be written in the direct link authentication reply message. For example, an information element "layer two identification (layer-2 ID)" is written, the presence form is "Optional", the format is "type value", 24 bits (bit), and the like.

S422: after completing the PC5 unicast link establishment procedure, the second terminal receives the second source layer two identification sent by the first terminal.

In one implementation, the second source layer two identifier is carried in a direct link identifier update request message.

Therefore, according to the method for updating identifier information provided by the embodiment of the present invention, after the unicast link establishment procedure of the PC5 is completed, the unicast link identifier update procedure of the PC5 is initiated, and the second source layer second identifier is carried in the direct link identifier update request message and sent to the second terminal, so that the source layer second identifier of the PC5 unicast connection initiation end can be updated, and the initiation end of the PC5 unicast connection is prevented from being tracked and identified.

The method for updating the identification information according to the embodiment of the present invention is described in detail above with reference to fig. 1 to 4. A terminal according to an embodiment of the present invention will be described in detail with reference to fig. 5.

Fig. 5 is a schematic structural diagram of a terminal according to an embodiment of the present invention. As shown in fig. 5, the terminal 500 includes: a processing module 510.

The processing module 510 is configured to send a second source layer two identifier of the first terminal to the second terminal, where the second source layer two identifier is different from the first source layer two identifier used by the direct link setup request message.

In an implementation manner, the second source layer two identifier is carried in a direct link security mode completion message or a direct link authentication reply message, and the processing module 510 is further configured to complete a PC5 unicast link establishment procedure based on the second source layer two identifier after the second source layer two identifier is sent to the second terminal.

In one implementation, the processing module 510 is further configured to receive a direct link security mode command message or a direct link setup accept message sent by the second terminal, where a destination layer two identifier used in the direct link security mode command message or the direct link setup accept message is the second source layer two identifier.

In an implementation manner, the direct link security mode command message or the direct link establishment acceptance message carries the second source layer two identifier.

In one implementation, an information element corresponding to the second source layer two identifier is added to the direct link security mode completion message or the direct link authentication reply message.

In one implementation, the processing module 510 is further configured to terminate the PC5 unicast link establishment procedure in case the received direct link security mode command message does not have the second source layer two identity as the destination layer two identity after said sending the second source layer two identity to the second terminal.

In one implementation, the processing module 510 is further configured to, after the sending of the second source layer two identifier to the second terminal, initiate a PC5 unicast link release procedure in a case that the second source layer two identifier is not used as the destination layer two identifier in the received direct link establishment accept message; or under the condition that the second source layer two identification is not taken as the destination layer two identification in the received direct link establishment receiving message, initiating the update process of the PC5 unicast link identification, and carrying the second source layer two identification in the direct link identification update request message.

In one implementation manner, the direct link release request message carries a release cause value, where the release cause value indicates a reason for: the identification is not updated.

In one implementation, the processing module 510 is configured to initiate a PC5 unicast link identifier update procedure after completing the PC5 unicast link establishment procedure, and send the second source layer second identifier to the second terminal, where the second source layer second identifier is carried in a direct link identifier update request message.

The terminal 500 according to the embodiment of the present invention may refer to the process executed by the first terminal in the method 100 and 400 corresponding to the embodiment of the present invention, and each unit/module and the other operations and/or functions in the terminal 500 are respectively for implementing the process executed by the first terminal in the method 100 and 400, and can achieve the same or equivalent technical effects, and for brevity, no further description is provided herein.

Fig. 6 is a schematic structural diagram of a network device according to an embodiment of the present invention. As shown in fig. 6, the network device 600 includes: the module 610 is executed.

The executing module 610 is configured to receive a second source layer second identifier of the first terminal sent by the first terminal, where the second source layer second identifier is different from the first source layer second identifier used by the direct link setup request message.

In an implementation manner, the second destination layer two identifier is carried in a direct link security mode complete message or a direct link authentication reply message, and the execution module 610 is further configured to: after the second source layer two identification of the first terminal sent by the first terminal is received, the PC5 unicast link establishment process is completed based on the second source layer two identification.

In one implementation, the execution module 610 is configured to: updating the destination layer two identifier stored in the unicast link text into the second source layer two identifier; and sending a PC5 unicast link message according to the second source layer two identifier.

In one implementation, the executing module 610 is configured to send a direct link security mode command message or a direct link setup accept message to the first terminal using the second source layer two identifier as a destination layer two identifier.

In an implementation manner, the direct link security mode command message or the direct link establishment acceptance message carries the second source layer two identifier.

In one implementation, an information element corresponding to the second source layer two identifier is added to the direct link security mode completion message or the direct link authentication reply message.

In one implementation, the execution module 610 is configured to receive the second source layer two identifier sent by the first terminal after completing the PC5 unicast link establishment procedure.

In one implementation, the second source layer two identifier is carried in a direct link identifier update request message.

The network device 600 according to the embodiment of the present invention may refer to the process executed by the second terminal in the method 100-400 corresponding to the embodiment of the present invention, and each unit/module and the other operations and/or functions in the network device 600 are respectively for implementing the process executed by the second terminal in the method 100-400 and achieving the same or equivalent technical effects, and for brevity, no further description is provided herein.

Fig. 7 is a block diagram of a terminal according to another embodiment of the present invention. The terminal 700 shown in fig. 7 includes: at least one processor 701, a memory 702, at least one network interface 704, and a user interface 703. The various components in the terminal 700 are coupled together by a bus system 705. It is understood that the bus system 705 is used to enable communications among the components. The bus system 705 includes a power bus, a control bus, and a status signal bus in addition to a data bus. But for clarity of illustration the various busses are labeled in figure 7 as the bus system 705.

The user interface 703 may include, among other things, a display, a keyboard, a pointing device (e.g., a mouse, trackball), a touch pad, or a touch screen.

It is to be understood that the memory 702 in embodiments of the present invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic random access memory (ddr Data Rate SDRAM, ddr SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The memory 702 of the systems and methods described in this embodiment of the invention is intended to comprise, without being limited to, these and any other suitable types of memory.

In some embodiments, memory 702 stores the following elements, executable modules or data structures, or a subset thereof, or an expanded set thereof: an operating system 7021 and application programs 7022.

The operating system 7021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, for implementing various basic services and processing hardware-based tasks. The application 7022 includes various applications, such as a Media Player (Media Player), a Browser (Browser), and the like, for implementing various application services. Programs that implement methods in accordance with embodiments of the present invention can be included within application program 7022.

In this embodiment of the present invention, the terminal 700 further includes: a computer program stored in the memory 702 and executable on the processor 701, wherein the computer program when executed by the processor 701 implements the procedures performed by the first terminal or the second terminal in the method 100 and 400 as follows.

The method disclosed in the above embodiments of the present invention may be applied to the processor 701, or implemented by the processor 701. The processor 701 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be implemented by integrated logic circuits of hardware or instructions in the form of software in the processor 701. The Processor 701 may be a general-purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may reside in ram, flash memory, rom, prom, or eprom, registers, among other computer-readable storage media known in the art. The computer readable storage medium is located in the memory 702, and the processor 701 reads the information in the memory 702, and performs the steps of the above method in combination with the hardware thereof. In particular, the computer readable storage medium has a computer program stored thereon, and the computer program, when executed by the processor 701, implements the steps performed by the first terminal or the second terminal in the method 100 and 400 as described above.

It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the Processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units configured to perform the functions described herein, or a combination thereof.

For a software implementation, the techniques described in this disclosure may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described in this disclosure. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.

The terminal 700 can implement each process implemented by the terminal in the foregoing embodiments, and can achieve the same or equivalent technical effects, and details are not described here to avoid repetition.

An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the steps executed by the first terminal or the second terminal in the above method embodiments 100-400, and can achieve the same technical effects, and in order to avoid repetition, details are not described here again. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.

It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.

Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.

While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

15页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:无线局域网中应用于多链路设备的通信方法及装置

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!