D2D (Device-to-Device) device identification label processing method and D2D device identification label processing device

A technology of identity identification and processing method, which is applied in the field of communication and can solve the problem of high security risk in the communication process

Inactive Publication Date: 2014-03-26
ZTE CORP
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of the relatively high security risk in the communication process of the D2D device identity processing process in the related art, the present invention provides a D2D device identity processing method and device to at least solve this problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • D2D (Device-to-Device) device identification label processing method and D2D device identification label processing device
  • D2D (Device-to-Device) device identification label processing method and D2D device identification label processing device
  • D2D (Device-to-Device) device identification label processing method and D2D device identification label processing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0185] The present invention provides a method for identity marking and identification in D2D discovery, which includes using two or three types of identity marks to implement identity marking and identification of discovered devices and / or their users.

[0186] In this preferred embodiment, the two types of identities are D2D temporary identities and D2D long-term identities respectively, and the above three types of identities are D2D temporary identities, D2D long-term identities and D2D application layer identities respectively. .

[0187] Preferably, the D2D temporary identity is used to mark the D2D temporary identity of the discovered end device and / or its user, and carry its temporary identity information. D2D temporary identity information also includes simple information such as the type of the discovery device, the purpose and type of the application, and the type of service provided.

[0188] Preferably, the D2D temporary identity is only valid within a certain pe...

Embodiment 2

[0196] This preferred embodiment provides an identity labeling and identification method in D2D discovery, Figure 14 It is the flow of the user identity labeling and identification method on the side of the discovered end device in D2D discovery according to the embodiment of the present invention Figure 1 ,Such as Figure 14 As shown, the method includes the following steps S1402 to S1410.

[0197] Step S1402: The discovered end device sends a D2D temporary identity application.

[0198] Step S1404: The D2D discovery system feeds back the authorization of the D2D temporary identity.

[0199] Step S1406: The discovered device sends the D2D temporary identity to the discovering device.

[0200] Step S1408: The discovering device sends a D2D temporary identity report to the D2D system.

[0201] Step S1410: the D2D discovery system feeds back the D2D identification information to the discovery device.

Embodiment 3

[0203] This preferred embodiment provides an identity labeling and identification method in D2D discovery, Figure 15 It is the flow of the user identity labeling and identification method on the side of the discovered end device in D2D discovery according to the embodiment of the present invention Figure II ,Such as Figure 15 As shown, the method includes the following steps S1502 to S1504.

[0204] Step S1502: The discovered end device sends a D2D temporary identity application.

[0205] Step S1504: The D2D discovery system feeds back D2D temporary identity authorization rejection information.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a D2D (Device-to-Device) device identification label processing method and a D2D device identification label processing device. The method includes the following steps: a D2D device sends a D2D temporary identification label application; the D2D device receives a D2D temporary identification label authorization information corresponding to the D2D temporary identification label application, and obtains a D2D temporary identification label; the D2D device broadcasts the received D2D temporary identification label, which is used to achieve the purpose that the D2D device can be discovered by a discovering end D2D device during the D2D discovery process. The communication safety of D2D devices is improved through the invention.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a device-to-device (Device-to-Device, D2D for short) device identification processing method and device. Background technique [0002] D2D communication based on cellular network is a new type of technology that directly communicates between multiple terminal devices that support D2D functions under the control of the system. It can reduce system resource occupation, increase the spectrum efficiency of cellular communication systems, and reduce terminal emission. Power consumption, and save network operation cost to a great extent. figure 1 It is a schematic diagram of the working mode of D2D based on the cellular network in related technologies, such as figure 1 As shown, data transmission is performed between D2D device 1 and D2D device 2 . [0003] The D2D device needs to complete the process of discovering other nearby D2D devices before performing D2D transmission. D2D ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/12
CPCH04W8/00H04W48/14H04W76/14H04W8/26H04W8/005H04W48/10
Inventor 梁枫吴栓栓任海涛甘露梁爽
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products