Method, device and system for near distance communication discovery

A discovery method and short-range technology, applied in the field of communication, can solve problems such as unfavorable restriction of business development and waste of wireless resources, and achieve the effect of avoiding waste of wireless resources and saving wireless resources.

Active Publication Date: 2016-04-06
ZTE CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the limited discovery service, the existing technology still adopts the above three processes. UE-A will occupy the air interface resources at any time, broadcast the discovery code, and seek the discovery of UE-B or other UEs, which will lead to waste of wireless resources. restrict the conduct of business
[0007] Aiming at the problem of waste of wireless resources in the discovery service that is limited in related technologies, no effective solution has been proposed so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for near distance communication discovery
  • Method, device and system for near distance communication discovery
  • Method, device and system for near distance communication discovery

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0099] In this embodiment, PF-A assigns a discovery identifier to UE-B, and notifies UE-A and UE-B, and UE-A uses the discovery identifier to discover UE-B.

[0100] Figure 10 It is a signaling flow chart of the restricted discovery service method in Embodiment 1, such as Figure 10 As shown, the method mainly includes the following steps:

[0101] Step 1001: UE-A sends a discovery authentication message to its home PF-A, the message carries the UE-A identity, the message carries the discovery type, and to restrict discovery, the message also carries the UE-A discovery authentication message. The service identifier, the message also indicates that UE-A seeks to discover friends, and the message also includes the location information of UE-A.

[0102] Step 1002: PF-A finds that if there is no user context of UE-A, it sends a home register authentication request to obtain the user context of UE-A. If the user context of UE-A exists, PF-A sends a discovery authentication requ...

Embodiment 2

[0116] In this embodiment, PF-A assigns a discovery identifier to UE-B, and notifies UE-A and UE-B, and UE-A uses the discovery identifier to discover UE-B.

[0117] Figure 11 It is a signaling flow chart of the restricted discovery service method in Embodiment 1, such as Figure 11 As shown, the method mainly includes the following steps:

[0118] Step 1101: UE-B sends a discovery request message to its home PF-B, the message carries the UE-B identity, the message carries the discovery type, and to restrict discovery, the message also carries the UE-B discovery request message. Service identifier, the message also indicates that UE-B expects to be discovered by a friend, so the message may also carry a friend or a list of friends expected to be discovered, that is, a list of service identifiers of friends, and the list of friends or friend service identifiers includes at least The service identifier of UE-A, and the message also includes the location information of UE-B. ...

Embodiment 3

[0130] In this embodiment, the PF-B assigns a discovery identifier to UE-B, and notifies UE-A and UE-B, and UE-A uses the discovery identifier to discover UE-B.

[0131] Figure 12 It is a signaling flowchart of the discovery service method limited in this embodiment, such as Figure 12 As shown, the method includes the following steps:

[0132] Step 1201: UE-A sends a discovery authentication message to its PF-A, the message carries the UE-A identity, the message carries the discovery type, and to restrict discovery, the message also carries the UE-A service discovered this time The message also indicates that UE-A seeks a friend discovery, and the message also includes the location information of UE-A.

[0133] Step 1202: PF-A finds that if there is no user context of UE-A, it sends a home register authentication request to obtain the user context of UE-A. If the user context of UE-A exists, PF-A sends a discovery authentication request message to the application server, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device and a system for near distance communication discovery. The method comprises steps: a discovery terminal receives discovery information allocated to a discovered terminal by a network side, wherein the discovery information comprises a discovery identifier, and the discovery information is sent to the discovered terminal by the network side; the discovery terminal uses the discovery identifier for calling or broadcasting; and the discovery terminal receives a response returned by the discovered terminal, and the discovered terminal is determined to be discovered.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a short-distance communication discovery method, device and system. Background technique [0002] In order to maintain the competitiveness of the third-generation mobile communication system in the communication field, provide users with faster rate, lower delay, and more personalized mobile communication services, and at the same time, in order to reduce the operating costs of operators, the third-generation cooperation The standard working group of the Partnership Project (3GPP, 3rdGenerationPartnershipProject) is working on the research of the Evolved Packet System (EPS, EvolvedPacketSystem). The entire EPS includes a radio access network (E-UTRAN, EvolvedUniversalTerrestrialRadioAccessNetwork) and a mobile core network (EPC, EvolvedPacketCoreNetworking), wherein, the EPC includes a home subscriber server (HSS, HomeSubscriberServer), a mobility management entity (MME, Mobili...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/00H04W8/00H04W4/80
CPCH04W92/18H04W8/005H04W4/80H04L67/51H04W48/10
Inventor 游世林蔡继燕宗在峰梁爽林兆骥彭锦李阳
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products