Short-range communication discovery method, device and system

A discovery method and short-distance technology, applied in the field of communication, can solve problems such as unfavorable restrictions on business development, waste of wireless resources, etc., and achieve the effect of avoiding waste of wireless resources and saving wireless resources

Active Publication Date: 2020-01-14
ZTE CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the limited discovery service, the existing technology still adopts the above three processes. UE-A will occupy the air interface resources at any time, broadcast the discovery code, and seek the discovery of UE-B or other UEs, which will lead to waste of wireless resources. restrict the conduct of business
[0007] Aiming at the problem of waste of wireless resources in the discovery service that is limited in related technologies, no effective solution has been proposed so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Short-range communication discovery method, device and system
  • Short-range communication discovery method, device and system
  • Short-range communication discovery method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0099] In this embodiment, PF-A assigns a discovery identifier to UE-B, and notifies UE-A and UE-B, and UE-A uses the discovery identifier to discover UE-B.

[0100] Figure 10 It is a signaling flow chart of the restricted discovery service method in Embodiment 1, such as Figure 10 As shown, the method mainly includes the following steps:

[0101] Step 1001: UE-A sends a discovery authentication message to its home PF-A, the message carries the UE-A identity, the message carries the discovery type, and to restrict discovery, the message also carries the UE-A discovery authentication message. The service identifier, the message also indicates that UE-A seeks to discover friends, and the message also includes the location information of UE-A.

[0102] Step 1002: PF-A finds that if there is no user context of UE-A, it sends a home register authentication request to obtain the user context of UE-A. If the user context of UE-A exists, PF-A sends a discovery authentication requ...

Embodiment 2

[0116] In this embodiment, PF-A assigns a discovery identifier to UE-B, and notifies UE-A and UE-B, and UE-A uses the discovery identifier to discover UE-B.

[0117] Figure 11 It is a signaling flow chart of the restricted discovery service method in Embodiment 1, such as Figure 11 As shown, the method mainly includes the following steps:

[0118] Step 1101: UE-B sends a discovery request message to its home PF-B, the message carries the UE-B identity, the message carries the discovery type, and to restrict discovery, the message also carries the UE-B discovery request message. Service identifier, the message also indicates that UE-B expects to be discovered by a friend, so the message may also carry a friend or a list of friends expected to be discovered, that is, a list of service identifiers of friends, and the list of friends or friend service identifiers includes at least The service identifier of UE-A, and the message also includes the location information of UE-B. ...

Embodiment 3

[0130] In this embodiment, the PF-B assigns a discovery identifier to UE-B, and notifies UE-A and UE-B, and UE-A uses the discovery identifier to discover UE-B.

[0131] Figure 12 It is a signaling flowchart of the discovery service method limited in this embodiment, such as Figure 12 As shown, the method includes the following steps:

[0132] Step 1201: UE-A sends a discovery authentication message to its PF-A, the message carries the UE-A identity, the message carries the discovery type, and to restrict discovery, the message also carries the UE-A service discovered this time The message also indicates that UE-A seeks a friend discovery, and the message also includes the location information of UE-A.

[0133] Step 1202: PF-A finds that if there is no user context of UE-A, it sends a home register authentication request to obtain the user context of UE-A. If the user context of UE-A exists, PF-A sends a discovery authentication request message to the application server, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a short distance communication discovery method, device and system. Wherein, the method includes: the discovery terminal receives discovery information allocated by the network side for the discovered terminal, wherein the discovery information includes: a discovery identifier, and the discovery information is sent to the discovered terminal by the network side; the discovery terminal uses the discovery identifier to search calling or broadcasting; the discovery terminal receives the response returned by the discovered terminal, and determines to discover the discovered terminal.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a short-distance communication discovery method, device and system. Background technique [0002] In order to maintain the competitiveness of the third-generation mobile communication system in the communication field, provide users with faster rate, lower delay, and more personalized mobile communication services, and at the same time, in order to reduce the operating costs of operators, the third-generation cooperation The standard working group of the Partnership Project (3GPP, 3rd Generation Partnership Project) is working on the research of the Evolved Packet System (EPS, Evolved Packet System). The entire EPS includes a radio access network (E-UTRAN, Evolved Universal Terrestrial Radio Access Network) and a mobile core network (EPC, Evolved PacketCore Networking), where the EPC includes a home subscriber server (HSS, Home Subscriber Server), a mobility management entity ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/80H04W8/00H04L29/08H04W92/18
CPCH04W92/18H04W8/005H04W4/80H04L67/51H04W48/10
Inventor 游世林蔡继燕宗在峰梁爽林兆骥彭锦李阳
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products