A resource selection method, base station and terminal

A resource selection and resource technology, applied in transmission path sub-channel allocation, digital transmission system, connection management, etc., can solve problems such as target terminal privacy leakage, and achieve the effect of reducing the probability of continuous tracking

Active Publication Date: 2022-01-28
DATANG MOBILE COMM EQUIP CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a resource selection method, a base station, and a terminal to solve the problem that under the SPS mechanism, a malicious terminal may track the geographical location of the target terminal by continuously determining the information on the resource, resulting in the privacy of the target terminal. leaked problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A resource selection method, base station and terminal
  • A resource selection method, base station and terminal
  • A resource selection method, base station and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to specific embodiments and accompanying drawings.

[0090] In order to enable those skilled in the art to better understand the embodiments of the present invention, the following explanations are first made.

[0091] PC5 mode mode3 has two types of scheduling: Dynamical Scheduling (DS for short) and Semi-Persistent Scheduling (SPS for short). Mode 4V2V has two types of scheduling based on monitoring sensing SPS and sending one shot at a time. For DS / one shot scheduling, it is impossible for a malicious terminal to track the geographical location of the target vehicle through continuous monitoring and high-level data processing on certain physical resources. In the embodiment of the present invention, only mode 4 sensing SPS and mode 3 SPS scheduling are considered.

[0092] For mode 4sensing SP...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a resource selection method, a base station and a terminal, and solves the problem that under the SPS mechanism, a malicious terminal may track the geographic location of a target terminal by continuously monitoring information on determined resources, resulting in privacy leakage of the target terminal. The resource selection method of the present invention includes: triggering SPS resource reselection when the Layer 2 ID changes or the duration of the semi-persistently scheduled SPS resource reaches a preset maximum duration. In the present invention, when the layer 2 ID changes or the duration of the semi-statically scheduled SPS resource reaches the preset maximum duration, SPS resource reselection is triggered to prevent the SPS resource from remaining unchanged for a long time, thereby preventing the receiving node from By associating the two IDs, the probability of continuous tracking of the target terminal by the malicious terminal is reduced.

Description

technical field [0001] The present invention relates to the technical field of communication applications, in particular to a resource selection method, a base station and a terminal. Background technique [0002] Under the semi-persistent scheduling (Semi-Persistent Scheduling, referred to as SPS) mechanism, malicious terminals may track the geographical location of target terminals by continuously monitoring information on determined resources, that is, there is a risk of privacy leakage in V2X communication. In order to ensure that this kind of tracking is only for a short period of time and to protect the privacy of the terminal as much as possible, it is necessary to do certain enhancements to the current resource selection process. Contents of the invention [0003] The purpose of the present invention is to provide a resource selection method, a base station, and a terminal to solve the problem that under the SPS mechanism, a malicious terminal may track the geograp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W72/12H04L5/00H04L47/76
CPCH04L5/003H04W72/535H04W72/23H04W72/12H04L5/00H04W72/04H04W76/36
Inventor 冯媛房家奕赵锐
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products