WO2013083074A1 - 通信监听方法、基站和终端 - Google Patents
通信监听方法、基站和终端 Download PDFInfo
- Publication number
- WO2013083074A1 WO2013083074A1 PCT/CN2012/086157 CN2012086157W WO2013083074A1 WO 2013083074 A1 WO2013083074 A1 WO 2013083074A1 CN 2012086157 W CN2012086157 W CN 2012086157W WO 2013083074 A1 WO2013083074 A1 WO 2013083074A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- terminal
- message
- base station
- terminal belonging
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/306—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/80—Arrangements enabling lawful interception [LI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
Definitions
- the present invention relates to mobile communication technologies, and in particular, to a communication monitoring method, a base station, and a terminal. Background technique
- Public security organs or other departments may monitor the user's communication content within the scope of the law for security reasons. Such monitoring is called "legal monitoring.”
- data such as the user's voice is carried by the network; for example, after the user A establishes a call with the user B, the voice of the user A is sent to the base station where the user A is located. Then, the user A's base station transmits the voice of the user A to the PGW (Packet Data Network Gateway), the SGW (Seving Gate Way), and then the PGW can be forwarded to the base station where the user B is located.
- the base station where B is located is sent to user B, and the voice of user A is transmitted to user B.
- the voice of user B is similar to that of user A. Since the voice of the user is carried by the network, the voice of the user is required in the existing voice. When the data is monitored, the user's voice and other data are directly obtained from the SGW or the PGW, and the user is monitored.
- location-based D2D Device to Device
- the core of the D2D idea is that if the distance between users is close enough, the user The data between them can be passed directly without being carried over the network. Summary of the invention
- the technical problem to be solved by the embodiments of the present invention is to provide a communication monitoring method, a base station and a terminal, which can avoid the defect that the D2D data cannot be monitored.
- an embodiment of the present invention provides a communication monitoring method, and a packet Includes:
- the acquired D2D data is transmitted to the first device.
- an embodiment of the present invention further provides a communication monitoring method, including:
- the terminal belonging to the device to the device D2D receives the second message sent by the base station, and the second message is used to trigger the terminal belonging to the D2D to record the D2D data of the terminal;
- the terminal belonging to the D2D records the D2D data according to the second message; the terminal belonging to the D2D sends the recorded D2D data to the base station.
- an embodiment of the present invention further provides a base station, including:
- a receiver configured to receive a first message sent by the first device, where the first message is used to indicate that the D2D data of the terminal belonging to the device to the device D2D is monitored;
- a processor configured to acquire the D2D data according to the first message
- a transmitter configured to send the acquired D2D data to the first device.
- an embodiment of the present invention further provides a terminal, including:
- a receiver configured to receive a second message sent by the base station, where the second message is used to trigger the terminal to record device-to-device D2D data of the terminal;
- a processor configured to record the D2D data according to the second message
- a transmitter configured to send the recorded D2D data to the base station.
- the embodiment of the present invention receives the first message sent by the first device, where the first message is used to indicate that the D2D data of the terminal belonging to the D2D is monitored; and the D2D data is acquired according to the first message, and the acquired D2D data is sent.
- the purpose of monitoring D2D communication during D2D communication is realized, thereby avoiding the defect that the D2D data cannot be monitored when the terminal belonging to the D2D performs D2D communication.
- FIG. 1 is a schematic flowchart of a first embodiment of a communication monitoring method provided by the present invention
- FIG. 2 is a schematic flowchart of step S12 in the first embodiment
- Figure 3 is a flow chart showing the step S12 in the first embodiment
- FIG. 4 is a schematic flowchart of a second embodiment of a communication monitoring method provided by the present invention
- FIG. 5 is a schematic structural diagram of an embodiment of a base station provided by the present invention
- FIG. 6 is a schematic structural diagram of an embodiment of a terminal provided by the present invention. detailed description
- FIG. 1 is a schematic flowchart of a first embodiment of a communication monitoring method according to the present invention.
- the execution body of the method flow of FIG. 1 may be a base station, for example: may be in 3GPP (The 3rd Generation Partnership Project, third generation cooperation)
- the ENB (Evolved Node B) in the Partner Program) the method flow of Figure 1 includes:
- Step S11 Receive a first message sent by the first device, where the first message is used to indicate that the D2D data of the terminal belonging to the D2D is monitored.
- the first device may be an MME (Mobility Management Entity), a PGW, an SGW, or a third-party client; for example: when the first device is an MME, and the execution body of the method flow in FIG. 1 is an ENB, the MME Sending a first message to the ENB through an interface with the ENB (the interface is referred to as an "S1" interface), and carrying the identity of the terminal belonging to the D2D that needs to be monitored in the message, to indicate that the ENB needs to be specifically monitored. D2D terminal.
- the third-party client is relative to the MME, the SGW, and the PGW.
- the MME, the SGW, and the PGW are devices in the core network, and the third-party clients refer to devices in the non-core network.
- the third-party client can be implemented by a notebook. After the notebook is connected to the base station, the first message can be sent to the base station to instruct the base station to monitor the D2D data of the terminal belonging to the D2D.
- the D2D data refers to data that is directly transmitted from the terminal to the terminal and does not need to be forwarded by the network.
- Step S12 Acquire the D2D data according to the first message.
- D2D data There are a plurality of methods for obtaining the D2D data, for example: actively uploading D2D data by a terminal belonging to the D2D or receiving the terminal belonging to the D2D according to scheduling information used by the terminal belonging to the D2D when performing D2D communication. D2D data.
- Step S13 the D2D data acquired in step S12 is sent to the first device.
- the signaling for implementing D2D communication is carried in whole or in part by the network (including: base station, MME, etc.), so the network can know when the terminal is D2D communication is performed to monitor the D2D data of the terminal at an appropriate timing.
- the first message for monitoring the D2D data of the terminal belonging to the D2D is sent to the base station, and the base station obtains the D2D data of the terminal belonging to the D2D according to the received first message, so that the base station implements the monitoring of the D2D data.
- the defect that the D2D data cannot be monitored due to the D2D data not being transmitted through the network is avoided; the embodiment of the present invention is non-rich and perfects the existing monitoring mode.
- step S12 of the first embodiment includes:
- Step S21 Send a second message to the terminal that belongs to the D2D, where the second message is used to trigger the terminal belonging to the D2D to record the D2D data.
- the terminal belonging to the D2D may record the D2D data in a cache manner.
- the second message further includes a recording policy used when the terminal belonging to the D2D records the D2D data; the terminal belonging to the D2D records the D2D data according to the recording policy pair included in the first message.
- the recording policy in the second message includes: The amount of data of the D2D data to be recorded; for example, the recording policy in the second message indicates that the terminal belonging to the D2D needs to record 1024 bytes of D2D data.
- the recording policy in the second message includes: the terminal belonging to the D2D needs to record the D2D data in the T time, where T is the time period; for example: the recording policy indication in the second message belongs to the D2D The terminal needs to record a total of 10 minutes of D2D data between 12: 00 and 12: 10.
- a recording strategy used by a terminal belonging to the D2D to record D2D data can be reasonably set as needed, for example, indicating the length of time required to save the recorded D2D data in the recording policy, etc. This embodiment does not limit the specific recording strategy.
- Step S22 Receive the D2D data reported by the terminal belonging to the D2D.
- the terminal belonging to the D2D may passively report the recorded D2D data to the base station when receiving the indication of the D2D data reported by the base station; or, when the D2D data is recorded, actively report the recorded D2D data to the base station; or At other reasonable times, the D2D data recorded by the terminal belonging to the D2D is actively or passively recorded, for example, the base station indicates the D2D data recorded by the terminal belonging to the D2D when it is idle. It can be understood that, after the terminal belonging to the D2D reports the recorded D2D data to the base station, the D2D data can be deleted or saved for a period of time, and then deleted.
- the D2D data is recorded by the terminal belonging to the D2D, and then sent to the base station; the monitoring of the D2D data is mainly implemented by the terminal itself, so that the impact on the base station is small, and the burden on the base station is not increased.
- the step S12 includes:
- Step S31 Obtain scheduling information used by the terminal belonging to the D2D to perform D2D communication.
- the D2D-based terminal may determine the scheduling information used in the D2D communication by the terminal belonging to the D2D when the D2D communication is established, and the scheduling information includes: the radio resource; or the base station belongs to the D2D.
- the terminal allocates scheduling information used in D2D communication; therefore, step S31 may have two implementation manners when acquiring scheduling information used by the terminal belonging to the D2D when performing D2D communication, and one is when the scheduling information is from the terminal belonging to the D2D.
- step S31 includes: sending a third message to the terminal belonging to the D2D, where the third message is used And indicating that the terminal that belongs to the D2D reports the scheduling information, and receives the scheduling information that is reported by the terminal that belongs to the D2D.
- the step S31 includes: acquiring, by the base station, the terminal that belongs to the D2D.
- the scheduling information used in the D2D communication for example, acquires scheduling information allocated to the terminal belonging to the D2D from the scheduling information allocation record buffered by the base station.
- Step S32 receiving D2D data according to the scheduling information acquired in step S31.
- Step S31 obtains the scheduling information used by the terminal belonging to the D2D when performing the D2D communication, and the step S32 receives the D2D data of the terminal belonging to the D2D according to the scheduling information, thereby achieving the purpose of monitoring the D2D data.
- step S32 uses the default demodulation method to solve the received D2D data when receiving the D2D data according to the scheduling information. If the data transmitted on the scheduling information is in a special modulation mode, for example: the modulation mode is determined by the terminal belonging to the D2D or allocated by the base station, then step S32 is also required to acquire the D2D data according to the scheduling information.
- Demodulating information for example: using the demodulation information required to upload the terminal belonging to the D2D or obtaining the required demodulation information from the record of the base station; after obtaining the required demodulation information, using the obtained demodulation information
- the D2D data received according to the scheduling information is demodulated.
- step S32 also needs to obtain corresponding encryption information. (for example: key information or encryption algorithm information), thereby facilitating the obtained key information or encryption algorithm information to decrypt the D2D data received according to the scheduling information, and similarly, if the encrypted information is determined by the terminal belonging to the D2D, the indication belongs to The terminal of the D2D uploads the encrypted information; if the encrypted information is allocated by the base station, the encrypted information is obtained by the base station.
- encryption information for example: key information or encryption algorithm information
- the scheduling information, demodulation information, or encrypted information used by the terminal belonging to the D2D in performing D2D communication may be partially allocated by the base station, and partially determined by the terminal belonging to the D2D, and thus the foregoing
- the scheduling information, demodulation information, or encrypted information that is indicated by the terminal belonging to the D2D in the indication is the portion determined by the terminal belonging to the D2D.
- the base station receives the D2D data according to the transmission resource used in the D2D communication by the terminal belonging to the D2D, thereby implementing the monitoring of the D2D data;
- the monitoring is mainly implemented by the base station, so that the influence of the monitoring on the terminal belonging to the D2D can be reduced.
- FIG. 4 is a schematic flowchart of a second embodiment of the communication monitoring method of the present invention.
- the execution body of FIG. 4 may be a terminal belonging to D2D, the terminal belonging to the D2D may be a mobile phone and a PDA (Personal Digital Assistant), etc.; the method flow of the specific map 4 includes :
- Step S41 The terminal belonging to the D2D receives the second message sent by the base station, where the second message is used to trigger the terminal belonging to the D2D to record the D2D data of the terminal.
- Step S42 the terminal belonging to the D2D records the D2D data according to the second message.
- step S42 may record the D2D data in a cached manner.
- the second message sent by the base station further includes a recording strategy used by the terminal belonging to the D2D to record the D2D data of the terminal; and step S42, when recording the D2D data, the D2D data according to the recording policy in the second message. Make a record.
- the recording policy in the second message includes: the amount of data of the D2D data that the terminal belonging to the D2D needs to record, for example, the recording policy indicates that the terminal belonging to the D2D needs to record 1024 bytes of D2D data.
- the recording policy in the second message includes: The terminal belonging to the D2D needs to record the D2D data in the T time, where T is a time period, for example, the recording policy indicates that the terminal belonging to the D2D needs to be the pair 12: A total of 5 minutes of D2D data was recorded between 10 and 12:15. It can be understood that a recording strategy used by a terminal belonging to the D2D to record the D2D data can be reasonably set according to requirements, for example, indicating the length of time required to save the recorded D2D data in the recording policy, etc. Wait.
- Step S43 The terminal belonging to the D2D sends the recorded D2D data to the base station.
- step S43 may be passively recording D2D data to the base station when receiving an indication of the D2D data reported by the base station; or, step S43 may actively record the step S42 when the recording of the D2D data is completed in step S42.
- the D2D data is sent to the base station; or the step S43 reports the recorded D2D data actively or passively at other reasonable times, for example, when receiving the indication that the D2D data is sent by the base station when the base station is idle, reporting the D2D data recorded in step S42 to the base station.
- the D2D data can be deleted or saved for a predetermined period of time (for example: one hour, Delete after one day).
- the D2D data is recorded by the terminal belonging to the D2D, and then sent to the base station, thereby realizing the monitoring of the D2D data. Since the monitoring of the D2D data is mainly implemented by the terminal, the impact on the base station is small, and the base station is not emphasized. burden.
- the communication monitoring method of the embodiment of the present invention is described in the foregoing method flow.
- the following describes the base station and the terminal in the embodiment of the present invention, and the system consisting of the base station and the terminal.
- the base station 5 may be an ENB called 3GPP. Specifically, the base station 5 includes:
- the receiver 51 is configured to receive a first message sent by the first device, where the first message is used to indicate that the D2D data of the terminal belonging to the D2D is monitored.
- the first device may be an MME, a PGW, an SGW, or a third-party client; for example, when the first device is an MME and the base station 5 is an ENB, the MME passes an interface with the ENB (the interface is referred to as "S1" The interface sends a first message to the ENB, and carries the identity of the terminal that belongs to the D2D to be monitored in the message, to indicate that the terminal that the ENB needs to specifically listen to belongs to the D2D.
- the third-party client is a device in the core network with respect to the MME, the SGW, and the PGW, and the third-party client refers to the device in the non-core network.
- the third-party client can be implemented by a notebook. After the notebook is connected to the base station, the first message can be sent to the base station to instruct the base station to monitor the D2D data of the terminal belonging to the D2D.
- the D2D data refers to data that is directly forwarded from the terminal to the terminal and does not need to be forwarded by the network.
- the processor 52 is configured to acquire D2D data according to the first message.
- the manner in which the monitoring module 52 acquires the D2D data is as follows.
- the terminal that belongs to the D2D actively uploads the D2D data or receives the D2D according to the scheduling information used by the terminal belonging to the D2D when performing the D2D communication.
- D2D data of the terminal D2D data of the terminal.
- the transmitter 53 is configured to send the D2D data acquired by the processor 52 to the first device.
- the signaling for implementing D2D communication is carried in whole or in part by the network (including: base station, MME, etc.), so the network can know when the terminal is D2D communication, so that it can be monitored at the right time Perform D2D data generated by D2D communication.
- the first message for monitoring the D2D data of the terminal belonging to the D2D is sent to the base station, and the base station obtains the D2D data of the terminal belonging to the D2D according to the received first message, so that the base station implements the monitoring of the D2D data.
- the base station obtains the D2D data of the terminal belonging to the D2D according to the received first message, so that the base station implements the monitoring of the D2D data.
- the transmitter 51 is further configured to send a second message to the terminal belonging to the D2D, where the second message is used to trigger the terminal belonging to the D2D to record the D2D data of the terminal.
- the second message further includes a recording policy used by the terminal belonging to the D2D to record the D2D data; the terminal belonging to the D2D records the D2D data according to the recording policy in the second message, and implements monitoring of the D2D data.
- the recording policy may include: the amount of data of the D2D data to be recorded, and the size of the data volume may be flexibly set according to requirements, which is not limited in this embodiment; the recording strategy may further include: need to be T (T is a time period) The D2D data is recorded in the time, and the T can be set to 12: 00 - 12: 05 or 13: 00 ⁇ 14: 00 or other, which is not specifically limited in this embodiment; the recording strategy can also be reasonably set according to actual needs. For example, in the case where the recording policy indicates that the recorded D2D data needs to be saved, the specific content of the recording policy is not limited in this embodiment.
- the receiver 53 is further configured to receive D2D data reported by the terminal belonging to the D2D.
- the terminal that belongs to the D2D can passively report the D2D data to the base station when receiving the indication of the D2D data of the base station; or, when the D2D data is recorded, actively report the recorded D2D data to the base station; or The recorded D2D data is reported to the base station actively or passively at other reasonable times.
- the D2D data is passively reported to the base station. It can be understood that after the D2D data is reported by the terminal belonging to the D2D, the D2D data that has been reported can be deleted immediately or the D2D data can be deleted for a predetermined period of time (for example, one hour, one day).
- the D2D data is recorded by the terminal belonging to the D2D, and then the D2D data is reported to the base station, thereby realizing the monitoring of the D2D data. Since the monitoring of the D2D data in the present embodiment is recorded by the terminal belonging to the D2D, The base station can spend less resources on monitoring D2D data, thereby reducing the burden on the base station.
- the processor 52 is further configured to acquire scheduling information used by the terminal belonging to the D2D when performing D2D communication, and receive D2D data according to the scheduling information.
- the scheduling information may be determined by the terminal belonging to the D2D, or may be allocated by the base station to the terminal belonging to the D2D. Therefore, when the scheduling information is determined by the terminal that belongs to the D2D, the processor 52 sends a third message to the terminal that belongs to the D2D, where the third message is used to indicate that the terminal that belongs to the D2D reports the scheduling information, and is received by the terminal.
- the machine 51 receives the scheduling information reported by the terminal belonging to the D2D, and the processor 52 acquires the scheduling information from the receiver 51.
- the processor 52 acquires the scheduling information through the base station.
- the D2D data of the terminal belonging to the D2D is received according to the scheduling information, so that the D2D data is monitored. It can be understood that, if the data transmitted on the scheduling information uses the default modulation mode, the processor 52 demodulates the D2D data by using the default demodulation information when receiving the D2D data according to the scheduling information; The data to be transmitted uses a special modulation method.
- the special modulation method includes: a modulation method determined by a terminal belonging to the D2D or a modulation mode allocated by the base station to the terminal belonging to the D2D when performing D2D communication, and the processor 52 according to the scheduling
- the D2D data is demodulated by using the demodulation information corresponding to the special modulation mode.
- the terminal corresponding to the D2D is indicated.
- the demodulation information is obtained when the special modulation mode is allocated by the base station to the terminal belonging to the D2D, and the corresponding demodulation information is acquired by the base station.
- the D2D data transmitted on the scheduling information can be encrypted for security reasons. Therefore, in this case, the processor 52 also needs to obtain the encrypted D2D data. Encrypted information used (including but not limited to: key), and facilitates decryption of the D2D data by the obtained encrypted information; similarly, if the encrypted information is determined by the terminal belonging to the D2D, the terminal belonging to the D2D is instructed to upload the encrypted information; if encrypted The information is allocated by the base station to the terminal belonging to the D2D, and the encrypted information is obtained by the base station.
- Encrypted information used including but not limited to: key
- the scheduling information, the demodulation information or the encrypted information used by the terminal belonging to the D2D for D2D communication may be all or partially allocated by the base station. All or part of the terminal belonging to the D2D is determined, so that the scheduling information, demodulation information or encrypted information uploaded by the terminal belonging to the D2D indicated in the above refers to the part determined by the terminal belonging to the D2D.
- the D2D data is monitored; since the monitoring of the D2D data is mainly received by the base station according to the transmission resource. The D2D data does not need to belong to the D2D terminal and spends any resources on the monitoring of the D2D data, so the impact on the terminal belonging to the D2D is small.
- FIG. 6 is a schematic structural diagram of an embodiment of a terminal according to the present invention.
- the terminal 6 may be a mobile phone or a PDA, etc.
- the terminal 6 includes:
- the receiver 61 is configured to receive a second message sent by the base station, where the second message is used to trigger the terminal 6 to record D2D data.
- the processor 62 is configured to record the terminal (for example, by caching) according to the second message
- the second message includes a recording policy used when the terminal 6 records the D2D data; when the receiver 61 receives the second message, the processor 62 records the D2D data according to the recording policy in the second message.
- the recording policy may include: the amount of data of the D2D data that the terminal 6 needs to record, for example, the recording policy indicates that the terminal 6 needs to record 1024 bytes of D2D data.
- the recording policy may further include: The terminal 6 needs to record the D2D data in the T (T is a time period) time, for example, the recording policy indicates that the terminal 6 needs to record a total of 10 minutes of D2D data between 12:00 and 12:10. It can be understood that those skilled in the art can reasonably set the recording strategy used by the terminal 6 when recording D2D data, for example, indicating the length of time required to save the recorded D2D data in the recording policy, and the like.
- the transmitter 63 is configured to send the D2D data recorded by the processor 62 to the base station.
- the transmitter 63 receives an indication of the D2D data reported by the base station at the receiver 61, and transmits the D2D data recorded by the processor 62 to the base station; or, the transmitter 63 processes the D2D data when the processor 62 completes the recording of the D2D data.
- the D2D data recorded by the processor 62 is sent to the base station; or the transmitter 63 may also transmit the D2D data recorded by the processor 62 to the base station at other reasonable timings, for example, when the receiver 61 receives the D2D data reporting indication sent when the base station is idle.
- the processor 62 immediately deletes the reported D2D data or deletes the D2D data for a predetermined period of time (for example, one day).
- the D2D data is recorded by the terminal 6 and sent to the base station, thereby realizing the D2D.
- the monitoring of the data, and such monitoring is mainly implemented by the terminal 6, so the influence on the base station is small, and the burden on the base station is not increased.
- the storage medium may be a magnetic disk, an optical disk, or a read-only storage memory.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明实施例公开了一种通信监听方法,包括:接收第一装置发送的第一消息,所述第一消息用于指示监听属于装置到装置D2D的终端的D2D 数据;根据所述第一消息,获取所述D2D数据;将所述获取的D2D数据发送至所述第一装置。本发明实施例还公开了一种基站和终端。采用本发明,可以避免现有中无法对D2D数据进行监听的缺陷。
Description
通信监听方法、 基站和终端 本申请要求于 2011年 12月 7日提交中国专利局、 申请号为
CN201110403036.0, 发明名称为 "通信监听方法、 基站和终端" 的 中国专利申请的优先权, 其全部内容通过引用结合在本申请中。 技术领域
本发明涉及移动通信技术, 尤其涉及一种通信监听方法、 基站和终端。 背景技术
公安机关或其它部门出于安全的需求, 在法律的授权范围内可以对用 户的通信内容进行监听, 此种监听被称为 "合法监听"。 目前, 由于用户借 助于移动通信网等进行通信时, 诸如用户的语音等数据均由网络进行承载; 例如: 当用户 A与用户 B建立呼叫之后,用户 A的语音发送给用户 A所在 的基站, 然后由用户 A的基站将用户 A的语音发送给 PGW ( Packet Data Network Gateway, 分组数据网关)、 SGW(Seving Gate Way, 服务网关), 然 后由 PGW可 SGW转发给用户 B所在的基站,由用户 B所在的基站发送给 用户 B, 实现用户 A的语音到用户 B的传递, 用户 B的语音传递给用户 A 时类似; 由于用户的语音等数据由网络承载, 因此现有中需要对用户的语 音等数据进行监听时, 直接从 SGW或 PGW中获取用户的语音等数据, 实 现对用户的监听。然而,随着移动通信技术的发展,基于位置的 D2D(Device to Device, 装置到装置)思想正在被讨论且已有一些应用产生, D2D思想的 核心是假若用户之间的距离足够近时, 用户之间的数据可以直接进行传递, 而不通过网络 载。 发明内容
本发明实施例所要解决的技术问题在于, 提供一种通信监听方法、 基 站和终端, 可以避免无法对 D2D数据进行监听的缺陷。
为了解决上述技术问题, 本发明实施例提供了一种通信监听方法, 包
括:
接收第一装置发送的第一消息, 所述第一消息用于指示监听属于装置 到装置 D2D的终端的 D2D数据;
根据所述第一消息, 获取所述 D2D数据;
将所述获取的 D2D数据发送至所述第一装置。
相应地, 本发明实施例还提供一种通信监听方法, 包括:
属于装置到装置 D2D的终端接收基站发送的第二消息, 所述第二消息 用于触发所述属于 D2D的终端记录所述终端的 D2D数据;
所述属于 D2D的终端根据所述第二消息, 记录所述 D2D数据; 所述属于 D2D的终端向所述基站发送所述记录的 D2D数据。
相应地, 本发明实施例还提供了一种基站, 包括:
接收机, 用于接收第一装置发送的第一消息, 所述第一消息用于指示 监听属于装置到装置 D2D的终端的 D2D数据;
处理器, 用于根据所述第一消息, 获取所述 D2D数据;
发送机, 用于将所述获取的 D2D数据发送至所述第一装置。
相应地, 本发明实施例还提供了一种终端, 包括:
接收机, 用于接收基站发送的第二消息, 所述第二消息用于触发所述 终端记录所述终端的装置到装置 D2D数据;
处理器, 用于根据所述第二消息, 记录所述 D2D数据;
发送机, 用于将所述记录的 D2D数据发送至所述基站。
实施本发明实施例, 具有如下有益效果:
本发明实施例通过接收第一装置发送的第一消息, 该第一消息用于指 示监听属于 D2D的终端的 D2D数据; 并根据第一消息, 获取所述 D2D数 据,以及将获取的 D2D数据发送至第一装置,实现了对 D2D通信时的 D2D 通信进行监听的目的,从而避免了现有中当属于 D2D的终端进行 D2D通信 时, 无法对 D2D数据进行监听的缺陷。 附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对
实施例或现有技术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是本发明的一些实施例, 对于本领域普通技术人员 来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他的附 图。
图 1是本发明提供的通信监听方法的第一实施例的流程示意图; 图 2是关于第一实施例中步骤 S12的流程示意图;
图 3是关于第一实施例中步骤 S12的流程示意图;
图 4是本发明提供的通信监听方法的第二实施例的流程示意图; 图 5是本发明提供的基站的实施例的结构示意图;
图 6是本发明提供的终端的实施例的结构示意图。 具体实施方式
下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进 行清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没 有作出创造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的 范围。
请参考图 1 , 是本发明的通信监听方法的第一实施例的流程示意图, 图 1 的方法流程的执行主体可以是基站, 例如: 可以是在 3GPP ( The 3rd Generation Partnership Project,第三代合作伙伴计划)中称作的 ENB( Evolved Node B, 演进型基站), 图 1的方法流程包括:
步骤 S11 ,接收第一装置发送的第一消息, 该第一消息用于指示监听属 于 D2D的终端的 D2D数据。
其中, 第一装置可以是 MME ( Mobility Management Entity, 移动性管 理实体)、 PGW、 SGW或第三方客户端; 例如: 当第一装置是 MME, 图 1 的方法流程的执行主体是 ENB时, MME通过与 ENB之间的接口 (该接口 被称为 "S1" 接口)向 ENB发送第一消息, 并在该消息中携带需要监听的 属于 D2D的终端的身份标识, 以指示 ENB需要具体监听的属于 D2D的终 端。 需要说明的是, 第三方客户端是相对于 MME、 SGW和 PGW而言,
MME、 SGW和 PGW是核心网中的设备, 第三方客户端是指非核心网中的 设备。 例如: 第三方客户端可以由一台笔记本实现, 将该笔记本与基站相 连接之后, 可以向基站发送第一消息, 以指示基站对属于 D2D 的终端的 D2D数据进行监听。 需要说明的是, D2D数据是指直接由终端到终端, 不 需要网络进行转发的数据。
步骤 S12, 根据所述第一消息, 获取所述 D2D数据。
其中, 获取所述 D2D数据的方式有许多种, 例如: 由属于 D2D的终端 主动上传 D2D数据或者根据所述属于 D2D的终端在进行 D2D通信时所使 用的调度信息, 接收所述属于 D2D的终端的 D2D数据。
步骤 S13 , 将步骤 S12获取的 D2D数据发送至第一装置。
本实施例需要说明的是在 D2D的思想中, 终端在进行 D2D通信时, 实现 D2D通信的信令会全部或部分由网络(包括: 基站、 MME等)承载, 因此网络可以知晓终端何时在进行 D2D通信, 从而在合适的时机对终端的 D2D数据进行监听。
本发明实施例通过向基站发送用于监听属于 D2D的终端的 D2D数据的 第一消息, 基站根据接收的第一消息, 获取属于 D2D的终端的 D2D数据, 从而由基站实现了对 D2D数据的监听,避免现有中由于 D2D数据不通过网 络承载, 而导致的无法对 D2D数据进行监听的缺陷; 本发明实施例非富和 完善了现有的监听方式。
请参考图 2, 是关于第一实施例的步骤 S12的具体描述, 所述步骤 S12 包括:
步骤 S21 , 向所述属于 D2D的终端发送第二消息, 所述第二消息用于 触发所述属于 D2D的终端记录所述 D2D数据。
具体地,在属于 D2D的终端接收到第二消息之后,所述属于 D2D的终 端可以釆用緩存的方式记录 D2D数据。
进一步地,在第二消息中还包括有属于 D2D的终端记录 D2D数据时所 釆用的记录策略; 属于 D2D的终端根据第一消息中包括的记录策略对记录 D2D数据。
在一种实施方式中, 第二消息中的记录策略包括: 属于 D2D的终端需
要记录的 D2D数据的数据量; 例如, 第二消息中的记录策略指示属于 D2D 的终端需要记录 1024字节的 D2D数据。 在另一种实施方式中, 第二消息 中的记录策略包括: 属于 D2D的终端需要对 T时间内的 D2D数据进行记 录, 其中 T为时间段; 例如: 第二消息中的记录策略指示属于 D2D的终端 需要对 12: 00 ~ 12: 10之间总共 10分钟的 D2D数据进行记录。 可以理解 的是, 本领域技术人员可以根据需要, 合理地设置属于 D2D 的终端记录 D2D数据时所釆用的记录策略,例如:在记录策略中指示需要对记录的 D2D 数据保存的时长, 等等; 本实施例不对具体的记录策略进行限定。
步骤 S22 , 接收所述属于 D2D的终端的上报的所述 D2D数据。
具体地,属于 D2D的终端可以在接收到基站的上报 D2D数据的指示时, 被动地向基站上报记录的 D2D数据; 或者, 在完成记录 D2D数据时, 主动 地向基站上报记录的 D2D数据;或者在其它合理的时机由属于 D2D的终端 主动或被动地上^艮记录的 D2D数据, 例如: 基站在空闲时指示属于 D2D 的终端上报记录的 D2D数据。 可以理解的是, 属于 D2D的终端将记录的 D2D数据上报给基站之后, 可以立即将该 D2D数据删除或者保存该 D2D 数据一段时间后, 将其删除。
本实施例由属于 D2D的终端记录 D2D数据,然后发送至基站;对 D2D 数据的监听主要由终端自身实现, 从而对基站的影响较小, 不会加重基站 的负担。
请参考图 3 ,是关于第一实施例的步骤 S12的另一具体描述, 所述步骤 S12包括:
步骤 S31 ,获取所述属于 D2D的终端在进行 D2D通信时所使用的调度 信息。
其中, 基于 D2D的思想, 属于 D2D的终端在建立 D2D通信时, 可以 由属于 D2D的终端确定在 D2D通信时所使用的调度信息,该调度信息包括: 无线资源;也可以由基站为属于 D2D的终端分配在 D2D通信时所使用的调 度信息; 因此步骤 S31在获取属于 D2D的终端在进行 D2D通信时所使用 的调度信息时可能有两种实现方式, 一种是当调度信息由属于 D2D的终端 确定时, 步骤 S31包括: 向属于 D2D的终端发送第三消息, 该第三消息用
于指示所述属于 D2D的终端上报调度信息,并接收所述属于 D2D的终端上 报的调度信息; 另一种是当调度信息由基站为其分配时, 步骤 S31 包括: 通过基站获取属于 D2D的终端在进行 D2D通信时所使用的调度信息,例如: 从基站緩存的调度信息分配记录中获取分配给所述属于 D2D的终端的调度 信息。
步骤 S32, 根据步骤 S31获取的调度信息, 接收 D2D数据。
其中, 步骤 S31获得了属于 D2D的终端在进行 D2D通信时所使用调 度信息时, 步骤 S32根据该调度信息, 接收所述属于 D2D的终端的 D2D 数据, 从而实现了对 D2D数据的监听的目的。 此处需要说明的是, 如果在 调度信息上传输的数据釆用默认的调制方式, 则步骤 S32在根据调度信息 接收到 D2D数据时, 釆用默认的解调方式对接收到的 D2D数据进行解调; 如果在调度信息上传输的数据釆用特别的调制方式, 例如: 由属于 D2D的 终端确定调制方式或者由基站为其分配, 那么步骤 S32还要根据调度信息 获取为接收 D2D数据所需的解调信息,例如: 釆用指示属于 D2D的终端上 传所需的解调信息或从基站的记录中获得所需的解调信息; 在获取所需的 解调信息后, 利用获得的解调信息解调根据调度信息接收到的 D2D数据。
可以理解的是,属于 D2D的终端在进行 D2D通信时,可能出于安全的 需要, 对在调度信息上传输的 D2D数据进行加密处理, 在此种情况上, 步 骤 S32还需要获得相应的加密信息(例如: 密钥信息或加密算法信息), 从 而利于获得的密钥信息或加密算法信息对根据调度信息接收的 D2D数据进 行解密, 类似地, 如果加密信息由属于 D2D的终端确定, 则指示属于 D2D 的终端上传加密信息; 如果加密信息由基站为其分配, 则通过基站获得加 密信息。
需要说明的是, 在建立 D2D通信时, 属于 D2D的终端在进行 D2D通 信时所使用的调度信息、 解调信息或加密信息可能部分由基站为其分配, 部分由属于 D2D的终端确定,因此上述中的指示属于 D2D的终端上传的调 度信息、 解调信息或加密信息是指由属于 D2D的终端确定的部分。
本实施例基站根据属于 D2D的终端进行 D2D通信时所使用的传输资 源, 接收 D2D数据, 从而实现了对 D2D数据的监听; 由于对 D2D数据的
监听主要由基站实现, 因此可以减少监听对属于 D2D的终端的影响。
请参考图 4, 是本发明的通信监听方法的第二实施例的流程示意图, 图
4与图 1不同的是, 图 4的执行主体可以是属于 D2D的终端, 该属于 D2D 的终端可以是手机和 PDA ( Personal Digital Assistant, 个人数字助理), 等 等; 具体地图 4的方法流程包括:
步骤 S41 , 属于 D2D的终端接收基站发送的第二消息, 所述第二消息 用于触发所述属于 D2D的终端记录所述终端的 D2D数据。
步骤 S42, 所述属于 D2D的终端根据所述第二消息, 记录所述 D2D数 据。
具体地, 步骤 S42可以釆用緩存的方式记录 D2D数据。
进一步地, 基站发送的第二消息中还包括属于 D2D的终端记录所述终 端的 D2D数据时所釆用的记录策略; 步骤 S42在记录 D2D数据时, 根据 第二消息中的记录策略对 D2D数据进行记录。
在一种实施方式中, 第二消息中的记录策略包括: 属于 D2D的终端需 要记录的 D2D数据的数据量,例如记录策略指示属于 D2D的终端需要记录 1024字节的 D2D数据。在另一种实施方式中,第二消息中的记录策略包括: 属于 D2D的终端需要对 T时间内的 D2D数据进行记录,其中 T为时间段, 例如记录策略指示属于 D2D的终端需要对 12: 10 ~ 12: 15之间总共 5分 钟的 D2D数据进行记录。 可以理解的是, 本领域技术人员可以根据需要, 合理地设置属于 D2D的终端记录所述 D2D数据时所釆用的记录策略,例如 在记录策略中指示需要对记录的 D2D数据保存的时长, 等等。
步骤 S43 , 所述属于 D2D的终端向基站发送所述记录的 D2D数据。 具体地, 步骤 S43可以是接收到基站的上报 D2D数据的指示时, 被动 地向基站上 记录的 D2D数据; 或者, 步骤 S43可以在步骤 S42完成 D2D 数据的记录时, 主动地将步骤 S42记录的 D2D数据发送至基站; 或者步骤 S43在其它合理的时机主动或被动地上报记录的 D2D数据, 例如当接收到 基站在空闲时发送的上报 D2D数据的指示时, 向基站上报步骤 S42记录的 D2D数据。 另外, 需要说明的是属于 D2D的终端将记录的 D2D数据发送 至基站后, 可以立即删除该 D2D数据或者保存预定时长(例如: 一小时、
一天)后删除。
本实施例由属于 D2D的终端记录 D2D数据,然后发送至基站,从而实 现了对 D2D数据的监听; 由于对 D2D数据的监听主要由终端实现, 因此对 基站的影响较小, 不会加重基站的负担。
上述从方法流程对本发明实施例的通信监听方法进行了举例说明, 下 面相应于上述的方法流程, 对本发明实施例的基站和终端, 以及由基站和 终端组成的系统进行举例介绍。
请参考图 5 , 是本发明的基站的实施例的结构示意图, 该基站 5可以是 在 3GPP中称作的 ENB, 具体地基站 5包括:
接收机 51 , 用于接收第一装置发送的第一消息, 该第一消息用于指示 监听属于 D2D的终端的 D2D数据。
其中, 第一装置可以是 MME、 PGW、 SGW或第三方客户端; 例如: 当第一装置是 MME,基站 5为 ENB时 , MME通过与 ENB之间的接口(该 接口被称为 "S1" 接口 )向 ENB发送第一消息, 并在该消息中携带需要监 听的属于 D2D的终端的身份标识, 以指示 ENB需要具体监听的属于 D2D 的终端。 此处需要说明的是, 第三方客户端是相对于 MME、 SGW和 PGW 而言, MME、 SGW和 PGW是核心网中的设备, 第三方客户端是指非核 心网中的设备。 例如: 第三方客户端可以由一台笔记本实现, 将该笔记本 与基站相连接之后, 可以向基站发送第一消息, 以指示基站对属于 D2D的 终端的 D2D数据进行监听。 需要说明的是, D2D数据是指直接由终端到终 端, 不需要网络进行转发的数据。
处理器 52, 用于根据第一消息, 获取 D2D数据。
其中,监听模块 52获取 D2D数据的方式有许多种,例如: 由属于 D2D 的终端主动上传 D2D数据或者根据所述属于 D2D的终端在进行 D2D通信 时所使用的调度信息, 接收所述属于 D2D的终端的 D2D数据。
发送机 53 , 用于将处理器 52获取的 D2D数据发送至第一装置。
本实施例需要说明的是在 D2D的思想中, 终端在进行 D2D通信时, 实现 D2D通信的信令会全部或部分由网络(包括: 基站、 MME, 等)承载, 因此网络可以知晓终端何时在进行 D2D通信, 从而可以在合适的时机监听
进行 D2D通信所产生的 D2D数据。
本发明实施例通过向基站发送用于监听属于 D2D的终端的 D2D数据的 第一消息, 基站根据接收的第一消息, 获取属于 D2D的终端的 D2D数据, 从而由基站实现了对 D2D数据的监听,避免现有中由于 D2D数据不通过网 络承载, 而导致的无法对 D2D数据进行监听的缺陷。
下面对图 5所示的基站实现 D2D数据的监听进行更具体的补充说明。 在一种实施方式中, 发送机 51 , 还用于向属于 D2D的终端发送第二消 息 ,所述第二消息用于触发所述属于 D2D的终端记录所述终端的 D2D数据。
具体地,第二消息中还包括有属于 D2D的终端记录 D2D数据时所釆用 的记录策略; 属于 D2D的终端根据第二消息中的记录策略记录 D2D数据, 实现对 D2D数据的监听。 例如: 记录策略可以包括: 需要记录的 D2D数据 的数据量, 该数据量的大小可以根据需要进行灵活设定, 本实施例不作限 定; 记录策略还可以包括: 需要对 T ( T为时间段) 时间内的 D2D数据进 行记录, 可以将 T设置为 12: 00 - 12: 05或者 13: 00 ~ 14: 00或其它, 本实施例不作具体的限定; 记录策略还可以根据实际需要被合理地设置, 例如在记录策略指示需要对记录的 D2D数据保存的时长, 本实施例不对记 录策略的具体内容进行限定。
接收机 53 , 还用于接收属于 D2D的终端上报的 D2D数据。
具体地,属于 D2D的终端可以在接收到基站的上报 D2D数据的指示时, 被动地向基站上报 D2D数据; 或者, 在完成 D2D数据的记录时, 主动地向 基站上报记录的 D2D数据; 或者, 在其它合理的时机主动或被动地向基站 上报记录的 D2D数据, 例如: 接收到基站空闲时发送的上报指示时, 被动 地向基站上报 D2D数据。 可以理解的是, 属于 D2D的终端上报 D2D数据 之后,可以即刻删除已上报的 D2D数据或者将 D2D数据再保存预定时长(例 如: 一小时、 一天)后删除。
本实施方式中由属于 D2D的终端记录 D2D数据, 然后将 D2D数据上 报给基站, 从而实实现了对 D2D数据的监听; 由于在本实施方式中对 D2D 数据的监听由属于 D2D的终端记录, 因此对基站可以花费较小的资源在实 现对 D2D数据的监听上, 从而降低了基站的负担。
在另一种实施方式中, 处理器 52, 还用于获取属于 D2D的终端在进行 D2D通信时所使用的调度信息; 及根据所述调度信息, 接收 D2D数据。
具体地, 在 D2D通信中, 调度信息可以由属于 D2D的终端确定, 也可 以由基站为属于 D2D的终端分配。因此当调度信息由属于 D2D的终端确定 时, 所述处理器 52向所述属于 D2D的终端发送第三消息, 所述第三消息 用于指示所述属于 D2D的终端上报调度信息,并由接收机 51接收属于 D2D 的终端上报的调度信息, 处理器 52从接收机 51 中获取调度信息。 当调度 信息由基站为属于 D2D的终端分配时, 则处理器 52通过基站获取调度信 息。
当处理器 52获取的调度信息时, 根据调度信息, 接收属于 D2D的终 端的 D2D数据, 实现对 D2D数据的监听。 可以理解的是, 如果在调度信息 上传输的数据釆用默认的调制方式,则处理器 52根据调度信息接收到 D2D 数据时, 釆用默认的解调信息解调 D2D数据; 如果在调度信息上传输的数 据釆用特殊的调制方式, 特殊的调制方式包括: 由属于 D2D的终端确定的 调制方式或由基站为属于 D2D的终端在进行 D2D通信时所分配的调制方 式, 则处理器 52根据调度信息接收到 D2D数据时, 釆用与特殊的调制方 式相应的解调信息解调 D2D数据 ,此处当特殊的调制方式由属于 D2D的终 端确定时, 则指示属于 D2D的终端上^艮相应的解调信息, 当特殊的调制方 式由基站为属于 D2D的终端分配时, 则通过基站获取相应的解调信息。 可 以理解的是, 属于 D2D的终端在进行 D2D通信时, 出于安全的需要, 可以 将在调度信息上传输的 D2D数据加密, 因此在此种情况下, 处理器 52还 要获得加密 D2D数据时所使用的加密信息 (包括但不限于: 密钥), 并利 于获得的加密信息解密 D2D数据; 类似地,如果加密信息由属于 D2D的终 端确定, 则指示属于 D2D的终端上传加密信息; 如果加密信息是由基站为 属于 D2D 的终端分配, 则通过基站获取加密信息; 需要说明的是, 属于 D2D的终端进行 D2D通信时所使用的调度信息、解调信息或加密信息可能 全部或部分由基站分配, 全部或部分由属于 D2D的终端确定, 因此上述中 的指示属于 D2D的终端上传的调度信息、 解调信息或加密信息是指由属于 D2D的终端确定的那部分。
本实施例通过获取属于 D2D的终端进行 D2D通信时所使用的传输资 源, 并根据传输资源, 接收 D2D数据, 实现了对 D2D数据的监听; 由于对 D2D数据的监听主要是由基站根据传输资源接收 D2D数据, 不需要属于 D2D终端花费任何资源在 D2D数据的监听上, 因此对属于 D2D的终端影 响面小。
请参考图 6, 是本发明的终端的实施例的结构示意图, 该终端 6可以是 手机或 PDA等; 具体地, 终端 6包括:
接收机 61 , 用于接收基站发送的第二消息, 所述第二消息用于触发所 述终端 6记录 D2D数据。
处理器 62, 用于才艮据第二消息, 记录(例如: 通过緩存的方式)终端
6的 D2D数据。
进一步地, 第二消息中包括有终端 6记录 D2D数据时所釆用的记录策 略; 当接收机 61接收到第二消息时, 处理器 62根据第二消息中的记录策 略, 记录 D2D数据。 具体地, 记录策略可以包括: 终端 6需要记录的 D2D 数据的数据量, 例如记录策略指示终端 6需要记录 1024字节的 D2D数据。 记录策略还可以包括: 终端 6需要对 T ( T为时间段) 时间内的 D2D数据 进行记录, 例如记录策略指示终端 6需要记录 12: 00 ~ 12: 10之间总共 10 分钟的 D2D数据。 可以理解的是, 本领域技术人员可以根据需要, 合理地 设置终端 6记录 D2D数据时所釆用的记录策略, 例如在记录策略中指示需 要对记录的 D2D数据保存的时长, 等等。
发送机 63 , 用于将处理器 62记录的 D2D数据发送至基站。
具体地, 发送机 63在接收机 61接收到基站的上报 D2D数据的指示, 将处理器 62记录的 D2D数据发送至基站; 或者, 发送机 63在处理器 62 完成 D2D数据的记录时, 将处理器 62记录的 D2D数据发送至基站; 或者 发送机 63也可以在其它合理的时机将处理器 62记录的 D2D数据发送至基 站, 例如在接收机 61接收到基站空闲时发送的 D2D数据上报指示时。 可 以理解的是, 发送机 62将 D2D数据上报给基站后, 处理器 62立即删除已 上报的 D2D数据或者将 D2D数据保存预定时长 (例如一天)后删除。
本实施例由终端 6记录 D2D数据, 并发送至基站, 从而实现了对 D2D
数据的监听, 并且此种监听主要由终端 6 实现, 因此对基站的影响小, 不 会加重基站的负担。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流 程, 是可以通过计算机程序来指令相关的硬件来完成, 所述的程序可存储 于一计算机可读取存储介质中, 该程序在执行时, 可包括如上述各方法的 实施例的流程。 其中, 所述的存储介质可为磁碟、 光盘、 只读存储记忆体
RAM )等。
以上所揭露的仅为本发明较佳实施例而已, 当然不能以此来限定本发 明之权利范围, 本领域普通技术人员可以理解实现上述实施例的全部或部 分流程, 并依本发明权利要求所作的等同变化, 仍属于发明所涵盖的范围。
Claims
1、 一种通信监听方法, 其特征在于, 包括:
接收第一装置发送的第一消息, 所述第一消息用于指示监听属于装置 到装置 D2D的终端的 D2D数据;
根据所述第一消息, 获取所述 D2D数据;
将所述获取的 D2D数据发送至所述第一装置。
2、 如权利要求 1所述的通信监听方法, 其特征在于, 所述第一装置包 括: 移动性管理实体 MME、 服务网关 SGW、 分组数据网关 PGW或第三方 客户端。
3、 如权利要求 1或 2所述的方法, 其特征在于, 所述根据所述第一消 息, 获取所述 D2D数据, 包括:
向所述属于 D2D的终端发送第二消息, 所述第二消息用于触发所述属 于 D2D的终端记录所述 D2D数据;
接收所述属于 D2D的终端上报的所述 D2D数据。
4、 如权利要求 3所述的方法, 其特征在于, 所述第二消息包括所述属 于 D2D的终端记录所述 D2D数据时所釆用的记录策略,所述记录策略包括: 需要记录的所述 D2D数据的数据量, 或需要对 T时间内的所述 D2D 数据进行记录, 所述 T为时间段。
5、 如权利要求 1或 2所述的方法, 其特征在于, 所述根据所述第一消 息, 获取所述 D2D数据, 包括:
获取所述属于 D2D的终端在进行 D2D通信时所使用的调度信息; 根据所述调度信息, 接收所述 D2D数据。
6、 如权利要求 5所述的方法, 其特征在于, 当所述调度信息由所述属于 D2D 的终端确定时, 所述获取所述属于 D2D的终端在进行 D2D通信时所使用的调度信息, 包括:
向所述属于 D2D的终端发送第三消息, 所述第三消息用于指示所述属 于 D2D的终端上报所述调度信息;
接收所述属于 D2D的终端上报的所述调度信息;
或
当所述调度信息由基站为所述属于 D2D的终端分配时, 所述获取所述 属于 D2D的终端在进行 D2D通信时所使用的调度信息, 包括:
通过所述基站获取所述调度信息。
7、 一种通信监听方法, 其特征在于, 包括:
属于装置到装置 D2D的终端接收基站发送的第二消息, 所述第二消息 用于触发所述属于 D2D的终端记录所述终端的 D2D数据;
所述属于 D2D的终端根据所述第二消息, 记录所述 D2D数据; 所述属于 D2D的终端向所述基站发送所述记录的 D2D数据。
8、 如权利要求 7所述的方法, 其特征在于, 所述第二消息包括所述属 于 D2D的终端记录所述 D2D数据时所釆用的记录策略,所述记录策略包括: 需要记录的所述 D2D数据的数据量, 或需要对 T时间内的所述 D2D数据 进行记录, 所述 T为时间段。
9、 一种基站, 其特征在于, 包括:
接收机, 用于接收第一装置发送的第一消息, 所述第一消息用于指示 监听属于装置到装置 D2D的终端的 D2D数据;
处理器, 用于根据所述第一消息, 获取所述 D2D数据;
发送机, 用于将所述获取的 D2D数据发送至所述第一装置。
10、 如权利要求 9 所述的基站, 其特征在于, 所述第一装置包括: 移 动性管理实体 MME、服务网关 SGW、分组数据网关 PGW或第三方客户端。
11、 如权利要求 9或 10所述的基站, 其特征在于,
所述发送机, 还用于向所述属于 D2D的终端发送第二消息, 所述第二 消息用于触发所述属于 D2D的终端记录所述 D2D数据;
所述接收机, 还用于接收所述属于 D2D的终端上报的所述 D2D数据。
12、 如权利要求 11所述的基站, 其特征在于, 所述第二消息包括所述 属于 D2D的终端记录所述 D2D数据时所釆用的记录策略,所述记录策略包 括: 需要记录的所述 D2D数据的数据量, 或需要对 T时间内的所述 D2D 数据进行记录, 所述 T为时间段。
13、 如权利要求 9或 10所述的基站, 其特征在于, 所述处理器, 还用 于:
获取所述属于 D2D的终端在进行 D2D通信时所使用的调度信息; 及 根据所述调度信息, 接收所述 D2D数据。
14、 如权利要求 13所述的基站, 其特征在于, 所述处理器, 还用于: 当所述调度信息由所述属于 D2D的终端确定时,向所述属于 D2D的终 端发送第三消息, 所述第三消息用于指示所述属于 D2D的终端上>¾所述调 度信息;
或
当所述调度信息由基站为所述属于 D2D的终端分配时, 通过所述基站 获取所述调度信息。
15、 一种终端, 其特征在于, 包括:
接收机, 用于接收基站发送的第二消息, 所述第二消息用于触发所述 终端记录所述终端的装置到装置 D2D数据;
处理器, 用于根据所述第二消息, 记录所述 D2D数据;
发送机, 用于将所述记录的 D2D数据发送至所述基站。
16、 如权利要求 15所述的终端, 其特征在于, 所述第二消息包括 所述属于 D2D的终端记录所述 D2D数据时所釆用的记录策略,所述记 录策略包括: 需要记录的所述 D2D数据的数据量, 或需要对 T时间内的所 述 D2D数据进行记录, 所述 T为时间段。
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP12856398.8A EP2768182B1 (en) | 2011-12-07 | 2012-12-07 | Method, base station, and terminal for communication surveillance |
| US14/299,525 US9544930B2 (en) | 2011-12-07 | 2014-06-09 | Communication interception method, base station, and terminal |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201110403036.0 | 2011-12-07 | ||
| CN201110403036.0A CN103152748B (zh) | 2011-12-07 | 2011-12-07 | 通信监听方法、基站和终端 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US14/299,525 Continuation US9544930B2 (en) | 2011-12-07 | 2014-06-09 | Communication interception method, base station, and terminal |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2013083074A1 true WO2013083074A1 (zh) | 2013-06-13 |
Family
ID=48550566
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2012/086157 Ceased WO2013083074A1 (zh) | 2011-12-07 | 2012-12-07 | 通信监听方法、基站和终端 |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US9544930B2 (zh) |
| EP (1) | EP2768182B1 (zh) |
| CN (1) | CN103152748B (zh) |
| WO (1) | WO2013083074A1 (zh) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3008884A1 (en) * | 2013-06-14 | 2016-04-20 | Nokia Solutions and Networks Oy | Lawful interception and security for proximity service |
| EP3100444A2 (en) * | 2014-01-29 | 2016-12-07 | Telefonaktiebolaget LM Ericsson (publ) | Method, apparatus and computer program for lawful intercept in device-to-device communication |
| EP3028429A4 (en) * | 2013-07-31 | 2017-03-29 | Nokia Technologies OY | Local communication interception |
| CN107852758A (zh) * | 2015-08-13 | 2018-03-27 | 株式会社Ntt都科摩 | 用户装置以及信号发送方法 |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9532213B2 (en) * | 2013-01-17 | 2016-12-27 | Intel IP Corporation | Lawful interception for device-to-device (D2D) communication |
| CN103974277B (zh) * | 2013-01-30 | 2018-03-23 | 电信科学技术研究院 | 一种数据传输方法、设备及系统 |
| WO2014198041A1 (en) * | 2013-06-13 | 2014-12-18 | Nokia Corporation | Reporting idle mode equipment data |
| KR101853750B1 (ko) * | 2013-10-25 | 2018-05-02 | 후아웨이 디바이스 (둥관) 컴퍼니 리미티드 | 장치 간(d2d) 통신 방법 및 장치 |
| CN105307194B (zh) | 2014-07-16 | 2019-12-06 | 中兴通讯股份有限公司 | D2d业务的优化处理方法及装置 |
| US10292130B2 (en) * | 2014-12-30 | 2019-05-14 | Lg Electronics Inc. | Method and apparatus for configuring bi-directional channel in wireless communication system |
| EP3101931B1 (en) * | 2015-06-04 | 2018-03-14 | BlackBerry Limited | Capturing data from a mobile device in an off-network environment |
| CN107534588B (zh) * | 2015-10-12 | 2020-08-14 | 泉州台商投资区天泰工业设计有限公司 | 监听方法和相关设备 |
| KR20200138746A (ko) * | 2018-04-02 | 2020-12-10 | 광동 오포 모바일 텔레커뮤니케이션즈 코포레이션 리미티드 | 정보 보고 방법, 단말 기기, 네트워크 기기 및 컴퓨터 저장 매체 |
| CN113615273A (zh) * | 2019-01-21 | 2021-11-05 | 中兴通讯股份有限公司 | 无线通信中的资源指示和选择方案 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1719788A (zh) * | 2004-07-07 | 2006-01-11 | 中兴通讯股份有限公司 | 软交换监听的呼叫控制及业务监听方法 |
| US7079488B1 (en) * | 2001-03-17 | 2006-07-18 | Cisco Technology, Inc. | Method and apparatus for modifying the bandwidth of an established ATM call in response to an identification of the contents of the call |
| CN101753526A (zh) * | 2008-12-19 | 2010-06-23 | 华为技术有限公司 | 一种监听方法、设备和系统 |
Family Cites Families (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1210798B1 (en) | 1999-09-07 | 2009-12-23 | Nokia Corporation | Ordered delivery of intercepted data |
| JP3686038B2 (ja) | 2000-02-11 | 2005-08-24 | ノキア コーポレイション | 通信ネットワークにおいて監視される当事者に関する識別情報を得るための方法及びシステム |
| US7283521B1 (en) | 2000-10-26 | 2007-10-16 | Nortel Networks Limited | System and method for reporting communication related information in a packet mode communication |
| ATE438238T1 (de) | 2001-05-16 | 2009-08-15 | Nokia Corp | Verfahren und system zur ermöglichung eines legitimen abfangens von verbindungen, wie zum beispiel sprache-über-internet-protokoll-anrufen |
| ES2229073T3 (es) | 2002-08-08 | 2005-04-16 | Alcatel | Interceptacion legal de llamadas voip en redes basadas en ip. |
| DE10323006A1 (de) * | 2003-05-21 | 2004-12-23 | Siemens Ag | Zentrale Abhör- und Auswerteinheit |
| DE10324872B4 (de) | 2003-06-02 | 2005-04-14 | Siemens Ag | Verfahren und Vorrichtungen zum Abhören von Teilnehmern eines Telekommunikationsnetzes bei der Teilnahme an Gruppenrufverbindungen |
| US7447909B2 (en) | 2003-06-05 | 2008-11-04 | Nortel Networks Limited | Method and system for lawful interception of packet switched network services |
| US7738384B2 (en) | 2004-03-23 | 2010-06-15 | Level 3 Communications, Llc | Systems and methods for accessing voice transmissions |
| DE102004040479B4 (de) | 2004-08-20 | 2006-05-24 | Siemens Ag | Verfahren und Vorrichtung zum Nutzdatenabgriff multimedialer Verbindungen in einem Paketnetz |
| DE102004040482B4 (de) | 2004-08-20 | 2006-05-24 | Siemens Ag | Vorrichtung zum Nutzdatenabgriff multimedialer Verbindungen in einem Paketnetz |
| US7730521B1 (en) | 2004-09-23 | 2010-06-01 | Juniper Networks, Inc. | Authentication device initiated lawful intercept of network traffic |
| US7535848B2 (en) | 2005-05-17 | 2009-05-19 | Tektronix, Inc. | System and method for associating IP services to mobile subscribers |
| GB0517592D0 (en) | 2005-08-25 | 2005-10-05 | Vodafone Plc | Data transmission |
| US8050273B2 (en) | 2006-06-22 | 2011-11-01 | Alcatel Lucent | Lawful interception in IP networks |
| US8116308B2 (en) | 2007-05-04 | 2012-02-14 | Ciena Corporation | System and method for providing improved packet traceability |
| CN101766000A (zh) | 2007-06-26 | 2010-06-30 | 传媒专利有限公司 | 管理组播组的方法和设备 |
| KR100852146B1 (ko) | 2007-11-21 | 2008-08-13 | 한국정보보호진흥원 | 제 3 신뢰기관을 이용한 VoIP 보안 통신에서의 감청시스템 및 감청 방법 |
| EP2491705B1 (en) * | 2009-10-23 | 2018-12-26 | Telefonaktiebolaget LM Ericsson (publ) | Li reporting of updated location information for eps |
| US20120294163A1 (en) * | 2011-05-19 | 2012-11-22 | Renesas Mobile Corporation | Apparatus and Method for Direct Device-to-Device Communication in a Mobile Communication System |
-
2011
- 2011-12-07 CN CN201110403036.0A patent/CN103152748B/zh active Active
-
2012
- 2012-12-07 EP EP12856398.8A patent/EP2768182B1/en not_active Not-in-force
- 2012-12-07 WO PCT/CN2012/086157 patent/WO2013083074A1/zh not_active Ceased
-
2014
- 2014-06-09 US US14/299,525 patent/US9544930B2/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7079488B1 (en) * | 2001-03-17 | 2006-07-18 | Cisco Technology, Inc. | Method and apparatus for modifying the bandwidth of an established ATM call in response to an identification of the contents of the call |
| CN1719788A (zh) * | 2004-07-07 | 2006-01-11 | 中兴通讯股份有限公司 | 软交换监听的呼叫控制及业务监听方法 |
| CN101753526A (zh) * | 2008-12-19 | 2010-06-23 | 华为技术有限公司 | 一种监听方法、设备和系统 |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP2768182A4 * |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3008884A1 (en) * | 2013-06-14 | 2016-04-20 | Nokia Solutions and Networks Oy | Lawful interception and security for proximity service |
| EP3028429A4 (en) * | 2013-07-31 | 2017-03-29 | Nokia Technologies OY | Local communication interception |
| US9736621B2 (en) | 2013-07-31 | 2017-08-15 | Nokia Technologies Oy | Local communication interception |
| EP3100444A2 (en) * | 2014-01-29 | 2016-12-07 | Telefonaktiebolaget LM Ericsson (publ) | Method, apparatus and computer program for lawful intercept in device-to-device communication |
| CN107852758A (zh) * | 2015-08-13 | 2018-03-27 | 株式会社Ntt都科摩 | 用户装置以及信号发送方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| EP2768182B1 (en) | 2019-08-21 |
| US9544930B2 (en) | 2017-01-10 |
| US20140314010A1 (en) | 2014-10-23 |
| EP2768182A4 (en) | 2015-02-25 |
| CN103152748A (zh) | 2013-06-12 |
| CN103152748B (zh) | 2015-11-25 |
| EP2768182A1 (en) | 2014-08-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2013083074A1 (zh) | 通信监听方法、基站和终端 | |
| CN109818868B (zh) | 一种实现边缘网络能力开放的方法、装置、设备及存储介质 | |
| CN104937966B (zh) | 无线通信系统中的设备间通信授权和数据嗅探 | |
| WO2020052531A1 (zh) | 获取安全上下文的方法和装置 | |
| CN108123783B (zh) | 数据传输方法、装置及系统 | |
| WO2021093438A1 (zh) | 一种接入网络的方法及通信装置 | |
| US11310658B2 (en) | Method and apparatus for determining status of terminal device, and device | |
| WO2018170626A1 (zh) | 一种连接恢复方法、接入和移动性管理功能实体及用户设备 | |
| WO2023179728A1 (zh) | 通信系统的数据传输方法、终端及网络侧设备 | |
| US20240251278A1 (en) | Method and apparatus for collecting sensing data, and core network element | |
| WO2018137152A1 (zh) | 短消息传输方法、设备和系统 | |
| WO2012022151A1 (zh) | 一种广播接入控制参数的方法和系统 | |
| WO2022174802A1 (zh) | 密钥更新的方法和装置 | |
| WO2020125579A1 (zh) | 通信方法和装置 | |
| CN201290181Y (zh) | 具有媒介无关切换能力的无线发射/接收单元和接入点 | |
| WO2017166978A1 (zh) | 一种数据传输方法及装置以及会话管理设备 | |
| WO2021217595A1 (zh) | 数据传输处理方法、装置、通信设备及存储介质 | |
| WO2011116714A2 (zh) | 终端间的通信方法和设备 | |
| CN103354666B (zh) | 通信方法、基站和终端 | |
| WO2021000820A1 (zh) | 通信方法和相关设备 | |
| WO2010037303A1 (zh) | 设置用户侧白名单及寻呼用户设备的方法和装置 | |
| WO2025026454A1 (zh) | 通信方法、第一功能、第二功能及存储介质 | |
| JPWO2020244312A5 (zh) | ||
| CN114374553B (zh) | 一种时间同步方法及系统 | |
| WO2014194526A1 (zh) | 移动网络数据资源获取方法、设备及系统 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12856398 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2012856398 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |