Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Resource selection method, base station and terminal

A resource selection and resource technology, applied in the field of communication applications, can solve problems such as target terminal privacy leakage

Active Publication Date: 2020-01-31
DATANG MOBILE COMM EQUIP CO LTD
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a resource selection method, a base station, and a terminal to solve the problem that under the SPS mechanism, a malicious terminal may track the geographical location of the target terminal by continuously determining the information on the resource, resulting in the privacy of the target terminal. leaked problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource selection method, base station and terminal
  • Resource selection method, base station and terminal
  • Resource selection method, base station and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to specific embodiments and accompanying drawings.

[0090] In order to enable those skilled in the art to better understand the embodiments of the present invention, the following explanations are first made.

[0091] PC5 mode mode3 has two types of scheduling: Dynamical Scheduling (DS for short) and Semi-Persistent Scheduling (SPS for short). Mode 4V2V has two types of scheduling: SPS based on monitoring sensing and sending one shot at a time. For DS / one shot scheduling, it is impossible for a malicious terminal to track the geographical location of the target vehicle through continuous monitoring and high-level data processing on certain physical resources. In the embodiment of the present invention, only mode 4 sensing SPS and mode 3 SPS scheduling are considered.

[0092] For mode 4sensing S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a resource selection method, a base station and a terminal, solving the problem that in an SPS mechanism mode, a malicious terminal may track the geographic position of a targetterminal by continuously determining information monitoring on resources, resulting in privacy leakage of the target terminal. The resource selection method comprises the step of triggering SPS resource reselection when a layer 2 ID is changed or the duration of semi-persistent scheduling SPS resources reaches the preset maximum duration. According to the resource selection method, when the layer2 ID changes or the duration of semi-persistent scheduling (SPS) resources reaches the preset maximum duration, the layer 2 ID is changed; and SPS resource reselection is triggered, so that the SPS resource is prevented from being kept unchanged for a long time, and the situation that the receiving node can associate different layer 2 IDs is avoided, and the probability of continuous tracking ofthe malicious terminal to the target terminal is reduced.

Description

technical field [0001] The present invention relates to the technical field of communication applications, in particular to a resource selection method, a base station and a terminal. Background technique [0002] Under the semi-persistent scheduling (Semi-Persistent Scheduling, referred to as SPS) mechanism, malicious terminals may track the geographical location of target terminals by continuously monitoring information on determined resources, that is, there is a risk of privacy leakage in V2X communication. In order to ensure that this kind of tracking is only for a short period of time and to protect the privacy of the terminal as much as possible, it is necessary to do certain enhancements to the current resource selection process. Contents of the invention [0003] The purpose of the present invention is to provide a resource selection method, a base station, and a terminal to solve the problem that under the SPS mechanism, a malicious terminal may track the geograp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W72/12H04L5/00H04L47/76
CPCH04L5/003H04W72/535H04W72/23H04W72/12H04L5/00H04W72/04H04W76/36
Inventor 冯媛房家奕赵锐
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products