白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Procedures enabling privacy for WTRUs using PC5 communication

專(zhuān)利號(hào)
US11930433B2
公開(kāi)日期
2024-03-12
申請(qǐng)人
InterDigital Patent Holdings, Inc.(US DE Wilmington)
發(fā)明人
Michelle Perras; Khalid Anwar; Saad Ahmad; Alec Brusilovsky; Samir Ferdi
IPC分類(lèi)
H04W4/40; H04L67/12; H04W12/02; H04W12/037; H04W76/11
技術(shù)領(lǐng)域
wtru,l2,id,wtrus,peer,privacy,sess,source,new,may
地域: DE DE Wilmington

摘要

Methods, devices, and systems for changing a layer 2 (L2) identifier (ID) during an ongoing vehicle-to-everything (V2X) session between a source wireless transmit/receive unit (WTRU) and a peer WTRU include communicating between the source and a peer WTRUs based on an existing layer 2 (L2) identifier (ID). On a condition that a trigger event occurs, the source WTRU generates a new source L2 ID, communicates the new source L2 ID to the peer WTRU, receives from the peer WTRU a message that responds to the new source L2 ID, and communicates between the source WTRU and the peer WTRU based on the new source L2 ID.

說(shuō)明書(shū)

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. Ser. No. 17/056,925, filed 19 Nov. 2020, which is a U.S. National Stage Application under 35 U.S.C. § 371 of International Patent Application No. PCT/US2019/036341, filed 10 Jun. 2019, which is incorporated herein by reference in its entirety.

This application claims the benefit of U.S. provisional patent application No. 62/688,614 filed 22 Jun. 2018, US provisional patent application No. 62,741,962 filed 5 Oct. 2018, and US provisional application No. 62,812,676 filed on 1 Mar. 2019, all of which are incorporated herein by reference in their entirety.

BACKGROUND

Vehicle to everything (V2X) communications can include communications between a vehicle and any other suitable entity, such as vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V21), vehicle to pedestrian (V2P), vehicle to network (V2N) and so forth. V2X can also refer to the standards pertaining to such communications. PC5 is an interface for communicating between V2X devices as a type of sidelink or proximity service (ProSe) direct communication.

SUMMARY

This summary is provided to introduce a selection of concepts in a simplified form as a prelude to the more detailed description that is presented later. The summary is not intended to identify key or essential features, nor is it intended to delineate the scope of the claimed subject matter. Embodiments expressed in the various figures are related and the features therein may be combined unless otherwise stated.

權(quán)利要求

1
What is claimed is:1. A method for use in a sidelink communication session, the method comprising:transmitting to or receiving from a peer wireless transmit/receive unit (WTRU) by a source WTRU using an existing source WTRU layer 2 identifier (L2 ID), an existing peer WTRU L2 ID, and an existing session identifier (ID) used for the session having an existing security context;on condition that the session is ongoing and a trigger event occurs:generating, by the source WTRU, a new source WTRU L2 ID and a new most significant eight bits (MSB) of a new session ID;transmitting, by the source WTRU to the peer WTRU, the new source WTRU L2 ID and the new MSB of the new session ID;receiving, from the peer WTRU, a new peer L2 ID and a new least significant eight bits (LSB) of the new session ID;transmitting, by the source WTRU to the peer WTRU, an acknowledgement of the new peer WTRU L2 ID and the new LSB of the new session ID; andtransmitting to or receiving from the peer WTRU by the source WTRU using the new source WTRU L2 ID, the new peer WTRU L2 ID, and the new session ID that comprises the new MSB and the new LSB, wherein the transmitting to or the receiving from the peer WTRU occurs in accordance with the new session ID, the new source WTRU L2 ID, and the new peer WTRU L2 ID while maintaining the session using the existing security context.2. The method of claim 1, wherein transmitting, by the source WTRU to the peer WTRU, the acknowledgement comprises transmitting the acknowledgement while continuing to use the existing source WTRU L2 ID, the existing peer WTRU L2 ID, and the session ID.3. The method of claim 1, wherein the new source WTRU L2 ID, the new peer WTRU L2 ID, and the new session ID are encrypted using the existing security context.4. The method of claim 1, wherein:transmitting, by the source WTRU to the peer WTRU, the new source WTRU L2 ID and the new MSB of the new session ID comprises a transmission in accordance with one of a keepalive procedure, a privacy procedure, a PC5 link update procedure, or another communication procedure.5. The method of claim 1, wherein on condition that the session is ongoing and a trigger event occurs comprises an ongoing session and any of:a condition that a timer expires;a condition that an upper layer or an application layer requests a new L2 ID;a condition that the source WTRU moved into a new geographic area;a condition that the source WTRU received new provisioning parameters from a control function or an application server; ora condition that the source WTRU received a request from the peer WTRU to change an L2 ID.6. The method of claim 1, wherein the session ID is a security context ID.7. The method of claim 1, wherein transmitting to or receiving from a peer WTRU by a source WTRU comprises communicating on a PC5 reference link.8. A source wireless transmit/receive unit (WTRU) comprising circuitry, including a transmitter, a receiver, a processor, and memory, the source WTRU configured to:transmit to or receive from using the transmitter or receiver respectively, by the source WTRU to and from a peer WTRU using an existing source WTRU layer 2 identifier (L2 ID), an existing peer WTRU L2 ID, and an existing session ID for a session having an existing security context;on condition that the session is ongoing and a trigger event occurs:generate by the source WTRU, a new source WTRU L2 ID, and a new most significant eight bits (MSB) of a new session ID;transmit, by the source WTRU to the peer WTRU, the new source WTRU L2 ID and the new MSB of the new session ID;receive, from the peer WTRU, a new peer WTRU L2 ID and a new least significant eight bits (LSB) of the new session ID;transmit, by the source WTRU to the peer WTRU, an acknowledgement of the new peer WTRU L2 ID and the new LSB of the new session ID; andtransmit to or receive from the peer WTRU by the source WTRU using the new source WTRU L2 ID, the new peer WTRU L2 ID, and the new session ID that comprises the new MSB and the new LSB, wherein transmission to or reception from the peer WTRU by the source WTRU occurs in accordance with the new session ID, the new source WTRU L2 ID, and the new peer WTRU L2 ID while maintaining the session using the existing security context.9. The source WTRU of claim 8, wherein the source WTRU transmits to the peer WTRU, the acknowledgement comprises a transmission of the acknowledgement while continuing to use the existing source WTRU L2 ID, the existing peer WTRU L2 ID, and the existing session ID.10. The source WTRU of claim 8, wherein: the trigger event comprises at least one of: an expiration of a timer; a request for a new L2 ID from an upper layer or an application layer; moving of the source WTRU into a new geographic area; reception by the source WTRU receiving of new provisioning parameters from a control function or an application server; or reception of a request by the source WTRU from the peer WTRU to change an L2 ID.11. The source WTRU of claim 8, wherein the source WTRU is configured to: transmit, by the source WTRU to the peer WTRU, the new source WTRU L2 ID and the new MSB of the new session ID using a transmission in accordance with one of a keepalive procedure, a privacy procedure, a PC5 link update procedure, or another communication procedure.12. The source WTRU of claim 8, wherein the session ID is a security context ID.13. The source WTRU of claim 8, wherein the source WTRU communicates with the peer WTRU on a PC5 link.14. A non-transitory computer-readable storage medium embodying instructions, which when executed by a computer, causes the computer to perform a method for use in an ongoing communication session, the method comprising: transmitting to or receiving from a peer wireless transmit/receive unit (WTRU) by a source WTRU using an existing source WTRU layer 2 identifier (L2 ID), an existing peer WTRU L2 ID, and an existing session identifier (ID) used for the session having an existing security context; on condition that the session is ongoing and a trigger event occurs: generating, by the source WTRU, a new source WTRU L2 ID and a new most significant eight bits (MSB) of a new session ID; transmitting, by the source WTRU to the peer WTRU, the new source WTRU L2 ID and the new MSB of the new session ID; receiving, from the peer WTRU, a new peer L2 ID and a new least significant eight bits (LSB) of the new session ID; transmitting, by the source WTRU to the peer WTRU, an acknowledgement of the new peer WTRU L2 ID and the new LSB of the new session ID; and transmitting to or receiving from the peer WTRU by the source WTRU using the new source WTRU L2 ID, the new peer WTRU L2 ID, and the new session ID that comprises the new MSB and the new LSB, wherein the transmitting to or the receiving from the peer WTRU occurs in accordance with the new session ID, the new source WTRU L2 ID, and the new peer WTRU L2 ID while maintaining the session using the existing security context.15. The non-transitory computer-readable storage medium of claim 1, wherein transmitting, by the source WTRU to the peer WTRU, the acknowledgement comprises transmitting the acknowledgement while continuing to use the existing source WTRU L2 ID, the existing peer WTRU L2 ID, and the session ID.16. The non-transitory computer-readable storage medium of claim 14, wherein the new source WTRU L2 ID, the new peer WTRU L2 ID, and the new session ID are encrypted using the existing security context.17. The non-transitory computer-readable storage medium of claim 14, wherein: transmitting, by the source WTRU to the peer WTRU, the new source WTRU L2 ID and the new MSB of the new session ID comprises a transmission in accordance with one of a keepalive procedure, a privacy procedure, a PC5 link update procedure, or another communication procedure.18. The non-transitory computer-readable storage medium of claim 14, wherein on condition that the session is ongoing and a trigger event occurs comprises an ongoing session and any of: a condition that a timer expires; a condition that an upper layer or an application layer requests a new L2 ID; a condition that the source WTRU moved into a new geographic area; a condition that the source WTRU received new provisioning parameters from a control function or an application server; or a condition that the source WTRU received a request from the peer WTRU to change an L2 ID.19. The non-transitory computer-readable storage medium of claim 14, wherein the session ID is a security context ID.20. The non-transitory computer-readable storage medium of claim 14, wherein transmitting to or receiving from a peer WTRU by a source WTRU comprises communicating on a PC5 link.
微信群二維碼
意見(jiàn)反饋