Search

EP-4738902-A2 - METHOD AND APPARATUS FOR PRIVACY PROTECTION

EP4738902A2EP 4738902 A2EP4738902 A2EP 4738902A2EP-4738902-A2

Abstract

There is provided a method at a first terminal device. The method comprises establishing (401) a unicast link with a second terminal device. The method comprises deciding (402) to change from old identifier(s) to new identifier(s) for the first terminal device. The method comprises sending (402) a link identifier update request message to the second terminal device using old identifier(s) of the second terminal device. The link identifier update request message comprises the new identifier(s) of the first terminal device. The method comprises receiving (403) a link identifier update response message from the second terminal device using the old identifier(s) of the first terminal device. The link identifier update response message comprises new identifier(s) of the second terminal device.

Inventors

  • SULTANA, SHABNAM
  • GAN, Juying
  • FU, Zhang

Assignees

  • Telefonaktiebolaget LM Ericsson (publ)

Dates

Publication Date
20260506
Application Date
20210209

Claims (15)

  1. A method at a first terminal device (800), the method comprising: establishing (401) a unicast link with a second terminal device (800); deciding (402) to change from old identifier(s) to new identifier(s) for the first terminal device; sending (402) a link identifier update request message to the second terminal device using old identifier(s) of the second terminal device, wherein the link identifier update request message comprises the new identifier(s) of the first terminal device; and receiving (403) a link identifier update response message from the second terminal device using the old identifier(s) of the first terminal device, wherein the link identifier update response message comprises new identifier(s) of the second terminal device.
  2. The method of claim 1, further comprising: sending (404) a link identifier update ack message to the second terminal device using the old identifiers of the second terminal device, wherein the link identifier update ack message comprises the new identifier(s) received from the second terminal device.
  3. The method of claim 1 or 2, further comprising: before the link identifier update ack message is sent, sending or receiving data traffic with the second terminal device using the old identifier(s); and/or after the link identifier update ack message is sent, sending or receiving (405, 406) data traffic with the second terminal device using the new identifier(s).
  4. The method of any one of claim 1 to 3, wherein: the new identifier(s) of the first terminal device include a new layer-2 identifier and security information for the first terminal device; and the new identifier(s) of the second terminal device include a new layer-2 identifier and security information for the second terminal device.
  5. The method of any one of claims 1 to 4, wherein the new identifier(s) of the first terminal device and the new identifier(s) of the second terminal device are cyphered to protect privacy.
  6. The method of any one of claims 1 to 5, wherein the unicast link is a PC5 unicast link and/or the link identifier update request message is sent via unicast.
  7. A first terminal device (800), comprising: a processor (821); and a memory (822) containing instructions executable by the processor, whereby the first terminal device is operative to perform a method according to any one of claims 1 to 6.
  8. A method at a second terminal device (800), the method comprising: establishing (401) a unicast link with a first terminal device (800); receiving (402) a link identifier update request message from the first terminal device using old identifier(s) of the second terminal device, wherein the link identifier update request message comprises new identifier(s) of the first terminal device; and sending (403) a link identifier update response message to the first terminal device using the old identifier(s) of the first terminal device, wherein the link identifier update response message comprises new identifier(s) of the second terminal device.
  9. The method of claim 8, further comprising: receiving (404) a link identifier update ack message from the first terminal device using the old identifiers of the second terminal device, wherein the link identifier update ack message comprises the new identifier(s) of the second terminal device.
  10. The method of claim 8 or 9, further comprising: before the link identifier update ack message is received, sending or receiving data traffic with the first terminal device using the old identifier(s); and/or after the link identifier update ack message is received, sending or receiving (405, 406) data traffic with the first terminal device using the new identifier(s).
  11. The method of any one of claims 8 to 10, wherein: the new identifier(s) of the first terminal device include a new layer-2 identifier and security information for the first terminal device; and the new identifier(s) of the second terminal device include a new layer-2 identifier and security information for the second terminal device.
  12. The method of any one of claims 8 to 11, wherein the new identifier(s) of the first terminal device and the new identifier(s) of the second terminal device are cyphered to protect privacy.
  13. The method of any one of claims 8 to 12, wherein the unicast link is a PC5 unicast link and/or the link identifier update request message is received via unicast.
  14. A second terminal device (800), comprising: a processor (821); and a memory (822) containing instructions executable by the processor, whereby the second terminal device is operative to perform a method according to any one of claims 8 to 13.
  15. A computer program product comprising instructions which when executed by at least one processor, cause the at least one processor to perform a method according to any one of claims 1 to 6 or a method according to any one of claims 8 to 13.

Description

TECHNICAL FIELD The present disclosure relates generally to the technology of wireless communication, and in particular, to methods and apparatuses for privacy protection. BACKGROUND This section introduces aspects that may facilitate better understanding of the present disclosure. Accordingly, the statements of this section are to be read in this light and are not to be understood as admissions about what is in the prior art or what is not in the prior art. Communication service providers and network operators have been continually facing challenges to deliver value and convenience to consumers by, for example, providing compelling network services and performance. With the evolution of wireless communication, a requirement for supporting device to device (D2D) such as Vehicle-to-Everything (V2X) communication feature which may target at both commercial and public safety applications has been proposed. Wireless communication networks such as long-term evolution (LTE) and new radio (NR) are expected to support various services over a D2D link (such as a sidelink (SL) and/or PC5 link) between devices such as user equipments (UEs). Radio resources may be configured for traffic communications over the D2D link such as PC5 link to meet different quality of service (QoS) requirements of the traffics. SUMMARY This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. To fullfill a privacy requirement, it is required that both UEs change their link identifers (IDs) such as Layer2 IDs at a same time in some senarios. For example, it is required that when one of a pair of terminal devices changes its link identifier (such as Layer-2 ID), the other one of the pair of terminal devices also changes its link identifier (such as Layer-2 ID). However, existing solutions may not guarantee that both UEs change their link identifers such as Layer2 IDs at the same time. For excample, if one of a pair of terminal devices does not change its link identifier, then it will violate the privacy policy of the other one of the pair of terminal devices. Certain aspects of the present disclosure and their embodiments may provide solutions to these or other challenges. There are, proposed herein, various embodiments which address one or more of the issues disclosed herein. A first aspect of the present disclosure provides a method at a first terminal device. The method comprises obtaining at least one privacy policy of the first terminal device. The at least one privacy policy of the first terminal device is related to a link identifier change. The method further comprises transmitting a request message including information regarding the at least one privacy policy of the first terminal device. In embodiments of the present disclosure, obtaining the at least one privacy policy of the first terminal device may comprise at least one of obtaining the at least one privacy policy of the first terminal device from a network node; obtaining the at least one privacy policy of the first terminal device from a server; and obtaining the at least one privacy policy of the first terminal device from the first terminal device. In embodiments of the present disclosure, the server may be an application server. In embodiments of the present disclosure, the network node may be a policy control function entity. In embodiments of the present disclosure, the at least one privacy policy of the first terminal device may comprise a policy of whether a peer terminal device is required to change the link identifier of the peer terminal device when the first terminal device changes the link identifier of the first terminal device. In embodiments of the present disclosure, the information regarding the at least one privacy policy of the first terminal device may comprise an indication of the at least one privacy policy of the first terminal device. In embodiments of the present disclosure, the indication of the at least one privacy policy of the first terminal device may be a Boolean value. In embodiments of the present disclosure, the method may further comprise receiving, from a second terminal device, a response message including a result of the request. The second terminal device is a peer terminal device of the first terminal device In embodiments of the present disclosure, the response message may be a reject message when the at least one privacy policy of the first terminal device does not match at least one corresponding privacy policy of the second terminal device. In embodiments of the present disclosure, the response message may be an accept message when the at least one privacy policy of the first terminal device matches the at least one corresponding privacy policy of the second ter