This disclosure relates to the communication field, and more specifically, to an information security protection method and apparatus.
Currently, wireless communication technologies are widely applied to manufacturing and everyday life, for example, applications in vertical industries with extreme high reliability requirements, such as industrial control, telemedicine, and self-driving, and applications in massive machine-type communications scenarios, such as a smart city, a smart home, and environment monitoring. Further, the wireless communication technology may also be combined with an artificial intelligence (AI) technology, to implement AI tasks such as training and inference of an artificial intelligence model, to meet more diversified requirements.
With the ever widening application of the wireless communication technology, improving information security in wireless communication and reducing the risks of information leakage have become the focus of current research.
Embodiments of this disclosure provide an information security protection method and apparatus, to improve communication security and reliability of wireless communication. According to a first aspect, an information security protection method is provided. The method may be performed by a communication device or a module (for example, a chip or a chip system) configured in (or used in) a communication device.
The method includes: A first node obtains first power control information based on an information security protection requirement, a maximum transmit power of a second node, and channel information between the second node and the first node, where the first power control information is power control information that is obtained through prediction and that maximizes a signal-to-noise ratio of a received signal of the first node when the information security protection requirement is met, and the received signal includes a signal from the second node; the first node sends the first power control information to the second node, where the first power control information is used by the second node to generate a first signal; and the first node receives the first signal from the second node, where the first signal includes data information and security protection information, and the security protection information is used to protect information security of the data information.
According to the foregoing solution, the security of the data information transmitted over a wireless channel can be improved, the probability of information leakage can be reduced, and the signal-to-noise ratio of the received signal can be maximized when the security protection requirement of the data information is met, improving the transmission reliability of the data information.
In some embodiments, the first power control information includes power control information corresponding to the data information and power control information corresponding to the security protection information.
According to the foregoing solution, the first power control information may separately include the power control information used to control the data information in the first signal and the power control information used to control the security protection information, so that power control is separately performed on the data information and the security protection information, to maximize the signal-to-noise ratio of the received signal when the security protection requirement of the data information is met, improving the transmission reliability of the data information.
In some embodiments, there are a plurality of second nodes, and that a first node obtains first power control information corresponding to the second node based on an information security budget, a maximum transmit power of a second node, and channel information between the second node and the first node includes: The first node obtains power control information corresponding to each second node based on the information security protection requirement, the maximum transmit power of each second node, and the channel information between the plurality of second nodes and the first node; and that the first node receives the first signal from the second node includes: The first node receives a superimposed signal of first signals from the plurality of second nodes.
According to the foregoing solution, when the first node needs to receive the superimposed signal of the first signals from the plurality of second nodes, the first node obtains the power control information corresponding to each second node based on the information security protection requirement, the maximum transmit power of each second node, and the channel information between the plurality of second nodes and the first node. In this way, when the superimposed signal of the first signals is received by the first node from the plurality of second nodes, the signal-to-noise ratio of the received signal can be maximized when the security protection requirement of the data information is met, improving transmission reliability of the data information.
In some embodiments, the method further includes: the first node sends first information to the second node, where the first information is used to request node feature information output by a kth layer of a first machine learning model, and the data information includes the node feature information that is output by the kth layer of the first machine learning model from the second node; and the method further includes: The first node determines, based on the node feature information output by the kth layer of the first machine learning model, second node feature information corresponding to the kth layer of the first machine learning model.
According to the foregoing solution, when a graph neural network (GNN) is applied to a wireless communication network, node feature information obtained through each layer iteration needs to be transmitted over a wireless channel, and two consecutive communications are highly correlated. Therefore, information transmission security and reliability can be improved by using the foregoing information security protection method.
In some embodiments, the first information includes the first power control information.
In some embodiments, the method further includes: the first node inputs first feature information and the second node feature information corresponding to the kth layer of the first machine learning model into a kth layer of a second machine learning model, to obtain aggregation node feature information output by the kth layer of the second machine learning model, where k is equal to 1, and the first feature information is node feature information of the first node; or k is an integer greater than 1, and the first feature information is second node feature information corresponding to a (k−1)th layer of the first machine learning model.
According to the foregoing solution, the GNN is applied to a wireless communication network, so that each communication node can obtain features and dependencies of its adjacent nodes of different depths in its environment. In this way, a status feature of the communication node is determined, higher-quality communication may be implemented, and distributed control and scheduling of a network may be implemented.
In some embodiments, the method further includes: The first node inputs the second node feature information corresponding to the kth layer into a (k+1)th layer of the first machine learning model, to obtain node feature information output by the (k+1)th layer of the first machine learning model; the first node receives second power control information from the second node; and the first node sends a second signal to the second node, where the second signal includes the node feature information output by the (k+1)th layer of the first machine learning model and security protection information, and the second signal is generated based on the second power control information.
According to the foregoing solution, in addition to obtaining the status feature of the first node by receiving the feature information from each adjacent node, the first node further generates, based on the power control information, the second signal including the node feature information that is output by the (k+1)th layer of the first machine learning model on the first node, so that an adjacent node of the first node can also obtain its own status feature.
According to a second aspect, an information security protection method is provided. The method may be performed by a communication device or a module (for example, a chip or a chip system) configured in (or used in) a communication device.
The method includes: A second node receives first power control information from a first node, where the first power control information is used by the second node to generate a first signal; and the second node sends the first signal to the first node, where the first signal includes data information and security protection information, and the security protection signal is used to protect information security of the data information.
In some embodiments, the first power control information includes power control information corresponding to the data information and power control information corresponding to the security protection information.
In some embodiments, the method further includes: The second node receives first information from the first node, where the first information is used to request node feature information output by a kth layer of a first machine learning model, the data information includes the node feature information that is output by the kth layer of the first machine learning model on the second node, and k is a positive integer.
In some embodiments, the first information includes the first power control information.
In some embodiments, the method further includes: The second node inputs second feature information into the kth layer of the first machine learning model, to obtain the node feature information output by the kth layer of the first machine learning model, where k=1, and the second feature information is node feature information of the second node; or k is an integer greater than 1, the second feature information is first node feature information corresponding to a (k−1)th layer of the first machine learning model, and the first node feature information is determined based on the node feature information that is output by the kth layer of the first machine learning model and that is from at least one first node.
According to a third aspect, a communication apparatus is provided. In a design, the apparatus may include a one-to-one corresponding module for performing the method/operation/step/action described in the first aspect. The module may be a hardware circuit, or may be software, or may be implemented by a hardware circuit in combination with software. In a design, the apparatus includes: a processing unit, configured to obtain first power control information based on an information security protection requirement, a maximum transmit power of a second node, and channel information between the second node and a first node, where the first power control information is power control information that is obtained through prediction and that maximizes a signal-to-noise ratio of a received signal of the first node when the information security protection requirement is met, and the received signal includes a signal from the second node; and a transceiver unit, configured to send the first power control information to the second node, where the first power control information is used by the second node to generate a first signal, where the transceiver unit is further configured to receive the first signal from the second node, where the first signal includes data information and security protection information, and the security protection information is used to protect information security of the data information.
In some embodiments, the first power control information includes power control information corresponding to the data information and power control information corresponding to the security protection information.
In some embodiments, there are a plurality of second nodes, the processing unit is configured to obtain power control information corresponding to each second node based on the information security protection requirement, the maximum transmit power of each second node, and the channel information between the plurality of second nodes and the first node; and the transceiver unit is configured to receive a superimposed signal of first signals from the plurality of second nodes.
In some embodiments, the transceiver unit is further configured to send first information to the second node, where the first information is used to request node feature information output by a kth layer of a first machine learning model, and the data information includes the node feature information that is output by the kth layer of the first machine learning model and that is from the second node.
The processing unit is further configured to determine, based on the node feature information output by the kth layer of the first machine learning model, second node feature information corresponding to the kth layer of the first machine learning model.
In some embodiments, the first information includes the first power control information.
In some embodiments, the processing unit is further configured to input first feature information and the second node feature information corresponding to the kth layer of the first machine learning model into a kth layer of a second machine learning model, to obtain aggregation node feature information output by the kth layer of the second machine learning model, where k is equal to 1, and the first feature information is node feature information of the first node; or k is an integer greater than 1, and the first feature information is second node feature information corresponding to a (k−1)th layer of the first machine learning model.
In some embodiments, the processing unit is further configured to input the second node feature information corresponding to the kth layer into a (k+1)th layer of the first machine learning model, to obtain node feature information output by the (k+1)th layer of the first machine learning model; the transceiver unit is further configured to receive second power control information from the second node; and the transceiver unit is further configured to send a second signal to the second node, where the second signal includes the node feature information output by the (k+1)th layer of the first machine learning model and security protection information, and the second signal is generated based on the second power control information.
According to a fourth aspect, a communication apparatus is provided. In a design, the apparatus may include a one-to-one corresponding module for performing the method/operation/step/action described in the second aspect. The module may be a hardware circuit, or may be software, or may be implemented by a hardware circuit in combination with software. In a design, the apparatus includes: a transceiver unit, configured to receive first power control information from a first node; and a processing unit, configured to generate a first signal based on the first power control information, where the transceiver unit is further configured to send the first signal to the first node, where the first signal includes data information and security protection information, and the security protection signal is used to protect information security of the data information.
In some embodiments, the first power control information includes power control information corresponding to the data information and power control information corresponding to the security protection information.
In some embodiments, the transceiver unit is further configured to receive first information from the first node, where the first information is used to request node feature information output by a kth layer of a first machine learning model, the data information includes the node feature information that is output by the kth layer of the first machine learning model on the second node, and k is a positive integer.
In some embodiments, the first information includes the first power control information.
In some embodiments, the processing unit is further configured to input second feature information into the kth layer of the first machine learning model, to obtain the node feature information output by the kth layer of the first machine learning model, where k=1, and the second feature information is node feature information of the second node; or k is an integer greater than 1, the second feature information is first node feature information corresponding to a (k−1)th layer of the first machine learning model, and the first node feature information is determined based on the node feature information that is output by the kth layer of the first machine learning model and that is from at least one first node.
According to a fifth aspect, a communication apparatus is provided, including a processor. The processor may implement the method according to the first aspect or the second aspect and any one of the embodiments of the first aspect or the second aspect. Optionally, the communication apparatus further includes a memory. The processor is coupled to the memory, and may be configured to execute instructions in the memory, to implement the method according to the first aspect or the second aspect and any one of the embodiments of the first aspect or the second aspect. Optionally, the communication apparatus further includes a communication interface, and the processor is coupled to the communication interface. In embodiments of this disclosure, the communication interface may be a transceiver, a pin, a circuit, a bus, a module, or another type of communication interface. This is not limited.
In some embodiments, the communication apparatus is a communication device. When the communication apparatus is the communication device, the communication interface may be a transceiver or an input/output interface.
In some embodiments, the communication apparatus is a chip or a chip system configured in a communication device. When the communication apparatus is the chip or the chip system configured in the communication device, the communication interface may be an input/output interface.
Optionally, the transceiver may be a transceiver circuit. Optionally, the input/output interface may be an input/output circuit.
According to a sixth aspect, a processor is provided. The processor includes an input circuit, an output circuit, and a processing circuit. The processing circuit is configured to: receive a signal through the input circuit, and transmit a signal through the output circuit, to enable the processor to perform the method according to the first aspect or the second aspect and any one of the embodiments of the first aspect or the second aspect.
In some embodiments, the processor may be one or more chips, the input circuit may be an input pin, the output circuit may be an output pin, and the processing circuit may be a transistor, a gate circuit, a trigger, any logic circuit, or the like. An input signal received by the input circuit may be received and input by, for example, but not limited to, a receiver, a signal output by the output circuit may be output to, for example, but not limited to, a transmitter and transmitted by the transmitter, and the input circuit and the output circuit may be a same circuit, where the circuit is used as the input circuit and the output circuit at different moments. Specific implementations of the processor and the various circuits are not limited in embodiments of this disclosure.
According to a seventh aspect, a computer program product is provided. The computer program product includes a computer program (which may also be referred to as code or instructions). When the computer program is run, a computer is enabled to perform the method according to the first aspect or the second aspect and any one of the embodiments of the first aspect or the second aspect.
According to an eighth aspect, a computer-readable storage medium is provided. The computer-readable storage medium stores a computer program (which may also be referred to as code or instructions). When the computer program is run on a computer, the computer is enabled to perform the method according to the first aspect or the second aspect and any one of the embodiments of the first aspect or the second aspect.
According to a ninth aspect, a communication system is provided, including the foregoing at least one first node and at least one second node.
It should be noted that, the first node or the second node may be a communication device, or may be a module (such as a chip or a chip system) configured in (or used in) a communication device.
The following describes technical solutions of this disclosure with reference to accompanying drawings.
In embodiments of this application, “/” may indicate an “or” relationship between associated objects, for example, A/B may indicate A or B; and “and/or” may indicate that three relationships exist between the associated objects, for example, A and/or B may indicate the following three cases: A exists alone, both A and B exist, and B exists alone, where A and B may be singular or plural. For ease of describing the technical solutions in embodiments of this application, terms such as “first” and “second” may be used for differentiation in embodiments of this application. The words such as “first” and “second” do not limit a quantity and an execution sequence, and the words such as “first” and “second” do not limit a definite difference. In embodiments of this application, the word such as “example” or “for example” is used to represent an example, evidence, or descriptions. Any embodiment or design solution described as “example” or “for example” should not be explained as being better or having more advantages than another embodiment or design solution. The word such as “example” or “for example” is used to present a related concept in a specific manner for ease of understanding. In embodiments of this application, “at least one (type)” may alternatively be described as “one (type) or more (types)”, and “a plurality of (types)” may be two (types), three (types), four (types), or more (types). This is not limited in this application.
The technical solutions in embodiments of this application may be applied to various communication systems, for example, a long-term evolution (LTE) system, an LTE frequency division duplex (FDD) system, an LTE time division duplex (TDD) system, a 5th generation (5G) communication system, and a wireless fidelity (Wi-Fi) system. In addition, a communication method provided in this application may be further applied to a communication system evolved after 5G, for example, a 6th generation (6G) communication system, a future communication system, another communication system, or the like. This is not limited in this application.
The communication node in embodiments of this application, for example, a first node and/or a second node, may be an access network device. For example, the access network device may be a base station, a NodeB, an evolved NodeB (eNodeB or eNB), a transmission reception point (TRP), a next generation NodeB (gNB) in a 5th generation (5G) mobile communication system, an access network device in an open radio access network (O-RAN or open RAN), a next generation base station in a 6th generation (6G) mobile communication system, a base station in a future mobile communication system, an access node in a wireless fidelity (Wi-Fi) system, or the like. The access network device may be a macro base station (for example, 110a in
The communication node in embodiments of this application, for example, a first node and/or a second node, may be a terminal device, and the terminal device may also be referred to as a terminal, user equipment (UE), a mobile station, a mobile terminal, or the like. The terminal may be widely used in various scenarios for communication. For example, the scenario includes but is not limited to at least one of the following scenarios: enhanced mobile broadband (eMBB), ultra-reliable low-latency communication (URLLC), massive machine-type communication (mMTC), device-to-device (D2D) communication, vehicle to everything (V2X) communication, machine-type communication (MTC), an internet of things (IoT), virtual reality, augmented reality, industrial control, self-driving, telemedicine, a smart grid, smart furniture, smart office, smart wearable, smart transportation, a smart city, or the like. The terminal may be a mobile phone, a tablet computer, a computer with a wireless transceiver function, a wearable device, a vehicle, an uncrewed aerial vehicle, a helicopter, an airplane, a ship, a robot, a robotic arm, a smart home device, or the like.
A specific technology and a specific device form that are used by the communication node provided in embodiments are not limited in this application.
The following describes related technologies and terms in embodiments of this application.
A conventional AI technology has superior performance in extracting features of Euclidean spatial data. However, in actual application scenarios, a lot of data does not belong to Euclidean space. Therefore, a graph neural network for processing graph data emerges. A graph data structure includes nodes and edges. The GNN is a connection model. A dependency relationship in a graph is obtained by transmitting information between nodes in the network. High-dimensional graph data can be mapped to low-dimensional vector space. The GNN updates a status of a node by using an adjacent node of any depth from the node. If two nodes are communicatively reachable, the two nodes may be referred to as adjacent nodes. For example, if a node A may receive a signal from a node B, and the node B may receive the signal sent by the node A, the node A and the node B are communicatively reachable, and the node A and the node B are adjacent nodes. The GNN still retains a hierarchical structure, and an operation at a kth layer of the GNN may be represented as follows:
where
and
When k is greater than 1, that is, in operations at a second layer and a subsequent layer of the GNN, an intermediate result qu(k-1) of a (k−1)th layer of each adjacent node and a feature euv of an edge of the node u and the node v are used as an input of ƒt(k), to obtain a sum of outputs of ƒt(k) corresponding to each adjacent node, that is, the intermediate result qv(k) of the kth layer of the node v. Then, the intermediate result qv(k) and the intermediate, result qv(k-1) obtained at the previous layer (that is, the (k−1)th layer) are used as an input of ƒo(k), to obtain an output result ou(k) that is of the kth layer of the node v and that is output by ƒo(k). By using a multi-layer convolution operation, a node can continuously aggregate information of adjacent nodes based on a topology structure, and update a status of the node.
For example, as shown in
The LDP technology protects security of data information by adding noise to the data information, to reduce correlation of the data information. Even if an attacker obtains a piece of data information, the attacker cannot infer other data information.
It is assumed that an information security budget is ε, M is a random function that uses a data set as an input, and S is a set of outputs of the random function M, any two adjacent data sets Q and Q′ are used as inputs of the random function M, and probabilities that the outputs are in the set S are respectively Pr(M(Q)∈S) and Pr(M(Q′)∈S). If the following inequality is met:
M satisfies (ε,δ)−LDP. ε and δ are positive real numbers, and the information security budget ε is used to control a similarity between the foregoing two probabilities. A smaller value of & indicates better information security protection performance, that is, a lower probability that the attacker determines whether the input is Q or Q′ based on the outputs of the random function M. δ is used to describe a probability of violating the foregoing information security protection requirement. A smaller value of δ indicates a lower probability of allowing violation of the information security protection requirement and better information security protection performance. A manner of adding Gaussian noise to the data information is an important means of implementing (ε,δ)−LDP, and this manner may alternatively be referred to as a Gaussian mechanism.
To improve information security in wireless communication and reduce a risk of information leakage, embodiments of this application proposes that information security protection is implemented by adding Gaussian noise to data information at a transmit end. However, during wireless communication, a channel has channel fading impact on a transmitted signal and noise exists on the channel. To avoid a problem that a signal cannot be correctly received by a receive end due to noise increased by data information security improvement, this application further proposes that power control information of a signal may be determined based on an information security requirement, a maximum transmit power of a transmit end, and channel information, so that the signal sent by the transmit end can be accurately received by the receive end when the security protection requirement of the data information is met. In this way, transmission reliability of the data information can be improved.
S301: A first node obtains first power control information based on an information security protection requirement, a maximum transmit power of a second node, and channel information between the second node and the first node, where the first power control information is power control information that is obtained through prediction and that maximizes a signal-to-noise ratio (SNR) of a received signal of the first node when the information security protection requirement is met, and the received signal includes a signal from the second node.
The first node may obtain the maximum transmit power of the second node from the second node. In addition, the first node may perform channel measurement to obtain the channel information between the second node and the first node.
The information security protection requirement may be referred to as an information security budget, and is a requirement of a communication node for an information security degree during information transmission. The first node may determine, by using an information security threshold corresponding to the security protection requirement, whether the information security degree of the received signal meets the information security protection requirement. For example, the first node obtains, through prediction based on the information security threshold that meets the information security protection requirement, the maximum transmit power of the second node, and the channel information, the first power control information that maximizes the SNR of the received signal of the first node when the information security protection requirement is met.
The following describes how the first node obtains the first power control information through prediction.
To improve information security, the second node needs to superimpose security protection information muv on data information wuv to be sent to the first node, where u is an identifier of the second node, v is an identifier of the first node, and the security protection information muv may be white Gaussian noise. However, this is not limited in this application. The first node may determine a power control parameter based on the channel information, so that a transmit power of a to-be-sent signal (where the signal includes data information and security protection information) generated by the second node based on the power control parameter falls within a maximum transmit power range of the second node, and the power control parameter can maximize the SNR of the received signal received by the first node after the signal is transmitted through a channel.
In Implementation 1, the received signal is a signal from the second node.
In an example, pre-equalization processing may be performed on a signal at the second node (that is, a signal transmit end). The pre-equalization processing may alternatively be referred to as precoding, to equalize channel interference on the signal. For example, the to-be-sent signal {tilde over (w)}uv of the second node may be represented as:
L is a norm upper limit ∥{tilde over (w)}uv∥2≤L of the data information. To be specific, after the second node processes the data information and the security protection information based on the power control parameter, a power coefficient of the data information wuv in the generated signal is √{square root over (αuvPu)}, where αuv is a power control parameter of the data information, and Pu is the maximum transmit power of the second node; and a power coefficient of the security protection information muv is βuvPu, where βuv is a power control parameter of the security protection information. In addition, the second node may pre-equalize the signal by using an equalization coefficient e−jϕ
In another example, equalization processing may be performed on a signal after the signal is received by the first node (that is, a signal receive end). For example, the to-be-sent signal {tilde over (w)}uv of the second node may be represented as:
In this implementation, for example, the received signal received by the first node from the second node may be represented as:
huv represents a weighting coefficient of a channel between the first node and the second node, and nuv represents channel noise.
To enable the first node to obtain wuv through unbiased estimation from Ruv, and the signal obtained by superimposing the security protection information muv meets the information security protection requirement of the first node, the power control parameters αuv and βuv need to meet the following constraint conditions:
εv is the information security threshold corresponding to the information security protection requirement of the first node, δ is a probability that the information security protection requirement is not met, and σv2 is a channel noise power.
To maximize the SNR of the received signal Ruv, it may be obtained that the power control parameter αuv that meets the foregoing constraint condition meets the following formula:
and εuvth1 is a threshold of a value range of εv. As shown in Formula (1), if
In addition, it may be obtained that the power control parameter βuv that meets the foregoing constraint condition meets the following formula:
Therefore, the first node may obtain the power control parameter a, and the power control parameter βuv based on the information security threshold εv, the maximum transmit power Pu of the second node, and the channel information between the first node and the second node (for example, including the channel weighting coefficient huv and/or the channel noise power σv2 that are/is between the first node and the second node and that are/is obtained by the first node by performing channel measurement). The first node may send the first power control information to the second node, where the first power control information indicates the power control parameter αuv and the power control parameter βuv. It may be understood that, the “indication” in this application includes a direct indication, an indirect indication, an explicit indication, and an implicit indication.
In an example, the first power control information may indicate the power control parameter αuv and the power control parameter βuv. Alternatively, the first power control information may indicate one of the two power control parameters, and the second node may determine the other power control parameter based on the one power control parameter and a relationship between αuv and βuv (that is, a sum of the two power control parameters is 1).
In another example, the first power control information may indicate a ratio of αuv to βuv, and the second node may determine two power control parameters based on a relationship between αuv and βuv.
In still another example, the first power control information indicates an identifier of a power control parameter. For example, the first node determines, based on the power control parameter, an identifier corresponding to the power control parameter in a predefined power control parameter set. For example, the predefined power control parameter set includes a plurality of power control parameters and an identifier of each power control parameter. The first node sends, to the second node, the first power control information that indicates the identifier corresponding to the power control parameter, and the second node determines, based on the identifier of the power control parameter indicated by the first power control information, the power control parameter corresponding to the identifier in the predefined power control parameter set. The first power control information may indicate an identifier corresponding to one power control parameter in αuv and βuv, and the second node determines the other power control parameter based on the relationship between αuv and βuv. Alternatively, the first power control information may indicate identifiers of the two power control parameters, and the second node determines the two power control parameters based on the identifiers.
In Implementation 2, there are a plurality of second nodes, and a received signal of the first node is a superimposed signal of signals from the plurality of second nodes. The first node obtains power control information corresponding to each second node based on the information security threshold, the maximum transmit power of each second node, and the channel information between the plurality of second nodes and the first node.
In other words, the plurality of second nodes may send the signals to the first node, and the signals of the plurality of second nodes are superimposed on the channel, and the received signal of the first node is a superimposed signal of the signals from the plurality of second nodes.
The plurality of second nodes may perform pre-equalization processing on a signal, so that the first node may restore data information based on the superimposed signal. A to-be-sent signal of each second node may be represented as {tilde over (w)}uv obtained through the pre-equalization processing. For example, there are N second nodes, identifiers of the N second nodes are respectively 1 to N, and N is an integer greater than 1. A to-be-sent signal of the second node (denoted as a second node 1) whose identifier is 1 may be represented as:
P1 is a maximum transmit power of the second node 1, w1v represents data information of the second node 1, m1v represents security protection information of the second node 1, α1v represents a power control parameter of the data information of the second node 1, and βuv is a power control parameter of the data information of the second node 1. For a to-be-sent signal of a second node with another identifier, refer to the foregoing representation manner of the to-be-sent signal of the second node 1. For brevity, details are not described herein again.
The plurality of second nodes send the to-be-sent signals of the plurality of second nodes to the first node, and the to-be-sent signals of the plurality of second nodes are superimposed on a channel, so that a received signal received by the first node is Rv, that is, a superimposed signal of the signals from the plurality of second nodes, which may be represented as follows:
and N(v) is a set of identifiers of the second nodes. For example, there are N second nodes, and a set of identifiers of the second nodes includes N identifiers corresponding to the N second nodes. For example, if the identifiers of the N second nodes are respectively 1 to N, the received signal may be represented as:
h1v is channel information between the second node whose identifier is 1 and the first node, h2v is channel information between the second node whose identifier is 2 and the first node, and hNv is channel information between the second node whose identifier is N and the first node.
The SNR of the received signal Rv may be represented as follows:
To enable the first node to obtain wv through unbiased estimation from Rv, the data information
or average value information
of the data information of the plurality of second nodes is superimposed, and Rv meets the information security protection requirement of the first node, and αuv and βuv need to meet the following constraint condition:
represents that
is defined as Cv, or in other words, represents that
is represented by Cv, and Cv in an expression including Cv may be replaced with
εv is an information security threshold corresponding to the information security protection requirement of the first node, and σv2 is a channel noise power.
To maximize the SNR of the received signal Ruv, it may be obtained that the power control parameter αuv that meets the foregoing constraint condition meets the following formula:
N is a quantity of second nodes in a set N(v), εuvth2 is another threshold in a value range of εv, and εuvth2 may be expressed as follows:
In addition, it may be obtained that the power control parameter βuv that meets the foregoing constraint condition meets the following formula:
and βuv′ is obtained by solving a problem by using a quasi-water-filling method, and the problem solved by using the quasi-water-filling method may be represented as:
represents that
is defined as βuvU, or in other words,
is represented by βuvU, and βuvU in an expression including βuvU may be replaced with
For the foregoing to-be-solved problem, the first node may perform a step of solving by using the quasi-water injection method, to obtain a value βuv′ of βuv corresponding to εuvth2<εv≤εuvth1.
and initialize a set 1=N(v)
2. When D>0, calculate a water injection line
where NI represents a quantity of elements in a set I, and determine a water injection policy:
If |huv|2βuvU≥
and update D=0, where ∀u∈I represents that any u belongs to the set I;
where
A is an indication function, indicating that if A is true, A=1; or if A is false,
A=0.
in the foregoing formula represents that:
In addition, update:
and
The first node may obtain the channel information huv between the first node and each second node through channel measurement. For example, there are N second nodes, and identifiers of the N second nodes are respectively 1 to N. The first node may measure a channel between the first node and a second node whose identifier is u=1 to obtain the channel information h1v. The first node may measure channel information h2v between the first node and a second node whose identifier is u=2, and measure channel information between the first node and another second node, for example, the first node may measure channel information hNv between the first node and a second node whose identifier is u=N. It should be noted that, a sequence in which the first node measures the channel information between the first node and the plurality of second nodes is not limited in embodiments of this application.
The first node may separately obtain, based on a value interval to which a value of the information security threshold εv belongs, the maximum transmit power Pu of each second node, and the channel information between the first node and each second node (for example, including a channel weighting coefficient huv and a channel noise power σv2), a power control parameter αuv and a power control parameter βuv that correspond to each second node. The first node sends the power control information to each second node, to notify each second node of the power control parameter corresponding to the second node.
S302: The first node sends the first power control information to the second node, where the first power control information is used by the second node to generate a first signal.
Correspondingly, the second node receives the first power control information from the first node. The second node determines, based on the first power control information, a power control parameter for generating the first signal, where the first signal is a signal sent by the second node to the first node.
The following provides an example of an indication manner in which the first power control information indicates the power control parameter αuv and the power control parameter βuv. It should be understood that, the indication manner of the first power control information is not limited in this application. It may be understood that, the “indication” in this application includes a direct indication, an indirect indication, an explicit indication, and an implicit indication.
In an example, the first power control information may indicate the power control parameter αuv and the power control parameter βuv. Alternatively, the first power control information may indicate one of the two power control parameters, and the second node may determine the other power control parameter based on the one power control parameter and a relationship between αuv and βuv (that is, a sum of the two power control parameters is 1).
In another example, the first power control information may indicate a ratio of αuv to βuv, and the second node may determine the two power control parameters based on a relationship between αuv and βuv.
In still another example, the first power control information indicates an identifier of a power control parameter. For example, the first node determines, based on the power control parameter, the identifier corresponding to the power control parameter in a predefined power control parameter set, and notifies the second node by using the first power control information. The second node determines, based on the identifier of the power control parameter indicated by the first power control information, the power control parameter corresponding to the identifier in the predefined power control parameter set. The first power control information may indicate an identifier corresponding to one power control parameter in αuv and βuv, and the second node determines the other power control parameter based on the relationship between αuv and βuv. Alternatively, the first power control information may indicate identifiers of the two power control parameters, and the second node determines the two power control parameters based on the identifiers.
S303: The second node sends the first signal to the first node, where the first signal includes data information and first security protection information, and the first security protection information is used to protect information security of the data information.
After determining the power control parameters αuv and βuv based on the first power control information, the second node may generate the first signal {tilde over (w)}uv, where the first signal includes the data information wuv and the security protection information muv. The first signal {tilde over (w)}uv may be represented as follows:
Alternatively, the second node may perform pre-equalization processing on the signal, and the first signal {tilde over (w)}uv may be represented as follows:
An equalization coefficient e−jϕ
Correspondingly, the first node receives the first signal from the second node.
In an implementation, the first node receives a first signal from the second node, the first node receives the first signal to obtain a received signal Ruv, and the first node may obtain wuv in the received signal Ruv through decoding.
In another implementation, there are a plurality of second nodes. The first node receives a superimposed signal of first signals from the plurality of second nodes, to obtain a received signal Rv, and obtains wv in the received signal through decoding, where wv is superimposed data information
or wv is average value information
of data information of the plurality of second nodes.
According to the foregoing solution, security of the data information transmitted over a wireless channel can be improved, a probability of information leakage can be reduced, and the signal-to-noise ratio of the received signal can be maximized when the security protection requirement of the data information is met, improving the transmission reliability of the data information.
The foregoing describes the graph neural network GNN. In this application, the GNN may be applied to a wireless communication network. By using the GNN, each communication node can obtain features and dependencies of its adjacent nodes of different depths in its environment. In this way, a status feature of the communication node is determined, higher-quality communication may be implemented, and distributed control and scheduling of a network may be implemented.
Each of the plurality of communication nodes that participate in GNN inference may be used as an adjacent node (denoted as a node u) of another node (denoted as a node v), the intermediate result qu(k-1) obtained at the previous layer (for example, a (k−1)th layer) and the feature euv of the edge of the node and the node v are input into the kth layer of the first machine learning model, to obtain the node feature information ƒt(k)({qu(k-1),euv} output by the kth layer, and send the node feature information to the node v. In addition, each node further serves as the node v to receive the node feature information ƒt(k){qu(k-1),euv} sent by each adjacent node of the node v, to obtain the intermediate result corresponding to the kth layer of the model, that is, the aggregation feature information
of the adjacent node. Then, the node v inputs the intermediate results qu(k-1) and qv(k) obtained at the (k−1)th layer into the kth layer of the second machine learning model, to obtain the output result ov(k)=ƒo(k)(qv(k-1),qv(k)) of the kth layer. It can be learned that the node feature information obtained by the node u through each layer iteration needs to be transmitted over a wireless channel, and two consecutive communications are highly correlated. The information security protection method shown in
S401: The node u broadcasts a maximum transmit power Pu.
In an initialization process, each node broadcasts a maximum transmit power, and receives a maximum transmit power broadcast by an adjacent node. The node v receives the maximum transmit power Pu of each node u, where u∈N(v), and N(v) is a set of identifiers of adjacent nodes of the node. After obtaining the maximum transmit power of the adjacent node in the initialization process, each node performs inference at each layer of a machine learning model. The following S402 to S409 show an inference process at a kth layer.
S402: The node v obtains channel information from each node u to the node v.
For inference at the kth layer, the node v may obtain channel information huv(k) between the node v and each node u through channel measurement. For example, there are N nodes u, and identifiers of the N nodes u are respectively 1 to N. The node y may measure a channel between the node v and a node u whose identifier is u=1, to obtain channel information h1v(k) corresponding to inference at the kth layer. The node v may measure a channel between the node v and a node u whose identifier is u=2, to obtain channel information h2v(k) corresponding to inference at the kth layer, and measures channel information between the node v and another node u. For example, the node v may measure a channel between the node v and a node u whose identifier is u=N, to obtain channel information hNv(k) corresponding to inference at the kth layer. It should be noted that, a sequence in which the node v measures the channel information between the node v and the plurality of nodes u is not limited in embodiments of this application. The channel information corresponding to inference at the kth layer of the node v and each node u may be represented as
where |huv(k)| represents an amplitude of the channel information huv(k), and ϕuv(k) represents a phase of the channel information huv(k).
S403: The node v obtains power control information corresponding to the node u based on an information security threshold, a maximum transmit power of the node u, and channel information between the node u and the node v.
The power control information corresponding to the node u is used by the node u to generate a first signal.
In an implementation, there is one or more nodes u, and the node v separately receives a first signal from the node u in S407. In this case, the node v may obtain the power control information corresponding to the node u based on the information security threshold εv, the maximum transmit power Pu of one node, and the channel information between the node u and the node v.
The power control information may be used to indicate a power control parameter αuv(k) and/or a power control parameter Buv(k), where αuv(k) is a power control parameter of the data information of the node u, and βuv(k) is a power control parameter of the security protection information of the node u. For a manner in which the node v obtains the power control parameter αuv(k) and/or the power control parameter βuv(k) that correspond to the node u, refer to Implementation 1 in the embodiment shown in
In another implementation, there are a plurality of nodes u, and the node v receives a superimposed signal of first signals from the plurality of nodes u in S407. In this case, the node v obtains, based on an information security threshold εv, a maximum transmit power of the plurality of nodes u, and channel information between the plurality of nodes u and the node v, power control information corresponding to each node u.
For a manner in which the node v obtains the power control parameters αuv(k) and αuv(k) corresponding to the node u, refer to Implementation 2 in the embodiment shown in
S404: The node v sends the power control information to each node u.
The node y notifies, by using the power control information, the power control parameter corresponding to each node u. For a specific implementation in which the power control information indicates the power control parameter, refer to the foregoing descriptions. For brevity, details are not described herein again.
Optionally, the node y may send first information to each node u, and the first information is used to request node feature information output by a kth layer of a first machine learning model. In this way, after receiving the first information, each node u sends, to the node v, the node feature information that is output by the kth layer of the first machine learning model and that is obtained by each node u.
The node y may separately send the power control information and the first information to each node. Alternatively, the first information may include the power control information. Alternatively, the power control information may be used as the first information to request the node feature information output by the kth layer of the first machine learning model. After receiving the power control information, the node u sends corresponding node feature information to the node v.
S405: The node u inputs second feature information into the kth layer of the first machine learning model, to obtain the node feature information output by the kth layer of the first machine learning model.
The second feature information is denoted as qu(k-1). If k=1, the second feature information qu(k-1) is node feature information xu of the node u, that is, qu(0)=xu, and the node feature information output by the kth layer of the first machine learning model is ƒt(1)({xu,euv}).
If k is an integer greater than 1, the second feature information qu(k-1) is adjacent node feature information that corresponds to a (k−1)th layer of the first machine learning model and that is obtained by the node u. For the adjacent node feature information qu(k-1) that corresponds to the (k−1)th layer of the first machine learning model, refer to the following implementation of qv(k) determined by the node v in S408.
For example, the kth layer of the first machine learning model may be represented as a function ƒt(k), and the second feature information qu(k-1) is input into the kth layer of the first machine learning model, to obtain the node feature information ƒt(k){qu(k-1),euv} output by the kth layer of the first machine learning model, where euv is feature information of an edge of the node u and the node v.
S406: The node u generates the first signal based on the power control information, where the first signal includes the node feature information output by the kth layer of the first machine learning model and security protection information.
The node u may need to superimpose the security protection information muv on the node feature information ƒt(k)({qu(k-1),euv}. The security protection information muv may be white Gaussian noise. However, this is not limited in this application. The node u may determine the power control parameters αuv(k) and βuv(k) based on the power control information, to generate the first signal based on the power control parameters αuv(k) and βuv(k), the node feature information ƒt(k)({qu(k-1),euv}, and the security protection information muv.
In an example, the first signal may be represented as:
L is an upper limit of a norm ∥{tilde over (w)}uv(k)∥2 of the data information {tilde over (w)}uv(k), that is, ∥{tilde over (w)}uv(k)∥2≤L, and e−jϕ
In another example, if the node v receives the first signal from each node u in S407, the node u may not perform pre-equalization processing, and the first signal may be represented as:
According to the foregoing solution, the node u performs power control on the to-be-sent node feature information and the security protection information based on the power control information, so that security of the data information transmitted over a wireless channel can be improved, a probability of information leakage can be reduced, and a signal-to-noise ratio of a received signal can be maximized when the security protection requirement of data information is met, improving the transmission reliability of the data information.
S407: Each node u sends the first signal to the node v.
The node v receives the first signal from each node u.
In an implementation, there are a plurality of nodes u, and the node v receives a superimposed signal of first signals from the plurality of nodes u, to obtain a received signal Rv(k).
For example, the plurality of nodes u simultaneously send respective first signals, so that the first signals of the plurality of nodes u are superimposed on a channel, and the node v receives and obtains the received signal Rv(k). For example, the received signal Rv(k) may be represented as:
nv(k) includes channel noise of a channel between the plurality of nodes u and the node v,
and nuv(k) is channel noise of a channel between the node u and the node v.
For example, there are N second nodes, and a set of identifiers of the second nodes includes N identifiers corresponding to the N second nodes. For example, if the identifiers of the N second nodes are respectively 1 to N, the first node receives a superimposed signal of first signals of the N second nodes, and an obtained received signal Rv(k) may be represented as:
h1v(k) is channel information corresponding to inference at the kth layer between a second node whose identifier is 1 and the first node, h2v(k) is channel information corresponding to inference at the kth layer between a second node whose identifier is 2 and the first node, and hNv(k) is channel information corresponding to inference at the kth layer between a second node whose identifier is N and the first node.
In another implementation, the node v separately receives a first signal of each node u, to obtain a received signal Ruv corresponding to each node u. For example, the received signal Ruv may be represented as:
where,
nuv(k) is channel noise of a channel between the node u and the node v.
S408: The node v estimates, based on the received signal obtained by receiving the first signal, adjacent node feature information corresponding to the kth layer of the first machine learning model.
For example, the received signal is a superimposed signal Rv received by the first node after the first signals of the plurality of nodes u are superimposed on the channel, or if the plurality of nodes u are included, the node v separately receives first information of each node u, and after obtaining a received signal Ruv corresponding to each node u, the node v performs superimposition processing on the received signal Ruv corresponding to the plurality of nodes u, to obtain the superimposed signal Rv, that is,
The node v obtains, through estimation based on the superimposed signal Rv, the adjacent node feature information qv(k) corresponding to the kth layer of the first machine learning model, where qv(k) is an average value of a superimposed signal of node feature information ƒt(k)({qu(k-1),euv} that is output by the kth layer of the first machine learning model and that is from each node u, that is:
where
For another example, the node v separately receives a first signal of each node, to obtain a received signal Ruv corresponding to each node u. The node v may obtain, through estimation based on each received signal Ruv, node feature information that ƒt(k)({qu(k-1),euv} that is output by the kth layer of the first machine learning model on a corresponding node u. The node v obtains an average value qv(k) of a superimposed signal of all node feature information ƒt(k)({qu(k-1),euv}. For details, refer to the foregoing expression.
S409: The node v inputs the first feature information and the adjacent node feature information corresponding to the kth layer of the first machine learning model into a kth layer of a second machine learning model, to obtain aggregation node feature information output by the kth layer of the second machine learning model.
For example, the kth layer of the second machine learning model may be represented as a function ƒo(k), and the node v inputs the first feature information qv(k-1) and the adjacent node feature information qv(k) corresponding to the kth layer of the first machine learning model into the kth layer of the second machine learning model, to obtain the aggregation node feature information ov(k) output by the kth layer of the second machine learning model, that is:
If k is an integer greater than 1, qu(k-1) is aggregation node feature information that is output by a (k−1)th layer of the second machine learning model and that is obtained by the node v.
Each of a plurality of communication nodes that participate in GNN inference is used as the node u in inference at the kth layer, to infer ƒt(k)({qu(k-1),euv}, the first signal is generated based on the power control information from each adjacent node (that is, the node v), and the first signal is sent to a corresponding adjacent node. In addition, each communication node further serves as the node v to obtain the power control information of each adjacent node (that is, the node) through prediction and notify each adjacent node, and then receives the first signal that is obtained through processing on the power control information from each adjacent node and that includes the security protection information, to obtain the adjacent node feature information qv(k) corresponding to the kth layer of the first machine learning model, input the adjacent node feature information into the kth layer of the second machine learning model, and obtain the output result of the kth layer of the GNN through inference. Each node then performs inference at a (k+1)th layer of the GNN. For details, refer to the procedures of S402 to S409. For brevity, details are not described herein again. Each communication node may complete an inference process through inference at K layers of the GNN, and each communication node obtains a GNN inference result including an output result of each of the K layers. K is a positive integer, and may be determined based on a specific implementation. This is not limited in this application.
It should be noted that, each node may exchange, based on an information security protection requirement, power control information at a GNN inference layer at which information security protection needs to be performed, and generate, based on the power control information, a signal including security protection information. At a GNN inference layer at which information security protection does not need to be performed, the power control information may not need to be exchanged, and a to-be-sent signal including node feature information may not include the security protection information. This may be implemented based on a specific implementation requirement. This is not limited in this application.
The GNN is applied to a wireless communication network, so that each communication node can obtain features and dependencies of its adjacent nodes of different depths in its environment. In this way, a status feature of the communication node is determined, higher-quality communication may be implemented, and distributed control and scheduling of a network may be implemented. In a GNN inference process, information security protection is performed and transmit power control is performed by adding noise at a transmit end, so that information security and information transmission reliability in the inference process can be improved.
To implement GNN inference in the wireless network, and obtain expected inference performance, the first machine learning model and the second machine learning model need to match a wireless network environment in a training process. A data processing node in a network may train data to perform model training. The data processing node may be a core network node, a server, an OAM, or the like. However, this application is not limited thereto. The training data may be obtained by collecting data of a communication node in a wireless network. The training data includes node feature information (that is, node data), association data between adjacent nodes (that is, edge data, for example, channel information between adjacent nodes), channel information used for security protection, a maximum transmit power of a node, and security requirement data. The communication node may include but is not limited to a terminal and/or a wireless access network node.
After the training data is collected, the data processing node may perform data preprocessing, and perform a training process of the GNN model (including the first machine learning model and the second machine learning model) based on the preprocessed training data. In this process, each model training includes iterative forward propagation and backward gradient updates. In a forward propagation process, a wireless channel environment, information security protection, and power control need to be simulated. Specifically, for the forward propagation process, refer to the inference process in the embodiment shown in
The foregoing describes in detail the method provided in this application with reference to the accompanying drawings. The following accompanying drawings describe a communication apparatus and a communication device provided this application. To implement functions in the methods provided in this application, network elements may include a hardware structure and/or a software module, and implement the foregoing functions in a form of the hardware structure, the software module, or a combination of the hardware structure and the software module. Whether a function in the foregoing functions is performed by using the hardware structure, the software module, or the combination of the hardware structure and the software module depends on particular applications and design constraints of the technical solutions.
In a possible design, the communication apparatus 500 may correspond to the first node in the foregoing method. When the communication apparatus 500 corresponds to the first node, the communication apparatus 500 may be a communication device, or the communication apparatus 500 may be a chip configured in (or used in) a communication device, or another apparatus, module, circuit, unit, or the like that can implement a method of the first node.
It should be understood that, the communication apparatus 500 may include units configured to perform the method performed by the first node in the foregoing method embodiments. In addition, the units in the communication apparatus 500 and the foregoing other operations and/or functions are separately used to implement corresponding procedures in the foregoing method embodiments.
Optionally, the communication apparatus 500 may further include a processing unit 510. The processing unit 510 may be configured to process instructions or data, to implement a corresponding operation.
It should be further understood that, when the communication apparatus 500 is a chip configured in (or used in) the first node, the transceiver unit 520 in the communication apparatus 500 may be an input/output interface or a circuit of the chip, and the processing unit 510 in the communication apparatus 500 may be a processor in the chip.
Optionally, the communication apparatus 500 may further include a storage unit 530. The storage unit 530 may be configured to store instructions or data. The processing unit 510 may execute the instructions or the data stored in the storage unit, so that the communication apparatus is enabled to implement a corresponding operation.
It should be further understood that, a specific process in which each unit performs the foregoing corresponding steps has been described in detail in the foregoing methods. For brevity, details are not described herein again.
In another possible design, the communication apparatus 500 may correspond to the second node in the foregoing method. When the communication apparatus 500 corresponds to the second node, the communication apparatus 500 may be a communication device, or the communication apparatus 500 may be a chip configured in (or used in) a communication device, or another apparatus, module, circuit, unit, or the like that can implement a method of the second node.
It should be understood that, the communication apparatus 500 may include units configured to perform the method performed by the second node in the foregoing method embodiments. In addition, the units in the communication apparatus 500 and the foregoing other operations and/or functions are separately used to implement corresponding procedures in the foregoing method embodiments.
Optionally, the communication apparatus 500 may further include a processing unit 510. The processing unit 510 may be configured to process instructions or data, to implement a corresponding operation.
It should be further understood that, when the communication apparatus 500 is a chip configured in (or used in) the second node, the transceiver unit 520 in the communication apparatus 500 may be an input/output interface or a circuit of the chip, and the processing unit 510 in the communication apparatus 500 may be a processor in the chip.
Optionally, the communication apparatus 500 may further include a storage unit 530. The storage unit 530 may be configured to store instructions or data. The processing unit 510 may execute the instructions or the data stored in the storage unit, so that the communication apparatus is enabled to implement a corresponding operation.
It should be understood that, the transceiver unit 520 in the communication apparatus 500 may be implemented by using a communication interface (for example, a transceiver, a transceiver circuit, an input/output interface, a pin, or the like), for example, may correspond to a transceiver 620 in a communication apparatus 600 shown in
Optionally, the communication apparatus 600 includes one or more memories 630, configured to store instructions 631. Optionally, the memory 630 may further store data. The processor and the memory may be separately disposed, or may be integrated together.
Optionally, the communication apparatus 600 may further include a transceiver 620 and/or an antenna 640. The transceiver 620 may be configured to send information to another apparatus or receive information from another apparatus. The transceiver 620 may be referred to as a transceiver, a transceiver circuit, an input/output interface, or the like, and is configured to implement a transceiver function of the communication apparatus 600 by using the antenna 640. Optionally, the transceiver 620 includes a transmitter and a receiver.
The communication apparatus 600 may be used in the communication device in the system shown in
In this application, the processor may be a general-purpose processor, a digital signal processor, an application-specific integrated circuit, a field programmable gate array or another programmable logic device, a discrete gate or a transistor logic device, or a discrete hardware component, and may implement or perform the methods, steps, and logical block diagrams in this application. The general-purpose processor may be a microprocessor or any conventional processor or the like. The steps of the methods with reference to this application may be directly performed and completed by a hardware processor, or may be performed and completed by a combination of hardware and software modules in the processor.
In this application, the memory may be a non-volatile memory, such as a hard disk drive (HDD) or a solid-state drive (SSD), or may be a volatile memory, such as a random access memory (RAM). The memory is any other medium that can carry or store expected program code in a form of instructions or a data structure and that can be accessed by a computer, but is not limited thereto. The memory in this application may alternatively be a circuit or any other apparatus that can implement a storage function, and is configured to store program instructions and/or data.
This application further provides a processing apparatus, including a processor and a (communication) interface. The processor is configured to perform the method provided in the foregoing method embodiments.
It should be understood that, the processing apparatus may be one or more chips. For example, the processing apparatus may be a field programmable gate array (FPGA), an application-specific integrated circuit (ASIC), a system on chip (SoC), a central processing unit (CPU), a network processor (NP), a digital signal processing circuit (e.g. a digital signal processor (DSP)), a microcontroller (MCU), a programmable controller (PLD), or another integrated chip.
This application further provides a computer-readable storage medium. The computer-readable storage medium stores a computer program or instructions. When the computer program or the instructions are run, the method performed by the second node or the first node device in the foregoing method embodiments is implemented. In this way, the functions described in the foregoing embodiments may be implemented in a form of a software functional unit and sold or used as an independent product. Based on such an understanding, the technical solutions of this application essentially, or the part contributing to the conventional technology, or some of the technical solutions may be implemented in a form of a software product. The computer software product is stored in a storage medium, and includes several instructions for instructing a computer device (which may be a personal computer, a server, a second node, or the like) to perform all or some of the steps of the methods described in embodiments of this application. The storage medium includes: any medium that can store program code, such as a USB flash drive, a removable hard disk drive, a read-only memory (ROM), a random access memory RAM, a magnetic disk, or an optical disc.
According to the method provided in this application, this application further provides a computer program product. The computer program product includes computer program code. When the computer program code is executed by one or more processors, an apparatus including the processor is enabled to perform the methods shown in
All or some of the technical solutions provided in this application may be implemented by using software, hardware, firmware, or any combination thereof. When software is used to implement embodiments, all or some of embodiments may be implemented in a form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the procedure or functions according to this application are all or partially generated. The foregoing computer instructions may be stored in a computer-readable storage medium, or may be transmitted from a computer-readable storage medium to another computer-readable storage medium. The computer-readable storage medium may be any usable medium accessible by a computer, or a data storage device, such as a server or a data center, integrating one or more usable media. The usable medium may be a magnetic medium (for example, a floppy disk, a hard disk drive, or a magnetic tape), an optical medium (for example, a digital video disc (DVD)), a semiconductor medium, or the like.
According to the method provided in this application, this application further provides a system, including the foregoing one or more first node devices. The system may further include the foregoing plurality of second nodes.
In the several embodiments provided in this application, it should be understood that, the disclosed system, apparatus, and method may be implemented in another manner. For example, the described apparatus is merely an example. For example, division into the units is merely logical function division and may be other division during actual implementation. For example, a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed. In addition, the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented by using some interfaces. The indirect couplings or communication connections between the apparatuses or units may be implemented in electronic, mechanical, or other forms.
The foregoing descriptions are merely specific implementations of this application, but are not intended to limit the protection scope of this application. Any variation or replacement readily figured out by a person skilled in the art within the technical scope disclosed in this application shall fall within the protection scope of this application. Therefore, the protection scope of this application shall be subject to the protection scope of the claims.
This application is a continuation of International Application No. PCT/CN2022/103176, filed on Jun. 30, 2022, the disclosure of which is hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/CN2022/103176 | Jun 2022 | WO |
Child | 19001879 | US |