Method of controlling location acquisition, user terminal and device

ABSTRACT

A method of controlling a location acquisition, a user terminal and a device are provided. The method includes: determining whether a predetermined condition is satisfied; in the case that the predetermined condition is satisfied, sending control information configured to control a relevant behavior of acquiring a location of the user terminal.

CROSS REFERENCE OF RELATED APPLICATION

The present application is the U.S. national phase of PCT ApplicationPCT/CN2018/115204 filed on Nov. 13, 2018, which claims a priority ofChinese patent application No. 201711204326.6 filed on Nov. 27, 2017,which is incorporated herein by reference in its entirety.

TECHNICAL FIELD

The present disclosure relates to the field of communicationtechnologies, and in particular to a method of controlling a locationacquisition, a user terminal and a device.

BACKGROUND

In the location service in the related art, the network activelyrequests the user terminal to report the location of the user terminal.For example, the network requires the user terminal to perform alocation measurement and report the location according to the request ofthe location service client. However, in actual applications, the userof the user terminal does not necessarily want to report its location,so the user terminal may not respond to the request sent by the network,which results in a waste of transmission resources occupied by signalingand consumes power consumption of the user terminal. It can be seen thatthe location service in the related art, the transmission resource iswasted and the power consumption is large.

SUMMARY

In a first aspect, a method of controlling a location acquisition isprovided in an embodiment of the present disclosure, applied to a userterminal, including:

determining whether a predetermined condition is satisfied;

in the case that the predetermined condition is satisfied, sendingcontrol information configured to control a relevant behavior ofacquiring a location of the user terminal.

In a second aspect, a method of controlling a location acquisition isfurther provided in an embodiment of the present disclosure, applied toa network unit or a location service client, including:

receiving control information configured to control a relevant behaviorof acquiring a location of a user terminal;

controlling, based on or referring to the control information, therelevant behavior of acquiring the location of the user terminal.

In a third aspect, a user terminal is further provided in an embodimentof the present disclosure, including:

a determining module, configured to determine whether a predeterminedcondition is satisfied;

a sending module, configured to, in the case that the predeterminedcondition is satisfied, send control information configured to control arelevant behavior of acquiring a location of the user terminal.

In a fourth aspect, a device of controlling a location acquisition isfurther provided in an embodiment of the present disclosure, applied toa network unit or a location service client, including:

a receiving module, configured to receive control information configuredto control a relevant behavior of acquiring a location of a userterminal;

a controlling module, configured to control, based on or referring tothe control information, the relevant behavior of acquiring the locationof the user terminal.

In a fifth aspect, a user terminal is further provided in an embodimentof the present disclosure, including: a memory, a processor and acomputer program stored in the memory and executable on the processor,where the computer program is executed by the processor to perform themethod of controlling a location acquisition at the user terminal sidein the embodiment of the present disclosure.

In a sixth aspect, a device of controlling a location acquisition isfurther provided in an embodiment of the present disclosure, including:a memory, a processor and a computer program stored in the memory andexecutable on the processor, where the computer program is executed bythe processor to perform the method of controlling a locationacquisition at the device of controlling a location acquisition side inthe embodiment of the present disclosure.

In a seventh aspect, a computer-readable storage medium storing acomputer program is further provided in an embodiment of the presentdisclosure, where the computer program is executed by a processor toperform the method of controlling a location acquisition at the userterminal side in the embodiment of the present disclosure.

In an eighth aspect, a computer-readable storage medium storing acomputer program is further provided in an embodiment of the presentdisclosure, where the computer program is executed by a processor toperform the method of controlling a location acquisition at the deviceof controlling a location acquisition side in the embodiment of thepresent disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

In order to more clearly explain the technical solutions of theembodiments of the present disclosure, the drawings required for thedescription of the embodiments of the present disclosure will be brieflydescribed below. Obviously, the drawings in the following descriptionare only some embodiments of the present disclosure. For those ofordinary skill in the art, without any creative work, other drawings mayalso be acquired based on these drawings.

FIG. 1 is a structural diagram of a system of controlling a locationacquisition in an embodiment of the present disclosure;

FIG. 2 is a flowchart of a method of controlling a location acquisitionin an embodiment of the present disclosure;

FIG. 3 is a flowchart of a method of controlling a location acquisitionin another embodiment of the present disclosure;

FIG. 4 is a flowchart of a method of controlling a location acquisitionin another embodiment of the present disclosure;

FIG. 5 is a schematic view of a method of controlling a locationacquisition in another embodiment of the present disclosure;

FIG. 6 is a schematic view of a method of controlling a locationacquisition in another embodiment of the present disclosure;

FIG. 7 is a schematic view of a method of controlling a locationacquisition in another embodiment of the present disclosure;

FIG. 8 is a schematic view of a method of controlling a locationacquisition in another embodiment of the present disclosure;

FIG. 9 is a schematic view of a method of controlling a locationacquisition in another embodiment of the present disclosure;

FIG. 10 is a structural diagram of a user terminal in an embodiment ofthe present disclosure;

FIG. 11 is a structural diagram of a device of controlling a locationacquisition in an embodiment of the present disclosure;

FIG. 12 is a structural diagram of a device of controlling a locationacquisition in another embodiment of the present disclosure;

FIG. 13 is a structural diagram of a device of controlling a locationacquisition in another embodiment of the present disclosure;

FIG. 14 is a structural diagram of a user terminal in another embodimentof the present disclosure; and

FIG. 15 is a structural diagram of a device of controlling a locationacquisition in another embodiment of the present disclosure.

DETAILED DESCRIPTION

The technical solutions in the embodiments of the present disclosurewill be described clearly and completely in conjunction with thedrawings in the embodiments of the present disclosure. Obviously, thedescribed embodiments are part of the embodiments of the presentdisclosure, but not all of the embodiments. Based on the embodiments ofthe present disclosure, all other embodiments acquired by a person ofordinary skill in the art without creative work fall within the scope ofthe present disclosure.

Referring to FIG. 1 which is a structural diagram of a system ofcontrolling a location acquisition in an embodiment of the presentdisclosure. As shown in FIG. 1, the system includes a user terminal 11,a radio access network unit 12, a core network unit 13 and at least onelocation service client 14. The user terminal 11 may be a User Equipment(UE), for example, a mobile phone, a Tablet Personal Computer, a LaptopComputer, a personal digital assistant (PDA), a Mobile Internet Device(MID) or a Wearable Device and other terminal-side devices. It should benoted that the specific type of the user terminal 11 is not limited inthe embodiment of the present disclosure. The radio access network unit12 may be a radio access network node and/or a radio access networkfunction. The radio access network unit may include but is not limitedto at least one of: an evolved Node B (eNB), a next-generation Basestation (gNB), a Centralized Unit (CU), a Distributed Unit (DU), aCentralized Unit Control Plane (CU-CP), a Centralized Unit User Plane(CU-UP). It should be noted that the specific type of the radio accessnetwork unit 12 is not limited in the embodiment of the presentdisclosure. The user terminal 11 may communicate with the core networkunit 13 through the radio access network unit 12, where the core networkunit 13 may be a core network node and/or a core network function, andthe core network unit may include but is not limited to at least one of:a mobile management node, a mobile management function, a locationservice management node, a location service management function, a userdata management node, a user data management function, an Access andMobility Management Function (AMF), a Mobile Management Entity (MME), aLocation Services (LCS), an Enhanced Service Serving Mobile LocationCentre (E-SMLC). In addition, the location service client 14 may send alocation acquiring request to the core network unit 13, and the corenetwork unit 13 may respond to or reject the location acquiring request.In addition, the location service client 14 may be called an LCS client,and may be a third-party device, such as a third-party device such as acommercial third-party device or an emergency third-party device (suchas a public security bureau) device.

The specific functions of the user terminal 11, the radio access networkunit 12, the core network unit point 13, and the location service client14 will be described in detail through the following embodiments.

In addition, it should be noted that the control information in thepresent disclosure may be referred to as one of the followinginformation:

Control information about acquiring the location of the user terminal;

Control information for controlling the relevant behavior of acquiringthe location of the user terminal.

In some embodiments, the control information described herein may alsobe understood as the user terminal and/or the user's propensityinformation regarding the acquisition of the user terminal's relevantbehavior or may be understood as the user and/or user terminal'spropensity information regarding the acquisition of the user terminal'slocation.

In addition, it should be noted that “permitted” in the presentdisclosure may also be referred to as enabling. The “non-permitted”appearing in the present disclosure can also be called one of thefollowing: disable, prohibit.

In addition, in the embodiment of the present disclosure, theinformation of the interaction between the user terminal and the corenetwork unit may be forwarded or transparently transmitted through theradio access network.

Optionally, the user terminal may send to the core network unit througha Radio Resource Control (RRC) message or a non-access stratum (NAS)message.

The user terminal may send to the core network unit through thefollowing but not limited to the following messages:

Registration request (such as Registration request, Attach Request),registration completed (such as Registration Complete, Attach Complete),location update request message (such as Registration request, TAURequest), location update completed (such as Registration Complete, TAUComplete), location request permits verification. In response, controlinformation about UE location acquisition is sent to the mobilitymanagement node/function. The NAS messages are transparently transmittedthrough the radio access network unit.

The RRC message is sent through the radio access network unit, and thenthe radio access network unit forwards it to the managementnode/function (such as AMF, MME) through the Si or NG interface message.

The mobile management node/function (such as AMF, MME) can send controlinformation about the location acquisition of the UE to the locationservice management node/function (such as E-SMLC, LCS).

The core network unit may contain multiple network nodes or networkfunctions (mobile management nodes/functions, location servicemanagement nodes/functions, user data management nodes/functions, etc.).In the embodiments of the present disclosure, operations between networknodes or network functions in the core network unit are not limited.

After receiving the location request sent by the location serviceclient, the location service management unit can generate a locationrequest about the user terminal and send it to the mobile managementunit. The mobile management unit sends the result of acquiring thelocation of the user terminal to the location service management unit.The interoperable location between the unit and the mobility managementunit is not limited in the embodiment.

In addition, the network units herein may represent network entitiesand/or network functions. The core network unit may represent corenetwork entities and/or core network functions. The radio access networknode may represent a radio access network entity and/or a radio accessnetwork function. The mobility management unit may represent a mobilitymanagement entity/mobility management unit. The location servicemanagement unit may represent the location service managemententity/location service management unit.

In addition, the present disclosure mentions that the verifying requestor verification process for acquiring the location of the user terminalmay be a request for the user terminal to confirm whether it ispermitted to acquire the location of the user terminal. For example, itmay be a verifying request regarding privacy permission for acquiringthe location of the user terminal, or a verifying request based onwhether the user terminal itself tends to permit an acquisition of thelocation of the user terminal.

In some embodiments, the “subsequent” herein, at the user terminal side,refers to after sending the control information by the user terminal. Inother embodiments, the “subsequent”, at the network unit side, refers toafter receiving the control information by the network unit side.

Referring to FIG. 2 which is a flowchart of a method of controlling alocation acquisition in an embodiment of the present disclosure. Asshown in FIG. 2, the method includes the following steps:

Step 201: determining whether a predetermined condition is satisfied.

The above predetermined conditions may be pre-configured by the userterminal, or pre-set by the user, or pre-defined by the protocol, orpre-configured by the network to the user terminal, and so on. Forexample, the above predetermined condition may be receiving a specificinstruction input by a user, or a specific request sent by a network,etc., which is not limited in this embodiment of the present disclosure.

Step 202: in the case that the predetermined condition is satisfied,sending control information configured to control a relevant behavior ofacquiring a location of the user terminal.

The control information sent above may be generated and/or updatedaccording to the operation input by the user.

For example, if the user wants to protect location privacy, the controlinformation may be generated and configured to not permit the relevantbehavior of acquiring the location of the user terminal. Later, if theuser wants to disclose the location of the user terminal, the controlinformation may be updated to permit to acquire and/or permit todisclose the location of the user terminal to a third party, vice versa.Alternatively, the above control information may be generatedintelligently by the user terminal.

For example, when the power of the user terminal is relatively low (forexample, when in the power saving mode) or when the measurement overheadis too large to affect other services of the UE, the control informationmay be generated and configured to not permit the relevant behavior ofacquiring the location of the user terminal. When the subsequent userterminal has sufficient power or is idle, the control information may beupdated to permit acquisition of the user terminal location and/orpermit to disclose the user terminal location to a third party, viceversa. This embodiment of the present disclosure is not limited herein.

Alternatively, the control information sent above may also be controlinformation sent by the user terminal according to the received requestmessage.

For example, when the network side sends multiple requests for acquiringthe location of the user terminal and/or sends a verifying request foracquiring the location of the user terminal, the user or the userterminal does not intend to be acquired for the location of the userterminal for a period of time, Then, the control information may begenerated and sent so that the network side no longer sends a locationrequest to the user terminal and/or sends a verifying request to acquirethe location of the user terminal within a period of time. After thetime limit expires, the network may send a request to the user terminalto acquire the location of the user terminal and/or send a verifyingrequest to acquire the location of the user terminal. Alternatively, ifthe user or the user terminal does not intend to acquire the location ofthe user terminal for a period of time, the control information may begenerated and sent. On the one hand, the request of acquiring thelocation of the user terminal and/or the verifying request of acquiringthe location of the user terminal may be friendly permitted; but it isrequired that the network side no longer send a location request to theuser terminal and/or send a verifying request for acquiring the locationof the user terminal in a subsequent period of time. After the timelimit expires, the network may send a request to the user terminal toacquire the location of the user terminal and/or send a verifyingrequest to acquire the location of the user terminal.

For example, receiving the request of acquiring the control informationand returning the control information. For example, receiving thecontrol information request indicating returning back the controlinformation when the control information is updated. Then, when thecontrol information is updated, the control information is returned.

In addition, the above-mentioned control information configured tocontrol the relevant behavior of acquiring the location of the userterminal may be that the control information may control the relevantbehavior of acquiring the location of the user terminal, where therelevant behavior of acquiring the location of the user terminal may bea behavior related to acquiring the location of the user terminal,including but not limited to at least one of: acquiring the location ofthe user terminal, disclosing the location of the user terminal (such assending the acquired location of the user terminal to a location serviceclient), triggering the user terminal to perform the locationmeasurement and responds to a location acquiring request sent by alocation service client. For example, the above control information maybe that the acquiring of the location of the user terminal is permitted,or the acquiring of the location of the user terminal is not permitted,or the disclosing of the location of the user terminal is permitted, orthe disclosing of the location of the user terminal is not permitted,and so on.

The sending the control information may be sending the controlinformation to the network side, including but not limited to sendingcontrol information to the network unit and/or location service client.The way that the user terminal sends the control information to thelocation service client is that it can be transparently transmitted orforwarded to the location service client through the network unit. Afterreceiving the above control information, the network unit and/orlocation service client may control the relevant behavior of acquiringthe location of the user terminal according to or referring to thecontrol information, for example: acquiring the location of the userterminal, or not permitting to acquire the location of the userterminal, or disclosing the location of the user terminal, or notpermitting to disclose the location of the user terminal, and so on.

In addition, the above control information may be applied to alllocation service clients or a part of location service clients, forexample: the user terminal and the network unit pre-negotiate thelocation service client to which the above control information isapplicable, or the protocol predefines the location service client towhich the above control information is applicable. The location requestssuch as public security bureaus or schools to serve clients' urgentbusiness needs can always be permitted, not limited by the controlinformation.

Through the above steps, the user terminal may control the relevantbehavior of acquiring the location of the user terminal, which canreduce some meaningless signaling overhead to save transmissionresources, and can also reduce the power consumption and locationmeasurement overhead of the user terminal.

It should be noted that the above method provided in the embodiment ofthe present disclosure can be applied to a 5G system, but it is notlimited to this, as long as it can achieve basically the same functionand is suitable for other communication systems, for example: 6G systemor other communication systems applying the location services, etc.

In this embodiment, control information for controlling the relevantbehavior of acquiring the location of the user terminal is sent.Thereby, some meaningless signaling overhead can be reduced to savetransmission resources, and the power consumption of the user terminalcan also be reduced.

Referring to FIG. 3 which is a flowchart of a method of controlling alocation acquisition in another embodiment of the present disclosure. Asshown in FIG. 3, the method includes the following steps:

Step 301: determining whether a predetermined condition is satisfied;

The predetermined condition may include but not limited to at least oneof:

generating and/or updating the control information;

an acquiring request of acquiring the location of the user terminal isreceived;

a verifying request of acquiring the location of the user terminal isreceived;

a request of acquiring current control information is received; and

a request of acquiring updated control information in the case that thecurrent control information changes is received.

For the above-mentioned generating and/or updating of the controlinformation, reference may be made to the embodiment shown in FIG. 2,which will not be repeated here.

The above acquiring request of acquiring the location of the userterminal may be a network unit or a location service client requestingthe user terminal for acquiring the location of the user terminal; theverifying request of acquiring the location of the user terminal may bea request for the user terminal to confirm whether acquisition of thelocation of the user terminal is permitted; the above request ofacquiring the current control information may be a request for the userterminal to acquire control information for controlling the relevantbehavior of acquiring the location of the user terminal; the request ofacquiring the updated control information may be a request for the userterminal to acquire updated control information.

Through the above-mentioned predetermined conditions, the user terminalmay only send control information under certain circumstances, which canincrease the flexibility of location services, and can also save theuser terminal and network overhead, because the above-mentionedpredetermined conditions can avoid the overhead waste caused by the userterminal sending the control information when the network units orlocation service clients do not need the location service.

Step 302: in the case that the predetermined condition is satisfied,sending control information configured to control a relevant behavior ofacquiring a location of the user terminal.

Optionally, the control information indicates at least one of:

whether to permit to perform the relevant behavior of acquiring thelocation of the user terminal;

whether to permit a currently requested relevant behavior of acquiringthe location of the user terminal;

whether to permit a subsequent relevant behavior of acquiring thelocation of the user terminal;

a permission condition for permitting to perform the relevant behaviorof acquiring the location of the user terminal;

a non-permission condition for not permitting to perform the relevantbehavior of acquiring the location of the user terminal;

a permission condition for permitting the subsequent relevant behaviorof acquiring the location of the user terminal;

a non-permission condition for not permitting the subsequent relevantbehavior of acquiring the location of the user terminal;

whether to permit to disclose the acquired location of the userterminal;

a permission condition for permitting to disclose the acquired locationof the user terminal; and

a non-permission condition for not permitting to disclose the acquiredlocation of the user terminal.

The permission condition for permitting the relevant behavior ofacquiring the location of the user terminal may refer to that when thepermission condition is satisfied, the relevant behavior of acquiringthe location of the user terminal may be permitted, and/or when thepermission condition is not satisfied, the relevant behavior ofacquiring the location of the user terminal may not be permitted.

The non-permission condition for not permitting the relevant behavior ofacquiring the location of the user terminal may refer to that when thenon-permission condition is satisfied, the relevant behavior ofacquiring the location of the user terminal may not be permitted, and/orwhen the non-permission condition is not satisfied, the relevantbehavior of acquiring the location of the user terminal may bepermitted.

The permission condition for permitting the subsequent relevant behaviorof acquiring the location of the user terminal may refer to that whenthe permission condition is satisfied, the subsequent relevant behaviorof acquiring the location of the user terminal may be permitted, and/orwhen the permission condition is not satisfied, the subsequent relevantbehavior of acquiring the location of the user terminal may not bepermitted.

The non-permission condition for not permitting the subsequent relevantbehavior of acquiring the location of the user terminal may refer tothat when the non-permission condition is satisfied, the subsequentrelevant behavior of acquiring the location of the user terminal may notbe permitted, and/or when the non-permission condition is not satisfied,the subsequent relevant behavior of acquiring the location of the userterminal may be permitted.

The permission condition for permitting to disclose the acquiredlocation of the user terminal may refer to that when the permissioncondition is satisfied, the location of the acquired user terminal maybe permitted to be disclosed and/or when the permission condition is notsatisfied, the location of the acquired user terminal may not bepermitted to be disclosed.

The non-permission condition for not permitting to disclose the acquiredlocation of the user terminal may refer to that when the non-permissioncondition is satisfied, the location of the acquired user terminal maynot be permitted to be disclosed and/or when the non-permissioncondition is not satisfied, the location of the acquired user terminalmay be permitted to be disclosed.

In this embodiment, it may be realized that the above controlinformation may indicate whether to permit the relevant behavior ofacquiring the location of the user terminal, for example: the abovecontrol instruction permits the relevant behavior of acquiring thelocation of the user terminal, or not permits the relevant behavior ofacquiring the location of the user terminal.

In another embodiment, the above control information may indicatewhether to permit the relevant behavior of acquiring the location of theuser terminal from the network request this time, and whether to permitthe subsequent relevant behavior of acquiring the location of the userterminal. The above-mentioned relevant behavior of acquiring thelocation of the user terminal from the network request may be a recentor current relevant behavior of the network to acquire the location ofthe user terminal for the user terminal, for example: acquiring thelocation of the user terminal or requesting the user terminal to performpermission verification on the location request, or trigger the userterminal to perform the location measurement, and so on. The abovecontrol information may indicate whether to permit the current andwhether to permit the subsequent relevant behavior of acquiring thelocation of the user terminal, thereby saving signaling overhead.

For example, the network initiates a verifying request to the userterminal to acquire the location of the user terminal, and the userterminal returns the above control information to the networkverification response. According to the above control information, thenetwork determines whether to acquire the location information of theuser terminal and/or how to acquire the location information of the userterminal, and whether to disclose the location information of the userterminal to the location service client. The above control informationmay indicate at least one of:

whether to permit the currently requested relevant behavior of acquiringthe location of the UE;

whether to permit the subsequent relevant behavior of acquiring thelocation of the UE;

a non-permission time duration of not permitting the subsequent relevantbehavior of acquiring the location of the user terminal.

The non-permission time duration of not permitting the subsequentrelevant behavior of acquiring the location of the user terminal mayrefer to that it is required to wait for a period of time beforepermitting subsequent relevant behaviors regarding acquiring thelocation of the UE or may refer to not permitting subsequent relevantbehaviors regarding acquiring the location of the UE.

In one embodiment, the user terminal may permit the current locationrequest about the user terminal, and temporarily not permit subsequentlocation requests about the user terminal. This can be achieved bysetting a length of time that permits subsequent location requests foruser terminals, and a length of time that does not permit subsequentlocation requests for user terminals. After receiving the waiting timeor the non-permitted time duration, the network unit may perform therelevant behavior of acquiring the location of the user terminal withinthe waiting time or the non-permitted time, as described above, whichwill not be repeated here. After the non-permitted time or the wait timeexpires, if a service request for the user terminal location isreceived, the network node/function may ask the user terminal whether topermit to acquire and/or disclose location information about the userterminal.

As such, the current situation (energy or overhead) of the user terminalmay not support the frequent location measurement. In a friendly manner,this location request for the user terminal may be permitted this time,but the subsequent location requests are delayed.

In addition, the above control information may indicate the permissionrange and the non-permission range implicitly by indicating thepermission condition and the non-permission condition described above,thereby saving signaling overhead.

In an embodiment, the control information indicates permitting therelevant behavior of acquiring the location of the user terminal; and/or

the control information indicates permitting the subsequent relevantbehavior of acquiring the location of the user terminal; and/or

the control information indicates a permission range where permittingthe relevant behavior of acquiring the location of the user terminal;and/or

the control information indicates a permission range where permittingthe subsequent relevant behavior of acquiring the location of the userterminal.

The above control information only indicating permitting the relevantbehavior of acquiring the location of the user terminal can beunderstood as not limiting the permission range, and the above controlinformation only indicating permitting the subsequent relevant behaviorof acquiring the location of the user terminal can also be understood asnot limiting the permission range.

The above control information indicating a permission range wherepermitting the relevant behavior of acquiring the location of the userterminal can be understood as that the relevant behavior of acquiringthe location of the user terminal is permitted within the permissionrange, and the relevant behavior of acquiring the location of the userterminal is not permitted outside the permission range.

The above control information indicating a permission range wherepermitting the subsequent relevant behavior of acquiring the location ofthe user terminal can be understood as that the subsequent relevantbehavior of acquiring the location of the user terminal is permittedwithin the permission range, and the subsequent relevant behavior ofacquiring the location of the user terminal is not permitted outside thepermission range.

In another embodiment, the control information indicates not permittingto acquire the location of the user terminal; and/or

the control information indicates a non-permission range where notpermitting to acquire the location of the user terminal; and/or

the control information indicates not permitting to acquire the locationof the user terminal subsequently; and/or

the control information indicates a non-permission range where notpermitting to acquire the location of the user terminal subsequently.

The control information indicating not permitting the relevant behaviorof acquiring the location of the user terminal may be not limiting thenon-permission range, and the above control information indicating notpermitting the subsequent relevant behavior of acquiring the location ofthe user terminal may be not limiting the non-permission range.

The above control information indicating a non-permission range wherenot permitting the relevant behavior of acquiring the location of theuser terminal can be understood as that the relevant behavior ofacquiring the location of the user terminal is not permitted within thenon-permission range, and the relevant behavior of acquiring thelocation of the user terminal is permitted outside the non-permissionrange.

The above control information indicating a non-permission range wherenot permitting the subsequent relevant behavior of acquiring thelocation of the user terminal can be understood as that the subsequentrelevant behavior of acquiring the location of the user terminal is notpermitted within the non-permission range, and the subsequent relevantbehavior of acquiring the location of the user terminal is permittedoutside the non-permission range.

In another embodiment, the control information further indicates atleast one of:

whether to permit to disclose the acquired location of the userterminal; and/or

a permission range where permitting to disclose the acquired location ofthe user terminal; and/or

a non-permission range where not permitting to disclose the acquiredlocation of the user terminal.

The above whether to permit to disclose the acquired location of theuser terminal may be a behavior result of whether to permit to disclosethe acquired location of the user terminal to a third party, forexample, whether to permit to disclose the acquired location of the userterminal to a location service client.

The above permission range where permitting to disclose the acquiredlocation of the user terminal may be permitting to disclose the acquiredlocation of the user terminal within the permission range, for example,permitting to disclose the acquired location of the user terminal withinthe permission range.

The above non-permission range where not permitting to disclose theacquired location of the user terminal may be not permitting to disclosethe acquired location of the user terminal within the non-permissionrange, for example, not permitting to disclose the acquired location ofthe user terminal within the non-permission range.

In this embodiment, it is able to flexible control whether the locationof the user terminal is disclosed, thereby improving the privacyprotection performance.

Optionally, the control information indicates the permission range byincluding a permission condition and/or a non-permission condition;where the range that meets the permission condition belongs to thepermission range and/or the range that does not meet the non-permissioncondition belongs to the permission range.

Optionally, the control information indicates the non-permission rangeby including a permission condition and/or a non-permission condition;where the range that does not meet the permission condition belongs tothe non-permission range and/or the range that meets the non-permissioncondition belongs to the non-permission range.

In this embodiment, it is able to indicate the permission range throughthe permission condition and/or the non-permission condition. Forexample, the range corresponding to the permission condition is thepermission range, and the range outside the range corresponding to thenon-permission condition is the permission range. In addition, it isable to indicate the non-permission range through the permissioncondition and/or the non-permission condition. For example, the rangeoutside the range corresponding to the permission condition is thenon-permission range, and the range corresponding to the non-permissioncondition is the permission range.

In this embodiment, it is also possible to realize that the permissionoperations are performed in conjunction with the non-permissionoperations. In addition, when the user terminal is changed fromnon-permission to permission, the control information of the userterminal can be updated to the network. Since the network does not needto request the user terminal to verify each location request, thenetwork does not need to frequently request the user terminal to performauthorization verification on each location request. The network candirectly request the user terminal to perform the location measurement,thereby saving the signaling interaction process required for verifyingthe location request and saving user terminal and network overhead.

Optionally, the permission condition includes at least one of: apermitted time period, a permitted time duration, permitted locationservice client information, permitted usage information, permittedterminal status information, permitted location type information,permitted moving area range information and permitted locationmeasurement technical information; and/or

the non-permission condition includes at least one of: a non-permittedtime period, a non-permitted time duration, non-permitted locationservice client information, non-permitted usage information,non-permitted terminal status information, non-permitted location typeinformation, non-permitted moving area range information andnon-permitted location measurement technical information.

In the above embodiment, it is able to achieve a more controllablelocation service through the time period or time duration. The timeperiod may refer to being valid within a specific time interval, and thetime duration may refer to that the network unit starts a timer afterreceiving the time duration, and the timer is valid according to thetime duration. In this way, by setting the permitted time period, thepermitted time duration, the non-permitted time period and/or thenon-permitted time duration, etc., it is able to reduce the signaling ofthe interaction between the network and the user terminal and the costof the user terminal within a period of time.

In addition, in the above-mentioned embodiment, by indicating theinformation of the permitted location service client, it is able toscreen the location service clients who want to acquire the location ofthe user terminal. It is not difficult to see that the user terminal maynot permit too frequent location acquisition by setting the informationof permitted location service clients and the information ofnon-permitted location service clients. For example, according to thetype of the client, only a location request for emergency services maybe permitted, or only a location service client trusted by the user orpreset by the UE may be permitted to acquire the location request.

In addition, the above-mentioned permitted use information may refer toactions related to permitting or permitting subsequent execution toacquire the location of the user terminal under the designated use; theabove-mentioned permitted use information may refer to not permittingunder the designated use The purpose of acquiring the location of theuser terminal; it is not permitted to perform or is not permitted toperform subsequent actions related to acquiring the location of the userterminal. It is not difficult to see that some uses are for emergencyservices, user terminals can permit, and some uses are commercial, userterminals may not permit.

In addition, the above-mentioned permitted terminal state informationmay refer to permitting to perform the relevant behavior of acquiringthe location of the user terminal or permitting to perform thesubsequent relevant behavior of acquiring the location of the userterminal; the above-mentioned non-permitted terminal state informationmay refer to not permitting to perform the relevant behavior ofacquiring the location of the user terminal or not permitting to performthe subsequent relevant behavior of acquiring the location of the userterminal. For example: when the user terminal is in the idle state orinactive state, if a location request is required, the user terminalneeds to be paged, and the user terminal needs to establish a connectionor restore the connection, and more signaling overhead is required; ifonly the user is acquired in the connected state The terminal locationcan save a lot of signaling overhead; in the connected state, frequentmeasurement of the user terminal location will occupy the measurementoverhead of the user terminal. If the location of the user terminal ispermitted to be acquired in other states, the measurement overhead ofthe user terminal can be saved. The user terminal can be implemented bythe permitted terminal state information and the non-permitted terminalstate information.

The above-mentioned permitted location type information may refer topermitting to perform the relevant behavior of the location typeinformation, and the above-mentioned non-permitted location typeinformation may refer to not permitting to perform the relevant behaviorof the location type information. For example: “current location” needsto be initiated by location measurement, and “latest location” is thelatest measured location out of the box, which is not needed to measure,thereby saving resources. The “historical location” relates to thetrajectory of the user terminal, and involves more privacy of the userterminal. The user terminal can set different types of locations thatare permitted or not permitted according to its own requirements orpreferences, so as to achieve the effect of saving power consumption ofthe user terminal or protecting the privacy of the user terminal.

The above-mentioned permitted movement area range information may bethat the relevant behavior of acquiring the location of the userterminal is permitted to be performed within the movement area rangeindicated by the control information. However, the above-mentionedinformation about the range where the mobile area that is not permittedmay be that it is not permitted to perform the relevant behavior ofacquiring the location of the user terminal within the range where themobile area indicated by the control information. By permitting and/ornot permitting the range where the mobile area, the effects of savingpower consumption of the user terminal and protecting the privacy of theuser terminal can be achieved, because the power consumption of the userterminal for location measurement in some moving area ranges may bedifferent or the location privacy tendency is different. For example, insome mobile areas, the user may not want to disclose the location of theuser terminal.

The above-mentioned permissive location measurement technologyinformation may be an instruction to permit a specific locationmeasurement technology to perform the relevant action of acquiring thelocation of the user terminal, and the above-mentioned non-permittedlocation measurement technology information may be an instruction topermit the specific location measurement technology. Behaviors relatedto acquiring the location of the user terminal. For example, somelocation measurement technologies are user terminal-led (such as UTDOA),which requires more power consumption of the user terminal; somelocation measurement technologies are dominated by radio access networknodes and require relatively few user terminals, so that the userterminal Different measurement technical requirements can be permittedand/or not permitted according to their own requirements. In addition,it can also be sent directly to the radio access network (Radio AccessNetwork, RAN), or sent to the LCS and then sent to the RAN.

In this embodiment, the location service client information, usageinformation, terminal status information, location type information,moving area range information, and location measurement technicalinformation can be referred to as described below, but this is notlimited.

Optionally, the location service client information includes at leastone of: an identity of the location service client, a name of theidentity of the location service client, a domain name address of theidentity of the location service client, an identity of a requester of alocation service client party, a name of the requester of the locationservice client party, an IP address of the requester of the locationservice client party, a type of a location request of the locationservice client and a port number applied by a location service clientend; and/or

the usage information includes at least one of an emergency business useand a commercial use; and/or

the terminal status information includes at least one of: an idle state,a connected state, an inactive state, available or unavailable before alocation measurement and when powering on and off; and/or

the location type information includes at least one of: a currentlocation, a historical location and a latest location; and/or

the moving area range information includes at least one of: a TrackingArea (TA) identity list, a radio access network node identity list, amobile management unit list, an Authentication Management Function (AMF)identity list, a Mobile Management Entity (MME) identity list, alocation area list, a cell list of a service area list; and/or

the location measurement technical information includes at least one of:an Enhanced Cell-ID (ECID) measurement, an Observed Time Difference ofArrival (OTDOA) measurement and an Uplink Time Difference of Arrival(UTDOA) measurement.

The above-mentioned available state may be a state where locationservice can be used, but may not be used before the location measurementmay be a state of a preset time (for example, 1 second or 0.1 second, oreven shorter time) before the location measurement is not available. Forexample: before the location measurement is not possible due to the userterminal, such as the moment of shutdown, or before the location servicecapability is completely turned off, or the time when the user terminalcoverage begins to deteriorate to the point where it cannot support thelocation service. By permitting the reporting of the status unavailablebefore the location measurement, the last location of the user terminalcan be acquired, which is useful for emergency service-related locatingrequirements.

In addition, in some embodiments, an indication of whether to requestprivacy verification to the location request is received. Upon receivingthe location request of the user terminal, according to the abovecontrol information, the network unit may decide whether to request theuser terminal to permit the location request operation. In anembodiment, when the location of the user terminal is permitted to beacquired and/or the location of the user terminal is permitted to bedisclosed, the network still needs to decide whether to request the userterminal to perform privacy authentication on the location request ofthe UE according to the indication.

Optionally, the control information indicates whether it is needed torequest the user terminal to perform a verification request of acquiringthe location of the user terminal on a location request in the case thatthe location of the user terminal needs to be acquired.

It should be noted that the indication here can be implemented incombination with the indication described above, for example: inconjunction with the permitting to perform the relevant behavior ofacquiring the location of the user terminal indicated hereinabove. Ofcourse, the indication here may also be implemented separately. Theembodiments of the disclosure are not limited herein.

In this embodiment, the control information indicates at least one of:needing to verify the location request, information of a locationservice client that needs to verify the location request; not needing toverify the location request, information of a location service clientthat does not need to verify the location request.

In this embodiment, it is able to indicate whether the location requestneeds to be verified or not, so that it is able to indicate whether toskip the verification process, thereby saving the user terminal andnetwork overhead. Of course, in one embodiment, when the location of theuser terminal is permitted to be acquired and/or the location of theuser terminal is permitted to be disclosed, the network still has todecide whether to request the user terminal to perform privacyauthentication on the location request of the user terminal according tothe indication.

Optionally, the relevant behavior of acquiring the location of the userterminal includes at least one of:

whether to send to the user terminal a verifying request of acquiringthe location of the user terminal;

whether to acquire the location of the user terminal;

whether to request a radio access network unit to trigger a locationmeasurement for the user terminal;

whether to trigger the user terminal to perform a location measurement;

whether successfully responded to a received location request for theuser terminal;

whether to disclose the acquired location of the user terminal; and

whether requiring to start a timer.

For example, the above-mentioned relevant behavior of acquiring thelocation of the user terminal may refer to, when (for example, a networkunit or a location service client) generates a location request ofacquiring the location of the user terminal or receives a locationrequest of the user terminal:

whether to send to the user terminal a verifying request of acquiringthe location of the user terminal;

whether to acquire the location of the user terminal;

whether to request a radio access network unit to trigger a locationmeasurement for the user terminal;

whether to trigger the user terminal to perform a location measurement;

whether successfully responded to a received location request for theuser terminal;

whether to disclose the acquired location of the user terminal; and

whether requiring to start a timer.

In this embodiment, it is able to permit or not permit, or permit withinthe permission range, or not permit at least one of the above-mentionedrelevant behaviors of acquiring the location of the user terminal withinthe not-permission range, thereby saving transmission resources and userterminal power consumption. For example, within the permission range,when a request for acquiring the location of the user terminal isgenerated, a permission verifying request to acquire the location of theuser terminal is permitted, the acquiring of the location of the userterminal is permitted, the triggering the user terminal to perform alocation measurement is permitted or the response to location acquiringrequests sent by location service clients is permitted. For anotherexample: within the non-permission range, when a request for acquiringthe location of the user terminal is generated, a permission verifyingrequest to acquire the location of the user terminal is not permitted,the acquiring of the location of the user terminal is not permitted, thetriggering the user terminal to perform a location measurement is notpermitted or the response to location acquiring requests sent bylocation service clients is not permitted.

Of course, in the embodiment of the present disclosure, the relevantactions of acquiring the location of the user terminal include, but arenot limited to, the actions of the above list.

Optionally, Step 302 may include: when it is determined that thepredetermined condition is satisfied, sending network unit or locationservice client control information configured to control the relevantbehavior of acquiring the location of the user terminal.

Step 302 may be sending the above control information to the networkunit, for example: NAS message or RRC message to send the above controlinformation to the network unit. The above network unit may include atleast one of: radio access network node, radio access network function,core network function, core network node, mobility management node,mobility management function, location service management function,location service management Node, location service management client,eNB, gNB, AMF, MME, LCS and E-SMLC.

After the network unit or the location service client receives thecontrol information hereinabove, it can perform corresponding controlaccording to the above control information. For example, within thepermission range, when a request for acquiring the location of the userterminal is generated, a permission verifying request to acquire thelocation of the user terminal is performed, the location of the userterminal is acquired, the user terminal is triggered to perform alocation measurement or location acquiring requests sent by locationservice clients is responded. For another example: within thenon-permission range, when a request for acquiring the location of theuser terminal is generated, a permission verifying request to acquirethe location of the user terminal is performed, the location of the userterminal is acquired, the user terminal is triggered to perform alocation measurement or location acquiring requests sent by locationservice clients is responded.

In this embodiment, a variety of optional implementations are added onthe basis of the embodiment shown in FIG. 2, and can save transmissionresources and power consumption of the user terminal.

Referring to FIG. 4 which is a flowchart of a method of controlling alocation acquisition in another embodiment of the present disclosure.The method is applied to a network unit or a location service client. Asshown in FIG. 4, the method includes the following steps:

Step 401: receiving control information configured to control a relevantbehavior of acquiring a location of a user terminal.

The above control information may be control information sent by theuser terminal, for example, may be control information forwarded ortransparently transmitted by the user terminal through the radio accessnetwork unit.

Step 402: controlling, based on or referring to the control information,the relevant behavior of acquiring the location of the user terminal.

The above-mentioned control of the relevant behavior of acquiring thelocation of the user terminal may be acquiring the location of the userterminal, not permitting the acquiring of the location of the userterminal, etc., for details, reference may be made to the followingdescription.

Through the above steps, some meaningless signaling overhead can bereduced to save transmission resources, and the power consumption of theuser terminal can also be reduced.

Optionally, the control information indicates at least one of:

whether to permit to perform the relevant behavior of acquiring thelocation of the user terminal;

whether to permit a currently requested relevant behavior of acquiringthe location of the user terminal;

whether to permit a subsequent relevant behavior of acquiring thelocation of the user terminal;

a permission condition for permitting to perform the relevant behaviorof acquiring the location of the user terminal;

a non-permission condition for not permitting to perform the relevantbehavior of acquiring the location of the user terminal;

a permission condition for permitting the subsequent relevant behaviorof acquiring the location of the user terminal;

a non-permission condition for not permitting the subsequent relevantbehavior of acquiring the location of the user terminal;

whether to permit to disclose the acquired location of the userterminal;

a permission condition for permitting to disclose the acquired locationof the user terminal; and

a non-permission condition for not permitting to disclose the acquiredlocation of the user terminal.

For the above control information, reference may be made to the relevantdescription of the embodiment shown in FIG. 3, which will not berepeated here, and the same beneficial effects can be achieved.

Optionally, the control information indicates permitting the relevantbehavior of acquiring the location of the user terminal; and/or

the control information indicates permitting the subsequent relevantbehavior of acquiring the location of the user terminal; and/or

the control information indicates a permission range where permittingthe relevant behavior of acquiring the location of the user terminal;and/or

the control information indicates a permission range where permittingthe subsequent relevant behavior of acquiring the location of the userterminal;

the controlling, based on or referring to the control information, therelevant behavior of acquiring the location of the user terminalincludes:

performing the relevant behavior of acquiring the location of the userterminal, based on or referring to the control information; and/or

performing the subsequent relevant behavior of acquiring the location ofthe user terminal, based on or referring to the control information;and/or

performing the relevant behavior of acquiring the location of the userterminal, based on or referring to the control information and within apermission range where permitting the relevant behavior of acquiring thelocation of the user terminal indicated by the control information;and/or

performing the subsequent relevant behavior of acquiring the location ofthe user terminal, based on or referring to the control information andwithin a permission range where permitting the subsequent relevantbehavior of acquiring the location of the user terminal indicated by thecontrol information.

In this embodiment, relevant behaviors may be performed based on orreferring to the above control information, and the relevant behaviorsmay be performed within a specific range, so that user terminal andnetwork overhead may be saved.

Optionally, the control information indicates not permitting to acquirethe location of the user terminal; and/or

the control information indicates a non-permission range where notpermitting to acquire the location of the user terminal; and/or

the control information indicates not permitting to acquire the locationof the user terminal subsequently; and/or

the control information indicates a non-permission range where notpermitting to acquire the location of the user terminal subsequently;

the controlling, based on or referring to the control information, therelevant behavior of acquiring the location of the user terminalincludes:

not permitting to acquire the location of the user terminal, based on orreferring to the control information; and/or

not permitting to acquire the location of the user terminal, based on orreferring to the control information and within a non-permission rangewhere not permitting to acquire the location of the user terminalindicated by the control information; and/or

not permitting to acquire the location of the user terminalsubsequently, based on or referring to the control information; and/or

not permitting to acquire the location of the user terminalsubsequently, based on or referring to the control information andwithin a non-permission range where not permitting to acquire thelocation of the user terminal subsequently indicated by the controlinformation.

In this embodiment, relevant behaviors may not be permitted based on orreferring to the above control information, and the location of the userterminal may not be permitted to be acquired within a specific range,thereby saving user terminal and network overhead.

Optionally, the control information further indicates at least one of:

whether to permit to disclose the acquired location of the userterminal; and/or

a permission range where permitting to disclose the acquired location ofthe user terminal; and/or

a non-permission range where not permitting to disclose the acquiredlocation of the user terminal,

the controlling, based on or referring to the control information, therelevant behavior of acquiring the location of the user terminalincludes:

disclosing the acquired location of the user terminal, based on orreferring to the control information; and/or

disclosing the acquired location of the user terminal, based on orreferring to the control information and within the permission rangewhere permitting to disclose the acquired location of the user terminal;and/or

not permitting to disclose the acquired location of the user terminal,based on or referring to the control information and within thenon-permission range where not permitting to disclose the acquiredlocation of the user terminal.

In this embodiment, the location of the user terminal may be disclosedbased on or referring to the control information sent by the userterminal, or the location of the user terminal is not permitted to bedisclosed, so that the privacy of the user terminal can be protected.

Optionally, the control information indicates the permission range byindicating a permission condition; and/or

the control information indicates the permission range by indicating anon-permission condition, where a range that does not satisfy thenon-permission condition belongs to the permission range; and/or

the control information indicates the non-permission range by indicatinga non-permission condition; and/or

the control information indicates the non-permission range by indicatinga permission condition, where a range that does not satisfy thenon-permission condition belongs to the permission range.

For the above control information, reference may be made to the relevantdescription of the embodiment shown in FIG. 3, which will not berepeated here, and the same beneficial effects can be achieved.

Optionally, the permission condition includes at least one of: apermitted time period, a permitted time duration, permitted locationservice client information, permitted usage information, permittedterminal status information, permitted location type information,permitted moving area range information and permitted locationmeasurement technical information; and/or

the non-permission condition includes at least one of: a non-permittedtime period, a non-permitted time duration, non-permitted locationservice client information, non-permitted usage information,non-permitted terminal status information, non-permitted location typeinformation, non-permitted moving area range information andnon-permitted location measurement technical information.

For the above permission conditions and non-permission conditions,reference may be made to the relevant description of the embodimentshown in FIG. 3, which will not be repeated here, and the samebeneficial effects can be achieved.

Optionally, the location service client information includes at leastone of: an identity of the location service client, a name of theidentity of the location service client, a domain name address of theidentity of the location service client, an identity of a requester of alocation service client party, a name of the requester of the locationservice client party, an IP address of the requester of the locationservice client party, a type of a location request of the locationservice client and a port number applied by a location service clientend; and/or

the usage information includes at least one of an emergency business useand a commercial use; and/or

the terminal status information includes at least one of: an idle state,a connected state, an inactive state, available or unavailable before alocation measurement and when powering on and off; and/or

the location type information includes at least one of: a currentlocation, a historical location and a latest location; and/or

the moving area range information includes at least one of: a TrackingArea (TA) identity list, a radio access network node identity list, amobile management unit list, an Authentication Management Function (AMF)identity list, a Mobile Management Entity (MME) identity list, alocation area list, a cell list of a service area list; and/or

the location measurement technical information includes at least one of:an Enhanced Cell-ID (ECID) measurement, an Observed Time Difference ofArrival (OTDOA) measurement and an Uplink Time Difference of Arrival(UTDOA) measurement.

For the above information, please refer to the relevant description ofthe embodiment shown in FIG. 3, which will not be repeated here, and thesame beneficial effects can be achieved.

Optionally, the control information indicates whether it is needed torequest the user terminal to perform a permission verification on alocation request in the case that the location of the user terminalneeds to be acquired;

the controlling, based on or referring to the control information, therelevant behavior of acquiring the location of the user terminalincludes:

determining whether it is needed to request the user terminal to performa permission verification on a location request, based on or referringto the control information, in the case that the location of the userterminal needs to be acquired.

In this embodiment, it is able to determine whether to request the userterminal to perform permission verification on the location requestaccording to or referring to the above control information, for example:the control information indicates that when the location of the userterminal needs to be acquired, the user terminal does not need to berequested to perform the permission verification on the locationrequest, and the network unit may acquire the location of the userterminal, thereby reducing verification signaling and savingtransmission resources.

Optionally, the control information indicates at least one of: needingto verify the location request, information of a location service clientthat needs to verify the location request; not needing to verify thelocation request, information of a location service client that does notneed to verify the location request.

For the above control information, reference may be made to the relevantdescription of the embodiment shown in FIG. 3, which will not berepeated here, and the same beneficial effects can be achieved.

Optionally, before receiving the control information, the method furtherincludes at least one of:

sending an acquiring request of acquiring the location of the userterminal;

sending a verifying request of acquiring the location of the userterminal;

sending a request of acquiring current control information; and

sending a request of acquiring updated control information.

In this embodiment, the control information of the user terminal may beacquired through at least one of the above four requests, and then therelevant behavior of acquiring the location of the user terminal may becontrolled according to the acquired control information, so as to savethe overhead of the user terminal and the network.

Optionally, the controlling the relevant behavior of acquiring thelocation of the user terminal includes at least one of:

permitting the relevant behavior of acquiring the location of the userterminal;

not permitting the relevant behavior of acquiring the location of theuser terminal;

starting a timer.

The above permitting the relevant behavior of acquiring the location ofthe user terminal may be understood as performing the relevant behaviorof acquiring the location of the user permitted by the controlinformation. The above not permitting the relevant behavior of acquiringthe location of the user terminal and starting a timer may be understoodas performing not permitting the relevant behavior of acquiring thelocation of the user within a certain period of time, and the control isimplemented by starting the timer. That is, after the timer is startedand before it expires, performing not permitting the relevant behaviorof acquiring the location of the user. The time duration of the timermay be pre-configured, or configured according to the permitted timeduration indicated in the above control information. Starting the timermay also be understood as performing permitting the relevant behavior ofacquiring the location of the user within a certain period of time, andthe control is implemented by starting the timer. That is, after thetimer is started and before it expires, performing permitting therelevant behavior of acquiring the location of the user. The timeduration of the timer may be configured according to the permitted timeduration indicated in the above control information.

In this embodiment, by performing or not permitting the correspondingbehavior, the overhead of the user terminal and the network can besaved.

Optionally, the controlling, based on or referring to the controlinformation, the relevant behavior of acquiring the location of the userterminal includes:

starting a timer to perform a time counting in the case that controlinformation indicates not permitting a subsequent relevant behavior ofacquiring the location of the user terminal, and

performing the subsequent not permitting the relevant behavior ofacquiring the location of the user terminal after the timer starts toperform the time counting and before the timer expires;

where the time counting duration is preset or set according to anon-permitted time duration indicated by the control information;

and/or

starting a timer to perform a time counting in the case that controlinformation indicates not permitting the relevant behavior of acquiringthe location of the user terminal, and

performing not permitting the relevant behavior of acquiring thelocation of the user terminal before the timer expires;

where the time counting duration is preset or set according to anon-permitted time duration indicated by the control information;

and/or

starting a timer to perform a time counting in the case that thatcontrol information indicates permitting the relevant behavior ofacquiring the location of the user terminal and the control informationindicates a permitted time, and permitting the relevant behavior ofacquiring the location of the user terminal before the timer expires.

In this embodiment, relevant behaviors that are not permitted by thecontrol information are not permitted during the special time, andrelevant behaviors that are permitted by the control information areperformed during the special time, so as to save the overhead of userterminal and network, and can also avoid the impact of circumstancesthat are not permitted or always permitted. In addition, when the timerexpires, an inquiry request may be sent to the user terminal to askwhether to permit to acquire the user terminal's location and/or todisclose the user terminal's location, and the corresponding responsemessage of the user terminal's inquiry request may be subsequentlycontrolled according to the user terminal, thereby improving theflexibility of the system.

Optionally, the performing not permitting the relevant behavior ofacquiring the location of the user terminal includes at least one of:

directly feeding back a user terminal location acquisition failure, inthe case that a location request for the user terminal is received;

not sending a verifying request of acquiring the location of the userterminal to the user terminal;

not acquiring the location of the user terminal;

not requesting a radio access network unit to trigger a locationmeasurement for the user terminal;

not triggering the user terminal to perform a location measurement; and

not responding to a location acquiring request sent by a locationservice client.

For example, the above-mentioned performing not permitting the relevantbehavior of acquiring the location of the user terminal, refers to, whenthere is a requirement of acquiring the location of the user terminal orwhen a request for the user terminal' location is received:

directly feeding back a user terminal location acquisition failure, inthe case that a location request for the user terminal is received;

not sending a verifying request of acquiring the location of the userterminal to the user terminal;

not acquiring the location of the user terminal;

not requesting a radio access network unit to trigger a locationmeasurement for the user terminal;

not triggering the user terminal to perform a location measurement; and

not responding to a location acquiring request sent by a locationservice client.

In this embodiment, the above behavior can save the overhead of userterminal and network. It should be noted that, the above-mentionedrelevant behaviors of performing the subsequent not permitting therelevant behavior of acquiring the location of the user terminal mayalso refer to, when at least one of the requirements for the userterminal' location is generated or the request for the user terminal'slocation is received:

directly feeding back a user terminal location acquisition failure, inthe case that a location request for the user terminal is received;

not sending a verifying request of acquiring the location of the userterminal to the user terminal;

not acquiring the location of the user terminal;

not requesting a radio access network unit to trigger a locationmeasurement for the user terminal;

not triggering the user terminal to perform a location measurement; and

not responding to a location acquiring request sent by a locationservice client.

The performing the subsequent not permitting the relevant behavior ofacquiring the location of the user terminal may also save the overheadof user terminal and network.

Optionally, the performing permitting the relevant behavior of acquiringthe location of the user terminal includes at least one of:

sending a verifying request of acquiring the location of the userterminal to the user terminal;

acquiring the location of the user terminal;

requesting a radio access network unit to trigger a location measurementfor the user terminal;

triggering the user terminal to perform a location measurement;

responding to a location acquiring request sent by a location serviceclient, to acquire the location of the user terminal; and

responding to a received location request for the user terminal, toacquire the location of the user terminal.

For example, the above-mentioned performing permitting the relevantbehavior of acquiring the location of the user terminal, refers to thatwhen a requirement for acquiring the location of the user terminal isgenerated or a request for the user terminal's location is received, atleast one of the following is performed:

sending a verifying request of acquiring the location of the userterminal to the user terminal;

acquiring the location of the user terminal;

requesting a radio access network unit to trigger a location measurementfor the user terminal;

triggering the user terminal to perform a location measurement;

responding to a location acquiring request sent by a location serviceclient, to acquire the location of the user terminal; and

responding to a received location request for the user terminal, toacquire the location of the user terminal.

In this embodiment, it is able to perform corresponding behavior underthe conditions permitted by the control information, thereby ensuringthe performance of the location service.

Optionally, subsequent to the receiving the control information andprior to the controlling the relevant behavior of acquiring the locationof the user terminal based on or referring to the control information,the method further includes:

determining whether to receive the control information and returningback to the user terminal a return message of whether to determine toreceive the control information and/or the received control information;

the controlling, based on or referring to the control information, therelevant behavior of acquiring the location of the user terminalincludes:

controlling the relevant behavior of acquiring the location of the userterminal, based on or referring to the control information, in the casethat the control information is received.

In this embodiment, the above-mentioned return message may increase theinteractivity between the network units or the location service clients.

Optionally, the network unit includes but not limited to at least oneof: a radio access network node, a radio access network function, a corenetwork function, a core network node, a mobile management node, amobile management function, a location service management function, alocation service management node, a location service management client,an evolved Node B (eNB), an Access and Mobility Management Function(AMF), a Mobile Management Entity (MME), a Location Service (LCS)function and an Enhanced Serving Mobile Location Centre (E-SMLC).

For the above network unit, reference may be made to the relevantdescription of the embodiments shown in FIG. 2 and FIG. 3, and detailsare not described here.

It should be noted that this embodiment is an implementation manner of anetwork unit or a location service client corresponding to theembodiments shown in FIGS. 2 to 3. For a specific implementation manner,reference may be made to the related descriptions of the embodimentsshown in FIGS. 2 to 3, the same beneficial effect may be achieved, inorder to avoid duplication of description, the details thereof areomitted here.

Referring to FIG. 5 which is a schematic view of a method of controllinga location acquisition in another embodiment of the present disclosure.As shown in FIG. 5, the method includes the following steps:

Step 501: a user terminal (UE) sends control information about UElocation acquisition to core network units (such as AMF and MME). Forthe control information, reference may be made to the controlinformation of the embodiments shown in FIG. 2 to FIG. 4, and detailsare not described herein again.

The user terminal sends control information about the location of theuser terminal to the core network unit through the radio access networkunit. The control information about the location acquisition of the UEis as described in the control information in step 302, and is notrepeated here.

Optionally, the UE may send to the core network unit through an RRCmessage or a NAS message.

The UE may send to the core network unit through the following but notlimited to the following messages. Registration request (such asRegistration request, Attach Request), registration completed (such asRegistration Complete, Attach Complete), location update request message(such as Registration request, TAU Request), location update completed(such as Registration Complete, TAU Complete), control information aboutUE location acquisition is sent to the mobility management node/functionin location request permission verification response. NAS messages aretransparently transmitted through the radio access network unit.

The RRC message is sent through the radio access network unit, and thenthe radio access network unit forwards it to the managementnode/function (such as AMF, MME) through the 51 or NG interface message.

The mobile management node/function (such as AMF, MME) can send controlinformation about the location acquisition of the UE to the locationservice management node/function (such as E-SMLC, LCS).

The core network unit here may include multiple network nodes or networkfunctions (mobile management node/function, location service managementnode/function, user data management node/function, etc.). In theembodiment, the operation between network nodes or network functions inthe core network unit is not limited. The mobile managementnode/function or location service management node/function may save orupdate the control information about the UE location acquisition. Themobile management node/function or location service managementnode/function may send the control information about the UE locationacquisition to the user data management node/function (such as HSS, UDM)for storage or update.

Step 502: The location service client sends a location service requestto a core network unit (such as a location service management unit).After receiving the location request sent by the location serviceclient, the location service management unit may generate a locationrequest about the UE and send it to the mobile management unit. Themobility management unit sends the result of acquiring the location ofthe UE to the location service management unit. The interoperablelocation between the location service management unit and the mobilitymanagement unit is not limited in the embodiment.

The core network unit controls the location service request of thelocation service client according to the received control information,UE subscription information and/or UE capabilities. The core networkunit may acquire the latest control information about the UE locationacquisition from the user data management section unit.

When the control information about the UE location acquisition indicatesthat the UE location acquisition is not permitted, the core network unitmay perform at least one of:

1) Reject the location service request from the location service clientregarding the UE.

2) Start a timer (can be pre-configured) to count time.

Before the timer expires, the location service client's location requestabout the UE is rejected.

The core network unit may perform one of the following before receivingthe control information sent by the UE to update the control information(such as not permitting UE location update to be permitted to acquire UElocation): The location of the UE is not acquired, and the UE locationmeasurement is not triggered to the wireless access node.

Step 503: The core network unit returns a location service response tothe location service client, and explains the failure and/or the reasonfor failure to acquire the location of the UE. The reason for thefailure may be that the user terminal does not permit it. The locationservice client can start a timer (which can be pre-configured) to countthe time after receiving it. Before the timer expires, the locationrequest about the UE is not sent to the network.

Referring to FIG. 6 which is a schematic view of a method of controllinga location acquisition in another embodiment of the present disclosure.As shown in FIG. 6, the method includes the following steps:

Step 601 is the same as step 501 in the embodiment shown in FIG. 5 andwill not be repeated here.

Step 602. When the control information regarding the UE locationacquisition indicates that the time period/time duration for which theUE location acquisition is not permitted, the core network unit mayperform at least one of:

1) The timer is started according to the time duration, and if alocation service client request for a location service of the UE isreceived before the indicated time duration expires, it returns afailure to acquire the location of the UE, a back off timer and/or afailed Reason (for example, UE does not permit). The core network unitmay set the back off timer (Back off timer) sent to the location serviceclient according to the time duration. The back-off time may be greaterthan or equal to the time duration. During the specified back-off time,the location service client will not send a location request about theUE.

2) Initiate monitoring according to the time period, if within theindicated time period, if a location service client request for alocation service from the UE is received, return failure to acquire theUE location, back off period and/or cause of failure (For example, UEdoes not permit). The core network unit may set a back off period (Backoff period) sent to the location service client according to the timeperiod. The back off period may include but is not limited to the timeperiod. During the specified back-off period, the location serviceclient will not send a location request about the UE.

Step 603: The core network unit receives the location service requestabout the UE sent by the location service client.

Step 604: The core network unit returns a location service response tothe location service client, and explains the failure to acquire thelocation of the UE and/or the reason for the failure. The cause of thefailure may be that the UE does not permit it. If the core network unitalso returns the back-off time to the location service client, thelocation service client can start a timer according to the back-off timeafter receiving the time. Before the timer expires, the location requestabout the UE is not sent to the network. If the core network unit alsoreturns the fallback time period to the location service client, thelocation service client does not send a location request about the UE tothe network within the fallback time period after receiving it.

Step 605: The timer times out or the current time is not within the timeperiod.

Step 606: The location service client sends a location service requestabout the UE to the core network unit.

Step 607: The core network unit initiates the process of acquiring thelocation of the UE, and this step is not limited in this embodiment.

Step 608: The core network unit returns a location service response tothe location service client.

Referring to FIG. 7 which is a schematic view of a method of controllinga location acquisition in another embodiment of the present disclosure.As shown in FIG. 7, the method includes the following steps:

Step 701 is the same as step 501 in the embodiment shown in FIG. 5 andwill not be repeated here.

Step 702: The first location service client sends a location servicerequest about the UE to the core network unit.

The control information regarding UE location acquisition indicates thatlocation service client information that is not permitted to acquire theUE location or location service client information that is permitted toacquire the UE location is permitted.

The first location service client is a location service client indicatedby the control information that is not permitted to acquire the locationof the UE, and is not included in the location service clientinformation indicated by the control information that is not permittedto acquire the location of the UE. The core network unit returns to thefirst location service client the failure to acquire the UE location, aback off timer (Back off timer), a back off period (Back off period),and/or the reason for the failure (such as UE not permit). If thecontrol information regarding the location acquisition of the UEincludes a time period/time duration that does not permit the firstlocation service client to acquire the UE location, the core networkunit may set the fallback time period according to the time period. Theback-off time period may include but is not limited to the time period.The core network unit may set the back-off time according to the timeduration. The back-off time may be greater than or equal to the timeduration. After receiving the location service client, the locationrequest for the UE is not initiated to the network within the back-offtime and/or back-off time period.

Step 703: The core network unit returns a location service response tothe location service client, and explains the failure to acquire thelocation of the UE and/or the reason for the failure.

Step 704: The second location service client sends a location servicerequest about the UE to the core network unit. The second locationservice client is the location service client information that thecontrol information indicates that the location of the UE is permittedto be acquired or is not included in the location service clientinformation that the control information indicates that the location ofthe UE is not permitted to be acquired.

Step 705: The core network unit initiates the process of acquiring thelocation of the UE. This embodiment does not limit this step.

Step 706: The core network unit returns a location service response tothe location service client.

Referring to FIG. 8 which is a schematic view of a method of controllinga location acquisition in another embodiment of the present disclosure.As shown in FIG. 8, the method includes the following steps:

Step 801: The location service client sends a location service requestabout the UE to the core network unit.

Step 802: The core network unit sends a verifying request or a locationrequest for acquiring the location of the user terminal to the UE.

Step 803: The UE sends a verification response or location requestresponse to the location request to the core network unit to the UE.Optionally, the above response contains control information about thelocation acquisition of the UE. The control information about thelocation acquisition of the UE is as described in the controlinformation in step 302, and is not repeated here.

In some embodiments, the control information regarding the locationacquisition of the UE indicates at least one of:

permitting the relevant behavior of acquiring the location of the userterminal this time requested by the network unit or location serviceclient; do not permitting subsequent relevant behavior of acquiring thelocation of the user terminal;

the time duration of the subsequent behavior of acquiring the locationof the user terminal is not permitted;

the time duration of not permitting the subsequent relevant behavior ofacquiring the location of the user terminal can be set by indicating thetime duration of the non-permission condition in the control informationthat does not permit the subsequent relevant behavior of acquiring thelocation of the user terminal.

The time duration of not permitting subsequent relevant behaviors ofacquiring the location of the user terminal may refer to waiting for aperiod of time before permitting subsequent relevant behaviors regardingacquiring the location of the UE or may refer to not permittingsubsequent relevant behavior regarding acquiring the location of the UE.The relevant behavior of acquiring the location of the UE in thisembodiment is as described in step 302, and will not be repeated here.

In some embodiments, the UE's current situation (energy, overhead) maynot support frequent location measurements. In a friendly manner, thislocation request for the UE may be permitted this time, but it isachieved by setting a period of time that does not permit subsequentrelevant behaviors regarding acquiring the location of the UE.

Step 804: The core network unit receives that the verification responseinformation includes the control information and the control informationindicates that the relevant behavior of not permitting subsequentacquisition of the location of the user terminal is permitted. The corenetwork unit may start a timer according to the default configuration tocount time.

When the core network unit receives the verification responseinformation that includes the control information and the controlinformation indicates a time duration that does not permit subsequentrelevant behaviors to acquire the location of the user terminal, it maystart a timer according to the time duration to count time.

Before the timer expires, the core network unit performs at least oneof: other location requests received from the location service clientregarding the UE all return failure, do not send the UE a verifyingrequest regarding acquiring the location of the user terminal, and donot trigger acquisition The UE's location behavior does not request theradio access network unit to trigger the behavior of acquiring the UE'slocation.

Step 805: The core network unit triggers the process of acquiring thelocation of the UE this time to acquire the location of the UE.

Step 806: The core network unit sends a location service response to thelocation service client this time, which may include a back off timer.The location service client does not initiate a location request for theUE to the network within the backoff time after receiving the backofftime. The core network unit sets the back-off time according to the timeduration provided by the UE that does not permit subsequent locationacquisition of the UE. The back-off time may be greater than or equal tothe time duration.

Referring to FIG. 9 which is a schematic view of a method of controllinga location acquisition in another embodiment of the present disclosure.As shown in FIG. 9, the method includes the following steps:

Step 901: The core network unit requests control information aboutacquiring the location of the UE from the UE through the radio accessnetwork unit.

The request may indicate at least one of:

requesting current control information of the UE about acquiring thelocation of the UE; the control information about acquiring the locationof the UE is as described in the control information in step 302, anddetails are not described herein again;

requesting the UE to report the updated control information on acquiringthe UE location when the control information on acquiring the UElocation changes.

Step 902: The UE returns control information about acquiring thelocation of the UE to the core network unit. After receiving the controlinformation, the core network unit controls relevant behaviors regardingacquiring the location of the UE according to or referring to thecontrol information.

Step 903: The control information on the UE side about acquiring thelocation of the UE is changed, for example, the tendency of the UE orthe user about acquiring the location of the UE is changed. According tothe request in step 901, the UE determines whether to send the updatedcontrol information about acquiring the location of the UE after sendingthe update to the core network. If it is decided to send, step 904 isentered, otherwise the process ends.

Step 904: The UE sends updated control information about acquiring thelocation of the UE to the core network unit. The core network unitupdates according to the received control information, and subsequentlycontrols relevant behaviors regarding acquiring the location of the UEaccording to the updated control information.

The information sent by the UE to the core network unit can be forwardedor transparently transmitted through the radio access network.

Referring to FIG. 10 which is a structural diagram of a user terminal inan embodiment of the present disclosure. As shown in FIG. 10, the userterminal 1000 includes:

a determining module 1001, configured to determine whether apredetermined condition is satisfied;

a sending module 1002, configured to, in the case that the predeterminedcondition is satisfied, send control information configured to control arelevant behavior of acquiring a location of the user terminal.

Optionally, the control information indicates at least one of:

whether to permit to perform the relevant behavior of acquiring thelocation of the user terminal;

whether to permit a currently requested relevant behavior of acquiringthe location of the user terminal;

whether to permit a subsequent relevant behavior of acquiring thelocation of the user terminal;

a permission condition for permitting to perform the relevant behaviorof acquiring the location of the user terminal;

a non-permission condition for not permitting to perform the relevantbehavior of acquiring the location of the user terminal;

a permission condition for permitting the subsequent relevant behaviorof acquiring the location of the user terminal;

a non-permission condition for not permitting the subsequent relevantbehavior of acquiring the location of the user terminal;

whether to permit to disclose the acquired location of the userterminal;

a permission condition for permitting to disclose the acquired locationof the user terminal; and

a non-permission condition for not permitting to disclose the acquiredlocation of the user terminal.

Optionally, the control information indicates permitting the relevantbehavior of acquiring the location of the user terminal; and/or

the control information indicates permitting the subsequent relevantbehavior of acquiring the location of the user terminal; and/or

the control information indicates a permission range where permittingthe relevant behavior of acquiring the location of the user terminal;and/or

the control information indicates a permission range where permittingthe subsequent relevant behavior of acquiring the location of the userterminal.

Optionally, the control information indicates not permitting to acquirethe location of the user terminal; and/or

the control information indicates a non-permission range where notpermitting to acquire the location of the user terminal; and/or

the control information indicates not permitting to acquire the locationof the user terminal subsequently; and/or

the control information indicates a non-permission range where notpermitting to acquire the location of the user terminal subsequently.

Optionally, the control information further indicates at least one of:

whether to permit to disclose the acquired location of the userterminal; and/or

a permission range where permitting to disclose the acquired location ofthe user terminal; and/or

a non-permission range where not permitting to disclose the acquiredlocation of the user terminal.

Optionally, the control information indicates the permission range byindicating a permission condition; and/or

the control information indicates the permission range by indicating anon-permission condition, where a range that does not satisfy thenon-permission condition belongs to the permission range; and/or

the control information indicates the non-permission range by indicatinga non-permission condition; and/or

the control information indicates the non-permission range by indicatinga permission condition, where a range that does not satisfy thenon-permission condition belongs to the permission range.

Optionally, the permission condition includes at least one of: apermitted time period, a permitted time duration, permitted locationservice client information, permitted usage information, permittedterminal status information, permitted location type information,permitted moving area range information and permitted locationmeasurement technical information; and/or

the non-permission condition includes at least one of: a non-permittedtime period, a non-permitted time duration, non-permitted locationservice client information, non-permitted usage information,non-permitted terminal status information, non-permitted location typeinformation, non-permitted moving area range information andnon-permitted location measurement technical information.

Optionally, the location service client information includes at leastone of:

an identity of the location service client, a name of the identity ofthe location service client, a domain name address of the identity ofthe location service client, an identity of a requester of a locationservice client party, a name of the requester of the location serviceclient party, an IP address of the requester of the location serviceclient party, a type of a location request of the location serviceclient and a port number applied by a location service client end;and/or

the usage information includes at least one of an emergency business useand a commercial use; and/or

the terminal status information includes at least one of: an idle state,a connected state, an inactive state, available or unavailable before alocation measurement and when powering on and off; and/or

the location type information includes at least one of: a currentlocation, a historical location and a latest location; and/or

the moving area range information includes at least one of: a TrackingArea (TA) identity list, a radio access network node identity list, amobile management unit list, an Authentication Management Function (AMF)identity list, a Mobile Management Entity (MME) identity list, alocation area list, a cell list of a service area list; and/or

the location measurement technical information includes at least one of:an Enhanced Cell-ID (ECID) measurement, an Observed Time Difference ofArrival (OTDOA) measurement and an Uplink Time Difference of Arrival(UTDOA) measurement.

Optionally, the control information indicates whether it is needed torequest the user terminal to perform a permission verification on alocation request in the case that the location of the user terminalneeds to be acquired.

Optionally, the control information indicates at least one of:

needing to verify the location request, information of a locationservice client that needs to verify the location request;

not needing to verify the location request, information of a locationservice client that does not need to verify the location request.

Optionally, the predetermined condition includes at least one of:

generating and/or updating the control information;

an acquiring request of acquiring the location of the user terminal isreceived;

a verifying request of acquiring the location of the user terminal isreceived;

a request of acquiring current control information is received; and

a request of acquiring updated control information in the case that thecurrent control information changes is received.

Optionally, the relevant behavior of acquiring the location of the userterminal includes at least one of:

whether to send to the user terminal a verifying request of acquiringthe location of the user terminal;

whether to acquire the location of the user terminal;

whether to request a radio access network unit to trigger a locationmeasurement for the user terminal;

whether to trigger the user terminal to perform a location measurement;

whether successfully responded to a received location request for theuser terminal;

whether to disclose the acquired location of the user terminal; and

whether requiring to start a timer.

Optionally, the sending module is configured to send the controlinformation to a network unit, where

the network unit includes at least one of: a radio access network node,a radio access network function, a core network function, a core networknode, a mobile management node, a mobile management function, a locationservice management function, a location service management node, alocation service management client, an evolved Node B (eNB), anext-generation base station (gNB), an Access and Mobility ManagementFunction (AMF), a Mobile Management Entity (MME), a Location Service(LCS) function and an Enhanced Serving Mobile Location Centre (E-SMLC).

The base station provided by the embodiment of the present disclosurecan implement various processes implemented by the user terminal in themethod embodiments of FIG. 2 to FIG. 3. To avoid repetition, details arenot described here, and transmission resources can be saved and thepower consumption of the user terminal can also be reduced.

Referring to FIG. 11 which is a structural diagram of a device ofcontrolling a location acquisition in an embodiment of the presentdisclosure. The device is applied to a network unit or a locationservice client. As shown in FIG. 11, the device 1100 includes:

a receiving module 1101, configured to receive control informationconfigured to control a relevant behavior of acquiring a location of auser terminal;

a controlling module 1102, configured to control, based on or referringto the control information, the relevant behavior of acquiring thelocation of the user terminal.

Optionally, the control information indicates at least one of:

whether to permit to perform the relevant behavior of acquiring thelocation of the user terminal;

whether to permit a currently requested relevant behavior of acquiringthe location of the user terminal;

whether to permit a subsequent relevant behavior of acquiring thelocation of the user terminal;

a permission condition for permitting to perform the relevant behaviorof acquiring the location of the user terminal;

a non-permission condition for not permitting to perform the relevantbehavior of acquiring the location of the user terminal;

a permission condition for permitting the subsequent relevant behaviorof acquiring the location of the user terminal;

a non-permission condition for not permitting the subsequent relevantbehavior of acquiring the location of the user terminal;

whether to permit to disclose the acquired location of the userterminal;

a permission condition for permitting to disclose the acquired locationof the user terminal; and

a non-permission condition for not permitting to disclose the acquiredlocation of the user terminal.

Optionally, the control information indicates permitting the relevantbehavior of acquiring the location of the user terminal; and/or

the control information indicates permitting the subsequent relevantbehavior of acquiring the location of the user terminal; and/or

the control information indicates a permission range where permittingthe relevant behavior of acquiring the location of the user terminal;and/or

the control information indicates a permission range where permittingthe subsequent relevant behavior of acquiring the location of the userterminal;

the controlling module 1102 is configured to:

perform the relevant behavior of acquiring the location of the userterminal, based on or referring to the control information; and/or

perform the subsequent relevant behavior of acquiring the location ofthe user terminal, based on or referring to the control information;and/or

perform the relevant behavior of acquiring the location of the userterminal, based on or referring to the control information and within apermission range where permitting the relevant behavior of acquiring thelocation of the user terminal indicated by the control information;and/or

perform the subsequent relevant behavior of acquiring the location ofthe user terminal, based on or referring to the control information andwithin a permission range where permitting the subsequent relevantbehavior of acquiring the location of the user terminal indicated by thecontrol information.

Optionally, the control information indicates not permitting to acquirethe location of the user terminal; and/or

the control information indicates a non-permission range where notpermitting to acquire the location of the user terminal; and/or

the control information indicates not permitting to acquire the locationof the user terminal subsequently; and/or

the control information indicates a non-permission range where notpermitting to acquire the location of the user terminal subsequently;

the controlling module 1102 is configured to:

not permit to acquire the location of the user terminal, based on orreferring to the control information; and/or

not permit to acquire the location of the user terminal, based on orreferring to the control information and within a non-permission rangewhere not permitting to acquire the location of the user terminalindicated by the control information; and/or

not permit to acquire the location of the user terminal subsequently,based on or referring to the control information; and/or

not permit to acquire the location of the user terminal subsequently,based on or referring to the control information and within anon-permission range where not permitting to acquire the location of theuser terminal subsequently indicated by the control information.

Optionally, the control information further indicates at least one of:

whether to permit to disclose the acquired location of the userterminal; and/or

a permission range where permitting to disclose the acquired location ofthe user terminal; and/or

a non-permission range where not permitting to disclose the acquiredlocation of the user terminal,

the controlling module 1102 is configured to:

disclose the acquired location of the user terminal, based on orreferring to the control information; and/or

disclose the acquired location of the user terminal, based on orreferring to the control information and within the permission rangewhere permitting to disclose the acquired location of the user terminal;and/or

not permit to disclose the acquired location of the user terminal, basedon or referring to the control information and within the non-permissionrange where not permitting to disclose the acquired location of the userterminal.

Optionally, the control information indicates the permission range byindicating a permission condition; and/or

the control information indicates the permission range by indicating anon-permission condition, where a range that does not satisfy thenon-permission condition belongs to the permission range; and/or

the control information indicates the non-permission range by indicatinga non-permission condition; and/or

the control information indicates the non-permission range by indicatinga permission condition, where a range that does not satisfy thenon-permission condition belongs to the permission range.

Optionally, the permission condition includes at least one of: apermitted time period, a permitted time duration, permitted locationservice client information, permitted usage information, permittedterminal status information, permitted location type information,permitted moving area range information and permitted locationmeasurement technical information; and/or

the non-permission condition includes at least one of: a non-permittedtime period, a non-permitted time duration, non-permitted locationservice client information, non-permitted usage information,non-permitted terminal status information, non-permitted location typeinformation, non-permitted moving area range information andnon-permitted location measurement technical information.

Optionally, the location service client information includes at leastone of:

an identity of the location service client, a name of the identity ofthe location service client, a domain name address of the identity ofthe location service client, an identity of a requester of a locationservice client party, a name of the requester of the location serviceclient party, an IP address of the requester of the location serviceclient party, a type of a location request of the location serviceclient and a port number applied by a location service client end;and/or

the usage information includes at least one of an emergency business useand a commercial use; and/or

the terminal status information includes at least one of: an idle state,a connected state, an inactive state, available or unavailable before alocation measurement and when powering on and off; and/or

the location type information includes at least one of: a currentlocation, a historical location and a latest location; and/or

the moving area range information includes at least one of: a TrackingArea (TA) identity list, a radio access network node identity list, amobile management unit list, an Authentication Management Function (AMF)identity list, a Mobile Management Entity (MME) identity list, alocation area list, a cell list of a service area list; and/or

the location measurement technical information includes at least one of:an Enhanced Cell-ID (ECID) measurement, an Observed Time Difference ofArrival (OTDOA) measurement and an Uplink Time Difference of Arrival(UTDOA) measurement.

Optionally, the control information indicates whether it is needed torequest the user terminal to perform a permission verification on alocation request in the case that the location of the user terminalneeds to be acquired;

the controlling module is configured to: determine whether it is neededto request the user terminal to perform a permission verification on alocation request, based on or referring to the control information, inthe case that the location of the user terminal needs to be acquired.

Optionally, the control information indicates at least one of:

needing to verify the location request, information of a locationservice client that needs to verify the location request;

not needing to verify the location request, information of a locationservice client that does not need to verify the location request.

Optionally, as shown in FIG. 12, the device 1100 further includes atleast one of:

a first sending module 1103, configured to send an acquiring request ofacquiring the location of the user terminal;

a second sending module 1104, configured to send a verifying request ofacquiring the location of the user terminal;

a third sending module 1105, configured to send a request of acquiringcurrent control information; and

a fourth sending module 1106, configured to send a request of acquiringupdated control information.

Optionally, the controlling the relevant behavior of acquiring thelocation of the user terminal includes at least one of:

permitting the relevant behavior of acquiring the location of the userterminal;

not permitting the relevant behavior of acquiring the location of theuser terminal;

starting a timer.

Optionally, the controlling module 1102 is configured to:

start a timer to perform a time counting in the case that controlinformation indicates not permitting a subsequent relevant behavior ofacquiring the location of the user terminal, and

perform the subsequent not permitting the relevant behavior of acquiringthe location of the user terminal after the timer starts to perform thetime counting and before the timer expires;

where the time counting duration is preset or set according to anon-permitted time duration indicated by the control information;

and/or

start a timer to perform a time counting in the case that controlinformation indicates not permitting the relevant behavior of acquiringthe location of the user terminal, and

perform not permitting the relevant behavior of acquiring the locationof the user terminal before the timer expires;

where the time counting duration is preset or set according to anon-permitted time duration indicated by the control information;

and/or

start a timer to perform a time counting in the case that that controlinformation indicates permitting the relevant behavior of acquiring thelocation of the user terminal and the control information indicates apermitted time, and permit the relevant behavior of acquiring thelocation of the user terminal before the timer expires.

Optionally, the performing not permitting the relevant behavior ofacquiring the location of the user terminal includes at least one of:

directly feeding back a user terminal location acquisition failure, inthe case that a location request for the user terminal is received;

not sending a verifying request of acquiring the location of the userterminal to the user terminal;

not acquiring the location of the user terminal;

not requesting a radio access network unit to trigger a locationmeasurement for the user terminal;

not triggering the user terminal to perform a location measurement; and

not responding to a location acquiring request sent by a locationservice client.

Optionally, the performing permitting the relevant behavior of acquiringthe location of the user terminal includes at least one of:

sending a verifying request of acquiring the location of the userterminal to the user terminal;

acquiring the location of the user terminal;

requesting a radio access network unit to trigger a location measurementfor the user terminal;

triggering the user terminal to perform a location measurement;

responding to a location acquiring request sent by a location serviceclient, to acquire the location of the user terminal; and

responding to a received location request for the user terminal, toacquire the location of the user terminal.

Optionally, as shown in FIG. 13, the device 1100 further includes:

a determining module 1107, configured to determine whether to receivethe control information and returning back to the user terminal a returnmessage of whether to determine to receive the control informationand/or the received control information;

the controlling module 1102 is configured to control the relevantbehavior of acquiring the location of the user terminal, based on orreferring to the control information, in the case that the controlinformation is received.

Optionally, the network unit includes at least one of: a radio accessnetwork node, a radio access network function, a core network function,a core network node, a mobile management node, a mobile managementfunction, a location service management function, a location servicemanagement node, a location service management client, an evolved Node B(eNB), an Access and Mobility Management Function (AMF), a MobileManagement Entity (MME), a Location Service (LCS) function and anEnhanced Serving Mobile Location Centre (E-SMLC).

The base station provided by the embodiment of the present disclosurecan implement various processes implemented by the network unit in themethod embodiment of FIG. 4. In order to avoid repetition, detailsthereof are omitted herein. According to the base station in theembodiment of the present disclosure, it is able to save thetransmission resource and reduce the power consumption of user terminal.

FIG. 14 is a structural diagram of a user terminal in another embodimentof the present disclosure.

The user terminal 1400 includes but is not limited to: a radio frequencyunit 1401, a network module 1402, an audio output unit 1403, an inputunit 1404, a sensor 1405, a display unit 1406, a user input unit 1407,an interface unit 1408, a memory 1409, a processor 1410, and powersupply 1411 and other components. Those skilled in the art mayunderstand that the structure of the user terminal shown in FIG. 14 doesnot constitute a limitation on the user terminal, and the user terminalmay include more or fewer components than those illustrated, or combinecertain components, or different components layout. In the embodimentsof the present disclosure, user terminals include but are not limited tomobile phones, tablet computers, notebook computers, palmtop computers,in-vehicle user terminals, wearable devices, and pedometers.

The processor 1410 is configured to determine whether the predeterminedcondition is satisfied;

The radio frequency unit 1401 is configured to send control informationwhen it is determined that the predetermined condition is satisfied, andthe control information is configured to control relevant behaviors ofacquiring the location of the user terminal.

Optionally, the control information indicates at least one of:

whether to permit to perform the relevant behavior of acquiring thelocation of the user terminal;

whether to permit a currently requested relevant behavior of acquiringthe location of the user terminal;

whether to permit a subsequent relevant behavior of acquiring thelocation of the user terminal;

a permission condition for permitting to perform the relevant behaviorof acquiring the location of the user terminal;

a non-permission condition for not permitting to perform the relevantbehavior of acquiring the location of the user terminal;

a permission condition for permitting the subsequent relevant behaviorof acquiring the location of the user terminal;

a non-permission condition for not permitting the subsequent relevantbehavior of acquiring the location of the user terminal;

whether to permit to disclose the acquired location of the userterminal;

a permission condition for permitting to disclose the acquired locationof the user terminal; and

a non-permission condition for not permitting to disclose the acquiredlocation of the user terminal.

Optionally, the control information indicates permitting the relevantbehavior of acquiring the location of the user terminal; and/or

the control information indicates permitting the subsequent relevantbehavior of acquiring the location of the user terminal; and/or

the control information indicates a permission range where permittingthe relevant behavior of acquiring the location of the user terminal;and/or

the control information indicates a permission range where permittingthe subsequent relevant behavior of acquiring the location of the userterminal.

Optionally, the control information indicates not permitting to acquirethe location of the user terminal; and/or

the control information indicates a non-permission range where notpermitting to acquire the location of the user terminal; and/or

the control information indicates not permitting to acquire the locationof the user terminal subsequently; and/or

the control information indicates a non-permission range where notpermitting to acquire the location of the user terminal subsequently.

Optionally, the control information further indicates at least one of:

whether to permit to disclose the acquired location of the userterminal; and/or

a permission range where permitting to disclose the acquired location ofthe user terminal; and/or

a non-permission range where not permitting to disclose the acquiredlocation of the user terminal.

Optionally, the control information indicates the permission range byindicating a permission condition; and/or

the control information indicates the permission range by indicating anon-permission condition, where a range that does not satisfy thenon-permission condition belongs to the permission range; and/or

the control information indicates the non-permission range by indicatinga non-permission condition; and/or

the control information indicates the non-permission range by indicatinga permission condition, where a range that does not satisfy thenon-permission condition belongs to the permission range.

Optionally, the permission condition includes at least one of: apermitted time period, a permitted time duration, permitted locationservice client information, permitted usage information, permittedterminal status information, permitted location type information,permitted moving area range information and permitted locationmeasurement technical information; and/or

the non-permission condition includes at least one of: a non-permittedtime period, a non-permitted time duration, non-permitted locationservice client information, non-permitted usage information,non-permitted terminal status information, non-permitted location typeinformation, non-permitted moving area range information andnon-permitted location measurement technical information.

Optionally, the location service client information includes at leastone of:

an identity of the location service client, a name of the identity ofthe location service client, a domain name address of the identity ofthe location service client, an identity of a requester of a locationservice client party, a name of the requester of the location serviceclient party, an IP address of the requester of the location serviceclient party, a type of a location request of the location serviceclient and a port number applied by a location service client end;and/or

the usage information includes at least one of an emergency business useand a commercial use; and/or

the terminal status information includes at least one of: an idle state,a connected state, an inactive state, available or unavailable before alocation measurement and when powering on and off; and/or

the location type information includes at least one of: a currentlocation, a historical location and a latest location; and/or

the moving area range information includes at least one of: a TrackingArea (TA) identity list, a radio access network node identity list, amobile management unit list, an Authentication Management Function (AMF)identity list, a Mobile Management Entity (MME) identity list, alocation area list, a cell list of a service area list; and/or

the location measurement technical information includes at least one of:an Enhanced Cell-ID (ECID) measurement, an Observed Time Difference ofArrival (OTDOA) measurement and an Uplink Time Difference of Arrival(UTDOA) measurement.

Optionally, the control information indicates whether it is needed torequest the user terminal to perform a permission verification on alocation request in the case that the location of the user terminalneeds to be acquired.

Optionally, the control information indicates at least one of:

needing to verify the location request, information of a locationservice client that needs to verify the location request;

not needing to verify the location request, information of a locationservice client that does not need to verify the location request.

Optionally, the predetermined condition includes at least one of:

generating and/or updating the control information;

an acquiring request of acquiring the location of the user terminal(e.g., sent by the network unit or location service client) is received;

a verifying request of acquiring the location of the user terminal(e.g., sent by the network unit or location service client) is received;

a request of acquiring current control information (e.g., sent by thenetwork unit or location service client) is received; and

a request of acquiring updated control information in the case that thecurrent control information changes (e.g., sent by the network unit orlocation service client) is received.

Optionally, the relevant behavior of acquiring the location of the userterminal includes at least one of:

whether to send to the user terminal a verifying request of acquiringthe location of the user terminal;

whether to acquire the location of the user terminal;

whether to request a radio access network unit to trigger a locationmeasurement for the user terminal;

whether to trigger the user terminal to perform a location measurement;

whether successfully responded to a received location request for theuser terminal;

whether to disclose the acquired location of the user terminal; and

whether requiring to start a timer.

Optionally, the sending the control information includes:

sending the control information to a network unit, where

the network unit includes at least one of: a radio access network node,a radio access network function, a core network function, a core networknode, a mobile management node, a mobile management function, a locationservice management function, a location service management node, alocation service management client, an evolved Node B (eNB), anext-generation base station (gNB), an Access and Mobility ManagementFunction (AMF), a Mobile Management Entity (MME), a Location Service(LCS) function and an Enhanced Serving Mobile Location Centre (E-SMLC).

It should be understood that, in the embodiment of the presentdisclosure, the radio frequency unit 1401 may be configured to receiveand send signals during sending and receiving information or during acall. Specifically, after receiving the downlink data from the basestation, it is processed by the processor 1410. The uplink data is sentto the base station. Generally, the radio frequency unit 1401 includes,but is not limited to, an antenna, at least one amplifier, atransceiver, a coupler, a low noise amplifier, a duplexer, and the like.In addition, the radio frequency unit 1401 can also communicate with thenetwork and other devices through a wireless communication system.

The user terminal provides the user with wireless broadband Internetaccess through the network module 1402, such as helping the user to sendand receive e-mail, browse the web, and access streaming media.

The audio output unit 1403 may convert the audio data received by theradio frequency unit 1401 or the network module 1402 or stored in thememory 1409 into an audio signal and output as sound. Moreover, theaudio output unit 1403 may also provide audio output related to aspecific function performed by the user terminal 1400 (for example, callsignal reception sound, message reception sound, etc.). The audio outputunit 1403 includes a speaker, a buzzer, a receiver, and so on.

The input unit 1404 is configured to receive audio or video signals. Theinput unit 1404 may include a graphics processing unit (GraphicsProcessing Unit, GPU) 14041 and a microphone 14042. The graphicsprocessor 14041 displays images of still pictures or videos acquired byan image capture device (such as a camera) in a video capture mode or animage capture mode. The data is processed. The processed image frame maybe displayed on the display unit 1406. The image frame processed by thegraphics processor 14041 may be stored in the memory 1409 (or otherstorage medium) or sent via the radio frequency unit 1401 or the networkmodule 1402. The microphone 14042 can receive sound, and can processsuch sound into audio data. The processed audio data can be convertedinto a format that can be sent to the mobile communication 14071 basestation via the radio frequency unit 1401 in the case of the telephonecall mode and output.

The user terminal 1400 further includes at least one sensor 1405, suchas a light sensor, a motion sensor, and other sensors. Specifically, thelight sensor includes an ambient light sensor and a proximity sensor,wherein the ambient light sensor can adjust the brightness of thedisplay panel 14061 according to the brightness of the ambient light,and the proximity sensor can close the display panel 14061 and the userterminal 1400 when moving to the ear/Or backlight. As a type of motionsensor, the accelerometer sensor can detect the magnitude ofacceleration in various directions (generally three axes), and candetect the magnitude and direction of gravity when at rest, and can beconfigured to identify the user terminal posture (such as horizontal andvertical screen switching, related games, Magnetometer attitudecalibration), vibration recognition related functions (such aspedometer, tap), etc.; sensor 1405 can also include fingerprint sensors,pressure sensors, iris sensors, molecular sensors, gyroscopes,barometers, hygrometers, thermometers, Infrared sensors, etc. will notbe repeated here.

The display unit 1406 is configured to display information input by theuser or information provided to the user. The display unit 1406 mayinclude a display panel 14061, and the display panel 14061 may beconfigured in the form of a liquid crystal display (LCD), organiclight-emitting diode (OLED), or the like.

The user input unit 1407 can be configured to receive input numeric orcharacter information, and generate key signal input related to usersettings and function control of the user terminal. Specifically, theuser input unit 1407 includes a touch panel 14071 and other inputdevices 14072. The touch panel 14071, also known as a touch screen, cancollect user's touch operations on or near it (for example, the useruses any suitable objects or accessories such as fingers, stylus, etc.on or near the touch panel 14071. operating). The touch panel 14071 mayinclude a touch detection device and a touch controller. Among them, thetouch detection device detects the user's touch orientation, and detectsthe signal brought by the touch operation, and transmits the signal tothe touch controller; the touch controller receives touch informationfrom the touch detection device and converts it into contactcoordinates, and then sends To the processor 1410, the command sent bythe processor 1410 is received and executed. In addition, the touchpanel 14071 can be implemented in various types such as resistive,capacitive, infrared, and surface acoustic waves. In addition to thetouch panel 14071, the user input unit 1407 may also include other inputdevices 14072. Specifically, other input devices 14072 may include, butare not limited to, physical keyboards, function keys (such as volumecontrol keys, switch keys, etc.), trackballs, mice, and joysticks, whichwill not be repeated here.

Further, the touch panel 14071 can be overlaid on the display panel14061. After the touch panel 14071 detects a touch operation on or nearit, it is transmitted to the processor 1410 to determine the type oftouch event, and the processor 1410 then provides corresponding visualoutput on the display panel 14061. Although in FIG. 14, the touch panel14071 and the display panel 14061 are implemented as two independentcomponents to realize the input and output functions of the userterminal, in some embodiments, the touch panel 14071 and the displaypanel 14061 may be integrated The input and output functions of the userterminal are not specifically limited here.

The interface unit 1408 is an interface for connecting an externaldevice to the user terminal 1400. For example, the external device mayinclude a wired or wireless headset port, an external power (or batterycharger) port, a wired or wireless data port, a memory card port, a portfor connecting a device with an identification module, audioinput/output (I/O) port, video I/O port, headphone port, etc. Theinterface unit 1408 may be configured to receive input from externaldevices (e.g., data information, power, etc.) and transmit the receivedinput to one or more elements within the user terminal 1400 or may beused at the user terminal 1400 and external Transfer data betweendevices.

The memory 1409 can be configured to store software programs and variousdata. The memory 1409 may mainly include a storage program area and astorage data area, wherein the storage program area may store anoperating system, at least one function required application programs(such as sound playback function, image playback function, etc.), etc.;the storage data area may store Data created by the use of mobile phones(such as audio data, phonebooks, etc.), etc. In addition, the memory1409 may include a high-speed random access memory, and may also includea non-volatile memory, such as at least one magnetic disk storagedevice, a flash memory device, or other volatile solid-state storagedevices.

The processor 1410 is the control center of the user terminal, and usesvarious interfaces and lines to connect the various parts of the entireuser terminal, by running or executing the software programs and/ormodules stored in the memory 1409, and calling the data stored in thememory 1409, perform various functions and process data of the userterminal, so as to monitor the user terminal as a whole. The processor1410 may include one or more processing units; preferably, the processor1410 may integrate an application processor and a modem processor, wherethe application processor mainly processes an operating system, a userinterface, and application programs, etc. The processor mainly handleswireless communication. It can be understood that, the foregoing modemprocessor may not be integrated into the processor 1410.

The user terminal 1400 may further include a power supply 1411 (such asa battery) that supplies power to various components. Preferably, thepower supply 1411 may be logically connected to the processor 1410through a power management system, thereby managing charge, discharge,and power consumption management through the power management system andother functions.

In addition, the user terminal 1400 includes some function modules notshown, which will not be repeated here.

Optionally, a user terminal is further provided in an embodiment of thepresent disclosure, including: a memory 1409, a processor 1410 and acomputer program stored in the memory 1409 and executable on theprocessor 1410, where the computer program is executed by the processorto perform the method of controlling a location acquisition hereinabove,which can achieve the same technical effect, and in order to avoidrepetition, they are not repeated here.

Referring to FIG. 15 which is a structural diagram of a device ofcontrolling a location acquisition in another embodiment of the presentdisclosure. The device is applied to a network unit or a locationservice client. As shown in FIG. 15, the device 1500 of controllinglocation acquisition includes: a processor 1501, a transceiver 1502, amemory 1503 and a bus interface, where

the transceiver 1502 is configured to receive control informationconfigured to control relevant behaviors of acquiring the location ofthe user terminal;

the processor 1501 is configured to control the relevant behaviors ofacquiring the location of the user terminal according to or referring tothe control information.

Optionally, the control information indicates at least one of:

whether to permit to perform the relevant behavior of acquiring thelocation of the user terminal;

whether to permit a currently requested relevant behavior of acquiringthe location of the user terminal;

whether to permit a subsequent relevant behavior of acquiring thelocation of the user terminal;

a permission condition for permitting to perform the relevant behaviorof acquiring the location of the user terminal;

a non-permission condition for not permitting to perform the relevantbehavior of acquiring the location of the user terminal;

a permission condition for permitting the subsequent relevant behaviorof acquiring the location of the user terminal;

a non-permission condition for not permitting the subsequent relevantbehavior of acquiring the location of the user terminal;

whether to permit to disclose the acquired location of the userterminal;

a permission condition for permitting to disclose the acquired locationof the user terminal; and

a non-permission condition for not permitting to disclose the acquiredlocation of the user terminal.

Optionally, the control information indicates permitting the relevantbehavior of acquiring the location of the user terminal; and/or

the control information indicates permitting the subsequent relevantbehavior of acquiring the location of the user terminal; and/or

the control information indicates a permission range where permittingthe relevant behavior of acquiring the location of the user terminal;and/or

the control information indicates a permission range where permittingthe subsequent relevant behavior of acquiring the location of the userterminal;

the controlling module is configured to:

perform the relevant behavior of acquiring the location of the userterminal, based on or referring to the control information; and/or

perform the subsequent relevant behavior of acquiring the location ofthe user terminal, based on or referring to the control information;and/or

perform the relevant behavior of acquiring the location of the userterminal, based on or referring to the control information and within apermission range where permitting the relevant behavior of acquiring thelocation of the user terminal indicated by the control information;and/or

perform the subsequent relevant behavior of acquiring the location ofthe user terminal, based on or referring to the control information andwithin a permission range where permitting the subsequent relevantbehavior of acquiring the location of the user terminal indicated by thecontrol information.

Optionally, the control information indicates not permitting to acquirethe location of the user terminal; and/or

the control information indicates a non-permission range where notpermitting to acquire the location of the user terminal; and/or

the control information indicates not permitting to acquire the locationof the user terminal subsequently; and/or

the control information indicates a non-permission range where notpermitting to acquire the location of the user terminal subsequently;

the controlling module is configured to:

not permit to acquire the location of the user terminal, based on orreferring to the control information; and/or

not permit to acquire the location of the user terminal, based on orreferring to the control information and within a non-permission rangewhere not permitting to acquire the location of the user terminalindicated by the control information; and/or

not permit to acquire the location of the user terminal subsequently,based on or referring to the control information; and/or

not permit to acquire the location of the user terminal subsequently,based on or referring to the control information and within anon-permission range where not permitting to acquire the location of theuser terminal subsequently indicated by the control information.

Optionally, the control information further indicates at least one of:

whether to permit to disclose the acquired location of the userterminal; and/or

a permission range where permitting to disclose the acquired location ofthe user terminal; and/or

a non-permission range where not permitting to disclose the acquiredlocation of the user terminal,

the controlling module is configured to:

disclose the acquired location of the user terminal, based on orreferring to the control information; and/or

disclose the acquired location of the user terminal, based on orreferring to the control information and within the permission rangewhere permitting to disclose the acquired location of the user terminal;and/or

not permit to disclose the acquired location of the user terminal, basedon or referring to the control information and within the non-permissionrange where not permitting to disclose the acquired location of the userterminal.

Optionally, the control information indicates the permission range byindicating a permission condition; and/or

the control information indicates the permission range by indicating anon-permission condition, where a range that does not satisfy thenon-permission condition belongs to the permission range; and/or

the control information indicates the non-permission range by indicatinga non-permission condition; and/or

the control information indicates the non-permission range by indicatinga permission condition, where a range that does not satisfy thenon-permission condition belongs to the permission range.

Optionally, the permission condition includes at least one of: apermitted time period, a permitted time duration, permitted locationservice client information, permitted usage information, permittedterminal status information, permitted location type information,permitted moving area range information and permitted locationmeasurement technical information; and/or

the non-permission condition includes at least one of: a non-permittedtime period, a non-permitted time duration, non-permitted locationservice client information, non-permitted usage information,non-permitted terminal status information, non-permitted location typeinformation, non-permitted moving area range information andnon-permitted location measurement technical information.

Optionally, the location service client information includes at leastone of:

an identity of the location service client, a name of the identity ofthe location service client, a domain name address of the identity ofthe location service client, an identity of a requester of a locationservice client party, a name of the requester of the location serviceclient party, an IP address of the requester of the location serviceclient party, a type of a location request of the location serviceclient and a port number applied by a location service client end;and/or

the usage information includes at least one of an emergency business useand a commercial use; and/or

the terminal status information includes at least one of: an idle state,a connected state, an inactive state, available or unavailable before alocation measurement and when powering on and off; and/or

the location type information includes at least one of: a currentlocation, a historical location and a latest location; and/or

the moving area range information includes at least one of: a TrackingArea (TA) identity list, a radio access network node identity list, amobile management unit list, an Authentication Management Function (AMF)identity list, a Mobile Management Entity (MME) identity list, alocation area list, a cell list of a service area list; and/or

the location measurement technical information includes at least one of:an Enhanced Cell-ID (ECID) measurement, an Observed Time Difference ofArrival (OTDOA) measurement and an Uplink Time Difference of Arrival(UTDOA) measurement.

Optionally, the control information indicates whether it is needed torequest the user terminal to perform a permission verification on alocation request in the case that the location of the user terminalneeds to be acquired;

the controlling module is configured to: determine whether it is neededto request the user terminal to perform a permission verification on alocation request, based on or referring to the control information, inthe case that the location of the user terminal needs to be acquired.

Optionally, the control information indicates at least one of:

needing to verify the location request, information of a locationservice client that needs to verify the location request;

not needing to verify the location request, information of a locationservice client that does not need to verify the location request.

Optionally, before receiving the control information, the transceiver1502 is further configured to perform at least one of:

send an acquiring request of acquiring the location of the userterminal;

send a verifying request of acquiring the location of the user terminal;

send a request of acquiring current control information; and

send a request of acquiring updated control information.

Optionally, the controlling the relevant behavior of acquiring thelocation of the user terminal includes at least one of:

permitting the relevant behavior of acquiring the location of the userterminal;

not permitting the relevant behavior of acquiring the location of theuser terminal;

starting a timer.

Optionally, the controlling module is configured to:

start a timer to perform a time counting in the case that controlinformation indicates not permitting a subsequent relevant behavior ofacquiring the location of the user terminal, and

perform the subsequent not permitting the relevant behavior of acquiringthe location of the user terminal after the timer starts to perform thetime counting and before the timer expires;

where the time counting duration is preset or set according to anon-permitted time duration indicated by the control information;

and/or

start a timer to perform a time counting in the case that controlinformation indicates not permitting the relevant behavior of acquiringthe location of the user terminal, and

perform not permitting the relevant behavior of acquiring the locationof the user terminal before the timer expires;

where the time counting duration is preset or set according to anon-permitted time duration indicated by the control information;

and/or

start a timer to perform a time counting in the case that that controlinformation indicates permitting the relevant behavior of acquiring thelocation of the user terminal and the control information indicates apermitted time, and permit the relevant behavior of acquiring thelocation of the user terminal before the timer expires.

Optionally, the performing not permitting the relevant behavior ofacquiring the location of the user terminal includes at least one of:

directly feeding back a user terminal location acquisition failure, inthe case that a location request for the user terminal is received;

not sending a verifying request of acquiring the location of the userterminal to the user terminal;

not acquiring the location of the user terminal;

not requesting a radio access network unit to trigger a locationmeasurement for the user terminal;

not triggering the user terminal to perform a location measurement; and

not responding to a location acquiring request sent by a locationservice client.

Optionally, the performing permitting the relevant behavior of acquiringthe location of the user terminal includes at least one of:

sending a verifying request of acquiring the location of the userterminal to the user terminal;

acquiring the location of the user terminal;

requesting a radio access network unit to trigger a location measurementfor the user terminal;

triggering the user terminal to perform a location measurement;

responding to a location acquiring request sent by a location serviceclient, to acquire the location of the user terminal; and

responding to a received location request for the user terminal, toacquire the location of the user terminal.

Optionally, after receiving the control information, the transceiver1502 is further configured to determine whether to receive the controlinformation and returning back to the user terminal a return message ofwhether to determine to receive the control information and/or thereceived control information;

the controlling, based on or referring to the control information, therelevant behavior of acquiring the location of the user terminalincludes: control the relevant behavior of acquiring the location of theuser terminal, based on or referring to the control information, in thecase that the control information is received.

Optionally, the network unit includes at least one of: a radio accessnetwork node, a radio access network function, a core network function,a core network node, a mobile management node, a mobile managementfunction, a location service management function, a location servicemanagement node, a location service management client, an evolved Node B(eNB), an Access and Mobility Management Function (AMF), a MobileManagement Entity (MME), a Location Service (LCS) function and anEnhanced Serving Mobile Location Centre (E-SMLC).

The transceiver 1502 is configured to receive and transmit data underthe control of the processor 1501, and the transceiver 1502 includes atleast two antenna ports.

In FIG. 15, the bus architecture may include any number ofinterconnected buses and bridges, specifically, one or more processorsrepresented by the processor 1501 and various circuits of the memoryrepresented by the memory 1503 are linked together. The bus architecturecan also link various other circuits such as peripheral devices, voltageregulators, and power management circuits, etc., which are well known inthe art, and therefore, they will not be further described in thisarticle. The bus interface provides an interface. The transceiver 1502may be a plurality of elements, including a transmitter and a receiver,and provides a unit for communicating with various other devices on atransmission medium. For different user devices, the user interface 1504may also be an interface that can be externally connected to therequired device. The connected devices include, but are not limited to,a keypad, a display, a speaker, a microphone, and a joystick.

The processor 1501 is responsible for managing the bus architecture andgeneral processing, and the memory 1503 may store data used by theprocessor 1501 when performing operations.

Optionally, a device of controlling a location acquisition is furtherprovided in an embodiment, including: a memory 1503, a processor 1501and a computer program stored in the memory 1503 and executable on theprocessor 1501, where the computer program is executed by the processor1501 to perform the method of controlling a location acquisitionhereinabove, and the same technical effect can be achieved. To avoidrepetition, details are not repeated here.

A computer-readable storage medium storing a computer program is furtherprovided in an embodiment of the present disclosure, where the computerprogram is executed by a processor to perform the method of controllinga location acquisition at the user terminal side in the embodiment ofthe present disclosure.

A computer-readable storage medium storing a computer program is furtherprovided in an embodiment of the present disclosure, where the computerprogram is executed by a processor to perform the method of controllinga location acquisition at the device of controlling a locationacquisition side in the embodiment of the present disclosure.

The computer-readable storage medium, such as Read-Only Memory (ROM), aRandom Access Memory (RAM), magnetic disk or optical disk, etc.

It should be noted that in this article, the terms “include”,“including” or any other variant thereof are intended to covernon-exclusive inclusion, so that a process, method, article or devicethat includes a series of elements includes not only those elements, Italso includes other elements that are not explicitly listed, or includeelements inherent to this process, method, article, or device. Withoutmore restrictions, the element defined by the sentence “include one . .. ” does not exclude that there are other identical elements in theprocess, method, article or device that includes the element.

Through the description of the above embodiments, those skilled in theart can clearly understand that the methods in the above embodiments canbe implemented by means of software plus a necessary general hardwareplatform, and of course, can also be implemented by hardware, but inmany cases the former is better implementation. Based on thisunderstanding, the technical solution of the present disclosure can beembodied in the form of a software product in essence or part thatcontributes to the existing technology, and the computer softwareproduct is stored in a storage medium (such as ROM/RAM, magnetic disk,The CD-ROM includes several instructions to enable a terminal (which maybe a mobile phone, a computer, a server, an air conditioner, or anetwork device, etc.) to execute the method described in each embodimentof the present disclosure.

The embodiments of the present disclosure have been described above withreference to the drawings, but the present disclosure is not limited tothe above-mentioned specific embodiments. The above-mentioned specificembodiments are only schematic, not limiting, and those of ordinaryskill in the art under the enlightenment of the present disclosure, manyforms can be made without departing from the principle of the presentdisclosure and the scope of the claims, all of which fall within thescope of the present disclosure.

What is claimed is:
 1. A method of controlling a location acquisition,applied to a user terminal, comprising: determining whether apredetermined condition is satisfied; in the case that the predeterminedcondition is satisfied, sending control information configured toindicate whether to permit a subsequent relevant behavior of acquiring alocation of the user terminal; the predetermined condition comprises atleast one of: generating and/or updating the control information; anacquiring request of acquiring the location of the user terminal isreceived; a verifying request of acquiring the location of the userterminal is received; a request of acquiring current control informationis received; and a request of acquiring updated control information inthe case that the current control information changes is received. 2.The method according to claim 1, wherein the control informationindicates at least one of: whether to permit to perform the relevantbehavior of acquiring the location of the user terminal; whether topermit a currently requested relevant behavior of acquiring the locationof the user terminal; a permission condition for permitting to performthe relevant behavior of acquiring the location of the user terminal; anon-permission condition for not permitting to perform the relevantbehavior of acquiring the location of the user terminal; a permissioncondition for permitting the subsequent relevant behavior of acquiringthe location of the user terminal; a non-permission condition for notpermitting the subsequent relevant behavior of acquiring the location ofthe user terminal; whether to permit to disclose the acquired locationof the user terminal; a permission condition for permitting to disclosethe acquired location of the user terminal; and a non-permissioncondition for not permitting to disclose the acquired location of theuser terminal.
 3. The method according to claim 2, wherein the controlinformation further indicates at least one of: whether to permit todisclose the acquired location of the user terminal; and/or a permissionrange where permitting to disclose the acquired location of the userterminal; and/or a non-permission range where not permitting to disclosethe acquired location of the user terminal.
 4. The method according toclaim 2, wherein the permission condition comprises at least one of: apermitted time period, a permitted time duration, permitted locationservice client information, permitted usage information, permittedterminal status information, permitted location type information,permitted moving area range information and permitted locationmeasurement technical information; and/or the non-permission conditioncomprises at least one of: a non-permitted time period, a non-permittedtime duration, non-permitted location service client information,non-permitted usage information, non-permitted terminal statusinformation, non-permitted location type information, non-permittedmoving area range information and non-permitted location measurementtechnical information.
 5. The method according to claim 1, wherein thecontrol information indicates whether it is needed to request the userterminal to perform a permission verification on a location request inthe case that the location of the user terminal needs to be acquired. 6.The method according to claim 1, wherein the relevant behavior ofacquiring the location of the user terminal comprises at least one of:whether to send to the user terminal a verifying request of acquiringthe location of the user terminal; whether to acquire the location ofthe user terminal; whether to request a radio access network unit totrigger a location measurement for the user terminal; whether to triggerthe user terminal to perform a location measurement; whethersuccessfully responded to a received location request for the userterminal; whether to disclose the acquired location of the userterminal; and whether requiring to start a timer.
 7. The methodaccording to claim 1, wherein the predetermined condition is configuredby the user terminal, or the predetermined condition is preset by auser, or the predetermined condition is predefined by a protocol, or thepredetermined condition is pre-configured to the user terminal by anetwork.
 8. The method according to claim 1, wherein the controlinformation is applicable to all location service clients.
 9. A methodof controlling a location acquisition, applied to a network unit,comprising: receiving control information configured to control arelevant behavior of acquiring a location of a user terminal;controlling, based on or referring to the control information, therelevant behavior of acquiring the location of the user terminal; in acase that the control information indicates that the subsequent relevantbehavior of acquiring the location of the user terminal is notpermitted, the controlling the relevant behavior of acquiring thelocation of the user terminal comprises at least one of: directlyfeeding back a user terminal location acquisition failure, in the casethat a location request for the user terminal is received; not sending averifying request of acquiring the location of the user terminal to theuser terminal; not acquiring the location of the user terminal; notrequesting a radio access network unit to trigger a location measurementfor the user terminal; not triggering the user terminal to perform alocation measurement; not responding to a location acquiring requestsent by a location service client; and rejecting a location servicerequest from a location service client regarding a user equipment, UE.10. The method according to claim 9, wherein the control informationindicates at least one of: whether to permit to perform the relevantbehavior of acquiring the location of the user terminal; whether topermit a currently requested relevant behavior of acquiring the locationof the user terminal; a permission condition for permitting to performthe relevant behavior of acquiring the location of the user terminal; anon-permission condition for not permitting to perform the relevantbehavior of acquiring the location of the user terminal; a permissioncondition for permitting the subsequent relevant behavior of acquiringthe location of the user terminal; a non-permission condition for notpermitting the subsequent relevant behavior of acquiring the location ofthe user terminal; whether to permit to disclose the acquired locationof the user terminal; a permission condition for permitting to disclosethe acquired location of the user terminal; and a non-permissioncondition for not permitting to disclose the acquired location of theuser terminal.
 11. The method according to claim 10, wherein the controlinformation indicates permitting the relevant behavior of acquiring thelocation of the user terminal; and/or the control information indicatespermitting the subsequent relevant behavior of acquiring the location ofthe user terminal; and/or the control information indicates a permissionrange where permitting the relevant behavior of acquiring the locationof the user terminal; and/or the control information indicates apermission range where permitting the subsequent relevant behavior ofacquiring the location of the user terminal; the controlling, based onor referring to the control information, the relevant behavior ofacquiring the location of the user terminal comprises: performing therelevant behavior of acquiring the location of the user terminal, basedon or referring to the control information; and/or performing thesubsequent relevant behavior of acquiring the location of the userterminal, based on or referring to the control information; and/orperforming the relevant behavior of acquiring the location of the userterminal, based on or referring to the control information and within apermission range where permitting the relevant behavior of acquiring thelocation of the user terminal indicated by the control information;and/or performing the subsequent relevant behavior of acquiring thelocation of the user terminal, based on or referring to the controlinformation and within a permission range where permitting thesubsequent relevant behavior of acquiring the location of the userterminal indicated by the control information.
 12. The method accordingto claim 10, wherein the control information indicates not permitting toacquire the location of the user terminal; and/or the controlinformation indicates a non-permission range where not permitting toacquire the location of the user terminal; and/or the controlinformation indicates not permitting to acquire the location of the userterminal subsequently; and/or the control information indicates anon-permission range where not permitting to acquire the location of theuser terminal subsequently; the controlling, based on or referring tothe control information, the relevant behavior of acquiring the locationof the user terminal comprises: not permitting to acquire the locationof the user terminal, based on or referring to the control information;and/or not permitting to acquire the location of the user terminal,based on or referring to the control information and within anon-permission range where not permitting to acquire the location of theuser terminal indicated by the control information; and/or notpermitting to acquire the location of the user terminal subsequently,based on or referring to the control information; and/or not permittingto acquire the location of the user terminal subsequently, based on orreferring to the control information and within a non-permission rangewhere not permitting to acquire the location of the user terminalsubsequently indicated by the control information.
 13. The methodaccording to claim 10, wherein the permission condition comprises atleast one of: a permitted time period, a permitted time duration,permitted location service client information, permitted usageinformation, permitted terminal status information, permitted locationtype information, permitted moving area range information and permittedlocation measurement technical information; and/or the non-permissioncondition comprises at least one of: a non-permitted time period, anon-permitted time duration, non-permitted location service clientinformation, non-permitted usage information, non-permitted terminalstatus information, non-permitted location type information,non-permitted moving area range information and non-permitted locationmeasurement technical information.
 14. The method according to claim 9,wherein the controlling the relevant behavior of acquiring the locationof the user terminal comprises at least one of: permitting the relevantbehavior of acquiring the location of the user terminal; not permittingthe relevant behavior of acquiring the location of the user terminal;starting a timer.
 15. The method according to claim 9, wherein thecontrolling, based on or referring to the control information, therelevant behavior of acquiring the location of the user terminalcomprises: performing the subsequent not permitting the relevantbehavior of acquiring the location of the user terminal, in the casethat the control information indicates not permitting a subsequentrelevant behavior of acquiring the location of the user terminal;starting a timer to perform a time counting in the case that controlinformation indicates not permitting a subsequent relevant behavior ofacquiring the location of the user terminal, and performing thesubsequent not permitting the relevant behavior of acquiring thelocation of the user terminal after the timer starts to perform the timecounting and before the timer expires; wherein the time countingduration is preset or set according to a non-permitted time durationindicated by the control information; and/or starting a timer to performa time counting in the case that control information indicates notpermitting the relevant behavior of acquiring the location of the userterminal, and performing not permitting the relevant behavior ofacquiring the location of the user terminal before the timer expires;wherein the time counting duration is preset or set according to anon-permitted time duration indicated by the control information; and/orstarting a timer to perform a time counting in the case that thatcontrol information indicates permitting the relevant behavior ofacquiring the location of the user terminal and the control informationindicates a permitted time, and permitting the relevant behavior ofacquiring the location of the user terminal before the timer expires.16. The method according to claim 9, wherein subsequent to the receivingthe control information and prior to the controlling the relevantbehavior of acquiring the location of the user terminal based on orreferring to the control information, the method further comprises:determining whether to receive the control information and returningback to the user terminal a return message of whether to determine toreceive the control information and/or the received control information;the controlling, based on or referring to the control information, therelevant behavior of acquiring the location of the user terminalcomprises: controlling the relevant behavior of acquiring the locationof the user terminal, based on or referring to the control information,in the case that the control information is received.
 17. A userterminal, comprising: a memory, a processor and a computer programstored in the memory and executable on the processor, wherein thecomputer program is executed by the processor to perform a method ofcontrolling a location acquisition and the method comprises: determiningwhether a predetermined condition is satisfied; in the case that thepredetermined condition is satisfied, sending control informationconfigured to indicate whether to permit a subsequent relevant behaviorof acquiring a location of the user terminal; the predeterminedcondition comprises at least one of: generating and/or updating thecontrol information; an acquiring request of acquiring the location ofthe user terminal is received; a verifying request of acquiring thelocation of the user terminal is received; a request of acquiringcurrent control information is received; and a request of acquiringupdated control information in the case that the current controlinformation changes is received according to claim
 1. 18. The userterminal according to claim 17, wherein the control informationindicates at least one of: whether to permit to perform the relevantbehavior of acquiring the location of the user terminal; whether topermit a currently requested relevant behavior of acquiring the locationof the user terminal; a permission condition for permitting to performthe relevant behavior of acquiring the location of the user terminal; anon-permission condition for not permitting to perform the relevantbehavior of acquiring the location of the user terminal; a permissioncondition for permitting the subsequent relevant behavior of acquiringthe location of the user terminal; a non-permission condition for notpermitting the subsequent relevant behavior of acquiring the location ofthe user terminal; whether to permit to disclose the acquired locationof the user terminal; a permission condition for permitting to disclosethe acquired location of the user terminal; and a non-permissioncondition for not permitting to disclose the acquired location of theuser terminal.
 19. The user terminal according to claim 18, wherein thepermission condition comprises at least one of: a permitted time period,a permitted time duration, permitted location service clientinformation, permitted usage information, permitted terminal statusinformation, permitted location type information, permitted moving arearange information and permitted location measurement technicalinformation; and/or the non-permission condition comprises at least oneof: a non-permitted time period, a non-permitted time duration,non-permitted location service client information, non-permitted usageinformation, non-permitted terminal status information, non-permittedlocation type information, non-permitted moving area range informationand non-permitted location measurement technical information.