CN113438646A - Service establishing method, device, terminal and network side equipment - Google Patents

Service establishing method, device, terminal and network side equipment Download PDF

Info

Publication number
CN113438646A
CN113438646A CN202110742122.8A CN202110742122A CN113438646A CN 113438646 A CN113438646 A CN 113438646A CN 202110742122 A CN202110742122 A CN 202110742122A CN 113438646 A CN113438646 A CN 113438646A
Authority
CN
China
Prior art keywords
resource control
radio resource
terminal
control configuration
network side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110742122.8A
Other languages
Chinese (zh)
Other versions
CN113438646B (en
Inventor
倪春木
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spreadtrum Communications Shanghai Co Ltd
Original Assignee
Spreadtrum Communications Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spreadtrum Communications Shanghai Co Ltd filed Critical Spreadtrum Communications Shanghai Co Ltd
Priority to CN202110742122.8A priority Critical patent/CN113438646B/en
Publication of CN113438646A publication Critical patent/CN113438646A/en
Application granted granted Critical
Publication of CN113438646B publication Critical patent/CN113438646B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0205Traffic management, e.g. flow control or congestion control at the air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention provides a service establishing method, which is applied to a terminal with idle wireless resource control and connection management, and comprises the following steps: responding to the data transmission requirement, and sending a wireless resource control configuration request to a network side; so that the network side acquires the context setting request from the core network and allocates air interface resources for the terminal; receiving radio resource control configuration information sent by a network side, establishing a bearer control plane signaling data connection or a bearer user plane data connection according to the radio resource control configuration information, and activating access stratum security verification; and sending radio resource control configuration completion information to a network side so that the network side sends a context setting response to the core network and establishes connection between the air interface and the core network. The invention can adopt less air interface signaling to establish a data path, and does not need to save the context information of the terminal and occupy more memory.

Description

Service establishing method, device, terminal and network side equipment
Technical Field
The present invention relates to the field of wireless communication technologies, and in particular, to a method, an apparatus, a terminal, and a network device for establishing a service.
Background
In current 4G and 5G communication systems, there are large-scale machine type communication, for example, application scenarios of 5G mtc, which requires that the terminal power consumption is low, for example, in case of using a common battery to supply power, it needs to be able to use for more than 10 years. In the prior art, the power consumption of the terminal is reduced by switching the terminal to the suspended state when no information is transmitted, but in this way, when the terminal is in the suspended state, the core network needs to be kept in the connected state, and the terminal, the network side and the core network all need to store the context information of the terminal, and when the network side is connected with a plurality of terminals, a large amount of memory of the network side needs to be occupied.
Disclosure of Invention
The service establishing method, the device, the terminal and the network side equipment provided by the invention can adopt fewer air interface signaling to establish a data path, and do not need to store the context information of the terminal and occupy more memory.
In a first aspect, the present invention provides a service establishment method, where the method is applied to a terminal in an idle state for radio resource control and connection management, and the method includes:
responding to the data transmission requirement, and sending a wireless resource control configuration request to a network side; so that the network side acquires the context setting request from the core network and allocates air interface resources for the terminal;
receiving radio resource control configuration information sent by a network side, establishing a bearer control plane signaling data connection or a bearer user plane data connection according to the radio resource control configuration information, and activating access stratum security verification;
and sending radio resource control configuration completion information to a network side so that the network side sends a context setting response to the core network and establishes connection between the air interface and the core network.
Optionally, the sending the radio resource control configuration request to the network side includes: and carrying more than one complete security and encryption algorithm, the content of the service request, the terminal identity information and the selected network identity information in the radio resource control configuration request so that the network side stores the complete security and encryption algorithm and the terminal identity information and sends the service request content and the selected network identity information to a core network.
Optionally, receiving the radio resource control configuration information sent by the network side includes: and decrypting the radio resource control configuration information and carrying out security check.
Optionally, the decrypting the rrc configuration information and the security check include:
acquiring a complete protection and encryption algorithm set supported by a terminal;
sequentially adopting the algorithm in the algorithm set to decrypt and completely protect the wireless resource control configuration information;
and when the algorithm in the algorithm set fails to decrypt and completely protect the radio resource control configuration information, checking the validity of the radio resource control configuration information.
Optionally, before sending the radio resource control configuration completion information to the network side, the method includes: and performing complete protection and/or encryption on the radio resource control configuration completion information.
Optionally, receiving the radio resource control configuration information sent by the network side includes:
when the radio resource control configuration information has an error;
acquiring a current cell state;
when the cell is not updated, initiating a radio resource control setting request process;
when the cell is updated, a radio resource control setting request process is initiated or a radio resource control configuration request is reinitiated.
In a second aspect, the present invention provides a service establishment method, which is applied to a network side device, and the method includes:
receiving a radio resource control configuration request sent by a terminal, and sending a message for initializing the terminal to a core network according to the radio resource control configuration request; wherein radio resource control and connection management of the terminal are in an idle state;
receiving an initialization context setting request sent by a core network according to the message of the initialization terminal; sending wireless resource control configuration information to the terminal according to the initialization context setting request;
and receiving radio resource control configuration completion information sent by the terminal, and sending an initialization context setting response to the core network according to the radio resource control configuration completion information so as to complete the previous connection between the air interface and the core network.
Optionally, before sending the radio resource control configuration information to the terminal according to the initialization context setting request, the method includes:
selecting a complete protection and encryption algorithm aiming at the radio resource control configuration information;
and adopting the selected algorithm to completely protect and encrypt the radio resource control configuration information.
In a third aspect, the present invention provides a service establishing apparatus, where the apparatus is located at a terminal, and the apparatus includes:
the request module is used for responding to the data transmission requirement and sending a wireless resource control configuration request to the network side; so that the network side acquires the context setting request from the core network and allocates air interface resources for the terminal;
the receiving module is used for receiving the radio resource control configuration information sent by the network side, establishing a bearer control plane signaling data connection or a bearer user plane data connection according to the radio resource control configuration information, and activating the access layer security verification;
and the completion module is used for sending the radio resource control configuration completion information to the network side so that the network side sends a context setting response to the core network and establishes connection between the air interface and the core network.
Optionally, the request module is configured to carry more than one security and encryption algorithm, content of the service request, terminal identity information, and selected network identity information in the radio resource control configuration request, so that the network side stores the security and encryption algorithm and the terminal identity information, and sends the content of the service request and the selected network identity information to a core network.
Optionally, the receiving module includes:
and the checking submodule is used for decrypting the radio resource control configuration information and carrying out security check.
Optionally, the checking submodule includes:
the terminal comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a complete protection and encryption algorithm set supported by the terminal;
the decryption unit is used for sequentially adopting the algorithm in the algorithm set to decrypt and completely protect the wireless resource control configuration information;
and the checking unit is used for checking the validity of the radio resource control configuration information when the algorithms in the algorithm set fail to decrypt and completely protect the radio resource control configuration information.
Optionally, the completion module comprises:
and the encryption sub-module is used for carrying out complete protection and/or encryption on the radio resource control configuration completion information.
Optionally, the receiving module includes:
a compatibility judging submodule, configured to, when the radio resource control configuration information is in error;
the state judgment submodule is used for acquiring the current cell state;
the first request submodule is used for initiating a radio resource control setting request process when the cell is not updated;
and the second request submodule is used for initiating a radio resource control setting request process or re-initiating a radio resource control configuration request when the cell is updated.
In a fourth aspect, the present invention provides a service establishing apparatus, applied to a network side device,
the initialization module is used for receiving a radio resource control configuration request sent by a terminal and sending a message for initializing the terminal to a core network according to the radio resource control configuration request; wherein radio resource control and connection management of the terminal are in an idle state;
a configuration module, configured to receive an initialization context setting request sent by a core network according to the message of the initialization terminal; sending wireless resource control configuration information to the terminal according to the initialization context setting request;
and the response module is used for receiving the radio resource control configuration completion information sent by the terminal and sending an initialization context setting response to the core network according to the radio resource control configuration completion information so as to complete the previous connection between the air interface and the core network.
Optionally, the configuration module comprises:
the selection submodule is used for selecting a complete protection and an encryption algorithm aiming at the radio resource control configuration information;
and the encryption submodule is used for carrying out complete protection and encryption on the radio resource control configuration information by adopting a selected algorithm.
In a fifth aspect, the present invention provides a terminal, including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any of the methods described above as applied to a terminal.
In a sixth aspect, the present invention provides a chip, where the chip is located at a terminal, and the chip includes:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any of the methods described above as applied to a terminal.
In a seventh aspect, the present invention provides a computer-readable storage medium, wherein the computer-readable storage medium stores computer instructions, which when executed by a processor, implement any one of the above methods applied to a terminal.
In an eighth aspect, the present invention provides a network side device, where the network side device includes:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any of the methods described above as applied to a network-side device.
In a ninth aspect, the present invention provides a chip, where the chip is located in a network side device, and the chip includes:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any of the methods described above as applied to a network-side device.
In a tenth aspect, the present invention provides a chip module, which includes any one of the above chips.
In an eleventh aspect, the present invention provides a computer-readable storage medium, wherein the computer-readable storage medium stores computer instructions, and the computer instructions, when executed by a processor, implement any one of the above methods applied to a network-side device.
In the technical scheme provided by the invention, the radio resource control and the connection management of the terminal are both in an idle state, and when data transmission is required, the establishment of an air interface data path and the data transmission can be completed only through 3 air interface messages of the radio resource control configuration request, the radio resource control configuration information and the radio resource control configuration completion information. Meanwhile, the technical scheme provided by the invention does not change the original message interaction flow between the network side and the core network, and the initialization setting of the context information is realized through the interaction between the network side and the core network, so that the context information of the terminal does not need to be stored. Therefore, the technical scheme of the invention not only reduces the energy consumption of the terminal, but also does not bring extra memory requirements to the network side and the core network.
Drawings
Fig. 1 is a flowchart of a service establishment method according to an embodiment of the present invention;
fig. 2 is a flowchart of validity checking of a service establishment method according to another embodiment of the present invention;
FIG. 3 is a flowchart illustrating an error handling procedure of a service establishment method according to an embodiment of the present invention;
fig. 4 is a flowchart of a service establishment method according to another embodiment of the present invention;
FIG. 5 is a flowchart of a transaction setup method according to an embodiment of the present invention;
fig. 6 is an interaction flowchart of a terminal, a network side and a core network of a service establishment method according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a service establishment apparatus according to an embodiment of the present invention;
fig. 8 is a schematic diagram of an inspection sub-module of a service establishment apparatus according to an embodiment of the present invention;
fig. 9 is a schematic diagram of a receiving module of a service establishing apparatus according to an embodiment of the present invention;
fig. 10 is a schematic diagram of a service establishing apparatus according to an embodiment of the present invention;
fig. 11 is a schematic diagram of a configuration module of a service establishment apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An embodiment of the present invention provides a service establishment method, where the method is applied to a terminal in an idle state for radio resource control and connection management, as shown in fig. 1 and 6, and the method includes:
step 1100, responding to a data transmission demand, and sending a radio resource control configuration request to a network side; so that the network side acquires the context setting request from the core network and allocates air interface resources for the terminal;
in some embodiments, the terminal is a terminal already registered to the network, and the radio resource control and connection management of the terminal are both in an IDLE state in order to save resources when there is no data transmission, for example, the terminal enters a state of RRC _ IDLE, CM _ IDLE. At this time, the terminal and the network side do not need to store the terminal context data related to the service. The network side can carry some encryption or security completion algorithms used by the recommended terminal in the radio resource control release message for the terminal to subsequently access the network side for use. When the terminal has uplink data to be transmitted or sends a paging message to the terminal because the network side has downlink data to be transmitted, a non-access stratum of the terminal triggers a service request, and radio resource control of the terminal sends a radio resource control configuration request RrcConfigurationRequest on an air interface. After receiving the radio resource control configuration Request RrcConfigurationRequest, the network side sends a Message Initial UE Message of an initialization terminal to the core network, and after receiving the Message Initial UE Message of the initialization terminal, the core network sends an initialization Context Setup Request Initial Context Setup Request to the network side.
As an optional implementation manner, the sending the radio resource control configuration request to the network side includes: and carrying more than one complete security and encryption algorithm, the content of the service request, the terminal identity information and the selected network identity information in the radio resource control configuration request so that the network side stores the complete security and encryption algorithm and the terminal identity information and sends the service request content and the selected network identity information to a core network. In some embodiments, the rrc configuration request carries one or more of the security and encryption algorithms desired by the terminal, the service request content, the terminal Identity information ue-Identity, and the selected network Identity information selected plmn-Identity. After receiving the Message, the network side stores the information such as the complete security and encryption algorithm expected by the terminal, the terminal Identity information UE-Identity and the like, and simultaneously sends the service request content service request, the selected network Identity information UE-Identity and the like to the core network through initializing the Message Initial UE Message of the terminal. In other embodiments, the message content carried by the rrc configuration request may not include the security completion and encryption algorithm.
Step 1200, receiving radio resource control configuration information sent by a network side, establishing a connection for carrying control plane signaling data or a connection for carrying user plane data according to the radio resource control configuration information, and activating access stratum security verification;
in some embodiments, after receiving the initial Context Setup Request, the network side allocates air interface resources and issues radio resource control configuration information RrcConfiguration to the terminal, where the radio resource control configuration information RrcConfiguration includes configuration information such as control plane signaling data SRB, user plane data DRB, medium access control layer MAC, physical configuration dedicated data physical configured modified configured and security algorithm configuration secure algorithm configured. As an optional implementation manner, before sending the rrc configuration message, the base station selects an algorithm for performing security completion and encryption on the rrc configuration message, then performs security completion on the message using the selected security completion algorithm, then encrypts the message using the selected encryption algorithm, and preferentially uses the security completion and encryption algorithm carried in the rrc configuration request message in step 1100. After the terminal receives the rrc configuration, the terminal decrypts the message and performs security check to determine that the received message is valid rrc configuration, and after the UE determines that the valid rrc configuration is received, the UE establishes a connection for carrying control plane signaling data SRB and a connection DRB for carrying user plane data according to the information provided by the rrc configuration, and activates an access stratum security authentication AS security.
Step 1300, sending radio resource control configuration completion information to a network side, so that the network side sends a context setting response to a core network, and establishes a connection between an air interface and the core network.
In some embodiments, the terminal sends Rrc Configuration Complete information Rrc Configuration Complete to the network, where the Rrc Configuration Complete information Rrc Configuration Complete may perform security completion and/or encryption using a security completion encryption algorithm carried by the Rrc Configuration Request. After receiving the radio resource control configuration completion information Rrc configuration Complete, the network side sends a Context Setup Response to the core network, thereby completing establishment of connection between the air interface and the core network, and then performing data transmission by using the establishment service.
In the technical solution provided in this embodiment, both the radio resource control and the connection management of the terminal are in an idle state, and when data transmission is required, the establishment of an air interface data path and data transmission may be completed only through 3 air interface messages, namely, the radio resource control configuration request, the radio resource control configuration information, and the radio resource control configuration completion information. Meanwhile, the technical scheme provided by the embodiment does not change the original message interaction flow between the network side and the core network, and the initialization setting of the context information is realized through the interaction between the network side and the core network, so that the context information of the terminal does not need to be stored. Therefore, the technical scheme in the embodiment not only reduces the energy consumption of the terminal, but also does not bring extra memory requirements to the network side and the core network.
As an alternative implementation, as shown in fig. 2, in step 1200, the decrypting and integrity check of the rrc configuration information includes:
step 1210, acquiring a complete security and encryption algorithm set supported by the terminal;
in some embodiments, the set of integrity protection and encryption algorithms refers to the set of all integrity protection and encryption algorithms that the terminal is capable of supporting.
Step 1220, sequentially adopting the algorithms in the algorithm set to decrypt the radio resource control configuration information;
in some embodiments, the terminal performs decryption and re-security check on the received rrc configuration message in sequence by using each security completion and encryption algorithm in the algorithm set, and when the security completion check is successful, it may be determined that the decryption and security completion algorithm currently used by the terminal is an algorithm for performing security completion and encryption on the rrc configuration message at the network side. And the terminal obtains the contents of the rrc configuration message through the decryption operation. In order to improve efficiency, the terminal preferentially uses the security completion and encryption algorithm expected by the terminal carried by the Rrc Configuration Request in step 1100.
Step 1230, when the algorithm in the algorithm set fails to decrypt the rrc configuration information, the validity of the rrc configuration information is checked.
In some embodiments, after all the security and encryption algorithms in the algorithm set are tried, a security and encryption algorithm with successful security check is not found yet, and one possibility is that the network side does not encrypt and complete security for Rrc Configuration, at this time, the content of the Rrc Configuration message is directly checked, and if the content is legal, the Rrc Configuration message is a legal message, and the terminal may continue to process the message; another possibility is that the network side encrypts and finishes the radio resource control Configuration information Rrc Configuration using an encryption or a finishing algorithm that is not supported by the terminal, and at this time, the terminal can only discard the received radio resource control Configuration information Rrc Configuration.
As an alternative implementation manner, as shown in fig. 3, in step 1200, after receiving the radio resource control configuration information sent by the network side, the method includes:
step 1240, when the radio resource control configuration information has an error;
in some embodiments, when some parameters indicated by the Rrc Configuration information are not compatible or have errors (for example, there is an error in the physical layer parameter Configuration check), the UE may be unable to process the parameters.
In order to process the error, the processing is required to be carried out according to the current cell updating state, so the current cell state is acquired firstly;
step 1251, when the cell is not updated, initiate a radio resource control setup request procedure;
in some embodiments, when the cell is not updated, that is, the access is still initiated in the original cell, since the Rrc Configuration has already occurred, it is indicated to some extent that the success rate of continuing to use the Rrc Configuration on the current cell may be relatively low, and in order to increase the success rate, the new access procedure uses an Rrc setup request rrcstupreq/RrcSetup procedure. In other embodiments, since the reason for the failure may not be caused by the Rrc Configuration procedure, the reason for the failure may have been eliminated when the connection is performed next time, in which case, the use of the Rrc Configuration procedure can save air interface signaling. Therefore, it is possible to attempt to establish a connection using the rcconfiguration flow a plurality of times, and when failing a plurality of times, it is possible to initiate a request for establishing a connection using the Rrc Configuration/rcsetup flow.
Step 1252, when the cell is updated, initiate a radio resource control setup request procedure or reinitiate a radio resource control configuration request.
In some embodiments, when the new cell supports Rrc Configuration information Rrc Configuration, an Rrc Configuration request RrcConfiguration req/RrcConfiguration procedure may be selected, and an Rrc setup request rrcstupreq/RrcSetup procedure may be selected. In some embodiments, the terminal may acquire whether the new cell supports radio resource control Configuration information Rrc Configuration through broadcast information on the network side.
An embodiment of the present invention provides a service establishment method, which is applied to a network side device, and as shown in fig. 4 and fig. 6, the method includes:
step 2100, receiving a radio resource control configuration request sent by a terminal, and sending a message for initializing the terminal to a core network according to the radio resource control configuration request; wherein radio resource control and connection management of the terminal are in an idle state;
in some embodiments, the terminal is a terminal already registered to the network, and the radio resource control and connection management of the terminal are both in an IDLE state in order to save resources when there is no data transmission, for example, the terminal enters a state of RRC _ IDLE, CM _ IDLE. At this time, the terminal and the network side do not need to store the terminal context data related to the service. The network side can carry some encryption or security completion algorithms used by the recommended terminal in the radio resource control release message for the terminal to subsequently access the network side for use. When the terminal has uplink data to be transmitted or sends a paging message to the terminal because the network side has downlink data to be transmitted, a non-access stratum of the terminal triggers a service request, and radio resource control of the terminal sends a radio resource control configuration request RrcConfigurationRequest on an air interface. After receiving the radio resource control configuration Request RrcConfigurationRequest, the network side sends a Message Initial UE Message of an initialization terminal to the core network, and after receiving the Message Initial UE Message of the initialization terminal, the core network sends an initialization Context Setup Request Initial Context Setup Request to the network side.
As an optional implementation manner, the sending the radio resource control configuration request to the network side includes: and carrying more than one complete security and encryption algorithm, the content of the service request, the terminal identity information and the selected network identity information in the radio resource control configuration request so that the network side stores the complete security and encryption algorithm and the terminal identity information and sends the service request content and the selected network identity information to a core network. In some embodiments, the rrc configuration request carries one or more of the security and encryption algorithms desired by the terminal, the service request content, the terminal Identity information ue-Identity, and the selected network Identity information selected plmn-Identity. After receiving the Message, the network side stores the information such as the complete security and encryption algorithm expected by the terminal, the terminal Identity information UE-Identity and the like, and simultaneously sends the service request content service request, the selected network Identity information UE-Identity and the like to the core network through initializing the Message Initial UE Message of the terminal. In other embodiments, the message content carried by the rrc configuration request may not include the security completion and encryption algorithm.
Step 2200, receiving an initialization context setting request sent by a core network according to the message of the initialization terminal; sending wireless resource control configuration information to the terminal according to the initialization context setting request;
in some embodiments, after receiving the initial Context Setup Request, the network side allocates air interface resources and issues radio resource control configuration information RrcConfiguration to the terminal, where the radio resource control configuration information RrcConfiguration includes configuration information such as control plane signaling data SRB, user plane data DRB, medium access control layer MAC, physical configuration dedicated data physical configured modified configured and security algorithm configuration secure algorithm configured. As an optional implementation manner, before sending the rrc configuration message, the base station selects an algorithm for performing security completion and encryption on the rrc configuration message, then performs security completion on the message using the selected security completion algorithm, then encrypts the message using the selected encryption algorithm, and preferentially uses the security completion and encryption algorithm carried in the rrc configuration request message in step 2100. After the terminal receives the rrc configuration, the terminal decrypts the message and performs security check to determine that the received message is valid rrc configuration, and after the UE determines that the valid rrc configuration is received, the UE establishes a connection for carrying control plane signaling data SRB and a connection DRB for carrying user plane data according to the information provided by the rrc configuration, and activates an access stratum security authentication AS security.
Step 2300, receiving the radio resource control configuration completion information sent by the terminal, and sending an initialization context setup response to the core network according to the radio resource control configuration completion information, so as to complete the previous connection between the air interface and the core network.
In some embodiments, the terminal sends Rrc Configuration Complete information Rrc Configuration Complete to the network, where the Rrc Configuration Complete information Rrc Configuration Complete may perform security completion and/or encryption using a security completion encryption algorithm carried by the Rrc Configuration Request. After receiving the radio resource control configuration completion information Rrc configuration Complete, the network side sends a Context Setup Response to the core network, thereby completing establishment of connection between the air interface and the core network, and then performing data transmission by using the establishment service.
In the technical solution provided in this embodiment, both the radio resource control and the connection management of the terminal are in an idle state, and when data transmission is required, the establishment of an air interface data path and data transmission may be completed only through 3 air interface messages, namely, the radio resource control configuration request, the radio resource control configuration information, and the radio resource control configuration completion information. Meanwhile, the technical scheme provided by the embodiment does not change the original message interaction flow between the network side and the core network, and the initialization setting of the context information is realized through the interaction between the network side and the core network, so that the context information of the terminal does not need to be stored. Therefore, the technical scheme in the embodiment not only reduces the energy consumption of the terminal, but also does not bring extra memory requirements to the network side and the core network.
As an alternative implementation manner, as shown in fig. 5, step 2200 includes, before sending radio resource control configuration information to the terminal according to the initialization context setup request:
step 2210, selecting a security completion and encryption algorithm for the radio resource control configuration information;
in some embodiments, the base station selects an algorithm for performing security and encryption on the rrc configuration message before sending the rrc configuration message, and in the selection process, the selection may be performed based on an algorithm in a set of security and encryption algorithms supported by the terminal. As an alternative embodiment, a security completion and encryption algorithm carried by the Rrc Configuration Request message in step 2100 may be used.
Step 2220, complete protection and encryption are performed on the rrc configuration information by using the selected algorithm.
In some embodiments, after the security and encryption algorithms are selected, the selected security algorithm is used to perform security completion on the message, and then the selected encryption algorithm is used to encrypt the message, which is beneficial to the secure transmission of the message.
An embodiment of the present invention provides a service establishing apparatus, where the apparatus is located at a terminal, and as shown in fig. 7, the apparatus includes:
the request module is used for responding to the data transmission requirement and sending a wireless resource control configuration request to the network side; so that the network side acquires the context setting request from the core network and allocates air interface resources for the terminal;
in some embodiments, the terminal is a terminal already registered to the network, and the radio resource control and connection management of the terminal are both in an IDLE state in order to save resources when there is no data transmission, for example, the terminal enters a state of RRC _ IDLE, CM _ IDLE. At this time, the terminal and the network side do not need to store the terminal context data related to the service. The network side can carry some encryption or security completion algorithms used by the recommended terminal in the radio resource control release message for the terminal to subsequently access the network side for use. When the terminal has uplink data to be transmitted or sends a paging message to the terminal because the network side has downlink data to be transmitted, a non-access stratum of the terminal triggers a service request, and radio resource control of the terminal sends a radio resource control configuration request RrcConfigurationRequest on an air interface. After receiving the radio resource control configuration Request RrcConfigurationRequest, the network side sends a Message Initial UE Message of an initialization terminal to the core network, and after receiving the Message Initial UE Message of the initialization terminal, the core network sends an initialization Context Setup Request Initial Context Setup Request to the network side.
As an optional implementation manner, the sending the radio resource control configuration request to the network side includes: and carrying more than one complete security and encryption algorithm, the content of the service request, the terminal identity information and the selected network identity information in the radio resource control configuration request so that the network side stores the complete security and encryption algorithm and the terminal identity information and sends the service request content and the selected network identity information to a core network. In some embodiments, the rrc configuration request carries one or more of the security and encryption algorithms desired by the terminal, the service request content, the terminal Identity information ue-Identity, and the selected network Identity information selected plmn-Identity. After receiving the Message, the network side stores the information such as the complete security and encryption algorithm expected by the terminal, the terminal Identity information UE-Identity and the like, and simultaneously sends the service request content service request, the selected network Identity information UE-Identity and the like to the core network through initializing the Message Initial UE Message of the terminal. In other embodiments, the message content carried by the rrc configuration request may not include the security completion and encryption algorithm.
The receiving module is used for receiving the radio resource control configuration information sent by the network side, establishing a bearer control plane signaling data connection or a bearer user plane data connection according to the radio resource control configuration information, and activating the access layer security verification;
in some embodiments, after receiving the initial Context Setup Request, the network side allocates air interface resources and issues radio resource control configuration information RrcConfiguration to the terminal, where the radio resource control configuration information RrcConfiguration includes configuration information such as control plane signaling data SRB, user plane data DRB, medium access control layer MAC, physical configuration dedicated data physical configured modified configured and security algorithm configuration secure algorithm configured. As an optional implementation manner, before sending the rrc configuration message, the base station selects an algorithm for performing security completion and encryption on the rrc configuration message, then performs security completion on the message using the selected security completion algorithm, then encrypts the message using the selected encryption algorithm, and preferentially uses the security completion and encryption algorithm carried in the rrc configuration request message in step 1100.
As an optional implementation manner, the receiving module includes a checking sub-module, configured to perform decryption and integrity check on the rrc configuration information. In some embodiments, after the terminal receives the rrc configuration information, the terminal decrypts the message and performs security check on the message to determine that the received message is valid rrc configuration information, and after the UE determines that the valid rrc configuration information is received, the UE establishes a connection for carrying control plane signaling data SRB and a connection DRB for carrying user plane data according to information provided by the rrc configuration information, and activates an access stratum security AS security.
And the completion module is used for sending the radio resource control configuration completion information to the network side so that the network side sends a context setting response to the core network and establishes connection between the air interface and the core network.
In some embodiments, the terminal sends Rrc Configuration Complete information Rrc Configuration Complete to the network, where the Rrc Configuration Complete information Rrc Configuration Complete may perform security completion and/or encryption using a security completion encryption algorithm carried by the Rrc Configuration Request. After receiving the radio resource control configuration completion information Rrc configuration Complete, the network side sends a Context Setup Response to the core network, thereby completing establishment of connection between the air interface and the core network, and then performing data transmission by using the establishment service.
In the technical solution provided in this embodiment, both the radio resource control and the connection management of the terminal are in an idle state, and when data transmission is required, the establishment of an air interface data path and data transmission may be completed only through 3 air interface messages, namely, the radio resource control configuration request, the radio resource control configuration information, and the radio resource control configuration completion information. Meanwhile, the technical scheme provided by the embodiment does not change the original message interaction flow between the network side and the core network, and the initialization setting of the context information is realized through the interaction between the network side and the core network, so that the context information of the terminal does not need to be stored. Therefore, the technical scheme in the embodiment not only reduces the energy consumption of the terminal, but also does not bring extra memory requirements to the network side and the core network.
As an alternative embodiment, as shown in fig. 8, the checking sub-module includes:
the terminal comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a complete protection and encryption algorithm set supported by the terminal;
in some embodiments, the set of integrity protection and encryption algorithms refers to the set of all integrity protection and encryption algorithms that the terminal is capable of supporting.
The decryption unit is used for sequentially adopting the algorithm in the algorithm set to decrypt and completely protect the wireless resource control configuration information;
in some embodiments, the terminal performs decryption and re-security check on the received rrc configuration message in sequence by using each security completion and encryption algorithm in the algorithm set, and when the security completion check is successful, it may be determined that the decryption and security completion algorithm currently used by the terminal is an algorithm for performing security completion and encryption on the rrc configuration message at the network side. And the terminal obtains the contents of the rrc configuration message through the decryption operation. In order to improve efficiency, the terminal preferentially uses the security completion and encryption algorithm expected by the terminal carried by the Rrc Configuration Request in step 1100.
And the checking unit is used for checking the validity of the radio resource control configuration information when the algorithms in the algorithm set fail to decrypt and completely protect the radio resource control configuration information.
In some embodiments, after all the security and encryption algorithms in the algorithm set are tried, a security and encryption algorithm with successful security check is not found yet, and one possibility is that the network side does not encrypt and complete security for Rrc Configuration, at this time, the content of the Rrc Configuration message is directly checked, and if the content is legal, the Rrc Configuration message is a legal message, and the terminal may continue to process the message; another possibility is that the network side encrypts and finishes the radio resource control Configuration information Rrc Configuration using an encryption or a finishing algorithm that is not supported by the terminal, and at this time, the terminal can only discard the received radio resource control Configuration information Rrc Configuration.
As an alternative embodiment, as shown in fig. 9, the receiving module includes:
a compatibility judging submodule, configured to, when the radio resource control configuration information is in error;
in some embodiments, when some parameters indicated by the Rrc Configuration information are not compatible or have errors (for example, there is an error in the physical layer parameter Configuration check), the UE may be unable to process the parameters.
The state judgment submodule is used for acquiring the current cell state;
in some embodiments, in order to process the error, the processing needs to be performed according to the current cell update state, so the current cell state is obtained first;
the first request submodule is used for initiating a radio resource control setting request process when the cell is not updated;
in some embodiments, when the cell is not updated, that is, the access is still initiated in the original cell, since the Rrc Configuration has already occurred, it is indicated to some extent that the success rate of continuing to use the Rrc Configuration on the current cell may be relatively low, and in order to increase the success rate, the new access procedure uses an Rrc setup request rrcstupreq/RrcSetup procedure. In other embodiments, since the reason for the failure may not be caused by the Rrc Configuration procedure, the reason for the failure may have been eliminated when the connection is performed next time, in which case, the use of the Rrc Configuration procedure can save air interface signaling. Therefore, it is possible to attempt to establish a connection using the rcconfiguration flow a plurality of times, and when failing a plurality of times, it is possible to initiate a request for establishing a connection using the Rrc Configuration/rcsetup flow.
And the second request submodule is used for initiating a radio resource control setting request process or re-initiating a radio resource control configuration request when the cell is updated.
In some embodiments, when the new cell supports Rrc Configuration information Rrc Configuration, an Rrc Configuration request RrcConfiguration req/RrcConfiguration procedure may be selected, and an Rrc setup request rrcstupreq/RrcSetup procedure may be selected. In some embodiments, the terminal may acquire whether the new cell supports radio resource control Configuration information Rrc Configuration through broadcast information on the network side.
An embodiment of the present invention provides a service establishing apparatus, which is applied to a network side device, and as shown in fig. 10, the apparatus includes:
the initialization module is used for receiving a radio resource control configuration request sent by a terminal and sending a message for initializing the terminal to a core network according to the radio resource control configuration request; wherein radio resource control and connection management of the terminal are in an idle state;
in some embodiments, the terminal is a terminal already registered to the network, and the radio resource control and connection management of the terminal are both in an IDLE state in order to save resources when there is no data transmission, for example, the terminal enters a state of RRC _ IDLE, CM _ IDLE. At this time, the terminal and the network side do not need to store the terminal context data related to the service. The network side can carry some encryption or security completion algorithms used by the recommended terminal in the radio resource control release message for the terminal to subsequently access the network side for use. When the terminal has uplink data to be transmitted or sends a paging message to the terminal because the network side has downlink data to be transmitted, a non-access stratum of the terminal triggers a service request, and radio resource control of the terminal sends a radio resource control configuration request RrcConfigurationRequest on an air interface. After receiving the radio resource control configuration Request RrcConfigurationRequest, the network side sends a Message Initial UE Message of an initialization terminal to the core network, and after receiving the Message Initial UE Message of the initialization terminal, the core network sends an initialization Context Setup Request Initial Context Setup Request to the network side.
As an optional implementation manner, the sending the radio resource control configuration request to the network side includes: and carrying more than one complete security and encryption algorithm, the content of the service request, the terminal identity information and the selected network identity information in the radio resource control configuration request so that the network side stores the complete security and encryption algorithm and the terminal identity information and sends the service request content and the selected network identity information to a core network. In some embodiments, the rrc configuration request carries one or more of the security and encryption algorithms desired by the terminal, the service request content, the terminal Identity information ue-Identity, and the selected network Identity information selected plmn-Identity. After receiving the Message, the network side stores the information such as the complete security and encryption algorithm expected by the terminal, the terminal Identity information UE-Identity and the like, and simultaneously sends the service request content service request, the selected network Identity information UE-Identity and the like to the core network through initializing the Message Initial UE Message of the terminal.
A configuration module, configured to receive an initialization context setting request sent by a core network according to the message of the initialization terminal; sending wireless resource control configuration information to the terminal according to the initialization context setting request;
in some embodiments, after receiving the initial Context Setup Request, the network side allocates air interface resources and issues radio resource control configuration information RrcConfiguration to the terminal, where the radio resource control configuration information RrcConfiguration includes configuration information such as control plane signaling data SRB, user plane data DRB, medium access control layer MAC, physical configuration dedicated data physical configured modified configured and security algorithm configuration secure algorithm configured. As an optional implementation manner, before sending the rrc configuration message, the base station selects an algorithm for performing security completion and encryption on the rrc configuration message, then performs security completion on the message using the selected security completion algorithm, then encrypts the message using the selected encryption algorithm, and preferentially uses the security completion and encryption algorithm carried in the rrc configuration request message in step 2100. After the terminal receives the rrc configuration, the terminal decrypts the message and performs security check to determine that the received message is valid rrc configuration, and after the UE determines that the valid rrc configuration is received, the UE establishes a connection for carrying control plane signaling data SRB and a connection DRB for carrying user plane data according to the information provided by the rrc configuration, and activates an access stratum security authentication AS security.
And the response module is used for receiving the radio resource control configuration completion information sent by the terminal and sending an initialization context setting response to the core network according to the radio resource control configuration completion information so as to complete the previous connection between the air interface and the core network.
In some embodiments, the terminal sends Rrc Configuration Complete information Rrc Configuration Complete to the network, where the Rrc Configuration Complete information Rrc Configuration Complete may perform security completion and/or encryption using a security completion encryption algorithm carried by the Rrc Configuration Request. After receiving the radio resource control configuration completion information Rrc configuration Complete, the network side sends a Context Setup Response to the core network, thereby completing establishment of connection between the air interface and the core network, and then performing data transmission by using the establishment service.
In the technical solution provided in this embodiment, both the radio resource control and the connection management of the terminal are in an idle state, and when data transmission is required, the establishment of an air interface data path and data transmission may be completed only through 3 air interface messages, namely, the radio resource control configuration request, the radio resource control configuration information, and the radio resource control configuration completion information. Meanwhile, the technical scheme provided by the embodiment does not change the original message interaction flow between the network side and the core network, and the initialization setting of the context information is realized through the interaction between the network side and the core network, so that the context information of the terminal does not need to be stored. Therefore, the technical scheme in the embodiment not only reduces the energy consumption of the terminal, but also does not bring extra memory requirements to the network side and the core network.
As an alternative embodiment, as shown in fig. 11, the configuration module includes:
the selection submodule is used for selecting a complete protection and an encryption algorithm aiming at the radio resource control configuration information;
in some embodiments, the base station selects an algorithm for performing security and encryption on the rrc configuration message before sending the rrc configuration message, and in the selection process, the selection may be performed based on an algorithm in a set of security and encryption algorithms supported by the terminal. As an alternative embodiment, a security completion and encryption algorithm carried by the Rrc Configuration Request message in step 2100 may be used.
And the encryption submodule is used for carrying out complete protection and encryption on the radio resource control configuration information by adopting a selected algorithm.
In some embodiments, after the security and encryption algorithms are selected, the selected security algorithm is used to perform security completion on the message, and then the selected encryption algorithm is used to encrypt the message, which is beneficial to the secure transmission of the message.
In the above embodiments, the encryption and decryption mechanisms may be as follows:
the network side and the terminal use a set of rules which are obeyed together, through the rules, the network side and the terminal uniquely determine a set of { KEY, value COUNT, BEARER, DIRECTION, LENGTH } parameters, and the terminal can correctly decrypt the radio resource control configuration information rcc reconfiguration by trying the supported encryption algorithm EEA. In order to simplify the calculation process, the network side and the terminal can be specified to use the appointed { value COUNT, bearing BEARER, pointing to DIRECTION, LENGTH } value; the KEY used for encryption may be determined by using a secret KEY and an encryption algorithm both stored by the agreed terminal and the network side, for example, by using a secret KEY both stored by the agreed terminal and the network and an encryption algorithm carried in the radio resource control configuration request.
In the above embodiments, the mechanism of complete guarantee may adopt the following manner:
the network side and the terminal use a set of rules which are obeyed together, through the rules, the network side and the terminal uniquely determine a set of { KEY, value COUNT, BEARER, and DIRECTION } parameters, and the terminal can correctly perform security check on the radio resource control configuration information Rrc reconfiguration through trying a supported security algorithm EIA. In order to simplify the calculation process, the network side and the terminal can be specified to use the appointed { value COUNT, carrying BEARER, pointing to DIRECTION } value; the KEY used for the security completion may be determined by using a secret KEY and a security completion algorithm both stored in the terminal and the network, for example, by using a secret KEY and a security completion algorithm carried in the radio resource control configuration request both stored in the terminal and the network.
The service establishment method may be performed by: a chip or chip module; the service establishing device may be, for example: a chip or a chip module.
Each module/unit included in each apparatus and product described in the above embodiments may be a software module/unit, or may also be a hardware module/unit, or may also be a part of a software module/unit and a part of a hardware module/unit. For example, for each device or product applied to or integrated into a chip, each module/unit included in the device or product may be implemented by hardware such as a circuit, or at least a part of the module/unit may be implemented by a software program running on a processor integrated within the chip, and the rest (if any) part of the module/unit may be implemented by hardware such as a circuit; for each device or product applied to or integrated with the chip module, each module/unit included in the device or product may be implemented by using hardware such as a circuit, and different modules/units may be located in the same component (e.g., a chip, a circuit module, etc.) or different components of the chip module, or at least some of the modules/units may be implemented by using a software program running on a processor integrated within the chip module, and the rest (if any) of the modules/units may be implemented by using hardware such as a circuit; for each device and product applied to or integrated in the terminal, each module/unit included in the device and product may be implemented by using hardware such as a circuit, and different modules/units may be located in the same component (e.g., a chip, a circuit module, etc.) or different components in the terminal, or at least part of the modules/units may be implemented by using a software program running on a processor integrated in the terminal, and the rest (if any) part of the modules/units may be implemented by using hardware such as a circuit.
An embodiment of the present invention further provides a terminal, where the terminal includes:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the method applied to the terminal.
The embodiment of the present invention further provides a chip, where the chip is located at a terminal, and the chip includes:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the method applied to the terminal.
The embodiment of the invention also provides a chip module which is characterized by comprising the chip positioned at the terminal.
An embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores computer instructions, and the computer instructions, when executed by a processor, implement the method applied to the terminal.
An embodiment of the present invention further provides a network side device, where the network side device includes:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the method applied to the network side device.
The embodiment of the present invention further provides a chip, where the chip is located on a network side device, and the chip includes:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the method applied to the network side device.
The embodiment of the invention also provides a chip module, which is characterized in that the chip module comprises the chip positioned on the network side equipment.
An embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores computer instructions, and the computer instructions, when executed by a processor, implement the method applied to the network-side device.
It will be understood by those skilled in the art that all or part of the processes of the embodiments of the methods described above may be implemented by a computer program, which may be stored in a computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (23)

1. A service establishment method applied to a terminal with idle radio resource control and connection management, the method comprising:
responding to the data transmission requirement, and sending a wireless resource control configuration request to a network side; so that the network side acquires the context setting request from the core network and allocates air interface resources for the terminal;
receiving radio resource control configuration information sent by a network side, establishing a bearer control plane signaling data connection or a bearer user plane data connection according to the radio resource control configuration information, and activating access stratum security verification;
and sending radio resource control configuration completion information to a network side so that the network side sends a context setting response to the core network and establishes connection between the air interface and the core network.
2. The method of claim 1, wherein sending a radio resource control configuration request to a network side comprises: and carrying more than one complete security and encryption algorithm, the content of the service request, the terminal identity information and the selected network identity information in the radio resource control configuration request so that the network side stores the complete security and encryption algorithm and the terminal identity information and sends the service request content and the selected network identity information to a core network.
3. The method of claim 2, wherein receiving the radio resource control configuration information sent by the network side comprises: and decrypting the radio resource control configuration information and carrying out security check.
4. The method of claim 3, wherein decrypting the RRC configuration information and performing a integrity check comprises:
acquiring a complete protection and encryption algorithm set supported by a terminal;
sequentially adopting the algorithm in the algorithm set to decrypt and completely protect the wireless resource control configuration information;
and when the algorithm in the algorithm set fails to decrypt and completely protect the radio resource control configuration information, checking the validity of the radio resource control configuration information.
5. The method of claim 2, wherein before sending the rrc configuration complete information to the network side, the method comprises: and performing complete protection and/or encryption on the radio resource control configuration completion information.
6. The method of claim 1, wherein receiving the radio resource control configuration information sent by the network side comprises:
when the radio resource control configuration information has an error;
acquiring a current cell state;
when the cell is not updated, initiating a radio resource control setting request process;
when the cell is updated, a radio resource control setting request process is initiated or a radio resource control configuration request is reinitiated.
7. A service establishing method is applied to network side equipment, and is characterized in that the method comprises the following steps:
receiving a radio resource control configuration request sent by a terminal, and sending a message for initializing the terminal to a core network according to the radio resource control configuration request; wherein radio resource control and connection management of the terminal are in an idle state;
receiving an initialization context setting request sent by a core network according to the message of the initialization terminal; sending wireless resource control configuration information to the terminal according to the initialization context setting request;
and receiving radio resource control configuration completion information sent by the terminal, and sending an initialization context setting response to the core network according to the radio resource control configuration completion information so as to complete the previous connection between the air interface and the core network.
8. The method of claim 1, wherein sending radio resource control configuration information to the terminal according to the initialization context setup request comprises:
selecting a complete protection and encryption algorithm aiming at the radio resource control configuration information;
and adopting the selected algorithm to completely protect and encrypt the radio resource control configuration information.
9. A service establishment apparatus, the apparatus being located at a terminal, the apparatus comprising:
the request module is used for responding to the data transmission requirement and sending a wireless resource control configuration request to the network side; so that the network side acquires the context setting request from the core network and allocates air interface resources for the terminal;
the receiving module is used for receiving the radio resource control configuration information sent by the network side, establishing a bearer control plane signaling data connection or a bearer user plane data connection according to the radio resource control configuration information, and activating the access layer security verification;
and the completion module is used for sending the radio resource control configuration completion information to the network side so that the network side sends a context setting response to the core network and establishes connection between the air interface and the core network.
10. The apparatus according to claim 9, wherein the request module is configured to carry one or more than one security and encryption algorithm, content of the service request, terminal identity information, and selected network identity information in the rrc configuration request, so that the network side stores the security and encryption algorithm and the terminal identity information, and sends the content of the service request and the selected network identity information to a core network.
11. The apparatus of claim 10, wherein the receiving module comprises:
and the checking submodule is used for decrypting the radio resource control configuration information and carrying out security check.
12. The apparatus of claim 11, wherein the checking submodule comprises:
the terminal comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a complete protection and encryption algorithm set supported by the terminal;
the decryption unit is used for sequentially adopting the algorithm in the algorithm set to decrypt and completely protect the wireless resource control configuration information;
and the checking unit is used for checking the validity of the radio resource control configuration information when the algorithms in the algorithm set fail to decrypt and completely protect the radio resource control configuration information.
13. The method of claim 10, wherein completing a module comprises:
and the encryption submodule is used for carrying out complete protection and encryption on the radio resource control configuration completion information.
14. The method of claim 9, wherein the receiving module comprises:
a compatibility judging submodule, configured to, when the radio resource control configuration information is in error;
the state judgment submodule is used for acquiring the current cell state;
the first request submodule is used for initiating a radio resource control setting request process when the cell is not updated;
and the second request submodule is used for initiating a radio resource control setting request process or re-initiating a radio resource control configuration request when the cell is updated.
15. A service establishing device is applied to a network side device, and is characterized in that the device comprises:
the initialization module is used for receiving a radio resource control configuration request sent by a terminal and sending a message for initializing the terminal to a core network according to the radio resource control configuration request; wherein radio resource control and connection management of the terminal are in an idle state;
a configuration module, configured to receive an initialization context setting request sent by a core network according to the message of the initialization terminal; sending wireless resource control configuration information to the terminal according to the initialization context setting request;
and the response module is used for receiving the radio resource control configuration completion information sent by the terminal and sending an initialization context setting response to the core network according to the radio resource control configuration completion information so as to complete the previous connection between the air interface and the core network.
16. The method of claim 15, wherein configuring the module comprises:
the selection submodule is used for selecting a complete protection and an encryption algorithm aiming at the radio resource control configuration information;
and the encryption submodule is used for carrying out complete protection and encryption on the radio resource control configuration information by adopting a selected algorithm.
17. A terminal, characterized in that the terminal comprises:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1 to 6.
18. A chip, the chip being located at a terminal, the chip comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1 to 6.
19. A computer readable storage medium, wherein the computer readable storage medium stores computer instructions which, when executed by a processor, implement the method of any one of claims 1 to 6.
20. A network side device, wherein the network side device comprises:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 7 to 8.
21. A chip, the chip being located in a network side device, the chip comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 7 to 8.
22. A chip module, characterized in that it comprises a chip according to claim 18 or 21.
23. A computer readable storage medium, wherein the computer readable storage medium stores computer instructions which, when executed by a processor, implement the method of any one of claims 7 to 8.
CN202110742122.8A 2021-06-30 2021-06-30 Service establishing method, device, terminal and network side equipment Active CN113438646B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110742122.8A CN113438646B (en) 2021-06-30 2021-06-30 Service establishing method, device, terminal and network side equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110742122.8A CN113438646B (en) 2021-06-30 2021-06-30 Service establishing method, device, terminal and network side equipment

Publications (2)

Publication Number Publication Date
CN113438646A true CN113438646A (en) 2021-09-24
CN113438646B CN113438646B (en) 2022-08-23

Family

ID=77758445

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110742122.8A Active CN113438646B (en) 2021-06-30 2021-06-30 Service establishing method, device, terminal and network side equipment

Country Status (1)

Country Link
CN (1) CN113438646B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108476536A (en) * 2016-03-29 2018-08-31 Oppo广东移动通信有限公司 The method and apparatus of wireless communication
CN109429213A (en) * 2017-06-23 2019-03-05 电信科学技术研究院 A kind of information processing method, device, equipment and computer readable storage medium
CN109548109A (en) * 2017-08-14 2019-03-29 电信科学技术研究院 A kind of UE and the unmatched processing method and processing device of network state
CN109699050A (en) * 2017-10-24 2019-04-30 普天信息技术有限公司 A kind of inactive state terminal restores method, base station, equipment and the system of connection
US20200029206A1 (en) * 2017-01-05 2020-01-23 Nokia Technologies Oy Inactive state security support in wireless communications system
US20200120592A1 (en) * 2017-06-16 2020-04-16 Huawei Technologies Co., Ltd. Communication Method and Apparatus
US20200128608A1 (en) * 2016-12-29 2020-04-23 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Context release method, device and system
CN111491338A (en) * 2019-01-28 2020-08-04 华为技术有限公司 Context storage method and device
US20210168894A1 (en) * 2018-08-09 2021-06-03 Zte Corporation State transitions for idle mode transmissions using pre-configured dedicated resources

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108476536A (en) * 2016-03-29 2018-08-31 Oppo广东移动通信有限公司 The method and apparatus of wireless communication
US20200128608A1 (en) * 2016-12-29 2020-04-23 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Context release method, device and system
US20200029206A1 (en) * 2017-01-05 2020-01-23 Nokia Technologies Oy Inactive state security support in wireless communications system
US20200120592A1 (en) * 2017-06-16 2020-04-16 Huawei Technologies Co., Ltd. Communication Method and Apparatus
CN109429213A (en) * 2017-06-23 2019-03-05 电信科学技术研究院 A kind of information processing method, device, equipment and computer readable storage medium
CN109548109A (en) * 2017-08-14 2019-03-29 电信科学技术研究院 A kind of UE and the unmatched processing method and processing device of network state
CN109699050A (en) * 2017-10-24 2019-04-30 普天信息技术有限公司 A kind of inactive state terminal restores method, base station, equipment and the system of connection
US20210168894A1 (en) * 2018-08-09 2021-06-03 Zte Corporation State transitions for idle mode transmissions using pre-configured dedicated resources
CN111491338A (en) * 2019-01-28 2020-08-04 华为技术有限公司 Context storage method and device

Also Published As

Publication number Publication date
CN113438646B (en) 2022-08-23

Similar Documents

Publication Publication Date Title
CN111669276B (en) Network verification method, device and system
CN108271125B (en) Data transmitting method, data receiving method and device
ES2898304T3 (en) Method, apparatus and system to support multiple IMSI
CN107006049A (en) A kind of smart machine and its set up the method for equipment room bluetooth connection, device
US11778458B2 (en) Network access authentication method and device
CN102026180A (en) M2M transmission control method, device and system
CN108605225B (en) Safety processing method and related equipment
CN112105021B (en) Authentication method, device and system
EP3675541B1 (en) Authentication method and device
CN110944319B (en) 5G communication identity verification method, equipment and storage medium
WO2017167102A1 (en) Methods for generating and verifying message integrity authentication information, device, and verification system
CN104661171B (en) Small data secure transmission method and system for MTC (machine type communication) equipment group
CN111050324B (en) 5G terminal equipment access method, equipment and storage medium
CN105323231A (en) Security algorithm selection method, security algorithm selection device and security algorithm selection system
Pratas et al. Massive machine-type communication (mMTC) access with integrated authentication
CN110351894A (en) A kind of method and apparatus authenticating UE
CN109803456B (en) Method and device for requesting to recover connection
CN113498057A (en) Communication system, method and device
CN110087338B (en) Method and equipment for authenticating narrowband Internet of things
CN113438646B (en) Service establishing method, device, terminal and network side equipment
CN110545253B (en) Information processing method, device, equipment and computer readable storage medium
WO2022068669A1 (en) Session establishment method and apparatus, access network device and storage medium
CN113691973A (en) Number portability method based on block chain network and operator system
US11272357B2 (en) Method and device for determining SIM card information
CN113302959A (en) Data transmission method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant