CN113438646A - Service establishing method, device, terminal and network side equipment - Google Patents
Service establishing method, device, terminal and network side equipment Download PDFInfo
- Publication number
- CN113438646A CN113438646A CN202110742122.8A CN202110742122A CN113438646A CN 113438646 A CN113438646 A CN 113438646A CN 202110742122 A CN202110742122 A CN 202110742122A CN 113438646 A CN113438646 A CN 113438646A
- Authority
- CN
- China
- Prior art keywords
- resource control
- radio resource
- terminal
- control configuration
- network side
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0205—Traffic management, e.g. flow control or congestion control at the air interface
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0033—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0055—Transmission or use of information for re-establishing the radio link
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention provides a service establishing method, which is applied to a terminal with idle wireless resource control and connection management, and comprises the following steps: responding to the data transmission requirement, and sending a wireless resource control configuration request to a network side; so that the network side acquires the context setting request from the core network and allocates air interface resources for the terminal; receiving radio resource control configuration information sent by a network side, establishing a bearer control plane signaling data connection or a bearer user plane data connection according to the radio resource control configuration information, and activating access stratum security verification; and sending radio resource control configuration completion information to a network side so that the network side sends a context setting response to the core network and establishes connection between the air interface and the core network. The invention can adopt less air interface signaling to establish a data path, and does not need to save the context information of the terminal and occupy more memory.
Description
Technical Field
The present invention relates to the field of wireless communication technologies, and in particular, to a method, an apparatus, a terminal, and a network device for establishing a service.
Background
In current 4G and 5G communication systems, there are large-scale machine type communication, for example, application scenarios of 5G mtc, which requires that the terminal power consumption is low, for example, in case of using a common battery to supply power, it needs to be able to use for more than 10 years. In the prior art, the power consumption of the terminal is reduced by switching the terminal to the suspended state when no information is transmitted, but in this way, when the terminal is in the suspended state, the core network needs to be kept in the connected state, and the terminal, the network side and the core network all need to store the context information of the terminal, and when the network side is connected with a plurality of terminals, a large amount of memory of the network side needs to be occupied.
Disclosure of Invention
The service establishing method, the device, the terminal and the network side equipment provided by the invention can adopt fewer air interface signaling to establish a data path, and do not need to store the context information of the terminal and occupy more memory.
In a first aspect, the present invention provides a service establishment method, where the method is applied to a terminal in an idle state for radio resource control and connection management, and the method includes:
responding to the data transmission requirement, and sending a wireless resource control configuration request to a network side; so that the network side acquires the context setting request from the core network and allocates air interface resources for the terminal;
receiving radio resource control configuration information sent by a network side, establishing a bearer control plane signaling data connection or a bearer user plane data connection according to the radio resource control configuration information, and activating access stratum security verification;
and sending radio resource control configuration completion information to a network side so that the network side sends a context setting response to the core network and establishes connection between the air interface and the core network.
Optionally, the sending the radio resource control configuration request to the network side includes: and carrying more than one complete security and encryption algorithm, the content of the service request, the terminal identity information and the selected network identity information in the radio resource control configuration request so that the network side stores the complete security and encryption algorithm and the terminal identity information and sends the service request content and the selected network identity information to a core network.
Optionally, receiving the radio resource control configuration information sent by the network side includes: and decrypting the radio resource control configuration information and carrying out security check.
Optionally, the decrypting the rrc configuration information and the security check include:
acquiring a complete protection and encryption algorithm set supported by a terminal;
sequentially adopting the algorithm in the algorithm set to decrypt and completely protect the wireless resource control configuration information;
and when the algorithm in the algorithm set fails to decrypt and completely protect the radio resource control configuration information, checking the validity of the radio resource control configuration information.
Optionally, before sending the radio resource control configuration completion information to the network side, the method includes: and performing complete protection and/or encryption on the radio resource control configuration completion information.
Optionally, receiving the radio resource control configuration information sent by the network side includes:
when the radio resource control configuration information has an error;
acquiring a current cell state;
when the cell is not updated, initiating a radio resource control setting request process;
when the cell is updated, a radio resource control setting request process is initiated or a radio resource control configuration request is reinitiated.
In a second aspect, the present invention provides a service establishment method, which is applied to a network side device, and the method includes:
receiving a radio resource control configuration request sent by a terminal, and sending a message for initializing the terminal to a core network according to the radio resource control configuration request; wherein radio resource control and connection management of the terminal are in an idle state;
receiving an initialization context setting request sent by a core network according to the message of the initialization terminal; sending wireless resource control configuration information to the terminal according to the initialization context setting request;
and receiving radio resource control configuration completion information sent by the terminal, and sending an initialization context setting response to the core network according to the radio resource control configuration completion information so as to complete the previous connection between the air interface and the core network.
Optionally, before sending the radio resource control configuration information to the terminal according to the initialization context setting request, the method includes:
selecting a complete protection and encryption algorithm aiming at the radio resource control configuration information;
and adopting the selected algorithm to completely protect and encrypt the radio resource control configuration information.
In a third aspect, the present invention provides a service establishing apparatus, where the apparatus is located at a terminal, and the apparatus includes:
the request module is used for responding to the data transmission requirement and sending a wireless resource control configuration request to the network side; so that the network side acquires the context setting request from the core network and allocates air interface resources for the terminal;
the receiving module is used for receiving the radio resource control configuration information sent by the network side, establishing a bearer control plane signaling data connection or a bearer user plane data connection according to the radio resource control configuration information, and activating the access layer security verification;
and the completion module is used for sending the radio resource control configuration completion information to the network side so that the network side sends a context setting response to the core network and establishes connection between the air interface and the core network.
Optionally, the request module is configured to carry more than one security and encryption algorithm, content of the service request, terminal identity information, and selected network identity information in the radio resource control configuration request, so that the network side stores the security and encryption algorithm and the terminal identity information, and sends the content of the service request and the selected network identity information to a core network.
Optionally, the receiving module includes:
and the checking submodule is used for decrypting the radio resource control configuration information and carrying out security check.
Optionally, the checking submodule includes:
the terminal comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a complete protection and encryption algorithm set supported by the terminal;
the decryption unit is used for sequentially adopting the algorithm in the algorithm set to decrypt and completely protect the wireless resource control configuration information;
and the checking unit is used for checking the validity of the radio resource control configuration information when the algorithms in the algorithm set fail to decrypt and completely protect the radio resource control configuration information.
Optionally, the completion module comprises:
and the encryption sub-module is used for carrying out complete protection and/or encryption on the radio resource control configuration completion information.
Optionally, the receiving module includes:
a compatibility judging submodule, configured to, when the radio resource control configuration information is in error;
the state judgment submodule is used for acquiring the current cell state;
the first request submodule is used for initiating a radio resource control setting request process when the cell is not updated;
and the second request submodule is used for initiating a radio resource control setting request process or re-initiating a radio resource control configuration request when the cell is updated.
In a fourth aspect, the present invention provides a service establishing apparatus, applied to a network side device,
the initialization module is used for receiving a radio resource control configuration request sent by a terminal and sending a message for initializing the terminal to a core network according to the radio resource control configuration request; wherein radio resource control and connection management of the terminal are in an idle state;
a configuration module, configured to receive an initialization context setting request sent by a core network according to the message of the initialization terminal; sending wireless resource control configuration information to the terminal according to the initialization context setting request;
and the response module is used for receiving the radio resource control configuration completion information sent by the terminal and sending an initialization context setting response to the core network according to the radio resource control configuration completion information so as to complete the previous connection between the air interface and the core network.
Optionally, the configuration module comprises:
the selection submodule is used for selecting a complete protection and an encryption algorithm aiming at the radio resource control configuration information;
and the encryption submodule is used for carrying out complete protection and encryption on the radio resource control configuration information by adopting a selected algorithm.
In a fifth aspect, the present invention provides a terminal, including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any of the methods described above as applied to a terminal.
In a sixth aspect, the present invention provides a chip, where the chip is located at a terminal, and the chip includes:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any of the methods described above as applied to a terminal.
In a seventh aspect, the present invention provides a computer-readable storage medium, wherein the computer-readable storage medium stores computer instructions, which when executed by a processor, implement any one of the above methods applied to a terminal.
In an eighth aspect, the present invention provides a network side device, where the network side device includes:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any of the methods described above as applied to a network-side device.
In a ninth aspect, the present invention provides a chip, where the chip is located in a network side device, and the chip includes:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any of the methods described above as applied to a network-side device.
In a tenth aspect, the present invention provides a chip module, which includes any one of the above chips.
In an eleventh aspect, the present invention provides a computer-readable storage medium, wherein the computer-readable storage medium stores computer instructions, and the computer instructions, when executed by a processor, implement any one of the above methods applied to a network-side device.
In the technical scheme provided by the invention, the radio resource control and the connection management of the terminal are both in an idle state, and when data transmission is required, the establishment of an air interface data path and the data transmission can be completed only through 3 air interface messages of the radio resource control configuration request, the radio resource control configuration information and the radio resource control configuration completion information. Meanwhile, the technical scheme provided by the invention does not change the original message interaction flow between the network side and the core network, and the initialization setting of the context information is realized through the interaction between the network side and the core network, so that the context information of the terminal does not need to be stored. Therefore, the technical scheme of the invention not only reduces the energy consumption of the terminal, but also does not bring extra memory requirements to the network side and the core network.
Drawings
Fig. 1 is a flowchart of a service establishment method according to an embodiment of the present invention;
fig. 2 is a flowchart of validity checking of a service establishment method according to another embodiment of the present invention;
FIG. 3 is a flowchart illustrating an error handling procedure of a service establishment method according to an embodiment of the present invention;
fig. 4 is a flowchart of a service establishment method according to another embodiment of the present invention;
FIG. 5 is a flowchart of a transaction setup method according to an embodiment of the present invention;
fig. 6 is an interaction flowchart of a terminal, a network side and a core network of a service establishment method according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a service establishment apparatus according to an embodiment of the present invention;
fig. 8 is a schematic diagram of an inspection sub-module of a service establishment apparatus according to an embodiment of the present invention;
fig. 9 is a schematic diagram of a receiving module of a service establishing apparatus according to an embodiment of the present invention;
fig. 10 is a schematic diagram of a service establishing apparatus according to an embodiment of the present invention;
fig. 11 is a schematic diagram of a configuration module of a service establishment apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An embodiment of the present invention provides a service establishment method, where the method is applied to a terminal in an idle state for radio resource control and connection management, as shown in fig. 1 and 6, and the method includes:
step 1100, responding to a data transmission demand, and sending a radio resource control configuration request to a network side; so that the network side acquires the context setting request from the core network and allocates air interface resources for the terminal;
in some embodiments, the terminal is a terminal already registered to the network, and the radio resource control and connection management of the terminal are both in an IDLE state in order to save resources when there is no data transmission, for example, the terminal enters a state of RRC _ IDLE, CM _ IDLE. At this time, the terminal and the network side do not need to store the terminal context data related to the service. The network side can carry some encryption or security completion algorithms used by the recommended terminal in the radio resource control release message for the terminal to subsequently access the network side for use. When the terminal has uplink data to be transmitted or sends a paging message to the terminal because the network side has downlink data to be transmitted, a non-access stratum of the terminal triggers a service request, and radio resource control of the terminal sends a radio resource control configuration request RrcConfigurationRequest on an air interface. After receiving the radio resource control configuration Request RrcConfigurationRequest, the network side sends a Message Initial UE Message of an initialization terminal to the core network, and after receiving the Message Initial UE Message of the initialization terminal, the core network sends an initialization Context Setup Request Initial Context Setup Request to the network side.
As an optional implementation manner, the sending the radio resource control configuration request to the network side includes: and carrying more than one complete security and encryption algorithm, the content of the service request, the terminal identity information and the selected network identity information in the radio resource control configuration request so that the network side stores the complete security and encryption algorithm and the terminal identity information and sends the service request content and the selected network identity information to a core network. In some embodiments, the rrc configuration request carries one or more of the security and encryption algorithms desired by the terminal, the service request content, the terminal Identity information ue-Identity, and the selected network Identity information selected plmn-Identity. After receiving the Message, the network side stores the information such as the complete security and encryption algorithm expected by the terminal, the terminal Identity information UE-Identity and the like, and simultaneously sends the service request content service request, the selected network Identity information UE-Identity and the like to the core network through initializing the Message Initial UE Message of the terminal. In other embodiments, the message content carried by the rrc configuration request may not include the security completion and encryption algorithm.
in some embodiments, after receiving the initial Context Setup Request, the network side allocates air interface resources and issues radio resource control configuration information RrcConfiguration to the terminal, where the radio resource control configuration information RrcConfiguration includes configuration information such as control plane signaling data SRB, user plane data DRB, medium access control layer MAC, physical configuration dedicated data physical configured modified configured and security algorithm configuration secure algorithm configured. As an optional implementation manner, before sending the rrc configuration message, the base station selects an algorithm for performing security completion and encryption on the rrc configuration message, then performs security completion on the message using the selected security completion algorithm, then encrypts the message using the selected encryption algorithm, and preferentially uses the security completion and encryption algorithm carried in the rrc configuration request message in step 1100. After the terminal receives the rrc configuration, the terminal decrypts the message and performs security check to determine that the received message is valid rrc configuration, and after the UE determines that the valid rrc configuration is received, the UE establishes a connection for carrying control plane signaling data SRB and a connection DRB for carrying user plane data according to the information provided by the rrc configuration, and activates an access stratum security authentication AS security.
In some embodiments, the terminal sends Rrc Configuration Complete information Rrc Configuration Complete to the network, where the Rrc Configuration Complete information Rrc Configuration Complete may perform security completion and/or encryption using a security completion encryption algorithm carried by the Rrc Configuration Request. After receiving the radio resource control configuration completion information Rrc configuration Complete, the network side sends a Context Setup Response to the core network, thereby completing establishment of connection between the air interface and the core network, and then performing data transmission by using the establishment service.
In the technical solution provided in this embodiment, both the radio resource control and the connection management of the terminal are in an idle state, and when data transmission is required, the establishment of an air interface data path and data transmission may be completed only through 3 air interface messages, namely, the radio resource control configuration request, the radio resource control configuration information, and the radio resource control configuration completion information. Meanwhile, the technical scheme provided by the embodiment does not change the original message interaction flow between the network side and the core network, and the initialization setting of the context information is realized through the interaction between the network side and the core network, so that the context information of the terminal does not need to be stored. Therefore, the technical scheme in the embodiment not only reduces the energy consumption of the terminal, but also does not bring extra memory requirements to the network side and the core network.
As an alternative implementation, as shown in fig. 2, in step 1200, the decrypting and integrity check of the rrc configuration information includes:
in some embodiments, the set of integrity protection and encryption algorithms refers to the set of all integrity protection and encryption algorithms that the terminal is capable of supporting.
in some embodiments, the terminal performs decryption and re-security check on the received rrc configuration message in sequence by using each security completion and encryption algorithm in the algorithm set, and when the security completion check is successful, it may be determined that the decryption and security completion algorithm currently used by the terminal is an algorithm for performing security completion and encryption on the rrc configuration message at the network side. And the terminal obtains the contents of the rrc configuration message through the decryption operation. In order to improve efficiency, the terminal preferentially uses the security completion and encryption algorithm expected by the terminal carried by the Rrc Configuration Request in step 1100.
In some embodiments, after all the security and encryption algorithms in the algorithm set are tried, a security and encryption algorithm with successful security check is not found yet, and one possibility is that the network side does not encrypt and complete security for Rrc Configuration, at this time, the content of the Rrc Configuration message is directly checked, and if the content is legal, the Rrc Configuration message is a legal message, and the terminal may continue to process the message; another possibility is that the network side encrypts and finishes the radio resource control Configuration information Rrc Configuration using an encryption or a finishing algorithm that is not supported by the terminal, and at this time, the terminal can only discard the received radio resource control Configuration information Rrc Configuration.
As an alternative implementation manner, as shown in fig. 3, in step 1200, after receiving the radio resource control configuration information sent by the network side, the method includes:
in some embodiments, when some parameters indicated by the Rrc Configuration information are not compatible or have errors (for example, there is an error in the physical layer parameter Configuration check), the UE may be unable to process the parameters.
In order to process the error, the processing is required to be carried out according to the current cell updating state, so the current cell state is acquired firstly;
step 1251, when the cell is not updated, initiate a radio resource control setup request procedure;
in some embodiments, when the cell is not updated, that is, the access is still initiated in the original cell, since the Rrc Configuration has already occurred, it is indicated to some extent that the success rate of continuing to use the Rrc Configuration on the current cell may be relatively low, and in order to increase the success rate, the new access procedure uses an Rrc setup request rrcstupreq/RrcSetup procedure. In other embodiments, since the reason for the failure may not be caused by the Rrc Configuration procedure, the reason for the failure may have been eliminated when the connection is performed next time, in which case, the use of the Rrc Configuration procedure can save air interface signaling. Therefore, it is possible to attempt to establish a connection using the rcconfiguration flow a plurality of times, and when failing a plurality of times, it is possible to initiate a request for establishing a connection using the Rrc Configuration/rcsetup flow.
Step 1252, when the cell is updated, initiate a radio resource control setup request procedure or reinitiate a radio resource control configuration request.
In some embodiments, when the new cell supports Rrc Configuration information Rrc Configuration, an Rrc Configuration request RrcConfiguration req/RrcConfiguration procedure may be selected, and an Rrc setup request rrcstupreq/RrcSetup procedure may be selected. In some embodiments, the terminal may acquire whether the new cell supports radio resource control Configuration information Rrc Configuration through broadcast information on the network side.
An embodiment of the present invention provides a service establishment method, which is applied to a network side device, and as shown in fig. 4 and fig. 6, the method includes:
in some embodiments, the terminal is a terminal already registered to the network, and the radio resource control and connection management of the terminal are both in an IDLE state in order to save resources when there is no data transmission, for example, the terminal enters a state of RRC _ IDLE, CM _ IDLE. At this time, the terminal and the network side do not need to store the terminal context data related to the service. The network side can carry some encryption or security completion algorithms used by the recommended terminal in the radio resource control release message for the terminal to subsequently access the network side for use. When the terminal has uplink data to be transmitted or sends a paging message to the terminal because the network side has downlink data to be transmitted, a non-access stratum of the terminal triggers a service request, and radio resource control of the terminal sends a radio resource control configuration request RrcConfigurationRequest on an air interface. After receiving the radio resource control configuration Request RrcConfigurationRequest, the network side sends a Message Initial UE Message of an initialization terminal to the core network, and after receiving the Message Initial UE Message of the initialization terminal, the core network sends an initialization Context Setup Request Initial Context Setup Request to the network side.
As an optional implementation manner, the sending the radio resource control configuration request to the network side includes: and carrying more than one complete security and encryption algorithm, the content of the service request, the terminal identity information and the selected network identity information in the radio resource control configuration request so that the network side stores the complete security and encryption algorithm and the terminal identity information and sends the service request content and the selected network identity information to a core network. In some embodiments, the rrc configuration request carries one or more of the security and encryption algorithms desired by the terminal, the service request content, the terminal Identity information ue-Identity, and the selected network Identity information selected plmn-Identity. After receiving the Message, the network side stores the information such as the complete security and encryption algorithm expected by the terminal, the terminal Identity information UE-Identity and the like, and simultaneously sends the service request content service request, the selected network Identity information UE-Identity and the like to the core network through initializing the Message Initial UE Message of the terminal. In other embodiments, the message content carried by the rrc configuration request may not include the security completion and encryption algorithm.
Step 2200, receiving an initialization context setting request sent by a core network according to the message of the initialization terminal; sending wireless resource control configuration information to the terminal according to the initialization context setting request;
in some embodiments, after receiving the initial Context Setup Request, the network side allocates air interface resources and issues radio resource control configuration information RrcConfiguration to the terminal, where the radio resource control configuration information RrcConfiguration includes configuration information such as control plane signaling data SRB, user plane data DRB, medium access control layer MAC, physical configuration dedicated data physical configured modified configured and security algorithm configuration secure algorithm configured. As an optional implementation manner, before sending the rrc configuration message, the base station selects an algorithm for performing security completion and encryption on the rrc configuration message, then performs security completion on the message using the selected security completion algorithm, then encrypts the message using the selected encryption algorithm, and preferentially uses the security completion and encryption algorithm carried in the rrc configuration request message in step 2100. After the terminal receives the rrc configuration, the terminal decrypts the message and performs security check to determine that the received message is valid rrc configuration, and after the UE determines that the valid rrc configuration is received, the UE establishes a connection for carrying control plane signaling data SRB and a connection DRB for carrying user plane data according to the information provided by the rrc configuration, and activates an access stratum security authentication AS security.
In some embodiments, the terminal sends Rrc Configuration Complete information Rrc Configuration Complete to the network, where the Rrc Configuration Complete information Rrc Configuration Complete may perform security completion and/or encryption using a security completion encryption algorithm carried by the Rrc Configuration Request. After receiving the radio resource control configuration completion information Rrc configuration Complete, the network side sends a Context Setup Response to the core network, thereby completing establishment of connection between the air interface and the core network, and then performing data transmission by using the establishment service.
In the technical solution provided in this embodiment, both the radio resource control and the connection management of the terminal are in an idle state, and when data transmission is required, the establishment of an air interface data path and data transmission may be completed only through 3 air interface messages, namely, the radio resource control configuration request, the radio resource control configuration information, and the radio resource control configuration completion information. Meanwhile, the technical scheme provided by the embodiment does not change the original message interaction flow between the network side and the core network, and the initialization setting of the context information is realized through the interaction between the network side and the core network, so that the context information of the terminal does not need to be stored. Therefore, the technical scheme in the embodiment not only reduces the energy consumption of the terminal, but also does not bring extra memory requirements to the network side and the core network.
As an alternative implementation manner, as shown in fig. 5, step 2200 includes, before sending radio resource control configuration information to the terminal according to the initialization context setup request:
step 2210, selecting a security completion and encryption algorithm for the radio resource control configuration information;
in some embodiments, the base station selects an algorithm for performing security and encryption on the rrc configuration message before sending the rrc configuration message, and in the selection process, the selection may be performed based on an algorithm in a set of security and encryption algorithms supported by the terminal. As an alternative embodiment, a security completion and encryption algorithm carried by the Rrc Configuration Request message in step 2100 may be used.
In some embodiments, after the security and encryption algorithms are selected, the selected security algorithm is used to perform security completion on the message, and then the selected encryption algorithm is used to encrypt the message, which is beneficial to the secure transmission of the message.
An embodiment of the present invention provides a service establishing apparatus, where the apparatus is located at a terminal, and as shown in fig. 7, the apparatus includes:
the request module is used for responding to the data transmission requirement and sending a wireless resource control configuration request to the network side; so that the network side acquires the context setting request from the core network and allocates air interface resources for the terminal;
in some embodiments, the terminal is a terminal already registered to the network, and the radio resource control and connection management of the terminal are both in an IDLE state in order to save resources when there is no data transmission, for example, the terminal enters a state of RRC _ IDLE, CM _ IDLE. At this time, the terminal and the network side do not need to store the terminal context data related to the service. The network side can carry some encryption or security completion algorithms used by the recommended terminal in the radio resource control release message for the terminal to subsequently access the network side for use. When the terminal has uplink data to be transmitted or sends a paging message to the terminal because the network side has downlink data to be transmitted, a non-access stratum of the terminal triggers a service request, and radio resource control of the terminal sends a radio resource control configuration request RrcConfigurationRequest on an air interface. After receiving the radio resource control configuration Request RrcConfigurationRequest, the network side sends a Message Initial UE Message of an initialization terminal to the core network, and after receiving the Message Initial UE Message of the initialization terminal, the core network sends an initialization Context Setup Request Initial Context Setup Request to the network side.
As an optional implementation manner, the sending the radio resource control configuration request to the network side includes: and carrying more than one complete security and encryption algorithm, the content of the service request, the terminal identity information and the selected network identity information in the radio resource control configuration request so that the network side stores the complete security and encryption algorithm and the terminal identity information and sends the service request content and the selected network identity information to a core network. In some embodiments, the rrc configuration request carries one or more of the security and encryption algorithms desired by the terminal, the service request content, the terminal Identity information ue-Identity, and the selected network Identity information selected plmn-Identity. After receiving the Message, the network side stores the information such as the complete security and encryption algorithm expected by the terminal, the terminal Identity information UE-Identity and the like, and simultaneously sends the service request content service request, the selected network Identity information UE-Identity and the like to the core network through initializing the Message Initial UE Message of the terminal. In other embodiments, the message content carried by the rrc configuration request may not include the security completion and encryption algorithm.
The receiving module is used for receiving the radio resource control configuration information sent by the network side, establishing a bearer control plane signaling data connection or a bearer user plane data connection according to the radio resource control configuration information, and activating the access layer security verification;
in some embodiments, after receiving the initial Context Setup Request, the network side allocates air interface resources and issues radio resource control configuration information RrcConfiguration to the terminal, where the radio resource control configuration information RrcConfiguration includes configuration information such as control plane signaling data SRB, user plane data DRB, medium access control layer MAC, physical configuration dedicated data physical configured modified configured and security algorithm configuration secure algorithm configured. As an optional implementation manner, before sending the rrc configuration message, the base station selects an algorithm for performing security completion and encryption on the rrc configuration message, then performs security completion on the message using the selected security completion algorithm, then encrypts the message using the selected encryption algorithm, and preferentially uses the security completion and encryption algorithm carried in the rrc configuration request message in step 1100.
As an optional implementation manner, the receiving module includes a checking sub-module, configured to perform decryption and integrity check on the rrc configuration information. In some embodiments, after the terminal receives the rrc configuration information, the terminal decrypts the message and performs security check on the message to determine that the received message is valid rrc configuration information, and after the UE determines that the valid rrc configuration information is received, the UE establishes a connection for carrying control plane signaling data SRB and a connection DRB for carrying user plane data according to information provided by the rrc configuration information, and activates an access stratum security AS security.
And the completion module is used for sending the radio resource control configuration completion information to the network side so that the network side sends a context setting response to the core network and establishes connection between the air interface and the core network.
In some embodiments, the terminal sends Rrc Configuration Complete information Rrc Configuration Complete to the network, where the Rrc Configuration Complete information Rrc Configuration Complete may perform security completion and/or encryption using a security completion encryption algorithm carried by the Rrc Configuration Request. After receiving the radio resource control configuration completion information Rrc configuration Complete, the network side sends a Context Setup Response to the core network, thereby completing establishment of connection between the air interface and the core network, and then performing data transmission by using the establishment service.
In the technical solution provided in this embodiment, both the radio resource control and the connection management of the terminal are in an idle state, and when data transmission is required, the establishment of an air interface data path and data transmission may be completed only through 3 air interface messages, namely, the radio resource control configuration request, the radio resource control configuration information, and the radio resource control configuration completion information. Meanwhile, the technical scheme provided by the embodiment does not change the original message interaction flow between the network side and the core network, and the initialization setting of the context information is realized through the interaction between the network side and the core network, so that the context information of the terminal does not need to be stored. Therefore, the technical scheme in the embodiment not only reduces the energy consumption of the terminal, but also does not bring extra memory requirements to the network side and the core network.
As an alternative embodiment, as shown in fig. 8, the checking sub-module includes:
the terminal comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a complete protection and encryption algorithm set supported by the terminal;
in some embodiments, the set of integrity protection and encryption algorithms refers to the set of all integrity protection and encryption algorithms that the terminal is capable of supporting.
The decryption unit is used for sequentially adopting the algorithm in the algorithm set to decrypt and completely protect the wireless resource control configuration information;
in some embodiments, the terminal performs decryption and re-security check on the received rrc configuration message in sequence by using each security completion and encryption algorithm in the algorithm set, and when the security completion check is successful, it may be determined that the decryption and security completion algorithm currently used by the terminal is an algorithm for performing security completion and encryption on the rrc configuration message at the network side. And the terminal obtains the contents of the rrc configuration message through the decryption operation. In order to improve efficiency, the terminal preferentially uses the security completion and encryption algorithm expected by the terminal carried by the Rrc Configuration Request in step 1100.
And the checking unit is used for checking the validity of the radio resource control configuration information when the algorithms in the algorithm set fail to decrypt and completely protect the radio resource control configuration information.
In some embodiments, after all the security and encryption algorithms in the algorithm set are tried, a security and encryption algorithm with successful security check is not found yet, and one possibility is that the network side does not encrypt and complete security for Rrc Configuration, at this time, the content of the Rrc Configuration message is directly checked, and if the content is legal, the Rrc Configuration message is a legal message, and the terminal may continue to process the message; another possibility is that the network side encrypts and finishes the radio resource control Configuration information Rrc Configuration using an encryption or a finishing algorithm that is not supported by the terminal, and at this time, the terminal can only discard the received radio resource control Configuration information Rrc Configuration.
As an alternative embodiment, as shown in fig. 9, the receiving module includes:
a compatibility judging submodule, configured to, when the radio resource control configuration information is in error;
in some embodiments, when some parameters indicated by the Rrc Configuration information are not compatible or have errors (for example, there is an error in the physical layer parameter Configuration check), the UE may be unable to process the parameters.
The state judgment submodule is used for acquiring the current cell state;
in some embodiments, in order to process the error, the processing needs to be performed according to the current cell update state, so the current cell state is obtained first;
the first request submodule is used for initiating a radio resource control setting request process when the cell is not updated;
in some embodiments, when the cell is not updated, that is, the access is still initiated in the original cell, since the Rrc Configuration has already occurred, it is indicated to some extent that the success rate of continuing to use the Rrc Configuration on the current cell may be relatively low, and in order to increase the success rate, the new access procedure uses an Rrc setup request rrcstupreq/RrcSetup procedure. In other embodiments, since the reason for the failure may not be caused by the Rrc Configuration procedure, the reason for the failure may have been eliminated when the connection is performed next time, in which case, the use of the Rrc Configuration procedure can save air interface signaling. Therefore, it is possible to attempt to establish a connection using the rcconfiguration flow a plurality of times, and when failing a plurality of times, it is possible to initiate a request for establishing a connection using the Rrc Configuration/rcsetup flow.
And the second request submodule is used for initiating a radio resource control setting request process or re-initiating a radio resource control configuration request when the cell is updated.
In some embodiments, when the new cell supports Rrc Configuration information Rrc Configuration, an Rrc Configuration request RrcConfiguration req/RrcConfiguration procedure may be selected, and an Rrc setup request rrcstupreq/RrcSetup procedure may be selected. In some embodiments, the terminal may acquire whether the new cell supports radio resource control Configuration information Rrc Configuration through broadcast information on the network side.
An embodiment of the present invention provides a service establishing apparatus, which is applied to a network side device, and as shown in fig. 10, the apparatus includes:
the initialization module is used for receiving a radio resource control configuration request sent by a terminal and sending a message for initializing the terminal to a core network according to the radio resource control configuration request; wherein radio resource control and connection management of the terminal are in an idle state;
in some embodiments, the terminal is a terminal already registered to the network, and the radio resource control and connection management of the terminal are both in an IDLE state in order to save resources when there is no data transmission, for example, the terminal enters a state of RRC _ IDLE, CM _ IDLE. At this time, the terminal and the network side do not need to store the terminal context data related to the service. The network side can carry some encryption or security completion algorithms used by the recommended terminal in the radio resource control release message for the terminal to subsequently access the network side for use. When the terminal has uplink data to be transmitted or sends a paging message to the terminal because the network side has downlink data to be transmitted, a non-access stratum of the terminal triggers a service request, and radio resource control of the terminal sends a radio resource control configuration request RrcConfigurationRequest on an air interface. After receiving the radio resource control configuration Request RrcConfigurationRequest, the network side sends a Message Initial UE Message of an initialization terminal to the core network, and after receiving the Message Initial UE Message of the initialization terminal, the core network sends an initialization Context Setup Request Initial Context Setup Request to the network side.
As an optional implementation manner, the sending the radio resource control configuration request to the network side includes: and carrying more than one complete security and encryption algorithm, the content of the service request, the terminal identity information and the selected network identity information in the radio resource control configuration request so that the network side stores the complete security and encryption algorithm and the terminal identity information and sends the service request content and the selected network identity information to a core network. In some embodiments, the rrc configuration request carries one or more of the security and encryption algorithms desired by the terminal, the service request content, the terminal Identity information ue-Identity, and the selected network Identity information selected plmn-Identity. After receiving the Message, the network side stores the information such as the complete security and encryption algorithm expected by the terminal, the terminal Identity information UE-Identity and the like, and simultaneously sends the service request content service request, the selected network Identity information UE-Identity and the like to the core network through initializing the Message Initial UE Message of the terminal.
A configuration module, configured to receive an initialization context setting request sent by a core network according to the message of the initialization terminal; sending wireless resource control configuration information to the terminal according to the initialization context setting request;
in some embodiments, after receiving the initial Context Setup Request, the network side allocates air interface resources and issues radio resource control configuration information RrcConfiguration to the terminal, where the radio resource control configuration information RrcConfiguration includes configuration information such as control plane signaling data SRB, user plane data DRB, medium access control layer MAC, physical configuration dedicated data physical configured modified configured and security algorithm configuration secure algorithm configured. As an optional implementation manner, before sending the rrc configuration message, the base station selects an algorithm for performing security completion and encryption on the rrc configuration message, then performs security completion on the message using the selected security completion algorithm, then encrypts the message using the selected encryption algorithm, and preferentially uses the security completion and encryption algorithm carried in the rrc configuration request message in step 2100. After the terminal receives the rrc configuration, the terminal decrypts the message and performs security check to determine that the received message is valid rrc configuration, and after the UE determines that the valid rrc configuration is received, the UE establishes a connection for carrying control plane signaling data SRB and a connection DRB for carrying user plane data according to the information provided by the rrc configuration, and activates an access stratum security authentication AS security.
And the response module is used for receiving the radio resource control configuration completion information sent by the terminal and sending an initialization context setting response to the core network according to the radio resource control configuration completion information so as to complete the previous connection between the air interface and the core network.
In some embodiments, the terminal sends Rrc Configuration Complete information Rrc Configuration Complete to the network, where the Rrc Configuration Complete information Rrc Configuration Complete may perform security completion and/or encryption using a security completion encryption algorithm carried by the Rrc Configuration Request. After receiving the radio resource control configuration completion information Rrc configuration Complete, the network side sends a Context Setup Response to the core network, thereby completing establishment of connection between the air interface and the core network, and then performing data transmission by using the establishment service.
In the technical solution provided in this embodiment, both the radio resource control and the connection management of the terminal are in an idle state, and when data transmission is required, the establishment of an air interface data path and data transmission may be completed only through 3 air interface messages, namely, the radio resource control configuration request, the radio resource control configuration information, and the radio resource control configuration completion information. Meanwhile, the technical scheme provided by the embodiment does not change the original message interaction flow between the network side and the core network, and the initialization setting of the context information is realized through the interaction between the network side and the core network, so that the context information of the terminal does not need to be stored. Therefore, the technical scheme in the embodiment not only reduces the energy consumption of the terminal, but also does not bring extra memory requirements to the network side and the core network.
As an alternative embodiment, as shown in fig. 11, the configuration module includes:
the selection submodule is used for selecting a complete protection and an encryption algorithm aiming at the radio resource control configuration information;
in some embodiments, the base station selects an algorithm for performing security and encryption on the rrc configuration message before sending the rrc configuration message, and in the selection process, the selection may be performed based on an algorithm in a set of security and encryption algorithms supported by the terminal. As an alternative embodiment, a security completion and encryption algorithm carried by the Rrc Configuration Request message in step 2100 may be used.
And the encryption submodule is used for carrying out complete protection and encryption on the radio resource control configuration information by adopting a selected algorithm.
In some embodiments, after the security and encryption algorithms are selected, the selected security algorithm is used to perform security completion on the message, and then the selected encryption algorithm is used to encrypt the message, which is beneficial to the secure transmission of the message.
In the above embodiments, the encryption and decryption mechanisms may be as follows:
the network side and the terminal use a set of rules which are obeyed together, through the rules, the network side and the terminal uniquely determine a set of { KEY, value COUNT, BEARER, DIRECTION, LENGTH } parameters, and the terminal can correctly decrypt the radio resource control configuration information rcc reconfiguration by trying the supported encryption algorithm EEA. In order to simplify the calculation process, the network side and the terminal can be specified to use the appointed { value COUNT, bearing BEARER, pointing to DIRECTION, LENGTH } value; the KEY used for encryption may be determined by using a secret KEY and an encryption algorithm both stored by the agreed terminal and the network side, for example, by using a secret KEY both stored by the agreed terminal and the network and an encryption algorithm carried in the radio resource control configuration request.
In the above embodiments, the mechanism of complete guarantee may adopt the following manner:
the network side and the terminal use a set of rules which are obeyed together, through the rules, the network side and the terminal uniquely determine a set of { KEY, value COUNT, BEARER, and DIRECTION } parameters, and the terminal can correctly perform security check on the radio resource control configuration information Rrc reconfiguration through trying a supported security algorithm EIA. In order to simplify the calculation process, the network side and the terminal can be specified to use the appointed { value COUNT, carrying BEARER, pointing to DIRECTION } value; the KEY used for the security completion may be determined by using a secret KEY and a security completion algorithm both stored in the terminal and the network, for example, by using a secret KEY and a security completion algorithm carried in the radio resource control configuration request both stored in the terminal and the network.
The service establishment method may be performed by: a chip or chip module; the service establishing device may be, for example: a chip or a chip module.
Each module/unit included in each apparatus and product described in the above embodiments may be a software module/unit, or may also be a hardware module/unit, or may also be a part of a software module/unit and a part of a hardware module/unit. For example, for each device or product applied to or integrated into a chip, each module/unit included in the device or product may be implemented by hardware such as a circuit, or at least a part of the module/unit may be implemented by a software program running on a processor integrated within the chip, and the rest (if any) part of the module/unit may be implemented by hardware such as a circuit; for each device or product applied to or integrated with the chip module, each module/unit included in the device or product may be implemented by using hardware such as a circuit, and different modules/units may be located in the same component (e.g., a chip, a circuit module, etc.) or different components of the chip module, or at least some of the modules/units may be implemented by using a software program running on a processor integrated within the chip module, and the rest (if any) of the modules/units may be implemented by using hardware such as a circuit; for each device and product applied to or integrated in the terminal, each module/unit included in the device and product may be implemented by using hardware such as a circuit, and different modules/units may be located in the same component (e.g., a chip, a circuit module, etc.) or different components in the terminal, or at least part of the modules/units may be implemented by using a software program running on a processor integrated in the terminal, and the rest (if any) part of the modules/units may be implemented by using hardware such as a circuit.
An embodiment of the present invention further provides a terminal, where the terminal includes:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the method applied to the terminal.
The embodiment of the present invention further provides a chip, where the chip is located at a terminal, and the chip includes:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the method applied to the terminal.
The embodiment of the invention also provides a chip module which is characterized by comprising the chip positioned at the terminal.
An embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores computer instructions, and the computer instructions, when executed by a processor, implement the method applied to the terminal.
An embodiment of the present invention further provides a network side device, where the network side device includes:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the method applied to the network side device.
The embodiment of the present invention further provides a chip, where the chip is located on a network side device, and the chip includes:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the method applied to the network side device.
The embodiment of the invention also provides a chip module, which is characterized in that the chip module comprises the chip positioned on the network side equipment.
An embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores computer instructions, and the computer instructions, when executed by a processor, implement the method applied to the network-side device.
It will be understood by those skilled in the art that all or part of the processes of the embodiments of the methods described above may be implemented by a computer program, which may be stored in a computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (23)
1. A service establishment method applied to a terminal with idle radio resource control and connection management, the method comprising:
responding to the data transmission requirement, and sending a wireless resource control configuration request to a network side; so that the network side acquires the context setting request from the core network and allocates air interface resources for the terminal;
receiving radio resource control configuration information sent by a network side, establishing a bearer control plane signaling data connection or a bearer user plane data connection according to the radio resource control configuration information, and activating access stratum security verification;
and sending radio resource control configuration completion information to a network side so that the network side sends a context setting response to the core network and establishes connection between the air interface and the core network.
2. The method of claim 1, wherein sending a radio resource control configuration request to a network side comprises: and carrying more than one complete security and encryption algorithm, the content of the service request, the terminal identity information and the selected network identity information in the radio resource control configuration request so that the network side stores the complete security and encryption algorithm and the terminal identity information and sends the service request content and the selected network identity information to a core network.
3. The method of claim 2, wherein receiving the radio resource control configuration information sent by the network side comprises: and decrypting the radio resource control configuration information and carrying out security check.
4. The method of claim 3, wherein decrypting the RRC configuration information and performing a integrity check comprises:
acquiring a complete protection and encryption algorithm set supported by a terminal;
sequentially adopting the algorithm in the algorithm set to decrypt and completely protect the wireless resource control configuration information;
and when the algorithm in the algorithm set fails to decrypt and completely protect the radio resource control configuration information, checking the validity of the radio resource control configuration information.
5. The method of claim 2, wherein before sending the rrc configuration complete information to the network side, the method comprises: and performing complete protection and/or encryption on the radio resource control configuration completion information.
6. The method of claim 1, wherein receiving the radio resource control configuration information sent by the network side comprises:
when the radio resource control configuration information has an error;
acquiring a current cell state;
when the cell is not updated, initiating a radio resource control setting request process;
when the cell is updated, a radio resource control setting request process is initiated or a radio resource control configuration request is reinitiated.
7. A service establishing method is applied to network side equipment, and is characterized in that the method comprises the following steps:
receiving a radio resource control configuration request sent by a terminal, and sending a message for initializing the terminal to a core network according to the radio resource control configuration request; wherein radio resource control and connection management of the terminal are in an idle state;
receiving an initialization context setting request sent by a core network according to the message of the initialization terminal; sending wireless resource control configuration information to the terminal according to the initialization context setting request;
and receiving radio resource control configuration completion information sent by the terminal, and sending an initialization context setting response to the core network according to the radio resource control configuration completion information so as to complete the previous connection between the air interface and the core network.
8. The method of claim 1, wherein sending radio resource control configuration information to the terminal according to the initialization context setup request comprises:
selecting a complete protection and encryption algorithm aiming at the radio resource control configuration information;
and adopting the selected algorithm to completely protect and encrypt the radio resource control configuration information.
9. A service establishment apparatus, the apparatus being located at a terminal, the apparatus comprising:
the request module is used for responding to the data transmission requirement and sending a wireless resource control configuration request to the network side; so that the network side acquires the context setting request from the core network and allocates air interface resources for the terminal;
the receiving module is used for receiving the radio resource control configuration information sent by the network side, establishing a bearer control plane signaling data connection or a bearer user plane data connection according to the radio resource control configuration information, and activating the access layer security verification;
and the completion module is used for sending the radio resource control configuration completion information to the network side so that the network side sends a context setting response to the core network and establishes connection between the air interface and the core network.
10. The apparatus according to claim 9, wherein the request module is configured to carry one or more than one security and encryption algorithm, content of the service request, terminal identity information, and selected network identity information in the rrc configuration request, so that the network side stores the security and encryption algorithm and the terminal identity information, and sends the content of the service request and the selected network identity information to a core network.
11. The apparatus of claim 10, wherein the receiving module comprises:
and the checking submodule is used for decrypting the radio resource control configuration information and carrying out security check.
12. The apparatus of claim 11, wherein the checking submodule comprises:
the terminal comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a complete protection and encryption algorithm set supported by the terminal;
the decryption unit is used for sequentially adopting the algorithm in the algorithm set to decrypt and completely protect the wireless resource control configuration information;
and the checking unit is used for checking the validity of the radio resource control configuration information when the algorithms in the algorithm set fail to decrypt and completely protect the radio resource control configuration information.
13. The method of claim 10, wherein completing a module comprises:
and the encryption submodule is used for carrying out complete protection and encryption on the radio resource control configuration completion information.
14. The method of claim 9, wherein the receiving module comprises:
a compatibility judging submodule, configured to, when the radio resource control configuration information is in error;
the state judgment submodule is used for acquiring the current cell state;
the first request submodule is used for initiating a radio resource control setting request process when the cell is not updated;
and the second request submodule is used for initiating a radio resource control setting request process or re-initiating a radio resource control configuration request when the cell is updated.
15. A service establishing device is applied to a network side device, and is characterized in that the device comprises:
the initialization module is used for receiving a radio resource control configuration request sent by a terminal and sending a message for initializing the terminal to a core network according to the radio resource control configuration request; wherein radio resource control and connection management of the terminal are in an idle state;
a configuration module, configured to receive an initialization context setting request sent by a core network according to the message of the initialization terminal; sending wireless resource control configuration information to the terminal according to the initialization context setting request;
and the response module is used for receiving the radio resource control configuration completion information sent by the terminal and sending an initialization context setting response to the core network according to the radio resource control configuration completion information so as to complete the previous connection between the air interface and the core network.
16. The method of claim 15, wherein configuring the module comprises:
the selection submodule is used for selecting a complete protection and an encryption algorithm aiming at the radio resource control configuration information;
and the encryption submodule is used for carrying out complete protection and encryption on the radio resource control configuration information by adopting a selected algorithm.
17. A terminal, characterized in that the terminal comprises:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1 to 6.
18. A chip, the chip being located at a terminal, the chip comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1 to 6.
19. A computer readable storage medium, wherein the computer readable storage medium stores computer instructions which, when executed by a processor, implement the method of any one of claims 1 to 6.
20. A network side device, wherein the network side device comprises:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 7 to 8.
21. A chip, the chip being located in a network side device, the chip comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 7 to 8.
22. A chip module, characterized in that it comprises a chip according to claim 18 or 21.
23. A computer readable storage medium, wherein the computer readable storage medium stores computer instructions which, when executed by a processor, implement the method of any one of claims 7 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110742122.8A CN113438646B (en) | 2021-06-30 | 2021-06-30 | Service establishing method, device, terminal and network side equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110742122.8A CN113438646B (en) | 2021-06-30 | 2021-06-30 | Service establishing method, device, terminal and network side equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113438646A true CN113438646A (en) | 2021-09-24 |
CN113438646B CN113438646B (en) | 2022-08-23 |
Family
ID=77758445
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110742122.8A Active CN113438646B (en) | 2021-06-30 | 2021-06-30 | Service establishing method, device, terminal and network side equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113438646B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108476536A (en) * | 2016-03-29 | 2018-08-31 | Oppo广东移动通信有限公司 | The method and apparatus of wireless communication |
CN109429213A (en) * | 2017-06-23 | 2019-03-05 | 电信科学技术研究院 | A kind of information processing method, device, equipment and computer readable storage medium |
CN109548109A (en) * | 2017-08-14 | 2019-03-29 | 电信科学技术研究院 | A kind of UE and the unmatched processing method and processing device of network state |
CN109699050A (en) * | 2017-10-24 | 2019-04-30 | 普天信息技术有限公司 | A kind of inactive state terminal restores method, base station, equipment and the system of connection |
US20200029206A1 (en) * | 2017-01-05 | 2020-01-23 | Nokia Technologies Oy | Inactive state security support in wireless communications system |
US20200120592A1 (en) * | 2017-06-16 | 2020-04-16 | Huawei Technologies Co., Ltd. | Communication Method and Apparatus |
US20200128608A1 (en) * | 2016-12-29 | 2020-04-23 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Context release method, device and system |
CN111491338A (en) * | 2019-01-28 | 2020-08-04 | 华为技术有限公司 | Context storage method and device |
US20210168894A1 (en) * | 2018-08-09 | 2021-06-03 | Zte Corporation | State transitions for idle mode transmissions using pre-configured dedicated resources |
-
2021
- 2021-06-30 CN CN202110742122.8A patent/CN113438646B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108476536A (en) * | 2016-03-29 | 2018-08-31 | Oppo广东移动通信有限公司 | The method and apparatus of wireless communication |
US20200128608A1 (en) * | 2016-12-29 | 2020-04-23 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Context release method, device and system |
US20200029206A1 (en) * | 2017-01-05 | 2020-01-23 | Nokia Technologies Oy | Inactive state security support in wireless communications system |
US20200120592A1 (en) * | 2017-06-16 | 2020-04-16 | Huawei Technologies Co., Ltd. | Communication Method and Apparatus |
CN109429213A (en) * | 2017-06-23 | 2019-03-05 | 电信科学技术研究院 | A kind of information processing method, device, equipment and computer readable storage medium |
CN109548109A (en) * | 2017-08-14 | 2019-03-29 | 电信科学技术研究院 | A kind of UE and the unmatched processing method and processing device of network state |
CN109699050A (en) * | 2017-10-24 | 2019-04-30 | 普天信息技术有限公司 | A kind of inactive state terminal restores method, base station, equipment and the system of connection |
US20210168894A1 (en) * | 2018-08-09 | 2021-06-03 | Zte Corporation | State transitions for idle mode transmissions using pre-configured dedicated resources |
CN111491338A (en) * | 2019-01-28 | 2020-08-04 | 华为技术有限公司 | Context storage method and device |
Also Published As
Publication number | Publication date |
---|---|
CN113438646B (en) | 2022-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111669276B (en) | Network verification method, device and system | |
CN108271125B (en) | Data transmitting method, data receiving method and device | |
ES2898304T3 (en) | Method, apparatus and system to support multiple IMSI | |
CN107006049A (en) | A kind of smart machine and its set up the method for equipment room bluetooth connection, device | |
US11778458B2 (en) | Network access authentication method and device | |
CN102026180A (en) | M2M transmission control method, device and system | |
CN108605225B (en) | Safety processing method and related equipment | |
CN112105021B (en) | Authentication method, device and system | |
EP3675541B1 (en) | Authentication method and device | |
CN110944319B (en) | 5G communication identity verification method, equipment and storage medium | |
WO2017167102A1 (en) | Methods for generating and verifying message integrity authentication information, device, and verification system | |
CN104661171B (en) | Small data secure transmission method and system for MTC (machine type communication) equipment group | |
CN111050324B (en) | 5G terminal equipment access method, equipment and storage medium | |
CN105323231A (en) | Security algorithm selection method, security algorithm selection device and security algorithm selection system | |
Pratas et al. | Massive machine-type communication (mMTC) access with integrated authentication | |
CN110351894A (en) | A kind of method and apparatus authenticating UE | |
CN109803456B (en) | Method and device for requesting to recover connection | |
CN113498057A (en) | Communication system, method and device | |
CN110087338B (en) | Method and equipment for authenticating narrowband Internet of things | |
CN113438646B (en) | Service establishing method, device, terminal and network side equipment | |
CN110545253B (en) | Information processing method, device, equipment and computer readable storage medium | |
WO2022068669A1 (en) | Session establishment method and apparatus, access network device and storage medium | |
CN113691973A (en) | Number portability method based on block chain network and operator system | |
US11272357B2 (en) | Method and device for determining SIM card information | |
CN113302959A (en) | Data transmission method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |