CN115707358A - Recovery method and device after security activation failure - Google Patents

Recovery method and device after security activation failure Download PDF

Info

Publication number
CN115707358A
CN115707358A CN202180016259.3A CN202180016259A CN115707358A CN 115707358 A CN115707358 A CN 115707358A CN 202180016259 A CN202180016259 A CN 202180016259A CN 115707358 A CN115707358 A CN 115707358A
Authority
CN
China
Prior art keywords
network
message
security mode
rrc connection
random access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202180016259.3A
Other languages
Chinese (zh)
Inventor
白帆
刘文卓
王琪
林天柱
杨峰
王经谊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN115707358A publication Critical patent/CN115707358A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • H04W76/38Connection release triggered by timers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to the technical field of wireless communication, and discloses a recovery method and a recovery device after a security mode activation failure. The method comprises the following steps: the terminal equipment receives a security mode command from a network and starts an access stratum security activation process; after the security activation fails, sending a security mode failure message to the network; and initiating a random access flow to the network to establish a new RRC connection under the condition that a security mode failure message is sent to the network and a Radio Resource Control (RRC) connection release message is not received. By adopting the scheme, the problem that the terminal equipment needs to rely on the network notification to release RRC connection after sending the security mode failure message can be solved, the random access process can be initiated autonomously, and the service recovery is accelerated.

Description

Recovery method and device after security activation failure Technical Field
The present application relates to wireless communication systems, and in particular, to a method and an apparatus for recovering after a security activation failure.
Background
In today's mobile radio communication networks, the control of radio resources involves the handling of various radio resources, e.g. handling of system messages, connection control, mobility management, measurements, etc. In addition, the connection control part of the Access Stratum (AS) also includes many sub-processes, among which there is an Initial AS security activation (Initial AS security activation) process.
The initial security activation procedure for the AS, i.e. the activation of the security mode, comprises the following steps: a network issues a Security Mode Command (SMC), and after receiving an SMC message from the network, a terminal obtains related security parameters of an AS and performs integrity protection verification on the received message. If the terminal passes the integrity protection verification of the AS, sending a security mode complete (security mode complete) message to the network; if the AS fails the integrity protection verification, a security mode failure (security mode failure) message is sent to the network. After the security mode configuration is completed, the terminal can normally perform the services of data service information and voice information. Therefore, the failure of the initial security activation process directly affects the business experience of the user.
In the prior art, the method has the defects that, the failure of the security activation of the terminal AS may cause the terminal AS to fail to normally perform data and voice services. With the diversified development of wireless communication services and application environments, the network environment becomes more challenging, so it is necessary to research how to accelerate the normal service of the terminal to data and voice services under the condition of failed activation of the security mode, and improve the communication experience of users.
Disclosure of Invention
The embodiment of the application provides a recovery method and a recovery device after a security activation failure, which are used for accelerating the recovery and normal operation of a data service and a voice call in the case that a user fails to activate in a security mode, so that the service quality and the communication experience of the user are ensured.
In a first aspect, embodiments of the present application provide a method of wireless communication, which may be performed by a wireless communication apparatus. The method comprises the following steps: receiving a security mode command from a network, the security mode command for providing information of access stratum security activation; sending a security mode failure message to the network, the security mode failure message indicating a security mode activation failure; initiating a random access procedure to the network to establish a new Radio Resource Control (RRC) connection after a security mode failure message is sent to the network and a RRC connection release message from the network is not received.
Based on the method, the terminal reduces the waiting time of the RRC connection release message. In the prior art, a terminal depends on an RRC connection release message from a network to release an RRC connection, and in a scenario where the network is unstable, the terminal waits for the RRC connection release message, which may cause that a user service cannot be performed normally. By comparison, the adoption of the scheme is beneficial to reducing the dependence of the terminal on the network, accelerating the recovery and normal operation of the service, responding to the service requirement in time and improving the service experience of the user.
As a possible implementation manner, the terminal initiates a random access procedure to the network when an RRC connection release message from the network is not received within a period of time (e.g., a first duration) after the security mode failure message is sent to the network.
In a specific implementation, the terminal may start a timer after sending the security mode failure message, where a duration of the timer is the first duration. Further, the value of the first duration is one of a plurality of configurable values, i.e., the first duration can be adjusted. The adjustment may be based on big data statistics or network conditions, and the range may be controlled between 100 and 3000 milliseconds.
In the technical scheme, the terminal avoids unlimited waiting of the RRC connection release message by limiting the time when the RRC connection release message is not received, reduces the dependence on the network and can reestablish the RRC connection with the network as soon as possible.
As another possible implementation manner, the terminal initiates a random access procedure to the network when receiving other downlink messages except the RRC connection release message from the network after sending the security mode failure message to the network. The other downlink message may refer to an RRC message including an RRC connection reconfiguration message.
In the technical scheme, the terminal receives the RRC message which is not regarded as the RRC connection release message from the network, and the RRC message is regarded as the RRC connection release message with wrong decoding, so that the RRC connection is reestablished in time, and infinite waiting time caused by decoding errors and the like is avoided.
As another possible implementation manner, after sending the security mode failure message to the network, the terminal actively initiates a random access procedure to the network under the condition that an RRC connection release message from the network is not received.
In the technical scheme, the terminal does not need to try to receive the RRC connection release message from the network, and actively initiates the random access process after sending the security mode failure message, so that the time delay can be further reduced.
As another possible implementation manner, the terminal enters an RRC idle state after sending the security mode failure message to the network and without receiving an RRC connection release message from the network, and sends a random access preamble to the network according to a service requirement.
In the technical scheme, the terminal enters an RRC idle state in time and sends a random access preamble to the network when service is required, so that the power consumption of the terminal for maintaining the RRC connection state is reduced, and the time delay and the power consumption are balanced.
In a second aspect, embodiments of the present application provide a method of wireless communication, which may be performed by a wireless communication device. The method comprises the following steps: receiving a security mode command from a network, the security mode command for providing information of access stratum security activation; sending a security mode failure message to the network, the security mode failure message indicating a security mode activation failure; and after sending a security mode failure message to the network, directly initiating a random access flow to the network to establish a new RRC connection.
Based on the method, after the terminal sends the security mode failure message to the network, the random access process can be directly initiated without trying to receive an RRC connection release message. Compared with the prior art, the time for waiting the RRC connection release message is not needed, and the recovery of the service depends on the time for sending the security mode failure message, so that the recovery of the service can be accelerated to the greatest extent compared with the prior art.
As a possible implementation manner, after sending the security mode failure message to the network, the terminal enters an RRC idle state, and sends a random access preamble to the network according to a service requirement.
In the technical scheme, the terminal releases resources in time, enters an RRC idle state, and sends a random access preamble to the network when service is required, namely, the random access to the network is started, so that the service recovery speed is accelerated, and meanwhile, the power consumption can be reduced by reducing the time that the terminal is in the RRC connection state under the condition of no service.
In a third aspect, an embodiment of the present application provides a wireless communication apparatus, including a processing unit and a transceiver unit, where the processing unit is configured to control the transceiver unit; the transceiver unit is used for transmitting and receiving related functions, and comprises: receiving a security mode command from a network, the security mode command for providing information of access stratum security activation; sending a security mode failure message to the network, the security mode failure message indicating a security activation failure; and initiating a random access process to the network to establish a new RRC connection after sending a security mode failure message to the network and without receiving an RRC connection release message from the network.
Alternatively, the transceiving unit comprises a receiving unit and a transmitting unit. In one design, the wireless communication device is a communication chip, the processing unit may be one or more processors or processor cores, and the transceiving unit may be an input-output circuit or interface of the communication chip.
In another design, the transceiver unit may be a transmitter and a receiver, or the transceiver unit may be a transmitter and a receiver.
Optionally, the wireless communication apparatus further includes various modules operable to perform any of the embodiments of the wireless communication methods of any of the first to second aspects.
In a fourth aspect, an embodiment of the present application provides a wireless communication apparatus, which may be a terminal and may also be a chip for a terminal. The apparatus having functionality to implement the method of the first aspect described above, or any possible implementation thereof. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In a fifth aspect, an embodiment of the present application provides a wireless communication apparatus, which includes a processor and a memory. Optionally, a transceiver is also included. The memory is configured to store a computer program or instructions, and the processor is configured to call and execute the computer program or instructions from the memory, and when the processor executes the computer program or instructions in the memory, the wireless communication apparatus is enabled to perform any one of the embodiments of the wireless communication method of the first aspect to the second aspect.
Optionally, the number of the processors is one or more, and the number of the memories is one or more.
Alternatively, the memory may be integrated with the processor, or may be provided separately from the processor.
Alternatively, the memory may be volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory.
In a sixth aspect, a system is provided, which includes the above wireless communication apparatus and a network device.
In a seventh aspect, a computer program product is provided, the computer program product comprising: a computer program (which may also be referred to as code, or instructions), which when executed, causes a computer to perform, or cause a computer to perform, a method in any of the possible implementations of the first to second aspects described above.
In an eighth aspect, a computer-readable storage medium is provided, which stores a computer program (which may also be referred to as code or instructions) that, when executed on a computer, causes the computer to perform the method in any of the possible implementations of the first to second aspects described above, or causes the computer to perform the method in any of the implementations of the first to second aspects described above.
In a ninth aspect, a chip system is provided, which may include a processor. The processor is coupled to the memory and is operable to perform the method of any one of the first to second aspects and any one of the possible implementations of the first to second aspects. Optionally, the chip system further comprises a memory. A memory for storing a computer program (also referred to as code, or instructions). A processor configured to call and run a computer program from the memory, so that the device with the system on chip installed performs the method of any one of the first aspect to the second aspect, and any one of the possible implementations of any one of the first aspect to the second aspect.
In a tenth aspect, there is provided a wireless communication apparatus comprising: interface circuitry and processing circuitry. The interface circuit may include an input circuit and an output circuit. The processing circuit is configured to receive a signal via the input circuit and transmit a signal via the output circuit, such that the method of any one of the first to third aspects and any one of the possible implementations of the first to second aspects is implemented.
In a specific implementation process, the wireless communication device may be a chip, the input circuit may be an input pin, the output circuit may be an output pin, and the processing circuit may be a transistor, a gate circuit, a flip-flop, various logic circuits, and the like. The input signal received by the input circuit may be received and input by, for example and without limitation, a receiver, the signal output by the output circuit may be output to and transmitted by a transmitter, for example and without limitation, and the input circuit and the output circuit may be the same circuit that functions as the input circuit and the output circuit, respectively, at different times. The embodiment of the present application does not limit the specific implementation manner of the processor and various circuits.
In one implementation, the wireless communication apparatus may be a wireless communication device, i.e., a computer device supporting wireless communication functions. In particular, the wireless communication device may be a terminal, such as a smartphone, or a radio access network device, such as a base station. A system-on-chip may also be referred to as a system-on-chip (SoC), or simply as an SoC chip. The communication chip may include a baseband processing chip and a radio frequency processing chip. The baseband processing chip is sometimes also referred to as a modem (modem) or baseband chip. The rf processing chip is also sometimes referred to as a radio frequency transceiver (transceiver) or rf chip. In a physical implementation, part of the communication chip or all of the communication chip may be integrated inside the SoC chip. For example, the baseband processing chip is integrated in the SoC chip, and the radio frequency processing chip is not integrated with the SoC chip. The interface circuit may be a radio frequency processing chip in the wireless communication device, and the processing circuit may be a baseband processing chip in the wireless communication device.
In yet another implementation, the wireless communication apparatus may be a part of a device in a wireless communication device, such as an integrated circuit product such as a system chip or a communication chip. The interface circuit may be an input/output interface, interface circuit, output circuit, input circuit, pin or related circuit on the chip or system of chips, etc. A processor may also be embodied as a processing circuit or a logic circuit.
Drawings
Fig. 1 is a schematic structural diagram of a wireless communication system according to an embodiment of the present application;
fig. 2 is a schematic diagram of a control plane radio protocol architecture according to an embodiment of the present application;
fig. 3 is a schematic diagram of a RRC connection state transition procedure according to an embodiment of the present application;
fig. 4 is a schematic flowchart of RRC connection establishment according to an embodiment of the present application;
fig. 5 is an access stratum initial security activation process provided in an embodiment of the present application, where fig. 5 (a) shows a successful initial security activation process, and fig. 5 (b) shows a failed initial security activation process;
fig. 6 is a block diagram of a process of actively recovering an exception after a failure of activating a security mode according to an embodiment of the present application;
fig. 7 is a schematic flowchart illustrating active recovery of an exception after a failure of activating a security mode according to an embodiment of the present application;
fig. 8 is a schematic flowchart of another active recovery of an exception after a failure of activating a security mode according to an embodiment of the present application;
fig. 9 is a schematic flowchart of another active recovery of an exception after a failure of activating a security mode according to an embodiment of the present application;
fig. 10 is a schematic flowchart of another active recovery of an exception after a failure of activating a security mode according to an embodiment of the present application;
fig. 11 is a schematic flowchart of another active recovery of an exception after a failure of activating a security mode according to an embodiment of the present application;
fig. 12 is a schematic block diagram of a wireless communication apparatus provided in an embodiment of the present application;
fig. 13 is a schematic structural diagram of a wireless communication device according to an embodiment of the present disclosure.
It should be understood that the dimensions and forms of the various blocks in the block diagrams described above are for reference only and should not be construed as exclusive of the embodiments of the present application. The relative positions and the inclusion relations among the blocks shown in the structural schematic diagram are only used for schematically representing the structural associations among the blocks, and do not limit the physical connection manner of the embodiment of the application.
Detailed Description
The technical solution provided by the present application is further described below by referring to the drawings and the embodiments. It should be understood that the system structure and the service scenario provided in the embodiments of the present application are mainly for explaining some possible implementations of the technical solutions of the present application, and should not be interpreted as the only limitations of the technical solutions of the present application. As can be known to those skilled in the art, with the evolution of the system and the occurrence of an updated service scenario, the technical solution provided in the present application may still be applicable to the same or similar technical problems.
It should be understood that the technical solutions provided in the embodiments of the present application include an active reply method for an exception after a failure of activating a security mode and a related device thereof. The principles of solving the problems of these solutions are the same or similar, and some of the repeated parts may not be repeated in the following description of the specific embodiments, but it should be understood that these specific embodiments are referred to and can be combined with each other.
In a wireless communication system, devices can be divided into devices that provide wireless network services and devices that use wireless network services. The devices providing wireless network services refer to devices forming a wireless communication network, and may be referred to as network devices (network elements) for short. Network devices are typically assigned to and operated or maintained by operators (e.g., china mobile and Vodafone) or infrastructure providers (e.g., tower companies). The network devices may be further classified into Radio Access Network (RAN) devices and Core Network (CN) devices. A typical RAN equipment includes a Base Station (BS).
It should be understood that a base station may also sometimes be referred to as a wireless Access Point (AP), or a Transmission Reception Point (TRP). Specifically, the base station may be a general Node B (gNB) in a 5G New Radio (NR) system, an evolved Node B (eNB) in a 4G Long Term Evolution (LTE) system.
Devices using wireless network services are often located at the edge of the network, and may be referred to simply as terminals (terminals). The terminal can establish connection with the network equipment and provide specific wireless communication services for users based on the services of the network equipment. It should be understood that the terminal is sometimes referred to as User Equipment (UE), or Subscriber Unit (SU), due to the tighter relationship between the terminal and the user. In addition, the terminal tends to move with the user, sometimes referred to as a Mobile Station (MS), relative to a base station, which is typically located at a fixed location. Some network devices, such as Relay Nodes (RNs) or wireless routers, may also be considered as terminals due to their UE identities or due to their affiliations with users.
In particular, the terminal may be a mobile phone (mobile phone), a tablet computer (tablet computer), a laptop computer (laptop computer), a wearable device (such as a smart watch, a smart bracelet, a smart helmet, and smart glasses), and other devices with wireless access capability, such as a smart car, various internet of things (IOT) devices, including various smart home devices (such as a smart meter and smart home appliances), and smart city devices (such as security and security devices or monitoring devices, and smart road traffic facilities), and the like.
For convenience of description, the technical solutions of the embodiments of the present application will be described in detail by taking a base station and a terminal as examples.
Fig. 1 is a schematic structural diagram of a wireless communication system according to an embodiment of the present disclosure. As shown in fig. 1, the wireless communication system includes a terminal and a base station. Depending on the transmission direction, the transmission link from the terminal to the base station is denoted as Uplink (UL), and the transmission link from the base station to the terminal is denoted as Downlink (DL). Similarly, data transmission in the uplink may be abbreviated as uplink data transmission or uplink transmission, and data transmission in the downlink may be abbreviated as downlink data transmission or downlink transmission.
In the wireless communication system, a base station may provide communication coverage for a particular geographic area through an integrated or external antenna device. One or more terminals located within the communication coverage area of the base station may each access the base station. One base station may manage one or more cells (cells). Each cell has an identity (identification), also called cell identity (cell ID). From the perspective of radio resources, one cell is a combination of downlink radio resources and (optionally) uplink radio resources paired therewith.
It should be understood that the wireless communication system may be compliant with 3 GPP's wireless communication standards, as well as other wireless communication standards, such as 802.11, 802.15, or 802.20 series of IEEE, the Institute of Electrical and Electronics Engineers. Although only one base station and one terminal are shown in fig. 1, the wireless communication system may include other numbers of terminals and base stations. The wireless communication system may also include other network devices, such as core network devices.
The terminal and the base station should know the predefined configuration of the wireless communication system, including Radio Access Technologies (RATs) supported by the system, and the radio resources specified by the system, such as radio frequency bands and carriers. A carrier is a range of frequencies that conforms to system specifications. This frequency range may be determined by both the center frequency of the carrier (denoted as carrier frequency) and the bandwidth of the carrier. These system-predefined configurations may be determined as part of a standard protocol for the wireless communication system or by interaction between the terminal and the base station. The contents of the standard protocols of the wireless communication system may be pre-stored in the memories of the terminal and the base station and/or embodied as hardware circuits or software codes of the terminal and the base station.
In the wireless communication system, the terminal and the base station support one or more of the same RATs, e.g., the RATs of the 5G nr,4g LTE, or future evolution systems. Specifically, the terminal and the base station use the same air interface parameters, coding scheme, modulation scheme, and the like, and communicate with each other based on radio resources specified by the system. The air interface parameter is a parameter for describing air interface characteristics. In english, the air interface parameter is sometimes also referred to as numerology. The air interface parameter may include a subcarrier Spacing (SC) and may also include a Cyclic Prefix (CP). The wireless communication system may support a variety of different air interface parameters, which may be part of a standard protocol.
The transmission between the terminal and the network (including the base station and the core network device) may conform to the technical specifications defined by the relevant standards organization. Fig. 2 is a schematic diagram of a control plane radio protocol architecture according to an embodiment of the present application. The radio protocol architecture may correspond to that of 3 GPP. The radio protocol stack is divided into two planes: a user plane and a control plane. A User Plane (UP) protocol stack is a protocol cluster used for User data transmission, and a Control Plane (CP) protocol stack is a protocol cluster used for Control signaling transmission of a system. The user plane protocol is mainly responsible for functions related to user data transmission, and the control plane protocol is mainly responsible for functions such as connection establishment, mobility management and security management.
As shown in fig. 2, the radio protocol architecture corresponds to a control plane protocol, and forms a protocol stack from a bottom layer protocol to a higher layer protocol, and includes: a Physical (PHY) layer protocol, a Media Access Control (MAC) layer protocol, a Radio Link Control (RLC) layer protocol, a Packet Data Convergence (PDCP) layer protocol, a Radio Resource Control (RRC) layer protocol, and a non-access stratum (NAS) layer protocol. Taking the terminal as an example, the message of the control plane is transmitted from the upper layer to the bottom layer, then transmitted to the base station or the core network side through the physical channel, and then transmitted from the bottom layer to the corresponding upper layer, thereby completing one communication transmission.
From the perspective of the protocol stack, the communication flow between the terminal and the network can be divided into an Access Stratum (AS) flow and a Non-Access Stratum (NAS) flow. The procedure of the access stratum may be understood as a procedure that requires the terminal device of the radio access stratum to participate in the processing with the base station, and the procedure of the non-access stratum refers to a signaling procedure that only the terminal and the core network participate in the processing, and the base station plays a role in transporting the signaling procedure. The latter corresponds to NAS layer protocols, the former including RRC protocol and other layer protocols below, for link set-up. Through the flow of the access layer, a communication path is established between the terminal and the core network, thereby realizing the signaling flow of the non-access layer.
In the signaling flow through the access layer and the non-access layer, the radio resource management is a very important ring in the mobile communication network, which is to improve the utilization rate of the radio frequency spectrum to the greatest extent under the condition of limited bandwidth, prevent the network congestion and keep the signaling load as small as possible, and provide the service quality guarantee for the wireless user terminal in the network. The control of radio resources involves processing of various radio resources, for example, processing of system messages, connection control, mobility management, measurement, and the like.
In the above process of processing the radio resource, a signaling flow in the access stratum includes: paging (Paging) procedure, radio resource Connection establishment (RRC Connection establishment), initial security activation (Initial AS security activation) procedure, radio resource Reconfiguration (RRC Reconfiguration) radio resource Connection Release (RRC Connection Release) procedure, and the like. The flow of the method in the non-access layer mainly comprises the mobility management of the circuit domain, the call control of the circuit domain, the mobility management of the packet domain and the session management of the packet domain.
In the next generation (NR) mobile communication network, for example, during the processing of radio resources, the network needs to establish RRC connection with the terminal before communication of control signaling and service data is performed.
Fig. 3 is a schematic diagram of a RRC connection state transition procedure according to an embodiment of the present application. As shown in fig. 3, the terminal and the network may enter different RRC connected states, including: IDLE (RRC _ IDLE) and CONNECTED (RRC _ CONNECTED), reasons may include mobility changes or traffic triggers, etc.
Taking the terminal and the base station as an example, the terminal is in the RRC _ IDLE state at the first time. When the scene changes, such as registration or service triggering, the terminal establishes a link with the base station and changes from the RRC _ IDLE state to the RRC _ CONNECTED state. Fig. 4 is a schematic flowchart of RRC connection establishment according to an embodiment of the present application, where UE refers to a terminal device, NW refers to a network, and the schematic flowchart is generally used in subsequent processes. Fig. 4 indicates the flow of the terminal from the RRC _ IDLE state to the RRC _ CONNECTED state:
step 401, the terminal sends an RRC Connection Setup Request (RRC Connection Setup Request) to the base station, where the RRC Connection Setup Request is used to Request to establish an RRC Connection with the base station.
Step 402, the terminal receives an RRC Connection Setup (RRC Connection Setup) message from the base station, where the RRC Connection Setup message is used to respond to the RRC Connection Setup request.
Step 403, the terminal sends an RRC Connection Setup Complete (RRC Connection Setup Complete) message to the base station, where the RRC Connection Setup Complete message is used to indicate that the RRC Connection Setup between the terminal and the base station is Complete.
When the terminal receives the RRC connection setup message, the connection state is changed from the RRC _ IDLE state to the RRC _ CONNECTED state. The terminal sending the RRC connection setup complete message means that the RRC connection setup is complete, and the terminal may return to the RRC _ IDLE state only if the connection is released, in such a manner that the terminal receives the RRC connection release message from the base station. In the prior art, a base station side starts a timer, and when communication interaction with a terminal stops exceeding a certain threshold, an RRC connection release message is issued.
The terminal releases the RRC connection to enter the RRC _ IDLE state under two conditions, one of which can be selected to satisfy: 1. the wireless link is not normally connected; 2. the terminal receives an RRC Connection Release message.
The RRC connection establishment request, the RRC connection establishment message, the RRC connection establishment completion message, and the RRC connection release message all belong to control signaling of an RRC layer, and are transmitted using a Signaling Radio Bearer (SRB). In wireless communications, a variety of SRBs are defined, mainly SRB0, SRB1, and SRB2.
SRB0 is a default established radio bearer without integrity protection and ciphering processes, such as the RRC connection setup request and RRC connection setup messages described above.
The SRB1 is configured to send an RRC signaling message, and is configured to indicate a state and a change of an RRC connection, such as an air interface node configuration and a link handover. The signaling carried by the method comprises the RRC connection establishment completion message and the RRC connection release message.
SRB2 is used to send RRC messages containing the recorded measurement information and NAS layer messages, and may offload signaling load of SRB 1. In addition, the RRC layer also transfers user plane data downward, which is handled by a Data Radio Bearer (DRB). Among these, SRB1, SRB2, and DRB generally require integrity protection and encryption protection.
To achieve integrity protection and ciphering protection, the terminal needs to perform security mode activation with the base station, i.e., activate AS initial security. The AS layer security function refers to integrity protection and encryption protection of control plane RRC signaling and encryption protection of user plane data.
For a terminal in an RRC _ CONNECTED state, an initial security activation procedure of an AS includes: an initial security activation success procedure and an initial security activation failure procedure. Fig. 5 shows an AS initial security activation process provided in an embodiment of the present application, where fig. 5 (a) shows a successful initial security activation process, and fig. 5 (b) shows a failed initial security activation process.
AS can be seen from the figure, the terminal first receives a Security Mode Command (SMC) message from the network, where the SMC message is carried by the SRB1 and carries relevant Security parameters of the AS for Security Mode activation.
The related security parameters of the AS comprise a key group, an integrity protection algorithm and an encryption protection algorithm. Wherein the key group comprises a root key, an integrity protected and an encryption protected algorithm key, the latter is composed of a root key K asme And (3) derivation. Root key K asme And managing and generating by the mobility management entity. When the root key changes, the AS layer security algorithm key derived from the root key changes accordingly. It should be noted that the change is synchronized between the terminal and the network, so that the integrity protection mechanism and the confidentiality protection mechanism can be guaranteed to operate normally.
Obtaining of algorithm key of AS layer integrity protection and encryption protection based on K asme And an uplink NAS count value(namely, a non-access stratum UPLINK message counting sequence value) (NAS UPLINK COUNT), calculating the access stratum root key by the non-access stratum UPLINK message counting sequence value and the NAS UPLINK COUNT to obtain the access stratum root key, and then calculating the security algorithm key of the AS layer by the access stratum root key.
When the terminal accesses the network, the network is configured by the MME to select the corresponding integrity algorithm, encryption and decryption algorithm and K asme And then informing the terminal of the security algorithm through the SMC, wherein the security algorithm comprises an integrity algorithm and an encryption algorithm. At the same time, the terminal is based on K asme And generating an AS layer security key by the security algorithm and the NAS UPLINK COUNT, wherein the AS layer security key comprises a control plane integrity protection key, an encryption key and a user plane encryption and decryption key. And finally, the terminal verifies the integrity of the SMC message based on the integrity protection key and the algorithm, and updates the security parameters if the verification is passed. Therefore, if the security parameters of the terminal are updated, the terminal is considered to be successfully activated, otherwise, the terminal is failed to activate the security mode.
The terminal successfully activates the Security Mode, and sends a Security Mode Complete message to the network to confirm successful activation of the AS Security, see fig. 5 (a). And the terminal configures the updated key group, the integrity protection algorithm and the encryption algorithm.
If the terminal Security Mode fails to be activated, a Security Mode Failure (Security Mode Failure) message is sent to the network to indicate that the AS Security fails to be activated, see fig. 5 (b). The terminal security mode activation failure situations mainly include: and the network and the terminal are used for deducing the inconsistency of the uplink NAS count values of the key group and the like.
The failure of the activation of the AS security may cause that the terminal and the network cannot establish SRB2 and DRB, i.e. the exception after the failure of the activation of the security mode. Since the DRB is used for carrying data service information and voice information, the configuration failure of the DRB causes the data service and the voice call of the user to be unable to be performed normally. Therefore, after the terminal fails to activate the security mode, the terminal enters an abnormal state in which the user service cannot be normally performed, and the service experience of the user is further influenced.
In the prior art, the configuration procedure of the DRB is fixed on the premise of RRC connection completion and successful security mode activation. According to the specification of the 3gpp 38.331, the terminal needs to end the SMC procedure after the security mode activation fails. After the SMC flow is finished, the terminal is still maintained in the RRC _ CONNECTED state and does not have the condition of initiating an RRC connection establishment request to the base station; and the terminal can initiate an RRC connection reestablishment request to the base station only when certain conditions are met, such as radio link abnormity and the like. Therefore, the terminal cannot restart the security mode activation from the master by reestablishing the RRC connection, which results in that DRB configuration cannot be performed and user services cannot be performed.
In the prior art, a terminal may convert an RRC connection state of the terminal into an RRC _ IDLE state by receiving an RRC connection release message sent by a base station. When the terminal is in the RRC _ IDLE state, it may actively send an RRC connection establishment request to the network through random access again through subsequent service requirements, such as data service or voice call. After the terminal completes the RRC connection establishment with the network, the terminal may receive the SMC message from the network again, thereby initiating the AS initial security activation again. When uncontrollable conditions such as network congestion or data packet loss occur, the RRC connection release message cannot reach the terminal in time, which may cause the blocking and uncontrollable service. As can be seen from the above, in the prior art, restarting the security mode activation requires the terminal to passively wait for the network to issue an RRC connection release message, thereby further establishing a DRB and resuming normal operation of the user service.
To solve the above problems, the general idea of the embodiments of the present application is as follows: the terminal can initiate a random access process to the network under the condition that the RRC connection release message is not received, and respond to the existing or new service requirement in time, so that the normal operation of user services is accelerated, wherein the services comprise but not limited to data communication, voice call, registration and the like which are actively initiated by the terminal.
Fig. 6 is a block flow diagram of active recovery of an exception after a failure of activating a security mode according to an embodiment of the present application. In the process, the terminal accesses the network again and establishes a communication link after the first AS security activation fails so AS to start the second AS security activation. The flow chart comprises the following steps:
step 601, the terminal receives a security mode command from the network, wherein the security mode command is used for providing information of security activation of an access layer.
Step 602, the terminal sends a security mode failure message to the network, where the security mode failure message is used to indicate that the security mode activation fails.
Step 603, the terminal initiates a random access procedure to the network to establish a new RRC connection when the terminal does not receive the RRC connection release message from the network.
After the terminal completes establishment of RRC connection with the network, AS shown in step 601, the terminal receives a security mode command, where an AS security parameter carried by the security mode command is used to instruct security activation; when the security mode activation fails, the terminal sends a security mode failure message to the network as shown in step 602, for indicating that the security mode activation failed this time. In this case, the network should normally send an RRC connection release message for instructing the terminal to release the current RRC connection resource and transition to the RRC _ IDLE state. However, the terminal delays or fails to receive the RRC connection release message due to various reasons such as network failure.
In order to reduce the dependence of the terminal on the RRC connection release message issued by the network and improve the robustness of communication, the embodiment of the present application provides a technical solution that the terminal can initiate a random access procedure even when the terminal does not receive the RRC connection release message, as described in step 603. The situations that the terminal sends the security mode failure message to the network and does not receive the RRC connection release message from the network may include the following situations:
1. and the terminal actively initiates a random access process to the network after sending the security mode failure message to the network. That is, after the terminal sends the security mode failure message, it can autonomously initiate a random access procedure without trying to receive an RRC connection release message issued by the network, so as to establish a new RRC connection. In this case, since the terminal does not need to wait for the receiving network to issue the RRC connection release message, the scheme can make it more quickly reestablish the RRC connection and perform security activation without depending on the network.
2. After sending the security mode failure message to the network, the terminal waits for a period of time, e.g., a first duration, during which it attempts to receive an RRC connection release message. If the terminal receives the expected RRC connection release message within the first duration, the terminal can normally enter an RRC idle state according to the existing standard protocol, and then the RRC connection is reestablished. If the terminal does not receive the expected RRC connection release message within the first duration, the terminal can autonomously initiate a random access procedure to establish a new RRC connection. Under the condition, the random access process is automatically initiated by the terminal by introducing a period of waiting (first time duration), so that the random access process is compatible with the existing standard protocol and can also be used as a product implementation scheme.
3. And after the terminal sends a security mode failure message to the network, the terminal tries to receive an RRC connection release message. If the downlink message received by the terminal subsequently is an RRC connection release message, the terminal may normally enter an RRC idle state according to the existing standard protocol, and then re-establish an RRC connection. If the downlink message (e.g., the first RRC message) received by the terminal is not an RRC connection release message, the terminal may then autonomously initiate a random access procedure to establish a new RRC connection. Under the condition, other downlink messages except the RRC connection release message are identified as trigger conditions, the existing standard protocol can be compatible, the scheme can also be used as another product implementation scheme, and when the existing standard protocol cannot solve the problem, the random access flow is automatically initiated through the terminal, so that the time delay of network connection recovery and safety activation is reduced.
It should be understood that the above 3 cases are only some possible cases of the embodiments of the present application, and do not limit the applicable cases of the embodiments of the present application. The above-mentioned 3 cases may be combined with each other. For example, the latter 2 cases may be considered that after combination, that is, if other RRC messages are received within the first time period, the terminal may autonomously initiate the random access procedure.
On the basis of the embodiment shown in fig. 6, the following will describe the embodiment of the present application in conjunction with a specific message interaction flow. Fig. 7 is a schematic flow chart illustrating active recovery of an exception after a failure of activating a security mode according to an embodiment of the present application. The message interaction enclosed by the dashed line box belongs to the random access procedure in step 703. The method can comprise the following steps:
step 701, the terminal receives a security mode command from the network.
Step 702 and the terminal sends a security mode failure message to the network.
Step 703, after sending the security mode failure message to the network and without receiving the RRC connection release message from the network, initiating a random access procedure to the network.
Step 704, the terminal receives the RRC connection setup message from the network.
Step 705, the terminal sends an RRC connection setup complete message to the network.
Step 706, the terminal receives a new security mode command from the network.
The above steps 701, 702 and 703 may refer to steps 601, 602 and 603, which are not described herein again.
In addition, in step 703, in the case that the RRC connection release message is not received, the terminal initiates a random access procedure and re-accesses the network. The initiation of the random access procedure is as shown in the figure, and mainly includes four message interactions: the terminal sends a random access preamble message, receives a random access preamble response message, sends an uplink message (here, the uplink message is an RRC connection establishment request), and receives a contention resolution message. Through the random access procedure, the terminal can synchronize with the network and obtain uplink resources, and here, the terminal starts the random access procedure to send an RRC connection establishment request to the network, thereby establishing a new RRC connection.
In the above embodiment, under the condition that multiple RRC connection release messages are not received, the starting of the random access procedure by the terminal may also be divided into two types according to the time when the terminal sends the random access preamble message:
1. the terminal immediately transmits a random access preamble message. And the terminal immediately starts a random access flow after receiving various situations of the RRC connection release message, and immediately sends a random access preamble message to the network for acquiring uplink resources and requesting the network to establish RRC connection. Under the condition, the recovery speed of RRC connection between the terminal and the network can be maximized, and the service experience of the user is optimized.
2. The terminal transmits the random access preamble message non-immediately. One of the implementation modes can be seen in fig. 8, and the specific steps are as follows:
step 802, the terminal sends a security mode failure message to the network.
Step 803 includes the following steps:
step 8031, the terminal enters RRC _ IDLE state.
Step 8032, the terminal initiates a random access procedure to the network according to the service requirement, where the random access procedure includes sending a random access preamble message, and the random access procedure is used to establish a new RRC connection.
In step 8031, the terminal actively releases the current RRC connection and enters the RRC _ IDLE state after receiving no RRC connection release message. If the terminal receives the RRC connection release message in the RRC _ IDLE state, the message cannot be delivered to the RRC layer in the IDLE state, and the terminal discards the message and does not perform its corresponding operation. After the terminal is in the RRC _ IDLE state, it can respond to the new service requirement. When a service requirement occurs, such as voice call or data service, the terminal is triggered by the service requirement to start a random access procedure so as to establish a new RRC connection. If in the process, namely the terminal initiates the random access process and before the new RRC connection is established, the terminal receives the RRC connection release message, discards the message and does not execute the corresponding operation.
In this case, the terminal first enters the RRC idle state and sends the random access preamble message non-immediately, so that the speed of re-accessing the network without a service requirement can be reduced, power consumption in a scene can be effectively reduced, a generated service requirement is responded in time, and a time delay for recovering network connection is reduced.
After the terminal establishes uplink synchronization, the network receives the RRC connection establishment request sent by the terminal, reconfigures related parameters of the RRC connection, and sends the parameters to the terminal through an RRC connection establishment message, as shown in step 704.
In step 705, after receiving the RRC connection establishment message, the terminal applies the configuration carried by the RRC connection establishment message and sends an RRC connection establishment completion message to the network to indicate that the RRC connection is successfully established. Up to this point, the new RRC connection between the terminal and the network is established, as well as the SRB1 carrying the signaling traffic.
According to the protocol, the network issues the SMC message again, in step 706, to instruct the terminal to perform a new security mode activation to activate AS security and establish communication bearers of SRB2 and DRB.
Therefore, the terminal actively sends the random access preamble and establishes RRC connection with the network again under the conditions that the previous security activation fails and the RRC connection release message is not received, so as to promote the new security activation and accelerate the normal operation of the service.
In view of the repeatability of steps 701, 704, 705, and 706 for the following embodiments, they are not described in detail in other embodiments.
Furthermore, it should be understood that the above 2 cases are only some possible cases of the embodiments of the present application, and do not limit the cases to which the embodiments of the present application are applicable. Moreover, the 2 cases in the above example may be combined with the aforementioned "case that the terminal does not receive the RRC connection release message from the network after sending the security mode failure message to the network", so as to expand the implementation manner.
Fig. 9 is a schematic flow chart illustrating active recovery of an exception after a failure of activating a security mode according to an embodiment of the present application. The schematic flow chart corresponds to a situation that after the terminal sends the security mode failure message, the RRC connection release message issued by the network is not received within the first time period, and the specific implementation of the first time period can be achieved by a timing module, for example, a timer is set, so the flow chart includes the following steps:
step 902, the terminal sends a security mode failure message to the network.
Step 903 comprises the following steps:
step 9031, the terminal starts a timer, and the duration of the timer is the first duration.
Step 9032, the terminal initiates a random access to the network when the timer is over, where the random access is used to request uplink resources, thereby sending an RRC connection establishment request.
After the terminal completes sending the security mode failure message, as shown in step 9031, the terminal starts a timer, where a duration of the timer is the first duration. The timer may be a forward timer or a reverse timer. The terminal detects whether an RRC connection release message from the network is received within a first time period.
If so, the process is performed according to the subsequent procedure of the RRC connection release message in the prior art.
If the terminal does not receive the message, the terminal stops waiting for the RRC connection release message. The terminal terminates the timer and initiates random access to the network.
The value of the first duration may be set to a fixed value, or may be adjusted, where the adjustment mode includes dynamic adjustment or one of multiple configurable values, and the minimum unit of adjustment may be an international unit system, such as 1ms, or a Transmission Time Interval (TTI) in a communication protocol, which is used to indicate that no RRC connection release message is received in a plurality of TTIs. For example, the value range of the first duration may be controlled to be between 100ms and 3000ms, and if the power consumption problem of the mobile terminal is emphasized, the value of the first duration may be reduced, for example, 100ms may be adopted; when the network condition of extreme severe is faced, that is, the RRC connection release message is received slowly, it should be considered to reduce the signaling interaction with the network, and the value of the first duration may be increased, for example, 3000ms. In addition, the adjustment basis of the value can also comprise: and counting service requirements or big data according to the number of times of RRC connection establishment failure sensed by the terminal.
And if the terminal receives the RRC connection release message after the first time period and a new RRC connection is not established currently, discarding the RRC connection release message and continuing to execute a random access process, wherein the random access process is used for establishing the new RRC connection.
According to the scheme, under the condition that the security activation fails, the terminal can recover from the failure according to the time length when the RRC connection release message is not received, namely the self timer, the random access process is started, the new RRC connection establishment and security mode activation are promoted, and the service can be normally carried out.
Fig. 10 is a schematic flow chart of active recovery of an exception after failure of activation of another security mode according to the embodiment of the present application. This flowchart corresponds to a case where the received downlink message is not an RRC connection release message after the terminal has sent the security mode failure message. The terminal may receive other messages sent by the network without receiving the RRC connection release message. Since the terminal fails to configure AS security, the terminal cannot decode signaling messages carried by SRBs other than SRB0 and data messages carried by DRBs. Taking the RRC message as an example, wherein the RRC message received by the terminal mainly includes a signaling message (such as an RRC connection reconfiguration message) carried by the SRB and a signaling message (such as a system message block) that is not protected in the transparent mode, the foregoing procedure includes the following steps:
step 1002, the terminal sends a security mode failure message to the network.
Step 1003 includes the following steps:
step 10031 is to receive, after sending the security mode failure message to the network, other RRC messages except the RRC connection release message from the network.
Step 10032, initiating a random access procedure to the network, where the random access procedure is used to request reestablishment of an RRC connection.
In step 10031, after the network receives the security mode failure message, it should issue an RRC connection release message. The foregoing case that the received downlink message is not an RRC connection release message means that the RRC message received by the terminal is not considered as an RRC connection release message, and specifically may be regarded as including two cases:
1. the received RRC message is an RRC connection release message, but a decoding failure of the message may occur due to network transmission, internal processing, and the like. That is, the terminal cannot recognize it as the RRC connection release message.
2. The received RRC message is the other RRC message other than the RRC connection release message. The RRC message sent by the network is a message carried by the SRB and related to non-service content, and includes, for example, an RRC connection reconfiguration message, an NAS direct transfer message, and the like.
From the above two cases, it can be seen that, for the terminal, when it receives any other RRC message from the network, which is not an RRC connection release message, after sending the security mode failure message, it can mark it as an RRC connection release message with decoding error, and delete the original RRC connection configuration. In this procedure, the terminal does not perform any operation indicated by the received RRC message. And then, a random access flow is initiated to the network, and a new RRC connection is applied to be established, so that a new security activation is executed after the RRC connection is established. After the security mode is successfully activated, the DRB can be established and the normal operation of the user service can be recovered.
In the above embodiment, in case of a security activation failure, the terminal regards all RRC messages from the network that are not RRC connection release messages as decoding error RRC connection release messages for subsequent processing, instead of deleting the RRC connection configuration limited to the RRC connection release messages, thereby reducing the dependence on the network and speeding up the establishment of RRC connection and normal recovery of services.
Fig. 11 is a schematic flow chart of active recovery of an exception after failure of activation of another security mode according to the embodiment of the present application. The flow diagram is that after the terminal sends the failure message of the security mode, under the condition of not trying to receive the RRC connection release message sent by the network, the method mainly comprises the following steps:
step 1102, the terminal sends a security mode failure message to the network.
Step 1103, after sending a security mode failure message to a network, a terminal directly initiates a random access procedure to the network, where the random access procedure is used to request reestablishment of an RRC connection.
After the terminal sends the security mode failure message to the network, the terminal can directly initiate a random access process to the network without waiting for the response of the network, namely, without trying to receive an RRC connection release message from the network. It should be noted that the attempt to receive does not refer to physically shutting down the terminal's ability to receive downlink messages, or disregarding all messages received by the terminal, but rather makes the subsequent "initiate random access procedure to the network" dependent on the completion of the aforementioned "send security mode failure message to the network", the reception of a non-RRC connection release message. I.e. the terminal relies on itself rather than the release of the network. The terminal directly initiates a random access procedure to the network, which can be divided into the following two cases:
1. and after sending the security mode failure message to the network, the terminal immediately initiates a random access flow to the network. Since the security mode failure message sent in step 1102 indicates that the previous communication connection establishment of the terminal with the network failed, this also represents that the previous service requiring establishment of the RRC connection is not satisfied. In order to meet the previous service requirement, the terminal can start the random access process immediately after sending the security mode failure message, so as to shorten the abnormal time of the service. Common application scenarios are as follows: in the process of a call or a data service, when a terminal fails to activate the security mode, the terminal immediately and directly sends a random access preamble message to the network and deletes the original RRC connection configuration after sending a security mode failure message, so that the RRC connection with the network and the service recovery speed are maximized, and the user experience is optimized.
2. The terminal initiates a random access flow to the network non-immediately after sending a security mode failure message to the network. The terminal ignores the previous service requirement, if the terminal fails to activate the security mode in the switching process and has no voice or data service in progress, the terminal can firstly release the RRC connection after sending the security mode failure message, change the RRC connection state of the terminal into the RRC idle state, and when the service requirement exists later, such as calling or data interaction, then applies for access to the network, and recovers the RRC connection. Under the condition, the terminal actively enters an RRC _ IDLE state, responds to the service requirement and carries out a random access process, and network access is carried out according to the condition of the service requirement on the premise of not depending on RRC release information of the network, so that normal operation of the service is accelerated. In addition, the terminal can also effectively reduce power consumption in a scene by actively entering the RRC _ IDLE state in time.
After receiving the security mode failure message, the network issues an RRC connection release message, and directly deletes the existing RRC connection configuration in the network without waiting for the terminal to perform a reply acknowledgement, i.e., does not schedule retransmission of the RRC connection release message. Therefore, after receiving the security mode failure message and the random access preamble message, the network executes the corresponding random access process according to the normal sequence, thereby establishing RRC connection with the terminal.
If the terminal receives the RRC connection release message before establishing a new RRC connection, the terminal cannot deliver the RRC connection release message to the RRC layer because the RRC connection configuration is deleted, and therefore discards the message and continues to perform a random access procedure, where the random access procedure is used to establish the new RRC connection.
It can be known from the above that, the terminal directly initiates the random access procedure to the network after sending the security mode failure message, does not attempt to receive the message issued by the network, and depends on the operation of sending the security mode failure message or the triggering of the service requirement on the operation of starting the random access, thereby reducing the dependency on the network, and thus implementing active recovery from the situation of security activation failure, accelerating RRC connection reestablishment, and reducing the time for abnormal service.
A wireless communication apparatus according to an embodiment of the present application is described below.
Referring to fig. 12, which is a schematic block diagram of a wireless communication device according to an embodiment of the present disclosure, the communication device 1200 includes a processing unit 1210 and a transceiver unit 1220, which are connected by a line. The wireless communication device is used for realizing the steps of the corresponding terminal in the embodiments:
the processing unit 1210 is configured to control the transceiver unit 1220 to perform communication with a network; and the control unit is used for controlling the transceiver unit to start a random access process when the service requirement is sensed, so as to establish RRC connection with the network.
A transceiving unit 1220, configured to receive a security mode command from a network, where the security mode command is used to provide information of access stratum security activation; sending a security mode failure message; and starting a random access process.
In a possible implementation method, the transceiver 1220 is further configured to initiate a random access procedure to the network if an RRC connection release message from the network is not received within a first duration after the security mode failure message is sent.
In a possible implementation method, the processing unit 1210 further includes a timer, and is configured to start the timer after sending the security mode failure message, where a duration of the timer is the first duration.
In a possible implementation method, the transceiver 1220 is further configured to initiate a random access procedure to the network when receiving an RRC message other than the RRC connection release message from the network after sending the security mode failure message.
In one possible implementation, the other RRC message includes an RRC connection reconfiguration message.
In a possible implementation method, the transceiving unit 1220 is further configured to actively initiate a random access procedure to the network after sending the security mode failure message.
In a possible implementation method, the processing unit 1210 is further configured to actively release occupied RRC resources, and control the communication apparatus 1200 to enter an RRC idle state; the transceiver 1220 is further configured to send a random access preamble message when there is a service requirement after the communication apparatus 1200 enters the RRC idle state after sending the security mode failure message and without receiving the RRC connection release message.
In each of the above embodiments, the transceiver 1220 may be divided into one receiver and one transmitter, and each may have a function of receiving and transmitting, and is not limited here.
Optionally, the communication device may further include a storage unit, which is used for storing data or instructions (also referred to as codes or programs), and the units may interact with or be coupled with the storage unit to implement corresponding methods or functions. The coupling in the embodiments of the present application is an indirect coupling or a communication connection between devices, units or modules, and may be an electrical, mechanical or other form for information interaction between the devices, units or modules.
In the embodiment of the present application, the division of the units in the communication device is only a division of logical functions, and may be wholly or partially integrated into one physical entity or may be physically separated in actual implementation. And the units in the communication device can be realized in the form of software called by the processing element; or may be implemented entirely in hardware; part of the units can also be realized in the form of software called by a processing element, and part of the units can be realized in the form of hardware. For example, each unit may be a processing element separately set up, or may be integrated into a chip of the communication apparatus, or may be stored in a memory in the form of a program, and a processing element of the communication apparatus calls and executes the function of the unit. In addition, all or part of the units can be integrated together or can be independently realized. The processing element described herein, which may also be referred to as a processor, may be an integrated circuit having signal processing capabilities. In the implementation process, the steps of the method or the units above may be implemented by integrated logic circuits of hardware in a processor element or in a form called by software through the processor element.
In one example, the units in any of the above communication devices may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), or a combination of at least two of these integrated circuit formats. As another example, when a unit in a communication device may be implemented in the form of a processing element scheduler, the processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor that may invoke a program. As another example, these units may be integrated together and implemented in the form of a system-on-a-chip (SOC).
Referring to fig. 13, a schematic structural diagram of a wireless communication apparatus provided in this embodiment of the present application is shown, where the wireless communication apparatus may be a wireless communication apparatus or a network device, or may be a chip or a circuit, such as a chip or a circuit that can be disposed in the wireless communication apparatus, or further such as a chip or a circuit that can be disposed in the network device, for implementing the method in the foregoing method embodiment. As shown in fig. 13, the communication apparatus 1300 includes: the processor 1310 and the transceiver 1330, and optionally the communication device 1300 further includes a memory 1320, the memory 1320 not necessarily being shown in phantom. The transceiver 1330 is used to enable communication with other devices. The processor 1310, the memory 1320, and the transceiver 1330 may be connected by a bus to communicate data.
It is to be understood that the processor 1310 may be a chip. For example, the processor 1310 may be a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), a system on chip (SoC), a Central Processing Unit (CPU), a Network Processor (NP), a digital signal processing circuit (DSP), a Microcontroller (MCU), a Programmable Logic Device (PLD), or other integrated chips.
In implementation, the steps of the method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 1310. The steps of a method disclosed in connection with the embodiments disclosed herein may be embodied directly in a hardware processor, or in a combination of hardware and software modules within the processor 1310. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 1320, and the processor 1310 reads the information in the memory 1320, and performs the steps of the above method in combination with the hardware thereof.
In particular, the functions of the processing unit 1210 in fig. 12 and the implementation thereof may be implemented by the processor 1310 in the communication device 1300 illustrated in fig. 13 calling computer executable instructions stored in the memory 1320. Alternatively, the function/implementation procedure of the transceiving unit 1220 in fig. 12 may be implemented by the transceiver 1330 in the communication apparatus 1300 shown in fig. 13.
It should be noted that the processor 1310 in the embodiment of the present application may be an integrated circuit chip having signal processing capability. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The processor described above may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may be located in ram, flash, rom, prom, or eprom, registers, etc. as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
In embodiments of the present application, the memory 1320 may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of example, and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic Random Access Memory (SDRAM), double data rate SDRAM (DDR SDRAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In the case where the communication apparatus 1300 corresponds to the wireless communication apparatus in the above method, the communication apparatus may include a processor 1310, a transceiver 1330, and a memory 1320. The memory 1320 is configured to store instructions, and the processor 1310 is configured to execute the instructions stored in the memory 1320, so as to implement the steps performed by the wireless communication apparatus in any one or more corresponding methods shown in fig. 6 to 10.
Those of ordinary skill in the art will understand that: various numbers of the first, second, etc. mentioned in the embodiments of the present application are only for convenience of description and distinction, and are not used to limit the scope of the embodiments of the present application, and also represent a sequence order. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one" means one or more. At least two means two or more. "at least one," "any," or similar expressions refer to any combination of these items, including any combination of item(s) or item(s). For example, at least one (one ) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple. "plurality" means two or more, and other terms are analogous.
It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
The technical scheme provided by the embodiment of the application can be wholly or partially realized through software hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, a terminal device, a network device, an artificial intelligence device, or other programmable apparatus. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device including one or more available media integrated servers, data centers, and the like. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
In embodiments of the present application, various embodiments may be referred to one another, for example, methods and/or terms between method embodiments may be referred to one another, for example, functions and/or terms between apparatus embodiments and method embodiments may be referred to one another.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (20)

  1. A method of wireless communication, comprising:
    receiving a security mode command from a network, the security mode command for providing information of access stratum security activation;
    sending a security mode failure message to the network, the security mode failure message indicating a security activation failure; and
    and initiating a random access process to the network to establish a new RRC connection under the condition that a Radio Resource Control (RRC) connection release message from the network is not received after a security mode failure message is sent to the network.
  2. The method of claim 1, wherein:
    after sending a security mode failure message to the network and without receiving an RRC connection release message from the network, initiating a random access procedure to the network, comprising:
    and in the first time period after the security mode failure message is sent to the network, initiating a random access process to the network under the condition that an RRC connection release message from the network is not received.
  3. The method of claim 2, further comprising:
    and starting a timer after the safety mode failure message is sent, wherein the duration of the timer is the first duration.
  4. The method of claim 3, wherein:
    the value of the first duration is one of a plurality of configurable values.
  5. The method of claim 1, wherein:
    after sending a security mode failure message to the network and without receiving an RRC connection release message from the network, initiating a random access procedure to the network, including:
    and after the security mode failure message is sent to the network, initiating a random access process to the network under the condition of receiving other RRC messages except the RRC connection release message from the network.
  6. The method of claim 5, wherein:
    the other RRC message includes an RRC connection reconfiguration message.
  7. The method of claim 1, wherein:
    after sending a security mode failure message to the network and without receiving an RRC connection release message from the network, initiating a random access procedure to the network, including:
    and actively initiating a random access process to the network after sending a security mode failure message to the network.
  8. The method according to any one of claims 1 to 7, wherein:
    after sending a security mode failure message to the network and without receiving an RRC connection release message from the network, initiating a random access procedure to the network, including:
    and after the security mode failure message is sent to the network and the RRC connection release message from the network is not received, the RRC idle state is firstly entered, and a random access preamble is sent to the network according to the service requirement.
  9. A wireless communications apparatus, comprising:
    a processing unit and a transceiver unit;
    wherein, the processing unit is used for controlling the transceiving unit, and the transceiving unit is used for:
    receiving a security mode command from a network, the security mode command for providing information of access stratum security activation;
    sending a security mode failure message to the network, the security mode failure message indicating a security activation failure; and
    and initiating a random access process to the network to establish a new RRC connection under the condition that a Radio Resource Control (RRC) connection release message from the network is not received after a security mode failure message is sent to the network.
  10. The apparatus of claim 9, wherein:
    the transceiver unit is configured to initiate a random access procedure to the network after sending a security mode failure message to the network and without receiving an RRC connection release message from the network, and includes:
    the receiving and sending unit is configured to initiate a random access procedure to the network in a first time period after the security mode failure message is sent to the network, in a case where an RRC connection release message from the network is not received.
  11. The apparatus of claim 10, wherein:
    the processing unit is further configured to start a timer after the transceiver unit sends the security mode failure message, where a duration of the timer is the first duration.
  12. The apparatus of claim 11, wherein:
    the processing unit is further configured to set a value of the first duration, where the value of the first duration is one of a plurality of settable values.
  13. The apparatus of claim 9, wherein:
    the transceiver unit is configured to initiate a random access procedure to the network after sending a security mode failure message to the network and without receiving an RRC connection release message from the network, and includes:
    the receiving and sending unit is used for initiating a random access process to the network under the condition that other RRC messages except the RRC connection release message from the network are received after the security mode failure message is sent to the network.
  14. The apparatus of claim 13, wherein:
    the other RRC message includes an RRC connection reconfiguration message.
  15. The apparatus of claim 9, wherein:
    the transceiver unit is configured to initiate a random access procedure to the network after sending a security mode failure message to the network and without receiving an RRC connection release message from the network, and includes:
    the receiving and sending unit is used for actively initiating a random access process to the network after sending a security mode failure message to the network.
  16. The apparatus according to any one of claims 9 to 15, wherein:
    the transceiver unit is configured to initiate a random access procedure to the network after sending a security mode failure message to the network and without receiving an RRC connection release message from the network, and includes:
    the receiving and sending unit is used for entering an RRC idle state firstly and sending a random access preamble to the network according to service requirements under the condition that an RRC connection release message from the network is not received after a security mode failure message is sent to the network.
  17. A wireless communications apparatus, comprising:
    a processor and a memory, wherein the memory is configured to store program instructions and the processor is configured to execute the program instructions in the memory to implement the method of any of claims 1 to 8.
  18. A wireless communications apparatus, comprising:
    processing circuitry and interface circuitry; wherein the content of the first and second substances,
    the interface circuit is configured to couple to a memory external to the wireless communication device and to provide a communication interface for the processing circuit to access the memory;
    the processing circuitry is configured to execute program instructions in the memory to implement the method of any of claims 1 to 8.
  19. A computer-readable storage medium characterized by:
    the computer readable storage medium has stored therein program code which, when executed by a processor, implements the method of any of claims 1 to 8.
  20. A computer program product, characterized in that:
    the computer program product comprises program code which, when executed by a processor, implements the method of any one of claims 1 to 8.
CN202180016259.3A 2021-06-02 2021-06-02 Recovery method and device after security activation failure Pending CN115707358A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/097792 WO2022252133A1 (en) 2021-06-02 2021-06-02 Method and apparatus for recovery after security activation failure

Publications (1)

Publication Number Publication Date
CN115707358A true CN115707358A (en) 2023-02-17

Family

ID=84322656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202180016259.3A Pending CN115707358A (en) 2021-06-02 2021-06-02 Recovery method and device after security activation failure

Country Status (2)

Country Link
CN (1) CN115707358A (en)
WO (1) WO2022252133A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8195991B2 (en) * 2008-06-20 2012-06-05 Qualcomm Incorporated Handling of integrity check failure in a wireless communication system
US9788208B2 (en) * 2015-12-31 2017-10-10 Mediatek Inc. Apparatuses and methods for recovering from security mode command failures
CN108377494B (en) * 2016-11-22 2020-10-27 深圳市中兴微电子技术有限公司 Terminal abnormal flow protection method and device
CN107592620A (en) * 2017-08-31 2018-01-16 努比亚技术有限公司 A kind of method, terminal and the computer-readable recording medium of network signal interaction
CN115396927A (en) * 2018-12-29 2022-11-25 华为技术有限公司 Communication method and device

Also Published As

Publication number Publication date
WO2022252133A1 (en) 2022-12-08

Similar Documents

Publication Publication Date Title
CN109565896B (en) Low power RRC operation method and apparatus
CN112088542B (en) Method and apparatus for handling radio access network notification area (RNA) update configuration at rejection
US20200396652A1 (en) Method, apparatus, computer program product and computer program for conditional handover
CN108391321B (en) Apparatus and method for handling status mismatch in wireless communication system
CN110381554B (en) Communication method, device, system and computer storage medium
WO2021232202A1 (en) Method and apparatus for a master cell group
US20230362881A1 (en) Methods and apparatuses for a relay reselection and data transmission handling procedure in a ue-to-network relay scenario
WO2020088305A1 (en) Communication method, device, and system
US20230328828A1 (en) Methods and apparatuses for a relay reselection and connection handling procedure in a ue-to-ue relay scenario
CN110636572A (en) Communication method and device
US20220225128A1 (en) Information Update Method, Device, and System
US11895542B2 (en) Reducing handover interruption with two transmitters and receivers
WO2022236484A1 (en) Sdt failure reporting method, terminal device, and network device
CN116636253A (en) Mobility of small data transfer procedures
WO2023028991A1 (en) Method and apparatus for small data transmission
WO2022151239A1 (en) Method and apparatus for data transmission processing
CN115707358A (en) Recovery method and device after security activation failure
EP3844998A1 (en) User equipment context transfer over radio access network paging
WO2024020728A1 (en) Methods and apparatuses for simultaneous transmission on multiple paths
WO2023071752A1 (en) Sidelink transmission method and apparatus, network device, and terminal device
WO2023141905A1 (en) Methods and apparatuses for timers and behavior in l2 u2n relay case
WO2023137670A1 (en) Methods and apparatuses of a link management and mobility for ul aggregation
WO2022205344A1 (en) Method and apparatus for handling arrival of non-small data transmission
WO2023130274A1 (en) Connection establishment method and apparatus, computer device, storage medium, and program product
WO2022170545A1 (en) Radio link reestablishment method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination