CN117676572A - Cell selection method, device and terminal - Google Patents

Cell selection method, device and terminal Download PDF

Info

Publication number
CN117676572A
CN117676572A CN202211288068.5A CN202211288068A CN117676572A CN 117676572 A CN117676572 A CN 117676572A CN 202211288068 A CN202211288068 A CN 202211288068A CN 117676572 A CN117676572 A CN 117676572A
Authority
CN
China
Prior art keywords
signature information
information
terminal
system information
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211288068.5A
Other languages
Chinese (zh)
Inventor
何燃燃
郑倩
鲍炜
杨晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Publication of CN117676572A publication Critical patent/CN117676572A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a cell selection method, a cell selection device and a terminal, which belong to the technical field of communication, and the cell selection method in the embodiment of the application comprises the following steps: in the case that the first signature information is not verified or the terminal cannot acquire the first signature information, the terminal performs a first operation, where the first signature information includes at least one signature information, and the signature information is associated with at least one system information of the target cell, and the first operation includes at least one of: regarding the state of the target cell as a forbidden state; treating the target cell as an acceptable cell; cell selection or reselection is performed.

Description

Cell selection method, device and terminal
Technical Field
The application belongs to the technical field of communication, and particularly relates to a cell selection method, a cell selection device and a terminal.
Background
In the related art, a base station transmits system information by a broadcasting method. The content of the system information is sent in clear and without security protection. If an illegal base station sends system information, a terminal residing under the illegal base station is instructed to perform certain operations (such as reselection according to the appointed frequency point priority), the terminal works according to the instruction of the illegal base station, which leads to the failure of the related strategy configured by an operator; even further, it is possible to induce the UE to access an illegal base station, causing unpredictable losses to the user. To avoid this, the base station may digitally sign the system information so that the UE verifies the legitimacy of the base station. However, when signature information verification of the system information is not passed, the terminal does not know how to perform subsequent processing.
Disclosure of Invention
The embodiment of the application provides a cell selection method, a cell selection device and a terminal, which can solve the problem that if signature information verification of system information is not passed, the terminal cannot clearly perform subsequent processing.
In a first aspect, a cell selection method is provided, applied to a terminal, and the method includes:
in the case that the first signature information is not verified or the terminal cannot acquire the first signature information, the terminal performs a first operation, where the first signature information includes at least one signature information, and the signature information is associated with at least one system information of the target cell, and the first operation includes at least one of:
regarding the state of the target cell as a forbidden state;
treating the target cell as an acceptable cell;
cell selection or reselection is performed.
In a second aspect, there is provided a cell selection apparatus comprising:
the processing module is configured to perform a first operation when the first signature information is not verified or the terminal cannot acquire the first signature information, where the first signature information includes at least one signature information, the signature information is associated with at least one system information of the target cell, and the first operation includes at least one of:
Regarding the state of the target cell as a forbidden state;
treating the target cell as an acceptable cell;
cell selection or reselection is performed.
In a third aspect, there is provided a terminal comprising a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor, implement the steps of the method as described in the first aspect.
In a fourth aspect, a terminal is provided, including a processor and a communication interface, where the processor is configured to perform a first operation if first signature information is not verified or the terminal cannot obtain the first signature information, where the first signature information includes at least one signature information, where the signature information is associated with at least one system information of a target cell, and the first operation includes at least one of:
regarding the state of the target cell as a forbidden state;
treating the target cell as an acceptable cell;
cell selection or reselection is performed.
In a fifth aspect, there is provided a readable storage medium having stored thereon a program or instructions which when executed by a processor realizes the steps of the method according to the first aspect.
In a sixth aspect, there is provided a chip comprising a processor and a communication interface coupled to the processor for running a program or instructions to implement the method of the first aspect.
In a seventh aspect, there is provided a computer program/program product stored in a storage medium, the computer program/program product being executed by at least one processor to carry out the steps of the method according to the first aspect.
In the embodiment of the present application, under the condition that the first signature information verification is not passed or the terminal cannot acquire the first signature information, the terminal performs a first operation, where the first operation includes at least one of regarding the state of the target cell as a forbidden state, regarding the target cell as an acceptable cell, and performing cell selection or reselection, that is, the embodiment of the present application provides a scheme that the terminal can perform a subsequent specific operation under the condition that the signature information verification of the system information is not passed, which is favorable for the terminal to select or reselect a legal cell, and improves the stability of terminal communication.
Drawings
FIG. 1 illustrates a block diagram of a communication system to which embodiments of the present application may be applied;
fig. 2 is a schematic flow chart of a cell selection method according to an embodiment of the present application;
fig. 3 shows a schematic block diagram of a cell selection apparatus according to an embodiment of the present application;
fig. 4 shows a block diagram of a communication device according to an embodiment of the present application;
fig. 5 shows a block diagram of the structure of a terminal according to an embodiment of the present application.
Fig. 6 shows a schematic flow chart of a cell selection method according to an embodiment of the present application.
Detailed Description
Technical solutions in the embodiments of the present application will be clearly described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application are within the scope of the protection of the present application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments of the application are capable of operation in sequences other than those illustrated or otherwise described herein, and that the terms "first" and "second" are generally intended to be used in a generic sense and not to limit the number of objects, for example, the first object may be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/" generally means a relationship in which the associated object is an "or" before and after.
It is noted that the techniques described in embodiments of the present application are not limited to long term evolution (Long Term Evolution, LTE)/LTE evolution (LTE-Advanced, LTE-a) systems, but may also be used in other wireless communication systems, such as code division multiple access (Code Division Multiple Access, CDMA), time division multiple access (Time Division Multiple Access, TDMA), frequency division multiple access (Frequency Division Multiple Access, FDMA), orthogonal frequency division multiple access (Orthogonal Frequency Division Multiple Access, OFDMA), single carrier frequency division multiple access (Single-carrier Frequency Division Multiple Access, SC-FDMA), and other systems. The terms "system" and "network" in embodiments of the present application are often used interchangeably, and the techniques described may be used for both the above-mentioned systems and radio technologies, as well as other systems and radio technologies. The following description describes a New air interface (NR) system for purposes of example and uses NR terminology in much of the description that follows, but these techniques are also applicable to applications other than NR system applications, such as generation 6 (6) th Generation, 6G) communication system.
Fig. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable. The wireless communication system includes a terminal 11 and a network device 12. The terminal 11 may be a mobile phone, a tablet (Tablet Personal Computer), a Laptop (Laptop Computer) or a terminal-side Device called a notebook, a personal digital assistant (Personal Digital Assistant, PDA), a palm top, a netbook, an ultra-mobile personal Computer (ultra-mobile personal Computer, UMPC), a mobile internet appliance (Mobile Internet Device, MID), an augmented reality (augmented reality, AR)/Virtual Reality (VR) Device, a robot, a Wearable Device (weather Device), a vehicle-mounted Device (VUE), a pedestrian terminal (PUE), a smart home (home Device with a wireless communication function, such as a refrigerator, a television, a washing machine, or a furniture), a game machine, a personal Computer (personal Computer, PC), a teller machine, or a self-service machine, and the Wearable Device includes: intelligent wrist-watch, intelligent bracelet, intelligent earphone, intelligent glasses, intelligent ornament (intelligent bracelet, intelligent ring, intelligent necklace, intelligent anklet, intelligent foot chain etc.), intelligent wrist strap, intelligent clothing etc.. Note that, the specific type of the terminal 11 is not limited in the embodiment of the present application. The network-side device 12 may comprise an access network device or a core network device, wherein the access network device 12 may also be referred to as a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or a radio access network element. Access network device 12 may include a base station, a WLAN access point, a WiFi node, or the like, which may be referred to as a node B, an evolved node B (eNB), an access point, a base transceiver station (Base Transceiver Station, BTS), a radio base station, a radio transceiver, a basic service set (Basic Service Set, BSS), an extended service set (Extended Service Set, ESS), a home node B, a home evolved node B, a transmission and reception point (Transmitting Receiving Point, TRP), or some other suitable terminology in the art, and the base station is not limited to a particular technical vocabulary so long as the same technical effect is achieved, and it should be noted that in the embodiments of the present application, only a base station in an NR system is described as an example, and the specific type of the base station is not limited.
Before proceeding with the description of specific embodiments of the present application, the following description is first made:
system information (System Information, SI):
the system information includes a master information block (Master Information Block, MIB) and a series of system information blocks (System Information Block, SIBs), which may be divided into Minimum system information (Minimum SI) and other system information (other SI):
the Minimum SI includes basic information required for cell access and contents of the scheduling other SI, including:
MIB: including cell forbidden (bar) state information and cell basic physical layer information required for further receiving system information;
SIB1: a scheduling information block indicating whether a terminal (UE) is allowed to access a cell and other SIBs;
other SI is other SIBs that are not minimal SI, for example:
system information block type 2 (SIB 2): common information for idle/inactive (idle) UEs to perform co-frequency/inter-system cell reselection;
system information block type 3 (SIB 3): information special for the same-frequency cell reselection of idle/inactive UE;
system information block type 4 (SIB 4): information special for idle/inactive UE to reselect different frequency cells;
system information block type 5 (SIB 5): information special for idle/inactive UE to reselect different system cells;
Etc.
Broadcast message security:
in the current network, the base station transmits system information by broadcasting. The content of the system information is sent in clear and without security protection. If an illegal base station sends system information, the terminal residing under the illegal base station is instructed to perform certain operations (such as reselection according to the designated frequency point priority), and the terminal operates according to the instruction of the illegal base station. This would lead to failure of the relevant policies of the operator configuration; even further, it is possible to induce the UE to access an illegal base station, causing unpredictable losses to the user. To avoid this transmission, the base station may digitally sign the system information so that the UE verifies the legitimacy of the base station.
System information signature:
the following steps verify the security of the broadcast message for the terminal:
the network calculates signature information corresponding to SIB X using one or more of the following inputs: SIB X, a signature key, information related to the SIB transmission time, etc.;
broadcasting signature information corresponding to the SIB X and the computed SIB X by a network; signature information is placed in SIB Y different from SIB X (i.e., a new SIB is introduced to send signature information);
the terminal receives SIB X and SIB Y, verifies the received SIB X with one or more of the following inputs: and SIB X, information related to the SIB X receiving time, signature information carried in the SIB Y and corresponding to the SIB X, and verifying the corresponding signature information.
The cell selection method provided by the embodiment of the application is described in detail below by some embodiments and application scenarios thereof with reference to the accompanying drawings.
As shown in fig. 2, an embodiment of the present application provides a cell selection method, including:
step 201: in the case that the first signature information is not verified or the terminal cannot acquire the first signature information, the terminal performs a first operation, where the first signature information includes at least one signature information, and the signature information is associated with at least one system information of the target cell, and the first operation includes at least one of:
regarding the state of the target cell as a forbidden state;
treating the target cell as an acceptable cell;
cell selection or reselection is performed.
In this step, the terminal may execute the first operation if the system information verification is not passed. That is, in the case where the first signature information verification is not passed, or in the case where the system information verification is not passed, the terminal performs at least one of the following operations:
the terminal regards the state of the target cell as (con 'barred'), and the terminal cannot select or reselect the target cell;
the terminal regards the target cell as an acceptable cell (acceptable cell can only provide emergency services);
The terminal performs cell selection or reselection.
As shown in fig. 6, an embodiment of the present application provides a cell selection method, including:
step 601: under the condition that the terminal cannot acquire first signature information, the terminal executes a first operation, wherein the first signature information comprises at least one piece of signature information, the signature information is associated with at least one piece of system information of a target cell, and the first operation comprises at least one of the following steps:
regarding the state of the target cell as a forbidden state;
treating the target cell as an acceptable cell;
cell selection or reselection is performed.
In this step, in the case where the terminal cannot acquire the first signature information, the terminal performs at least one of the following operations:
the terminal regards the state of the target cell as (con 'barred'), and the terminal cannot select or reselect the target cell;
the terminal regards the target cell as an acceptable cell (acceptable cell can only provide emergency services);
the terminal performs cell selection or reselection.
In this embodiment, the "verification" is digital signature (Digital signature, DS) verification.
The embodiment of the application provides a scheme how the terminal performs subsequent processing under the condition that signature information verification of system information is not passed or system information verification is not passed, so that the terminal can select or reselect a legal cell.
Optionally, the first operation includes cell selection or reselection, and the terminal performs cell selection or reselection according to at least one of:
the terminal excludes the target cell as a candidate cell for cell selection or reselection;
the terminal considers that the same-frequency reselection is allowed, or the terminal considers that the same-frequency reselection is not allowed;
the terminal does not apply the configuration in the main system information block MIB of the target cell;
the terminal does not apply the configuration in the system information block SIB1 of the target cell;
applying the configuration in the master system information block MIB of the target cell in case the second signature information verifies;
applying the configuration in the system information block SIB1 of the target cell in case the third signature information verification is passed;
the type of the system information associated with the first signature information;
wherein the second signature information is different from the first signature information, and the third signature information is different from the first signature information.
That is, in the case that the first signature information verification is not passed or the terminal cannot acquire the first signature information or the system information verification is not passed, the terminal performs cell selection or reselection including at least one of:
The terminal excludes the target cell as a candidate cell for cell selection or reselection, i.e. the terminal does not take the target cell as a candidate cell for cell selection or reselection, and the terminal cannot select or reselect the target cell;
the terminal considers that the same-frequency reselection is allowed, namely if the cell selection or reselection criteria are met, the terminal may select or reselect other cells with the same frequency as the target cell;
the terminal considers that the same-frequency reselection is not allowed, namely the terminal is not allowed to select or reselect other cells with the same frequency as the target cell, and only can select or reselect other cells with different frequencies from the target cell;
the terminal does not apply the configuration in the MIB of the target cell, and performs cell selection or reselection, for example, the terminal does not use the setting of the intra freqreselection in the MIB of the follow target cell, or the terminal can ignore the setting of the intra freqreselection in the MIB;
the terminal does not apply the configuration in SIB1 of the target cell, and performs cell selection or reselection; for example, the terminal may ignore the PLMN in SIB1 of the target cell, and consider that the PLMN to which the target cell belongs is equivalent or not equivalent to the PLMN registered by the terminal or the selected PLMN;
in the case where the second signature information verification passes (the first signature information verification does not pass, but other signature information verification than the first signature information passes), the terminal applies the configuration in the MIB of the target cell, performs cell selection or reselection, for example, the terminal applies the configuration in the MIB of the target cell (for example, the setting of the terminal follow intraFreqReselection), performs cell selection or reselection;
In the case that the third signature information verification is passed (the first signature information verification is not passed, but other signature information verification than the first signature information is passed), the terminal performs cell selection or reselection by applying the configuration in SIB1 of the target cell, for example, the terminal performs cell selection or reselection based on whether or not the PLMN to which the target cell belongs is equivalent to the PLMN registered by the terminal or the selected PLMN;
the selection or reselection is performed based on the type of system information associated with the first signature information that is not verified.
Optionally, the terminal excludes the target cell as a candidate cell for cell selection or reselection, including:
the terminal excludes the target cell as a candidate cell for cell selection or reselection in a first time.
That is, in the case that the first signature information verification is not passed or the terminal cannot acquire the first signature information or the system information verification is not passed, the terminal excludes the target cell as a candidate cell for cell selection or reselection in a first time, where the first time may be agreed by a protocol or configured by a network, for example, the first time is a preset duration, such as 300s.
Optionally, the second signature information is associated with at least one of:
MIB of the target cell;
minimum system information of the target cell;
the optional third signature information is associated with at least one of:
SIB1 of the target cell;
and minimum system information of the target cell.
Wherein the minimum system information includes MIB and SIB1.
It should also be noted that the second signature information may also be associated with other system information than MIB and/or Minimum SI. The third signature information may also be associated with other system information than SIB1 and/or Minimum SI. That is, in the embodiment of the present application, one piece of signature information may correspond to one piece of system information or may correspond to a plurality of pieces of system information.
Specifically, the input parameters for verifying the second signature information include all system information associated with the second signature information, i.e., if the second signature information is associated with other system information (e.g., SIB2, SIB 3) in addition to MIB, the input parameters for verifying the second signature information should include MIB, SIB2, SIB3.
Specifically, the input parameters for verifying the third signature information include all system information associated with the third signature information, i.e., if the second signature information is associated with other system information (e.g., MIB, SIB3, SIB 4) in addition to SIB1, the input parameters for verifying the second signature information should include MIB, SIB3, SIB4.
Optionally, the terminal does not apply the configuration in the master system information block MIB of the target cell, including:
in case the first signature information comprises signature information associated with MIB or minimum system information, the terminal does not apply the configuration in the master system information block MIB of the target cell.
That is, the terminal does not apply the configuration in the MIB of the target cell, including one of:
in case that at least one signature information verification is not passed, the terminal does not apply the configuration in the target cell MIB;
in case that the signature information associated with the MIB does not pass, the terminal does not apply the configuration in the MIB of the target cell;
in case the signature information associated with the Minimum SI does not pass, the terminal does not apply the configuration in the target cell MIB.
Optionally, the terminal does not apply the configuration in the system information block SIB1 of the target cell, including:
in case the first signature information comprises signature information associated with SIB1 or minimum system information, the terminal does not apply the configuration in the system information block SIB1 of the target cell.
That is, the terminal should not apply the configuration in SIB1 of the target cell, including one of:
In case that at least one signature information verification is not passed, the terminal does not apply the configuration in the target cell SIB 1;
in case the signature information associated with SIB1 does not pass, the terminal does not apply the configuration in the target cell SIB 1;
in case the signature information associated with the Minimum SI does not pass, the terminal does not apply the configuration in the target cell SIB 1.
Optionally, the terminal performs cell selection or reselection according to the type of the system information associated with the first signature information, including at least one of the following:
the terminal executes cell selection under the condition that the type of the system information associated with the first signature information is a first type; wherein the first type is minimum system information;
the terminal performs cell reselection when the type of the system information associated with the first signature information is a second type; the second type is other system information (other SI), and the other system information is system information except the minimum system information in the system information of the target cell.
That is, the terminal performs cell selection or reselection according to the type of system information associated with the first signature information that is not verified, including at least one of:
If the verification of the first type of system information is not passed, executing cell selection, wherein the first type of system information belongs to a minimum SI;
and if the verification of the second type of system information is not passed, performing cell reselection, wherein the second type of system information belongs to other SI.
The first type of system information may be one or more, for example, the first type of system information is MIB or SIB1, or the first type of system information is MIB and SIB1.
The second type of system information may be one or more.
Optionally, the associating the signature information with at least one system information of the target cell includes: the at least one system information is an input parameter for verifying the signature information.
That is, when verifying the signature information, the at least one system information is used as a verification input parameter.
Optionally, the signature information verification of the system information includes verifying the signature information by inputting one or more of:
system information;
information related to a reception time of the system information;
a signature key.
The specific verification flow of the signature information is as follows: the terminal acquires system information and signature information, and performs a verification process using at least one of the system information, information related to a reception time of the system information (time information of receiving the system information), and a signature key as an input parameter. The verification process may be that the terminal generates a signature information from the input parameter, compares the signature information with the signature information sent by the network side device, and determines whether the signature information passes verification according to a comparison result.
Optionally, the first signature information verification does not pass one of:
any signature information of the network broadcast is not verified to pass, namely, the signature information which is not verified to pass is the first signature information, and the signature information which is verified to pass does not belong to the first signature information;
at least two signature information verification of network broadcasting is not passed, namely part or a plurality of signature information verification is not passed, namely the signature information which is not passed by verification is the first signature information, and the signature information which is passed by verification is not the first signature information;
all signature information broadcast by the network is not verified, namely all signature information broadcast by the network side is the first signature information;
the signature information associated with the MIB is not verified, namely the signature information associated with the MIB is the first signature information;
signature information associated with minimum system information (minimum SI) is not verified, i.e., the signature information associated with minimum system information is the first signature information;
signature information associated with SIB1 is not verified, i.e. the signature information associated with SIB1 is the first signature information.
Optionally, the system information verification does not pass one of:
Any one system information verification of the network broadcast is not passed;
at least two system information verification of the network broadcast is not passed, namely part or a plurality of system information verification is not passed;
all system information verification of network broadcast is not passed
MIB verification fails;
SIB1 verification is not passed;
the Minimum SI verification fails;
the system information verification does not indicate that the terminal verifies that the system information is not authentic.
Optionally, the terminal cannot obtain the first signature information, including one of the following:
the terminal failing to acquire the first signature information includes one of:
the terminal cannot acquire SIB1;
the terminal cannot acquire target system information, wherein the target system information is used for bearing first signature information;
the terminal cannot acquire the scheduling information of the target system information;
the terminal cannot acquire signature information associated with the MIB;
the terminal cannot acquire signature information associated with SIB1;
the terminal cannot acquire signature information associated with the minimum system information;
the terminal cannot acquire at least one signature information.
Wherein the terminal cannot acquire at least one signature information, including: the terminal may not be able to obtain any one or more signature information and/or the terminal may not be able to obtain any signature information.
Optionally, the terminal in the present application may satisfy at least one of the following:
the terminal is a terminal with signature information verification capability;
the terminal is configured to perform signature verification; that is, the terminal is configured to need to perform authentication;
the terminal is configured with parameters for signature verification.
It should be noted that, the above-mentioned terminal is configured, which means that the terminal may be configured by the NAS layer, or configured by the RAN, or configured by the core network, or may be preconfigured or predefined. In addition, the execution of signature verification in the present application may be understood as execution of security verification, and may be understood as application of signature verification or security verification. The parameter used for signature verification may be a key for verifying the signature, such as a public key, or may be security information or a security domain for verifying the signature, etc., which is not particularly limited in this application.
It should be noted that the terminal may not be able to acquire the above information, and may be understood that the terminal may not be able to acquire the above information.
It should be noted that, in the case where the terminal cannot acquire at least one signature information, the first signature information may be any one or more signature information, that is, the terminal cannot acquire any one signature information, and/or the terminal cannot acquire part(s) or all of the signature information.
In this example, the terminal may optionally be a terminal having the capability of verifying the signature information or verifying the authenticity of the system information.
In the embodiment of the present application, under the condition that the first signature information is not verified or the terminal cannot acquire the first signature information, the terminal performs a first operation, where the first operation includes at least one of regarding the state of the target cell as a forbidden state, regarding the target cell as an acceptable cell, and performing cell selection or reselection, that is, the embodiment of the present application provides a scheme how the terminal performs subsequent processing under the condition that the signature information of the system information is not verified, which is favorable for the terminal to select or reselect to a legal cell.
According to the cell selection method provided by the embodiment of the application, the execution body can be a cell selection device. In the embodiment of the present application, a cell selection device executes a cell selection method as an example, and the cell selection device provided in the embodiment of the present application is described.
As shown in fig. 3, the embodiment of the present application further provides a cell selection apparatus 300, which is applied to a terminal, and the apparatus includes:
a processing module 301, configured to perform a first operation if the first signature information is not verified or the terminal cannot obtain the first signature information, where the first signature information includes at least one signature information, and the signature information is associated with at least one system information of the target cell, and the first operation includes at least one of:
Regarding the state of the target cell as a forbidden state;
treating the target cell as an acceptable cell;
cell selection or reselection is performed.
Optionally, the processing module 301 includes: a first processing unit;
the first processing unit is configured to perform cell selection or reselection according to at least one of:
excluding the target cell as a candidate cell for cell selection or reselection;
the same-frequency reselection is considered to be allowed, or the terminal considers the same-frequency reselection not to be allowed;
the configuration in the master system information block MIB of the target cell is not applied;
the configuration in the system information block SIB1 of the target cell is not applied;
applying the configuration in the master system information block MIB of the target cell in case the second signature information verifies;
in case that the third signature information verification is passed, performing cell selection or reselection by applying the configuration in the system information block SIB1 of the target cell;
the type of the system information associated with the first signature information;
wherein the second signature information is different from the first signature information, and the third signature information is different from the first signature information.
Optionally, the first processing unit is specifically configured to exclude the target cell as a candidate cell for cell selection or reselection in a first time.
Optionally, the second signature information is associated with at least one of:
MIB of the target cell;
minimum system information of the target cell;
the third signature information is associated with at least one of:
SIB1 of the target cell;
and minimum system information of the target cell.
Optionally, the first processing unit is specifically configured to, in case the first signature information includes signature information associated with MIB or minimum system information, not apply the configuration in the master system information block MIB of the target cell.
Optionally, the first processing unit is specifically configured to not apply the configuration in the system information block SIB1 of the target cell, in case the first signature information includes signature information associated with SIB1 or minimum system information.
Optionally, the first processing unit is specifically configured to perform at least one of the following:
performing cell selection in case that the type of the system information associated with the first signature information is a first type; wherein the first type is minimum system information;
performing cell reselection in case that the type of the system information associated with the first signature information is a second type; the second type is other system information, and the other system information is system information except the minimum system information in the system information of the target cell.
Optionally, the associating the signature information with at least one system information of the target cell includes: the at least one system information is an input parameter for verifying the signature information.
Optionally, the signature information verification of the system information includes verifying the signature information by inputting one or more of:
system information;
information related to a reception time of the system information;
a signature key.
Optionally, the first signature information verification does not pass one of:
any signature information of the network broadcast is not verified;
at least two signature information verification of the network broadcast are not passed;
all signature information of the network broadcast is not verified;
signature information associated with the MIB is not verified;
signature information verification associated with the minimum system information is not passed;
signature information verification associated with SIB1 is not passed.
Optionally, the failure to obtain the first signature information includes one of:
failure to obtain the first signature information includes one of:
SIB1 cannot be obtained;
target system information cannot be acquired, and the target system information is used for bearing first signature information;
scheduling information of target system information cannot be acquired;
The signature information associated with the MIB cannot be obtained;
the signature information associated with SIB1 cannot be acquired;
signature information associated with the minimum system information cannot be acquired;
at least one signature information cannot be obtained.
Wherein the failure to obtain at least one signature information includes: any one or more signature information cannot be acquired and/or any signature information cannot be acquired.
Optionally, the terminal in the present application may satisfy at least one of the following:
the terminal is a terminal with signature information verification capability;
the terminal is configured to perform signature verification; that is, the terminal is configured to need to perform authentication;
the terminal is configured with parameters for signature verification.
It should be noted that, the above-mentioned terminal is configured, which means that the terminal may be configured by the NAS layer, or configured by the RAN, or configured by the core network, or may be preconfigured or predefined. In addition, the execution of signature verification in the present application may be understood as execution of security verification, and may be understood as application of signature verification or security verification. The parameter used for signature verification may be a key for verifying the signature, such as a public key, or may be security information or a security domain for verifying the signature, etc., which is not particularly limited in this application.
It should be noted that the terminal may not be able to acquire the above information, and may be understood that the terminal may not be able to acquire the above information.
It should be noted that, in the case where the terminal cannot acquire at least one signature information, the first signature information may be any one or more signature information, that is, the terminal cannot acquire any one signature information, and/or the terminal cannot acquire part(s) or all of the signature information.
In the embodiment of the present application, under the condition that the first signature information is not verified or cannot be obtained, the terminal performs a first operation, where the first operation includes at least one of regarding the state of the target cell as a forbidden state, regarding the target cell as an acceptable cell, and performing cell selection or reselection, that is, the embodiment of the present application provides a scheme how the terminal performs subsequent processing under the condition that the signature information of the system information is not verified, which is favorable for the terminal to select or reselect to a legal cell.
The cell selection in the embodiments of the present application may be an electronic device, for example, an electronic device with an operating system, or may be a component in an electronic device, for example, an integrated circuit or a chip. The electronic device may be a terminal, or may be other devices than a terminal. By way of example, terminals may include, but are not limited to, the types of terminals 11 listed above, other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., and embodiments of the application are not specifically limited.
The cell selection device provided in the embodiment of the present application can implement each process implemented by the method embodiment of fig. 2, and achieve the same technical effects, so that repetition is avoided, and no further description is given here.
Optionally, as shown in fig. 4, the embodiment of the present application further provides a communication device 400, including a processor 401 and a memory 402, where the memory 402 stores a program or instructions that can be executed on the processor 401, for example, when the communication device 400 is a terminal, the program or instructions implement the steps of the foregoing cell selection method embodiment when executed by the processor 401, and achieve the same technical effects.
The embodiment of the application also provides a terminal, which comprises a processor and a communication interface, wherein the processor is used for executing a first operation under the condition that the first signature information is not verified or the terminal cannot acquire the first signature information, the first signature information comprises at least one signature information, the signature information is associated with at least one system information of a target cell, and the first operation comprises at least one of the following steps: regarding the state of the target cell as a forbidden state; treating the target cell as an acceptable cell; cell selection or reselection is performed. The terminal embodiment corresponds to the terminal-side method embodiment, and each implementation process and implementation manner of the method embodiment can be applied to the terminal embodiment, and the same technical effects can be achieved. Specifically, fig. 5 is a schematic hardware structure of a terminal for implementing an embodiment of the present application.
The terminal 500 includes, but is not limited to: at least some of the components of the radio frequency unit 501, the network module 502, the audio output unit 503, the input unit 504, the sensor 505, the display unit 506, the user input unit 507, the interface unit 508, the memory 509, and the processor 510.
Those skilled in the art will appreciate that the terminal 500 may further include a power source (e.g., a battery) for powering the various components, and the power source may be logically coupled to the processor 510 via a power management system so as to perform functions such as managing charging, discharging, and power consumption via the power management system. The terminal structure shown in fig. 5 does not constitute a limitation of the terminal, and the terminal may include more or less components than shown, or may combine certain components, or may be arranged in different components, which will not be described in detail herein.
It should be appreciated that in embodiments of the present application, the input unit 504 may include a graphics processing unit (Graphics Processing Unit, GPU) 5041 and a microphone 5042, with the graphics processor 5041 processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The display unit 506 may include a display panel 5061, and the display panel 5061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 507 includes at least one of a touch panel 5071 and other input devices 5072. Touch panel 5071, also referred to as a touch screen. Touch panel 5071 may include two parts, a touch detection device and a touch controller. Other input devices 5072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and so forth, which are not described in detail herein.
In this embodiment, after receiving downlink data from the network side device, the radio frequency unit 501 may transmit the downlink data to the processor 510 for processing; in addition, the radio frequency unit 501 may send uplink data to the network side device. Typically, the radio frequency unit 501 includes, but is not limited to, an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
The memory 509 may be used to store software programs or instructions as well as various data. The memory 509 may mainly include a first storage area storing programs or instructions and a second storage area storing data, wherein the first storage area may store an operating system, application programs or instructions (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, the memory 509 may include volatile memory or nonvolatile memory, or the memory 509 may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM), static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (ddr SDRAM), enhanced SDRAM (Enhanced SDRAM), synchronous DRAM (SLDRAM), and Direct RAM (DRRAM). Memory 509 in embodiments of the present application includes, but is not limited to, these and any other suitable types of memory.
Processor 510 may include one or more processing units; optionally, the processor 510 integrates an application processor that primarily processes operations involving an operating system, user interface, application programs, etc., and a modem processor that primarily processes wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor 510.
Wherein the processor 510 is configured to perform a first operation if the first signature information is not verified or the terminal cannot obtain the first signature information, where the first signature information includes at least one signature information, and the signature information is associated with at least one system information of the target cell, and the first operation includes at least one of the following:
regarding the state of the target cell as a forbidden state;
treating the target cell as an acceptable cell;
cell selection or reselection is performed.
In the embodiment of the present application, in the case that the first signature information is not verified or the terminal cannot acquire the first signature information, the terminal performs a first operation, where the first operation includes at least one of regarding the state of the target cell as a forbidden state, regarding the target cell as an acceptable cell, and performing cell selection or reselection, that is, the embodiment of the present application provides a scheme how the terminal performs subsequent processing in the case that the signature information of the system information is not verified, which is favorable for the terminal to select or reselect to a legal cell.
Optionally, the processor 510 is specifically configured to at least one of:
the terminal excludes the target cell as a candidate cell for cell selection or reselection;
the terminal considers that the same-frequency reselection is allowed, or the terminal considers that the same-frequency reselection is not allowed;
the terminal does not apply the configuration in the main system information block MIB of the target cell;
the terminal does not apply the configuration in the system information block SIB1 of the target cell;
applying the configuration in the master system information block MIB of the target cell in case the second signature information verifies;
applying the configuration in the system information block SIB1 of the target cell in case the third signature information verification is passed;
the type of system information associated with the first signature information;
wherein the second signature information is different from the first signature information, and the third signature information is different from the first signature information.
Optionally, the processor 510 is specifically configured to exclude the target cell as a candidate cell for cell selection or reselection during the first time.
Optionally, the second signature information is associated with at least one of:
MIB of the target cell;
Minimum system information of the target cell;
the third signature information is associated with at least one of:
SIB1 of the target cell;
and minimum system information of the target cell.
Optionally, the processor 510 is specifically configured to, in case the first signature information includes signature information associated with MIB or minimum system information, not apply the configuration in the master system information block MIB of the target cell by the terminal.
Optionally, the processor 510 is specifically configured to, in case the first signature information comprises signature information associated with SIB1 or minimum system information, not apply the configuration in the system information block SIB1 of the target cell by the terminal.
Optionally, the processor 510 is specifically configured to at least one of:
the terminal executes cell selection under the condition that the type of the system information associated with the first signature information is a first type; wherein the first type is minimum system information;
the terminal performs cell reselection when the type of the system information associated with the first signature information is a second type; the second type is other system information, and the other system information is system information except the minimum system information in the system information of the target cell.
Optionally, the associating the signature information with at least one system information of the target cell includes: the at least one system information is an input parameter for verifying the signature information.
Optionally, the signature information verification of the system information includes verifying the signature information by inputting one or more of:
system information;
information related to a reception time of the system information;
a signature key.
Optionally, the first signature information verification does not pass one of:
any signature information of the network broadcast is not verified;
at least two signature information verification of the network broadcast are not passed;
all signature information of the network broadcast is not verified;
signature information associated with the MIB is not verified;
signature information verification associated with the minimum system information is not passed;
signature information verification associated with SIB1 is not passed.
Optionally, the failure to obtain the first signature information includes one of:
failure to obtain the first signature information includes one of:
SIB1 cannot be obtained;
target system information cannot be acquired, and the target system information is used for bearing first signature information;
scheduling information of target system information cannot be acquired;
The signature information associated with the MIB cannot be obtained;
the signature information associated with SIB1 cannot be acquired;
signature information associated with the minimum system information cannot be acquired;
at least one signature information cannot be obtained.
Wherein the failure to obtain at least one signature information includes: any one or more signature information cannot be acquired and/or any signature information cannot be acquired.
Optionally, the terminal in the present application may satisfy at least one of the following:
the terminal is a terminal with signature information verification capability;
the terminal is configured to perform signature verification; that is, the terminal is configured to need to perform authentication;
the terminal is configured with parameters for signature verification.
It should be noted that, the above-mentioned terminal is configured, which means that the terminal may be configured by the NAS layer, or configured by the RAN, or configured by the core network, or may be preconfigured or predefined. In addition, the execution of signature verification in the present application may be understood as execution of security verification, and may be understood as application of signature verification or security verification. The parameter used for signature verification may be a key for verifying the signature, such as a public key, or may be security information or a security domain for verifying the signature, etc., which is not particularly limited in this application.
It should be noted that the terminal may not be able to acquire the above information, and may be understood that the terminal may not be able to acquire the above information.
It should be noted that, in the case where the terminal cannot acquire at least one signature information, the first signature information may be any one or more signature information, that is, the terminal cannot acquire any one signature information, and/or the terminal cannot acquire part(s) or all of the signature information.
In the embodiment of the present application, in the case that the first signature information is not verified or the terminal cannot acquire the first signature information, the terminal performs a first operation, where the first operation includes at least one of regarding the state of the target cell as a forbidden state, regarding the target cell as an acceptable cell, and performing cell selection or reselection, that is, the embodiment of the present application provides a scheme how the terminal performs subsequent processing in the case that the signature information of the system information is not verified, which is favorable for the terminal to select or reselect to a legal cell.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the processes of the embodiment of the cell selection method are implemented, and the same technical effects can be achieved, so that repetition is avoided, and no redundant description is provided herein.
Wherein the processor is a processor in the terminal described in the above embodiment. The readable storage medium may be non-volatile or non-transitory. The readable storage medium may include a computer readable storage medium such as a computer read only memory ROM, a random access memory RAM, a magnetic or optical disk, etc.
The embodiment of the application further provides a chip, the chip includes a processor and a communication interface, the communication interface is coupled with the processor, and the processor is configured to run a program or an instruction, implement each process of the above embodiment of the cell selection method, and achieve the same technical effect, so that repetition is avoided, and no redundant description is provided herein.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, or the like. The embodiments of the present application further provide a computer program/program product, where the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement each process of the above-mentioned cell selection method embodiment, and the same technical effects can be achieved, so that repetition is avoided, and details are not repeated herein.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may also be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solutions of the present application may be embodied essentially or in a part contributing to the prior art in the form of a computer software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), comprising several instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those of ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are also within the protection of the present application.

Claims (26)

1. A method of cell selection, comprising:
in the case that the first signature information is not verified or the terminal cannot acquire the first signature information, the terminal performs a first operation, where the first signature information includes at least one signature information, and the signature information is associated with at least one system information of the target cell, and the first operation includes at least one of:
regarding the state of the target cell as a forbidden state;
treating the target cell as an acceptable cell;
cell selection or reselection is performed.
2. The method of claim 1, wherein the first operation comprises cell selection or reselection, the terminal performing cell selection or reselection according to at least one of:
The terminal excludes the target cell as a candidate cell for cell selection or reselection;
the terminal considers that the same-frequency reselection is allowed, or the terminal considers that the same-frequency reselection is not allowed;
the terminal does not apply the configuration in the main system information block MIB of the target cell;
the terminal does not apply the configuration in the system information block SIB1 of the target cell;
applying the configuration in the master system information block MIB of the target cell in case the second signature information verifies;
applying the configuration in the system information block SIB1 of the target cell in case the third signature information verification is passed;
the type of the system information associated with the first signature information;
wherein the second signature information is different from the first signature information, and the third signature information is different from the first signature information.
3. The method according to claim 2, wherein the terminal excludes the target cell as a candidate cell for cell selection or reselection, comprising:
the terminal excludes the target cell as a candidate cell for cell selection or reselection in a first time.
4. The method of claim 2, wherein the second signature information is associated with at least one of:
MIB of the target cell;
minimum system information of the target cell;
the third signature information is associated with at least one of:
SIB1 of the target cell;
and minimum system information of the target cell.
5. The method of claim 2, wherein the terminal does not apply the configuration in the MIB of the target cell, comprising:
in case the first signature information comprises signature information associated with MIB or minimum system information, the terminal does not apply the configuration in MIB of the target cell.
6. The method of claim 2, wherein the terminal does not apply the configuration in SIB1 of the target cell, comprising:
in case the first signature information comprises signature information associated with SIB1 or minimum system information, the terminal does not apply the configuration in the system information block SIB1 of the target cell.
7. The method according to claim 2, wherein the terminal performs cell selection or reselection according to the type of system information associated with the first signature information, comprising at least one of:
the terminal executes cell selection under the condition that the type of the system information associated with the first signature information is a first type; wherein the first type is minimum system information;
The terminal performs cell reselection when the type of the system information associated with the first signature information is a second type; the second type is other system information, and the other system information is system information except the minimum system information in the system information of the target cell.
8. The method of claim 1, wherein the associating of the signature information with at least one system information of the target cell comprises: the at least one system information is an input parameter for verifying the signature information.
9. The method of claim 1, wherein signature information verification of the system information comprises verifying the signature information by inputting one or more of:
system information;
information related to a reception time of the system information;
a signature key.
10. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the first signature information verification does not pass one of:
any signature information of the network broadcast is not verified;
at least two signature information verification of the network broadcast are not passed;
all signature information of the network broadcast is not verified;
Signature information associated with the MIB is not verified;
signature information verification associated with the minimum system information is not passed;
signature information verification associated with SIB1 is not passed.
11. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the terminal failing to acquire the first signature information includes one of:
the terminal cannot acquire SIB1;
the terminal cannot acquire target system information, wherein the target system information is used for bearing first signature information;
the terminal cannot acquire the scheduling information of the target system information;
the terminal cannot acquire signature information associated with the MIB;
the terminal cannot acquire signature information associated with SIB1;
the terminal cannot acquire signature information associated with the minimum system information;
the terminal cannot acquire at least one signature information.
12. The method of claim 1, wherein the terminal satisfies at least one of:
the terminal is a terminal with signature information verification capability;
the terminal is configured to perform signature verification;
the terminal is configured with parameters for signature verification.
13. A cell selection apparatus, applied to a terminal, comprising:
A processing module, configured to perform a first operation if the first signature information is not verified or cannot be obtained, where the first signature information includes at least one signature information, and the signature information is associated with at least one system information of a target cell, and the first operation includes at least one of:
regarding the state of the target cell as a forbidden state;
treating the target cell as an acceptable cell;
cell selection or reselection is performed.
14. The apparatus of claim 13, wherein the processing module comprises a first processing unit to perform cell selection or reselection based on at least one of:
excluding the target cell as a candidate cell for cell selection or reselection;
the same-frequency reselection is considered to be allowed, or the same-frequency reselection is considered to be not allowed;
the configuration in the master system information block MIB of the target cell is not applied;
the configuration in the system information block SIB1 of the target cell is not applied;
applying the configuration in the master system information block MIB of the target cell in case the second signature information verifies;
applying the configuration in the system information block SIB1 of the target cell in case the third signature information verification is passed;
The type of the system information associated with the first signature information;
wherein the second signature information is different from the first signature information, and the third signature information is different from the first signature information.
15. The apparatus of claim 14, wherein the first processing unit is configured to exclude the target cell as a candidate cell for cell selection or reselection during a first time.
16. The apparatus of claim 14, wherein the second signature information is associated with at least one of:
MIB of the target cell;
minimum system information of the target cell;
the third signature information is associated with at least one of:
SIB1 of the target cell;
and minimum system information of the target cell.
17. The apparatus of claim 14, wherein the first processing unit is configured to not apply a configuration in a master system information block, MIB, of the target cell if the first signature information includes signature information associated with MIB or minimum system information.
18. The apparatus of claim 14, wherein the first processing unit is configured to not apply a configuration in a system information block, SIB1, of the target cell if the first signature information includes signature information associated with SIB1 or minimum system information.
19. The apparatus of claim 14, wherein the first processing unit is configured to perform at least one of:
performing cell selection in case that the type of the system information associated with the first signature information is a first type; wherein the first type is minimum system information;
performing cell reselection in case that the type of the system information associated with the first signature information is a second type; the second type is other system information, and the other system information is system information except the minimum system information in the system information of the target cell.
20. The apparatus of claim 13, wherein the association of the signature information with at least one system information of the target cell comprises: the at least one system information is an input parameter for verifying the signature information.
21. The apparatus of claim 13, wherein signature information verification of the system information comprises verifying the signature information by inputting one or more of:
system information;
information related to a reception time of the system information;
a signature key.
22. The apparatus of claim 13, wherein the device comprises a plurality of sensors,
The first signature information verification does not pass one of:
any signature information of the network broadcast is not verified;
at least two signature information verification of the network broadcast are not passed;
all signature information of the network broadcast is not verified;
signature information associated with the MIB is not verified;
signature information verification associated with the minimum system information is not passed;
signature information verification associated with SIB1 is not passed.
23. The apparatus of claim 13, wherein the device comprises a plurality of sensors,
the inability to obtain the first signature information includes one of:
SIB1 cannot be obtained;
target system information cannot be acquired, and the target system information is used for bearing first signature information;
scheduling information of target system information cannot be acquired;
the signature information associated with the MIB cannot be obtained;
the signature information associated with SIB1 cannot be acquired;
signature information associated with the minimum system information cannot be acquired;
at least one signature information cannot be obtained.
24. The apparatus of claim 13, wherein the terminal satisfies at least one of:
the terminal is a terminal with signature information verification capability;
the terminal is configured to perform signature verification;
The terminal is configured with parameters for signature verification.
25. A terminal comprising a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor, performs the steps of the cell selection method according to any one of claims 1 to 12.
26. A readable storage medium, characterized in that the readable storage medium has stored thereon a program or instructions which, when executed by a processor, implement the steps of the cell selection method according to any of claims 1-12.
CN202211288068.5A 2022-08-26 2022-10-20 Cell selection method, device and terminal Pending CN117676572A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2022110344664 2022-08-26
CN202211034466 2022-08-26

Publications (1)

Publication Number Publication Date
CN117676572A true CN117676572A (en) 2024-03-08

Family

ID=90085155

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211288068.5A Pending CN117676572A (en) 2022-08-26 2022-10-20 Cell selection method, device and terminal

Country Status (1)

Country Link
CN (1) CN117676572A (en)

Similar Documents

Publication Publication Date Title
CN117440401A (en) Processing method of condition configuration, processing device of condition configuration and terminal
CN115174009A (en) Method and device for determining HARQ (hybrid automatic repeat request) feedback, terminal and readable storage medium
CN117676572A (en) Cell selection method, device and terminal
CN103931257A (en) Methods and apparatus for sending and receiving paging messages
WO2024104082A1 (en) Information processing method and apparatus, and terminal
CN117675212A (en) Signature information transmission method, signature information transmission device and readable storage medium
CN113923756B (en) Control method and device for obtaining emergency service, terminal and readable storage medium
US20240129717A1 (en) Information processing method, key material obtaining method, and device
CN117675553A (en) Method, device, terminal and network side equipment for processing security parameters of broadcast message
CN116567831A (en) Paging method, paging device, terminal and wireless access network equipment
CN116847356A (en) Beam processing method, device and equipment
CN115915083A (en) Emergency service processing method, equipment and readable storage medium
CN117177369A (en) Message reporting method and device, electronic equipment and readable storage medium
CN116456353A (en) Managed network access processing method and device, terminal and network side equipment
CN116419167A (en) Multicast service processing method, terminal equipment and network equipment
CN116419402A (en) Resource selection method, device and terminal
CN117440367A (en) Secure configuration method and device for parameter information between terminals, communication equipment and storage medium
CN115209448A (en) Terminal registration method, terminal and network side equipment
CN116419401A (en) Resource selection method, device and terminal
CN117835372A (en) Network selection method and terminal
CN117241364A (en) Information determination method, device and terminal
CN116456401A (en) Cell selection reselection method, device, terminal and network equipment
CN117528712A (en) Network selection method and terminal
CN115460579A (en) Processing method and obtaining method of key material, information transmission method and equipment
CN116761259A (en) Resource pool selection method, device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination