WO2017219365A1 - 数据传输的方法和装置 - Google Patents

数据传输的方法和装置 Download PDF

Info

Publication number
WO2017219365A1
WO2017219365A1 PCT/CN2016/087121 CN2016087121W WO2017219365A1 WO 2017219365 A1 WO2017219365 A1 WO 2017219365A1 CN 2016087121 W CN2016087121 W CN 2016087121W WO 2017219365 A1 WO2017219365 A1 WO 2017219365A1
Authority
WO
WIPO (PCT)
Prior art keywords
security parameter
security
data
logical channel
bearer
Prior art date
Application number
PCT/CN2016/087121
Other languages
English (en)
French (fr)
Inventor
张宏平
严乐
戴明增
曾清海
郭轶
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2016/087121 priority Critical patent/WO2017219365A1/zh
Priority to BR112018076420A priority patent/BR112018076420A2/pt
Priority to EP16905905.2A priority patent/EP3457752B1/en
Priority to CN201680086644.4A priority patent/CN109314899B/zh
Publication of WO2017219365A1 publication Critical patent/WO2017219365A1/zh
Priority to US16/220,711 priority patent/US11026091B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0069Transmission or use of information for re-establishing the radio link in case of dual connectivity, e.g. decoupled uplink/downlink
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/06Reselecting a communication resource in the serving access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/34Reselection control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/15Setup of multiple wireless link connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/022Selective call receivers
    • H04W88/023Selective call receivers with message or information receiving capability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information

Definitions

  • the present invention relates to the field of wireless communication technologies, and in particular, to a method and apparatus for data transmission.
  • LTE-Advanced LTE-Advanced
  • Carrier Aggregation means that User Equipment (UE) can use multiple cells (carriers) for uplink and downlink communication at the same time, thus supporting high-speed data transmission.
  • UE User Equipment
  • SCell secondary cell
  • 3GPP further introduces Dual Connectivity (DC) technology in the LTE-A standard, that is, supports two base stations to simultaneously provide data transmission services for one UE.
  • the base station where the PCell is located is called the primary eNB (MeNB for short), and the other base station is called the secondary eNB (SeNB).
  • MCG primary cell group
  • SCell SCells
  • SCG secondary cell group
  • the MCG bearer For a DC scenario, there are three types of data bearers: the MCG bearer, the SCG bearer, and the split bearer.
  • the network indicates the specific bearer type.
  • the data carried by the MCG can only be transmitted through the serving cell under the primary base station, and is encrypted and decrypted by the primary base station, and the uplink data is sent by the primary base station to the Serving Gateway (S-GW) and the primary base station.
  • S-GW Serving Gateway
  • the downlink data is received from the S-GW.
  • the data carried by the SCG can only be transmitted through the serving cell under the secondary base station, and the secondary base station performs encryption and decryption, and the secondary base station sends uplink data to the S-GW and the secondary base station to receive downlink data from the S-GW.
  • the data carried by the split can be transmitted through the serving cell under the primary base station and the secondary base station, but can only be encrypted and decrypted at the primary base station, and the uplink data is sent by the primary base station to the S-GW and the primary base station receives the downlink data from the S-GW.
  • the primary base station and the secondary base station respectively allocate respective logical channels for the bearer, that is, one split bearer corresponds to two logical channels, one is a logical channel allocated by the primary base station, and the other is a logical channel allocated by the secondary base station.
  • the primary base station When the network adds a secondary base station to the UE, the primary base station derives a new parameter based on its own key and sends it to the secondary base station. The primary base station also sends the derived parameter to the UE, and the UE derives the same secret according to the derived parameters. key.
  • the confusion period of the secure processing (including the encryption processing and the decryption processing) of the data carried by the split occurs.
  • the security key and the security algorithm are changed to use the security key and the security algorithm of the target primary base station, and the subsequent data packets are in the packet data convergence protocol.
  • PDCP Packet Data Convergence Protocol
  • layer processing always uses the security key and security algorithm of the target primary base station, but the data of the Radio Link Control (RLC) layer and the layers below the RLC that are currently being transmitted. The packet still uses the security key and security algorithm of the source primary base station.
  • RLC Radio Link Control
  • the source primary base station does not know when the UE can receive the signaling after issuing the PCell change message, it is not sure that the UE performs the exact time of replacing the PCell.
  • the data transmission may always be Therefore, for the split bearer, the source primary base station and the target primary base station are unsure whether the received data packet is encrypted using the source primary base station key or the target primary base station key, which is the security of the data during the PCell change process. Dealing with the problem of confusion. The same problem also exists in the downlink data transmission. The UE is not sure whether the received data packet is encrypted using the key of the source primary base station or the key of the target primary base station, and there is a problem of confusion. For In the confusing period of data transmission, if the receiving end uses the wrong key to decrypt, it will lead to the problem of erroneous data being decrypted.
  • the same confusing period problem of data security processing also exists in other security parameter changes (including key and encryption algorithms and other related security parameters) scenarios, for example, a serving cell change in a single carrier scenario, between the UE and the serving base station.
  • the change of security parameters is also asynchronous. If the data transmission is continuous, the above-mentioned confusion period of the security processing will also occur, and the decrypted data will be erroneous.
  • the single carrier scenario mentioned here means that the UE is in single carrier mode, and the UE communicates with the network through only one serving cell.
  • the base station triggers the intra-cell handover update key in order to avoid reuse of the COUNT value by using the same key and Radio Bearer Identity (RB ID). If the purpose of data transmission is not interrupted during the handover process, there will be a problem of the confusion period of the security processing as described above, which may also cause the problem of decrypted data being erroneous.
  • RB ID Radio Bearer Identity
  • the embodiment of the invention provides a method and a device for data transmission, in order to solve the problem of obfuscation period of security processing when the security parameter is changed, and to avoid erroneous data being decrypted.
  • an embodiment of the present invention provides a data transmission method, the method comprising: receiving a first message, where the first message is used to trigger a security parameter change of a first bearer, where the first bearer is signaling a radio bearer or a data radio bearer, the security parameter includes a key and/or a security algorithm, the security parameter change changes the security parameter of the first bearer from the first security parameter to the second security parameter, and sends a second message, where The second message is used to indicate that the security parameter change of the first bearer is complete; the first security processing is performed on the uplink data on the first bearer to obtain second uplink data, where the first security process includes: The data on the integrity protection, the data on the signaling radio bearer and the data on the data radio bearer Performing at least one of the encryption processing; transmitting the second uplink data, where the second uplink data includes a first security parameter indication, where the first security parameter indicates a first security processing station for indicating the second uplink data The security parameters used.
  • the data transmission method provided by the embodiment of the present invention by introducing the first security parameter indication in the uplink data of the first bearer, the base station can determine, according to the first security parameter indication in the uplink data, whether the uplink data adopts the first security parameter or the first The second security parameter performs the first security processing, and then selects the corresponding security parameter for the second security processing, thereby solving the problem that the decrypted data is erroneous during the confusing period.
  • the method further includes: receiving downlink data on the first bearer, where the downlink data is subjected to a first security process, where the downlink data includes a second security parameter indication, and the second security parameter indication is used The security parameter used by the first security process for indicating the downlink data; the security parameter is selected according to the second security parameter indication in the downlink data, and the second security process is performed on the downlink data, where the second security process includes: The data on the radio bearer is subjected to at least one of an integrity protection check, a decryption process on the data on the signalling radio bearer, and a decryption process on the data on the radio bearer.
  • the second security parameter indication is introduced in the downlink data, and the UE can determine, according to the second security parameter indication in the downlink data, whether the data is processed by using the first security parameter or the second security parameter, and then selecting The corresponding security parameter performs the second security processing, thereby solving the problem that the decrypted data is erroneous during the confusing period.
  • the first message may further include information of a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry the first first security processing using the second security parameter.
  • the data on the bearer may further include information of a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry the first first security processing using the second security parameter.
  • the first security parameter indication and the second security parameter are indicated as logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to the first security parameter, the logical channel identifier of the third logical channel, and the logic of the fourth logical channel.
  • the channel identifier corresponds to the second security parameter, where the first logical channel and the second logical channel are used to carry data on the first bearer that performs the first security processing using the first security parameter, and the third logical channel and the fourth logical channel are used for Carrying data on the first bearer that performs the first security process using the second security parameter; or, the logical channel identifier of the fifth logical channel corresponds to the first security parameter, and the logical channel identifier of the sixth logical channel corresponds to the second security parameter,
  • the fifth logical channel is used to carry data on the first bearer that performs the first security process using the first security parameter
  • the sixth logical channel is used to carry data on the first bearer that performs the first security process using the second security parameter.
  • the first security parameter indication and the second security parameter are indicated as a bit, and a change in the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • performing the first security processing on the uplink data on the first bearer may include: performing the uplink data by using the second security parameter after receiving the first message or after sending the second message. First security processing; performing first security processing on the uplink data using the first security parameter before receiving the first message or before transmitting the second message.
  • the method further includes: when the second security parameter indication in the downlink data indicates the first security parameter, using the first security parameter to perform second security processing on the downlink data; When the second security parameter indication in the data indicates the second security parameter, the second security parameter is used to perform second security processing on the downlink data.
  • the first message is from the base station, and the second message is sent to the base station; or the first message is from the source base station, and the second message is sent to the target base station, where the source base station is the source primary cell
  • the base station is the base station where the target primary cell is located.
  • the first message is a primary cell change message or a radio resource control connection reconfiguration (RRC Connection Reconfiguration) message.
  • RRC Connection Reconfiguration radio resource control connection reconfiguration
  • the second message is a primary cell change complete message or an RRC connection reconfiguration complete message.
  • an embodiment of the present invention provides another data transmission method, where the method includes: Sending a first message, where the first message is used to trigger a security parameter change of the first bearer, where the first bearer is a data radio bearer, and the security parameter includes a key and/or a security algorithm, and the security parameter changes the first Changing the security parameter of a bearer from the first security parameter to the second security parameter; performing first security processing on the downlink data on the first bearer to obtain second downlink data, where the first security process includes The data is encrypted, and the second downlink data is sent, where the second downlink data includes a second security parameter indication, where the second security parameter indicates a security parameter used to indicate the first security processing of the second downlink data.
  • the data transmission method provided by the embodiment of the present invention by introducing a second security parameter indication in the downlink data of the first bearer, the UE can determine, according to the second security parameter indication in the downlink data, whether the data adopts the first security parameter or the second The security parameter performs the first security processing, and then selects the corresponding security parameter for the second security processing, thereby solving the problem that the decrypted data is erroneous during the confusing period.
  • the method further includes: receiving uplink data on the first bearer, where the uplink data is subjected to a first security process, where the uplink data includes a first security parameter indication, where the first security parameter indication is used And a security parameter used by the first security process for indicating the uplink data; selecting a security parameter according to the first security parameter indication in the uplink data, performing second security processing on the uplink data, where the second security processing includes wirelessly The data on the bearer is decrypted.
  • the first security parameter indication is introduced in the uplink data, and the source base station can determine, according to the first security parameter indication in the uplink data, whether the uplink data is processed by using the first security parameter or the second security parameter, Then, the corresponding security parameters are selected for the second security processing, thereby solving the problem that the decrypted data is erroneous during the confusing period.
  • the first message further includes information of a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry the first bearer that performs the first security process by using the second security parameter.
  • the data on it
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and different logical channel identifiers respectively correspond to the first security parameter and the first Two security parameters.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to the first security parameter
  • the logical channel identifier of the third logical channel and the logical channel identifier of the fourth logical channel correspond to the second security parameter
  • a logical channel and a second logical channel are used to carry data on the first bearer that performs the first security process using the first security parameter
  • the third logical channel and the fourth logical channel are used to carry the first security using the second security parameter Processing the data on the first bearer.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the method further comprises: performing first security processing on the downlink data using the first security parameter.
  • the method further includes: performing second security processing on the uplink data by using the first security parameter when the first security parameter indication in the uplink data indicates the first security parameter.
  • the first message is a primary cell change message or a radio resource control connection reconfiguration (RRC Connection Reconfiguration) message.
  • RRC Connection Reconfiguration radio resource control connection reconfiguration
  • the embodiment of the present invention provides a data transmission method, where the method includes: receiving a second message, where the second message is used to indicate that the security parameter change of the first bearer is completed, and the first bearer is data wireless. Performing a first security process on the downlink data on the first bearer to obtain second downlink data, where the first security process includes performing encryption processing on data on the data radio bearer, and transmitting the second downlink data, where The second downlink data includes a second security parameter indication, and the second security parameter indicates a security parameter used to indicate the first security processing of the second downlink data.
  • the data transmission method provided by the embodiment of the present invention by introducing a second security parameter indication in the downlink data of the first bearer, the UE can determine, according to the second security parameter indication in the downlink data, whether the data adopts the first security parameter or the second The safety parameters are processed for the first safety, and then selected The second security process is performed by selecting the corresponding security parameter, thereby solving the problem that the decrypted data is erroneous during the confusing period.
  • the method further includes: receiving uplink data on the first bearer, where the uplink data is subjected to a first security process, where the uplink data includes a first security parameter indication, where the first security parameter indication is used And a security parameter used by the first security process for indicating the uplink data; selecting a security parameter according to the first security parameter indication in the uplink data, performing second security processing on the uplink data, where the second security processing includes wirelessly The data on the bearer is decrypted.
  • the first security parameter indication is introduced in the uplink data, and the target base station can determine, according to the first security parameter indication in the uplink data, whether the uplink data is processed by using the first security parameter or the second security parameter, Then, the corresponding security parameters are selected for the second security processing, thereby solving the problem that the decrypted data is erroneous during the confusing period.
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to the first security parameter
  • the logical channel identifier of the third logical channel and the logical channel identifier of the fourth logical channel correspond to the second security parameter
  • a logical channel and a second logical channel are used to carry data on the first bearer that performs the first security process using the first security parameter
  • the third logical channel and the fourth logical channel are used to carry the first security using the second security parameter Processing the data on the first bearer.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the method further includes: performing a first security process on the downlink data using the second security parameter.
  • the method further includes: when the first security parameter indication in the uplink data indicates the second security parameter, using the second security parameter to perform the second security on the uplink data. Fully processed.
  • the second message is a primary cell change complete message or an RRC connection reconfiguration complete message.
  • the embodiment of the present invention provides a data transmission method, where the method includes: sending a first message, where the first message is used to trigger a change of a security parameter of a first bearer, where the first bearer is signaling.
  • the security parameter includes a key and/or a security algorithm
  • the security parameter change changes the security parameter of the first bearer from the first security parameter to the second security parameter, and receives the second message, where The second message is used to indicate that the security parameter change of the first bearer is completed;
  • the first security processing is performed on the downlink data on the first bearer to obtain the second downlink data, where the first security process includes: And performing at least one of performing integrity protection, encrypting data on the signaling radio bearer, and encrypting data on the radio bearer of the data; transmitting the second downlink data, where the second downlink data includes The second security parameter indicates that the second security parameter indicates a security parameter used to indicate the first security processing of the second downlink data.
  • the data transmission method provided by the embodiment of the present invention by introducing a second security parameter indication in the downlink data of the first bearer, the UE can determine, according to the second security parameter indication in the downlink data, whether the data adopts the first security parameter or the second The security parameter performs the first security processing, and then selects the corresponding security parameter for the second security processing, thereby solving the problem that the decrypted data is erroneous during the confusing period.
  • the method further includes: receiving uplink data on the first bearer, where the uplink data is subjected to a first security process, where the uplink data includes a first security parameter indication, where the first security parameter indication is used The security parameter used by the first security process for indicating the uplink data; the security parameter is selected according to the first security parameter indication in the uplink data, and the second security process is performed on the uplink data, where the second security process includes: The data on the radio bearer is subjected to at least one of an integrity protection check, a decryption process on the data on the signalling radio bearer, and a decryption process on the data on the radio bearer.
  • the first security parameter indicates that the base station can determine, according to the first security parameter indication in the uplink data, whether the uplink data is processed by using the first security parameter or the second security parameter, and then selecting the corresponding security parameter for the second security. Processing, thus solving the problem of decrypting the wrong data during the confusing period.
  • the first message further includes information of a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry the first bearer that performs the first security process by using the second security parameter.
  • the data on it
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the fifth logical channel corresponds to the first security parameter
  • the logical channel identifier of the sixth logical channel corresponds to the second security parameter
  • the fifth logical channel is used to carry the first security processing by using the first security parameter.
  • the data on the bearer, the sixth logical channel is used to carry data on the first bearer that performs the first security process using the second security parameter.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the method further includes: performing first security processing on the downlink data using the second security parameter after transmitting the first message or after receiving the second message; before receiving the first message or receiving Before the second message, the first security parameter is used to perform the first security processing on the downlink data.
  • the method further includes: when the first security parameter indication in the uplink data indicates the first security parameter, performing the second security processing on the uplink data by using the first security parameter; When the first security parameter indicates that the second security parameter is indicated, the second security parameter is used to perform second security processing on the uplink data.
  • the first message is a primary cell change message or a radio resource control connection reconfiguration (RRC Connection Reconfiguration) message.
  • RRC Connection Reconfiguration radio resource control connection reconfiguration
  • the second message is a primary cell change complete message or an RRC connection reconfiguration complete message.
  • an embodiment of the present invention provides a UE, where the UE includes a receiver, a processor, and a transmitter.
  • the UE implements the functions of the UE in the data transmission method of the first aspect described above, and thus can also achieve the beneficial effects of the data transmission method of the first aspect.
  • the function of the UE may be implemented by using hardware or by executing corresponding software through hardware.
  • the hardware or software includes at least one module corresponding to the functions described above.
  • the receiver is configured to receive the first message, where the first message is used to trigger a security parameter change of the first bearer, where the first bearer is a signaling radio bearer or a data radio bearer, and the security parameter is Including a key and/or security algorithm, the security parameter change changes the security parameter of the first bearer from the first security parameter to the second security parameter;
  • the sender is configured to send a second message, where the second message is used to Instructing the change of the security parameter of the first bearer is complete;
  • the processor is configured to perform first security processing on the uplink data on the first bearer to obtain second uplink data, where the first security process includes: At least one of performing integrity protection, encrypting data on the signaling radio bearer, and encrypting data on the radio bearer of the data;
  • the transmitter is further configured to send the second uplink data, the second
  • the uplink data includes a first security parameter indication, where the first security parameter indicates security used to indicate the first security processing of the second uplink data. parameter.
  • the receiver is further configured to receive downlink data of the first bearer, where the downlink data is subjected to a first security process, where the downlink data includes a second security parameter indication, and the second security parameter indication a security parameter used for indicating the first security processing of the downlink data;
  • the processor is further configured to: select a security parameter according to the second security parameter indication in the downlink data, and perform second security processing on the downlink data, where the The second security processing includes at least one of performing an integrity protection check on the data on the signaling radio bearer, decrypting the data on the signaling radio bearer, and decrypting the data on the radio bearer of the data.
  • the first message may further include information of a logical channel, where The information of the logical channel includes an identifier of a logical channel for carrying data on the first bearer that performs the first security processing using the second security parameter.
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to the first security parameter
  • the logical channel identifier of the third logical channel and the logical channel identifier of the fourth logical channel correspond to the second security parameter
  • a logical channel and a second logical channel are used to carry data on the first bearer that performs the first security process using the first security parameter
  • the third logical channel and the fourth logical channel are used to carry the first security using the second security parameter Processing the data on the first bearer; or the logical channel identifier of the fifth logical channel corresponds to the first security parameter
  • the logical channel identifier of the sixth logical channel corresponds to the second security parameter
  • the fifth logical channel is used to carry the first security
  • the parameter performs data on the first bear
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the processor is further configured to: after receiving the first message or after sending the second message, perform first security processing on the uplink data by using the second security parameter; before receiving the first message Or performing the first security processing on the uplink data by using the first security parameter before sending the second message.
  • the processor is further configured to: when the second security parameter indication in the downlink data indicates the first security parameter, use the first security parameter to perform second security processing on the downlink data; When the second security parameter indication in the downlink data indicates the second security parameter, the second security parameter is used to perform second security processing on the downlink data.
  • the first message is sent from the base station, and the second message is sent to the base station; or the first message is from the source base station, and the second message is sent to the target base station.
  • the source base station is a base station where the source primary cell is located
  • the target base station is a base station where the target primary cell is located.
  • an embodiment of the present invention provides a UE, where the UE includes a receiving unit, a processing unit, and a sending unit.
  • the UE implements the functions of the UE in the data transmission method of the first aspect described above, and thus can also achieve the beneficial effects of the data transmission method of the first aspect.
  • the function of the UE may be implemented by using hardware or by executing corresponding software through hardware.
  • the hardware or software includes at least one module corresponding to the functions described above.
  • the receiving unit is configured to receive a first message, where the first message is used to trigger a security parameter change of the first bearer, where the first bearer is a signaling radio bearer or a data radio bearer.
  • the parameter includes a key and/or a security algorithm, the security parameter change changes the security parameter of the first bearer from the first security parameter to the second security parameter;
  • the sending unit is configured to send the second message, wherein the second message
  • the processing unit is configured to perform the first security processing on the uplink data on the first bearer to obtain the second uplink data, where the first security processing includes: At least one of performing integrity protection, encrypting data on the signaling radio bearer, and encrypting data on the radio bearer of the data;
  • the sending unit is further configured to send the second uplink data, where
  • the second uplink data includes a first security parameter indication, where the first security parameter indicates that the first security process is used to indicate the second uplink data.
  • the receiving unit is further configured to receive downlink data of the first bearer, where the downlink data passes the first security process, the downlink data includes a second security parameter indication, and the second security parameter indication a security parameter used for indicating the first security processing of the downlink data; the processing unit is further configured to: select a security parameter according to the second security parameter indication in the downlink data, and perform second security processing on the downlink data, where The second security processing includes at least one of performing an integrity protection check on the data on the signaling radio bearer, decrypting the data on the signaling radio bearer, and decrypting the data on the radio bearer of the data.
  • the first message may further include information of a logical channel, where the information of the logical channel includes an identifier of a logical channel, and the logical channel is used to carry the second security.
  • the parameter performs data on the first bearer of the first security process.
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to the first security parameter
  • the logical channel identifier of the third logical channel and the logical channel identifier of the fourth logical channel correspond to the second security parameter
  • a logical channel and a second logical channel are used to carry data on the first bearer that performs the first security process using the first security parameter
  • the third logical channel and the fourth logical channel are used to carry the first security using the second security parameter Processing the data on the first bearer; or the logical channel identifier of the fifth logical channel corresponds to the first security parameter
  • the logical channel identifier of the sixth logical channel corresponds to the second security parameter
  • the fifth logical channel is used to carry the first security
  • the parameter performs data on the first bear
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the processing unit is further configured to: after receiving the first message or after sending the second message, perform first security processing on the uplink data by using the second security parameter; before receiving the first message Or performing the first security processing on the uplink data by using the first security parameter before sending the second message.
  • the processing unit is further configured to: when the second security parameter indication in the downlink data indicates the first security parameter, use the first security parameter to perform second security processing on the downlink data; When the second security parameter indication in the downlink data indicates the second security parameter, the second security parameter is used to perform second security processing on the downlink data.
  • the first message is from the base station, and the second message is sent to the base station; or the first message is from the source base station, and the second message is sent to the target base station, where the source base station is the source primary cell
  • the base station is the base station where the target primary cell is located.
  • an embodiment of the present invention provides a base station, where the base station includes: a processor and a transmitter, and may further include a receiver.
  • the base station implements the functions of the base station in the data transmission method of the second aspect described above, and thus can also achieve the beneficial effects of the data transmission method of the second aspect.
  • the function of the base station may be implemented by hardware, or may be implemented by hardware corresponding software.
  • the hardware or software includes at least one module corresponding to the functions described above.
  • the transmitter is configured to send a first message, where the first message is used to trigger a security parameter change of the first bearer, where the first bearer is a data radio bearer, and the security parameter includes a key and/or security.
  • An algorithm, the security parameter change changes the security parameter of the first bearer from the first security parameter to the second security parameter;
  • the processor is configured to perform first security processing on the downlink data on the first bearer to obtain second downlink data,
  • a security process includes performing encryption processing on the data radio bearer;
  • the transmitter is further configured to send the second downlink data, where the second downlink data includes a second security parameter indication, where the second security parameter indication is used for indicating The security parameter used by the first security processing of the second downlink data.
  • the receiver is configured to receive uplink data on the first bearer, where the uplink data is subjected to a first security process, where the uplink data includes a first security parameter indication, where the first security parameter indication is used for Determining a security parameter used by the first security processing of the uplink data;
  • the processor is further configured to: select a security parameter according to the first security parameter indication in the uplink data, perform second security processing on the uplink data, and second security processing This includes decrypting the data on the data radio bearer.
  • the first message may further include information of a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry a first bearer that performs a first security process by using the second security parameter.
  • the data on it may be included in the first message.
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to a first security parameter, a logical channel identifier of the third logical channel, and a fourth logic
  • the logical channel identifier of the channel corresponds to the second security parameter, where the first logical channel and the second logical channel are used to carry data on the first bearer that performs the first security processing using the first security parameter, the third logical channel and the fourth logical channel. And for carrying data on the first bearer that performs the first security process using the second security parameter.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the processor is further configured to: perform first security processing on the downlink data by using the first security parameter.
  • the processor is further configured to perform second security processing on the uplink data by using the first security parameter when the first security parameter indication in the uplink data indicates the first security parameter.
  • an embodiment of the present invention provides another base station, where the base station includes a receiver, a processor, and a transmitter.
  • the base station implements the functions of the base station in the data transmission method of the third aspect, and thus can also achieve the beneficial effects of the data transmission method of the third aspect.
  • the function of the base station may be implemented by hardware, or may be implemented by hardware corresponding software.
  • the hardware or software includes at least one module corresponding to the functions described above.
  • the receiver is configured to receive the second message, where the second message is used to indicate that the security parameter change of the first bearer is completed, and the first bearer is a data radio bearer; the processor is configured to use the first bearer.
  • the downlink data is subjected to the first security processing to obtain the second downlink data, where the first security processing includes performing encryption processing on the data radio bearer; the transmitter is configured to send the second downlink data, where the second downlink data includes The second security parameter indicates that the second security parameter indicates a security parameter used to indicate the first security processing of the second downlink data.
  • the receiver is further configured to receive uplink data on the first bearer, where the uplink data is subjected to a first security process, where the uplink data includes a first security parameter indication,
  • the first security parameter indicates a security parameter used to indicate the first security processing of the uplink data
  • the processor is further configured to: select a security parameter according to the first security parameter indication in the uplink data, and perform the Second security processing, the second security processing includes decrypting data on the data radio bearer.
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to the first security parameter
  • the logical channel identifier of the third logical channel and the logical channel identifier of the fourth logical channel correspond to the second security parameter
  • a logical channel and a second logical channel are used to carry data on a first bearer that performs a first security process using a first security parameter
  • the third logical channel and the fourth logical channel are used to carry a second security parameter.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the processor is further configured to perform the first security processing on the downlink data by using the second security parameter.
  • the processor is further configured to perform second security processing on the uplink data by using the second security parameter when the first security parameter indication in the uplink data indicates the second security parameter.
  • an embodiment of the present invention provides a base station, where the base station includes a receiver, a processor, and a transmitter.
  • the base station implements the functions of the base station in the data transmission method of the fourth aspect described above, and thus can also achieve the beneficial effects of the data transmission method of the fourth aspect.
  • the function of the base station may be implemented by hardware, or may be implemented by hardware corresponding software.
  • the hardware or software includes at least one module corresponding to the functions described above.
  • the transmitter is configured to send a first message, wherein the first message
  • the security parameter is used to trigger the change of the first bearer, where the first bearer is a signaling radio bearer or a data radio bearer, and the security parameter includes a key and/or a security algorithm, and the security parameter changes the first bearer security parameter from the first
  • the security parameter is changed to the second security parameter
  • the receiver is configured to receive the second message, where the second message is used to indicate that the security parameter change of the first bearer is completed
  • the processor is configured to perform the first downlink data on the first bearer
  • the security process is performed to obtain second downlink data, where the first security processing includes: performing integrity protection on the data on the signaling radio bearer, encrypting data on the signaling radio bearer, and encrypting data on the radio bearer of the data.
  • the transmitter is further configured to send the second downlink data, where the second downlink data includes a second security parameter indication, the second security parameter indication is used to indicate the first of the second
  • the receiver is further configured to receive uplink data on the first bearer, where the uplink data is subjected to a first security process, where the uplink data includes a first security parameter indication, and the first security parameter indication a security parameter used to indicate the first security processing of the uplink data;
  • the processor is further configured to: select a security parameter according to the first security parameter indication in the uplink data, and perform second security processing on the uplink data, where the The second security processing includes at least one of performing an integrity protection check on the data on the signaling radio bearer, decrypting the data on the signaling radio bearer, and decrypting the data on the radio bearer of the data.
  • the first message may further include information of a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry the first security processing using the second security parameter.
  • a data on the bearer may be included in the first message.
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the fifth logical channel corresponds to the first security parameter
  • the logical channel identifier of the sixth logical channel corresponds to the second security parameter
  • the fifth logical channel is used to carry the first security processing by using the first security parameter.
  • the data on the bearer, the sixth logical channel is used to carry data on the first bearer that performs the first security process using the second security parameter.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the processor is further configured to perform the first security processing on the downlink data after using the second security parameter after sending the first message or after receiving the second message;
  • the first security process is performed on the downlink data using the first security parameter before receiving the second message.
  • the processor is further configured to: when the first security parameter indication in the uplink data indicates the first security parameter, perform second security processing on the uplink data by using the first security parameter; When the first security parameter indication indicates that the second security parameter is indicated, the second security parameter is used to perform second security processing on the uplink data.
  • an embodiment of the present invention provides a base station, where the base station includes: a processing unit and a sending unit, and may further include a receiving unit.
  • the base station implements the functions of the base station in the data transmission method of the second aspect described above, and thus can also achieve the beneficial effects of the data transmission method of the second aspect.
  • the function of the base station may be implemented by hardware, or may be implemented by hardware corresponding software.
  • the hardware or software includes at least one module corresponding to the functions described above.
  • the sending unit is configured to send a first message, where the first message is used to trigger a security parameter change of the first bearer, where the first bearer is a data radio bearer, and the security parameter includes a key and/or
  • the security algorithm changes the security parameter of the first bearer from the first security parameter to the second security parameter;
  • the processing unit is configured to perform first security processing on the downlink data on the first bearer to obtain the second downlink data.
  • the first security process includes performing encryption processing on the data radio bearer;
  • the sending unit is further configured to send the second downlink data, where the second downlink data includes a second security parameter indication, where the second security parameter indication is used And a security parameter used by the first security process indicating the second downlink data.
  • the receiving unit is configured to receive uplink data on the first bearer, where the uplink data is subjected to a first security process, where the uplink data includes a first security parameter indication,
  • the first security parameter indicates a security parameter used to indicate the first security processing of the uplink data
  • the processing unit is further configured to select a security parameter according to the first security parameter indication in the uplink data, and perform the Second security processing, the second security processing includes decrypting data on the data radio bearer.
  • the first message may further include information of a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry a first bearer that performs a first security process by using the second security parameter.
  • the data on it may be included in the first message.
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to the first security parameter
  • the logical channel identifier of the third logical channel and the logical channel identifier of the fourth logical channel correspond to the second security parameter
  • a logical channel and a second logical channel are used to carry data on the first bearer that performs the first security process using the first security parameter
  • the third logical channel and the fourth logical channel are used to carry the first security using the second security parameter Processing the data on the first bearer.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the processing unit is further configured to: perform first security processing on the downlink data by using the first security parameter.
  • the processing unit is further configured to perform second security processing on the uplink data by using the first security parameter when the first security parameter indication in the uplink data indicates the first security parameter.
  • an embodiment of the present invention provides a base station, where the base station includes a receiving unit, a processing unit, and a sending unit.
  • the base station implements the functions of the base station in the data transmission method of the third aspect, and thus can also achieve the beneficial effects of the data transmission method of the third aspect.
  • the base station The functions can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes at least one module corresponding to the functions described above.
  • the receiving unit is configured to receive the second message, where the second message is used to indicate that the security parameter change of the first bearer is completed, and the first bearer is a data radio bearer;
  • the processing unit is configured to use the first The downlink data on the bearer performs the first security process to obtain the second downlink data, where the first security process includes performing encryption processing on the data radio bearer;
  • the sending unit is configured to send the second downlink data, where the second downlink The data includes a second security parameter indication indicating a security parameter used to indicate the first security process of the second downlink data.
  • the receiving unit is further configured to receive uplink data on the first bearer, where the uplink data is subjected to a first security process, where the uplink data includes a first security parameter indication, where the first security parameter indicates a security parameter used for indicating the first security processing of the uplink data; the processing unit is further configured to: select a security parameter according to the first security parameter indication in the uplink data, perform second security processing on the uplink data, and second Security processing involves decrypting data on the data radio bearer.
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to the first security parameter
  • the logical channel identifier of the third logical channel and the logical channel identifier of the fourth logical channel correspond to the second security parameter
  • a logical channel and a second logical channel are used to carry data on a first bearer that performs a first security process using a first security parameter
  • the third logical channel and the fourth logical channel are used to carry a second security parameter.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the processing unit is further configured to perform the first security processing on the downlink data by using the second security parameter.
  • the processing unit is further configured to perform second security processing on the uplink data by using the second security parameter when the first security parameter indication in the uplink data indicates the second security parameter.
  • an embodiment of the present invention provides a base station, where the base station includes a receiving unit, a processing unit, and a sending unit.
  • the base station implements the functions of the base station in the data transmission method of the fourth aspect described above, and thus can also achieve the beneficial effects of the data transmission method of the fourth aspect.
  • the function of the base station may be implemented by hardware, or may be implemented by hardware corresponding software.
  • the hardware or software includes at least one module corresponding to the functions described above.
  • the sending unit is configured to send a first message, where the first message is used to trigger a security parameter change of the first bearer, where the first bearer is a signaling radio bearer or a data radio bearer, and the security parameter includes a key and/or security algorithm that changes a security parameter of the first bearer from a first security parameter to a second security parameter;
  • the receiving unit is configured to receive a second message, wherein the second message is used to indicate The change of the security parameter of the bearer is completed;
  • the processing unit is configured to perform the first security processing on the downlink data on the first bearer to obtain the second downlink data, where the first security process includes: completing the data on the signaling radio bearer At least one of the protection of the data, the encryption processing of the data on the signaling radio bearer, and the encryption processing of the data on the radio bearer;
  • the transmitting unit is further configured to send the second downlink data, where the second downlink data Including a second security parameter indication, the second security parameter indicating security used to indicate the
  • the receiving unit is further configured to receive uplink data on the first bearer, where the uplink data is subjected to a first security process, where the uplink data includes a first security parameter indication, where the first security parameter indicates a security parameter used for indicating the first security processing of the uplink data;
  • the processing unit is further configured to: select a security parameter according to the first security parameter indication in the uplink data, and perform second security processing on the uplink data, where the The second security treatment includes: The data on the radio bearer is subjected to at least one of an integrity protection check, a decryption process on the data on the signalling radio bearer, and a decryption process on the data on the radio bearer.
  • the first message may further include information of a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry the first security processing using the second security parameter.
  • a data on the bearer may be included in the first message.
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the fifth logical channel corresponds to the first security parameter
  • the logical channel identifier of the sixth logical channel corresponds to the second security parameter
  • the fifth logical channel is used to carry the first security processing by using the first security parameter.
  • the data on the bearer, the sixth logical channel is used to carry data on the first bearer that performs the first security process using the second security parameter.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the processing unit is further configured to: after the first message is sent or after receiving the second message, use the second security parameter to perform first security processing on the downlink data; before sending the first message or The first security process is performed on the downlink data using the first security parameter before receiving the second message.
  • the processing unit is further configured to: when the first security parameter indication in the uplink data indicates the first security parameter, perform second security processing on the uplink data by using the first security parameter; When the first security parameter indication indicates that the second security parameter is indicated, the second security parameter is used to perform second security processing on the uplink data.
  • the base station by introducing a first security parameter indication in the uplink data of the first bearer, the base station can determine, according to the first security parameter indication in the uplink data, that the uplink data is the first security
  • the parameter is also the second security parameter to perform the first security process, and then the corresponding security parameter is selected for the second security process, thereby solving the confusion period
  • the problem of erroneous data is decrypted internally; the second security parameter indication is introduced in the downlink data, and the UE can determine whether the data is based on the first security parameter or the second security parameter according to the second security parameter indication in the downlink data.
  • a security process and then select the corresponding security parameters for the second security process, thereby solving the problem of decrypting the wrong data during the confusing period.
  • FIG. 1 is a schematic flowchart of a control plane for changing a security parameter during a PCell change process between base stations according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of an uplink data transmission process of a possible split bearer according to an embodiment of the present invention
  • FIG. 3 is a schematic flowchart of a downlink data transmission process of a possible split bearer according to an embodiment of the present invention
  • FIG. 4 is a schematic flowchart of a control plane of a possible security parameter change in a base station according to an embodiment of the present invention
  • FIG. 5 is a schematic flowchart of a data plane of a possible security parameter change in a base station according to an embodiment of the present invention
  • FIG. 6 is a schematic structural diagram of a device of a possible UE according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of another possible UE according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a device of a possible base station according to an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of another possible base station apparatus according to an embodiment of the present invention.
  • FIG. 1 is a schematic flowchart of a control plane for changing a security parameter in a primary cell (Primary Cell, PCell) change process between base stations according to an embodiment of the present invention.
  • Primary Cell Primary Cell
  • a user equipment may be referred to as a terminal (Mobile), a mobile station (Mobile Station, MS), a mobile terminal (Mobile Terminal), etc.
  • the user equipment may be through a radio access network.
  • Radio Access Network, RAN communicates with one or more core networks, for example, the user equipment may be a mobile phone (or "cell phone"), a computer with a mobile terminal, etc., for example, the user equipment may also be portable , pocket, handheld, computer built-in or in-vehicle mobile devices that exchange voice and/or data with a wireless access network.
  • the source base station determines to perform a PCell change of the UE, and determines a target PCell that performs PCell change.
  • the source base station is the base station where the source PCell is located, and the source PCell is the PCell that provides services for the UE before the PCell change.
  • the source base station may also be referred to as a source primary base station (Master eNB, abbreviated as MeNB).
  • the source base station allocates a third logical channel to the split split bearer of the UE, where the third logical channel corresponds to a unique logical channel identifier LCID3, where the third logical channel is used to transmit the split bearer after the PCell change is completed.
  • the downlink data sent by the air interface of the source base station to the UE and the source base station receive uplink data from the UE through the air interface.
  • the source base station Before the source base station decides to change the PCell of the UE, the source base station has established a first logical channel for the split bearer, corresponding to the logical channel identifier LCID1, where the first logical channel is used to transmit the split bearer through the source base station before the PCell change is completed.
  • the air interface sends downlink data to the UE and the source base station receives uplink data from the UE over the air interface.
  • the source base station allocates a new logical channel for each split bearer of the UE.
  • the description is performed according to the UE having only one split bearer.
  • the source base station sends a first message to the target base station, where the first message is used to indicate a PCell change, where the target base station is a base station where the target PCell is located.
  • the target base A station can also be referred to as a target primary base station.
  • the first message includes target PCell information, such as a cell identity or index of the target PCell.
  • the first message further includes a first GPRS tunneling protocol (General Packet Radio System Tunneling Protocol, GTP) tunnel information, and the corresponding GTP tunnel identifier is GTP1, and is used for transmitting after the S1 path switching.
  • GTP General Packet Radio System Tunneling Protocol
  • the downlink data that is sent by the target base station to the source base station, where the downlink data needs to be sent to the UE by using an air interface of the source base station, where the first security process includes performing encryption processing on the data on the split bearer.
  • the target base station allocates a fourth logical channel to the split bearer of the UE, corresponding to the logical channel identifier LCID4, where the fourth logical channel is used to transmit the split destination of the PCell after the PCell change is completed.
  • the downlink data sent by the air interface of the base station to the UE and the target base station receive uplink data from the UE through the air interface.
  • the target base station Before the source base station decides to change the PCell of the UE, the target base station has established a second logical channel for the split bearer, corresponding to the logical channel identifier LCID2, where the second logical channel is used to transmit the split bearer through the target base station before the PCell change is completed.
  • the air interface sends downlink data to the UE and the target base station receives uplink data from the UE over the air interface.
  • a fourth GTP tunnel is established between the source base station and the target base station, and the identifier of the corresponding GTP tunnel is GTP4, and is used for transmission.
  • the target base station sends a second message to the source base station, where the second message is used to confirm the first message sent by the source base station to the target base station.
  • the second message includes a bearer identifier of the split bearer, and the second message may further include a logical channel identifier LCID4 of the fourth logical channel corresponding to the split bearer.
  • the second message includes the second GTP tunnel information carried by the split, corresponding to The GTP tunnel is identified as GTP2, and is used to transmit uplink data that is sent by the source base station to the target base station after the S1 path is switched, and the uplink data is sent by the target base station to the Serving Gateway (S-GW).
  • S-GW Serving Gateway
  • the second message includes the third GTP tunnel information carried by the split, and the corresponding GTP tunnel identifier is GTP3, and is used to transmit uplink data that is sent by the source base station to the target base station after the S1 path switch, where the uplink data is The target base station performs second security processing and sends it to the S-GW.
  • the source base station sends a third message to the UE, where the third message is used to trigger a PCell change, and may also be used to trigger a security parameter change, and the security parameter change changes the security parameter of the split bearer from the first security parameter to the second.
  • Safety parameters The third message includes the target PCell information, and the third message may further include the bearer identifier of the split bearer and the information of the logical channel, where the information of the logical channel includes a logical channel identifier, and the logical channel is added and used for bearer use.
  • the second security parameter performs data on the split bearer of the first security process.
  • the first security parameter includes a key of the source base station and/or a security algorithm of the source base station, where the first security parameter is used for performing first security processing and second security processing on the data on the split bearer before the security parameter is changed.
  • a security parameter includes a key of the target base station and/or a security algorithm of the target base station, where the second security parameter is used to perform first security processing and second on the data on the split bearer after the security parameter is changed.
  • the information of the third logical channel and the information of the fourth logical channel may be included in the third message. So that the UE learns that the split bearer corresponds to four logical channels, where the first logical channel and the second logical channel are established before receiving the third message, and are used to carry the first security processing by using the first security parameter.
  • the data is carried on the split; the third logical channel and the fourth logical channel are established after receiving the third message, and are used to carry data on the split bearer that performs the first security process by using the second security parameter.
  • the third message may be a PCell change message or an RRC Connection Reconfiguration message including a PCell change indication, and the UE is instructed to perform the change of the PCell by using a modification instead of a handover.
  • performing PCell changes in a modified manner includes, During the PCell change process, the wireless connection between the UE and the source PCell and the target PCell is maintained without interruption, and the source base station and the target base station can schedule the data of the UE during the PCell change process. It can be understood that the third message can also be other types of messages, which is not limited by the present invention.
  • the UE performs a PCell change and a security parameter change according to the received third message from the source base station.
  • the PCell change includes changing the target PCell to the PCell of the UE and changing the source PCell to the active secondary SCell of the UE.
  • the PCell change further includes the UE changing the source base station to a secondary base station (Secondary eNB, SeNB for short) and changing the target base station to the primary base station.
  • a secondary base station Secondary eNB, SeNB for short
  • the data plane processing of the security parameter change may refer to the description of the embodiment in FIG. 2 and FIG. 3.
  • the UE sends a fourth message to the target base station, where the fourth message is used to indicate that the PCell change is complete, and may also be used to indicate that the security parameter change of the split bearer is completed.
  • the fourth message may include a first COUNT value, where the first COUNT value is a starting COUNT value of a data packet in which the UE performs the first security processing on the uplink data by using the second security parameter.
  • the fourth message may be a new message, such as a PCell change completion message, or may be an RRC connection reconfiguration complete message, indicating that the PCell change operation of the UE has been completed.
  • the target base station After receiving the fourth message sent by the UE, the target base station sends a fifth message to the source base station, where the fifth message is used to indicate that the PCell change is complete or is used to request a sequence number (SN) state.
  • the requesting SN status includes requesting, by the source base station, a Packet Data Convergence Protocol (PDCP) SN receiving status and a downlink PDCP SN sending status.
  • PDCP Packet Data Convergence Protocol
  • the source base station After receiving the fifth message sent by the target base station, the source base station sends a sixth message to the target base station, where the sixth message is used for SN state transition, where the sixth message includes an uplink PDCP SN receiving status and a downlink PDCP SN sending status.
  • the PDCP SN receiving status may include a second COUNT value and At least one of a receiving state of the corresponding PDCP receiving window, the second COUNT value is a count COUNT value of the first unreceived PDCP data of the source base station;
  • the PDCPSN sending state may include a third COUNT value and At least one of the transmission status of the corresponding PDCP transmission window, the third COUNT value is a starting COUNT value assigned by the target base station to the downlink data of the unassigned sequence number (ie, from which COUNT value the target base station starts to allocate the sequence number).
  • the source base station stops allocating the PDCP sequence number to the data carried by the split.
  • the source base station sends the received uplink data to the target base station, and sends the downlink data that has been allocated the sequence number but has not been successfully sent to the UE and the downlink data that has not been allocated the sequence number received from the serving gateway to the target.
  • Base station sends the received uplink data to the target base station, and sends the downlink data that has been allocated the sequence number but has not been successfully sent to the UE and the downlink data that has not been allocated the sequence number received from the serving gateway to the target.
  • the target base station sends an S1 path switch request message to the Mobility Management Entity (MME) to request the MME to switch the S1-U interface and the S1-U path of the split bearer to the target base station, so that the target base station becomes For the new primary base station, the subsequent MME sends the S1 signaling to the new primary base station, and the S-GW sends the downlink data carried by the split to the new primary base station.
  • MME Mobility Management Entity
  • the MME sends an S1 path switch request acknowledgement message to the target base station, and is used to confirm the S1 path switch request message.
  • the target base station determines that the confusion period of the data transmission of the split bearer has ended, and deletes the second logical channel.
  • the target base station determines whether the obfuscation period of the uplink data transmission and the downlink data transmission of the split bearer has ended. If the obfuscation period of the uplink data transmission and the downlink data transmission has ended, the data transmission of the split bearer is considered to be performed. The confusion period is over.
  • the target base station determines that the data of the COUNT value of the downlink data of the split bearer is successfully received by the UE, and the confusing period of the downlink data transmission of the split bearer is considered to have ended.
  • the target base station determines that the data of the COUNT value of the uplink data of the split is successfully received by the target base station, and the obfuscation period of the uplink data transmission of the split bearer is considered to have ended. If the first COUNT value is not included in the fourth message, the first COUNT value is a COUNT value of the first uplink data packet received by the target base station for performing the first security processing using the second security parameter. It can be understood that the uplink data can be received through the air interface of the source base station and then sent to the target base station.
  • the target base station sends a seventh message to the source base station, where the seventh message is used to indicate that the obfuscation period ends or deletes the old logical channel, where the seventh message includes the bearer identifier of the split bearer.
  • the source base station After receiving the seventh message, the source base station deletes the first logical channel.
  • the target base station sends an eighth message to the UE, where the eighth message is used to indicate that the obfuscation period ends or deletes the old logical channel, where the eighth message includes the bearer identifier of the split bearer.
  • the UE After receiving the eighth message, the UE deletes the first logical channel and the second logical channel.
  • the UE determines that the obfuscation period of the data transmission of the split bearer has ended, deleting the first logical channel and the second logical channel.
  • the UE determines whether the obfuscation period of the uplink data transmission and the downlink data transmission of the split bearer has ended. If the obfuscation period of the uplink data transmission and the downlink data transmission has ended, the data transmission of the split bearer is considered. The confusion period is over.
  • the UE records the received COUNT value of the first PDCP data processed by the second security parameter of the split bearer as a fourth COUNT value. If the UE determines that the data of the COUNT value of the downlink data of the split is successfully received by the UE, the UE considers that the confusion period of the downlink data transmission of the split has ended.
  • the UE determines that the uplink data of the COUNT value of the split bearer before the first COUNT value is successfully received by the target base station, and considers that the confusion period of the uplink data transmission of the split bearer has ended. It can be understood that the uplink data can be received through the air interface of the source base station and then sent to the target base station.
  • the execution order of the above 112 and 113 or the execution order of 111 and 114 is not in the embodiment of the present invention. Make a limit.
  • the method of the embodiment shown in FIG. 1 is described by taking Dual Connectivity (DC) as an example, but this does not limit the scenario to which the embodiment applies.
  • the method in this embodiment is also applicable to a single carrier scenario and a carrier aggregation (CA) scenario.
  • a single carrier scenario or a CA scenario when the UE experiences a serving cell update or a PCell update between the base stations due to mobility, the network first adds the target base station as the secondary base station of the UE, and the current serving base station becomes the primary base station, corresponding to The UE is also configured in a DC mode, and the scene of the UE is also converted into a DC scenario.
  • each set of security parameters may correspond to one logical channel identifier.
  • the LCID the set of security parameters used by the sender for the first security processing
  • the data includes the corresponding LCID.
  • the receiver can determine the security parameter used by the sender according to the LCID in the data, and the receiver uses the security parameter to perform the second. Safe handling, which solves the problem of decrypting the wrong data during the confusing period.
  • FIG. 2 is a schematic diagram of an uplink data transmission process of a possible split bearer according to an embodiment of the present invention.
  • the UE performs first security processing on the uplink data on the split bearer to obtain second uplink data.
  • the first security process is performed on the uplink data by using the second security parameter; before the security parameter switching time point, the first security process is performed on the uplink data by using the first security parameter.
  • the security parameter switching time point may be a time point when the UE receives the third message or may be a time point for the UE to send the fourth message, or may be a certain time point determined by the UE.
  • the UE offloads the second uplink data, and part of the data is sent to the source base station by using an air interface; and another part of the data is sent to the target base station by using an air interface.
  • the UE sends the second uplink data to the source base station.
  • the second uplink data includes a first security parameter indication, where the first security parameter indicates whether the security parameter used by the first security processing of the second uplink data is the first security parameter or the second security parameter.
  • the first security process includes performing encryption processing on the data on the split bearer, where the first security parameter includes a key of the source base station and/or a security algorithm of the source base station, where the second security parameter includes a key of the target base station. And/or the security algorithm of the target base station.
  • the first security parameter indication may be a logical channel identifier, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier may be LCID1 or LCID3
  • LCID1 indicates a first security parameter
  • LCID3 indicates a second security parameter.
  • the second uplink data may be carried on a logical channel corresponding to the logical channel identifier.
  • the first security parameter indication may also be a new one of the headers of the PDCP data packet: the content of the cell may be a base station identifier or a base station index anchored by the security function; or may be fixed one bit or multiple bits Cycling changes, the change in the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter. If the content indicated by the first security parameter is a base station identifier or a base station index of the source base station, indicating that the first security parameter indication indicates a first security parameter; if the content indicated by the first security parameter is a base station identifier of the target base station Or the base station index indicates that the first security parameter indication indicates the second security parameter.
  • the content indicated by the first security parameter is a cyclic change value of one bit or multiple bits, then one bit is taken as an example: if the value indicated by the first security parameter is 0 before the PCell change process, After the PCell change process is started, it becomes 1, then 0 represents that the first security parameter indication indicates a first security parameter, and 1 represents that the first security parameter indication indicates a second security parameter; or conversely, the first security parameter The value of the indication is 1 before the PCell change process, and becomes 0 after the PCell change process is started. Then 1 indicates that the first security parameter indication indicates the first security parameter, and 0 indicates the first security parameter indication indication. Is the second security parameter. It can be understood that whether the value of the bit changes is based on the value of the bit before the PCell change.
  • the source base station selects a security parameter according to the first security parameter indication in the second uplink data.
  • the second security processing is performed on the second uplink data.
  • the second security process includes performing decryption processing on the data on the split bearer, where the data on the split bearer is the second uplink data.
  • the source base station when the first security parameter indication in the second uplink data indicates the first security parameter, the source base station performs second security processing on the second uplink data by using the first security parameter; when the second uplink data is used.
  • the first security parameter indication indicates that the second security parameter is instructed, the second uplink data needs to be forwarded to the target base station for performing second security processing, and the source base station does not perform second security processing on the second uplink data.
  • the source base station sends the split bearer data to the target base station, where the split bearer data is data that is processed by the source base station or that is not subjected to the second security process of the source base station, and needs to be forwarded to the target base station for second security processing. data.
  • the split bearer data includes a first security parameter indication, where the first security parameter of the data is used to indicate whether the first security parameter is a first security parameter or a second security parameter.
  • first security parameter indication refers to the description of 211 for the first security parameter indication.
  • the source base station may also send the split bearer data to the target base station through different GTP tunnels.
  • the logical channel identifier is data of LCID1, and is transmitted on the second GTP tunnel;
  • the logical channel identifier is data of LCID3, and is transmitted on the third GTP tunnel.
  • the target base station processes data from the source base station according to the GTP tunnel receiving the data or according to the first security parameter indication in the data.
  • the second base station performs the second security processing on the data from the second GTP tunnel, and the target base station sends the data to the S. -GW; for data from the third GTP tunnel, the target base station performs second security processing on the data using the second security parameter, and then sends the data to S-GW.
  • the target base station may further select a security parameter according to the first security parameter indication in the data, and perform second security processing on the data. Specifically, when the first security parameter indication in the data indicates the first security parameter, the data has been processed by the source base station, and the target base station does not need to perform second security processing on the data; When the first security parameter indication in the data indicates the second security parameter, the target base station performs second security processing on the data using the second security parameter. For details, how to determine whether the first security parameter indication in the data indicates the first security parameter or the second security parameter, as described in 211.
  • the target base station sends the data processed by 214 to the S-GW. It can be understood that the data needs to be removed from the PDCP header information before being sent to the S-GW, and encapsulated according to the data format of the S1 interface.
  • the UE sends the second uplink data to the target base station.
  • the second uplink data includes a first security parameter indication.
  • the logical channel identifier may be LCID2 or LCID4
  • the LCID2 indicates a first security parameter
  • the LCID4 indicates a second security parameter
  • the second uplink data is carried in the logical channel.
  • the corresponding security channel is identified.
  • the specific security parameter indicates that the specific value can be referred to the related description in 211.
  • the target base station selects a security parameter according to the first security parameter indication in the second uplink data, and performs second security processing on the uplink data.
  • the second uplink data needs to be forwarded to the source base station for performing second security processing, and the target base station does not The second security process is performed.
  • the target base station performs the second security processing on the second uplink data by using the second parameter.
  • the full parameter is also the second security parameter, as described in 211.
  • the target base station sends the data that has completed the second security processing to the S-GW. It can be understood that the data needs to be removed from the PDCP header information before being sent to the S-GW, and encapsulated according to the data format of the S1 interface.
  • the target base station sends, by the first security parameter indication, the data of the first security parameter to the source base station, where the data is received by the target base station by using an air interface, where the data may include a first security parameter indication for indicating The first security parameter of the data is the first security parameter or the second security parameter.
  • the target base station sends, by using the fourth GTP tunnel, data that is identified by the logical channel as LCID2 to the source base station, where the data is received by the target base station over the air interface.
  • the source base station performs second security processing on data from the target base station, where the second security process uses the first security parameter.
  • the source base station sends the data that is processed by the second security to the target base station, where the data may include a first security parameter indication.
  • the first security parameter indicates a logical channel identifier
  • the data may be transmitted on the second GTP tunnel.
  • the target base station sends data from the source base station to the S-GW, where the first security parameter indication of the data indicates the first security parameter, or the data is transmitted through the second GTP tunnel. It can be understood that the data needs to be removed from the PDCP header information before being sent to the S-GW, and encapsulated according to the data format of the S1 interface.
  • the source base station and the target base station can determine, according to the first security parameter indication in the uplink data, whether the uplink data is processed by using the first security parameter or the second security parameter, Then, the corresponding security parameters are selected for the second security processing, thereby solving the problem that the decrypted data is erroneous during the confusing period.
  • the above-mentioned uplink data flow is described based on the scenario in which the S1 path has been switched. For the scenario where the S1 path has not been switched yet, there is a similar data flow, which can be obtained by referring to the above process.
  • FIG. 3 is a schematic diagram of a downlink data transmission process of a possible split bearer according to an embodiment of the present invention.
  • the source base station performs the first security processing on the downlink data on the split bearer from the S-GW to obtain the second downlink data, where the first security process includes performing encryption processing on the data on the split bearer, where the first security is performed.
  • the process uses a first security parameter that includes a key of the source base station and/or a security algorithm of the source base station.
  • the source base station offloads the second downlink data, and part of the data is sent to the UE by using an air interface of the source base station; and another part of the data is sent to the target base station by using an X2-U interface (a data plane interface between the base station and the base station). And transmitting to the UE through the air interface of the target base station.
  • X2-U interface a data plane interface between the base station and the base station.
  • the source base station sends the second downlink data to the UE, where the second downlink data includes a second security parameter indication, where the second security parameter indicates a security parameter used to indicate the first security processing of the second downlink data. Is the first security parameter or the second security parameter.
  • the second security parameter indicates that the security parameter used by the second downlink data is the first security parameter.
  • the second security parameter indication may be a logical channel identifier, where different logical channel identifiers respectively correspond to the first security parameter and the second security parameter, where the logical channel identifier is LCID1, and the LCID1 indicates the first security parameter.
  • the second downlink data is carried on the first logical channel.
  • the second security parameter indication may also be a new cell in the PDCP header for indicating the first security parameter, and the relevant description in 211 may be referred to the new cell.
  • the second security parameter indication is similar to the definition of the first security parameter indication, wherein the second security parameter indicates a security parameter used for indicating the first security processing of the downlink data, and the first security parameter Indicates a security parameter used by the first security process for indicating uplink data.
  • the source base station sends the second downlink data to the target base station by using an X2-U interface, where the second downlink data includes a second security parameter indication or is transmitted through a specific GTP tunnel, and is used to indicate a security parameter used by the data. Is the first security parameter.
  • the target base station sends the second downlink data from the source base station to the air interface by using an air interface.
  • the UE includes the second security parameter indication in the second downlink data.
  • the second security parameter indicates that the security parameter used to indicate the second downlink data is the first security parameter. .
  • the second security parameter indication may be a logical channel identifier, where the logical channel identifier is LCID2, and the LCID2 indicates the first security parameter, and correspondingly, the second downlink data is carried on the second logical channel.
  • the security parameter indication may also be a new one of the PDCP headers for indicating the first security parameter, and the relevant description in 211 may be referred to for the new cell.
  • the target security base station performs the first security processing on the downlink data on the split bearer from the S-GW to obtain the second downlink data, where the first security process includes performing encryption processing on the data on the split bearer, where the first security is performed.
  • the process uses a second security parameter that includes the key of the target base station and/or the security algorithm of the target base station.
  • the target base station offloads the second downlink data, and part of the data is sent to the UE through the air interface of the target base station; another part of the data is sent to the source base station through the X2-U interface, and is sent to the UE through the air interface of the source base station.
  • the first security processing performed by the target base station on the data carried by the split using the second security parameter is performed after the target base station receives the fourth message in FIG.
  • the target base station sends the second downlink data to the UE, where the second downlink data includes a second security parameter indication.
  • the second security parameter indicates that the security parameter indicating the use of the downlink data is the second security parameter.
  • the second security parameter indication may be a logical channel identifier, where the logical channel identifier is LCID4, and the LCID4 indicates a second security parameter, and correspondingly, the second downlink data is carried on the fourth logical channel.
  • the second security parameter indication may also be a new cell in the PDCP header for indicating the second security parameter, and the relevant description in 211 may be referred to the new cell.
  • the target base station sends the second downlink data to the source base station by using the X2-U interface, where the second downlink data includes the second security parameter indication or is transmitted by using the first GTP tunnel, and is used to indicate the security parameter used by the data. Is the second security parameter.
  • the source base station sends the second downlink data from the target base station to the air interface by using an air interface.
  • the UE includes the second security parameter indication in the second downlink data.
  • the second security parameter indicates that the security parameter used to indicate the downlink data is the second security parameter.
  • the second security parameter indication may be a logical channel identifier, where the logical channel identifier is LCID3, and the LCID3 indicates a second security parameter, and correspondingly, the second downlink data is carried on the third logical channel.
  • the second security parameter indication may also be a new one of the PDCP headers for indicating the first security parameter, and the relevant description in 211 may be referred to the new cell.
  • the eNB selects a security parameter, and performs second security processing on the second downlink data, where the second security processing includes performing decryption processing on the data on the split bearer.
  • the second security parameter indication in the second downlink data indicates the first security parameter
  • the UE performs the second security processing on the second downlink data by using the first security parameter
  • the second security parameter indicates that the second security parameter is indicated
  • the UE performs second security processing on the second downlink data by using the second security parameter.
  • how to determine whether the second security parameter indication in the data indicates the first security parameter or the second security parameter, and refer to the related description of the first security parameter in 211.
  • the UE can determine, according to the second security parameter indication in the downlink data, whether the data is processed by using the first security parameter or the second security parameter, and then selecting the corresponding security.
  • the parameter performs the second security processing, thereby solving the problem that the decrypted data is erroneous during the confusing period.
  • the implicit processing may be used to indicate whether the data is used by the first security parameter or the second security parameter, such as a PCell change.
  • the former UE uses the C-RNTI 1 (Cell Radio Network Temporary Identifier), and the base station allocates a new C-RNTI 2 and carries it to the UE when the PCell is changed.
  • C-RNTI 1 Cell Radio Network Temporary Identifier
  • the base station allocates a new C-RNTI 2 and carries it to the UE when the PCell is changed.
  • the UE After transmitting the data to the peer, the UE (or base station) transmits data using the C-RNTI 2; the peer receives the data. After the data, the second security processing is performed on the data according to whether the C-RNTI 1 or the C-RNTI 2 is used to select the corresponding security parameter. For specific steps, refer to the above description, which will not be described in detail here.
  • FIG. 1, FIG. 2 and FIG. 3 are related embodiments of the security parameter change during the PCell change process between the base stations, and FIG. 1 corresponds to the control plane flow of the security parameter change, and FIG. 2 corresponds to the uplink.
  • the data transmission process, Figure 3 corresponds to the downlink data transmission process.
  • TCP Traffic Control Protocol
  • UDP User Datagram Protocol
  • the business of its data transmission is one-way. Therefore, for the first bearer, uplink data transmission and downlink data transmission may exist at the same time, and only downlink data transmission or only uplink data transmission may be performed.
  • FIG. 4 is a schematic flowchart of a control plane of a possible security parameter change in a base station according to an embodiment of the present invention.
  • the base station determines to perform a security parameter change, where the security parameter includes a key and/or a security algorithm, and the security parameter may be used for the third security process and the fourth security process.
  • the third security process includes at least one of performing integrity protection on data on the signaling radio bearer, encrypting data on the signaling radio bearer, and encrypting data on the radio bearer of the data.
  • the fourth security processing includes at least one of performing an integrity protection check on the data on the signaling radio bearer, decrypting the data on the signaling radio bearer, and decrypting the data on the radio bearer of the data.
  • the new security parameter that is, the fourth security parameter
  • the base station communicates with the UE to use the third security parameter.
  • the security parameter change of the base station may be to avoid reuse of the COUNT value by using the same key and Radio Bearer Identity (RB ID).
  • the security parameter change will affect the MCG. Bearer and split bearer; if the base station is the secondary base station of the UE configured with DC, the security parameter change will affect the SCG bearer.
  • the affected bearer includes at least one of a signaling bearer and a data bearer. There may be one or more affected bearers. For convenience of description, it is assumed that there is only one bearer affected, which is called the first bearer. For a scenario in which a plurality of affected bearers are present, those skilled in the art can obtain corresponding embodiments based on the embodiments of the present invention without inventive labor, and thus are also protected by the present invention.
  • the third security parameter is a security parameter used for performing third security processing and fourth security processing on the data on the first bearer before the security parameter is changed; the fourth security parameter is used after the security parameter is changed.
  • a data on the bearer performs security parameters of the third security process and the fourth security process.
  • the base station allocates a new logical channel sixth logical channel to the affected first bearer, and the corresponding logical channel identifier is LCID6.
  • the sixth logical channel is configured to carry data on the first bearer that performs the third security process using the fourth security parameter.
  • the base station allocates a fifth logical channel to the first bearer, and the corresponding logical channel identifier is LCID5.
  • the fifth logical channel is configured to carry data on the first bearer that performs the third security process using the third security parameter.
  • the base station sends a ninth message to the UE, where the ninth message is used to trigger a security parameter change, where the security parameter change changes the security parameter of the first bearer from the third security parameter to the fourth security parameter.
  • the ninth message may include a bearer identifier of the first bearer, and the ninth message may further include information of a logical channel, where the information of the logical channel includes a logical channel identifier, where the logical channel is added and used for carrying the fourth.
  • the security parameter performs data on the first bearer of the third security process.
  • the ninth message includes information of the sixth logical channel.
  • the ninth message may further include a sixth COUNT value, where the sixth COUNT value is a starting COUNT value of the downlink data that is used for the third security processing by using the fourth security parameter.
  • the ninth message may be an RRC Connection Reconfiguration message including a security parameter change indication.
  • the UE After receiving the ninth message, the UE derives the fourth security parameter in the same manner as the network side. Before the UE receives the ninth message, the UE communicates with the base station to use the third security parameter.
  • the UE sends a tenth message to the base station, where the tenth message is used to indicate that the security parameter change of the first bearer is complete.
  • the tenth message may include a fifth COUNT value, where the fifth COUNT value is used.
  • the fourth security parameter performs a starting COUNT value of the uplink data of the third security processing.
  • the base station determines that the obfuscation period of the data transmission of the first bearer has ended, and deletes the fifth logical channel.
  • the base station determines whether the obfuscation period of the uplink data transmission and the downlink data transmission of the first bearer has ended. If the obfuscation period of the uplink data transmission and the downlink data transmission has ended, the data of the first bearer is considered. The obfuscation period of the transmission is over.
  • the base station determines that the data of the COUNT value of the downlink data of the first bearer before the sixth COUNT value is successfully received by the UE, and considers that the confusion period of the downlink data transmission of the first bearer has ended.
  • the base station determines that the data of the COUNT value of the uplink data of the first bearer before the fifth COUNT value is successfully received by the base station, and considers that the confusion period of the uplink data transmission of the first bearer has ended. If the fifth COUNT value is not included in the tenth message, the fifth COUNT value is set to the COUNT value of the first uplink data received by the base station for performing the third security processing using the fourth security parameter.
  • the base station sends an eleventh message to the UE, where the eleventh message is used to indicate that the obfuscation period ends or deletes the old logical channel, where the eleventh message includes the bearer identifier of the first bearer.
  • the UE After receiving the eleventh message, the UE deletes the fifth logical channel.
  • the UE determines that the obfuscation period of the data transmission of the first bearer has ended, and releases the fifth logical channel.
  • the UE determines whether the obfuscation period of the uplink data transmission and the downlink data transmission of the first bearer has ended. If the obfuscation period of the uplink data transmission and the downlink data transmission has ended, the data of the first bearer is considered. The obfuscation period of the transmission is over.
  • the UE determines that the data of the COUNT value of the downlink data of the first bearer is successfully received by the UE, the UE considers that the confusion period of the downlink data transmission of the first bearer has ended. If the sixth COUNT value is not included in the ninth message, the sixth COUNT value is set to the COUNT value of the first downlink data received by the UE for performing the third security processing using the fourth security parameter.
  • the UE determines that the uplink data of the COUNT value of the first bearer before the fifth COUNT value is successfully received by the base station, and considers that the confusion period of the uplink data transmission of the first bearer has ended.
  • FIG. 5 is a schematic diagram of a data plane of a possible security parameter change in a base station according to an embodiment of the present invention.
  • the base station performs third security processing on the downlink data on the first bearer to obtain third downlink data, where the third security process includes: performing integrity protection on the data on the signaling radio bearer, and performing on the signaling radio bearer.
  • the data is subjected to at least one of an encryption process and an encryption process of data on the data radio bearer.
  • the fourth security parameter is used to perform third security processing on the downlink data, where the downlink data may be carried on the sixth logical channel, using LCID6; before the security parameter switching time point, use
  • the third security parameter performs third security processing on the downlink data, and the downlink data may be carried on the fifth logical channel, using LCID5.
  • the security parameter switching time point may be a time point at which the base station determines to perform the security parameter change, or may be a time point at which the base station sends the ninth message to the UE, and may also be a time point at which the base station receives the tenth message from the UE.
  • the base station sends the third downlink data to the UE, where the third downlink data includes the third security.
  • the full parameter indicates that the third security parameter indicates whether the security parameter used for the third security process of the third downlink data is the third security parameter or the fourth security parameter.
  • the third security parameter indication may be a logical channel identifier, and the different logical channel identifiers respectively correspond to the third security parameter and the fourth security parameter.
  • the logical channel identifier is LCID5 or LCID6, where LCID5 indicates a third security parameter and LCID6 indicates a fourth security parameter.
  • the third security parameter indicates a logical channel identifier
  • the third downlink data may be carried on a logical channel corresponding to the logical channel identifier.
  • the third security parameter indication may also be a new cell in the PDCP packet header, for example, may be a fixed one-bit or a plurality of bit cyclic changes, and the change of the value of the bit indicates that the security parameter is changed from the third security parameter to the third Four safety parameters. If the value indicated by the third security parameter is 0 before the change of the security parameter, and becomes 1 after the change of the security parameter, 0 means that the third security parameter indicates that the third security parameter is indicated, and 1 represents the first
  • the third security parameter indication indicates a fourth security parameter; or conversely, the value indicated by the third security parameter is 1 before the security parameter is changed, and becomes 0 after the security parameter is changed, and 1 represents the third security.
  • the parameter indication indicates a third security parameter, and 0 indicates that the third security parameter indication indicates a fourth security parameter. It can be understood whether the value of the bit changes as a reference to the value of the bit before the security parameter change.
  • the UE selects a security parameter according to the third security parameter indication in the third downlink data, and performs fourth security processing on the third downlink data, where the fourth security processing includes: performing integrity on the data on the signaling radio bearer. At least one of a protection check, a decryption process on the data on the signaling radio bearer, and a decryption process on the data on the radio bearer.
  • the third security parameter indication in the third downlink data indicates the third security parameter
  • the UE performs the fourth security processing on the third downlink data by using the third security parameter
  • the UE performs the fourth security processing on the third downlink data by using the fourth security parameter.
  • the UE performs third security processing on the uplink data on the first bearer to obtain third uplink data.
  • the fourth security parameter is used to perform third security processing on the uplink data, where the uplink data may be carried on the sixth logical channel, using LCID6; before the security parameter switching time point, use The third security parameter performs third security processing on the uplink data, and the data on the first bearer may be carried on the fifth logical channel, using LCID5.
  • the security parameter switching time point may be a time point at which the UE receives the ninth message or a time point at which the UE may send the tenth message, or may be another certain time point determined by the UE.
  • the UE sends the third uplink data to the base station, where the third uplink data includes a fourth security parameter indication, where the fourth security parameter indicates that the security parameter used for the third security process for indicating the third uplink data is
  • the third security parameter is also the fourth security parameter.
  • the fourth security parameter indication reference may be made to the related description of the third security parameter indication in 512.
  • the fourth security parameter indication is similar to the definition of the third security parameter indication, wherein the third security parameter indication is used to indicate the security parameter used by the downlink data, and the fourth security parameter indication is used to indicate the uplink.
  • the security parameters used by the data When the fourth security parameter indicates a logical channel identifier, the third uplink data may be carried on a logical channel corresponding to the logical channel identifier.
  • the base station selects a security parameter according to the fourth security parameter indication in the third uplink data, and performs fourth security processing on the third uplink data. Specifically, when the fourth security parameter indication in the third uplink data indicates the third security parameter, the base station performs the fourth security processing on the third uplink data by using the third security parameter; When the fourth security parameter indication indicates the fourth security parameter, the base station performs the fourth security processing on the third uplink data by using the fourth security parameter.
  • how to determine whether the fourth security parameter indication in the data indicates the third security parameter or the fourth security parameter may refer to the related description of the third security parameter indication in 512.
  • the UE or the base station can determine whether the data is processed by using the third security parameter or the fourth security parameter according to the security parameter indication in the downlink data or the uplink data, and then selecting the corresponding The security parameter performs the fourth security processing, thereby solving the problem that the decrypted data is erroneous during the confusing period.
  • an implicit method may be used to indicate whether the data is used by the third security parameter or the fourth security parameter, such as the security parameter.
  • the UE uses C-RNTI 1, and the base station allocates a new C-RNTI 2 and carries it to the UE in the ninth message. After the UE (or the base station) performs the third security processing on the data by using the third security parameter.
  • the UE When the data is sent to the peer, the UE (or the base station) transmits data using the C-RNTI 1; when the UE (or the base station) performs the third security processing on the data using the fourth security parameter, and then sends the data to the peer end, the UE ( Or the base station sends data using the C-RNTI 2; after receiving the data, the peer selects the corresponding security parameter according to the used C-RNTI 1 or C-RNTI 2 to perform fourth security processing on the data.
  • the UE or the base station
  • FIG. 4 and FIG. 5 are related embodiments of the security parameter change in the base station
  • FIG. 4 corresponds to the control plane flow of the security parameter change
  • FIG. 5 corresponds to the data plane flow of the security parameter change.
  • TCP Traffic Control Protocol
  • UDP User Datagram Protocol
  • the business of its data transmission is one-way. Therefore, for the first bearer, uplink data transmission and downlink data transmission may exist at the same time, and only downlink data transmission or only uplink data transmission may be performed.
  • the size of the sequence numbers of the above processes does not mean the order of execution, and the order of execution of each process should be determined by its function and internal logic, and should not be taken to the embodiments of the present invention.
  • the implementation process constitutes any limitation.
  • each network element such as a UE, a base station, and an MME, in order to implement the above functions, includes hardware structures and/or software modules corresponding to each function.
  • the present invention can be implemented in a combination of computer software or hardware or a combination of hardware and computer software, in combination with the elements and steps of the various embodiments described herein. Whether a function is implemented in hardware, computer software or computer software to drive hardware depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods for implementing the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present invention.
  • the method of data transmission according to an embodiment of the present invention is described in detail above, and a base station and a UE according to an embodiment of the present invention will be described below. It should be understood that the base station and the UE in the embodiments of the present invention may perform the foregoing various methods of the embodiments of the present invention, that is, the specific working processes of the following various devices, and may refer to the corresponding processes in the foregoing method embodiments.
  • FIG. 6 is a schematic structural diagram of a device of a possible UE according to an embodiment of the present invention.
  • the UE includes a receiver 601, a processor 602, and a transmitter 603.
  • the receiver 601 is configured to receive the first message, where the first message is used to trigger a security parameter change of the first bearer, where the first bearer is a signaling radio bearer or a data radio bearer, and the security parameter includes a key and/or a security algorithm that changes the security parameter of the first bearer from the first security parameter to the second security parameter.
  • the sender 603 is configured to send a second message, where the second message is used to indicate that the security parameter change of the first bearer is completed.
  • the processor 602 is configured to perform first security processing on the uplink data on the first bearer to obtain second uplink data, where the first security process includes: performing integrity protection on the data on the signaling radio bearer, and wirelessly signaling
  • the data on the bearer performs at least one of an encryption process and a process of encrypting data on the data radio bearer.
  • the transmitter 603 is further configured to send the second uplink data, where the second uplink data includes a first security parameter indication, where the first security parameter indicates a first security for indicating the second uplink data. Handle the security parameters used.
  • the receiver 601 is further configured to receive downlink data of the first bearer, where the downlink data is subjected to a first security process, where the downlink data includes a second security parameter indication, where the second security parameter indication is used for indicating The security parameters used by the first security processing of the downlink data.
  • the processor 602 is further configured to: according to the second security parameter indication in the downlink data, select a security parameter, perform second security processing on the downlink data, and the second security processing includes: performing integrity protection on the data on the signaling radio bearer. At least one of checking, decrypting the data on the signaling radio bearer, and decrypting the data on the radio bearer of the data.
  • the foregoing first message may further include information about a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry data on the first bearer that performs the first security processing by using the second security parameter. .
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to the first security parameter
  • the logical channel identifier of the third logical channel and the logical channel identifier of the fourth logical channel correspond to the second security parameter
  • a logical channel and a second logical channel are used to carry data on the first bearer that performs the first security process using the first security parameter
  • the third logical channel and the fourth logical channel are used to carry the first security using the second security parameter Processing the data on the first bearer; or the logical channel identifier of the fifth logical channel corresponds to the first security parameter
  • the logical channel identifier of the sixth logical channel corresponds to the second security parameter
  • the fifth logical channel is used to carry the first security
  • the parameter performs data on the first bearer of
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the first security parameter indication and the second security parameter indication have other implementation forms. For details, refer to the related description in the method embodiment.
  • the processor 602 is further configured to: after receiving the first message or after sending the second message, perform first security processing on the uplink data by using the second security parameter; before sending the second message or sending the second message Previously, the first security parameter is used to perform the first security processing on the uplink data.
  • the processor 602 is further configured to: when the second security parameter indication in the downlink data indicates the first security parameter, use the first security parameter to perform second security processing on the downlink data; when the downlink data is in the first When the second security parameter indicates that the second security parameter is indicated, the second security parameter is used to perform second security processing on the downlink data.
  • the first message is sent from the base station, and the second message is sent to the base station; or the first message is sent from the source base station, and the second message is sent to the target base station, where the source base station is the base station where the source primary cell is located,
  • the target base station is a base station where the target primary cell is located.
  • Figure 6 shows only one design of the UE.
  • the UE may include any number of receivers, transmitters, and processors.
  • the receivers and transmitters may be independent physical entities or integrated on the same physical entity, such as receivers and transmitters.
  • On a transceiver physical entity all UEs that can implement embodiments of the present invention are within the scope of the present invention.
  • FIG. 7 is a schematic structural diagram of another possible UE according to an embodiment of the present invention.
  • the UE includes a receiving unit 701, a processing unit 702, and a transmitting unit 703.
  • the receiving unit 701 is configured to receive the first message, where the first message is used to trigger a security parameter change of the first bearer, where the first bearer is a signaling radio bearer or a data radio bearer, and the security parameter includes a key and/or a security algorithm that changes the security parameter of the first bearer from the first security parameter to the second security parameter.
  • the sending unit 703 is configured to send a second message, where the second message is used to indicate that the security parameter change of the first bearer is completed.
  • the processing unit 702 is configured to perform first security processing on the uplink data on the first bearer to obtain second uplink data, where the first security process includes: performing data on the signaling radio bearer At least one of integrity protection, encryption processing of data on the signaling radio bearer, and encryption processing of data on the radio bearer of the data.
  • the sending unit 703 is further configured to send the second uplink data, where the second uplink data includes a first security parameter indication, where the first security parameter indicates a security parameter used to indicate the first security processing of the second uplink data. .
  • the receiving unit 701 is further configured to receive downlink data of the first bearer, where the downlink data passes the first security process, the downlink data includes a second security parameter indication, and the second security parameter indication is used to indicate The security parameters used by the first security processing of the downlink data.
  • the processing unit 702 is further configured to select a security parameter according to the second security parameter indication in the downlink data, and perform second security processing on the downlink data.
  • the second security process includes at least one of performing an integrity protection check on the data on the signaling radio bearer, decrypting the data on the signaling radio bearer, and decrypting the data on the data radio bearer.
  • the foregoing first message may further include information about a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry data on the first bearer that performs the first security processing by using the second security parameter. .
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to the first security parameter
  • the logical channel identifier of the third logical channel and the logical channel identifier of the fourth logical channel correspond to the second security parameter
  • a logical channel and a second logical channel are used to carry data on the first bearer that performs the first security process using the first security parameter
  • the third logical channel and the fourth logical channel are used to carry the first security using the second security parameter Processing the data on the first bearer; or the logical channel identifier of the fifth logical channel corresponds to the first security parameter
  • the logical channel identifier of the sixth logical channel corresponds to the second security parameter
  • the fifth logical channel is used to carry the first security
  • the parameter performs data on the first bearer of
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the first security parameter indication and the second security parameter indication have other implementation forms. For details, refer to the related description in the method embodiment.
  • the processing unit 702 is further configured to: after receiving the first message or after sending the second message, perform first security processing on the uplink data by using the second security parameter; before sending the second message or sending the second message Previously, the first security parameter is used to perform the first security processing on the uplink data.
  • the processing unit 702 is further configured to: when the second security parameter indication in the downlink data indicates the first security parameter, use the first security parameter to perform second security processing on the downlink data; when the downlink data is in the first When the second security parameter indicates that the second security parameter is indicated, the second security parameter is used to perform second security processing on the downlink data.
  • the first message is sent from the base station, and the second message is sent to the base station; or the first message is sent from the source base station, and the second message is sent to the target base station, where the source base station is the base station where the source primary cell is located,
  • the target base station is a base station where the target primary cell is located.
  • FIG. 8 is a schematic structural diagram of a device of a possible base station according to an embodiment of the present invention.
  • the base station in this embodiment performs the functions of the source base station in FIG. 1, FIG. 2 and FIG. 3 in the foregoing method embodiment.
  • the base station includes a processor 802 and a transmitter 803, and the base station may further include a receiver 801.
  • the transmitter 803 is configured to send a first message, where the first message is used to trigger a security parameter change of the first bearer, where the first bearer is a data radio bearer, and the security parameter includes a key and/or a security algorithm, and the security parameter is changed.
  • the security parameter of the first bearer is changed from the first security parameter to the second security parameter.
  • the processor 802 is configured to perform first security processing on the downlink data on the first bearer to obtain second downlink data, where the first security process includes performing encryption processing on the data on the data radio bearer.
  • the transmitter 803 is further configured to send the second downlink data, where the second downlink data includes a second security parameter indication, where the second security parameter indication is used to indicate the first downlink of the second downlink data.
  • the security parameters used for full processing are further configured to send the second downlink data, where the second downlink data includes a second security parameter indication, where the second security parameter indication is used to indicate the first downlink of the second downlink data.
  • the receiver 801 is configured to receive uplink data on the first bearer, where the uplink data is subjected to a first security process, where the uplink data includes a first security parameter indication, where the first security parameter indication is used to indicate the The security parameter used by the first security processing of the uplink data; the processor 802 is further configured to: select a security parameter according to the first security parameter indication in the uplink data, perform second security processing on the uplink data, and the second security processing includes The data on the data radio bearer is decrypted.
  • the foregoing first message may further include information about a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry data on the first bearer that performs the first security processing by using the second security parameter. .
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to the first security parameter
  • the logical channel identifier of the third logical channel and the logical channel identifier of the fourth logical channel correspond to the second security parameter
  • a logical channel and a second logical channel are used to carry data on the first bearer that performs the first security process using the first security parameter
  • the third logical channel and the fourth logical channel are used to carry the first security using the second security parameter Processing the data on the first bearer.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the first security parameter indication and the second security parameter indication have other implementation forms. For details, refer to the related description in the method embodiment.
  • the processor 802 is further configured to: perform first security processing on the downlink data by using the first security parameter.
  • the processor 802 is further configured to perform second security processing on the uplink data by using the first security parameter when the first security parameter indication in the uplink data indicates the first security parameter.
  • the embodiment of the present invention further provides another possible base station apparatus.
  • the base station in this embodiment performs the functions of the target base station in FIG. 1, FIG. 2 and FIG. 3 in the foregoing method embodiment, and the structure diagram and the diagram of the base station apparatus are performed. 8 is similar, specifically including a receiver, a processor, and a transmitter.
  • the receiver is configured to receive the second message, where the second message is used to indicate that the security parameter change of the first bearer is completed, and the first bearer is a data radio bearer.
  • the processor is configured to perform first security processing on the downlink data on the first bearer to obtain second downlink data, where the first security process includes performing encryption processing on the data on the data radio bearer.
  • the transmitter is configured to send the second downlink data, where the second downlink data includes a second security parameter indication, where the second security parameter indicates a security parameter used to indicate the first security processing of the second downlink data.
  • the receiver is further configured to receive uplink data on the first bearer, where the uplink data is subjected to a first security process, where the uplink data includes a first security parameter indication, where the first security parameter indication is used to indicate The security parameter used by the first security processing of the uplink data;
  • the processor is further configured to: select a security parameter according to the first security parameter indication in the uplink data, perform second security processing on the uplink data, and the second security processing includes Decrypting the data on the data radio bearer.
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to the first security parameter
  • the logical channel identifier of the third logical channel and the logical channel identifier of the fourth logical channel correspond to the second security parameter
  • a logical channel and a second logical channel are used to carry data on a first bearer that performs a first security process using a first security parameter
  • the third logical channel and the fourth logical channel are used to carry a second security parameter.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the first security parameter indication and the second security parameter indication have other implementation forms, specifically Reference is made to the relevant description in the method embodiment.
  • the processor is further configured to: perform first security processing on the downlink data by using the second security parameter.
  • the processor may be further configured to perform second security processing on the uplink data by using the second security parameter when the first security parameter indication in the uplink data indicates the second security parameter.
  • the embodiment of the present invention further provides a possible base station apparatus.
  • the base station in this embodiment performs the functions of the base station in FIG. 4 and FIG. 5 in the foregoing method embodiment.
  • the structure diagram of the base station apparatus is similar to that in FIG. Receiver, processor and transmitter.
  • the transmitter is configured to send a first message, where the first message is used to trigger a security parameter change of the first bearer, where the first bearer is a signaling radio bearer or a data radio bearer, and the security parameter includes a key and/or a security algorithm, where The security parameter change changes the security parameter of the first bearer from the first security parameter to the second security parameter.
  • the receiver is configured to receive the second message, where the second message is used to indicate that the security parameter change of the first bearer is completed.
  • the processor is configured to perform first security processing on the downlink data on the first bearer to obtain second downlink data, where the first security process includes: performing integrity protection on the data on the signaling radio bearer, and performing on the signaling radio bearer
  • the data is subjected to at least one of an encryption process and an encryption process of data on the data radio bearer.
  • the transmitter is further configured to send the second downlink data, where the second downlink data includes a second security parameter indication, where the second security parameter indicates a security parameter used to indicate the first security processing of the second downlink data.
  • the receiver is further configured to receive uplink data on the first bearer, where the uplink data is subjected to a first security process, where the uplink data includes a first security parameter indication, where the first security parameter indication is used to indicate a security parameter used by the first security processing of the uplink data;
  • the processor is further configured to select a security parameter according to the first security parameter indication in the uplink data,
  • the row data performs a second security process, including: performing integrity protection check on the data on the signaling radio bearer, decrypting the data on the signaling radio bearer, and decrypting the data on the radio bearer of the data At least one of the processes.
  • the first message may further include information about a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry the first bearer that performs the first security process by using the second security parameter.
  • the data may further include information about a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry the first bearer that performs the first security process by using the second security parameter.
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the fifth logical channel corresponds to the first security parameter
  • the logical channel identifier of the sixth logical channel corresponds to the second security parameter
  • the fifth logical channel is used to carry the first security processing by using the first security parameter.
  • the data on the bearer, the sixth logical channel is used to carry data on the first bearer that performs the first security process using the second security parameter.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the first security parameter indication and the second security parameter indication have other implementation forms. For details, refer to the related description in the method embodiment.
  • the processor may be further configured to perform first security processing on the downlink data after using the second security parameter after sending the first message or after receiving the second message; before receiving the first message or receiving Before the second message, the first security parameter is used to perform the first security processing on the downlink data.
  • the processor may be further configured to: when the first security parameter indication in the uplink data indicates the first security parameter, perform second security processing on the uplink data by using the first security parameter; When a security parameter indication indicates a second security parameter, the second security parameter is used to perform second security processing on the uplink data.
  • FIG. 8 only shows a device structure diagram of the base station.
  • the base station can include any number of receivers, transmitters, and processors, receivers, and transmitters. It may be an independent physical entity or may be integrated on the same physical entity.
  • the receiver and the transmitter are integrated on one transceiver physical entity, and all base stations that can implement the embodiments of the present invention are in the protection scope of the present invention. within.
  • FIG. 9 is a schematic structural diagram of another possible base station apparatus according to an embodiment of the present invention.
  • the base station in this embodiment performs the functions of the source base station in FIG. 1, FIG. 2 and FIG. 3 in the foregoing method embodiment.
  • the base station includes a processing unit 902 and a sending unit 903, and the base station may further include a receiving unit 901.
  • the sending unit 903 is configured to send a first message, where the first message is used to trigger a security parameter change of the first bearer, where the first bearer is a data radio bearer, and the security parameter includes a key and/or a security algorithm, and the security parameter is changed.
  • the security parameter of the first bearer is changed from the first security parameter to the second security parameter.
  • the processing unit 902 is configured to perform first security processing on the downlink data on the first bearer to obtain second downlink data, where the first security process includes performing encryption processing on the data on the data radio bearer.
  • the sending unit 903 is further configured to send the second downlink data, where the second downlink data includes a second security parameter indication, where the second security parameter indicates a security parameter used to indicate the first security processing of the downlink data;
  • the receiving unit 901 is configured to receive uplink data on the first bearer, where the uplink data is subjected to a first security process, where the uplink data includes a first security parameter indication, where the first security parameter indication is used to indicate the The security parameter used by the first security processing of the uplink data; the processing unit 902 is further configured to: select a security parameter according to the first security parameter indication in the uplink data, perform second security processing on the uplink data, and the second security processing includes The data on the data radio bearer is decrypted.
  • the first message may further include information about a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry the first bearer that performs the first security process by using the second security parameter.
  • the data may further include information about a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry the first bearer that performs the first security process by using the second security parameter.
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to the first security parameter
  • the logical channel identifier of the third logical channel and the logical channel identifier of the fourth logical channel correspond to the second security parameter
  • the second logical channel is configured to carry data on the first bearer that performs the first security process by using the first security parameter, where the third logical channel and the fourth logical channel are used to carry the first security process by using the second security parameter.
  • the data on the first bearer is configured to carry data on the first bearer that performs the first security process by using the first security parameter
  • the third logical channel and the fourth logical channel are used to carry the first security process by using the second security parameter. The data on the first bearer.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the first security parameter indication and the second security parameter indication have other implementation forms. For details, refer to the related description in the method embodiment.
  • processing unit 902 is further configured to: perform first security processing on the downlink data by using the first security parameter.
  • processing unit 902 is further configured to: when the first security parameter indication in the uplink data indicates the first security parameter, perform second security processing on the uplink data by using the first security parameter.
  • the embodiment of the present invention further provides another possible base station apparatus.
  • the base station in this embodiment performs the functions of the target base station in FIG. 1, FIG. 2 and FIG. 3 in the foregoing method embodiment, and the structure diagram and the diagram of the base station apparatus are performed.
  • 9 is similar, and specifically includes a receiving unit, a processing unit, and a transmitting unit.
  • the receiving unit is configured to receive the second message, where the second message is used to indicate that the security parameter change of the first bearer is completed, and the first bearer is a data radio bearer.
  • the processing unit is configured to perform first security processing on the downlink data on the first bearer to obtain second downlink data, where the first security process includes performing encryption processing on the data on the data radio bearer.
  • a sending unit configured to send the second downlink data, where the second downlink data includes a second security parameter indication, where the second security parameter indicates a security parameter used to indicate the first security processing of the second downlink data.
  • the receiving unit is further configured to receive uplink data on the first bearer, where the uplink data is processed by a first security process, where the uplink data includes a first security parameter indication, where the first The security parameter indicates a security parameter used to indicate the first security processing of the uplink data.
  • the processing unit is further configured to: select a security parameter according to the first security parameter indication in the uplink data, and perform second security processing on the uplink data.
  • the second security process includes decrypting the data on the data radio bearer.
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the first logical channel and the logical channel identifier of the second logical channel correspond to the first security parameter
  • the logical channel identifier of the third logical channel and the logical channel identifier of the fourth logical channel correspond to the second security parameter
  • a logical channel and a second logical channel are used to carry data on a first bearer that performs a first security process using a first security parameter
  • the third logical channel and the fourth logical channel are used to carry a second security parameter.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the first security parameter indication and the second security parameter indication have other implementation forms. For details, refer to the related description in the method embodiment.
  • the processing unit is further configured to: perform first security processing on the downlink data by using the second security parameter.
  • the processing unit may be further configured to perform second security processing on the uplink data by using the second security parameter when the first security parameter indication in the uplink data indicates the second security parameter.
  • the embodiment of the present invention further provides a possible base station apparatus.
  • the base station in this embodiment performs the functions of the base station in FIG. 4 and FIG. 5 in the foregoing method embodiment.
  • the structure diagram of the base station apparatus is similar to that in FIG. Receiving unit, processing unit and transmitting unit.
  • the sending unit is configured to send a first message, where the first message is used to trigger a security parameter change of the first bearer, where the first bearer is a signaling radio bearer or a data radio bearer, and the foregoing security parameter includes a key and/or a security algorithm.
  • the security parameter changes the security parameters of the first bearer from the first security
  • the parameter is changed to the second security parameter.
  • the receiving unit is configured to receive the second message, where the second message is used to indicate that the security parameter change of the first bearer is completed.
  • the processing unit is configured to perform first security processing on the downlink data on the first bearer to obtain second downlink data, where the first security process includes: performing integrity protection on the data on the signaling radio bearer, and performing signaling on the radio bearer
  • the data is subjected to at least one of encryption processing and encryption processing of data on the data radio bearer.
  • the sending unit is further configured to send the second downlink data, where the second downlink data includes a second security parameter indication, where the second security parameter indicates a security parameter used to indicate the first security processing of the second downlink data.
  • the receiving unit is further configured to receive uplink data on the first bearer, where the uplink data is subjected to a first security process, where the uplink data includes a first security parameter indication, where the first security parameter indication is used to indicate a security parameter used by the first security processing of the uplink data; the processing unit is further configured to: select a security parameter according to the first security parameter indication in the uplink data, perform second security processing on the uplink data, and the second security processing
  • the method includes: performing at least one of performing integrity protection check on data on the signaling radio bearer, decrypting data on the signaling radio bearer, and decrypting data on the data radio bearer.
  • the first message may further include information about a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry the first bearer that performs the first security process by using the second security parameter.
  • the data may further include information about a logical channel, where the information of the logical channel includes an identifier of a logical channel, where the logical channel is used to carry the first bearer that performs the first security process by using the second security parameter.
  • the first security parameter indication and the second security parameter indication may be logical channel identifiers, and the different logical channel identifiers respectively correspond to the first security parameter and the second security parameter.
  • the logical channel identifier of the fifth logical channel corresponds to the first security parameter
  • the logical channel identifier of the sixth logical channel corresponds to the second security parameter
  • the fifth logical channel is used to carry the first security processing by using the first security parameter.
  • the data on the bearer, the sixth logical channel is used to carry data on the first bearer that performs the first security process using the second security parameter.
  • the first security parameter indication and the second security parameter indication may also be a bit, and the change of the value of the bit indicates that the security parameter is changed from the first security parameter to the second security parameter.
  • the first security parameter indication and the second security parameter indication have other implementation forms. For details, refer to the related description in the method embodiment.
  • the processing unit may be further configured to perform first security processing on the downlink data after using the second security parameter after sending the first message or after receiving the second message; before receiving the first message or receiving Before the second message, the first security parameter is used to perform the first security processing on the downlink data.
  • the processing unit may be further configured to: when the first security parameter indication in the uplink data indicates the first security parameter, perform second security processing on the uplink data by using the first security parameter; When a security parameter indication indicates a second security parameter, the second security parameter is used to perform second security processing on the uplink data.
  • the term "and/or” is merely an association relationship describing an associated object, indicating that there may be three relationships.
  • a and/or B may indicate that A exists separately, and A and B exist simultaneously, and B cases exist alone.
  • the character "/" in this article generally indicates that the contextual object is an "or" relationship.
  • the processor for performing the above base station and UE of the embodiment of the present invention may be a central processing unit (CPU), a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), and a field programmable gate array (FPGA). Or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It is possible to implement or perform various exemplary logical functions and modules described in connection with the present disclosure.
  • CPU central processing unit
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • the steps of a method or algorithm described in connection with the present disclosure may be implemented in a hardware, or may be implemented by a processor executing software instructions.
  • the software instructions may be comprised of corresponding software modules that may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, removable hard disk, CD-ROM, or any other form of storage well known in the art.
  • An exemplary storage medium coupling The processor is coupled to the processor to enable reading of information from the storage medium and to write information to the storage medium.
  • the storage medium can also be an integral part of the processor.
  • the processor and the storage medium can be located in an ASIC. Additionally, the ASIC can be located in a user equipment or base station.
  • the processor and the storage medium may also reside as discrete components in the user equipment.
  • the functions described herein can be implemented in hardware, software, firmware, or any combination thereof.
  • the functions may be stored in a computer readable medium or transmitted as one or more instructions or code on a computer readable medium.
  • Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program or related information from one location to another.
  • a storage medium may be any available media that can be accessed by a general purpose or special purpose computer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明涉及无线通信技术领域,具体涉及数据传输的方法和装置。本发明实施例提供的数据传输方法,通过在第一承载的上行数据中引入第一安全参数指示,基站能够根据上行数据中的第一安全参数指示判断该上行数据是采用第一安全参数还是第二安全参数进行第一安全处理的,进而选择对应的安全参数进行第二安全处理,从而解决了混淆期内解密出来的是错误的数据的问题,从而能够让上行数据无中断地传输;在下行数据中引入第二安全参数指示,UE能够根据下行数据中的第二安全参数指示判断该数据是采用第一安全参数还是第二安全参数进行第一安全处理的,进而选择对应的安全参数进行第二安全处理,从而解决了混淆期内解密出来的是错误的数据的问题,从而能够让下行数据无中断地传输。

Description

数据传输的方法和装置 技术领域
本发明涉及无线通信技术领域,具体涉及数据传输的方法和装置。
背景技术
随着移动通信系统的发展,系统能够提供的服务质量越来越高。为保持第三代合作伙伴计划(the 3rd Generation Partner Project,简称3GPP)的长期竞争优势,进一步的提高系统的频谱效率和用户吞吐率,LTE后续演进(LTE-Advanced,简称LTE-A)的标准被制定。载波聚合(Carrier Aggregation,简称CA)作为一种新技术被引入到LTE-A标准中。载波聚合的意思是用户设备(User Equipment,简称UE)可以同时使用多个小区(载波)进行上下行通信,从而支持高速数据传输。在这多个小区中,其中一个是主小区(Primary Cell,简称PCell),其它是辅小区(Secondary Cell,简称SCell)。
为了进一步提升系统的频谱效率和用户吞吐率,3GPP在LTE-A标准中进一步引入了双连接(Dual Connectivity,简称DC)技术,即支持两个基站同时为一个UE提供数据传输服务。其中PCell所在的基站称为主基站(Master eNB,简称MeNB),另外一个基站称为辅基站(Secondary eNB,简称SeNB)。在DC中,主基站中的多个服务小区组成主小区组(Master Cell Group,简称MCG),包括一个PCell和可选的一个或多个SCell。辅基站中的多个服务小区组成辅小区组(Secondary Cell Group,简称SCG)。
对于DC场景,有三类数据承载:MCG承载,SCG承载和剖分承载(split bearer),网络在建立数据承载时,会指明具体的承载类型。MCG承载的数据只能通过主基站下的服务小区进行传输,在主基站进行加解密,并通过主基站发送上行数据给服务网关(Serving Gateway,简称S-GW)和主基站 从S-GW接收下行数据。SCG承载的数据只能通过辅基站下的服务小区进行传输,在辅基站进行加解密,并通过辅基站发送上行数据给S-GW和辅基站从S-GW接收下行数据。Split承载的数据能通过主基站和辅基站下的服务小区进行传输,但是只能在主基站进行加解密,通过主基站发送上行数据给S-GW和主基站从S-GW接收下行数据。对于split承载,主基站和辅基站会分别为该承载分配各自的逻辑信道,也就是一个split承载对应两个逻辑信道,一个是主基站分配的逻辑信道,另一个是辅基站分配的逻辑信道。
在网络为UE增加辅基站时,主基站会基于自身的密钥衍生出新的参数并发给辅基站使用,主基站也同时将该衍生参数发送给UE,UE根据这些衍生参数衍生出相同的密钥。
当UE的PCell发生变更的时候,如果在变更过程中,数据是连续传输的,那么会出现split承载的数据的安全处理(包括加密处理和解密处理)的混淆期问题。比如,对于上行数据,UE在接收到源主基站发出的PCell变更消息后,安全密钥和安全算法更改为使用目标主基站的安全密钥和安全算法,后续的数据包在经由分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层处理时总是使用目标主基站的安全密钥和安全算法,但是当前正在传输的无线链路控制(Radio Link Control,简称RLC)层及RLC以下各层的数据包仍然使用的是源主基站的安全密钥和安全算法。由于源主基站在发出PCell变更消息后不确定UE什么时候能接收到该信令,也就不确定UE确切执行更换PCell的时机,然而为了达到数据传输不中断的目的,数据传输可能是一直在进行的,因此对于split承载,源主基站和目标主基站不确定收到的数据包是使用源主基站的密钥还是目标主基站的密钥进行加密的,这就是PCell变更过程中数据的安全处理的混淆期的问题。同样的问题也存在于下行数据传输中,UE不确定接收到的数据包是使用源主基站的密钥还是目标主基站的密钥进行加密的,存在混淆期的问题。对于 混淆期的数据传输,接收端如果采用了错误的密钥进行解密,那么会导致解密出来的是错误的数据的问题。
同样的数据安全处理的混淆期问题也存在于其它安全参数变更(包括密钥和加密算法等相关的安全参数)的场景,例如,单载波场景下的服务小区变更,UE和服务基站之间的安全参数变更也是不同步的,如果数据传输是连续的,也会存在上述的安全处理的混淆期问题,从而也会导致解密出来的是错误的数据。这里所说的单载波场景是指UE处于单载波模式,UE只通过一个服务小区与网络进行通信。
另外,基站为了避免使用相同的密钥和无线承载标识(Radio Bearer Identity,简称RB ID)对COUNT值进行重用,基站会触发小区内切换更新密钥。如果要达到切换过程中数据传输不中断的目的,此时也会存在如上所述的安全处理的混淆期问题,从而也会导致解密出来的是错误的数据的问题。
发明内容
本发明实施例提供了数据传输的方法和装置,以期解决安全参数变更时安全处理的混淆期问题,避免解密出来的是错误的数据。
本发明实施例具体可以通过如下技术方案实现:
第一方面,本发明的实施例提供了一种数据传输方法,该方法包括:接收第一消息,其中,该第一消息用于触发第一承载的安全参数变更,该第一承载为信令无线承载或数据无线承载,该安全参数包括密钥和/或安全算法,该安全参数变更将该第一承载的安全参数从第一安全参数变更为第二安全参数;发送第二消息,其中,该第二消息用于指示该第一承载的安全参数变更完成;对该第一承载上的上行数据进行第一安全处理,得到第二上行数据,该第一安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据 进行加密处理中的至少一种;发送该第二上行数据,其中,该第二上行数据包括第一安全参数指示,该第一安全参数指示用于指示该第二上行数据的第一安全处理所使用的安全参数。
本发明实施例提供的数据传输方法,通过在第一承载的上行数据中引入第一安全参数指示,基站能够根据上行数据中的第一安全参数指示判断该上行数据是采用第一安全参数还是第二安全参数进行第一安全处理的,进而选择对应的安全参数进行第二安全处理,从而解决了混淆期内解密出来的是错误的数据的问题。
在一个可能的设计中,该方法还包括:接收该第一承载上的下行数据,其中,该下行数据经过第一安全处理,该下行数据包括第二安全参数指示,该第二安全参数指示用于指示该下行数据的第一安全处理所使用的安全参数;根据该下行数据中的第二安全参数指示选择安全参数,对该下行数据进行第二安全处理,该第二安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。通过该设计,在下行数据中引入第二安全参数指示,UE能够根据下行数据中的第二安全参数指示判断该数据是采用第一安全参数还是第二安全参数进行第一安全处理的,进而选择对应的安全参数进行第二安全处理,从而解决了混淆期内解密出来的是错误的数据的问题。
在一个可能的设计中,该第一消息还可以包括逻辑信道的信息,该逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全参数进行第一安全处理的该第一承载上的数据。
在一个可能的设计中,该第一安全参数指示和该第二安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻 辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据;或者,第五逻辑信道的逻辑信道标识对应第一安全参数,第六逻辑信道的逻辑信道标识对应第二安全参数,第五逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第六逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,该第一安全参数指示和该第二安全参数指示为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。
在一个可能的设计中,对该第一承载上的上行数据进行第一安全处理,可以具体包括:在接收到第一消息之后或者在发送第二消息之后,使用第二安全参数对上行数据进行第一安全处理;在接收到第一消息之前或者在发送第二消息之前,使用第一安全参数对上行数据进行第一安全处理。
在一个可能的设计中,该方法还包括:当该下行数据中的第二安全参数指示指示的是第一安全参数时,使用第一安全参数对该下行数据进行第二安全处理;当该下行数据中的第二安全参数指示指示的是第二安全参数时,使用第二安全参数对该下行数据进行第二安全处理。
在一个可能的设计中,上述第一消息来自基站,上述第二消息发送给该基站;或者,上述第一消息来自源基站,上述第二消息发送给目标基站,该源基站为源主小区所在的基站,该目标基站为目标主小区所在的基站。
在一个可能的设计中,该第一消息为主小区变更消息或无线资源控制连接重配置(RRC Connection Reconfiguration)消息。
在一个可能的设计中,该第二消息为主小区变更完成消息或RRC连接重配置完成消息。
第二方面,本发明实施例提供了另一种数据传输方法,该方法包括: 发送第一消息,其中,该第一消息用于触发第一承载的安全参数变更,该第一承载为数据无线承载,该安全参数包括密钥和/或安全算法,该安全参数变更将该第一承载的安全参数从第一安全参数变更为第二安全参数;对该第一承载上的下行数据进行第一安全处理,得到第二下行数据,该第一安全处理包括对数据无线承载上的数据进行加密处理;发送该第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安全处理所使用的安全参数。
本发明实施例提供的数据传输方法,通过在第一承载的下行数据中引入第二安全参数指示,UE能够根据下行数据中的第二安全参数指示判断该数据是采用第一安全参数还是第二安全参数进行第一安全处理的,进而选择对应的安全参数进行第二安全处理,从而解决了混淆期内解密出来的是错误的数据的问题。
在一个可能的设计中,该方法还包括:接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示,该第一安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;根据该上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理,该第二安全处理包括对数据无线承载上的数据进行解密处理。通过该设计,在上行数据中引入第一安全参数指示,源基站能够根据上行数据中的第一安全参数指示判断该上行数据是采用第一安全参数还是第二安全参数进行第一安全处理的,进而选择对应的安全参数进行第二安全处理,从而解决了混淆期内解密出来的是错误的数据的问题。
在一个可能的设计中,上述第一消息还包括逻辑信道的信息,该逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全参数进行第一安全处理的该第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第 二安全参数。具体地,第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。
在一个可能的设计中,该方法还包括:使用第一安全参数对下行数据进行第一安全处理。
在一个可能的设计中,该方法还包括:当上行数据中的第一安全参数指示指示的是第一安全参数时,使用第一安全参数对上行数据进行第二安全处理。
在一个可能的设计中,该第一消息为主小区变更消息或无线资源控制连接重配置(RRC Connection Reconfiguration)消息。
第三方面,本发明实施例提供了又一种数据传输方法,该方法包括:接收第二消息,其中,第二消息用于指示第一承载的安全参数变更完成,该第一承载为数据无线承载;对该第一承载上的下行数据进行第一安全处理,得到第二下行数据,该第一安全处理包括对数据无线承载上的数据进行加密处理;发送该第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安全处理所使用的安全参数。
本发明实施例提供的数据传输方法,通过在第一承载的下行数据中引入第二安全参数指示,UE能够根据下行数据中的第二安全参数指示判断该数据是采用第一安全参数还是第二安全参数进行第一安全处理的,进而选 择对应的安全参数进行第二安全处理,从而解决了混淆期内解密出来的是错误的数据的问题。
在一个可能的设计中,该方法还包括:接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示,该第一安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;根据该上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理,该第二安全处理包括对数据无线承载上的数据进行解密处理。通过该设计,在上行数据中引入第一安全参数指示,目标基站能够根据上行数据中的第一安全参数指示判断该上行数据是采用第一安全参数还是第二安全参数进行第一安全处理的,进而选择对应的安全参数进行第二安全处理,从而解决了混淆期内解密出来的是错误的数据的问题。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。
在一个可能的设计中,该方法还包括:使用第二安全参数对下行数据进行第一安全处理。
在一个可能的设计中,该方法还包括:当上行数据中的第一安全参数指示指示的是第二安全参数时,使用第二安全参数对上行数据进行第二安 全处理。
在一个可能的设计中,该第二消息为主小区变更完成消息或RRC连接重配置完成消息。
第四方面,本发明实施例提供了又一种数据传输方法,该方法包括:发送第一消息,其中,该第一消息用于触发第一承载的安全参数变更,该第一承载为信令无线承载或数据无线承载,该安全参数包括密钥和/或安全算法,该安全参数变更将该第一承载的安全参数从第一安全参数变更为第二安全参数;接收第二消息,其中,第二消息用于指示第一承载的安全参数变更完成;对该第一承载上的下行数据进行第一安全处理,得到第二下行数据,该第一安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种;发送该第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安全处理所使用的安全参数。
本发明实施例提供的数据传输方法,通过在第一承载的下行数据中引入第二安全参数指示,UE能够根据下行数据中的第二安全参数指示判断该数据是采用第一安全参数还是第二安全参数进行第一安全处理的,进而选择对应的安全参数进行第二安全处理,从而解决了混淆期内解密出来的是错误的数据的问题。
在一个可能的设计中,该方法还包括:接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示,该第一安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;根据该上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理,该第二安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。通过该设计,在上行数据中引入 第一安全参数指示,基站能够根据上行数据中的第一安全参数指示判断该上行数据是采用第一安全参数还是第二安全参数进行第一安全处理的,进而选择对应的安全参数进行第二安全处理,从而解决了混淆期内解密出来的是错误的数据的问题。
在一个可能的设计中,上述第一消息还包括逻辑信道的信息,该逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全参数进行第一安全处理的该第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第五逻辑信道的逻辑信道标识对应第一安全参数,第六逻辑信道的逻辑信道标识对应第二安全参数,第五逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第六逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。
在一个可能的设计中,该方法还包括:在发送第一消息之后或者在接收到第二消息之后,使用第二安全参数对下行数据进行第一安全处理;在发送第一消息之前或者在接收到第二消息之前,使用第一安全参数对下行数据进行第一安全处理。
在一个可能的设计中,该方法还包括:当上行数据中的第一安全参数指示指示的是第一安全参数时,使用第一安全参数对上行数据进行第二安全处理;当上行数据中的第一安全参数指示指示的是第二安全参数时,使用第二安全参数对上行数据进行第二安全处理。
在一个可能的设计中,该第一消息为主小区变更消息或无线资源控制连接重配置(RRC Connection Reconfiguration)消息。
在一个可能的设计中,该第二消息为主小区变更完成消息或RRC连接重配置完成消息。
第五方面,本发明实施例提供了一种UE,该UE包括接收器、处理器和发送器。该UE实现上述第一方面数据传输方法中UE的功能,因此也能实现第一方面数据传输方法所具备的有益效果。其中,UE的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括至少一个与上述功能相对应的模块。
在一个可能的设计中,该接收器用于接收第一消息,其中,该第一消息用于触发第一承载的安全参数变更,该第一承载为信令无线承载或数据无线承载,该安全参数包括密钥和/或安全算法,该安全参数变更将该第一承载的安全参数从第一安全参数变更为第二安全参数;该发送器用于发送第二消息,其中,该第二消息用于指示该第一承载的安全参数变更完成;该处理器用于对该第一承载上的上行数据进行第一安全处理,得到第二上行数据,该第一安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种;该发送器还用于发送该第二上行数据,该第二上行数据包括第一安全参数指示,该第一安全参数指示用于指示该第二上行数据的第一安全处理所使用的安全参数。
在一个可能的设计中,该接收器还用于接收来该第一承载的下行数据,其中,该下行数据经过第一安全处理,该下行数据包括第二安全参数指示,该第二安全参数指示用于指示该下行数据的第一安全处理所使用的安全参数;该处理器还用于根据该下行数据中的第二安全参数指示选择安全参数,对该下行数据进行第二安全处理,该第二安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。
在一个可能的设计中,上述第一消息还可以包括逻辑信道的信息,该 逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据;或者,第五逻辑信道的逻辑信道标识对应第一安全参数,第六逻辑信道的逻辑信道标识对应第二安全参数,第五逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第六逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。
在一个可能的设计中,该处理器还用于,在接收到第一消息之后或者在发送第二消息之后,使用第二安全参数对上行数据进行第一安全处理;在接收到第一消息之前或者在发送第二消息之前,使用第一安全参数对上行数据进行第一安全处理。
在一个可能的设计中,该处理器还用于,当该下行数据中的第二安全参数指示指示的是第一安全参数时,使用第一安全参数对该下行数据进行第二安全处理;当该下行数据中的第二安全参数指示指示的是第二安全参数时,使用第二安全参数对该下行数据进行第二安全处理。
在一个可能的设计中,上述第一消息来自基站,上述第二消息发送给该基站;或者,上述第一消息来自源基站,上述第二消息发送给目标基站, 该源基站为源主小区所在的基站,该目标基站为目标主小区所在的基站。
第六方面,本发明实施例提供了一种UE,该UE包括接收单元、处理单元和发送单元。该UE实现上述第一方面数据传输方法中UE的功能,因此也能实现第一方面数据传输方法所具备的有益效果。其中,UE的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括至少一个与上述功能相对应的模块。
在一个可能的设计中,该接收单元用于接收第一消息,其中,该第一消息用于触发第一承载的安全参数变更,该第一承载为信令无线承载或数据无线承载,该安全参数包括密钥和/或安全算法,该安全参数变更将该第一承载的安全参数从第一安全参数变更为第二安全参数;该发送单元用于发送第二消息,其中,该第二消息用于指示该第一承载的安全参数变更完成;该处理单元用于对该第一承载上的上行数据进行第一安全处理,得到第二上行数据,该第一安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种;该发送单元还用于发送该第二上行数据,该第二上行数据包括第一安全参数指示,该第一安全参数指示用于指示该第二上行数据的第一安全处理所使用的安全参数。
在一个可能的设计中,该接收单元还用于接收来该第一承载的下行数据,其中,该下行数据经过第一安全处理,该下行数据包括第二安全参数指示,该第二安全参数指示用于指示该下行数据的第一安全处理所使用的安全参数;该处理单元还用于根据该下行数据中的第二安全参数指示选择安全参数,对该下行数据进行第二安全处理,该第二安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。
在一个可能的设计中,上述第一消息还可以包括逻辑信道的信息,该逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全 参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据;或者,第五逻辑信道的逻辑信道标识对应第一安全参数,第六逻辑信道的逻辑信道标识对应第二安全参数,第五逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第六逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。
在一个可能的设计中,该处理单元还用于,在接收到第一消息之后或者在发送第二消息之后,使用第二安全参数对上行数据进行第一安全处理;在接收到第一消息之前或者在发送第二消息之前,使用第一安全参数对上行数据进行第一安全处理。
在一个可能的设计中,该处理单元还用于,当该下行数据中的第二安全参数指示指示的是第一安全参数时,使用第一安全参数对该下行数据进行第二安全处理;当该下行数据中的第二安全参数指示指示的是第二安全参数时,使用第二安全参数对该下行数据进行第二安全处理。
在一个可能的设计中,上述第一消息来自基站,上述第二消息发送给该基站;或者,上述第一消息来自源基站,上述第二消息发送给目标基站,该源基站为源主小区所在的基站,该目标基站为目标主小区所在的基站。
第七方面,本发明实施例提供了一种基站,该基站包括:处理器和发送器,还可以包括接收器。该基站实现上述第二方面数据传输方法中基站的功能,因此也能实现第二方面数据传输方法所具备的有益效果。其中,基站的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括至少一个与上述功能相对应的模块。
在一个可能的设计中,该发送器用于发送第一消息,其中,第一消息用于触发第一承载的安全参数变更,第一承载为数据无线承载,上述安全参数包括密钥和/或安全算法,该安全参数变更将第一承载的安全参数从第一安全参数变更为第二安全参数;该处理器用于对第一承载上的下行数据进行第一安全处理,得到第二下行数据,第一安全处理包括对数据无线承载上的数据进行加密处理;该发送器还用于发送第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安全处理所使用的安全参数。
在一个可能的设计中,该接收器用于接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示,该第一安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;该处理器还用于根据该上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理,第二安全处理包括对数据无线承载上的数据进行解密处理。
在一个可能的设计中,上述第一消息还可以包括逻辑信道的信息,该逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑 信道的逻辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。
在一个可能的设计中,该处理器还用于:使用第一安全参数对下行数据进行第一安全处理。
在一个可能的设计中,该处理器还用于:当上行数据中的第一安全参数指示指示的是第一安全参数时,使用第一安全参数对上行数据进行第二安全处理。
第八方面,本发明实施例提供了另一种基站,该基站包括接收器、处理器和发送器。该基站实现上述第三方面数据传输方法中基站的功能,因此也能实现第三方面数据传输方法所具备的有益效果。其中,基站的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括至少一个与上述功能相对应的模块。
在一个可能的设计中,该接收器用于接收第二消息,其中,第二消息用于指示第一承载的安全参数变更完成,第一承载为数据无线承载;该处理器用于对第一承载上的下行数据进行第一安全处理,得到第二下行数据,第一安全处理包括对数据无线承载上的数据进行加密处理;该发送器用于发送第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安全处理所使用的安全参数。
在一个可能的设计中,该接收器还用于接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示, 该第一安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;该处理器还用于根据该上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理,第二安全处理包括对数据无线承载上的数据进行解密处理。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和所述第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。
在一个可能的设计中,该处理器还用于:使用第二安全参数对下行数据进行第一安全处理。
在一个可能的设计中,该处理器还用于:当上行数据中的所述第一安全参数指示指示的是第二安全参数时,使用第二安全参数对上行数据进行第二安全处理。
第九方面,本发明实施例提供了一种基站,该基站包括接收器、处理器和发送器。该基站实现上述第四方面数据传输方法中基站的功能,因此也能实现第四方面数据传输方法所具备的有益效果。其中,基站的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括至少一个与上述功能相对应的模块。
在一个可能的设计中,该发送器用于发送第一消息,其中,第一消息 用于触发第一承载的安全参数变更,第一承载为信令无线承载或数据无线承载,该安全参数包括密钥和/或安全算法,该安全参数变更将第一承载的安全参数从第一安全参数变更为第二安全参数;该接收器用于接收第二消息,其中,第二消息用于指示第一承载的安全参数变更完成;该处理器用于对第一承载上的下行数据进行第一安全处理,得到第二下行数据,该第一安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种;该发送器还用于发送第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安全处理所使用的安全参数。
在一个可能的设计中,该接收器还用于接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示,该第一安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;该处理器还用于根据该上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理,该第二安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。
在一个可能的设计中,上述第一消息还可以包括逻辑信道的信息,该逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全参数进行第一安全处理的所述第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第五逻辑信道的逻辑信道标识对应第一安全参数,第六逻辑信道的逻辑信道标识对应第二安全参数,第五逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第六逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。
在一个可能的设计中,该处理器还用于:在发送第一消息之后或者在接收到第二消息之后,使用第二安全参数对下行数据进行第一安全处理;在发送第一消息之前或者在接收到第二消息之前,使用第一安全参数对下行数据进行第一安全处理。
在一个可能的设计中,该处理器还用于:当上行数据中的第一安全参数指示指示的是第一安全参数时,使用第一安全参数对上行数据进行第二安全处理;当上行数据中的第一安全参数指示指示的是第二安全参数时,使用第二安全参数对上行数据进行第二安全处理。
第十方面,本发明实施例提供了一种基站,该基站包括:处理单元和发送单元,还可以包括接收单元。该基站实现上述第二方面数据传输方法中基站的功能,因此也能实现第二方面数据传输方法所具备的有益效果。其中,基站的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括至少一个与上述功能相对应的模块。
在一个可能的设计中,该发送单元用于发送第一消息,其中,第一消息用于触发第一承载的安全参数变更,第一承载为数据无线承载,上述安全参数包括密钥和/或安全算法,该安全参数变更将第一承载的安全参数从第一安全参数变更为第二安全参数;该处理单元用于对第一承载上的下行数据进行第一安全处理,得到第二下行数据,第一安全处理包括对数据无线承载上的数据进行加密处理;该发送单元还用于发送第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安全处理所使用的安全参数。
在一个可能的设计中,该接收单元用于接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示, 该第一安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;该处理单元还用于根据该上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理,第二安全处理包括对数据无线承载上的数据进行解密处理。
在一个可能的设计中,上述第一消息还可以包括逻辑信道的信息,该逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。
在一个可能的设计中,该处理单元还用于:使用第一安全参数对下行数据进行第一安全处理。
在一个可能的设计中,该处理单元还用于:当上行数据中的第一安全参数指示指示的是第一安全参数时,使用第一安全参数对上行数据进行第二安全处理。
第十一方面,本发明实施例提供了一种基站,该基站包括接收单元、处理单元和发送单元。该基站实现上述第三方面数据传输方法中基站的功能,因此也能实现第三方面数据传输方法所具备的有益效果。其中,基站 的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括至少一个与上述功能相对应的模块。
在一个可能的设计中,该接收单元用于接收第二消息,其中,第二消息用于指示第一承载的安全参数变更完成,第一承载为数据无线承载;该处理单元用于对第一承载上的下行数据进行第一安全处理,得到第二下行数据,第一安全处理包括对数据无线承载上的数据进行加密处理;该发送单元用于发送第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安全处理所使用的安全参数。
在一个可能的设计中,该接收单元还用于接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示,该第一安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;该处理单元还用于根据该上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理,第二安全处理包括对数据无线承载上的数据进行解密处理。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和所述第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。
在一个可能的设计中,该处理单元还用于:使用第二安全参数对下行数据进行第一安全处理。
在一个可能的设计中,该处理单元还用于:当上行数据中的所述第一安全参数指示指示的是第二安全参数时,使用第二安全参数对上行数据进行第二安全处理。
第十二方面,本发明实施例提供了一种基站,该基站包括接收单元、处理单元和发送单元。该基站实现上述第四方面数据传输方法中基站的功能,因此也能实现第四方面数据传输方法所具备的有益效果。其中,基站的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括至少一个与上述功能相对应的模块。
在一个可能的设计中,该发送单元用于发送第一消息,其中,第一消息用于触发第一承载的安全参数变更,第一承载为信令无线承载或数据无线承载,该安全参数包括密钥和/或安全算法,该安全参数变更将第一承载的安全参数从第一安全参数变更为第二安全参数;该接收单元用于接收第二消息,其中,第二消息用于指示第一承载的安全参数变更完成;该处理单元用于对第一承载上的下行数据进行第一安全处理,得到第二下行数据,该第一安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种;该发送单元还用于发送第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安全处理所使用的安全参数。
在一个可能的设计中,该接收单元还用于接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示,该第一安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;该处理单元还用于根据该上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理,该第二安全处理包括:对信 令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。
在一个可能的设计中,上述第一消息还可以包括逻辑信道的信息,该逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全参数进行第一安全处理的所述第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第五逻辑信道的逻辑信道标识对应第一安全参数,第六逻辑信道的逻辑信道标识对应第二安全参数,第五逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第六逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
在一个可能的设计中,上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。
在一个可能的设计中,该处理单元还用于:在发送第一消息之后或者在接收到第二消息之后,使用第二安全参数对下行数据进行第一安全处理;在发送第一消息之前或者在接收到第二消息之前,使用第一安全参数对下行数据进行第一安全处理。
在一个可能的设计中,该处理单元还用于:当上行数据中的第一安全参数指示指示的是第一安全参数时,使用第一安全参数对上行数据进行第二安全处理;当上行数据中的第一安全参数指示指示的是第二安全参数时,使用第二安全参数对上行数据进行第二安全处理。
本发明各实施例提供的数据传输方法和装置,通过在第一承载的上行数据中引入第一安全参数指示,基站能够根据上行数据中的第一安全参数指示判断该上行数据是采用第一安全参数还是第二安全参数进行第一安全处理的,进而选择对应的安全参数进行第二安全处理,从而解决了混淆期 内解密出来的是错误的数据的问题;在下行数据中引入第二安全参数指示,UE能够根据下行数据中的第二安全参数指示判断该数据是采用第一安全参数还是第二安全参数进行第一安全处理的,进而选择对应的安全参数进行第二安全处理,从而解决了混淆期内解密出来的是错误的数据的问题。
附图说明
图1为本发明实施例的一种可能的基站间的PCell变更过程中安全参数变更的控制面流程示意图;
图2为本发明实施例的一种可能的split承载的上行数据传输流程示意图;
图3为本发明实施例的一种可能的split承载的下行数据传输流程示意图;
图4为本发明实施例的一种可能的基站内安全参数变更的控制面流程示意图;
图5为本发明实施例的一种可能的基站内安全参数变更的数据面流程示意图;
图6为本发明实施例的一种可能的UE的装置结构示意图;
图7为本发明实施例的另一种可能的UE的装置结构示意图;
图8为本发明实施例的一种可能的基站的装置结构示意图;
图9为本发明实施例的另一种可能的基站的装置结构示意图。
具体实施方式
为使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明实施方式做出进一步地详细描述。对于本领域普通技术人员在没有付出创造性劳动的前提下所获得的其它所有实施例,都属于本发明保护的范围。
图1提供了本发明实施例的一种可能的基站间的主小区(Primary Cell,简称PCell)变更过程中安全参数变更的控制面流程示意图。
在本发明实施例中,用户设备(User Equipment,UE)可称之为终端(Terminal)、移动台(Mobile Station,MS)、移动终端(Mobile Terminal)等,该用户设备可以经无线接入网(Radio Access Network,RAN)与一个或多个核心网进行通信,例如,用户设备可以是移动电话(或称为“蜂窝电话”)、具有移动终端的计算机等,例如,用户设备还可以是便携式、袖珍式、手持式、计算机内置的或者车载的移动装置,它们与无线接入网交换语音和/或数据。
101,源基站决定进行UE的PCell变更,并确定进行PCell变更的目标PCell。其中,源基站是源PCell所在的基站,源PCell是指进行PCell变更之前的为UE提供服务的PCell。在本发明的实施例中,源基站也可以称为源主基站(Master eNB,简称MeNB)。
可选地,源基站为该UE的剖分split承载分配第三逻辑信道,该第三逻辑信道对应有唯一的逻辑信道标识LCID3,该第三逻辑信道用于传输PCell变更完成后该split承载通过源基站的空中接口发给UE的下行数据以及源基站通过空中接口接收来自UE的上行数据。在源基站决定变更UE的PCell之前,源基站就已经为该split承载建立了第一逻辑信道,对应逻辑信道标识LCID1,该第一逻辑信道用于传输PCell变更完成前该split承载通过源基站的空中接口发给该UE的下行数据以及源基站通过空中接口接收来自该UE的上行数据。
如果该UE有多个split承载,那么源基站为该UE的每一个split承载分配一个新的逻辑信道。为了描述简便,在本发明的实施例中,按照该UE只有一个split承载来进行描述。
102,源基站向目标基站发送第一消息,该第一消息用于指示PCell变更,其中目标基站是目标PCell所在的基站,在本发明的实施例中,目标基 站也可以称为目标主基站。该第一消息包括目标PCell信息,例如目标PCell的小区标识或索引。
可选地,该第一消息还包括剖分split承载的第一GPRS隧道协议(General Packet Radio System Tunneling Protocol,简称GTP)隧道信息,对应的GTP隧道标识为GTP1,用于传输在S1路径切换后由目标基站进行第一安全处理并发送给源基站的下行数据,该下行数据需要通过源基站的空中接口发送给该UE,该第一安全处理包括对该split承载上的数据进行加密处理。
可选地,目标基站收到该第一消息后,为该UE的split承载分配第四逻辑信道,对应逻辑信道标识LCID4,该第四逻辑信道用于传输PCell变更完成后该split承载通过该目标基站的空中接口发给UE的下行数据以及目标基站通过空中接口接收来自UE的上行数据。在源基站决定变更UE的PCell之前,目标基站就已经为该split承载建立了第二逻辑信道,对应逻辑信道标识LCID2,该第二逻辑信道用于传输PCell变更完成前该split承载通过该目标基站的空中接口发给该UE的下行数据以及该目标基站通过空中接口接收来自该UE的上行数据。
可选地,在该UE的双连接(Dual Connectivity,简称DC)初始建立的时候,源基站和目标基站之间已经建立了第四GTP隧道,对应的GTP隧道的标识为GTP4,用于传输由目标基站发送给源基站的上行数据,该上行数据是由目标基站从空中接口接收到的,该上行数据由源基站进行第二安全处理,该第二安全处理包括对该split承载上的数据进行解密处理。
103,目标基站向源基站发送第二消息,该第二消息用于确认源基站发送给目标基站的第一消息。该第二消息包括该split承载的承载标识,该第二消息还可以包括该split承载对应的第四逻辑信道的逻辑信道标识LCID4。
可选地,该第二消息包括该split承载的第二GTP隧道信息,对应的 GTP隧道标识为GTP2,用于传输在S1路径切换后由源基站进行第二安全处理并发送给目标基站的上行数据,该上行数据由目标基站发送给服务网关(Serving Gateway,简称S-GW)。
可选地,该第二消息包括该split承载的第三GTP隧道信息,对应的GTP隧道标识为GTP3,用于传输在S1路径切换后由源基站发送给目标基站的上行数据,该上行数据由目标基站进行第二安全处理后发给S-GW。
104,源基站向UE发送第三消息,该第三消息用于触发PCell变更,也可以用于触发安全参数变更,该安全参数变更将该split承载的安全参数从第一安全参数变更为第二安全参数。该第三消息包括目标PCell信息,该第三消息还可以包括该split承载的承载标识以及逻辑信道的信息,其中,逻辑信道的信息包括逻辑信道标识,该逻辑信道是新增的并用于承载使用第二安全参数进行第一安全处理的该split承载上的数据。该第一安全参数包括源基站的密钥和/或源基站的安全算法,该第一安全参数为安全参数变更之前用于对该split承载上的数据进行第一安全处理和第二安全处理的安全参数;该第二安全参数包括目标基站的密钥和/或目标基站的安全算法,该第二安全参数为安全参数变更之后用于对该split承载上的数据进行第一安全处理和第二安全处理的安全参数。
具体地,该第三消息中可以包括第三逻辑信道的信息以及第四逻辑信道的信息。从而使得该UE获知该split承载对应四个逻辑信道,其中第一逻辑信道和第二逻辑信道是在收到该第三消息之前建立的,用于承载使用第一安全参数进行第一安全处理的该split承载上的数据;第三逻辑信道和第四逻辑信道是在收到该第三消息之后建立的,用于承载使用第二安全参数进行第一安全处理的该split承载上的数据。
该第三消息可以为PCell变更消息或包括PCell变更指示的RRC连接重配置(RRC Connection Reconfiguration)消息,指示UE采用修改而不是切换的方式进行PCell的变更。具体地,以修改的方式进行PCell变更包括, 在进行PCell变更过程中,保持UE与源PCell和目标PCell的无线连接不中断,源基站和目标基站在PCell变更过程中能够对UE的数据进行调度。可以理解的是,该第三消息也可以是其它类型的消息,本发明对此不做限定。
105,UE根据接收到的来自源基站的第三消息进行PCell变更以及安全参数变更。PCell变更包括将目标PCell变更为UE的PCell以及将源PCell变更为UE的处于激活状态的辅小区SCell。
PCell变更还包括,UE将源基站变更为辅基站(Secondary eNB,简称SeNB),将目标基站变更为主基站。
具体地,安全参数变更的数据面处理可以参考图2和图3中实施例的描述。
106,UE向目标基站发送第四消息,该第四消息用于指示PCell变更完成,同时也可以用于指示该split承载的安全参数变更完成。该第四消息可以包括第一COUNT值,该第一COUNT值为UE采用第二安全参数对上行数据进行第一安全处理的数据包的起始COUNT值。
该第四消息可以是一条新的消息,例如PCell变更完成消息;也可以是RRC连接重配置完成消息,用于指示UE的PCell变更操作已完成。
107,目标基站接收到UE发送的第四消息后,向源基站发送第五消息,该第五消息用于指示PCell变更完成或用于请求序列号(Sequence Number,简称SN)状态。其中,该请求SN状态包括向源基站请求上行分组数据汇聚协议(Packet Data Convergence Protocol,简称PDCP)SN接收状态以及下行PDCP SN发送状态。
108,源基站收到目标基站发送的第五消息后,向目标基站发送第六消息,该第六消息用于SN状态转移,该第六消息包括上行PDCP SN接收状态以及下行PDCP SN发送状态。
进一步的,对于上行,PDCP SN接收状态可以包括第二COUNT值和 对应的PDCP接收窗口的接收状态中的至少一项,该第二COUNT值为源基站的第一个未接收到的PDCP数据的计数COUNT值;对于下行,PDCPSN发送状态可以包括第三COUNT值和对应的PDCP发送窗口的发送状态中的至少一项,该第三COUNT值为目标基站给未分配序号的下行数据分配的起始COUNT值(即目标基站从哪个COUNT值开始分配序号)。
可选的,源基站收到该第五消息后,停止给split承载的数据分配PDCP序号。
可选的,源基站将已经接收到的上行数据发送给目标基站,将已经分配序号但是还未确认成功发送给UE的下行数据和从服务网关接收到的还未分配序号的下行数据发送给目标基站。
109,目标基站向移动性管理实体(Mobility Management Entity,简称MME)发送S1路径切换请求消息,用于请求MME将S1-MME接口以及split承载的S1-U路径切换到目标基站,从而目标基站变为新的主基站,后续MME将S1信令发送给该新的主基站,S-GW将split承载的下行数据发送给该新的主基站。
110,MME给目标基站发送S1路径切换请求确认消息,用于确认S1路径切换请求消息。
本发明实施例对上述107和109的执行顺序不做限定。
111,目标基站确定该split承载的数据传输的混淆期已经结束,并删除第二逻辑信道。
具体地,目标基站分别判断该split承载的上行数据传输和下行数据传输的混淆期是否已经结束,如果该上行数据传输和下行数据传输的混淆期都已经结束了,则认为该split承载的数据传输的混淆期结束了。
具体地,目标基站判断该split承载的下行数据的COUNT值在第三COUNT值之前的数据都被UE成功接收到,则认为该split承载的下行数据传输的混淆期已经结束。
具体地,目标基站判断该split承载的上行数据的COUNT值在第一COUNT值之前的数据都被目标基站成功接收到,则认为该split承载的上行数据传输的混淆期已经结束。如果该第四消息中没有包括该第一COUNT值,那么第一COUNT值为目标基站接收到的使用第二安全参数进行第一安全处理的第一个上行数据包的COUNT值。可以理解的是,该上行数据可以通过源基站的空中接口接收,然后发送给目标基站。
112,可选地,目标基站向源基站发送第七消息,该第七消息用于指示混淆期结束或删除旧的逻辑信道,该第七消息包括该split承载的承载标识。
源基站收到该第七消息之后,删除第一逻辑信道。
113,可选地,目标基站向UE发送第八消息,该第八消息用于指示混淆期结束或删除旧的逻辑信道,该第八消息包括该split承载的承载标识。
UE接收到该第八消息之后,删除第一逻辑信道和第二逻辑信道。
114,可选地,UE确定该split承载的数据传输的混淆期已经结束,删除第一逻辑信道和第二逻辑信道。
具体地,UE分别判断该split承载的上行数据传输和下行数据传输的混淆期是否已经结束,如果该上行数据传输和下行数据传输的混淆期都已经结束了,则认为该split承载的数据传输的混淆期结束了。
具体地,UE将接收到的该split承载的第一个使用第二安全参数处理的PDCP数据的COUNT值记为第四COUNT值。UE判断该split承载的下行数据的COUNT值在第四COUNT值之前的数据都被UE成功接收到,则认为该split承载的下行数据传输的混淆期已经结束。
具体地,UE判断该split承载的COUNT值在第一COUNT值之前的上行数据都被目标基站成功接收到,则认为该split承载的上行数据传输的混淆期已经结束。可以理解的是,该上行数据可以通过源基站的空中接口接收,然后发送给目标基站。
本发明实施例对上述112和113的执行顺序或111和114的执行顺序不 做限定。
上述图1所示的实施例的方法是以双连接(Dual Connectivity,简称DC)为例进行描述的,但这并不限定本实施例所适用的场景。本实施例的方法也同样适用于单载波场景和载波聚合(Carrier Aggregation,简称CA)场景。对于单载波场景或CA场景,当UE由于移动性发生基站间的服务小区更新或PCell更新的时候,网络首先将目标基站加为该UE的辅基站,当前的服务基站变为主基站,对应的该UE也就配置为DC模式,该UE的场景也就转变为DC场景。
在本实施例中,对于UE与一个基站之间传输的同一个承载的数据,如果在一段时间内两组或两组以上的安全参数同时被使用,则可以每组安全参数对应一个逻辑信道标识LCID,发送方使用哪组安全参数进行第一安全处理则数据中包括对应的LCID,对应地,接收方根据数据中的LCID可以确定发送方使用的安全参数,接收方使用该安全参数进行第二安全处理,从而解决了混淆期内解密出来的是错误的数据的问题。
图2提供了本发明实施例的一种可能的split承载的上行数据传输流程示意图。
201,UE对split承载上的上行数据进行第一安全处理,得到第二上行数据。
具体地,在安全参数切换时间点之后,使用第二安全参数对该上行数据进行第一安全处理;在该安全参数切换时间点之前,使用第一安全参数对该上行数据进行第一安全处理。该安全参数切换时间点可以为UE接收到该第三消息的时间点或者可以为UE发送该第四消息的时间点,也可以为UE确定的某个时间点。
可选地,UE对该第二上行数据进行分流,一部分数据通过空中接口发送给源基站;另一部分数据通过空中接口发送给目标基站。
211,UE将第二上行数据发送给源基站。
该第二上行数据包括第一安全参数指示,该第一安全参数指示用于指示该第二上行数据的第一安全处理所使用的安全参数是第一安全参数还是第二安全参数。其中,该第一安全处理包括对该split承载上的数据进行加密处理,该第一安全参数包括源基站的密钥和/或源基站的安全算法,该第二安全参数包括目标基站的密钥和/或目标基站的安全算法。
具体地,该第一安全参数指示可以是逻辑信道标识,不同的逻辑信道标识分别对应该第一安全参数和该第二安全参数。具体地,该逻辑信道标识可以为LCID1或LCID3,LCID1指示第一安全参数,LCID3指示第二安全参数。当第一安全参数指示为逻辑信道标识时,该第二上行数据可以承载在与该逻辑信道标识对应的逻辑信道上。
该第一安全参数指示还可以是PDCP数据包的包头中的一个新的信元:该信元的内容可以是安全功能锚定的基站标识或基站索引;或者可以是固定一比特或多个比特循环变化,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。如果该第一安全参数指示的内容是源基站的基站标识或基站索引,则表明该第一安全参数指示指示的是第一安全参数;如果该第一安全参数指示的内容是目标基站的基站标识或基站索引,则表明该第一安全参数指示指示的是第二安全参数。如果该第一安全参数指示的内容是一个比特或多个比特的循环变化取值,那么以一比特为例:假如该第一安全参数指示的值在PCell变更过程之前的取值是0,在PCell变更过程启动之后变为1,则0代表该第一安全参数指示指示的是第一安全参数,1代表该第一安全参数指示指示的是第二安全参数;或者相反,该第一安全参数指示的值在PCell变更过程之前的取值是1,在PCell变更过程启动之后变为0,则1代表该第一安全参数指示指示的是第一安全参数,0代表该第一安全参数指示指示的是第二安全参数。可以理解的是,该比特位的值是否变化是以PCell变更之前的该比特位的值作为参考的。
212,源基站根据该第二上行数据中的第一安全参数指示选择安全参 数,对该第二上行数据进行第二安全处理。其中,该第二安全处理包括对该split承载上的数据进行解密处理,此处该split承载上的数据为第二上行数据。
具体地,当该第二上行数据中的第一安全参数指示指示的是第一安全参数时,源基站使用第一安全参数对该第二上行数据进行第二安全处理;当该第二上行数据中的第一安全参数指示指示的是第二安全参数时,该第二上行数据需要转发给目标基站进行第二安全处理,源基站对该第二上行数据不进行第二安全处理。
具体如何判断第二上行数据中的第一安全参数指示指示的是第一安全参数还是第二安全参数,可以参见211中的描述。
213,源基站将split承载数据发送给目标基站,该split承载数据为经过源基站的第二安全处理的数据或者没有经过源基站的第二安全处理而需要转发给目标基站进行第二安全处理的数据。
可选地,该split承载数据中包括第一安全参数指示,用于指示该数据的第一安全处理采用的是第一安全参数还是第二安全参数。有关第一安全参数指示可以参考211的描述。
当211中选择的第一安全参数指示为逻辑信道标识时,源基站还可以通过不同的GTP隧道将该split承载数据发送给目标基站。具体地,逻辑信道标识为LCID1的数据,在第二GTP隧道上传输;逻辑信道标识为LCID3的数据,在第三GTP隧道上传输。
214,目标基站根据接收数据的GTP隧道或根据数据中的第一安全参数指示对来自源基站的数据进行处理。
具体地,当源基站通过不同的GTP隧道将该split承载数据发送给目标基站时,对于来自第二GTP隧道的数据,已经由源基站进行第二安全处理了,目标基站将该数据发送给S-GW;对于来自第三GTP隧道的数据,目标基站使用第二安全参数对数据进行第二安全处理,然后将数据发送给 S-GW。
可选地,目标基站还可以根据该数据中的第一安全参数指示选择安全参数,对该数据进行第二安全处理。具体地,当该数据中的第一安全参数指示指示的是第一安全参数时,该数据已经由源基站进行了第二安全处理,目标基站不需要再对该数据进行第二安全处理;当该数据中的第一安全参数指示指示的是第二安全参数时,目标基站使用第二安全参数对该数据进行第二安全处理。具体如何判断数据中的第一安全参数指示指示的是第一安全参数还是第二安全参数,可以参见211中的描述。
215,目标基站将经过214处理的数据发送给S-GW。可以理解的是,该数据在发送给S-GW之前需要去掉PDCP头部信息,并按照S1接口的数据格式进行封装。
221,UE将第二上行数据发送给目标基站。
该第二上行数据包括第一安全参数指示。具体地,当该第一安全参数指示为逻辑信道标识时,该逻辑信道标识可以为LCID2或LCID4,LCID2指示第一安全参数,LCID4指示第二安全参数,第二上行数据承载在与该逻辑信道标识对应的逻辑信道上;当该第一安全参数指示为PDCP数据包的包头中的新的信元时,该第一安全参数指示具体的取值可以参考211中相关的描述。
222,目标基站根据该第二上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理。
具体地,当该第二上行数据中的第一安全参数指示指示的是第一安全参数时,该第二上行数据需要转发给源基站进行第二安全处理,目标基站对该第二上行数据不进行第二安全处理;当该第二上行数据中的第一安全参数指示指示的是第二安全参数时,目标基站使用第二参数对该第二上行数据进行第二安全处理。
具体如何判断该第二上行数据中的第一安全参数指示指示的是第一安 全参数还是第二安全参数,可以参见211中的描述。
223,目标基站将已经完成第二安全处理的数据发送给S-GW。可以理解的是,该数据在发送给S-GW之前需要去掉PDCP头部信息,并按照S1接口的数据格式进行封装。
224,目标基站将第一安全参数指示指示的是第一安全参数的数据发送给源基站,该数据是目标基站通过空中接口接收到的,该数据中可以包括第一安全参数指示,用于指示该数据的第一安全处理采用的是第一安全参数还是第二安全参数。
可选地,目标基站通过第四GTP隧道将逻辑信道标识为LCID2的数据发送给源基站,该数据是目标基站通过空中接口接收到的。
225,源基站对来自目标基站的数据进行第二安全处理,其中第二安全处理使用的是第一安全参数。
226,源基站将经过第二安全处理的数据发送给目标基站,该数据中可以包括第一安全参数指示。可选地,当第一安全参数指示为逻辑信道标识时,该数据可以在第二GTP隧道上传输。
227,目标基站将来自源基站的数据发送给S-GW,该数据的第一安全参数指示指示的是第一安全参数,或者,该数据是通过第二GTP隧道进行传输的。可以理解的是,该数据在发送给S-GW之前需要去掉PDCP头部信息,并按照S1接口的数据格式进行封装。
如上所述,通过引入第一安全参数指示,源基站和目标基站能够根据上行数据中的第一安全参数指示判断该上行数据是采用第一安全参数还是第二安全参数进行第一安全处理的,进而选择对应的安全参数进行第二安全处理,从而解决了混淆期内解密出来的是错误的数据的问题。
上述上行的数据流程是基于S1路径已经完成切换的场景进行描述的,对于S1路径还没有完成切换的场景,也有类似的数据流程,可以参考上述流程得到。
图3提供了本发明实施例的一种可能的split承载的下行数据传输流程示意图。
311,源基站对来自S-GW的split承载上的下行数据进行第一安全处理,得到第二下行数据,其中该第一安全处理包括对该split承载上的数据进行加密处理,该第一安全处理使用第一安全参数,该第一安全参数包括源基站的密钥和/或源基站的安全算法。
可选地,源基站对该第二下行数据进行分流,一部分数据通过源基站的空中接口发送给UE;另一部分数据通过X2-U接口(基站与基站之间的数据面接口)发送给目标基站,通过目标基站的空中接口发送给UE。
312,源基站将该第二下行数据发送给UE,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安全处理所使用的安全参数是第一安全参数还是第二安全参数。此处该第二安全参数指示指示该第二下行数据使用的安全参数为第一安全参数。
具体地,该第二安全参数指示可以是逻辑信道标识,不同的逻辑信道标识分别对应该第一安全参数和该第二安全参数,此处,该逻辑信道标识为LCID1,LCID1指示第一安全参数,对应地,该第二下行数据承载在第一逻辑信道上。该第二安全参数指示还可以是PDCP包头中的一个新的信元,用于指示第一安全参数,有关该新的信元可以参考211中相关的描述。
可以理解的是,第二安全参数指示与第一安全参数指示的定义相似,其区别在于,第二安全参数指示用于指示下行数据的第一安全处理所使用的安全参数,而第一安全参数指示用于指示上行数据的第一安全处理所使用的安全参数。
313,源基站通过X2-U接口将该第二下行数据发送给目标基站,该第二下行数据中包括第二安全参数指示或者通过特定的GTP隧道传输,用于指示该数据所使用的安全参数是第一安全参数。
314,目标基站通过空中接口将来自源基站的该第二下行数据发送给 UE,该第二下行数据中包括第二安全参数指示。此处该第二安全参数指示指示该第二下行数据所使用的安全参数是第一安全参数。。
具体地,该第二安全参数指示可以是逻辑信道标识,该逻辑信道标识为LCID2,LCID2指示第一安全参数,对应地,该第二下行数据承载在第二逻辑信道上。该安全参数指示还可以是PDCP包头中的一个新的信元,用于指示第一安全参数,有关该新的信元可以参考211中相关的描述。
321,目标基站对来自S-GW的split承载上的下行数据进行第一安全处理,得到第二下行数据,其中该第一安全处理包括对该split承载上的数据进行加密处理,该第一安全处理使用第二安全参数,该第二安全参数包括目标基站的密钥和/或目标基站的安全算法。
可选地,目标基站对该第二下行数据进行分流,一部分数据通过目标基站的空中接口发送给UE;另一部分数据通过X2-U接口发送给源基站,通过源基站的空中接口发送给UE。
可以理解的是,该目标基站使用第二安全参数对该split承载的数据进行第一安全处理是在该目标基站接收到图1中的第四消息之后进行的。
322,目标基站将该第二下行数据发送给UE,该第二下行数据包括第二安全参数指示。此处该第二安全参数指示指示该下行数据使用的安全参数为第二安全参数。
具体地,该第二安全参数指示可以是逻辑信道标识,该逻辑信道标识为LCID4,LCID4指示第二安全参数,对应地,该第二下行数据承载在第四逻辑信道上。该第二安全参数指示还可以是PDCP包头中的一个新的信元,用于指示第二安全参数,有关该新的信元可以参考211中相关的描述。
323,目标基站通过X2-U接口将该第二下行数据发送给源基站,该第二下行数据中包括第二安全参数指示或通过第一GTP隧道传输,用于指示该数据所使用的安全参数是第二安全参数。
324,源基站通过空中接口将来自目标基站的该第二下行数据发送给 UE,该第二下行数据中包括第二安全参数指示。此处,该第二安全参数指示指示该下行数据所使用的安全参数是第二安全参数。
具体地,该第二安全参数指示可以是逻辑信道标识,该逻辑信道标识为LCID3,LCID3指示第二安全参数,对应地,该第二下行数据承载在第三逻辑信道上。该第二安全参数指示还可以是PDCP包头中的一个新的信元,用于指示第一安全参数,有关该新的信元可以参考211中的相关描述。
331,UE根据该第二下行数据中的第二安全参数指示选择安全参数,对该第二下行数据进行第二安全处理,该第二安全处理包括对该split承载上的数据进行解密处理。具体地,当该第二下行数据中的第二安全参数指示指示的是第一安全参数时,UE使用第一安全参数对该第二下行数据进行第二安全处理;当该第二下行数据中的第二安全参数指示指示的是第二安全参数时,UE使用第二安全参数对该第二下行数据进行第二安全处理。具体如何判断数据中的第二安全参数指示指示的是第一安全参数还是第二安全参数,可以参见211中有关第一安全参数的相关描述。
如上所述,通过引入第二安全参数指示,UE能够根据下行数据中的第二安全参数指示判断该数据是采用第一安全参数还是第二安全参数进行第一安全处理的,进而选择对应的安全参数进行第二安全处理,从而解决了混淆期内解密出来的是错误的数据的问题。
除了如上述实施例所述的数据中包括显式的安全参数指示外,还可以通过隐式的方法来指示数据使用的是第一安全参数还是第二安全参数进行的安全处理,比如在PCell变更前UE使用的是C-RNTI 1(Cell Radio Network Temporary Identifier,小区无线网络临时标识),则基站分配一个新的C-RNTI 2并在PCell变更时携带给UE,当UE(或基站)使用第一安全参数对数据进行第一安全处理后将数据发送给对端时,UE(或基站)使用C-RNTI 1发送数据;当UE(或基站)使用第二安全参数对数据进行第一安全处理后将数据发送给对端时,UE(或基站)使用C-RNTI 2发送数据;对端接收到 数据后,根据使用的是C-RNTI 1还是C-RNTI 2来选择对应的安全参数对数据进行第二安全处理。具体的步骤,可以参见上面的描述,这里不再详述。
可以理解的是,上述图1、图2和图3的实施例是基站间的PCell变更过程中安全参数变更的相互关联的实施例,图1对应安全参数变更的控制面流程,图2对应上行数据传输流程,图3对应下行数据传输流程。对于某些业务,例如,基于传输控制协议(Transmission Control Protocol,简称TCP)的业务,其数据传输是双向的;而对于另外一些业务,例如,基于用户数据报协议(User Datagram Protocol,简称UDP)的业务,其数据传输是单向的。因此,对于上述第一承载,上行数据传输和下行数据传输可能是同时存在,也可能只有下行数据传输或只有上行数据传输。
图4提供了本发明实施例的一种可能的基站内安全参数变更的控制面流程示意图。
401,基站决定进行安全参数变更,该安全参数包括密钥和/或安全算法,该安全参数可以用于第三安全处理和第四安全处理。第三安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种。第四安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。
基站决定进行安全参数变更之后,按照一定的规则衍生出新的安全参数,即第四安全参数;在基站决定进行安全参数变更之前,基站与UE通信使用第三安全参数。具体地,基站如何衍生出第四安全参数,是现有技术,在此不做详述。基站进行安全参数变更可能是为了避免使用相同的密钥和无线承载标识(Radio Bearer Identity,简称RB ID)对COUNT值进行重用。
如果基站是被配置了DC的UE的主基站,则安全参数变更会影响MCG 承载和split承载;如果基站是被配置了DC的UE的辅基站,则安全参数变更会影响SCG承载。如果UE处于单载波或CA场景,则受影响的承载包括信令承载和数据承载中的至少一个。受影响的承载可能有一个或多个,为了方便描述,假设受影响的承载只有一个,称为第一承载。对于受影响的承载有多个的场景,本领域普通技术人员基于本发明实施例不需要经过创造性的劳动就可以获得对应的实施例,因此也是本发明所保护的范围。
可以理解的是,第三安全参数是安全参数变更之前用于对第一承载上的数据进行第三安全处理和第四安全处理的安全参数;第四安全参数是安全参数变更之后用于对第一承载上的数据进行第三安全处理和第四安全处理的安全参数。
可选地,基站为受影响的第一承载分配新的逻辑信道第六逻辑信道,对应逻辑信道标识为LCID6。该第六逻辑信道用于承载使用第四安全参数进行第三安全处理的该第一承载上的数据。在基站决定进行安全参数变更之前,基站已经为该第一承载分配第五逻辑信道,对应的逻辑信道标识为LCID5。该第五逻辑信道用于承载使用第三安全参数进行第三安全处理的该第一承载上的数据。
402,基站向UE发送第九消息,该第九消息用于触发安全参数变更,该安全参数变更将该第一承载的安全参数从第三安全参数变更为第四安全参数。该第九消息可以包括该第一承载的承载标识,该第九消息还可以包括逻辑信道的信息,其中,逻辑信道的信息包括逻辑信道标识,该逻辑信道是新增的并用于承载使用第四安全参数进行第三安全处理的该第一承载上的数据。具体地,该第九消息包括第六逻辑信道的信息。从而使得该UE获知该第一承载对应两个逻辑信道,其中第五逻辑信道是在收到该第九消息之前建立的;第六逻辑信道是在收到该第九消息之后建立的。
可选地,该第九消息还可以包括第六COUNT值,第六COUNT值为使用第四安全参数进行第三安全处理的下行数据的起始COUNT值。
该第九消息可以是包括安全参数变更指示的RRC连接重配置(RRCConnection Reconfiguration)消息。
该UE收到该第九消息后,按照与网络侧相同的方式衍生出第四安全参数。在该UE收到该第九消息之前,该UE与基站通信使用第三安全参数。
403,UE向基站发送第十消息,该第十消息可以用于指示该第一承载的安全参数变更完成,可选地,该第十消息可以包括第五COUNT值,该第五COUNT值为使用第四安全参数进行第三安全处理的上行数据的起始COUNT值。
404,基站确定该第一承载的数据传输的混淆期已经结束,删除第五逻辑信道。
具体地,基站分别判断该第一承载的上行数据传输和下行数据传输的混淆期是否已经结束,如果该上行数据传输和下行数据传输的混淆期都已经结束了,则认为该第一承载的数据传输的混淆期结束了。
具体地,基站判断该第一承载的下行数据的COUNT值在第六COUNT值之前的数据都被UE成功接收到,则认为该第一承载的下行数据传输的混淆期已经结束。
具体地,基站判断该第一承载的上行数据的COUNT值在第五COUNT值之前的数据都被基站成功接收到,则认为该第一承载的上行数据传输的混淆期已经结束。如果该第十消息中没有包括第五COUNT值,那么第五COUNT值设置为基站接收到的使用第四安全参数进行第三安全处理的第一个上行数据的COUNT值。
405,可选地,基站向UE发送第十一消息,该第十一消息用于指示混淆期结束或删除旧的逻辑信道,该第十一消息包括该第一承载的承载标识。
UE接收到该第十一消息之后,删除第五逻辑信道。
406,可选地,UE确定该第一承载的数据传输的混淆期已经结束,释放第五逻辑信道。
具体地,UE分别判断该第一承载的上行数据传输和下行数据传输的混淆期是否已经结束,如果该上行数据传输和下行数据传输的混淆期都已经结束了,则认为该第一承载的数据传输的混淆期结束了。
具体地,该UE判断该第一承载的下行数据的COUNT值在第六COUNT值之前的数据都被UE成功接收到,则认为该第一承载的下行数据传输的混淆期已经结束。如果该第九消息中没有包括第六COUNT值,那么第六COUNT值设置为UE接收到的使用第四安全参数进行第三安全处理的第一个下行数据的COUNT值。
具体地,该UE判断该第一承载的COUNT值在第五COUNT值之前的上行数据都被基站成功接收到,则认为该第一承载的上行数据传输的混淆期已经结束。
本发明实施例对上述404和406的执行顺序不做限定。
图5提供了本发明实施例的一种可能的基站内安全参数变更的数据面流程示意图。
511,基站对第一承载上的下行数据进行第三安全处理,得到第三下行数据,该第三安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种。
具体地,在安全参数切换时间点之后,使用第四安全参数对该下行数据进行第三安全处理,该下行数据可以承载在第六逻辑信道上,使用LCID6;在安全参数切换时间点之前,使用第三安全参数对该下行数据进行第三安全处理,该下行数据可以承载在第五逻辑信道上,使用LCID5。该安全参数切换时间点可以为基站决定进行安全参数变更的时间点,也可以为基站向UE发送第九消息的时间点,还可以为基站接收到来自UE的第十消息的时间点。
512,基站将该第三下行数据发送给UE,该第三下行数据包括第三安 全参数指示,该第三安全参数指示用于指示该第三下行数据的第三安全处理所使用的安全参数是第三安全参数还是第四安全参数。
具体地,该第三安全参数指示可以是逻辑信道标识,不同的逻辑信道标识分别对应该第三安全参数和该第四安全参数。该逻辑信道标识为LCID5或LCID6,其中LCID5指示第三安全参数,LCID6指示第四安全参数。当第三安全参数指示为逻辑信道标识时,第三下行数据可以承载在与该逻辑信道标识对应的逻辑信道上。
该第三安全参数指示还可以是PDCP包头中的一个新的信元,例如可以是固定一比特或多个比特循环变化,该比特位的值的变化指示安全参数从第三安全参数变更为第四安全参数。假如第三该安全参数指示的值在安全参数变更之前的取值是0,在安全参数变更之后变为1,则0代表该第三安全参数指示指示的是第三安全参数,1代表该第三安全参数指示指示的是第四安全参数;或者相反,该第三安全参数指示的值在安全参数变更之前的取值是1,在安全参数变更之后变为0,则1代表该第三安全参数指示指示的是第三安全参数,0代表该第三安全参数指示指示的是第四安全参数。可以理解的是,该比特位的值是否变化是以安全参数变更之前的该比特位的值作为参考的。
513,UE根据该第三下行数据中的第三安全参数指示选择安全参数,对该第三下行数据进行第四安全处理,该第四安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。具体地,当该第三下行数据中的第三安全参数指示指示的是第三安全参数时,UE使用第三安全参数对该第三下行数据进行第四安全处理;当该第三下行数据中的第三安全参数指示指示的是第四安全参数时,UE使用第四安全参数对该第三下行数据进行第四安全处理。
具体如何判断数据中的第三安全参数指示指示的是第三安全参数还是 第四安全参数,可以参见512中的描述。
521,UE对第一承载上的上行数据进行第三安全处理,得到第三上行数据。
具体地,在安全参数切换时间点之后,使用第四安全参数对该上行数据进行第三安全处理,该上行数据可以承载在第六逻辑信道上,使用LCID6;在安全参数切换时间点之前,使用第三安全参数对该上行数据进行第三安全处理,该第一承载上的数据可以承载在第五逻辑信道上,使用LCID5。该安全参数切换时间点可以为UE接收到第九消息的时间点或者可以为UE发送第十消息的时间点,也可以为UE确定的其它某个时间点。
522,UE将该第三上行数据发送给基站,该第三上行数据包括第四安全参数指示,该第四安全参数指示用于指示该第三上行数据的第三安全处理所使用的安全参数是第三安全参数还是第四安全参数。有关第四安全参数指示的定义可以参考512中第三安全参数指示的相关描述。
可以理解的是,第四安全参数指示与第三安全参数指示的定义相似,其区别在于,第三安全参数指示用于指示下行数据所使用的安全参数,而第四安全参数指示用于指示上行数据所使用的安全参数。当第四安全参数指示为逻辑信道标识时,第三上行数据可以承载在与该逻辑信道标识对应的逻辑信道上。
523,基站根据该第三上行数据中的第四安全参数指示选择安全参数,对该第三上行数据进行第四安全处理。具体地,当该第三上行数据中的第四安全参数指示指示的是第三安全参数时,基站使用第三安全参数对该第三上行数据进行第四安全处理;当该第三上行数据中的第四安全参数指示指示的是第四安全参数时,基站使用第四安全参数对该第三上行数据进行第四安全处理。
具体如何判断数据中的第四安全参数指示指示的是第三安全参数还是第四安全参数,可以参考512中第三安全参数指示的相关描述。
如上所述,通过引入安全参数指示,UE或基站能够根据下行数据或上行数据中的安全参数指示判断该数据是采用第三安全参数还是第四安全参数进行第三安全处理的,进而选择对应的安全参数进行第四安全处理,从而解决了混淆期内解密出来的是错误的数据的问题。
除了如上述实施例所述的数据中包括显式的安全参数指示外,还可以通过隐式的方法来指示数据使用的是第三安全参数还是第四安全参数进行的安全处理,比如在安全参数变更前UE使用的是C-RNTI 1,则基站分配一个新的C-RNTI 2并在第九消息中携带给UE,当UE(或基站)使用第三安全参数对数据进行第三安全处理后将数据发送给对端时,UE(或基站)使用C-RNTI 1发送数据;当UE(或基站)使用第四安全参数对数据进行第三安全处理后将数据发送给对端时,UE(或基站)使用C-RNTI 2发送数据;对端接收到数据后,根据使用的C-RNTI 1还是C-RNTI 2来选择对应的安全参数对数据进行第四安全处理。具体的步骤,可以参见上面的描述,这里不再详述。
可以理解的是,上述图4和图5的实施例是基站内安全参数变更的相互关联的实施例,图4对应安全参数变更的控制面流程,图5对应安全参数变更的数据面流程。对于某些业务,例如,基于传输控制协议(Transmission Control Protocol,简称TCP)的业务,其数据传输是双向的;而对于另外一些业务,例如,基于用户数据报协议(User Datagram Protocol,简称UDP)的业务,其数据传输是单向的。因此,对于上述第一承载,上行数据传输和下行数据传输可能是同时存在,也可能只有下行数据传输或只有上行数据传输。
应理解,在本发明的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本发明实施例的实施过程构成任何限定。
上述主要从各个网元之间交互的角度对本发明实施例提供的方案进行 了介绍。可以理解的是,各个网元,例如UE,基站和MME为了实现上述功能,其包括了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及方案步骤,本发明能够以计算机软件或硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件、计算机软件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
上文中详细描述了根据本发明实施例的数据传输的方法,下面将描述根据本发明实施例的基站和UE。应理解,本发明实施例的基站和UE可以执行前述本发明实施例的各种方法,即以下各种装置的具体工作过程,可以参考前述方法实施例中的对应过程。
图6为本发明实施例的一种可能的UE的装置结构示意图。该UE包括接收器601、处理器602和发送器603。
接收器601用于接收第一消息,其中,该第一消息用于触发第一承载的安全参数变更,该第一承载为信令无线承载或数据无线承载,该安全参数包括密钥和/或安全算法,该安全参数变更将该第一承载的安全参数从第一安全参数变更为第二安全参数。
发送器603用于发送第二消息,其中,该第二消息用于指示该第一承载的安全参数变更完成。
处理器602用于对该第一承载上的上行数据进行第一安全处理,得到第二上行数据,该第一安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种。
该发送器603还用于发送该第二上行数据,该第二上行数据包括第一安全参数指示,该第一安全参数指示用于指示该第二上行数据的第一安全 处理所使用的安全参数。
可选地,接收器601还用于接收来该第一承载的下行数据,其中,该下行数据经过第一安全处理,该下行数据包括第二安全参数指示,该第二安全参数指示用于指示该下行数据的第一安全处理所使用的安全参数。处理器602还用于根据该下行数据中的第二安全参数指示选择安全参数,对该下行数据进行第二安全处理,该第二安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。
可选地,上述第一消息还可以包括逻辑信道的信息,该逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据;或者,第五逻辑信道的逻辑信道标识对应第一安全参数,第六逻辑信道的逻辑信道标识对应第二安全参数,第五逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第六逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。第一安全参数指示和第二安全参数指示还有其它的实现形式,具体可以参考方法实施例中的相关描述。
处理器602还可以用于,在接收到第一消息之后或者在发送第二消息之后,使用第二安全参数对上行数据进行第一安全处理;在接收到第一消息之前或者在发送第二消息之前,使用第一安全参数对上行数据进行第一安全处理。
处理器602还可以用于,当该下行数据中的第二安全参数指示指示的是第一安全参数时,使用第一安全参数对该下行数据进行第二安全处理;当该下行数据中的第二安全参数指示指示的是第二安全参数时,使用第二安全参数对该下行数据进行第二安全处理。
可选地,上述第一消息来自基站,上述第二消息发送给该基站;或者,上述第一消息来自源基站,上述第二消息发送给目标基站,该源基站为源主小区所在的基站,该目标基站为目标主小区所在的基站。
可以理解的是,图6仅仅示出了UE的一种设计。在实际应用中,UE可以包括任意数量的接收器、发送器和处理器,接收器和发送器可以是独立的物理实体也可以是集成在同一个物理实体上,例如接收器和发送器都集成在一个收发器物理实体上,而所有可以实现本发明实施例的UE都在本发明的保护范围之内。
图7为本发明实施例的另一种可能的UE的装置结构示意图。该UE包括接收单元701、处理单元702和发送单元703。
接收单元701用于接收第一消息,其中,该第一消息用于触发第一承载的安全参数变更,该第一承载为信令无线承载或数据无线承载,该安全参数包括密钥和/或安全算法,该安全参数变更将该第一承载的安全参数从第一安全参数变更为第二安全参数。
发送单元703用于发送第二消息,其中,该第二消息用于指示该第一承载的安全参数变更完成。
处理单元702用于对该第一承载上的上行数据进行第一安全处理,得到第二上行数据,该第一安全处理包括:对信令无线承载上的数据进行完 整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种。
该发送单元703还用于发送该第二上行数据,该第二上行数据包括第一安全参数指示,该第一安全参数指示用于指示该第二上行数据的第一安全处理所使用的安全参数。
可选地,接收单元701还用于接收来该第一承载的下行数据,其中,该下行数据经过第一安全处理,该下行数据包括第二安全参数指示,该第二安全参数指示用于指示该下行数据的第一安全处理所使用的安全参数。处理单元702还用于根据该下行数据中的第二安全参数指示选择安全参数,对该下行数据进行第二安全处理。第二安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。
可选地,上述第一消息还可以包括逻辑信道的信息,该逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据;或者,第五逻辑信道的逻辑信道标识对应第一安全参数,第六逻辑信道的逻辑信道标识对应第二安全参数,第五逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第六逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。第一安全参数指示和第二安全参数指示还有其它的实现形式,具体可以参考方法实施例中的相关描述。
处理单元702还可以用于,在接收到第一消息之后或者在发送第二消息之后,使用第二安全参数对上行数据进行第一安全处理;在接收到第一消息之前或者在发送第二消息之前,使用第一安全参数对上行数据进行第一安全处理。
处理单元702还可以用于,当该下行数据中的第二安全参数指示指示的是第一安全参数时,使用第一安全参数对该下行数据进行第二安全处理;当该下行数据中的第二安全参数指示指示的是第二安全参数时,使用第二安全参数对该下行数据进行第二安全处理。
可选地,上述第一消息来自基站,上述第二消息发送给该基站;或者,上述第一消息来自源基站,上述第二消息发送给目标基站,该源基站为源主小区所在的基站,该目标基站为目标主小区所在的基站。
图8为本发明实施例的一种可能的基站的装置结构示意图。本实施例中的基站完成上述方法实施例中的图1、图2和图3中源基站的功能,该基站包括处理器802和发送器803,该基站还可以包括接收器801。
发送器803用于发送第一消息,其中,第一消息用于触发第一承载的安全参数变更,第一承载为数据无线承载,上述安全参数包括密钥和/或安全算法,该安全参数变更将第一承载的安全参数从第一安全参数变更为第二安全参数。
处理器802用于对第一承载上的下行数据进行第一安全处理,得到第二下行数据,第一安全处理包括对数据无线承载上的数据进行加密处理。
发送器803还用于发送第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安 全处理所使用的安全参数。
可选地,接收器801用于接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示,该第一安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;处理器802还用于根据该上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理,第二安全处理包括对数据无线承载上的数据进行解密处理。
可选地,上述第一消息还可以包括逻辑信道的信息,该逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。第一安全参数指示和第二安全参数指示还有其它的实现形式,具体可以参考方法实施例中的相关描述。
具体地,处理器802还可以用于:使用第一安全参数对下行数据进行第一安全处理。
具体地,处理器802还可以用于:当上行数据中的第一安全参数指示指示的是第一安全参数时,使用第一安全参数对上行数据进行第二安全处理。
本发明实施例还提供了另一种可能的基站装置,本实施例中的基站完成上述方法实施例中的图1、图2和图3中目标基站的功能,该基站装置的结构图与图8类似,具体包括接收器、处理器和发送器。
接收器用于接收第二消息,其中,第二消息用于指示第一承载的安全参数变更完成,第一承载为数据无线承载。
处理器用于对第一承载上的下行数据进行第一安全处理,得到第二下行数据,第一安全处理包括对数据无线承载上的数据进行加密处理。
发送器用于发送第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安全处理所使用的安全参数。
可选地,该接收器还用于接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示,该第一安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;该处理器还用于根据该上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理,第二安全处理包括对数据无线承载上的数据进行解密处理。
上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和所述第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。第一安全参数指示和第二安全参数指示还有其它的实现形式,具体可 以参考方法实施例中的相关描述。
具体地,该处理器还可以用于:使用第二安全参数对下行数据进行第一安全处理。
具体地,该处理器还可以用于:当上行数据中的所述第一安全参数指示指示的是第二安全参数时,使用第二安全参数对上行数据进行第二安全处理。
本发明实施例还提供了一种可能的基站装置,本实施例中的基站完成上述方法实施例中的图4和图5中基站的功能,该基站装置的结构图与图8类似,具体包括接收器,处理器和发送器。
发送器用于发送第一消息,其中,第一消息用于触发第一承载的安全参数变更,第一承载为信令无线承载或数据无线承载,该安全参数包括密钥和/或安全算法,该安全参数变更将第一承载的安全参数从第一安全参数变更为第二安全参数。
接收器用于接收第二消息,其中,第二消息用于指示第一承载的安全参数变更完成。
处理器用于对第一承载上的下行数据进行第一安全处理,得到第二下行数据,该第一安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种。
该发送器还用于发送第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安全处理所使用的安全参数。
可选地,该接收器还用于接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示,该第一安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;该处理器还用于根据该上行数据中的第一安全参数指示选择安全参数,对该上 行数据进行第二安全处理,该第二安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。
可选地,上述第一消息还可以包括逻辑信道的信息,该逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全参数进行第一安全处理的所述第一承载上的数据。
上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第五逻辑信道的逻辑信道标识对应第一安全参数,第六逻辑信道的逻辑信道标识对应第二安全参数,第五逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第六逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。第一安全参数指示和第二安全参数指示还有其它的实现形式,具体可以参考方法实施例中的相关描述。
具体地,该处理器还可以用于:在发送第一消息之后或者在接收到第二消息之后,使用第二安全参数对下行数据进行第一安全处理;在发送第一消息之前或者在接收到第二消息之前,使用第一安全参数对下行数据进行第一安全处理。
具体地,该处理器还可以用于:当上行数据中的第一安全参数指示指示的是第一安全参数时,使用第一安全参数对上行数据进行第二安全处理;当上行数据中的第一安全参数指示指示的是第二安全参数时,使用第二安全参数对上行数据进行第二安全处理。
可以理解的是,图8仅仅示出了基站的一种装置结构图。在实际应用中,基站可以包括任意数量的接收器、发送器和处理器,接收器和发送器 可以是独立的物理实体也可以是集成在同一个物理实体上,例如接收器和发送器都集成在一个收发器物理实体上,而所有可以实现本发明实施例的基站都在本发明的保护范围之内。
图9为本发明实施例的另一种可能的基站的装置结构示意图。本实施例中的基站完成上述方法实施例中的图1、图2和图3中源基站的功能,该基站包括处理单元902和发送单元903,该基站还可以包括接收单元901。
发送单元903用于发送第一消息,其中,第一消息用于触发第一承载的安全参数变更,第一承载为数据无线承载,上述安全参数包括密钥和/或安全算法,该安全参数变更将第一承载的安全参数从第一安全参数变更为第二安全参数。
处理单元902用于对第一承载上的下行数据进行第一安全处理,得到第二下行数据,第一安全处理包括对数据无线承载上的数据进行加密处理。
发送单元903还用于发送第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该下行数据的第一安全处理所使用的安全参数;
可选地,接收单元901用于接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示,该第一安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;处理单元902还用于根据该上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理,第二安全处理包括对数据无线承载上的数据进行解密处理。
可选地,上述第一消息还可以包括逻辑信道的信息,该逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全参数进行第一安全处理的所述第一承载上的数据。
上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地, 第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和所述第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。第一安全参数指示和第二安全参数指示还有其它的实现形式,具体可以参考方法实施例中的相关描述。
具体地,处理单元902还可以用于:使用第一安全参数对下行数据进行第一安全处理。
具体地,处理单元902还可以用于:当上行数据中的所述第一安全参数指示指示的是第一安全参数时,使用第一安全参数对上行数据进行第二安全处理。
本发明实施例还提供了另一种可能的基站装置,本实施例中的基站完成上述方法实施例中的图1、图2和图3中目标基站的功能,该基站装置的结构图与图9类似,具体包括接收单元,处理单元和发送单元。
接收单元,用于接收第二消息,其中,第二消息用于指示第一承载的安全参数变更完成,第一承载为数据无线承载。
处理单元,用于对第一承载上的下行数据进行第一安全处理,得到第二下行数据,第一安全处理包括对数据无线承载上的数据进行加密处理。
发送单元,用于发送第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安全处理所使用的安全参数。
可选地,该接收单元还用于接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示,该第一 安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;该处理单元还用于根据该上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理,第二安全处理包括对数据无线承载上的数据进行解密处理。
上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应第二安全参数,第一逻辑信道和第二逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第三逻辑信道和所述第四逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。第一安全参数指示和第二安全参数指示还有其它的实现形式,具体可以参考方法实施例中的相关描述。
具体地,该处理单元还可以用于:使用第二安全参数对下行数据进行第一安全处理。
具体地,该处理单元还可以用于:当上行数据中的所述第一安全参数指示指示的是第二安全参数时,使用第二安全参数对上行数据进行第二安全处理。
本发明实施例还提供了一种可能的基站装置,本实施例中的基站完成上述方法实施例中的图4和图5中基站的功能,该基站装置的结构图与图9类似,具体包括接收单元,处理单元和发送单元。
发送单元用于发送第一消息,其中,第一消息用于触发第一承载的安全参数变更,第一承载为信令无线承载或数据无线承载,上述安全参数包括密钥和/或安全算法,该安全参数变更将第一承载的安全参数从第一安全 参数变更为第二安全参数。
接收单元用于接收第二消息,其中,第二消息用于指示第一承载的安全参数变更完成。
处理单元用于对第一承载上的下行数据进行第一安全处理,得到第二下行数据,该第一安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种。
该发送单元还用于发送第二下行数据,其中,该第二下行数据包括第二安全参数指示,该第二安全参数指示用于指示该第二下行数据的第一安全处理所使用的安全参数。
可选地,该接收单元还用于接收该第一承载上的上行数据,其中,该上行数据经过第一安全处理,该上行数据包括第一安全参数指示,该第一安全参数指示用于指示该上行数据的第一安全处理所使用的安全参数;该处理单元还用于根据该上行数据中的第一安全参数指示选择安全参数,对该上行数据进行第二安全处理,该第二安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种
可选地,上述第一消息还可以包括逻辑信道的信息,该逻辑信道的信息包括逻辑信道的标识,该逻辑信道用于承载使用第二安全参数进行第一安全处理的所述第一承载上的数据。
上述第一安全参数指示和上述第二安全参数指示可以为逻辑信道标识,不同的逻辑信道标识分别对应第一安全参数和第二安全参数。具体地,第五逻辑信道的逻辑信道标识对应第一安全参数,第六逻辑信道的逻辑信道标识对应第二安全参数,第五逻辑信道用于承载使用第一安全参数进行第一安全处理的第一承载上的数据,第六逻辑信道用于承载使用第二安全参数进行第一安全处理的第一承载上的数据。
上述第一安全参数指示和上述第二安全参数指示还可以为一个比特位,该比特位的值的变化指示安全参数从第一安全参数变更为第二安全参数。第一安全参数指示和第二安全参数指示还有其它的实现形式,具体可以参考方法实施例中的相关描述。
具体地,该处理单元还可以用于:在发送第一消息之后或者在接收到第二消息之后,使用第二安全参数对下行数据进行第一安全处理;在发送第一消息之前或者在接收到第二消息之前,使用第一安全参数对下行数据进行第一安全处理。
具体地,该处理单元还可以用于:当上行数据中的第一安全参数指示指示的是第一安全参数时,使用第一安全参数对上行数据进行第二安全处理;当上行数据中的第一安全参数指示指示的是第二安全参数时,使用第二安全参数对上行数据进行第二安全处理。
应理解,在本发明实施例中,术语“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系。例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
用于执行本发明实施例的上述基站和UE的处理器可以是中央处理器(CPU),通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC),现场可编程门阵列(FPGA)或者其他可编程逻辑器件、晶体管逻辑器件,硬件部件或者其任意组合。其可以实现或执行结合本发明公开内容所描述的各种示例性的逻辑功能和模块。
结合本发明公开内容所描述的方法或者算法的步骤可以硬件的方式来实现,也可以是由处理器执行软件指令的方式来实现。软件指令可以由相应的软件模块组成,软件模块可以被存放于RAM存储器、闪存、ROM存储器、EPROM存储器、EEPROM存储器、寄存器、硬盘、移动硬盘、CD-ROM或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦 合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息。当然,存储介质也可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。另外,该ASIC可以位于用户设备或基站中。当然,处理器和存储介质也可以作为分立组件存在于用户设备中。
本领域技术人员应该可以意识到,在上述一个或多个示例中,本发明所描述的功能可以用硬件、软件、固件或它们的任意组合来实现。当使用软件实现时,可以将这些功能存储在计算机可读介质中或者作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序或相关信息的任何介质。存储介质可以是通用或专用计算机能够存取的任何可用介质。
以上所述的具体实施方式,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明的具体实施方式而已,并不用于限定本发明的保护范围,凡在本发明的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本发明的保护范围之内。

Claims (64)

  1. 一种数据传输方法,其特征在于,所述方法包括:
    接收第一消息,其中,所述第一消息用于触发第一承载的安全参数变更,所述第一承载为信令无线承载或数据无线承载,所述安全参数包括密钥和/或安全算法,所述安全参数变更将所述第一承载的安全参数从第一安全参数变更为第二安全参数;
    发送第二消息,其中,所述第二消息用于指示所述第一承载的安全参数变更完成;
    对所述第一承载上的上行数据进行第一安全处理,得到第二上行数据,所述第一安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种;
    发送所述第二上行数据,其中,所述第二上行数据包括第一安全参数指示,所述第一安全参数指示用于指示所述第二上行数据的所述第一安全处理所使用的安全参数。
  2. 根据权利要求1所述的方法,其特征在于,
    接收所述第一承载上的下行数据,其中,所述下行数据经过所述第一安全处理,所述下行数据包括第二安全参数指示,所述第二安全参数指示用于指示所述下行数据的所述第一安全处理所使用的安全参数;
    根据所述下行数据中的所述第二安全参数指示选择安全参数,对所述下行数据进行第二安全处理,所述第二安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。
  3. 根据权利要求2所述的方法,其特征在于,所述第二安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述 第二安全参数;或者,
    所述第二安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  4. 根据权利要求2或3所述的方法,其特征在于,所述根据所述下行数据中的所述第二安全参数指示选择安全参数,对所述下行数据进行第二安全处理,还包括:
    当所述下行数据中的所述第二安全参数指示指示的是所述第一安全参数时,使用所述第一安全参数对所述下行数据进行所述第二安全处理;
    当所述下行数据中的所述第二安全参数指示指示的是所述第二安全参数时,使用所述第二安全参数对所述下行数据进行所述第二安全处理。
  5. 根据权利要求1-4任一项所述的方法,其特征在于,所述第一安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第一安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  6. 根据权利要求3或5所述的方法,其特征在于,所述不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数,包括:
    第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应所述第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应所述第二安全参数,所述第一逻辑信道和所述第二逻辑信道用于承载使用所述第一安全参数进行所述第一安全处理的所述第一承载上的数据,所述第三逻辑信道和所述第四逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据;或者,
    第五逻辑信道的逻辑信道标识对应所述第一安全参数,第六逻辑信道的逻辑信道标识对应所述第二安全参数,第五逻辑信道用于承载使用所述第一安全参数进行所述第一安全处理的所述第一承载上的数据,第六逻辑 信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据。
  7. 根据权利要求1-6任一项所述的方法,其特征在于,所述对所述第一承载上的上行数据进行第一安全处理,包括:
    在接收到所述第一消息之后或者在发送所述第二消息之后,使用所述第二安全参数对所述上行数据进行所述第一安全处理;
    在接收到所述第一消息之前或者在发送所述第二消息之前,使用所述第一安全参数对所述上行数据进行所述第一安全处理。
  8. 根据权利要求1-7任一项所述的方法,其特征在于,所述第一消息还包括逻辑信道的信息,所述逻辑信道的信息包括逻辑信道的标识,所述逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据。
  9. 根据权利要求1-8任一项所述的方法,其特征在于,
    所述第一消息来自基站,所述第二消息发送给所述基站;或者,
    所述第一消息来自源基站,所述第二消息发送给目标基站,所述源基站为源主小区所在的基站,所述目标基站为目标主小区所在的基站。
  10. 一种数据传输方法,其特征在于,所述方法包括:
    发送第一消息,其中,所述第一消息用于触发第一承载的安全参数变更,所述第一承载为数据无线承载,所述安全参数包括密钥和/或安全算法,所述安全参数变更将所述第一承载的安全参数从第一安全参数变更为第二安全参数;
    对所述第一承载上的下行数据进行第一安全处理,得到第二下行数据,所述第一安全处理包括对数据无线承载上的数据进行加密处理;
    发送所述第二下行数据,其中,所述第二下行数据包括第二安全参数指示,所述第二安全参数指示用于指示所述第二下行数据的所述第一安全处理所使用的安全参数。
  11. 根据权利要求10所述的方法,其特征在于,所述方法还包括:
    接收所述第一承载上的上行数据,其中,所述上行数据经过所述第一安全处理,所述上行数据包括第一安全参数指示,所述第一安全参数指示用于指示所述上行数据的所述第一安全处理所使用的安全参数;
    根据所述上行数据中的所述第一安全参数指示选择安全参数,对所述上行数据进行第二安全处理,所述第二安全处理包括对数据无线承载上的数据进行解密处理。
  12. 根据权利要求11所述的方法,其特征在于,所述第一安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第一安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  13. 根据权利要求11或12所述的方法,其特征在于,所述根据所述上行数据中的所述第一安全参数指示选择安全参数,对所述上行数据进行第二安全处理,包括:
    当所述上行数据中的所述第一安全参数指示指示的是所述第一安全参数时,使用所述第一安全参数对所述上行数据进行所述第二安全处理。
  14. 根据权利要求10-13任一项所述的方法,其特征在于,所述第二安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第二安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  15. 根据权利要求12或14所述的方法,其特征在于,所述不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数,包括:
    第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应所述第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信 道标识对应所述第二安全参数,所述第一逻辑信道和所述第二逻辑信道用于承载使用所述第一安全参数进行所述第一安全处理的所述第一承载上的数据,所述第三逻辑信道和所述第四逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据。
  16. 根据权利要求10-15任一项所述的方法,其特征在于,所述对所述第一承载上的下行数据进行第一安全处理,包括:
    使用所述第一安全参数对所述下行数据进行所述第一安全处理。
  17. 根据权利要求10-16任一项所述的方法,其特征在于,所述第一消息还包括逻辑信道的信息,所述逻辑信道的信息包括逻辑信道的标识,所述逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据。
  18. 一种数据传输方法,其特征在于,所述方法包括:
    接收第二消息,其中,所述第二消息用于指示第一承载的安全参数变更完成,所述第一承载为数据无线承载;
    对所述第一承载上的下行数据进行第一安全处理,得到第二下行数据,所述第一安全处理包括对数据无线承载上的数据进行加密处理;
    发送所述第二下行数据,其中,所述第二下行数据包括第二安全参数指示,所述第二安全参数指示用于指示所述第二下行数据的所述第一安全处理所使用的安全参数。
  19. 根据权利要求18所述的方法,其特征在于,所述方法还包括:
    接收所述第一承载上的上行数据,其中,所述上行数据经过所述第一安全处理,所述上行数据包括第一安全参数指示,所述第一安全参数指示用于指示所述上行数据的所述第一安全处理所使用的安全参数;
    根据所述上行数据中的所述第一安全参数指示选择安全参数,对所述上行数据进行第二安全处理,所述第二安全处理包括对数据无线承载上的数据进行解密处理。
  20. 根据权利要求19所述的方法,其特征在于,所述第一安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第一安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  21. 根据权利要求19或20所述的方法,其特征在于,所述根据所述上行数据中的所述第一安全参数指示选择安全参数,对所述上行数据进行第二安全处理,包括:
    当所述上行数据中的所述第一安全参数指示指示的是所述第二安全参数时,使用所述第二安全参数对所述上行数据进行所述第二安全处理。
  22. 根据权利要求18-21任一项所述的方法,其特征在于,所述第二安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第二安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  23. 根据权利要求20或22所述的方法,其特征在于,所述不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数,包括:
    第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应所述第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应所述第二安全参数,所述第一逻辑信道和所述第二逻辑信道用于承载使用所述第一安全参数进行所述第一安全处理的所述第一承载上的数据,所述第三逻辑信道和所述第四逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据。
  24. 根据权利要求18-23任一项所述的方法,其特征在于,所述对所述第一承载上的下行数据进行第一安全处理,包括:
    使用所述第二安全参数对所述下行数据进行所述第一安全处理。
  25. 一种数据传输方法,其特征在于,所述方法包括:
    发送第一消息,其中,所述第一消息用于触发第一承载的安全参数变更,所述第一承载为信令无线承载或数据无线承载,所述安全参数包括密钥和/或安全算法,所述安全参数变更将所述第一承载的安全参数从第一安全参数变更为第二安全参数;
    接收第二消息,其中,所述第二消息用于指示第一承载的安全参数变更完成;
    对所述第一承载上的下行数据进行第一安全处理,得到第二下行数据,所述第一安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种;
    发送所述第二下行数据,其中,所述第二下行数据包括第二安全参数指示,所述第二安全参数指示用于指示所述第二下行数据的所述第一安全处理所使用的安全参数。
  26. 根据权利要求25所述的方法,其特征在于,所述方法还包括:
    接收所述第一承载上的上行数据,其中,所述上行数据经过所述第一安全处理,所述上行数据包括第一安全参数指示,所述第一安全参数指示用于指示所述上行数据的所述第一安全处理所使用的安全参数;
    根据所述上行数据中的所述第一安全参数指示选择安全参数,对所述上行数据进行第二安全处理,所述第二安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。
  27. 根据权利要求26所述的方法,其特征在于,所述第一安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第一安全参数指示为一个比特位,所述比特位的值的变化指示所 述安全参数从所述第一安全参数变更为所述第二安全参数。
  28. 根据权利要求26或27所述的方法,其特征在于,所述根据所述上行数据中的所述第一安全参数指示选择安全参数,对所述上行数据进行第二安全处理,包括:
    当所述上行数据中的所述第一安全参数指示指示的是所述第一安全参数时,使用所述第一安全参数对所述上行数据进行所述第二安全处理;
    当所述上行数据中的所述第一安全参数指示指示的是所述第二安全参数时,使用所述第二安全参数对所述上行数据进行所述第二安全处理。
  29. 根据权利要求25-28任一项所述的方法,其特征在于,所述第二安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第二安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  30. 根据权利要求27或29所述的方法,其特征在于,所述不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数,包括:
    第五逻辑信道的逻辑信道标识对应所述第一安全参数,第六逻辑信道的逻辑信道标识对应所述第二安全参数,第五逻辑信道用于承载使用所述第一安全参数进行所述第一安全处理的所述第一承载上的数据,第六逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据。
  31. 根据权利要求25-30任一项所述的方法,其特征在于,所述对所述第一承载上的下行数据进行第一安全处理,包括:
    在发送所述第一消息之后或者在接收到所述第二消息之后,使用所述第二安全参数对所述下行数据进行所述第一安全处理;
    在发送所述第一消息之前或者在接收到所述第二消息之前,使用所述第一安全参数对所述下行数据进行所述第一安全处理。
  32. 根据权利要求25-31任一项所述的方法,其特征在于,所述第一消息还包括逻辑信道的信息,所述逻辑信道的信息包括逻辑信道的标识,所述逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据。
  33. 一种用户设备UE,其特征在于,包括:
    接收器,用于接收第一消息,其中,所述第一消息用于触发第一承载的安全参数变更,所述第一承载为信令无线承载或数据无线承载,所述安全参数包括密钥和/或安全算法,所述安全参数变更将所述第一承载的安全参数从第一安全参数变更为第二安全参数;
    发送器,发送第二消息,其中,所述第二消息用于指示所述第一承载的安全参数变更完成;
    处理器,用于对所述第一承载上的上行数据进行第一安全处理,得到第二上行数据,所述第一安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种;
    所述发送器还用于发送所述第二上行数据,其中,所述第二上行数据包括第一安全参数指示,所述第一安全参数指示用于指示所述第二上行数据的所述第一安全处理所使用的安全参数。
  34. 根据权利要求33所述的UE,其特征在于,
    所述接收器还用于接收所述第一承载上的下行数据,其中,所述下行数据经过所述第一安全处理,所述下行数据包括第二安全参数指示,所述第二安全参数指示用于指示所述下行数据的所述第一安全处理所使用的安全参数;
    所述处理器还用于根据所述下行数据中的所述第二安全参数指示选择安全参数,对所述下行数据进行第二安全处理,所述第二安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据 进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。
  35. 根据权利要求34所述的UE,其特征在于,所述第二安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第二安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  36. 根据权利要求34或35所述的UE,其特征在于,所述处理器还用于:
    当所述下行数据中的所述第二安全参数指示指示的是所述第一安全参数时,使用所述第一安全参数对所述下行数据进行所述第二安全处理;
    当所述下行数据中的所述第二安全参数指示指示的是所述第二安全参数时,使用所述第二安全参数对所述下行数据进行所述第二安全处理。
  37. 根据权利要求33-36任一项所述的UE,其特征在于,所述第一安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第一安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  38. 根据权利要求35或37所述的UE,其特征在于,所述不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数,包括:
    第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应所述第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应所述第二安全参数,所述第一逻辑信道和所述第二逻辑信道用于承载使用所述第一安全参数进行所述第一安全处理的所述第一承载上的数据,所述第三逻辑信道和所述第四逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据;或者,
    第五逻辑信道的逻辑信道标识对应所述第一安全参数,第六逻辑信道 的逻辑信道标识对应所述第二安全参数,第五逻辑信道用于承载使用所述第一安全参数进行所述第一安全处理的所述第一承载上的数据,第六逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据。
  39. 根据权利要求33-38任一项所述的UE,其特征在于,所述处理器用于对所述第一承载上的上行数据进行第一安全处理,具体用于:
    在接收到所述第一消息之后或者在发送所述第二消息之后,使用所述第二安全参数对所述上行数据进行所述第一安全处理;
    在接收到所述第一消息之前或者在发送所述第二消息之前,使用所述第一安全参数对所述上行数据进行所述第一安全处理。
  40. 根据权利要求33-39任一项所述的UE,其特征在于,所述第一消息还包括逻辑信道的信息,所述逻辑信道的信息包括逻辑信道的标识,所述逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据。
  41. 根据权利要求33-40任一项所述的UE,其特征在于,
    所述第一消息来自基站,所述第二消息发送给所述基站;或者,
    所述第一消息来自源基站,所述第二消息发送给目标基站,所述源基站为源主小区所在的基站,所述目标基站为目标主小区所在的基站。
  42. 一种基站,其特征在于,所述基站包括:
    发送器,用于发送第一消息,其中,所述第一消息用于触发第一承载的安全参数变更,所述第一承载为数据无线承载,所述安全参数包括密钥和/或安全算法,所述安全参数变更将所述第一承载的安全参数从第一安全参数变更为第二安全参数;
    处理器,用于对所述第一承载上的下行数据进行第一安全处理,得到第二下行数据,所述第一安全处理包括对数据无线承载上的数据进行加密处理;
    所述发送器还用于发送所述第二下行数据,其中,所述第二下行数据包括第二安全参数指示,所述第二安全参数指示用于指示所述第二下行数据的所述第一安全处理所使用的安全参数。
  43. 根据权利要求42所述的基站,其特征在于,
    接收器用于接收所述第一承载上的上行数据,其中,所述上行数据经过所述第一安全处理,所述上行数据包括第一安全参数指示,所述第一安全参数指示用于指示所述上行数据的所述第一安全处理所使用的安全参数;
    所述处理器还用于根据所述上行数据中的所述第一安全参数指示选择安全参数,对所述上行数据进行第二安全处理,所述第二安全处理包括对数据无线承载上的数据进行解密处理。
  44. 根据权利要求43所述的基站,其特征在于,所述第一安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第一安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  45. 根据权利要求43或44所述的基站,其特征在于,所述处理器用于根据所述上行数据中的所述第一安全参数指示选择安全参数,对所述上行数据进行第二安全处理,具体用于:
    当所述上行数据中的所述第一安全参数指示指示的是所述第一安全参数时,使用所述第一安全参数对所述上行数据进行所述第二安全处理。
  46. 根据权利要求42-45任一项所述的基站,其特征在于,所述第二安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第二安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  47. 根据权利要求44或46所述的方法,其特征在于,所述不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数,包括:
    第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应所述第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应所述第二安全参数,所述第一逻辑信道和所述第二逻辑信道用于承载使用所述第一安全参数进行所述第一安全处理的所述第一承载上的数据,所述第三逻辑信道和所述第四逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据。
  48. 根据权利要求42-47任一项所述的基站,其特征在于,所述处理器用于对所述第一承载上的下行数据进行第一安全处理,具体用于:
    使用所述第一安全参数对所述下行数据进行所述第一安全处理。
  49. 根据权利要求42-48任一项所述的基站,其特征在于,所述第一消息还包括逻辑信道的信息,所述逻辑信道的信息包括逻辑信道的标识,所述逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据。
  50. 一种基站,其特征在于,所述基站包括:
    接收器,用于接收第二消息,其中,所述第二消息用于指示第一承载的安全参数变更完成,所述第一承载为数据无线承载;
    处理器,用于对所述第一承载上的下行数据进行第一安全处理,得到第二下行数据,所述第一安全处理包括对数据无线承载上的数据进行加密处理;
    发送器,用于发送所述第二下行数据,其中,所述第二下行数据包括第二安全参数指示,所述第二安全参数指示用于指示所述第二下行数据的所述第一安全处理所使用的安全参数。
  51. 根据权利要求50所述的基站,其特征在于,
    所述接收器还用于接收所述第一承载上的上行数据,其中,所述上行 数据经过所述第一安全处理,所述上行数据包括第一安全参数指示,所述第一安全参数指示用于指示所述上行数据的所述第一安全处理所使用的安全参数;
    所述处理器还用于根据所述上行数据中的所述第一安全参数指示选择安全参数,对所述上行数据进行第二安全处理,所述第二安全处理包括对数据无线承载上的数据进行解密处理。
  52. 根据权利要求51所述的基站,其特征在于,所述第一安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第一安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  53. 根据权利要求51或52所述的基站,其特征在于,所述处理器用于根据所述上行数据中的所述第一安全参数指示选择安全参数,对所述上行数据进行第二安全处理,具体用于:
    当所述上行数据中的所述第一安全参数指示指示的是所述第二安全参数时,使用所述第二安全参数对所述上行数据进行所述第二安全处理。
  54. 根据权利要求50-53任一项所述的基站,其特征在于,所述第二安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第二安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  55. 根据权利要求52或54所述的方法,其特征在于,所述不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数,包括:
    第一逻辑信道的逻辑信道标识和第二逻辑信道的逻辑信道标识对应所述第一安全参数,第三逻辑信道的逻辑信道标识和第四逻辑信道的逻辑信道标识对应所述第二安全参数,所述第一逻辑信道和所述第二逻辑信道用 于承载使用所述第一安全参数进行所述第一安全处理的所述第一承载上的数据,所述第三逻辑信道和所述第四逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据。
  56. 根据权利要求50-55任一项所述的基站,其特征在于,所述处理器用于对所述第一承载上的下行数据进行第一安全处理,具体用于:
    使用所述第二安全参数对所述下行数据进行所述第一安全处理。
  57. 一种基站,其特征在于,所述基站包括:
    发送器,用于发送第一消息,其中,所述第一消息用于触发第一承载的安全参数变更,所述第一承载为信令无线承载或数据无线承载,所述安全参数包括密钥和/或安全算法,所述安全参数变更将所述第一承载的安全参数从第一安全参数变更为第二安全参数;
    接收器,用于接收第二消息,其中,所述第二消息用于指示第一承载的安全参数变更完成;
    处理器,用于对所述第一承载上的下行数据进行第一安全处理,得到第二下行数据,所述第一安全处理包括:对信令无线承载上的数据进行完整性保护、对信令无线承载上的数据进行加密处理和对数据无线承载上的数据进行加密处理中的至少一种;
    所述发送器还用于发送所述第二下行数据,其中,所述第二下行数据包括第二安全参数指示,所述第二安全参数指示用于指示所述第二下行数据的所述第一安全处理所使用的安全参数。
  58. 根据权利要求57所述的基站,其特征在于,
    所述接收器还用于接收所述第一承载上的上行数据,其中,所述上行数据经过所述第一安全处理,所述上行数据包括第一安全参数指示,所述第一安全参数指示用于指示所述上行数据的所述第一安全处理所使用的安全参数;
    所述处理器还用于根据所述上行数据中的所述第一安全参数指示选择 安全参数,对所述上行数据进行第二安全处理,所述第二安全处理包括:对信令无线承载上的数据进行完整性保护检查、对信令无线承载上的数据进行解密处理和对数据无线承载上的数据进行解密处理中的至少一种。
  59. 根据权利要求58所述的基站,其特征在于,所述第一安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第一安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  60. 根据权利要求58或59所述的基站,其特征在于,所述处理器用于根据所述上行数据中的所述第一安全参数指示选择安全参数,对所述上行数据进行第二安全处理,具体用于:
    当所述上行数据中的所述第一安全参数指示指示的是所述第一安全参数时,使用所述第一安全参数对所述上行数据进行所述第二安全处理;
    当所述上行数据中的所述第一安全参数指示指示的是所述第二安全参数时,使用所述第二安全参数对所述上行数据进行所述第二安全处理。
  61. 根据权利要求57-60任一项所述的基站,其特征在于,所述第二安全参数指示为逻辑信道标识,不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数;或者,
    所述第二安全参数指示为一个比特位,所述比特位的值的变化指示所述安全参数从所述第一安全参数变更为所述第二安全参数。
  62. 根据权利要求59或61所述的方法,其特征在于,所述不同的逻辑信道标识分别对应所述第一安全参数和所述第二安全参数,包括:
    第五逻辑信道的逻辑信道标识对应所述第一安全参数,第六逻辑信道的逻辑信道标识对应所述第二安全参数,第五逻辑信道用于承载使用所述第一安全参数进行所述第一安全处理的所述第一承载上的数据,第六逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承 载上的数据。
  63. 根据权利要求57-62任一项所述的基站,其特征在于,所述处理器用于对所述第一承载上的下行数据进行第一安全处理,具体用于:
    在发送所述第一消息之后或者在接收到所述第二消息之后,使用所述第二安全参数对所述下行数据进行所述第一安全处理;
    在发送所述第一消息之前或者在接收到所述第二消息之前,使用所述第一安全参数对所述下行数据进行所述第一安全处理。
  64. 根据权利要求57-63任一项所述的基站,其特征在于,所述第一消息还包括逻辑信道的信息,所述逻辑信道的信息包括逻辑信道的标识,所述逻辑信道用于承载使用所述第二安全参数进行所述第一安全处理的所述第一承载上的数据。
PCT/CN2016/087121 2016-06-24 2016-06-24 数据传输的方法和装置 WO2017219365A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
PCT/CN2016/087121 WO2017219365A1 (zh) 2016-06-24 2016-06-24 数据传输的方法和装置
BR112018076420A BR112018076420A2 (pt) 2016-06-24 2016-06-24 método e aparelho de transmissão de dados
EP16905905.2A EP3457752B1 (en) 2016-06-24 2016-06-24 Data transmission methods and apparatuses
CN201680086644.4A CN109314899B (zh) 2016-06-24 2016-06-24 数据传输的方法和装置
US16/220,711 US11026091B2 (en) 2016-06-24 2018-12-14 Data transmission method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/087121 WO2017219365A1 (zh) 2016-06-24 2016-06-24 数据传输的方法和装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/220,711 Continuation US11026091B2 (en) 2016-06-24 2018-12-14 Data transmission method and apparatus

Publications (1)

Publication Number Publication Date
WO2017219365A1 true WO2017219365A1 (zh) 2017-12-28

Family

ID=60783735

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/087121 WO2017219365A1 (zh) 2016-06-24 2016-06-24 数据传输的方法和装置

Country Status (5)

Country Link
US (1) US11026091B2 (zh)
EP (1) EP3457752B1 (zh)
CN (1) CN109314899B (zh)
BR (1) BR112018076420A2 (zh)
WO (1) WO2017219365A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020089519A1 (en) * 2018-11-01 2020-05-07 Nokia Technologies Oy User plane handling to enable a near oms cell change
CN111866774A (zh) * 2018-03-15 2020-10-30 Oppo广东移动通信有限公司 处理数据的方法、接入网设备和核心网设备

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019219668A1 (en) * 2018-05-14 2019-11-21 Telefonaktiebolaget Lm Ericsson (Publ) To increase security of dual connectvity
WO2020243291A1 (en) * 2019-05-29 2020-12-03 Google Llc Sequence number transfer for radio bearers

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102378225A (zh) * 2010-08-23 2012-03-14 普天信息技术研究院有限公司 载波聚合中小区参数的配置方法
CN102378198A (zh) * 2010-08-13 2012-03-14 电信科学技术研究院 一种小区配置方法和装置
CN102378287A (zh) * 2010-08-11 2012-03-14 电信科学技术研究院 一种主小区更换的小区配置方法及装置

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2341059A (en) * 1998-08-28 2000-03-01 Nokia Oy Ab Internet protocol flow detection
FI20070094A0 (fi) * 2007-02-02 2007-02-02 Nokia Corp Radiopäällysverkon turvallisuusalgoritmin vaihtaminen handoverin aikana
CN101702818B (zh) * 2009-11-02 2012-12-12 上海华为技术有限公司 无线链路控制连接重建立中的算法协商方法、系统及设备
CN102833741B (zh) * 2011-06-13 2017-03-15 中兴通讯股份有限公司 一种安全参数修改方法及基站
EP3621334B1 (en) * 2012-07-24 2022-05-04 Huawei Technologies Co., Ltd. Counter check and reconfiguration method, apparatus, and system
CN103813308B (zh) * 2012-11-13 2017-11-10 电信科学技术研究院 一种上行数据传输方法、装置及系统
CN103888936B (zh) * 2012-12-21 2018-09-21 华为技术有限公司 小区优化方法及装置
EP3886397B1 (en) * 2014-03-21 2023-01-18 Sun Patent Trust Security key derivation in dual connectivity
JP2017514367A (ja) 2014-03-28 2017-06-01 富士通株式会社 ベアラ管理装置、方法及び通信システム
US20170150405A1 (en) * 2014-07-03 2017-05-25 Nokia Solutions And Networks Oy Method and apparatus
WO2016021822A1 (en) * 2014-08-07 2016-02-11 Lg Electronics Inc. Method for processing a packet data convergence protocol packet data unit at a user equipment in a dual connectivity systme and device therefor
WO2016021820A1 (en) * 2014-08-08 2016-02-11 Lg Electronics Inc. Method for processing a packet data convergence protocol re-ordering function at a user equipment in a dual connectivity system and device therefor

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102378287A (zh) * 2010-08-11 2012-03-14 电信科学技术研究院 一种主小区更换的小区配置方法及装置
CN102378198A (zh) * 2010-08-13 2012-03-14 电信科学技术研究院 一种小区配置方法和装置
CN102378225A (zh) * 2010-08-23 2012-03-14 普天信息技术研究院有限公司 载波聚合中小区参数的配置方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Requirements for Support of Radio Resource Management (Release 11", 3GPP TS 36. 133, 31 July 2014 (2014-07-31) *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111866774A (zh) * 2018-03-15 2020-10-30 Oppo广东移动通信有限公司 处理数据的方法、接入网设备和核心网设备
US20220038908A1 (en) * 2018-03-15 2022-02-03 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Data processing method, access network device, and core network device
CN111866774B (zh) * 2018-03-15 2022-03-04 Oppo广东移动通信有限公司 处理数据的方法、接入网设备和核心网设备
US11317291B2 (en) 2018-03-15 2022-04-26 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Data processing method, access network device, and core network device
US11722899B2 (en) 2018-03-15 2023-08-08 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Data processing method, access network device, and core network device
WO2020089519A1 (en) * 2018-11-01 2020-05-07 Nokia Technologies Oy User plane handling to enable a near oms cell change

Also Published As

Publication number Publication date
CN109314899B (zh) 2021-06-15
CN109314899A (zh) 2019-02-05
EP3457752B1 (en) 2022-08-24
BR112018076420A2 (pt) 2019-04-09
US20190124515A1 (en) 2019-04-25
EP3457752A4 (en) 2019-03-20
EP3457752A1 (en) 2019-03-20
US11026091B2 (en) 2021-06-01

Similar Documents

Publication Publication Date Title
US10492214B2 (en) Communication of security key information
US11438941B2 (en) Communication method and communications apparatus
CN108366369B (zh) 一种数据安全传输的方法及接入网、终端、核心网设备
WO2016119243A1 (zh) 通信方法、网络设备、用户设备和通信系统
CN108781376B (zh) 数据传输方法、用户设备及接入网设备
KR20110090812A (ko) 이동 통신 시스템에서 pdcp 기능을 선택적으로 적용하는 방법
CN108886726B (zh) 移动性管理的方法、装置和系统
US11895617B2 (en) Message identification method and apparatus
US11026091B2 (en) Data transmission method and apparatus
WO2017132962A1 (zh) 一种安全参数传输方法及相关设备
CN109327833B (zh) 一种通信方法及装置
WO2020088611A1 (zh) 一种重置mac层、数据传输方法及装置
US20220377541A1 (en) Key Management Method and Communication Apparatus
WO2021238813A1 (zh) 一种获取密钥的方法及装置
WO2022151086A1 (zh) 集成的接入和回传的通信方法以及装置
JP5869013B2 (ja) 移動局及び上りデータ送信方法
WO2021203353A1 (zh) 多播传输方法及相关装置
WO2024031345A1 (en) Srap control pdus for ue-to-ue relay
WO2024073105A1 (en) Managing data communication in a serving cell change scenario
KR20150110281A (ko) 복수의 캐리어들을 지원하는 이동 통신 시스템에서 신호 송/수신 방법 및 장치
KR102092739B1 (ko) 이동 통신 시스템에서 스몰 셀 기지국과 단말 사이의 보안을 효과적으로 설정하는 방법 및 장치
WO2024064399A1 (en) Managing radio link control protocol operation for a fast serving cell change
WO2024073748A1 (en) Managing communication failures in a user equipment
WO2024073036A1 (en) Managing pdcp operation in a serving cell change scenario
WO2024064398A1 (en) Managing serving cell changes in a radio access network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16905905

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2016905905

Country of ref document: EP

Effective date: 20181210

NENP Non-entry into the national phase

Ref country code: DE

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112018076420

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112018076420

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20181218