WO2018192513A1 - Communication method and device - Google Patents

Communication method and device Download PDF

Info

Publication number
WO2018192513A1
WO2018192513A1 PCT/CN2018/083474 CN2018083474W WO2018192513A1 WO 2018192513 A1 WO2018192513 A1 WO 2018192513A1 CN 2018083474 W CN2018083474 W CN 2018083474W WO 2018192513 A1 WO2018192513 A1 WO 2018192513A1
Authority
WO
WIPO (PCT)
Prior art keywords
encryption algorithm
terminal device
network device
network
sent
Prior art date
Application number
PCT/CN2018/083474
Other languages
French (fr)
Chinese (zh)
Inventor
李秉肇
熊新
王学龙
曹振臻
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2018192513A1 publication Critical patent/WO2018192513A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection

Definitions

  • the present application relates to the field of communications and, more particularly, to a communication method and apparatus.
  • the inactive state of the terminal device means that the terminal device disconnects the RRC connection with the Radio Access Network (RAN) device, but retains the state of the context information of the terminal device.
  • the uplink data may be sent to the new RAN device (which may also be referred to as the switched RAN device) based on the context of the previously reserved terminal device.
  • the encryption algorithm used by the terminal device to communicate with the new RAN device follows the encryption algorithm (referred to as the first encryption algorithm) used when the terminal device communicates with the previously-registered RAN device.
  • the new RAN device does not necessarily support the first encryption algorithm, and if it is not supported, the data transmitted by the terminal device cannot be decrypted.
  • the present application provides a communication method and device, which can effectively avoid the problem that a network device newly accessed by a terminal device in an inactive state cannot decrypt data transmitted by the terminal device.
  • the first aspect provides a communication method, the communication method includes: after the terminal device moves to a cell of the second network device, the terminal device determines a second encryption algorithm, where the second encryption algorithm is the second network device The supported encryption algorithm, the terminal device is in a state of saving the context information of the terminal device in the first network device, and has a cell reselection mobility, the first network device being different from the second network device; The terminal device sends data encrypted by using the second encryption algorithm to the second network device.
  • the state in which the terminal device is located may be referred to as an inactive state.
  • the terminal device is a terminal device that enters an inactive state.
  • the first network device may notify the terminal device to enter an inactive state by sending a Radio Resource Control (RRC) suspension message to the terminal device.
  • RRC Radio Resource Control
  • the inactive terminal device sends the encrypted data to the new network device (ie, the second network device), and the encrypted data is encrypted using the new network device. Algorithm encrypted. In this way, it can be ensured that the data sent by the terminal device to the new network device can be decrypted by the new network device. Therefore, the solution provided by the present application can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
  • the determining, by the terminal device, the second encryption algorithm includes: determining, by the terminal device, whether the second network device supports a first encryption algorithm,
  • the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device; when the second network device supports the first encryption algorithm, the terminal device determines the first encryption algorithm as The second encryption algorithm.
  • the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to use when communicating with the first network device.
  • the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to be used in the state (ie, an inactive state).
  • the first network device may send the first encryption algorithm to the terminal device before configuring the terminal device to enter the inactive state; or send the first encryption algorithm to the terminal device before configuring the terminal device to enter the inactive state .
  • the second encryption algorithm may be the same as or different from the first encryption algorithm. Specifically, when the second network device supports the first encryption algorithm, the second encryption algorithm may be directly the first encryption algorithm. When the second network device does not support the first encryption algorithm, the second encryption algorithm must be different from the first encryption algorithm.
  • the terminal device when the terminal device determines that the second network device does not support the first encryption algorithm, sends an RRC connection recovery request to the second network device, where the RRC connection is restored.
  • the request includes the identifier of the terminal device; the terminal device receives an RRC connection recovery response sent by the second network device, where the RRC connection recovery response includes an encryption algorithm used to indicate that the second network device supports The second indication information; the terminal device acquires the second encryption algorithm according to the second indication information.
  • the terminal device determines whether the second network device supports the encryption algorithm (ie, the first encryption algorithm) configured by the first network device for the terminal device, and further adopts the encryption algorithm supported by the second network device to the second
  • the network device transmits data, so that data transmitted by the terminal device can be guaranteed to be decrypted by the second network device. Therefore, the solution provided by the present application can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
  • the determining, by the terminal device, whether the second network device supports the first encryption algorithm includes: the terminal device receiving the second network a system broadcast message sent by the device, where the system broadcast message includes first indication information for indicating an encryption algorithm supported or not supported by the second network device, and the terminal device determines, according to the first indication information, Whether the second network device supports the first encryption algorithm.
  • the second network device support may be acquired by using the first indication information.
  • the encryption algorithm or the encryption algorithm supported by the second network device is obtained by sending an RRC connection recovery request to the second network device.
  • the second network device enables the terminal device to determine whether the second network device supports the first network device as a terminal by sending a system broadcast message indicating the encryption algorithm supported by the second network device to the terminal device.
  • the encryption algorithm that is, the first encryption algorithm
  • the encryption algorithm configured by the device, and then the data is sent to the second network device by using an encryption algorithm supported by the second network device, so that the data sent by the terminal device can be ensured by the second network device. Decrypt. Therefore, the solution provided by the present application can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
  • the communication method further includes: receiving, by the terminal device, cell encryption algorithm information sent by the first network device, where the cell encryption algorithm information is used by The information about the encryption algorithm of each cell in the management area of the first network device; the terminal device determining whether the second network device supports the first encryption algorithm, including: when the second network device When the cell is in the management area, the terminal device determines, according to the cell encryption algorithm information, whether the second network device supports the first encryption algorithm.
  • the first network device may send the cell encryption algorithm information to the terminal device before or at the same time as configuring the terminal device to enter the inactive state.
  • the cell encryption algorithm information is used to indicate encryption algorithm related information of each cell in the management area of the first network device.
  • the information about the encryption algorithm of the cell may be any one or more of the following information: an encryption algorithm supported by the cell, an encryption algorithm not supported by the cell, a cell supporting the first encryption algorithm, and the cell does not support the first encryption algorithm, and the notification
  • the management area may be a paging area of the first network device or an access network location tracking area. When the terminal device moves in the management area, the first network device does not need to be notified, and when the management area is moved out Need to notify the first network device.
  • the first encryption algorithm is directly determined as the second encryption algorithm, that is, in the subsequent data transmission process, the data is directly encrypted by using the first encryption algorithm.
  • the second encryption algorithm may be configured to obtain a second encryption algorithm supported by the second network device by sending an RRC connection recovery request to the second network device, or may obtain the second according to the cell encryption algorithm information. Encryption Algorithm.
  • the encryption algorithm supported by the second network device may be obtained by: Sending an RRC connection recovery request to the second network device, where the RRC connection recovery request includes an identifier of the terminal device, and the terminal device receives an RRC connection recovery response sent by the second network device, where the RRC The connection recovery response includes second indication information for indicating an encryption algorithm supported by the second network device, and the terminal device acquires the second encryption algorithm according to the second indication information.
  • the terminal device can determine whether the second network device supports the encryption algorithm configured by the first network device for the terminal device by knowing the cell encryption algorithm information in the management area of the first network device.
  • the first encryption algorithm further transmits data to the second network device by using an encryption algorithm supported by the second network device, so that data transmitted by the terminal device can be decrypted by the second network device. Therefore, the solution provided by the present application can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
  • the terminal device determines a second encryption algorithm, including:
  • the terminal device Transmitting, by the terminal device, the first message to the second network device, where the first message includes an identifier of the terminal device, and first data encrypted by using a first encryption algorithm, where the first encryption algorithm is An encryption algorithm configured by the first network device for the terminal device; the terminal device receives an encryption algorithm update command sent by the second network device, where the encryption algorithm update command is used to indicate that the first encryption algorithm is updated And being the second encryption algorithm; the terminal device acquires the second encryption algorithm according to the encryption algorithm update command.
  • the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to use when communicating with the first network device.
  • the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to be used in the state (ie, an inactive state).
  • the first network device may send the first encryption algorithm to the terminal device before configuring the terminal device to enter the inactive state; or send the first encryption algorithm to the terminal device before configuring the terminal device to enter the inactive state .
  • the data that is sent by the terminal device to the second network device and that is encrypted by using the second encryption algorithm is the first data.
  • the communication method before the terminal device sends the first data that is encrypted by using the second encryption algorithm to the second network device, the communication method also includes:
  • the terminal device receives third indication information that is sent by the second network device, where the third indication information is used to indicate that data sent by using the first encryption algorithm is retransmitted.
  • the second network device when determining that the second network device does not support the encryption algorithm currently used by the terminal device, that is, the first encryption algorithm, the second network device notifies the terminal device to update the encryption algorithm to be supported by the second network device.
  • the second encryption algorithm can ensure that the data sent by the terminal device can be decrypted by the second network device. Therefore, the solution provided by the present application can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
  • a second aspect provides a communication method, where the second network device receives data encrypted by a terminal device and is encrypted by using a second encryption algorithm, where the second encryption algorithm is supported by the second network device.
  • An encryption algorithm the terminal device is in a state of saving context information of the terminal device in the first network device, and has a cell reselection mobility, where the first network device is different from the second network device;
  • the second network device decrypts the data sent by the terminal device based on the second encryption algorithm.
  • the inactive terminal device sends the encrypted data to the new network device (ie, the second network device), and the encrypted data is encrypted using the new network device. Algorithm encrypted. In this way, it can be ensured that the data sent by the terminal device to the new network device can be decrypted by the new network device. Therefore, the solution provided by the present application can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
  • the communication method before the second network device receives the data that is sent by the terminal device and is encrypted by using the second encryption algorithm, the communication method further includes: The second network device sends a system broadcast message to the terminal device, where the system broadcast message includes first indication information for indicating an encryption algorithm supported or not supported by the second network device.
  • the communication method before the second network device receives the data that is sent by the terminal device and is encrypted by using the second encryption algorithm, the communication method further includes: Receiving, by the second network device, an RRC connection recovery request sent by the terminal device, where the RRC connection recovery request includes an identifier of the terminal device, and the second network device sends an RRC connection recovery response to the terminal device, where The RRC connection recovery response includes second indication information for indicating an encryption algorithm supported by the second network device.
  • the communication method before the second network device receives the data that is sent by the terminal device and is encrypted by using the second encryption algorithm, the communication method further includes:
  • the first network device receives, by the second network device, the first message sent by the terminal device, where the first message includes an identifier of the terminal device, and first data encrypted by using a first encryption algorithm, where the first encryption algorithm is
  • the first network device is an encryption algorithm configured by the terminal device; the second network device requests context information of the terminal device from the first network device based on the identifier of the terminal device; The network device acquires the first encryption algorithm according to the context information; when the second network device does not support the first encryption algorithm, the second network device sends an encryption algorithm update command to the terminal device, The encryption algorithm update command is used to indicate that the first encryption algorithm is updated to the second encryption algorithm.
  • the data that is sent by the terminal device that is received by the second network device and that is encrypted by using the second encryption algorithm is the first data.
  • the communication method before the second network device receives the data that is sent by the terminal device and is encrypted by using the second encryption algorithm, the communication method further includes:
  • the second network device sends third indication information to the terminal device, where the third indication information is used to indicate that data sent by using the first encryption algorithm is retransmitted.
  • a third aspect provides a communication method, the method includes: receiving, by a terminal device, a notification message sent by a first network device, where the notification message includes an identifier of the terminal device; when the radio link is found to be failed, the terminal device Performing cell selection or cell reselection to determine a current serving cell; the terminal device sends a connection recovery request to the second network device corresponding to the current serving cell, where the connection recovery request carries the identifier of the terminal device.
  • the failure of the radio link refers to a communication link failure of the terminal device and the network device.
  • the current serving cell may be a coverage cell of the network device, or may be an overlay of other network devices.
  • the first network device allocates an identifier of the terminal device to the terminal device when establishing a connection with the terminal device.
  • the first network device allocates an identifier of the terminal device to the terminal device.
  • the identifier of the terminal device includes an identifier for identifying the terminal device and an identifier of a network device that is previously logged.
  • the terminal identifier is used by the terminal device to resume connection after the radio link fails, or the device identifier may also be used when the terminal device performs connection recovery in the deactivated state.
  • the identifier of the terminal device is configured in advance by the network device, so that when the terminal device finds that the wireless link fails, the connection recovery can be performed in time based on the identifier of the terminal device.
  • the notification message further includes key information.
  • the communication method further includes the terminal device generating integrity protection information using the key information, and transmitting the integrity protection information to the serving network device.
  • the integrity protection information may be calculated by combining the connection information of the key information with the terminal device.
  • the integrity protection information may be calculated by combining the key information with the identifier of the terminal device.
  • the network device configures the key and the identifier of the terminal device for the terminal device in advance, so that the terminal device can perform connection recovery in time and effectively when the wireless link fails.
  • a fourth aspect provides a terminal device, where the terminal device is configured to perform the communication method in the foregoing first aspect or any possible implementation manner of the first aspect.
  • the terminal device may comprise means for performing the communication method of the first aspect or any of the possible implementations of the first aspect.
  • a fifth aspect provides a terminal device, the terminal device comprising a memory and a processor, the memory for storing an instruction, the processor for executing the instruction stored by the memory, and the instruction stored in the memory Executing the method of causing the processor to perform the first aspect or any of the possible implementations of the first aspect.
  • a sixth aspect provides a computer readable storage medium having stored thereon a computer program, the program being executed by a processor to implement the method of the first aspect or any of the possible implementations of the first aspect.
  • the seventh aspect provides a network device, where the network device is configured to perform the communication method in any of the foregoing possible implementation manners of the second aspect or the second aspect.
  • the network device may comprise means for performing the communication method of the second aspect or any of the possible implementations of the second aspect.
  • An eighth aspect provides a network device, the network device including a memory and a processor, the memory for storing instructions for executing the memory stored instructions, and for instructions stored in the memory Executing the method of causing the processor to perform the second aspect or any of the possible implementations of the second aspect.
  • a ninth aspect provides a computer readable storage medium having stored thereon a computer program, the program being executed by a processor to implement the method of any of the possible implementations of the second aspect or the second aspect.
  • FIG. 1 is a schematic structural diagram of an embodiment of the present invention.
  • FIG. 2 is a schematic flowchart of a communication method according to an embodiment of the present invention.
  • FIG. 3 is another schematic flowchart of a communication method according to an embodiment of the present invention.
  • FIG. 4 is still another schematic flowchart of a communication method according to an embodiment of the present invention.
  • FIG. 5 is still another schematic flowchart of a communication method according to an embodiment of the present invention.
  • FIG. 6 is still another schematic flowchart of a communication method according to an embodiment of the present invention.
  • FIG. 7 is a schematic block diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 8 is another schematic block diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 9 is a schematic block diagram of a network device according to an embodiment of the present invention.
  • FIG. 10 is another schematic block diagram of a network device according to an embodiment of the present invention.
  • FIG. 11 is a schematic block diagram of a communication apparatus according to an embodiment of the present application.
  • FIG. 12 is another schematic block diagram of a communication apparatus according to an embodiment of the present application.
  • FIG. 13 is still another schematic block diagram of a communication apparatus according to an embodiment of the present application.
  • the technical solution of the embodiment of the present invention can be applied to a Long Term Evolution (LTE) architecture, and can also be applied to a Universal Mobile Telecommunications System (UMTS) terrestrial radio access network (UMTS Terrestrial Radio Access).
  • Network, UTRAN Universal Mobile Telecommunications System
  • UMTS Terrestrial Radio Access Universal Mobile Telecommunications System
  • GSM Global System for Mobile Communication
  • EDGE Enhanced Data Rate for GSM Evolution
  • GSM EDGE Radio Access Network GSM EDGE Radio Access Network, GERAN
  • the function of the MME is completed by Serving GPRS Support (SGSN), and the function of SGW ⁇ PGW is supported by the gateway GPRS support node (Gateway GPRS). Support Node, GGSN) is completed.
  • the technical solution of the embodiment of the present invention can also be applied to other communication systems, such as a Public Land Mobile Network (PLMN) system, or even a future 5G communication system or a communication system after 5G, etc. Not limited.
  • PLMN Public
  • Embodiments of the present invention relate to a terminal device.
  • the terminal device may be a device that includes a wireless transceiver function and can cooperate with the network device to provide a communication service for the user.
  • the terminal device may refer to a user equipment (User Equipment, UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, a wireless communication device, User agent or user device.
  • User Equipment User Equipment
  • the terminal device may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), with wireless
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • the network device may be a device for communicating with the terminal device, for example, may be a base station (Base Transceiver Station, BTS) in the GSM system or CDMA, or may be a base station (NodeB, NB) in the WCDMA system, or may be An evolved base station (Evolutional Node B, eNB or eNodeB) in an LTE system, or the network device may be a relay station, an access point, an in-vehicle device, a wearable device, and a network side device in a network after a 5G network or a 5G or Network devices and the like in a future evolved PLMN network.
  • BTS Base Transceiver Station
  • NodeB NodeB
  • NB base station
  • eNodeB evolved base station
  • the network device may be a relay station, an access point, an in-vehicle device, a wearable device, and a network side device in a network after a 5G network or a 5G or Network devices
  • the network device involved in the embodiment of the present invention may also be referred to as a Radio Access Network (RAN) device.
  • the RAN device is connected to the terminal device and is configured to receive data of the terminal device and send the data to the core network device.
  • the RAN device corresponds to different devices in different communication systems, for example, a corresponding base station and a base station controller in a 2G system, and a corresponding base station and a radio network controller (RNC) in a 3G system, correspondingly evolved in a 4G system.
  • An evolved Node B (eNB) corresponds to a 5G system in a 5G system, such as an access network device (eg, gNB, CU, DU) in a new Radio Access Technology (NR).
  • NR Radio Access Technology
  • Embodiments of the present invention also relate to a Core Network (CN) device.
  • the CN device corresponds to different devices in different communication systems, for example, a Serving GPRS Support Node (SGSN) or a Gateway GPRS Support Node (GGSN) in a 3G system, in a 4G system.
  • SGSN Serving GPRS Support Node
  • GGSN Gateway GPRS Support Node
  • MME Mobility Management Entity
  • S-GW Serving GateWay
  • the 5G system corresponds to the core network related equipment (for example, NG-Core) of the 5G system.
  • a Radio Resource Control (RRC) connection is established between the terminal device and the Radio Access Network (RAN) device.
  • RRC Radio Resource Control
  • RAN Radio Access Network
  • the terminal device In the idle state, there is no RRC connection between the terminal device and the RAN device, and the context information is no longer saved in the terminal device and the RAN device.
  • the terminal device releases its own context information when the terminal device is in an idle state, cell-based reselection can be performed.
  • the terminal device saves its own context information and can perform a cell-based reselection operation. Meanwhile, the connection information of the terminal device is saved in the anchor RAN device, and the connection information of the terminal device includes the context information of the terminal device and the core network. connection.
  • the terminal device saves the management area information configured by the anchor RAN device, and the terminal device needs to notify the anchor RAN device when moving the management area corresponding to the management area information.
  • the third state may also be referred to as an inactive state, a light connection state, a Suspend state, a deactivated state, a low overhead state, and the like.
  • the management area may also be called a paging area, an access network location tracking area, and the like.
  • the RRC connection between the terminal device and the RAN device may be restored by using a Resume message, and optionally, the data radio bearer for transmitting data between the terminal device and the RAN device may also be restored ( Data Radio Bearer, DRB).
  • DRB Data Radio Bearer
  • the S1 interface of the terminal device is anchored to a RAN device (which may be referred to as an anchor RAN device), and then cell reselection mobility may be performed in a predetermined area (eg, referred to as "RAN-based paging"
  • RAN-based paging There is no need to notify the anchor RAN device when moving within the zone, or "radio access zone", and once the RAN-based paging zone is out, the anchor RAN device needs to be notified of its location. This process is called RAN's paging area update (Paging Area Update).
  • the "inactive state” referred to in the embodiments of the present invention is only for describing such a state, and is not limited thereto.
  • inactive state anchor RAN device
  • radio access network area (or RAN-based paging area) update are only for convenience of description, and are not used to limit The scope of the embodiments of the present invention.
  • Context information after the RAN device establishes an RRC connection with the terminal device, the RAN device allocates context information to the terminal device, and the RAN device communicates with the terminal device based on the context information.
  • the context information includes identifier information of the terminal device, security context information of the terminal device, subscription information of the terminal device, configuration information of the radio bearer of the terminal device, logical channel information, and Network Slicing Info, and the current terminal is included in the Network Slicing Info.
  • the value of variables, counters, and/or timers, media access control MAC variables, counters and/or timer values, and/or physical layer PHY variables, counters, and/or timer values for example, COUNT of the PDCP packet, SN of the PDCP packet.
  • the identifier of the terminal device indicates that the identifier of the terminal device can be uniquely identified, and may be an identifier allocated by the RAN device for the terminal device, or may be an identifier assigned by the control plane device (CP Function) to the terminal device.
  • CP Function control plane device
  • FIG. 1 is a schematic structural diagram of a system according to an embodiment of the present invention.
  • the terminal device 110 initially establishes an RRC connection with the first network device 120, that is, the terminal device 110 enters a connected state.
  • the first network device 120 assigns context information to the terminal device 110.
  • the terminal device communicates with the first network device 120 based on the RRC connection, such as through the first network device 120.
  • the terminal device 110 disconnects the RRC connection with the first network device 120, but retains the context information of the terminal device 110 at the first network device 120 (ie, the context information that the first network device 120 allocates for the terminal device 110), that is, the terminal.
  • Device 110 enters an inactive state.
  • the terminal device 110 moves to the second network device 130.
  • the terminal device 110 performs communication transmission with the second network device 130 based on the previously retained context information, for example.
  • the core network 140 is accessed by the first network device 120.
  • FIG. 2 is a schematic flowchart of a communication method 200 according to an embodiment of the present invention.
  • the terminal device, the first network device, and the second network device described in FIG. 2 may correspond to the terminal device 110, the first network device 120, and the second network device 130 illustrated in FIG. 1, respectively.
  • the communication method 200 includes:
  • the terminal device determines a second encryption algorithm, where the second encryption algorithm is an encryption algorithm supported by the second network device, and the terminal device is in a context of saving the terminal device in the first network device.
  • Information, and having a state of cell reselection mobility, the first network device is different from the second network device.
  • the state in which the terminal device is located may be referred to as an inactive state.
  • the second encryption algorithm is an encryption algorithm supported by the second network device, and the second network device is capable of decrypting the data encrypted using the second encryption algorithm.
  • the terminal device sends, to the second network device, data encrypted by using the second encryption algorithm.
  • the encrypted data sent by the terminal device to the second network device is encrypted by using the second encryption algorithm.
  • the key may be a key used by the first network to be used by the terminal device. It should be understood that after the first network device configures the key for the terminal device, the key information is configured in the context information configured by the terminal device, that is, the context information of the terminal device under the first network device.
  • the second network device may acquire the key by requesting the context information from the first network device.
  • the terminal device when the terminal device sends the data encrypted by using the second encryption algorithm to the second network device, the identifier of the terminal device is also sent, and the identifier of the terminal device is used by the second network device to identify the received Which data comes from which device.
  • the identifier of the terminal device includes an identifier for identifying the terminal device. After receiving the identifier of the terminal device, the second network device can learn that the received data is from the terminal device.
  • the identifier of the terminal device may include an identifier for identifying the terminal device, and may further include an identifier for identifying the first network device.
  • the second network device can learn that the received data is from the terminal device, and can also know that the network device to which the terminal device belongs before is the first network device.
  • the identifier of the terminal device that is used to identify the terminal device may specifically be an identifier for identifying the terminal device in the first network device.
  • the identifier of the terminal device may be an identifier that is allocated by the first network device to the terminal device in the connected state.
  • the second network device decrypts data sent by the terminal device based on the second encryption algorithm.
  • the second network device decrypts the data by using a decryption algorithm corresponding to the encryption algorithm.
  • step 220 the data transmitted by the terminal is encrypted using a key and a second encryption algorithm.
  • the second network device may request the first network device for context information of the terminal device, thereby acquiring the key, and then decrypting the data sent by the terminal device based on the key and the corresponding decryption algorithm.
  • the inactive terminal device sends the encrypted data to the new network device (ie, the second network device), and the encrypted data is encrypted by using an encryption algorithm supported by the new network device. .
  • the new network device ie, the second network device
  • the encrypted data is encrypted by using an encryption algorithm supported by the new network device.
  • the terminal device in the embodiment of the present invention is a terminal device that is inactive.
  • the process of the terminal device entering the inactive state may be: the terminal device receives an RRC suspension message sent by the first network device, where the RRC suspension message is used to indicate that the terminal device enters an inactive state; and the terminal device receives the RRC After the message is suspended, the context information of the terminal device in the first network device is saved, and the device can be moved to other network devices, and the neighboring cell can be autonomously accessed.
  • the RRC suspension message may be an RRC release message, an RRC reconfiguration message or an RRC deactivation message.
  • the terminal device determines the second encryption algorithm, where the terminal device determines whether the second network device supports the first encryption algorithm, and the first encryption algorithm An encryption algorithm configured for the first network device as the terminal device; when the terminal device determines that the second network device supports the first encryption algorithm, determining the first encryption algorithm as the second encryption algorithm.
  • the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to use when communicating with the first network device.
  • the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to use in the state (ie, the inactive state).
  • the terminal device acquires the first encryption algorithm from the first network device.
  • the first network device may send the first encryption algorithm to the terminal device before configuring the terminal device to enter the inactive state; or send the first encryption algorithm to the terminal device while configuring the terminal device to enter the inactive state.
  • the first network device may carry the information of the first encryption algorithm in the RRC suspend message for configuring the terminal device to enter the inactive state; or may send the information to the terminal device before sending the RRC suspension message to the terminal device.
  • the information of the first encryption algorithm refers to the indication information used to indicate the first encryption algorithm, and the indication information is, for example, a number or identifier of the first encryption algorithm.
  • the system pre-defines a plurality of encryption algorithms, and assigns a unique number to each encryption algorithm. In the subsequent communication process, the number of the encryption algorithm may be used to represent the corresponding encryption algorithm.
  • the second encryption algorithm may be the same as or different from the first encryption algorithm. Specifically, when the second network device supports the first encryption algorithm, the second encryption algorithm may be directly the first encryption algorithm. When the second network device does not support the first encryption algorithm, the second encryption algorithm must be different from the first encryption algorithm.
  • the first encryption algorithm is used to indicate that the network device (that is, the first network device) that the terminal device belongs to is configured with an encryption algorithm for the terminal device, and is only used for describing the second encryption algorithm supported by the second network device.
  • the scope of protection of the embodiments of the present invention is not limited.
  • the terminal device determines that the second network device supports the first encryption algorithm, determining the first encryption algorithm as the second encryption algorithm. That is, in step 220, the terminal device directly encrypts the data to be transmitted to the second network device using the first encryption algorithm.
  • the second encryption algorithm may be obtained by: sending an RRC connection recovery request to the second network device, where the RRC connection recovery request is The RRC connection recovery response is sent to the terminal device, where the second network device includes an RRC connection recovery request, and the RRC connection recovery response includes an encryption algorithm used to indicate that the second network device supports The second indication information; the terminal device acquires the second encryption algorithm according to the second indication information.
  • the second indication information may be, for example, a number or identifier of an encryption algorithm supported by the second network device.
  • the terminal device can learn, according to the second indication information, which encryption algorithm is supported by the encryption algorithm supported by the second network device.
  • the terminal device determines an encryption algorithm supported by the second network device by determining whether the second network device supports an encryption algorithm configured by the first network device to which the terminal device belongs before, that is, the first encryption algorithm. Therefore, the encrypted data can be sent to the second network device based on an encryption algorithm supported by the second network device, so that data sent by the terminal device can be decrypted by the second network device. Therefore, the solution provided by the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
  • the terminal device can determine whether the second network device supports the first encryption algorithm in a plurality of different manners.
  • the terminal device determines whether the second network device supports the first encryption algorithm, and the method includes: receiving, by the terminal device, a system broadcast message sent by the second network device, where the system broadcasts a message
  • the first indication information is used to indicate an encryption algorithm supported or not supported by the second network device.
  • the terminal device determines, according to the first indication information, whether the second network device supports the first encryption algorithm.
  • the second network device sends a system broadcast message to the device in the cell, where the system broadcast message includes first indication information for indicating an encryption algorithm supported or not supported by the second network device, and is in an inactive state.
  • the terminal device moves to the cell of the second network device, it receives the system broadcast message of the second network device, and then, based on the first indication information, can learn which type or encryption algorithms the second network device supports. Or which one or more encryption algorithms are not supported, and then it can be known whether the second network device supports the first encryption algorithm.
  • the first indication information may be a number of an encryption algorithm supported by the second network device.
  • the system pre-defines 10 encryption algorithms, and the number of these 10 encryption algorithms is defined as 1-10. For example, if the first indication information is 1, 5, 7, the encryption algorithm supported by the second network device is an encryption algorithm numbered 1, 5, and 7. If the number of the first encryption algorithm is 1, it is known that the second network device supports the first encryption algorithm. If the number of the first encryption algorithm is 9, it is known that the second network device does not support the first encryption algorithm.
  • the second network device when it is determined that the second network device supports the first encryption algorithm according to the first indication information in the system broadcast message, directly using the first encryption algorithm to send to the second network device.
  • the data is encrypted.
  • the second network device support may be acquired by using the first indication information.
  • the encryption algorithm or the encryption algorithm supported by the second network device is obtained by sending an RRC connection recovery request to the second network device.
  • the encryption algorithm indicated by the first indication information may be directly determined as the second encryption algorithm.
  • the terminal device may be sent to the network device to learn the encryption algorithm currently used by the second network device.
  • the terminal device sends an RRC connection recovery request to the second network device, where the RRC connection recovery request includes an identifier of the terminal device; after receiving the RRC connection recovery request, the second network device sends an RRC connection to the terminal device.
  • the RRC connection recovery response includes second indication information for indicating an encryption algorithm currently used by the second network device, and the terminal device acquires the second encryption algorithm according to the second indication information.
  • the terminal device may select one of the multiple encryption algorithms to encrypt and determine the second encryption algorithm, and send the data encrypted by using the second encryption algorithm to the second network device.
  • the indication information of the second encryption algorithm may be determined, according to the indication information of the second encryption algorithm, an encryption algorithm used to decrypt data sent by the terminal device.
  • FIG. 3 is a schematic flowchart of a communication method 300 according to an embodiment of the present invention.
  • the communication method 300 includes:
  • the first network device sends an RRC suspension message to the terminal device.
  • the terminal device before receiving the RRC suspension message, the terminal device has obtained the first encryption algorithm from the first network device.
  • the RRC suspend message carries information indicating the first encryption algorithm, and the terminal device learns the first encryption algorithm by using the RRC suspend message.
  • the RRC suspension message may be an RRC release message, an RRC deactivation message, or an RRC reconfiguration message.
  • the RRC suspension message may further include an identifier of the terminal device configured by the first network device for the terminal device.
  • the RRC suspension message may further include a paging area configured by the first network device for the terminal device, and the terminal device does not need to notify the first network device when moving in the paging area.
  • This paging area can also be referred to as a management area.
  • the terminal device After receiving the RRC suspension message, the terminal device enters an inactive state.
  • the terminal device After the terminal device (the terminal device in the inactive state) moves to the cell of the second network device, receive a system broadcast message of the second network device, where the system broadcast message includes an encryption algorithm used to indicate that the second network device supports the encryption algorithm. Instructions.
  • the terminal device determines, according to the system broadcast message, whether the second network device supports the first encryption algorithm. If yes, go to step 305, and if no, go to step 306.
  • the terminal device sends the data encrypted by using the first encryption algorithm to the second network device.
  • the terminal device sends an RRC connection recovery request to the second network device, where the RRC connection recovery request includes an identifier of the terminal device.
  • the second network device After receiving the RRC connection recovery request, the second network device sends an RRC connection recovery response to the terminal device, where the RRC connection recovery response includes information indicating an encryption algorithm supported by the second network device.
  • the terminal device After receiving the RRC connection recovery response, the terminal device determines the second encryption algorithm.
  • the terminal device sends data encrypted by using a second encryption algorithm to the second network device.
  • the system broadcast message of the second network device further includes information indicating an encryption algorithm currently used by the second network device.
  • the second device may use the information in the system broadcast message to indicate the encryption algorithm currently used by the second network device.
  • the encryption algorithm currently used by the network device is determined as the second encryption algorithm.
  • the second network device sends a system broadcast message indicating the encryption algorithm supported by the second network device to the terminal device, so that the terminal device can determine whether the second network device supports the first network device as the terminal device.
  • the configured encryption algorithm ie, the first encryption algorithm
  • the configured encryption algorithm further transmits data to the second network device by using an encryption algorithm supported by the second network device, so that data transmitted by the terminal device can be decrypted by the second network device. Therefore, the solution provided by the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
  • the communications method 200 further includes: receiving, by the terminal device, cell encryption algorithm information sent by the first network device, where the cell encryption algorithm information is used to indicate the first network device The information about the encryption algorithm of each cell in the management area; the terminal device determines whether the second network device supports the first encryption algorithm, and includes: when determining that the cell of the second network device that is currently in the home zone is in the management area, The terminal device determines, according to the cell encryption algorithm information, whether the second network device supports the first encryption algorithm.
  • the terminal device receives the cell encryption algorithm information sent by the first network device before or at the same time as entering the inactive state.
  • the cell encryption algorithm information is used to indicate encryption algorithm related information of each cell in the management area of the first network device.
  • the information about the encryption algorithm of the cell may be any one or more of the following information: an encryption algorithm supported by the cell, an encryption algorithm not supported by the cell, a cell supporting the first encryption algorithm, and the cell does not support the first encryption algorithm, and the notification The encryption algorithm used by the terminal device after entering the cell.
  • the management area may be a paging area of the first network device or an access network location tracking area, and the terminal device does not need to notify the first network device when moving in the management area, and needs to notify the mobile device when moving out of the management area.
  • a network device may be a paging area of the first network device or an access network location tracking area, and the terminal device does not need to notify the first network device when moving in the management area, and needs to notify the mobile device when moving out of the management area.
  • the cell of the second network device to which the terminal device belongs is located in the management area, and according to the cell encryption algorithm information, determining that the second network device supports the first encryption algorithm
  • the first encryption algorithm is directly determined as the second encryption algorithm, that is, in the subsequent data transmission process, the data is directly encrypted using the first encryption algorithm.
  • the second encryption algorithm supported by the second network device may be obtained by sending an RRC connection recovery request to the second network device; or the second encryption algorithm may be obtained according to the cell encryption algorithm information.
  • the terminal device sends an RRC connection recovery request to the second network device, where the RRC connection recovery request includes an identifier of the terminal device, and the terminal device receives an RRC connection recovery response sent by the second network device, where the RRC connection resumes response.
  • the second indication information is used to indicate an encryption algorithm supported by the second network device; the terminal device acquires the second encryption algorithm according to the second indication information.
  • the terminal device learns an encryption algorithm supported by a cell of the second network device that belongs to the current cell based on the cell encryption algorithm information, and then selects an encryption algorithm as the second encryption algorithm.
  • the information of the second encryption algorithm for example, the number of the second encryption algorithm, may be sent to the second network device while the data encrypted by using the second encryption algorithm is sent to the second network device.
  • the encryption algorithm supported by the second network device may be obtained by: The second network device sends an RRC connection recovery request, where the RRC connection recovery request includes an identifier of the terminal device, and the terminal device receives an RRC connection recovery response sent by the second network device, where the RRC connection recovery response includes The second indication information of the encryption algorithm supported by the network device; the terminal device acquires the second encryption algorithm according to the second indication information.
  • FIG. 4 is a schematic flowchart of a communication method 400 according to an embodiment of the present invention.
  • the communication method 400 includes:
  • the first network device sends an RRC suspension message to the terminal device, where the RRC suspension message is used to indicate that the terminal device enters an inactive state, where the RRC suspension message further includes cell encryption algorithm information, where the cell encryption algorithm information is used. Encryption algorithm related information indicating each cell in the management area of the first network device.
  • the encryption algorithm related information may be any one or more of the following information: an encryption algorithm supported by the cell, an encryption algorithm not supported by the cell, a cell supporting the first encryption algorithm, and the cell does not support the first encryption algorithm, and the notification The encryption algorithm used by the terminal device after entering the cell.
  • the first network device may also send the cell encryption algorithm information to the terminal device before sending the RRC suspension message.
  • the terminal device before receiving the RRC suspension message, the terminal device has obtained the first encryption algorithm from the first network device.
  • the RRC suspend message carries information indicating the first encryption algorithm, and the terminal device learns the first encryption algorithm by using the RRC suspend message.
  • the RRC suspension message may further include an identifier of the terminal device configured by the first network device for the terminal device.
  • the RRC suspension message may further include a paging area (ie, the management area) configured by the first network device for the terminal device, and the terminal device does not need to notify the first network device when moving in the paging area.
  • a paging area ie, the management area
  • the RRC suspension message may be an RRC release message, an RRC deactivation message, or an RRC reconfiguration message.
  • the terminal device After receiving the RRC suspension message, the terminal device enters an inactive state.
  • the terminal device determines, according to the cell encryption algorithm information, whether the second network device supports the first encryption algorithm. If yes, go to step 405, and if no, go to step 406.
  • the terminal device sends the data encrypted by using the first encryption algorithm to the second network device.
  • the terminal device sends an RRC connection recovery request to the second network device, where the RRC connection recovery request includes an identifier of the terminal device.
  • the second network device After receiving the RRC connection recovery request, the second network device sends an RRC connection recovery response to the terminal device, where the RRC connection recovery response includes an encryption algorithm used to indicate that the second network device supports.
  • the terminal device After receiving the RRC connection recovery response, the terminal device determines the second encryption algorithm.
  • the terminal device sends data encrypted by using a second encryption algorithm to the second network device.
  • the second encryption algorithm may be determined based on the cell encryption algorithm information. Specifically, the encryption algorithm supported by the cell of the second network device that belongs to the current network is obtained by using the encryption algorithm related information of each cell included in the cell encryption algorithm information, and then an encryption algorithm is selected as the second encryption algorithm. .
  • the information of the second encryption algorithm may be sent to the second network device, for example, the second encryption, while the data encrypted by using the second encryption algorithm is sent to the second network device. The number of the algorithm.
  • the terminal device is configured to determine whether the second network device supports the encryption algorithm configured by the first network device for the terminal device by using the cell encryption algorithm information in the management area of the first network device.
  • An encryption algorithm is further configured to send data to the second network device by using an encryption algorithm supported by the second network device, so that data transmitted by the terminal device can be decrypted by the second network device. Therefore, the solution provided by the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
  • the terminal device determines whether the second network device supports the encryption algorithm currently used by the terminal device (ie, the first encryption algorithm), and then acquires the second network device by using corresponding means according to the determination result.
  • Supported encryption algorithms The embodiment of the present invention is not limited thereto, and the second network device may further determine whether the second network device supports the first encryption algorithm currently used by the terminal device.
  • the terminal device determines, according to another embodiment, the second encryption algorithm, that the terminal device sends the first message to the second network device, where the first message includes the An identifier of the terminal device, and the first data encrypted by using the first encryption algorithm, where the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device; and the second network device receives the first message sent by the terminal device And requesting, by the first network device, context information of the terminal device according to the identifier of the terminal device; the second network device acquiring the first encryption algorithm according to the context information; and when the second network device determines the second When the network device does not support the first encryption algorithm, sending an encryption algorithm update command to the terminal device, where the encryption algorithm update command is used to indicate that the first encryption algorithm is updated to the second encryption algorithm; and the terminal device is configured according to the encryption algorithm. Update the command to obtain the second encryption algorithm.
  • the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to use when communicating with the first network device.
  • the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to use in the state (ie, the inactive state).
  • the terminal device acquires the first encryption algorithm from the first network device.
  • the first network device may send the first encryption algorithm to the terminal device before configuring the terminal device to enter the inactive state; or send the first encryption algorithm to the terminal device while configuring the terminal device to enter the inactive state.
  • the first network device may carry the information of the first encryption algorithm in the RRC suspend message for configuring the terminal device to enter the inactive state; or may send the information to the terminal device before sending the RRC suspension message to the terminal device.
  • the information of the first encryption algorithm refers to the indication information used to indicate the first encryption algorithm, and the indication information is, for example, a number or identifier of the first encryption algorithm.
  • the system pre-defines a plurality of encryption algorithms, and assigns a unique number to each encryption algorithm. In the subsequent communication process, the number of the encryption algorithm may be used to represent the corresponding encryption algorithm.
  • the network device After receiving the encrypted data sent by the terminal device, the network device requests the first network device according to the identifier of the terminal device, and then obtains the first encryption algorithm based on the context information, if the second network device If the first encryption algorithm is not supported, the encryption algorithm update command is sent to the terminal device, where the encryption algorithm update command is used to indicate that the first encryption algorithm is updated to the second encryption algorithm, and the second encryption algorithm may be the second network. An encryption algorithm currently used by the device; the terminal device obtains the second encryption algorithm according to the encryption algorithm update command.
  • the decryption algorithm corresponding to the first encryption algorithm may be directly used to decrypt the data sent by the terminal device, and the encryption algorithm update is not sent. Ordered.
  • the first data encrypted by using the first encryption algorithm may be retransmitted to the second network device, that is, in step 220.
  • the terminal device sends the data encrypted by using the second encryption algorithm to the second network device as the first data.
  • the second network device may further send, to the terminal device, third indication information, which is used to indicate that the first The data sent by an encryption algorithm is retransmitted; the terminal device retransmits the first data encrypted by the first encryption algorithm to the second network device according to the third indication information.
  • third indication information which is used to indicate that the first The data sent by an encryption algorithm is retransmitted; the terminal device retransmits the first data encrypted by the first encryption algorithm to the second network device according to the third indication information.
  • FIG. 5 is a schematic flowchart of a communication method 500 according to an embodiment of the present invention.
  • the communication method 500 includes:
  • the first network device sends an RRC suspension message to the terminal device.
  • Step 501 is the same as step 301.
  • Step 501 is the same as step 301.
  • details refer to the above, and details are not described herein again.
  • the terminal device After receiving the RRC suspension message, the terminal device enters an inactive state.
  • the terminal device After the terminal device (the terminal device in the inactive state) moves to the cell of the second network device, when the data needs to be sent, the first message is sent to the second network device, where the first message includes the identifier of the terminal device, and the first The first data encrypted by an encryption algorithm.
  • the second network device After receiving the first message, the second network device sends the identifier of the terminal device to the first network device, to request context information of the terminal device.
  • the first network device After receiving the identifier of the terminal device, the first network device sends the context information of the terminal device to the second network device.
  • the second network device acquires the first encryption algorithm according to the context information of the terminal device, and determines whether the first encryption algorithm is supported. If yes, go to step 507, and if no, go to step 509.
  • the second network device sends an encryption algorithm update command to the terminal device, where the encryption algorithm update command is used to indicate that the first encryption algorithm is updated to the second encryption algorithm.
  • the terminal device sends, according to the encryption algorithm update command, the data encrypted by using the second encryption algorithm to the second network device.
  • the terminal device uses the second encryption algorithm to retransmit the data encrypted by the first encryption algorithm to the second network device, for example, the first data sent in step 503.
  • the second network device sends data to the terminal device for indicating transmission using the first encryption algorithm before retransmission.
  • the second network device decrypts the first data sent by the terminal device by using a decryption algorithm corresponding to the first encryption algorithm.
  • the second network device when determining that the second network device does not support the encryption algorithm currently used by the terminal device, that is, the first encryption algorithm, the second network device notifies the terminal device to update the encryption algorithm to the second network device.
  • the second encryption algorithm ensures that the data sent by the terminal device can be decrypted by the second network device. Therefore, the solution provided by the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
  • the inactive terminal device sends the encrypted data to the new network device (ie, the second network device), and the encrypted data is supported by using the new network device.
  • the encryption algorithm is encrypted. In this way, it can be ensured that the data transmitted by the terminal device to the new network device can be decrypted by the new network device. Therefore, the solution provided by the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
  • the embodiment of the present invention further provides a communication method 600, where the communication method 600 includes:
  • the first network device sends a notification message to the terminal device, where the notification message includes an identifier of the terminal device.
  • the first network device allocates the identifier of the terminal device to the terminal device when establishing a connection with the terminal device.
  • the first network device allocates an identifier of the terminal device to the terminal device, and may notify the terminal device of the identifier of the terminal device by using an RRC connection setup message. That is, the notification message is an RRC connection setup message.
  • the first network device allocates the identifier of the terminal device to the terminal device.
  • the first network device allocates the identifier of the terminal device to the terminal device, and notifies the terminal device of the identifier of the terminal device by using a handover command. That is, the notification message is a handover command.
  • the identifier of the terminal device includes an identifier for identifying the terminal device and an identifier of the network device that is previously belonged.
  • the terminal identifier is used by the terminal device to resume connection after the radio link fails, or the device identifier can also be used when the terminal device performs connection recovery in the deactivated state.
  • the identifier of the terminal device that is allocated by the first network device to the terminal device includes an identifier for identifying the terminal device, and an identifier for identifying the first network device.
  • the identifier for identifying the terminal device may specifically be an identifier for identifying the terminal device within the first network device.
  • the terminal device acquires an identifier of the terminal device according to the notification message sent by the network device.
  • the terminal device finds that the radio link fails, perform cell selection or cell reselection to determine the current serving cell.
  • the failure of the radio link refers to that the communication link between the terminal device and the network device is faulty.
  • the specific triggering cause includes any one or more of the following reasons:
  • the quality of the communication link between the terminal device and the network device does not meet the threshold, or
  • the terminal device fails to decrypt the data or the integrity check fails, or
  • the Radio Link Control (RLC) entity of the terminal device generates a fault.
  • the current serving cell may be a coverage cell of the network device, or may be an overlay of other network devices.
  • the terminal device sends a connection recovery request to the second network device corresponding to the current serving cell, where the connection recovery request carries the identifier of the terminal device.
  • the second network device in the embodiment of the present invention may be the same as the first network device, and may be different.
  • the second network device may learn, according to the terminal identifier, that the network device that the terminal belongs to is the first network device, and requests the first network device for the context information of the terminal device; the first network device sends the network device to the second network device. Context information of the terminal device; the second network device restores the connection for the terminal device according to the context information of the terminal device.
  • connection recovery message further carries the reason for the connection recovery, for example, the radio link fails.
  • the identifier of the terminal device is configured in advance by the network device, so that when the terminal device finds that the wireless link fails, the connection recovery may be performed in time based on the identifier of the terminal device.
  • the notification message further includes key information.
  • the communication method 600 further includes the terminal device generating the integrity protection information using the key information and transmitting the integrity protection information to the serving network device.
  • connection recovery information of the key information and the terminal device may be combined to calculate the integrity protection information.
  • the integrity protection information may be calculated by combining the key information with the identifier of the terminal device.
  • the network device configures the key and the identifier of the terminal device for the terminal device in advance, so that the terminal device can perform connection recovery in time and effectively when the wireless link fails.
  • the RRC connection recovery message mentioned in the embodiment of the present invention indicates a message for the terminal device and the network device to resume the connection, and the specific name of the message does not limit the protection scope of the embodiment of the present invention.
  • the RRC connection recovery message may also represent a message with similar functions, including but not limited to: an RRC connection activation message, an RRC connection reactivation message, or an RRC connection re-establishment message.
  • the communication method provided by the embodiment of the present invention is described above, and the terminal device and the network device provided by the embodiment of the present invention are described below.
  • FIG. 7 is a schematic block diagram of a terminal device 700 according to an embodiment of the present invention.
  • the terminal device 700 includes:
  • the processing module 710 is configured to determine, after the terminal device moves to the cell of the second network device, a second encryption algorithm, where the second encryption algorithm is an encryption algorithm supported by the second network device, where the terminal device is in the terminal a state in which the device is in the context information of the first network device and has cell reselection mobility, the first network device being different from the second network device;
  • the transceiver module 720 is configured to send data encrypted by using the second encryption algorithm to the second network device.
  • the inactive terminal device sends the encrypted data to the new network device (ie, the second network device), and the encrypted data is an encryption algorithm supported by the new network device. Encrypted. In this way, it can be ensured that the data sent by the terminal device to the new network device can be decrypted by the new network device. Therefore, the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
  • the processing module 710 is configured to determine a second encryption algorithm, including:
  • the processing module 710 is configured to determine whether the second network device supports the first encryption algorithm, where the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device; and when the second network device supports the first When the algorithm is encrypted, the first encryption algorithm is determined as the second encryption algorithm.
  • the transceiver module 720 is further configured to receive a system broadcast message sent by the second network device, where the system broadcast message includes an encryption algorithm used to indicate that the second network device supports or does not support.
  • First indication information includes an encryption algorithm used to indicate that the second network device supports or does not support.
  • the processing module 710 is configured to determine whether the second network device supports the first encryption algorithm, including:
  • the processing module 710 is configured to determine, according to the first indication information, whether the second network device supports the first encryption algorithm.
  • the transceiver module 720 is further configured to receive cell encryption algorithm information sent by the first network device, where the cell encryption algorithm information is used to indicate each cell in the management area of the first network device. Information about the encryption algorithm;
  • the processing module 710 is configured to determine whether the second network device supports the first encryption algorithm, including:
  • the processing module 710 is configured to determine, according to the cell encryption algorithm information, whether the second network device supports the first encryption algorithm when the cell of the second network device is in the management area.
  • the transceiver module 720 is further configured to: when the second network device does not support the first encryption algorithm, send a radio resource control RRC connection recovery request to the second network device, where the RRC connection is The recovery request includes the identifier of the terminal device;
  • the transceiver module 720 is further configured to receive an RRC connection recovery response that is sent by the second network device, where the RRC connection recovery response includes second indication information that is used to indicate an encryption algorithm supported by the second network device.
  • the processing module 710 is configured to determine a second encryption algorithm, including:
  • the processing module 710 is configured to acquire the second encryption algorithm according to the second indication information received by the transceiver module 720.
  • the system broadcast message includes the first indication information used to indicate an encryption algorithm supported by the second network device;
  • the processing module 710 is configured to determine a second encryption algorithm, including:
  • the processing module 710 is configured to: when the second network device does not support the first encryption algorithm, obtain the second encryption algorithm based on an encryption algorithm supported by the second network device indicated by the first indication information.
  • the transceiver module 720 is further configured to: when the cell of the second network device is not in the management area, send an RRC connection recovery request to the second network device, where the RRC connection recovery request is And including an identifier of the terminal device, and receiving an RRC connection recovery response sent by the second network device, where the RRC connection recovery response includes second indication information for indicating an encryption algorithm supported by the second network device;
  • the processing module 710 is configured to determine a second encryption algorithm, including:
  • the processing module 710 is configured to obtain the second encryption algorithm according to the second indication information.
  • the transceiver module 720 is further configured to send, to the second network device, a first message, where the first message includes an identifier of the terminal device, and the first encrypted by using a first encryption algorithm.
  • the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device; and an encryption algorithm update command sent by the second network device is received, where the encryption algorithm update command is used to indicate that the first encryption algorithm is updated.
  • the second encryption algorithm For the second encryption algorithm;
  • the processing module 710 is configured to determine a second encryption algorithm, including:
  • the processing module 710 is configured to acquire the second encryption algorithm according to the encryption algorithm update command.
  • the data that is sent by the terminal device to the second network device and encrypted by using the second encryption algorithm is the first data.
  • the transceiver module 720 is further configured to: before sending the first data encrypted by using the second encryption algorithm, send the third data sent by the second network device to the second network device.
  • the indication information is used to indicate that the data sent by using the first encryption algorithm is retransmitted.
  • processing module 710 in the embodiment of the present invention may be implemented by a processor or a processor related circuit component
  • transceiver module 720 may be implemented by a transceiver or a transceiver related circuit component.
  • the embodiment of the present invention further provides a terminal device 800, which includes a processor 810, a memory 820 and a transceiver 830, wherein the memory 820 stores instructions or programs, and the processor 810 is configured to execute An instruction or program stored in the memory 820.
  • the processor 810 is configured to perform the operations performed by the processing module 710 in the above embodiment
  • the transceiver 830 is configured to perform the operations performed by the transceiver module 720 in the above embodiment.
  • terminal device 700 or the terminal device 800 may correspond to the terminal device in the communication methods 200 to 500 of the embodiment of the present invention, and the operation of each module in the terminal device 700 or the terminal device 800 and/or
  • the functions of the respective methods in FIG. 2 to FIG. 5 are not described here.
  • FIG. 9 is a schematic flowchart of a network device 900 according to an embodiment of the present disclosure.
  • the network device 900 includes:
  • the transceiver module 910 is configured to receive data that is sent by the terminal device and is encrypted by using a second encryption algorithm, where the second encryption algorithm is an encryption algorithm supported by the network device, where the terminal device is in the first network device Context information, and having a state of cell reselection mobility, the first network device being different from the network device;
  • the processing module 920 is configured to decrypt data sent by the terminal device based on the second encryption algorithm.
  • the inactive terminal device sends the encrypted data to the new network device (ie, the second network device), and the encrypted data is an encryption algorithm supported by the new network device. Encrypted. In this way, it can be ensured that the data sent by the terminal device to the new network device can be decrypted by the new network device. Therefore, the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
  • the transceiver module 910 is further configured to: before receiving the data encrypted by the second encryption algorithm sent by the terminal device, send a system broadcast message to the terminal device, where the system broadcast message includes First indication information indicating an encryption algorithm supported or not supported by the network device.
  • the transceiver module 910 is further configured to: before receiving the data encrypted by the second encryption algorithm sent by the terminal device, receive a radio resource control RRC connection recovery request sent by the terminal device, where The RRC connection recovery request includes an identifier of the terminal device;
  • the transceiver module 910 is further configured to send an RRC connection recovery response to the terminal device, where the RRC connection recovery response includes second indication information for indicating an encryption algorithm supported by the network device.
  • the transceiver module 910 is further configured to: before receiving the data encrypted by the second encryption algorithm sent by the terminal device, receive the first message sent by the terminal device, where the first message includes An identifier of the terminal device, and the first data encrypted by using the first encryption algorithm, where the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device;
  • the processing module 920 is further configured to request context information of the terminal device from the first network device based on the identifier of the terminal device received by the transceiver module 910;
  • the processing module 920 is further configured to: acquire the first encryption algorithm according to the context information;
  • the transceiver module 910 is further configured to: when the network device does not support the first encryption algorithm, the terminal device sends an encryption algorithm update command, where the encryption algorithm update command is used to indicate that the first encryption algorithm is updated to the second encryption algorithm.
  • the data that is sent by the terminal device and is encrypted by using the second encryption algorithm that is sent by the terminal device is the first data.
  • the transceiver module 910 is further configured to send third indication information to the terminal device before receiving the data encrypted by the second encryption algorithm sent by the terminal device, where the third indication information is used by the terminal device Retransmitting the data indicated to be transmitted using the first encryption algorithm.
  • processing module 920 in the embodiments of the present invention may be implemented by a processor or a processor related circuit component
  • transceiver module 910 may be implemented by a transceiver or a transceiver related circuit component.
  • an embodiment of the present invention further provides a network device 1000, which includes a processor 1010, a memory 1020, and a transceiver 1030.
  • the memory 1020 stores instructions or programs
  • the processor 1010 is configured to execute An instruction or program stored in the memory 1020.
  • the processor 1010 is configured to perform the operations performed by the processing module 920 in the above embodiment
  • the transceiver 1030 is configured to perform the operations performed by the transceiver module 910 in the above embodiment.
  • the network device 900 or the network device 1000 may correspond to the network device in the communication methods 200 to 500 of the embodiment of the present invention, and the operation of each module in the network device 900 or the network device 1000 and/or For the sake of brevity, the functions of the respective methods in FIG. 2 to FIG. 5 are not described here.
  • the embodiment of the present invention further provides a computer readable storage medium, on which a computer program is stored, and when the program is executed by the processor, the process related to the terminal device in the communication method 200 provided by the foregoing method embodiment may be implemented.
  • the embodiment of the present invention further provides a computer readable storage medium, on which a computer program is stored, and when the program is executed by the processor, the process related to the second network device in the communication method 200 provided by the foregoing method embodiment may be implemented.
  • An embodiment of the present invention further provides a terminal device, where the terminal device includes:
  • a transceiver module configured to receive a notification message sent by the first network device, where the notification message includes an identifier of the terminal device;
  • a processing module configured to perform cell selection or cell reselection when the radio link fails to be determined, and determine a current serving cell
  • the transceiver module is further configured to send a connection recovery request to the second network device corresponding to the current serving cell, where the connection recovery request carries the identifier of the terminal device.
  • the identifier of the terminal device is configured in advance by the network device, so that when the terminal device finds that the wireless link fails, the connection recovery may be performed in time based on the identifier of the terminal device.
  • the notification message further includes key information; the processing module is further configured to: use the key information to generate integrity protection information; the transceiver module is further configured to send to the serving network device This integrity protection information.
  • the network device configures the key and the identifier of the terminal device for the terminal device in advance, so that the terminal device can perform connection recovery in time and effectively when the wireless link fails.
  • processing modules in the above embodiments may be implemented by a processor or processor related circuit components, which may be implemented by transceivers or transceiver related circuit components.
  • terminal device may correspond to the terminal device in the communication method 600 of the embodiment of the present invention, and the operations and/or functions of the respective modules in the terminal device are respectively implemented to implement the corresponding in FIG. 6 .
  • the process, for the sake of brevity, will not be described here.
  • the embodiment of the invention further provides a network device, where the network device includes:
  • a processing module is configured to determine an identifier of the terminal device.
  • the transceiver module is configured to send a notification message to the terminal device, where the notification message includes an identifier of the terminal device, so that the terminal device performs connection recovery when the wireless link fails to be discovered.
  • the identifier of the terminal device is configured in advance by the network device, so that when the terminal device finds that the wireless link fails, the connection recovery may be performed in time based on the identifier of the terminal device.
  • the notification message further includes key information, so that the terminal device generates integrity protection information according to the key information.
  • processing modules in the above embodiments may be implemented by a processor or processor related circuit components, which may be implemented by transceivers or transceiver related circuit components.
  • the network device according to the embodiment of the present invention may correspond to the network device in the communication method 600 of the embodiment of the present invention, and the operations and/or functions of the respective modules in the network device are respectively implemented to implement the corresponding in FIG. 6 The process, for the sake of brevity, will not be described here.
  • the embodiment of the present application further provides a communication device, which may be a terminal device or a circuit.
  • the communication device can be used to perform the actions performed by the terminal device in the above method embodiments.
  • FIG. 11 shows a schematic structural diagram of a simplified terminal device.
  • the terminal device uses a mobile phone as an example.
  • the terminal device includes a processor, a memory, a radio frequency circuit, an antenna, and an input/output device.
  • the processor is mainly used for processing communication protocols and communication data, and controlling terminal devices, executing software programs, processing data of software programs, and the like.
  • Memory is primarily used to store software programs and data.
  • the RF circuit is mainly used for the conversion of the baseband signal and the RF signal and the processing of the RF signal.
  • the antenna is mainly used to transmit and receive RF signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, keyboards, etc., are primarily used to receive user input data and output data to the user. It should be noted that some types of terminal devices may not have input and output devices.
  • the processor When the data needs to be sent, the processor performs baseband processing on the data to be sent, and outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal, and then sends the radio frequency signal to the outside through the antenna in the form of electromagnetic waves.
  • the RF circuit receives the RF signal through the antenna, converts the RF signal into a baseband signal, and outputs the baseband signal to the processor, which converts the baseband signal into data and processes the data.
  • the memory may also be referred to as a storage medium or a storage device or the like.
  • the memory may be independent of the processor, or may be integrated with the processor, which is not limited in this embodiment of the present application.
  • the antenna and the radio frequency circuit having the transceiving function can be regarded as the transceiving unit of the terminal device, and the processor having the processing function is regarded as the processing unit of the terminal device.
  • the terminal device includes a transceiver unit 1110 and a processing unit 1120.
  • the transceiver unit can also be referred to as a transceiver, a transceiver, a transceiver, and the like.
  • the processing unit may also be referred to as a processor, a processing board, a processing module, a processing device, and the like.
  • the device for implementing the receiving function in the transceiver unit 1110 can be regarded as a receiving unit, and the device for implementing the sending function in the transceiver unit 1110 is regarded as a sending unit, that is, the transceiver unit 1110 includes a receiving unit and a sending unit.
  • the transceiver unit may also be referred to as a transceiver, a transceiver, or a transceiver circuit.
  • the receiving unit may also be referred to as a receiver, a receiver, or a receiving circuit or the like.
  • the transmitting unit may also be referred to as a transmitter, a transmitter, or a transmitting circuit, and the like.
  • transceiver unit 1110 is configured to perform the sending operation and the receiving operation on the terminal device side in the foregoing method embodiment
  • processing unit 1120 is configured to perform other operations on the terminal device except the transmitting and receiving operations in the foregoing method embodiment.
  • the transceiver unit 1110 is configured to perform a sending operation on the terminal device side in step 220 in FIG. 2, and/or the transceiver unit 1110 is further configured to perform other receiving and receiving on the terminal device side in the embodiment of the present application.
  • step. The processing unit 1120 is configured to perform step 210 in FIG. 2, and/or the processing unit 1120 is further configured to perform other processing steps on the terminal device side in the embodiment of the present application.
  • the transceiver unit 1110 is configured to perform the receiving operation on the terminal device side in step 301, step 303 and step 307 in FIG. 3 or the terminal device side in step 305, step 306 and step 309.
  • the operation, and/or the transceiver unit 1120 is also used to perform other transceiving steps on the terminal device side in the embodiment of the present application.
  • the processing unit 1120 is configured to perform step 302, step 304, and step 308 in FIG. 3, and/or the processing unit 1120 is further configured to perform other processing steps on the terminal device side in the embodiment of the present application.
  • the transceiver unit 1110 is configured to perform the receiving operation on the terminal device side in step 401 and step 407 in FIG. 4 or the sending on the terminal device side in step 405 and step 405, step 406 and step 409 in step 409.
  • the operation, and/or the transceiver unit 1110 is further configured to perform other transceiver steps on the terminal device side in the embodiment of the present application.
  • the processing unit 1120 is configured to perform step 402, step 403, step 404, and step 408 in FIG. 4, and/or the processing unit 1120 is further configured to perform other processing steps on the terminal device side in the embodiment of the present application.
  • the transceiver unit 1110 is configured to perform the receiving operation on the terminal device side in step 501 and step 508 in FIG. 5 or the transmitting operation on the terminal device side in step 503 and step 509, and/or transmit and receive.
  • the unit 1110 is further configured to perform other transmitting and receiving steps on the terminal device side in the embodiment of the present application.
  • the processing unit 1120 is configured to perform step 502 in FIG. 5, and/or the processing unit 1120 is further configured to perform other processing steps on the terminal device side in the embodiment of the present application.
  • the transceiver unit 1110 is configured to perform a receiving operation on the terminal device side in step 610 in FIG. 6 or a transmitting operation on the terminal device side in step 640, and/or the transceiver unit 1110 is further configured to perform Other steps of transmitting and receiving on the terminal device side in this embodiment of the present application.
  • the processing unit 1120 is configured to perform step 620 and step 630 in FIG. 6, and/or the processing unit 1120 is further configured to perform other processing steps on the terminal device side in the embodiment of the present application.
  • the chip When the communication device is a chip, the chip includes a transceiver unit and a processing unit.
  • the transceiver unit may be an input/output circuit and a communication interface;
  • the processing unit is a processor or a microprocessor or an integrated circuit integrated on the chip.
  • the device shown in FIG. 12 can be referred to.
  • the device can perform functions similar to processor 810 in FIG.
  • the device includes a processor 1210, a transmit data processor 1220, and a receive data processor 1230.
  • the processing module 710 in the above embodiment may be the processor 1210 in FIG. 12 and perform the corresponding functions.
  • the transceiver module 720 in the above embodiment may be the transmit data processor 1220 in FIG. 12, and/or the receive data processor 1230.
  • a channel coder and a channel decoder are shown in FIG. 12, it is to be understood that these modules are not intended to be limiting, and are merely illustrative.
  • the processing device 1300 includes modules such as a modulation subsystem, a central processing subsystem, and a peripheral subsystem.
  • the communication device in this embodiment can be used as a modulation subsystem therein.
  • the modulation subsystem may include a processor 1303, an interface 1304.
  • the processor 1303 performs the functions of the foregoing processing module 710, and the interface 1304 performs the functions of the transceiver module 720.
  • the modulation subsystem includes a memory 1306, a processor 1303, and a program stored on the memory 1306 and executable on the processor, and the processor 1303 executes the program to implement the terminal device side in the above method embodiment. Methods.
  • the memory 1306 may be non-volatile or volatile, and its location may be located inside the modulation subsystem or in the processing device 1300 as long as the memory 1306 can be connected to the The processor 1303 is sufficient.
  • a computer readable storage medium having stored thereon an instruction for executing a method on a terminal device side in the above method embodiment when the instruction is executed.
  • a computer program product comprising instructions which, when executed, perform the method on the terminal device side in the above method embodiment.
  • processors mentioned in the embodiment of the present invention may be a central processing unit (CPU), and may also be other general-purpose processors, digital signal processors (DSPs), and application specific integrated circuits ( Application Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory referred to in the embodiments of the present invention may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read only memory (PROM), an erasable programmable read only memory (Erasable PROM, EPROM), or an electric Erase programmable read only memory (EEPROM) or flash memory.
  • the volatile memory can be a Random Access Memory (RAM) that acts as an external cache.
  • RAM Random Access Memory
  • many forms of RAM are available, such as static random access memory (SRAM), dynamic random access memory (DRAM), synchronous dynamic random access memory (Synchronous DRAM). SDRAM), Double Data Rate SDRAM (DDR SDRAM), Enhanced Synchronous Dynamic Random Access Memory (ESDRAM), Synchronous Connection Dynamic Random Access Memory (Synchlink DRAM, SLDRAM) ) and direct memory bus random access memory (DR RAM).
  • processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, the memory (storage module) is integrated in the processor.
  • memories described herein are intended to comprise, without being limited to, these and any other suitable types of memory.
  • the size of the serial numbers of the above processes does not mean the order of execution, and the order of execution of each process should be determined by its function and internal logic, and should not be taken to the embodiments of the present invention.
  • the implementation process constitutes any limitation.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
  • the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .

Abstract

Provided by the present application are a communication method and device, the communication method comprising: after a terminal device moves to a cell of a second network device, the terminal device determines a second encryption algorithm to be used when communicating with the second network device, the second encryption algorithm being an encryption algorithm supported by the second network device, the terminal device being in a state of saving the context information of the terminal device in a first network device and having cell re-selection mobility, and the first network device being different from the second network device; and the terminal device sends data encrypted by using the second encryption algorithm to the second network device, which may effectively avoid the problem of a network device newly accessed by the terminal device in an inactive state not being able to decrypt data sent by the terminal device.

Description

通信方法与设备Communication method and device
本申请要求于2017年04月18日提交中国专利局、申请号为201710253561.6、申请名称为“通信方法与设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。The present application claims the priority of the Chinese Patent Application, the entire disclosure of which is hereby incorporated by reference.
技术领域Technical field
本申请涉及通信领域,并且更具体地,涉及一种通信方法与设备。The present application relates to the field of communications and, more particularly, to a communication method and apparatus.
背景技术Background technique
终端设备的非激活态指的是,终端设备与无线接入网(Radio Access Network,RAN)设备断开RRC连接,但保留终端设备的上下文信息的状态。在非激活态下,当终端设备移动到新的RAN设备的小区时,可以基于之前保留的该终端设备的上下文,向新的RAN设备(也可称为切换后的RAN设备)发送上行数据。The inactive state of the terminal device means that the terminal device disconnects the RRC connection with the Radio Access Network (RAN) device, but retains the state of the context information of the terminal device. In the inactive state, when the terminal device moves to the cell of the new RAN device, the uplink data may be sent to the new RAN device (which may also be referred to as the switched RAN device) based on the context of the previously reserved terminal device.
当前技术中,终端设备与新的RAN设备通信时所使用的加密算法沿用的是该终端设备与之前归属的RAN设备通信时所采用的加密算法(记为第一加密算法)。但是,新的RAN设备不一定支持该第一加密算法,如果不支持,则无法解密终端设备发送的数据。In the current technology, the encryption algorithm used by the terminal device to communicate with the new RAN device follows the encryption algorithm (referred to as the first encryption algorithm) used when the terminal device communicates with the previously-registered RAN device. However, the new RAN device does not necessarily support the first encryption algorithm, and if it is not supported, the data transmitted by the terminal device cannot be decrypted.
发明内容Summary of the invention
本申请提供一种通信方法与设备,能够有效避免非激活态下的终端设备新接入的网络设备无法解密终端设备发送的数据的问题。The present application provides a communication method and device, which can effectively avoid the problem that a network device newly accessed by a terminal device in an inactive state cannot decrypt data transmitted by the terminal device.
第一方面提供一种通信方法,所述通信方法包括:终端设备移动到第二网络设备的小区后,所述终端设备确定第二加密算法,所述第二加密算法为所述第二网络设备所支持的加密算法,所述终端设备处于保存所述终端设备在第一网络设备的上下文信息、且具有小区重选移动性的状态,所述第一网络设备不同于所述第二网络设备;所述终端设备向所述第二网络设备发送使用所述第二加密算法加密后的数据。The first aspect provides a communication method, the communication method includes: after the terminal device moves to a cell of the second network device, the terminal device determines a second encryption algorithm, where the second encryption algorithm is the second network device The supported encryption algorithm, the terminal device is in a state of saving the context information of the terminal device in the first network device, and has a cell reselection mobility, the first network device being different from the second network device; The terminal device sends data encrypted by using the second encryption algorithm to the second network device.
所述终端设备处于的所述状态可以称为非激活态。换句话说,终端设备为进入非激活态的终端设备。具体地,第一网络设备可以通过向终端设备发送无线资源控制(Radio Resource Control,RRC)挂起消息,来通知终端设备进入非激活态。The state in which the terminal device is located may be referred to as an inactive state. In other words, the terminal device is a terminal device that enters an inactive state. Specifically, the first network device may notify the terminal device to enter an inactive state by sending a Radio Resource Control (RRC) suspension message to the terminal device.
在本申请提供的方案中,非激活态的终端设备向新的网络设备(即第二网络设备)发送加密后的数据,所述加密后的数据是使用所述新的网络设备所支持的加密算法加密的。这样,可以保证所述终端设备向所述新的网络设备发送的数据能够被新的网络设备解密。因此,本申请提供的方案,能够有效避免非激活态下的终端设备新接入的网络设备无法解密所述终端设备发送的数据的问题,从而可以提高数据传输的有效性。In the solution provided by the present application, the inactive terminal device sends the encrypted data to the new network device (ie, the second network device), and the encrypted data is encrypted using the new network device. Algorithm encrypted. In this way, it can be ensured that the data sent by the terminal device to the new network device can be decrypted by the new network device. Therefore, the solution provided by the present application can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
结合第一方面,在第一方面的一种可能的实现方式中,所述终端设备确定第二加密算法,包括:所述终端设备判断所述第二网络设备是否支持第一加密算法,所述第一加密算 法为所述第一网络设备为所述终端设备配置的加密算法;当所述第二网络设备支持所述第一加密算法时,所述终端设备将所述第一加密算法确定为所述第二加密算法。With reference to the first aspect, in a possible implementation manner of the first aspect, the determining, by the terminal device, the second encryption algorithm, includes: determining, by the terminal device, whether the second network device supports a first encryption algorithm, The first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device; when the second network device supports the first encryption algorithm, the terminal device determines the first encryption algorithm as The second encryption algorithm.
可选地,所述第一加密算法为第一网络设备配置的用于终端设备在与第一网络设备通信时使用的加密算法。Optionally, the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to use when communicating with the first network device.
可选地,所述第一加密算法为第一网络设备配置的用于终端设备在所述状态(即非激活态)下使用的加密算法。Optionally, the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to be used in the state (ie, an inactive state).
具体地,第一网络设备可以在配置终端设备进入非激活态之前,向终端设备发送所述第一加密算法;或者,在配置终端设备进入非激活态之前向终端设备发送所述第一加密算法。Specifically, the first network device may send the first encryption algorithm to the terminal device before configuring the terminal device to enter the inactive state; or send the first encryption algorithm to the terminal device before configuring the terminal device to enter the inactive state .
第二加密算法可能与第一加密算法相同,也有可能不同。具体地,当第二网络设备支持第一加密算法时,所述第二加密算法可以直接是第一加密算法。当第二网络设备不支持第一加密算法时,所述第二加密算法一定与第一加密算法不同。The second encryption algorithm may be the same as or different from the first encryption algorithm. Specifically, when the second network device supports the first encryption algorithm, the second encryption algorithm may be directly the first encryption algorithm. When the second network device does not support the first encryption algorithm, the second encryption algorithm must be different from the first encryption algorithm.
可选地,作为一种实现方式,当所述终端设备判断所述第二网络设备不支持所述第一加密算法时,向所述第二网络设备发送RRC连接恢复请求,所述RRC连接恢复请求中包括所述终端设备的标识;所述终端设备接收所述第二网络设备发送的RRC连接恢复响应,所述RRC连接恢复响应中包括用于指示所述第二网络设备支持的加密算法的第二指示信息;所述终端设备根据所述第二指示信息,获取所述第二加密算法。Optionally, as an implementation manner, when the terminal device determines that the second network device does not support the first encryption algorithm, sends an RRC connection recovery request to the second network device, where the RRC connection is restored. The request includes the identifier of the terminal device; the terminal device receives an RRC connection recovery response sent by the second network device, where the RRC connection recovery response includes an encryption algorithm used to indicate that the second network device supports The second indication information; the terminal device acquires the second encryption algorithm according to the second indication information.
在本申请提供的方案中,终端设备通过判断第二网络设备是否支持第一网络设备为终端设备配置的加密算法(即第一加密算法),进而采用第二网络设备支持的加密算法向第二网络设备发送数据,这样,可以保证所述终端设备发送的数据能够被所述第二网络设备解密。因此,本申请提供的方案,能够有效避免非激活态下的终端设备新接入的网络设备无法解密所述终端设备发送的数据的问题,从而可以提高数据传输的有效性。In the solution provided by the present application, the terminal device determines whether the second network device supports the encryption algorithm (ie, the first encryption algorithm) configured by the first network device for the terminal device, and further adopts the encryption algorithm supported by the second network device to the second The network device transmits data, so that data transmitted by the terminal device can be guaranteed to be decrypted by the second network device. Therefore, the solution provided by the present application can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
结合第一方面,在第一方面的一种可能的实现方式中,所述终端设备判断所述第二网络设备是否支持所述第一加密算法,包括:所述终端设备接收所述第二网络设备发送的系统广播消息,所述系统广播消息中包括用于指示所述第二网络设备支持或不支持的加密算法的第一指示信息;所述终端设备根据所述第一指示信息,判断所述第二网络设备是否支持所述第一加密算法。With reference to the first aspect, in a possible implementation manner of the first aspect, the determining, by the terminal device, whether the second network device supports the first encryption algorithm, includes: the terminal device receiving the second network a system broadcast message sent by the device, where the system broadcast message includes first indication information for indicating an encryption algorithm supported or not supported by the second network device, and the terminal device determines, according to the first indication information, Whether the second network device supports the first encryption algorithm.
具体地,当根据所述系统广播消息中的第一指示信息,判断所述第二网络设备支持所述第一加密算法时,直接利用所述第一加密算法对向第二网络设备发送的数据进行加密。Specifically, when it is determined that the second network device supports the first encryption algorithm according to the first indication information in the system broadcast message, directly using the first encryption algorithm to send data to the second network device. Encrypt.
具体地,当根据所述系统广播消息中的第一指示信息,判断所述第二网络设备不支持所述第一加密算法时,可以通过所述第一指示信息获取所述第二网络设备支持的加密算法,或者通过向第二网络设备发送RRC连接恢复请求来获取所述第二网络设备支持的加密算法。Specifically, when it is determined that the second network device does not support the first encryption algorithm according to the first indication information in the system broadcast message, the second network device support may be acquired by using the first indication information. The encryption algorithm or the encryption algorithm supported by the second network device is obtained by sending an RRC connection recovery request to the second network device.
在本申请提供的方案中,第二网络设备通过向终端设备发送用于指示第二网络设备支持的加密算法的系统广播消息,使得终端设备能够判断第二网络设备是否支持第一网络设备为终端设备配置的加密算法(即第一加密算法),进而采用第二网络设备支持的加密算法向第二网络设备发送数据,这样,可以保证所述终端设备发送的数据能够被所述第二网络设备解密。因此,本申请提供的方案,能够有效避免非激活态下的终端设备新接入的网络设备无法解密所述终端设备发送的数据的问题,从而可以提高数据传输的有效性。In the solution provided by the application, the second network device enables the terminal device to determine whether the second network device supports the first network device as a terminal by sending a system broadcast message indicating the encryption algorithm supported by the second network device to the terminal device. The encryption algorithm (that is, the first encryption algorithm) configured by the device, and then the data is sent to the second network device by using an encryption algorithm supported by the second network device, so that the data sent by the terminal device can be ensured by the second network device. Decrypt. Therefore, the solution provided by the present application can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
结合第一方面,在第一方面的一种可能的实现方式中,所述通信方法还包括:所述终端设备接收所述第一网络设备发送的小区加密算法信息,所述小区加密算法信息用于指示所述第一网络设备的管理区域内的各个小区的加密算法相关信息;所述终端设备判断所述第二网络设备是否支持所述第一加密算法,包括:当所述第二网络设备的小区在所述管理区域内时,所述终端设备根据所述小区加密算法信息,判断所述第二网络设备是否支持所述第一加密算法。With reference to the first aspect, in a possible implementation manner of the first aspect, the communication method further includes: receiving, by the terminal device, cell encryption algorithm information sent by the first network device, where the cell encryption algorithm information is used by The information about the encryption algorithm of each cell in the management area of the first network device; the terminal device determining whether the second network device supports the first encryption algorithm, including: when the second network device When the cell is in the management area, the terminal device determines, according to the cell encryption algorithm information, whether the second network device supports the first encryption algorithm.
可选地,所述第一网络设备可以在配置终端设备进入非激活态之前或同时,向终端设备发送所述小区加密算法信息。Optionally, the first network device may send the cell encryption algorithm information to the terminal device before or at the same time as configuring the terminal device to enter the inactive state.
具体地,所述小区加密算法信息用于指示所述第一网络设备的管理区域内的各个小区的加密算法相关信息。其中,小区的加密算法相关信息可以是下列信息中的任一种或多种:小区支持的加密算法,小区不支持的加密算法,小区支持第一加密算法,小区不支持第一加密算法,通知终端设备进入小区后使用的加密算法。其中,所述管理区域可以是第一网络设备的寻呼区或接入网位置跟踪区,终端设备在所述管理区域内移动时,无需通知第一网络设备,当移动出所述管理区域时需要通知第一网络设备。Specifically, the cell encryption algorithm information is used to indicate encryption algorithm related information of each cell in the management area of the first network device. The information about the encryption algorithm of the cell may be any one or more of the following information: an encryption algorithm supported by the cell, an encryption algorithm not supported by the cell, a cell supporting the first encryption algorithm, and the cell does not support the first encryption algorithm, and the notification The encryption algorithm used by the terminal device after entering the cell. The management area may be a paging area of the first network device or an access network location tracking area. When the terminal device moves in the management area, the first network device does not need to be notified, and when the management area is moved out Need to notify the first network device.
可选地,作为一种实现方式,当终端设备当前归属的所述第二网络设备的小区在所述管理区域内时,且根据所述小区加密算法信息,判断所述第二网络设备支持所述第一加密算法时,直接将所述第一加密算法确定为第二加密算法,即在后续数据发送过程中,直接使用第一加密算法对数据加密。Optionally, as an implementation manner, when the cell of the second network device to which the terminal device belongs is located in the management area, and according to the cell encryption algorithm information, determining the second network device support When the first encryption algorithm is described, the first encryption algorithm is directly determined as the second encryption algorithm, that is, in the subsequent data transmission process, the data is directly encrypted by using the first encryption algorithm.
可选地,作为一种实现方式,当终端设备当前归属的所述第二网络设备的小区在所述管理区域内时,且根据所述小区加密算法信息,判断所述第二网络设备不支持所述第一加密算法时,可以通过向第二网络设备发送RRC连接恢复请求,来获取第二网络设备支持的第二加密算法;或者也可以根据所述小区加密算法信息,获取所述第二加密算法。Optionally, as an implementation manner, when the cell of the second network device to which the terminal device belongs is located in the management area, and according to the cell encryption algorithm information, determining that the second network device does not support The second encryption algorithm may be configured to obtain a second encryption algorithm supported by the second network device by sending an RRC connection recovery request to the second network device, or may obtain the second according to the cell encryption algorithm information. Encryption Algorithm.
可选地,作为一种实现方式,当所述终端设备确定当前归属的所述第二网络设备的小区不在所述管理区域内时,可以通过如下方式获取所述第二网络设备支持的加密算法:向所述第二网络设备发送RRC连接恢复请求,所述RRC连接恢复请求中包括所述终端设备的标识;所述终端设备接收所述第二网络设备发送的RRC连接恢复响应,所述RRC连接恢复响应中包括用于指示所述第二网络设备支持的加密算法的第二指示信息;所述终端设备根据所述第二指示信息,获取所述第二加密算法。Optionally, as an implementation manner, when the terminal device determines that the cell of the second network device that is currently in the home device is not in the management area, the encryption algorithm supported by the second network device may be obtained by: Sending an RRC connection recovery request to the second network device, where the RRC connection recovery request includes an identifier of the terminal device, and the terminal device receives an RRC connection recovery response sent by the second network device, where the RRC The connection recovery response includes second indication information for indicating an encryption algorithm supported by the second network device, and the terminal device acquires the second encryption algorithm according to the second indication information.
在本申请提供的方案中,终端设备通过获知第一网络设备的管理区域内的小区加密算法信息,使得终端设备能够判断第二网络设备是否支持第一网络设备为终端设备配置的加密算法(即第一加密算法),进而采用第二网络设备支持的加密算法向第二网络设备发送数据,这样,可以保证所述终端设备发送的数据能够被所述第二网络设备解密。因此,本申请提供的方案能够有效避免非激活态下的终端设备新接入的网络设备无法解密所述终端设备发送的数据的问题,从而可以提高数据传输的有效性。In the solution provided by the present application, the terminal device can determine whether the second network device supports the encryption algorithm configured by the first network device for the terminal device by knowing the cell encryption algorithm information in the management area of the first network device. The first encryption algorithm) further transmits data to the second network device by using an encryption algorithm supported by the second network device, so that data transmitted by the terminal device can be decrypted by the second network device. Therefore, the solution provided by the present application can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
结合第一方面,在第一方面的一种可能的实现方式中,所述终端设备确定第二加密算法,包括:With reference to the first aspect, in a possible implementation manner of the first aspect, the terminal device determines a second encryption algorithm, including:
所述终端设备向所述第二网络设备发送第一消息,所述第一消息包括所述终端设备的标识,以及使用第一加密算法加密后的第一数据,所述第一加密算法为所述第一网络设备为所述终端设备配置的加密算法;所述终端设备接收所述第二网络设备发送的加密算法更 新命令,所述加密算法更新命令用于指示将所述第一加密算法更新为所述第二加密算法;所述终端设备根据所述加密算法更新命令,获取所述第二加密算法。Transmitting, by the terminal device, the first message to the second network device, where the first message includes an identifier of the terminal device, and first data encrypted by using a first encryption algorithm, where the first encryption algorithm is An encryption algorithm configured by the first network device for the terminal device; the terminal device receives an encryption algorithm update command sent by the second network device, where the encryption algorithm update command is used to indicate that the first encryption algorithm is updated And being the second encryption algorithm; the terminal device acquires the second encryption algorithm according to the encryption algorithm update command.
可选地,所述第一加密算法为第一网络设备配置的用于终端设备在与第一网络设备通信时使用的加密算法。Optionally, the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to use when communicating with the first network device.
可选地,所述第一加密算法为第一网络设备配置的用于终端设备在所述状态(即非激活态)下使用的加密算法。Optionally, the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to be used in the state (ie, an inactive state).
具体地,第一网络设备可以在配置终端设备进入非激活态之前,向终端设备发送所述第一加密算法;或者,在配置终端设备进入非激活态之前向终端设备发送所述第一加密算法。Specifically, the first network device may send the first encryption algorithm to the terminal device before configuring the terminal device to enter the inactive state; or send the first encryption algorithm to the terminal device before configuring the terminal device to enter the inactive state .
结合第一方面,在第一方面的一种可能的实现方式中,所述终端设备向所述第二网络设备发送的使用所述第二加密算法加密的数据为所述第一数据。In conjunction with the first aspect, in a possible implementation manner of the first aspect, the data that is sent by the terminal device to the second network device and that is encrypted by using the second encryption algorithm is the first data.
结合第一方面,在第一方面的一种可能的实现方式中,在所述终端设备向所述第二网络设备发送使用所述第二加密算法加密后的所述第一数据之前,所述通信方法还包括:With reference to the first aspect, in a possible implementation manner of the first aspect, before the terminal device sends the first data that is encrypted by using the second encryption algorithm to the second network device, The communication method also includes:
所述终端设备接收所述第二网络设备发送的第三指示信息,所述第三指示信息用于指示将使用所述第一加密算法发送的数据进行重传。The terminal device receives third indication information that is sent by the second network device, where the third indication information is used to indicate that data sent by using the first encryption algorithm is retransmitted.
在本申请提供的方案中,第二网络设备在判断第二网络设备不支持终端设备当前使用的加密算法(即第一加密算法)时,通知终端设备将加密算法更新为第二网络设备支持的第二加密算法,这样,可以保证所述终端设备发送的数据能够被所述第二网络设备解密。因此,本申请提供的方案能够有效避免非激活态下的终端设备新接入的网络设备无法解密所述终端设备发送的数据的问题,从而可以提高数据传输的有效性。In the solution provided by the present application, when determining that the second network device does not support the encryption algorithm currently used by the terminal device, that is, the first encryption algorithm, the second network device notifies the terminal device to update the encryption algorithm to be supported by the second network device. The second encryption algorithm can ensure that the data sent by the terminal device can be decrypted by the second network device. Therefore, the solution provided by the present application can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
第二方面提供一种通信方法,所述通信方法包括:第二网络设备接收终端设备发送的使用第二加密算法加密后的数据,所述第二加密算法为所述第二网络设备所支持的加密算法,所述终端设备处于保存所述终端设备在第一网络设备的上下文信息、且具有小区重选移动性的状态,所述第一网络设备不同于所述第二网络设备;所述第二网络设备基于所述第二加密算法,解密所述终端设备发送的数据。A second aspect provides a communication method, where the second network device receives data encrypted by a terminal device and is encrypted by using a second encryption algorithm, where the second encryption algorithm is supported by the second network device. An encryption algorithm, the terminal device is in a state of saving context information of the terminal device in the first network device, and has a cell reselection mobility, where the first network device is different from the second network device; The second network device decrypts the data sent by the terminal device based on the second encryption algorithm.
在本申请提供的方案中,非激活态的终端设备向新的网络设备(即第二网络设备)发送加密后的数据,所述加密后的数据是使用所述新的网络设备所支持的加密算法加密的。这样,可以保证所述终端设备向所述新的网络设备发送的数据能够被新的网络设备解密。因此,本申请提供的方案,能够有效避免非激活态下的终端设备新接入的网络设备无法解密所述终端设备发送的数据的问题,从而可以提高数据传输的有效性。In the solution provided by the present application, the inactive terminal device sends the encrypted data to the new network device (ie, the second network device), and the encrypted data is encrypted using the new network device. Algorithm encrypted. In this way, it can be ensured that the data sent by the terminal device to the new network device can be decrypted by the new network device. Therefore, the solution provided by the present application can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
结合第二方面,在第二方面的一种可能的实现方式中,在所述第二网络设备接收终端设备发送的使用第二加密算法加密后的数据之前,所述通信方法还包括:所述第二网络设备向所述终端设备发送系统广播消息,所述系统广播消息中包括用于指示所述第二网络设备支持或不支持的加密算法的第一指示信息。With reference to the second aspect, in a possible implementation manner of the second aspect, before the second network device receives the data that is sent by the terminal device and is encrypted by using the second encryption algorithm, the communication method further includes: The second network device sends a system broadcast message to the terminal device, where the system broadcast message includes first indication information for indicating an encryption algorithm supported or not supported by the second network device.
结合第二方面,在第二方面的一种可能的实现方式中,在所述第二网络设备接收终端设备发送的使用第二加密算法加密后的数据之前,所述通信方法还包括:所述第二网络设备接收所述终端设备发送的RRC连接恢复请求,所述RRC连接恢复请求中包括所述终端设备的标识;所述第二网络设备向所述终端设备发送RRC连接恢复响应,所述RRC连接恢复响应中包括用于指示所述第二网络设备支持的加密算法的第二指示信息。With reference to the second aspect, in a possible implementation manner of the second aspect, before the second network device receives the data that is sent by the terminal device and is encrypted by using the second encryption algorithm, the communication method further includes: Receiving, by the second network device, an RRC connection recovery request sent by the terminal device, where the RRC connection recovery request includes an identifier of the terminal device, and the second network device sends an RRC connection recovery response to the terminal device, where The RRC connection recovery response includes second indication information for indicating an encryption algorithm supported by the second network device.
结合第二方面,在第二方面的一种可能的实现方式中,在所述第二网络设备接收终端设备发送的使用第二加密算法加密后的数据之前,所述通信方法还包括:With reference to the second aspect, in a possible implementation manner of the second aspect, before the second network device receives the data that is sent by the terminal device and is encrypted by using the second encryption algorithm, the communication method further includes:
所述第二网络设备接收所述终端设备发送的第一消息,所述第一消息包括所述终端设备的标识,以及使用第一加密算法加密后的第一数据,所述第一加密算法为所述第一网络设备为所述终端设备配置的加密算法;所述第二网络设备基于所述终端设备的标识,向所述第一网络设备请求所述终端设备的上下文信息;所述第二网络设备根据所述上下文信息,获取所述第一加密算法;当所述第二网络设备不支持所述第一加密算法时,所述第二网络设备向所述终端设备发送加密算法更新命令,所述加密算法更新命令用于指示将所述第一加密算法更新为所述第二加密算法。Receiving, by the second network device, the first message sent by the terminal device, where the first message includes an identifier of the terminal device, and first data encrypted by using a first encryption algorithm, where the first encryption algorithm is The first network device is an encryption algorithm configured by the terminal device; the second network device requests context information of the terminal device from the first network device based on the identifier of the terminal device; The network device acquires the first encryption algorithm according to the context information; when the second network device does not support the first encryption algorithm, the second network device sends an encryption algorithm update command to the terminal device, The encryption algorithm update command is used to indicate that the first encryption algorithm is updated to the second encryption algorithm.
结合第二方面,在第二方面的一种可能的实现方式中,所述第二网络设备接收的所述终端设备发送的使用所述第二加密算法加密后的数据为所述第一数据。With reference to the second aspect, in a possible implementation manner of the second aspect, the data that is sent by the terminal device that is received by the second network device and that is encrypted by using the second encryption algorithm is the first data.
结合第二方面,在第二方面的一种可能的实现方式中,在所述第二网络设备接收终端设备发送的使用第二加密算法加密后的数据之前,所述通信方法还包括:With reference to the second aspect, in a possible implementation manner of the second aspect, before the second network device receives the data that is sent by the terminal device and is encrypted by using the second encryption algorithm, the communication method further includes:
所述第二网络设备向所述终端设备发送第三指示信息,所述第三指示信息用于指示将使用所述第一加密算法发送的数据进行重传。The second network device sends third indication information to the terminal device, where the third indication information is used to indicate that data sent by using the first encryption algorithm is retransmitted.
第三方面提供一种通信方法,所述通信方法包括:终端设备接收第一网络设备发送的通知消息,所述通知消息包括所述终端设备的标识;当发现无线链路失败,所述终端设备进行小区选择或者小区重选,确定当前服务小区;所述终端设备向所述当前服务小区对应的第二网络设备发送连接恢复请求,所述连接恢复请求中携带所述终端设备的标识。A third aspect provides a communication method, the method includes: receiving, by a terminal device, a notification message sent by a first network device, where the notification message includes an identifier of the terminal device; when the radio link is found to be failed, the terminal device Performing cell selection or cell reselection to determine a current serving cell; the terminal device sends a connection recovery request to the second network device corresponding to the current serving cell, where the connection recovery request carries the identifier of the terminal device.
具体地,所述无线链路失败是指所述终端设备与所述网络设备的通讯链路发送故障。Specifically, the failure of the radio link refers to a communication link failure of the terminal device and the network device.
具体地,所述当前服务小区可以是所述网络设备的覆盖小区,也可以是其他网络设备的覆盖。Specifically, the current serving cell may be a coverage cell of the network device, or may be an overlay of other network devices.
可选地,所述第一网络设备在与终端设备建立连接时,为所述终端设备分配所述终端设备的标识。Optionally, the first network device allocates an identifier of the terminal device to the terminal device when establishing a connection with the terminal device.
可选地,在所述终端设备切换到所述第一网络设备的小区时,所述第一网络设备为所述终端设备分配所述终端设备的标识。Optionally, when the terminal device switches to a cell of the first network device, the first network device allocates an identifier of the terminal device to the terminal device.
具体地,所述终端设备的标识包括用于识别所述终端设备的标识以及之前归属的网络设备的标识。所述终端标识用于所述终端设备在无线链路失败后恢复连接使用,或者所述设备标识也可以用于所述终端设备在去激活态进行连接恢复时使用。Specifically, the identifier of the terminal device includes an identifier for identifying the terminal device and an identifier of a network device that is previously logged. The terminal identifier is used by the terminal device to resume connection after the radio link fails, or the device identifier may also be used when the terminal device performs connection recovery in the deactivated state.
在本申请提供的方案中,通过网络设备预先为终端设备配置终端设备的标识,使得当终端设备发现无线链路失败时,可以基于终端设备的标识,及时进行连接恢复。In the solution provided by the present application, the identifier of the terminal device is configured in advance by the network device, so that when the terminal device finds that the wireless link fails, the connection recovery can be performed in time based on the identifier of the terminal device.
结合第三方面,在第三方面的一种可能的实现方式中,所述通知消息中还包括密钥信息。所述通信方法还包括,终端设备使用所述密钥信息生成完整性保护信息,并向所述服务网络设备发送所述完整性保护信息。In conjunction with the third aspect, in a possible implementation manner of the third aspect, the notification message further includes key information. The communication method further includes the terminal device generating integrity protection information using the key information, and transmitting the integrity protection information to the serving network device.
具体地,可以结合所述密钥信息与终端设备的连接恢复信息,计算得到所述完整性保护信息。或者,可以结合所述密钥信息与所述终端设备的标识,计算得到所述完整性保护信息。Specifically, the integrity protection information may be calculated by combining the connection information of the key information with the terminal device. Alternatively, the integrity protection information may be calculated by combining the key information with the identifier of the terminal device.
在本申请提供的方案中,网络设备提前为终端设备配置密钥与终端设备的标识,能够使得终端设备发现无线链路失败时,及时、有效地进行连接恢复。In the solution provided by the present application, the network device configures the key and the identifier of the terminal device for the terminal device in advance, so that the terminal device can perform connection recovery in time and effectively when the wireless link fails.
第四方面提供一种终端设备,所述终端设备用于执行上述第一方面或第一方面的任一可能的实现方式中的通信方法。具体地,所述终端设备可以包括用于执行第一方面或第一方面的任一可能的实现方式中的通信方法的模块。A fourth aspect provides a terminal device, where the terminal device is configured to perform the communication method in the foregoing first aspect or any possible implementation manner of the first aspect. In particular, the terminal device may comprise means for performing the communication method of the first aspect or any of the possible implementations of the first aspect.
第五方面提供一种终端设备,所述终端设备包括存储器和处理器,所述存储器用于存储指令,所述处理器用于执行所述存储器存储的指令,并且对所述存储器中存储的指令的执行使得所述处理器执行第一方面或第一方面的任一可能的实现方式中的方法。A fifth aspect provides a terminal device, the terminal device comprising a memory and a processor, the memory for storing an instruction, the processor for executing the instruction stored by the memory, and the instruction stored in the memory Executing the method of causing the processor to perform the first aspect or any of the possible implementations of the first aspect.
第六方面提供一种计算机可读存储介质,其上存储有计算机程序,所述程序被处理器执行时实现第一方面或第一方面的任一可能的实现方式中的方法。A sixth aspect provides a computer readable storage medium having stored thereon a computer program, the program being executed by a processor to implement the method of the first aspect or any of the possible implementations of the first aspect.
第七方面提供一种网络设备,所述网络设备用于执行上述第二方面或第二方面的任一可能的实现方式中的通信方法。具体地,所述网络设备可以包括用于执行第二方面或第二方面的任一可能的实现方式中的通信方法的模块。The seventh aspect provides a network device, where the network device is configured to perform the communication method in any of the foregoing possible implementation manners of the second aspect or the second aspect. In particular, the network device may comprise means for performing the communication method of the second aspect or any of the possible implementations of the second aspect.
第八方面提供一种网络设备,所述网络设备包括存储器和处理器,所述存储器用于存储指令,所述处理器用于执行所述存储器存储的指令,并且对所述存储器中存储的指令的执行使得所述处理器执行第二方面或第二方面的任一可能的实现方式中的方法。An eighth aspect provides a network device, the network device including a memory and a processor, the memory for storing instructions for executing the memory stored instructions, and for instructions stored in the memory Executing the method of causing the processor to perform the second aspect or any of the possible implementations of the second aspect.
第九方面提供一种计算机可读存储介质,其上存储有计算机程序,所述程序被处理器执行时实现第二方面或第二方面的任一可能的实现方式中的方法。种A ninth aspect provides a computer readable storage medium having stored thereon a computer program, the program being executed by a processor to implement the method of any of the possible implementations of the second aspect or the second aspect. Species
附图说明DRAWINGS
图1为本发明实施例的架构示意图。FIG. 1 is a schematic structural diagram of an embodiment of the present invention.
图2为本发明实施例提供的通信方法的示意性流程图。FIG. 2 is a schematic flowchart of a communication method according to an embodiment of the present invention.
图3为本发明实施例提供的通信方法的另一示意性流程图。FIG. 3 is another schematic flowchart of a communication method according to an embodiment of the present invention.
图4为本发明实施例提供的通信方法的再一示意性流程图。FIG. 4 is still another schematic flowchart of a communication method according to an embodiment of the present invention.
图5为本发明实施例提供的通信方法的再一示意性流程图。FIG. 5 is still another schematic flowchart of a communication method according to an embodiment of the present invention.
图6为本发明实施例提供的通信方法的再一示意性流程图。FIG. 6 is still another schematic flowchart of a communication method according to an embodiment of the present invention.
图7为本发明实施例提供的终端设备的示意性框图。FIG. 7 is a schematic block diagram of a terminal device according to an embodiment of the present invention.
图8为本发明实施例提供的终端设备的另一示意性框图。FIG. 8 is another schematic block diagram of a terminal device according to an embodiment of the present invention.
图9为本发明实施例提供的网络设备的示意性框图。FIG. 9 is a schematic block diagram of a network device according to an embodiment of the present invention.
图10为本发明实施例提供的网络设备的另一示意性框图。FIG. 10 is another schematic block diagram of a network device according to an embodiment of the present invention.
图11为本申请实施例提供的通信装置的示意性框图。FIG. 11 is a schematic block diagram of a communication apparatus according to an embodiment of the present application.
图12为本申请实施例提供的通信装置的另一示意性框图。FIG. 12 is another schematic block diagram of a communication apparatus according to an embodiment of the present application.
图13为本申请实施例提供的通信装置的再一示意性框图。FIG. 13 is still another schematic block diagram of a communication apparatus according to an embodiment of the present application.
具体实施方式detailed description
下面将结合附图,对本申请中的技术方案进行描述。The technical solutions in the present application will be described below with reference to the accompanying drawings.
应理解,本发明实施例的技术方案可以应用于长期演进(Long Term Evolution,LTE)架构,还可以应用于通用移动通信系统(Universal Mobile Telecommunications System,UMTS)陆地无线接入网(UMTS Terrestrial Radio Access Network,UTRAN)架构,或者全球移动通信系统(Global System for Mobile Communication,GSM)/增强型数据速率GSM演进(Enhanced Data Rate for GSM Evolution,EDGE)系统的无线接入网(GSM EDGE Radio  Access Network,GERAN)架构。在UTRAN架构或/GERAN架构中,MME的功能由服务通用分组无线业务(General Packet Radio Service,GPRS)支持节点(Serving GPRS Support,SGSN)完成,SGW\PGW的功能由网关GPRS支持节点(Gateway GPRS Support Node,GGSN)完成。本发明实施例的技术方案还可以应用于其他通信系统,例如公共陆地移动网络(Public Land Mobile Network,PLMN)系统,甚至未来的5G通信系统或5G之后的通信系统等,本发明实施例对此不作限定。It should be understood that the technical solution of the embodiment of the present invention can be applied to a Long Term Evolution (LTE) architecture, and can also be applied to a Universal Mobile Telecommunications System (UMTS) terrestrial radio access network (UMTS Terrestrial Radio Access). Network, UTRAN) architecture, or Global System for Mobile Communication (GSM)/Enhanced Data Rate for GSM Evolution (EDGE) system radio access network (GSM EDGE Radio Access Network, GERAN) architecture. In the UTRAN architecture or /GERAN architecture, the function of the MME is completed by Serving GPRS Support (SGSN), and the function of SGW\PGW is supported by the gateway GPRS support node (Gateway GPRS). Support Node, GGSN) is completed. The technical solution of the embodiment of the present invention can also be applied to other communication systems, such as a Public Land Mobile Network (PLMN) system, or even a future 5G communication system or a communication system after 5G, etc. Not limited.
本发明实施例涉及终端设备。终端设备可以为包含无线收发功能、且可以与网络设备配合为用户提供通讯服务的设备。具体地,终端设备可以指用户设备(User Equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。例如,终端设备可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,未来5G网络或5G之后的网络中的终端设备等,本发明实施例对此不作限定。Embodiments of the present invention relate to a terminal device. The terminal device may be a device that includes a wireless transceiver function and can cooperate with the network device to provide a communication service for the user. Specifically, the terminal device may refer to a user equipment (User Equipment, UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, a wireless communication device, User agent or user device. For example, the terminal device may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), with wireless The communication function of the handheld device, the computing device or other processing device connected to the wireless modem, the in-vehicle device, the wearable device, the terminal device in the network after the 5G network or the 5G, etc., are not limited in this embodiment of the present invention.
本发明实施例还涉及网络设备。网络设备可以是用于与终端设备进行通信的设备,例如,可以是GSM系统或CDMA中的基站(Base Transceiver Station,BTS),也可以是WCDMA系统中的基站(NodeB,NB),还可以是LTE系统中的演进型基站(Evolutional Node B,eNB或eNodeB),或者该网络设备可以为中继站、接入点、车载设备、可穿戴设备以及未来5G网络或5G之后的网络中的网络侧设备或未来演进的PLMN网络中的网络设备等。Embodiments of the present invention are also directed to network devices. The network device may be a device for communicating with the terminal device, for example, may be a base station (Base Transceiver Station, BTS) in the GSM system or CDMA, or may be a base station (NodeB, NB) in the WCDMA system, or may be An evolved base station (Evolutional Node B, eNB or eNodeB) in an LTE system, or the network device may be a relay station, an access point, an in-vehicle device, a wearable device, and a network side device in a network after a 5G network or a 5G or Network devices and the like in a future evolved PLMN network.
本发明实施例中涉及的网络设备也可称为无线接入网(Radio Access Network,RAN)设备。RAN设备与终端设备连接,用于接收终端设备的数据并发送给核心网设备。RAN设备在不同通信系统中对应不同的设备,例如,在2G系统中对应基站与基站控制器,在3G系统中对应基站与无线网络控制器(Radio Network Controller,RNC),在4G系统中对应演进型基站(Evolutional Node B,eNB),在5G系统中对应5G系统,如新无线接入系统(New Radio Access Technology,NR)中的接入网设备(例如gNB,CU,DU)。The network device involved in the embodiment of the present invention may also be referred to as a Radio Access Network (RAN) device. The RAN device is connected to the terminal device and is configured to receive data of the terminal device and send the data to the core network device. The RAN device corresponds to different devices in different communication systems, for example, a corresponding base station and a base station controller in a 2G system, and a corresponding base station and a radio network controller (RNC) in a 3G system, correspondingly evolved in a 4G system. An evolved Node B (eNB) corresponds to a 5G system in a 5G system, such as an access network device (eg, gNB, CU, DU) in a new Radio Access Technology (NR).
本发明实施例还涉及核心网(Core Network,CN)设备。CN设备在不同的通信系统中对应不同的设备,例如,在3G系统中对应服务GPRS支持节点(Serving GPRS Support Node,SGSN)或网关GPRS支持节点(Gateway GPRS Support Node,GGSN),在4G系统中对应移动管理实体(Mobility Management Entity,MME)或服务网关(Serving GateWay,S-GW),在5G系统中对应5G系统的核心网相关设备(例如NG-Core)。Embodiments of the present invention also relate to a Core Network (CN) device. The CN device corresponds to different devices in different communication systems, for example, a Serving GPRS Support Node (SGSN) or a Gateway GPRS Support Node (GGSN) in a 3G system, in a 4G system. Corresponding to the Mobility Management Entity (MME) or Serving GateWay (S-GW), the 5G system corresponds to the core network related equipment (for example, NG-Core) of the 5G system.
为了便于理解本申请,首先在此介绍本申请的描述中会引入的几个要素:In order to facilitate the understanding of the present application, several elements introduced in the description of the present application are first introduced herein:
连接(Connected)态,终端设备与无线接入网(Radio Access Network,RAN)设备之间建立了无线资源控制(Radio Resource Control,RRC)连接。当终端设备处于连接态时终端设备保存自身的上下文信息,可以执行基于RAN控制的小区切换。In the Connected state, a Radio Resource Control (RRC) connection is established between the terminal device and the Radio Access Network (RAN) device. When the terminal device is in the connected state, the terminal device saves its own context information, and can perform cell handover based on the RAN control.
空闲(Idle)态,终端设备与RAN设备之间没有RRC连接,且终端设备与RAN设备中不再保存上下文信息。当终端设备处于空闲态时终端设备释放自身的上下文信息,可以执行基于小区的重选。In the idle state, there is no RRC connection between the terminal device and the RAN device, and the context information is no longer saved in the terminal device and the RAN device. When the terminal device releases its own context information when the terminal device is in an idle state, cell-based reselection can be performed.
第三态,终端设备保存其自身的上下文信息并且可以执行基于小区的重选操作,同时, 终端设备的连接信息保存在锚点RAN设备,终端设备的连接信息包括终端设备的上下文信息以及核心网连接。在终端设备处于第三态时,终端设备保存一个锚点RAN设备配置的管理区域信息,终端设备移动出该管理区域信息对应的管理区域时需要通知锚点RAN设备。In a third state, the terminal device saves its own context information and can perform a cell-based reselection operation. Meanwhile, the connection information of the terminal device is saved in the anchor RAN device, and the connection information of the terminal device includes the context information of the terminal device and the core network. connection. When the terminal device is in the third state, the terminal device saves the management area information configured by the anchor RAN device, and the terminal device needs to notify the anchor RAN device when moving the management area corresponding to the management area information.
第三态还可以称为非激活态,轻连接(Light connection)态,挂起(Suspend)态,去激活态,低开销状态等。管理区域也可以叫做寻呼区(Paging Area),接入网位置跟踪区等。The third state may also be referred to as an inactive state, a light connection state, a Suspend state, a deactivated state, a low overhead state, and the like. The management area may also be called a paging area, an access network location tracking area, and the like.
在终端设备处于第三态时,可以通过恢复(Resume)消息恢复终端设备与RAN设备间的RRC连接,可选地,还可以恢复终端设备与RAN设备间的用于传输数据的数据无线承载(Data Radio Bearer,DRB)。该终端设备的S1接口会锚定在一个RAN设备(可以称之为锚点RAN设备),然后可以执行小区重选移动性,在一个预定的区域(如,称之为“基于RAN的寻呼区”,或“无线接入网区”)内移动时不需要通知锚点RAN设备,而一旦出了基于RAN的寻呼区,则需要向锚点RAN设备通知其位置,这个过程称为基于RAN的寻呼区更新(Paging Area Update)。本发明实施例中提及的“非激活态”只是用于描述这种状态,而非任何限定。When the terminal device is in the third state, the RRC connection between the terminal device and the RAN device may be restored by using a Resume message, and optionally, the data radio bearer for transmitting data between the terminal device and the RAN device may also be restored ( Data Radio Bearer, DRB). The S1 interface of the terminal device is anchored to a RAN device (which may be referred to as an anchor RAN device), and then cell reselection mobility may be performed in a predetermined area (eg, referred to as "RAN-based paging" There is no need to notify the anchor RAN device when moving within the zone, or "radio access zone", and once the RAN-based paging zone is out, the anchor RAN device needs to be notified of its location. This process is called RAN's paging area update (Paging Area Update). The "inactive state" referred to in the embodiments of the present invention is only for describing such a state, and is not limited thereto.
需要说明的是,本文中提及的以下术语:非激活态,锚点RAN设备,无线接入网区(或基于RAN的寻呼区)更新,仅为描述方便进行的区分,并不用来限制本发明实施例的范围。It should be noted that the following terms mentioned in this document: inactive state, anchor RAN device, radio access network area (or RAN-based paging area) update, are only for convenience of description, and are not used to limit The scope of the embodiments of the present invention.
上下文信息,RAN设备与终端设备建立RRC连接之后,RAN设备为终端设备分配上下文信息,RAN设备与终端设备基于上下文信息进行通信。Context information, after the RAN device establishes an RRC connection with the terminal device, the RAN device allocates context information to the terminal device, and the RAN device communicates with the terminal device based on the context information.
具体地,上下文信息包括终端设备的标识信息、终端设备的安全上下文信息、终端设备的签约信息、终端设备的无线承载的配置信息,逻辑信道信息,以及Network Slicing Info,Network Slicing Info中包含当前终端设备在哪些Network Slicing内注册,以及每个Network Slicing内的CP Function的地址,其中,终端设备的无线承载的配置信息包括以下至少一项:分组数据汇聚协议PDCP的配置参数,无线链路层控制协议RLC的配置参数,媒体接入控制MAC的配置参数和/或物理层PHY的配置参数,分组数据汇聚协议PDCP的变量、计数器和/或定时器的取值,无线链路层控制协议RLC的变量、计数器和/或定时器的取值,媒体接入控制MAC的变量、计数器和/或定时器的取值和/或物理层PHY的变量、计数器和/或定时器的取值,比如,PDCP包的COUNT,PDCP包的SN。Specifically, the context information includes identifier information of the terminal device, security context information of the terminal device, subscription information of the terminal device, configuration information of the radio bearer of the terminal device, logical channel information, and Network Slicing Info, and the current terminal is included in the Network Slicing Info. The network function of the device, and the address of the CP Function in each network Slicing, where the configuration information of the radio bearer of the terminal device includes at least one of the following: configuration parameters of the packet data convergence protocol PDCP, and radio link layer control Protocol RLC configuration parameters, media access control MAC configuration parameters and/or physical layer PHY configuration parameters, packet data convergence protocol PDCP variables, counters and/or timer values, radio link layer control protocol RLC The value of variables, counters, and/or timers, media access control MAC variables, counters and/or timer values, and/or physical layer PHY variables, counters, and/or timer values, for example, COUNT of the PDCP packet, SN of the PDCP packet.
终端设备的标识,表示能够唯一标识终端设备的标识,可以是由RAN设备为终端设备分配的标识,也可以为控制面设备(CP Function)为该终端设备分配的标识。The identifier of the terminal device indicates that the identifier of the terminal device can be uniquely identified, and may be an identifier allocated by the RAN device for the terminal device, or may be an identifier assigned by the control plane device (CP Function) to the terminal device.
图1为本发明实施例的系统架构示意图。终端设备110初始与第一网络设备120建立RRC连接,即终端设备110进入连接态。在连接态,第一网络设备120为终端设备110分配上下文信息。在连接态,终端设备基于RRC连接与第一网络设备120进行通信,例如通过第一网络设备120访问核心网140。然后,终端设备110断开与第一网络设备120的RRC连接,但保留终端设备110在第一网络设备120的上下文信息(即第一网络设备120为终端设备110分配的上下文信息),即终端设备110进入非激活态。在非激活态,终端设备110向第二网络设备130移动,当移动到第二网络设备130的小区内时,终端设备110基于之前保留的上下文信息,与第二网络设备130进行通信传输,例如通过第一网 络设备120访问核心网140。FIG. 1 is a schematic structural diagram of a system according to an embodiment of the present invention. The terminal device 110 initially establishes an RRC connection with the first network device 120, that is, the terminal device 110 enters a connected state. In the connected state, the first network device 120 assigns context information to the terminal device 110. In the connected state, the terminal device communicates with the first network device 120 based on the RRC connection, such as through the first network device 120. Then, the terminal device 110 disconnects the RRC connection with the first network device 120, but retains the context information of the terminal device 110 at the first network device 120 (ie, the context information that the first network device 120 allocates for the terminal device 110), that is, the terminal. Device 110 enters an inactive state. In the inactive state, the terminal device 110 moves to the second network device 130. When moving to the cell of the second network device 130, the terminal device 110 performs communication transmission with the second network device 130 based on the previously retained context information, for example. The core network 140 is accessed by the first network device 120.
图2为本发明实施例提供的通信方法200的示意性流程图。图2中描述的终端设备、第一网络设备、第二网络设备可以分别对应于图1中所示的终端设备110、第一网络设备120与第二网络设备130。如图2所示,该通信方法200包括:FIG. 2 is a schematic flowchart of a communication method 200 according to an embodiment of the present invention. The terminal device, the first network device, and the second network device described in FIG. 2 may correspond to the terminal device 110, the first network device 120, and the second network device 130 illustrated in FIG. 1, respectively. As shown in FIG. 2, the communication method 200 includes:
210,终端设备移动到第二网络设备的小区后,终端设备确定第二加密算法,第二加密算法为第二网络设备所支持的加密算法,终端设备处于保存终端设备在第一网络设备的上下文信息、且具有小区重选移动性的状态,第一网络设备不同于第二网络设备。210. After the terminal device moves to the cell of the second network device, the terminal device determines a second encryption algorithm, where the second encryption algorithm is an encryption algorithm supported by the second network device, and the terminal device is in a context of saving the terminal device in the first network device. Information, and having a state of cell reselection mobility, the first network device is different from the second network device.
具体地,终端设备所处的状态可以称为非激活态。Specifically, the state in which the terminal device is located may be referred to as an inactive state.
该第二加密算法为该第二网络设备所支持的加密算法指的是,第二网络设备能够解密使用该第二加密算法加密后的数据。The second encryption algorithm is an encryption algorithm supported by the second network device, and the second network device is capable of decrypting the data encrypted using the second encryption algorithm.
220,该终端设备向该第二网络设备发送使用该第二加密算法加密后的数据。220. The terminal device sends, to the second network device, data encrypted by using the second encryption algorithm.
具体地,该终端设备向第二网络设备发送的加密后的数据是使用密钥与该第二加密算法加密的。其中,该密钥可以是该第一网络配置给该终端设备使用的密钥。应理解,该第一网络设备为该终端设备配置该密钥后,在该终端设备配置的上下文信息(即该终端设备在该第一网络设备下的上下文信息)中包括该密钥。该第二网络设备可以通过向该第一网络设备请求该上下文信息,获取该密钥。Specifically, the encrypted data sent by the terminal device to the second network device is encrypted by using the second encryption algorithm. The key may be a key used by the first network to be used by the terminal device. It should be understood that after the first network device configures the key for the terminal device, the key information is configured in the context information configured by the terminal device, that is, the context information of the terminal device under the first network device. The second network device may acquire the key by requesting the context information from the first network device.
应理解,该终端设备在向该第二网络设备发送使用第二加密算法加密后的数据的同时,也会发送该终端设备的标识,该终端设备的标识用于该第二网络设备识别接收到的数据来自于哪个设备。It should be understood that, when the terminal device sends the data encrypted by using the second encryption algorithm to the second network device, the identifier of the terminal device is also sent, and the identifier of the terminal device is used by the second network device to identify the received Which data comes from which device.
具体地,该终端设备的标识包括用于识别该终端设备的标识。第二网络设备接收到该终端设备的标识后,能够获知接收到的数据来自于该终端设备。Specifically, the identifier of the terminal device includes an identifier for identifying the terminal device. After receiving the identifier of the terminal device, the second network device can learn that the received data is from the terminal device.
可选地,该终端设备的标识除了可以包括用于识别该终端设备的标识,还可以包括用于识别该第一网络设备的标识。第二网络设备接收到该终端设备的标识后,能够获知接收到的数据来自于该终端设备,还能够获知该终端设备之前归属的网络设备是该第一网络设备。Optionally, the identifier of the terminal device may include an identifier for identifying the terminal device, and may further include an identifier for identifying the first network device. After receiving the identifier of the terminal device, the second network device can learn that the received data is from the terminal device, and can also know that the network device to which the terminal device belongs before is the first network device.
进一步地,该终端设备的标识包括的用于识别该终端设备的标识具体可以是用于在该第一网络设备内识别该终端设备的标识。Further, the identifier of the terminal device that is used to identify the terminal device may specifically be an identifier for identifying the terminal device in the first network device.
具体地,该终端设备的标识可以是该第一网络设备为连接态下的终端设备分配的标识。Specifically, the identifier of the terminal device may be an identifier that is allocated by the first network device to the terminal device in the connected state.
230,该第二网络设备基于该第二加密算法,解密该终端设备发送的数据。230. The second network device decrypts data sent by the terminal device based on the second encryption algorithm.
具体地,该第二网络设备使用该加密算法对应的解密算法解密该数据。Specifically, the second network device decrypts the data by using a decryption algorithm corresponding to the encryption algorithm.
在步骤220中已经提及,终端发送的数据是使用密钥与第二加密算法加密的。该第二网络设备可以向该第一网络设备请求该终端设备的上下文信息,从而获取该密钥,进而可以基于该密钥与对应的解密算法解密终端设备发送的数据。It has already been mentioned in step 220 that the data transmitted by the terminal is encrypted using a key and a second encryption algorithm. The second network device may request the first network device for context information of the terminal device, thereby acquiring the key, and then decrypting the data sent by the terminal device based on the key and the corresponding decryption algorithm.
在本发明实施例中,非激活态的终端设备向新的网络设备(即第二网络设备)发送加密后的数据,该加密后的数据是使用该新的网络设备所支持的加密算法加密的。这样,可以保证该终端设备向该新的网络设备发送的数据能够被新的网络设备解密。因此,本发明实施例提供的方案,能够有效避免非激活态下的终端设备新接入的网络设备无法解密该终端设备发送的数据的问题,从而可以提高数据传输的有效性。In the embodiment of the present invention, the inactive terminal device sends the encrypted data to the new network device (ie, the second network device), and the encrypted data is encrypted by using an encryption algorithm supported by the new network device. . In this way, it can be ensured that the data transmitted by the terminal device to the new network device can be decrypted by the new network device. Therefore, the solution provided by the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
本发明实施例中的该终端设备为处于非激活下的终端设备。该终端设备进入非激活态的流程可以为:该终端设备接收第一网络设备发送的RRC挂起消息,该RRC挂起消息用于指示该终端设备进入非激活态;该终端设备接收到该RRC挂起消息后,保存该终端设备在该第一网络设备的上下文信息,可以向其他网络设备移动,并可以自主接入临近的小区。其中,该RRC挂起消息具体可以为RRC释放消息,RRC重配置消息或者RRC去激活消息。The terminal device in the embodiment of the present invention is a terminal device that is inactive. The process of the terminal device entering the inactive state may be: the terminal device receives an RRC suspension message sent by the first network device, where the RRC suspension message is used to indicate that the terminal device enters an inactive state; and the terminal device receives the RRC After the message is suspended, the context information of the terminal device in the first network device is saved, and the device can be moved to other network devices, and the neighboring cell can be autonomously accessed. The RRC suspension message may be an RRC release message, an RRC reconfiguration message or an RRC deactivation message.
具体地,在步骤210中,可选地,作为一种实施例,该终端设备确定第二加密算法,包括:该终端设备判断该第二网络设备是否支持第一加密算法,该第一加密算法为第一网络设备为终端设备配置的加密算法;当该终端设备判断该第二网络设备支持该第一加密算法时,将该第一加密算法确定为该第二加密算法。Specifically, in step 210, optionally, the terminal device determines the second encryption algorithm, where the terminal device determines whether the second network device supports the first encryption algorithm, and the first encryption algorithm An encryption algorithm configured for the first network device as the terminal device; when the terminal device determines that the second network device supports the first encryption algorithm, determining the first encryption algorithm as the second encryption algorithm.
可选地,该第一加密算法为第一网络设备配置的用于终端设备在与第一网络设备通信时使用的加密算法。Optionally, the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to use when communicating with the first network device.
可选地,该第一加密算法为第一网络设备配置的用于终端设备在该状态(即非激活态)下使用的加密算法。Optionally, the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to use in the state (ie, the inactive state).
具体地,终端设备从第一网络设备获取该第一加密算法。可选地,第一网络设备可以在配置终端设备进入非激活态之前,向终端设备发送该第一加密算法;也可以在配置终端设备进入非激活态的同时向终端设备发送该第一加密算法。例如,第一网络设备可以在用于配置终端设备进入非激活态的RRC挂起消息中携带该第一加密算法的信息;或者,可以在向终端设备发送RRC挂起消息之前,向终端设备发送该第一加密算法的信息。其中,该第一加密算法的信息指的是用于指示该第一加密算法的指示信息,该指示信息例如为该第一加密算法的编号或标识。例如,系统预定义多种加密算法,并为每种加密算法分别分配唯一的编号,在后续通信过程中,可以利用加密算法的编号来表示对应的加密算法。Specifically, the terminal device acquires the first encryption algorithm from the first network device. Optionally, the first network device may send the first encryption algorithm to the terminal device before configuring the terminal device to enter the inactive state; or send the first encryption algorithm to the terminal device while configuring the terminal device to enter the inactive state. . For example, the first network device may carry the information of the first encryption algorithm in the RRC suspend message for configuring the terminal device to enter the inactive state; or may send the information to the terminal device before sending the RRC suspension message to the terminal device. The information of the first encryption algorithm. The information of the first encryption algorithm refers to the indication information used to indicate the first encryption algorithm, and the indication information is, for example, a number or identifier of the first encryption algorithm. For example, the system pre-defines a plurality of encryption algorithms, and assigns a unique number to each encryption algorithm. In the subsequent communication process, the number of the encryption algorithm may be used to represent the corresponding encryption algorithm.
第二加密算法可能与第一加密算法相同,也有可能不同。具体地,当第二网络设备支持第一加密算法时,该第二加密算法可以直接是第一加密算法。当第二网络设备不支持第一加密算法时,该第二加密算法一定与第一加密算法不同。The second encryption algorithm may be the same as or different from the first encryption algorithm. Specifically, when the second network device supports the first encryption algorithm, the second encryption algorithm may be directly the first encryption algorithm. When the second network device does not support the first encryption algorithm, the second encryption algorithm must be different from the first encryption algorithm.
本文采用“第一加密算法”表示该终端设备之前归属的网络设备(即第一网络设备)为该终端设备配置的加密算法,仅用于在描述上与第二网络设备支持的第二加密算法作区分,并不限定本发明实施例的保护范围。The first encryption algorithm is used to indicate that the network device (that is, the first network device) that the terminal device belongs to is configured with an encryption algorithm for the terminal device, and is only used for describing the second encryption algorithm supported by the second network device. The scope of protection of the embodiments of the present invention is not limited.
具体地,当该终端设备判断该第二网络设备支持该第一加密算法时,将该第一加密算法确定为该第二加密算法。即在步骤220中,终端设备直接使用该第一加密算法对将要向第二网络设备发送的数据进行加密。Specifically, when the terminal device determines that the second network device supports the first encryption algorithm, determining the first encryption algorithm as the second encryption algorithm. That is, in step 220, the terminal device directly encrypts the data to be transmitted to the second network device using the first encryption algorithm.
具体地,当该终端设备判断该第二网络设备不支持该第一加密算法时,可以通过如下方式获取该第二加密算法:向该第二网络设备发送RRC连接恢复请求,该RRC连接恢复请求中包括该终端设备的标识;该第二网络设备接收到RRC连接恢复请求后,向该终端设备发送RRC连接恢复响应,该RRC连接恢复响应中包括用于指示该第二网络设备支持的加密算法的第二指示信息;该终端设备根据该第二指示信息,获取该第二加密算法。Specifically, when the terminal device determines that the second network device does not support the first encryption algorithm, the second encryption algorithm may be obtained by: sending an RRC connection recovery request to the second network device, where the RRC connection recovery request is The RRC connection recovery response is sent to the terminal device, where the second network device includes an RRC connection recovery request, and the RRC connection recovery response includes an encryption algorithm used to indicate that the second network device supports The second indication information; the terminal device acquires the second encryption algorithm according to the second indication information.
具体地,该第二指示信息例如可以是该第二网络设备支持的加密算法的编号或标识。换句话说,该终端社设备根据该第二指示信息可以获知该第二网络设备支持的加密算法具体是哪个加密算法。Specifically, the second indication information may be, for example, a number or identifier of an encryption algorithm supported by the second network device. In other words, the terminal device can learn, according to the second indication information, which encryption algorithm is supported by the encryption algorithm supported by the second network device.
在本发明实施例中,终端设备通过判断第二网络设备是否支持终端设备之前归属的第一网络设备配置的加密算法(即第一加密算法),确定出该第二网络设备所支持的加密算法,从而可以基于该第二网络设备所支持的加密算法向该第二网络设备发送加密后的数据,这样,可以保证该终端设备发送的数据能够被该第二网络设备解密。因此,本发明实施例提供的方案,能够有效避免非激活态下的终端设备新接入的网络设备无法解密该终端设备发送的数据的问题,从而可以提高数据传输的有效性。In the embodiment of the present invention, the terminal device determines an encryption algorithm supported by the second network device by determining whether the second network device supports an encryption algorithm configured by the first network device to which the terminal device belongs before, that is, the first encryption algorithm. Therefore, the encrypted data can be sent to the second network device based on an encryption algorithm supported by the second network device, so that data sent by the terminal device can be decrypted by the second network device. Therefore, the solution provided by the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
具体地,该终端设备可以采用多种不同的方式来判断该第二网络设备是否支持第一加密算法。Specifically, the terminal device can determine whether the second network device supports the first encryption algorithm in a plurality of different manners.
可选地,作为一种可选实施例,该终端设备判断该第二网络设备是否支持该第一加密算法,包括:该终端设备接收该第二网络设备发送的系统广播消息,该系统广播消息中包括用于指示该第二网络设备支持或不支持的加密算法的第一指示信息;该终端设备根据该第一指示信息,判断该第二网络设备是否支持该第一加密算法。Optionally, as an optional embodiment, the terminal device determines whether the second network device supports the first encryption algorithm, and the method includes: receiving, by the terminal device, a system broadcast message sent by the second network device, where the system broadcasts a message The first indication information is used to indicate an encryption algorithm supported or not supported by the second network device. The terminal device determines, according to the first indication information, whether the second network device supports the first encryption algorithm.
具体地,该第二网络设备向小区内的设备发送系统广播消息,该系统广播消息中包括用于指示该第二网络设备支持或不支持的加密算法的第一指示信息;处于非激活态的该终端设备移动到该第二网络设备的小区后,接收该第二网络设备的系统广播消息,然后,基于该第一指示信息可以获知该第二网络设备支持哪种或哪几种加密算法,或者不支持哪一种或哪几种加密算法,进而可以获知该第二网络设备是否支持该第一加密算法。Specifically, the second network device sends a system broadcast message to the device in the cell, where the system broadcast message includes first indication information for indicating an encryption algorithm supported or not supported by the second network device, and is in an inactive state. After the terminal device moves to the cell of the second network device, it receives the system broadcast message of the second network device, and then, based on the first indication information, can learn which type or encryption algorithms the second network device supports. Or which one or more encryption algorithms are not supported, and then it can be known whether the second network device supports the first encryption algorithm.
可选地,该第一指示信息可以为第二网络设备支持的加密算法的编号。Optionally, the first indication information may be a number of an encryption algorithm supported by the second network device.
例如,系统预定义10种加密算法,且分别为这10种加密算法定义编号为1-10。例如该第一指示信息为1,5,7,则表明该第二网络设备支持的加密算法为编号分别为1,5与7的加密算法。如果该第一加密算法的编号为1,则可知第二网络设备支持该第一加密算法;如果该第一加密算法的编号为9,则可知第二网络设备不支持该第一加密算法。For example, the system pre-defines 10 encryption algorithms, and the number of these 10 encryption algorithms is defined as 1-10. For example, if the first indication information is 1, 5, 7, the encryption algorithm supported by the second network device is an encryption algorithm numbered 1, 5, and 7. If the number of the first encryption algorithm is 1, it is known that the second network device supports the first encryption algorithm. If the number of the first encryption algorithm is 9, it is known that the second network device does not support the first encryption algorithm.
具体地,在本实施例中,当根据该系统广播消息中的第一指示信息判断该第二网络设备支持该第一加密算法时,直接利用该第一加密算法对向第二网络设备发送的数据进行加密。Specifically, in this embodiment, when it is determined that the second network device supports the first encryption algorithm according to the first indication information in the system broadcast message, directly using the first encryption algorithm to send to the second network device. The data is encrypted.
具体地,在本实施例中,当根据该系统广播消息中的第一指示信息判断该第二网络设备不支持该第一加密算法时,可以通过该第一指示信息获取该第二网络设备支持的加密算法,或者通过向第二网络设备发送RRC连接恢复请求来获取该第二网络设备支持的加密算法。Specifically, in this embodiment, when it is determined that the second network device does not support the first encryption algorithm according to the first indication information in the system broadcast message, the second network device support may be acquired by using the first indication information. The encryption algorithm or the encryption algorithm supported by the second network device is obtained by sending an RRC connection recovery request to the second network device.
例如,当该第一指示信息仅指示第二网络设备支持的一种加密算法时,可以直接将该第一指示信息所指示的加密算法确定为第二加密算法。For example, when the first indication information indicates only one encryption algorithm supported by the second network device, the encryption algorithm indicated by the first indication information may be directly determined as the second encryption algorithm.
例如,当该第一指示信息指示第二网络设备支持的多种加密算法时,由于终端设备并不知道第二网络设备当前使用的加密算法是哪种,因此,在这种情形下,终端设备可以向网络设备发送RRC连接恢复请求来获知第二网络设备当前使用的加密算法。具体地,终端设备向该第二网络设备发送RRC连接恢复请求,该RRC连接恢复请求中包括该终端设备的标识;该第二网络设备接收到RRC连接恢复请求后,向该终端设备发送RRC连接恢复响应,该RRC连接恢复响应中包括用于指示该第二网络设备当前使用的加密算法的第二指示信息;该终端设备根据该第二指示信息,获取该第二加密算法。For example, when the first indication information indicates multiple encryption algorithms supported by the second network device, since the terminal device does not know which encryption algorithm is currently used by the second network device, in this case, the terminal device The RRC connection recovery request may be sent to the network device to learn the encryption algorithm currently used by the second network device. Specifically, the terminal device sends an RRC connection recovery request to the second network device, where the RRC connection recovery request includes an identifier of the terminal device; after receiving the RRC connection recovery request, the second network device sends an RRC connection to the terminal device. Recovering the response, the RRC connection recovery response includes second indication information for indicating an encryption algorithm currently used by the second network device, and the terminal device acquires the second encryption algorithm according to the second indication information.
可选地,当该第一指示信息指示第二网络设备支持的多种加密算法时,虽然终端设备 并不知道第二网络设备当前使用的加密算法是哪种,但是第一指示信息所指示的多种加密算法均是第二网络设备所支持的加密算法。因此,终端设备可以选择该多种加密算法中的一种加密算法加密确定为该第二加密算法,并在向第二网络设备发送使用该第二加密算法加密的数据的同时还发送用于指示该第二加密算法的指示信息。对应地,第二网络设备可以根据该第二加密算法的指示信息,确定出用于对终端设备发送的数据进行解密的加密算法。Optionally, when the first indication information indicates multiple encryption algorithms supported by the second network device, although the terminal device does not know which encryption algorithm is currently used by the second network device, the first indication information indicates A plurality of encryption algorithms are encryption algorithms supported by the second network device. Therefore, the terminal device may select one of the multiple encryption algorithms to encrypt and determine the second encryption algorithm, and send the data encrypted by using the second encryption algorithm to the second network device. The indication information of the second encryption algorithm. Correspondingly, the second network device may determine, according to the indication information of the second encryption algorithm, an encryption algorithm used to decrypt data sent by the terminal device.
为了便于更好地理解本发明实施例提供的通信方法,下文结合图3详细描述一些具体实施例。图3为本发明实施例提供的通信方法300的示意性流程图,该通信方法300包括:In order to facilitate a better understanding of the communication method provided by the embodiment of the present invention, some specific embodiments are described in detail below with reference to FIG. 3. FIG. 3 is a schematic flowchart of a communication method 300 according to an embodiment of the present invention. The communication method 300 includes:
301,第一网络设备向终端设备发送RRC挂起消息。301. The first network device sends an RRC suspension message to the terminal device.
具体地,在接收到该RRC挂起消息之前,终端设备已经从第一网络设备获取到第一加密算法。或者,该RRC挂起消息中携带用于指示第一加密算法的信息,终端设备通过该RRC挂起消息,获知该第一加密算法。其中,具体地,该RRC挂起消息可以是RRC释放消息,RRC去激活消息或RRC重配置消息。Specifically, before receiving the RRC suspension message, the terminal device has obtained the first encryption algorithm from the first network device. Alternatively, the RRC suspend message carries information indicating the first encryption algorithm, and the terminal device learns the first encryption algorithm by using the RRC suspend message. Specifically, the RRC suspension message may be an RRC release message, an RRC deactivation message, or an RRC reconfiguration message.
可选地,该RRC挂起消息还可包括第一网络设备为该终端设备配置的终端设备的标识。Optionally, the RRC suspension message may further include an identifier of the terminal device configured by the first network device for the terminal device.
可选地,该RRC挂起消息还可包括第一网络设备为该终端设备配置的寻呼区域,终端设备在该寻呼区域内移动时,无需通知第一网络设备。该寻呼区域也可称为管理区域。Optionally, the RRC suspension message may further include a paging area configured by the first network device for the terminal device, and the terminal device does not need to notify the first network device when moving in the paging area. This paging area can also be referred to as a management area.
302,终端设备接收RRC挂起消息后,进入非激活态。302. After receiving the RRC suspension message, the terminal device enters an inactive state.
303,终端设备(非激活态的终端设备)移动到第二网络设备的小区后,接收第二网络设备的系统广播消息,该系统广播消息中包括用于指示第二网络设备支持的加密算法的指示信息。303. After the terminal device (the terminal device in the inactive state) moves to the cell of the second network device, receive a system broadcast message of the second network device, where the system broadcast message includes an encryption algorithm used to indicate that the second network device supports the encryption algorithm. Instructions.
304,终端设备基于该系统广播消息,判断第二网络设备是否支持第一加密算法,若是,转到步骤305,若否,转到步骤306。304. The terminal device determines, according to the system broadcast message, whether the second network device supports the first encryption algorithm. If yes, go to step 305, and if no, go to step 306.
305,终端设备向第二网络设备发送使用第一加密算法加密后的数据。305. The terminal device sends the data encrypted by using the first encryption algorithm to the second network device.
306,终端设备向第二网络设备发送RRC连接恢复请求,该RRC连接恢复请求中包括该终端设备的标识。306. The terminal device sends an RRC connection recovery request to the second network device, where the RRC connection recovery request includes an identifier of the terminal device.
307,第二网络设备接收RRC连接恢复请求后,向终端设备发送RRC连接恢复响应,该RRC连接恢复响应中包括用于指示第二网络设备支持的加密算法的信息。307. After receiving the RRC connection recovery request, the second network device sends an RRC connection recovery response to the terminal device, where the RRC connection recovery response includes information indicating an encryption algorithm supported by the second network device.
308,终端设备接收RRC连接恢复响应后,确定第二加密算法。308. After receiving the RRC connection recovery response, the terminal device determines the second encryption algorithm.
309,终端设备向第二网络设备发送使用第二加密算法加密的数据。309. The terminal device sends data encrypted by using a second encryption algorithm to the second network device.
可选地,第二网络设备的系统广播消息还包括用于指示第二网络设备当前使用的加密算法的信息。这种情形下,当在步骤304中,终端设备判断第二网络设备不支持第一加密算法时,可以根据系统广播消息中用于指示第二网络设备当前使用的加密算法的信息,将第二网络设备当前使用的加密算法确定为该第二加密算法。Optionally, the system broadcast message of the second network device further includes information indicating an encryption algorithm currently used by the second network device. In this case, when the terminal device determines in step 304 that the second network device does not support the first encryption algorithm, the second device may use the information in the system broadcast message to indicate the encryption algorithm currently used by the second network device. The encryption algorithm currently used by the network device is determined as the second encryption algorithm.
在本发明实施例中,第二网络设备通过向终端设备发送用于指示第二网络设备支持的加密算法的系统广播消息,使得终端设备能够判断第二网络设备是否支持第一网络设备为终端设备配置的加密算法(即第一加密算法),进而采用第二网络设备支持的加密算法向第二网络设备发送数据,这样,可以保证该终端设备发送的数据能够被该第二网络设备解密。因此,本发明实施例提供的方案,能够有效避免非激活态下的终端设备新接入的网络 设备无法解密该终端设备发送的数据的问题,从而可以提高数据传输的有效性。In the embodiment of the present invention, the second network device sends a system broadcast message indicating the encryption algorithm supported by the second network device to the terminal device, so that the terminal device can determine whether the second network device supports the first network device as the terminal device. The configured encryption algorithm (ie, the first encryption algorithm) further transmits data to the second network device by using an encryption algorithm supported by the second network device, so that data transmitted by the terminal device can be decrypted by the second network device. Therefore, the solution provided by the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
可选地,作为另一种可选实施例,该通信方法200还包括:该终端设备接收该第一网络设备发送的小区加密算法信息,该小区加密算法信息用于指示该第一网络设备的管理区域内的各个小区的加密算法相关信息;该终端设备判断该第二网络设备是否支持该第一加密算法,包括:当确定当前归属的该第二网络设备的小区在该管理区域内时,该终端设备根据该小区加密算法信息,判断该第二网络设备是否支持该第一加密算法。Optionally, in another optional embodiment, the communications method 200 further includes: receiving, by the terminal device, cell encryption algorithm information sent by the first network device, where the cell encryption algorithm information is used to indicate the first network device The information about the encryption algorithm of each cell in the management area; the terminal device determines whether the second network device supports the first encryption algorithm, and includes: when determining that the cell of the second network device that is currently in the home zone is in the management area, The terminal device determines, according to the cell encryption algorithm information, whether the second network device supports the first encryption algorithm.
具体地,终端设备在进入非激活态之前或同时,接收该第一网络设备发送的小区加密算法信息。该小区加密算法信息用于指示该第一网络设备的管理区域内的各个小区的加密算法相关信息。Specifically, the terminal device receives the cell encryption algorithm information sent by the first network device before or at the same time as entering the inactive state. The cell encryption algorithm information is used to indicate encryption algorithm related information of each cell in the management area of the first network device.
其中,小区的加密算法相关信息可以是下列信息中的任一种或多种:小区支持的加密算法,小区不支持的加密算法,小区支持第一加密算法,小区不支持第一加密算法,通知终端设备进入小区后使用的加密算法。The information about the encryption algorithm of the cell may be any one or more of the following information: an encryption algorithm supported by the cell, an encryption algorithm not supported by the cell, a cell supporting the first encryption algorithm, and the cell does not support the first encryption algorithm, and the notification The encryption algorithm used by the terminal device after entering the cell.
其中,该管理区域可以是第一网络设备的寻呼区或接入网位置跟踪区,终端设备在该管理区域内移动时,无需通知第一网络设备,当移动出该管理区域时需要通知第一网络设备。The management area may be a paging area of the first network device or an access network location tracking area, and the terminal device does not need to notify the first network device when moving in the management area, and needs to notify the mobile device when moving out of the management area. A network device.
可选地,在本实施例中,当终端设备当前归属的该第二网络设备的小区在该管理区域内时,且根据该小区加密算法信息,判断该第二网络设备支持该第一加密算法时,直接将该第一加密算法确定为第二加密算法,即在后续数据发送过程中,直接使用第一加密算法对数据加密。Optionally, in this embodiment, when the cell of the second network device to which the terminal device belongs is located in the management area, and according to the cell encryption algorithm information, determining that the second network device supports the first encryption algorithm The first encryption algorithm is directly determined as the second encryption algorithm, that is, in the subsequent data transmission process, the data is directly encrypted using the first encryption algorithm.
可选地,在本实施例中,当终端设备当前归属的该第二网络设备的小区在该管理区域内时,且根据该小区加密算法信息,判断该第二网络设备不支持该第一加密算法时,可以通过向第二网络设备发送RRC连接恢复请求,来获取第二网络设备支持的第二加密算法;或者也可以根据该小区加密算法信息,获取该第二加密算法。Optionally, in this embodiment, when the cell of the second network device to which the terminal device belongs is located in the management area, and according to the cell encryption algorithm information, determining that the second network device does not support the first encryption In the algorithm, the second encryption algorithm supported by the second network device may be obtained by sending an RRC connection recovery request to the second network device; or the second encryption algorithm may be obtained according to the cell encryption algorithm information.
例如,终端设备向该第二网络设备发送RRC连接恢复请求,该RRC连接恢复请求中包括该终端设备的标识;该终端设备接收该第二网络设备发送的RRC连接恢复响应,该RRC连接恢复响应中包括用于指示该第二网络设备支持的加密算法的第二指示信息;该终端设备根据该第二指示信息,获取该第二加密算法。For example, the terminal device sends an RRC connection recovery request to the second network device, where the RRC connection recovery request includes an identifier of the terminal device, and the terminal device receives an RRC connection recovery response sent by the second network device, where the RRC connection resumes response. The second indication information is used to indicate an encryption algorithm supported by the second network device; the terminal device acquires the second encryption algorithm according to the second indication information.
再例如,终端设备基于该小区加密算法信息,获知当前归属的第二网络设备的小区所支持的加密算法,然后从中选择一种加密算法作为该第二加密算法。优选地,在向第二网络设备发送使用该第二加密算法加密后的数据的同时,可以向第二网络设备发送该第二加密算法的信息,例如,该第二加密算法的编号。For another example, the terminal device learns an encryption algorithm supported by a cell of the second network device that belongs to the current cell based on the cell encryption algorithm information, and then selects an encryption algorithm as the second encryption algorithm. Preferably, the information of the second encryption algorithm, for example, the number of the second encryption algorithm, may be sent to the second network device while the data encrypted by using the second encryption algorithm is sent to the second network device.
可选地,在本实施例中,当该终端设备确定当前归属的该第二网络设备的小区不在该管理区域内时,可以通过如下方式获取该第二网络设备支持的加密算法:向该第二网络设备发送RRC连接恢复请求,该RRC连接恢复请求中包括该终端设备的标识;该终端设备接收该第二网络设备发送的RRC连接恢复响应,该RRC连接恢复响应中包括用于指示该第二网络设备支持的加密算法的第二指示信息;该终端设备根据该第二指示信息,获取该第二加密算法。Optionally, in this embodiment, when the terminal device determines that the cell of the second network device that is currently in the home device is not in the management area, the encryption algorithm supported by the second network device may be obtained by: The second network device sends an RRC connection recovery request, where the RRC connection recovery request includes an identifier of the terminal device, and the terminal device receives an RRC connection recovery response sent by the second network device, where the RRC connection recovery response includes The second indication information of the encryption algorithm supported by the network device; the terminal device acquires the second encryption algorithm according to the second indication information.
为了便于更好地理解本发明实施例提供的通信方法,下文结合图4详细描述一些具体实施例。图4为本发明实施例提供的通信方法400的示意性流程图,该通信方法400包括:In order to facilitate a better understanding of the communication method provided by the embodiment of the present invention, some specific embodiments are described in detail below with reference to FIG. FIG. 4 is a schematic flowchart of a communication method 400 according to an embodiment of the present invention. The communication method 400 includes:
401,第一网络设备向终端设备发送RRC挂起消息,该RRC挂起消息用于指示终端设备进入非激活态,该RRC挂起消息中还包括小区加密算法信息,该小区加密算法信息用于指示该第一网络设备的管理区域内的各个小区的加密算法相关信息。401. The first network device sends an RRC suspension message to the terminal device, where the RRC suspension message is used to indicate that the terminal device enters an inactive state, where the RRC suspension message further includes cell encryption algorithm information, where the cell encryption algorithm information is used. Encryption algorithm related information indicating each cell in the management area of the first network device.
具体地,该加密算法相关信息可以是下列信息中的任一种或多种:小区支持的加密算法,小区不支持的加密算法,小区支持第一加密算法,小区不支持第一加密算法,通知终端设备进入小区后使用的加密算法。Specifically, the encryption algorithm related information may be any one or more of the following information: an encryption algorithm supported by the cell, an encryption algorithm not supported by the cell, a cell supporting the first encryption algorithm, and the cell does not support the first encryption algorithm, and the notification The encryption algorithm used by the terminal device after entering the cell.
可选地,第一网络设备也可以在发送该RRC挂起消息之前,向终端设备发送该小区加密算法信息。Optionally, the first network device may also send the cell encryption algorithm information to the terminal device before sending the RRC suspension message.
具体地,在接收到该RRC挂起消息之前,终端设备已经从第一网络设备获取到第一加密算法。或者,该RRC挂起消息中携带用于指示第一加密算法的信息,终端设备通过该RRC挂起消息,获知该第一加密算法。Specifically, before receiving the RRC suspension message, the terminal device has obtained the first encryption algorithm from the first network device. Alternatively, the RRC suspend message carries information indicating the first encryption algorithm, and the terminal device learns the first encryption algorithm by using the RRC suspend message.
可选地,该RRC挂起消息还可包括第一网络设备为该终端设备配置的终端设备的标识。Optionally, the RRC suspension message may further include an identifier of the terminal device configured by the first network device for the terminal device.
可选地,该RRC挂起消息还可包括第一网络设备为该终端设备配置的寻呼区域(即该管理区域),终端设备在该寻呼区域内移动时,无需通知第一网络设备。Optionally, the RRC suspension message may further include a paging area (ie, the management area) configured by the first network device for the terminal device, and the terminal device does not need to notify the first network device when moving in the paging area.
其中,具体地,该RRC挂起消息可以是RRC释放消息,RRC去激活消息或RRC重配置消息。Specifically, the RRC suspension message may be an RRC release message, an RRC deactivation message, or an RRC reconfiguration message.
402,终端设备接收RRC挂起消息后,进入非激活态。402. After receiving the RRC suspension message, the terminal device enters an inactive state.
403,终端设备(非激活态的终端设备)移动到第二网络设备的小区后,判断当前归属的第二网络设备的小区是否在该管理区域内,若是,转到步骤404,若否,转到步骤406。403. After the terminal device (inactive terminal device) moves to the cell of the second network device, determine whether the cell of the second network device that is currently in the current zone is in the management region, and if yes, go to step 404, if no, turn Go to step 406.
404,终端设备基于该小区加密算法信息,判断第二网络设备是否支持第一加密算法,若是,转到步骤405,若否,转到步骤406。404. The terminal device determines, according to the cell encryption algorithm information, whether the second network device supports the first encryption algorithm. If yes, go to step 405, and if no, go to step 406.
405,终端设备向第二网络设备发送使用第一加密算法加密后的数据。405. The terminal device sends the data encrypted by using the first encryption algorithm to the second network device.
406,终端设备向第二网络设备发送RRC连接恢复请求,该RRC连接恢复请求中包括该终端设备的标识。406. The terminal device sends an RRC connection recovery request to the second network device, where the RRC connection recovery request includes an identifier of the terminal device.
407,第二网络设备接收RRC连接恢复请求后,向终端设备发送RRC连接恢复响应,该RRC连接恢复响应中包括用于指示第二网络设备支持的加密算法。407. After receiving the RRC connection recovery request, the second network device sends an RRC connection recovery response to the terminal device, where the RRC connection recovery response includes an encryption algorithm used to indicate that the second network device supports.
408,终端设备接收RRC连接恢复响应后,确定第二加密算法。408. After receiving the RRC connection recovery response, the terminal device determines the second encryption algorithm.
409,终端设备向第二网络设备发送使用第二加密算法加密的数据。409. The terminal device sends data encrypted by using a second encryption algorithm to the second network device.
可选地,在步骤404中,若基于该小区加密算法信息,判断第二网络设备不支持第一加密算法的情况下,还可以基于该小区加密算法信息,确定该第二加密算法。具体地,首先通过该小区加密算法信息包括的各个小区的加密算法相关信息,获取到当前归属的第二网络设备的小区所支持的加密算法,然后从中选择一种加密算法作为该第二加密算法。在本实施例中,优选地,在向第二网络设备发送使用该第二加密算法加密后的数据的同时,可以向第二网络设备发送该第二加密算法的信息,例如,该第二加密算法的编号。Optionally, in step 404, if it is determined that the second network device does not support the first encryption algorithm based on the cell encryption algorithm information, the second encryption algorithm may be determined based on the cell encryption algorithm information. Specifically, the encryption algorithm supported by the cell of the second network device that belongs to the current network is obtained by using the encryption algorithm related information of each cell included in the cell encryption algorithm information, and then an encryption algorithm is selected as the second encryption algorithm. . In this embodiment, preferably, the information of the second encryption algorithm may be sent to the second network device, for example, the second encryption, while the data encrypted by using the second encryption algorithm is sent to the second network device. The number of the algorithm.
在本发明实施例中,终端设备通过获知第一网络设备的管理区域内的小区加密算法信息,使得终端设备能够判断第二网络设备是否支持第一网络设备为终端设备配置的加密算法(即第一加密算法),进而采用第二网络设备支持的加密算法向第二网络设备发送数据,这样,可以保证该终端设备发送的数据能够被该第二网络设备解密。因此,本发明实施例 提供的方案,能够有效避免非激活态下的终端设备新接入的网络设备无法解密该终端设备发送的数据的问题,从而可以提高数据传输的有效性。In the embodiment of the present invention, the terminal device is configured to determine whether the second network device supports the encryption algorithm configured by the first network device for the terminal device by using the cell encryption algorithm information in the management area of the first network device. An encryption algorithm) is further configured to send data to the second network device by using an encryption algorithm supported by the second network device, so that data transmitted by the terminal device can be decrypted by the second network device. Therefore, the solution provided by the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
在上文描述的某些实施例中,由终端设备判断第二网络设备是否支持终端设备当前使用的加密算法(即第一加密算法),然后根据判断结果,采用对应的手段获取第二网络设备支持的加密算法。本发明实施例并非限定于此,还可以由第二网络设备来判断第二网络设备是否支持终端设备当前使用的第一加密算法。In some embodiments described above, the terminal device determines whether the second network device supports the encryption algorithm currently used by the terminal device (ie, the first encryption algorithm), and then acquires the second network device by using corresponding means according to the determination result. Supported encryption algorithms. The embodiment of the present invention is not limited thereto, and the second network device may further determine whether the second network device supports the first encryption algorithm currently used by the terminal device.
具体地,在步骤210中,可选地,作为另一种实施例,该终端设备确定第二加密算法,包括:该终端设备向该第二网络设备发送第一消息,该第一消息包括该终端设备的标识,以及使用第一加密算法加密后的第一数据,该第一加密算法为第一网络设备为终端设备配置的加密算法;该第二网络设备接收该终端设备发送的第一消息后,基于该终端设备的标识,向该第一网络设备请求该终端设备的上下文信息;该第二网络设备根据该上下文信息,获取该第一加密算法;当该第二网络设备确定该第二网络设备不支持该第一加密算法时,向该终端设备发送加密算法更新命令,该加密算法更新命令用于指示将该第一加密算法更新为该第二加密算法;该终端设备根据该加密算法更新命令,获取该第二加密算法。Specifically, in step 210, optionally, the terminal device determines, according to another embodiment, the second encryption algorithm, that the terminal device sends the first message to the second network device, where the first message includes the An identifier of the terminal device, and the first data encrypted by using the first encryption algorithm, where the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device; and the second network device receives the first message sent by the terminal device And requesting, by the first network device, context information of the terminal device according to the identifier of the terminal device; the second network device acquiring the first encryption algorithm according to the context information; and when the second network device determines the second When the network device does not support the first encryption algorithm, sending an encryption algorithm update command to the terminal device, where the encryption algorithm update command is used to indicate that the first encryption algorithm is updated to the second encryption algorithm; and the terminal device is configured according to the encryption algorithm. Update the command to obtain the second encryption algorithm.
可选地,该第一加密算法为第一网络设备配置的用于终端设备在与第一网络设备通信时使用的加密算法。Optionally, the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to use when communicating with the first network device.
可选地,该第一加密算法为第一网络设备配置的用于终端设备在该状态(即非激活态)下使用的加密算法。Optionally, the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device to use in the state (ie, the inactive state).
具体地,终端设备从第一网络设备获取该第一加密算法。可选地,第一网络设备可以在配置终端设备进入非激活态之前,向终端设备发送该第一加密算法;也可以在配置终端设备进入非激活态的同时向终端设备发送该第一加密算法。例如,第一网络设备可以在用于配置终端设备进入非激活态的RRC挂起消息中携带该第一加密算法的信息;或者,可以在向终端设备发送RRC挂起消息之前,向终端设备发送该第一加密算法的信息。其中,该第一加密算法的信息指的是用于指示该第一加密算法的指示信息,该指示信息例如为该第一加密算法的编号或标识。例如,系统预定义多种加密算法,并为每种加密算法分别分配唯一的编号,在后续通信过程中,可以利用加密算法的编号来表示对应的加密算法。Specifically, the terminal device acquires the first encryption algorithm from the first network device. Optionally, the first network device may send the first encryption algorithm to the terminal device before configuring the terminal device to enter the inactive state; or send the first encryption algorithm to the terminal device while configuring the terminal device to enter the inactive state. . For example, the first network device may carry the information of the first encryption algorithm in the RRC suspend message for configuring the terminal device to enter the inactive state; or may send the information to the terminal device before sending the RRC suspension message to the terminal device. The information of the first encryption algorithm. The information of the first encryption algorithm refers to the indication information used to indicate the first encryption algorithm, and the indication information is, for example, a number or identifier of the first encryption algorithm. For example, the system pre-defines a plurality of encryption algorithms, and assigns a unique number to each encryption algorithm. In the subsequent communication process, the number of the encryption algorithm may be used to represent the corresponding encryption algorithm.
具体地,非激活态的终端设备移动到第二网络设备的小区后,如果需要发送数据时,向第二网络设备发送使用第一加密算法加密后的数据,同时还发送终端设备的标识;第二网络设备接收到终端设备发送到的加密数据后,根据该终端设备的标识向第一网络设备请求该终端设备的上下文信息,然后基于该上下文信息获得该第一加密算法,如果第二网络设备不支持该第一加密算法,则向终端设备发送加密算法更新命令,该加密算法更新命令用于指示将该第一加密算法更新为该第二加密算法,该第二加密算法可以为第二网络设备当前使用的加密算法;该终端设备根据该加密算法更新命令,获取该第二加密算法。Specifically, after the terminal device in the inactive state moves to the cell of the second network device, if data needs to be sent, the data encrypted by using the first encryption algorithm is sent to the second network device, and the identifier of the terminal device is also sent; After receiving the encrypted data sent by the terminal device, the network device requests the first network device according to the identifier of the terminal device, and then obtains the first encryption algorithm based on the context information, if the second network device If the first encryption algorithm is not supported, the encryption algorithm update command is sent to the terminal device, where the encryption algorithm update command is used to indicate that the first encryption algorithm is updated to the second encryption algorithm, and the second encryption algorithm may be the second network. An encryption algorithm currently used by the device; the terminal device obtains the second encryption algorithm according to the encryption algorithm update command.
应理解,在本实施例中,如果第二网络设备支持该第一加密算法时,则可以直接使用该第一加密算法对应的解密算法,解密终端设备发送的数据,而无非发送该加密算法更新命令了。It should be understood that, in this embodiment, if the second network device supports the first encryption algorithm, the decryption algorithm corresponding to the first encryption algorithm may be directly used to decrypt the data sent by the terminal device, and the encryption algorithm update is not sent. Ordered.
可选地,在本实施例中,当终端设备根据加密算法更新命令获取该第二加密算法后,可以向第二网络设备重发之前使用第一加密算法加密的第一数据,即步骤220中,该终端设备向该第二网络设备发送使用该第二加密算法加密后的数据为该第一数据。Optionally, in this embodiment, after the terminal device acquires the second encryption algorithm according to the encryption algorithm update command, the first data encrypted by using the first encryption algorithm may be retransmitted to the second network device, that is, in step 220. The terminal device sends the data encrypted by using the second encryption algorithm to the second network device as the first data.
优选地,在本实施例中,第二网络设备在向终端设备发送加密算法更新命令的同时或者之后,还可以向终端设备发送第三指示信息,该第三指示信息用于指示将使用该第一加密算法发送的数据进行重传;该终端设备根据该第三指示信息,向第二网络设备重发之前使用第一加密算法加密的第一数据。Preferably, in this embodiment, the second network device may further send, to the terminal device, third indication information, which is used to indicate that the first The data sent by an encryption algorithm is retransmitted; the terminal device retransmits the first data encrypted by the first encryption algorithm to the second network device according to the third indication information.
为了便于更好地理解本发明实施例提供的通信方法,下文结合图5详细描述一些具体实施例。图5为本发明实施例提供的通信方法500的示意性流程图,该通信方法500包括:In order to facilitate a better understanding of the communication method provided by the embodiment of the present invention, some specific embodiments are described in detail below with reference to FIG. 5. FIG. 5 is a schematic flowchart of a communication method 500 according to an embodiment of the present invention. The communication method 500 includes:
501,第一网络设备向终端设备发送RRC挂起消息。501. The first network device sends an RRC suspension message to the terminal device.
步骤501同步骤301,具体描述参见上文,这里不再赘述。Step 501 is the same as step 301. For details, refer to the above, and details are not described herein again.
502,终端设备接收RRC挂起消息后,进入非激活态。502. After receiving the RRC suspension message, the terminal device enters an inactive state.
503,终端设备(非激活态的终端设备)移动到第二网络设备的小区后,需要发送数据时,向第二网络设备发送第一消息,该第一消息包括终端设备的标识,以及使用第一加密算法加密后的第一数据。503. After the terminal device (the terminal device in the inactive state) moves to the cell of the second network device, when the data needs to be sent, the first message is sent to the second network device, where the first message includes the identifier of the terminal device, and the first The first data encrypted by an encryption algorithm.
504,第二网络设备接收到第一消息后,向第一网络设备发送终端设备的标识,用于请求终端设备的上下文信息。504. After receiving the first message, the second network device sends the identifier of the terminal device to the first network device, to request context information of the terminal device.
505,第一网络设备接收到终端设备的标识后,向第二网络设备发送终端设备的上下文信息。505. After receiving the identifier of the terminal device, the first network device sends the context information of the terminal device to the second network device.
506,第二网络设备根据终端设备的上下文信息,获取该第一加密算法,并判断是否支持该第一加密算法,若是,转到步骤507,若否,转到步骤509。506. The second network device acquires the first encryption algorithm according to the context information of the terminal device, and determines whether the first encryption algorithm is supported. If yes, go to step 507, and if no, go to step 509.
507,第二网络设备向该终端设备发送加密算法更新命令,该加密算法更新命令用于指示将该第一加密算法更新为该第二加密算法。507. The second network device sends an encryption algorithm update command to the terminal device, where the encryption algorithm update command is used to indicate that the first encryption algorithm is updated to the second encryption algorithm.
508,终端设备根据该加密算法更新命令,向第二网络设备发送使用第二加密算法加密后的数据。508. The terminal device sends, according to the encryption algorithm update command, the data encrypted by using the second encryption algorithm to the second network device.
可选地,终端设备使用第二加密算法,向第二网络设备重发之前使用第一加密算法加密后的数据,例如步骤503中发送的第一数据。Optionally, the terminal device uses the second encryption algorithm to retransmit the data encrypted by the first encryption algorithm to the second network device, for example, the first data sent in step 503.
可选地,在步骤507之后,或者在步骤507中,第二网络设备向该终端设备发送用于指示重发之前使用第一加密算法发送的数据。Optionally, after step 507, or in step 507, the second network device sends data to the terminal device for indicating transmission using the first encryption algorithm before retransmission.
509,第二网络设备使用第一加密算法对应的解密算法,解密终端设备发送的第一数据。509. The second network device decrypts the first data sent by the terminal device by using a decryption algorithm corresponding to the first encryption algorithm.
在本发明实施例中,第二网络设备在判断第二网络设备不支持终端设备当前使用的加密算法(即第一加密算法)时,通知终端设备将加密算法更新为第二网络设备支持的第二加密算法,这样,可以保证该终端设备发送的数据能够被该第二网络设备解密。因此,本发明实施例提供的方案,能够有效避免非激活态下的终端设备新接入的网络设备无法解密该终端设备发送的数据的问题,从而可以提高数据传输的有效性。In the embodiment of the present invention, when determining that the second network device does not support the encryption algorithm currently used by the terminal device, that is, the first encryption algorithm, the second network device notifies the terminal device to update the encryption algorithm to the second network device. The second encryption algorithm ensures that the data sent by the terminal device can be decrypted by the second network device. Therefore, the solution provided by the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
综上该,在本发明实施例中,非激活态的终端设备向新的网络设备(即第二网络设备)发送加密后的数据,该加密后的数据是使用该新的网络设备所支持的加密算法加密的。这样,可以保证该终端设备向该新的网络设备发送的数据能够被新的网络设备解密。因此,本发明实施例提供的方案,能够有效避免非激活态下的终端设备新接入的网络设备无法解密该终端设备发送的数据的问题,从而可以提高数据传输的有效性。In summary, in the embodiment of the present invention, the inactive terminal device sends the encrypted data to the new network device (ie, the second network device), and the encrypted data is supported by using the new network device. The encryption algorithm is encrypted. In this way, it can be ensured that the data transmitted by the terminal device to the new network device can be decrypted by the new network device. Therefore, the solution provided by the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
如图6所示,本发明实施例还提供一种通信方法600,该通信方法600包括:As shown in FIG. 6, the embodiment of the present invention further provides a communication method 600, where the communication method 600 includes:
610,第一网络设备向终端设备发送通知消息,该通知消息包括该终端设备的标识。610. The first network device sends a notification message to the terminal device, where the notification message includes an identifier of the terminal device.
可选地,该第一网络设备在与终端设备建立连接时,为该终端设备分配该终端设备的标识。Optionally, the first network device allocates the identifier of the terminal device to the terminal device when establishing a connection with the terminal device.
具体地,该第一网络设备为该终端设备建立RRC连接的同时,为终端设备分配终端设备的标识,并可以通过RRC连接建立消息向终端设备通知该终端设备的标识。即该通知消息为RRC连接建立消息。Specifically, the first network device allocates an identifier of the terminal device to the terminal device, and may notify the terminal device of the identifier of the terminal device by using an RRC connection setup message. That is, the notification message is an RRC connection setup message.
可选地,在该终端设备切换到该第一网络设备的小区时,该第一网络设备为该终端设备分配该终端设备的标识。Optionally, when the terminal device switches to the cell of the first network device, the first network device allocates the identifier of the terminal device to the terminal device.
具体地,在终端设备向第一网络设备切换时,该第一网络设备为终端设备分配该终端设备的标识,并通过切换命令向终端设备通知该终端设备的标识。即该通知消息为切换命令。Specifically, when the terminal device switches to the first network device, the first network device allocates the identifier of the terminal device to the terminal device, and notifies the terminal device of the identifier of the terminal device by using a handover command. That is, the notification message is a handover command.
具体地,该终端设备的标识包括用于识别该终端设备的标识以及之前归属的网络设备的标识。该终端标识用于该终端设备在无线链路失败后恢复连接使用,或者该设备标识也可以用于该终端设备在去激活态进行连接恢复时使用。Specifically, the identifier of the terminal device includes an identifier for identifying the terminal device and an identifier of the network device that is previously belonged. The terminal identifier is used by the terminal device to resume connection after the radio link fails, or the device identifier can also be used when the terminal device performs connection recovery in the deactivated state.
例如,在本实施例中,第一网络设备为终端设备分配的终端设备的标识,包括用于识别该终端设备的标识,还包括用于识别该第一网络设备的标识。进一步地,用于识别该终端设备的标识具体可以是用于在该第一网络设备内识别该终端设备的标识。For example, in this embodiment, the identifier of the terminal device that is allocated by the first network device to the terminal device includes an identifier for identifying the terminal device, and an identifier for identifying the first network device. Further, the identifier for identifying the terminal device may specifically be an identifier for identifying the terminal device within the first network device.
620,终端设备根据网络设备发送的通知消息,获取该终端设备的标识。620. The terminal device acquires an identifier of the terminal device according to the notification message sent by the network device.
630,当终端设备发现无线链路失败时,进行小区选择或者小区重选,确定当前服务小区。630. When the terminal device finds that the radio link fails, perform cell selection or cell reselection to determine the current serving cell.
具体地,该无线链路失败是指该终端设备与该网络设备的通讯链路发送故障,具体触发原因包括下列原因中的任一种或多种:Specifically, the failure of the radio link refers to that the communication link between the terminal device and the network device is faulty. The specific triggering cause includes any one or more of the following reasons:
该终端设备与该网络设备的通讯链路质量不满足阈值,或The quality of the communication link between the terminal device and the network device does not meet the threshold, or
该终端设备解密数据失败或者完整性校验失败,或者The terminal device fails to decrypt the data or the integrity check fails, or
该终端设备的无线链路层控制协议(Radio Link Control,RLC)实体产生故障。The Radio Link Control (RLC) entity of the terminal device generates a fault.
具体地,该当前服务小区可以是该网络设备的覆盖小区,也可以是其他网络设备的覆盖Specifically, the current serving cell may be a coverage cell of the network device, or may be an overlay of other network devices.
640,终端设备向该当前服务小区对应的第二网络设备发送连接恢复请求,该连接恢复请求中携带该终端设备的标识。640. The terminal device sends a connection recovery request to the second network device corresponding to the current serving cell, where the connection recovery request carries the identifier of the terminal device.
应理解,本发明实施例中的第二网络设备与第一网络设备可能相同,可能不同。It should be understood that the second network device in the embodiment of the present invention may be the same as the first network device, and may be different.
具体地,该第二网络设备可以根据该终端标识获知该终端之前归属的网络设备为第一网络设备,并向第一网络设备请求终端设备的上下文信息;第一网络设备向第二网络设备发送该终端设备的上下文信息;第二网络设备根据该终端设备的上下文信息为该终端设备恢复连接。Specifically, the second network device may learn, according to the terminal identifier, that the network device that the terminal belongs to is the first network device, and requests the first network device for the context information of the terminal device; the first network device sends the network device to the second network device. Context information of the terminal device; the second network device restores the connection for the terminal device according to the context information of the terminal device.
可选地,该连接恢复消息还携带连接恢复的原因,例如该原因为无线链路失败。Optionally, the connection recovery message further carries the reason for the connection recovery, for example, the radio link fails.
在本发明实施例中,通过网络设备预先为终端设备配置终端设备的标识,使得当终端设备发现无线链路失败时,可以基于终端设备的标识,及时进行连接恢复。In the embodiment of the present invention, the identifier of the terminal device is configured in advance by the network device, so that when the terminal device finds that the wireless link fails, the connection recovery may be performed in time based on the identifier of the terminal device.
可选地,作为一种可选实施例,在步骤610中,该通知消息中还包括密钥信息。该通信方法600还包括,终端设备使用该密钥信息生成完整性保护信息,并向该服务网络设备 发送该完整性保护信息。Optionally, as an optional embodiment, in step 610, the notification message further includes key information. The communication method 600 further includes the terminal device generating the integrity protection information using the key information and transmitting the integrity protection information to the serving network device.
具体地,可以结合该密钥信息与终端设备的连接恢复信息,计算得到该完整性保护信息。或者,可以结合该密钥信息与该终端设备的标识,计算得到该完整性保护信息。Specifically, the connection recovery information of the key information and the terminal device may be combined to calculate the integrity protection information. Alternatively, the integrity protection information may be calculated by combining the key information with the identifier of the terminal device.
在本发明实施例中,网络设备提前为终端设备配置密钥与终端设备的标识,能够使得终端设备发现无线链路失败时,及时、有效地进行连接恢复。In the embodiment of the present invention, the network device configures the key and the identifier of the terminal device for the terminal device in advance, so that the terminal device can perform connection recovery in time and effectively when the wireless link fails.
应理解,本发明实施例中提及的RRC连接恢复消息表示用于终端设备和网络设备恢复连接的消息,该消息的具体名称并不对本发明实施例的保护范围作限定。具体地,该RRC连接恢复消息还可以表示具有相似功能的消息,包括但不限定于:RRC连接激活消息,RRC连接重激活消息,或RRC连接重建立消息等。It should be understood that the RRC connection recovery message mentioned in the embodiment of the present invention indicates a message for the terminal device and the network device to resume the connection, and the specific name of the message does not limit the protection scope of the embodiment of the present invention. Specifically, the RRC connection recovery message may also represent a message with similar functions, including but not limited to: an RRC connection activation message, an RRC connection reactivation message, or an RRC connection re-establishment message.
上文描述了本发明实施例提供的通信方法,下文将描述本发明实施例提供的终端设备与网络设备。The communication method provided by the embodiment of the present invention is described above, and the terminal device and the network device provided by the embodiment of the present invention are described below.
图7为本发明实施例提供的终端设备700的示意性框图,终端设备700包括:FIG. 7 is a schematic block diagram of a terminal device 700 according to an embodiment of the present invention. The terminal device 700 includes:
处理模块710,用于在该终端设备移动到第二网络设备的小区后,确定第二加密算法,该第二加密算法为该第二网络设备所支持的加密算法,该终端设备处于保存该终端设备在第一网络设备的上下文信息、且具有小区重选移动性的状态,该第一网络设备不同于该第二网络设备;The processing module 710 is configured to determine, after the terminal device moves to the cell of the second network device, a second encryption algorithm, where the second encryption algorithm is an encryption algorithm supported by the second network device, where the terminal device is in the terminal a state in which the device is in the context information of the first network device and has cell reselection mobility, the first network device being different from the second network device;
收发模块720,用于向该第二网络设备发送使用该第二加密算法加密后的数据。The transceiver module 720 is configured to send data encrypted by using the second encryption algorithm to the second network device.
在本发明实施例中,非激活态的终端设备向新的网络设备(即第二网络设备)发送加密后的数据,所述加密后的数据是使用所述新的网络设备所支持的加密算法加密的。这样,可以保证所述终端设备向所述新的网络设备发送的数据能够被新的网络设备解密。因此,本发明实施例能够有效避免非激活态下的终端设备新接入的网络设备无法解密所述终端设备发送的数据的问题,从而可以提高数据传输的有效性。In the embodiment of the present invention, the inactive terminal device sends the encrypted data to the new network device (ie, the second network device), and the encrypted data is an encryption algorithm supported by the new network device. Encrypted. In this way, it can be ensured that the data sent by the terminal device to the new network device can be decrypted by the new network device. Therefore, the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
可选地,作为一个实施例,该处理模块710用于确定第二加密算法,包括:Optionally, as an embodiment, the processing module 710 is configured to determine a second encryption algorithm, including:
该处理模块710用于,判断该第二网络设备是否支持第一加密算法,该第一加密算法为该第一网络设备为该终端设备配置的加密算法;当该第二网络设备支持该第一加密算法时,将该第一加密算法确定为该第二加密算法。The processing module 710 is configured to determine whether the second network device supports the first encryption algorithm, where the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device; and when the second network device supports the first When the algorithm is encrypted, the first encryption algorithm is determined as the second encryption algorithm.
可选地,作为一个实施例,该收发模块720还用于,接收该第二网络设备发送的系统广播消息,该系统广播消息中包括用于指示该第二网络设备支持或不支持的加密算法的第一指示信息;Optionally, as an embodiment, the transceiver module 720 is further configured to receive a system broadcast message sent by the second network device, where the system broadcast message includes an encryption algorithm used to indicate that the second network device supports or does not support. First indication information;
该处理模块710用于判断该第二网络设备是否支持该第一加密算法,包括:The processing module 710 is configured to determine whether the second network device supports the first encryption algorithm, including:
该处理模块710用于,根据该第一指示信息,判断该第二网络设备是否支持该第一加密算法。The processing module 710 is configured to determine, according to the first indication information, whether the second network device supports the first encryption algorithm.
可选地,作为一个实施例,该收发模块720还用于,接收该第一网络设备发送的小区加密算法信息,该小区加密算法信息用于指示该第一网络设备的管理区域内的各个小区的加密算法相关信息;Optionally, as an embodiment, the transceiver module 720 is further configured to receive cell encryption algorithm information sent by the first network device, where the cell encryption algorithm information is used to indicate each cell in the management area of the first network device. Information about the encryption algorithm;
该处理模块710用于判断该第二网络设备是否支持该第一加密算法,包括:The processing module 710 is configured to determine whether the second network device supports the first encryption algorithm, including:
该处理模块710用于,当该第二网络设备的小区在该管理区域内时,根据该小区加密算法信息,判断该第二网络设备是否支持该第一加密算法。The processing module 710 is configured to determine, according to the cell encryption algorithm information, whether the second network device supports the first encryption algorithm when the cell of the second network device is in the management area.
可选地,作为一个实施例,该收发模块720还用于,当该第二网络设备不支持该第一 加密算法时,向该第二网络设备发送无线资源控制RRC连接恢复请求,该RRC连接恢复请求中包括该终端设备的标识;Optionally, as an embodiment, the transceiver module 720 is further configured to: when the second network device does not support the first encryption algorithm, send a radio resource control RRC connection recovery request to the second network device, where the RRC connection is The recovery request includes the identifier of the terminal device;
该收发模块720还用于,接收该第二网络设备发送的RRC连接恢复响应,该RRC连接恢复响应中包括用于指示该第二网络设备支持的加密算法的第二指示信息;The transceiver module 720 is further configured to receive an RRC connection recovery response that is sent by the second network device, where the RRC connection recovery response includes second indication information that is used to indicate an encryption algorithm supported by the second network device.
该处理模块710用于确定第二加密算法,包括:The processing module 710 is configured to determine a second encryption algorithm, including:
该处理模块710用于,根据该收发模块720接收的该第二指示信息,获取该第二加密算法。The processing module 710 is configured to acquire the second encryption algorithm according to the second indication information received by the transceiver module 720.
可选地,作为一个实施例,该系统广播消息中包括用于指示该第二网络设备支持的加密算法的该第一指示信息;Optionally, as an embodiment, the system broadcast message includes the first indication information used to indicate an encryption algorithm supported by the second network device;
该处理模块710用于确定第二加密算法,包括:The processing module 710 is configured to determine a second encryption algorithm, including:
该处理模块710用于,当该第二网络设备不支持该第一加密算法时,基于该第一指示信息指示的该第二网络设备支持的加密算法,获取该第二加密算法。The processing module 710 is configured to: when the second network device does not support the first encryption algorithm, obtain the second encryption algorithm based on an encryption algorithm supported by the second network device indicated by the first indication information.
可选地,作为一个实施例,该收发模块720还用于,当该第二网络设备的小区不在该管理区域内时,向该第二网络设备发送RRC连接恢复请求,该RRC连接恢复请求中包括该终端设备的标识;接收该第二网络设备发送的RRC连接恢复响应,该RRC连接恢复响应中包括用于指示该第二网络设备支持的加密算法的第二指示信息;Optionally, in an embodiment, the transceiver module 720 is further configured to: when the cell of the second network device is not in the management area, send an RRC connection recovery request to the second network device, where the RRC connection recovery request is And including an identifier of the terminal device, and receiving an RRC connection recovery response sent by the second network device, where the RRC connection recovery response includes second indication information for indicating an encryption algorithm supported by the second network device;
该处理模块710用于确定第二加密算法,包括:The processing module 710 is configured to determine a second encryption algorithm, including:
该处理模块710用于,根据该第二指示信息,获取该第二加密算法。The processing module 710 is configured to obtain the second encryption algorithm according to the second indication information.
可选地,作为一个实施例,该收发模块720还用于,向该第二网络设备发送第一消息,该第一消息包括该终端设备的标识,以及使用第一加密算法加密后的第一数据,该第一加密算法为该第一网络设备为该终端设备配置的加密算法;接收该第二网络设备发送的加密算法更新命令,该加密算法更新命令用于指示将该第一加密算法更新为该第二加密算法;Optionally, as an embodiment, the transceiver module 720 is further configured to send, to the second network device, a first message, where the first message includes an identifier of the terminal device, and the first encrypted by using a first encryption algorithm. Data, the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device; and an encryption algorithm update command sent by the second network device is received, where the encryption algorithm update command is used to indicate that the first encryption algorithm is updated. For the second encryption algorithm;
该处理模块710用于确定第二加密算法,包括:The processing module 710 is configured to determine a second encryption algorithm, including:
该处理模块710用于,根据该加密算法更新命令,获取该第二加密算法。The processing module 710 is configured to acquire the second encryption algorithm according to the encryption algorithm update command.
可选地,作为一个实施例,该终端设备向该第二网络设备发送的使用该第二加密算法加密的数据为该第一数据。Optionally, as an embodiment, the data that is sent by the terminal device to the second network device and encrypted by using the second encryption algorithm is the first data.
可选地,作为一个实施例,该收发模块720还用于,在向该第二网络设备发送使用该第二加密算法加密后的该第一数据之前,接收该第二网络设备发送的第三指示信息,该第三指示信息用于指示将使用该第一加密算法发送的数据进行重传。Optionally, as an embodiment, the transceiver module 720 is further configured to: before sending the first data encrypted by using the second encryption algorithm, send the third data sent by the second network device to the second network device. The indication information is used to indicate that the data sent by using the first encryption algorithm is retransmitted.
应理解,本发明实施例中的处理模块710可以由处理器或处理器相关电路组件实现,收发模块720可以由收发器或收发器相关电路组件实现。It should be understood that the processing module 710 in the embodiment of the present invention may be implemented by a processor or a processor related circuit component, and the transceiver module 720 may be implemented by a transceiver or a transceiver related circuit component.
如图8所示,本发明实施例还提供一种终端设备800,该终端设备800包括处理器810,存储器820与收发器830,其中,存储器820中存储指令或程序,处理器810用于执行存储器820中存储的指令或程序。存储器820中存储的指令或程序被执行时,该处理器810用于执行上述实施例中处理模块710执行的操作,收发器830用于执行上述实施例中收发模块720执行的操作。As shown in FIG. 8, the embodiment of the present invention further provides a terminal device 800, which includes a processor 810, a memory 820 and a transceiver 830, wherein the memory 820 stores instructions or programs, and the processor 810 is configured to execute An instruction or program stored in the memory 820. When an instruction or program stored in the memory 820 is executed, the processor 810 is configured to perform the operations performed by the processing module 710 in the above embodiment, and the transceiver 830 is configured to perform the operations performed by the transceiver module 720 in the above embodiment.
应理解,根据本发明实施例的终端设备700或终端设备800可对应于本发明实施例的通信方法200至500中的终端设备,并且终端设备700或终端设备800中的各个模块的操作和/或功能分别为了实现图2至图5中的各个方法的相应流程,为了简洁,在此不再赘 述。It should be understood that the terminal device 700 or the terminal device 800 according to the embodiment of the present invention may correspond to the terminal device in the communication methods 200 to 500 of the embodiment of the present invention, and the operation of each module in the terminal device 700 or the terminal device 800 and/or For the sake of brevity, the functions of the respective methods in FIG. 2 to FIG. 5 are not described here.
图9为本发明实施例提供的网络设备900的示意性流程图,该网络设备900包括:FIG. 9 is a schematic flowchart of a network device 900 according to an embodiment of the present disclosure. The network device 900 includes:
收发模块910,用于接收终端设备发送的使用第二加密算法加密后的数据,该第二加密算法为该网络设备所支持的加密算法,该终端设备处于保存该终端设备在第一网络设备的上下文信息、且具有小区重选移动性的状态,该第一网络设备不同于该网络设备;The transceiver module 910 is configured to receive data that is sent by the terminal device and is encrypted by using a second encryption algorithm, where the second encryption algorithm is an encryption algorithm supported by the network device, where the terminal device is in the first network device Context information, and having a state of cell reselection mobility, the first network device being different from the network device;
处理模块920,用于基于该第二加密算法,解密该终端设备发送的数据。The processing module 920 is configured to decrypt data sent by the terminal device based on the second encryption algorithm.
在本发明实施例中,非激活态的终端设备向新的网络设备(即第二网络设备)发送加密后的数据,所述加密后的数据是使用所述新的网络设备所支持的加密算法加密的。这样,可以保证所述终端设备向所述新的网络设备发送的数据能够被新的网络设备解密。因此,本发明实施例能够有效避免非激活态下的终端设备新接入的网络设备无法解密所述终端设备发送的数据的问题,从而可以提高数据传输的有效性。In the embodiment of the present invention, the inactive terminal device sends the encrypted data to the new network device (ie, the second network device), and the encrypted data is an encryption algorithm supported by the new network device. Encrypted. In this way, it can be ensured that the data sent by the terminal device to the new network device can be decrypted by the new network device. Therefore, the embodiment of the present invention can effectively avoid the problem that the network device newly accessed by the terminal device in the inactive state cannot decrypt the data sent by the terminal device, thereby improving the effectiveness of data transmission.
可选地,作为一个实施例,该收发模块910还用于,在接收该终端设备发送的使用第二加密算法加密后的数据之前,向该终端设备发送系统广播消息,该系统广播消息中包括用于指示该网络设备支持或不支持的加密算法的第一指示信息。Optionally, as an embodiment, the transceiver module 910 is further configured to: before receiving the data encrypted by the second encryption algorithm sent by the terminal device, send a system broadcast message to the terminal device, where the system broadcast message includes First indication information indicating an encryption algorithm supported or not supported by the network device.
可选地,作为一个实施例,该收发模块910还用于,在接收该终端设备发送的使用第二加密算法加密后的数据之前,接收该终端设备发送的无线资源控制RRC连接恢复请求,该RRC连接恢复请求中包括该终端设备的标识;Optionally, as an embodiment, the transceiver module 910 is further configured to: before receiving the data encrypted by the second encryption algorithm sent by the terminal device, receive a radio resource control RRC connection recovery request sent by the terminal device, where The RRC connection recovery request includes an identifier of the terminal device;
该收发模块910还用于,向该终端设备发送RRC连接恢复响应,该RRC连接恢复响应中包括用于指示该网络设备支持的加密算法的第二指示信息。The transceiver module 910 is further configured to send an RRC connection recovery response to the terminal device, where the RRC connection recovery response includes second indication information for indicating an encryption algorithm supported by the network device.
可选地,作为一个实施例,该收发模块910还用于,在接收该终端设备发送的使用第二加密算法加密后的数据之前,接收该终端设备发送的第一消息,该第一消息包括该终端设备的标识,以及使用第一加密算法加密后的第一数据,该第一加密算法为该第一网络设备为该终端设备配置的加密算法;Optionally, as an embodiment, the transceiver module 910 is further configured to: before receiving the data encrypted by the second encryption algorithm sent by the terminal device, receive the first message sent by the terminal device, where the first message includes An identifier of the terminal device, and the first data encrypted by using the first encryption algorithm, where the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device;
该处理模块920还用于,基于该收发模块910接收的该终端设备的标识,向该第一网络设备请求该终端设备的上下文信息;The processing module 920 is further configured to request context information of the terminal device from the first network device based on the identifier of the terminal device received by the transceiver module 910;
该处理模块920还用于,根据该上下文信息,获取该第一加密算法;The processing module 920 is further configured to: acquire the first encryption algorithm according to the context information;
该收发模块910还用于,当该网络设备不支持该第一加密算法时,该终端设备发送加密算法更新命令,该加密算法更新命令用于指示将该第一加密算法更新为该第二加密算法。The transceiver module 910 is further configured to: when the network device does not support the first encryption algorithm, the terminal device sends an encryption algorithm update command, where the encryption algorithm update command is used to indicate that the first encryption algorithm is updated to the second encryption algorithm.
可选地,作为一个实施例,该网络设备接收的该终端设备发送的使用该第二加密算法加密后的数据为该第一数据。Optionally, as an embodiment, the data that is sent by the terminal device and is encrypted by using the second encryption algorithm that is sent by the terminal device is the first data.
可选地,作为一个实施例,该收发模块910还用于,在接收终端设备发送的使用第二加密算法加密后的数据之前,向该终端设备发送第三指示信息,该第三指示信息用于指示将使用该第一加密算法发送的数据进行重传。Optionally, as an embodiment, the transceiver module 910 is further configured to send third indication information to the terminal device before receiving the data encrypted by the second encryption algorithm sent by the terminal device, where the third indication information is used by the terminal device Retransmitting the data indicated to be transmitted using the first encryption algorithm.
应理解,本发明实施例中的处理模块920可以由处理器或处理器相关电路组件实现,收发模块910可以由收发器或收发器相关电路组件实现。It should be understood that the processing module 920 in the embodiments of the present invention may be implemented by a processor or a processor related circuit component, and the transceiver module 910 may be implemented by a transceiver or a transceiver related circuit component.
如图10所示,本发明实施例还提供一种网络设备1000,该网络设备1000包括处理器1010,存储器1020与收发器1030,其中,存储器1020中存储指令或程序,处理器1010用于执行存储器1020中存储的指令或程序。存储器1020中存储的指令或程序被执行时, 该处理器1010用于执行上述实施例中处理模块920执行的操作,收发器1030用于执行上述实施例中收发模块910执行的操作。As shown in FIG. 10, an embodiment of the present invention further provides a network device 1000, which includes a processor 1010, a memory 1020, and a transceiver 1030. The memory 1020 stores instructions or programs, and the processor 1010 is configured to execute An instruction or program stored in the memory 1020. When the instructions or programs stored in the memory 1020 are executed, the processor 1010 is configured to perform the operations performed by the processing module 920 in the above embodiment, and the transceiver 1030 is configured to perform the operations performed by the transceiver module 910 in the above embodiment.
应理解,根据本发明实施例的网络设备900或网络设备1000可对应于本发明实施例的通信方法200至500中的网络设备,并且网络设备900或网络设备1000中的各个模块的操作和/或功能分别为了实现图2至图5中的各个方法的相应流程,为了简洁,在此不再赘述。It should be understood that the network device 900 or the network device 1000 according to the embodiment of the present invention may correspond to the network device in the communication methods 200 to 500 of the embodiment of the present invention, and the operation of each module in the network device 900 or the network device 1000 and/or For the sake of brevity, the functions of the respective methods in FIG. 2 to FIG. 5 are not described here.
本发明实施例还提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时可以实现上述方法实施例提供的通信方法200中与终端设备相关的流程。The embodiment of the present invention further provides a computer readable storage medium, on which a computer program is stored, and when the program is executed by the processor, the process related to the terminal device in the communication method 200 provided by the foregoing method embodiment may be implemented.
本发明实施例还提供计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时可以实现上述方法实施例提供的通信方法200中与第二网络设备相关的流程。The embodiment of the present invention further provides a computer readable storage medium, on which a computer program is stored, and when the program is executed by the processor, the process related to the second network device in the communication method 200 provided by the foregoing method embodiment may be implemented.
本发明实施例还提供一种终端设备,该终端设备包括:An embodiment of the present invention further provides a terminal device, where the terminal device includes:
收发模块,用于接收第一网络设备发送的通知消息,该通知消息包括该终端设备的标识;a transceiver module, configured to receive a notification message sent by the first network device, where the notification message includes an identifier of the terminal device;
处理模块,用于在发现无线链路失败时,进行小区选择或者小区重选,确定当前服务小区;a processing module, configured to perform cell selection or cell reselection when the radio link fails to be determined, and determine a current serving cell;
该收发模块还用于,向该当前服务小区对应的第二网络设备发送连接恢复请求,该连接恢复请求中携带该终端设备的标识。The transceiver module is further configured to send a connection recovery request to the second network device corresponding to the current serving cell, where the connection recovery request carries the identifier of the terminal device.
在本发明实施例中,通过网络设备预先为终端设备配置终端设备的标识,使得当终端设备发现无线链路失败时,可以基于终端设备的标识,及时进行连接恢复。In the embodiment of the present invention, the identifier of the terminal device is configured in advance by the network device, so that when the terminal device finds that the wireless link fails, the connection recovery may be performed in time based on the identifier of the terminal device.
可选地,作为一个实施例,该通知消息中还包括密钥信息;该处理模块还用于,使用该密钥信息生成完整性保护信息;该收发模块还用于,向该服务网络设备发送该完整性保护信息。Optionally, as an embodiment, the notification message further includes key information; the processing module is further configured to: use the key information to generate integrity protection information; the transceiver module is further configured to send to the serving network device This integrity protection information.
在本发明实施例中,网络设备提前为终端设备配置密钥与终端设备的标识,能够使得终端设备发现无线链路失败时,及时、有效地进行连接恢复。In the embodiment of the present invention, the network device configures the key and the identifier of the terminal device for the terminal device in advance, so that the terminal device can perform connection recovery in time and effectively when the wireless link fails.
应理解,上述实施例中的处理模块可以由处理器或处理器相关电路组件实现,收发模块可以由收发器或收发器相关电路组件实现。It should be understood that the processing modules in the above embodiments may be implemented by a processor or processor related circuit components, which may be implemented by transceivers or transceiver related circuit components.
还应理解,根据本发明实施例的终端设备可对应于本发明实施例的通信方法600中的终端设备,并且该终端设备中的各个模块的操作和/或功能分别为了实现图6中的相应流程,为了简洁,在此不再赘述。It should also be understood that the terminal device according to the embodiment of the present invention may correspond to the terminal device in the communication method 600 of the embodiment of the present invention, and the operations and/or functions of the respective modules in the terminal device are respectively implemented to implement the corresponding in FIG. 6 . The process, for the sake of brevity, will not be described here.
本发明实施例还提供一种网络设备,该网络设备包括:The embodiment of the invention further provides a network device, where the network device includes:
处理模块,用于确定终端设备的标识。A processing module is configured to determine an identifier of the terminal device.
收发模块,用于向该终端设备发送通知消息,该通知消息包括该终端设备的标识,以便于该终端设备在发现无线链路失败时,进行连接恢复。The transceiver module is configured to send a notification message to the terminal device, where the notification message includes an identifier of the terminal device, so that the terminal device performs connection recovery when the wireless link fails to be discovered.
在本发明实施例中,通过网络设备预先为终端设备配置终端设备的标识,使得当终端设备发现无线链路失败时,可以基于终端设备的标识,及时进行连接恢复。In the embodiment of the present invention, the identifier of the terminal device is configured in advance by the network device, so that when the terminal device finds that the wireless link fails, the connection recovery may be performed in time based on the identifier of the terminal device.
可选地,作为一个实施例,该通知消息中还包括密钥信息,以便于该终端设备根据该密钥信息生成完整性保护信息。Optionally, as an embodiment, the notification message further includes key information, so that the terminal device generates integrity protection information according to the key information.
应理解,上述实施例中的处理模块可以由处理器或处理器相关电路组件实现,收发模块可以由收发器或收发器相关电路组件实现。It should be understood that the processing modules in the above embodiments may be implemented by a processor or processor related circuit components, which may be implemented by transceivers or transceiver related circuit components.
还应理解,根据本发明实施例的网络设备可对应于本发明实施例的通信方法600中的网络设备,并且该网络设备中的各个模块的操作和/或功能分别为了实现图6中的相应流程,为了简洁,在此不再赘述。It should also be understood that the network device according to the embodiment of the present invention may correspond to the network device in the communication method 600 of the embodiment of the present invention, and the operations and/or functions of the respective modules in the network device are respectively implemented to implement the corresponding in FIG. 6 The process, for the sake of brevity, will not be described here.
本申请实施例还提供一种通信装置,该通信装置可以是终端设备也可以是电路。该通信装置可以用于执行上述方法实施例中由终端设备所执行的动作。The embodiment of the present application further provides a communication device, which may be a terminal device or a circuit. The communication device can be used to perform the actions performed by the terminal device in the above method embodiments.
当该通信装置为终端设备时,图11示出了一种简化的终端设备的结构示意图。便于理解和图示方便,图11中,终端设备以手机作为例子。如图11所示,终端设备包括处理器、存储器、射频电路、天线以及输入输出装置。处理器主要用于对通信协议以及通信数据进行处理,以及对终端设备进行控制,执行软件程序,处理软件程序的数据等。存储器主要用于存储软件程序和数据。射频电路主要用于基带信号与射频信号的转换以及对射频信号的处理。天线主要用于收发电磁波形式的射频信号。输入输出装置,例如触摸屏、显示屏,键盘等主要用于接收用户输入的数据以及对用户输出数据。需要说明的是,有些种类的终端设备可以不具有输入输出装置。When the communication device is a terminal device, FIG. 11 shows a schematic structural diagram of a simplified terminal device. For ease of understanding and illustration, in FIG. 11, the terminal device uses a mobile phone as an example. As shown in FIG. 11, the terminal device includes a processor, a memory, a radio frequency circuit, an antenna, and an input/output device. The processor is mainly used for processing communication protocols and communication data, and controlling terminal devices, executing software programs, processing data of software programs, and the like. Memory is primarily used to store software programs and data. The RF circuit is mainly used for the conversion of the baseband signal and the RF signal and the processing of the RF signal. The antenna is mainly used to transmit and receive RF signals in the form of electromagnetic waves. Input and output devices, such as touch screens, display screens, keyboards, etc., are primarily used to receive user input data and output data to the user. It should be noted that some types of terminal devices may not have input and output devices.
当需要发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到终端设备时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。为便于说明,图11中仅示出了一个存储器和处理器。在实际的终端设备产品中,可以存在一个或多个处理器和一个或多个存储器。存储器也可以称为存储介质或者存储设备等。存储器可以是独立于处理器设置,也可以是与处理器集成在一起,本申请实施例对此不做限制。When the data needs to be sent, the processor performs baseband processing on the data to be sent, and outputs the baseband signal to the radio frequency circuit. The radio frequency circuit performs radio frequency processing on the baseband signal, and then sends the radio frequency signal to the outside through the antenna in the form of electromagnetic waves. When data is transmitted to the terminal device, the RF circuit receives the RF signal through the antenna, converts the RF signal into a baseband signal, and outputs the baseband signal to the processor, which converts the baseband signal into data and processes the data. For ease of illustration, only one memory and processor are shown in FIG. In an actual terminal device product, there may be one or more processors and one or more memories. The memory may also be referred to as a storage medium or a storage device or the like. The memory may be independent of the processor, or may be integrated with the processor, which is not limited in this embodiment of the present application.
在本申请实施例中,可以将具有收发功能的天线和射频电路视为终端设备的收发单元,将具有处理功能的处理器视为终端设备的处理单元。如图11所示,终端设备包括收发单元1110和处理单元1120。收发单元也可以称为收发器、收发机、收发装置等。处理单元也可以称为处理器,处理单板,处理模块、处理装置等。可选的,可以将收发单元1110中用于实现接收功能的器件视为接收单元,将收发单元1110中用于实现发送功能的器件视为发送单元,即收发单元1110包括接收单元和发送单元。收发单元有时也可以称为收发机、收发器、或收发电路等。接收单元有时也可以称为接收机、接收器、或接收电路等。发送单元有时也可以称为发射机、发射器或者发射电路等。In the embodiment of the present application, the antenna and the radio frequency circuit having the transceiving function can be regarded as the transceiving unit of the terminal device, and the processor having the processing function is regarded as the processing unit of the terminal device. As shown in FIG. 11, the terminal device includes a transceiver unit 1110 and a processing unit 1120. The transceiver unit can also be referred to as a transceiver, a transceiver, a transceiver, and the like. The processing unit may also be referred to as a processor, a processing board, a processing module, a processing device, and the like. Optionally, the device for implementing the receiving function in the transceiver unit 1110 can be regarded as a receiving unit, and the device for implementing the sending function in the transceiver unit 1110 is regarded as a sending unit, that is, the transceiver unit 1110 includes a receiving unit and a sending unit. The transceiver unit may also be referred to as a transceiver, a transceiver, or a transceiver circuit. The receiving unit may also be referred to as a receiver, a receiver, or a receiving circuit or the like. The transmitting unit may also be referred to as a transmitter, a transmitter, or a transmitting circuit, and the like.
应理解,收发单元1110用于执行上述方法实施例中终端设备侧的发送操作和接收操作,处理单元1120用于执行上述方法实施例中终端设备上除了收发操作之外的其他操作。It should be understood that the transceiver unit 1110 is configured to perform the sending operation and the receiving operation on the terminal device side in the foregoing method embodiment, and the processing unit 1120 is configured to perform other operations on the terminal device except the transmitting and receiving operations in the foregoing method embodiment.
例如,在一种实现方式中,收发单元1110用于执行图2中的步骤220中终端设备侧的发送操作,和/或收发单元1110还用于执行本申请实施例中终端设备侧的其他收发步骤。处理单元1120,用于执行图2中的步骤210,和/或处理单元1120还用于执行本申请实施例中终端设备侧的其他处理步骤。For example, in an implementation manner, the transceiver unit 1110 is configured to perform a sending operation on the terminal device side in step 220 in FIG. 2, and/or the transceiver unit 1110 is further configured to perform other receiving and receiving on the terminal device side in the embodiment of the present application. step. The processing unit 1120 is configured to perform step 210 in FIG. 2, and/or the processing unit 1120 is further configured to perform other processing steps on the terminal device side in the embodiment of the present application.
再例如,在另一种实现方式中,收发单元1110用于执行图3中步骤301、步骤303与步骤307中终端设备侧的接收操作或步骤305、步骤306与步骤309中终端设备侧的发送操作,和/或收发单元1120还用于执行本申请实施例中终端设备侧的其他收发步骤。处理单元1120用于执行图3中的步骤302、步骤304、与步骤308,和/或处理单元1120还 用于执行本申请实施例中终端设备侧的其他处理步骤。For example, in another implementation manner, the transceiver unit 1110 is configured to perform the receiving operation on the terminal device side in step 301, step 303 and step 307 in FIG. 3 or the terminal device side in step 305, step 306 and step 309. The operation, and/or the transceiver unit 1120 is also used to perform other transceiving steps on the terminal device side in the embodiment of the present application. The processing unit 1120 is configured to perform step 302, step 304, and step 308 in FIG. 3, and/or the processing unit 1120 is further configured to perform other processing steps on the terminal device side in the embodiment of the present application.
又例如,在再一种实现方式中,收发单元1110用于执行图4中步骤401和步骤407中终端设备侧的接收操作或步骤407与步骤405、步骤406与步骤409中终端设备侧的发送操作,和/或收发单元1110还用于执行本申请实施例中终端设备侧的其他收发步骤。处理单元1120,用于执行图4中的步骤402、步骤403、步骤404、和步骤408,和/或处理单元1120还用于执行本申请实施例中终端设备侧的其他处理步骤。For example, in another implementation manner, the transceiver unit 1110 is configured to perform the receiving operation on the terminal device side in step 401 and step 407 in FIG. 4 or the sending on the terminal device side in step 405 and step 405, step 406 and step 409 in step 409. The operation, and/or the transceiver unit 1110 is further configured to perform other transceiver steps on the terminal device side in the embodiment of the present application. The processing unit 1120 is configured to perform step 402, step 403, step 404, and step 408 in FIG. 4, and/or the processing unit 1120 is further configured to perform other processing steps on the terminal device side in the embodiment of the present application.
又例如,在再一种实现方式中,收发单元1110用于执行图5中步骤501和步骤508中终端设备侧的接收操作或步骤503和步骤509中终端设备侧的发送操作,和/或收发单元1110还用于执行本申请实施例中终端设备侧的其他收发步骤。处理单元1120,用于执行图5中的步骤502,和/或处理单元1120还用于执行本申请实施例中终端设备侧的其他处理步骤。For another example, in another implementation manner, the transceiver unit 1110 is configured to perform the receiving operation on the terminal device side in step 501 and step 508 in FIG. 5 or the transmitting operation on the terminal device side in step 503 and step 509, and/or transmit and receive. The unit 1110 is further configured to perform other transmitting and receiving steps on the terminal device side in the embodiment of the present application. The processing unit 1120 is configured to perform step 502 in FIG. 5, and/or the processing unit 1120 is further configured to perform other processing steps on the terminal device side in the embodiment of the present application.
又例如,在再一种实现方式中,收发单元1110用于执行图6中步骤610中终端设备侧的接收操作或步骤640中终端设备侧的发送操作,和/或收发单元1110还用于执行本申请实施例中终端设备侧的其他收发步骤。处理单元1120,用于执行图6中的步骤620和步骤630,和/或处理单元1120还用于执行本申请实施例中终端设备侧的其他处理步骤。For example, in another implementation manner, the transceiver unit 1110 is configured to perform a receiving operation on the terminal device side in step 610 in FIG. 6 or a transmitting operation on the terminal device side in step 640, and/or the transceiver unit 1110 is further configured to perform Other steps of transmitting and receiving on the terminal device side in this embodiment of the present application. The processing unit 1120 is configured to perform step 620 and step 630 in FIG. 6, and/or the processing unit 1120 is further configured to perform other processing steps on the terminal device side in the embodiment of the present application.
当该通信装置为芯片时,该芯片包括收发单元和处理单元。其中,收发单元可以是输入输出电路、通信接口;处理单元为该芯片上集成的处理器或者微处理器或者集成电路。When the communication device is a chip, the chip includes a transceiver unit and a processing unit. The transceiver unit may be an input/output circuit and a communication interface; the processing unit is a processor or a microprocessor or an integrated circuit integrated on the chip.
本实施例中的通信装置为终端设备时,可以参照图12所示的设备。作为一个例子,该设备可以完成类似于图8中处理器810的功能。在图12中,该设备包括处理器1210,发送数据处理器1220,接收数据处理器1230。上述实施例中的处理模块710可以是图12中的该处理器1210,并完成相应的功能。上述实施例中的收发模块720可以是图12中的发送数据处理器1220,和/或接收数据处理器1230。虽然图12中示出了信道编码器、信道解码器,但是可以理解这些模块并不对本实施例构成限制性说明,仅是示意性的。When the communication device in this embodiment is a terminal device, the device shown in FIG. 12 can be referred to. As an example, the device can perform functions similar to processor 810 in FIG. In FIG. 12, the device includes a processor 1210, a transmit data processor 1220, and a receive data processor 1230. The processing module 710 in the above embodiment may be the processor 1210 in FIG. 12 and perform the corresponding functions. The transceiver module 720 in the above embodiment may be the transmit data processor 1220 in FIG. 12, and/or the receive data processor 1230. Although a channel coder and a channel decoder are shown in FIG. 12, it is to be understood that these modules are not intended to be limiting, and are merely illustrative.
图13示出本实施例的另一种形式。处理装置1300中包括调制子系统、中央处理子系统、周边子系统等模块。本实施例中的通信装置可以作为其中的调制子系统。具体的,该调制子系统可以包括处理器1303,接口1304。其中处理器1303完成上述处理模块710的功能,接口1304完成上述收发模块720的功能。作为另一种变形,该调制子系统包括存储器1306、处理器1303及存储在存储器1306上并可在处理器上运行的程序,该处理器1303执行该程序时实现上述方法实施例中终端设备侧的方法。需要注意的是,所述存储器1306可以是非易失性的,也可以是易失性的,其位置可以位于调制子系统内部,也可以位于处理装置1300中,只要该存储器1306可以连接到所述处理器1303即可。Fig. 13 shows another form of this embodiment. The processing device 1300 includes modules such as a modulation subsystem, a central processing subsystem, and a peripheral subsystem. The communication device in this embodiment can be used as a modulation subsystem therein. Specifically, the modulation subsystem may include a processor 1303, an interface 1304. The processor 1303 performs the functions of the foregoing processing module 710, and the interface 1304 performs the functions of the transceiver module 720. As another variation, the modulation subsystem includes a memory 1306, a processor 1303, and a program stored on the memory 1306 and executable on the processor, and the processor 1303 executes the program to implement the terminal device side in the above method embodiment. Methods. It should be noted that the memory 1306 may be non-volatile or volatile, and its location may be located inside the modulation subsystem or in the processing device 1300 as long as the memory 1306 can be connected to the The processor 1303 is sufficient.
作为本实施例的另一种形式,提供一种计算机可读存储介质,其上存储有指令,该指令被执行时执行上述方法实施例中终端设备侧的方法。As another form of the present embodiment, there is provided a computer readable storage medium having stored thereon an instruction for executing a method on a terminal device side in the above method embodiment when the instruction is executed.
作为本实施例的另一种形式,提供一种包含指令的计算机程序产品,该指令被执行时执行上述方法实施例中终端设备侧的方法。As another form of the embodiment, there is provided a computer program product comprising instructions which, when executed, perform the method on the terminal device side in the above method embodiment.
应理解,本发明实施例中提及的处理器可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、 分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be understood that the processor mentioned in the embodiment of the present invention may be a central processing unit (CPU), and may also be other general-purpose processors, digital signal processors (DSPs), and application specific integrated circuits ( Application Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. The general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
还应理解,本发明实施例中提及的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。It should also be understood that the memory referred to in the embodiments of the present invention may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory. The non-volatile memory may be a read-only memory (ROM), a programmable read only memory (PROM), an erasable programmable read only memory (Erasable PROM, EPROM), or an electric Erase programmable read only memory (EEPROM) or flash memory. The volatile memory can be a Random Access Memory (RAM) that acts as an external cache. By way of example and not limitation, many forms of RAM are available, such as static random access memory (SRAM), dynamic random access memory (DRAM), synchronous dynamic random access memory (Synchronous DRAM). SDRAM), Double Data Rate SDRAM (DDR SDRAM), Enhanced Synchronous Dynamic Random Access Memory (ESDRAM), Synchronous Connection Dynamic Random Access Memory (Synchlink DRAM, SLDRAM) ) and direct memory bus random access memory (DR RAM).
需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)集成在处理器中。It should be noted that when the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, the memory (storage module) is integrated in the processor.
应注意,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It should be noted that the memories described herein are intended to comprise, without being limited to, these and any other suitable types of memory.
还应理解,本文中涉及的第一、第二、第三、第四以及各种数字编号仅为描述方便进行的区分,并不用来限制本申请的范围。It is also to be understood that the reference to the first, second, third, fourth
应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。It should be understood that the term "and/or" herein is merely an association relationship describing an associated object, indicating that there may be three relationships, for example, A and/or B, which may indicate that A exists separately, and A and B exist simultaneously. There are three cases of B alone. In addition, the character "/" in this article generally indicates that the contextual object is an "or" relationship.
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本发明实施例的实施过程构成任何限定。It should be understood that, in various embodiments of the present application, the size of the serial numbers of the above processes does not mean the order of execution, and the order of execution of each process should be determined by its function and internal logic, and should not be taken to the embodiments of the present invention. The implementation process constitutes any limitation.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the various examples described in connection with the embodiments disclosed herein can be implemented in electronic hardware or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods to implement the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。A person skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the system, the device and the unit described above can refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the device embodiments described above are merely illustrative. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner, for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed. In addition, the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的 部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。The functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product. Based on such understanding, the technical solution of the present application, which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including The instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application. The foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。The foregoing is only a specific embodiment of the present application, but the scope of protection of the present application is not limited thereto, and any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed in the present application. It should be covered by the scope of protection of this application. Therefore, the scope of protection of the present application should be determined by the scope of the claims.

Claims (36)

  1. 一种终端设备,其特征在于,包括:A terminal device, comprising:
    处理模块,用于在所述终端设备移动到第二网络设备的小区后,确定第二加密算法,所述第二加密算法为所述第二网络设备所支持的加密算法,所述终端设备处于保存所述终端设备在第一网络设备的上下文信息、且具有小区重选移动性的状态,所述第一网络设备不同于所述第二网络设备;a processing module, configured to determine a second encryption algorithm after the terminal device moves to a cell of the second network device, where the second encryption algorithm is an encryption algorithm supported by the second network device, where the terminal device is located And saving the context information of the terminal device in the first network device, and having a state of cell reselection mobility, where the first network device is different from the second network device;
    收发模块,用于向所述第二网络设备发送使用所述第二加密算法加密后的数据。And a transceiver module, configured to send data encrypted by using the second encryption algorithm to the second network device.
  2. 根据权利要求1所述的终端设备,其特征在于,所述处理模块用于确定第二加密算法,包括:The terminal device according to claim 1, wherein the processing module is configured to determine a second encryption algorithm, including:
    所述处理模块用于,判断所述第二网络设备是否支持第一加密算法,所述第一加密算法为所述第一网络设备为所述终端设备配置的加密算法;当所述第二网络设备支持所述第一加密算法时,将所述第一加密算法确定为所述第二加密算法。The processing module is configured to determine whether the second network device supports a first encryption algorithm, where the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device; and when the second network is When the device supports the first encryption algorithm, the first encryption algorithm is determined as the second encryption algorithm.
  3. 根据权利要求2所述的终端设备,其特征在于,所述收发模块还用于,接收所述第二网络设备发送的系统广播消息,所述系统广播消息中包括用于指示所述第二网络设备支持或不支持的加密算法的第一指示信息;The terminal device according to claim 2, wherein the transceiver module is further configured to receive a system broadcast message sent by the second network device, where the system broadcast message includes a second network for indicating First indication information of an encryption algorithm supported or not supported by the device;
    所述处理模块用于判断所述第二网络设备是否支持所述第一加密算法,包括:The processing module is configured to determine whether the second network device supports the first encryption algorithm, including:
    所述处理模块用于,根据所述第一指示信息,判断所述第二网络设备是否支持所述第一加密算法。The processing module is configured to determine, according to the first indication information, whether the second network device supports the first encryption algorithm.
  4. 根据权利要求2所述的终端设备,其特征在于,所述收发模块还用于,接收所述第一网络设备发送的小区加密算法信息,所述小区加密算法信息用于指示所述第一网络设备的管理区域内的各个小区的加密算法相关信息;The terminal device according to claim 2, wherein the transceiver module is further configured to receive cell encryption algorithm information sent by the first network device, where the cell encryption algorithm information is used to indicate the first network Encryption algorithm related information of each cell in the management area of the device;
    所述处理模块用于判断所述第二网络设备是否支持所述第一加密算法,包括:The processing module is configured to determine whether the second network device supports the first encryption algorithm, including:
    所述处理模块用于,当所述第二网络设备的小区在所述管理区域内时,根据所述小区加密算法信息,判断所述第二网络设备是否支持所述第一加密算法。The processing module is configured to determine, according to the cell encryption algorithm information, whether the second network device supports the first encryption algorithm when the cell of the second network device is in the management area.
  5. 根据权利要求2至4中任一项所述的终端设备,其特征在于,所述收发模块还用于,当所述第二网络设备不支持所述第一加密算法时,向所述第二网络设备发送无线资源控制RRC连接恢复请求,所述RRC连接恢复请求中包括所述终端设备的标识;The terminal device according to any one of claims 2 to 4, wherein the transceiver module is further configured to: when the second network device does not support the first encryption algorithm, to the second device The network device sends a radio resource control RRC connection recovery request, where the RRC connection recovery request includes an identifier of the terminal device;
    所述收发模块还用于,接收所述第二网络设备发送的RRC连接恢复响应,所述RRC连接恢复响应中包括用于指示所述第二网络设备支持的加密算法的第二指示信息;The transceiver module is further configured to receive an RRC connection recovery response that is sent by the second network device, where the RRC connection recovery response includes second indication information that is used to indicate an encryption algorithm supported by the second network device.
    所述处理模块用于确定第二加密算法,包括:The processing module is configured to determine a second encryption algorithm, including:
    所述处理模块用于,根据所述收发模块接收的所述第二指示信息,获取所述第二加密算法。The processing module is configured to acquire the second encryption algorithm according to the second indication information received by the transceiver module.
  6. 根据权利要求3所述的终端设备,其特征在于,所述系统广播消息中包括用于指示所述第二网络设备支持的加密算法的所述第一指示信息;The terminal device according to claim 3, wherein the system broadcast message includes the first indication information for indicating an encryption algorithm supported by the second network device;
    所述处理模块用于确定第二加密算法,包括:The processing module is configured to determine a second encryption algorithm, including:
    所述处理模块用于,当所述第二网络设备不支持所述第一加密算法时,基于所述第一指示信息指示的所述第二网络设备支持的加密算法,获取所述第二加密算法。The processing module is configured to: when the second network device does not support the first encryption algorithm, acquire the second encryption based on an encryption algorithm supported by the second network device indicated by the first indication information algorithm.
  7. 根据权利要求4所述的终端设备,其特征在于,所述收发模块还用于,当所述第二网络设备的小区不在所述管理区域内时,向所述第二网络设备发送RRC连接恢复请求,所述RRC连接恢复请求中包括所述终端设备的标识;接收所述第二网络设备发送的RRC连接恢复响应,所述RRC连接恢复响应中包括用于指示所述第二网络设备支持的加密算法的第二指示信息;The terminal device according to claim 4, wherein the transceiver module is further configured to: when the cell of the second network device is not in the management area, send an RRC connection recovery to the second network device a request, the RRC connection recovery request includes an identifier of the terminal device, and an RRC connection recovery response sent by the second network device, where the RRC connection recovery response includes Second indication information of the encryption algorithm;
    所述处理模块用于确定第二加密算法,包括:The processing module is configured to determine a second encryption algorithm, including:
    所述处理模块用于,根据所述第二指示信息,获取所述第二加密算法。The processing module is configured to acquire the second encryption algorithm according to the second indication information.
  8. 根据权利要求1所述的终端设备,其特征在于,所述收发模块还用于,向所述第二网络设备发送第一消息,所述第一消息包括所述终端设备的标识,以及使用第一加密算法加密后的第一数据,所述第一加密算法为所述第一网络设备为所述终端设备配置的加密算法;接收所述第二网络设备发送的加密算法更新命令,所述加密算法更新命令用于指示将所述第一加密算法更新为所述第二加密算法;The terminal device according to claim 1, wherein the transceiver module is further configured to send a first message to the second network device, where the first message includes an identifier of the terminal device, and a first data encrypted by an encryption algorithm, where the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device; and an encryption algorithm update command sent by the second network device is received, the encryption An algorithm update command is used to indicate that the first encryption algorithm is updated to the second encryption algorithm;
    所述处理模块用于确定第二加密算法,包括:The processing module is configured to determine a second encryption algorithm, including:
    所述处理模块用于,根据所述加密算法更新命令,获取所述第二加密算法。The processing module is configured to acquire the second encryption algorithm according to the encryption algorithm update command.
  9. 根据权利要求8所述的终端设备,其特征在于,所述终端设备向所述第二网络设备发送的使用所述第二加密算法加密的数据为所述第一数据。The terminal device according to claim 8, wherein the data that is sent by the terminal device to the second network device and encrypted by using the second encryption algorithm is the first data.
  10. 根据权利要求9所述的终端设备,其特征在于,所述收发模块还用于,在向所述第二网络设备发送使用所述第二加密算法加密后的所述第一数据之前,接收所述第二网络设备发送的第三指示信息,所述第三指示信息用于指示将使用所述第一加密算法发送的数据进行重传。The terminal device according to claim 9, wherein the transceiver module is further configured to: before transmitting the first data encrypted by using the second encryption algorithm to the second network device, The third indication information sent by the second network device is used to indicate that the data sent by using the first encryption algorithm is retransmitted.
  11. 一种网络设备,其特征在于,包括:A network device, comprising:
    收发模块,用于接收终端设备发送的使用第二加密算法加密后的数据,所述第二加密算法为所述网络设备所支持的加密算法,所述终端设备处于保存所述终端设备在第一网络设备的上下文信息、且具有小区重选移动性的状态,所述第一网络设备不同于所述网络设备;a transceiver module, configured to receive data that is sent by the terminal device and that is encrypted by using a second encryption algorithm, where the second encryption algorithm is an encryption algorithm supported by the network device, and the terminal device is in the first Context information of the network device, and having a state of cell reselection mobility, the first network device being different from the network device;
    处理模块,用于基于所述第二加密算法,解密所述终端设备发送的数据。And a processing module, configured to decrypt data sent by the terminal device based on the second encryption algorithm.
  12. 根据权利要求11所述的网络设备,其特征在于,所述收发模块还用于,在接收所述终端设备发送的使用第二加密算法加密后的数据之前,向所述终端设备发送系统广播消息,所述系统广播消息中包括用于指示所述网络设备支持或不支持的加密算法的第一指示信息。The network device according to claim 11, wherein the transceiver module is further configured to: before receiving the data encrypted by the second encryption algorithm sent by the terminal device, send a system broadcast message to the terminal device. And the system broadcast message includes first indication information for indicating an encryption algorithm supported or not supported by the network device.
  13. 根据权利要求11所述的网络设备,其特征在于,所述收发模块还用于,在接收所述终端设备发送的使用第二加密算法加密后的数据之前,接收所述终端设备发送的无线资源控制RRC连接恢复请求,所述RRC连接恢复请求中包括所述终端设备的标识;The network device according to claim 11, wherein the transceiver module is further configured to: before receiving the data encrypted by the second encryption algorithm sent by the terminal device, receive the wireless resource sent by the terminal device Controlling an RRC connection recovery request, where the RRC connection recovery request includes an identifier of the terminal device;
    所述收发模块还用于,向所述终端设备发送RRC连接恢复响应,所述RRC连接恢复响应中包括用于指示所述网络设备支持的加密算法的第二指示信息。The transceiver module is further configured to send an RRC connection recovery response to the terminal device, where the RRC connection recovery response includes second indication information for indicating an encryption algorithm supported by the network device.
  14. 根据权利要求11所述的网络设备,其特征在于,所述收发模块还用于,在接收所述终端设备发送的使用第二加密算法加密后的数据之前,接收所述终端设备发送的第一消息,所述第一消息包括所述终端设备的标识,以及使用第一加密算法加密后的第一数据,所述第一加密算法为所述第一网络设备为所述终端设备配置的加密算法;The network device according to claim 11, wherein the transceiver module is further configured to: before receiving the data encrypted by the second encryption algorithm sent by the terminal device, receive the first sent by the terminal device a message, the first message includes an identifier of the terminal device, and first data encrypted by using a first encryption algorithm, where the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device ;
    所述处理模块还用于,基于所述收发模块接收的所述终端设备的标识,向所述第一网络设备请求所述终端设备的上下文信息;The processing module is further configured to request context information of the terminal device from the first network device based on the identifier of the terminal device received by the transceiver module;
    所述处理模块还用于,根据所述上下文信息,获取所述第一加密算法;The processing module is further configured to acquire the first encryption algorithm according to the context information;
    所述收发模块还用于,当所述网络设备不支持所述第一加密算法时,所述终端设备发送加密算法更新命令,所述加密算法更新命令用于指示将所述第一加密算法更新为所述第二加密算法。The transceiver module is further configured to: when the network device does not support the first encryption algorithm, the terminal device sends an encryption algorithm update command, where the encryption algorithm update command is used to indicate that the first encryption algorithm is updated. For the second encryption algorithm.
  15. 根据权利要求14所述的网络设备,其特征在于,所述网络设备接收的所述终端设备发送的使用所述第二加密算法加密后的数据为所述第一数据。The network device according to claim 14, wherein the data encrypted by the terminal device and transmitted by the terminal device using the second encryption algorithm is the first data.
  16. 根据权利要求15所述的网络设备,其特征在于,所述收发模块还用于,在接收终端设备发送的使用第二加密算法加密后的数据之前,向所述终端设备发送第三指示信息,所述第三指示信息用于指示将使用所述第一加密算法发送的数据进行重传。The network device according to claim 15, wherein the transceiver module is further configured to: before receiving the data encrypted by the second encryption algorithm sent by the terminal device, send the third indication information to the terminal device, The third indication information is used to indicate that the data sent by using the first encryption algorithm is retransmitted.
  17. 一种通信方法,其特征在于,包括:A communication method, comprising:
    终端设备移动到第二网络设备的小区后,所述终端设备确定第二加密算法,所述第二加密算法为所述第二网络设备所支持的加密算法,所述终端设备处于保存所述终端设备在第一网络设备的上下文信息、且具有小区重选移动性的状态,所述第一网络设备不同于所述第二网络设备;After the terminal device moves to the cell of the second network device, the terminal device determines a second encryption algorithm, the second encryption algorithm is an encryption algorithm supported by the second network device, and the terminal device is in the save the terminal a state in which the device is in context information of the first network device and has cell reselection mobility, the first network device being different from the second network device;
    所述终端设备向所述第二网络设备发送使用所述第二加密算法加密后的数据。The terminal device sends data encrypted by using the second encryption algorithm to the second network device.
  18. 根据权利要求17所述的通信方法,其特征在于,所述终端设备确定第二加密算法,包括:The communication method according to claim 17, wherein the terminal device determines the second encryption algorithm, including:
    所述终端设备判断所述第二网络设备是否支持第一加密算法,所述第一加密算法为所述第一网络设备为所述终端设备配置的加密算法;Determining, by the terminal device, whether the second network device supports the first encryption algorithm, where the first encryption algorithm is an encryption algorithm configured by the first network device for the terminal device;
    当所述第二网络设备支持所述第一加密算法时,所述终端设备将所述第一加密算法确定为所述第二加密算法。When the second network device supports the first encryption algorithm, the terminal device determines the first encryption algorithm as the second encryption algorithm.
  19. 根据权利要求18所述的通信方法,其特征在于,所述终端设备判断所述第二网络设备是否支持所述第一加密算法,包括:The communication method according to claim 18, wherein the determining, by the terminal device, whether the second network device supports the first encryption algorithm comprises:
    所述终端设备接收所述第二网络设备发送的系统广播消息,所述系统广播消息中包括用于指示所述第二网络设备支持或不支持的加密算法的第一指示信息;Receiving, by the terminal device, a system broadcast message sent by the second network device, where the system broadcast message includes first indication information for indicating an encryption algorithm supported or not supported by the second network device;
    所述终端设备根据所述第一指示信息,判断所述第二网络设备是否支持所述第一加密算法。The terminal device determines, according to the first indication information, whether the second network device supports the first encryption algorithm.
  20. 根据权利要求18所述的通信方法,其特征在于,所述通信方法还包括:The communication method according to claim 18, wherein the communication method further comprises:
    所述终端设备接收所述第一网络设备发送的小区加密算法信息,所述小区加密算法信息用于指示所述第一网络设备的管理区域内的各个小区的加密算法相关信息;The terminal device receives the cell encryption algorithm information sent by the first network device, where the cell encryption algorithm information is used to indicate encryption algorithm related information of each cell in the management area of the first network device;
    所述终端设备判断所述第二网络设备是否支持所述第一加密算法,包括:The determining, by the terminal device, whether the second network device supports the first encryption algorithm, includes:
    当所述第二网络设备的小区在所述管理区域内时,所述终端设备根据所述小区加密算法信息,判断所述第二网络设备是否支持所述第一加密算法。When the cell of the second network device is in the management area, the terminal device determines, according to the cell encryption algorithm information, whether the second network device supports the first encryption algorithm.
  21. 根据权利要求18至20中任一项所述的通信方法,其特征在于,所述终端设备确定第二加密算法,包括:The communication method according to any one of claims 18 to 20, wherein the terminal device determines the second encryption algorithm, including:
    当所述第二网络设备不支持所述第一加密算法时,所述终端设备向所述第二网络设备发送无线资源控制RRC连接恢复请求,所述RRC连接恢复请求中包括所述终端设备的标 识;When the second network device does not support the first encryption algorithm, the terminal device sends a radio resource control RRC connection recovery request to the second network device, where the RRC connection recovery request includes the terminal device Identification
    所述终端设备接收所述第二网络设备发送的RRC连接恢复响应,所述RRC连接恢复响应中包括用于指示所述第二网络设备支持的加密算法的第二指示信息;Receiving, by the terminal device, an RRC connection recovery response sent by the second network device, where the RRC connection recovery response includes second indication information for indicating an encryption algorithm supported by the second network device;
    所述终端设备根据所述第二指示信息,获取所述第二加密算法。The terminal device acquires the second encryption algorithm according to the second indication information.
  22. 根据权利要求19所述的通信方法,其特征在于,所述系统广播消息中包括用于指示所述第二网络设备支持的加密算法的所述第一指示信息;The communication method according to claim 19, wherein the system broadcast message includes the first indication information for indicating an encryption algorithm supported by the second network device;
    所述终端设备确定第二加密算法,包括:The terminal device determines a second encryption algorithm, including:
    当所述第二网络设备不支持所述第一加密算法时,所述终端设备基于所述第一指示信息指示的所述第二网络设备支持的加密算法,获取所述第二加密算法。When the second network device does not support the first encryption algorithm, the terminal device acquires the second encryption algorithm based on an encryption algorithm supported by the second network device indicated by the first indication information.
  23. 根据权利要求20所述的通信方法,其特征在于,所述终端设备确定第二加密算法,包括:The communication method according to claim 20, wherein the terminal device determines the second encryption algorithm, including:
    当所述第二网络设备的小区不在所述管理区域内时,所述终端设备向所述第二网络设备发送RRC连接恢复请求,所述RRC连接恢复请求中包括所述终端设备的标识;When the cell of the second network device is not in the management area, the terminal device sends an RRC connection recovery request to the second network device, where the RRC connection recovery request includes an identifier of the terminal device;
    所述终端设备接收所述第二网络设备发送的RRC连接恢复响应,所述RRC连接恢复响应中包括用于指示所述第二网络设备支持的加密算法的第二指示信息;Receiving, by the terminal device, an RRC connection recovery response sent by the second network device, where the RRC connection recovery response includes second indication information for indicating an encryption algorithm supported by the second network device;
    所述终端设备根据所述第二指示信息,获取所述第二加密算法。The terminal device acquires the second encryption algorithm according to the second indication information.
  24. 根据权利要求17所述的通信方法,其特征在于,所述终端设备确定第二加密算法,包括:The communication method according to claim 17, wherein the terminal device determines the second encryption algorithm, including:
    所述终端设备向所述第二网络设备发送第一消息,所述第一消息包括所述终端设备的标识,以及使用第一加密算法加密后的第一数据,所述第一加密算法为所述第一网络设备为所述终端设备配置的加密算法;Transmitting, by the terminal device, the first message to the second network device, where the first message includes an identifier of the terminal device, and first data encrypted by using a first encryption algorithm, where the first encryption algorithm is An encryption algorithm configured by the first network device for the terminal device;
    所述终端设备接收所述第二网络设备发送的加密算法更新命令,所述加密算法更新命令用于指示将所述第一加密算法更新为所述第二加密算法;Receiving, by the terminal device, an encryption algorithm update command sent by the second network device, where the encryption algorithm update command is used to indicate that the first encryption algorithm is updated to the second encryption algorithm;
    所述终端设备根据所述加密算法更新命令,获取所述第二加密算法。The terminal device acquires the second encryption algorithm according to the encryption algorithm update command.
  25. 根据权利要求24所述的通信方法,其特征在于,所述终端设备向所述第二网络设备发送的使用所述第二加密算法加密的数据为所述第一数据。The communication method according to claim 24, wherein the data transmitted by the terminal device to the second network device and encrypted by using the second encryption algorithm is the first data.
  26. 根据权利要求25所述的通信方法,其特征在于,在所述终端设备向所述第二网络设备发送使用所述第二加密算法加密后的所述第一数据之前,所述通信方法还包括:The communication method according to claim 25, wherein before the terminal device transmits the first data encrypted by using the second encryption algorithm to the second network device, the communication method further includes :
    所述终端设备接收所述第二网络设备发送的第三指示信息,所述第三指示信息用于指示将使用所述第一加密算法发送的数据进行重传。The terminal device receives third indication information that is sent by the second network device, where the third indication information is used to indicate that data sent by using the first encryption algorithm is retransmitted.
  27. 一种通信方法,其特征在于,包括:A communication method, comprising:
    第二网络设备接收终端设备发送的使用第二加密算法加密后的数据,所述第二加密算法为所述第二网络设备所支持的加密算法,所述终端设备处于保存所述终端设备在第一网络设备的上下文信息、且具有小区重选移动性的状态,所述第一网络设备不同于所述第二网络设备;The second network device receives the data encrypted by the terminal device and is encrypted by using the second encryption algorithm, where the second encryption algorithm is an encryption algorithm supported by the second network device, and the terminal device is in the storage of the terminal device. a context information of a network device, and having a state of cell reselection mobility, the first network device being different from the second network device;
    所述第二网络设备基于所述第二加密算法,解密所述终端设备发送的数据。The second network device decrypts data sent by the terminal device based on the second encryption algorithm.
  28. 根据权利要求27所述的通信方法,其特征在于,在所述第二网络设备接收终端设备发送的使用第二加密算法加密后的数据之前,所述通信方法还包括:The communication method according to claim 27, wherein before the second network device receives the data encrypted by the second encryption algorithm sent by the terminal device, the communication method further includes:
    所述第二网络设备向所述终端设备发送系统广播消息,所述系统广播消息中包括用于 指示所述第二网络设备支持或不支持的加密算法的第一指示信息。The second network device sends a system broadcast message to the terminal device, where the system broadcast message includes first indication information for indicating an encryption algorithm supported or not supported by the second network device.
  29. 根据权利要求27所述的通信方法,其特征在于,在所述第二网络设备接收终端设备发送的使用第二加密算法加密后的数据之前,所述通信方法还包括:The communication method according to claim 27, wherein before the second network device receives the data encrypted by the second encryption algorithm sent by the terminal device, the communication method further includes:
    所述第二网络设备接收所述终端设备发送的无线资源控制RRC连接恢复请求,所述RRC连接恢复请求中包括所述终端设备的标识;Receiving, by the second network device, a radio resource control RRC connection recovery request sent by the terminal device, where the RRC connection recovery request includes an identifier of the terminal device;
    所述第二网络设备向所述终端设备发送RRC连接恢复响应,所述RRC连接恢复响应中包括用于指示所述第二网络设备支持的加密算法的第二指示信息。The second network device sends an RRC connection recovery response to the terminal device, where the RRC connection recovery response includes second indication information for indicating an encryption algorithm supported by the second network device.
  30. 根据权利要求27所述的通信方法,其特征在于,在所述第二网络设备接收终端设备发送的使用第二加密算法加密后的数据之前,所述通信方法还包括:The communication method according to claim 27, wherein before the second network device receives the data encrypted by the second encryption algorithm sent by the terminal device, the communication method further includes:
    所述第二网络设备接收所述终端设备发送的第一消息,所述第一消息包括所述终端设备的标识,以及使用第一加密算法加密后的第一数据,所述第一加密算法为所述第一网络设备为所述终端设备配置的加密算法;Receiving, by the second network device, the first message sent by the terminal device, where the first message includes an identifier of the terminal device, and first data encrypted by using a first encryption algorithm, where the first encryption algorithm is The encryption algorithm configured by the first network device for the terminal device;
    所述第二网络设备基于所述终端设备的标识,向所述第一网络设备请求所述终端设备的上下文信息;The second network device requests context information of the terminal device from the first network device based on the identifier of the terminal device;
    所述第二网络设备根据所述上下文信息,获取所述第一加密算法;The second network device acquires the first encryption algorithm according to the context information;
    当所述第二网络设备不支持所述第一加密算法时,所述第二网络设备向所述终端设备发送加密算法更新命令,所述加密算法更新命令用于指示将所述第一加密算法更新为所述第二加密算法。When the second network device does not support the first encryption algorithm, the second network device sends an encryption algorithm update command to the terminal device, where the encryption algorithm update command is used to indicate that the first encryption algorithm is to be used. Updated to the second encryption algorithm.
  31. 根据权利要求30所述的通信方法,其特征在于,所述第二网络设备接收的所述终端设备发送的使用所述第二加密算法加密后的数据为所述第一数据。The communication method according to claim 30, wherein the data encrypted by the terminal device and transmitted by the second device using the second encryption algorithm is the first data.
  32. 根据权利要求31所述的通信方法,其特征在于,在所述第二网络设备接收终端设备发送的使用第二加密算法加密后的数据之前,所述通信方法还包括:The communication method according to claim 31, wherein before the second network device receives the data encrypted by the second encryption algorithm sent by the terminal device, the communication method further includes:
    所述第二网络设备向所述终端设备发送第三指示信息,所述第三指示信息用于指示将使用所述第一加密算法发送的数据进行重传。The second network device sends third indication information to the terminal device, where the third indication information is used to indicate that data sent by using the first encryption algorithm is retransmitted.
  33. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述程序被处理器执行时实现如权利要求17至26中任一项所述的通信方法。A computer readable storage medium having stored thereon a computer program, wherein the program is executed by a processor to implement the communication method according to any one of claims 17 to 26.
  34. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述程序被处理器执行时实现如权利要求27至32中任一项所述的通信方法。A computer readable storage medium having stored thereon a computer program, wherein the program is executed by a processor to implement the communication method according to any one of claims 27 to 32.
  35. 一种通信装置,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序,其特征在于,所述处理器执行所述程序时实现权利要求17至26中任一项所述的通信方法。A communication device comprising a memory, a processor, and a program stored on the memory and operable on the processor, wherein the processor executes the program to implement any of claims 17 to 26 A communication method as described.
  36. 一种通信装置,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的程序,其特征在于,所述处理器执行所述程序时实现权利要求27至32中任一项所述的通信方法。A communication device comprising a memory, a processor, and a program stored on the memory and operable on the processor, wherein the processor executes the program to implement any of claims 27 to 32 A communication method as described.
PCT/CN2018/083474 2017-04-18 2018-04-18 Communication method and device WO2018192513A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710253561.6 2017-04-18
CN201710253561.6A CN108738084B (en) 2017-04-18 2017-04-18 Communication method and device

Publications (1)

Publication Number Publication Date
WO2018192513A1 true WO2018192513A1 (en) 2018-10-25

Family

ID=63855598

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/083474 WO2018192513A1 (en) 2017-04-18 2018-04-18 Communication method and device

Country Status (2)

Country Link
CN (1) CN108738084B (en)
WO (1) WO2018192513A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094096A (en) * 2006-06-20 2007-12-26 华为技术有限公司 Mobility management method under architecture of talk network
CN101442714A (en) * 2007-11-20 2009-05-27 中兴通讯股份有限公司 Method and system for transferring MBMS context between e-Node B
CN101888684A (en) * 2009-05-14 2010-11-17 中兴通讯股份有限公司 Fast connection establishment method and system after reconstruction of radio resource control connection fails
CN104219787A (en) * 2014-09-10 2014-12-17 电信科学技术研究院 Wireless link recovery method and device
WO2017048170A1 (en) * 2015-09-14 2017-03-23 Telefonaktiebolaget Lm Ericsson (Publ) Radio access nodes and terminal devices in a communication network

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045713A (en) * 2009-10-15 2011-05-04 中兴通讯股份有限公司 Business connection reestablishment method and system
CN102857920A (en) * 2011-06-30 2013-01-02 重庆重邮信科通信技术有限公司 Processing method and device for downlink signal messages by terminal side of LTE (long term evolution) system
JP2014523672A (en) * 2011-07-11 2014-09-11 エルジー エレクトロニクス インコーポレイティド Traffic encryption key management for M2M multicast groups
WO2013169073A1 (en) * 2012-05-10 2013-11-14 Samsung Electronics Co., Ltd. Method and system for connectionless transmission during uplink and downlink of data packets
US9817720B2 (en) * 2012-10-29 2017-11-14 Nokia Solutions And Networks Oy Methods, apparatuses and computer program products enabling to improve handover security in mobile communication networks
CN106102105B (en) * 2016-06-15 2019-09-17 京信通信系统(中国)有限公司 A kind of method and device of switching within cell

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094096A (en) * 2006-06-20 2007-12-26 华为技术有限公司 Mobility management method under architecture of talk network
CN101442714A (en) * 2007-11-20 2009-05-27 中兴通讯股份有限公司 Method and system for transferring MBMS context between e-Node B
CN101888684A (en) * 2009-05-14 2010-11-17 中兴通讯股份有限公司 Fast connection establishment method and system after reconstruction of radio resource control connection fails
CN104219787A (en) * 2014-09-10 2014-12-17 电信科学技术研究院 Wireless link recovery method and device
WO2017048170A1 (en) * 2015-09-14 2017-03-23 Telefonaktiebolaget Lm Ericsson (Publ) Radio access nodes and terminal devices in a communication network

Also Published As

Publication number Publication date
CN108738084B (en) 2020-09-18
CN108738084A (en) 2018-11-02

Similar Documents

Publication Publication Date Title
WO2018171703A1 (en) Communication method and device
US11653199B2 (en) Multi-RAT access stratum security
EP3578001B1 (en) Radio resource control resume without context fetch
EP3684024B1 (en) Method, apparatus, and system for security protection
CN108029015B (en) Wireless access point and terminal device in communication network
US20220386184A1 (en) Mobility management method, terminal, and base station
US10470234B2 (en) Communication method, network-side device, and user equipment
JP6737903B2 (en) Storing UE context in RAN for inactive use
WO2017113264A1 (en) Communication method and device
EP3216310A1 (en) Methods and apparatus for dual connectivity management
US20190124506A1 (en) System and Method for Communicating with Provisioned Security Protection
US20220394802A1 (en) Re-establishment method and communication apparatus
US10708971B2 (en) Mobility management method, user equipment, storage node, and base station
US11582680B2 (en) Access control related method, base station, and user equipment
WO2018166338A1 (en) Key update method and apparatus
US11109441B2 (en) Connection release method and apparatus
WO2018192513A1 (en) Communication method and device
TW201840234A (en) Method for acquiring context configuration information, terminal equipment, and access network equipment
WO2022006719A1 (en) Wireless communication method, terminal device, and network device
WO2017166291A1 (en) Communication method, terminal, base station, and mobility management equipment
WO2023065156A1 (en) Wireless communication method, terminal device, and network device
WO2018058439A1 (en) Method, device and system for supporting data transmission

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18786963

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18786963

Country of ref document: EP

Kind code of ref document: A1