WO2019096171A1 - Method and apparatus for requesting recovery of connection - Google Patents

Method and apparatus for requesting recovery of connection Download PDF

Info

Publication number
WO2019096171A1
WO2019096171A1 PCT/CN2018/115477 CN2018115477W WO2019096171A1 WO 2019096171 A1 WO2019096171 A1 WO 2019096171A1 CN 2018115477 W CN2018115477 W CN 2018115477W WO 2019096171 A1 WO2019096171 A1 WO 2019096171A1
Authority
WO
WIPO (PCT)
Prior art keywords
base station
authentication code
source base
connection
terminal
Prior art date
Application number
PCT/CN2018/115477
Other languages
French (fr)
Chinese (zh)
Inventor
胡力
陈中平
李秉肇
陈璟
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2019096171A1 publication Critical patent/WO2019096171A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/19Connection re-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states

Definitions

  • the present application relates to the field of mobile communications technologies, and in particular, to a method and apparatus for requesting to restore a connection.
  • the suspend and resume process can be used for narrowband internet of things (NB-IoT) terminals, ie, IoT devices with low mobility or low power consumption.
  • NB-IoT narrowband internet of things
  • IoT devices with low mobility or low power consumption.
  • the terminal and the base station When the base station informs the terminal to release the current connection in a suspended manner, the terminal and the base station delete the context of the part of the access layer, and also retain the context of the part of the access layer, such as the access layer key, the security capability of the terminal, and the current Selected security algorithms, etc.
  • the terminal then enters an inactive state from the connected state. When the terminal wishes to resume the connection with the base station, it can quickly recover from the inactive state to the connected state.
  • the above service flow can be extended to apply the suspend and resume process to an enhanced mobile broadband (eMBB) terminal such as a smart phone.
  • eMBB enhanced mobile broadband
  • the base station to which the terminal is connected may change. Further, when the base station serves the terminal, a scenario of load balancing is considered. For example, when the terminal requests to recover from the inactive state to the connected state, if the load of the base station that the terminal currently wants to access is heavy, the base station will reject the access of the terminal, that is, reject the connection recovery request of the terminal. And sending the timer information to the terminal, the information of the timer is used to notify the terminal of the time of denying the access, and can also be understood as the minimum duration for waiting for the terminal to re-initiate the connection recovery request.
  • the attacker obtains the information of the timer sent by the base station to the terminal, the information of the timer may be tampered with. For example, if the attacker modifies the waiting time indicated by the timer information to a larger duration, the length of time for the terminal to re-initiate the connection recovery request is extended.
  • the present application provides a method and apparatus for requesting a recovery connection to solve the problem that the information of the timer is tampered with.
  • the present application provides a method for requesting to restore a connection, including: a terminal sending a connection recovery request message to a target base station, where the connection recovery request message is used to request to restore a radio resource control (RRC) connection;
  • RRC radio resource control
  • the terminal receives a connection recovery reject message and a message authentication code from the target base station, where the connection recovery reject message is used to indicate that the terminal is denied to restore the RRC connection, and the connection recovery reject message includes information of a timer.
  • the message authentication code is generated according to an integrity protection key of the source base station and information of the timer;
  • the terminal If the terminal verifies that the message authentication code is correct according to the information of the timer and the integrity protection key of the terminal, the terminal initiates a connection recovery request procedure according to the information of the timer.
  • the target base station generates the message authentication code according to the information of the timer, and the terminal checks the message authentication code before using the information of the timer. If the verification is correct, the information of the timer is not modified by the attacker. Therefore, the terminal initiates a connection recovery request process according to the information of the timer, so that the terminal can re-initiate the connection recovery request according to the information of the timer, thereby effectively avoiding the use of the timer of the timer falsified by the attacker.
  • the message authentication code is generated according to the integrity protection key of the source base station, the information of the timer, and the freshness parameter, and the message used by the message authentication code is generated twice. Sexual parameters are different.
  • the above method by introducing the freshness parameter, makes the message authentication code generated each time different, which can effectively solve the problem that the attacker continuously sends the same connection recovery rejection message to the terminal and causes the terminal to sleep all the time.
  • the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
  • the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate the freshness parameter.
  • the freshness parameter comprises a packet data convergence protocol count PDCP COUNT, the indication parameter comprising part or all of the bits of the PDCP COUNT.
  • the present application provides a method for requesting a connection to restore, comprising: receiving, by a source base station, information of a timer from a target base station; and the source base station protecting the density according to the information of the timer and the integrity of the source base station And generating a message authentication code, where the message authentication code is used for authenticity of the information that the terminal authenticates the timer; and the source base station sends the message authentication code to the target base station.
  • the source base station generates a message authentication code according to the information of the timer and the integrity protection key of the source base station, including: the source base station according to the information of the timer The integrity protection key and the freshness parameter of the source base station generate the message authentication code; wherein the freshness parameters used to generate the message authentication code twice are different.
  • the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
  • the source base station may further receive an indication parameter from the target base station, where the indication parameter is used to indicate the freshness parameter.
  • the freshness parameter may include a packet data convergence protocol count PDCP COUNT, the indication parameter including some or all of the bits of the PDCP COUNT.
  • the present application provides a method for requesting a connection to restore, comprising: receiving, by a source base station, a connection reject request message from a target base station, where the connection reject request message includes information of a timer, and the connection reject request message is used to indicate Rejecting the terminal to restore the radio resource control RRC connection; the source base station generates a message authentication code according to the connection reject request message and the integrity protection key of the source base station, where the message authentication code is used for the terminal authentication The validity of the information of the timer; the source base station sends the message authentication code to the target base station.
  • the source base station generates a message authentication code according to the connection reject request message and the integrity protection key of the source base station, including: the source base station according to the connection reject request message And the integrity protection key and the freshness parameter of the source base station generate a message authentication code; wherein the freshness parameters used to generate the message authentication code twice are different.
  • the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
  • the source base station receives an indication parameter from the target base station, where the indication parameter is used to indicate the freshness parameter.
  • the freshness parameter may include a packet data convergence protocol count PDCP COUNT, the indication parameter including some or all of the bits of the PDCP COUNT.
  • the application provides a method for requesting a connection to restore, comprising: receiving, by a target base station, a connection recovery request message from a terminal, where the connection recovery request message is used to request to restore a radio resource control RRC connection; if the target base station rejects Recovering the RRC connection, sending a connection recovery reject message and a message authentication code to the terminal, the connection recovery reject message includes information of a timer, and the connection reject request message is used to indicate that the terminal is refused to resume the RRC The message authentication code is used by the terminal to authenticate the validity of the timer.
  • the method may further include: the target base station transmitting information of the timer to a source base station; the target base station receiving the message authentication code from the source base station, the message The authentication code is generated by the source base station according to the integrity protection key of the source base station and the information of the timer.
  • the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate a freshness parameter, and the target base station sends the indication parameter to the source base station; wherein the message
  • the authentication code is generated by the source base station according to the integrity protection key of the source base station, the freshness parameter, and the information of the timer, and the freshness parameters used to generate the message authentication code twice are different.
  • the target base station sends the connection reject request message to a source base station; the target base station receives the message authentication code from the source base station, where the message authentication code is used by the source The base station generates according to the integrity protection key of the source base station and the connection reject request message.
  • connection recovery request message may include an indication parameter, where the indication parameter is used to indicate a freshness parameter
  • the method may further include: the target base station sending the indication parameter to the source base station;
  • the message authentication code is generated by the source base station according to the integrity protection key of the source base station, the freshness parameter, and the connection rejection request message, and the freshness parameter used by the message authentication code is generated twice. different.
  • the method may further include: the target base station receiving a key from the source base station; and the target base station generating the message according to the information of the key and the timer Authentication Code.
  • the target base station generates the message authentication code according to the information of the key and the timer, including: the target base station according to the key, the timer The information and freshness parameters are generated, and the message authentication code is generated; wherein the freshness parameters used to generate the message authentication code two times are different.
  • the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
  • the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate the freshness parameter, and the freshness parameter includes a packet data convergence protocol count PDCP COUNT, the indication parameter Some or all of the bits of the PDCP COUNT are included.
  • the method may further include: the target base station receiving a key from the source base station; and the target base station generating the message according to the key and the connection request rejection message Authentication Code.
  • the target base station generates the message authentication code according to the key and the connection request rejection message, including: the target base station rejects according to the key, the connection request The message and the freshness parameter are generated, and the message authentication code is generated; wherein the freshness parameters used to generate the message authentication code two times are different.
  • the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
  • the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate the freshness parameter, and the freshness parameter includes a packet data convergence protocol count PDCP COUNT, the indication parameter Some or all of the bits of the PDCP COUNT are included.
  • the present application provides a device, which may be a terminal or a chip in a terminal.
  • the device has the functionality to implement the various embodiments of the first aspect described above. This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the terminal when the device is a terminal, the terminal includes: a transmitting unit, a processing unit, and a receiving unit.
  • the processing unit may for example be a processor, which may for example be a receiver, a transmitting unit, for example a transmitter.
  • the receiver and transmitter include radio frequency circuits.
  • the terminal further comprises a storage unit, which may be, for example, a memory.
  • the storage unit stores a computer execution instruction
  • the processing unit is connected to the storage unit, and the processing unit executes a computer execution instruction stored by the storage unit, so that the terminal performs the request to restore the connection according to any one of the foregoing first aspects.
  • the chip when the device is a chip in the terminal, the chip includes: a transmitting unit, a processing unit, and a receiving unit.
  • the processing unit can be, for example, a processing circuit, which can be, for example, an input interface, a pin or a circuit, etc.
  • the transmitting unit can be, for example, an output interface, a pin or a circuit.
  • the processing unit may execute a computer-executed instruction stored by the storage unit to cause the method of restoring the connection of any of the above-described first aspects to be performed.
  • the storage unit may be a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in the terminal, such as a read-only memory (ROM), and may be stored.
  • ROM read-only memory
  • RAM random access memory
  • the processor mentioned in any of the above may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more A program-implemented integrated circuit for controlling a method of requesting a resume connection of any of the above first aspects.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • the application provides a device, which may be a source base station or a chip in a source base station.
  • the device has the functionality to implement the various embodiments of the second aspect described above. This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the base station when the device is a source base station, the base station includes: a receiving unit, a transmitting unit, and a processing unit.
  • the processing unit may for example be a processor, which may for example be a receiver, a transmitting unit, for example a transmitter.
  • the receiver and transmitter include radio frequency circuits.
  • the base station further comprises a storage unit, which may be, for example, a memory.
  • the storage unit stores a computer execution instruction
  • the processing unit is coupled to the storage unit, and the processing unit executes a computer execution instruction stored by the storage unit to cause the base station to perform the request to restore the connection according to any one of the foregoing second aspects.
  • the chip when the device is a chip in a source base station, the chip includes: a receiving unit, a transmitting unit, and a processing unit.
  • the processing unit can be, for example, a processing circuit, which can be, for example, an input interface, a pin or a circuit, etc.
  • the transmitting unit can be, for example, an output interface, a pin or a circuit.
  • the processing unit may execute a computer-executed instruction stored by the storage unit to cause the method of restoring the connection of any of the above-described second aspects to be performed.
  • the storage unit may be a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in the terminal, such as a ROM only, other types of statics that can store static information and instructions.
  • Storage device RAM, etc.
  • the processor mentioned in any of the above may be a general-purpose CPU, a microprocessor, an ASIC, or a program executed by one or more methods for controlling the connection recovery request of any of the above second aspects. integrated circuit.
  • the application provides a device, which may be a source base station or a chip in a source base station.
  • the device has the functionality to implement the various embodiments of the third aspect described above. This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the base station when the device is a source base station, the base station includes: a receiving unit, a transmitting unit, and a processing unit.
  • the processing unit may for example be a processor, which may for example be a receiver, a transmitting unit, for example a transmitter.
  • the receiver and transmitter include radio frequency circuits.
  • the base station further comprises a storage unit, which may be, for example, a memory.
  • the storage unit stores a computer execution instruction
  • the processing unit is connected to the storage unit, and the processing unit executes a computer execution instruction stored by the storage unit, so that the base station performs the request to restore the connection according to any one of the foregoing third aspects.
  • the chip when the device is a chip in a source base station, the chip includes: a receiving unit, a transmitting unit, and a processing unit.
  • the processing unit can be, for example, a processing circuit, which can be, for example, an input interface, a pin or a circuit, etc.
  • the transmitting unit can be, for example, an output interface, a pin or a circuit.
  • the processing unit may execute a computer-executed instruction stored by the storage unit to cause the method of restoring the connection of any of the above-described third aspects to be performed.
  • the storage unit may be a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in the terminal, such as a ROM only, other types of statics that can store static information and instructions.
  • Storage device RAM, etc.
  • the processor mentioned in any of the above may be a general-purpose CPU, a microprocessor, an ASIC, or a program executed by one or more methods for controlling the connection recovery request of any of the above third aspects. integrated circuit.
  • the present application provides an apparatus, which may be a target base station or a chip in a target base station.
  • the device has the functionality to implement the various embodiments of the fourth aspect described above. This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the base station when the device is a target base station, the base station includes: a receiving unit and a sending unit, and optionally, a processing unit.
  • the processing unit may for example be a processor, which may for example be a receiver, a transmitting unit, for example a transmitter.
  • the receiver and transmitter include radio frequency circuits.
  • the base station further comprises a storage unit, which may be, for example, a memory.
  • the storage unit stores a computer execution instruction
  • the processing unit is coupled to the storage unit, and the processing unit executes a computer execution instruction stored by the storage unit to cause the base station to perform the request to restore the connection according to any one of the foregoing fourth aspects.
  • the chip when the device is a chip in a target base station, the chip includes: a receiving unit and a transmitting unit, and optionally, a processing unit.
  • the processing unit can be, for example, a processing circuit, which can be, for example, an input interface, a pin or a circuit, etc.
  • the transmitting unit can be, for example, an output interface, a pin or a circuit.
  • the processing unit may execute a computer-executed instruction stored by the storage unit to cause the method of requesting to restore the connection of any of the above fourth aspects to be performed.
  • the storage unit may be a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in the terminal, such as a ROM only, other types of statics that can store static information and instructions.
  • Storage device RAM, etc.
  • the processor mentioned in any of the above may be a general-purpose CPU, a microprocessor, an ASIC, or a program executed by one or more methods for controlling a connection recovery connection according to any of the above fourth aspects. integrated circuit.
  • the present application further provides a computer readable storage medium having instructions stored therein that, when executed on a computer, cause the computer to perform the methods described in the above aspects.
  • the present application also provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the methods described in the various aspects above.
  • the present application provides a communication system, the system comprising the device of the fifth aspect, the device of the sixth aspect, and the device of the eighth aspect, or the system includes the fifth aspect The device, the device of the seventh aspect, and the device of the eighth aspect.
  • FIG. 1 is a schematic diagram of a possible network architecture provided by the present application
  • FIG. 2 is a schematic diagram of a method for requesting a connection to be restored according to the present application
  • FIG. 3 is a flowchart of another method for requesting a recovery connection according to the present application.
  • FIG. 5 is a flowchart of another method for requesting a recovery connection according to the present application.
  • FIG. 6 is a flowchart of another method for requesting a recovery connection according to the present application.
  • Figure 7 is a schematic diagram of a device provided by the present application.
  • FIG. 8 is a schematic diagram of another apparatus provided by the present application.
  • Figure 9 is a schematic view of another apparatus provided by the present application.
  • FIG. 10 is a schematic diagram of another apparatus provided by the present application.
  • the method of requesting to restore the connection of the present application may be performed by a device.
  • the device may include a device on the network side and/or a device on the terminal side.
  • the device On the network side, the device may be a chip in the base station or the base station, that is, the method of requesting to restore the connection may be performed by the chip in the base station or the base station;
  • the device on the terminal side, the device may be a chip in the terminal or the terminal, that is, The method of requesting to restore a connection of the present application can be performed by a chip in a terminal or a terminal.
  • the base station may be a target base station or a source base station.
  • the present application uses a device as a base station or a terminal as an example to describe a method for requesting to restore a connection.
  • a device is a chip in a base station or a chip in a terminal
  • the connection may be restored by referring to the request of the base station or the terminal. The specific description of the method is not repeated.
  • FIG. 1 is a schematic diagram of a possible network architecture of the present application. It includes a terminal, a source base station, and a target base station.
  • the terminal communicates with the source base station and the target base station through a wireless interface.
  • the source base station and the target base station can communicate through a wired connection, such as through an X2 interface, an Xn interface, or can communicate through an air interface.
  • the terminal may move from the source base station to the target base station due to the movement of the terminal or the like.
  • the source base station is a base station that the terminal accesses first
  • the target base station is a base station that is accessed after the terminal moves.
  • the terminal is a device with wireless transceiver function, which can be deployed on land, indoors or outdoors, handheld or on-board; it can also be deployed on the water surface (such as ships); it can also be deployed in the air (such as airplanes, balloons). And satellites, etc.).
  • the terminal may be a mobile phone, a tablet, a computer with wireless transceiver function, a virtual reality (VR) terminal, an augmented reality (AR) terminal, industrial control (industrial control) Wireless terminal, wireless terminal in self driving, wireless terminal in remote medical, wireless terminal in smart grid, wireless terminal in transportation safety, A wireless terminal in a smart city, a wireless terminal in a smart home, and the like.
  • a base station is a device that provides wireless communication functions for a terminal, including but not limited to: a next-generation base station (g nodeB, gNB), an evolved node B (eNB), and a radio network controller (radio) in 5G.
  • Network controller g nodeB, gNB
  • eNB evolved node B
  • RNC Radio network controller
  • NB node B
  • BSC base station controller
  • BTS base transceiver station
  • home base station for example, home evolved node B, or home node B
  • HNB BaseBand Unit
  • TRP transmission and receiving point
  • TP transmitting point
  • mobile switching center etc.
  • the terminal generally has three states, that is, a connected state, an idle state, and an inactive state.
  • the terminal when the terminal is in the connected state, the terminal is in a normal working state.
  • User data can be sent and received between the network side and the terminal.
  • the terminal and the base station When the terminal enters the idle state from the connected state, the terminal and the base station generally delete all the access stratum (AS) contexts of the terminal.
  • AS access stratum
  • the terminal and the base station when the network side releases the connection of the terminal by the suspend reason, the terminal also enters the idle state from the connected state, but at this time, the terminal and the base station delete part of the AS context, and retain A partial AS context, for example, may retain an access layer key (which may be referred to as KeNB in 4G), a security capability of the terminal, and a security algorithm (including an integrity protection algorithm and an encryption algorithm) for communication between the terminal and the source base station to which the terminal accesses. .
  • the security capability of the terminal refers to the security algorithm supported by the terminal, including the supported encryption algorithm and the supported integrity protection algorithm.
  • the special idle state in which the terminal is located may be referred to as a suspended state.
  • an inactive state is introduced.
  • the base station suspends the terminal.
  • the terminal and the base station delete part of the AS context, and reserve part of the AS context, for example, the access layer may be reserved.
  • the key (which can be called KgNB in 5G), the security capability of the terminal, and the security algorithm (including integrity protection algorithm and encryption algorithm) for communication between the terminal and the source base station accessed by the terminal.
  • the security capability of the terminal refers to the security algorithm supported by the terminal, including the supported encryption algorithm and the supported integrity protection algorithm.
  • the subsequent unification of the suspended state defined in 4G and the inactive state defined in 5G is called inactive state.
  • the base station connected to the terminal and the terminal before the terminal enters the inactive state will save part of the AS context. For details, refer to the foregoing description.
  • the terminal When the terminal is in an inactive state, since part of the AS context is reserved on the terminal, the terminal enters the connected state from the inactive state more quickly than when the terminal enters the connected state from the idle state.
  • the terminal when the terminal returns from the inactive state to the connected state, the terminal may need to replace the base station. That is, the terminal first establishes a connection with the source base station, and then the terminal enters an inactive state at the source base station for some reason, such as network side notification.
  • the terminal wishes to return to the connected state, if the terminal has moved to the coverage of the target base station, the terminal will resume from the inactive state to the connected state at the target base station.
  • the present application is also applicable to the scenario in which the target base station and the source base station are the same when the terminal is restored from the inactive state to the connected state, that is, the base station accessed by the terminal may not change, and is still the same base station.
  • a schematic diagram of a method for requesting a connection recovery includes the following steps:
  • Step 201 The terminal sends a connection recovery request message to the target base station, and the target base station receives a connection recovery request message from the terminal.
  • a connection recovery request message sent by the terminal used to request to resume the RRC connection. That is, the terminal requests to return from the inactive state to the connected state.
  • Step 202 The target base station determines to reject the connection recovery request of the terminal.
  • the target base station may reject the connection recovery request of the terminal, that is, reject the terminal from accessing the target base station.
  • Step 203 The target base station sends a connection recovery reject message and a message authentication code to the terminal, where the terminal receives the connection recovery reject message and the message authentication code from the target base station.
  • the connection recovery reject message is used to indicate that the terminal is denied the RRC connection.
  • the connection recovery refusal message carries the information of the timer, and the information of the timer is used to indicate the time for denying the terminal access, and can also be understood as the minimum duration for the terminal to wait for the terminal to re-request to resume the RRC connection. For example, if the timer indicates that the duration is 30 minutes, the terminal needs to wait at least 30 minutes to re-initiate the connection recovery request.
  • the message authentication code (MAC) is used for the validity of the information of the terminal authentication timer.
  • the message authentication code is generated based on the integrity protection key of the source base station and the information of the timer.
  • the message authentication code is generated according to the integrity protection key and the connection recovery rejection message of the source base station, wherein the connection recovery rejection message includes information of a timer, and optionally, the connection recovery rejection message further includes other information.
  • Step 204 If the terminal verifies that the message authentication code is correct according to the information of the timer and the integrity protection key of the terminal, the terminal initiates a connection recovery request process according to the information of the timer.
  • the message authentication code sent by the target base station to the terminal is generated according to the integrity protection key of the source base station and the information of the timer, and the manner in which the terminal checks the message authentication code is: the terminal according to the information of the timer and The integrity protection key of the terminal generates a message authentication code. If the message authentication code is the same as the message authentication code sent by the target base station to the terminal, the verification is correct. If not, the verification fails.
  • the terminal If the verification message authentication code is correct, the terminal considers that the information of the timer is not modified by the attacker. Therefore, the terminal initiates a connection recovery request process according to the information of the timer, that is, re-initiates the connection recovery request according to the duration indicated by the information of the timer. .
  • the terminal ignores the information of the timer, that is, does not re-initiate the connection recovery request according to the duration indicated by the information of the timer.
  • the terminal checks the message authentication code before using the information of the timer. If the verification is correct, the information of the timer is not found.
  • the attacker modifies, so the terminal initiates a connection recovery request process according to the information of the timer, so that the terminal can re-initiate the connection recovery request according to the information of the timer, effectively avoiding the use of the timer of the tampering by the attacker.
  • the information of the timer included in the connection recovery rejection message sent by the target base station to the terminal is 30 minutes, and the message authentication code is generated according to the integrity protection key of the source base station and the information of the timer.
  • the message authentication code sent by the base station to the terminal is generated according to the integrity protection key of the source base station for 30 minutes.
  • the generated message authentication code is represented by MAC (30 minutes, Krrc-int1), where Krrc-int1 represents the integrity protection key of the source base station.
  • the target base station sends a MAC (30 minutes, Krrc-int1) and a connection recovery reject message to the terminal.
  • the connection recovery reject message includes information of a timer, and the information of the timer indicates a duration of 30 minutes.
  • the terminal will acquire the MAC (30 minutes, Krrc-int1), and acquire 100 minutes from the connection recovery rejection message.
  • the terminal generates a message authentication code MAC (100 minutes, Krrc-int2) according to the acquired 100 minutes and the integrity protection key of the terminal (represented by Krrc-int2).
  • Krrc-int1 and Krrc-int2 are the same under normal conditions.
  • the MAC generated by the terminal 100 minutes, Krrc-int2
  • the MAC sent by the target base station to the terminal 30 minutes, Krrc-int1
  • the terminal will ignore this information for 100 minutes. Therefore, the solution of the present application can protect the attacker from attack.
  • the following describes several methods for generating the message authentication code sent by the target base station.
  • Method 1 The source base station generates a message authentication code according to the information of the timer and the integrity protection key of the source base station.
  • a flow chart of a method for requesting a connection recovery includes the following steps:
  • Steps 301 to 302 are the same as steps 201 to 202 shown in FIG. 2, and the foregoing description may be referred to.
  • Step 303 The target base station sends the information of the timer to the source base station, and the source base station receives the information of the timer from the target base station.
  • Step 304 The source base station generates a message authentication code according to the information of the timer and the integrity protection key of the source base station.
  • the integrity protection key of the source base station refers to the integrity protection key corresponding to the context of the terminal stored by the source base station, and the integrity protection key is generated according to the following manner: the source base station acquires the integrity in the context of the terminal.
  • the protection algorithm also referred to as the integrity protection algorithm of the source base station
  • the access layer key which may be referred to as the integrity protection key of the source base station
  • the source base station directly acquires an integrity protection algorithm in the context of the terminal (which may also be referred to as an integrity protection algorithm of the source base station) and an integrity protection key in the context of the terminal (which may be referred to as an integrity protection key of the source base station). key).
  • the access layer key may also be an updated access layer key.
  • Step 305 The source base station sends a message authentication code to the target base station, and the target base station receives the message authentication code from the source base station.
  • Step 306-Step 307 is the same as Step 203-Step 204 shown in FIG. 2, and can refer to the foregoing description.
  • the source base station generates a message authentication code according to the information of the timer and the integrity protection key of the source base station, and sends the message authentication code to the target base station.
  • Method 2 The source base station generates a message authentication code according to the connection reject request message and the integrity protection key of the source base station, where the connection reject request message includes information of a timer.
  • a flow chart of a method for requesting a connection recovery includes the following steps:
  • Steps 401 to 402 are the same as steps 201 to 202 shown in FIG. 2, and may be referred to the foregoing description.
  • Step 403 The target base station sends a connection reject request message to the source base station, where the source base station receives a connection reject request message from the target base station, where the connection reject request message includes information of a timer.
  • the connection reject request message is that the target base station is configured to be sent to the terminal. Since the target base station does not have the context of the terminal, the message needs to be sent to the source base station, and the source base station performs protection.
  • Step 404 The source base station generates a message authentication code according to the connection reject request message and the integrity protection key of the source base station.
  • the source base station obtains the integrity protection key, which is the same as step 304 shown in FIG. 3, and can refer to the foregoing description.
  • Step 405 The source base station sends a message authentication code to the target base station, and the target base station receives the message authentication code from the source base station.
  • Step 406-Step 407 is the same as Step 203-Step 204 shown in FIG. 2, and may refer to the foregoing description.
  • the source base station generates a message authentication code according to the connection reject request message and the integrity protection key of the source base station, and sends the message authentication code to the target base station. Since the connection rejection request message includes the information of the timer, the generated message authentication code can also secure the information of the timer. Correspondingly, when the terminal checks, the message authentication code is verified according to the received connection rejection request message and the integrity protection key of the terminal.
  • Method 3 The target base station generates a message authentication code according to the information of the timer and the integrity protection key of the source base station.
  • a flow chart of a method for requesting a connection recovery includes the following steps:
  • Steps 501 to 502 are the same as steps 201 to 202 shown in FIG. 2, and the foregoing description may be referred to.
  • Step 503 The target base station sends a request message to the source base station.
  • the request message requests the source base station to acquire a key.
  • Step 504 The source base station sends a key to the target base station.
  • the key may be an integrity protection key of the source base station or an access layer key.
  • Step 505 The target base station generates a message authentication code according to the information and the key of the timer.
  • the target base station if the key sent by the source base station is the integrity protection key of the source base station, the target base station generates a message authentication code according to the information of the timer and the integrity protection key of the source base station.
  • the target base station If the key sent by the source base station is an access layer key, the target base station generates an integrity protection key according to the access layer key, and then generates a message authentication code according to the timer information and the integrity protection key.
  • Steps 506 to 507 are the same as steps 203 to 204 shown in FIG. 2, and the foregoing description may be referred to.
  • the target base station acquires a key from the source base station, and then generates a message authentication code according to the information and the key of the timer.
  • Method 4 The target base station generates a message authentication code according to the connection rejection request message and the integrity protection key of the source base station, where the connection rejection request message includes the timer information.
  • a flowchart of a method for requesting a connection recovery includes the following steps:
  • Steps 601 to 602 are the same as steps 201 to 202 shown in FIG. 2, and the foregoing description may be referred to.
  • Step 603 The target base station sends a request message to the source base station.
  • the request message requests the source base station to acquire a key.
  • Step 604 The source base station sends a key to the target base station.
  • the key may be an integrity protection key of the source base station or an access layer key.
  • Step 605 The target base station generates a message authentication code according to the connection rejection request message and the key.
  • the connection rejection request message includes information of a timer.
  • the target base station if the key sent by the source base station is the integrity protection key of the source base station, the target base station generates a message authentication code according to the connection reject request message and the integrity protection key of the source base station.
  • the target base station If the key sent by the source base station is an access layer key, the target base station generates an integrity protection key according to the access layer key, and then generates a message authentication code according to the connection rejection request message and the integrity protection key.
  • Step 606-Step 607 is the same as Step 203-Step 204 shown in FIG. 2, and can refer to the foregoing description.
  • the target base station acquires a key from the source base station, and then generates a message authentication code according to the connection rejection request message and the key.
  • another attack scenario is considered: after acquiring the message authentication code and the timer information sent by the target base station to the terminal, the attacker does not modify the timer information, but continuously Replaying, that is, repeating the above step 203, causing the terminal to continuously sleep, causing an attack on the terminal.
  • the message authentication code is MAC (30 minutes, Krrc-int1), where Krrc-int1 is the integrity of the source base station.
  • the target base station transmits a connection recovery reject message and a MAC (30 minutes, Krrc-int1) to the terminal through the above-mentioned step 203, and the information indicated by the timer included in the connection recovery rejection message is 30 minutes. After verifying the MAC (30 minutes, Krrc-int1), the terminal enters 30 minutes of sleep.
  • the attacker Before the arrival of 30 minutes, the attacker sends a connection recovery rejection message and MAC to the terminal (30 minutes, Krrc-int1), the terminal will still verify the MAC (30 minutes, Krrc-int1) successfully, and then enter 30 minutes of sleep. .
  • the attacker sends a connection recovery rejection message and MAC to the terminal (30 minutes, Krrc-int1), the terminal will still verify the MAC (30 minutes, Krrc-int1) successfully, and then enter 30 again. Minutes of sleep. In this way, the terminal will sleep all the time, and the connection recovery request cannot be successful.
  • the present application provides a corresponding solution.
  • connection recovery request message in step 201 carries an indication parameter, and the indication parameter is used to indicate a freshness parameter.
  • the freshness parameter may be used by the target base station to generate a message authentication code, that is, in the above step 203, the message authentication code sent by the target base station to the terminal is generated according to the freshness parameter.
  • the target base station generates a message authentication code according to the integrity protection key of the source base station, the information of the timer, and the freshness parameter.
  • the target base station generates a message authentication code according to the integrity protection key of the source base station, the connection recovery rejection message, and the freshness parameter, where the connection recovery rejection message includes information of the timer.
  • the freshness parameters used to generate the message authentication code two times are different. That is, the specific value of the freshness parameter changes every time the message authentication code is generated, so that the freshness parameter used when generating the message authentication code is different from the freshness parameter used when the message authentication code is generated last time. .
  • the freshness parameter includes a Packet Data Convergence Protocol (PDCP) count (COUNT), and the PDCP COUNT may include an uplink PDCP COUNT and a downlink PDCP COUNT, and the terminal uplinks every time an uplink PDCP packet is sent.
  • the PDCP COUNT is incremented by 1, and the downlink PDCP COUNT is incremented by one for each downlink PDCP packet sent by the base station.
  • the PDCP COUNT may be the uplink PDCP COUNT of the signaling radio bearer (SRB).
  • SRB signaling radio bearer
  • the PDCP COUNT can be reset to zero. Since the PDCP COUNT is constantly changing, the message authentication code generated by the terminal each time is different from the last generated message authentication code.
  • connection recovery request message sent by the terminal to the target base station carries an indication parameter, where the indication parameter is used to indicate a freshness parameter.
  • the indication parameter may be the freshness parameter itself, or may be a parameter indicating the freshness parameter.
  • the indication parameter may be the PDCP COUNT itself, that is, all bits of the PDCP COUNT.
  • the indication parameter can also be a partial bit of the PDCP COUNT.
  • the indication parameter can be represented using a portion of the low bit of the PDCP COUNT.
  • the PDCP COUNT used by the terminal to generate the message authentication code is “00000000000011111111111100011111”
  • the PDCP COUNT used by the terminal to generate the message authentication code is “00000000000011111111100100011”. It can be found that only the lower 5 bits of the PDCP COUNT have changed. The high 27 did not change. Therefore, the lower N bits of the PDCP COUNT can be selected as the indication parameter, N being greater than 1, and less than 32.
  • the indication parameter can also be all bits of the PDCP COUNT.
  • the freshness parameter may include the number of rejections, and the number of rejections may be used to indicate the number of times the terminal attempts to restore the RRC connection rejected by the network side. Each time the terminal attempts to resume being rejected by the network side, the number of rejections is increased by one. Alternatively, the number of rejections may be reset to zero each time the RRC connection is successfully restored. Since the number of rejections is always changing, the message authentication code generated by the terminal each time is different from the message authentication code generated last time.
  • the terminal may not carry the indication parameter in the connection recovery request message.
  • the terminal may determine the current number of rejections by itself, and the base station (such as the target base station or the source base station) may also determine the current number of rejections by itself. That is, the terminal and the target base station each maintain the number of times the terminal is refused to resume the connection. Alternatively, the terminal and the source base station each maintain the number of times the terminal is refused to resume the connection.
  • the terminal verifies that the message authentication code passes, and the terminal updates the number of rejections, including the number of rejections plus one.
  • the source base station updates the number of rejections, including the number of rejections plus one.
  • the target base station decides to reject the terminal to resume the connection, the target base station updates the number of rejections, including the number of rejections plus one.
  • the terminal may also carry an indication parameter in the connection recovery request message, where the indication parameter is used to indicate the number of rejections.
  • the message authentication code generated by the target base station is different from the message authentication code generated last time. Therefore, even if the attacker steals the message authentication code used by the target last time, the message is "expired". Code, therefore, the attacker will not be able to attack successfully.
  • the improved method can effectively solve the problem of the vulnerability of the method shown in FIG. 2 after introducing the freshness parameter.
  • the following is explained in conjunction with specific examples.
  • the target base station generates a message authentication code according to the freshness parameter, the information of the timer, and the integrity protection key of the source base station, and the freshness parameter is PDCP COUNT as an example.
  • the terminal is currently in an inactive state.
  • the target base station Assuming that the value of the PDCP COUNT indicated by the indication parameter of the connection recovery request message is 5, the target base station generates a message authentication code according to the value of the PDCP COUNT, the information of the timer, and the integrity protection key of the source base station.
  • the message authentication code is generated. Specifically, the message authentication code is generated according to the value of the PDCP COUNT, the information of the timer, and the integrity protection key of the source base station, where the value of the PDCP COUNT is 5.
  • the generated message authentication code is represented as MAC (5, 30 minutes, Krrc-int1), where 5 is the value of PDCP COUNT, 30 minutes is the waiting time indicated by the timer information, and Krrc-int1 is The integrity protection key of the source base station.
  • the target base station sends a connection recovery reject message and a MAC (5, 30 minutes, Krrc-int1) to the terminal, and the information including the timer is included in the connection recovery reject message, and the indicated duration is 30 minutes, that is, the terminal is instructed to try after 30 minutes. Re-initiate the connection recovery request.
  • the terminal receives the connection recovery rejection message and the MAC (5, 30 minutes, Krrc-int1), and obtains the information of the timer from the connection recovery rejection message, and then according to the acquired timer information, the integrity protection key of the terminal.
  • the value of the PDCP COUNT is used to generate a message authentication code.
  • the message authentication code generated by the terminal is MAC (5, 30 minutes, Krrc-int2), where 5 is the value of the PDCP COUNT sent by the terminal to the target base station, and 30 minutes is the terminal.
  • the length of time indicated by the information of the timer obtained from the connection recovery rejection message, Krrc-int2 is the integrity protection key of the terminal.
  • Krrc-int1 is the same as Krrc-int2. Therefore, if the MAC (5, 30 minutes, Krrc-int1) generated by the terminal is the same as the MAC (5, 30 minutes, Krrc-int1) transmitted by the target base station, the terminal check message authentication code is correct. Then the terminal sleeps for 30 minutes.
  • the attacker target base station steals the connection recovery reject message and MAC (5, 30 minutes, Krrc-int2), masquerades as the target base station, and sends a connection recovery reject message and MAC to the terminal (5, 30 minutes, Krrc-int2).
  • the terminal After receiving the connection recovery reject message and the MAC (5, 30 minutes, Krrc-int2), the terminal first obtains the duration indicated by the information of the timer from the connection recovery rejection message, which is 30 minutes, and then the terminal acquires the current PDCP of the terminal.
  • COUNT since the value of PDCP COUNT has generally changed, for example, has been updated to 12, the message authentication code generated by the terminal is MAC (12, 30 minutes, Krrc-int2). Since the value of PDCP COUNT has changed, the MAC generated by the terminal (12, 30 minutes, Krrc-int2) is different from the MAC (5, 30 minutes, Krrc-int1) sent by the attacker, and the verification fails. Ignore the information for the timer in the connection recovery reject message.
  • the freshness parameter as the rejection number As an example, assume that the value of the number of rejections currently stored by the terminal and the source base station is 2, and the terminal is currently in an inactive state.
  • the terminal sends a connection recovery request message to the target base station for the first time.
  • the connection recovery request message carries a message authentication code and a recovery identifier.
  • the message authentication code is generated according to the number of rejections and the integrity protection key of the terminal. 2.
  • the target base station rejects the connection recovery request of the terminal, the connection recovery rejection message sent to the terminal carries the information of the waiting timer, indicating that the terminal may try to re-initiate the connection recovery request after 30 minutes, and the terminal update rejection number is 3. At the same time, the target base station notifies the source base station to update the number of rejections in the context of the terminal of the source base station to 3.
  • the attacker steals the message authentication code and the recovery identifier from the connection recovery request message sent by the terminal to the target base station for the first time, where the message authentication code is generated.
  • the number of rejections used is 2.
  • the attacker sends a connection recovery request message to the target base station, where the connection recovery request message carries the stolen message authentication code and the recovery identifier, and after receiving the connection recovery request message, the target base station, if it agrees to the attacker's recovery request, then The source base station sends a context request message. Then, the source base station checks the message authentication code sent by the attacker, because the number of rejections used by the attacker to send the message authentication code is 2, and the number of rejections in the context of the terminal of the source base station is 3, so the school The test failed. Thus, the attacker fails to attack.
  • connection recovery request message of step 301 may carry an indication parameter for indicating a freshness parameter, and the message authentication code generated in step 306 is generated by combining the freshness parameter.
  • the specific improved method is the same as the foregoing improved method for step 202 and step 204 of FIG. 2, and the foregoing description may be referred to.
  • the target base station may further send an indication parameter to the source base station, for example, the information of the timer and the indication parameter may be sent in step 303, or the indication parameter may be sent in a separate step.
  • the source base station can then determine the freshness parameter based on the indication parameters. For example, if the freshness parameter is PDCP COUNT, and the indication parameter indicates a part of the low bit of the PDCP COUNT, the source base station may indicate according to a part of the high bit of the last used PDCP COUNT and an indication parameter received from the target base station. Part of the low bit of PDCP COUNT, get PDCP COUNT.
  • step 304 the specific method for generating the message authentication code needs to be modified as follows: the source base station generates a message authentication code according to the integrity protection key of the source base station, the freshness parameter, and the information of the timer.
  • the source base station may obtain the number of rejections from the context of the terminal.
  • the connection recovery request message of step 301 and step 303 may not carry the indication parameter for indicating the freshness parameter. Since the target base station rejects the connection recovery request of the terminal, the source base station also needs to update the context of the terminal in the source base station, specifically: the source base station increases the number of rejections by one.
  • the terminal After verifying that the message authentication code is passed, the terminal needs to update the context of the terminal, specifically: the terminal adds 1 to the number of rejections.
  • connection recovery request message of step 401 may carry an indication parameter for indicating a freshness parameter, and the message authentication code generated in step 406 is generated by combining the freshness parameter.
  • the method is specifically improved, which is the same as the foregoing improved method for step 202 and step 204 of FIG. 2, and can be referred to the foregoing description.
  • the target base station may further send the indication parameter to the source base station, for example, the connection rejection request message and the indication parameter may be sent in step 403, or the indication parameter may be sent in a separate step.
  • the source base station can then determine the freshness parameter based on the indication parameters. The method is the same as above.
  • step 404 the specific method for generating the message authentication code needs to be modified as follows: the source base station generates a message authentication code according to the integrity protection key, the freshness parameter, and the connection rejection request message of the source base station.
  • the source base station may obtain the number of rejections from the context of the terminal.
  • the connection recovery request message of step 401 and step 403 may not carry the indication parameter for indicating the freshness parameter. Since the target base station rejects the connection recovery request of the terminal, the source base station also needs to update the context of the terminal in the source base station, specifically: the source base station increases the number of rejections by one.
  • the terminal After verifying that the message authentication code is passed, the terminal needs to update the context of the terminal, specifically: the terminal adds 1 to the number of rejections.
  • connection recovery request message of step 501 needs to carry an indication parameter for indicating a freshness parameter, and the message authentication code generated in step 506 is generated by combining the freshness parameter.
  • the method is specifically improved, which is the same as the foregoing improved method for step 202 and step 204 of FIG. 2, and can be referred to the foregoing description.
  • the target base station further needs to send the indication parameter to the source base station, for example, the request message and the indication parameter may be sent in step 503, or the indication parameter may be sent in a separate step.
  • the source base station can then determine the freshness parameter based on the indication parameters. The method is the same as above.
  • the source base station also needs to send the determined freshness parameter to the target base station, for example, the key and the freshness parameter may be sent in step 504, or the freshness parameter may be sent in a separate step.
  • step 505 the specific method for generating the message authentication code needs to be modified as follows: the target base station generates a message authentication code according to the key, the freshness parameter, and the information of the timer.
  • the target base station may obtain the number of rejections from the source base station.
  • the connection recovery request message of step 501 and step 503 may not carry the indication parameter for indicating the freshness parameter. Since the target base station rejects the connection recovery request of the terminal, the source base station also needs to update the context of the terminal in the source base station, specifically: the source base station increases the number of rejections by one.
  • the terminal After verifying that the message authentication code is passed, the terminal needs to update the context of the terminal, specifically: the terminal adds 1 to the number of rejections.
  • connection recovery request message of step 601 needs to carry an indication parameter for indicating a freshness parameter, and the message authentication code generated in step 606 is generated by combining the freshness parameter.
  • the method is specifically improved, which is the same as the foregoing improved method for step 202 and step 204 of FIG. 2, and can be referred to the foregoing description.
  • the target base station further needs to send the indication parameter to the source base station, for example, the request message and the indication parameter may be sent in step 603, or the indication parameter may be sent in a separate step.
  • the source base station can then determine the freshness parameter based on the indication parameters. The method is the same as above.
  • the source base station also needs to send the determined freshness parameter to the target base station, for example, the key and the freshness parameter may be sent in step 604, or the freshness parameter may be sent in a separate step.
  • step 605 the specific method for generating the message authentication code needs to be modified as follows: the target base station generates a message authentication code according to the key, the freshness parameter, and the connection recovery reject message.
  • the target base station may obtain the number of rejections from the local.
  • the connection recovery request message of step 601 and step 603 may not carry the indication parameter for indicating the freshness parameter. Since the target base station rejects the connection recovery request of the terminal, the source base station needs to update the context of the terminal in the source base station according to the freshness parameter, specifically: the source base station adds 1 to the number of rejections.
  • the terminal After verifying that the message authentication code is passed, the terminal also needs to update the context of the terminal, specifically: the terminal adds 1 to the number of rejections.
  • connection recovery request message the connection recovery rejection message, and the like in the foregoing embodiment are only one name, and the name does not limit the message itself.
  • the connection recovery request message and the connection recovery rejection message may be other names, which are not specifically limited in the embodiment of the present application.
  • the connection recovery request message may also be replaced with a request message, a recovery request message, a connection request message, etc.
  • the connection recovery rejection message may be replaced with a rejection message, a recovery rejection message, a connection rejection message, and the like.
  • each of the foregoing network elements includes a hardware structure and/or a software module corresponding to each function.
  • the present invention can be implemented in a combination of hardware or hardware and computer software in combination with the elements and algorithm steps of the various examples described in the embodiments disclosed herein. Whether a function is implemented in hardware or computer software to drive hardware depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods for implementing the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present invention.
  • FIG. 7 a schematic diagram of a device, which may be a terminal, a target base station, or a source base station, may be implemented by a terminal, a target base station, or a source base station in any of the above embodiments.
  • the apparatus 700 includes at least one processor 701, a transmitter 702, a receiver 703, and optionally a memory 704.
  • the processor 701, the transmitter 702, the receiver 703, and the memory 704 are connected by a communication line.
  • the processor 701 can be a general purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of the program of the present invention.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • the communication line can include a path for communicating information between the units.
  • the transmitter 702 and the receiver 703 are configured to communicate with other devices or communication networks.
  • the transmitter and receiver include radio frequency circuits.
  • the memory 704 can be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (RAM) or other type that can store information and instructions.
  • the dynamic storage device may also be an electrically erasable programmabler-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disc storage, or a disc storage ( Including compressed optical discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be stored by a computer Any other media taken, but not limited to this.
  • EEPROM electrically erasable programmabler-only memory
  • CD-ROM compact disc read-only memory
  • CD-ROM compact disc read-only memory
  • disc storage Including compressed optical discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.
  • the memory 704 may be independent and connected to the processor 701 via a communication line. Memory 704 can also be integrated with the processor.
  • the memory 704 is used to store application code for executing the solution of the present invention, and is controlled by the processor 701 for execution.
  • the processor 701 is configured to execute application code stored in the memory 704.
  • the processor 701 may include one or more CPUs, such as CPU0 and CPU1 in FIG.
  • apparatus 700 can include multiple processors, such as processor 701 and processor 708 in FIG. Each of these processors may be a single-CPU processor or a multi-core processor, where the processor may refer to one or more devices, circuits, and/or A processing core for processing data, such as computer program instructions.
  • the device 700 when the device 700 is a terminal, the device 700 may be used to implement the steps performed by the terminal in the method of the embodiment of the present invention.
  • the device 700 may perform step 301, step 307 in FIG. 3, and may also perform Step 401 and step 407 in FIG. 4, step 501 and step 507 in FIG. 5 may also be performed, and step 601 and step 607 in FIG. 6 may also be performed.
  • step 301, step 307 in FIG. 3 may also perform Step 401 and step 407 in FIG. 4
  • step 501 and step 507 in FIG. 5 may also be performed
  • step 601 and step 607 in FIG. 6 may also be performed.
  • the device 700 can be used to implement the steps performed by the target base station in the method of the embodiment of the present invention.
  • the device 700 can perform step 302, step 303, and step 306 in FIG. Step 502, step 403, step 406 in FIG. 5 may be performed, and step 502, step 503, step 505, and step 506 in FIG. 5 may be performed, and step 602, step 603, step 605 in FIG. 6 may also be performed.
  • Step 606 related features may refer to the above, and details are not described herein again.
  • the device 700 can be used to implement the steps performed by the source base station in the method of the embodiment of the present invention.
  • the device 700 can perform step 304 and step 305 in FIG.
  • step 404 and step 405 of FIG. 4 step 504 in FIG. 5 may also be performed, and step 604 in FIG. 6 may also be performed.
  • step 404 and step 405 of FIG. 4 step 504 in FIG. 5 may also be performed
  • step 604 in FIG. 6 may also be performed.
  • the actions of the terminal in FIG. 3-6 may be performed by the processor 701 (and/or the processor 708) in the device 700 calling the application code stored in the memory 704. Any restrictions.
  • the application may divide the function module into the terminal according to the above method example.
  • each function module may be divided according to each function, or two or more functions may be integrated into one processing module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of modules in the present application is schematic, and is only a logical function division, and may be further divided in actual implementation.
  • FIG. 8 shows a schematic diagram of a device, which may be the terminal involved in the above embodiment, and the device 800 includes a processing unit 801 and a receiving unit 802. And transmitting unit 803.
  • the sending unit 803 is configured to send a connection recovery request message to the target base station, where the connection recovery request message is used to request to resume the radio resource control RRC connection;
  • the receiving unit 802 is configured to receive a connection recovery reject message and a message authentication code from the target base station, where the connection recovery reject message is used to indicate that the device is denied to restore the RRC connection, and the connection recovery reject message includes Information of the timer, the message authentication code is generated according to the integrity protection key of the source base station and the information of the timer;
  • the processing unit 801 is configured to: if the message authentication code is verified to be correct according to the information of the timer and the integrity protection key of the device, initiate a connection recovery request process according to the information of the timer.
  • the message authentication code is generated according to the integrity protection key of the source base station, the information of the timer, and the freshness parameter, and the message used by the message authentication code is generated twice. Sexual parameters are different.
  • connection recovery request message includes an indication parameter, where the indication parameter is used to indicate the freshness parameter.
  • the freshness parameter includes a packet data convergence protocol count PDCP COUNT
  • the indication parameter includes part or all of the bits of the PDCP COUNT.
  • the freshness parameter includes a number of rejections, the number of rejections being used to indicate the number of times the device is rejected when attempting to resume the RRC connection.
  • the terminal may be used to implement the steps performed by the terminal in the method of the embodiment of the present invention.
  • the terminal may be used to implement the steps performed by the terminal in the method of the embodiment of the present invention.
  • the application may perform the division of the function modules on the target base station according to the foregoing method example.
  • each function module may be divided according to each function, or two or more functions may be integrated into one processing module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the division of modules in the present application is schematic, and is only a logical function division, and may be further divided in actual implementation.
  • FIG. 9 shows a schematic diagram of a device, which may be the target base station involved in the above embodiment, and the device 900 includes a receiving unit 902 and a transmitting unit. 903.
  • a processing unit 901 is also included.
  • the receiving unit 902 is configured to receive a connection recovery request message from the terminal, where the connection recovery request message is used to request to resume the radio resource control RRC connection;
  • the sending unit 903 is configured to: if the RRC connection is refused to be restored, send a connection recovery reject message and a message authentication code to the terminal, where the connection recovery reject message includes information of a timer, and the connection reject request message is used by And instructing to reject the terminal to resume the RRC connection.
  • the sending unit 903 is further configured to send information about the timer to a source base station;
  • the receiving unit 902 is further configured to receive the message authentication code from the source base station, where the message authentication code is used by the source base station according to the integrity protection key of the source base station and the information of the timer generate.
  • connection recovery request message includes an indication parameter, where the indication parameter is used to indicate a freshness parameter, and the sending unit 903 is further configured to send the indication parameter to the source base station;
  • the message authentication code is generated by the source base station according to the integrity protection key of the source base station, the freshness parameter, and the information of the timer, and the message used by the message authentication code is generated twice. Sexual parameters are different.
  • the sending unit 903 is further configured to send the connection reject request message to the source base station;
  • the receiving unit 902 is further configured to receive the message authentication code from the source base station, where the message authentication code is used by the source base station according to the integrity protection key of the source base station and the connection reject request message. generate.
  • connection recovery request message includes an indication parameter, where the indication parameter is used to indicate a freshness parameter, and the sending unit 903 is further configured to send the indication parameter to the source base station;
  • the message authentication code is generated by the source base station according to the integrity protection key of the source base station, the freshness parameter, and the connection rejection request message, and the message used by the message authentication code is generated twice. Sexual parameters are different.
  • the receiving unit 902 is further configured to receive a key from the source base station;
  • the processing unit 901 is configured to generate the message authentication code according to the key and the information of the timer.
  • the processing unit 901 is specifically configured to generate the message authentication code according to the key, the information of the timer, and the freshness parameter.
  • the freshness parameters used to generate the message authentication code twice are different.
  • the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate the freshness parameter, and the freshness parameter includes a packet data convergence protocol count PDCP COUNT, the indication parameter Some or all of the bits of the PDCP COUNT are included.
  • the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
  • the receiving unit 902 is further configured to receive a key from the source base station;
  • the processing unit 901 is configured to generate the message authentication code according to the key and the connection request rejection message.
  • the processing unit 901 is specifically configured to generate the message authentication code according to the key, the connection request rejection message, and the freshness parameter.
  • the freshness parameters used to generate the message authentication code twice are different.
  • the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate the freshness parameter, and the freshness parameter includes a packet data convergence protocol count PDCP COUNT, the indication parameter Some or all of the bits of the PDCP COUNT are included.
  • the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
  • the target base station may be used to implement the steps performed by the target base station in the method of the embodiment of the present invention. For related features, reference may be made to the above, and details are not described herein again.
  • the application may divide the function modules of the source base station according to the foregoing method example.
  • each function module may be divided according to each function, or two or more functions may be integrated into one processing module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of modules in the present application is schematic, and is only a logical function division, and may be further divided in actual implementation.
  • FIG. 10 shows a schematic diagram of a device, which may be the source base station involved in the above embodiment, and the device 1000 includes a processing unit 1001 and a receiving unit. 1002 and transmitting unit 1003.
  • the receiving unit 1002 is configured to receive information about a timer from a target base station
  • the processing unit 1001 is configured to generate a message authentication code according to the information of the timer and the integrity protection key of the device;
  • the sending unit 1003 is configured to send the message authentication code to the target base station.
  • the processing unit 1001 is specifically configured to generate the message authentication code according to the information of the timer, the integrity protection key of the device, and the freshness parameter.
  • the freshness parameters used to generate the message authentication code twice are different.
  • the receiving unit 1002 is further configured to receive an indication parameter from the target base station, where the indication parameter is used to indicate the freshness parameter.
  • the freshness parameter includes a packet data convergence protocol count PDCP COUNT
  • the indication parameter includes part or all of the bits of the PDCP COUNT.
  • the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
  • the receiving unit 1002 is configured to receive a connection reject request message from the target base station, where the connection reject request message includes information of a timer, where the connection reject request message is used to indicate that the terminal is refused to resume the radio resource control RRC connection;
  • the processing unit 1001 is configured to generate a message authentication code according to the connection reject request message and the integrity protection key of the device;
  • the sending unit 1003 is configured to send the message authentication code to the target base station.
  • processing unit 1001 is specifically configured to:
  • the freshness parameters used to generate the message authentication code twice are different.
  • the receiving unit 1002 is further configured to receive an indication parameter from the target base station, where the indication parameter is used to indicate the freshness parameter.
  • the freshness parameter includes a packet data convergence protocol count PDCP COUNT
  • the indication parameter includes part or all of the bits of the PDCP COUNT.
  • the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
  • the source base station may be used to implement the steps performed by the source base station in the method of the embodiment of the present invention.
  • reference may be made to the above, and details are not described herein again.
  • the above embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a Solid State Disk (SSD)) or the like.
  • a magnetic medium eg, a floppy disk, a hard disk, a magnetic tape
  • an optical medium eg, a DVD
  • a semiconductor medium such as a Solid State Disk (SSD)
  • the above embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a Solid State Disk (SSD)) or the like.
  • a magnetic medium eg, a floppy disk, a hard disk, a magnetic tape
  • an optical medium eg, a DVD
  • a semiconductor medium such as a Solid State Disk (SSD)
  • embodiments of the present application can be provided as a method, apparatus (device), computer readable storage medium, or computer program product.
  • the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware aspects, which are collectively referred to herein as "module” or "system.”

Abstract

The present application provides a method and apparatus for requesting recovery of a connection. The method comprises: a terminal sends a connection recovery request message to a target base station; the terminal receives a connection recovery reject message and a message authentication code from the target base station, the connection recovery reject message comprising information of a timer, and the message authentication code being generated on the basis of an integrity protection key of a source base station and the information of the timer; and if the terminal verifies that the message authentication code is correct according to the information of the timer and an integrity protection key of the terminal, the terminal initiates a connection recovery requesting process according to the information of the timer. Before the terminal uses the information of the timer, the message authentication code is first verified, and if the verification is successful, the information of the timer is considered as not being modified by an attacker, so that the terminal initiates the connection recovery requesting process according to the information of the time, and thus the terminal can normally re-initiate a connection recovery request according to the information of the timer, and use of information of the timer that is tampered with by an attacker is effectively avoided.

Description

一种请求恢复连接的方法及装置Method and device for requesting restoration of connection
本申请要求在2017年11月16日提交中华人民共和国知识产权局、申请号为201711140813.0、发明名称为“一种请求恢复连接的方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese Patent Application filed on November 16, 2017, the disclosure of which is hereby incorporated by reference. Combined in this application.
技术领域Technical field
本申请涉及移动通信技术领域,尤其涉及一种请求恢复连接的方法及装置。The present application relates to the field of mobile communications technologies, and in particular, to a method and apparatus for requesting to restore a connection.
背景技术Background technique
在长期演进(long term evolution,LTE)中,挂起和恢复流程可用于窄带-物联网(narrowband internet of things,NB-IoT)的终端,即移动性较低或耗电低的物联网设备,如智能水表。In long term evolution (LTE), the suspend and resume process can be used for narrowband internet of things (NB-IoT) terminals, ie, IoT devices with low mobility or low power consumption. Such as smart water meters.
当基站以挂起的方式通知终端释放当前连接时,终端和基站会删除部分接入层的上下文,以及还会保留部分接入层的上下文,如接入层密钥,终端的安全能力,当前选择的安全算法等。然后终端从连接态进入不活跃态。当终端希望恢复与基站的连接时,可以快速地从不活跃态恢复到连接态。When the base station informs the terminal to release the current connection in a suspended manner, the terminal and the base station delete the context of the part of the access layer, and also retain the context of the part of the access layer, such as the access layer key, the security capability of the terminal, and the current Selected security algorithms, etc. The terminal then enters an inactive state from the connected state. When the terminal wishes to resume the connection with the base station, it can quickly recover from the inactive state to the connected state.
第五代(5th generation,5G)系统及未来的通信系统中,可以扩展上述服务流程,将挂起和恢复流程应用到增强移动带宽(enhanced mobile broadband,eMBB)的终端,如智能手机。In the fifth generation (5th generation, 5G) system and future communication systems, the above service flow can be extended to apply the suspend and resume process to an enhanced mobile broadband (eMBB) terminal such as a smart phone.
由于终端的移动性较高,因而终端所接入的基站可能发生改变。进一步地,基站在服务终端时,会考虑负载均衡的场景。例如,当终端请求从不活跃态恢复到连接态时,若终端当前想要接入的基站的负载较重,则该基站将会拒绝该终端的接入,即拒绝该终端的连接恢复请求,并向终端发送计时器的信息,计时器的信息用于通知终端拒绝接入的时间,也可以理解为,用于通知终端重新发起连接恢复请求所需要等待的最小时长。Due to the high mobility of the terminal, the base station to which the terminal is connected may change. Further, when the base station serves the terminal, a scenario of load balancing is considered. For example, when the terminal requests to recover from the inactive state to the connected state, if the load of the base station that the terminal currently wants to access is heavy, the base station will reject the access of the terminal, that is, reject the connection recovery request of the terminal. And sending the timer information to the terminal, the information of the timer is used to notify the terminal of the time of denying the access, and can also be understood as the minimum duration for waiting for the terminal to re-initiate the connection recovery request.
在上述场景下,存在的一个问题是:若攻击者获取到基站发送给终端的计时器的信息,则计时器的信息有可能被篡改。例如,若攻击者将计时器的信息所指示的等待时长修改为更大的时长,将延长终端重新发起连接恢复请求的时长。In the above scenario, there is a problem that if the attacker obtains the information of the timer sent by the base station to the terminal, the information of the timer may be tampered with. For example, if the attacker modifies the waiting time indicated by the timer information to a larger duration, the length of time for the terminal to re-initiate the connection recovery request is extended.
发明内容Summary of the invention
本申请提供一种请求恢复连接的方法及装置,用以解决计时器的信息被篡改的问题。The present application provides a method and apparatus for requesting a recovery connection to solve the problem that the information of the timer is tampered with.
第一方面,本申请提供一种请求恢复连接的方法,包括:终端向目标基站发送连接恢复请求消息,所述连接恢复请求消息用于请求恢复无线资源控制(radio resource control,RRC)连接;In a first aspect, the present application provides a method for requesting to restore a connection, including: a terminal sending a connection recovery request message to a target base station, where the connection recovery request message is used to request to restore a radio resource control (RRC) connection;
所述终端接收来自所述目标基站的连接恢复拒绝消息和消息认证码,所述连接恢复拒绝消息用于指示拒绝所述终端恢复所述RRC连接,所述连接恢复拒绝消息包括计时器的信息,所述消息认证码是根据源基站的完整性保护密钥和所述计时器的信息生 成的;The terminal receives a connection recovery reject message and a message authentication code from the target base station, where the connection recovery reject message is used to indicate that the terminal is denied to restore the RRC connection, and the connection recovery reject message includes information of a timer. The message authentication code is generated according to an integrity protection key of the source base station and information of the timer;
所述终端若根据所述计时器的信息和所述终端的完整性保护密钥,校验所述消息认证码正确,则根据所述计时器的信息发起连接恢复请求流程。If the terminal verifies that the message authentication code is correct according to the information of the timer and the integrity protection key of the terminal, the terminal initiates a connection recovery request procedure according to the information of the timer.
上述方法,由于目标基站根据计时器的信息生成了消息认证码,终端在使用计时器的信息之前,先校验消息认证码,若校验正确,则认为计时器的信息没有被攻击者修改,因此终端根据计时器的信息发起连接恢复请求流程,从而终端可以正常依据计时器的信息重新发起连接恢复请求,有效地避免了使用了被攻击者篡改的计时器的信息。In the above method, the target base station generates the message authentication code according to the information of the timer, and the terminal checks the message authentication code before using the information of the timer. If the verification is correct, the information of the timer is not modified by the attacker. Therefore, the terminal initiates a connection recovery request process according to the information of the timer, so that the terminal can re-initiate the connection recovery request according to the information of the timer, thereby effectively avoiding the use of the timer of the timer falsified by the attacker.
在一种可能的实现方式中,所述消息认证码是根据源基站的完整性保护密钥、所述计时器的信息和新鲜性参数生成的,相邻两次生成消息认证码所使用的新鲜性参数不同。In a possible implementation, the message authentication code is generated according to the integrity protection key of the source base station, the information of the timer, and the freshness parameter, and the message used by the message authentication code is generated twice. Sexual parameters are different.
上述方法,通过引入新鲜性参数,使得每次生成的消息认证码都不同,可有效解决攻击者不停地向终端发送同样的连接恢复拒绝消息而导致终端一直睡眠的问题。The above method, by introducing the freshness parameter, makes the message authentication code generated each time different, which can effectively solve the problem that the attacker continuously sends the same connection recovery rejection message to the terminal and causes the terminal to sleep all the time.
在一种可能的实现方式中,所述新鲜性参数包括拒绝次数,所述拒绝次数用于表示所述终端尝试恢复所述RRC连接时被拒绝的次数。In a possible implementation manner, the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
在一种可能的实现方式中,所述连接恢复请求消息包括指示参数,所述指示参数用于指示所述新鲜性参数。可选地,所述新鲜性参数包括分组数据汇聚协议计数PDCP COUNT,所述指示参数包括所述PDCP COUNT的部分或全部比特位。In a possible implementation manner, the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate the freshness parameter. Optionally, the freshness parameter comprises a packet data convergence protocol count PDCP COUNT, the indication parameter comprising part or all of the bits of the PDCP COUNT.
第二方面,本申请提供一种请求恢复连接的方法,包括:源基站接收来自目标基站的计时器的信息;所述源基站根据所述计时器的信息和所述源基站的完整性保护密钥,生成消息认证码,所述消息认证码用于所述终端认证所述计时器的信息的合法性;所述源基站将所述消息认证码发送至所述目标基站。In a second aspect, the present application provides a method for requesting a connection to restore, comprising: receiving, by a source base station, information of a timer from a target base station; and the source base station protecting the density according to the information of the timer and the integrity of the source base station And generating a message authentication code, where the message authentication code is used for authenticity of the information that the terminal authenticates the timer; and the source base station sends the message authentication code to the target base station.
在一种可能的实现方式中,所述源基站根据所述计时器的信息和所述源基站的完整性保护密钥,生成消息认证码,包括:所述源基站根据所述计时器的信息、所述源基站的完整性保护密钥和新鲜性参数生成所述消息认证码;其中,相邻两次生成消息认证码所使用的新鲜性参数不同。In a possible implementation, the source base station generates a message authentication code according to the information of the timer and the integrity protection key of the source base station, including: the source base station according to the information of the timer The integrity protection key and the freshness parameter of the source base station generate the message authentication code; wherein the freshness parameters used to generate the message authentication code twice are different.
在一种可能的实现方式中,所述新鲜性参数包括拒绝次数,所述拒绝次数用于表示所述终端尝试恢复所述RRC连接时被拒绝的次数。In a possible implementation manner, the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
在一种可能的实现方式中,所述源基站还可以接收来自所述目标基站的指示参数,所述指示参数用于指示所述新鲜性参数。In a possible implementation manner, the source base station may further receive an indication parameter from the target base station, where the indication parameter is used to indicate the freshness parameter.
在这种实现方式中,所述新鲜性参数可以包括分组数据汇聚协议计数PDCP COUNT,所述指示参数包括所述PDCP COUNT的部分或全部比特位。第三方面,本申请提供一种请求恢复连接的方法,包括:源基站接收来自目标基站的连接拒绝请求消息,所述连接拒绝请求消息包括计时器的信息,所述连接拒绝请求消息用于指示拒绝所述终端恢复无线资源控制RRC连接;所述源基站根据所述连接拒绝请求消息和所述源基站的完整性保护密钥,生成消息认证码,所述消息认证码用于所述终端认证所述计时器的信息的合法性;所述源基站将所述消息认证码发送至所述目标基站。In such an implementation, the freshness parameter may include a packet data convergence protocol count PDCP COUNT, the indication parameter including some or all of the bits of the PDCP COUNT. In a third aspect, the present application provides a method for requesting a connection to restore, comprising: receiving, by a source base station, a connection reject request message from a target base station, where the connection reject request message includes information of a timer, and the connection reject request message is used to indicate Rejecting the terminal to restore the radio resource control RRC connection; the source base station generates a message authentication code according to the connection reject request message and the integrity protection key of the source base station, where the message authentication code is used for the terminal authentication The validity of the information of the timer; the source base station sends the message authentication code to the target base station.
在一种可能的实现方式中,所述源基站根据所述连接拒绝请求消息和所述源基站的完整性保护密钥,生成消息认证码,包括:所述源基站根据所述连接拒绝请求消息、所述源基站的完整性保护密钥和新鲜性参数,生成消息认证码;其中,相邻两次生成 消息认证码所使用的新鲜性参数不同。In a possible implementation, the source base station generates a message authentication code according to the connection reject request message and the integrity protection key of the source base station, including: the source base station according to the connection reject request message And the integrity protection key and the freshness parameter of the source base station generate a message authentication code; wherein the freshness parameters used to generate the message authentication code twice are different.
在一种可能的实现方式中,所述新鲜性参数包括拒绝次数,所述拒绝次数用于表示终端尝试恢复所述RRC连接时被拒绝的次数。In a possible implementation manner, the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
在一种可能的实现方式中,所述源基站接收来自所述目标基站的指示参数,所述指示参数用于指示所述新鲜性参数。In a possible implementation manner, the source base station receives an indication parameter from the target base station, where the indication parameter is used to indicate the freshness parameter.
在这种实现方式中,所述新鲜性参数可以包括分组数据汇聚协议计数PDCP COUNT,所述指示参数包括所述PDCP COUNT的部分或全部比特位。第四方面,本申请提供一种请求恢复连接的方法,包括:目标基站接收来自终端的连接恢复请求消息,所述连接恢复请求消息用于请求恢复无线资源控制RRC连接;所述目标基站若拒绝恢复所述RRC连接,则向所述终端发送连接恢复拒绝消息和消息认证码,所述连接恢复拒绝消息包括计时器的信息,所述连接拒绝请求消息用于指示拒绝所述终端恢复所述RRC连接,所述消息认证码用于终端认证所述计时器的合法性。In such an implementation, the freshness parameter may include a packet data convergence protocol count PDCP COUNT, the indication parameter including some or all of the bits of the PDCP COUNT. In a fourth aspect, the application provides a method for requesting a connection to restore, comprising: receiving, by a target base station, a connection recovery request message from a terminal, where the connection recovery request message is used to request to restore a radio resource control RRC connection; if the target base station rejects Recovering the RRC connection, sending a connection recovery reject message and a message authentication code to the terminal, the connection recovery reject message includes information of a timer, and the connection reject request message is used to indicate that the terminal is refused to resume the RRC The message authentication code is used by the terminal to authenticate the validity of the timer.
在一种可能的实现方式中,该方法还可以包括:所述目标基站向源基站发送所述计时器的信息;所述目标基站接收来自所述源基站的所述消息认证码,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥和所述计时器的信息生成。In a possible implementation, the method may further include: the target base station transmitting information of the timer to a source base station; the target base station receiving the message authentication code from the source base station, the message The authentication code is generated by the source base station according to the integrity protection key of the source base station and the information of the timer.
在一种可能的实现方式中,所述连接恢复请求消息包括指示参数,所述指示参数用于指示新鲜性参数;所述目标基站向所述源基站发送所述指示参数;其中,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥、所述新鲜性参数和所述计时器的信息生成,相邻两次生成消息认证码所使用的新鲜性参数不同。In a possible implementation, the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate a freshness parameter, and the target base station sends the indication parameter to the source base station; wherein the message The authentication code is generated by the source base station according to the integrity protection key of the source base station, the freshness parameter, and the information of the timer, and the freshness parameters used to generate the message authentication code twice are different.
在一种可能的实现方式中,所述目标基站向源基站发送所述连接拒绝请求消息;所述目标基站接收来自所述源基站的所述消息认证码,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥和所述连接拒绝请求消息生成。In a possible implementation manner, the target base station sends the connection reject request message to a source base station; the target base station receives the message authentication code from the source base station, where the message authentication code is used by the source The base station generates according to the integrity protection key of the source base station and the connection reject request message.
在这种实现方式中,所述连接恢复请求消息可以包括指示参数,所述指示参数用于指示新鲜性参数;该方法还可以包括:目标基站向所述源基站发送所述指示参数;其中,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥、所述新鲜性参数和所述连接拒绝请求消息生成,相邻两次生成消息认证码所使用的新鲜性参数不同。In this implementation, the connection recovery request message may include an indication parameter, where the indication parameter is used to indicate a freshness parameter, and the method may further include: the target base station sending the indication parameter to the source base station; The message authentication code is generated by the source base station according to the integrity protection key of the source base station, the freshness parameter, and the connection rejection request message, and the freshness parameter used by the message authentication code is generated twice. different.
在一种可能的实现方式中,该方法还可以包括:所述目标基站接收来自所述源基站的密钥;所述目标基站根据所述密钥和所述计时器的信息,生成所述消息认证码。In a possible implementation manner, the method may further include: the target base station receiving a key from the source base station; and the target base station generating the message according to the information of the key and the timer Authentication Code.
在一种可能的实现方式中,所述目标基站根据所述密钥和所述计时器的信息,生成所述消息认证码,包括:所述目标基站根据所述密钥、所述计时器的信息和新鲜性参数,生成所述消息认证码;其中,相邻两次生成消息认证码所使用的新鲜性参数不同。In a possible implementation manner, the target base station generates the message authentication code according to the information of the key and the timer, including: the target base station according to the key, the timer The information and freshness parameters are generated, and the message authentication code is generated; wherein the freshness parameters used to generate the message authentication code two times are different.
在一种可能的实现方式中,所述新鲜性参数包括拒绝次数,所述拒绝次数用于表示终端尝试恢复所述RRC连接时被拒绝的次数。In a possible implementation manner, the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
在一种可能的实现方式中,所述连接恢复请求消息包括指示参数,所述指示参数用于指示所述新鲜性参数,所述新鲜性参数包括分组数据汇聚协议计数PDCP COUNT,所述指示参数包括所述PDCP COUNT的部分或全部比特位。In a possible implementation, the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate the freshness parameter, and the freshness parameter includes a packet data convergence protocol count PDCP COUNT, the indication parameter Some or all of the bits of the PDCP COUNT are included.
在一种可能的实现方式中,该方法还可以包括:所述目标基站接收来自所述源基站的密钥;所述目标基站根据所述密钥和所述连接请求拒绝消息,生成所述消息认证 码。In a possible implementation manner, the method may further include: the target base station receiving a key from the source base station; and the target base station generating the message according to the key and the connection request rejection message Authentication Code.
在一种可能的实现方式中,所述目标基站根据所述密钥和所述连接请求拒绝消息,生成所述消息认证码,包括:所述目标基站根据所述密钥、所述连接请求拒绝消息和新鲜性参数,生成所述消息认证码;其中,相邻两次生成消息认证码所使用的新鲜性参数不同。In a possible implementation manner, the target base station generates the message authentication code according to the key and the connection request rejection message, including: the target base station rejects according to the key, the connection request The message and the freshness parameter are generated, and the message authentication code is generated; wherein the freshness parameters used to generate the message authentication code two times are different.
在一种可能的实现方式中,所述新鲜性参数包括拒绝次数,所述拒绝次数用于表示终端尝试恢复所述RRC连接时被拒绝的次数。In a possible implementation manner, the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
在一种可能的实现方式中,所述连接恢复请求消息包括指示参数,所述指示参数用于指示所述新鲜性参数,所述新鲜性参数包括分组数据汇聚协议计数PDCP COUNT,所述指示参数包括所述PDCP COUNT的部分或全部比特位。In a possible implementation, the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate the freshness parameter, and the freshness parameter includes a packet data convergence protocol count PDCP COUNT, the indication parameter Some or all of the bits of the PDCP COUNT are included.
第五方面,本申请提供一种装置,该装置可以是终端,也可以是终端内的芯片。该装置具有实现上述第一方面的各实施例的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。In a fifth aspect, the present application provides a device, which may be a terminal or a chip in a terminal. The device has the functionality to implement the various embodiments of the first aspect described above. This function can be implemented in hardware or in hardware by executing the corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
在一种可能的设计中,当该装置为终端时,终端包括:发送单元、处理单元和接收单元。处理单元例如可以是处理器,接收单元例如可以是接收器,发送单元,例如可以是发送器。接收器和发送器包括射频电路。可选地,终端还包括存储单元,该存储单元例如可以是存储器。当终端包括存储单元时,该存储单元存储有计算机执行指令,处理单元与存储单元连接,处理单元执行存储单元存储的计算机执行指令,以使该终端执行上述第一方面任意一项的请求恢复连接的方法。In a possible design, when the device is a terminal, the terminal includes: a transmitting unit, a processing unit, and a receiving unit. The processing unit may for example be a processor, which may for example be a receiver, a transmitting unit, for example a transmitter. The receiver and transmitter include radio frequency circuits. Optionally, the terminal further comprises a storage unit, which may be, for example, a memory. When the terminal includes a storage unit, the storage unit stores a computer execution instruction, the processing unit is connected to the storage unit, and the processing unit executes a computer execution instruction stored by the storage unit, so that the terminal performs the request to restore the connection according to any one of the foregoing first aspects. Methods.
在另一种可能的设计中,当该装置为终端内的芯片时,芯片包括:发送单元、处理单元和接收单元。处理单元例如可以是处理电路,接收单元例如可以是输入接口、管脚或电路等,发送单元例如可以是输出接口、管脚或电路等。该处理单元可执行存储单元存储的计算机执行指令,以使上述第一方面任意一项的请求恢复连接的方法被执行。可选地,存储单元可以是芯片内的存储单元,如寄存器、缓存等,存储单元还可以是终端内的位于芯片外部的存储单元,如只读存储器(read-only memory,ROM)、可存储静态信息和指令的其他类型的静态存储设备、随机存取存储器(random access memory,RAM)等。In another possible design, when the device is a chip in the terminal, the chip includes: a transmitting unit, a processing unit, and a receiving unit. The processing unit can be, for example, a processing circuit, which can be, for example, an input interface, a pin or a circuit, etc., and the transmitting unit can be, for example, an output interface, a pin or a circuit. The processing unit may execute a computer-executed instruction stored by the storage unit to cause the method of restoring the connection of any of the above-described first aspects to be performed. Optionally, the storage unit may be a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in the terminal, such as a read-only memory (ROM), and may be stored. Other types of static storage devices, random access memory (RAM), etc. for static information and instructions.
其中,上述任一处提到的处理器,可以是一个通用的中央处理器(Central Processing Unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制上述第一方面任意一项的请求恢复连接的方法的程序执行的集成电路。The processor mentioned in any of the above may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more A program-implemented integrated circuit for controlling a method of requesting a resume connection of any of the above first aspects.
第六方面,本申请提供一种装置,该装置可以是源基站,也可以是源基站内的芯片。该装置具有实现上述第二方面的各实施例的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。In a sixth aspect, the application provides a device, which may be a source base station or a chip in a source base station. The device has the functionality to implement the various embodiments of the second aspect described above. This function can be implemented in hardware or in hardware by executing the corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
在一种可能的设计中,当该装置为源基站时,基站包括:接收单元、发送单元和处理单元。处理单元例如可以是处理器,接收单元例如可以是接收器,发送单元,例如可以是发送器。接收器和发送器包括射频电路。可选地,基站还包括存储单元,该存储单元例如可以是存储器。当基站包括存储单元时,该存储单元存储有计算机执行 指令,处理单元与存储单元连接,处理单元执行存储单元存储的计算机执行指令,以使该基站执行上述第二方面任意一项的请求恢复连接的方法。In a possible design, when the device is a source base station, the base station includes: a receiving unit, a transmitting unit, and a processing unit. The processing unit may for example be a processor, which may for example be a receiver, a transmitting unit, for example a transmitter. The receiver and transmitter include radio frequency circuits. Optionally, the base station further comprises a storage unit, which may be, for example, a memory. When the base station includes a storage unit, the storage unit stores a computer execution instruction, the processing unit is coupled to the storage unit, and the processing unit executes a computer execution instruction stored by the storage unit to cause the base station to perform the request to restore the connection according to any one of the foregoing second aspects. Methods.
在另一种可能的设计中,当该装置为源基站内的芯片时,芯片包括:接收单元、发送单元和处理单元。处理单元例如可以是处理电路,接收单元例如可以是输入接口、管脚或电路等,发送单元例如可以是输出接口、管脚或电路等。该处理单元可执行存储单元存储的计算机执行指令,以使上述第二方面任意一项的请求恢复连接的方法被执行。可选地,存储单元可以是芯片内的存储单元,如寄存器、缓存等,存储单元还可以是终端内的位于芯片外部的存储单元,如只ROM、可存储静态信息和指令的其他类型的静态存储设备、RAM等。In another possible design, when the device is a chip in a source base station, the chip includes: a receiving unit, a transmitting unit, and a processing unit. The processing unit can be, for example, a processing circuit, which can be, for example, an input interface, a pin or a circuit, etc., and the transmitting unit can be, for example, an output interface, a pin or a circuit. The processing unit may execute a computer-executed instruction stored by the storage unit to cause the method of restoring the connection of any of the above-described second aspects to be performed. Optionally, the storage unit may be a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in the terminal, such as a ROM only, other types of statics that can store static information and instructions. Storage device, RAM, etc.
其中,上述任一处提到的处理器,可以是一个通用的CPU,微处理器,ASIC,或一个或多个用于控制上述第二方面任意一项的请求恢复连接的方法的程序执行的集成电路。Wherein, the processor mentioned in any of the above may be a general-purpose CPU, a microprocessor, an ASIC, or a program executed by one or more methods for controlling the connection recovery request of any of the above second aspects. integrated circuit.
第七方面,本申请提供一种装置,该装置可以是源基站,也可以是源基站内的芯片。该装置具有实现上述第三方面的各实施例的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。In a seventh aspect, the application provides a device, which may be a source base station or a chip in a source base station. The device has the functionality to implement the various embodiments of the third aspect described above. This function can be implemented in hardware or in hardware by executing the corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
在一种可能的设计中,当该装置为源基站时,基站包括:接收单元、发送单元和处理单元。处理单元例如可以是处理器,接收单元例如可以是接收器,发送单元,例如可以是发送器。接收器和发送器包括射频电路。可选地,基站还包括存储单元,该存储单元例如可以是存储器。当基站包括存储单元时,该存储单元存储有计算机执行指令,处理单元与存储单元连接,处理单元执行存储单元存储的计算机执行指令,以使该基站执行上述第三方面任意一项的请求恢复连接的方法。In a possible design, when the device is a source base station, the base station includes: a receiving unit, a transmitting unit, and a processing unit. The processing unit may for example be a processor, which may for example be a receiver, a transmitting unit, for example a transmitter. The receiver and transmitter include radio frequency circuits. Optionally, the base station further comprises a storage unit, which may be, for example, a memory. When the base station includes a storage unit, the storage unit stores a computer execution instruction, the processing unit is connected to the storage unit, and the processing unit executes a computer execution instruction stored by the storage unit, so that the base station performs the request to restore the connection according to any one of the foregoing third aspects. Methods.
在另一种可能的设计中,当该装置为源基站内的芯片时,芯片包括:接收单元、发送单元和处理单元。处理单元例如可以是处理电路,接收单元例如可以是输入接口、管脚或电路等,发送单元例如可以是输出接口、管脚或电路等。该处理单元可执行存储单元存储的计算机执行指令,以使上述第三方面任意一项的请求恢复连接的方法被执行。可选地,存储单元可以是芯片内的存储单元,如寄存器、缓存等,存储单元还可以是终端内的位于芯片外部的存储单元,如只ROM、可存储静态信息和指令的其他类型的静态存储设备、RAM等。In another possible design, when the device is a chip in a source base station, the chip includes: a receiving unit, a transmitting unit, and a processing unit. The processing unit can be, for example, a processing circuit, which can be, for example, an input interface, a pin or a circuit, etc., and the transmitting unit can be, for example, an output interface, a pin or a circuit. The processing unit may execute a computer-executed instruction stored by the storage unit to cause the method of restoring the connection of any of the above-described third aspects to be performed. Optionally, the storage unit may be a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in the terminal, such as a ROM only, other types of statics that can store static information and instructions. Storage device, RAM, etc.
其中,上述任一处提到的处理器,可以是一个通用的CPU,微处理器,ASIC,或一个或多个用于控制上述第三方面任意一项的请求恢复连接的方法的程序执行的集成电路。Wherein, the processor mentioned in any of the above may be a general-purpose CPU, a microprocessor, an ASIC, or a program executed by one or more methods for controlling the connection recovery request of any of the above third aspects. integrated circuit.
第八方面,本申请提供一种装置,该装置可以是目标基站,也可以是目标基站内的芯片。该装置具有实现上述第四方面的各实施例的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。In an eighth aspect, the present application provides an apparatus, which may be a target base station or a chip in a target base station. The device has the functionality to implement the various embodiments of the fourth aspect described above. This function can be implemented in hardware or in hardware by executing the corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
在一种可能的设计中,当该装置为目标基站时,基站包括:接收单元和发送单元,可选地,还包括处理单元。处理单元例如可以是处理器,接收单元例如可以是接收器,发送单元,例如可以是发送器。接收器和发送器包括射频电路。可选地,基站还包括存储单元,该存储单元例如可以是存储器。当基站包括存储单元时,该存储单元存储 有计算机执行指令,处理单元与存储单元连接,处理单元执行存储单元存储的计算机执行指令,以使该基站执行上述第四方面任意一项的请求恢复连接的方法。In a possible design, when the device is a target base station, the base station includes: a receiving unit and a sending unit, and optionally, a processing unit. The processing unit may for example be a processor, which may for example be a receiver, a transmitting unit, for example a transmitter. The receiver and transmitter include radio frequency circuits. Optionally, the base station further comprises a storage unit, which may be, for example, a memory. When the base station includes a storage unit, the storage unit stores a computer execution instruction, the processing unit is coupled to the storage unit, and the processing unit executes a computer execution instruction stored by the storage unit to cause the base station to perform the request to restore the connection according to any one of the foregoing fourth aspects. Methods.
在另一种可能的设计中,当该装置为目标基站内的芯片时,芯片包括:接收单元和发送单元,可选地,还包括处理单元。处理单元例如可以是处理电路,接收单元例如可以是输入接口、管脚或电路等,发送单元例如可以是输出接口、管脚或电路等。该处理单元可执行存储单元存储的计算机执行指令,以使上述第四方面任意一项的请求恢复连接的方法被执行。可选地,存储单元可以是芯片内的存储单元,如寄存器、缓存等,存储单元还可以是终端内的位于芯片外部的存储单元,如只ROM、可存储静态信息和指令的其他类型的静态存储设备、RAM等。In another possible design, when the device is a chip in a target base station, the chip includes: a receiving unit and a transmitting unit, and optionally, a processing unit. The processing unit can be, for example, a processing circuit, which can be, for example, an input interface, a pin or a circuit, etc., and the transmitting unit can be, for example, an output interface, a pin or a circuit. The processing unit may execute a computer-executed instruction stored by the storage unit to cause the method of requesting to restore the connection of any of the above fourth aspects to be performed. Optionally, the storage unit may be a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in the terminal, such as a ROM only, other types of statics that can store static information and instructions. Storage device, RAM, etc.
其中,上述任一处提到的处理器,可以是一个通用的CPU,微处理器,ASIC,或一个或多个用于控制上述第四方面任意一项的请求恢复连接的方法的程序执行的集成电路。Wherein, the processor mentioned in any of the above may be a general-purpose CPU, a microprocessor, an ASIC, or a program executed by one or more methods for controlling a connection recovery connection according to any of the above fourth aspects. integrated circuit.
第九方面,本申请还提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述各方面所述的方法。In a ninth aspect, the present application further provides a computer readable storage medium having instructions stored therein that, when executed on a computer, cause the computer to perform the methods described in the above aspects.
第十方面,本申请还提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述各方面所述的方法。In a tenth aspect, the present application also provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the methods described in the various aspects above.
第十一方面,本申请提供一种通信系统,所述系统包括第五方面所述的装置、第六方面所述的装置和第八方面所述的装置,或者,所述系统包括第五方面所述的装置、第七方面所述的装置和第八方面所述的装置。In an eleventh aspect, the present application provides a communication system, the system comprising the device of the fifth aspect, the device of the sixth aspect, and the device of the eighth aspect, or the system includes the fifth aspect The device, the device of the seventh aspect, and the device of the eighth aspect.
另外,第二方面至第十一方面中任一种实现方式方式所带来的技术效果可参见第一方面中不同实现方式方式所带来的技术效果,此处不再赘述。In addition, the technical effects brought by the implementation modes of the first aspect to the eleventh aspect can be referred to the technical effects brought by different implementation manners in the first aspect, and details are not described herein again.
本申请的这些方面或其他方面在以下实施例的描述中会更加简明易懂。These and other aspects of the present application will be more readily apparent from the following description of the embodiments.
附图说明DRAWINGS
图1为本申请提供的一种可能的网络架构示意图;FIG. 1 is a schematic diagram of a possible network architecture provided by the present application;
图2为本申请提供的一种请求恢复连接的方法示意图;2 is a schematic diagram of a method for requesting a connection to be restored according to the present application;
图3为本申请提供的另一种请求恢复连接的方法流程图;FIG. 3 is a flowchart of another method for requesting a recovery connection according to the present application; FIG.
图4为本申请提供的另一种请求恢复连接的方法流程图;4 is a flowchart of another method for requesting a recovery connection according to the present application;
图5为本申请提供的另一种请求恢复连接的方法流程图;FIG. 5 is a flowchart of another method for requesting a recovery connection according to the present application; FIG.
图6为本申请提供的另一种请求恢复连接的方法流程图;FIG. 6 is a flowchart of another method for requesting a recovery connection according to the present application; FIG.
图7为本申请提供的一种装置示意图;Figure 7 is a schematic diagram of a device provided by the present application;
图8为本申请提供的另一种装置示意图;Figure 8 is a schematic diagram of another apparatus provided by the present application;
图9为本申请提供的另一种装置示意图;Figure 9 is a schematic view of another apparatus provided by the present application;
图10为本申请提供的另一种装置示意图。FIG. 10 is a schematic diagram of another apparatus provided by the present application.
具体实施方式Detailed ways
下面将结合附图对本申请作进一步地详细描述。方法实施例中的具体操作方法也可以应用于装置实施例或系统实施例中。其中,在本申请的描述中,除非另有说明,“多个”的含义是两个或两个以上。The present application will be further described in detail below with reference to the accompanying drawings. The specific method of operation in the method embodiments can also be applied to device embodiments or system embodiments. In the description of the present application, the meaning of "a plurality" is two or more unless otherwise stated.
需要说明的的是,本申请的请求恢复连接的方法可由装置执行。其中,该装置可以包括网络侧的装置和/或终端侧的装置。在网络侧,该装置可以是基站或基站内的芯片,即可以由基站或基站内的芯片执行本申请的请求恢复连接的方法;在终端侧,该装置可以是终端或终端内的芯片,即可以由终端或终端内的芯片执行本申请的请求恢复连接的方法。其中,基站可以是目标基站或源基站。It should be noted that the method of requesting to restore the connection of the present application may be performed by a device. Wherein, the device may include a device on the network side and/or a device on the terminal side. On the network side, the device may be a chip in the base station or the base station, that is, the method of requesting to restore the connection may be performed by the chip in the base station or the base station; on the terminal side, the device may be a chip in the terminal or the terminal, that is, The method of requesting to restore a connection of the present application can be performed by a chip in a terminal or a terminal. The base station may be a target base station or a source base station.
为方便说明,本申请,以装置为基站或终端为例,对请求恢复连接的方法进行说明,对于装置为基站内的芯片或终端内的芯片的实现方法,可参考基站或终端的请求恢复连接的方法的具体说明,不再重复介绍。For convenience of description, the present application uses a device as a base station or a terminal as an example to describe a method for requesting to restore a connection. For a method in which a device is a chip in a base station or a chip in a terminal, the connection may be restored by referring to the request of the base station or the terminal. The specific description of the method is not repeated.
如图1所示,为本申请的一种可能的网络架构示意图。包括终端、源基站和目标基站。终端通过无线接口与源基站、目标基站进行通信。源基站与目标基站之间可以通过有线连接进行通信,如通过X2接口,Xn接口进行通信,或者还可以通过空口的方式进行通信。FIG. 1 is a schematic diagram of a possible network architecture of the present application. It includes a terminal, a source base station, and a target base station. The terminal communicates with the source base station and the target base station through a wireless interface. The source base station and the target base station can communicate through a wired connection, such as through an X2 interface, an Xn interface, or can communicate through an air interface.
本申请中,由于终端的移动等原因,终端可能从源基站移动到目标基站。源基站是终端在先接入的基站,目标基站是终端移动后,在后接入的基站。In the present application, the terminal may move from the source base station to the target base station due to the movement of the terminal or the like. The source base station is a base station that the terminal accesses first, and the target base station is a base station that is accessed after the terminal moves.
其中,终端是一种具有无线收发功能的设备,可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。所述终端可以是手机(mobile phone)、平板电脑(pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端、增强现实(augmented reality,AR)终端、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等等。Among them, the terminal is a device with wireless transceiver function, which can be deployed on land, indoors or outdoors, handheld or on-board; it can also be deployed on the water surface (such as ships); it can also be deployed in the air (such as airplanes, balloons). And satellites, etc.). The terminal may be a mobile phone, a tablet, a computer with wireless transceiver function, a virtual reality (VR) terminal, an augmented reality (AR) terminal, industrial control (industrial control) Wireless terminal, wireless terminal in self driving, wireless terminal in remote medical, wireless terminal in smart grid, wireless terminal in transportation safety, A wireless terminal in a smart city, a wireless terminal in a smart home, and the like.
基站,是一种为终端提供无线通信功能的设备,包括但不限于:5G中的下一代基站(g nodeB,gNB)、演进型节点B(evolved node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved nodeB,或home node B,HNB)、基带单元(BaseBand Unit,BBU)、传输点(transmitting and receiving point,TRP)、发射点(transmitting point,TP)、移动交换中心等。A base station is a device that provides wireless communication functions for a terminal, including but not limited to: a next-generation base station (g nodeB, gNB), an evolved node B (eNB), and a radio network controller (radio) in 5G. Network controller (RNC), node B (NB), base station controller (BSC), base transceiver station (BTS), home base station (for example, home evolved node B, or home node B) , HNB), BaseBand Unit (BBU), transmission and receiving point (TRP), transmitting point (TP), mobile switching center, etc.
本申请,终端一般情况下,具有三种状态,即连接(connected)态,空闲(idle)态和不活跃(inactive)态。In the present application, the terminal generally has three states, that is, a connected state, an idle state, and an inactive state.
其中,当终端处于连接态时,终端处于正常工作的状态。网络侧与终端之间可以发送和接收用户数据。Wherein, when the terminal is in the connected state, the terminal is in a normal working state. User data can be sent and received between the network side and the terminal.
当终端从连接态进入空闲态时,终端和基站一般会删除终端的全部的接入层(access stratum,AS)上下文。在一种特别的情况下,在4G中,当网络侧以挂起原因释放终端的连接时,终端也会从连接态进入空闲态,但此时,终端和基站会删除部分AS上下文,以及保留部分AS上下文,例如可以保留接入层密钥(4G中可以称为KeNB),终端的安全能力,终端和终端接入的源基站之间通信的安全算法(包括完整性保护算法和加密算法)。其中,终端的安全能力指的是终端支持的安全算法,包括支持的加密算法和支持的完整性保护算法。此时,终端所处于的特殊的空闲态可以称为挂起态。When the terminal enters the idle state from the connected state, the terminal and the base station generally delete all the access stratum (AS) contexts of the terminal. In a special case, in 4G, when the network side releases the connection of the terminal by the suspend reason, the terminal also enters the idle state from the connected state, but at this time, the terminal and the base station delete part of the AS context, and retain A partial AS context, for example, may retain an access layer key (which may be referred to as KeNB in 4G), a security capability of the terminal, and a security algorithm (including an integrity protection algorithm and an encryption algorithm) for communication between the terminal and the source base station to which the terminal accesses. . The security capability of the terminal refers to the security algorithm supported by the terminal, including the supported encryption algorithm and the supported integrity protection algorithm. At this time, the special idle state in which the terminal is located may be referred to as a suspended state.
在5G中,引入了不活跃态,当终端从连接态进入不活跃态时,基站将挂起终端, 此时,终端和基站删除部分AS上下文,以及保留部分AS上下文,例如可以保留接入层密钥(5G中可以称为KgNB),终端的安全能力,终端和终端接入的源基站之间通信的安全算法(包括完整性保护算法和加密算法)。其中,终端的安全能力指的是终端支持的安全算法,包括支持的加密算法和支持的完整性保护算法。In 5G, an inactive state is introduced. When the terminal enters the inactive state from the connected state, the base station suspends the terminal. At this time, the terminal and the base station delete part of the AS context, and reserve part of the AS context, for example, the access layer may be reserved. The key (which can be called KgNB in 5G), the security capability of the terminal, and the security algorithm (including integrity protection algorithm and encryption algorithm) for communication between the terminal and the source base station accessed by the terminal. The security capability of the terminal refers to the security algorithm supported by the terminal, including the supported encryption algorithm and the supported integrity protection algorithm.
为方便说明,后续统一将4G中定义的挂起态和5G中定义的不活跃态,称为不活跃态。当终端处于不活跃态时,终端和终端进入不活跃态之前所连接的基站都会保存部分的AS上下文,具体内容参见前述描述。For convenience of explanation, the subsequent unification of the suspended state defined in 4G and the inactive state defined in 5G is called inactive state. When the terminal is in an inactive state, the base station connected to the terminal and the terminal before the terminal enters the inactive state will save part of the AS context. For details, refer to the foregoing description.
当终端处于不活跃态时,由于终端上保留了部分AS上下文,因此相较于终端从空闲态进入连接态,终端从不活跃态进入连接态会更加快速。When the terminal is in an inactive state, since part of the AS context is reserved on the terminal, the terminal enters the connected state from the inactive state more quickly than when the terminal enters the connected state from the idle state.
另外,考虑到终端的移动性,当终端从不活跃态恢复到连接态时,终端可能需要更换基站。即,终端先与源基站建立连接,然后由于某些原因,例如网络侧通知等,终端在源基站进入不活跃态。当终端希望恢复到连接态时,若终端已经移动至目标基站的覆盖范围,则终端将在目标基站从不活跃态恢复到连接态。In addition, considering the mobility of the terminal, when the terminal returns from the inactive state to the connected state, the terminal may need to replace the base station. That is, the terminal first establishes a connection with the source base station, and then the terminal enters an inactive state at the source base station for some reason, such as network side notification. When the terminal wishes to return to the connected state, if the terminal has moved to the coverage of the target base station, the terminal will resume from the inactive state to the connected state at the target base station.
当然,本申请同样也适用终端从不活跃态恢复到连接态时,接入的目标基站与源基站相同的场景,即终端接入的基站也可以不发发生改变,仍然是同一个基站。Of course, the present application is also applicable to the scenario in which the target base station and the source base station are the same when the terminal is restored from the inactive state to the connected state, that is, the base station accessed by the terminal may not change, and is still the same base station.
下面结合附图介绍本申请提供的请求恢复连接的方法。The method for requesting a recovery connection provided by the present application is described below with reference to the accompanying drawings.
如图2所示,为本申请提供的一种请求恢复连接的方法示意图,包括以下步骤:As shown in FIG. 2, a schematic diagram of a method for requesting a connection recovery provided by the present application includes the following steps:
步骤201、终端向目标基站发送连接恢复请求消息,目标基站接收来自终端的连接恢复请求消息。Step 201: The terminal sends a connection recovery request message to the target base station, and the target base station receives a connection recovery request message from the terminal.
终端发送的连接恢复请求消息,用于请求恢复RRC连接。即终端请求从不活跃态恢复到连接态。A connection recovery request message sent by the terminal, used to request to resume the RRC connection. That is, the terminal requests to return from the inactive state to the connected state.
步骤202、目标基站决定拒绝终端的连接恢复请求。Step 202: The target base station determines to reject the connection recovery request of the terminal.
例如,目标基站的负载比较重,不能接入该终端,则目标基站可以拒绝该终端的连接恢复请求,即拒绝该终端接入目标基站。For example, if the load of the target base station is relatively heavy and cannot access the terminal, the target base station may reject the connection recovery request of the terminal, that is, reject the terminal from accessing the target base station.
步骤203、目标基站向终端发送连接恢复拒绝消息和消息认证码,终端接收来自目标基站的连接恢复拒绝消息和消息认证码。Step 203: The target base station sends a connection recovery reject message and a message authentication code to the terminal, where the terminal receives the connection recovery reject message and the message authentication code from the target base station.
其中,该连接恢复拒绝消息用于指示拒绝终端恢复RRC连接。连接恢复拒绝消息中携带计时器的信息,该计时器的信息用于指示拒绝终端接入的时间,也可以理解为,用于指示终端重新请求恢复RRC连接所需要等待的最小时长。例如,若计时器的信息指示的时长为30分钟,则终端至少需要等待30分钟才可以重新发起连接恢复请求。The connection recovery reject message is used to indicate that the terminal is denied the RRC connection. The connection recovery refusal message carries the information of the timer, and the information of the timer is used to indicate the time for denying the terminal access, and can also be understood as the minimum duration for the terminal to wait for the terminal to re-request to resume the RRC connection. For example, if the timer indicates that the duration is 30 minutes, the terminal needs to wait at least 30 minutes to re-initiate the connection recovery request.
其中,消息认证码(message authentication code,MAC)用于终端认证计时器的信息的合法性。The message authentication code (MAC) is used for the validity of the information of the terminal authentication timer.
消息认证码是根据源基站的完整性保护密钥和计时器的信息生成的。The message authentication code is generated based on the integrity protection key of the source base station and the information of the timer.
或者,消息认证码是根据源基站的完整性保护密钥和连接恢复拒绝消息生成的,其中连接恢复拒绝消息中包括计时器的信息,可选地,连接恢复拒绝消息中还包括其它信息。Alternatively, the message authentication code is generated according to the integrity protection key and the connection recovery rejection message of the source base station, wherein the connection recovery rejection message includes information of a timer, and optionally, the connection recovery rejection message further includes other information.
步骤204、终端若根据计时器的信息和终端的完整性保护密钥,校验消息认证码正确,则根据计时器的信息发起连接恢复请求流程。Step 204: If the terminal verifies that the message authentication code is correct according to the information of the timer and the integrity protection key of the terminal, the terminal initiates a connection recovery request process according to the information of the timer.
其中,以目标基站发送给终端的消息认证码是根据源基站的完整性保护密钥和计时器的信息生成的为例,则终端校验消息认证码的方式为:终端根据计时器的信息和 终端的完整性保护密钥,生成消息认证码,若该消息认证码与目标基站发送给终端的消息认证码相同,则校验正确,若不相同,则校验失败。For example, the message authentication code sent by the target base station to the terminal is generated according to the integrity protection key of the source base station and the information of the timer, and the manner in which the terminal checks the message authentication code is: the terminal according to the information of the timer and The integrity protection key of the terminal generates a message authentication code. If the message authentication code is the same as the message authentication code sent by the target base station to the terminal, the verification is correct. If not, the verification fails.
若校验消息认证码正确,则终端认为计时器的信息没有被攻击者修改,因此终端根据计时器的信息发起连接恢复请求流程,即根据计时器的信息所指示的时长,重新发起连接恢复请求。If the verification message authentication code is correct, the terminal considers that the information of the timer is not modified by the attacker. Therefore, the terminal initiates a connection recovery request process according to the information of the timer, that is, re-initiates the connection recovery request according to the duration indicated by the information of the timer. .
若校验消息认证码失败,则终端忽略该计时器的信息,即不根据该计时器的信息所指示的时长重新发起连接恢复请求。If the verification message authentication code fails, the terminal ignores the information of the timer, that is, does not re-initiate the connection recovery request according to the duration indicated by the information of the timer.
通过上述步骤201-步骤204,由于目标基站根据计时器的信息生成了消息认证码,终端在使用计时器的信息之前,先校验消息认证码,若校验正确,则认为计时器的信息没有被攻击者修改,因此终端根据计时器的信息发起连接恢复请求流程,从而终端可以正常依据计时器的信息重新发起连接恢复请求,有效地避免了使用了被攻击者篡改的计时器的信息。Through the above steps 201-204, since the target base station generates the message authentication code according to the information of the timer, the terminal checks the message authentication code before using the information of the timer. If the verification is correct, the information of the timer is not found. The attacker modifies, so the terminal initiates a connection recovery request process according to the information of the timer, so that the terminal can re-initiate the connection recovery request according to the information of the timer, effectively avoiding the use of the timer of the tampering by the attacker.
下面举例说明为什么攻击者无法攻击成功。例如目标基站向终端发送的连接恢复拒绝消息包括的计时器的信息指示的时长为30分钟,以消息认证码是根据源基站的完整性保护密钥和计时器的信息生成的为例,则目标基站向终端发送的消息认证码是根据30分钟和源基站的完整性保护密钥生成的。用MAC(30分钟,Krrc-int1)表示生成的消息认证码,其中,Krrc-int1表示源基站的完整性保护密钥。The following example shows why an attacker cannot attack successfully. For example, the information of the timer included in the connection recovery rejection message sent by the target base station to the terminal is 30 minutes, and the message authentication code is generated according to the integrity protection key of the source base station and the information of the timer. The message authentication code sent by the base station to the terminal is generated according to the integrity protection key of the source base station for 30 minutes. The generated message authentication code is represented by MAC (30 minutes, Krrc-int1), where Krrc-int1 represents the integrity protection key of the source base station.
目标基站向终端发送MAC(30分钟,Krrc-int1)和连接恢复拒绝消息,连接恢复拒绝消息包括计时器的信息,计时器的信息指示的时长为30分钟。The target base station sends a MAC (30 minutes, Krrc-int1) and a connection recovery reject message to the terminal. The connection recovery reject message includes information of a timer, and the information of the timer indicates a duration of 30 minutes.
假设攻击者将连接恢复拒绝消息包括的计时器的信息所指示的时长修改为100分钟,则终端将获取到MAC(30分钟,Krrc-int1),以及从连接恢复拒绝消息中获取到100分钟。Assuming that the attacker modifies the duration indicated by the information of the timer included in the connection recovery rejection message to 100 minutes, the terminal will acquire the MAC (30 minutes, Krrc-int1), and acquire 100 minutes from the connection recovery rejection message.
接着,终端根据获取到的100分钟和终端的完整性保护密钥(用Krrc-int2表示)生成消息认证码MAC(100分钟,Krrc-int2)。其中,正常情况下,Krrc-int1与Krrc-int2是相同的。Next, the terminal generates a message authentication code MAC (100 minutes, Krrc-int2) according to the acquired 100 minutes and the integrity protection key of the terminal (represented by Krrc-int2). Among them, Krrc-int1 and Krrc-int2 are the same under normal conditions.
可以看出,终端生成的MAC(100分钟,Krrc-int2)与目标基站发送给终端的MAC(30分钟,Krrc-int1),由于输入参数中的时长不同,因此二者不同,因此校验失败。从而,终端将忽略100分钟这个信息。因此,本申请方案可以起到保护不受攻击者攻击的作用。It can be seen that the MAC generated by the terminal (100 minutes, Krrc-int2) and the MAC sent by the target base station to the terminal (30 minutes, Krrc-int1) are different because the durations in the input parameters are different, so the verification fails. . Thus, the terminal will ignore this information for 100 minutes. Therefore, the solution of the present application can protect the attacker from attack.
下面介绍目标基站所发送的消息认证码的几种生成方法。The following describes several methods for generating the message authentication code sent by the target base station.
方法一、源基站根据计时器的信息、源基站的完整性保护密钥,生成消息认证码。Method 1: The source base station generates a message authentication code according to the information of the timer and the integrity protection key of the source base station.
如图3所示,为本申请提供的一种请求恢复连接的方法流程图,包括以下步骤:As shown in FIG. 3, a flow chart of a method for requesting a connection recovery provided by the present application includes the following steps:
步骤301-步骤302,与图2所示的步骤201-步骤202相同,可参考前述描述。Steps 301 to 302 are the same as steps 201 to 202 shown in FIG. 2, and the foregoing description may be referred to.
步骤303、目标基站向源基站发送计时器的信息,源基站接收来自目标基站的计时器的信息。Step 303: The target base station sends the information of the timer to the source base station, and the source base station receives the information of the timer from the target base station.
步骤304、源基站根据计时器的信息和源基站的完整性保护密钥,生成消息认证码。Step 304: The source base station generates a message authentication code according to the information of the timer and the integrity protection key of the source base station.
源基站的完整性保护密钥指的是源基站存储的终端的上下文所对应的完整性保护密钥,该完整性保护密钥是根据下列方式生成的:源基站获取终端的上下文中的完整性保护算法(也可以称为源基站的完整性保护算法)和接入层密钥,然后根据接入层 密钥,推衍得到完整性保护密钥(可以称为源基站的完整性保护密钥)。或,源基站直接获取终端的上下文中的完整性保护算法(也可以称为源基站的完整性保护算法)和终端的上下文中的完整性保护密钥(可以称为源基站的完整性保护密钥)。其中,接入层密钥还可以是更新后的接入层密钥。The integrity protection key of the source base station refers to the integrity protection key corresponding to the context of the terminal stored by the source base station, and the integrity protection key is generated according to the following manner: the source base station acquires the integrity in the context of the terminal. The protection algorithm (also referred to as the integrity protection algorithm of the source base station) and the access layer key, and then derive the integrity protection key according to the access layer key (which may be referred to as the integrity protection key of the source base station) ). Or, the source base station directly acquires an integrity protection algorithm in the context of the terminal (which may also be referred to as an integrity protection algorithm of the source base station) and an integrity protection key in the context of the terminal (which may be referred to as an integrity protection key of the source base station). key). The access layer key may also be an updated access layer key.
步骤305、源基站向目标基站发送消息认证码,目标基站接收来自源基站的消息认证码。Step 305: The source base station sends a message authentication code to the target base station, and the target base station receives the message authentication code from the source base station.
步骤306-步骤307,与图2所示的步骤203-步骤204相同,可参考前述描述。Step 306-Step 307 is the same as Step 203-Step 204 shown in FIG. 2, and can refer to the foregoing description.
上述方法一,是由源基站根据计时器的信息和源基站的完整性保护密钥,生成消息认证码,并发送给目标基站。In the first method, the source base station generates a message authentication code according to the information of the timer and the integrity protection key of the source base station, and sends the message authentication code to the target base station.
方法二、源基站根据连接拒绝请求消息、源基站的完整性保护密钥,生成消息认证码,其中,连接拒绝请求消息中包括计时器的信息。Method 2: The source base station generates a message authentication code according to the connection reject request message and the integrity protection key of the source base station, where the connection reject request message includes information of a timer.
如图4所示,为本申请提供的一种请求恢复连接的方法流程图,包括以下步骤:As shown in FIG. 4, a flow chart of a method for requesting a connection recovery provided by the present application includes the following steps:
步骤401-步骤402,与图2所示的步骤201-步骤202相同,可参考前述描述。Steps 401 to 402 are the same as steps 201 to 202 shown in FIG. 2, and may be referred to the foregoing description.
步骤403、目标基站向源基站发送连接拒绝请求消息,源基站接收来自目标基站的连接拒绝请求消息,其中,连接拒绝请求消息中包括计时器的信息。Step 403: The target base station sends a connection reject request message to the source base station, where the source base station receives a connection reject request message from the target base station, where the connection reject request message includes information of a timer.
连接拒绝请求消息是目标基站构造好准备发送给终端的。由于目标基站不具备终端的上下文,需要将该消息发送给源基站,由源基站做保护。The connection reject request message is that the target base station is configured to be sent to the terminal. Since the target base station does not have the context of the terminal, the message needs to be sent to the source base station, and the source base station performs protection.
步骤404、源基站根据连接拒绝请求消息和源基站的完整性保护密钥,生成消息认证码。Step 404: The source base station generates a message authentication code according to the connection reject request message and the integrity protection key of the source base station.
源基站获得完整性保护密钥,与图3所示的步骤304相同,可参考前述描述。The source base station obtains the integrity protection key, which is the same as step 304 shown in FIG. 3, and can refer to the foregoing description.
步骤405、源基站向目标基站发送消息认证码,目标基站接收来自源基站的消息认证码。Step 405: The source base station sends a message authentication code to the target base station, and the target base station receives the message authentication code from the source base station.
步骤406-步骤407,与图2所示的步骤203-步骤204相同,可参考前述描述。Step 406-Step 407 is the same as Step 203-Step 204 shown in FIG. 2, and may refer to the foregoing description.
上述方法二,是由源基站根据连接拒绝请求消息和源基站的完整性保护密钥,生成消息认证码,并发送给目标基站。由于连接拒绝请求消息包括计时器的信息,因此生成的消息认证码也可以对计时器的信息进行安全性保护。相应地,终端在校验时,则是根据接收到的连接拒绝请求消息和终端的完整性保护密钥,来校验消息认证码。In the second method, the source base station generates a message authentication code according to the connection reject request message and the integrity protection key of the source base station, and sends the message authentication code to the target base station. Since the connection rejection request message includes the information of the timer, the generated message authentication code can also secure the information of the timer. Correspondingly, when the terminal checks, the message authentication code is verified according to the received connection rejection request message and the integrity protection key of the terminal.
方法三、目标基站根据计时器的信息、源基站的完整性保护密钥,生成消息认证码。Method 3: The target base station generates a message authentication code according to the information of the timer and the integrity protection key of the source base station.
如图5所示,为本申请提供的一种请求恢复连接的方法流程图,包括以下步骤:As shown in FIG. 5, a flow chart of a method for requesting a connection recovery provided by the present application includes the following steps:
步骤501-步骤502,与图2所示的步骤201-步骤202相同,可参考前述描述。Steps 501 to 502 are the same as steps 201 to 202 shown in FIG. 2, and the foregoing description may be referred to.
步骤503、目标基站向源基站发送请求消息。Step 503: The target base station sends a request message to the source base station.
该请求消息向源基站请求获取密钥。The request message requests the source base station to acquire a key.
步骤504、源基站向目标基站发送密钥。Step 504: The source base station sends a key to the target base station.
其中,该密钥可以是源基站的完整性保护密钥,也可以是接入层密钥。The key may be an integrity protection key of the source base station or an access layer key.
步骤505、目标基站根据计时器的信息和密钥,生成消息认证码。Step 505: The target base station generates a message authentication code according to the information and the key of the timer.
具体地,若源基站发送的密钥是源基站的完整性保护密钥,则目标基站根据计时器的信息和源基站的完整性保护密钥,生成消息认证码。Specifically, if the key sent by the source base station is the integrity protection key of the source base station, the target base station generates a message authentication code according to the information of the timer and the integrity protection key of the source base station.
若源基站发送的密钥是接入层密钥,则目标基站根据接入层密钥生成完整性保护密钥,然后根据计时器的信息和完整性保护密钥,生成消息认证码。If the key sent by the source base station is an access layer key, the target base station generates an integrity protection key according to the access layer key, and then generates a message authentication code according to the timer information and the integrity protection key.
步骤506-步骤507,与图2所示的步骤203-步骤204相同,可参考前述描述。Steps 506 to 507 are the same as steps 203 to 204 shown in FIG. 2, and the foregoing description may be referred to.
上述方法三,是由目标基站从源基站获取密钥,然后根据计时器的信息和密钥,生成消息认证码。In the third method, the target base station acquires a key from the source base station, and then generates a message authentication code according to the information and the key of the timer.
方法四、目标基站根据连接拒绝请求消息、源基站的完整性保护密钥,生成消息认证码,其中,连接拒绝请求消息中包括计时器的信息Method 4: The target base station generates a message authentication code according to the connection rejection request message and the integrity protection key of the source base station, where the connection rejection request message includes the timer information.
如图6所示,为本申请提供的一种请求恢复连接的方法流程图,包括以下步骤:As shown in FIG. 6, a flowchart of a method for requesting a connection recovery provided by the present application includes the following steps:
步骤601-步骤602,与图2所示的步骤201-步骤202相同,可参考前述描述。Steps 601 to 602 are the same as steps 201 to 202 shown in FIG. 2, and the foregoing description may be referred to.
步骤603、目标基站向源基站发送请求消息。Step 603: The target base station sends a request message to the source base station.
该请求消息向源基站请求获取密钥。The request message requests the source base station to acquire a key.
步骤604、源基站向目标基站发送密钥。Step 604: The source base station sends a key to the target base station.
其中,该密钥可以是源基站的完整性保护密钥,也可以是接入层密钥。The key may be an integrity protection key of the source base station or an access layer key.
步骤605、目标基站根据连接拒绝请求消息和密钥,生成消息认证码。其中,连接拒绝请求消息包括计时器的信息。Step 605: The target base station generates a message authentication code according to the connection rejection request message and the key. The connection rejection request message includes information of a timer.
具体地,若源基站发送的密钥是源基站的完整性保护密钥,则目标基站根据连接拒绝请求消息和源基站的完整性保护密钥,生成消息认证码。Specifically, if the key sent by the source base station is the integrity protection key of the source base station, the target base station generates a message authentication code according to the connection reject request message and the integrity protection key of the source base station.
若源基站发送的密钥是接入层密钥,则目标基站根据接入层密钥生成完整性保护密钥,然后根据连接拒绝请求消息和完整性保护密钥,生成消息认证码。If the key sent by the source base station is an access layer key, the target base station generates an integrity protection key according to the access layer key, and then generates a message authentication code according to the connection rejection request message and the integrity protection key.
步骤606-步骤607,与图2所示的步骤203-步骤204相同,可参考前述描述。Step 606-Step 607 is the same as Step 203-Step 204 shown in FIG. 2, and can refer to the foregoing description.
上述方法四,是由目标基站从源基站获取密钥,然后根据连接拒绝请求消息和密钥,生成消息认证码。In the fourth method, the target base station acquires a key from the source base station, and then generates a message authentication code according to the connection rejection request message and the key.
针对图2所示的请求恢复连接的方法,考虑另外一种攻击场景:攻击者在获取到目标基站发送给终端的消息认证码和计时器的信息后,不修改计时器的信息,而是不断地重放,即不断重复上述步骤203,使得终端连续休眠,造成对终端的攻击。For the method of requesting to restore the connection shown in FIG. 2, another attack scenario is considered: after acquiring the message authentication code and the timer information sent by the target base station to the terminal, the attacker does not modify the timer information, but continuously Replaying, that is, repeating the above step 203, causing the terminal to continuously sleep, causing an attack on the terminal.
作为示例,假设目标基站第一次发送给终端的计时器的信息指示的时长为30分钟,且消息认证码为MAC(30分钟,Krrc-int1),其中,Krrc-int1为源基站的完整性保护密钥,则:As an example, assume that the information of the timer that the target base station sends to the terminal for the first time indicates a duration of 30 minutes, and the message authentication code is MAC (30 minutes, Krrc-int1), where Krrc-int1 is the integrity of the source base station. Protect the key, then:
目标基站通过上述步骤203向终端发送连接恢复拒绝消息和MAC(30分钟,Krrc-int1),连接恢复拒绝消息中包括的计时器的信息指示的时长为30分钟。终端在校验MAC(30分钟,Krrc-int1)成功后,进入30分钟的休眠。The target base station transmits a connection recovery reject message and a MAC (30 minutes, Krrc-int1) to the terminal through the above-mentioned step 203, and the information indicated by the timer included in the connection recovery rejection message is 30 minutes. After verifying the MAC (30 minutes, Krrc-int1), the terminal enters 30 minutes of sleep.
在30分钟到达之前,攻击者向终端发送连接恢复拒绝消息和MAC(30分钟,Krrc-int1),则终端仍然会校验MAC(30分钟,Krrc-int1)成功,然后又进入30分钟的休眠。Before the arrival of 30 minutes, the attacker sends a connection recovery rejection message and MAC to the terminal (30 minutes, Krrc-int1), the terminal will still verify the MAC (30 minutes, Krrc-int1) successfully, and then enter 30 minutes of sleep. .
接着,在30分钟到达之前,攻击者又向终端发送连接恢复拒绝消息和MAC(30分钟,Krrc-int1),则终端仍然会校验MAC(30分钟,Krrc-int1)成功,然后又进入30分钟的休眠。如此往复,则终端将会一直休眠,连接恢复请求无法成功。Then, before the arrival of 30 minutes, the attacker sends a connection recovery rejection message and MAC to the terminal (30 minutes, Krrc-int1), the terminal will still verify the MAC (30 minutes, Krrc-int1) successfully, and then enter 30 again. Minutes of sleep. In this way, the terminal will sleep all the time, and the connection recovery request cannot be successful.
为解决存在的上述问题,本申请提供相应的解决方案。In order to solve the above problems, the present application provides a corresponding solution.
本申请提供的解决方案是在上述图2-图6的基础上进行改进,已达到解决存在的上述问题的目的。具体地,引入新鲜性参数来解决上述问题,下面具体说明。The solution provided by the present application is improved on the basis of the above-mentioned FIG. 2 to FIG. 6, and the object of solving the above problems has been achieved. Specifically, freshness parameters are introduced to solve the above problems, which are specifically described below.
针对上述图2所示的流程,在步骤201的连接恢复请求消息中携带指示参数,指示参数用于指示新鲜性参数。For the foregoing process shown in FIG. 2, the connection recovery request message in step 201 carries an indication parameter, and the indication parameter is used to indicate a freshness parameter.
新鲜性参数可由目标基站用于生成消息认证码,即上述步骤203中,目标基站发送给终端的消息认证码是根据新鲜性参数生成的。The freshness parameter may be used by the target base station to generate a message authentication code, that is, in the above step 203, the message authentication code sent by the target base station to the terminal is generated according to the freshness parameter.
具体地,目标基站根据源基站的完整性保护密钥、计时器的信息和新鲜性参数生成消息认证码。或者,目标基站根据源基站的完整性保护密钥、连接恢复拒绝消息和新鲜性参数生成消息认证码,其中,连接恢复拒绝消息包括计时器的信息。Specifically, the target base station generates a message authentication code according to the integrity protection key of the source base station, the information of the timer, and the freshness parameter. Alternatively, the target base station generates a message authentication code according to the integrity protection key of the source base station, the connection recovery rejection message, and the freshness parameter, where the connection recovery rejection message includes information of the timer.
并且,相邻两次生成消息认证码所使用的新鲜性参数不同。即,新鲜性参数的具体取值,在每次生成消息认证码是会发生变化,使得当前生成消息认证码时所使用的新鲜性参数与上次生成消息认证码时所使用的新鲜性参数不同。Moreover, the freshness parameters used to generate the message authentication code two times are different. That is, the specific value of the freshness parameter changes every time the message authentication code is generated, so that the freshness parameter used when generating the message authentication code is different from the freshness parameter used when the message authentication code is generated last time. .
作为一种实现方式,新鲜性参数包括分组数据汇聚协议((Packet Data Convergence Protocol,PDCP)计数(COUNT),PDCP COUNT可以包含上行PDCP COUNT和下行PDCP COUNT,终端每发送一个上行PDCP数据包则上行PDCP COUNT加1,基站每发送一个下行PDCP数据包则下行PDCP COUNT加1。例如,PDCP COUNT可以是信令无线承载(signaling radio bearer,SRB)的上行PDCP COUNT。可选地,每当重建无线承载时,PDCP COUNT可以重置为零。由于PDCP COUNT是一直在变化的,因此,终端每次生成的消息认证码与上次生成的消息认证码是不同的。As an implementation manner, the freshness parameter includes a Packet Data Convergence Protocol (PDCP) count (COUNT), and the PDCP COUNT may include an uplink PDCP COUNT and a downlink PDCP COUNT, and the terminal uplinks every time an uplink PDCP packet is sent. The PDCP COUNT is incremented by 1, and the downlink PDCP COUNT is incremented by one for each downlink PDCP packet sent by the base station. For example, the PDCP COUNT may be the uplink PDCP COUNT of the signaling radio bearer (SRB). Optionally, whenever the wireless is re-established At the time of bearer, the PDCP COUNT can be reset to zero. Since the PDCP COUNT is constantly changing, the message authentication code generated by the terminal each time is different from the last generated message authentication code.
其中,终端向目标基站发送的连接恢复请求消息中携带的是指示参数,该指示参数用于指示新鲜性参数。The connection recovery request message sent by the terminal to the target base station carries an indication parameter, where the indication parameter is used to indicate a freshness parameter.
具体地,该指示参数可以是新鲜性参数本身,也可以是可指示该新鲜性参数的参数。Specifically, the indication parameter may be the freshness parameter itself, or may be a parameter indicating the freshness parameter.
例如,若新鲜性参数为PDCP COUNT,且PDCP COUNT采用二进制比特位表示,则该指示参数可以是PDCP COUNT本身,即为PDCP COUNT的全部比特位。该指示参数还可以是PDCP COUNT的部分比特位。For example, if the freshness parameter is PDCP COUNT and the PDCP COUNT is represented by a binary bit, the indication parameter may be the PDCP COUNT itself, that is, all bits of the PDCP COUNT. The indication parameter can also be a partial bit of the PDCP COUNT.
举例来说,假设PDCP COUNT采用32个比特位来表示,由于相邻两次生成消息认证码时所使用的PDCP COUNT之间的变化不会特别大,因此,相邻两次的PDCP COUNT之间也只是低位的比特位发生变化,而高位的比特位不会发生变化。因此,指示参数可以使用PDCP COUNT的部分低比特位来表示。例如,终端上次生成消息认证码所使用的PDCP COUNT为“00000000000011111111111100011111”,而终端本次生成消息认证码所使用的PDCP COUNT为“00000000000011111111111100100011”,可以发现,PDCP COUNT只有低5位发生了变化,而高27位未发生变化。因此,可以选择PDCP COUNT的低N个比特位作为指示参数,N大于1,且小于32。当然,指示参数也可以是PDCP COUNT的全部比特位。For example, suppose the PDCP COUNT is represented by 32 bits. Since the change between the PDCP COUNTs used when generating the message authentication code two times is not particularly large, between two adjacent PDCP COUNTs Only the lower bits change, and the higher bits do not change. Therefore, the indication parameter can be represented using a portion of the low bit of the PDCP COUNT. For example, the PDCP COUNT used by the terminal to generate the message authentication code is “00000000000011111111111100011111”, and the PDCP COUNT used by the terminal to generate the message authentication code is “00000000000011111111111100100011”. It can be found that only the lower 5 bits of the PDCP COUNT have changed. The high 27 did not change. Therefore, the lower N bits of the PDCP COUNT can be selected as the indication parameter, N being greater than 1, and less than 32. Of course, the indication parameter can also be all bits of the PDCP COUNT.
作为另一种实现方式,新鲜性参数可以包括拒绝次数,拒绝次数可以用于表示终端尝试恢复RRC连接被网络侧拒绝的次数。终端每次尝试恢复被网络侧拒绝,则拒绝次数加1。可选地,每当恢复RRC连接成功时,拒绝次数可以重置为零。由于拒绝次数是一直在变化的,因此,终端每次生成的消息认证码与上次生成的消息认证码是不同的。As another implementation manner, the freshness parameter may include the number of rejections, and the number of rejections may be used to indicate the number of times the terminal attempts to restore the RRC connection rejected by the network side. Each time the terminal attempts to resume being rejected by the network side, the number of rejections is increased by one. Alternatively, the number of rejections may be reset to zero each time the RRC connection is successfully restored. Since the number of rejections is always changing, the message authentication code generated by the terminal each time is different from the message authentication code generated last time.
需要说明的是,当新鲜性参数包括拒绝次数时,终端在连接恢复请求消息中可以不携带指示参数。在具体实现时,终端可自行确定当前的拒绝次数,基站(如目标基站或源基站)也可以自行确定当前的拒绝次数。即,终端和目标基站之间各自维持该 终端被拒绝恢复连接的次数。或者,终端和源基站之间各自维持该终端被拒绝恢复连接的次数。It should be noted that, when the freshness parameter includes the number of rejections, the terminal may not carry the indication parameter in the connection recovery request message. In a specific implementation, the terminal may determine the current number of rejections by itself, and the base station (such as the target base station or the source base station) may also determine the current number of rejections by itself. That is, the terminal and the target base station each maintain the number of times the terminal is refused to resume the connection. Alternatively, the terminal and the source base station each maintain the number of times the terminal is refused to resume the connection.
例如,终端在接收到连接拒绝请求消息后,校验消息认证码通过,则终端更新拒绝次数,包括拒绝次数加1。源基站在接收到目标基站发送的计时器或连接拒绝请求消息后,则源基站更新拒绝次数,包括拒绝次数加1。目标基站在决定拒绝终端恢复连接后,则目标基站更新拒绝次数,包括拒绝次数加1。For example, after receiving the connection rejection request message, the terminal verifies that the message authentication code passes, and the terminal updates the number of rejections, including the number of rejections plus one. After receiving the timer or connection rejection request message sent by the target base station, the source base station updates the number of rejections, including the number of rejections plus one. After the target base station decides to reject the terminal to resume the connection, the target base station updates the number of rejections, including the number of rejections plus one.
当然,作为另一种实现,当新鲜性参数包括拒绝次数时,终端也可以在连接恢复请求消息中携带指示参数,该指示参数用于指示拒绝次数。Of course, as another implementation, when the freshness parameter includes the number of rejections, the terminal may also carry an indication parameter in the connection recovery request message, where the indication parameter is used to indicate the number of rejections.
通过上述方法,目标基站每次生成的消息认证码与上次生成的消息认证码不同,因此,即使攻击者窃取到目标上次所使用的消息认证码,由于使用的是“过期的”消息认证码,因此,攻击者将无法攻击成功。Through the above method, the message authentication code generated by the target base station is different from the message authentication code generated last time. Therefore, even if the attacker steals the message authentication code used by the target last time, the message is "expired". Code, therefore, the attacker will not be able to attack successfully.
该改进的方法在引入了新鲜性参数之后,可有效解决图2所示的方法所存在的易受攻击的问题。下面结合具体例子进行解释说明。The improved method can effectively solve the problem of the vulnerability of the method shown in FIG. 2 after introducing the freshness parameter. The following is explained in conjunction with specific examples.
比如,以目标基站根据新鲜性参数、计时器的信息和源基站的完整性保护密钥生成消息认证码,且新鲜性参数为PDCP COUNT为例进行说明。终端当前处于不活跃态。For example, the target base station generates a message authentication code according to the freshness parameter, the information of the timer, and the integrity protection key of the source base station, and the freshness parameter is PDCP COUNT as an example. The terminal is currently in an inactive state.
假设终端通过连接恢复请求消息的指示参数所指示的PDCP COUNT的数值为5,则目标基站根据该PDCP COUNT的数值、计时器的信息和源基站的完整性保护密钥生成消息认证码。Assuming that the value of the PDCP COUNT indicated by the indication parameter of the connection recovery request message is 5, the target base station generates a message authentication code according to the value of the PDCP COUNT, the information of the timer, and the integrity protection key of the source base station.
目标基站若拒绝终端的连接恢复请求,则生成消息认证码,具体地,根据PDCP COUNT的数值、计时器的信息和源基站的完整性保护密钥生成消息认证码,其中,PDCP COUNT的数值为5。为方便理解,将生成的消息认证码表示为MAC(5,30分钟,Krrc-int1),其中,5为PDCP COUNT的数值,30分钟为计时器的信息所指示的等待时长,Krrc-int1为源基站的完整性保护密钥。If the target base station rejects the connection recovery request of the terminal, the message authentication code is generated. Specifically, the message authentication code is generated according to the value of the PDCP COUNT, the information of the timer, and the integrity protection key of the source base station, where the value of the PDCP COUNT is 5. For ease of understanding, the generated message authentication code is represented as MAC (5, 30 minutes, Krrc-int1), where 5 is the value of PDCP COUNT, 30 minutes is the waiting time indicated by the timer information, and Krrc-int1 is The integrity protection key of the source base station.
然后,目标基站向终端发送连接恢复拒绝消息和MAC(5,30分钟,Krrc-int1),连接恢复拒绝消息中包括计时器的信息,指示的时长为30分钟,即指示终端30分钟后可以尝试重新发起连接恢复请求。Then, the target base station sends a connection recovery reject message and a MAC (5, 30 minutes, Krrc-int1) to the terminal, and the information including the timer is included in the connection recovery reject message, and the indicated duration is 30 minutes, that is, the terminal is instructed to try after 30 minutes. Re-initiate the connection recovery request.
终端接收到连接恢复拒绝消息和MAC(5,30分钟,Krrc-int1),并从连接恢复拒绝消息中获取到计时器的信息,然后根据获取的计时器的信息、终端的完整性保护密钥和PDCP COUNT的数值生成消息认证码,这里,终端生成的消息认证码为MAC(5,30分钟,Krrc-int2),其中,5为终端发送给目标基站的PDCP COUNT的数值,30分钟为终端从连接恢复拒绝消息中获取到的计时器的信息所指示的时长,Krrc-int2为终端的完整性保护密钥。一般的,Krrc-int1与Krrc-int2相同。从而,若终端生成的MAC(5,30分钟,Krrc-int1)与目标基站发送的MAC(5,30分钟,Krrc-int1)相同,则终端校验消息认证码正确。然后终端休眠30分钟。The terminal receives the connection recovery rejection message and the MAC (5, 30 minutes, Krrc-int1), and obtains the information of the timer from the connection recovery rejection message, and then according to the acquired timer information, the integrity protection key of the terminal. The value of the PDCP COUNT is used to generate a message authentication code. Here, the message authentication code generated by the terminal is MAC (5, 30 minutes, Krrc-int2), where 5 is the value of the PDCP COUNT sent by the terminal to the target base station, and 30 minutes is the terminal. The length of time indicated by the information of the timer obtained from the connection recovery rejection message, Krrc-int2 is the integrity protection key of the terminal. In general, Krrc-int1 is the same as Krrc-int2. Therefore, if the MAC (5, 30 minutes, Krrc-int1) generated by the terminal is the same as the MAC (5, 30 minutes, Krrc-int1) transmitted by the target base station, the terminal check message authentication code is correct. Then the terminal sleeps for 30 minutes.
假设在30分钟到达之前,攻击者目标基站窃取到了连接恢复拒绝消息和MAC(5,30分钟,Krrc-int2),伪装成目标基站,向终端发送连接恢复拒绝消息和MAC(5,30分钟,Krrc-int2)。终端在接收到连接恢复拒绝消息和MAC(5,30分钟,Krrc-int2)后,首先从连接恢复拒绝消息获取到计时器的信息所指示的时长,为30分钟,然后终端获取终端当前的PDCP COUNT的数值,这里,由于PDCP COUNT的数值一般的已 经发生了变化,例如已经更新为12,则终端生成的消息认证码为MAC(12,30分钟,Krrc-int2)。由于PDCP COUNT的数值发生了变化,导致终端生成的MAC(12,30分钟,Krrc-int2)与攻击者发送的MAC(5,30分钟,Krrc-int1)不相同,因而校验失败,则终端忽略连接恢复拒绝消息中的计时器的信息。Assume that before the arrival of 30 minutes, the attacker target base station steals the connection recovery reject message and MAC (5, 30 minutes, Krrc-int2), masquerades as the target base station, and sends a connection recovery reject message and MAC to the terminal (5, 30 minutes, Krrc-int2). After receiving the connection recovery reject message and the MAC (5, 30 minutes, Krrc-int2), the terminal first obtains the duration indicated by the information of the timer from the connection recovery rejection message, which is 30 minutes, and then the terminal acquires the current PDCP of the terminal. The value of COUNT, here, since the value of PDCP COUNT has generally changed, for example, has been updated to 12, the message authentication code generated by the terminal is MAC (12, 30 minutes, Krrc-int2). Since the value of PDCP COUNT has changed, the MAC generated by the terminal (12, 30 minutes, Krrc-int2) is different from the MAC (5, 30 minutes, Krrc-int1) sent by the attacker, and the verification fails. Ignore the information for the timer in the connection recovery reject message.
再比如,以新鲜性参数为拒绝次数为例,假设终端与源基站当前存储的拒绝次数的数值均为2,且终端当前处于不活跃态。For example, taking the freshness parameter as the rejection number as an example, assume that the value of the number of rejections currently stored by the terminal and the source base station is 2, and the terminal is currently in an inactive state.
终端第一次向目标基站发送连接恢复请求消息,连接恢复请求消息中携带消息认证码和恢复标识,该消息认证码是根据拒绝次数和终端的完整性保护密钥生成的,此时拒绝次数为2。The terminal sends a connection recovery request message to the target base station for the first time. The connection recovery request message carries a message authentication code and a recovery identifier. The message authentication code is generated according to the number of rejections and the integrity protection key of the terminal. 2.
目标基站若拒绝了终端的连接恢复请求,向终端发送的连接恢复拒绝消息中携带等待计时器的信息,指示终端30分钟后可以尝试重新发起连接恢复请求,此时终端更新拒绝次数为3。同时,目标基站通知源基站将源基站的终端的上下文中的拒绝次数更新为3。If the target base station rejects the connection recovery request of the terminal, the connection recovery rejection message sent to the terminal carries the information of the waiting timer, indicating that the terminal may try to re-initiate the connection recovery request after 30 minutes, and the terminal update rejection number is 3. At the same time, the target base station notifies the source base station to update the number of rejections in the context of the terminal of the source base station to 3.
假设在终端第二次向目标基站发送连接恢复请求消息之前,攻击者从终端第一次向目标基站发送的连接恢复请求消息中窃取到了消息认证码和恢复标识,其中,生成该消息认证码所使用的拒绝次数为2。It is assumed that before the terminal sends the connection recovery request message to the target base station for the second time, the attacker steals the message authentication code and the recovery identifier from the connection recovery request message sent by the terminal to the target base station for the first time, where the message authentication code is generated. The number of rejections used is 2.
接着,攻击者向目标基站发送连接恢复请求消息,连接恢复请求消息中携带窃取到的消息认证码和恢复标识,目标基站接收到连接恢复请求消息后,若同意该攻击者的恢复请求,则向源基站发送上下文请求消息。接着,源基站对攻击者发送的消息认证码进行校验,由于攻击者发送的消息认证码在生成时所使用的拒绝次数为2,源基站的终端的上下文中的拒绝次数为3,因此校验失败。从而,攻击者攻击失败。Then, the attacker sends a connection recovery request message to the target base station, where the connection recovery request message carries the stolen message authentication code and the recovery identifier, and after receiving the connection recovery request message, the target base station, if it agrees to the attacker's recovery request, then The source base station sends a context request message. Then, the source base station checks the message authentication code sent by the attacker, because the number of rejections used by the attacker to send the message authentication code is 2, and the number of rejections in the context of the terminal of the source base station is 3, so the school The test failed. Thus, the attacker fails to attack.
因此,本申请提供的上述解决方案,可以有效解决图2所示的方法存在易受攻击的问题。Therefore, the above solution provided by the present application can effectively solve the problem that the method shown in FIG. 2 is vulnerable.
若图2所示的流程按照该方法进行改进,则相应地,图3-图6所示的方法也需要作出相应的调整。下面逐个说明。If the flow shown in Figure 2 is modified in accordance with this method, then the methods shown in Figures 3-6 need to be adjusted accordingly. The following is explained one by one.
针对上述图3所示的流程,步骤301的连接恢复请求消息可以携带用于指示新鲜性参数的指示参数,步骤306中生成的消息认证码是结合了新鲜性参数生成的。具体的改进方法,与前述针对图2的步骤202和步骤204的改进方法相同,可参考前述描述。For the foregoing process shown in FIG. 3, the connection recovery request message of step 301 may carry an indication parameter for indicating a freshness parameter, and the message authentication code generated in step 306 is generated by combining the freshness parameter. The specific improved method is the same as the foregoing improved method for step 202 and step 204 of FIG. 2, and the foregoing description may be referred to.
进一步地,目标基站还可以向源基站发送指示参数,例如可以在步骤303中发送计时器的信息和指示参数,也可以是使用单独的步骤发送指示参数。然后源基站可根据指示参数,确定新鲜性参数。例如,若新鲜性参数为PDCP COUNT,且指示参数指示了PDCP COUNT的部分低比特位,则源基站可根据上次使用的PDCP COUNT的部分高比特位和从目标基站接收到的指示参数指示的PDCP COUNT的部分低比特位,得到PDCP COUNT。Further, the target base station may further send an indication parameter to the source base station, for example, the information of the timer and the indication parameter may be sent in step 303, or the indication parameter may be sent in a separate step. The source base station can then determine the freshness parameter based on the indication parameters. For example, if the freshness parameter is PDCP COUNT, and the indication parameter indicates a part of the low bit of the PDCP COUNT, the source base station may indicate according to a part of the high bit of the last used PDCP COUNT and an indication parameter received from the target base station. Part of the low bit of PDCP COUNT, get PDCP COUNT.
进一步地,针对步骤304,生成消息认证码的具体方法需要修改为:源基站根据源基站的完整性保护密钥、新鲜性参数和计时器的信息生成消息认证码。Further, for step 304, the specific method for generating the message authentication code needs to be modified as follows: the source base station generates a message authentication code according to the integrity protection key of the source base station, the freshness parameter, and the information of the timer.
进一步地,若新鲜性参数为拒绝次数,源基站可以从终端的上下文中获取拒绝次数。此时,步骤301的连接恢复请求消息和步骤303可以不携带用于指示新鲜性参数的指示参数。由于目标基站拒绝了终端的连接恢复请求,因此源基站还需要更新源基 站中的终端的上下文,具体为:源基站将拒绝次数加1。针对步骤307,终端在校验消息认证码通过后,还需要更新终端的上下文,具体为:终端将拒绝次数加1。Further, if the freshness parameter is the number of rejections, the source base station may obtain the number of rejections from the context of the terminal. At this time, the connection recovery request message of step 301 and step 303 may not carry the indication parameter for indicating the freshness parameter. Since the target base station rejects the connection recovery request of the terminal, the source base station also needs to update the context of the terminal in the source base station, specifically: the source base station increases the number of rejections by one. For step 307, after verifying that the message authentication code is passed, the terminal needs to update the context of the terminal, specifically: the terminal adds 1 to the number of rejections.
针对上述图4所示的流程,步骤401的连接恢复请求消息可以携带用于指示新鲜性参数的指示参数,步骤406中生成的消息认证码是结合了新鲜性参数生成的。具体地改进方法,与前述针对图2的步骤202和步骤204的改进方法相同,可参考前述描述。For the process shown in FIG. 4 above, the connection recovery request message of step 401 may carry an indication parameter for indicating a freshness parameter, and the message authentication code generated in step 406 is generated by combining the freshness parameter. The method is specifically improved, which is the same as the foregoing improved method for step 202 and step 204 of FIG. 2, and can be referred to the foregoing description.
进一步地,目标基站还可以向源基站发送指示参数,例如可以在步骤403中发送连接拒绝请求消息和指示参数,也可以是使用单独的步骤发送指示参数。然后源基站可根据指示参数,确定新鲜性参数。方法同上。Further, the target base station may further send the indication parameter to the source base station, for example, the connection rejection request message and the indication parameter may be sent in step 403, or the indication parameter may be sent in a separate step. The source base station can then determine the freshness parameter based on the indication parameters. The method is the same as above.
进一步地,针对步骤404,生成消息认证码的具体方法需要修改为:源基站根据源基站的完整性保护密钥、新鲜性参数和连接拒绝请求消息生成消息认证码。Further, for step 404, the specific method for generating the message authentication code needs to be modified as follows: the source base station generates a message authentication code according to the integrity protection key, the freshness parameter, and the connection rejection request message of the source base station.
进一步地,若新鲜性参数为拒绝次数,源基站可以从终端的上下文中获取拒绝次数。此时,步骤401的连接恢复请求消息和步骤403可以不携带用于指示新鲜性参数的指示参数。由于目标基站拒绝了终端的连接恢复请求,因此源基站还需要更新源基站中的终端的上下文,具体为:源基站将拒绝次数加1。针对步骤407,终端在校验消息认证码通过后,还需要更新终端的上下文,具体为:终端将拒绝次数加1。Further, if the freshness parameter is the number of rejections, the source base station may obtain the number of rejections from the context of the terminal. At this time, the connection recovery request message of step 401 and step 403 may not carry the indication parameter for indicating the freshness parameter. Since the target base station rejects the connection recovery request of the terminal, the source base station also needs to update the context of the terminal in the source base station, specifically: the source base station increases the number of rejections by one. For step 407, after verifying that the message authentication code is passed, the terminal needs to update the context of the terminal, specifically: the terminal adds 1 to the number of rejections.
针对上述图5所示的流程,步骤501的连接恢复请求消息需要携带用于指示新鲜性参数的指示参数,步骤506中生成的消息认证码是结合了新鲜性参数生成的。具体地改进方法,与前述针对图2的步骤202和步骤204的改进方法相同,可参考前述描述。For the foregoing process shown in FIG. 5, the connection recovery request message of step 501 needs to carry an indication parameter for indicating a freshness parameter, and the message authentication code generated in step 506 is generated by combining the freshness parameter. The method is specifically improved, which is the same as the foregoing improved method for step 202 and step 204 of FIG. 2, and can be referred to the foregoing description.
进一步地,目标基站还需要向源基站发送指示参数,例如可以在步骤503中发送请求消息和指示参数,也可以是使用单独的步骤发送指示参数。然后源基站可根据指示参数,确定新鲜性参数。方法同上。Further, the target base station further needs to send the indication parameter to the source base station, for example, the request message and the indication parameter may be sent in step 503, or the indication parameter may be sent in a separate step. The source base station can then determine the freshness parameter based on the indication parameters. The method is the same as above.
进一步地,源基站还需要将确定的新鲜性参数发送给目标基站,例如可以在步骤504中发送密钥和新鲜性参数,也可以是使用单独的步骤发送新鲜性参数。Further, the source base station also needs to send the determined freshness parameter to the target base station, for example, the key and the freshness parameter may be sent in step 504, or the freshness parameter may be sent in a separate step.
进一步地,针对步骤505,生成消息认证码的具体方法需要修改为:目标基站根据密钥、新鲜性参数和计时器的信息生成消息认证码。Further, for step 505, the specific method for generating the message authentication code needs to be modified as follows: the target base station generates a message authentication code according to the key, the freshness parameter, and the information of the timer.
进一步地,若新鲜性参数为拒绝次数,则目标基站可以是从源基站获取到拒绝次数,此时,步骤501的连接恢复请求消息和步骤503可以不携带用于指示新鲜性参数的指示参数。由于目标基站拒绝了终端的连接恢复请求,因此源基站还需要更新源基站中的终端的上下文,具体为:源基站将拒绝次数加1。针对步骤507,终端在校验消息认证码通过后,还需要更新终端的上下文,具体为:终端将拒绝次数加1。Further, if the freshness parameter is the number of rejections, the target base station may obtain the number of rejections from the source base station. At this time, the connection recovery request message of step 501 and step 503 may not carry the indication parameter for indicating the freshness parameter. Since the target base station rejects the connection recovery request of the terminal, the source base station also needs to update the context of the terminal in the source base station, specifically: the source base station increases the number of rejections by one. For step 507, after verifying that the message authentication code is passed, the terminal needs to update the context of the terminal, specifically: the terminal adds 1 to the number of rejections.
针对上述图6所示的流程,步骤601的连接恢复请求消息需要携带用于指示新鲜性参数的指示参数,步骤606中生成的消息认证码是结合了新鲜性参数生成的。具体地改进方法,与前述针对图2的步骤202和步骤204的改进方法相同,可参考前述描述。For the foregoing process shown in FIG. 6, the connection recovery request message of step 601 needs to carry an indication parameter for indicating a freshness parameter, and the message authentication code generated in step 606 is generated by combining the freshness parameter. The method is specifically improved, which is the same as the foregoing improved method for step 202 and step 204 of FIG. 2, and can be referred to the foregoing description.
进一步地,目标基站还需要向源基站发送指示参数,例如可以在步骤603中发送请求消息和指示参数,也可以是使用单独的步骤发送指示参数。然后源基站可根据指示参数,确定新鲜性参数。方法同上。Further, the target base station further needs to send the indication parameter to the source base station, for example, the request message and the indication parameter may be sent in step 603, or the indication parameter may be sent in a separate step. The source base station can then determine the freshness parameter based on the indication parameters. The method is the same as above.
进一步地,源基站还需要将确定的新鲜性参数发送给目标基站,例如可以在步骤 604中发送密钥和新鲜性参数,也可以是使用单独的步骤发送新鲜性参数。Further, the source base station also needs to send the determined freshness parameter to the target base station, for example, the key and the freshness parameter may be sent in step 604, or the freshness parameter may be sent in a separate step.
进一步地,针对步骤605,生成消息认证码的具体方法需要修改为:目标基站根据密钥、新鲜性参数和连接恢复拒绝消息生成消息认证码。Further, for step 605, the specific method for generating the message authentication code needs to be modified as follows: the target base station generates a message authentication code according to the key, the freshness parameter, and the connection recovery reject message.
进一步地,若新鲜性参数为拒绝次数,则目标基站可以是从本地获取到拒绝次数,此时,步骤601的连接恢复请求消息和步骤603可以不携带用于指示新鲜性参数的指示参数。由于目标基站拒绝了终端的连接恢复请求,因此源基站还需要根据新鲜性参数,更新源基站中的终端的上下文,具体为:源基站将拒绝次数加1。针对步骤607,终端在校验消息认证码通过后,还需要更新终端的上下文,具体为:终端将拒绝次数加1。Further, if the freshness parameter is the number of rejections, the target base station may obtain the number of rejections from the local. In this case, the connection recovery request message of step 601 and step 603 may not carry the indication parameter for indicating the freshness parameter. Since the target base station rejects the connection recovery request of the terminal, the source base station needs to update the context of the terminal in the source base station according to the freshness parameter, specifically: the source base station adds 1 to the number of rejections. For the step 607, after verifying that the message authentication code is passed, the terminal also needs to update the context of the terminal, specifically: the terminal adds 1 to the number of rejections.
需要说明的是,上述实施例中的连接恢复请求消息、连接恢复拒绝消息等仅是一个名字,名字对消息本身不构成限定。在5G网络以及未来其它的网络中,连接恢复请求消息、连接恢复拒绝消息也可以是其他的名字,本申请实施例对此不作具体限定。例如,连接恢复请求消息还有可能被替换为请求消息、恢复请求消息、连接请求消息等,连接恢复拒绝消息还有可能被替换为拒绝消息、恢复拒绝消息、连接拒绝消息等。It should be noted that the connection recovery request message, the connection recovery rejection message, and the like in the foregoing embodiment are only one name, and the name does not limit the message itself. In the 5G network and other networks in the future, the connection recovery request message and the connection recovery rejection message may be other names, which are not specifically limited in the embodiment of the present application. For example, the connection recovery request message may also be replaced with a request message, a recovery request message, a connection request message, etc., and the connection recovery rejection message may be replaced with a rejection message, a recovery rejection message, a connection rejection message, and the like.
上述主要从各个网元之间交互的角度对本申请提供的方案进行了介绍。可以理解的是,上述实现各网元为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本发明能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。The foregoing provides a description of the solution provided by the present application from the perspective of interaction between the various network elements. It can be understood that, in order to implement the above functions, each of the foregoing network elements includes a hardware structure and/or a software module corresponding to each function. Those skilled in the art will readily appreciate that the present invention can be implemented in a combination of hardware or hardware and computer software in combination with the elements and algorithm steps of the various examples described in the embodiments disclosed herein. Whether a function is implemented in hardware or computer software to drive hardware depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods for implementing the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present invention.
基于相同的发明构思,如图7所示,为本申请提供的一种装置示意图,该装置可以是终端、目标基站或源基站,可执行上述任一实施例中由终端、目标基站或源基站执行的方法。Based on the same inventive concept, as shown in FIG. 7, a schematic diagram of a device, which may be a terminal, a target base station, or a source base station, may be implemented by a terminal, a target base station, or a source base station in any of the above embodiments. The method of execution.
该装置700包括至少一个处理器701,发送器702,接收器703,可选地,还包括存储器704。所述处理器701,发送器702,接收器703,存储器704通过通信线路连接。The apparatus 700 includes at least one processor 701, a transmitter 702, a receiver 703, and optionally a memory 704. The processor 701, the transmitter 702, the receiver 703, and the memory 704 are connected by a communication line.
处理器701可以是一个通用中央处理器(CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本发明方案程序执行的集成电路。The processor 701 can be a general purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of the program of the present invention.
通信线路可包括一通路,在上述单元之间传送信息。The communication line can include a path for communicating information between the units.
所述发送器702和接收器703,用于与其他设备或通信网络通信。发送器和接收器包括射频电路。The transmitter 702 and the receiver 703 are configured to communicate with other devices or communication networks. The transmitter and receiver include radio frequency circuits.
存储器704可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(Electrically erasable programmabler-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任 何其他介质,但不限于此。存储器704可以是独立存在,通过通信线路与处理器701相连接。存储器704也可以和处理器集成在一起。其中,所述存储器704用于存储执行本发明方案的应用程序代码,并由处理器701来控制执行。所述处理器701用于执行存储器704中存储的应用程序代码。The memory 704 can be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (RAM) or other type that can store information and instructions. The dynamic storage device may also be an electrically erasable programmabler-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disc storage, or a disc storage ( Including compressed optical discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be stored by a computer Any other media taken, but not limited to this. The memory 704 may be independent and connected to the processor 701 via a communication line. Memory 704 can also be integrated with the processor. The memory 704 is used to store application code for executing the solution of the present invention, and is controlled by the processor 701 for execution. The processor 701 is configured to execute application code stored in the memory 704.
在具体实现中,作为一种实施例,处理器701可以包括一个或多个CPU,例如图7中的CPU0和CPU1。In a specific implementation, as an embodiment, the processor 701 may include one or more CPUs, such as CPU0 and CPU1 in FIG.
在具体实现中,作为一种实施例,装置700可以包括多个处理器,例如图7中的处理器701和处理器708。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器,这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。In a particular implementation, as an embodiment, apparatus 700 can include multiple processors, such as processor 701 and processor 708 in FIG. Each of these processors may be a single-CPU processor or a multi-core processor, where the processor may refer to one or more devices, circuits, and/or A processing core for processing data, such as computer program instructions.
应理解,当该装置700是终端时,该装置700可以用于实现本发明实施例的方法中由终端执行的步骤,例如,装置700可以执行图3中的步骤301、步骤307,还可以执行图4中的步骤401和步骤407,还可以执行图5中的步骤501和步骤507,还可以执行图6中的步骤601和步骤607,相关特征可以参照上文,此处不再赘述。It should be understood that, when the device 700 is a terminal, the device 700 may be used to implement the steps performed by the terminal in the method of the embodiment of the present invention. For example, the device 700 may perform step 301, step 307 in FIG. 3, and may also perform Step 401 and step 407 in FIG. 4, step 501 and step 507 in FIG. 5 may also be performed, and step 601 and step 607 in FIG. 6 may also be performed. For related features, reference may be made to the above, and details are not described herein again.
当该装置700是目标基站时,该装置700可以用于实现本发明实施例的方法中由目标基站执行的步骤,例如,装置700可以执行图3中的步骤302、步骤303、步骤306,还可以执行图4中的步骤402、步骤403、步骤406,还可以执行图5中的步骤502、步骤503、步骤505、步骤506,还可以执行图6中的步骤602、步骤603、步骤605、步骤606,相关特征可以参照上文,此处不再赘述。When the device 700 is a target base station, the device 700 can be used to implement the steps performed by the target base station in the method of the embodiment of the present invention. For example, the device 700 can perform step 302, step 303, and step 306 in FIG. Step 502, step 403, step 406 in FIG. 5 may be performed, and step 502, step 503, step 505, and step 506 in FIG. 5 may be performed, and step 602, step 603, step 605 in FIG. 6 may also be performed. Step 606, related features may refer to the above, and details are not described herein again.
当该装置700是源基站时,该装置700可以用于实现本发明实施例的方法中由源基站执行的步骤,例如,装置700可以执行图3中的步骤304、步骤305,还可以执行图4中的步骤404、步骤405,还可以执行图5中的步骤504,还可以执行图6中的步骤604,相关特征可以参照上文,此处不再赘述。When the device 700 is a source base station, the device 700 can be used to implement the steps performed by the source base station in the method of the embodiment of the present invention. For example, the device 700 can perform step 304 and step 305 in FIG. In step 404 and step 405 of FIG. 4, step 504 in FIG. 5 may also be performed, and step 604 in FIG. 6 may also be performed. For related features, reference may be made to the above, and details are not described herein again.
在具体实现中,图3-图6中终端的动作可以由装置700中的处理器701(和/或处理器708)调用存储器704中存储的应用程序代码来执行,本申请实施例对此不作任何限制。In a specific implementation, the actions of the terminal in FIG. 3-6 may be performed by the processor 701 (and/or the processor 708) in the device 700 calling the application code stored in the memory 704. Any restrictions.
本申请可以根据上述方法示例对终端进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。比如,在采用对应各个功能划分各个功能模块的情况下,图8示出了一种装置示意图,该装置800可以是上述实施例中所涉及的终端,该装置800包括处理单元801、接收单元802和发送单元803。The application may divide the function module into the terminal according to the above method example. For example, each function module may be divided according to each function, or two or more functions may be integrated into one processing module. The above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of modules in the present application is schematic, and is only a logical function division, and may be further divided in actual implementation. For example, in the case of dividing each functional module by using corresponding functions, FIG. 8 shows a schematic diagram of a device, which may be the terminal involved in the above embodiment, and the device 800 includes a processing unit 801 and a receiving unit 802. And transmitting unit 803.
在一种请求恢复连接的方法的实现中:In an implementation of a method of requesting a restore connection:
所述发送单元803,用于向目标基站发送连接恢复请求消息,所述连接恢复请求消息用于请求恢复无线资源控制RRC连接;The sending unit 803 is configured to send a connection recovery request message to the target base station, where the connection recovery request message is used to request to resume the radio resource control RRC connection;
所述接收单元802,用于接收来自所述目标基站的连接恢复拒绝消息和消息认证码,所述连接恢复拒绝消息用于指示拒绝所述装置恢复所述RRC连接,所述连接恢复拒绝消息包括计时器的信息,所述消息认证码是根据源基站的完整性保护密钥和所述计时器的信息生成的;The receiving unit 802 is configured to receive a connection recovery reject message and a message authentication code from the target base station, where the connection recovery reject message is used to indicate that the device is denied to restore the RRC connection, and the connection recovery reject message includes Information of the timer, the message authentication code is generated according to the integrity protection key of the source base station and the information of the timer;
所述处理单元801,用于若根据所述计时器的信息和所述装置的完整性保护密钥,校验所述消息认证码正确,则根据所述计时器的信息发起连接恢复请求流程。The processing unit 801 is configured to: if the message authentication code is verified to be correct according to the information of the timer and the integrity protection key of the device, initiate a connection recovery request process according to the information of the timer.
在一种可能的实现方式中,所述消息认证码是根据源基站的完整性保护密钥、所述计时器的信息和新鲜性参数生成的,相邻两次生成消息认证码所使用的新鲜性参数不同。In a possible implementation, the message authentication code is generated according to the integrity protection key of the source base station, the information of the timer, and the freshness parameter, and the message used by the message authentication code is generated twice. Sexual parameters are different.
在一种可能的实现方式中,所述连接恢复请求消息包括指示参数,所述指示参数用于指示所述新鲜性参数。In a possible implementation manner, the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate the freshness parameter.
在一种可能的实现方式中,所述新鲜性参数包括分组数据汇聚协议计数PDCP COUNT,所述指示参数包括所述PDCP COUNT的部分或全部比特位。In a possible implementation manner, the freshness parameter includes a packet data convergence protocol count PDCP COUNT, and the indication parameter includes part or all of the bits of the PDCP COUNT.
在一种可能的实现方式中,所述新鲜性参数包括拒绝次数,所述拒绝次数用于表示所述装置尝试恢复所述RRC连接时被拒绝的次数。In a possible implementation manner, the freshness parameter includes a number of rejections, the number of rejections being used to indicate the number of times the device is rejected when attempting to resume the RRC connection.
应理解,该终端可以用于实现本发明实施例的方法中由终端执行的步骤,相关特征可以参照上文,此处不再赘述。It should be understood that the terminal may be used to implement the steps performed by the terminal in the method of the embodiment of the present invention. For related features, reference may be made to the above, and details are not described herein again.
本申请可以根据上述方法示例对目标基站进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。比如,在采用对应各个功能划分各个功能模块的情况下,图9示出了一种装置示意图,该装置900可以是上述实施例中所涉及的目标基站,该装置900包括接收单元902和发送单元903。可选地,还包括处理单元901。The application may perform the division of the function modules on the target base station according to the foregoing method example. For example, each function module may be divided according to each function, or two or more functions may be integrated into one processing module. The above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of modules in the present application is schematic, and is only a logical function division, and may be further divided in actual implementation. For example, in the case of dividing each functional module by corresponding functions, FIG. 9 shows a schematic diagram of a device, which may be the target base station involved in the above embodiment, and the device 900 includes a receiving unit 902 and a transmitting unit. 903. Optionally, a processing unit 901 is also included.
在一种请求恢复连接的方法的实现中:In an implementation of a method of requesting a restore connection:
所述接收单元902,用于接收来自终端的连接恢复请求消息,所述连接恢复请求消息用于请求恢复无线资源控制RRC连接;The receiving unit 902 is configured to receive a connection recovery request message from the terminal, where the connection recovery request message is used to request to resume the radio resource control RRC connection;
所述发送单元903,用于若拒绝恢复所述RRC连接,则向所述终端发送连接恢复拒绝消息和消息认证码,所述连接恢复拒绝消息包括计时器的信息,所述连接拒绝请求消息用于指示拒绝所述终端恢复所述RRC连接。The sending unit 903 is configured to: if the RRC connection is refused to be restored, send a connection recovery reject message and a message authentication code to the terminal, where the connection recovery reject message includes information of a timer, and the connection reject request message is used by And instructing to reject the terminal to resume the RRC connection.
在一种可能的实现方式中,所述发送单元903,还用于向源基站发送所述计时器的信息;In a possible implementation manner, the sending unit 903 is further configured to send information about the timer to a source base station;
所述接收单元902,还用于接收来自所述源基站的所述消息认证码,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥和所述计时器的信息生成。The receiving unit 902 is further configured to receive the message authentication code from the source base station, where the message authentication code is used by the source base station according to the integrity protection key of the source base station and the information of the timer generate.
在一种可能的实现方式中,所述连接恢复请求消息包括指示参数,所述指示参数用于指示新鲜性参数;所述发送单元903,还用于向所述源基站发送所述指示参数;In a possible implementation manner, the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate a freshness parameter, and the sending unit 903 is further configured to send the indication parameter to the source base station;
其中,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥、所述新鲜性参数和所述计时器的信息生成,相邻两次生成消息认证码所使用的新鲜性参数不同。The message authentication code is generated by the source base station according to the integrity protection key of the source base station, the freshness parameter, and the information of the timer, and the message used by the message authentication code is generated twice. Sexual parameters are different.
在一种可能的实现方式中,所述发送单元903,还用于向源基站发送所述连接拒绝请求消息;In a possible implementation, the sending unit 903 is further configured to send the connection reject request message to the source base station;
所述接收单元902,还用于接收来自所述源基站的所述消息认证码,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥和所述连接拒绝请求消息生成。The receiving unit 902 is further configured to receive the message authentication code from the source base station, where the message authentication code is used by the source base station according to the integrity protection key of the source base station and the connection reject request message. generate.
在一种可能的实现方式中,所述连接恢复请求消息包括指示参数,所述指示参数 用于指示新鲜性参数;所述发送单元903,还用于向所述源基站发送所述指示参数;In a possible implementation manner, the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate a freshness parameter, and the sending unit 903 is further configured to send the indication parameter to the source base station;
其中,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥、所述新鲜性参数和所述连接拒绝请求消息生成,相邻两次生成消息认证码所使用的新鲜性参数不同。The message authentication code is generated by the source base station according to the integrity protection key of the source base station, the freshness parameter, and the connection rejection request message, and the message used by the message authentication code is generated twice. Sexual parameters are different.
在一种可能的实现方式中,所述接收单元902,还用于接收来自所述源基站的密钥;In a possible implementation manner, the receiving unit 902 is further configured to receive a key from the source base station;
所述处理单元901,用于根据所述密钥和所述计时器的信息,生成所述消息认证码。The processing unit 901 is configured to generate the message authentication code according to the key and the information of the timer.
在一种可能的实现方式中,所述处理单元901,具体用于根据所述密钥、所述计时器的信息和新鲜性参数,生成所述消息认证码;In a possible implementation, the processing unit 901 is specifically configured to generate the message authentication code according to the key, the information of the timer, and the freshness parameter.
其中,相邻两次生成消息认证码所使用的新鲜性参数不同。The freshness parameters used to generate the message authentication code twice are different.
在一种可能的实现方式中,所述连接恢复请求消息包括指示参数,所述指示参数用于指示所述新鲜性参数,所述新鲜性参数包括分组数据汇聚协议计数PDCP COUNT,所述指示参数包括所述PDCP COUNT的部分或全部比特位。In a possible implementation, the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate the freshness parameter, and the freshness parameter includes a packet data convergence protocol count PDCP COUNT, the indication parameter Some or all of the bits of the PDCP COUNT are included.
在一种可能的实现方式中,所述新鲜性参数包括拒绝次数,所述拒绝次数用于表示所述终端尝试恢复所述RRC连接时被拒绝的次数。In a possible implementation manner, the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
在一种可能的实现方式中,所述接收单元902,还用于接收来自所述源基站的密钥;In a possible implementation manner, the receiving unit 902 is further configured to receive a key from the source base station;
所述处理单元901,用于根据所述密钥和所述连接请求拒绝消息,生成所述消息认证码。The processing unit 901 is configured to generate the message authentication code according to the key and the connection request rejection message.
在一种可能的实现方式中,所述处理单元901,具体用于根据所述密钥、所述连接请求拒绝消息和新鲜性参数,生成所述消息认证码;In a possible implementation, the processing unit 901 is specifically configured to generate the message authentication code according to the key, the connection request rejection message, and the freshness parameter.
其中,相邻两次生成消息认证码所使用的新鲜性参数不同。The freshness parameters used to generate the message authentication code twice are different.
在一种可能的实现方式中,所述连接恢复请求消息包括指示参数,所述指示参数用于指示所述新鲜性参数,所述新鲜性参数包括分组数据汇聚协议计数PDCP COUNT,所述指示参数包括所述PDCP COUNT的部分或全部比特位。In a possible implementation, the connection recovery request message includes an indication parameter, where the indication parameter is used to indicate the freshness parameter, and the freshness parameter includes a packet data convergence protocol count PDCP COUNT, the indication parameter Some or all of the bits of the PDCP COUNT are included.
在一种可能的实现方式中,所述新鲜性参数包括拒绝次数,所述拒绝次数用于表示所述终端尝试恢复所述RRC连接时被拒绝的次数。应理解,该目标基站可以用于实现本发明实施例的方法中由目标基站执行的步骤,相关特征可以参照上文,此处不再赘述。In a possible implementation manner, the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection. It should be understood that the target base station may be used to implement the steps performed by the target base station in the method of the embodiment of the present invention. For related features, reference may be made to the above, and details are not described herein again.
本申请可以根据上述方法示例对源基站进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。比如,在采用对应各个功能划分各个功能模块的情况下,图10示出了一种装置示意图,该装置1000可以是上述实施例中所涉及的源基站,该装置1000包括处理单元1001、接收单元1002和发送单元1003。The application may divide the function modules of the source base station according to the foregoing method example. For example, each function module may be divided according to each function, or two or more functions may be integrated into one processing module. The above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of modules in the present application is schematic, and is only a logical function division, and may be further divided in actual implementation. For example, in the case of dividing each functional module by corresponding functions, FIG. 10 shows a schematic diagram of a device, which may be the source base station involved in the above embodiment, and the device 1000 includes a processing unit 1001 and a receiving unit. 1002 and transmitting unit 1003.
在一种请求恢复连接的方法的实现中:In an implementation of a method of requesting a restore connection:
所述接收单元1002,用于接收来自目标基站的计时器的信息;The receiving unit 1002 is configured to receive information about a timer from a target base station;
所述处理单元1001,用于根据所述计时器的信息和所述装置的完整性保护密钥, 生成消息认证码;The processing unit 1001 is configured to generate a message authentication code according to the information of the timer and the integrity protection key of the device;
所述发送单元1003,用于将所述消息认证码发送至所述目标基站。The sending unit 1003 is configured to send the message authentication code to the target base station.
在一种可能的实现方式中,所述处理单元1001,具体用于根据所述计时器的信息、所述装置的完整性保护密钥和新鲜性参数生成所述消息认证码;In a possible implementation, the processing unit 1001 is specifically configured to generate the message authentication code according to the information of the timer, the integrity protection key of the device, and the freshness parameter.
其中,相邻两次生成消息认证码所使用的新鲜性参数不同。The freshness parameters used to generate the message authentication code twice are different.
在一种可能的实现方式中,所述接收单元1002,还用于接收来自所述目标基站的指示参数,所述指示参数用于指示所述新鲜性参数。In a possible implementation manner, the receiving unit 1002 is further configured to receive an indication parameter from the target base station, where the indication parameter is used to indicate the freshness parameter.
在一种可能的实现方式中,所述新鲜性参数包括分组数据汇聚协议计数PDCP COUNT,所述指示参数包括所述PDCP COUNT的部分或全部比特位。In a possible implementation manner, the freshness parameter includes a packet data convergence protocol count PDCP COUNT, and the indication parameter includes part or all of the bits of the PDCP COUNT.
在一种可能的实现方式中,所述新鲜性参数包括拒绝次数,所述拒绝次数用于表示终端尝试恢复所述RRC连接时被拒绝的次数。In a possible implementation manner, the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
在另一种请求恢复连接的方法的实现中:In another implementation of a method that requests a restore connection:
所述接收单元1002,用于接收来自目标基站的连接拒绝请求消息,所述连接拒绝请求消息包括计时器的信息,所述连接拒绝请求消息用于指示拒绝所述终端恢复无线资源控制RRC连接;The receiving unit 1002 is configured to receive a connection reject request message from the target base station, where the connection reject request message includes information of a timer, where the connection reject request message is used to indicate that the terminal is refused to resume the radio resource control RRC connection;
所述处理单元1001,用于根据所述连接拒绝请求消息和所述装置的完整性保护密钥,生成消息认证码;The processing unit 1001 is configured to generate a message authentication code according to the connection reject request message and the integrity protection key of the device;
所述发送单元1003,用于将所述消息认证码发送至所述目标基站。The sending unit 1003 is configured to send the message authentication code to the target base station.
在一种可能的实现方式中,所述处理单元1001,具体用于:In a possible implementation, the processing unit 1001 is specifically configured to:
根据所述连接拒绝请求消息、所述装置的完整性保护密钥和新鲜性参数,生成消息认证码;Generating a message authentication code according to the connection rejection request message, the integrity protection key of the device, and the freshness parameter;
其中,相邻两次生成消息认证码所使用的新鲜性参数不同。The freshness parameters used to generate the message authentication code twice are different.
在一种可能的实现方式中,所述接收单元1002,还用于接收来自所述目标基站的指示参数,所述指示参数用于指示所述新鲜性参数。In a possible implementation manner, the receiving unit 1002 is further configured to receive an indication parameter from the target base station, where the indication parameter is used to indicate the freshness parameter.
在一种可能的实现方式中,所述新鲜性参数包括分组数据汇聚协议计数PDCP COUNT,所述指示参数包括所述PDCP COUNT的部分或全部比特位。In a possible implementation manner, the freshness parameter includes a packet data convergence protocol count PDCP COUNT, and the indication parameter includes part or all of the bits of the PDCP COUNT.
在一种可能的实现方式中,所述新鲜性参数包括拒绝次数,所述拒绝次数用于表示所述终端尝试恢复所述RRC连接时被拒绝的次数。In a possible implementation manner, the freshness parameter includes a number of rejections, and the number of rejections is used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
应理解,该源基站可以用于实现本发明实施例的方法中由源基站执行的步骤,相关特征可以参照上文,此处不再赘述。It should be understood that the source base station may be used to implement the steps performed by the source base station in the method of the embodiment of the present invention. For related features, reference may be made to the above, and details are not described herein again.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质 集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(Solid State Disk,SSD))等。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device. The computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.). The computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media. The usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a Solid State Disk (SSD)) or the like.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(Solid State Disk,SSD))等。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device. The computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.). The computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media. The usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a Solid State Disk (SSD)) or the like.
尽管在此结合各实施例对本发明进行了描述,然而,在实施所要求保护的本发明过程中,本领域技术人员通过查看所述附图、公开内容、以及所附权利要求书,可理解并实现所述公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。Although the present invention has been described herein in connection with the embodiments of the present invention, it will be understood by those skilled in the <RTIgt; Other variations of the disclosed embodiments are achieved. In the claims, the word "comprising" does not exclude other components or steps, and "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill several of the functions recited in the claims. Certain measures are recited in mutually different dependent claims, but this does not mean that the measures are not combined to produce a good effect.
本领域技术人员应明白,本申请的实施例可提供为方法、装置(设备)、计算机可读存储介质或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式,这里将它们都统称为“模块”或“系统”。Those skilled in the art will appreciate that embodiments of the present application can be provided as a method, apparatus (device), computer readable storage medium, or computer program product. Thus, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware aspects, which are collectively referred to herein as "module" or "system."
本领域技术人员还可以了解到本申请实施例列出的各种说明性逻辑块(illustrative logical block)和步骤(step)可以通过电子硬件、电脑软件,或两者的结合进行实现。这样的功能是通过硬件还是软件来实现取决于特定的应用和整个系统的设计要求。本领域技术人员可以对于每种特定的应用,可以使用各种方法实现所述的功能,但这种实现不应被理解为超出本申请实施例保护的范围。Those skilled in the art can also understand that the various illustrative logical blocks and steps listed in the embodiments of the present application can be implemented by electronic hardware, computer software, or a combination of the two. Whether such functionality is implemented by hardware or software depends on the design requirements of the particular application and the overall system. Those skilled in the art can implement the described functions using various methods for each specific application, but such implementation should not be construed as being beyond the scope of the embodiments of the present application.
尽管结合具体特征及其实施例对本发明进行了描述,显而易见的,在不脱离本发明的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本发明的示例性说明,且视为已覆盖本发明范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。While the invention has been described with respect to the specific embodiments and embodiments thereof, various modifications and combinations may be made without departing from the spirit and scope of the invention. Accordingly, the specification and drawings are to be construed as the It is apparent that those skilled in the art can make various modifications and variations to the invention without departing from the spirit and scope of the invention. Thus, it is intended that the present invention cover the modifications and modifications of the invention

Claims (38)

  1. 一种请求恢复连接的方法,其特征在于,包括:A method for requesting a connection to restore, characterized in that it comprises:
    终端向目标基站发送连接恢复请求消息,所述连接恢复请求消息用于请求恢复无线资源控制RRC连接;The terminal sends a connection recovery request message to the target base station, where the connection recovery request message is used to request to resume the radio resource control RRC connection;
    所述终端接收来自所述目标基站的连接恢复拒绝消息和消息认证码,所述连接恢复拒绝消息用于指示拒绝所述终端恢复所述RRC连接,所述连接恢复拒绝消息包括计时器的信息,所述消息认证码是根据源基站的完整性保护密钥和所述计时器的信息生成的;The terminal receives a connection recovery reject message and a message authentication code from the target base station, where the connection recovery reject message is used to indicate that the terminal is denied to restore the RRC connection, and the connection recovery reject message includes information of a timer. The message authentication code is generated according to an integrity protection key of the source base station and information of the timer;
    所述终端若根据所述计时器的信息和所述终端的完整性保护密钥,校验所述消息认证码正确,则根据所述计时器的信息发起连接恢复请求流程。If the terminal verifies that the message authentication code is correct according to the information of the timer and the integrity protection key of the terminal, the terminal initiates a connection recovery request procedure according to the information of the timer.
  2. 根据权利要求1所述的方法,其特征在于,所述消息认证码是根据源基站的完整性保护密钥、所述计时器的信息和新鲜性参数生成的,相邻两次生成消息认证码所使用的新鲜性参数不同。The method according to claim 1, wherein the message authentication code is generated according to an integrity protection key of the source base station, the information of the timer, and a freshness parameter, and the message authentication code is generated twice. The freshness parameters used are different.
  3. 根据权利要求2所述的方法,其特征在于,所述连接恢复请求消息包括指示参数,所述指示参数用于指示所述新鲜性参数。The method of claim 2, wherein the connection recovery request message includes an indication parameter, the indication parameter being used to indicate the freshness parameter.
  4. 根据权利要求2所述的方法,其特征在于,所述新鲜性参数包括拒绝次数,所述拒绝次数用于表示所述终端尝试恢复所述RRC连接时被拒绝的次数。The method of claim 2, wherein the freshness parameter comprises a number of rejections, the number of rejections being used to indicate a number of times the terminal is rejected when attempting to resume the RRC connection.
  5. 一种请求恢复连接的方法,其特征在于,包括:A method for requesting a connection to restore, characterized in that it comprises:
    源基站接收来自目标基站的计时器的信息;The source base station receives information of a timer from the target base station;
    所述源基站根据所述计时器的信息和所述源基站的完整性保护密钥,生成消息认证码;The source base station generates a message authentication code according to the information of the timer and the integrity protection key of the source base station;
    所述源基站将所述消息认证码发送至所述目标基站。The source base station sends the message authentication code to the target base station.
  6. 根据权利要求5所述的方法,其特征在于,所述源基站根据所述计时器的信息和所述源基站的完整性保护密钥,生成消息认证码,包括:The method according to claim 5, wherein the source base station generates a message authentication code according to the information of the timer and the integrity protection key of the source base station, including:
    所述源基站根据所述计时器的信息、所述源基站的完整性保护密钥和新鲜性参数生成所述消息认证码;The source base station generates the message authentication code according to the information of the timer, the integrity protection key of the source base station, and a freshness parameter;
    其中,相邻两次生成消息认证码所使用的新鲜性参数不同。The freshness parameters used to generate the message authentication code twice are different.
  7. 根据权利要求6所述的方法,其特征在于,所述方法还包括:The method of claim 6 wherein the method further comprises:
    所述源基站接收来自所述目标基站的指示参数,所述指示参数用于指示所述新鲜性参数。The source base station receives an indication parameter from the target base station, and the indication parameter is used to indicate the freshness parameter.
  8. 根据权利要求6所述的方法,其特征在于,所述新鲜性参数包括拒绝次数,所述拒绝次数用于表示终端尝试恢复所述RRC连接时被拒绝的次数。The method of claim 6, wherein the freshness parameter comprises a number of rejections, the number of rejections being used to indicate the number of times the terminal is rejected when attempting to resume the RRC connection.
  9. 一种请求恢复连接的方法,其特征在于,包括:A method for requesting a connection to restore, characterized in that it comprises:
    源基站接收来自目标基站的连接拒绝请求消息,所述连接拒绝请求消息包括计时器的信息,所述连接拒绝请求消息用于指示拒绝终端恢复无线资源控制RRC连接;The source base station receives a connection reject request message from the target base station, where the connection reject request message includes information of a timer, and the connection reject request message is used to indicate that the terminal is allowed to resume the radio resource control RRC connection;
    所述源基站根据所述连接拒绝请求消息和所述源基站的完整性保护密钥,生成消息认证码;The source base station generates a message authentication code according to the connection reject request message and the integrity protection key of the source base station;
    所述源基站将所述消息认证码发送至所述目标基站。The source base station sends the message authentication code to the target base station.
  10. 根据权利要求9所述的方法,其特征在于,所述源基站根据所述连接拒绝请 求消息和所述源基站的完整性保护密钥,生成消息认证码,包括:The method according to claim 9, wherein the source base station generates a message authentication code according to the connection reject request message and the integrity protection key of the source base station, including:
    所述源基站根据所述连接拒绝请求消息、所述源基站的完整性保护密钥和新鲜性参数,生成消息认证码;The source base station generates a message authentication code according to the connection reject request message, the integrity protection key of the source base station, and the freshness parameter;
    其中,相邻两次生成消息认证码所使用的新鲜性参数不同。The freshness parameters used to generate the message authentication code twice are different.
  11. 一种请求恢复连接的方法,其特征在于,包括:A method for requesting a connection to restore, characterized in that it comprises:
    目标基站接收来自终端的连接恢复请求消息,所述连接恢复请求消息用于请求恢复无线资源控制RRC连接;The target base station receives a connection recovery request message from the terminal, where the connection recovery request message is used to request to resume the radio resource control RRC connection;
    所述目标基站若拒绝恢复所述RRC连接,则向所述终端发送连接恢复拒绝消息和消息认证码,所述连接恢复拒绝消息包括计时器的信息,所述连接拒绝请求消息用于指示拒绝所述终端恢复所述RRC连接。If the target base station refuses to restore the RRC connection, sending a connection recovery reject message and a message authentication code to the terminal, the connection recovery reject message includes information of a timer, and the connection reject request message is used to indicate the reject The terminal resumes the RRC connection.
  12. 根据权利要求11所述的方法,其特征在于,所述方法还包括:The method of claim 11 wherein the method further comprises:
    所述目标基站向源基站发送所述计时器的信息;Sending, by the target base station, information of the timer to a source base station;
    所述目标基站接收来自所述源基站的所述消息认证码,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥和所述计时器的信息生成。The target base station receives the message authentication code from the source base station, and the message authentication code is generated by the source base station according to the integrity protection key of the source base station and the information of the timer.
  13. 根据权利要求12所述的方法,其特征在于,所述连接恢复请求消息包括指示参数,所述指示参数用于指示新鲜性参数;所述方法还包括:The method according to claim 12, wherein the connection recovery request message includes an indication parameter, the indication parameter is used to indicate a freshness parameter, and the method further comprises:
    所述目标基站向所述源基站发送所述指示参数;Sending, by the target base station, the indication parameter to the source base station;
    其中,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥、所述新鲜性参数和所述计时器的信息生成,相邻两次生成消息认证码所使用的新鲜性参数不同。The message authentication code is generated by the source base station according to the integrity protection key of the source base station, the freshness parameter, and the information of the timer, and the message used by the message authentication code is generated twice. Sexual parameters are different.
  14. 根据权利要求11所述的方法,其特征在于,所述方法还包括:The method of claim 11 wherein the method further comprises:
    所述目标基站向源基站发送所述连接拒绝请求消息;Sending, by the target base station, the connection reject request message to the source base station;
    所述目标基站接收来自所述源基站的所述消息认证码,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥和所述连接拒绝请求消息生成。The target base station receives the message authentication code from the source base station, and the message authentication code is generated by the source base station according to the integrity protection key of the source base station and the connection reject request message.
  15. 根据权利要求14所述的方法,其特征在于,所述连接恢复请求消息包括指示参数,所述指示参数用于指示新鲜性参数;所述方法还包括:The method according to claim 14, wherein the connection recovery request message includes an indication parameter, the indication parameter is used to indicate a freshness parameter, and the method further comprises:
    所述目标基站向所述源基站发送所述指示参数;Sending, by the target base station, the indication parameter to the source base station;
    其中,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥、所述新鲜性参数和所述连接拒绝请求消息生成,相邻两次生成消息认证码所使用的新鲜性参数不同。The message authentication code is generated by the source base station according to the integrity protection key of the source base station, the freshness parameter, and the connection rejection request message, and the message used by the message authentication code is generated twice. Sexual parameters are different.
  16. 一种装置,其特征在于,包括:发送单元、接收单元和处理单元;An apparatus, comprising: a transmitting unit, a receiving unit, and a processing unit;
    所述发送单元,用于向目标基站发送连接恢复请求消息,所述连接恢复请求消息用于请求恢复无线资源控制RRC连接;The sending unit is configured to send a connection recovery request message to the target base station, where the connection recovery request message is used to request to resume the radio resource control RRC connection;
    所述接收单元,用于接收来自所述目标基站的连接恢复拒绝消息和消息认证码,所述连接恢复拒绝消息用于指示拒绝所述装置恢复所述RRC连接,所述连接恢复拒绝消息包括计时器的信息,所述消息认证码是根据源基站的完整性保护密钥和所述计时器的信息生成的;The receiving unit is configured to receive a connection recovery reject message and a message authentication code from the target base station, where the connection recovery reject message is used to indicate that the device is denied to restore the RRC connection, and the connection recovery reject message includes timing Information of the device, the message authentication code is generated according to the integrity protection key of the source base station and the information of the timer;
    所述处理单元,用于若根据所述计时器的信息和所述装置的完整性保护密钥,校验所述消息认证码正确,则根据所述计时器的信息发起连接恢复请求流程。The processing unit is configured to: if the message authentication code is verified to be correct according to the information of the timer and the integrity protection key of the device, initiate a connection recovery request process according to the information of the timer.
  17. 根据权利要求16所述的装置,其特征在于,所述消息认证码是根据源基站的 完整性保护密钥、所述计时器的信息和新鲜性参数生成的,相邻两次生成消息认证码所使用的新鲜性参数不同。The apparatus according to claim 16, wherein the message authentication code is generated according to an integrity protection key of the source base station, the information of the timer, and a freshness parameter, and the message authentication code is generated twice. The freshness parameters used are different.
  18. 根据权利要求17所述的装置,其特征在于,所述连接恢复请求消息包括指示参数,所述指示参数用于指示所述新鲜性参数。The apparatus of claim 17, wherein the connection recovery request message includes an indication parameter, the indication parameter being used to indicate the freshness parameter.
  19. 根据权利要求17所述的装置,其特征在于,所述新鲜性参数包括拒绝次数,所述拒绝次数用于表示所述装置尝试恢复所述RRC连接时被拒绝的次数。The apparatus of claim 17, wherein the freshness parameter comprises a number of rejections, the number of rejections being used to indicate the number of times the device was rejected when attempting to resume the RRC connection.
  20. 一种装置,其特征在于,包括接收单元、发送单元和处理单元;An apparatus, comprising: a receiving unit, a transmitting unit, and a processing unit;
    所述接收单元,用于接收来自目标基站的计时器的信息;The receiving unit is configured to receive information about a timer from a target base station;
    所述处理单元,用于根据所述计时器的信息和所述装置的完整性保护密钥,生成消息认证码;The processing unit is configured to generate a message authentication code according to the information of the timer and the integrity protection key of the device;
    所述发送单元,用于将所述消息认证码发送至所述目标基站。The sending unit is configured to send the message authentication code to the target base station.
  21. 根据权利要求20所述的装置,其特征在于,所述处理单元,具体用于根据所述计时器的信息、所述装置的完整性保护密钥和新鲜性参数生成所述消息认证码;The device according to claim 20, wherein the processing unit is configured to generate the message authentication code according to the information of the timer, the integrity protection key of the device, and a freshness parameter;
    其中,相邻两次生成消息认证码所使用的新鲜性参数不同。The freshness parameters used to generate the message authentication code twice are different.
  22. 根据权利要求21所述的装置,其特征在于,所述接收单元,还用于接收来自所述目标基站的指示参数,所述指示参数用于指示所述新鲜性参数。The apparatus according to claim 21, wherein the receiving unit is further configured to receive an indication parameter from the target base station, where the indication parameter is used to indicate the freshness parameter.
  23. 根据权利要求21所述的装置,其特征在于,所述新鲜性参数包括拒绝次数,所述拒绝次数用于表示终端尝试恢复所述RRC连接时被拒绝的次数。The apparatus of claim 21, wherein the freshness parameter comprises a number of rejections, the number of rejections being used to indicate a number of times the terminal is rejected when attempting to resume the RRC connection.
  24. 一种装置,其特征在于,包括接收单元、发送单元和处理单元;An apparatus, comprising: a receiving unit, a transmitting unit, and a processing unit;
    所述接收单元,用于接收来自目标基站的连接拒绝请求消息,所述连接拒绝请求消息包括计时器的信息,所述连接拒绝请求消息用于指示拒绝终端恢复无线资源控制RRC连接;The receiving unit is configured to receive a connection reject request message from a target base station, where the connection reject request message includes information of a timer, where the connection reject request message is used to indicate that the terminal is denied to restore the radio resource control RRC connection;
    所述处理单元,用于根据所述连接拒绝请求消息和所述装置的完整性保护密钥,生成消息认证码;The processing unit is configured to generate a message authentication code according to the connection rejection request message and the integrity protection key of the device;
    所述发送单元,用于将所述消息认证码发送至所述目标基站。The sending unit is configured to send the message authentication code to the target base station.
  25. 根据权利要求24所述的装置,其特征在于,所述处理单元具体用于根据所述连接拒绝请求消息、所述装置的完整性保护密钥和新鲜性参数,生成消息认证码;The device according to claim 24, wherein the processing unit is configured to generate a message authentication code according to the connection rejection request message, the integrity protection key of the device, and a freshness parameter;
    其中,相邻两次生成消息认证码所使用的新鲜性参数不同。The freshness parameters used to generate the message authentication code twice are different.
  26. 一种装置,其特征在于,包括接收单元和发送单元;A device, comprising: a receiving unit and a transmitting unit;
    所述接收单元,用于接收来自终端的连接恢复请求消息,所述连接恢复请求消息用于请求恢复无线资源控制RRC连接;The receiving unit is configured to receive a connection recovery request message from the terminal, where the connection recovery request message is used to request to resume the radio resource control RRC connection;
    所述发送单元,用于若拒绝恢复所述RRC连接,则向所述终端发送连接恢复拒绝消息和消息认证码,所述连接恢复拒绝消息包括计时器的信息,所述连接拒绝请求消息用于指示拒绝所述终端恢复所述RRC连接。The sending unit is configured to: if the RRC connection is refused to be restored, send a connection recovery reject message and a message authentication code to the terminal, where the connection recovery reject message includes information of a timer, and the connection reject request message is used for Instructing to reject the terminal to resume the RRC connection.
  27. 根据权利要求26所述的装置,其特征在于,所述发送单元,还用于向源基站发送所述计时器的信息;The apparatus according to claim 26, wherein the sending unit is further configured to send information of the timer to a source base station;
    所述接收单元,还用于接收来自所述源基站的所述消息认证码,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥和所述计时器的信息生成。The receiving unit is further configured to receive the message authentication code from the source base station, where the message authentication code is generated by the source base station according to the integrity protection key of the source base station and the information of the timer .
  28. 根据权利要求27所述的装置,其特征在于,所述连接恢复请求消息包括指示参数,所述指示参数用于指示新鲜性参数;所述发送单元,还用于向所述源基站发送 所述指示参数;The device according to claim 27, wherein the connection recovery request message includes an indication parameter, the indication parameter is used to indicate a freshness parameter, and the sending unit is further configured to send the Indication parameter
    其中,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥、所述新鲜性参数和所述计时器的信息生成,相邻两次生成消息认证码所使用的新鲜性参数不同。The message authentication code is generated by the source base station according to the integrity protection key of the source base station, the freshness parameter, and the information of the timer, and the message used by the message authentication code is generated twice. Sexual parameters are different.
  29. 根据权利要求26所述的装置,其特征在于,所述发送单元,还用于向源基站发送所述连接拒绝请求消息;The apparatus according to claim 26, wherein the sending unit is further configured to send the connection reject request message to a source base station;
    所述接收单元,还用于接收来自所述源基站的所述消息认证码,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥和所述连接拒绝请求消息生成。The receiving unit is further configured to receive the message authentication code from the source base station, where the message authentication code is generated by the source base station according to the integrity protection key of the source base station and the connection reject request message. .
  30. 根据权利要求29所述的装置,其特征在于,所述连接恢复请求消息包括指示参数,所述指示参数用于指示新鲜性参数;所述发送单元,还用于向所述源基站发送所述指示参数;The device according to claim 29, wherein the connection recovery request message includes an indication parameter, the indication parameter is used to indicate a freshness parameter, and the sending unit is further configured to send the Indication parameter
    其中,所述消息认证码由所述源基站根据所述源基站的完整性保护密钥、所述新鲜性参数和所述连接拒绝请求消息生成,相邻两次生成消息认证码所使用的新鲜性参数不同。The message authentication code is generated by the source base station according to the integrity protection key of the source base station, the freshness parameter, and the connection rejection request message, and the message used by the message authentication code is generated twice. Sexual parameters are different.
  31. 一种计算机存储介质,其特征在于,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行所述权利要求1-4中任意一项所述的方法。A computer storage medium, characterized in that the computer readable storage medium stores instructions that, when run on a computer, cause the computer to perform the method of any of claims 1-4.
  32. 一种计算机存储介质,其特征在于,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行所述权利要求5-8中任意一项所述的方法。A computer storage medium, characterized in that the computer readable storage medium stores instructions that, when run on a computer, cause the computer to perform the method of any one of claims 5-8.
  33. 一种计算机存储介质,其特征在于,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行所述权利要求9或10所述的方法。A computer storage medium, characterized in that the computer readable storage medium stores instructions that, when run on a computer, cause the computer to perform the method of claim 9 or 10.
  34. 一种计算机存储介质,其特征在于,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行所述权利要求11-15中任意一项所述的方法。A computer storage medium, characterized in that the computer readable storage medium stores instructions that, when run on a computer, cause the computer to perform the method of any one of claims 11-15.
  35. 一种装置,其特征在于,包括:包括存储器以及与该存储器耦合的处理器;An apparatus, comprising: a memory and a processor coupled to the memory;
    所述存储器中保存有程序指令,当所述处理器执行所述程序指令时,使得所述装置执行上述权利要求1-4任一所述的方法。Program instructions are stored in the memory, and when the processor executes the program instructions, cause the apparatus to perform the method of any of claims 1-4.
  36. 一种装置,其特征在于,包括:包括存储器以及与该存储器耦合的处理器;An apparatus, comprising: a memory and a processor coupled to the memory;
    所述存储器中保存有程序指令,当所述处理器执行所述程序指令时,使得所述装置执行上述权利要求5-8任一所述的方法。Program instructions are stored in the memory, and when the processor executes the program instructions, cause the apparatus to perform the method of any of the preceding claims 5-8.
  37. 一种装置,其特征在于,包括:包括存储器以及与该存储器耦合的处理器;An apparatus, comprising: a memory and a processor coupled to the memory;
    所述存储器中保存有程序指令,当所述处理器执行所述程序指令时,使得所述装置执行上述权利要求9或10所述的方法。Program instructions are stored in the memory, and when the processor executes the program instructions, cause the apparatus to perform the method of claim 9 or 10.
  38. 一种装置,其特征在于,包括:包括存储器以及与该存储器耦合的处理器;An apparatus, comprising: a memory and a processor coupled to the memory;
    所述存储器中保存有程序指令,当所述处理器执行所述程序指令时,使得所述装置执行上述权利要求11-15任一所述的方法。Program instructions are stored in the memory, and when the processor executes the program instructions, cause the apparatus to perform the method of any of the preceding claims 11-15.
PCT/CN2018/115477 2017-11-16 2018-11-14 Method and apparatus for requesting recovery of connection WO2019096171A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201711140813.0A CN109803456B (en) 2017-11-16 2017-11-16 Method and device for requesting to recover connection
CN201711140813.0 2017-11-16

Publications (1)

Publication Number Publication Date
WO2019096171A1 true WO2019096171A1 (en) 2019-05-23

Family

ID=66539980

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/115477 WO2019096171A1 (en) 2017-11-16 2018-11-14 Method and apparatus for requesting recovery of connection

Country Status (2)

Country Link
CN (1) CN109803456B (en)
WO (1) WO2019096171A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109756900B (en) * 2018-06-05 2021-02-23 Oppo广东移动通信有限公司 Method and device for improving UE identification security and computer storage medium
CN112788795B (en) * 2019-11-08 2023-04-07 华为技术有限公司 Connection recovery method and device
CN113811022B (en) * 2021-08-12 2024-03-12 天翼物联科技有限公司 Abnormal terminal rejection method, system, device and storage medium
CN116584119A (en) * 2021-12-10 2023-08-11 北京小米移动软件有限公司 Information transmission method, apparatus, communication device and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104737615A (en) * 2012-10-04 2015-06-24 Lg电子株式会社 Method for reporting denied connection in wireless communication system and apparatus supporting same
WO2017048170A1 (en) * 2015-09-14 2017-03-23 Telefonaktiebolaget Lm Ericsson (Publ) Radio access nodes and terminal devices in a communication network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101047978A (en) * 2006-03-27 2007-10-03 华为技术有限公司 Method for updating key in user's set
WO2017123048A1 (en) * 2016-01-14 2017-07-20 Lg Electronics Inc. Method for connecting with network at ue in wireless communication system and apparatus therefor

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104737615A (en) * 2012-10-04 2015-06-24 Lg电子株式会社 Method for reporting denied connection in wireless communication system and apparatus supporting same
WO2017048170A1 (en) * 2015-09-14 2017-03-23 Telefonaktiebolaget Lm Ericsson (Publ) Radio access nodes and terminal devices in a communication network

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "Security solution for key handling in state transition from RRC inactive state to RRC connected state", 3GPP TSG SA WG3 (SECURITY) MEETING #87- 171587, vol. SA WG3, 19 May 2017 (2017-05-19), pages 3, XP051289768 *
HUAWEI ET AL.: "Discussion on DoS and replay attacks for rejection procedure", 3GPP RAN WG2 MEETING #101 R2-1803266, vol. RAN WG2, 2 March 2018 (2018-03-02), XP051399743 *
HUAWEI ET AL.: "Security consideration for NR", 3GPP TSG-RAN WG2 MEETING #96 R2-167874, vol. RAN WG2, 18 November 2016 (2016-11-18), XP051177619 *

Also Published As

Publication number Publication date
CN109803456A (en) 2019-05-24
CN109803456B (en) 2021-05-11

Similar Documents

Publication Publication Date Title
AU2018366755B2 (en) Connection resume request method and apparatus
WO2019096171A1 (en) Method and apparatus for requesting recovery of connection
CN110912854B (en) Safety protection method, equipment and system
US11564099B2 (en) RRC connection resume method and apparatus
EP3713372A1 (en) Method and device for creating user group
CN111886885B (en) Secure authentication when recovering an RRC connection
CN110383868A (en) Inactive state in wireless communication system is supported safely
US20190349406A1 (en) Method, Apparatus, And System For Protecting Data
US20220303763A1 (en) Communication method, apparatus, and system
CN111836263A (en) Communication processing method and communication processing device
TWI685267B (en) Method and equipment for access control
CN109936444B (en) Key generation method and device
RU2772617C2 (en) Method and apparatus for requesting reconnection
WO2019096265A1 (en) Method and device for requesting connection recovery
WO2023098209A1 (en) Data transmission protection method, device and system
WO2023072271A1 (en) Method and apparatus for managing security context
WO2023213191A1 (en) Security protection method and communication apparatus
WO2021238280A1 (en) Communication method, apparatus and system
EP3952598A1 (en) Management method and apparatus for terminal device
CN116530119A (en) Method, device and system for protecting serial numbers in wireless network
WO2023282834A1 (en) Generating an authentication token

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18879234

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18879234

Country of ref document: EP

Kind code of ref document: A1