WO2019161548A1 - 控制上报安全校验失败的方法及装置、计算机存储介质 - Google Patents

控制上报安全校验失败的方法及装置、计算机存储介质 Download PDF

Info

Publication number
WO2019161548A1
WO2019161548A1 PCT/CN2018/077063 CN2018077063W WO2019161548A1 WO 2019161548 A1 WO2019161548 A1 WO 2019161548A1 CN 2018077063 W CN2018077063 W CN 2018077063W WO 2019161548 A1 WO2019161548 A1 WO 2019161548A1
Authority
WO
WIPO (PCT)
Prior art keywords
timer
indication information
network device
terminal
data bearer
Prior art date
Application number
PCT/CN2018/077063
Other languages
English (en)
French (fr)
Inventor
唐海
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to KR1020207027362A priority Critical patent/KR102382344B1/ko
Priority to AU2018409918A priority patent/AU2018409918A1/en
Priority to CN201880088999.6A priority patent/CN111699708A/zh
Priority to EP18907430.5A priority patent/EP3751879A4/en
Priority to JP2020544444A priority patent/JP2021518069A/ja
Priority to PCT/CN2018/077063 priority patent/WO2019161548A1/zh
Publication of WO2019161548A1 publication Critical patent/WO2019161548A1/zh
Priority to US16/994,307 priority patent/US20200382960A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0252Traffic management, e.g. flow control or congestion control per individual bearer or channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/18Management of setup rejection or failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • H04W76/38Connection release triggered by timers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/19Connection re-establishment

Definitions

  • the present invention relates to the field of wireless communication technologies, and in particular, to a method and apparatus for controlling failure of reporting security verification, and a computer storage medium.
  • enhanced mobile broadband eMBB
  • URLLC Ultra Reliable Low Latency Communication
  • mMTC massive machine type communication
  • 5G mobile communication technology is also called Next Generation Wireless Communication Technology (NR, New Radio).
  • NR Next Generation Wireless Communication Technology
  • LTE Long Term Evolution
  • NR Combination of NR coverage
  • LTE Long Term Evolution
  • a tight interworking mode between LTE and NR is proposed.
  • each packet data convergence protocol (PDCP, Packet Data)
  • the Convergence Protocol (SDU) Service Data Unit (SDU) additionally carries an integrity protection check code (MAC-I) for integrity protection check.
  • MAC-I integrity protection check code
  • the data receiving end needs to perform integrity protection check on each data packet. If the integrity protection check fails, it is very likely that the data is received and attacked and maliciously altered. Data that has been maliciously altered should be discarded. For this to happen, the network side should take appropriate measures to avoid the existence of security risks and ensure communication security. Further, when it is detected that the integrity protection check of the downlink data fails, the user equipment (UE, User Equipment) should notify the network side that the integrity protection check failure of the data detected by a certain bearer fails, but considers the completeness of the reported data. The signaling load of the sexual protection check failure is too large, and measures need to be taken to control the reporting.
  • UE User Equipment
  • an embodiment of the present invention provides a method and apparatus for controlling a failure of reporting a security check, and a computer storage medium.
  • the first indication information is sent to the network device, where the first indication information is used to indicate that the integrity protection check failure is detected, and the first timer is started;
  • the terminal receives the second indication information sent by the network device before the first timer expires, stopping the first timer; if the first timer expires, the terminal does not receive And sending the first indication information to the network device, and restarting the first timer, to the second indication information sent by the network device.
  • the method further includes:
  • the terminal Receiving, by the terminal, the first configuration information that is sent by the network device, where the first configuration information is used to configure a corresponding timer for the at least one data bearer, where the at least one data bearer includes the first data bearer,
  • the first data bearer corresponds to the first timer.
  • the at least one data bearer further includes a second data bearer, where the second data bearer corresponds to a second timer, where
  • the second timer is different from the first timer
  • the terminal detects that the integrity protection check of the second data bearer fails during the running of the first timer, sending, by the network device, third indication information, where the third indication information is used to indicate An integrity protection check failure is detected and the second timer is started.
  • the method further includes:
  • the terminal receives the second configuration information that is sent by the network device, where the second configuration information is used to configure a corresponding first timer for the terminal, where all data bearers under the terminal correspond to the first A timer, all data bearers under the terminal include the first data bearer.
  • the method further includes:
  • the terminal After the terminal sends the first indication information to the network device, if the terminal switches from the first cell to the second cell within the first time period, the terminal resends the First indication information.
  • the second indication information includes at least reconfiguration information or key update information.
  • a detecting unit configured to detect that the integrity protection check of the first data bearer fails
  • the reporting control unit is configured to send the first indication information to the network device, where the first indication information is used to indicate that the integrity protection check failure is detected, and the first timer is started; if the first timer expires, Receiving the second indication information sent by the network device, stopping the first timer; if the second indication information sent by the network device is not received before the first timer expires, Sending the first indication information to the network device, and restarting the first timer.
  • the device further includes:
  • a first receiving unit configured to receive first configuration information that is sent by the network device, where the first configuration information is used to configure a corresponding timer for at least one data bearer, where the at least one data bearer includes the first data
  • the first data bearer corresponds to the first timer.
  • the at least one data bearer further includes a second data bearer, where the second data bearer corresponds to a second timer, where
  • the second timer is different from the first timer
  • the reporting control unit is further configured to: if the detecting unit detects that the integrity protection check of the second data bearer fails during the running of the first timer, send the third indication information to the network device The third indication information is used to indicate that the integrity protection check failure is detected, and the second timer is started.
  • the device further includes:
  • a second receiving unit configured to receive second configuration information that is sent by the network device, where the second configuration information is used to configure a corresponding first timer for the terminal, where all data bearers under the terminal are Corresponding to the first timer, all data bearers under the terminal include the first data bearer.
  • the reporting control unit is further configured to: after the first indication information is sent to the network device, if the terminal switches from the first cell to the second cell within the first time duration, The second cell resends the first indication information.
  • the second indication information includes at least reconfiguration information or key update information.
  • the computer storage medium provided by the embodiment of the present invention has stored thereon computer executable instructions, and when the computer executable instructions are executed by the processor, the method for controlling the reported security check failure is implemented.
  • the terminal when the terminal detects that the integrity protection check of the first data bearer fails, the terminal sends the first indication information to the network device, where the first indication information is used to indicate that the integrity protection check fails to be detected. And starting a first timer; if the terminal receives the second indication information sent by the network device before the first timer expires, stopping the first timer; if the first timer Before the timeout, the terminal does not receive the second indication information sent by the network device, and then resends the first indication information to the network device, and restarts the first timer.
  • the indication of reporting the integrity check failure is detected by the timer, and the signaling load is effectively controlled.
  • FIG. 1 is a schematic flowchart of a method for controlling failure of reporting security check according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of an apparatus for controlling a failure of reporting a security check according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
  • the technical solution of the embodiment of the present invention is mainly applied to a 5G mobile communication system.
  • the technical solution of the embodiment of the present invention is not limited to the 5G mobile communication system, and can also be applied to other types of mobile communication systems.
  • eMBB aims at users to obtain multimedia content, services and data, and its business needs are growing rapidly. Because eMBB may be deployed in different scenarios, such as indoors, urban areas, and rural areas, the difference in service capabilities and requirements is relatively large. Therefore, services must be analyzed in combination with specific deployment scenarios.
  • URLLC scenario Typical applications for URLLC include: industrial automation, power automation, telemedicine operations, traffic security, and more.
  • Typical characteristics of URLLC include: high connection density, small data volume, delay-insensitive service, low cost and long service life of the module.
  • FIG. 1 is a schematic flowchart of a method for controlling a failure of reporting a security check according to an embodiment of the present invention. As shown in FIG. 1 , the method for controlling a failure to report a security check includes the following steps:
  • Step 101 When the terminal detects that the integrity protection check of the first data bearer fails, the terminal sends the first indication information to the network device, where the first indication information is used to indicate that the integrity protection check failure is detected, and the first timing is started. Device.
  • the terminal is any device capable of communicating with a network device, such as a mobile phone, a tablet computer, a notebook computer, or a desktop computer.
  • the network device may be a base station, for example, a gNB in 5G.
  • the process of performing integrity check verification on the data bearer for each data bearer may be configured through the network side.
  • the network side may configure an independent timer for each data bearer to implement independent control of each data bearer, or configure a timer for the terminal to implement control of all data bearers together. Understand that the control here refers to the failure of the control report security check.
  • Step 102 If the terminal receives the second indication information sent by the network device before the first timer expires, stopping the first timer; if the first timer expires, the After the terminal does not receive the second indication information sent by the network device, the terminal sends the first indication information to the network device again, and restarts the first timer.
  • the second indication information includes at least reconfiguration information or key update information.
  • the terminal receives the first configuration information that is sent by the network device, where the first configuration information is used to configure a corresponding timer for the at least one data bearer, where the at least one data bearer includes the first A data bearer, the first data bearer corresponding to the first timer.
  • the at least one data bearer further includes a second data bearer, where the second data bearer corresponds to a second timer; wherein the second timer is different from the first timer;
  • the terminal detects that the integrity protection check of the second data bearer fails, and sends a third indication information to the network device, where the third indication information is used to indicate that the integrity is detected.
  • the sexual protection check fails and the second timer is started.
  • the first configuration information may also be a timer corresponding to any number of data bearers configured by the third data bearer, the fourth data bearer, and the like, for example, DRB1 corresponds to timer T1, DRB2 corresponds to timer T2, DRB3 corresponds to timer T3, and so on.
  • the indication information (ie, the first indication information) for reporting the failure of the security check is independently controlled by its own timer. Specifically, when a data bearer detects that the integrity protection check fails, the terminal An indication information is reported to the network side to indicate that the integrity protection check failure is detected. At the same time, the timer of the data bearer is started. If the network side reconfiguration or key update is received before the timer expires, the timer is stopped. If no reconfiguration or key update information is received on the network side before the timer expires, the network side reports the indication that the integrity check failure is detected, and restarts the timer.
  • the terminal receives the second configuration information that is sent by the network device, where the second configuration information is used to configure a corresponding first timer for the terminal, where all data under the terminal is Each bearer corresponds to the first timer, and all data bearers under the terminal include the first data bearer.
  • a timer (that is, a timer of the terminal) is used to control the indication information (ie, the first indication information) that reports the failure of the security check, specifically, when a certain data bearer detects integrity. If the protection check fails, the terminal reports an indication to the network side to indicate that the integrity protection check failure is detected. At the same time, the timer of the data bearer is started. If the network side reconfiguration or key update is received before the timer expires, the timer is stopped. If no reconfiguration or key update information is received on the network side before the timer expires, the network side reports the indication that the integrity check failure is detected, and restarts the timer.
  • the indication information ie, the first indication information
  • the terminal after the terminal sends the first indication information to the network device, if the terminal switches from the first cell to the second cell within the first time period, the terminal resends in the second cell.
  • the first indication information may be configured on the network side, or specified by a protocol, or obtained according to the implementation of the terminal itself.
  • the terminal sends the first indication information to the corresponding network device 1 in the cell 1.
  • the terminal needs to re-send the corresponding network device 2 in the cell 2. Sending the first indication information.
  • FIG. 2 is a schematic structural diagram of an apparatus for controlling a failure of reporting a security check according to an embodiment of the present invention. As shown in FIG. 2, the apparatus includes:
  • the detecting unit 201 is configured to detect that the integrity protection check of the first data bearer fails
  • the report control unit 202 is configured to send first indication information to the network device, where the first indication information is used to indicate that the integrity protection check failure is detected, and start the first timer; if the first timer expires before And receiving the second indication information sent by the network device, stopping the first timer; if the second indication information sent by the network device is not received before the first timer expires, Resending the first indication information to the network device, and restarting the first timer.
  • the device further includes:
  • the first receiving unit 203 is configured to receive first configuration information that is sent by the network device, where the first configuration information is used to configure a corresponding timer for the at least one data bearer, where the at least one data bearer includes the first Data bearer, the first data bearer corresponding to the first timer.
  • the at least one data bearer further includes a second data bearer, where the second data bearer corresponds to a second timer;
  • the second timer is different from the first timer
  • the reporting control unit 202 is further configured to: if the detecting unit detects that the integrity protection check of the second data bearer fails during the running of the first timer, send a third indication to the network device The third indication information is used to indicate that the integrity protection check failure is detected, and the second timer is started.
  • the device further includes:
  • the second receiving unit 204 is configured to receive second configuration information that is sent by the network device, where the second configuration information is used to configure a corresponding first timer for the terminal, where all data bearers under the terminal Each of the data bearers in the terminal includes the first data bearer.
  • the reporting control unit 202 is further configured to: after sending the first indication information to the network device, if the terminal switches from the first cell to the second cell within the first time period, And transmitting, by the second cell, the first indication information.
  • the second indication information includes at least reconfiguration information or key update information.
  • each unit in the apparatus for controlling the failure of the security check failure shown in Fig. 2 can be understood by referring to the foregoing description of the method of controlling the failure of the security check.
  • the function of each unit in the apparatus for controlling the failure of the security check failure shown in FIG. 2 can be realized by a program running on the processor, or can be realized by a specific logic circuit.
  • the device for controlling the failure to report the security check may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a separate product.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions.
  • a computer device (which may be a personal computer, server, or network device, etc.) is caused to perform all or part of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes various media that can store program codes, such as a USB flash drive, a mobile hard disk, a read only memory (ROM), a magnetic disk, or an optical disk.
  • program codes such as a USB flash drive, a mobile hard disk, a read only memory (ROM), a magnetic disk, or an optical disk.
  • the embodiment of the present invention further provides a computer storage medium, wherein the computer executable instructions are stored, and when the computer executable instructions are executed by the processor, the method for controlling the reported security check failure of the embodiment of the present invention is implemented.
  • FIG. 3 is a schematic structural diagram of a computer device according to an embodiment of the present invention, and the computer device may be any type of terminal.
  • computer device 100 may include one or more (only one shown) processor 1002 (processor 1002 may include, but is not limited to, a Micro Controller Unit (MCU) or a programmable logic device.
  • a processing device such as an FPGA (Field Programmable Gate Array), a memory 1004 for storing data, and a transmission device 1006 for a communication function.
  • FPGA Field Programmable Gate Array
  • FIG. 3 is merely illustrative and does not limit the structure of the above electronic device.
  • computer device 100 may also include more or fewer components than those shown in FIG. 3, or have a different configuration than that shown in FIG.
  • the memory 1004 can be used to store software programs and modules of application software, such as program instructions/modules corresponding to the method in the embodiment of the present invention, and the processor 1002 executes various functional applications by running software programs and modules stored in the memory 1004. And data processing, that is, to achieve the above method.
  • Memory 1004 can include high speed random access memory, and can also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory.
  • memory 1004 can further include memory remotely located relative to processor 1002, which can be connected to computer device 100 over a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • Transmission device 1006 is for receiving or transmitting data via a network.
  • the network specific examples described above may include a wireless network provided by a communication provider of computer device 100.
  • the transmission device 1006 includes a Network Interface Controller (NIC) that can be connected to other network devices through a base station to communicate with the Internet.
  • the transmission device 1006 can be a radio frequency (RF) module for communicating with the Internet wirelessly.
  • NIC Network Interface Controller
  • RF radio frequency
  • the disclosed method and smart device may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored or not executed.
  • the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
  • the units described above as separate components may or may not be physically separated, and the components displayed as the unit may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one second processing unit, or each unit may be separately used as one unit, or two or more units may be integrated into one unit;
  • the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种控制上报安全校验失败的方法及装置、计算机存储介质,所述方法包括:终端检测到第一数据承载的完整性保护检验失败时,向网络设备发送第一指示信息,所述第一指示信息用于指示检测到完整性保护校验失败,并启动第一定时器;如果所述第一定时器超时前,所述终端接收到所述网络设备发送的第二指示信息,则停止所述第一定时器;如果所述第一定时器超时前,所述终端未接收到所述网络设备发送的所述第二指示信息,则重新向所述网络设备发送所述第一指示信息,并重新启动所述第一定时器。

Description

控制上报安全校验失败的方法及装置、计算机存储介质 技术领域
本发明涉及无线通信技术领域,尤其涉及一种控制上报安全校验失败的方法及装置、计算机存储介质。
背景技术
为了满足人们对业务的速率、延迟、高速移动性、能效的追求,以及未来生活中业务的多样性、复杂性,第三代合作伙伴计划(3GPP,3rd Generation Partnership Project)国际标准组织开始研发第五代(5G,5 th Generation)移动通信技术。
5G移动通信技术的主要应用场景为:增强型移动宽带(eMBB,Enhance Mobile Broadband)、低时延高可靠通信(URLLC,Ultra Reliable Low Latency Communication)、大规模机器类通信(mMTC,massive Machine Type Communication)。
5G移动通信技术也称为新一代无线通信技术(NR,New Radio),在NR早期部署时,完整的NR覆盖很难达到,所以典型的网络覆盖是长期演进(LTE,Long Term Evolution)覆盖和NR覆盖的结合。此外,为了保护移动运营商前期在LTE上的投资,提出了LTE和NR之间的紧耦合(tight interworking)工作模式。
在LTE中,对于数据承载(DRB,Data Resource Bearer)没有完整性保护的需求,但是,在NR中增加了对于DRB进行完整性保护的需求,为此每个分组数据汇聚协议(PDCP,Packet Data Convergence Protocol)服务数据单元(SDU,Service Data Unit)都要额外携带一个用于完整性保护校验的完整性保护校验码(MAC-I)。
数据接收端需要对每个数据包进行完整性保护校验,如果完整性保护校验失败,则很大可能是数据收到攻击,被恶意撰改。对于被恶意撰改的数据应该被丢弃。对于这种情况发生,网络侧应该采取适当的措施,避免安全隐患存在,保证通信安全。进一步,当检测到下行数据的完整性保护校验失败,用户设备(UE,User Equipment)应该通知网络侧关于某个承载检测到数据的完整性保护校验失败,但是考虑到关于上报数据的完整性保护校验失败的信令负荷过大,需要采用措施来控制该上报。
发明内容
为解决上述技术问题,本发明实施例提供了一种控制上报安全校验失败的方法及装置、计算机存储介质。
本发明实施例提供的控制上报安全校验失败的方法,包括:
终端检测到第一数据承载的完整性保护检验失败时,向网络设备发送第一指示信息,所述第一指示信息用于指示检测到完整性保护校验失败,并启动第一定时器;
如果所述第一定时器超时前,所述终端接收到所述网络设备发送的第二指示信息,则停止所述第一定时器;如果所述第一定时器超时前,所述终端未接收到所述网络设备发送的所述第二指示信息,则重新向所述网络设备发送所述第一指示信息,并重新启动所述第一定时器。
本发明实施例中,所述方法还包括:
所述终端接收所述网络设备发送的第一配置信息,所述第一配置信息用于为至少一个数据承载配置对应的定时器,所述至少一个数据承载包括所述第一数据承载,所述第一数据承载对应所述第一定时器。
本发明实施例中,所述至少一个数据承载还包括第二数据承载,所述第二数据承载对应第二定时器;其中,
所述第二定时器与所述第一定时器不同;
如果在所述第一定时器运行期间,所述终端检测到所述第二数据承载的完整性保护检验失败,则向所述网络设备发送第三指示信息,所述第三指示信息用于指示检测到完整性保护校验失败,并启动所述第二定时器。
本发明实施例中,所述方法还包括:
所述终端接收所述网络设备发送的第二配置信息,所述第二配置信息用于为所述终端配置对应的第一定时器,其中,所述终端下的全部数据承载均对应所述第一定时器,所述终端下的全部数据承载包括所述第一数据承载。
本发明实施例中,所述方法还包括:
所述终端向所述网络设备发送所述第一指示信息后,如果在第一时长内所述终端从第一小区切换到第二小区,则所述终端在所述第二小区重新发送所述第一指示信息。
本发明实施例中,所述第二指示信息至少包括重配置信息、或密钥更新信息。
本发明实施例提供的控制上报安全校验失败的装置,包括:
检测单元,用于检测到第一数据承载的完整性保护检验失败;
上报控制单元,用于向网络设备发送第一指示信息,所述第一指示信息用于指示检测到完整性保护校验失败,并启动第一定时器;如果所述第一定时器超时前,接收到所述网络设备发送的第二指示信息,则停止所述第一定时器;如果所述第一定时器超时前,未接收到所述网络设备发送的所述第二指示信息,则重新向所述网络设备发送所述第一指示信息,并重新启动所述第一定时器。
本发明实施例中,所述装置还包括:
第一接收单元,用于接收所述网络设备发送的第一配置信息,所述第一配置信息用于为至少一个数据承载配置对应的定时器,所述至少一个数 据承载包括所述第一数据承载,所述第一数据承载对应所述第一定时器。
本发明实施例中,所述至少一个数据承载还包括第二数据承载,所述第二数据承载对应第二定时器;其中,
所述第二定时器与所述第一定时器不同;
所述上报控制单元,还用于如果在所述第一定时器运行期间,所述检测单元检测到所述第二数据承载的完整性保护检验失败,则向所述网络设备发送第三指示信息,所述第三指示信息用于指示检测到完整性保护校验失败,并启动所述第二定时器。
本发明实施例中,所述装置还包括:
第二接收单元,用于接收所述网络设备发送的第二配置信息,所述第二配置信息用于为所述终端配置对应的第一定时器,其中,所述终端下的全部数据承载均对应所述第一定时器,所述终端下的全部数据承载包括所述第一数据承载。
本发明实施例中,所述上报控制单元,还用于向所述网络设备发送所述第一指示信息后,如果在第一时长内所述终端从第一小区切换到第二小区,则在所述第二小区重新发送所述第一指示信息。
本发明实施例中,所述第二指示信息至少包括重配置信息、或密钥更新信息。
本发明实施例提供的计算机存储介质,其上存储有计算机可执行指令,该计算机可执行指令被处理器执行时实现上述的控制上报安全校验失败的方法。
本发明实施例的技术方案中,终端检测到第一数据承载的完整性保护检验失败时,向网络设备发送第一指示信息,所述第一指示信息用于指示检测到完整性保护校验失败,并启动第一定时器;如果所述第一定时器超时前,所述终端接收到所述网络设备发送的第二指示信息,则停 止所述第一定时器;如果所述第一定时器超时前,所述终端未接收到所述网络设备发送的所述第二指示信息,则重新向所述网络设备发送所述第一指示信息,并重新启动所述第一定时器。采用本发明实施例的技术方案,通过定时器控制关于检测完整性保护校验失败的指示上报,有效地控制了信令负荷。
附图说明
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1为本发明实施例的控制上报安全校验失败的方法的流程示意图;
图2为本发明实施例的控制上报安全校验失败的装置的结构组成示意图;
图3为本发明实施例的计算机设备的结构组成示意图。
具体实施方式
为了能够更加详尽地了解本发明实施例的特点与技术内容,下面结合附图对本发明实施例的实现进行详细阐述,所附附图仅供参考说明之用,并非用来限定本发明实施例。
本发明实施例的技术方案主要应用于5G移动通信系统,当然,本发明实施例的技术方案并不局限于5G移动通信系统,还可以应用于其他类型的移动通信系统。以下对5G移动通信系统中的主要应用场景进行说明:
1)eMBB场景:eMBB以用户获得多媒体内容、服务和数据为目标,其业务需求增长十分迅速。由于eMBB可能部署在不同的场景中,例如室内、市区、农村等,其业务能力和需求的差别也比较大,所以必须结合具体的部署场景对业务进行分析。
2)URLLC场景:URLLC的典型应用包括:工业自动化、电力自动化、远程医疗操作、交通安全保障等。
3)mMTC场景:URLLC的典型特点包括:高连接密度、小数据量、时延不敏感业务、模块的低成本和长使用寿命等。
图1为本发明实施例的控制上报安全校验失败的方法的流程示意图,如图1所示,所述控制上报安全校验失败的方法包括以下步骤:
步骤101:终端检测到第一数据承载的完整性保护检验失败时,向网络设备发送第一指示信息,所述第一指示信息用于指示检测到完整性保护校验失败,并启动第一定时器。
本发明实施例中,所述终端为手机、平板电脑、笔记本电脑、台式机等任意能够与网络设备进行通信的设备。
本发明实施例中,所述网络设备可以是基站,例如5G中的gNB。
本发明实施例中,每个数据承载是否执行针对该数据承载上的数据的完整性保护校验的过程,可以通过网络侧进行配置。
本发明实施例中,网络侧可以针对每个数据承载配置一个独立的定时器,从而实现每个数据承载的独立控制;或者,针对终端配置一个定时器,从而实现所有的数据承载一起控制,应理解,这里的控制是指控制上报安全校验失败。
步骤102:如果所述第一定时器超时前,所述终端接收到所述网络设备发送的第二指示信息,则停止所述第一定时器;如果所述第一定时器超时前,所述终端未接收到所述网络设备发送的所述第二指示信息,则重新向所述网络设备发送所述第一指示信息,并重新启动所述第一定时器。
本发明实施例中,所述第二指示信息至少包括重配置信息、或密钥更新信息。
以下结合两种不同类型的定时器(每个数据承载配置一个独立的定时 器、针对终端配置一个定时器),对本发明实施例的技术方案分别进行描述:
1)每个数据承载配置一个独立的定时器
在一实施方式中,所述终端接收所述网络设备发送的第一配置信息,所述第一配置信息用于为至少一个数据承载配置对应的定时器,所述至少一个数据承载包括所述第一数据承载,所述第一数据承载对应所述第一定时器。
例如:所述至少一个数据承载还包括第二数据承载,所述第二数据承载对应第二定时器;其中,所述第二定时器与所述第一定时器不同;这时,如果在所述第一定时器运行期间,所述终端检测到所述第二数据承载的完整性保护检验失败,则向所述网络设备发送第三指示信息,所述第三指示信息用于指示检测到完整性保护校验失败,并启动所述第二定时器。
上述例子中,以两个数据承载为例进行解释说明,应理解,所述第一配置信息还可以为第三数据承载、第四数据承载等等任意数量的数据承载配置对应的定时器,例如DRB1对应定时器T1,DRB2对应定时器T2,DRB3对应定时器T3等等。
对于每个数据承载,均通过自己的定时器独立来控制上报安全校验失败的指示信息(也即第一指示信息),具体地,当某个数据承载检测到完整性保护检验失败,则终端向网络侧上报一个指示性信息,用于指示检测到完整性保护校验失败。同时启动该数据承载的定时器。如果定时器超时前收到网络侧的重配置或者密钥更新等指示信息,则停止定时器。如果定时器超时前,没有收到任何网络侧的重配置或者密钥更新信息,则重新给网络侧上报关于检测完整性保护校验失败的指示信息,并重新启动定时器。
2)针对终端配置一个定时器
在一实施方式中,所述终端接收所述网络设备发送的第二配置信息, 所述第二配置信息用于为所述终端配置对应的第一定时器,其中,所述终端下的全部数据承载均对应所述第一定时器,所述终端下的全部数据承载包括所述第一数据承载。
对于全部的数据承载,均通过一个定时器(也即终端的定时器)来控制上报安全校验失败的指示信息(也即第一指示信息),具体地,当某个数据承载检测到完整性保护检验失败,则终端向网络侧上报一个指示性信息,用于指示检测到完整性保护校验失败。同时启动该数据承载的定时器。如果定时器超时前收到网络侧的重配置或者密钥更新等指示信息,则停止定时器。如果定时器超时前,没有收到任何网络侧的重配置或者密钥更新信息,则重新给网络侧上报关于检测完整性保护校验失败的指示信息,并重新启动定时器。
此外,所述终端向所述网络设备发送所述第一指示信息后,如果在第一时长内所述终端从第一小区切换到第二小区,则所述终端在所述第二小区重新发送所述第一指示信息。这里,所述第一时长可以是网络侧配置的,或者协议规定的,或者根据所述终端的自身实现来获取到的。
例如:所述终端在小区1向相应的网络设备1发送了第一指示信息,当终端在T1时长内由小区1切换到了小区2,则所述终端需要在小区2向相应的网络设备2重新发送所述第一指示信息。
图2为本发明实施例的控制上报安全校验失败的装置的结构组成示意图,如图2所示,所述装置包括:
检测单元201,用于检测到第一数据承载的完整性保护检验失败;
上报控制单元202,用于向网络设备发送第一指示信息,所述第一指示信息用于指示检测到完整性保护校验失败,并启动第一定时器;如果所述第一定时器超时前,接收到所述网络设备发送的第二指示信息,则停止所述第一定时器;如果所述第一定时器超时前,未接收到所述网络设备发送 的所述第二指示信息,则重新向所述网络设备发送所述第一指示信息,并重新启动所述第一定时器。
在一实施方式中,所述装置还包括:
第一接收单元203,用于接收所述网络设备发送的第一配置信息,所述第一配置信息用于为至少一个数据承载配置对应的定时器,所述至少一个数据承载包括所述第一数据承载,所述第一数据承载对应所述第一定时器。
在一实施方式中,所述至少一个数据承载还包括第二数据承载,所述第二数据承载对应第二定时器;其中,
所述第二定时器与所述第一定时器不同;
所述上报控制单元202,还用于如果在所述第一定时器运行期间,所述检测单元检测到所述第二数据承载的完整性保护检验失败,则向所述网络设备发送第三指示信息,所述第三指示信息用于指示检测到完整性保护校验失败,并启动所述第二定时器。
在一实施方式中,所述装置还包括:
第二接收单元204,用于接收所述网络设备发送的第二配置信息,所述第二配置信息用于为所述终端配置对应的第一定时器,其中,所述终端下的全部数据承载均对应所述第一定时器,所述终端下的全部数据承载包括所述第一数据承载。
在一实施方式中,所述上报控制单元202,还用于向所述网络设备发送所述第一指示信息后,如果在第一时长内所述终端从第一小区切换到第二小区,则在所述第二小区重新发送所述第一指示信息。
在一实施方式中,所述第二指示信息至少包括重配置信息、或密钥更新信息。
本领域技术人员应当理解,图2所示的控制上报安全校验失败的装置中的各单元的实现功能可参照前述控制上报安全校验失败的方法的相关描 述而理解。图2所示的控制上报安全校验失败的装置中的各单元的功能可通过运行于处理器上的程序而实现,也可通过具体的逻辑电路而实现。
本发明实施例上述控制上报安全校验失败的装置如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本发明各个实施例所述方法的全部或部分。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read Only Memory)、磁碟或者光盘等各种可以存储程序代码的介质。这样,本发明实施例不限制于任何特定的硬件和软件结合。
相应地,本发明实施例还提供一种计算机存储介质,其中存储有计算机可执行指令,该计算机可执行指令被处理器执行时实现本发明实施例的上述控制上报安全校验失败的方法。
图3为本发明实施例的计算机设备的结构组成示意图,该计算机设备可以是任意类型的终端。如图3所示,计算机设备100可以包括一个或多个(图中仅示出一个)处理器1002(处理器1002可以包括但不限于微处理器(MCU,Micro Controller Unit)或可编程逻辑器件(FPGA,Field Programmable Gate Array)等的处理装置)、用于存储数据的存储器1004、以及用于通信功能的传输装置1006。本领域普通技术人员可以理解,图3所示的结构仅为示意,其并不对上述电子装置的结构造成限定。例如,计算机设备100还可包括比图3中所示更多或者更少的组件,或者具有与图3所示不同的配置。
存储器1004可用于存储应用软件的软件程序以及模块,如本发明实施例中的方法对应的程序指令/模块,处理器1002通过运行存储在存储器1004 内的软件程序以及模块,从而执行各种功能应用以及数据处理,即实现上述的方法。存储器1004可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器1004可进一步包括相对于处理器1002远程设置的存储器,这些远程存储器可以通过网络连接至计算机设备100。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
传输装置1006用于经由一个网络接收或者发送数据。上述的网络具体实例可包括计算机设备100的通信供应商提供的无线网络。在一个实例中,传输装置1006包括一个网络适配器(NIC,Network Interface Controller),其可通过基站与其他网络设备相连从而可与互联网进行通讯。在一个实例中,传输装置1006可以为射频(RF,Radio Frequency)模块,其用于通过无线方式与互联网进行通讯。
本发明实施例所记载的技术方案之间,在不冲突的情况下,可以任意组合。
在本发明所提供的几个实施例中,应该理解到,所揭露的方法和智能设备,可以通过其它的方式实现。以上所描述的设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其它形式的。
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的,作为单元显示的部件可以是、或也可以不是物理单元,即可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。
另外,在本发明各实施例中的各功能单元可以全部集成在一个第二处理单元中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。

Claims (13)

  1. 一种控制上报安全校验失败的方法,所述方法包括:
    终端检测到第一数据承载的完整性保护检验失败时,向网络设备发送第一指示信息,所述第一指示信息用于指示检测到完整性保护校验失败,并启动第一定时器;
    如果所述第一定时器超时前,所述终端接收到所述网络设备发送的第二指示信息,则停止所述第一定时器;如果所述第一定时器超时前,所述终端未接收到所述网络设备发送的所述第二指示信息,则重新向所述网络设备发送所述第一指示信息,并重新启动所述第一定时器。
  2. 根据权利要求1所述的方法,其中,所述方法还包括:
    所述终端接收所述网络设备发送的第一配置信息,所述第一配置信息用于为至少一个数据承载配置对应的定时器,所述至少一个数据承载包括所述第一数据承载,所述第一数据承载对应所述第一定时器。
  3. 根据权利要求2所述的方法,其中,所述至少一个数据承载还包括第二数据承载,所述第二数据承载对应第二定时器;其中,
    所述第二定时器与所述第一定时器不同;
    如果在所述第一定时器运行期间,所述终端检测到所述第二数据承载的完整性保护检验失败,则向所述网络设备发送第三指示信息,所述第三指示信息用于指示检测到完整性保护校验失败,并启动所述第二定时器。
  4. 根据权利要求1所述的方法,其中,所述方法还包括:
    所述终端接收所述网络设备发送的第二配置信息,所述第二配置信息用于为所述终端配置对应的第一定时器,其中,所述终端下的全部数据承载均对应所述第一定时器,所述终端下的全部数据承载包括所述第一数据承载。
  5. 根据权利要求1至4任一项所述的方法,其中,所述方法还包括:
    所述终端向所述网络设备发送所述第一指示信息后,如果在第一时长内所述终端从第一小区切换到第二小区,则所述终端在所述第二小区重新发送所述第一指示信息。
  6. 根据权利要求1至5任一项所述的方法,其中,所述第二指示信息至少包括重配置信息、或密钥更新信息。
  7. 一种控制上报安全校验失败的装置,所述装置包括:
    检测单元,用于检测到第一数据承载的完整性保护检验失败;
    上报控制单元,用于向网络设备发送第一指示信息,所述第一指示信息用于指示检测到完整性保护校验失败,并启动第一定时器;如果所述第一定时器超时前,接收到所述网络设备发送的第二指示信息,则停止所述第一定时器;如果所述第一定时器超时前,未接收到所述网络设备发送的所述第二指示信息,则重新向所述网络设备发送所述第一指示信息,并重新启动所述第一定时器。
  8. 根据权利要求7所述的装置,其中,所述装置还包括:
    第一接收单元,用于接收所述网络设备发送的第一配置信息,所述第一配置信息用于为至少一个数据承载配置对应的定时器,所述至少一个数据承载包括所述第一数据承载,所述第一数据承载对应所述第一定时器。
  9. 根据权利要求8所述的装置,其中,所述至少一个数据承载还包括第二数据承载,所述第二数据承载对应第二定时器;其中,
    所述第二定时器与所述第一定时器不同;
    所述上报控制单元,还用于如果在所述第一定时器运行期间,所述检测单元检测到所述第二数据承载的完整性保护检验失败,则向所述网络设备发送第三指示信息,所述第三指示信息用于指示检测到完整性保 护校验失败,并启动所述第二定时器。
  10. 根据权利要求7所述的装置,其中,所述装置还包括:
    第二接收单元,用于接收所述网络设备发送的第二配置信息,所述第二配置信息用于为所述终端配置对应的第一定时器,其中,所述终端下的全部数据承载均对应所述第一定时器,所述终端下的全部数据承载包括所述第一数据承载。
  11. 根据权利要求7至10任一项所述的装置,其中,所述上报控制单元,还用于向所述网络设备发送所述第一指示信息后,如果在第一时长内所述终端从第一小区切换到第二小区,则在所述第二小区重新发送所述第一指示信息。
  12. 根据权利要求7至11任一项所述的装置,其中,所述第二指示信息至少包括重配置信息、或密钥更新信息。
  13. 一种计算机存储介质,其上存储有计算机可执行指令,该计算机可执行指令被处理器执行时实现权利要求1至6任一项所述的方法步骤。
PCT/CN2018/077063 2018-02-23 2018-02-23 控制上报安全校验失败的方法及装置、计算机存储介质 WO2019161548A1 (zh)

Priority Applications (7)

Application Number Priority Date Filing Date Title
KR1020207027362A KR102382344B1 (ko) 2018-02-23 2018-02-23 시큐리티 체크 실패 보고의 제어 방법, 장치 및 컴퓨터 기억 매체
AU2018409918A AU2018409918A1 (en) 2018-02-23 2018-02-23 Method and device for controlling reporting of security check failure and computer storage medium
CN201880088999.6A CN111699708A (zh) 2018-02-23 2018-02-23 控制上报安全校验失败的方法及装置、计算机存储介质
EP18907430.5A EP3751879A4 (en) 2018-02-23 2018-02-23 SECURITY CHECK FAILURE REPORT CONTROL PROCESS AND DEVICE AND COMPUTER INFORMATION SUPPORT
JP2020544444A JP2021518069A (ja) 2018-02-23 2018-02-23 セキュリティチェック失敗報告の制御方法、装置及びコンピュータ記憶媒体
PCT/CN2018/077063 WO2019161548A1 (zh) 2018-02-23 2018-02-23 控制上报安全校验失败的方法及装置、计算机存储介质
US16/994,307 US20200382960A1 (en) 2018-02-23 2020-08-14 Method and device for controlling reporting of security check failure and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/077063 WO2019161548A1 (zh) 2018-02-23 2018-02-23 控制上报安全校验失败的方法及装置、计算机存储介质

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/994,307 Continuation US20200382960A1 (en) 2018-02-23 2020-08-14 Method and device for controlling reporting of security check failure and computer storage medium

Publications (1)

Publication Number Publication Date
WO2019161548A1 true WO2019161548A1 (zh) 2019-08-29

Family

ID=67686659

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/077063 WO2019161548A1 (zh) 2018-02-23 2018-02-23 控制上报安全校验失败的方法及装置、计算机存储介质

Country Status (7)

Country Link
US (1) US20200382960A1 (zh)
EP (1) EP3751879A4 (zh)
JP (1) JP2021518069A (zh)
KR (1) KR102382344B1 (zh)
CN (1) CN111699708A (zh)
AU (1) AU2018409918A1 (zh)
WO (1) WO2019161548A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022082640A1 (en) * 2020-10-22 2022-04-28 Nokia Shanghai Bell Co., Ltd. Failure cancellation recording

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102204217A (zh) * 2011-05-30 2011-09-28 华为技术有限公司 通知网络能力的方法、装置和系统
WO2012060565A2 (en) * 2010-11-04 2012-05-10 Lg Electronics Inc. Method and apparatus for reconfiguring connection to base station at relay node in a wireless communication system
CN104936170A (zh) * 2014-03-21 2015-09-23 华为技术有限公司 检测中间人攻击的方法与装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012060565A2 (en) * 2010-11-04 2012-05-10 Lg Electronics Inc. Method and apparatus for reconfiguring connection to base station at relay node in a wireless communication system
CN102204217A (zh) * 2011-05-30 2011-09-28 华为技术有限公司 通知网络能力的方法、装置和系统
CN104936170A (zh) * 2014-03-21 2015-09-23 华为技术有限公司 检测中间人攻击的方法与装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3751879A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022082640A1 (en) * 2020-10-22 2022-04-28 Nokia Shanghai Bell Co., Ltd. Failure cancellation recording

Also Published As

Publication number Publication date
KR102382344B1 (ko) 2022-04-04
CN111699708A (zh) 2020-09-22
US20200382960A1 (en) 2020-12-03
AU2018409918A1 (en) 2020-10-01
EP3751879A4 (en) 2021-02-17
KR20200125963A (ko) 2020-11-05
EP3751879A1 (en) 2020-12-16
JP2021518069A (ja) 2021-07-29

Similar Documents

Publication Publication Date Title
CN110999523A (zh) 重新连接与无线接入网节点的无线资源控制连接的方法和用户设备
EP3840522B1 (en) Methods and devices for controlling rrc state
EP3742815B1 (en) Recovering an rrc connection
JP2021514126A (ja) フル構成で接続を再開するための方法、ネットワークノード、無線デバイス、およびコンピュータプログラム製品
TWI771513B (zh) 一種rrc連接重建立方法及裝置、儲存媒體
WO2019161548A1 (zh) 控制上报安全校验失败的方法及装置、计算机存储介质
WO2019223774A1 (zh) 一种提高寻呼可靠性的方法及装置、计算机存储介质
US11882450B2 (en) Method and device for determining security algorithm, and computer storage medium
EP4319250A1 (en) Communication method and apparatus
CN109644338B (zh) 一种获取密钥的方法及装置、计算机存储介质
WO2019140619A1 (zh) 一种信息指示方法及装置、计算机存储介质
CN113748715B (zh) 分解式基站架构中的小区组配置
AU2021269615B2 (en) Integrity Protection Failure Handling Method and Apparatus, and User Equipment
US20220279415A1 (en) Controlling mobility between base stations of different types
CN111641981B (zh) 一种终端上下文的获取方法及装置、计算机存储介质
WO2019153174A1 (zh) 一种参数配置方法及装置、计算机存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18907430

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020544444

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2018907430

Country of ref document: EP

Effective date: 20200910

ENP Entry into the national phase

Ref document number: 20207027362

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2018409918

Country of ref document: AU

Date of ref document: 20180223

Kind code of ref document: A