WO2019242680A1 - 通信方法和装置 - Google Patents

通信方法和装置 Download PDF

Info

Publication number
WO2019242680A1
WO2019242680A1 PCT/CN2019/092055 CN2019092055W WO2019242680A1 WO 2019242680 A1 WO2019242680 A1 WO 2019242680A1 CN 2019092055 W CN2019092055 W CN 2019092055W WO 2019242680 A1 WO2019242680 A1 WO 2019242680A1
Authority
WO
WIPO (PCT)
Prior art keywords
data packet
message
drb
response
data
Prior art date
Application number
PCT/CN2019/092055
Other languages
English (en)
French (fr)
Inventor
张宏平
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2019242680A1 publication Critical patent/WO2019242680A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/04Error control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/19Connection re-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC

Definitions

  • the present application relates to the field of communication, and more particularly, to a communication method and device.
  • the network device can be configured to protect the integrity of the data transmitted by the air interface.
  • the sender performs integrity protection on the data packet to be sent, generates a MAC-I according to the calculation parameters of the integrity message authentication code-integrity (MAC-I), and sends it to the receiver together in the header of the data packet .
  • MAC-I integrity message authentication code-integrity
  • the method is: Use the same method as the sender to calculate the MAC-I of a received data packet, and calculate the MAC-I of the received data packet header. MAC-I is compared. If they are the same, the check is passed, otherwise the check fails.
  • the main reasons for the failure of the integrity protection check are: attack by the attacker, such as tampering with the content of the data packet, or the message received by the receiver is an insert message sent by the attacker (the integrity protection key KEY is inconsistent) Or; CRC check failed, that is, there was an error in the air interface reception, but the CRC check did not identify an error, and the data packet with the air interface reception error was passed to the PDCP layer; step.
  • the receiver In order to ensure normal business communication between the terminal device and the network device, the receiver will adopt different processing methods for different reasons for the failure of the integrity protection check. Therefore, how to determine the cause of packet integrity check failure is an urgent problem.
  • This application provides a communication method that can determine the cause of a data packet integrity check failure, so that the receiving end can perform subsequent processing based on the reason for the failure of the data packet integrity check, and ensure normal business between the sending end and the receiving end. get on.
  • a communication method including: a receiving end determines that a integrity check of a first data packet on a data radio bearer DRB fails; the receiving end sends a first message to a sending end, where the first message is used for Indicates that an integrity check failure has occurred;
  • the receiving device when it is determined that the integrity check of the first data packet on the DRB fails, the receiving device sends a first message indicating that an integrity check failure has occurred to the sending device. After a message, a response to the first message is sent to the receiving device, and the response is integrity protected. Determining, by the receiving device, a reason for the failure of the first data packet integrity check on the DRB according to whether the response to the first message is successfully received from the sending device on the DRB within a preset time, The receiver can perform subsequent processing according to the reason that the integrity check of the data packet fails, which ensures that the service between the sender and the receiver can proceed normally.
  • the first message is used to indicate that an integrity check failure has occurred, and at the same time, the first message also implicitly requests the sending device to send a response to the receiving device to the first message. Or the first message is used to request the sending device to send a response to the first message to the receiving device, that is, it implicitly indicates that an integrity check failure has occurred.
  • the success of receiving the response to the first message from the sending device means that the receiving device receives an integrity-protected response and performs an integrity check successfully. Failure of the integrity check of the response or the integrity-protected response indicates that the response to the first message was not successfully received from the sending device.
  • the first message is a packet data aggregation protocol PDCP control protocol data unit PDU associated with the DRB; or the first message is a radio resource control RRC message
  • the RRC message is used to indicate that an integrity check failure has occurred.
  • the RRC message carries DRB information that the integrity check of the first data packet fails.
  • the RRC message carries DRB information that the integrity check of the first data packet fails, and the sending device only needs to reply the response to the first message on the designated DRB, and does not need to send the response to the terminal device. Replying to the response to the first message on all DRBs can reduce signaling overhead.
  • the first message includes a counter COUNT value of the first data packet or a PDCP sequence number SN of the first data packet.
  • the first message carries the count COUNT value of the first data packet or the PDCP sequence number SN of the first data packet, so that the sending device sends the COUNT value of the response to the first message or
  • the PDCP SN sequence number is greater than the COUNT value of the first data packet or the PDCP SN sequence number.
  • the response is a second data packet generated by the sending end, and the second data packet has the same format as the PDCP data PDU of the DRB, the The second data packet includes first indication information, and the first indication information is used to indicate that the second data packet is the response; or the response is an RRC message, and the RRC message is carried on the DRB and is The RRC message has the same format as the PDCP data PDU of the DRB, the RRC message includes second indication information, and the second indication information is used to indicate that the RRC message is the response; or the response is carried in the Describe the service data packets on the DRB.
  • the second data packet includes a COUNT value or a PDCP SN
  • the second data packet includes a COUNT value or a PDCP SN greater than that of the first data packet COUNT value or PDCP SN of the first data packet.
  • the failure of the first data packet integrity check on the DRB includes: failure of any one of the first data packet integrity checks on the data radio bearer; Or the integrity check of N consecutive first data packets on the data radio bearer fails; or the integrity check of M first data packets on the data radio bearer fails within the first time period; where N> 1 , M> 1.
  • sending the first message can reduce the number of times the first message is sent and reduce signaling overhead.
  • N and M may be configured by a network device, may be predetermined by a receiving device and a transmitting device, or may be prescribed by an agreement.
  • the receiving end determines, based on whether or not a response to the first message is successfully received from the transmitting end within a preset time, all the addresses on the DRB.
  • the reason for the failure of the integrity check of the first data packet includes: when the receiving end successfully receives a response to the first message from the sending end within a preset time, the receiving end determines that the DRB The reason for the failure of the integrity check of the first data packet is not that the security parameters are out of sync; or when the receiving end fails to receive a response to the first message from the sending end within a preset time, the receiving end It is determined that the cause of the failure of the integrity check of the first data packet on the DRB is that the security parameters are out of sync.
  • the receiving end after the receiving end sends a first message to the transmitting end when determining that the integrity check of the first data packet on the data radio bearer DRB fails, the receiving end The method further includes: when the receiving end determines that the integrity check of the third data packet on the data radio bearer fails within the preset time, not sending the first message to the sending end.
  • the receiving end determines that the integrity check of the first data packet on the data radio bearer DRB fails, after sending the first message to the sending end, the receiving end determines When the integrity check of the third data packet on the data radio bearer fails, not sending the first message to the sending end can reduce signaling overhead.
  • the method further includes: when the sending the first message to the sending end, the receiving end starts a timer, and the timer is used for all For the timing of the preset time period, during the running of the timer, the receiving end stops the timer when receiving the response; or during the running of the timer, the receiving end does not receive In the response, it is determined that the cause of the failure of the integrity check of the first data packet on the DRB is that the security parameters are out of sync.
  • the method when it is determined that a failure of the integrity check of the first data packet on the DRB is out of synchronization of security parameters, the method further includes: when the When the receiving end is a terminal device, the receiving end initiates RRC re-establishment or the receiving end sends to the sending end the failure of the integrity check of the first data packet on the DRB; or when the receiving end is connected to When the device is connected to the network, the receiving end triggers the sending end to perform RRC re-establishment or the receiving end reconfigures the DRB.
  • a communication method including: a sending end receives a first message from a receiving end, the first message is used to indicate that an integrity check failure has occurred; and the sending end sends a message to the first message according to the first message. The receiving end sends a response to the first message, wherein the response is integrity protected.
  • the first message is a packet data aggregation protocol PDCP control protocol data unit PDU associated with the data radio bearer DRB, and the first packet integrity on the DRB is The check fails; or the first message is a radio resource control RRC message, and the RRC message is used to indicate that an integrity check failure has occurred.
  • the first message includes a COUNT value of the first data packet or a PDCP sequence number SN of the first data packet.
  • the response is a second data packet generated by the sending end, and the second data packet has the same format as the PDCP data PDU of the DRB, the The second data packet includes first indication information, and the first indication information is used to indicate that the second data packet is the response; or the response is an RRC message, and the RRC message is carried on the DRB and is The RRC message has the same format as the PDCP data PDU of the DRB, the RRC message includes second indication information, and the second indication information is used to indicate that the RRC message is the response; or the response is carried in the The service data packet on the DRB is described; wherein the integrity check of the first data packet on the DRB fails.
  • the second data packet includes a COUNT value or a PDCP SN
  • the second data packet includes a COUNT value or a PDCP SN greater than that of the first data packet COUNT value or PDCP SN of the first data packet.
  • a communication device including: a determining module, configured to determine that a integrity check of a first data packet on a data radio bearer DRB fails;
  • a sending module configured to send a first message to the sending end, where the first message is used to indicate that an integrity check failure has occurred;
  • the determining module is further configured to determine whether to successfully receive a response to the first message from the sending end on the DRB within a preset time, and determine whether the first data packet integrity check on the DRB fails. The reason, wherein the response is integrity protected.
  • the first message is a packet data aggregation protocol PDCP control protocol data unit PDU associated with the DRB; or the first message is a radio resource control RRC message
  • the RRC message is used to indicate that an integrity check failure has occurred.
  • the first message includes a count COUNT value of the first data packet or a PDCP sequence number SN of the first data packet.
  • the response is a second data packet generated by the sending end, and the second data packet has the same format as the PDCP data PDU of the DRB, the The second data packet includes first indication information, and the first indication information is used to indicate that the second data packet is the response; or the response is an RRC message, and the RRC message is carried on the DRB and is The RRC message has the same format as the PDCP data PDU of the DRB, the RRC message includes second indication information, and the second indication information is used to indicate that the RRC message is the response; or the response is carried in the Describe the service data packets on the DRB.
  • the second data packet includes a COUNT value or a PDCP SN
  • the second data packet includes a COUNT value or a PDCP SN that is greater than that of the first data packet COUNT value or PDCP SN of the first data packet.
  • the failure of the first data packet integrity check on the DRB includes: failure of any of the first data packet integrity checks on the data radio bearer; Or the integrity check of N consecutive first data packets on the data radio bearer fails; or the integrity check of M first data packets on the data radio bearer fails within the first time period; where N> 1 , M> 1.
  • the processing module is specifically configured to: when a response to the first message is successfully received from the sender within a preset time, determine the The failure of the integrity check of the first data packet on the DRB is not a step out of security parameters; or when the response to the first message is not successfully received from the sender within a preset time, the The first packet integrity check failed because the security parameters were out of sync.
  • the receiving end after the receiving end sends the first message to the transmitting end when it determines that the integrity check of the first data packet on the data radio bearer DRB fails, the receiving end
  • the processing module is further configured not to send the first message to the sending end when the receiving end determines that a third data packet integrity check on the data radio bearer fails within the preset time.
  • the processing module is further configured to: when the first message is sent to the sending end, start a timer, and the timer is used for the pre- Set the timing of the time period, and during the running of the timer, when the receiving end receives the response, stop the timer; or during the running of the timer, the receiving end does not receive the In response, it is determined that the cause of the failure of the integrity check of the first data packet on the DRB is that the security parameters are out of sync.
  • the receiving device when it is determined that the failure reason of the integrity check of the first data packet on the DRB is out of synchronization of security parameters, when the receiving device is a terminal, The receiving device further includes a sending module, which is configured to initiate an RRC re-establishment or the sending module sends a reason for the failure of the first data packet integrity check on the DRB to the sending end; or when the When the receiving device is a network end, the receiving device further includes a sending module, and the sending module is configured to trigger the sending end to perform RRC re-establishment or the processing module to reconfigure the DRB.
  • a communication device including:
  • a receiving module configured to receive a first message from a receiving end, where the first message is used to indicate that an integrity check failure has occurred;
  • a sending module is configured to send a response to the first message to the receiving end according to the first message, where the response is integrity-protected.
  • the first message is a packet data aggregation protocol PDCP control protocol data unit PDU associated with the data radio bearer DRB, and the first data packet on the DRB is complete The check fails; or the first message is a radio resource control RRC message, and the RRC message is used to indicate that an integrity check failure has occurred.
  • the first message includes a COUNT value of the first data packet or a PDCP sequence number SN of the first data packet.
  • the response is a second data packet generated by the sending end, and the second data packet has the same format as the PDCP data PDU of the DRB, the The second data packet includes first indication information, and the first indication information is used to indicate that the second data packet is the response; or the response is an RRC message, and the RRC message is carried on the DRB and is The RRC message has the same format as the PDCP data PDU of the DRB, the RRC message includes second indication information, and the second indication information is used to indicate that the RRC message is the response; or the response is carried in the The service data packet on the DRB is described; wherein the integrity check of the first data packet on the DRB fails.
  • the second data packet includes a COUNT value or a PDCP SN
  • the second data packet includes a COUNT value or a PDCP SN that is greater than that of the first data packet COUNT value or PDCP SN of the first data packet.
  • a communication device including: at least one processor, a memory, and a transceiver, where the memory is used to store instructions or application program code, and the transceiver is used to implement a corresponding communication function.
  • the instructions or application program codes are directly or indirectly executed by the at least one processor, so that the communication device can execute the first aspect or the method in any optional implementation manner of the first aspect.
  • a communication device including: at least one processor, a memory, and a transceiver, where the memory is used to store instructions or application program code, and the transceiver is used to implement a corresponding communication function.
  • the instructions or application program code are directly or indirectly executed by the at least one processor, so that the communication device can execute the second aspect or the method in any optional implementation manner of the second aspect.
  • a chip system including: at least one processor, where the at least one processor is configured to execute a stored instruction, so that the receiving end can execute the first aspect or any optional implementation of the first aspect Way in the way.
  • a chip system including: at least one processor, where the at least one processor is configured to execute a stored instruction, so that the sending end can execute the second aspect or any optional implementation of the second aspect Way in the way.
  • a computer program product includes instructions. When the instructions are executed, the receiving end can execute the first aspect or any optional implementation manner of the first aspect. method.
  • a computer program product includes instructions.
  • the sending end can execute the second aspect or any optional implementation manner of the second aspect. method.
  • a computer storage medium stores program instructions.
  • the receiving end may execute the second aspect or any optional implementation manner of the second aspect.
  • a computer storage medium stores program instructions.
  • the sending end may execute the second aspect or any optional implementation manner of the second aspect.
  • FIG. 1 is a schematic block diagram of a communication system architecture of a communication method and device according to the present application.
  • FIG. 2 is a schematic flowchart of a communication method according to the present application.
  • FIG. 3 is a schematic block diagram of a communication device according to an embodiment of the present application.
  • FIG. 4 is a schematic block diagram of a communication device according to an embodiment of the present application.
  • FIG. 5 is a schematic block diagram of a communication device according to an embodiment of the present application.
  • FIG. 6 is a schematic block diagram of a communication device according to an embodiment of the present application.
  • GSM global mobile communication
  • CDMA code division multiple access
  • CDMA wideband code division multiple access
  • WCDMA wideband code division multiple access
  • GPRS general packet radio service
  • LTE long term evolution
  • FDD LTE frequency division duplex
  • TDD time division duplex
  • UMTS universal mobile communication system
  • WiMAX global interconnected microwave access
  • 5G future generation
  • NR new radio
  • the terminal device in the embodiments of the present application may refer to user equipment, access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent, or User device.
  • Terminal equipment can also be cellular phones, cordless phones, session initiation protocol (SIP) phones, wireless local loop (WLL) stations, personal digital assistants (PDAs), and wireless communications Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in future 5G networks, or public land mobile networks (PLMN) in future evolution Terminal equipment and the like are not limited in this embodiment of the present application.
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDAs personal digital assistants
  • PLMN public land mobile networks
  • the network device in the embodiment of the present application may be a device for communicating with a terminal device.
  • the network device may be a Global System for Mobile Communication (GSM) system or a Code Division Multiple Access (CDMA) system.
  • Base station (BTS) can also be a base station (NodeB, NB) in a wideband code division multiple access (WCDMA) system, or an evolved base station (evolvedNodeB, in an LTE system).
  • the network device may be a relay station, an access point, an in-vehicle device, a wearable device, and a future 5G network
  • the network equipment in the future or the network equipment in a PLMN network to be evolved in the future is not limited in the embodiments of the present application.
  • the terminal device or the network device includes a hardware layer, an operating system layer running on the hardware layer, and an application layer running on the operating system layer.
  • This hardware layer includes hardware such as a central processing unit (CPU), a memory management unit (MMU), and a memory (also called main memory).
  • the operating system may be any one or more computer operating systems that implement business processing through processes, such as a Linux operating system, a Unix operating system, an Android operating system, an iOS operating system, or a windows operating system.
  • This application layer contains applications such as browsers, address books, word processing software, and instant messaging software.
  • the embodiment of the present application does not specifically limit the specific structure of the execution subject of the method provided by the embodiment of the present application, as long as the program that records the code of the method provided by the embodiment of the application can be run to provide the program according to the embodiment of the application.
  • the communication may be performed by using the method described above.
  • the method execution subject provided in the embodiment of the present application may be a terminal device or a network device, or a function module in the terminal device or the network device that can call a program and execute the program.
  • various aspects or features of the application may be implemented as a method, apparatus, or article of manufacture using standard programming and / or engineering techniques.
  • article of manufacture encompasses a computer program accessible from any computer-readable device, carrier, or medium.
  • computer-readable media may include, but are not limited to: magnetic storage devices (eg, hard disks, floppy disks, or magnetic tapes, etc.), optical disks (eg, compact discs (CDs), digital versatile discs (DVDs) Etc.), smart cards and flash memory devices (for example, erasable programmable read-only memory (EPROM), cards, sticks or key drives, etc.).
  • various storage media described herein may represent one or more devices and / or other machine-readable media used to store information.
  • machine-readable medium may include, but is not limited to, wireless channels and various other media capable of storing, containing, and / or carrying instruction (s) and / or data.
  • FIG. 1 is a schematic diagram of a communication system 100 using a communication method and apparatus of the present application.
  • the communication system 100 includes a network device 102, and the network device 102 may include multiple antennas, for example, antennas 104, 106, 108, 110, 112, and 114.
  • the network device 102 may additionally include a transmitter chain and a receiver chain.
  • Those of ordinary skill in the art may understand that each of them may include multiple components related to signal transmission and reception (such as a processor, a modulator, and a multiplexer). , Demodulator, demultiplexer or antenna, etc.).
  • the network device 102 may communicate with multiple terminal devices (eg, the terminal device 116 and the terminal device 122). However, it can be understood that the network device 102 can communicate with any number of target terminal devices similar to the terminal devices 116 or 122.
  • the terminal device 116 communicates with the antennas 112 and 114, where the antennas 112 and 114 send information to the terminal device 116 through the forward link 118 and receive information from the terminal device 116 through the reverse link 120.
  • the terminal device 122 communicates with the antennas 104 and 106, where the antennas 104 and 106 send information to the terminal device 122 through the forward link 124 and receive information from the terminal device 122 through the reverse link 126.
  • forward link 118 may use a different frequency band from reverse link 120, and forward link 124 may use a different frequency band than reverse link 126.
  • the frequency band may be used in a frequency division duplex (FDD) system.
  • FDD frequency division duplex
  • the forward link 118 and the reverse link 120 can use a common frequency band, and the forward link 124 and the reverse link The link 126 may use a common frequency band.
  • Each antenna (or antenna group consisting of multiple antennas) and / or area designed for communication is called a sector of the network device 102.
  • the antenna group may be designed to communicate with terminal devices in a sector covered by the network device 102.
  • the transmitting antennas of the network device 102 can use beamforming to improve the signal-to-noise ratio of the forward links 118 and 124.
  • the Mobile devices experience less interference.
  • the network device 102, the terminal device 116, or the terminal device 122 may be a wireless communication transmitting apparatus and / or a wireless communication receiving apparatus.
  • the wireless communication transmitting device may encode the data for transmission.
  • the wireless communication transmitting device may obtain (for example, generate, receive from another communication device, or save in a memory, etc.) a certain number of target data bits to be transmitted to the wireless communication receiving device through a channel.
  • Such data bits may be contained in a transport block (or transport blocks) of data, which may be segmented to generate a plurality of code blocks.
  • FIG. 1 is only a simplified schematic diagram of an example, and the communication system may further include other network devices, which are not shown in FIG. 1.
  • the receiving end may be a receiving device or a component (such as a chip or a circuit) used for the receiving device, and the transmitting end may be a transmitting device or a component (for example, a transmitting device) Chip or circuit, etc.).
  • the receiving end may be a terminal device, and the transmitting device may be a network device; corresponding to the uplink transmission, the receiving device may be a network device, and the transmitting device may be a terminal device.
  • the following description uses the receiving end as a receiving device and the sending end as a sending device as an example.
  • the network device can be configured to protect the integrity of the data transmitted by the air interface.
  • the sending device performs integrity protection on the data packet to be sent, generates a MAC-I according to the calculation parameters of the integrity message authentication code-integrity (MAC-I), and places it in the packet header to send to the receiving device together .
  • the calculation parameters of the integrity authentication code may include: the data packet content, the integrity protection key KEY (K RRCint ), the integrity protection algorithm, the bearer ID, the COUNT value, and the direction DIRECTION (specifying the data Whether the packet is a downlink data packet or an uplink data packet).
  • COUNT when the COUNT value is sent, the sending device first determines on which bearer the data packet is sent, and then assigns the data packet a COUNT value corresponding to the bearer (the COUNT value can be understood as the data packet sent on the bearer Counts are allocated in a sequential accumulation manner).
  • COUNT consists of two parts, the high-order part is a hyper frame number (HFN), and the low-order part is a packet data convergence protocol serial number (PDCP SN).
  • the PDCP SN is the PDCP sequence number of the data packet, which is carried in the packet header.
  • the HFN is not transmitted on the air interface and is maintained by the sending device and the receiving device. In the calculation parameters of the integrity authentication code, only the data packet content and the PDCP SN in the COUNT are transmitted over the air interface.
  • the receiving device After the receiving device receives the data packet, it performs an integrity protection check on the content of the data packet. Calculate a MAC-I according to the same device method above and compare it with the MAC-I in the packet header. If they are the same, the check is passed, otherwise the check fails. This requires that the parameters of the MAC-I calculated by the sending device and the receiving device must be exactly the same before they can be checked. Because only the network device and the terminal device have the correct integrity protection key KEY, only the sending device can use the correct key to generate the correct MAC-I. If the data is tampered, the receiving device using the same process will generate different MAC-I, so that problems can be identified for integrity protection purposes.
  • the reasons for the failure of the integrity protection check mainly include the following three reasons:
  • Attack of the attacker For example, the attacker has tampered with the content of the data packet, or the data packet received by the receiving device is an insert message, that is, the data packet was sent by the attacker, and the sending device did not send the data packet.
  • cyclic redundancy check (cyclic redundancy check, CRC) fails, that is, there is an error in the air interface reception, but the CRC check does not identify the error, and the data packet with the air interface reception error is delivered to the PDCP layer.
  • one possible processing method is to initiate the RRC re-establishment process (the COUNT value after re-establishment Reset to zero) to solve the out-of-sync problem; if the integrity protection check fails on the network device side, one possible processing method is to trigger the terminal device to initiate an RRC re-establishment process.
  • the receiving device generally uses the method of directly discarding the data packet. Once the security parameters of the terminal device and the network device are out of sync, the terminal device All data packets in this direction of the bearer with the network device will fail the integrity protection check, and the services on the bearer between the terminal device and the network device cannot communicate.
  • the receiving device when the integrity protection check fails, the receiving device always adopts the re-establishment method. If an attacker frequently sends attack packets, the terminal device will continuously perform the re-establishment process. The re-establishment process will cause the interruption of user services, which will result in The terminal equipment cannot perform normal services.
  • the embodiments of the present application provide a communication method and device that can determine the cause of a data packet integrity check failure, and further enable the receiving end to perform subsequent processing based on the reason for the failure of the data packet integrity check, ensuring that The service between the sender and receiver is proceeding normally.
  • FIG. 2 is a schematic flowchart of a communication method 200 according to an embodiment of the present application.
  • the method 200 may be applied to the scenario shown in FIG. 1, and of course, it may also be applied to other communication scenarios. Embodiments of the present application are here. No restrictions.
  • the method 200 may include the following content.
  • the receiving device determines that the first data packet integrity check on the data radio bearer DRB has failed.
  • the receiving device sends a first message to the sending device, where the first message is used to indicate that an integrity check failure has occurred.
  • the first message is used to indicate that an integrity check failure has occurred, which means that the first message may also implicitly request the sending device to send a response to the first message to the receiving device; or The first message is used to request the sending device to send a response to the first message to the receiving device, that is, it implicitly indicates that an integrity check failure has occurred.
  • the transmitting device receives the first message from the receiving device.
  • the sending device sends a response to the first message to the receiving device according to the first message, wherein the response is integrity-protected.
  • the response is integrity-protected, that is, the sending device performs integrity protection on the response.
  • the sending device generates a MAC-I according to the calculation parameters of the integrity message authentication code, and places it in the response together. Sent by the receiving device.
  • the receiving device determines a cause of failure of the integrity check of the first data packet on the DRB according to whether the response to the first message is successfully received from the sending device on the DRB within a preset time.
  • successfully receiving a response to the first message from the sending device means that the receiving device receives an integrity-protected response and performs an integrity check successfully. If no response is received or the response The failure of the integrity check indicates that the response to the first message was not successfully received from the sending device.
  • the receiving device when the receiving device determines that the integrity check of the first data packet on the DRB fails, it sends a first message to the sending device indicating that the integrity check failure has occurred, and the sending device receives the first message. After the message, a response to the first message is sent to the receiving device, and the response is integrity protected.
  • the receiving device determines, based on whether the response to the first message is successfully received from the sending device within a preset time, the cause of the failure of the integrity check of the first data packet on the DRB, so that the receiving device is based on the integrity of the data packet
  • the cause of the failure check can be followed up to ensure that the services between the sending device and the receiving device are running normally.
  • the first message is a packet data aggregation protocol PDCP control protocol data unit PDU associated with the DRB; or the first message is a radio resource control RRC message used to indicate that an integrity check failure has occurred.
  • the first message is the packet data aggregation protocol PDCP control protocol data unit PDU associated with the DRB, that is, when the receiving device determines that the integrity check of the first data packet on the data radio bearer DRB fails, it triggers one of the DRBs.
  • the PDCP control PDU is a new PDCP control PDU
  • the PDCP control PDU is used to indicate that an integrity check failure has occurred, because the PDCP control PDU is the first data packet integrity check failure
  • the DRB corresponds, that is, the PDCP control PDU is carried on the DRB, and therefore it is not necessary to indicate the DRB identification ID in the PDCP control PDU.
  • the sending device sends a response to the first message on the DRB.
  • the first message is a radio resource control RRC message
  • the first message is sent on a signaling bearer, that is, an RRC message is sent.
  • the RRC message carries DRB information that fails the integrity check of the first data packet, such as the DRB ID.
  • the sending device needs to reply to the response to the first message on the designated DRB, or the RRC message does not carry DRB information.
  • the sending device needs to reply to the response to the first message on all DRBs of the terminal device.
  • the first message includes a counter COUNT value of the first data packet or a PDCP sequence number SN of the first data packet.
  • the first message when the first message is a packet data aggregation protocol PDCP control protocol data unit PDU associated with the DRB or the first message is a radio resource control RRC message, the first message may carry an integrity check failure.
  • COUNT value or PDCP SN number of the first data packet The COUNT value or the PDCP SN sequence number of the response sent by the sending device to the first message is greater than the COUNT value or the PDCP SN sequence number of the first data packet.
  • the response is a second data packet generated by the sending end, the second data packet has the same format as the PDCP data PDU of the DRB, the second data packet includes first indication information, and the first indication information is used for Indicates that the second data packet is the response; or
  • the response is an RRC message, the RRC message is carried on the DRB, and the RRC message has the same format as the PDCP data PDU of the DRB.
  • the RRC message includes second indication information, and the second indication information is used to indicate that the RRC message is the Response; or
  • the response is a service data packet carried on the DRB.
  • the sending device after receiving the first message, the sending device generates a response, and the response is a second data packet generated by the sending device.
  • the second data packet is constructed by the sending device after receiving the first message.
  • the second data packet does not belong to a service data packet between the sending device and the receiving device.
  • the response may use the PDCP data PDU format of the DRB, that is, the response "pretends" to be a normal user data packet, but the response carries the first indication information, which is used to indicate that this is a response, for example, Use a bit to indicate.
  • the data part of the response may be generated by the sending device itself, such as randomly generated data, or the first message received. This response is encrypted and integrity protected just like normal user data packets.
  • the receiving device learns that the response is not a normal user data packet according to the first instruction information, and therefore does not deliver the response to a higher layer.
  • the second data packet includes a COUNT value or a PDCP SN
  • the second data packet includes a COUNT value or a PDCP SN greater than the COUNT value of the first data packet or the PDCP SN of the first data packet.
  • the sending device will assign the next COUNT value or PDCP number on the bearer (the number is no longer assigned to other data packets) to the response, that is, the response "Impersonates" a normal user data packet.
  • the next COUNT value or PDCP SN sequence number is the next COUNT value or PDCP SN sequence number of the COUNT value or PDCP SN sequence number that the transmitting device has currently allocated. Taking the PDCP SN number as an example, the receiving device has assigned the PDCP SN number 6 to a data packet.
  • the sending device constructs the second data packet the PDCP SN number of the second data packet is 7.
  • Table 1 is a PDCP data PDU format containing 12-bit PDCP and SN
  • Table 2 is a PDCP data PDU format containing 18-bit PDCP and SN.
  • the PDCP data PDU is a bit string arranged in byte length, that is, an integer multiple of 8 bits.
  • the bit order of each parameter field in the PDCP PDU is that the leftmost bit is the highest bit, and the rightmost bit is the lowest bit.
  • the first D / C on the left is used to indicate whether the PDU is a control PDU or a data PDU; R is a reserved bit; cont.
  • PDCP and SN are 12 bits, followed by byte 1.
  • the PDCP data PDU formats of two different PDCP and SN lengths do not include indication information.
  • the response is a data packet constructed by the sending device after receiving the first message
  • the DRB is used for the response.
  • PDCP data PDU format that is, the response "pretends" to be a normal user data packet, but the response is not a service data packet between the sending device and the receiving device. Therefore, the response may carry the first indication information.
  • the first indication information is used to indicate that this data packet is a "response". For example, a F field may be newly defined, and a bit (such as an R bit shown in Tables 3 and 4) may be used to indicate that the F field is used to indicate that this data packet is a response.
  • Tables 3 and 4 only show a PDCP data PDU format containing the first indication information, and the PDCP data PDU containing the first indication information may also be in other formats, such as the first indication information.
  • the PDCP data PDU format including the first indication information is not limited in this application.
  • the response may also use a new PDCP control PDU format.
  • the PDCP control PDU carries a PDCP SN on the DRB.
  • the PDCP control PDU performs integrity protection based on the PDCP SN.
  • the RRC message When the response is an RRC message, the RRC message is carried on the DRB and the RRC message has the same format as the PDCP data PDU of the DRB.
  • the RRC message includes second indication information, and the second indication information is used to indicate that the RRC message is This response enables the receiving device to recognize the special "data" at the PDCP layer and submit it to the RRC layer, instead of the higher layer of the user plane.
  • the second instruction information such as 1 bit, is introduced into the PDCP data PDU format. Indicates that this RRC message is a response.
  • the response is a service data packet carried on the DRB, that is, the response is not a special message, but a service data packet with a successful integrity check received on the DRB. That is, after the receiving device sends the first message, the receiving device receives a data packet with a successful integrity check on the DRB, that is, the data packet is considered as a response to the first message.
  • the response may also be encrypted.
  • the COUNT value of the service data packet that the integrity check succeeds is greater than the COUNT value of the first data packet that the integrity check fails.
  • the COUNT value of the service data packet that has passed the integrity check is greater than the COUNT value of the first data packet that has failed the integrity check, which can prevent an incorrect “response” from being received out of order. That is, due to the underlying transmission, the failed data packets arrive at the receiving end first, and the data packets before the failed data packets (the COUNT value is smaller) arrive later, to avoid these late packets from being mistakenly regarded as "responses”.
  • the failure of the first data packet integrity check on the DRB includes: any one of the first data packet integrity checks on the data radio bearer fails; or N consecutive first data packets on the data radio bearer Integrity check failed; or M first data packet integrity checks on the data radio bearer failed during the first time period; where N> 1 and M> 1.
  • the receiving device sends the first message when the integrity check of any first data packet on the data radio bearer fails; or the consecutive N first data packet integrity of the receiving device on the data radio bearer When the check fails, the receiving device sends the first message when the integrity check of the M first data packets on the data radio bearer within the first time period fails.
  • the receiving device sends the N consecutive first data packet integrity checks on the data radio bearer or the receiving device fails the M first data packet integrity checks on the data radio bearer within the first time period.
  • the first message can reduce the sending times of the first message and reduce signaling overhead.
  • N and M may be configured by the network device, may be predetermined by the receiving device and the sending device, or may be stipulated by an agreement.
  • the receiving end determines, based on whether the response to the first message is successfully received from the sending end within a preset time, the cause of failing the integrity check of the first data packet on the DRB, including:
  • the receiving end When the receiving end successfully receives a response to the first message from the sending end within a preset time, the receiving end determines that the cause of the failure of the integrity check of the first data packet on the DRB is not a step out of security parameters; or When the receiving end fails to receive a response to the first message from the sending end within a preset time, the receiving end determines that the reason for the failure of the integrity check of the first data packet on the DRB is that the security parameters are out of sync.
  • the receiving device may discard the first data packet that fails the integrity check.
  • the receiving device does not pass the data portion of the second data packet to the upper layer, but directly discards the response;
  • the receiving device passes the RRC message to the RRC layer for processing, such as discarding the response; or if the response message is a service data packet sent by the sending device on the DRB The receiving device submits the data part of the service data packet to a higher layer for processing.
  • the method further includes:
  • the receiving end determines that the integrity check of the third data packet on the data radio bearer fails within the preset time, it does not send the first message to the sending end.
  • the receiving end when determining that the integrity check of the first data packet on the data radio bearer DRB fails, the receiving end sends the first message to the sending device, and within the preset time, if the completeness of the bearer data occurs again If the sexuality check fails, the first message is not triggered, the data packet is directly discarded, or the first time period after the first message is sent (the first time period is less than or equal to the preset time) is not sent again.
  • the method further includes: when sending the first message to the sending end, the receiving end starts a timer, the timer is used for timing of the preset time period,
  • the timer stops counting
  • the receiving end starts a timer, and the timer has a preset duration.
  • the timer is a bearer level, and each DRB can correspond to a timing. Device.
  • the receiving end receives the response, it is determined that the failure of the integrity check of the first data packet on the DRB is not a step out of security parameters, and the timer is stopped or the timer is running. In the meantime, when the receiving end does not receive the response, it is determined that the cause of the failure of the integrity check of the first data packet on the DRB is that the security parameters are out of sync.
  • the method further includes: when the receiving end is a terminal device, the receiving end initiates RRC re-establishment or The receiving end sends the reason for the failure of the integrity check of the first data packet on the DRB to the sending end; or when the receiving end is an access network device, the receiving end triggers the sending end to perform RRC re-establishment or the receiving end Reconfigure the DRB.
  • the terminal device initiates an RRC re-establishment, or the terminal device sends an RRC message to notify the access network device that a security parameter out of sync occurs (to notify the access network device to reconfigure the DRB, For example, release and re-add the DRB); if the receiving device is an access network device, release and re-add the DRB, or trigger the UE to perform RRC re-establishment, or release the UE into the idle state.
  • the receiving device may perform different operations according to the determined cause of the failure of the integrity check, that is, whether the security parameters are out of step, to ensure that the services between the transmitting device and the receiving device are normally performed.
  • FIG. 3 is a schematic block diagram of a communication device 300 according to the present application.
  • the communication device correspondingly implements corresponding operations or steps of the receiving end in the foregoing embodiments.
  • the communication device 300 includes the following modules.
  • a determining module 310 configured to determine that the integrity check of the first data packet on the data radio bearer DRB fails
  • the sending module 320 is configured to send a first message to the sending end, where the first message is used to indicate that an integrity check failure has occurred;
  • the determining module 310 is further configured to determine that the first data packet integrity check fails on the DRB according to whether a response to the first message is successfully received from the sending end on the DRB within a preset time. The reason, wherein the response is integrity protected.
  • the determining module 310 and the sending module 320 are configured to perform various operations of the receiving device in a communication method 200 of the present application.
  • the determining module 310 and the sending module 320 are configured to perform various operations of the receiving device in a communication method 200 of the present application.
  • the foregoing communication device 300 may be a receiving device or a component (such as a chip or a circuit) that can be used for the receiving device, which is not limited in the embodiment of the present application.
  • FIG. 4 is a schematic block diagram of a communication device 400 according to the present application. As shown in FIG. 4, the communication device 400 includes the following modules.
  • the receiving module 410 is configured to receive a first message from a receiving end, where the first message is used to indicate that an integrity check failure occurs.
  • the sending module 420 is configured to send a response to the first message to the receiving end according to the first message, where the response is integrity-protected.
  • the receiving module 410 and the sending module 420 are configured to perform various operations of the sending device in a communication method 200 of the present application.
  • the receiving module 410 and the sending module 420 are configured to perform various operations of the sending device in a communication method 200 of the present application.
  • the foregoing communication device 400 may be a transmitting device, or a component (such as a chip or a circuit) that can be used for the transmitting device, which is not limited in the embodiment of the present application.
  • FIG. 5 shows a schematic block diagram of a communication device 500 provided in the present application.
  • the communication device 500 includes:
  • the memory 510 is configured to store a program, where the program includes code
  • the transceiver 520 is configured to implement a corresponding communication function
  • the processor 530 is configured to execute program code in the memory 510.
  • the processor 530 may implement each operation of the method 200.
  • the transceiver 520 is configured to perform specific signal transceiving under the driving of the processor 530.
  • the communication device 500 may be any one of the above-mentioned receiving device and transmitting device, and performs the operation of the determining module.
  • the transceiver may include a transmitter and / or a receiver, and respectively execute corresponding steps of the transmitting module and the receiving module.
  • An embodiment of the present application further provides a communication device 600, as shown in FIG.
  • the communication device 600 may include a transceiver 601.
  • it may further include at least one processor 602.
  • it may further include a memory 603.
  • the processor 602, the memory 603, and the communication interface transceiver 601 may be connected through a communication line.
  • the processor 602 may be a central processing unit (CPU), an application-specific integrated circuit (ASIC), or one or more integrated circuits configured to implement the embodiments of the present application.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • DSPs digital signal processors
  • FPGAs field programmable gate arrays
  • the memory 603 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, a random access memory (RAM), or other types that can store information and instructions Dynamic storage device, can also be electrically erasable programmable read-only memory (electrically erasable programmable read-only memory (EEPROM)), read-only compact disc (compact disc-read-only memory (CD-ROM) or other optical disc storage, optical disc storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to include or store desired program code in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this.
  • the memory 603 may exist independently of the processor 602. At this time, the memory 603 may be connected to the processor 602 through a communication line. In another possible design, the memory 603 may also be integrated with the processor 602.
  • the memory 603 may be used to store execution instructions or application program code, and is controlled and executed by the processor 602 to implement the communication method provided by the foregoing embodiments of the present application; and / or, it may also be used to temporarily store some data and instruction information.
  • the memory 603 may be a cache, for example.
  • the device 600 may further include other hardware devices, which are not listed here one by one.
  • the determining module 310 of FIG. 3 may be implemented by the processor 602
  • the sending module 320 of FIG. 3 may be implemented by the transceiver 601
  • the receiving module 410 and the sending module 420 of FIG. 4 may be implemented by the transceiver 601. achieve.
  • the disclosed systems, devices, and methods may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the unit is only a logical function division.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, which may be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, a network device, a user equipment, or another programmable device.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be from a website site, a computer, a server, or a data center. Transmission by wire (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) to another website site, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or includes one or more data storage devices such as servers, data centers, and the like that can be integrated with the medium.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a digital video disc (DVD)), or a semiconductor medium (for example, a solid state disk (SSD)) Wait.
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
  • an optical medium for example, a digital video disc (DVD)
  • DVD digital video disc
  • SSD solid state disk

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种通信方法和装置,可以确定数据包完整性检查失败的原因,使得接收端根据所述数据包完整性检查失败的原因可以进行后续处理,保证了发送端和接收端之间的业务正常进行。该方法包括:接收端在确定数据无线承载DRB上的第一数据包完整性检查失败时,向发送端发送第一消息,所述第一消息用于指示发生了完整性检查失败;所述接收端根据是否在预设时间内成功从所述发送端接收对于所述第一消息的响应,确定所述DRB上的所述第一数据包完整性检查失败的原因,其中,所述响应是经过完整性保护的。

Description

通信方法和装置
本申请要求于2018年06月21日提交中国专利局、申请号为201810646081.0、申请名称为“通信方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信领域,并且更具体地,涉及一种通信方法和设备。
背景技术
为了保证空口通信的安全性,防止终端设备和网络设备之间的通信被篡改或插入,网络设备可以配置对空口传输的数据进行完整性保护。发送方对要发送的数据包进行完整性保护,根据完整性消息鉴权码(message authentication code-integrity,MAC-I)的计算参数产生一个MAC-I,放在数据包头中一起向接收方发送。接收方收到数据包后,对数据包内容进行完整性保护检查,其方法是:采用和发送方相同的方法计算一个收到的数据包的MAC-I,并和收到的数据包头中的MAC-I进行比较,如果相同,则检查通过,否则检查失败。
引起完整性保护检查失败的原因主要有:攻击者的攻击,如,对数据包内容进行了篡改,或接收方接收到的消息是由攻击者发送的插入消息(完整性保护密钥KEY不一致)等;或者,CRC校验失败,即空口接收有错误,但是CRC校验未识别出错误,将空口接收错误的数据包递交给了PDCP层;或者,终端设备和网络设备的安全参数发生了失步。
为了保证终端设备和网络设备之间正常的业务通信,对于不同的完整性保护检查失败原因,接收方会采取不同的处理方式。因此,如何确定数据包完整性检查失败原因是一项亟待解决的问题。
发明内容
本申请提供一种通信方法,可以确定数据包完整性检查失败的原因,使得接收端根据所述数据包完整性检查失败的原因可以进行后续处理,保证了发送端和接收端之间的业务正常进行。
第一方面,提供了一种通信方法,包括:接收端确定数据无线承载DRB上的第一数据包完整性检查失败;所述接收端向发送端发送第一消息,所述第一消息用于指示发生了完整性检查失败;
所述接收端根据是否在预设时间内在所述DRB上成功从所述发送端接收对于所述第一消息的响应,确定所述DRB上的所述第一数据包完整性检查失败的原因,其中,所述响应是经过完整性保护的。
因此,在本申请实施例中,接收设备在确定DRB上的第一数据包完整性检查失败时, 向发送设备发送指示发生了完整性检查失败的第一消息,发送设备在接收到所述第一消息后,向所述接收设备发送对于所述第一消息的响应,所述响应是经过完整性保护的。所述接收设备根据是否在预设时间内在所述DRB上成功从所述发送设备接收对于所述第一消息的响应,确定所述DRB上的所述第一数据包完整性检查失败的原因,使得接收端根据所述数据包完整性检查失败的原因可以进行后续处理,保证了发送端和接收端之间的业务正常进行。
一种可能的方式中,所述第一消息用于指示发生了完整性检查失败,同时所述第一消息也隐式请求所述发送设备向所述接收设备发送对于所述第一消息的响应;或者该第一消息用于请求该发送设备向该接收设备发送对于该第一消息的响应,也就是说隐式的指示了发生了完整性检查失败。
一种可能的方式中,所述成功从所述发送设备接收对于所述第一消息的响应,指的是该接收设备收到经过完整性保护的响应并且进行完整性检查成功,如果没有收到响应或者所述经过完整性保护的响应的完整性检查失败则说明没有成功从所述发送设备接收对于所述第一消息的响应。
结合第一方面,在第一方面的某些实现方式中,所述第一消息为所述DRB关联的包数据汇聚协议PDCP控制协议数据单元PDU;或所述第一消息为无线资源控制RRC消息,所述RRC消息用于指示发生了完整性检查失败。
结合第一方面,在第一方面的某些实现方式中,所述RRC消息中携带第一数据包完整性检查失败的DRB信息。
此时,在所述RRC消息中携带第一数据包完整性检查失败的DRB信息,发送设备只需要需要在指定的所述DRB上回复对于该第一消息的响应,不需要在该终端设备的所有的DRB上回复该对于该第一消息的响应,可以减少信令开销。
结合第一方面,在第一方面的某些实现方式中,所述第一消息包括所述第一数据包的计数COUNT值或所述第一数据包的PDCP序号SN。
此时,通过在所述第一消息中携带所述第一数据包的计数COUNT值或所述第一数据包的PDCP序号SN,以使得发送设备发送对于该第一消息的响应的COUNT值或PDCP SN序号大于该第一数据包的COUNT值或PDCP SN序号。
结合第一方面,在第一方面的某些实现方式中,所述响应为所述发送端产生的第二数据包,所述第二数据包与所述DRB的PDCP数据PDU格式相同,所述第二数据包包括第一指示信息,所述第一指示信息用于指示所述第二数据包为所述响应;或所述响应为RRC消息,所述RRC消息承载在所述DRB上且所述RRC消息与所述DRB的PDCP数据PDU格式相同,所述RRC消息包括第二指示信息,所述第二指示信息用于指示所述RRC消息为所述响应;或所述响应为承载在所述DRB上的业务数据包。
结合第一方面,在第一方面的某些实现方式中,所述第二数据包包括COUNT值或PDCP SN,所述第二数据包包括的COUNT值或PDCP SN大于所述第一数据包的COUNT值或所述第一数据包的PDCP SN。
结合第一方面,在第一方面的某些实现方式中,所述DRB上的第一数据包完整性检查失败,包括:所述数据无线承载上的任一个第一数据包完整性检查失败;或所述数据无线承载上的连续N个第一数据包完整性检查失败;或在第一时间段内所述数据无线承载上 的M个第一数据包完整性检查失败;其中,N>1,M>1。
此时,接收设备在所述数据无线承载上的连续N个第一数据包完整性检查失败时或接收设备在第一时间段内所述数据无线承载上的M个第一数据包完整性检查失败时,发送所述第一消息,可以减少所述第一消息的发送次数,减少信令开销。
结合第一方面,在第一方面的某些实现方式中,N,M地具体数值可以由网络设备配置,也可以是接收设备和发送设备事先约定的,还可以是协议规定的。
结合第一方面,在第一方面的某些实现方式中,所述接收端根据是否在预设时间内成功从所述发送端接收对于所述第一消息的响应,确定所述DRB上的所述第一数据包完整性检查失败的原因,包括:当所述接收端在预设时间内成功从所述发送端接收对于所述第一消息的响应时,所述接收端确定所述DRB上的第一数据包完整性检查失败的原因不是安全参数失步;或当所述接收端在预设时间内没有成功从所述发送端接收对于所述第一消息的响应时,所述接收端确定所述DRB上的第一数据包完整性检查失败的原因是安全参数失步。
结合第一方面,在第一方面的某些实现方式中,在所述接收端在确定数据无线承载DRB上的第一数据包完整性检查失败时,向发送端发送第一消息之后,所述方法还包括:当在所述预设时间内,所述接收端确定所述数据无线承载上的第三数据包完整性检查失败时,不向所述发送端发送所述第一消息。
此时,通过在所述接收端在确定数据无线承载DRB上的第一数据包完整性检查失败时,向发送端发送第一消息之后,在所述预设时间内,所述接收端确定所述数据无线承载上的第三数据包完整性检查失败时,不向所述发送端发送所述第一消息,可以以减少信令开销。
结合第一方面,在第一方面的某些实现方式中,所述方法还包括:在所述向发送端发送所述第一消息时,所述接收端开启定时器,所述定时器用于所述预设时间段的定时,在所述定时器运行期间,所述接收端收到所述响应时,停止所述定时器计时;或在所述定时器运行期间,所述接收端没有收到所述响应时,确定所述DRB上的第一数据包完整性检查失败的原因是安全参数失步。
结合第一方面,在第一方面的某些实现方式中,在确定出所述DRB上的第一数据包完整性检查失败的原因是安全参数失步时,所述方法还包括:当所述接收端是终端设备时,所述接收端发起RRC重建立或者所述接收端向所述发送端发送所述DRB上的第一数据包完整性检查失败的原因;或当所述接收端是接入网设备时,所述接收端触发所述发送端进行RRC重建立或者所述接收端重配置所述DRB。
第二方面,提供了一种通信方法,包括:发送端从接收端接收第一消息,所述第一消息用于指示发生了完整性检查失败;所述发送端根据所述第一消息,向所述接收端发送对于所述第一消息的响应,其中,所述响应是经过完整性保护的。
结合第二方面,在第二方面的某些实现方式中,所述第一消息为数据无线承载DRB关联的包数据汇聚协议PDCP控制协议数据单元PDU,所述DRB上的第一数据包完整性检查失败;或所述第一消息为无线资源控制RRC消息,所述RRC消息用于指示发生了完整性检查失败。
结合第二方面,在第二方面的某些实现方式中,所述第一消息包括所述第一数据包的 COUNT值或所述第一数据包的PDCP序号SN。
结合第二方面,在第二方面的某些实现方式中,所述响应为所述发送端产生的第二数据包,所述第二数据包与所述DRB的PDCP数据PDU格式相同,所述第二数据包包括第一指示信息,所述第一指示信息用于指示所述第二数据包为所述响应;或所述响应为RRC消息,所述RRC消息承载在所述DRB上且所述RRC消息与所述DRB的PDCP数据PDU格式相同,所述RRC消息包括第二指示信息,所述第二指示信息用于指示所述RRC消息为所述响应;或所述响应为承载在所述DRB上的业务数据包;其中,所述DRB上的第一数据包完整性检查失败。
结合第二方面,在第二方面的某些实现方式中,所述第二数据包包括COUNT值或PDCP SN,所述第二数据包包括的COUNT值或PDCP SN大于所述第一数据包的COUNT值或所述第一数据包的PDCP SN。
第三方面,提供了一种通信装置,包括:确定模块,用于确定数据无线承载DRB上的第一数据包完整性检查失败;
发送模块,用于向发送端发送第一消息,所述第一消息用于指示发生了完整性检查失败;
所述确定模块还用于是否在预设时间内在所述DRB上成功从所述发送端接收对于所述第一消息的响应,确定所述DRB上的所述第一数据包完整性检查失败的原因,其中,所述响应是经过完整性保护的。
结合第三方面,在第三方面的某些实现方式中,所述第一消息为所述DRB关联的包数据汇聚协议PDCP控制协议数据单元PDU;或所述第一消息为无线资源控制RRC消息,所述RRC消息用于指示发生了完整性检查失败。
结合第三方面,在第三方面的某些实现方式中,所述第一消息包括所述第一数据包的计数COUNT值或所述第一数据包的PDCP序号SN。
结合第三方面,在第三方面的某些实现方式中,所述响应为所述发送端产生的第二数据包,所述第二数据包与所述DRB的PDCP数据PDU格式相同,所述第二数据包包括第一指示信息,所述第一指示信息用于指示所述第二数据包为所述响应;或所述响应为RRC消息,所述RRC消息承载在所述DRB上且所述RRC消息与所述DRB的PDCP数据PDU格式相同,所述RRC消息包括第二指示信息,所述第二指示信息用于指示所述RRC消息为所述响应;或所述响应为承载在所述DRB上的业务数据包。
结合第三方面,在第三方面的某些实现方式中,所述第二数据包包括COUNT值或PDCP SN,所述第二数据包包括的COUNT值或PDCP SN大于所述第一数据包的COUNT值或所述第一数据包的PDCP SN。
结合第三方面,在第三方面的某些实现方式中,所述DRB上的第一数据包完整性检查失败,包括:所述数据无线承载上的任一个第一数据包完整性检查失败;或所述数据无线承载上的连续N个第一数据包完整性检查失败;或在第一时间段内所述数据无线承载上的M个第一数据包完整性检查失败;其中,N>1,M>1。
结合第三方面,在第三方面的某些实现方式中,所述处理模块具体用于:当在预设时间内成功从所述发送端接收对于所述第一消息的响应时,确定所述DRB上的第一数据包完整性检查失败的原因不是安全参数失步;或当在预设时间内没有成功从所述发送端接收 对于所述第一消息的响应时,确定所述DRB上的第一数据包完整性检查失败的原因是安全参数失步。
结合第三方面,在第三方面的某些实现方式中,在所述接收端在确定数据无线承载DRB上的第一数据包完整性检查失败时,向发送端发送第一消息之后,所述处理模块还用于:当在所述预设时间内,所述接收端确定所述数据无线承载上的第三数据包完整性检查失败时,不向所述发送端发送所述第一消息。
结合第三方面,在第三方面的某些实现方式中,所述处理模块还用于:在所述向发送端发送所述第一消息时,开启定时器,所述定时器用于所述预设时间段的定时,在所述定时器运行期间,所述接收端收到所述响应时,停止所述定时器计时;或在所述定时器运行期间,所述接收端没有收到所述响应时,确定所述DRB上的第一数据包完整性检查失败的原因是安全参数失步。
结合第三方面,在第三方面的某些实现方式中,在确定出所述DRB上的第一数据包完整性检查失败的原因是安全参数失步时,当所述接收设备是终端时,所述接收设备还包括发送模块,所述发送模块用于发起RRC重建立或者所述发送模块向所述发送端发送所述DRB上的第一数据包完整性检查失败的原因;或当所述接收设备是网络端时,所述接收设备还包括发送模块,所述发送模块用于触发所述发送端进行RRC重建立或者所述处理模块重配置所述DRB。
第四方面,提供了一种通信装置,包括:
接收模块,用于从接收端接收第一消息,所述第一消息用于指示发生了完整性检查失败;
发送模块,用于根据所述第一消息,向所述接收端发送对于所述第一消息的响应,其中,所述响应是经过完整性保护的。
结合第四方面,在第四方面的某些实现方式中,所述第一消息为数据无线承载DRB关联的包数据汇聚协议PDCP控制协议数据单元PDU,所述DRB上的第一数据包完整性检查失败;或所述第一消息为无线资源控制RRC消息,所述RRC消息用于指示发生了完整性检查失败。
结合第四方面,在第四方面的某些实现方式中,所述第一消息包括所述第一数据包的COUNT值或所述第一数据包的PDCP序号SN。
结合第四方面,在第四方面的某些实现方式中,所述响应为所述发送端产生的第二数据包,所述第二数据包与所述DRB的PDCP数据PDU格式相同,所述第二数据包包括第一指示信息,所述第一指示信息用于指示所述第二数据包为所述响应;或所述响应为RRC消息,所述RRC消息承载在所述DRB上且所述RRC消息与所述DRB的PDCP数据PDU格式相同,所述RRC消息包括第二指示信息,所述第二指示信息用于指示所述RRC消息为所述响应;或所述响应为承载在所述DRB上的业务数据包;其中,所述DRB上的第一数据包完整性检查失败。
结合第四方面,在第四方面的某些实现方式中,所述第二数据包包括COUNT值或PDCP SN,所述第二数据包包括的COUNT值或PDCP SN大于所述第一数据包的COUNT值或所述第一数据包的PDCP SN。
第五方面,提供了一种通信装置,包括:至少一个处理器、存储器和收发器,所述存 储器用于存储指令或者应用程序代码,所述收发器用于实现相应的通信功能,所述存储的指令或者应用程序代码被所述至少一个处理器直接或间接的执行,使得所述通信装置可以执行第一方面或第一方面的任一可选的实现方式中的方法。
第六方面,提供了一种通信装置,包括:至少一个处理器、存储器和收发器,所述存储器用于存储指令或者应用程序代码,所述收发器用于实现相应的通信功能,所述存储的指令或者应用程序代码被所述至少一个处理器直接或间接的执行,使得所述通信装置可以执行第二方面或第二方面的任一可选的实现方式中的方法。
第七方面,提供了一种芯片系统,包括:至少一个处理器,所述至少一个处理器用于执行存储的指令,以使得接收端可以执行第一方面或第一方面的任一可选的实现方式中的方法。
第八方面,提供了一种芯片系统,包括:至少一个处理器,所述至少一个处理器用于执行存储的指令,以使得发送端可以执行第二方面或第二方面的任一可选的实现方式中的方法。
第九方面,提供了一种计算机程序产品,所述计算机程序产品包括指令,当所述指令被执行时,使得接收端可以执行第一方面或第一方面的任一可选的实现方式中的方法。
第十方面,提供了一种计算机程序产品,所述计算机程序产品包括指令,当所述指令被执行时,使得发送端可以执行第二方面或第二方面的任一可选的实现方式中的方法。
第十一方面,提供了一种计算机存储介质,所述计算机存储介质存储有程序指令,当所述指令被执行时,接收端可以执行第二方面或第二方面的任一可选的实现方式中的方法。
第十二方面,提供了一种计算机存储介质,所述计算机存储介质存储有程序指令,当所述指令被执行时,发送端可以执行第二方面或第二方面的任一可选的实现方式中的方法。
附图说明
图1是是根据本申请的一种通信方法和设备的通信系统架构的示意性框图。
图2是本申请的一种通信方法的示意性流程图。
图3是本申请实施例的通信装置的示意性框图。
图4是本申请实施例的通信装置的示意性框图。
图5是本申请实施例的一种通信装置的示意性框图。
图6是本申请实施例的一种通信装置的示意性框图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通信(global system formobile communications,GSM)系统、码分多址(code division multiple access,CDMA)系统、宽带码分多址(wideband code division multiple access,WCDMA)系统、通用分组无线业务(general packet radio service,GPRS)、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX) 通信系统、未来的第五代(5th generation,5G)系统或新无线(new radio,NR)等。
本申请实施例中的终端设备可以指用户设备、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。终端设备还可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,未来5G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等,本申请实施例对此并不限定。
本申请实施例中的网络设备可以是用于与终端设备通信的设备,该网络设备可以是全球移动通信(global system formobile communications,GSM)系统或码分多址(code division multiple access,CDMA)中的基站(base transceiver station,BTS),也可以是宽带码分多址(wideband code division multiple access,WCDMA)系统中的基站(NodeB,NB),还可以是LTE系统中的演进型基站(evolvedNodeB,eNB或eNodeB),还可以是云无线接入网络(cloud radio access network,CRAN)场景下的无线控制器,或者该网络设备可以为中继站、接入点、车载设备、可穿戴设备以及未来5G网络中的网络设备或者未来演进的PLMN网络中的网络设备等,本申请实施例并不限定。
在本申请实施例中,终端设备或网络设备包括硬件层、运行在硬件层之上的操作系统层,以及运行在操作系统层上的应用层。该硬件层包括中央处理器(central processing unit,CPU)、内存管理单元(memory management unit,MMU)和内存(也称为主存)等硬件。该操作系统可以是任意一种或多种通过进程(process)实现业务处理的计算机操作系统,例如,Linux操作系统、Unix操作系统、Android操作系统、iOS操作系统或windows操作系统等。该应用层包含浏览器、通讯录、文字处理软件、即时通信软件等应用。并且,本申请实施例并未对本申请实施例提供的方法的执行主体的具体结构特别限定,只要能够通过运行记录有本申请实施例的提供的方法的代码的程序,以根据本申请实施例提供的方法进行通信即可,例如,本申请实施例提供的方法的执行主体可以是终端设备或网络设备,或者,是终端设备或网络设备中能够调用程序并执行程序的功能模块。
另外,本申请的各个方面或特征可以实现成方法、装置或使用标准编程和/或工程技术的制品。本申请中使用的术语“制品”涵盖可从任何计算机可读器件、载体或介质访问的计算机程序。例如,计算机可读介质可以包括,但不限于:磁存储器件(例如,硬盘、软盘或磁带等),光盘(例如,压缩盘(compact disc,CD)、数字通用盘(digital versatile disc,DVD)等),智能卡和闪存器件(例如,可擦写可编程只读存储器(erasable programmable read-only memory,EPROM)、卡、棒或钥匙驱动器等)。另外,本文描述的各种存储介质可代表用于存储信息的一个或多个设备和/或其它机器可读介质。术语“机器可读介质”可包括但不限于,无线信道和能够存储、包含和/或承载指令和/或数据的各种其它介质。
图1是使用本申请的一种通信方法和装置的通信系统100的示意图。如图1所示,所述通信系统100包括网络设备102,网络设备102可包括多个天线例如,天线104、106、108、110、112和114。另外,网络设备102可附加地包括发射机链和接收机链,本领域普通技术人员可以理解,它们均可包括与信号发送和接收相关的多个部件(例如处理器、 调制器、复用器、解调器、解复用器或天线等)。
网络设备102可以与多个终端设备(例如终端设备116和终端设备122)通信。然而,可以理解,网络设备102可以与类似于终端设备116或122的任意数目标终端设备通信。
如图1所示,终端设备116与天线112和114通信,其中天线112和114通过前向链路118向终端设备116发送信息,并通过反向链路120从终端设备116接收信息。此外,终端设备122与天线104和106通信,其中天线104和106通过前向链路124向终端设备122发送信息,并通过反向链路126从终端设备122接收信息。
例如,在频分双工(frequency division duplex,FDD)系统中,例如,前向链路118可与反向链路120使用不同的频带,前向链路124可与反向链路126使用不同的频带。
再例如,在时分双工(time division duplex,TDD)系统和全双工(Full Duplex)系统中,前向链路118和反向链路120可使用共同频带,前向链路124和反向链路126可使用共同频带。
被设计用于通信的每个天线(或者由多个天线组成的天线组)和/或区域称为网络设备102的扇区。例如,可将天线组设计为与网络设备102覆盖区域的扇区中的终端设备通信。在网络设备102通过前向链路118和124分别与终端设备116和122进行通信的过程中,网络设备102的发射天线可利用波束成形来改善前向链路118和124的信噪比。此外,与网络设备通过单个天线向它所有的终端设备发送信号的方式相比,在网络设备102利用波束成形向相关覆盖区域中随机分散的终端设备116和122发送信号时,相邻小区中的移动设备会受到较少的干扰。
在给定时间,网络设备102、终端设备116或终端设备122可以是无线通信发送装置和/或无线通信接收装置。当发送数据时,无线通信发送装置可对数据进行编码以用于传输。具体地,无线通信发送装置可获取(例如生成、从其它通信装置接收、或在存储器中保存等)要通过信道发送至无线通信接收装置的一定数目标数据比特。这种数据比特可包含在数据的传输块(或多个传输块)中,传输块可被分段以产生多个码块。
应理解,图1只是举例的简化示意图,该通信系统中还可以包括其他网络设备,图1中未予以画出。
应理解,在本申请实施例中,接收端可以是接收设备或者可以用于接收设备的部件(例如芯片或者电路等)的统称,发送端可以是发送设备或者可以用于发送设备的部件(例如芯片或者电路等)的统称。对应于下行传输,接收端可以是终端设备,发送设备可以是网络设备;对应于上行传输,接收设备可以是网络设备,发送设备可以是终端设备。
以下以接收端是接收设备,发送端是发送设备为例进行说明。
为了保证空口通信的安全性,防止终端设备和网络设备之间的通信被篡改或插入,网络设备可以配置对空口传输的数据进行完整性保护。发送设备对要发送的数据包进行完整性保护,根据完整性消息鉴权码(message authentication code-integrity,MAC-I)的计算参数产生一个MAC-I,放在数据包头中一起向接收设备发送。完整性鉴权码的计算参数可以包括:数据包内容、完整性保护密钥KEY(K RRCint)、完整性保护算法、发送该数据包的承载标识BEARER ID、COUNT值和方向DIRECTION(指明该数据包是下行数据包还是上行数据包)。其中,COUNT值是数据包发送时,发送设备首先确定在哪个承载上发送该数据包,然后给该数据包分配一个该承载对应的COUNT值(COUNT值可以理解成 在该承载上发送的数据包的计数,采用顺序累加方式分配)。COUNT由两部分组成,高位部分是超帧号(hyper frame number,HFN),低位部分是包数据汇聚协议序号(packet data convergence protocol serial number,PDCP SN)。PDCP SN就是该数据包的PDCP序号,在数据包包头中携带,HFN在空口不传递,由发送设备和接收设备各自维护。该完整性鉴权码的计算参数中只有数据包内容和COUNT里的PDCP SN是在空口中传输的。
接收设备收到数据包后,对数据包内容进行完整性保护检查。根据上面相同的设备法计算一个MAC-I,并和数据包包头中的MAC-I进行比较,如果相同,则检查通过,否则检查失败。这就要求,发送设备和接收设备计算MAC-I的参数必须完全一致,才能检查通过。由于只有网络设备和终端设备才有正确的完整性保护密钥KEY,因此只有发送设备使用正确的密钥才能产生正确的MAC-I,如果数据被篡改,接收设备使用相同的过程会产生不同的MAC-I,从而能识别出问题,起到完整性保护的目的。
可选的,完整性保护检查失败的原因主要包括以下三个原因:
1、攻击者的攻击。例如,攻击者对数据包内容进行了篡改,或者该接收设备收到的数据包为插入消息,即该数据包由攻击者发送,发送设备并没有发送该数据包等。
2、循环冗余校验(cyclic redundancy check,CRC)失败,即空口接收有错误,但是CRC校验未识别出错误,将空口接收错误的数据包递交给了PDCP层。
3、终端设备和网络设备的安全参数发生了失步。主要是COUNT失步(COUNT中的PDCN SN是在消息中发送的,因此不存在失步,主要是HFN失步)。
对于原因1和原因2引起的完整性保护检查失败,一种可能的处理方式是直接丢弃掉该数据包。
对于原因3引起的完整性保护检查失败,除了丢弃掉该数据包外,如果是在终端设备侧发生完整性保护检查失败,一种可能的处理方式是发起RRC重建立流程(重建立后COUNT值复位到零)以解决失步问题;如果在网络设备侧发生完整性保护检查失败,一种可能的处理方式是触发终端设备发起RRC重建立过程。
如果不区分完整性保护检查失败的原因,如在完整性保护检查失败时,接收设备一般采用直接丢弃数据包的方法,则一旦出现终端设备和网络设备的安全参数发生了失步,则终端设备和网络设备之间在这个承载的这个方向上的数据包都将发生完整性保护检查失败,终端设备和网络设备之间在该承载上的业务就无法通信。
如在完整性保护检查失败时,接收设备一律采用重建立的方式,则如果出现攻击者频繁发送攻击包,则终端设备将不断进行重建立过程,重建立过程会导致用户业务的中断,这样导致终端设备无法进行正常的业务。
针对上述问题,本申请实施例提供了一种通信方法和设备,能够确定数据包完整性检查失败的原因,进一步,使得接收端可以根据该数据包完整性检查失败的原因进行后续处理,保证了发送端和接收端之间的业务正常进行。
下面结合图2详细说明本申请实施例提供的一种通信方法。图2是本申请一个实施例的一种通信方法200的示意性流程图,该方法200可以应用在图1所示的场景中,当然也可以应用在其他通信场景中,本申请实施例在此不作限制。
如图2所示,该方法200可以包括以下内容。
在210中,接收设备确定数据无线承载DRB上的第一数据包完整性检查失败。
在220中,该接收设备向发送设备发送第一消息,该第一消息用于指示发生了完整性检查失败。
一种可能的方式中,该第一消息用于指示发生了完整性检查失败,也就意味该第一消息也可以隐式请求该发送设备向该接收设备发送对于该第一消息的响应;或者该第一消息用于请求该发送设备向该接收设备发送对于该第一消息的响应,也就是说隐式的指示了发生了完整性检查失败。
在230中,发送设备从接收设备接收该第一消息。
在240中,该发送设备根据该第一消息,向该接收设备发送对于该第一消息的响应,其中,该响应是经过完整性保护的。
应理解,该响应是经过完整性保护的即该发送设备对该响应进行了完整性保护,该发送设备根据完整性消息鉴权码的计算参数产生一个MAC-I,放在该响应中一起向接收设备发送。
在250中,该接收设备根据是否在预设时间内成功从该发送设备在该DRB上接收对于该第一消息的响应,确定该DRB上的该第一数据包完整性检查失败的原因。
一种可能的方式中,成功从该发送设备接收对于该第一消息的响应,指的是该接收设备收到经过完整性保护的响应并且进行完整性检查成功,如果没有收到响应或者该响应的完整性检查失败则说明没有成功从该发送设备接收对于该第一消息的响应。
因此,在本申请实施例中,接收设备在确定DRB上的第一数据包完整性检查失败时,向发送设备发送指示发生了完整性检查失败的第一消息,发送设备在接收到该第一消息后,向该接收设备发送对于该第一消息的响应,该响应是经过完整性保护的。该接收设备根据是否在预设时间内成功从该发送设备接收对于该第一消息的响应,确定该DRB上的该第一数据包完整性检查失败的原因,使得接收设备根据该数据包完整性检查失败的原因可以进行后续处理,保证了发送设备和接收设备之间的业务正常进行。
可选地,该第一消息为该DRB关联的包数据汇聚协议PDCP控制协议数据单元PDU;或该第一消息为无线资源控制RRC消息,用于指示发生了完整性检查失败。
具体而言,该第一消息为该DRB关联的包数据汇聚协议PDCP控制协议数据单元PDU,即接收设备在确定数据无线承载DRB上的第一数据包完整性检查失败时,则触发一个该DRB对应的PDCP控制PDU(该PDCP控制PDU是一个新的PDCP控制PDU),该PDCP控制PDU用于指示发生了完整性检查失败,由于该PDCP控制PDU是该发生第一数据包完整性检查失败的DRB对应的,也就是说,该PDCP控制PDU承载在该DRB上发送,因此不需要在PDCP控制PDU里指示DRB标识ID。发送设备在收到该第一消息后,在该DRB上发送对于该第一消息的响应。
在该第一消息为无线资源控制RRC消息时,该第一消息是在信令承载上发送的,即发送RRC消息。可选地,该RRC消息中携带第一数据包完整性检查失败的DRB信息,比如DRB ID,发送设备需要在指定的该DRB上回复对于该第一消息的响应,或者该RRC消息中不携带DRB信息,发送设备需要在该终端设备的所有的DRB上回复该对于该第一消息的响应。
可选地,该第一消息包括该第一数据包的计数COUNT值或该第一数据包的PDCP序号SN。
具体而言,在该第一消息是该DRB关联的包数据汇聚协议PDCP控制协议数据单元PDU或该第一消息为无线资源控制RRC消息时,该第一消息都可以携带发生完整性检查失败的第一数据包的COUNT值或PDCP SN序号。使得发送设备发送对于该第一消息的响应的COUNT值或PDCP SN序号大于该第一数据包的COUNT值或PDCP SN序号。
可选地,该响应为该发送端产生的第二数据包,该第二数据包与该DRB的PDCP数据PDU格式相同,该第二数据包包括第一指示信息,该第一指示信息用于指示该第二数据包为该响应;或
该响应为RRC消息,该RRC消息承载在该DRB上且该RRC消息与该DRB的PDCP数据PDU格式相同,该RRC消息包括第二指示信息,该第二指示信息用于指示该RRC消息为该响应;或
该响应为承载在该DRB上的业务数据包。
具体而言,发送设备在收到该第一消息后,生成一个响应,该响应为该发送设备产生的第二数据包,该第二数据包是该发送设备在收到该第一消息后构造的数据包,该第二数据包不属于该发送设备和该接收设备之间的业务数据包。该响应可以使用该DRB的PDCP数据PDU格式,即该响应“冒充”一个正常的用户数据包,但是该响应携带该第一指示信息,该第一指示信息用于指示这是一个响应,比如,使用一个bit来指明。该响应中的数据部分可以是发送设备自己生成的,比如随机产生的数据,或者是接收到的第一消息等。该响应与正常的用户数据包一样,进行加密和完整性保护。接收设备根据该第一指示信息获知该响应不是一个正常的用户数据包,从而不将该响应递交给更高层。
可选地,该第二数据包包括COUNT值或PDCP SN,该第二数据包包括的COUNT值或PDCP SN大于该第一数据包的COUNT值或该第一数据包的PDCP SN。
具体而言,当该响应是该第二数据包时,发送设备会将该承载上的下一个COUNT值或PDCP SN序号(该号不再分配给其他数据包)分配给该响应,即该响应“冒充”一个正常的用户数据包。该下一个COUNT值或PDCP SN序号即该发送设备当前已经分配的COUNT值或PDCP SN序号的下一个COUNT值或PDCP SN序号。以PDCP SN序号为例,该接收设备将PDCP SN序号6已经分配给了一个数据包,在该发送设备构造该第二数据包时,该第二数据包的PDCP SN序号为7。
在当前的现有技术中,定义了以下两种不同PDCP SN长度的PDCP数据PDU格式,如表1和表2所示。表1为含有12位PDCP SN的PDCP数据PDU格式,表2为含有18位PDCP SN的PDCP数据PDU格式,PDCP数据PDU是一个长度按字节排列的比特串,即8位的整数倍。PDCP PDU中每个参数字段的比特顺序都是以最左位为最高位,最右位为最低位。其中左边第一位D/C用于指示PDU为控制PDU还是数据PDU;R为预留位;表中的cont.表示连续的,如表1中,PDCP SN为12位,字节1的后四位和字节2的8位(字节2的PDCP SN(cont.)表示和字节1的PDCP SN相连);表中的optional为可选的,表示MAC-I值是可选的。
表1.含有12位PDCP SN的PDCP数据PDU格式
Figure PCTCN2019092055-appb-000001
表2.含有18位PDCP SN的PDCP数据PDU格式
Figure PCTCN2019092055-appb-000002
现有技术中,两种不同PDCP SN长度的PDCP数据PDU格式中均不包括指示信息,当该响应为该发送设备在收到该第一消息后构造的数据包时,由于该响应使用该DRB的PDCP数据PDU格式,即该响应“冒充”一个正常的用户数据包,但是该响应不是该发送设备和该接收设备之间的业务数据包,因此,该响应可以携带该第一指示信息,该第一指示信息用于指示这个数据包是一个“响应”。例如,可以新定义F字段,使用一个bit(如表3和表4所示中的一个R比特)来指明,该F字段用于指示这个数据包是一个响应。
表3.含有指示信息的12位PDCP SN的PDCP数据PDU格式
Figure PCTCN2019092055-appb-000003
表4.含有指示信息的18位PDCP SN的PDCP数据PDU格式
Figure PCTCN2019092055-appb-000004
应理解,表3和表4只是示出了一种包含该第一指示信息的PDCP数据PDU格式,该包含该第一指示信息的PDCP数据PDU还可以是其他的格式,如该第一指示信息使用两个比特位表示等,对于该包括第一指示信息的PDCP数据PDU格式本申请并不进行限定。
应理解,该响应还可以使用一个新的PDCP控制PDU格式,该PDCP控制PDU里携 带一个该DRB上的PDCP SN,该PDCP控制PDU基于该PDCP SN进行完整性保护。
该响应为RRC消息时,该RRC消息承载在该DRB上且该RRC消息与该DRB的PDCP数据PDU格式相同,该RRC消息包括第二指示信息,该第二指示信息用于指示该RRC消息为该响应,使得接收设备在PDCP层识别该特殊的“数据”并递交给RRC层,而不是递交到用户面的更高层,在PDCP的数据PDU格式里引入该第二指示信息,比如1bit,来指示这个RRC消息是一个响应。
该响应为承载在该DRB上的业务数据包时,即该响应不是一个专门的消息,而是一个在该DRB上收到的完整性检查成功的业务数据包。即,在该接收设备发送了该第一消息后,接收设备在该DRB上收到一个完整性检查成功的数据包,即认为该数据包为对于该第一消息的响应。
可选地,为了保证接收设备和发送设备之间的通信安全,该响应还可以进行加密。
可选地,该完整性检查成功的业务数据包的COUNT值大于完整性检查失败的第一数据包的COUNT值。
在本申请实施例中,该完整性检查成功的业务数据包的COUNT值大于完整性检查失败的第一数据包的COUNT值,可以避免由于不是按序接收从而产生错误的“响应”。即由于底层的传输,失败的数据包先到达接收端,失败数据包之前的(COUNT值更小的)数据包后到达,避免这些后到达的数据包被错误认为是“响应”。
可选地,该DRB上的第一数据包完整性检查失败,包括:该数据无线承载上的任一个第一数据包完整性检查失败;或该数据无线承载上的连续N个第一数据包完整性检查失败;或在第一时间段内该数据无线承载上的M个第一数据包完整性检查失败;其中,N>1,M>1。
具体而言,接收设备在该数据无线承载上的任一个第一数据包完整性检查失败时,发送该第一消息;或接收设备在该数据无线承载上的连续N个第一数据包完整性检查失败时,息;或接收设备在第一时间段内该数据无线承载上的M个第一数据包完整性检查失败时,发送该第一消息。接收设备在该数据无线承载上的连续N个第一数据包完整性检查失败时或接收设备在第一时间段内该数据无线承载上的M个第一数据包完整性检查失败时,发送该第一消息,可以减少该第一消息的发送次数,减少信令开销。
应理解,N,M地具体数值可以由网络设备配置,也可以是接收设备和发送设备事先约定的,还可以是协议规定的。
可选地,该接收端根据是否在预设时间内成功从该发送端接收对于该第一消息的响应,确定该DRB上的该第一数据包完整性检查失败的原因,包括:
当该接收端在预设时间内成功从该发送端接收对于该第一消息的响应时,该接收端确定该DRB上的第一数据包完整性检查失败的原因不是安全参数失步;或当该接收端在预设时间内没有成功从该发送端接收对于该第一消息的响应时,该接收端确定该DRB上的第一数据包完整性检查失败的原因是安全参数失步。
具体而言,如果在该预设时间内在该DRB上成功从该发送端接收对于该第一消息的响应时,则说明未发生安全参数失步,可能是由于攻击,或者CRC失败等情况引起的,则接收设备丢弃掉完整性检查失败的第一数据包即可。
如果该响应是该第二数据包,由于该响应并不是一个正常的用户数据,因此,接收设 备不将该第二数据包的数据部分递交给高层,而是直接丢弃该响应;或
如果该响应为RRC消息时,该接收设备将该RRC消息传递给RRC层,由RR层进行处理,如丢弃该响应;或如果该响应消息为该发送设备在该DRB上发送的业务数据包时,接收设备将该业务数据包的数据部分递交给高层进行处理。
可选地,在该接收端在确定数据无线承载DRB上的第一数据包完整性检查失败时,向发送设备发送第一消息之后,该方法还包括:
当在该预设时间内,该接收端确定该数据无线承载上的第三数据包完整性检查失败时,不向该发送端发送该第一消息。
具体而言,该接收端在确定数据无线承载DRB上的第一数据包完整性检查失败时,向发送设备发送第一消息之后,在该预设时间内,如果再次发生了该承载数据的完整性检查失败,不触发该第一消息,直接丢弃该数据包,或者在发送该第一消息后的第一时间段内(该第一时间段小于或等于该预设时间)不再发送该第一消息,以减少信令开销。
可选地,该方法还包括:在该向发送端发送该第一消息时,该接收端开启定时器,该定时器用于该预设时间段的定时,
在该定时器运行期间,该接收端收到该响应时,停止该定时器计时;或
在该定时器运行期间,该接收端没有收到该响应时,确定该DRB上的第一数据包完整性检查失败的原因是安全参数失步。
具体而言,在该向发送端发送该第一消息时,该接收端开启定时器,该定时器的定时时长为该预设时间,该定时器是承载级的,每个DRB可以对应一个定时器。在该定时器运行过程中,即使再次发生数据包完整性检查失败,不再为该DRB触发该第一消息。在该定时器运行期间,该接收端收到该响应时,确定该DRB上的第一数据包完整性检查失败的原因不是安全参数失步,并停止该定时器计时,或者在该定时器运行期间,该接收端没有收到该响应时,确定该DRB上的第一数据包完整性检查失败的原因是安全参数失步。
可选地,在确定出该DRB上的第一数据包完整性检查失败的原因是安全参数失步时,该方法还包括:当该接收端是终端设备时,该接收端发起RRC重建立或者该接收端向该发送端发送该DRB上的第一数据包完整性检查失败的原因;或当该接收端是接入网设备时,该接收端触发该发送端进行RRC重建立或者该接收端重配置该DRB。
具体而言,如果接收设备是终端设备时,则终端设备发起RRC重建立,或终端设备通过发送RRC消息通知接入网设备发生了安全参数失步(以通知接入网设备重配置该DRB,比如释放并重新增加该DRB)等;如果接收设备是接入网设备,则释放并重新增加该DRB,或触发UE进行RRC重建立,或释放该UE进入空闲态等。
因此,接收设备根据确定的完整性检查失败的原因,即是否是安全参数失步引起的,可以执行不同的操作,保证了发送设备和接收设备之间的业务正常进行。
图3是根据本申请的通信装置300的示意性框图。该通信装置对应实现前面所述的各个实施例中接收端的相应操作或者步骤,如图3所示,该通信装置300包括以下模块。
确定模块310,用于确定数据无线承载DRB上的第一数据包完整性检查失败;
发送模块320,用于向发送端发送第一消息,所述第一消息用于指示发生了完整性检查失败;
所述确定模块310还用于根据是否在预设时间内在该DRB上成功从所述发送端接收 对于所述第一消息的响应,确定所述DRB上的所述第一数据包完整性检查失败的原因,其中,所述响应是经过完整性保护的。
可选地,所述确定模块310和所述发送模块320用于执行本申请的一种通信方法200中接收设备的各个操作,可以进一步参考方法实施例中的相应描述,为了简洁,在此不再赘述。
可以理解的是,上述通信装置300可以是接收设备,也可以是可用于接收设备的部件(例如芯片或者电路),本申请实施例对此不作限定。
图4是根据本申请的通信装置400的示意性框图。如图4所示,该通信装置400包括以下模块。
接收模块410,用于从接收端接收第一消息,所述第一消息用于指示发生了完整性检查失败。
发送模块420,用于根据所述第一消息,向所述接收端发送对于所述第一消息的响应,其中,所述响应是经过完整性保护的。
可选地,所述接收模块410和所述发送模块420用于执行本申请的一种通信方法200中发送设备的各个操作,可以进一步参考方法实施例中的相应描述,为了简洁,在此不再赘述。
可以理解的是,上述通信装置400可以是发送设备,也可以是可用于发送设备的部件(例如芯片或者电路),本申请实施例对此不作限定。
图5示出了本申请提供的通信装置500的示意性框图,所述通信设备500包括:
存储器510,用于存储程序,所述程序包括代码;
收发器520,用于实现相应的通信功能;
处理器530,用于执行存储器510中的程序代码。
可选地,当所述代码被执行时,所述处理器530可以实现方法200的各个操作,为了简洁,在此不再赘述。收发器520用于在处理器530的驱动下执行具体的信号收发。
通信装置500可以为上述接收设备和发送设备中的任意一个,执行确定模块的操作,收发器可以包括发射机和/或接收机,分别执行发送模块及接收模块相应的步骤。
本申请一实施例还提供了一种通信装置600,如图6所示。该通信装置600可以包括收发器601。可选的,还可以包括至少一个处理器602。可选的,还可以包括存储器603。
其中,处理器602,存储器603以及通信接口收发器601三者之间可以通过通信线路连接。
处理器602可以是一个中央处理器(central processing unit,CPU),也可以是特定集成电路(application specific integrated circuit,ASIC),或者是被配置成实施本申请实施例的一个或多个集成电路,例如:一个或多个数字信号处理器(digital signal processor,DSP),或,一个或者多个现场可编程门阵列(field programmable gate array,FPGA)。
存储器603可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字 通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于包括或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。一种可能的设计中,存储器603可以独立于处理器602存在,此时,存储器603可以通过通信线路与处理器602相连接。又一种可能的设计中,存储器603也可以和处理器602集成在一起。
存储器603可以用于存储执行指令或者应用程序代码,并由处理器602来控制执行,实现本申请上述实施例提供的通信方法;和/或,也可以用于暂存一些数据和指令信息等。一种可能的方式中,该存储器603例如可以为高速缓存。
应注意,在具体实现过程中,装置600还可以包括其他硬件器件,本文不再一一列举。
在本申请的一个示例中,图3的确定模块310可以通过处理器602实现,图3中的发送模块320可以通过收发器601实现,图4的接收模块410和发送模块420可以通过收发器601实现。
本领域普通技术人员可知,上述方法中的全部或部分步骤可以通过程序指令相关的硬件完成,该程序可以存储于一计算机可读存储介质中,该计算机可读存储介质如ROM、RAM和光盘等。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件程序实现时,可以全部或部分地以计算机程序产品的形式来实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、网络设备、用户设备、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质 传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或者数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可以用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带),光介质(例如,数字视频光盘(digital video disc,DVD))、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (19)

  1. 一种通信方法,其特征在于,包括:
    接收端确定数据无线承载DRB上的第一数据包完整性检查失败;
    所述接收端向发送端发送第一消息,所述第一消息用于指示发生了完整性检查失败;
    所述接收端根据是否在预设时间内在所述DRB上成功从所述发送端接收对于所述第一消息的响应,确定所述DRB上的所述第一数据包完整性检查失败的原因,其中,所述响应是经过完整性保护的。
  2. 根据权利要求1所述的方法,其特征在于,所述第一消息为所述DRB关联的包数据汇聚协议PDCP控制协议数据单元PDU;或
    所述第一消息为无线资源控制RRC消息,所述RRC消息用于指示发生了完整性检查失败。
  3. 根据权利要求2所述的方法,其特征在于,所述第一消息包括所述第一数据包的计数COUNT值或所述第一数据包的PDCP序号SN。
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,所述响应为所述发送端产生的第二数据包,所述第二数据包与所述DRB的PDCP数据PDU格式相同,所述第二数据包包括第一指示信息,所述第一指示信息用于指示所述第二数据包为所述响应;或
    所述响应为RRC消息,所述RRC消息承载在所述DRB上且所述RRC消息与所述DRB的PDCP数据PDU格式相同,所述RRC消息包括第二指示信息,所述第二指示信息用于指示所述RRC消息为所述响应;或
    所述响应为承载在所述DRB上的业务数据包。
  5. 根据权利要求4所述的方法,其特征在于,所述第二数据包包括COUNT值或PDCP SN,所述第二数据包包括的COUNT值或PDCP SN大于所述第一数据包的COUNT值或所述第一数据包的PDCP SN。
  6. 根据权利要求1至5中任一项所述的方法,其特征在于,所述DRB上的第一数据包完整性检查失败,包括:
    所述数据无线承载上的任一个第一数据包完整性检查失败;或
    所述数据无线承载上的连续N个第一数据包完整性检查失败;或
    在第一时间段内所述数据无线承载上的M个第一数据包完整性检查失败;
    其中,N>1,M>1。
  7. 根据权利要求1至6中任一项所述的方法,其特征在于,所述接收端根据是否在预设时间内成功从所述发送端接收对于所述第一消息的响应,确定所述DRB上的所述第一数据包完整性检查失败的原因,包括:
    当所述接收端在预设时间内成功从所述发送端接收对于所述第一消息的响应时,所述接收端确定所述DRB上的第一数据包完整性检查失败的原因不是安全参数失步;或
    当所述接收端在预设时间内没有成功从所述发送端接收对于所述第一消息的响应时,所述接收端确定所述DRB上的第一数据包完整性检查失败的原因是安全参数失步。
  8. 根据权利要求1至7中任一项所述的方法,其特征在于,在所述接收端在确定数 据无线承载DRB上的第一数据包完整性检查失败时,向发送端发送第一消息之后,所述方法还包括:
    当在所述预设时间内,所述接收端确定所述数据无线承载上的第三数据包完整性检查失败时,不向所述发送端发送所述第一消息。
  9. 根据权利要求8所述的方法,其特征在于,所述方法还包括:
    在所述向发送端发送所述第一消息时,所述接收端开启定时器,所述定时器用于所述预设时间段的定时,
    在所述定时器运行期间,所述接收端收到所述响应时,停止所述定时器计时;或
    在所述定时器运行期间,所述接收端没有收到所述响应时,确定所述DRB上的第一数据包完整性检查失败的原因是安全参数失步。
  10. 根据权利要求1至9中任一项所述的方法,其特征在于,在确定出所述DRB上的第一数据包完整性检查失败的原因是安全参数失步时,所述方法还包括:
    当所述接收端是终端设备时,所述接收端发起RRC重建立或者所述接收端向所述发送端发送所述DRB上的第一数据包完整性检查失败的原因;或
    当所述接收端是接入网设备时,所述接收端触发所述发送端进行RRC重建立或者所述接收端重配置所述DRB。
  11. 一种通信方法,其特征在于,包括:
    发送端从接收端接收第一消息,所述第一消息用于指示发生了完整性检查失败;
    所述发送端根据所述第一消息,向所述接收端发送对于所述第一消息的响应,其中,所述响应是经过完整性保护的。
  12. 根据权利要求11所述的方法,其特征在于,所述第一消息为数据无线承载DRB关联的包数据汇聚协议PDCP控制协议数据单元PDU,所述DRB上的第一数据包完整性检查失败;或
    所述第一消息为无线资源控制RRC消息,所述RRC消息用于指示发生了完整性检查失败。
  13. 根据权利要求12所述的方法,其特征在于,所述第一消息包括所述第一数据包的COUNT值或所述第一数据包的PDCP序号SN。
  14. 根据权利要求11至13中任一项所述的方法,其特征在于,
    所述响应为所述发送端产生的第二数据包,所述第二数据包与所述DRB的PDCP数据PDU格式相同,所述第二数据包包括第一指示信息,所述第一指示信息用于指示所述第二数据包为所述响应;或
    所述响应为RRC消息,所述RRC消息承载在所述DRB上且所述RRC消息与所述DRB的PDCP数据PDU格式相同,所述RRC消息包括第二指示信息,所述第二指示信息用于指示所述RRC消息为所述响应;或
    所述响应为承载在所述DRB上的业务数据包;
    其中,所述DRB上的第一数据包完整性检查失败。
  15. 根据权利要求14所述的方法,其特征在于,所述第二数据包包括COUNT值或PDCP SN,所述第二数据包包括的COUNT值或PDCP SN大于所述第一数据包的COUNT值或所述第一数据包的PDCP SN。
  16. 一种通信装置,其特征在于,所述通信装置包括用于执行权利要求1至10中任一项权利要求所述的方法的模块。
  17. 一种通信装置,其特征在于,所述通信装置包括用于执行权利要求10至15中任一项权利要求所述的方法的模块。
  18. 一种计算机存储介质,其特征在于,所述计算机存储介质存储有程序指令,当所述指令被执行时,使得通信装置可以执行如权利要求1至10中任一项权利要求所述的方法。
  19. 一种计算机存储介质,其特征在于,所述计算机存储介质存储有程序指令,当所述指令被执行时,使得通信装置可以执行如权利要求11至15中任一项权利要求所述的方法。
PCT/CN2019/092055 2018-06-21 2019-06-20 通信方法和装置 WO2019242680A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810646081.0A CN110636507A (zh) 2018-06-21 2018-06-21 通信方法和装置
CN201810646081.0 2018-06-21

Publications (1)

Publication Number Publication Date
WO2019242680A1 true WO2019242680A1 (zh) 2019-12-26

Family

ID=68966343

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/092055 WO2019242680A1 (zh) 2018-06-21 2019-06-20 通信方法和装置

Country Status (2)

Country Link
CN (1) CN110636507A (zh)
WO (1) WO2019242680A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113747518A (zh) * 2020-05-28 2021-12-03 华为技术有限公司 一种通信方法及装置
CN117715109A (zh) * 2020-11-24 2024-03-15 展讯半导体(成都)有限公司 通信处理方法、设备、装置及存储介质
CN115942301A (zh) * 2021-09-18 2023-04-07 维沃移动通信有限公司 多播业务的状态变量指示方法和设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010121408A1 (zh) * 2009-04-20 2010-10-28 深圳华为通信技术有限公司 一种对消息完整性保护检查失败的处理方法、设备和系统
CN102714794A (zh) * 2010-02-02 2012-10-03 Lg电子株式会社 无线通信系统中选择性应用pdcp功能的方法
EP3331314A1 (en) * 2016-12-02 2018-06-06 HTC Corporation Handling data transmissions after detecting a failure in a wireless communication system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2288195B1 (en) * 2009-08-20 2019-10-23 Samsung Electronics Co., Ltd. Method and apparatus for operating a base station in a wireless communication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010121408A1 (zh) * 2009-04-20 2010-10-28 深圳华为通信技术有限公司 一种对消息完整性保护检查失败的处理方法、设备和系统
CN102714794A (zh) * 2010-02-02 2012-10-03 Lg电子株式会社 无线通信系统中选择性应用pdcp功能的方法
EP3331314A1 (en) * 2016-12-02 2018-06-06 HTC Corporation Handling data transmissions after detecting a failure in a wireless communication system

Also Published As

Publication number Publication date
CN110636507A (zh) 2019-12-31

Similar Documents

Publication Publication Date Title
US11930554B2 (en) Radio link failure handling method and related product
WO2018224013A1 (zh) 波束失败处理方法、终端及网络设备
EP3611995A1 (en) Communication method, communication device and communication system therefor
BR112020020925A2 (pt) facilitando remapeamento de fluxo de qualidade de serviço utilizando uma camada de protocolo de adaptação de dados de serviço
WO2019242680A1 (zh) 通信方法和装置
BRPI0909884B1 (pt) método e aparelho para entregar notificação de retransmissão de estrato não acesso
WO2018130059A1 (zh) 数据包传输方法及装置
TW200816700A (en) Method and apparatus of adaptive sequence numbering in a wireless communication system
JP2021513245A (ja) 通信方法および装置
GB2572631A (en) Packet data convergence protocol (PDCP) duplication deactivation
CN111556506B (zh) 异常链路的处理方法及设备
CN117596719A (zh) Rrc连接恢复中的pdcp count处理
TWI772688B (zh) 無線電資源控制訊息分段
US11523382B2 (en) Resource determining method and apparatus, and resource indication method and apparatus
WO2018121462A1 (zh) 一种多载波中传输数据的方法、终端设备和网络设备
US8345649B2 (en) Method for indication of consecutive data units in a RAN
WO2019090626A1 (zh) 重传数据的方法和设备
WO2020164510A1 (zh) 通信方法、通信装置和计算机可读存储介质
WO2018126450A1 (zh) 无线通信的方法和设备
EP3860209B1 (en) Data transmission method and device
US20140024344A1 (en) Mobile communication method, radio base station, mobile management node, and mobile station
CN113783665B (zh) 通信方法及装置
CN112825593B (zh) 信号传输方法及装置
EP4145880A1 (en) Communication method and apparatus
WO2024031042A1 (en) Nr mobility – security considerations for l1/l2 mobility switching of an spcell

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19822869

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19822869

Country of ref document: EP

Kind code of ref document: A1