WO2020024296A1 - Base station switching method and apparatus, and network device - Google Patents
Base station switching method and apparatus, and network device Download PDFInfo
- Publication number
- WO2020024296A1 WO2020024296A1 PCT/CN2018/098673 CN2018098673W WO2020024296A1 WO 2020024296 A1 WO2020024296 A1 WO 2020024296A1 CN 2018098673 W CN2018098673 W CN 2018098673W WO 2020024296 A1 WO2020024296 A1 WO 2020024296A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- base station
- information
- key information
- key
- security
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
Definitions
- the embodiments of the present application relate to the field of mobile communication technologies, and in particular, to a base station handover method and device, and a network device.
- the communication between the terminal and the network can be in the form of dual-link or multi-link, so that data can be successfully transmitted on at least one link.
- Dual connectivity (DC, Dual Connectivity) network can realize dual-link communication.
- DC network when the terminal (UE, User Equipment) is migrated, if two transmission links are switched at the same time, or one link is switched If the switchover of another link is not completed yet, data will be completely interrupted in a short period of time.
- the embodiments of the present application provide a base station handover method and device, and a network device.
- the first base station receives first instruction information sent by a second base station, where the first instruction information is used to instruct execution of a conversion process between a primary node and a secondary node, the first base station is a secondary node, and the second base station is The master node.
- a receiving unit configured to receive first instruction information sent by a second base station, where the first instruction information is used to instruct execution of a conversion process between a primary node and a secondary node, where the first base station is a secondary node, and the second The base station is the master node.
- the network device provided in the embodiment of the present application includes a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to execute the base station handover method described above.
- the chip provided in the embodiment of the present application is used to implement the foregoing base station handover method.
- the chip includes a processor for invoking and running a computer program from a memory, so that a device installed with the chip executes the base station handover method described above.
- the computer-readable storage medium provided in the embodiment of the present application is used to store a computer program, and the computer program causes a computer to execute the foregoing base station handover method.
- the computer program product provided in the embodiment of the present application includes computer program instructions, and the computer program instructions cause a computer to execute the foregoing base station handover method.
- the computer program provided in the embodiment of the present application when run on a computer, causes the computer to execute the above-mentioned base station handover method.
- the first base station receives the first instruction information sent by the second base station, where the first instruction information is used to instruct execution of a conversion process between the primary node and the secondary node, and the first base station is the secondary node, so
- the second base station is described as the master node, so that the role switching between the primary node and the secondary node in the DC network is realized.
- This role switching process can ensure that there is always a node that can normally perform data transmission, thus avoiding the terminal moving.
- the occurrence of data interruption further solves the problem of how to use the key of each node during the role switching process and after the role switching is completed.
- FIG. 1 is a schematic diagram of a communication system architecture according to an embodiment of the present application.
- FIG. 3 is a flowchart of adding an SN by an MN according to an embodiment of the present application.
- FIG. 5 is a schematic diagram of derivation of a secret key on the SN side according to an embodiment of the present application.
- FIG. 6 is a schematic diagram of horizontal and vertical derivation of key derivation provided in an embodiment of the present application.
- FIG. 7 is a flowchart of a handover based on an N2 interface according to an embodiment of the present application.
- FIG. 8 is a flowchart of a handover based on an Xn interface according to an embodiment of the present application.
- FIG. 9 is a first schematic flowchart of a base station handover method according to an embodiment of the present application.
- FIG. 10 is a schematic diagram of forwarding information through AMF according to an embodiment of the present application.
- FIG. 11 is a second schematic flowchart of a base station handover method according to an embodiment of the present application.
- FIG. 12 is a third flowchart of a base station handover method according to an embodiment of the present application.
- FIG. 13 is a schematic structural composition diagram of a base station switching device according to an embodiment of the present application.
- FIG. 14 is a schematic structural diagram of a communication device according to an embodiment of the present application.
- 15 is a schematic structural diagram of a chip according to an embodiment of the present application.
- FIG. 16 is a schematic block diagram of a communication system according to an embodiment of the present application.
- GSM Global System for Mobile
- CDMA Code Division Multiple Access
- Wideband Code Division Multiple Access Wideband Code Division Multiple Access
- GPRS General Packet Radio Service
- LTE Long Term Evolution
- FDD Frequency Division Duplex
- TDD Time Division Duplex
- UMTS Universal Mobile Telecommunication System
- WiMAX Worldwide Interoperability for Microwave Access
- the communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal device 120 (or a communication terminal or a terminal).
- the network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminal devices located within the coverage area.
- the network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, or a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system.
- BTS Base Transceiver Station
- NodeB NodeB
- the network device may be a mobile switching center, relay station, access point, vehicle equipment, Wearable devices, hubs, switches, bridges, routers, network-side devices in 5G networks, or network devices in public land mobile networks (PLMN) that will evolve in the future.
- PLMN public land mobile networks
- the communication system 100 further includes at least one terminal device 120 located within a coverage area of the network device 110.
- terminal equipment used herein includes, but is not limited to, connection via wired lines, such as via Public Switched Telephone Networks (PSTN), Digital Subscriber Line (DSL), digital cable, direct cable connection ; And / or another data connection / network; and / or via a wireless interface, such as for cellular networks, Wireless Local Area Networks (WLAN), digital television networks such as DVB-H networks, satellite networks, AM- FM broadcast transmitter; and / or another terminal device configured to receive / transmit communication signals; and / or Internet of Things (IoT) devices.
- PSTN Public Switched Telephone Networks
- DSL Digital Subscriber Line
- WLAN Wireless Local Area Networks
- DVB-H Digital Video Broadband
- satellite networks satellite networks
- AM- FM broadcast transmitter AM- FM broadcast transmitter
- IoT Internet of Things
- a terminal device configured to communicate through a wireless interface may be referred to as a “wireless communication terminal”, a “wireless terminal”, or a “mobile terminal”.
- mobile terminals include, but are not limited to, satellite or cellular phones; personal communications systems (PCS) terminals that can combine cellular radiotelephones with data processing, facsimile, and data communications capabilities; can include radiotelephones, pagers, Internet / internal PDA with network access, web browser, notepad, calendar, and / or Global Positioning System (GPS) receiver; and conventional laptop and / or palm-type receivers or others including radiotelephone transceivers Electronic device.
- PCS personal communications systems
- GPS Global Positioning System
- a terminal device can refer to an access terminal, user equipment (User Equipment), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent, or User device.
- the access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Processing (PDA), and wireless communication.
- terminal devices 120 may perform terminal direct device (D2D) communication.
- D2D terminal direct device
- the 5G system or the 5G network may also be referred to as a New Radio (NR) system or an NR network.
- NR New Radio
- FIG. 1 exemplarily shows one network device and two terminal devices.
- the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminal devices. The embodiment does not limit this.
- the communication system 100 may further include other network entities such as a network controller, a mobility management entity, and the like in this embodiment of the present application is not limited thereto.
- network entities such as a network controller, a mobility management entity, and the like in this embodiment of the present application is not limited thereto.
- the device having a communication function in the network / system in the embodiments of the present application may be referred to as a communication device.
- the communication device may include a network device 110 and a terminal device 120 having a communication function, and the network device 110 and the terminal device 120 may be specific devices described above, and are not described herein again.
- the communication device may also include other devices in the communication system 100, such as other network entities such as a network controller, a mobile management entity, and the like, which is not limited in the embodiments of the present application.
- FIG. 2 shows a DC network architecture formed by a primary access network (M-RAN, Master RAN) node and a secondary access network (S-RAN, Secondary RAN) node.
- M-RAN primary access network
- S-RAN Secondary RAN
- FIG. 3 is a flowchart of adding an SN to the MN
- FIG. 4 is a flowchart of modifying the SN of the MN.
- the embodiment of the present application can implement the MN And SN, and solve related key usage issues.
- the secret key used by the MN and the SN for role switching (you can think of adding an SN first and then turning this SN into an MN) and the normal handover process (which can be considered as switching from one MN to another MN)
- the mechanism of keys is different.
- the key used on the SN side is the S-KgNB generated by the derivation method shown in Figure 5, which is not the same as the key generated by the ordinary MN handover process. same.
- the key for handover is derived using the ⁇ NCC, NH ⁇ information, see FIG. 6.
- Figure 6 shows the horizontal and vertical derivation of the secret key.
- the base station When the base station has unused ⁇ NCC, NH ⁇ information, it will use the unused information to derive a new secret key KgNB when it is handed over.
- the KgNB used derives KgNB *, which is a horizontal derivative.
- the switching based on the N2 interface can be referred to FIG. 7, and the switching based on the Xn interface can be referred to FIG. 8.
- FIG. 9 is a first flowchart of a base station handover method according to an embodiment of the present application. As shown in FIG. 9, the base station handover method includes the following steps:
- Step 901 The first base station receives first instruction information sent by a second base station, where the first instruction information is used to instruct execution of a conversion process between a primary node and a secondary node, the first base station is a secondary node, and the first The second base station is the master node.
- the first base station and the second base station are two base stations in a DC network, or two base stations in a multi-connection network, where the first base station is an SN and the second base station is an MN.
- the MN decides to perform role conversion with the SN.
- the MN sends first instruction information to the SN, where the first instruction information is used to instruct execution of a conversion process between the primary node and the secondary node.
- the key of each node may be implemented in the following manner.
- the first indication information carries first key information, and the first key information belongs to the master node key information, and is used by the first base station as a master node.
- the MN derives KgNB * and sends it to the SN for use by the SN, so that the first base station becomes the MN to work.
- the first key information is generated by the second base station in the following manner:
- the first key information is generated according to the currently used second key information.
- the first security information includes NCC (Next Hope Chaining) information and NH (Next Hop) information.
- KgNB * may be derived in a horizontal or vertical mode.
- the first base station may perform integrity protection and / or generate an encryption protection key based on the first key information.
- the first key information such as KgNB *
- the first base station serves as the primary node to generate third key information
- the third The key information belongs to the master node key information, wherein the third key information is different from the first key information.
- the first base station as a new MN derives a new KgNB, which is used to prevent the original MN (that is, the second base station) from knowing its secret key.
- the first base station serves as the primary node to generate fourth key information, and the fourth The key information belongs to the secondary node key information; the first base station sends the fourth key information to the second base station.
- the first base station After the roles of the first base station and the second base station are changed, the first base station generates a new S-KgNB and sends the new S-KgNB to the second base station for use.
- the first key information (such as KgNB *) is sent to the terminal by the first base station or the second base station, so that the terminal can use the same key information with the new MN.
- Manner 2 The first base station generates first key information based on unused first security information, where the first key information belongs to the master node key information and is used by the first base station as a master node.
- the first base station derives KgNB by itself using unused ⁇ NCC, NH ⁇ information.
- the first base station acquires the first security information in at least one of the following ways:
- the first base station acquires the first security information from the second base station; for example, the first security information is carried in the first indication information, and the first base station receives the first security information After the instruction information, the first security information is obtained from the first instruction information.
- the first base station acquires the first security information from a first core network element.
- the first base station obtains the first security information from an AMF.
- the first safety information includes NCC information and / or NH information.
- the first base station serves as the primary node to generate fourth key information, and the fourth The key information belongs to the secondary node key information; the first base station sends the fourth key information to the second base station.
- the first base station After the roles of the first base station and the second base station are changed, the first base station generates a new S-KgNB and sends the new S-KgNB to the second base station for use.
- the first key information (such as KgNB *) is sent to the terminal by the first base station, so that the terminal can use the same key information with the new MN.
- the first security information is sent to the terminal by the first base station or the second base station, so that the terminal can derive first key information (such as KgNB *) based on the first security information.
- the information sent by the second base station to the first base station includes the first indication information, and may further include first security information and / or first key information
- the first base station may pass the first An interface (Xn interface) between the base station and the second base station receives the first instruction information and / or the first security information and / or the first key information sent by the second base station; or, the first A base station receives the first indication information and / or the first security information and / or the first key information from the second base station forwarded by the network element of the first core network; or the first base station receives the first The first security information sent by the core network element, and the first instruction information and / or the first key information forwarded from the second base station.
- the first core network element may be AMF.
- the first core network element may send its own information to the first base station, or it may forward the information from the second base station to the first base station.
- the content sent by the second base station to the network element of the first core network may be any information in the first instruction information, the first security information, and the first key information (such as any 1 information or any 2 information or 3 information).
- Information the content sent by the first core network element to the first base station may be any of the first indication information, the first security information, and the first key information (such as any 1 information or any 2 information or 3 Messages).
- the MN sends a role change request message to the AMF, and the AMF sends a role change request message to the SN, which carries the first security information NCC and NH.
- the first indication information carries a role change request message and is indirectly sent to the SN through the AMF, during which the AMF can generate the latest NCC and NH for the target SN to use.
- the first key information or the second security information is transmitted by the first base station or the second base station.
- the base station sends to the terminal; or the first key information or the second security information is transparently transmitted to the terminal by the first core network element through the first base station or the second base station.
- the first core network element may be AMF.
- the second security information is NCC information corresponding to a currently used key or a new key.
- the first key information or the second security information is used by the terminal to perform a process of communicating with the first base station based on the first key information, or based on the second
- the security information derives a new secret key, and communicates with the first base station based on the new secret key.
- the derived new key KgNB
- the integrity of the control plane and / or user plane and / or the encryption key to communicate with the base station, instead of directly using KgNB for communication.
- the types of the MN and the SN may be the same or different.
- one of the MN and the SN is an NR base station (gNB), and the other is an LTE base station (eNB).
- MN and SN are both NR base stations (gNB).
- MN and SN are both LTE base stations (eNBs).
- KgNB its corresponding key
- KeNB its corresponding key
- FIG. 11 is a second schematic flowchart of a base station handover method according to an embodiment of the present application. As shown in FIG. 11, the base station handover method includes the following steps:
- the MN sends a role change request message to the SN.
- the role transition request message includes first indication information, where the first indication information is used to instruct execution of a conversion process between the primary node and the secondary node, and the first indication information carries first key information (KgNB *),
- the first key information (KgNB *) is derived by the MN in a horizontal or vertical mode by the method shown in FIG. 6.
- the SN sends a confirmation message to the MN.
- This step is optional.
- the MN sends a role change notification message to the UE.
- the role change notification message carries the first key information (KgNB *).
- the UE sends a confirmation message to the MN.
- This step is optional.
- the MN when the MN and the SN coexist, the MN provides KgNB * for the SN. Since the key used by the SN is the key belonging to the master node, the SN can use the key as the master node to work.
- FIG. 12 is a third flowchart of a base station handover method according to an embodiment of the present application. As shown in FIG. 12, the base station handover method includes the following steps:
- the MN sends a role change request message to the SN.
- the role transition request message includes first indication information, where the first indication information is used to instruct execution of a transition process between the primary node and the secondary node.
- the SN sends a role change notification message to the AMF.
- the AMF returns a message to the SN, which carries the unused first security information ⁇ NCC, NH ⁇ .
- the SN sends a confirmation message to the MN.
- the MN sends a role change notification message to the UE, where the message carries unused first security information ⁇ NCC, NH ⁇ .
- the SN sends a role change notification message to the UE, where the message carries unused first security information ⁇ NCC, NH ⁇ .
- FIG. 13 is a schematic structural composition diagram of a base station switching device according to an embodiment of the present application. As shown in FIG. 13, the device includes:
- the receiving unit 1301 is configured to receive first instruction information sent by a second base station, where the first instruction information is used to instruct execution of a conversion process between a primary node and a secondary node, where the first base station is a secondary node, and the first The second base station is the master node.
- the first indication information carries first key information, and the first key information belongs to the master node key information and is used by the first base station as a master node.
- the first key information is generated by the second base station in the following manner:
- the first key information is generated according to the currently used second key information.
- the device further includes:
- the security processing unit 1302 is configured to perform integrity protection and / or generate an encryption protection key based on the first key information.
- the device further includes:
- the first generating unit 1303 is configured to generate third key information, where the third key information belongs to the master node key information, and the third key information is different from the first key information.
- the device further includes:
- the second generating unit 1304 is configured to generate first key information based on the unused first security information, where the first key information belongs to the master node key information and is used by the first base station as the master node.
- the device further includes:
- the acquiring unit 1305 is configured to acquire the first security information from the second base station; and / or acquire the first security information from a first core network element.
- the first security information is carried in the first instruction information, and the obtaining unit acquires the first security information from the first instruction information generated by the second base station.
- the first security information includes NCC information and / or NH information.
- the device further includes:
- a third generating unit 1306, configured to generate fourth key information, where the fourth key information belongs to the secondary node key information
- the sending unit 1307 is configured to send the fourth key information to the second base station.
- the receiving unit 1301 is configured to receive the first instruction information and / or the first security sent by the second base station through an interface between the first base station and the second base station.
- Information and / or first key information or receiving the first indication information and / or first security information and / or first key information from the second base station and forwarded by the first core network element; Or, receive the first security information sent by the network element of the first core network, and the first indication information and / or the first key information forwarded from the second base station.
- the first key information or the second security information is sent to the terminal by the first base station or the second base station; or the first key information or the second security information is sent by the The first core network element is transparently transmitted to the terminal through the first base station or the second base station.
- the second security information is NCC information corresponding to a currently used key or a new key.
- the first key information or the second security information is used by the terminal to perform a process of communicating with the first base station based on the first key information, or derived based on the second security information.
- a new secret key and communicating with the first base station based on the new secret key.
- FIG. 14 is a schematic structural diagram of a communication device 600 according to an embodiment of the present application.
- the communication device may be a network device.
- the communication device 600 shown in FIG. 14 includes a processor 610, and the processor 610 may call and run a computer program from a memory to implement the method in the embodiment of the present application.
- the communication device 600 may further include a memory 620.
- the processor 610 may call and run a computer program from the memory 620 to implement the method in the embodiment of the present application.
- the memory 620 may be a separate device independent of the processor 610, or may be integrated in the processor 610.
- the communication device 600 may further include a transceiver 630, and the processor 610 may control the transceiver 630 to communicate with other devices, and specifically, may send information or data to other devices, or receive other Information or data sent by the device.
- the transceiver 630 may include a transmitter and a receiver.
- the transceiver 630 may further include antennas, and the number of antennas may be one or more.
- the communication device 600 may specifically be a network device according to the embodiment of the present application, and the communication device 600 may implement a corresponding process implemented by the network device in each method of the embodiment of the present application. For brevity, details are not described herein again. .
- the communication device 600 may specifically be a mobile terminal / terminal device according to the embodiment of the present application, and the communication device 600 may implement a corresponding process implemented by the mobile terminal / terminal device in each method of the embodiment of the present application, for simplicity , Will not repeat them here.
- FIG. 15 is a schematic structural diagram of a chip according to an embodiment of the present application.
- the chip 700 shown in FIG. 15 includes a processor 710, and the processor 710 may call and run a computer program from a memory to implement the method in the embodiment of the present application.
- the chip 700 may further include a memory 720.
- the processor 710 may call and run a computer program from the memory 720 to implement the method in the embodiment of the present application.
- the memory 720 may be a separate device independent of the processor 710, or may be integrated in the processor 710.
- the chip 700 may further include an input interface 730.
- the processor 710 may control the input interface 730 to communicate with other devices or chips. Specifically, the processor 710 may obtain information or data sent by the other devices or chips.
- the chip 700 may further include an output interface 740.
- the processor 710 may control the output interface 740 to communicate with other devices or chips. Specifically, the processor 710 may output information or data to the other devices or chips.
- the chip may be applied to the network device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the chip may be applied to the network device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
- the chip can be applied to the mobile terminal / terminal device in the embodiments of the present application, and the chip can implement the corresponding process implemented by the mobile terminal / terminal device in each method of the embodiments of the present application. For simplicity, here No longer.
- the chip mentioned in the embodiments of the present application may also be referred to as a system-level chip, a system chip, a chip system or a system-on-chip.
- FIG. 16 is a schematic block diagram of a communication system 900 according to an embodiment of the present application. As shown in FIG. 16, the communication system 900 includes a terminal device 910 and a network device 920.
- the terminal device 910 may be used to implement the corresponding functions implemented by the terminal device in the foregoing method
- the network device 920 may be used to implement the corresponding functions implemented by the network device in the foregoing method.
- the processor in the embodiment of the present application may be an integrated circuit chip and has a signal processing capability.
- each step of the foregoing method embodiment may be completed by using an integrated logic circuit of hardware in a processor or an instruction in a form of software.
- the above processor may be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (Field, Programmable Gate Array, FPGA), or other Programming logic devices, discrete gate or transistor logic devices, discrete hardware components.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA off-the-shelf programmable gate array
- Various methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
- a general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
- the steps of the method disclosed in combination with the embodiments of the present application may be directly implemented by a hardware decoding processor, or may be performed by using a combination of hardware and software modules in the decoding processor.
- the software module may be located in a mature storage medium such as a random access memory, a flash memory, a read-only memory, a programmable read-only memory, or an electrically erasable programmable memory, a register, and the like.
- the storage medium is located in a memory, and the processor reads the information in the memory and completes the steps of the foregoing method in combination with its hardware.
- the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), and an electronic memory. Erase programmable read-only memory (EPROM, EEPROM) or flash memory.
- the volatile memory may be Random Access Memory (RAM), which is used as an external cache.
- RAM Static Random Access Memory
- DRAM Dynamic Random Access Memory
- Synchronous Dynamic Random Access Memory Synchronous Dynamic Random Access Memory
- SDRAM double data rate synchronous dynamic random access memory
- Double SDRAM, DDR SDRAM enhanced synchronous dynamic random access memory
- Enhanced SDRAM, ESDRAM synchronous connection dynamic random access memory
- Synchronous DRAM Synchronous Dynamic Random Access Memory
- Enhanced SDRAM Enhanced SDRAM, ESDRAM
- synchronous connection dynamic random access memory Synchrobus RAM, SLDRAM
- Direct Rambus RAM Direct Rambus RAM
- the memory in the embodiment of the present application may also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (SDRAM), double data rate synchronous dynamic random access memory (Double SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct RAMbus RAM, DR RAM) and so on. That is, the memories in the embodiments of the present application are intended to include, but not limited to, these and any other suitable types of memories.
- An embodiment of the present application further provides a computer-readable storage medium for storing a computer program.
- the computer-readable storage medium can be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method in the embodiment of the present application. No longer.
- the computer-readable storage medium may be applied to the mobile terminal / terminal device in the embodiment of the present application, and the computer program causes the computer to execute a corresponding process implemented by the mobile terminal / terminal device in each method in the embodiment of the present application.
- the computer program causes the computer to execute a corresponding process implemented by the mobile terminal / terminal device in each method in the embodiment of the present application.
- An embodiment of the present application further provides a computer program product, including computer program instructions.
- the computer program product can be applied to the network device in the embodiment of the present application, and the computer program instruction causes the computer to execute a corresponding process implemented by the network device in each method in the embodiment of the present application. More details.
- the computer program product can be applied to a mobile terminal / terminal device in the embodiments of the present application, and the computer program instructions cause the computer to execute a corresponding process implemented by the mobile terminal / terminal device in each method in the embodiments of the present application, For brevity, I will not repeat them here.
- the embodiment of the present application also provides a computer program.
- the computer program may be applied to a network device in the embodiment of the present application.
- the computer program When the computer program is run on a computer, the computer is caused to execute a corresponding process implemented by the network device in each method in the embodiment of the present application. , Will not repeat them here.
- the computer program may be applied to a mobile terminal / terminal device in the embodiment of the present application.
- the computer program When the computer program is run on a computer, the computer executes each method in the embodiment of the application by the mobile terminal / terminal device. The corresponding processes are not repeated here for brevity.
- the disclosed systems, devices, and methods may be implemented in other ways.
- the device embodiments described above are only schematic.
- the division of the unit is only a logical function division.
- multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, which may be electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
- the functional units in the embodiments of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
- the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
- the technical solution of this application is essentially a part that contributes to the existing technology or a part of the technical solution can be embodied in the form of a software product.
- the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory) ROM, random access memory (Random Access Memory, RAM), magnetic disks or optical disks and other media that can store program codes .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Provided in the embodiments of the present application are a base station switching method and apparatus, and a network device; the method comprises: a first base station receiving first indication information sent by a second base station, the first indication information being used to indicate the execution of a conversion process between a main node and an auxiliary node, wherein the first base station is the auxiliary node, and the second base station is the main node.
Description
本申请实施例涉及移动通信技术领域,具体涉及一种基站切换方法及装置、网络设备。The embodiments of the present application relate to the field of mobile communication technologies, and in particular, to a base station handover method and device, and a network device.
低时延高可靠通信(URLLC,Ultra Reliable and Low Latency Communication)是未来的重要通信方式。为了提高数据传输的可靠性,终端与网络之间的通信可以采用双链路或多链路的形式,这样能够保障数据在至少一条链路上成功地传输。Low-latency and high-reliability communication (URLLC, Ultra Reliable and Low Communication) is an important communication method in the future. In order to improve the reliability of data transmission, the communication between the terminal and the network can be in the form of dual-link or multi-link, so that data can be successfully transmitted on at least one link.
双连接(DC,Dual Connectivity)网络能够实现双链路的通信,在DC网络下,当终端(UE,User Equipment)进行迁移时,如果两个传输链路同时进行切换,或者一条链路的切换还没完成又发生另一条链路的切换,则会造成在短暂时间内有数据完全中断的现象。Dual connectivity (DC, Dual Connectivity) network can realize dual-link communication. Under DC network, when the terminal (UE, User Equipment) is migrated, if two transmission links are switched at the same time, or one link is switched If the switchover of another link is not completed yet, data will be completely interrupted in a short period of time.
发明内容Summary of the invention
本申请实施例提供一种基站切换方法及装置、网络设备。The embodiments of the present application provide a base station handover method and device, and a network device.
本申请实施例提供的基站切换方法,包括:The base station handover method provided in the embodiment of the present application includes:
第一基站接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一基站为辅节点,所述第二基站为主节点。The first base station receives first instruction information sent by a second base station, where the first instruction information is used to instruct execution of a conversion process between a primary node and a secondary node, the first base station is a secondary node, and the second base station is The master node.
本申请实施例提供的基站切换装置,包括:The base station switching device provided in the embodiment of the present application includes:
接收单元,用于接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一基站为辅节点,所述第二基站为主节点。A receiving unit, configured to receive first instruction information sent by a second base station, where the first instruction information is used to instruct execution of a conversion process between a primary node and a secondary node, where the first base station is a secondary node, and the second The base station is the master node.
本申请实施例提供的网络设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述的基站切换方法。The network device provided in the embodiment of the present application includes a processor and a memory. The memory is used to store a computer program, and the processor is used to call and run the computer program stored in the memory to execute the base station handover method described above.
本申请实施例提供的芯片,用于实现上述的基站切换方法。The chip provided in the embodiment of the present application is used to implement the foregoing base station handover method.
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行上述的基站切换方法。Specifically, the chip includes a processor for invoking and running a computer program from a memory, so that a device installed with the chip executes the base station handover method described above.
本申请实施例提供的计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述的基站切换方法。The computer-readable storage medium provided in the embodiment of the present application is used to store a computer program, and the computer program causes a computer to execute the foregoing base station handover method.
本申请实施例提供的计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述的基站切换方法。The computer program product provided in the embodiment of the present application includes computer program instructions, and the computer program instructions cause a computer to execute the foregoing base station handover method.
本申请实施例提供的计算机程序,当其在计算机上运行时,使得计算机执行上述的基站切换方法。The computer program provided in the embodiment of the present application, when run on a computer, causes the computer to execute the above-mentioned base station handover method.
通过上述技术方案,第一基站接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一基站为辅节点,所述第二基站为主节点,从而实现了将DC网络中的主节点和辅节点进行角色切换,这种角色切换的过程能够保证始终有节点能够正常的进行数据传输,因而避免了终端移动时 的数据中断的发生,进一步,解决了角色切换过程中以及角色切换完成后各节点的秘钥如何使用的问题。Through the above technical solution, the first base station receives the first instruction information sent by the second base station, where the first instruction information is used to instruct execution of a conversion process between the primary node and the secondary node, and the first base station is the secondary node, so The second base station is described as the master node, so that the role switching between the primary node and the secondary node in the DC network is realized. This role switching process can ensure that there is always a node that can normally perform data transmission, thus avoiding the terminal moving. The occurrence of data interruption further solves the problem of how to use the key of each node during the role switching process and after the role switching is completed.
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:The drawings described here are used to provide a further understanding of the present application and constitute a part of the present application. The schematic embodiments of the present application and the description thereof are used to explain the present application, and do not constitute an improper limitation on the present application. In the drawings:
图1是本申请实施例提供的一种通信系统架构的示意性图;FIG. 1 is a schematic diagram of a communication system architecture according to an embodiment of the present application; FIG.
图2是本申请实施例提供的DC网络架构图;2 is a DC network architecture diagram provided by an embodiment of the present application;
图3是本申请实施例提供的MN添加SN的流程图;FIG. 3 is a flowchart of adding an SN by an MN according to an embodiment of the present application; FIG.
图4是本申请实施例提供的MN修改SN的流程图;4 is a flowchart of an MN modifying an SN according to an embodiment of the present application;
图5是本申请实施例提供的SN侧的秘钥派生的示意图;FIG. 5 is a schematic diagram of derivation of a secret key on the SN side according to an embodiment of the present application; FIG.
图6是本申请实施例提供的秘钥派生的水平和垂直衍生示意图;FIG. 6 is a schematic diagram of horizontal and vertical derivation of key derivation provided in an embodiment of the present application; FIG.
图7是本申请实施例提供的基于N2接口的切换流程图;7 is a flowchart of a handover based on an N2 interface according to an embodiment of the present application;
图8是本申请实施例提供的基于Xn接口的切换流程图;8 is a flowchart of a handover based on an Xn interface according to an embodiment of the present application;
图9为本申请实施例提供的基站切换方法的流程示意图一;FIG. 9 is a first schematic flowchart of a base station handover method according to an embodiment of the present application; FIG.
图10为本申请实施例提供的通过AMF转发信息的示意图;FIG. 10 is a schematic diagram of forwarding information through AMF according to an embodiment of the present application; FIG.
图11为本申请实施例提供的基站切换方法的流程示意图二;11 is a second schematic flowchart of a base station handover method according to an embodiment of the present application;
图12为本申请实施例提供的基站切换方法的流程示意图三;FIG. 12 is a third flowchart of a base station handover method according to an embodiment of the present application;
图13为本申请实施例提供的基站切换装置的结构组成示意图;13 is a schematic structural composition diagram of a base station switching device according to an embodiment of the present application;
图14是本申请实施例提供的一种通信设备示意性结构图;14 is a schematic structural diagram of a communication device according to an embodiment of the present application;
图15是本申请实施例的芯片的示意性结构图;15 is a schematic structural diagram of a chip according to an embodiment of the present application;
图16是本申请实施例提供的一种通信系统的示意性框图。FIG. 16 is a schematic block diagram of a communication system according to an embodiment of the present application.
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by a person of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、全球互联微波接入(Worldwide Interoperability for Microwave Access,WiMAX)通信系统或5G系统等。The technical solutions of the embodiments of the present application can be applied to various communication systems, for example, a Global System for Mobile (GSM) system, a Code Division Multiple Access (CDMA) system, and a Wideband Code Division Multiple Access (Wideband Code Division Multiple Access) system, General Packet Radio Service (GPRS), Long Term Evolution (LTE) system, LTE Frequency Division Duplex (FDD) system, LTE Time Division Duplex (TDD), Universal Mobile Telecommunication System (UMTS), Worldwide Interoperability for Microwave Access (WiMAX) communication system or 5G system, etc.
示例性的,本申请实施例应用的通信系统100如图1所示。该通信系统100可以包括网络设备110,网络设备110可以是与终端设备120(或称为通信终端、终端)通信的设备。网络设备110可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端设备进行通信。可选地,该网络设备110可以是GSM系统或CDMA系统中的基站(Base Transceiver Station,BTS),也可以是WCDMA系统中的基站(NodeB,NB),还可以是LTE系统中的演进型基站(Evolutional Node B,eNB或eNodeB),或者是云无线接入网络(Cloud Radio Access Network,CRAN)中的无线控制器,或者该网 络设备可以为移动交换中心、中继站、接入点、车载设备、可穿戴设备、集线器、交换机、网桥、路由器、5G网络中的网络侧设备或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)中的网络设备等。Exemplarily, the communication system 100 applied in the embodiment of the present application is shown in FIG. 1. The communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal device 120 (or a communication terminal or a terminal). The network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminal devices located within the coverage area. Optionally, the network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, or a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system. (Evolutional NodeB, eNB or eNodeB), or a wireless controller in a Cloud Radio Access Network (CRAN), or the network device may be a mobile switching center, relay station, access point, vehicle equipment, Wearable devices, hubs, switches, bridges, routers, network-side devices in 5G networks, or network devices in public land mobile networks (PLMN) that will evolve in the future.
该通信系统100还包括位于网络设备110覆盖范围内的至少一个终端设备120。作为在此使用的“终端设备”包括但不限于经由有线线路连接,如经由公共交换电话网络(Public Switched Telephone Networks,PSTN)、数字用户线路(Digital Subscriber Line,DSL)、数字电缆、直接电缆连接;和/或另一数据连接/网络;和/或经由无线接口,如,针对蜂窝网络、无线局域网(Wireless Local Area Network,WLAN)、诸如DVB-H网络的数字电视网络、卫星网络、AM-FM广播发送器;和/或另一终端设备的被设置成接收/发送通信信号的装置;和/或物联网(Internet of Things,IoT)设备。被设置成通过无线接口通信的终端设备可以被称为“无线通信终端”、“无线终端”或“移动终端”。移动终端的示例包括但不限于卫星或蜂窝电话;可以组合蜂窝无线电电话与数据处理、传真以及数据通信能力的个人通信系统(Personal Communications System,PCS)终端;可以包括无线电电话、寻呼机、因特网/内联网接入、Web浏览器、记事簿、日历以及/或全球定位系统(Global Positioning System,GPS)接收器的PDA;以及常规膝上型和/或掌上型接收器或包括无线电电话收发器的其它电子装置。终端设备可以指接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、5G网络中的终端设备或者未来演进的PLMN中的终端设备等。The communication system 100 further includes at least one terminal device 120 located within a coverage area of the network device 110. As the "terminal equipment" used herein includes, but is not limited to, connection via wired lines, such as via Public Switched Telephone Networks (PSTN), Digital Subscriber Line (DSL), digital cable, direct cable connection ; And / or another data connection / network; and / or via a wireless interface, such as for cellular networks, Wireless Local Area Networks (WLAN), digital television networks such as DVB-H networks, satellite networks, AM- FM broadcast transmitter; and / or another terminal device configured to receive / transmit communication signals; and / or Internet of Things (IoT) devices. A terminal device configured to communicate through a wireless interface may be referred to as a “wireless communication terminal”, a “wireless terminal”, or a “mobile terminal”. Examples of mobile terminals include, but are not limited to, satellite or cellular phones; personal communications systems (PCS) terminals that can combine cellular radiotelephones with data processing, facsimile, and data communications capabilities; can include radiotelephones, pagers, Internet / internal PDA with network access, web browser, notepad, calendar, and / or Global Positioning System (GPS) receiver; and conventional laptop and / or palm-type receivers or others including radiotelephone transceivers Electronic device. A terminal device can refer to an access terminal, user equipment (User Equipment), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent, or User device. The access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Processing (PDA), and wireless communication. Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, terminal devices in 5G networks, or terminal devices in future evolved PLMNs, etc.
可选地,终端设备120之间可以进行终端直连(Device to Device,D2D)通信。Optionally, terminal devices 120 may perform terminal direct device (D2D) communication.
可选地,5G系统或5G网络还可以称为新无线(New Radio,NR)系统或NR网络。Optionally, the 5G system or the 5G network may also be referred to as a New Radio (NR) system or an NR network.
图1示例性地示出了一个网络设备和两个终端设备,可选地,该通信系统100可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端设备,本申请实施例对此不做限定。FIG. 1 exemplarily shows one network device and two terminal devices. Optionally, the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminal devices. The embodiment does not limit this.
可选地,该通信系统100还可以包括网络控制器、移动管理实体等其他网络实体,本申请实施例对此不作限定。Optionally, the communication system 100 may further include other network entities such as a network controller, a mobility management entity, and the like in this embodiment of the present application is not limited thereto.
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1示出的通信系统100为例,通信设备可包括具有通信功能的网络设备110和终端设备120,网络设备110和终端设备120可以为上文所述的具体设备,此处不再赘述;通信设备还可包括通信系统100中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。It should be understood that the device having a communication function in the network / system in the embodiments of the present application may be referred to as a communication device. Taking the communication system 100 shown in FIG. 1 as an example, the communication device may include a network device 110 and a terminal device 120 having a communication function, and the network device 110 and the terminal device 120 may be specific devices described above, and are not described herein again. The communication device may also include other devices in the communication system 100, such as other network entities such as a network controller, a mobile management entity, and the like, which is not limited in the embodiments of the present application.
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。It should be understood that the terms "system" and "network" are often used interchangeably herein. The term "and / or" in this document is only a kind of association relationship describing related objects, which means that there can be three kinds of relationships, for example, A and / or B can mean: A exists alone, A and B exist simultaneously, and exists alone B these three cases. In addition, the character "/" in this article generally indicates that the related objects are an "or" relationship.
为便于理解本申请实施例的技术方案,以下对本申请实施例相关的技术进行解释说明。In order to facilitate understanding of the technical solutions of the embodiments of the present application, the technologies related to the embodiments of the present application are explained below.
参照图2,图2为主接入网(M-RAN,Master RAN)节点和辅接入网(S-RAN,Secondary RAN)节点形成的DC网络架构,可以看出B3隧道(N3Tunnel)和空口各自分开,形成两条链路进行冗余传输,这样数据可以在一个时间点有至少一路数据传输 成功的可能性进一步增加。Referring to FIG. 2, FIG. 2 shows a DC network architecture formed by a primary access network (M-RAN, Master RAN) node and a secondary access network (S-RAN, Secondary RAN) node. It can be seen that the B3 tunnel (N3Tunnel) and air interface They are separated from each other to form two links for redundant transmission, so that the possibility that data can have at least one successful data transmission at a point in time is further increased.
在DC场景下,当UE进行迁移时,如果两个传输链路同时进行切换,或者第一链路的切换还没完成又发生第二链路的切换,则会造成在短暂时间内有数据完全中断的现象。因此,为了避免UE移动时的数据中断的发生,需要一种无中断的切换方式。In the DC scenario, when the UE is migrating, if the two transmission links are switched at the same time, or if the switching of the second link is not completed and the second link is switched, it will cause data to be completely complete in a short period of time. Interruption. Therefore, in order to avoid the occurrence of data interruption when the UE moves, a non-disruptive handover mode is needed.
DC网络中的切换具有如下两种:There are two types of handover in the DC network:
1、辅节点(SN,Secondary Node)的添加/修改/删除:此场景不会影响到MN的数据传输,因此数据传输不会中断;1. Secondary node (SN, Secondary Node) addition / modification / deletion: This scenario will not affect the data transmission of the MN, so the data transmission will not be interrupted;
2、主节点(MN,Master Node)的切换(改变):此场景进一步分为1)MN和SN同时改变,和2)MN改变SN不变。对于1),数据传输会有中断,对于2)数据可以在切换过程中一直在SN上正常传输不会有中断。因此对于URLLC的切换必须使用2)。2. Handover (change) of the master node (MN, Master node): This scenario is further divided into 1) the MN and SN are changed at the same time, and 2) the MN is changed without changing the SN. For 1), data transmission will be interrupted, and for 2) data can be transmitted normally on the SN without interruption during the handover process. Therefore, 2) must be used for URLLC switching.
参照图3和图4,图3为MN添加SN的流程图,图4为MN修改SN的流程图,然而,目前还没有一个机制可以将MN和SN进行角色转换,本申请实施例可以实现MN和SN之间的角色转换,并解决相关的秘钥使用问题。3 and 4, FIG. 3 is a flowchart of adding an SN to the MN, and FIG. 4 is a flowchart of modifying the SN of the MN. However, there is currently no mechanism to switch roles between the MN and the SN. The embodiment of the present application can implement the MN And SN, and solve related key usage issues.
MN与SN进行角色切换(可以认为先添加了一个SN,然后把这个SN变成MN)所使用的秘钥和正常的切换流程(可以认为是从一个MN切到另一个MN)所使用的秘钥的机制不一样。对于前者(MN与SN进行角色切换),当MN添加SN时,SN侧使用的秘钥是通过图5所示的派生方法生成的S-KgNB,这与普通的MN切换流程生成的秘钥不一样。对于后者(正常的切换流程),切换的秘钥是使用{NCC,NH}信息来派生的,参照图6。The secret key used by the MN and the SN for role switching (you can think of adding an SN first and then turning this SN into an MN) and the normal handover process (which can be considered as switching from one MN to another MN) The mechanism of keys is different. For the former (MN and SN perform role switching), when the MN adds an SN, the key used on the SN side is the S-KgNB generated by the derivation method shown in Figure 5, which is not the same as the key generated by the ordinary MN handover process. same. For the latter (normal handover procedure), the key for handover is derived using the {NCC, NH} information, see FIG. 6.
图6为秘钥派生的水平和垂直衍生,当基站有未使用的{NCC,NH}信息时,在切换时就会使用未使用的该信息派生出新的秘钥KgNB,如果没有则根据当前使用的KgNB派生出KgNB*,即水平衍生。进一步,基于N2接口的切换可以参照图7所示,基于Xn接口的切换可以参照图8所示。Figure 6 shows the horizontal and vertical derivation of the secret key. When the base station has unused {NCC, NH} information, it will use the unused information to derive a new secret key KgNB when it is handed over. The KgNB used derives KgNB *, which is a horizontal derivative. Further, the switching based on the N2 interface can be referred to FIG. 7, and the switching based on the Xn interface can be referred to FIG. 8.
图9为本申请实施例提供的基站切换方法的流程示意图一,如图9所示,所述基站切换方法包括以下步骤:FIG. 9 is a first flowchart of a base station handover method according to an embodiment of the present application. As shown in FIG. 9, the base station handover method includes the following steps:
步骤901:第一基站接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一基站为辅节点,所述第二基站为主节点。Step 901: The first base station receives first instruction information sent by a second base station, where the first instruction information is used to instruct execution of a conversion process between a primary node and a secondary node, the first base station is a secondary node, and the first The second base station is the master node.
这里,第一基站和第二基站是DC网络中的两个基站,或者是多连接网络中的两个基站,其中,第一基站为SN,第二基站为MN,MN决定与SN进行角色转换,则MN向SN发送第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程。Here, the first base station and the second base station are two base stations in a DC network, or two base stations in a multi-connection network, where the first base station is an SN and the second base station is an MN. The MN decides to perform role conversion with the SN. , The MN sends first instruction information to the SN, where the first instruction information is used to instruct execution of a conversion process between the primary node and the secondary node.
本申请实施例中,在角色切换过程中以及角色切换过程后,各节点的秘钥可以通过以下方式实现。In the embodiment of the present application, during the role switching process and after the role switching process, the key of each node may be implemented in the following manner.
方式一:所述第一指示信息携带第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。Method 1: The first indication information carries first key information, and the first key information belongs to the master node key information, and is used by the first base station as a master node.
这里,MN派生KgNB*发送给SN供SN使用,使第一基站变作为MN工作。Here, the MN derives KgNB * and sends it to the SN for use by the SN, so that the first base station becomes the MN to work.
本申请实施例中,所述第一秘钥信息由所述第二基站通过以下方式生成:In the embodiment of the present application, the first key information is generated by the second base station in the following manner:
如果有未使用的第一安全信息,则基于所述未使用的第一安全信息生成所述第一秘钥信息;If there is unused first security information, generating the first key information based on the unused first security information;
如果没有未使用的第一安全信息,则根据当前使用的第二秘钥信息生成所述第一秘钥信息。If there is no unused first security information, the first key information is generated according to the currently used second key information.
这里,所述第一安全信息包括NCC(Next hop Chaining Counter)信息和NH(Next Hop)信息。Here, the first security information includes NCC (Next Hope Chaining) information and NH (Next Hop) information.
参照图6,KgNB*可以通过水平或垂直模式衍生。Referring to FIG. 6, KgNB * may be derived in a horizontal or vertical mode.
本申请实施例中,所述第一基站获得第一秘钥信息(如KgNB*)后,可以基于所述第一秘钥信息进行完整性保护和/或进行加密保护秘钥的生成。In the embodiment of the present application, after the first base station obtains the first key information (such as KgNB *), the first base station may perform integrity protection and / or generate an encryption protection key based on the first key information.
在一实施方式中,所述第一基站与所述第二基站执行完主节点与辅节点之间的转换过程后,所述第一基站作为主节点生成第三秘钥信息,所述第三秘钥信息属于主节点秘钥信息,其中,所述第三秘钥信息与所述第一秘钥信息不同。In an embodiment, after the first base station and the second base station perform a conversion process between the primary node and the secondary node, the first base station serves as the primary node to generate third key information, and the third The key information belongs to the master node key information, wherein the third key information is different from the first key information.
举个例子,第一基站在完成与第二基站的角色转换后,第一基站作为新的MN派生出新的KgNB,该KgNB用于避免原MN(也即第二基站)知道其秘钥。For example, after the first base station completes the role transition with the second base station, the first base station as a new MN derives a new KgNB, which is used to prevent the original MN (that is, the second base station) from knowing its secret key.
在一实施方式中,所述第一基站与所述第二基站执行完主节点与辅节点之间的转换过程后,所述第一基站作为主节点生成第四秘钥信息,所述第四秘钥信息属于辅节点秘钥信息;所述第一基站将所述第四秘钥信息发送给所述第二基站。In an implementation manner, after the first base station and the second base station perform a conversion process between the primary node and the secondary node, the first base station serves as the primary node to generate fourth key information, and the fourth The key information belongs to the secondary node key information; the first base station sends the fourth key information to the second base station.
举个例子,当第一基站与第二基站进行角色转变后,第一基站作为新的MN派生新的S-KgNB发给第二基站使用。For example, after the roles of the first base station and the second base station are changed, the first base station generates a new S-KgNB and sends the new S-KgNB to the second base station for use.
在一实施方式中,所述第一秘钥信息(如KgNB*)由所述第一基站或所述第二基站发送给终端,从而终端可以与新的MN使用一致的秘钥信息。In one embodiment, the first key information (such as KgNB *) is sent to the terminal by the first base station or the second base station, so that the terminal can use the same key information with the new MN.
方式二:所述第一基站基于未使用的第一安全信息生成第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。Manner 2: The first base station generates first key information based on unused first security information, where the first key information belongs to the master node key information and is used by the first base station as a master node.
这里,第一基站通过未使用的{NCC,NH}信息自己派生出KgNB。Here, the first base station derives KgNB by itself using unused {NCC, NH} information.
本申请实施例中,所述第一基站通过以下至少一种方式获取所述第一安全信息:In the embodiment of the present application, the first base station acquires the first security information in at least one of the following ways:
1)所述第一基站从所述第二基站获取所述第一安全信息;例如:所述第一安全信息携带在所述第一指示信息中,所述第一基站接收到所述第一指示信息后,从所述第一指示信息中获取所述第一安全信息。1) The first base station acquires the first security information from the second base station; for example, the first security information is carried in the first indication information, and the first base station receives the first security information After the instruction information, the first security information is obtained from the first instruction information.
2)所述第一基站从第一核心网网元获取所述第一安全信息。例如:所述第一基站从AMF获取所述第一安全信息。2) The first base station acquires the first security information from a first core network element. For example, the first base station obtains the first security information from an AMF.
这里,所述第一安全信息包括NCC信息和/或NH信息。Here, the first safety information includes NCC information and / or NH information.
在一实施方式中,所述第一基站与所述第二基站执行完主节点与辅节点之间的转换过程后,所述第一基站作为主节点生成第四秘钥信息,所述第四秘钥信息属于辅节点秘钥信息;所述第一基站将所述第四秘钥信息发送给所述第二基站。In an implementation manner, after the first base station and the second base station perform a conversion process between the primary node and the secondary node, the first base station serves as the primary node to generate fourth key information, and the fourth The key information belongs to the secondary node key information; the first base station sends the fourth key information to the second base station.
举个例子,当第一基站与第二基站进行角色转变后,第一基站作为新的MN派生新的S-KgNB发给第二基站使用。For example, after the roles of the first base station and the second base station are changed, the first base station generates a new S-KgNB and sends the new S-KgNB to the second base station for use.
在一实施方式中,所述第一秘钥信息(如KgNB*)由所述第一基站发送给终端,从而终端可以与新的MN使用一致的秘钥信息。或者,所述第一安全信息由所述第一基站或所述第二基站发送给终端,从而终端可以基于所述第一安全信息派生第一秘钥信息(如KgNB*)。In one embodiment, the first key information (such as KgNB *) is sent to the terminal by the first base station, so that the terminal can use the same key information with the new MN. Alternatively, the first security information is sent to the terminal by the first base station or the second base station, so that the terminal can derive first key information (such as KgNB *) based on the first security information.
上述方案中,第二基站向第一基站发送的信息包括第一指示信息,此外,还可以进一步包括第一安全信息和/或第一秘钥信息,所述第一基站可以通过所述第一基站和所述第二基站之间的接口(Xn接口)接收所述第二基站发送的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,所述第一基站接收第一核心网网元转发的来自所述第二基站的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,所述第一基站接收第一核心网网元发送的第一安全信息,以及转发的来自所述第二基站的第一指示信息和/或第一秘钥信息。这里,第一核心网网元可以是AMF。这里,第一核心网网元可以向第一基站发送自身的信息,也可以向第一基站转发来自第二基站的信息。其中,第二基站向第一核心网网元发送的内容可以是第一指示信息、第一安全信息以及第一秘钥信息中的任意信息(如任意1个信息或任意2个信息或3个信息),第一核心网网元 向第一基站发送的内容可以是第一指示信息、第一安全信息以及第一秘钥信息中的任意信息(如任意1个信息或任意2个信息或3个信息)。In the above solution, the information sent by the second base station to the first base station includes the first indication information, and may further include first security information and / or first key information, and the first base station may pass the first An interface (Xn interface) between the base station and the second base station receives the first instruction information and / or the first security information and / or the first key information sent by the second base station; or, the first A base station receives the first indication information and / or the first security information and / or the first key information from the second base station forwarded by the network element of the first core network; or the first base station receives the first The first security information sent by the core network element, and the first instruction information and / or the first key information forwarded from the second base station. Here, the first core network element may be AMF. Here, the first core network element may send its own information to the first base station, or it may forward the information from the second base station to the first base station. The content sent by the second base station to the network element of the first core network may be any information in the first instruction information, the first security information, and the first key information (such as any 1 information or any 2 information or 3 information). Information), the content sent by the first core network element to the first base station may be any of the first indication information, the first security information, and the first key information (such as any 1 information or any 2 information or 3 Messages).
参照图10,MN向AMF发送角色转换请求消息,AMF再向SN发送角色转换请求消息,其中携带第一安全信息NCC和NH。这里,第一指示信息携带角色转换请求消息中通过AMF间接发给SN,期间AMF可以生成最新的NCC和NH给目标SN使用。Referring to FIG. 10, the MN sends a role change request message to the AMF, and the AMF sends a role change request message to the SN, which carries the first security information NCC and NH. Here, the first indication information carries a role change request message and is indirectly sent to the SN through the AMF, during which the AMF can generate the latest NCC and NH for the target SN to use.
本申请实施例中,为了使终端能够与新的MN(也即第一基站)之间进行正常通信,所述第一秘钥信息或第二安全信息由所述第一基站或所述第二基站发送给终端;或者,所述第一秘钥信息或第二安全信息由所述第一核心网网元通过所述第一基站或所述第二基站透传给终端。这里,第一核心网网元可以是AMF。其中,所述第二安全信息为当前使用的秘钥或新的秘钥对应的NCC信息。In the embodiment of the present application, in order to enable the terminal to perform normal communication with the new MN (that is, the first base station), the first key information or the second security information is transmitted by the first base station or the second base station. The base station sends to the terminal; or the first key information or the second security information is transparently transmitted to the terminal by the first core network element through the first base station or the second base station. Here, the first core network element may be AMF. The second security information is NCC information corresponding to a currently used key or a new key.
基于此,所述第一秘钥信息或所述第二安全信息用于所述终端执行如下过程:基于所述第一秘钥信息与所述第一基站进行通信,或者,基于所述第二安全信息派生新的秘钥,并基于所述新的秘钥与所述第一基站进行通信。这里,派生的新的秘钥(KgNB)需要进一步计算出控制面和/或用户面的完整性和/或加密秘钥来与基站进行通信的,而不是直接使用KgNB进行通信。Based on this, the first key information or the second security information is used by the terminal to perform a process of communicating with the first base station based on the first key information, or based on the second The security information derives a new secret key, and communicates with the first base station based on the new secret key. Here, the derived new key (KgNB) needs to further calculate the integrity of the control plane and / or user plane and / or the encryption key to communicate with the base station, instead of directly using KgNB for communication.
本申请实施例的技术方案中,MN和SN的类型可以相同,也可以不同,例如:MN和SN中的一个是NR基站(gNB),另一个是LTE基站(eNB)。再例如:MN和SN都是NR基站(gNB)。又例如:MN和SN都是LTE基站(eNB)。In the technical solution of the embodiment of the present application, the types of the MN and the SN may be the same or different. For example, one of the MN and the SN is an NR base station (gNB), and the other is an LTE base station (eNB). For another example: MN and SN are both NR base stations (gNB). For another example: MN and SN are both LTE base stations (eNBs).
对于gNB而言,其对应的秘钥记作KgNB,对于eNB而言,其对应的秘钥记作KeNB。For gNB, its corresponding key is recorded as KgNB, and for eNB, its corresponding key is recorded as KeNB.
图11为本申请实施例提供的基站切换方法的流程示意图二,如图11所示,所述基站切换方法包括以下步骤:FIG. 11 is a second schematic flowchart of a base station handover method according to an embodiment of the present application. As shown in FIG. 11, the base station handover method includes the following steps:
1、MN向SN发送角色转换请求消息。1. The MN sends a role change request message to the SN.
这里,角色转换请求消息包括第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一指示信息携带第一秘钥信息(KgNB*),第一秘钥信息(KgNB*)是MN通过如图6所示的方法通过水平或垂直模式衍生。Here, the role transition request message includes first indication information, where the first indication information is used to instruct execution of a conversion process between the primary node and the secondary node, and the first indication information carries first key information (KgNB *), The first key information (KgNB *) is derived by the MN in a horizontal or vertical mode by the method shown in FIG. 6.
2、SN向MN发送确认消息。2. The SN sends a confirmation message to the MN.
本步骤为可选的步骤。This step is optional.
3、MN向UE发送角色转换通知消息。3. The MN sends a role change notification message to the UE.
这里,角色转换通知消息携带第一秘钥信息(KgNB*)。Here, the role change notification message carries the first key information (KgNB *).
4、UE向MN发送确认消息。4. The UE sends a confirmation message to the MN.
本步骤为可选的步骤。This step is optional.
上述过程中,MN和SN共存的情况下,MN为SN提供KgNB*,由于SN使用的秘钥是属于主节点的秘钥,因而是SN可以使用该秘钥作为主节点进行工作。In the above process, when the MN and the SN coexist, the MN provides KgNB * for the SN. Since the key used by the SN is the key belonging to the master node, the SN can use the key as the master node to work.
图12为本申请实施例提供的基站切换方法的流程示意图三,如图12所示,所述基站切换方法包括以下步骤:FIG. 12 is a third flowchart of a base station handover method according to an embodiment of the present application. As shown in FIG. 12, the base station handover method includes the following steps:
1、MN向SN发送角色转换请求消息。1. The MN sends a role change request message to the SN.
这里,角色转换请求消息包括第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程。Here, the role transition request message includes first indication information, where the first indication information is used to instruct execution of a transition process between the primary node and the secondary node.
2、SN向AMF发送角色转换通知消息。2. The SN sends a role change notification message to the AMF.
3、AMF向SN回复消息,其中,携带未使用的第一安全信息{NCC,NH}。3. The AMF returns a message to the SN, which carries the unused first security information {NCC, NH}.
4、SN向MN发送确认消息。4. The SN sends a confirmation message to the MN.
5a、MN向UE发送角色转换通知消息,其中,携带未使用的第一安全信息{NCC,NH}。5a. The MN sends a role change notification message to the UE, where the message carries unused first security information {NCC, NH}.
5b、SN向UE发送角色转换通知消息,其中,携带未使用的第一安全信息{NCC,NH}。5b. The SN sends a role change notification message to the UE, where the message carries unused first security information {NCC, NH}.
上述步骤5a和5b为可选的。The above steps 5a and 5b are optional.
图13为本申请实施例提供的基站切换装置的结构组成示意图,如图13所示,所述装置包括:FIG. 13 is a schematic structural composition diagram of a base station switching device according to an embodiment of the present application. As shown in FIG. 13, the device includes:
接收单元1301,用于接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一基站为辅节点,所述第二基站为主节点。The receiving unit 1301 is configured to receive first instruction information sent by a second base station, where the first instruction information is used to instruct execution of a conversion process between a primary node and a secondary node, where the first base station is a secondary node, and the first The second base station is the master node.
在一实施方式中,所述第一指示信息携带第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。In an embodiment, the first indication information carries first key information, and the first key information belongs to the master node key information and is used by the first base station as a master node.
在一实施方式中,所述第一秘钥信息由所述第二基站通过以下方式生成:In an implementation manner, the first key information is generated by the second base station in the following manner:
如果有未使用的第一安全信息,则基于所述未使用的第一安全信息生成所述第一秘钥信息;If there is unused first security information, generating the first key information based on the unused first security information;
如果没有未使用的第一安全信息,则根据当前使用的第二秘钥信息生成所述第一秘钥信息。If there is no unused first security information, the first key information is generated according to the currently used second key information.
在一实施方式中,所述装置还包括:In an embodiment, the device further includes:
安全处理单元1302,用于基于所述第一秘钥信息进行完整性保护和/或进行加密保护秘钥的生成。The security processing unit 1302 is configured to perform integrity protection and / or generate an encryption protection key based on the first key information.
在一实施方式中,所述装置还包括:In an embodiment, the device further includes:
第一生成单元1303,用于生成第三秘钥信息,所述第三秘钥信息属于主节点秘钥信息,其中,所述第三秘钥信息与所述第一秘钥信息不同。The first generating unit 1303 is configured to generate third key information, where the third key information belongs to the master node key information, and the third key information is different from the first key information.
在一实施方式中,所述装置还包括:In an embodiment, the device further includes:
第二生成单元1304,用于基于未使用的第一安全信息生成第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。The second generating unit 1304 is configured to generate first key information based on the unused first security information, where the first key information belongs to the master node key information and is used by the first base station as the master node.
在一实施方式中,所述装置还包括:In an embodiment, the device further includes:
获取单元1305,用于从所述第二基站获取所述第一安全信息;和/或,从第一核心网网元获取所述第一安全信息。The acquiring unit 1305 is configured to acquire the first security information from the second base station; and / or acquire the first security information from a first core network element.
在一实施方式中,所述第一安全信息携带在所述第一指示信息中,所述获取单元从所述第二基站发生的所述第一指示信息中获取所述第一安全信息。In an embodiment, the first security information is carried in the first instruction information, and the obtaining unit acquires the first security information from the first instruction information generated by the second base station.
在一实施方式中,所述第一安全信息包括NCC信息和/或NH信息。In an embodiment, the first security information includes NCC information and / or NH information.
在一实施方式中,所述装置还包括:In an embodiment, the device further includes:
第三生成单元1306,用于生成第四秘钥信息,所述第四秘钥信息属于辅节点秘钥信息;A third generating unit 1306, configured to generate fourth key information, where the fourth key information belongs to the secondary node key information;
发送单元1307,用于将所述第四秘钥信息发送给所述第二基站。The sending unit 1307 is configured to send the fourth key information to the second base station.
在一实施方式中,所述接收单元1301,用于通过所述第一基站和所述第二基站之间的接口接收所述第二基站发送的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,接收第一核心网网元转发的来自所述第二基站的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,接收第一核心网网元发送的第一安全信息,以及转发的来自所述第二基站的第一指示信息和/或第一秘钥信息。In an implementation manner, the receiving unit 1301 is configured to receive the first instruction information and / or the first security sent by the second base station through an interface between the first base station and the second base station. Information and / or first key information; or receiving the first indication information and / or first security information and / or first key information from the second base station and forwarded by the first core network element; Or, receive the first security information sent by the network element of the first core network, and the first indication information and / or the first key information forwarded from the second base station.
在一实施方式中,所述第一秘钥信息或第二安全信息由所述第一基站或所述第二基站发送给终端;或者,所述第一秘钥信息或第二安全信息由所述第一核心网网元通过所述第一基站或所述第二基站透传给终端。进一步,所述第二安全信息为当前使用的秘钥或新的秘钥对应的NCC信息。In an embodiment, the first key information or the second security information is sent to the terminal by the first base station or the second base station; or the first key information or the second security information is sent by the The first core network element is transparently transmitted to the terminal through the first base station or the second base station. Further, the second security information is NCC information corresponding to a currently used key or a new key.
所述第一秘钥信息或所述第二安全信息用于所述终端执行如下过程:基于所述第一秘钥信息与所述第一基站进行通信,或者,基于所述第二安全信息派生新的秘钥, 并基于所述新的秘钥与所述第一基站进行通信。The first key information or the second security information is used by the terminal to perform a process of communicating with the first base station based on the first key information, or derived based on the second security information. A new secret key, and communicating with the first base station based on the new secret key.
本领域技术人员应当理解,本申请实施例的上述基站切换装置的相关描述可以参照本申请实施例的基站切换方法的相关描述进行理解。Those skilled in the art should understand that the related description of the foregoing base station handover apparatus in the embodiment of the present application can be understood by referring to the related description of the base station handover method in the embodiment of the present application.
图14是本申请实施例提供的一种通信设备600示意性结构图。该通信设备可以是网络设备,图14所示的通信设备600包括处理器610,处理器610可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。FIG. 14 is a schematic structural diagram of a communication device 600 according to an embodiment of the present application. The communication device may be a network device. The communication device 600 shown in FIG. 14 includes a processor 610, and the processor 610 may call and run a computer program from a memory to implement the method in the embodiment of the present application.
可选地,如图14所示,通信设备600还可以包括存储器620。其中,处理器610可以从存储器620中调用并运行计算机程序,以实现本申请实施例中的方法。Optionally, as shown in FIG. 14, the communication device 600 may further include a memory 620. The processor 610 may call and run a computer program from the memory 620 to implement the method in the embodiment of the present application.
其中,存储器620可以是独立于处理器610的一个单独的器件,也可以集成在处理器610中。The memory 620 may be a separate device independent of the processor 610, or may be integrated in the processor 610.
可选地,如图14所示,通信设备600还可以包括收发器630,处理器610可以控制该收发器630与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。Optionally, as shown in FIG. 14, the communication device 600 may further include a transceiver 630, and the processor 610 may control the transceiver 630 to communicate with other devices, and specifically, may send information or data to other devices, or receive other Information or data sent by the device.
其中,收发器630可以包括发射机和接收机。收发器630还可以进一步包括天线,天线的数量可以为一个或多个。The transceiver 630 may include a transmitter and a receiver. The transceiver 630 may further include antennas, and the number of antennas may be one or more.
可选地,该通信设备600具体可为本申请实施例的网络设备,并且该通信设备600可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the communication device 600 may specifically be a network device according to the embodiment of the present application, and the communication device 600 may implement a corresponding process implemented by the network device in each method of the embodiment of the present application. For brevity, details are not described herein again. .
可选地,该通信设备600具体可为本申请实施例的移动终端/终端设备,并且该通信设备600可以实现本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the communication device 600 may specifically be a mobile terminal / terminal device according to the embodiment of the present application, and the communication device 600 may implement a corresponding process implemented by the mobile terminal / terminal device in each method of the embodiment of the present application, for simplicity , Will not repeat them here.
图15是本申请实施例的芯片的示意性结构图。图15所示的芯片700包括处理器710,处理器710可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。FIG. 15 is a schematic structural diagram of a chip according to an embodiment of the present application. The chip 700 shown in FIG. 15 includes a processor 710, and the processor 710 may call and run a computer program from a memory to implement the method in the embodiment of the present application.
可选地,如图15所示,芯片700还可以包括存储器720。其中,处理器710可以从存储器720中调用并运行计算机程序,以实现本申请实施例中的方法。Optionally, as shown in FIG. 15, the chip 700 may further include a memory 720. The processor 710 may call and run a computer program from the memory 720 to implement the method in the embodiment of the present application.
其中,存储器720可以是独立于处理器710的一个单独的器件,也可以集成在处理器710中。The memory 720 may be a separate device independent of the processor 710, or may be integrated in the processor 710.
可选地,该芯片700还可以包括输入接口730。其中,处理器710可以控制该输入接口730与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。Optionally, the chip 700 may further include an input interface 730. The processor 710 may control the input interface 730 to communicate with other devices or chips. Specifically, the processor 710 may obtain information or data sent by the other devices or chips.
可选地,该芯片700还可以包括输出接口740。其中,处理器710可以控制该输出接口740与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。Optionally, the chip 700 may further include an output interface 740. The processor 710 may control the output interface 740 to communicate with other devices or chips. Specifically, the processor 710 may output information or data to the other devices or chips.
可选地,该芯片可应用于本申请实施例中的网络设备,并且该芯片可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the chip may be applied to the network device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the network device in each method of the embodiment of the present application. For brevity, details are not described herein again.
可选地,该芯片可应用于本申请实施例中的移动终端/终端设备,并且该芯片可以实现本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the chip can be applied to the mobile terminal / terminal device in the embodiments of the present application, and the chip can implement the corresponding process implemented by the mobile terminal / terminal device in each method of the embodiments of the present application. For simplicity, here No longer.
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。It should be understood that the chip mentioned in the embodiments of the present application may also be referred to as a system-level chip, a system chip, a chip system or a system-on-chip.
图16是本申请实施例提供的一种通信系统900的示意性框图。如图16所示,该通信系统900包括终端设备910和网络设备920。FIG. 16 is a schematic block diagram of a communication system 900 according to an embodiment of the present application. As shown in FIG. 16, the communication system 900 includes a terminal device 910 and a network device 920.
其中,该终端设备910可以用于实现上述方法中由终端设备实现的相应的功能,以及该网络设备920可以用于实现上述方法中由网络设备实现的相应的功能为了简洁,在 此不再赘述。The terminal device 910 may be used to implement the corresponding functions implemented by the terminal device in the foregoing method, and the network device 920 may be used to implement the corresponding functions implemented by the network device in the foregoing method. .
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。It should be understood that the processor in the embodiment of the present application may be an integrated circuit chip and has a signal processing capability. In the implementation process, each step of the foregoing method embodiment may be completed by using an integrated logic circuit of hardware in a processor or an instruction in a form of software. The above processor may be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (Field, Programmable Gate Array, FPGA), or other Programming logic devices, discrete gate or transistor logic devices, discrete hardware components. Various methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed. A general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in combination with the embodiments of the present application may be directly implemented by a hardware decoding processor, or may be performed by using a combination of hardware and software modules in the decoding processor. The software module may be located in a mature storage medium such as a random access memory, a flash memory, a read-only memory, a programmable read-only memory, or an electrically erasable programmable memory, a register, and the like. The storage medium is located in a memory, and the processor reads the information in the memory and completes the steps of the foregoing method in combination with its hardware.
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It can be understood that the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), and an electronic memory. Erase programmable read-only memory (EPROM, EEPROM) or flash memory. The volatile memory may be Random Access Memory (RAM), which is used as an external cache. By way of example, but not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (Synchlink DRAM, SLDRAM ) And direct memory bus random access memory (Direct Rambus RAM, DR RAM). It should be noted that the memory of the systems and methods described herein is intended to include, but is not limited to, these and any other suitable types of memory.
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It should be understood that the foregoing memory is exemplary but not restrictive. For example, the memory in the embodiment of the present application may also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (SDRAM), double data rate synchronous dynamic random access memory (Double SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct RAMbus RAM, DR RAM) and so on. That is, the memories in the embodiments of the present application are intended to include, but not limited to, these and any other suitable types of memories.
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。An embodiment of the present application further provides a computer-readable storage medium for storing a computer program.
可选的,该计算机可读存储介质可应用于本申请实施例中的网络设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer-readable storage medium can be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method in the embodiment of the present application. No longer.
可选地,该计算机可读存储介质可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer-readable storage medium may be applied to the mobile terminal / terminal device in the embodiment of the present application, and the computer program causes the computer to execute a corresponding process implemented by the mobile terminal / terminal device in each method in the embodiment of the present application. For the sake of brevity, I won't repeat them here.
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。An embodiment of the present application further provides a computer program product, including computer program instructions.
可选的,该计算机程序产品可应用于本申请实施例中的网络设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简 洁,在此不再赘述。Optionally, the computer program product can be applied to the network device in the embodiment of the present application, and the computer program instruction causes the computer to execute a corresponding process implemented by the network device in each method in the embodiment of the present application. More details.
可选地,该计算机程序产品可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program product can be applied to a mobile terminal / terminal device in the embodiments of the present application, and the computer program instructions cause the computer to execute a corresponding process implemented by the mobile terminal / terminal device in each method in the embodiments of the present application, For brevity, I will not repeat them here.
本申请实施例还提供了一种计算机程序。The embodiment of the present application also provides a computer program.
可选的,该计算机程序可应用于本申请实施例中的网络设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program may be applied to a network device in the embodiment of the present application. When the computer program is run on a computer, the computer is caused to execute a corresponding process implemented by the network device in each method in the embodiment of the present application. , Will not repeat them here.
可选地,该计算机程序可应用于本申请实施例中的移动终端/终端设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program may be applied to a mobile terminal / terminal device in the embodiment of the present application. When the computer program is run on a computer, the computer executes each method in the embodiment of the application by the mobile terminal / terminal device. The corresponding processes are not repeated here for brevity.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art may realize that the units and algorithm steps of each example described in connection with the embodiments disclosed herein can be implemented by electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed by hardware or software depends on the specific application and design constraints of the technical solution. Professional technicians can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of description, the specific working processes of the systems, devices, and units described above can refer to the corresponding processes in the foregoing method embodiments, and are not repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other ways. For example, the device embodiments described above are only schematic. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner. For example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, which may be electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, the functional units in the embodiments of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,)ROM、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of this application is essentially a part that contributes to the existing technology or a part of the technical solution can be embodied in the form of a software product. The computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory) ROM, random access memory (Random Access Memory, RAM), magnetic disks or optical disks and other media that can store program codes .
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。The above is only a specific implementation of this application, but the scope of protection of this application is not limited to this. Any person skilled in the art can easily think of changes or replacements within the technical scope disclosed in this application. It should be covered by the protection scope of this application. Therefore, the protection scope of this application shall be subject to the protection scope of the claims.
Claims (33)
- 一种基站切换方法,所述方法包括:A base station handover method, the method includes:第一基站接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换,所述第一基站为辅节点,所述第二基站为主节点。The first base station receives first instruction information sent by a second base station, where the first instruction information is used to instruct execution of a conversion between a primary node and a secondary node, the first base station is a secondary node, and the second base station is a primary node.
- 根据权利要求1所述的方法,其中,所述第一指示信息携带第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。The method according to claim 1, wherein the first indication information carries first key information, and the first key information belongs to master node key information, and is used by the first base station as a master node.
- 根据权利要求2所述的方法,其中,所述第一秘钥信息由所述第二基站通过以下方式生成:The method according to claim 2, wherein the first key information is generated by the second base station in the following manner:如果有未使用的第一安全信息,则基于所述未使用的第一安全信息生成所述第一秘钥信息;If there is unused first security information, generating the first key information based on the unused first security information;如果没有未使用的第一安全信息,则根据当前使用的第二秘钥信息生成所述第一秘钥信息。If there is no unused first security information, the first key information is generated according to the currently used second key information.
- 根据权利要求2或3所述的方法,其中,所述方法还包括:The method according to claim 2 or 3, wherein the method further comprises:所述第一基站基于所述第一秘钥信息进行完整性保护和/或进行加密保护秘钥的生成。The first base station performs integrity protection and / or generates encryption protection key based on the first key information.
- 根据权利要求2至4任一项所述的方法,其中,所述第一基站与所述第二基站执行完主节点与辅节点之间的转换过程后,The method according to any one of claims 2 to 4, wherein after the first base station and the second base station perform a conversion process between a primary node and a secondary node,所述第一基站作为主节点生成第三秘钥信息,所述第三秘钥信息属于主节点秘钥信息,其中,所述第三秘钥信息与所述第一秘钥信息不同。The first base station as the master node generates third key information, and the third key information belongs to the master node key information, wherein the third key information is different from the first key information.
- 根据权利要求1所述的方法,其中,所述方法还包括:The method according to claim 1, further comprising:所述第一基站基于未使用的第一安全信息生成第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。The first base station generates first key information based on unused first security information, where the first key information belongs to master node key information and is used by the first base station as a master node.
- 根据权利要求6所述的方法,其中,所述方法还包括:The method according to claim 6, wherein the method further comprises:所述第一基站从所述第二基站获取所述第一安全信息;和/或,The first base station acquires the first security information from the second base station; and / or,所述第一基站从第一核心网网元获取所述第一安全信息。Acquiring, by the first base station, the first security information from a first core network element.
- 根据权利要求7所述的方法,其中,所述第一基站从所述第二基站获取所述第一安全信息的情况,所述第一安全信息携带在所述第一指示信息中。The method according to claim 7, wherein when the first base station obtains the first security information from the second base station, the first security information is carried in the first indication information.
- 根据权利要求3、6至8任一项所述的方法,其中,所述第一安全信息包括NCC信息和/或NH信息。The method according to any one of claims 3, 6 to 8, wherein the first security information includes NCC information and / or NH information.
- 根据权利要求1至9任一项所述的方法,其中,所述第一基站与所述第二基站执行完主节点与辅节点之间的转换过程后,The method according to any one of claims 1 to 9, wherein after the first base station and the second base station perform a conversion process between a primary node and a secondary node,所述第一基站作为主节点生成第四秘钥信息,所述第四秘钥信息属于辅节点秘钥信息;Generating, by the first base station as a primary node, fourth key information, where the fourth key information belongs to secondary node key information;所述第一基站将所述第四秘钥信息发送给所述第二基站。Sending, by the first base station, the fourth key information to the second base station.
- 根据权利要求1至10任一项所述的方法,其中,The method according to any one of claims 1 to 10, wherein:所述第一基站通过所述第一基站和所述第二基站之间的接口接收所述第二基站发送的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,Receiving, by the first base station through the interface between the first base station and the second base station, the first indication information and / or the first security information and / or the first key information sent by the second base station ;or,所述第一基站接收第一核心网网元转发的来自所述第二基站的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,Receiving, by the first base station, the first indication information and / or the first security information and / or the first key information from the second base station forwarded by the first core network element; or,所述第一基站接收第一核心网网元发送的第一安全信息,以及转发的来自所述第二基站的第一指示信息和/或第一秘钥信息。The first base station receives the first security information sent by the network element of the first core network, and the first indication information and / or the first key information forwarded from the second base station.
- 根据权利要求2至11任一项所述的方法,其中,The method according to any one of claims 2 to 11, wherein:所述第一秘钥信息或第二安全信息由所述第一基站或所述第二基站发送给终端; 或者,Sending the first key information or the second security information to the terminal by the first base station or the second base station; or所述第一秘钥信息或第二安全信息由所述第一核心网网元通过所述第一基站或所述第二基站透传给终端。The first key information or the second security information is transparently transmitted to the terminal by the first core network element through the first base station or the second base station.
- 根据权利要求12所述的方法,其中,所述第二安全信息为当前使用的秘钥或新的秘钥对应的NCC信息。The method according to claim 12, wherein the second security information is NCC information corresponding to a currently used key or a new key.
- 根据权利要求12或13所述的方法,其中,所述第一秘钥信息或所述第二安全信息用于所述终端执行如下过程:基于所述第一秘钥信息与所述第一基站进行通信,或者,基于所述第二安全信息派生新的秘钥,并基于所述新的秘钥与所述第一基站进行通信。The method according to claim 12 or 13, wherein the first key information or the second security information is used by the terminal to perform a process based on the first key information and the first base station Performing communication, or deriving a new key based on the second security information, and communicating with the first base station based on the new key.
- 一种基站切换装置,所述装置包括:A base station switching device includes:接收单元,用于接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一基站为辅节点,所述第二基站为主节点。A receiving unit, configured to receive first instruction information sent by a second base station, where the first instruction information is used to instruct execution of a conversion process between a primary node and a secondary node, where the first base station is a secondary node, and the second The base station is the master node.
- 根据权利要求15所述的装置,其中,所述第一指示信息携带第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。The apparatus according to claim 15, wherein the first indication information carries first key information, and the first key information belongs to master node key information, and is used by the first base station as a master node.
- 根据权利要求16所述的装置,其中,所述第一秘钥信息由所述第二基站通过以下方式生成:The apparatus according to claim 16, wherein the first key information is generated by the second base station in the following manner:如果有未使用的第一安全信息,则基于所述未使用的第一安全信息生成所述第一秘钥信息;If there is unused first security information, generating the first key information based on the unused first security information;如果没有未使用的第一安全信息,则根据当前使用的第二秘钥信息生成所述第一秘钥信息。If there is no unused first security information, the first key information is generated according to the currently used second key information.
- 根据权利要求16或17所述的装置,其中,所述装置还包括:The apparatus according to claim 16 or 17, wherein the apparatus further comprises:安全处理单元,用于基于所述第一秘钥信息进行完整性保护和/或进行加密保护秘钥的生成。The security processing unit is configured to perform integrity protection and / or generate an encryption protection key based on the first key information.
- 根据权利要求16至18任一项所述的装置,其中,所述装置还包括:The device according to any one of claims 16 to 18, wherein the device further comprises:第一生成单元,用于生成第三秘钥信息,所述第三秘钥信息属于主节点秘钥信息,其中,所述第三秘钥信息与所述第一秘钥信息不同。The first generating unit is configured to generate third key information, where the third key information belongs to the master node key information, wherein the third key information is different from the first key information.
- 根据权利要求15所述的装置,其中,所述装置还包括:The apparatus according to claim 15, wherein the apparatus further comprises:第二生成单元,用于基于未使用的第一安全信息生成第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。The second generating unit is configured to generate first key information based on the unused first security information, where the first key information belongs to the master node key information and is used by the first base station as the master node.
- 根据权利要求20所述的装置,其中,所述装置还包括:The apparatus of claim 20, wherein the apparatus further comprises:获取单元,用于从所述第二基站获取所述第一安全信息;和/或,从第一核心网网元获取所述第一安全信息。An acquiring unit, configured to acquire the first security information from the second base station; and / or acquire the first security information from a first core network element.
- 根据权利要求21所述的装置,其中,所述第一安全信息携带在所述第一指示信息中,所述获取单元从所述第二基站发生的所述第一指示信息中获取所述第一安全信息。The apparatus according to claim 21, wherein the first security information is carried in the first indication information, and the obtaining unit obtains the first security information from the first indication information generated by the second base station. A safety message.
- 根据权利要求17、20至22任一项所述的装置,其中,所述第一安全信息包括NCC信息和/或NH信息。The device according to any one of claims 17, 20 to 22, wherein the first safety information includes NCC information and / or NH information.
- 根据权利要求15至23任一项所述的装置,其中,所述装置还包括:The device according to any one of claims 15 to 23, wherein the device further comprises:第三生成单元,用于生成第四秘钥信息,所述第四秘钥信息属于辅节点秘钥信息;A third generating unit, configured to generate fourth key information, where the fourth key information belongs to the secondary node key information;发送单元,用于将所述第四秘钥信息发送给所述第二基站。A sending unit, configured to send the fourth key information to the second base station.
- 根据权利要求15至24任一项所述的装置,其中,所述接收单元,用于通过所述第一基站和所述第二基站之间的接口接收所述第二基站发送的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,接收第一核心网网元转发的来自所 述第二基站的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,接收第一核心网网元发送的第一安全信息,以及转发的来自所述第二基站的第一指示信息和/或第一秘钥信息。The apparatus according to any one of claims 15 to 24, wherein the receiving unit is configured to receive the first base station sent by the second base station through an interface between the first base station and the second base station. An indication information and / or a first security information and / or a first key information; or, receiving the first indication information and / or the first security information from the second base station forwarded by a first core network element And / or the first key information; or receiving the first security information sent by the network element of the first core network, and the first indication information and / or the first key information forwarded from the second base station.
- 根据权利要求16至25任一项所述的装置,其中,The device according to any one of claims 16 to 25, wherein:所述第一秘钥信息或第二安全信息由所述第一基站或所述第二基站发送给终端;或者,The first key information or the second security information is sent to the terminal by the first base station or the second base station; or所述第一秘钥信息或第二安全信息由所述第一核心网网元通过所述第一基站或所述第二基站透传给终端。The first key information or the second security information is transparently transmitted to the terminal by the first core network element through the first base station or the second base station.
- 根据权利要求26所述的装置,其中,所述第二安全信息为当前使用的秘钥或新的秘钥对应的NCC信息。The device according to claim 26, wherein the second security information is NCC information corresponding to a currently used key or a new key.
- 根据权利要求26或27所述的装置,其中,所述第一秘钥信息或所述第二安全信息用于所述终端执行如下过程:基于所述第一秘钥信息与所述第一基站进行通信,或者,基于所述第二安全信息派生新的秘钥,并基于所述新的秘钥与所述第一基站进行通信。The apparatus according to claim 26 or 27, wherein the first key information or the second security information is used by the terminal to perform a process based on the first key information and the first base station Performing communication, or deriving a new key based on the second security information, and communicating with the first base station based on the new key.
- 一种网络设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至14中任一项所述的方法。A network device includes a processor and a memory, where the memory is configured to store a computer program, and the processor is configured to call and run the computer program stored in the memory, and execute the method according to any one of claims 1 to 14. Methods.
- 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至14中任一项所述的方法。A chip includes a processor for calling and running a computer program from a memory, so that a device having the chip installed performs the method according to any one of claims 1 to 14.
- 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至14中任一项所述的方法。A computer-readable storage medium for storing a computer program that causes a computer to perform the method according to any one of claims 1 to 14.
- 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至14中任一项所述的方法。A computer program product comprising computer program instructions that cause a computer to perform the method according to any one of claims 1 to 14.
- 一种计算机程序,所述计算机程序使得计算机执行如权利要求1至14中任一项所述的方法。A computer program that causes a computer to perform the method according to any one of claims 1 to 14.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201880091251.1A CN111869262B (en) | 2018-08-03 | 2018-08-03 | Base station switching method and device, and network equipment |
PCT/CN2018/098673 WO2020024296A1 (en) | 2018-08-03 | 2018-08-03 | Base station switching method and apparatus, and network device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/098673 WO2020024296A1 (en) | 2018-08-03 | 2018-08-03 | Base station switching method and apparatus, and network device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020024296A1 true WO2020024296A1 (en) | 2020-02-06 |
Family
ID=69230779
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/098673 WO2020024296A1 (en) | 2018-08-03 | 2018-08-03 | Base station switching method and apparatus, and network device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111869262B (en) |
WO (1) | WO2020024296A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113613244A (en) * | 2020-04-17 | 2021-11-05 | 华为技术有限公司 | Node switching method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101932016A (en) * | 2009-06-18 | 2010-12-29 | 中兴通讯股份有限公司 | Method and device for switching between base stations |
CN103947275A (en) * | 2011-10-04 | 2014-07-23 | 三星电子株式会社 | Method and system for signalling and processing control information in a mobile broadband network environment |
CN104254066A (en) * | 2013-06-28 | 2014-12-31 | 华为技术有限公司 | State information transfer method, deactivation method, station equipment and terminal equipment |
WO2016131323A1 (en) * | 2015-07-01 | 2016-08-25 | 中兴通讯股份有限公司 | Method and apparatus for controlling dual connection x2 state report transmission and secondary base station |
CN108293214A (en) * | 2015-11-18 | 2018-07-17 | 瑞典爱立信有限公司 | Wireless communication system, wireless device, network node and method therein for changing master node for wireless device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9756531B2 (en) * | 2013-09-30 | 2017-09-05 | Lg Electronics Inc. | Method for determining radio resource control configuration in a wireless communication system supporting dual connectivity and apparatus thereof |
EP3101992A4 (en) * | 2014-01-31 | 2017-10-18 | Kyocera Corporation | Base station, user terminal, and communication control method |
KR101819409B1 (en) * | 2014-03-06 | 2018-01-16 | 닛본 덴끼 가부시끼가이샤 | Apparatus, system and method for dual connectivity |
-
2018
- 2018-08-03 CN CN201880091251.1A patent/CN111869262B/en active Active
- 2018-08-03 WO PCT/CN2018/098673 patent/WO2020024296A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101932016A (en) * | 2009-06-18 | 2010-12-29 | 中兴通讯股份有限公司 | Method and device for switching between base stations |
CN103947275A (en) * | 2011-10-04 | 2014-07-23 | 三星电子株式会社 | Method and system for signalling and processing control information in a mobile broadband network environment |
CN104254066A (en) * | 2013-06-28 | 2014-12-31 | 华为技术有限公司 | State information transfer method, deactivation method, station equipment and terminal equipment |
WO2016131323A1 (en) * | 2015-07-01 | 2016-08-25 | 中兴通讯股份有限公司 | Method and apparatus for controlling dual connection x2 state report transmission and secondary base station |
CN108293214A (en) * | 2015-11-18 | 2018-07-17 | 瑞典爱立信有限公司 | Wireless communication system, wireless device, network node and method therein for changing master node for wireless device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113613244A (en) * | 2020-04-17 | 2021-11-05 | 华为技术有限公司 | Node switching method and device |
Also Published As
Publication number | Publication date |
---|---|
CN111869262A (en) | 2020-10-30 |
CN111869262B (en) | 2022-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020164016A1 (en) | Cell switching method and device | |
WO2019242722A1 (en) | Measurement control method and apparatus, and terminal device | |
WO2020154994A1 (en) | Cell handover method, terminal device, and network device | |
WO2020061931A1 (en) | Method for switching reporting, terminal device and network device | |
US11229079B2 (en) | Information configuration method and terminal | |
WO2020227870A1 (en) | Switching method and apparatus, and communication device | |
US11785517B2 (en) | Method and apparatus for distinguishing between data formats, and communication device | |
WO2020113520A1 (en) | Connection establishing method, network device, and terminal device | |
WO2020155157A1 (en) | Security information processing method and apparatus during handover process, network device, and terminal | |
WO2020024301A1 (en) | Method and device for ensuring data transmission reliability, and network apparatus | |
WO2020082247A1 (en) | Processing method for security algorithm, device and terminal | |
WO2020024296A1 (en) | Base station switching method and apparatus, and network device | |
WO2020000174A1 (en) | Core network selection method and apparatus, terminal device and network device | |
WO2020061851A1 (en) | Wireless communication method and base station | |
US20210227385A1 (en) | Wireless communication method and device | |
WO2020082327A1 (en) | Method and apparatus for signaling interaction during switching process, and network device | |
WO2020061943A1 (en) | Data transmission method, terminal device and network device | |
WO2020097819A1 (en) | Method and apparatus for transmitting data upon handover, chip, and computer program | |
WO2020082336A1 (en) | Radio communication method, terminal device and network device | |
EP4007370B1 (en) | Wireless communication method and apparatus, and network device | |
US20220182895A1 (en) | Wireless communication method and apparatus, and network device | |
CN111989951B (en) | Data forwarding method and device, and network equipment | |
WO2020107340A1 (en) | Data processing method, devices, and storage medium | |
WO2020043010A1 (en) | Ui display method, terminal apparatus and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18928805 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18928805 Country of ref document: EP Kind code of ref document: A1 |