WO2020125592A1 - 通信方法、装置及系统 - Google Patents

通信方法、装置及系统 Download PDF

Info

Publication number
WO2020125592A1
WO2020125592A1 PCT/CN2019/125728 CN2019125728W WO2020125592A1 WO 2020125592 A1 WO2020125592 A1 WO 2020125592A1 CN 2019125728 W CN2019125728 W CN 2019125728W WO 2020125592 A1 WO2020125592 A1 WO 2020125592A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
terminal device
anonymous
rrc connection
establish
Prior art date
Application number
PCT/CN2019/125728
Other languages
English (en)
French (fr)
Inventor
张宏平
胡星星
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to JP2021535785A priority Critical patent/JP7381586B2/ja
Priority to EP19898306.6A priority patent/EP3886473A4/en
Publication of WO2020125592A1 publication Critical patent/WO2020125592A1/zh
Priority to US17/351,324 priority patent/US20210315044A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/10Scheduling measurement reports ; Arrangements for measurement reports
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Definitions

  • This application relates to the field of communication technology, and in particular to a communication method, device, and system that can support anonymous connection.
  • the minimization of driving test (MDT) technology of automatic measurement collection (measurement collection) is introduced in the prior art to complete part of the traditional drive testing work to detect and optimize the problems in the wireless network Or malfunction.
  • the application scenarios of the MDT technology may include, for example, operators generally perform routine network coverage drive tests every month, or do some network coverage drive tests for specific areas in response to user complaints, and so on.
  • the realization of MDT technology depends on the reporting of terminal equipment.
  • the terminal device must report the MDT data to the base station after passing the authentication of the core network, that is, the terminal device first establishes a radio resource control (RRC) connection on the air interface and passes the core network authentication or
  • RRC radio resource control
  • MDT data can only be sent to the base station after the air interface security is successfully activated.
  • MDT data carries location information, which involves security and user privacy issues, there may be access risks. Therefore, how to protect the security and user privacy during MDT data transmission is a problem that needs to be solved urgently.
  • the communication method provided by the embodiments of the present application may be used to protect the security and user privacy issues during data transmission.
  • a communication method and corresponding communication device are provided.
  • the access network device receives a first message from the terminal device, and the first message is used to instruct the terminal device to request an anonymous method to establish a radio resource control RRC connection; the access network device learns according to the first message The terminal device requests to use an anonymous method to establish the RRC connection; the access network device determines to establish an anonymous RRC connection with the terminal device.
  • the elements constituting user privacy include two aspects, namely the subject and object of user privacy, the subject is generally characterized by the identity information of the terminal device; the object is private information. The embodiments of the present application consider starting with the subject to solve the privacy problem of anonymous data.
  • the anonymous data can be transmitted, thereby protecting the security and user privacy issues during data transmission.
  • the anonymous data may include, for example, minimization of drive test MDT data, so as to alleviate the security and user privacy issues in the MDT data transmission process.
  • the access network device determining to establish an anonymous RRC connection with the terminal device includes: the access network device does not perform the step of establishing a connection with the core network device for the terminal device; Or the access network device establishes a connection with the core network device for the terminal device, but the terminal device does not send the core network device identity information that can directly or indirectly identify the terminal device, such as the international mobile user identification code IMSI, signing the permanent identification SUPI, S temporary mobile user identification code S-TMSI or fifth-generation 5G S-TMSI, etc.
  • the access network device does not perform the step of establishing a connection with the core network device for the terminal device, which may refer to the connection establishment between the access network device and the terminal device in an anonymous mode , No need to introduce the participation of the core network equipment; or it means that the access network equipment skips the step of establishing a connection with the core network equipment for the terminal equipment; or it means that the access network equipment ignores the establishment of the terminal equipment with the core network equipment
  • the connection step refers to the step in which the access network device does not initiate a connection with the core network device to establish a terminal device, etc., which is not specifically limited in this embodiment of the present application.
  • connection between the access network device and the core network device for the terminal device may be, for example, an N2 connection for the terminal device or a next-generation NG connection in the new air interface NR system; or, the access network device and the core network device
  • the connection between the terminal devices may be, for example, an S1 connection to the terminal device in the long-term evolution LTE system.
  • the step of establishing a connection with the core network device for the terminal device may include, for example, the base station sending an initial terminal message (initial UE) to the core network device, so that the core network device receives the After the initial terminal message, the terminal device is authenticated or authenticated. Furthermore, the core network device sends an initial context request (initial context setting request) to the base station, and the base station returns an initial context response (initial context setting setup response) to the core network device.
  • initial context request initial context setting request
  • the base station returns an initial context response (initial context setting setup response) to the core network device.
  • the first message carries first indication information
  • the first indication information is used to instruct the terminal device to request an anonymous way to establish the RRC connection. That is to say, in the embodiment of the present application, an explicit indication information may be used to instruct the terminal device to request to establish the RRC connection in an anonymous manner.
  • the first message is an RRC establishment complete message; according to the first message, the access network device learns that the terminal device requests to use an anonymous method to establish the RRC connection, including: the access network device determining The RRC establishment complete message does not carry NAS PDU cells or the RRC establishment complete message carries a NAS cell with a length of 0; the access network device learns that the terminal device requests to use an anonymous method to establish the RRC connection. That is to say, in the embodiment of the present application, the access network device may determine whether the terminal device requests whether the RRC setup complete message carries NAS PDU cells or the RRC setup complete message carries NAS PDU cells of length 0. Use an anonymous method to establish the RRC connection.
  • the access network device determines that the RRC setup complete message does not carry NAS PDU cells or the RRC setup complete message carries NAS PDU cells with a length of 0; the access network device learns that the terminal device requests to use an anonymous method to establish the RRC connection.
  • the access network device receiving the first message from the terminal device includes: the access network device receiving the first message from the terminal device on the first random access resource, the The first random access resource is a dedicated resource for random access for the terminal device to request an anonymous way to establish the RRC connection; according to the first message, the access network device learns that the terminal device requests to use an anonymous way to establish the RRC
  • the connection includes: the access network device learns that the terminal device requests to use an anonymous method to establish the RRC connection according to the first random access resource.
  • the terminal device may request that the dedicated resource for random access to establish the RRC connection using the anonymous method bear the first message, and then after the access network device receives the first message, according to the first A random access resource can know that the terminal device requests to use an anonymous method to establish the RRC connection.
  • the first random access resource may include, for example, any combination of a first random access preamble, a first random access time domain resource, and a first random access frequency domain resource.
  • the method further includes: the access network device sends second indication information, where the second indication information is used to indicate the terminal device Requesting configuration information of a dedicated resource for random access to establish the RRC connection in an anonymous manner, where the configuration information includes configuration information of the first random access resource.
  • the access network device and the terminal device may pre-negotiate the configuration information of the dedicated resource for the terminal device to request random access to establish an RRC connection using the anonymous method; or, pre-configure or pre-appoint
  • this embodiment of the present application does not specifically limit this.
  • the method further includes: the access network device receives a second message from the terminal device, the first The second message carries anonymous data. That is to say, in the embodiments of the present application, anonymous data can be transmitted through the control plane. Among them, the transmission of anonymous data through the control plane, because there is no need to establish a data bearing DRB, so compared to the method of transmitting anonymous data through the user plane, it is simpler.
  • the second message also carries third indication information, which is used to indicate the completion of data transmission or the anonymous data is the last packet of anonymous data; the method further includes: the access network device according to the first Three instructions, release the RRC connection corresponding to the terminal device. Based on this solution, since the access network device can release the RRC connection corresponding to the terminal device in time after the anonymous data transmission is completed, the energy consumption of the terminal device can be saved.
  • the method further includes: the access network device sends a third message to the terminal device, the third The message is used to indicate the establishment of a data bearer DRB; the access network device receives anonymous data from the terminal device from the DRB. That is to say, in the embodiment of the present application, anonymous data can be transmitted through the user plane. Among them, the method of transmitting anonymous data through the user plane does not require the decoding of RRC messages. Therefore, compared with the method of transmitting anonymous data through the control plane, the processing resource overhead of the access network device is reduced.
  • the method further includes: the access network device receives fourth indication information from the terminal device from the DRB, the fourth indication information is used to indicate the completion of data transmission or the anonymous data is the last packet of anonymous data
  • the access network device releases the RRC connection corresponding to the terminal device according to the fourth instruction information. Based on this solution, since the access network device can release the RRC connection corresponding to the terminal device in time after the anonymous data transmission is completed, the energy consumption of the terminal device can be saved.
  • the method further includes: the access network device receives a fourth message from the terminal device, the fourth message is used to indicate that the data transmission is completed or the anonymous data is the last packet of anonymous data, or the fourth message It is used to request to release the RRC connection corresponding to the terminal device; the access network device releases the RRC connection corresponding to the terminal device according to the fourth message. Based on this solution, since the access network device can release the RRC connection corresponding to the terminal device in time after the anonymous data transmission is completed, the energy consumption of the terminal device can be saved.
  • the method further includes: the access network device sends fifth indication information, the fifth indication information is used Indicating that the serving cell of the terminal device supports the transmission of anonymous data, or the fifth indication information is used to indicate that the serving cell of the terminal device supports the establishment of an anonymous RRC connection.
  • the terminal device can learn that the serving cell of the terminal device supports the transmission of anonymous data, or that the serving cell of the terminal device supports the establishment of an anonymous RRC connection. In this way, the terminal device can determine to establish the RRC connection using the anonymous method according to the fifth instruction information when the anonymous data needs to be transmitted.
  • a communication method and corresponding communication device are provided.
  • the terminal device determines to use an anonymous method to establish a radio resource control RRC connection; the terminal device sends a first message to the access network device, where the first message is used to instruct the terminal device to request to use an anonymous method to establish the RRC connection.
  • the elements constituting user privacy include two aspects, namely the subject and object of user privacy, the subject is generally characterized by the identity information of the terminal device; the object is private information. If the private information lacks the subject, then it no longer poses a privacy issue.
  • the private information may include location information, for example. The location information is crucial for network optimization. For example, if there is no location information, the MDT effect will be greatly reduced.
  • the embodiments of the present application consider starting with the subject to solve the privacy problem of anonymous data. Based on this solution, since an anonymous RRC connection can be established between the access network device and the terminal device, anonymous data can be transmitted, thereby protecting the security and user privacy issues during data transmission.
  • the anonymous data may include, for example, minimization of drive test MDT data, so as to alleviate the security and user privacy issues in the MDT data transmission process.
  • the first message carries first indication information
  • the first indication information is used to instruct the terminal device to request an anonymous way to establish the RRC connection. That is to say, in the embodiment of the present application, an explicit indication information may be used to instruct the terminal device to request to establish the RRC connection in an anonymous manner.
  • the first message is an RRC setup complete message, where the RRC setup complete message does not carry NAS PDU cells or the RRC setup complete message carries NAS PDU cells with a length of 0. That is to say, in the embodiment of the present application, the access network device may determine whether the terminal device requests whether the RRC setup complete message carries NAS PDU cells or the RRC setup complete message carries NAS PDU cells of length 0. Use an anonymous method to establish the RRC connection. If the access network device determines that the RRC setup complete message does not carry NAS PDU cells or the RRC setup complete message carries NAS PDU cells with a length of 0; the access network device learns that the terminal device requests to use an anonymous method to establish the RRC connection.
  • the terminal device sending the first message to the access network device includes: the terminal device sending the first message to the access network device on the first random access resource; the first The random access resource is a dedicated resource used by the terminal device to request random access to establish the RRC connection in an anonymous manner. That is to say, in the embodiment of the present application, the terminal device may request that the dedicated resource for random access to establish the RRC connection using the anonymous method bear the first message, and then after the access network device receives the first message, according to the first A random access resource can know that the terminal device requests to use an anonymous method to establish the RRC connection.
  • the first random access resource may include, for example, any combination of a first random access preamble, a first random access time domain resource, and a first random access frequency domain resource.
  • the method further includes: the terminal device receives second indication information from the access network device, where the second indication information is used to indicate The terminal device requests configuration information of a dedicated resource for random access that establishes the RRC connection in an anonymous manner, where the configuration information includes configuration information of the first random access resource.
  • the access network device and the terminal device may pre-negotiate the configuration information of the dedicated resource for the terminal device to request random access to establish an RRC connection using the anonymous method; or, pre-configure or pre-appoint
  • this embodiment of the present application does not specifically limit this.
  • the method further includes: the terminal device sends a second message to the access network device, where the second message carries anonymous data. That is to say, in the embodiments of the present application, anonymous data can be transmitted through the control plane. Among them, the transmission of anonymous data through the control plane, because there is no need to establish a data bearing DRB, so compared to the method of transmitting anonymous data through the user plane, it is simpler.
  • the second message also carries third indication information, and the third indication information is used to indicate that the data transmission is completed or that the current transmission is the last anonymous data packet.
  • the access network device can learn that the anonymous data transmission is completed, and then can release the RRC connection corresponding to the terminal device in time, so the energy consumption of the terminal device can be saved.
  • the method further includes: the terminal device receives a third message from the access network device, and the third message is used to indicate Establish a data bearing DRB; the terminal device establishes the DRB according to the third message; the terminal device sends anonymous data to the access network device on the DRB. That is to say, in the embodiment of the present application, anonymous data can be transmitted through the user plane. Among them, the method of transmitting anonymous data through the user plane does not require the decoding of RRC messages. Therefore, compared with the method of transmitting anonymous data through the control plane, the processing resource overhead of the access network device is reduced.
  • the method further includes: the terminal device sends fourth indication information to the access network device on the DRB, where the fourth indication information is used to indicate the completion of data transmission or the anonymous data is the last packet of anonymous data.
  • the access network device can learn that the anonymous data transmission is completed, and then can release the RRC connection corresponding to the terminal device in time, so the energy consumption of the terminal device can be saved.
  • the method further includes: the terminal device sends a fourth message to the access network device, the fourth message is used to indicate the completion of data transmission or the anonymous data is the last packet of anonymous data, or the fourth message is used In order to request to release the RRC connection corresponding to the terminal device.
  • the access network device can learn that the anonymous data transmission is completed, and then can release the RRC connection corresponding to the terminal device in time, so the energy consumption of the terminal device can be saved.
  • the method further includes: the terminal device receives fifth indication information from the access network device, the fifth indication information is used to indicate that the serving cell of the terminal device supports transmission of anonymous data, or the The fifth indication information is used to indicate that the serving cell of the terminal device supports establishing an anonymous RRC connection; the terminal device determining to use an anonymous method to establish an RRC connection includes: according to the fifth instruction information, the terminal device determines to use an anonymous method to establish an RRC connection connection. Based on this solution, the terminal device can learn that the serving cell of the terminal device supports the transmission of anonymous data, or the serving cell of the terminal device supports the establishment of an anonymous RRC connection. In this way, the terminal device can determine to establish the RRC connection using the anonymous method according to the fifth instruction information when the anonymous data needs to be transmitted.
  • the second indication information is used to indicate the configuration information of the dedicated resource used for the terminal device to request random access to establish the RRC connection using the anonymous method, which may be It means that the second indication information includes configuration information of a dedicated resource used for random access of a terminal device requesting to establish an RRC connection using an anonymous method; or it may refer to that the second indication information includes an anonymous method for a terminal device to request establishment
  • the identification (or index) of the configuration information of the dedicated resource for random access of the RRC connection and further, the terminal device according to the identification (or index) of the configuration information of the dedicated resource, the configuration information of the dedicated resource and the configuration information of the dedicated resource
  • the corresponding relationship of the identifier (or index) can determine the configuration information of the dedicated resource, which is not specifically limited in this embodiment of the present application.
  • the configuration information of the dedicated resource is random access preamble sequence information, random access time domain resource information, and random access frequency domain resource information. combination.
  • the above-mentioned dedicated resource configuration information may include random access preamble information; or, the dedicated resource configuration information may include random access time domain resource information; or, the dedicated resource configuration information may include random access frequency domain Resource information; or, the configuration information of the dedicated resource may include random access preamble information on the random access frequency domain resource, that is, the configuration information of the dedicated resource includes random access frequency resource information and random access preamble information
  • the configuration information of the dedicated resource may include random access preamble information on the random access time domain resource, that is, the configuration information of the dedicated resource includes random access time domain resource information and random access preamble code information
  • the configuration information of the dedicated resource may include random access time domain resources and random access preambles on the random access frequency domain resources, that is to say, the configuration information of the dedicated resources includes random access time domain resource information, random access Incoming frequency resource information and random access preamble information.
  • using an anonymous method to establish an RRC connection may also be described as transmitting data anonymously, or may be described as transmitting anonymous data, or when the anonymous data includes MDT data It can also be described as transmitting MDT data, etc., which is described here in a unified manner, which is not specifically limited in the embodiments of the present application.
  • the first message in a possible design, in a scenario where the first message carries the first indication information, the first message may be an RRC establishment request message or an RRC establishment completion message.
  • the RRC establishment request message also carries a random value, and the random value is used for contention resolution of the terminal device for random access. That is to say, since the embodiments of the present application are to implement anonymous data transmission, in the embodiments of the present application, regardless of whether the core network device allocates a terminal identifier to the terminal device, such as S-TMSI or 5G S-TMSI, the RRC establishment request message They do not carry the terminal identification of the non-access layer or some fields of the terminal identification, but carry a value generated or decided by the terminal device itself, such as a random value, which is used for the terminal device to compete for random access solve.
  • a terminal identifier such as S-TMSI or 5G S-TMSI
  • the access network device may return the random value in a response message (for example, a contention conflict resolution message) of the RRC establishment request message. Furthermore, the terminal device determines whether the competition is successful according to whether the random value returned by the access network device is sent by itself. Among them, if the random value returned by the access network device is sent by itself, it can be regarded as a success, otherwise it is regarded as a failure in competition.
  • the RRC establishment complete message does not carry the information that the terminal device is registered with the core network, or the RRC establishment complete message does not carry the non-access layer NAS protocol data unit PDU information element, or the RRC establishment complete message carries a length of 0 NAS PDU cells.
  • the RRC establishment complete message does not carry the information that the terminal device is registered in the core network
  • the RRC setup complete message does not carry PDU cells of non-access layer NAS protocol data units
  • the RRC setup complete message carries NAS PDU cells of length 0, where the NAS PDU cells are the access network equipment and Core network equipment performs interactive signaling. In this way, not only can the signaling overhead be reduced, but also the user information can be better hidden.
  • the first message is a dedicated message used to instruct the terminal device to request an anonymous way to establish the RRC connection.
  • the access network device can learn from the message of the dedicated message that the terminal device requests to use an anonymous method to establish an RRC connection.
  • a communication device for implementing the above various methods.
  • the communication device may be the access network device in the first aspect above, or a device including the above access network device; or, the communication device may be the terminal device in the second aspect above, or a device including the above terminal device.
  • the communication device includes a module, unit, or means corresponding to the above method.
  • the module, unit, or means can be implemented by hardware, software, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules or units corresponding to the above functions.
  • a communication device including: a processor and a memory; the memory is used to store computer instructions, and when the processor executes the instructions, the communication device performs the method described in any one of the above aspects.
  • the communication device may be the access network device in the first aspect above or a device including the above access network device; or the communication device may be the terminal device in the second aspect above or a device including the above terminal device.
  • a communication device including: a processor; the processor is configured to couple with a memory and read an instruction in the memory, and then execute the method according to any one of the above aspects according to the instruction.
  • the communication device may be the access network device in the first aspect above or a device including the above access network device; or the communication device may be the terminal device in the second aspect above or a device including the above terminal device.
  • a computer-readable storage medium stores instructions, which when executed on a computer, enables the computer to perform the method described in any one of the above aspects.
  • a computer program product containing instructions that, when run on a computer, enable the computer to perform the method described in any one of the above aspects.
  • a communication device for example, the communication device may be a chip or a chip system
  • the communication device includes a processor for implementing the functions involved in any of the above aspects.
  • the communication device further includes a memory for storing necessary program instructions and data.
  • the communication device is a chip system, it may be composed of a chip, or may include a chip and other discrete devices.
  • a communication system in a ninth aspect, includes the terminal device described in the above aspect and the access network device described in the above aspect.
  • FIG. 1 is a schematic structural diagram of a communication system provided by an embodiment of this application.
  • FIG. 2 is a schematic structural diagram of an access network device and a terminal device provided by an embodiment of this application;
  • FIG. 3 is a first schematic flowchart of a communication method provided by an embodiment of the present application.
  • FIG. 4 is a second schematic flowchart of a communication method provided by an embodiment of the present application.
  • FIG. 5 is a third schematic flowchart of a communication method provided by an embodiment of the present application.
  • FIG. 6 is another schematic structural diagram of an access network device provided by an embodiment of the present application.
  • FIG. 7 is another schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • At least one of the following or a similar expression refers to any combination of these items, including any combination of a single item or a plurality of items.
  • at least one item (a) in a, b, or c can represent: a, b, c, ab, ac, bc, or abc, where a, b, c can be a single or multiple .
  • the words “first” and “second” are used to distinguish the same or similar items whose functions and functions are basically the same. Those skilled in the art may understand that the words “first” and “second” do not limit the number and execution order, and the words “first” and “second” do not necessarily mean different.
  • the network architecture and business scenarios described in the embodiments of the present application are intended to more clearly explain the technical solutions of the embodiments of the present application, and do not constitute a limitation on the technical solutions provided by the embodiments of the present application.
  • the technical solutions provided by the embodiments of the present application are also applicable to similar technical problems.
  • the communication system 10 includes an access network device 20 and one or more terminal devices 30 connected to the access network device 20.
  • the terminal device 30 determines to use an anonymous method to establish a radio resource control (RRC) connection , Sending a first message to the access network device 20, where the first message is used to instruct the terminal device 30 to request an anonymous way to establish an RRC connection.
  • RRC radio resource control
  • the access network device 20 learns that the terminal device 30 requests to use an anonymous method to establish an RRC connection, and then may determine to establish an anonymous RRC connection with the terminal device 30, such as the access network device 20
  • the step of establishing a connection with the core network device for the terminal device 30 is not performed, or the access network device 20 establishes a connection with the core network device for the terminal device 30, but the terminal device does not send the core network device to directly or indirectly identify the terminal Device identity information, such as international mobile subscriber identity (IMSI), subscription permanent identifier (SUPI), S-temporary mobile subscriber identifier (S-TMSI) Or 5G-TMSI, etc.
  • IMSI international mobile subscriber identity
  • SUPI subscription permanent identifier
  • S-TMSI S-temporary mobile subscriber identifier
  • 5G-TMSI 5G-TMSI
  • the access network device 20 does not perform the step of establishing a connection with the core network device for the terminal device 30, which may refer to the access network device 20 and the terminal device 30 in an anonymous manner
  • the connection establishment is completed without introducing the participation of the core network device; or the access network device 20 skips the step of establishing a connection with the core network device for the terminal device 30; or the access network device 20 ignores the establishment of the terminal device with the core network device Step 30 of the connection; or the access network device 20 does not initiate the step of establishing a connection with the core network device for the terminal device 30, etc., which is not specifically limited in this embodiment of the present application.
  • the establishment of the RRC connection using the anonymous method may also be described as transmitting data anonymously, or may be described as transmitting anonymous data, or when the anonymous data includes MDT data, it may also be described as transmitting MDT data, etc., here Unified description, this embodiment of the present application does not specifically limit this.
  • the subject is generally characterized by the identity information of the terminal device; the object is private information. If the private information lacks the subject, then it no longer poses a privacy issue.
  • the private information may include location information, for example.
  • the location information is crucial for network optimization. For example, if there is no location information, the MDT effect will be greatly reduced. Since location information is important, the embodiments of the present application consider starting with the subject to solve the privacy problem of anonymous data. Based on the communication system provided by the embodiment of the present application, since an anonymous RRC connection can be established between the access network device and the terminal device, anonymous data can be transmitted, thereby protecting the security and user privacy issues during data transmission.
  • the anonymous data may include, for example, MDT data, so as to alleviate the security and user privacy issues in the MDT data transmission process.
  • FIG. 2 it is a schematic diagram of the hardware structure of the access network device 20 and the terminal device 30 provided by the embodiment of the present application.
  • the terminal device 30 includes at least one processor (exemplarily illustrated in FIG. 2 including one processor 301) and at least one transceiver (exemplified illustrated in FIG. 2 including one transceiver 303) ).
  • the terminal device 30 may further include at least one memory (exemplified in FIG. 2 by including a memory 302 as an example), and at least one output device (exemplified in FIG. 2 by including an output device 304 as an example) (For explanation) and at least one input device (in FIG. 2, an example includes an input device 305 as an example).
  • the processor 301, the memory 302, and the transceiver 303 are connected by a communication line.
  • the communication line may include a path to transfer information between the above components.
  • the processor 301 may be a general-purpose central processing unit (central processing unit, CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrations for controlling the execution of the program program of the present application Circuit.
  • the processor 301 may also include multiple CPUs, and the processor 301 may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor.
  • the processor here may refer to one or more devices, circuits, or processing cores for processing data (eg, computer program instructions).
  • the memory 302 may be a device having a storage function.
  • it can be read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access memory, RAM), or other types of information and instructions that can be stored.
  • ROM read-only memory
  • RAM random access memory
  • Dynamic storage devices can also be electrically erasable programmable read-only memory (electrically erasable programmable-read-only memory (EEPROM), read-only compact disc (compact disc read-only memory, CD-ROM) or other optical disc storage, optical disc storage ( (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), disk storage media or other magnetic storage devices, or can be used to carry or store the desired program code in the form of instructions or data structures and can be stored by the computer Any other media, but not limited to this.
  • the memory 302 may exist independently and be connected to the processor 301 through a communication line.
  • the memory 302 may also be integrated with the processor 301.
  • the memory 302 is used to store computer execution instructions for executing the solution of the present application, and the processor 301 controls execution.
  • the processor 301 is used to execute computer execution instructions stored in the memory 302, so as to implement the communication method described in the embodiments of the present application.
  • the computer execution instructions in the embodiments of the present application may also be called application program codes or computer program codes, which are not specifically limited in the embodiments of the present application.
  • the transceiver 303 may use any device such as a transceiver for communicating with other devices or communication networks, such as Ethernet, wireless access network (RAN), or wireless local area networks (WLAN) Wait.
  • the transceiver 303 includes a transmitter Tx and a receiver Rx.
  • the output device 304 communicates with the processor 301 and can display information in various ways.
  • the output device 304 may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector. Wait.
  • LCD liquid crystal display
  • LED light emitting diode
  • CRT cathode ray tube
  • the input device 305 communicates with the processor 301 and can accept user input in a variety of ways.
  • the input device 305 may be a mouse, a keyboard, a touch screen device, or a sensing device.
  • the access network device 20 includes at least one processor (exemplarily illustrated in FIG. 2 including one processor 201), and at least one transceiver (exemplified illustrated in FIG. 2 including one transceiver 203) ) And at least one network interface (exemplarily illustrated in FIG. 2 by including one network interface 204).
  • the access network device 20 may further include at least one memory (the example in FIG. 2 includes a memory 202 as an example).
  • the processor 201, the memory 202, the transceiver 203 and the network interface 204 are connected through a communication line.
  • the network interface 204 is used to connect to the core network device through a link (such as an S1 interface), or connect to the network interface of other access network devices through a wired or wireless link (such as an X2 interface) (not shown in FIG. 2)
  • a link such as an S1 interface
  • a wired or wireless link such as an X2 interface
  • the access network device 20 in the embodiment of the present application is a device that connects the terminal device 30 to a wireless network, and may be an evolutionary base station (evolutional Node) in long term evolution (LTE) B, eNB or eNodeB); or a base station in a 5th generation (5G) network or a public land mobile network (PLMN) that evolves in the future, a broadband network service gateway (BNG), Aggregation switches or non-3rd generation partnership project (3rd generation partnership project, 3GPP) access equipment, etc., which are not specifically limited in the embodiments of the present application.
  • the base stations in the embodiments of the present application may include various forms of base stations, such as macro base stations, micro base stations (also called small stations), relay stations, and access points, which are not specifically limited in the embodiments of the present application. .
  • the terminal device 30 in the embodiment of the present application may be a device for implementing a wireless communication function, such as a terminal or a chip that can be used in the terminal.
  • the terminal may be a user equipment (user equipment, UE), access terminal, terminal unit, terminal station, mobile station, mobile station, remote station, remote terminal, mobile device, wireless communication in a 5G network or a future evolved PLMN Equipment, terminal agent or terminal device, etc.
  • Access terminals can be cellular phones, cordless phones, session initiation protocol (SIP) phones, wireless local loop (WLL) stations, personal digital processing (personal digital assistant (PDA), wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices or wearable devices, virtual reality (VR) terminal devices, augmented reality (AR) terminal devices, industrial control (industrial wireless terminal in control), wireless terminal in self-driving (self-driving), wireless terminal in remote medical (remote), wireless terminal in smart grid (smart), wireless in transportation safety (transportation safety) Terminals, wireless terminals in smart cities (smart cities), wireless terminals in smart homes (smart homes), etc.
  • the terminal can be mobile or fixed.
  • the access network device 20 and the terminal device 30 shown in FIG. 1 or FIG. 2 may also be referred to as communication devices, which may be a general-purpose device or a dedicated device. The example does not specifically limit this.
  • the communication method in the embodiment of the present application supports anonymous connection and can be used for anonymous transmission or anonymous communication, which is described here in a unified manner and will not be described in detail below.
  • the access network device 20 shown in FIG. 1 interacting with any terminal device 30, where the access network device 20 is a base station, for example, as shown in FIG. 3, it is a communication method provided by an embodiment of the present application. It includes the following steps:
  • the base station sends a message a to the terminal device.
  • the terminal device receives the message a from the base station.
  • the message a includes indication information 1, which is used to indicate the configuration information of the dedicated resource used for the terminal device to request random access to establish an RRC connection using an anonymous method.
  • the indication information 1 is used to indicate the configuration information of the dedicated resource used for the terminal device to request the random access to establish the RRC connection using the anonymous method, which may refer to that the indication information 1 includes the The device requests the configuration information of the dedicated resource for random access to establish the RRC connection using the anonymous method; or may refer to, the indication information 1 includes the configuration information of the dedicated resource for the terminal device to request the random access to establish the RRC connection using the anonymous method Identification (or index), etc. Furthermore, the terminal device can determine the dedicated according to the identification (or index) of the configuration information of the dedicated resource and the correspondence between the configuration information of the dedicated resource and the identification (or index) of the configuration information of the dedicated resource The resource configuration information is not specifically limited in this embodiment of the present application.
  • the message a may be the system broadcast message in FIG. 3, for example. That is to say, the base station can broadcast the configuration information of the dedicated resource used by the terminal device (here, a general term terminal device) to request random access to establish an RRC connection using an anonymous method through a system broadcast message.
  • a system information block system information block (SIB)
  • SIB system information block
  • the SIB may include configuration information of dedicated resources used by the terminal device to request random access to establish an RRC connection using an anonymous method. .
  • the message a may also be a paging message and other messages, which are not specifically limited in this embodiment of the present application.
  • step S301 may be an optional step, and the terminal device may learn, based on the message a received from the base station, configuration information of the dedicated resource used for the terminal device to request random access to establish an RRC connection using an anonymous method.
  • step S301 may not be performed, but the base station and the terminal device may pre-negotiate the configuration information of the dedicated resource for the terminal device to request the random access to establish the RRC connection using the anonymous method; or, pre-configure or The configuration information of the dedicated resource used by the terminal device to request random access for establishing an RRC connection in an anonymous manner is pre-agreed, which is not specifically limited in this embodiment of the present application.
  • the configuration information of the dedicated resource may be any combination of random access preamble information, random access time domain resource information, or random access frequency domain resource information.
  • the dedicated resource configuration information may include random access preamble information; or the dedicated resource configuration information may include random access time domain resource information; or the dedicated resource configuration information may include random access frequency domain resource information;
  • the configuration information of the dedicated resource may include random access preamble information on the random access frequency domain resource, that is, the configuration information of the dedicated resource includes random access frequency resource information and random access preamble information; or,
  • the configuration information of the dedicated resource may include random access preamble information on the random access time domain resource, that is, the configuration information of the dedicated resource includes random access time domain resource information and random access preamble code information; or, dedicated The configuration information of the resource may include random access time domain resources and random access preambles on the random access frequency domain resources, that is, the configuration information of the dedicated resources includes random access time domain resource information and random access frequency resources Information and random access preamble information.
  • the random access time domain resource information may include, for example, an identifier of the random access time domain resource or a configuration of the random access time domain resource, where the configuration of the random access time domain resource may be, for example, Including the configuration of frames, symbols, slots, etc.
  • the random access frequency domain resource information may include, for example, an identifier of the random access frequency domain resource or a configuration of the random access frequency domain resource.
  • the configuration of the random access frequency domain resources may include the configuration of bandwidth, resource blocks, etc., for example.
  • the random access preamble information may include, for example, an identifier of the random access preamble or a configuration of the random access preamble.
  • the configuration of the random access preamble may include, for example, the preamble.
  • the message a in the embodiment of the present application may further include indication information 2, which is used to enable the terminal device to determine whether the serving cell of the terminal device supports the transmission of anonymous data, for example, the indication information 2 is used to indicate the terminal Whether the service cell of the device supports the transmission of anonymous data, or the indication information 2 is used to indicate whether the service cell of the terminal device supports the establishment of an anonymous RRC connection, or the indication information 2 is used to indicate that the service cell of the terminal supports the transmission of anonymous data or support Establish an anonymous RRC connection (that is, the terminal's serving cell supports the transmission of anonymous data or supports the establishment of an anonymous RRC connection to send indication information 2 to the terminal device, then no indication information is sent 2 The default terminal's serving cell does not support the transmission of anonymous Data or support for establishing an anonymous RRC connection).
  • the indication information 2 is used to indicate the terminal Whether the service cell of the device supports the transmission of anonymous data, or the indication information 2 is used to indicate whether the service cell of the terminal device supports the establishment of an anonymous RRC connection, or the indication information
  • the serving cell of the terminal device is the cell that sends the system broadcast message.
  • the terminal device needs to transmit anonymous data, it can determine to use an anonymous method to establish an RRC connection according to the instruction information 2, which will be described here in a unified manner, and will not be repeated below.
  • the instruction information 2 which will be described here in a unified manner, and will not be repeated below.
  • the terminal device may not transmit anonymous data, or may establish an RRC connection in the existing manner
  • the transmission of anonymous data is not specifically limited in the embodiments of the present application.
  • the mobile operator can control which cells transmit anonymous data or establish an anonymous RRC connection through an access network device (such as the base station in the embodiment of the present application), the impact on the system can be reduced. For example, mobile operators can choose to transmit anonymous data on cells with low load, thereby reducing the impact of MDT data transmission on user services.
  • the foregoing indication information 1 and the indication information 2 may be sent to the terminal device through a message (such as the message a) as an example for description.
  • a message such as the message a
  • the above indication information 1 and the above indication information 2 may also be sent to the terminal device through different messages, which is not specifically limited in this embodiment of the present application.
  • the terminal device determines to use an anonymous method to establish an RRC connection.
  • the terminal device that determines to use an anonymous method to establish an RRC connection may be a terminal device in an idle state, which is described here in a unified manner and will not be described in detail below.
  • the terminal device determining to use the anonymous method to establish the RRC connection may include: the terminal device determining to use the anonymous method to establish the RRC connection according to the foregoing instruction information 2.
  • the terminal device may determine to use the anonymous method to establish the RRC connection when it needs to transmit anonymous data and learns that the serving cell of the terminal device supports the establishment of the anonymous RRC connection or supports the transmission of anonymous data according to the above instruction information 2.
  • the above indication information 2 may also be optional, that is, the base station does not indicate to the terminal device whether the serving cell of the terminal device supports the transmission of anonymous data or whether the serving cell of the terminal device supports the establishment of an anonymous RRC connection.
  • the base station does not indicate to the terminal device whether the serving cell of the terminal device supports the transmission of anonymous data or whether the serving cell of the terminal device supports the establishment of an anonymous RRC connection.
  • it is determined to establish the RRC connection anonymously.
  • the terminal device may determine to use an anonymous method to establish an RRC connection when MDT data needs to be transmitted.
  • the terminal device sends a message b to the base station.
  • the base station receives the message b from the terminal equipment.
  • the message b includes the preamble used by the terminal device.
  • the message b is a possible form of the first message of the communication system part shown in FIG. 1.
  • the message b may be message 1 (message1) in the random access process in FIG. 3, for example.
  • the message 1 is the first message of the random access process, and may also be referred to as a preamble message, which is described here in a unified manner and will not be described in detail below.
  • the terminal device may send message 1 to the base station according to the indication information 1 in step S301.
  • the preamble carried by the terminal device in the message 1 may be the preamble corresponding to the preamble information in the configuration information of the dedicated resource indicated by the indication information 1; or, the terminal device may use the configuration information of the dedicated resource indicated by the indication information 1
  • the random access time domain resource information corresponding to the random access time domain resource information in the message 1 is sent to the base station; or, the terminal device may correspond to the random access frequency domain resource information in the configuration information of the dedicated resource indicated by the indication information 1 Sends a message 1 to the base station on the random access frequency domain resource; or, the terminal device may send the random access time domain resource corresponding to the random access time domain resource information in the configuration information of the dedicated resource indicated by the indication information 1 to the base station Send message 1, the message 1 includes the preamble corresponding to the preamble information in the configuration
  • the message 1 includes the preamble corresponding to the preamble information in the configuration information of the dedicated resource indicated by the indication information 1; or, the terminal device may indicate the information 1 indicates the random access time domain resource corresponding to the random access time domain resource information and the random access frequency domain resource corresponding to the random access frequency domain resource information in the configuration information of the indicated dedicated resource to send a message 1 to the base station, message 1 Includes the preamble corresponding to the preamble information in the configuration information of the dedicated resource indicated by the indication information 1.
  • the terminal device may also send message 1 to the base station according to pre-negotiated, pre-configured, or pre-agreed resource configuration information.
  • the preamble carried by the terminal device in the message 1 may be the preamble corresponding to the preamble information in the pre-negotiated, pre-configured or pre-agreed configuration information of the dedicated resource; or, the terminal device may be pre-negotiated, pre-negotiated
  • the random access time-domain resource information corresponding to the random access time-domain resource information in the configuration information of the configured or pre-agreed dedicated resource sends a message 1 to the base station; or, the terminal device may perform pre-negotiation, pre-configuration, or pre-agreed
  • the random access frequency domain resource information corresponding to the random access frequency domain resource information in the configuration information of the dedicated resource sends a message 1 to the base station; or, the terminal device may perform the configuration information of the dedicated resource pre-negotiated, pre-con
  • the message 1 includes the preamble information corresponding to the pre-negotiated, pre-configured or pre-agreed configuration information of the dedicated resource.
  • the terminal device may send message 1 to the base station on the random access frequency domain resource corresponding to the random access frequency domain resource information in the pre-negotiated, pre-configured, or pre-agreed configuration information of the dedicated resource
  • message 1 Includes the preamble corresponding to the preamble information in the pre-negotiated, pre-configured, or pre-agreed configuration information of the dedicated resource; or, the terminal device may randomly receive the pre-negotiated, pre-configured, or pre-agreed resource configuration information
  • the random access time domain resource corresponding to the time domain resource information and the random access frequency domain resource corresponding to the random access frequency domain resource information send a message 1 to the base station.
  • the message 1 includes pre-negotiated, pre-configured, or pre-agreed The preamble corresponding to the preamble information in the configuration information of the dedicated resource.
  • the base station determines the first random access resource for random access by the terminal device according to the message b.
  • the first random access resource is a dedicated resource used for random access requested by the terminal device (here is a general term terminal device) to request an anonymous RRC connection establishment, including the first random access preamble and the first random Access to any combination of time domain resources or first random access frequency domain resources.
  • the configuration information of the dedicated resource includes configuration information of the first random access resource.
  • the configuration information of the first random access resource may be any combination of first random access preamble information, first random access time domain resource information, or first random access frequency domain resource information, corresponding to the first random access Into resources.
  • the first random access time domain resource information may include, for example, the identifier or index of the first random access time domain resource or the configuration of the first random access time domain resource, and the configuration of the first random access time domain resource For example, it may include configurations of frames, symbols, slots, etc., wherein the first random access time domain resource information corresponds to the above first random access time domain resource; the first random access frequency
  • the domain resource information may include, for example, the identification or index of the first random access frequency domain resource or the configuration of the first random access frequency domain resource.
  • the configuration of the first random access frequency domain resource may include the configuration of bandwidth, resource block, etc.
  • the first random access preamble information may include, for example, the identifier of the first random access preamble or the first random access preamble
  • the configuration of the first random access preamble may include, for example, a preamble, where the first random access preamble information corresponds to the first random access preamble, which is not specifically limited in this embodiment of the present application.
  • the first random access resource may be a random access resource in a random access resource set corresponding to the configuration information of the dedicated resource.
  • the first random access preamble corresponds to the preamble carried in the message 1 of step S303
  • the first random access time domain resource corresponds to the random access time domain resource of the message 1 sent in step S303
  • the first random The access frequency domain resource corresponds to the random access frequency domain resource sent by message 1 in step S303.
  • the base station learns that the terminal device requests to use an anonymous method to establish an RRC connection based on the first random access resource.
  • an alternative solution is that the terminal device sends a message b in the random access process to the base station, and the message b carries a message indicating that the terminal device requests to use anonymous Information for establishing an RRC connection in a manner, and then the base station learns that the terminal device requests to use an anonymous method to establish an RRC connection based on the information, which is not specifically limited in this embodiment of the present application.
  • the base station sends a message c to the terminal device.
  • the terminal device receives the message c from the base station.
  • the message c includes a temporary cell radio network temporary identifier (TC-RNTI) assigned by the base station to the terminal device.
  • TC-RNTI temporary cell radio network temporary identifier
  • the message c is a response message to the above message b.
  • the message c may be, for example, a random access response (RAR) message.
  • the TC-RNTI becomes a cell radio network temporary identifier (C-RNTI) of the terminal device, and subsequent base stations and terminal devices perform anonymous data transmission based on the C-RNTI. Since the C-RNTI is allocated to the terminal device without the base station knowing the identity of the user, there is no privacy problem even if the base station and the terminal device communicate based on the C-RNTI.
  • C-RNTI cell radio network temporary identifier
  • the terminal device sends a message d to the base station.
  • the base station receives the message d from the terminal device.
  • the message d may be, for example, an RRC setup request (RRC setup request) message in FIG. 3.
  • RRC setup request RRC setup request
  • the core network will allocate a non-access layer terminal identifier to the terminal device, which may identify the terminal. For example, S-TMSI or 5G S-TMSI, etc., the RRC establishment request will carry the terminal identification of the non-access layer or part of the terminal identification field or identification information containing the terminal identification (such as extended identification); if the terminal If the device is not registered in the core network, the registered core network identifier will be carried in the RRC setup complete (RRC setup) message.
  • RRC setup RRC setup
  • the embodiments of the present application are to implement anonymous data transmission
  • the message d does not carry the terminal identification of the non-access stratum or part of the terminal identification field or contains identification information of the terminal identification (for example, extended identification), but carries one generated or decided by the terminal device itself
  • the value such as a random value, is used for contention resolution of random access by the terminal device. For example, after acquiring the random value, the base station may return the random value in a response message of message d (not shown in FIG. 3, for example, a contention and conflict resolution message).
  • the terminal device determines whether the competition is successful according to whether the random value returned by the base station is sent by itself. Among them, if the random value returned by the base station is sent by itself, it can be regarded as a success, otherwise it is regarded as a competition failure.
  • a terminal device may establish an anonymous RRC connection multiple times to report anonymous data.
  • an anonymous RRC connection multiple times to report anonymous data.
  • the terminal device After the terminal device generates or determines a value (such as a random value), the subsequent anonymous RRC connection also uses this value, so that it can associate anonymous data reported by a terminal device multiple times.
  • step S307 can be scrambled by the TC-RNTI in step S306.
  • TC-RNTI for related implementation, reference may be made to existing implementation methods, which will not be repeated here.
  • the base station sends a message e to the terminal device.
  • the terminal device receives the message e from the base station.
  • the message e may be, for example, an RRC setup (RRC setup) message in FIG. 3.
  • RRC setup RRC setup
  • the terminal device is taken as an example of a terminal device in which random access competition is successful. Among them, if the terminal equipment fails to compete, the subsequent process will not be executed, which is described here in a unified manner and will not be repeated below.
  • the terminal device sends a message f to the base station.
  • the base station receives the message f from the terminal device.
  • the message f may be, for example, the RRC establishment complete message in FIG. 3.
  • the message f does not carry the information that the terminal device is registered in the core network, such as not Carry the registered core network identification.
  • the message f does not carry the non-access stratum (non-access stratum, NAS) protocol data unit (protocol data unit, PDU) cells, or message f carries NAS PDU cells with a length of 0, where the NAS PDU cells are signaling for interaction between the base station and the core network device.
  • NAS non-access stratum
  • PDU protocol data unit
  • the message f Since the message f does not carry the information registered by the terminal device in the core network, or the message f does not carry NAS PDU cells, or the message f carries NAS PDU cells with a length of 0, not only can the signaling overhead be reduced, but also better Hide user information.
  • the base station determines to establish an anonymous RRC connection with the terminal device.
  • the base station determining to establish an anonymous RRC connection with the terminal device includes: the base station does not perform the step of establishing a connection with the core network device for the terminal device.
  • the connection between the base station and the core network device for the terminal device may be, for example, a N2 connection or a next generation (NG) connection for the terminal device in a new radio (NR) system for the terminal device ( That is, UE-associated logical connection (NG-connection); or, the connection between the base station and the core network device for the terminal device may be, for example, an S1 connection for the terminal device in the LTE system, which is not specifically limited in this embodiment of the present application.
  • NG next generation
  • NR new radio
  • the step of establishing a connection with the core network device for the terminal device may include, for example, the base station sending an initial terminal message (initial UE) message to the core network device, so that the core network device performs the terminal device after receiving the initial terminal message from the base station Authentication or authentication, and then, the core network device sends an initial context request (initial context setting request) to the base station, and the base station replies an initial context response (initial context setting response) to the core network device.
  • the base station sending an initial terminal message (initial UE) message to the core network device, so that the core network device performs the terminal device after receiving the initial terminal message from the base station Authentication or authentication, and then, the core network device sends an initial context request (initial context setting request) to the base station, and the base station replies an initial context response (initial context setting response) to the core network device.
  • an initial context request initial context setting request
  • the base station replies an initial context response (initial context setting response) to the core
  • the base station does not perform the step of establishing a connection with the core network device for the terminal device, which may refer to the establishment of the connection between the base station and the terminal device in the anonymous mode without the need to introduce the participation of the core network device; Either the base station skips the step of establishing a connection with the core network device for the terminal device; or the base station ignores the step of establishing a connection with the core network device for the terminal device; or the base station does not initiate a connection with the core network device
  • the steps of establishing a connection for a terminal device, etc. are not specifically limited in this embodiment of the present application.
  • the base station does not need to establish a connection for the terminal device with the core network device after learning that the terminal device requests to use an anonymous method to establish the RRC connection.
  • the base station determines to establish an anonymous RRC connection with the terminal device, including: the base station establishes a connection with the core network device for the terminal device, but the terminal device does not send the core network device directly or indirectly. Identify the identity information of the terminal device, such as IMSI, SUPI, S-TMSI, or 5G-TMSI, etc. This embodiment of the present application does not specifically limit this.
  • an anonymous transmission of an air interface can be performed between the base station and the terminal device without identifying the user identity.
  • the following exemplarily provides two anonymous transmission methods.
  • anonymous data can be transmitted through the control plane.
  • the communication method provided by the embodiment of the present application may further include the following step S311:
  • the terminal device sends a message g to the base station.
  • the base station receives the message g from the terminal device.
  • the message g carries anonymous data. That is, anonymous data is transmitted through signaling bearers.
  • the message g may be a possible form of the second message in the embodiment of this application.
  • the message g may be, for example, the RRC message in FIG. 3.
  • the RRC message may be a dedicated RRC message for transmitting anonymous data.
  • the RRC message may be an anonymous data transfer (anonymous data transfer) message.
  • the anonymous data in the embodiments of the present application may include MDT data or other data that needs to be transmitted anonymously, etc., which will be described here in a unified manner and will not be described in detail below.
  • the anonymous data as a cell in the RRC message, may be a byte stream transparent to the RRC layer, or may be a specific anonymous transmission data structure (for example, MDT data structure).
  • the structure of the byte stream is as follows:
  • the byte stream transparent to the RRC layer refers to a byte stream from the RRC layer, and the RRC layer does not decode the byte stream, that is, the RRC layer does not know the content of the byte stream
  • the RRC layer does not know the content of the byte stream
  • the embodiment of the present application does not specifically limit the specific anonymous transmission data structure (for example, the MDT data structure).
  • the base station after receiving the message g from the terminal device, the base station obtains anonymous data from the message g, and then can deliver the anonymous data to other protocol layers or operation management and maintenance (operation, administration and maintenance, OAM ) System etc.
  • the other protocol layer may be, for example, the MDT protocol layer, which is not specifically limited in this embodiment of the present application.
  • the message g in the embodiment of the present application may be one or more messages, which depends on the size of the anonymous data, which is described here in a unified manner and will not be described in detail below.
  • anonymous data may be transmitted through the user plane.
  • the communication method provided by the embodiment of the present application may further include the following steps S312-S315:
  • the base station sends a message h to the terminal device.
  • the terminal device receives the message h from the base station.
  • the message h is used to indicate the establishment of a data bearer (data radio bearer, DRB).
  • the message h may be a possible form of the third message in the embodiment of this application.
  • the message h may be, for example, the RRC reconfiguration message in FIG. 3.
  • the message h is used to indicate the establishment of the DRB.
  • the message h may include information indicating that the DRB is established, or the message h itself may have a function of indicating the establishment of the DRB. There is no specific limitation on this.
  • the message h may further include information indicating that the DRB is used for anonymous data transmission.
  • the information used to indicate that the DRB is used for anonymous data transmission may specifically be information used to indicate that the DRB is used for MDT data transmission.
  • bearer type information or MDT bearer type may be introduced to indicate that the current data transmission is MDT data transmission, which is described here in a unified manner and will not be described in detail below.
  • the DRB has no configuration such as a mapping relationship between a quality of service (QoS) flow identifier and the DRB, which is described here in a unified manner and will not be described in detail below.
  • QoS quality of service
  • the terminal device establishes a corresponding DRB according to the information indicating the establishment of the DRB.
  • the terminal device sends a message i to the base station.
  • the base station receives the message i from the terminal device.
  • the message i is used to indicate the completion of DRB establishment.
  • the message i may be, for example, the RRC reconfiguration complete (RRC reconfiguration) message in FIG. 3.
  • the terminal device sends anonymous data to the base station on the DRB.
  • the base station receives anonymous data from the terminal equipment from the DRB.
  • the base station may deliver the anonymous data to other protocol layers or OAM systems.
  • the other protocol layer may be, for example, the MDT protocol layer, which is not specifically limited in this embodiment of the present application.
  • step S314 may be executed first, and then step S315 may be executed; or step S315 may be executed first, and then step S314 is executed; It may also be that steps S314 and S315 are executed simultaneously, which is not specifically limited in this embodiment of the present application.
  • step S311 or the above steps S312-S315, anonymous data transmission can be achieved.
  • the method of transmitting anonymous data through the control plane does not need to establish a DRB, so it is simpler than the method of transmitting anonymous data through the user plane; the method of transmitting anonymous data through the user plane, because anonymous data does not require RRC messages
  • the decoding of therefore reduces the processing resource overhead of the base station compared to the method of transmitting anonymous data through the control plane.
  • the access layer of the terminal device (for example, the RRC layer) does not know whether the data transmission is completed, so the base station releases the RRC connection.
  • the access layer knows whether the transmission of the anonymous data is completed. Therefore, optionally, in the embodiment of the present application, after the data transmission is completed or the last anonymous data packet is transmitted, the terminal device notifies the base station that the anonymous data transmission is completed or requests the base station to release the RRC connection corresponding to the terminal device, so that it can be timely The RRC connection corresponding to the terminal device is released to save energy consumption of the terminal device. For example, there are several methods:
  • the message g in step S311 may carry indication information 3, which is used to indicate whether the transmission of anonymous data is completed or to indicate whether the current anonymous data packet Is the last anonymous packet. Therefore, after receiving the message g, the base station can release the RRC connection corresponding to the terminal device if it knows that the anonymous data transmission is completed or the current anonymous data packet is the last anonymous data packet according to the indication information 3.
  • the schematic structure corresponding to message g is as follows:
  • indication information 4 may be added to the header of the layer 2 of the DRB.
  • the indication information 4 is used to indicate whether the transmission of anonymous data is completed or used to indicate Whether the current anonymous data packet is the last anonymous data packet. Therefore, if the base station parses the header of the layer 2 of the DRB and learns that the anonymous data transmission is completed or learns that the current anonymous data packet is the last anonymous data packet, the RRC connection corresponding to the terminal device can be released.
  • the layer 2 of the DRB may be, for example, a packet data convergence layer protocol (packet data convergence protocol, PDCP) protocol layer, or a radio link control (radio link control, RLC) protocol layer, or a media access control (media access control (MAC) protocol layer.
  • PDCP packet data convergence protocol
  • RLC radio link control
  • MAC media access control
  • the communication method provided in this embodiment of the present application may further include the following step S316:
  • the terminal device sends a message j to the base station.
  • the base station receives the message j from the terminal device.
  • the message j may be, for example, the RRC message in FIG. 3.
  • the message j may be a possible form of the fourth message in the embodiment of the present application.
  • the RRC message may be a dedicated message used to indicate the completion of data transmission or used to indicate whether the current anonymous data packet is the last anonymous data packet.
  • the RRC message may be an anonymous data transfer complete (anonymous data transfer complete) message. In this way, after receiving the RRC message, the base station can release the RRC connection corresponding to the terminal device according to the RRC message.
  • the RRC message may be a message indicating that the RRC connection corresponding to the terminal device is requested to be released.
  • the RRC message may be an RRC release request message, or may be a dedicated message used to indicate a request to release the RRC connection corresponding to the terminal device, which is not specifically limited in this embodiment of the present application.
  • the base station can release the RRC connection corresponding to the terminal device according to the RRC message.
  • the RRC message may also carry a cause value requesting to release the RRC connection corresponding to the terminal device.
  • the cause value may be, for example, data transmission completion, which is not specifically limited in this embodiment of the present application.
  • the base station can release the RRC connection corresponding to the terminal device in time after the anonymous data transmission is completed, thereby saving energy consumption of the terminal device.
  • the terminal device may establish an RRC connection and transmit data according to an existing method, which is not specifically limited in the embodiment of the present application.
  • anonymous data transmission can be achieved, thereby protecting the security and user privacy issues during data transmission.
  • the anonymous data may be, for example, MDT data, so as to alleviate the security and user privacy issues in the MDT data transmission process.
  • the actions of the base station in the above steps S301 to S316 can be invoked by the processor 201 in the access network device 20 shown in FIG. 2 to call the application program code stored in the memory 202 to instruct the base station to perform, the above steps S301 to S316
  • the actions of the terminal device can be invoked by the processor 301 in the terminal device 30 shown in FIG. 2 by calling the application program code stored in the memory 302 to instruct the terminal device to execute, and this embodiment does not make any limitation on this.
  • the access network device 20 shown in FIG. 1 interacts with any terminal device 30, and the access network device 20 is a base station as an example.
  • the access network device 20 is a base station as an example.
  • FIG. 4 this is another example provided by an embodiment of this application.
  • a communication method including the following steps:
  • the base station sends a message k to the terminal device.
  • the terminal device receives the message k from the base station.
  • the message k may include indication information 2, and the relevant description of the indication information 2 may refer to the above step S301, which will not be repeated here.
  • the message k may be, for example, a paging message or a system broadcast message in FIG. 4 and so on, which is not specifically limited in this embodiment of the present application.
  • the terminal device may not transmit anonymous data, or may establish an RRC connection in the existing manner
  • the transmission of anonymous data is not specifically limited in the embodiments of the present application.
  • the mobile operator can control which cells transmit anonymous data or establish an anonymous RRC connection through an access network device (such as the base station in the embodiment of the present application), the impact on the system can be reduced. For example, mobile operators can choose to transmit anonymous data on cells with low load, thereby reducing the impact of MDT data transmission on user services.
  • the terminal device determines to use an anonymous method to establish an RRC connection.
  • step S402 For the relevant description of step S402, reference may be made to step S302 in the embodiment shown in FIG. 3, which will not be repeated here.
  • the terminal device sends a message m to the base station.
  • the base station receives the message m from the terminal device.
  • the message m includes the preamble used by the terminal device.
  • the message m may be, for example, message 1 (message1) in the random access process in FIG. 4.
  • the message 1 is the first message of the random access process, and may also be referred to as a preamble message, which is described here in a unified manner and will not be described in detail below.
  • the base station sends a message n to the terminal device.
  • the terminal device receives the message n from the base station.
  • the message n includes the TC-RNTI allocated by the base station to the terminal device.
  • the message n is a response message to the above message m.
  • the message n may be, for example, a RAR message.
  • the TC-RNTI becomes the C-RNTI of the terminal device after random access is completed, and subsequent base stations and terminal devices perform anonymous data transmission based on the C-RNTI. Since the C-RNTI is allocated to the terminal device without the base station knowing the identity of the user, there is no privacy problem even if the base station and the terminal device communicate based on the C-RNTI.
  • the terminal device sends a message p to the base station.
  • the base station receives the message p from the terminal device.
  • the message p may be a possible form of the first message of the communication system part shown in FIG. 1.
  • the message p may be, for example, the RRC establishment request message in FIG. 4.
  • the RRC establishment request message may carry indication information 5, which is used to instruct the terminal device to request an anonymous way to establish an RRC connection.
  • indication information 5 is used to indicate that the terminal device requests to use an anonymous method to establish the RRC connection. That is, the indication information 5 may be a cause value.
  • the message p may also be a dedicated message used to instruct the terminal device to request to establish an RRC connection using an anonymous method.
  • the message p may be, for example, an anonymous RRC setup request (anonymous RRC setup request) message.
  • step S405 for the rest of the relevant description in step S405, reference may be made to step S307 in the embodiment shown in FIG. 3, for example, the difference is that the message d in step S307 is replaced with the message p in step S405, which is not repeated here.
  • the base station learns that the terminal device requests to use an anonymous method to establish an RRC connection based on the message p.
  • the base station learns that the terminal device requests to use an anonymous method to establish an RRC connection according to the indication information 5.
  • the base station can learn that the terminal device requests to use the message according to the dedicated message An RRC connection is established anonymously.
  • the base station sends a message q to the terminal device.
  • the terminal device receives the message q from the base station.
  • the message q may be, for example, the RRC setup message in FIG. 4.
  • the message p in step S405 is a dedicated message for instructing the terminal device to request an anonymous RRC connection, such as an anonymous RRC setup request (anonymous RRC setup request) message
  • the message q in step S407 An anonymous RRC setup (anonymous RRC setup) message may be provided, which is not specifically limited in this embodiment of the present application.
  • the terminal device is taken as an example of a terminal device in which random access competition is successful. Among them, if the terminal device fails to compete, the subsequent process will not be performed, which will be described here in a unified manner, and will not be repeated below.
  • the terminal device sends a message r to the base station.
  • the base station receives the message r from the terminal equipment.
  • the message r may be, for example, the RRC establishment complete message in FIG. 4.
  • the message r in step S408 may be an anonymous RRC setup complete (anonymous RRC setup complete) message, which is not specifically limited in this embodiment of the present application.
  • step S408 for the rest of the relevant description in step S408, reference may be made to step S309 in the embodiment shown in FIG. 3, and the difference is, for example, that the message f in step S309 is replaced with the message r in step S408, which will not be repeated here.
  • the base station determines to establish an anonymous RRC connection with the terminal device.
  • step S409 For the rest of the relevant description in step S409, reference may be made to step S310 in the embodiment shown in FIG. 3, which will not be repeated here.
  • an anonymous transmission of an air interface can be performed between the base station and the terminal device without identifying the user identity.
  • steps S410-S415 in FIG. 4 For the related implementation of anonymous transmission (that is, steps S410-S415 in FIG. 4), reference may be made to steps S311-S316 in the embodiment shown in FIG. 3, and details are not described herein again.
  • anonymous data transmission can be achieved, thereby protecting the security and user privacy issues during data transmission.
  • the anonymous data may be, for example, MDT data, so as to alleviate the security and user privacy issues in the MDT data transmission process.
  • the actions of the base station in the above steps S401 to S415 can be invoked by the processor 201 in the access network device 20 shown in FIG. 2 to call the application program code stored in the memory 202 to instruct the base station to perform, in the above steps S401 to S415
  • the actions of the terminal device can be invoked by the processor 301 in the terminal device 30 shown in FIG. 2 by calling the application program code stored in the memory 302 to instruct the terminal device to execute, and this embodiment does not make any limitation on this.
  • the access network device 20 shown in FIG. 1 interacts with any terminal device 30, and the access network device 20 is a base station as an example.
  • the access network device 20 is a base station as an example.
  • FIG. 5 this is another example provided by an embodiment of this application.
  • a communication method including the following steps:
  • the base station sends a message k to the terminal device.
  • the terminal device receives the message k from the base station.
  • the message k may include indication information 2, and the relevant description of the indication information 2 may refer to the above step S301, which will not be repeated here.
  • step S501 For the rest of the relevant description in step S501, reference may be made to step S401 in the embodiment shown in FIG. 4, which will not be repeated here.
  • the terminal device determines to use an anonymous method to establish an RRC connection.
  • step S502 For the relevant description of step S502, reference may be made to step S402 in the embodiment shown in FIG. 4, which will not be repeated here.
  • the terminal device sends a message m to the base station.
  • the base station receives the message m from the terminal device.
  • the message m includes the preamble used by the terminal device.
  • step S503 For the relevant description of step S503, reference may be made to step S403 in the embodiment shown in FIG. 4, which will not be repeated here.
  • the base station sends a message n to the terminal device.
  • the terminal device receives the message n from the base station.
  • the message n includes the TC-RNTI allocated by the base station to the terminal device.
  • step S504 For the relevant description of step S504, reference may be made to step S404 in the embodiment shown in FIG. 4, which will not be repeated here.
  • the terminal device sends a message d to the base station.
  • the base station receives the message d from the terminal device.
  • step S505 For the relevant description of step S505, reference may be made to step S307 in the embodiment shown in FIG. 3, which will not be repeated here.
  • the base station sends a message e to the terminal device.
  • the terminal device receives the message e from the base station.
  • step S506 For the relevant description of step S506, reference may be made to step S308 in the embodiment shown in FIG. 3, which will not be repeated here.
  • the terminal device sends a message s to the base station.
  • the base station receives the message s from the terminal device.
  • the message s may be a possible form of the first message of the communication system part shown in FIG. 1.
  • the message s may be, for example, the RRC establishment complete message in FIG. 5.
  • the message s may carry indication information 5, which is used to instruct the terminal device to request an anonymous way to establish an RRC connection.
  • step S507 for the rest of the relevant description in step S507, reference may be made to step S309 in the embodiment shown in FIG. 3, the difference is, for example, that the message f in step S309 is replaced with the message s in step S507, which will not be repeated here.
  • the base station learns that the terminal device requests to use an anonymous method to establish an RRC connection according to the message s.
  • step S507 if the message s in step S507 carries indication information 5, the base station learns that the terminal device requests to use an anonymous method to establish an RRC connection according to the indication information 5.
  • the base station may learn that the terminal device requests to use an anonymous method to establish an RRC connection. This application The embodiment does not specifically limit this.
  • the base station determines to establish an anonymous RRC connection with the terminal device.
  • step S509 For the rest of the relevant description in step S509, reference may be made to step S310 in the embodiment shown in FIG. 3, which will not be repeated here.
  • an anonymous transmission of an air interface can be performed between the base station and the terminal device without identifying the user identity.
  • steps S510-S515 in FIG. 5 For the related implementation of anonymous transmission (that is, steps S510-S515 in FIG. 5), reference may be made to steps S311-S316 in the embodiment shown in FIG. 3, and details are not described herein again.
  • anonymous data transmission can be achieved, thereby protecting the security and user privacy issues during data transmission.
  • the anonymous data may be, for example, MDT data, so as to alleviate the security and user privacy issues in the MDT data transmission process.
  • the actions of the base station in the above steps S501 to S515 can be invoked by the processor 201 in the access network device 20 shown in FIG. 2 to call the application program code stored in the memory 202 to instruct the base station to perform, in the above steps S501 to S515
  • the actions of the terminal device can be invoked by the processor 301 in the terminal device 30 shown in FIG. 2 by calling the application program code stored in the memory 302 to instruct the terminal device to execute, and this embodiment does not make any limitation on this.
  • the above indication information 5 may also be called first indication information, and the above indication information 1 may also be called second indication information.
  • the instruction information 3 may also be referred to as third instruction information
  • the aforementioned instruction information 4 may also be referred to as fourth instruction information
  • the aforementioned instruction information 2 may also be referred to as fifth instruction information. Repeat again.
  • the methods and/or steps implemented by the terminal device may also be implemented by components (such as chips or circuits) that can be used for the terminal device, and the methods and/or steps implemented by the base station may also It can be realized by components available for the base station.
  • the embodiments of the present application also provide a communication device, which is used to implement the above various methods.
  • the communication device may be the terminal device in the above method embodiment, or the device containing the above terminal device, or a component that can be used for the terminal device; or, the communication device may be the access network device in the above method embodiment, or The device containing the above access network equipment, or a component that can be used for the access network equipment.
  • the communication device includes a hardware structure and/or a software module corresponding to each function.
  • the embodiments of the present application may divide the functional modules of the communication apparatus according to the above method embodiments, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above integrated modules can be implemented in the form of hardware or software function modules. It should be noted that the division of the modules in the embodiments of the present application is schematic, and is only a division of logical functions. In actual implementation, there may be another division manner.
  • FIG. 6 shows a schematic structural diagram of an access network device 60.
  • the access network device 60 includes a processing module 601 and a transceiver module 602.
  • the transceiver module 602 may also be referred to as a transceiver unit to implement sending and/or receiving functions, for example, it may be a transceiver circuit, a transceiver, a transceiver, or a communication interface.
  • the transceiving module 602 is used to receive a first message from the terminal device, and the first message is used to instruct the terminal device to request an anonymous way to establish an RRC connection.
  • the processing module 601 is configured to learn that the terminal device requests to use an anonymous method to establish an RRC connection according to the first message.
  • the processing module 601 is also used to determine that an anonymous RRC connection is established with the terminal device.
  • the processing module 601 is configured to determine that an anonymous RRC connection is established with the terminal device, including: not performing the step of establishing a connection with the core network device for the terminal device.
  • the processing module 601 is not used to perform the relevant description of the step of establishing a connection with the core network device for the terminal device. Reference may be made to the foregoing method embodiment part, and details are not described herein again.
  • the processing module 601 is used to determine the establishment of an anonymous RRC connection with the terminal device, including: used to establish a connection with the core network device for the terminal device, but the terminal device does not send the core network device directly or indirectly. Identify the identity information of the terminal device, such as IMSI, SUPI, S-TMSI or 5G S-TMSI, etc.
  • the first message carries first indication information
  • the first indication information is used to instruct the terminal device to request an anonymous way to establish an RRC connection.
  • the first message is a dedicated message used to instruct the terminal device to request an anonymous way to establish an RRC connection.
  • the first message is an RRC establishment complete message.
  • the processing module 601 is used to learn that the terminal device requests to use an anonymous method to establish an RRC connection according to the first message, including: determining whether the RRC establishment complete message does not carry NAS PDU cells or the RRC establishment complete message carries a length of 0 NAS PDU cell; learned that the terminal device requested to use an anonymous method to establish an RRC connection.
  • the transceiver module 602 is specifically configured to: receive the first message from the terminal device on the first random access resource, and the first random access resource is used by the terminal device to request an anonymous way to establish an RRC Dedicated resources for random access to the connection.
  • the processing module 601 is configured to learn that the terminal device requests to use an anonymous method to establish an RRC connection according to the first message, and includes: used to learn that the terminal device requests to use an anonymous method to establish an RRC connection based on the first random access resource.
  • the transceiver module 602 is further configured to send second indication information, where the second indication information is used to indicate the configuration information of the dedicated resource used for the terminal device to request random access to establish an RRC connection using an anonymous method.
  • the configuration information is Any combination of random access preamble information, random access time domain resource information and random access frequency domain resource information, the configuration information includes configuration information of the first random access resource.
  • the transceiver module 602 is also used to receive a second message from the terminal device, where the second message carries anonymous data.
  • the second message may be an RRC message.
  • the second message also carries third indication information, where the third indication information is used to indicate the completion of data transmission or the anonymous data is the last packet of anonymous data.
  • the processing module 601 is also used to release the RRC connection corresponding to the terminal device according to the third indication information.
  • the transceiver module 602 is also used to send a third message to the terminal device, where the third message is used to indicate the establishment of a data bearer DRB.
  • the transceiver module 602 is also used to receive anonymous data from the terminal device from the DRB.
  • the transceiver module 602 is further configured to receive fourth indication information from the terminal device from the DRB.
  • the fourth indication information is used to indicate the completion of data transmission or the anonymous data is the last packet of anonymous data.
  • the processing module 601 is also used to release the RRC connection corresponding to the terminal device according to the fourth instruction information.
  • the transceiver module 602 is also used to receive a fourth message from the terminal device, the fourth message is used to indicate the completion of data transmission or the anonymous data is the last packet of anonymous data, or the fourth message is used to request the release of the corresponding terminal device RRC connection.
  • the processing module 601 is further configured to release the RRC connection corresponding to the terminal device according to the fourth message.
  • the transceiver module 602 is also used to send fifth indication information, the fifth indication information is used to indicate that the serving cell of the terminal device supports transmission of anonymous data, or the fifth indication information is used to indicate that the serving cell of the terminal device supports establishment of anonymity RRC connection.
  • the access network device 60 is presented in the form of dividing each functional module in an integrated manner.
  • the "module" herein may refer to a specific ASIC, circuit, processor and memory that execute one or more software or firmware programs, integrated logic circuits, and/or other devices that can provide the above functions.
  • the access network device 60 may take the form of the access network device 20 shown in FIG. 2.
  • the processor 201 in the access network device 20 shown in FIG. 2 may call the computer stored in the memory 202 to execute instructions, so that the access network device 20 executes the data transmission method in the foregoing method embodiment.
  • the functions/implementation processes of the processing module 601 and the transceiver module 602 in FIG. 6 may be implemented by calling the computer execution instructions stored in the memory 202 by the processor 201 in the access network device 20 shown in FIG. 2.
  • the function/implementation process of the processing module 601 in FIG. 6 can be implemented by the processor 201 in the access network device 20 shown in FIG. 2 calling the computer execution instructions stored in the memory 202, and the transceiver module 602 in FIG. 6
  • the function/implementation process can be implemented by the transceiver 203 in the access network device 20 shown in FIG. 2.
  • the access network device 60 provided in this embodiment can perform the above-mentioned data transmission method, the technical effects that can be obtained can refer to the above-mentioned method embodiments, which will not be repeated here.
  • FIG. 7 shows a schematic structural diagram of a terminal device 70.
  • the terminal device 70 includes a processing module 701 and a transceiver module 702.
  • the transceiver module 702 may also be referred to as a transceiver unit to implement sending and/or receiving functions, for example, it may be a transceiver circuit, a transceiver, a transceiver, or a communication interface.
  • the processing module 701 is used to determine that the RRC connection is established in an anonymous manner.
  • the transceiver module 702 is used to send a first message to the access network device.
  • the first message is used to instruct the terminal device 70 to request an anonymous way to establish an RRC connection.
  • the first message carries first indication information, and the first indication information is used to instruct the terminal device 70 to request an anonymous way to establish an RRC connection.
  • the first message is a dedicated message used to instruct the terminal device 70 to request an anonymous way to establish an RRC connection.
  • the first message is an RRC setup complete message, where the RRC setup complete message does not carry NAS PDU cells or the RRC setup complete message carries NAS PDU cells with a length of 0.
  • the terminal device 70 sending the first message to the access network device includes: the terminal device 70 sends the first message to the access network device on the first random access resource; the first random access The resource is a dedicated resource for the terminal device 70 to request random access for establishing an RRC connection using an anonymous method.
  • the transceiver module 702 is further configured to receive second indication information from the access network device, where the second indication information is used to indicate a dedicated resource for the terminal device 70 to request random access to establish an RRC connection using an anonymous method
  • the configuration information is any combination of random access preamble information, random access time domain resource information and random access frequency domain resource information, and the configuration information includes configuration information of the first random access resource.
  • the transceiver module 702 is also used to send a second message to the access network device, where the second message carries anonymous data.
  • the second message may be an RRC message.
  • the second message also carries third indication information, and the third indication information is used to indicate that the data transmission is completed or that the current transmission is the last anonymous data packet.
  • the transceiver module 702 is also used to receive a third message from the access network device, and the third message is used to instruct to establish a data bearer DRB.
  • the processing module 701 is also used to establish a DRB according to the third message.
  • the transceiver module 702 is also used to send anonymous data to the access network device on the DRB.
  • the transceiver module 702 is further configured to send fourth indication information to the access network device on the DRB.
  • the fourth indication information is used to indicate the completion of data transmission or the anonymous data is the last packet of anonymous data.
  • the transceiver module 702 is also used to send a fourth message to the access network device, the fourth message is used to indicate the completion of data transmission or the anonymous data is the last packet of anonymous data, or the fourth message is used to request the release of the terminal device 70 corresponds to the RRC connection.
  • the transceiver module 702 is further configured to receive fifth indication information from the access network device.
  • the fifth indication information is used to indicate that the serving cell of the terminal device 70 supports the transmission of anonymous data, or the fifth indication information is used to indicate the terminal
  • the serving cell of the device 70 supports the establishment of an anonymous RRC connection.
  • the processing module 701 is configured to determine that the anonymous mode is used to establish the RRC connection, including: determining to use the anonymous mode to establish the RRC connection according to the fifth instruction information.
  • the terminal device 70 is presented in the form of dividing each functional module in an integrated manner.
  • the "module” herein may refer to a specific ASIC, circuit, processor and memory that execute one or more software or firmware programs, integrated logic circuits, and/or other devices that can provide the above functions.
  • those skilled in the art may think that the terminal device 70 may adopt the form of the terminal device 30 shown in FIG. 2.
  • the processor 301 in the terminal device 30 shown in FIG. 2 may call the computer stored in the memory 302 to execute instructions, so that the terminal device 30 executes the data transmission method in the foregoing method embodiment.
  • the functions/implementation processes of the processing module 701 and the transceiver module 702 in FIG. 7 can be implemented by calling the computer execution instructions stored in the memory 302 by the processor 301 in the terminal device 30 shown in FIG. 2.
  • the function/implementation process of the processing module 701 in FIG. 7 can be implemented by the processor 301 in the terminal device 30 shown in FIG. 2 calling the computer execution instructions stored in the memory 302, and the function of the transceiver module 702 in FIG. 7 /
  • the implementation process can be realized by the transceiver 303 in the terminal device 30 shown in FIG. 2.
  • the terminal device 70 provided in this embodiment can execute the above-mentioned data transmission method, the technical effects that can be obtained can refer to the above-mentioned method embodiments, which will not be repeated here.
  • an embodiment of the present application further provides a communication device (for example, the communication device may be a chip or a chip system), and the communication device includes a processor for implementing the method in any of the foregoing method embodiments.
  • the communication device further includes a memory.
  • the memory is used to store necessary program instructions and data, and the processor can call the program code stored in the memory to instruct the communication device to perform the method in any of the above method embodiments.
  • the memory may not be in the communication device.
  • the communication device is a chip system, it may be composed of a chip, or may include a chip and other discrete devices, which is not specifically limited in the embodiments of the present application.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a dedicated computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be from a website site, computer, server or data center Transmission to another website, computer, server or data center via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more servers and data centers that can be integrated with the medium.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)) or the like.
  • the computer may include the aforementioned device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供通信方法、装置及系统,可用于保护数据传输过程中的安全和用户隐私。终端设备在确定使用匿名的方式建立无线资源控制RRC连接之后,向接入网设备发送请求使用匿名方式建立RRC连接,进而使得接入网设备与终端设备建立匿名方式的RRC连接,比如接入网设备不执行与核心网设备建立针对终端设备的连接的步骤,或者接入网设备建立针对终端设备的与核心网设备连接,但是终端设备不向核心网设备发送能直接或间接识别该终端设备的身份信息。本申请中的方案可以用于通信系统,例如可以用于第五代5G网络。

Description

通信方法、装置及系统
本申请要求于2018年12月20日提交国家知识产权局、申请号为201811562867.0、申请名称为“通信方法、装置及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及可以支持匿名方式连接的通信方法、装置及系统。
背景技术
为了节省数据收集成本,现有技术中引入自动测量收集(measurement collection)的最小化路测(minimization of drive tests,MDT)技术来完成部分传统的路测工作,以检测和优化无线网络中的问题或故障。其中,MDT技术的应用场景例如可以包括:运营商一般每一个月都要做例行的网络覆盖路测,或者,针对用户投诉也会做一些针对特定区域的网络覆盖路测,等等。
目前,MDT技术的实现有赖于终端设备的上报。根据现有技术,终端设备必须要通过核心网的认证鉴权后才能上报MDT数据给基站,即终端设备先在空口建立无线资源控制(radio resource control,RRC)连接,并且通过核心网的认证或鉴权,空口安全成功激活后才能发送MDT数据给基站。
然而,由于MDT数据中携带有位置信息,涉及安全和用户隐私问题,可能存在准入风险。因此,如何保护MDT数据传输过程中的安全和用户隐私问题,是目前亟待解决的问题。
发明内容
本申请实施例提供的通信方法可以用于保护数据传输过程中的安全和用户隐私问题。
为达到上述目的,本申请的实施例采用如下技术方案:
第一方面,提供了一种通信方法及其相应的通信装置。在该方案中,接入网设备接收来自终端设备的第一消息,该第一消息用于指示该终端设备请求使用匿名方式建立无线资源控制RRC连接;接入网设备根据该第一消息,获知该终端设备请求使用匿名方式建立所述RRC连接;接入网设备确定与该终端设备之间建立匿名方式的RRC连接。考虑到构成用户隐私的要素包含两个方面,即用户隐私的主体和客体,主体一般通过终端设备的身份信息进行表征;客体是私有信息。本申请实施例考虑从主体入手来解决匿名数据的隐私问题。基于该方案,由于接入网设备和终端设备之间可以建立匿名方式的RRC连接,因此可以传输匿名数据,从而可以保护数据传输过程中的安全和用户隐私问题。一种可能的实现方式中,该匿名数据例如可以包括最小化路测MDT数据,从而可以减轻MDT数据传输过程中的安全和用户隐私问题。
在一种可能的设计中,该接入网设备确定与该终端设备之间建立匿名方式的RRC连接,包括:该接入网设备不执行与核心网设备建立针对该终端设备的连接的步骤; 或者接入网设备建立针对终端设备的与核心网设备连接,但是终端设备不向核心网设备发送能直接或间接识别该终端设备的身份信息,比如国际移动用户识别码IMSI,签约永久标识SUPI,S临时移动用户识别码S-TMSI或者第五代5G S-TMSI等。
需要说明的是,本申请实施例中,接入网设备不执行与核心网设备建立针对终端设备的连接的步骤,可以是指在匿名方式下,接入网设备与终端设备之间完成连接建立,无需引入核心网设备的参与;或者是指,接入网设备跳过与核心网设备建立针对终端设备的连接的步骤;或者是指,接入网设备忽略与核心网设备建立针对终端设备的连接的步骤;或者是指,接入网设备不发起与核心网设备建立针对终端设备的连接的步骤等,本申请实施例对此不作具体限定。
可选的,接入网设备与核心网设备之间针对终端设备的连接例如可以是新空口NR系统中针对该终端设备的N2连接或下一代NG连接;或者,接入网设备与核心网设备之间针对终端设备的连接例如可以是长期演进LTE系统中针对该终端设备的S1连接等。
可选的,本申请实施例中,与核心网设备建立针对终端设备的连接的步骤例如可以包括基站向核心网设备发送初始终端消息(initial UE message),以使得核心网设备在接收来自基站的初始终端消息之后,进行终端设备的认证或鉴权,进而,核心网设备向基站发送初始化上下文请求(initial context setup request),基站向核心网设备回复初始化上下文响应(initial context setup response)等,具体可参考现有的实现方式,在此不再赘述。
在一种可能的设计中,该第一消息携带第一指示信息,该第一指示信息用于指示该终端设备请求使用匿名方式建立该RRC连接。也就是说,本申请实施例中,可以通过一个显式的指示信息指示该终端设备请求使用匿名方式建立该RRC连接。
在一种可能的设计中,该第一消息为RRC建立完成消息;该接入网设备根据该第一消息,获知该终端设备请求使用匿名方式建立该RRC连接,包括:该接入网设备确定该RRC建立完成消息不携带NAS PDU信元或者该RRC建立完成消息携带长度为0的NAS PDU信元;该接入网设备获知该终端设备请求使用匿名方式建立该RRC连接。也就是说,本申请实施例中,接入网设备可以根据该RRC建立完成消息是否携带NAS PDU信元或者该RRC建立完成消息是否携带长度为0的NAS PDU信元来确定该终端设备是否请求使用匿名方式建立该RRC连接。若该接入网设备确定该RRC建立完成消息不携带NAS PDU信元或者该RRC建立完成消息携带长度为0的NAS PDU信元;该接入网设备获知该终端设备请求使用匿名方式建立该RRC连接。
在一种可能的设计中,该接入网设备接收来自该终端设备的第一消息,包括:该接入网设备在第一随机接入资源上接收来自该终端设备的该第一消息,该第一随机接入资源是用于该终端设备请求使用匿名方式建立该RRC连接的随机接入的专用资源;该接入网设备根据该第一消息,获知该终端设备请求使用匿名方式建立该RRC连接,包括:该接入网设备根据该第一随机接入资源,获知该终端设备请求使用匿名方式建立该RRC连接。也就是说,本申请实施例中,可以通过该终端设备请求使用匿名方式建立该RRC连接的随机接入的专用资源承载第一消息,进而接入网设备接收到第一消息之后,根据该第一随机接入资源即可获知终端设备请求使用匿名方式建立该RRC连接。该第一随机接入资源例如可以包括第一随机接入前导码、第一随机接入时域资源 和第一随机接入频域资源的任意组合。
可选的,在该接入网设备接收来自该终端设备的该第一消息之前,该方法还包括:该接入网设备发送第二指示信息,该第二指示信息用于指示用于终端设备请求使用匿名方式建立该RRC连接的随机接入的专用资源的配置信息,该配置信息包括该第一随机接入资源的配置信息。
当然,本申请实施例中也可以由接入网设备和终端设备预先协商好用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息;或者,预先配置或者预先约定用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息,本申请实施例对此不作具体限定。
在一种可能的设计中,在该接入网设备获知该终端设备请求使用匿名方式建立该RRC连接之后,该方法还包括:该接入网设备接收来自该终端设备的第二消息,该第二消息携带匿名数据。也就是说,本申请实施例中,可以通过控制面传输匿名数据。其中,通过控制面传输匿名数据,由于不需要建立数据承载DRB,因此相比于通过用户面传输匿名数据的方式,更加简单。
可选的,该第二消息还携带第三指示信息,该第三指示信息用于指示数据传输完成或者该匿名数据为最后一包匿名数据;该方法还包括:该接入网设备根据该第三指示信息,释放该终端设备对应的该RRC连接。基于该方案,由于接入网设备可以在匿名数据传输完成之后,及时释放终端设备对应的RRC连接,因此可以节省终端设备的能耗。
在一种可能的设计中,在该接入网设备获知该终端设备请求使用匿名方式建立该RRC连接之后,该方法还包括:该接入网设备向该终端设备发送第三消息,该第三消息用于指示建立数据承载DRB;该接入网设备从该DRB上接收来自该终端设备的匿名数据。也就是说,本申请实施例中,可以通过用户面传输匿名数据。其中,通过用户面传输匿名数据的方式,由于匿名数据不需要进行RRC消息的解码,因此相比于通过控制面传输匿名数据的方式,减少了接入网设备的处理资源开销。
可选的,该方法还包括:该接入网设备从该DRB上接收来自该终端设备的第四指示信息,该第四指示信息用于指示数据传输完成或者该匿名数据为最后一包匿名数据;该接入网设备根据该第四指示信息,释放该终端设备对应的RRC连接。基于该方案,由于接入网设备可以在匿名数据传输完成之后,及时释放终端设备对应的RRC连接,因此可以节省终端设备的能耗。
可选的,该方法还包括:该接入网设备接收来自该终端设备的第四消息,该第四消息用于指示数据传输完成或者该匿名数据为最后一包匿名数据,或者该第四消息用于请求释放该终端设备对应的RRC连接;该接入网设备根据该第四消息,释放该终端设备对应的RRC连接。基于该方案,由于接入网设备可以在匿名数据传输完成之后,及时释放终端设备对应的RRC连接,因此可以节省终端设备的能耗。
在一种可能的设计中,在该接入网设备获知该终端设备请求使用匿名方式建立该RRC连接之前,该方法还包括:该接入网设备发送第五指示信息,该第五指示信息用于指示该终端设备的服务小区支持传输匿名数据,或者该第五指示信息用于指示该终端设备的服务小区支持建立匿名方式的RRC连接。基于该方案,终端设备可以获知该 终端设备的服务小区支持传输匿名数据,或者该终端设备的服务小区支持建立匿名方式的RRC连接。这样,该终端设备可以在需要传输匿名数据的情况下,根据第五指示信息,确定使用匿名方式建立RRC连接。
第二方面,提供了一种通信方法及其相应的通信装置。在该方案中,终端设备确定使用匿名方式建立无线资源控制RRC连接;终端设备向接入网设备发送第一消息,该第一消息用于指示该终端设备请求使用匿名方式建立该RRC连接。考虑到构成用户隐私的要素包含两个方面,即用户隐私的主体和客体,主体一般通过终端设备的身份信息进行表征;客体是私有信息。私有信息如果缺少了主体,则就不再构成隐私问题了。私有信息例如可以包括位置信息。而位置信息对于网络优化至关重要。例如,如果没有位置信息,MDT效果将大打折扣。既然位置信息很重要,本申请实施例考虑从主体入手来解决匿名数据的隐私问题。基于该方案,由于接入网设备和终端设备之间可以建立匿名方式的RRC连接,因此可以传输匿名数据,从而可以保护数据传输过程中的安全和用户隐私问题。一种可能的实现方式中,该匿名数据例如可以包括最小化路测MDT数据,从而可以减轻MDT数据传输过程中的安全和用户隐私问题。
在一种可能的设计中,该第一消息携带第一指示信息,该第一指示信息用于指示该终端设备请求使用匿名方式建立该RRC连接。也就是说,本申请实施例中,可以通过一个显式的指示信息指示该终端设备请求使用匿名方式建立该RRC连接。
在一种可能的设计中,该第一消息为RRC建立完成消息,其中,该RRC建立完成消息不携带NAS PDU信元或者该RRC建立完成消息携带长度为0的NAS PDU信元。也就是说,本申请实施例中,接入网设备可以根据该RRC建立完成消息是否携带NAS PDU信元或者该RRC建立完成消息是否携带长度为0的NAS PDU信元来确定该终端设备是否请求使用匿名方式建立该RRC连接。若该接入网设备确定该RRC建立完成消息不携带NAS PDU信元或者该RRC建立完成消息携带长度为0的NAS PDU信元;该接入网设备获知该终端设备请求使用匿名方式建立该RRC连接。
在一种可能的设计中,该终端设备向接入网设备发送第一消息,包括:该终端设备在该第一随机接入资源上向该接入网设备发送该第一消息;该第一随机接入资源是用于该终端设备请求使用匿名方式建立该RRC连接的随机接入的专用资源。也就是说,本申请实施例中,可以通过该终端设备请求使用匿名方式建立该RRC连接的随机接入的专用资源承载第一消息,进而接入网设备接收到第一消息之后,根据该第一随机接入资源即可获知终端设备请求使用匿名方式建立该RRC连接。该第一随机接入资源例如可以包括第一随机接入前导码、第一随机接入时域资源和第一随机接入频域资源的任意组合。
可选的,在该终端设备向接入网设备发送第一消息之前,该方法还包括:该终端设备接收来自该接入网设备的第二指示信息,该第二指示信息用于指示用于终端设备请求使用匿名方式建立该RRC连接的随机接入的专用资源的配置信息,该配置信息包括该第一随机接入资源的配置信息。
当然,本申请实施例中也可以由接入网设备和终端设备预先协商好用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息;或者,预先配置或者预先约定用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的 配置信息,本申请实施例对此不作具体限定。
在一种可能的设计中,在该终端设备向接入网设备发送第一消息之后,该方法还包括:该终端设备向该接入网设备发送第二消息,该第二消息携带匿名数据。也就是说,本申请实施例中,可以通过控制面传输匿名数据。其中,通过控制面传输匿名数据,由于不需要建立数据承载DRB,因此相比于通过用户面传输匿名数据的方式,更加简单。
可选的,该第二消息还携带第三指示信息,该第三指示信息用于指示数据传输完成或当前传输的为最后一个匿名数据包。基于该方案,接入网设备可以获知匿名数据传输完成,进而可以及时释放终端设备对应的RRC连接,因此可以节省终端设备的能耗。
在一种可能的设计中,在该终端设备向接入网设备发送第一消息之后,该方法还包括:该终端设备接收来自该接入网设备的第三消息,该第三消息用于指示建立数据承载DRB;该终端设备根据该第三消息,建立该DRB;该终端设备在该DRB上向该接入网设备发送匿名数据。也就是说,本申请实施例中,可以通过用户面传输匿名数据。其中,通过用户面传输匿名数据的方式,由于匿名数据不需要进行RRC消息的解码,因此相比于通过控制面传输匿名数据的方式,减少了接入网设备的处理资源开销。
可选的,该方法还包括:该终端设备在该DRB上向该接入网设备发送第四指示信息,该第四指示信息用于指示数据传输完成或者该匿名数据为最后一包匿名数据。基于该方案,接入网设备可以获知匿名数据传输完成,进而可以及时释放终端设备对应的RRC连接,因此可以节省终端设备的能耗。
可选的,该方法还包括:该终端设备向该接入网设备发送第四消息,该第四消息用于指示数据传输完成或者该匿名数据为最后一包匿名数据,或者该第四消息用于请求释放该终端设备对应的RRC连接。基于该方案,接入网设备可以获知匿名数据传输完成,进而可以及时释放终端设备对应的RRC连接,因此可以节省终端设备的能耗。
在一种可能的设计中,该方法还包括:该终端设备接收来自该接入网设备的第五指示信息,该第五指示信息用于指示该终端设备的服务小区支持传输匿名数据,或者该第五指示信息用于指示该终端设备的服务小区支持建立匿名方式的RRC连接;该终端设备确定使用匿名方式建立RRC连接,包括:该终端设备根据该第五指示信息,确定使用匿名方式建立RRC连接。基于该方案,终端设备可以获知该终端设备的服务小区支持传输匿名数据,或者该终端设备的服务小区支持建立匿名方式的RRC连接。这样,该终端设备可以在需要传输匿名数据的情况下,根据第五指示信息,确定使用匿名方式建立RRC连接。
结合上述第一方面或第二方面,在一种可能的设计中,该第二指示信息用于指示用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息,可以是指,该第二指示信息包括用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息;或者可以是指,该第二指示信息包括用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息的标识(或索引)等,进而,终端设备根据专用资源的配置信息的标识(或索引)、以及专用资源的配置信息与专用资源的配置信息的标识(或索引)的对应关系,可以确定专用资源的配置信息, 本申请实施例对此不作具体限定。
结合上述第一方面或第二方面,在一种可能的设计中,上述专用资源的配置信息是随机接入前导码序列信息、随机接入时域资源信息和随机接入频域资源信息的任意组合。
示例性的,上述专用资源的配置信息可以包括随机接入前导码信息;或者,专用资源的配置信息可以包括随机接入时域资源信息;或者,专用资源的配置信息可以包括随机接入频域资源信息;或者,专用资源的配置信息可以包括随机接入频域资源上的随机接入前导码信息,也就是说专用资源的配置信息包括了随机接入频率资源信息和随机接入前导码信息;或者,专用资源的配置信息可以包括随机接入时域资源上的随机接入前导码信息,也就是说专用资源的配置信息包括了随机接入时域资源信息和随机接入前导码信息;或者,专用资源的配置信息可以包括随机接入时域资源和随机接入频域资源上的随机接入前导码,也就是说专用资源的配置信息包括了随机接入时域资源信息、随机接入频率资源信息和随机接入前导码信息。
结合上述第一方面或第二方面,在一种可能的设计中,使用匿名方式建立RRC连接也可以描述为使用匿名方式传输数据,或者可以描述为传输匿名数据,或者当匿名数据包括MDT数据时,也可以描述为传输MDT数据等,在此统一说明,本申请实施例对此不作具体限定。
结合上述第一方面或第二方面,在一种可能的设计中,在第一消息携带第一指示信息的场景下,该第一消息可以为RRC建立请求消息或者RRC建立完成消息。
可选的,该RRC建立请求消息还携带随机值,该随机值用于该终端设备进行随机接入的竞争解决。也就是说,由于本申请实施例要实现匿名数据传输,因此本申请实施例中,无论核心网设备是否给终端设备分配了终端标识,比如S-TMSI或者5G S-TMSI,该RRC建立请求消息均不会携带该非接入层的终端标识或该终端标识的部分字段,而是携带终端设备自己产生或决定的一个值,比如随机值,该随机值用于终端设备进行随机接入的竞争解决。比如,接入网设备获取该随机值之后,可以在RRC建立请求消息的响应消息(例如可以是竞争冲突解决消息)中返回该随机值。进而终端设备根据接入网设备返回的随机值是否是自己发送的来确定是否自己竞争成功。其中,若接入网设备返回的随机值是自己发送的,即可视为成功,否则视为竞争失败。
可选的,该RRC建立完成消息不携带该终端设备在核心网注册的信息,或者该RRC建立完成消息不携带非接入层NAS协议数据单元PDU信元,或者该RRC建立完成消息携带长度为0的NAS PDU信元。也就是说,由于本申请实施例希望实现匿名数据传输,因此本申请实施例中,无论终端设备是否在核心网进行了注册,该RRC建立完成消息均不携带该终端设备在核心网注册的信息,或者该RRC建立完成消息不携带非接入层NAS协议数据单元PDU信元,或者该RRC建立完成消息携带长度为0的NAS PDU信元,其中,该NAS PDU信元是接入网设备和核心网设备进行交互的信令。这样,不仅可以减少信令开销,并且可以更好的隐藏用户信息。
结合上述第一方面或第二方面,在一种可能的设计中,该第一消息是用于指示该终端设备请求使用匿名方式建立该RRC连接的专用消息。基于该方案,接入网设备接收到该专用消息之后,根据该专用消息的消息,即可获知该终端设备请求使用匿名方 式建立RRC连接。
第三方面,提供了一种通信装置用于实现上述各种方法。该通信装置可以为上述第一方面中的接入网设备,或者包含上述接入网设备的装置;或者,该通信装置可以为上述第二方面中的终端设备,或者包含上述终端设备的装置。所述通信装置包括实现上述方法相应的模块、单元、或手段(means),该模块、单元、或means可以通过硬件实现,软件实现,或者通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块或单元。
第四方面,提供了一种通信装置,包括:处理器和存储器;该存储器用于存储计算机指令,当该处理器执行该指令时,以使该通信装置执行上述任一方面所述的方法。该通信装置可以为上述第一方面中的接入网设备或者包含上述接入网设备的装置;或者,该通信装置可以为上述第二方面中的终端设备,或者包含上述终端设备的装置。
第五方面,提供了一种通信装置,包括:处理器;所述处理器用于与存储器耦合,并读取存储器中的指令之后,根据所述指令执行如上述任一方面所述的方法。该通信装置可以为上述第一方面中的接入网设备或者包含上述接入网设备的装置;或者,该通信装置可以为上述第二方面中的终端设备,或者包含上述终端设备的装置。
第六方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机可以执行上述任一方面所述的方法。
第七方面,提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机可以执行上述任一方面所述的方法。
第八方面,提供了一种通信装置(例如,该通信装置可以是芯片或芯片系统),该通信装置包括处理器,用于实现上述任一方面中所涉及的功能。在一种可能的设计中,该通信装置还包括存储器,该存储器,用于保存必要的程序指令和数据。该通信装置是芯片系统时,可以由芯片构成,也可以包含芯片和其他分立器件。
其中,第三方面至第八方面中任一种设计方式所带来的技术效果可参见上述第一方面或第二方面中不同设计方式所带来的技术效果,此处不再赘述。
第九方面,提供一种通信系统,该通信系统包括上述方面所述的终端设备和上述方面所述的接入网设备。
附图说明
图1为本申请实施例提供的通信系统的结构示意图;
图2为本申请实施例提供的接入网设备和终端设备的结构示意图;
图3为本申请实施例提供的通信方法的流程示意图一;
图4为本申请实施例提供的通信方法的流程示意图二;
图5为本申请实施例提供的通信方法的流程示意图三;
图6为本申请实施例提供的接入网设备的另一种结构示意图;
图7为本申请实施例提供的终端设备的另一种结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,在本申请的描述中,除非另有说明,“/”表示前后关联的对象是一种“或”的关系,例如,A/B可以表示A或B;本申请中的“和/或”仅仅是一种描述关联对象的关 联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。并且,在本申请的描述中,除非另有说明,“多个”是指两个或多于两个。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。
此外,本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
如图1所示,为本申请实施例提供的一种通信系统10。该通信系统10包括一个接入网设备20,以及与该接入网设备20连接的一个或多个终端设备30。
以图1所示的接入网设备20与任一终端设备30进行交互为例,本申请实施例中,终端设备30在确定使用匿名的方式建立无线资源控制(radio resource control,RRC)连接之后,向接入网设备20发送第一消息,该第一消息用于指示终端设备30请求使用匿名方式建立RRC连接。接入网设备20接收来自终端设备30的第一消息之后,获知终端设备30请求使用匿名方式建立RRC连接,进而可以确定与终端设备30之间建立匿名方式的RRC连接,比如接入网设备20不执行与核心网设备建立针对终端设备30的连接的步骤,或者接入网设备20建立针对终端设备30的与核心网设备连接,但是终端设备不向核心网设备发送能直接或间接识别该终端设备的身份信息,比如国际移动用户识别码(international mobile subscriber identification number,IMSI),签约永久标识(subscription permanent identifier,SUPI),S临时移动用户识别码(s-temporary mobile subscriber identity,S-TMSI)或者5G-TMSI等。
需要说明的是,本申请实施例中,接入网设备20不执行与核心网设备建立针对终端设备30的连接的步骤,可以是指在匿名方式下,接入网设备20与终端设备30之间完成连接建立,无需引入核心网设备的参与;或者接入网设备20跳过与核心网设备建立针对终端设备30的连接的步骤;或者接入网设备20忽略与核心网设备建立针对终端设备30的连接的步骤;或者接入网设备20不发起与核心网设备建立针对终端设备30的连接的步骤等,本申请实施例对此不作具体限定。
本申请实施例中,使用匿名方式建立RRC连接也可以描述为使用匿名方式传输数据,或者可以描述为传输匿名数据,或者当匿名数据包括MDT数据时,也可以描述为传输MDT数据等,在此统一说明,本申请实施例对此不作具体限定。
考虑到构成用户隐私的要素包含两个方面,即用户隐私的主体和客体,主体一般通过终端设备的身份信息进行表征;客体是私有信息。私有信息如果缺少了主体,则就不再构成隐私问题了。私有信息例如可以包括位置信息。而位置信息对于网络优化 至关重要。例如,如果没有位置信息,MDT效果将大打折扣。既然位置信息很重要,本申请实施例考虑从主体入手来解决匿名数据的隐私问题。基于本申请实施例提供的通信系统,由于接入网设备和终端设备之间可以建立匿名方式的RRC连接,因此可以传输匿名数据,从而可以保护数据传输过程中的安全和用户隐私问题。一种可能的实现方式中,该匿名数据例如可以包括MDT数据,从而可以减轻MDT数据传输过程中的安全和用户隐私问题。
可选的,如图2所示,为本申请实施例提供的接入网设备20和终端设备30的硬件结构示意图。
其中,终端设备30包括至少一个处理器(图2中示例性的以包括一个处理器301为例进行说明)和至少一个收发器(图2中示例性的以包括一个收发器303为例进行说明)。可选的,终端设备30还可以包括至少一个存储器(图2中示例性的以包括一个存储器302为例进行说明)、至少一个输出设备(图2中示例性的以包括一个输出设备304为例进行说明)和至少一个输入设备(图2中示例性的以包括一个输入设备305为例进行说明)。
处理器301、存储器302和收发器303通过通信线路相连接。通信线路可包括一通路,在上述组件之间传送信息。
处理器301可以是通用中央处理器(central processing unit,CPU)、微处理器、特定应用集成电路(application-specific integrated circuit,ASIC),或者一个或多个用于控制本申请方案程序执行的集成电路。在具体实现中,作为一种实施例,处理器301也可以包括多个CPU,并且处理器301可以是单核(single-CPU)处理器或多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路或用于处理数据(例如计算机程序指令)的处理核。
存储器302可以是具有存储功能的装置。例如可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备、随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器302可以是独立存在,通过通信线路与处理器301相连接。存储器302也可以和处理器301集成在一起。
其中,存储器302用于存储执行本申请方案的计算机执行指令,并由处理器301来控制执行。具体的,处理器301用于执行存储器302中存储的计算机执行指令,从而实现本申请实施例中所述的通信方法。可选的,本申请实施例中的计算机执行指令也可以称之为应用程序代码或者计算机程序代码,本申请实施例对此不作具体限定。
收发器303可以使用任何收发器一类的装置,用于与其他设备或通信网络通信,如以太网、无线接入网(radio access network,RAN)、或者无线局域网(wireless local area networks,WLAN)等。收发器303包括发射机Tx和接收机Rx。
输出设备304和处理器301通信,可以以多种方式来显示信息。例如,输出设备304可以是液晶显示器(liquid crystal display,LCD),发光二级管(light emitting diode,LED)显示设备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。
输入设备305和处理器301通信,可以以多种方式接受用户的输入。例如,输入设备305可以是鼠标、键盘、触摸屏设备或传感设备等。
接入网设备20包括至少一个处理器(图2中示例性的以包括一个处理器201为例进行说明)、至少一个收发器(图2中示例性的以包括一个收发器203为例进行说明)和至少一个网络接口(图2中示例性的以包括一个网络接口204为例进行说明)。可选的,接入网设备20还可以包括至少一个存储器(图2中示例性的以包括一个存储器202为例进行说明)。其中,处理器201、存储器202、收发器203和网络接口204通过通信线路相连接。网络接口204用于通过链路(例如S1接口)与核心网设备连接,或者通过有线或无线链路(例如X2接口)与其它接入网设备的网络接口进行连接(图2中未示出),本申请实施例对此不作具体限定。另外,处理器201、存储器202和收发器203的相关描述可参考终端设备30中处理器301、存储器302和收发器303的描述,在此不再赘述。
可选的,本申请实施例中的接入网设备20,是一种将终端设备30接入到无线网络的设备,可以是长期演进(long term evolution,LTE)中的演进型基站(evolutional Node B,eNB或eNodeB);或者第五代(5th generation,5G)网络或者未来演进的公共陆地移动网络(public land mobile network,PLMN)中的基站,宽带网络业务网关(broadband network gateway,BNG),汇聚交换机或非第三代合作伙伴项目(3rd generation partnership project,3GPP)接入设备等,本申请实施例对此不作具体限定。可选的,本申请实施例中的基站可以包括各种形式的基站,例如:宏基站,微基站(也称为小站),中继站,接入点等,本申请实施例对此不作具体限定。
可选的,本申请实施例中的终端设备30,可以是用于实现无线通信功能的设备,例如终端或者可用于终端中的芯片等。其中,终端可以是5G网络或者未来演进的PLMN中的用户设备(user equipment,UE)、接入终端、终端单元、终端站、移动站、移动台、远方站、远程终端、移动设备、无线通信设备、终端代理或终端装置等。接入终端可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备或可穿戴设备,虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等。终端可以是移动的,也可以是固定的。
可选的,本申请实施例中,图1或图2所示的接入网设备20与终端设备30也可以称之为通信装置,其可以是一个通用设备或者是一个专用设备,本申请实施例对此 不作具体限定。
下面将结合图1和图2,对本申请实施例提供的通信方法进行展开说明。
需要说明的是,本申请下述实施例中各个网元之间的消息名字或消息中各参数的名字等只是一个示例,具体实现中也可以是其他的名字,本申请实施例对此不作具体限定。
需要说明的是,本申请实施例中的通信方法支持匿名方式连接,可用于匿名传输或匿名通信,在此统一说明,以下不再赘述。
以图1所示的接入网设备20与任一终端设备30进行交互,接入网设备20为基站为例,如图3所示,为本申请实施例提供的一种通信方法,该方法包括如下步骤:
S301、基站向终端设备发送消息a。
相应的,终端设备接收来自基站的消息a。
其中,该消息a包括指示信息1,该指示信息1用于指示用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息。
可选的,本申请实施例中,指示信息1用于指示用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息,可以是指,该指示信息1包括用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息;或者可以是指,该指示信息1包括用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息的标识(或索引)等,进而,终端设备根据专用资源的配置信息的标识(或索引)、以及专用资源的配置信息与专用资源的配置信息的标识(或索引)的对应关系,可以确定专用资源的配置信息,本申请实施例对此不作具体限定。
示例性的,该消息a例如可以是图3中的系统广播消息。也就是说,基站可以通过系统广播消息广播用于终端设备(这里是一个泛指的终端设备)请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息。比如,一个系统信息块(system information block,SIB)专门用于广播匿名传输相关的配置,在该SIB中可以包括用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息。
可选的,该消息a还可以是寻呼消息等其他消息,本申请实施例对此不作具体限定。
本申请实施例中上述步骤S301可以为可选的步骤,终端设备可以基于接收来自基站的消息a获知用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息。
本申请实施例中也可以不执行步骤S301,而是可以由基站和终端设备预先协商好用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息;或者,预先配置或者预先约定用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息,本申请实施例对此不作具体限定。
可选的,本申请实施例中,专用资源的配置信息可以是随机接入前导码信息、随机接入时域资源信息或随机接入频域资源信息的任意组合。
例如,专用资源的配置信息可以包括随机接入前导码信息;或者,专用资源的配置信息可以包括随机接入时域资源信息;或者,专用资源的配置信息可以包括随机接入频域资源信息;或者,专用资源的配置信息可以包括随机接入频域资源上的随机接 入前导码信息,也就是说专用资源的配置信息包括了随机接入频率资源信息和随机接入前导码信息;或者,专用资源的配置信息可以包括随机接入时域资源上的随机接入前导码信息,也就是说专用资源的配置信息包括了随机接入时域资源信息和随机接入前导码信息;或者,专用资源的配置信息可以包括随机接入时域资源和随机接入频域资源上的随机接入前导码,也就是说专用资源的配置信息包括了随机接入时域资源信息、随机接入频率资源信息和随机接入前导码信息。
可选的,本申请实施例中,随机接入时域资源信息例如可以包括随机接入时域资源的标识或者随机接入时域资源的配置,其中,随机接入时域资源的配置例如可以包括帧(frame)、符号(symbol)、时隙(slot)等的配置。
可选的,本申请实施例中,随机接入频域资源信息例如可以包括随机接入频域资源的标识或者随机接入频域资源的配置。其中,随机接入频域资源的配置例如可以包括带宽、资源块等的配置。
可选的,本申请实施例中,随机接入前导码信息例如可以包括随机接入前导码的标识或者随机接入前导码的配置。其中,随机接入前导码的配置例如可以包括前导码。
此外,可选的,本申请实施例中的消息a还可以包括指示信息2,该指示信息2用于使得终端设备确定终端设备的服务小区是否支持传输匿名数据,例如指示信息2用于指示终端设备的服务小区是否支持传输匿名数据,或者该指示信息2用于指示终端设备的服务小区是否支持建立匿名方式的RRC连接,或者,指示信息2用于指示终端的服务小区支持传输匿名数据或者支持建立匿名方式的RRC连接(也就是说在终端的服务小区支持传输匿名数据或者支持建立匿名方式的RRC连接给终端设备发送指示信息2,那么没有发送指示信息2默认终端的服务小区不支持传输匿名数据或者支持建立匿名方式的RRC连接)。其中,该终端设备的服务小区即为发送该系统广播消息的小区。这样,该终端设备可以在需要传输匿名数据的情况下,根据指示信息2,确定使用匿名方式建立RRC连接,在此统一说明,以下不再赘述。其中,使用匿名方式建立RRC连接的其他对等描述可参考图1所示的通信系统部分,在此不再赘述。
可选的,本申请实施例中,若终端设备的服务小区不支持传输匿名数据或者不支持建立匿名方式的RRC连接,则终端设备可以不传输匿名数据,或者可以按照现有的方式建立RRC连接以及传输匿名数据,本申请实施例对此不作具体限定。
由于移动运营商可以通过接入网设备(例如本申请实施例中的基站)控制在哪些小区传输匿名数据或者建立匿名方式的RRC连接,因此可以降低对系统的影响。比如,移动运营商可以选择在负载低的小区上传输匿名数据,从而减少由于MDT数据传输对于用户业务的影响。
需要说明的是,本申请实施例示例性的以上述指示信息1和上述指示信息2可以是通过一条消息(比如上述消息a)发送给终端设备为例进行说明。当然,上述指示信息1和上述指示信息2也可以是通过不同的消息发送给终端设备,本申请实施例对此不作具体限定。
S302、终端设备确定使用匿名方式建立RRC连接。
可选的,本申请实施例中,确定使用匿名方式建立RRC连接的终端设备可以是针对空闲态的终端设备,在此统一说明,以下不再赘述。
可选的,本申请实施例中,终端设备确定使用匿名方式建立RRC连接可以包括:终端设备根据上述指示信息2,确定使用匿名方式建立RRC连接。比如,终端设备可以在需要传输匿名数据,并且根据上述指示信息2获知终端设备的服务小区支持建立匿名方式的RRC连接或者支持传输匿名数据的情况下,确定使用匿名方式建立RRC连接。
上述指示信息2也可以是可选的,即基站不向终端设备指示终端设备的服务小区是否支持传输匿名数据或者终端设备的服务小区是否支持建立匿名方式的RRC连接,则终端设备也可以在需要传输数据的情况下,确定使用匿名方式建立RRC连接。比如,终端设备可以在需要传输MDT数据的情况下,确定使用匿名方式建立RRC连接。
S303、终端设备向基站发送消息b。
相应的,基站接收来自终端设备的消息b。
其中,该消息b包括终端设备使用的前导码。
其中,该消息b为图1所示的通信系统部分的第一消息的一种可能的形式。
示例性的,该消息b例如可以是图3中的随机接入过程中的消息1(message1)。
可以理解,该消息1是是随机接入过程的第一条消息,也可以称为前导码消息,在此统一说明,以下不再赘述。
以消息b为随机接入过程中的消息1为例进行说明,可选的,本申请实施例中,终端设备可以根据步骤S301中的指示信息1向基站发送消息1。比如,终端设备在消息1中携带的前导码可以为指示信息1指示的专用资源的配置信息中的前导码信息对应的前导码;或者,终端设备可以在指示信息1指示的专用资源的配置信息中的随机接入时域资源信息对应的随机接入时域资源上向基站发送消息1;或者,终端设备可以在指示信息1指示的专用资源的配置信息中的随机接入频域资源信息对应的随机接入频域资源上向基站发送消息1;或者,终端设备可以在指示信息1指示的专用资源的配置信息中的随机接入时域资源信息对应的随机接入时域资源上向基站发送消息1,消息1中包括指示信息1指示的专用资源的配置信息中的前导码信息对应的前导码;或者,终端设备可以在指示信息1指示的专用资源的配置信息中的随机接入频域资源信息对应的随机接入频域资源上向基站发送消息1,消息1中包括指示信息1指示的专用资源的配置信息中的前导码信息对应的前导码;或者,终端设备可以在指示信息1指示的专用资源的配置信息中的随机接入时域资源信息对应的随机接入时域资源和随机接入频域资源信息对应的随机接入频域资源上向基站发送消息1,消息1中包括指示信息1指示的专用资源的配置信息中的前导码信息对应的前导码。
或者,以消息b为随机接入过程中的消息1为例进行说明,可选的,终端设备也可以根据预先协商好、预先配置或者预先约定的资源配置信息向基站发送消息1。比如,终端设备在消息1中携带的前导码可以为预先协商好、预先配置或者预先约定的专用资源的配置信息中的前导码信息对应的前导码;或者,终端设备可以在预先协商好、预先配置或者预先约定的专用资源的配置信息中的随机接入时域资源信息对应的随机接入时域资源上向基站发送消息1;或者,终端设备可以在预先协商好、预先配置或者预先约定的专用资源的配置信息中的随机接入频域资源信息对应的随机接入频域资源上向基站发送消息1;或者,终端设备可以在预先协商好、预先配置或者预先 约定的专用资源的配置信息中的随机接入时域资源信息对应的随机接入时域资源上向基站发送消息1,消息1中包括预先协商好、预先配置或者预先约定的专用资源的配置信息中的前导码信息对应的前导码;或者,终端设备可以在预先协商好、预先配置或者预先约定的专用资源的配置信息中的随机接入频域资源信息对应的随机接入频域资源上向基站发送消息1,消息1中包括预先协商好、预先配置或者预先约定的专用资源的配置信息中的前导码信息对应的前导码;或者,终端设备可以在预先协商好、预先配置或者预先约定的资源配置信息中的随机接入时域资源信息对应的随机接入时域资源和随机接入频域资源信息对应的随机接入频域资源上向基站发送消息1,消息1中包括预先协商好、预先配置或者预先约定的专用资源的配置信息中的前导码信息对应的前导码。
S304、基站根据消息b,确定该终端设备进行随机接入的第一随机接入资源。
其中,第一随机接入资源是用于终端设备(这里是一个泛指的终端设备)请求使用匿名方式建立RRC连接的随机接入的专用资源,包括第一随机接入前导码、第一随机接入时域资源或第一随机接入频域资源的任意组合。
可选的,上述专用资源的配置信息包括第一随机接入资源的配置信息。该第一随机接入资源的配置信息可以是第一随机接入前导码信息、第一随机接入时域资源信息或第一随机接入频域资源信息的任意组合,对应上述第一随机接入资源。示例性的,第一随机接入时域资源信息例如可以包括第一随机接入时域资源的标识或索引或者第一随机接入时域资源的配置,第一随机接入时域资源的配置例如可以包括帧(frame)、符号(symbol)、时隙(slot)等的配置,其中,第一随机接入时域资源信息对应上述第一随机接入时域资源;第一随机接入频域资源信息例如可以包括第一随机接入频域资源的标识或索引或者第一随机接入频域资源的配置,第一随机接入频域资源的配置例如可以包括带宽、资源块等的配置,其中,第一随机接入频域资源信息对应上述第一随机接入频域资源;第一随机接入前导码信息例如可以包括第一随机接入前导码的标识或者第一随机接入前导码的配置,第一随机接入前导码的配置例如可以包括前导码,其中,第一随机接入前导码信息对应上述第一随机接入前导码,本申请实施例对此不作具体限定。
换言之,该第一随机接入资源可以是上述专用资源的配置信息对应的随机接入资源集合中的随机接入资源。其中,该第一随机接入前导码对应上述步骤S303消息1中携带的前导码,该第一随机接入时域资源对应上述步骤S303发送消息1的随机接入时域资源,该第一随机接入频域资源对应上述步骤S303发送消息1的随机接入频域资源,相关描述可参考上述步骤S303,在此不再赘述。
S305、基站根据第一随机接入资源,获知终端设备请求使用匿名方式建立RRC连接。
可选的,本申请实施中,对于步骤上述步骤S303-S305,一种替代的方案是,终端设备向基站发送随机接入过程中的消息b,消息b中携带用于指示终端设备请求使用匿名方式建立RRC连接的信息,进而基站根据该信息,获知终端设备请求使用匿名方式建立RRC连接,本申请实施例对此不作具体限定。
S306、基站向终端设备发送消息c。
相应的,终端设备接收来自基站的消息c。
其中,该消息c包括基站为该终端设备分配的临时小区无线网络临时标识(temp cell radio network temporary identifier,TC-RNTI)。
其中,该消息c是针对上述消息b的响应消息。可选的,如图3所示,在上述消息b为随机接入过程中的消息1的情况下,该消息c例如可以为随机接入响应(random access response,RAR)消息。
其中,该TC-RNTI在随机接入完成后变成终端设备的小区无线网络临时标识(cell radio network temporary identifier,C-RNTI),后续基站和终端设备基于该C-RNTI进行匿名数据传输。由于该C-RNTI是在基站不知道用户身份的情况下分配给终端设备的,因此后续即使基站与终端设备基于该C-RNTI进行通信,也不存在隐私的问题。
S307、终端设备向基站发送消息d。
相应的,基站接收来自终端设备的消息d。
示例性的,该消息d例如可以是图3中的RRC建立请求(RRC setup request)消息。
在现有技术中,如果终端设备在核心网进行了注册,则核心网会给该终端设备分配一个非接入层的终端标识,可以标识所述终端。比如S-TMSI或者5G S-TMSI等,在RRC建立请求中会携带这个非接入层的终端标识或该终端标识的部分字段或者包含该终端标识的标识信息(例如扩展的标识);如果终端设备未在核心网进行注册,则在RRC建立完成(RRC setup complete)消息中会携带注册的核心网标识。与现有技术不一样,可选的,由于本申请实施例要实现匿名数据传输,因此本申请实施例中,无论核心网设备是否给终端设备分配了终端标识,比如S-TMSI或者5G S-TMSI,该消息d均不会携带该非接入层的终端标识或该终端标识的部分字段或者包含该终端标识的标识信息(例如扩展的标识),而是携带终端设备自己产生或决定的一个值,比如随机值,该随机值用于终端设备进行随机接入的竞争解决。比如,基站获取该随机值之后,可以在消息d的响应消息(图3中未示出,例如可以是竞争冲突解决消息)中返回该随机值。进而终端设备根据基站返回的随机值是否是自己发送的来确定是否自己竞争成功。其中,若基站返回的随机值是自己发送的,即可视为成功,否则视为竞争失败。
可选地,一个终端设备可能多次建立匿名方式的RRC连接来上报匿名数据,为了使得系统能够将将这个终端设备多次上报的匿名数据关联到一个终端设备上,一种可能的实现方式是,终端设备自己产生或决定了一个值(比如随机值)后,后续匿名方式的RRC连接也使用这个值,从而能将一个终端设备多次上报的匿名数据关联在一起。
其中,步骤S307中的消息d可以通过步骤S306中的TC-RNTI进行加扰,相关实现可参考现有的实现方式,在此不再赘述。
S308、基站向终端设备发送消息e。
相应的,终端设备接收来自基站的消息e。
示例性的,该消息e例如可以是图3中的RRC建立(RRC setup)消息。
需要说明的是,本申请实施例中,以终端设备为随机接入竞争成功的终端设备为例进行说明。其中,若终端设备竞争失败,则不会执行后续流程,在此统一说明,以 下不再赘述。
S309、终端设备向基站发送消息f。
相应的,基站接收来自终端设备的消息f。
示例性的,该消息f例如可以是图3中的RRC建立完成消息。
可选的,由于本申请实施例希望实现匿名数据传输,因此本申请实施例中,无论终端设备是否在核心网进行了注册,该消息f均不携带终端设备在核心网注册的信息,比如不携带注册的核心网标识。
或者,可选的,由于本申请实施例希望实现匿名数据传输,因此本申请实施例中,无论终端设备是否在核心网进行了注册,消息f均不携带非接入层(non-access stratum,NAS)协议数据单元(protocol data unit,PDU)信元,或者消息f携带长度为0的NAS PDU信元,其中,该NAS PDU信元是基站和核心网设备进行交互的信令。
由于消息f不携带终端设备在核心网注册的信息,或者消息f不携带NAS PDU信元,或者消息f携带长度为0的NAS PDU信元,因此不仅可以减少信令开销,并且可以更好的隐藏用户信息。
S310、基站确定与终端设备之间建立匿名方式的RRC连接。
一种可能的实现方式中,基站确定与终端设备之间建立匿名方式的RRC连接,包括:基站不执行与核心网设备建立针对终端设备的连接的步骤。
其中,本申请实施例中,基站与核心网设备之间针对终端设备的连接例如可以是新空口(new radio,NR)系统中针对该终端设备的N2连接或下一代(next generation)NG连接(即UE-associated logical NG-connection);或者,基站与核心网设备之间针对终端设备的连接例如可以是LTE系统中针对该终端设备的S1连接等,本申请实施例对此不作具体限定。
其中,与核心网设备建立针对终端设备的连接的步骤例如可以包括基站向核心网设备发送初始终端消息(initial UE message),以使得核心网设备在接收来自基站的初始终端消息之后,进行终端设备的认证或鉴权,进而,核心网设备向基站发送初始化上下文请求(initial context setup request),基站向核心网设备回复初始化上下文响应(initial context setup response)等,具体可参考现有的实现方式,在此不再赘述。
其中,本申请实施例中,基站不执行与核心网设备建立针对终端设备的连接的步骤,可以是指在匿名方式下,基站与终端设备之间完成连接建立,无需引入核心网设备的参与;或者是指,基站跳过与核心网设备建立针对终端设备的连接的步骤;或者是指,基站忽略与核心网设备建立针对终端设备的连接的步骤;或者是指,基站不发起与核心网设备建立针对终端设备的连接的步骤等,本申请实施例对此不作具体限定。
也就是说,本申请实施例中,基站在获知终端设备请求使用匿名方式建立RRC连接之后,不需要与核心网设备建立针对终端设备的连接。
另一种可能的实现方式中,基站确定与终端设备之间建立匿名方式的RRC连接,包括:基站建立针对终端设备的与核心网设备连接,但是终端设备不向核心网设备发送能直接或间接识别该终端设备的身份信息,比如IMSI,SUPI,S-TMSI或5G-TMSI等,本申请实施例对此不作具体限定。
在基站确定与终端设备之间建立匿名方式的RRC连接之后,基站和终端设备之间可以进行空口的匿名传输而无需识别用户身份。下面示例性的提供两种匿名传输方式。
可选的,一种可能的实现方式中,可以通过控制面传输匿名数据。比如,如图3所示,本申请实施例提供的通信方法还可以包括如下步骤S311:
S311、终端设备向基站发送消息g。
相应的,基站接收来自终端设备的消息g。
其中,该消息g携带匿名数据。即,匿名数据通过信令承载进行传输。
其中,该消息g可以为本申请实施例中第二消息的一种可能的形式。
示例性的,该消息g例如可以是图3中的RRC消息。可选的,该RRC消息可以是一个用于传输匿名数据的专用RRC消息。比如,该RRC消息可以为匿名数据传输(anonymous data transfer)消息。
可选的,本申请实施例中的匿名数据可以包括MDT数据或者其他需要匿名传输的数据等,在此统一说明,以下不再赘述。
可选的,本申请实施例中,匿名数据作为RRC消息中的信元,可以是一个对RRC层透明的字节流,也可以是具体的匿名传输的数据结构(比如,MDT数据结构)。
示例性的,字节流的结构示意如下:
Figure PCTCN2019125728-appb-000001
需要说明的是,本申请实施例中,对RRC层透明的字节流,是指从RRC层来看就是一个字节流,RRC层不解码字节流,即RRC层不知道字节流内容的含义,在此统一说明,以下不再赘述。
本申请实施例对具体的匿名传输的数据结构(比如,MDT数据结构)不作具体限定。
可选的,本申请实施例中,基站接收到来自终端设备的消息g之后,从消息g中获取匿名数据,进而可以将匿名数据递交给其他协议层或者操作管理维护(operation administration and maintenance,OAM)系统等。其中,其他协议层例如可以是MDT协议层,本申请实施例对此不作具体限定。
需要说明的是,本申请实施例中的消息g可以是一条或者多条消息,具体取决于匿名数据的大小,在此统一说明,以下不再赘述。
可选的,另一种可能的实现方式中,可以通过用户面传输匿名数据。比如,如图3所示,本申请实施例提供的通信方法还可以包括如下步骤S312-S315:
S312、基站向终端设备发送消息h。
相应的,终端设备接收来自基站的消息h。
其中,该消息h用于指示建立数据承载(data radio bearer,DRB)。
其中,该消息h可以为本申请实施例中第三消息的一种可能的形式。
示例性的,该消息h例如可以是图3中的RRC重配置(RRC reconfiguration)消息。
可选的,本申请实施例中,该消息h用于指示建立DRB例如可以是该消息h中包括用于指示建立DRB的信息,或者该消息h本身具备指示建立DRB的功能,本申请实施例对此不作具体限定。
可选的,本申请实施例中,为了与普通的DRB进行区分,该消息h中还可以包括用于指示该DRB是用于匿名数据传输的信息。可以理解的是,对于匿名数据是MDT数据的场景,用于指示该DRB是用于匿名数据传输的信息具体可以为用于指示该DRB是用于MDT数据传输的信息。
可选的,本申请实施例中,可以引入承载类型信息或者MDT承载类型来指示本次的数据传输是MDT数据的传输,在此统一说明,以下不再赘述。
此外,不同于传统的DRB,该DRB没有服务质量(quality of service,QoS)流标识与该DRB的映射关系等配置,在此统一说明,以下不再赘述。
S313、终端设备根据用于指示建立DRB的信息,建立相应的DRB。
具体的建立DRB的方式可参考现有技术,在此不再赘述。
S314、终端设备向基站发送消息i。
相应的,基站接收来自终端设备的消息i。其中,该消息i用于指示DRB建立完成。
示例性的,该消息i例如可以是图3中的RRC重配置完成(RRC reconfiguration complete)消息。
S315、终端设备在DRB上向基站发送匿名数据。
相应的,基站从DRB上接收来自终端设备的匿名数据。
其中,不同于普通DRB将数据发送给核心网的用户面,比如服务网关。可选的,本申请实施例中,基站从DRB上接收来自终端设备的匿名数据之后,可以将匿名数据递交给其他协议层或者OAM系统等。其他协议层例如可以是MDT协议层,本申请实施例对此不作具体限定。
需要说明的是,本申请实施例中,步骤S314与步骤S315之间没有必然的执行先后顺序,可以是先执行步骤S314,再执行步骤S315;也可以是先执行步骤S315,再执行步骤S314;还可以是同时执行步骤S314和S315,本申请实施例对此不作具体限定。
通过上述步骤S311,或者上述步骤S312-S315,均可以实现匿名数据传输。其中,通过控制面传输匿名数据的方式,由于不需要建立DRB,因此相比于通过用户面传输匿名数据的方式,更加简单;通过用户面传输匿名数据的方式,由于匿名数据不需要进行RRC消息的解码,因此相比于通过控制面传输匿名数据的方式,减少了基站的处理资源开销。
考虑到在传统的数据传输中,终端设备的接入层(例如可以是RRC层)并不知道数据传输是否完成,因此由基站来释放RRC连接。但是对于匿名数据,例如MDT数据,由于匿名数据是接入层产生的,因此接入层知道匿名数据是否传输完成。因此,可选的,本申请实施例中,在数据传输完成后或者传输最后一个匿名数据包时,由终端设备知会基站匿名数据传输完成或者请求基站释放终端设备对应的RRC连接,从而能及时释放终端设备对应的RRC连接,节省终端设备的能耗。例如,可以有以下几种方法:
一种可能的实现方式中,若执行上述步骤S311,则可以在步骤S311中的消息g中携带指示信息3,该指示信息3用于指示匿名数据是否传输完成或者用于指示当前匿名数据包是否为最后一个匿名数据包。从而,基站在接收消息g之后,若根据该指示信息3获知匿名数据传输完成或者获知当前匿名数据包为最后一个匿名数据包,则可以释放终端设备对应的RRC连接。其中,消息g对应的示意结构如下:
Figure PCTCN2019125728-appb-000002
或者,再一种可能的实现方式中,若执行上述步骤S312-S315,则可以在DRB的层2的包头里增加指示信息4,该指示信息4用于指示匿名数据是否传输完成或者用于指示当前匿名数据包是否为最后一个匿名数据包。从而,若基站解析DRB的层2的包头之后,获知匿名数据传输完成或者获知当前匿名数据包为最后一个匿名数据包,则可以释放终端设备对应的RRC连接。
示例性的,这里DRB的层2例如可以是分组数据汇聚层协议(packet data convergence protocol,PDCP)协议层,或者无线链路控制(radio link control,RLC)协议层,或者媒体接入控制(media access control,MAC)协议层。
或者,可选的,又一种可能的实现方式中,若执行上述步骤S311,或若执行上述步骤S312-S315,则本申请实施例提供的通信方法还可以包括如下步骤S316:
S316、终端设备向基站发送消息j。
相应的,基站接收来自终端设备的消息j。
示例性的,该消息j例如可以是图3中的RRC消息。
其中,该消息j可以为本申请实施例中第四消息的一种可能的形式。
以该消息j为RRC消息为例,可选的,该RRC消息可以是一个用于指示数据传输完成或者用于指示当前匿名数据包是否为最后一个匿名数据包的专用消息。比如,该RRC消息可以为匿名数据传输完成(anonymous data transfer complete)消息。这样,基站在接收该RRC消息之后,根据该RRC消息,可以释放终端设备对应的RRC连接。
或者,以该消息j为RRC消息为例,可选的,该RRC消息可以是一个用于指示请求释放该终端设备对应的RRC连接的消息。比如,该RRC消息可以为RRC释放请求消息,也可以是一个用于指示请求释放该终端设备对应的RRC连接的专用消息,本申请实施例对此不作具体限定。这样,基站在接收该RRC消息之后,根据该RRC消息,可以释放终端设备对应的RRC连接。可选的,该场景下,该RRC消息中还可以携带请求释放终端设备对应的RRC连接的原因值,该原因值例如可以是数据传输完成,本申请实施例对此不作具体限定。
基于上述几种可能的实现方式,基站可以在匿名数据传输完成之后,及时释放终端设备对应的RRC连接,节省终端设备的能耗。
可选的,本申请实施例中,若终端设备确定不需要使用匿名方式建立RRC连接,则可以按照现有的方式建立RRC连接以及传输数据,本申请实施例对此不作具体限定。
综上,基于本申请实施例提供的通信方法,可以实现匿名数据传输,从而可以保护数据传输过程中的安全和用户隐私问题。一种可能的实现方式中,该匿名数据例如可以是MDT数据,从而可以减轻MDT数据传输过程中的安全和用户隐私问题。
其中,上述步骤S301至S316中的基站的动作可以由图2所示的接入网设备20中的处理器201调用存储器202中存储的应用程序代码以指令该基站执行,上述步骤S301至S316中的终端设备的动作可以由图2所示的终端设备30中的处理器301调用存储器302中存储的应用程序代码以指令该终端设备执行,本实施例对此不作任何限制。
或者,可选的,以图1所示的接入网设备20与任一终端设备30进行交互,接入网设备20为基站为例,如图4所示,为本申请实施例提供的另一种通信方法,该通信方法包括如下步骤:
S401、可选的,基站向终端设备发送消息k。
相应的,终端设备接收来自基站的消息k。
其中,该消息k可以包括指示信息2,该指示信息2的相关描述可参考上述步骤S301,在此不再赘述。
示例性的,该消息k例如可以是寻呼消息或者图4中的系统广播消息等,本申请实施例对此不作具体限定。
可选的,本申请实施例中,若终端设备的服务小区不支持传输匿名数据或者不支持建立匿名方式的RRC连接,则终端设备可以不传输匿名数据,或者可以按照现有的方式建立RRC连接以及传输匿名数据,本申请实施例对此不作具体限定。
由于移动运营商可以通过接入网设备(例如本申请实施例中的基站)控制在哪些小区传输匿名数据或者建立匿名方式的RRC连接,因此可以降低对系统的影响。比如,移动运营商可以选择在负载低的小区上传输匿名数据,从而减少由于MDT数据传输对于用户业务的影响。
S402、终端设备确定使用匿名方式建立RRC连接。
其中,步骤S402的相关描述可参考图3所示的实施例中的步骤S302,在此不再赘述。
S403、终端设备向基站发送消息m。
相应的,基站接收来自终端设备的消息m。
其中,该消息m包括终端设备使用的前导码。
示例性的,该消息m例如可以是图4中的随机接入过程中的消息1(message1)。
可以理解,该消息1是是随机接入过程的第一条消息,也可以称为前导码消息,在此统一说明,以下不再赘述。
S404、基站向终端设备发送消息n。
相应的,终端设备接收来自基站的消息n。
其中,该消息n包括基站为该终端设备分配的TC-RNTI。
其中,该消息n是针对上述消息m的响应消息。可选的,如图4所示,在上述消 息m为随机接入过程中的消息1的情况下,该消息n例如可以为RAR消息。
其中,该TC-RNTI在随机接入完成后变成终端设备的C-RNTI,后续基站和终端设备基于该C-RNTI进行匿名数据传输。由于该C-RNTI是在基站不知道用户身份的情况下分配给终端设备的,因此后续即使基站与终端设备基于该C-RNTI进行通信,也不存在隐私的问题。
S405、终端设备向基站发送消息p。
相应的,基站接收来自终端设备的消息p。
其中,该消息p可以为图1所示的通信系统部分的第一消息的一种可能的形式。
示例性的,该消息p例如可以是图4中的RRC建立请求消息。
以消息p为RRC建立请求消息为例进行说明,则该RRC建立请求消息可以携带指示信息5,该指示信息5用于指示终端设备请求使用匿名方式建立RRC连接。可选的,一种可能的实现方式是,在RRC建立请求消息中携带一个原因值,比如“匿名传输”,或“MDT传输”等,该原因值用于指明终端设备请求使用匿名方式建立RRC连接。即指示信息5可以是一个原因值。
或者,示例性的,该消息p也可以是用于指示终端设备请求使用匿名方式建立RRC连接的专用消息。比如,该消息p例如可以是匿名RRC建立请求(anonymous RRC setup request)消息。
此外,步骤S405中的其余相关描述可参考图3所示的实施例中的步骤S307,区别比如在于将步骤S307中的消息d替换为步骤S405中的消息p,在此不再赘述。
S406、基站根据消息p,获知终端设备请求使用匿名方式建立RRC连接。
一种可能的实现方式中,若步骤S405中的消息p中携带指示信息5,则基站根据指示信息5,获知终端设备请求使用匿名方式建立RRC连接。
或者,另一种可能的实现方式中,若步骤S405中的消息p是用于指示终端设备请求使用匿名方式建立RRC连接的专用消息,则基站根据该专用消息的消息,可以获知终端设备请求使用匿名方式建立RRC连接。
S407、基站向终端设备发送消息q。
相应的,终端设备接收来自基站的消息q。
示例性的,该消息q例如可以是图4中的RRC建立(RRC setup)消息。
或者,示例性的,若步骤S405中的消息p是用于指示终端设备请求使用匿名方式建立RRC连接的专用消息,如匿名RRC建立请求(anonymous RRC setup request)消息,则步骤S407中的消息q可以为匿名RRC建立(anonymous RRC setup)消息,本申请实施例对此不作具体限定。
需要说明的是,本申请实施例中,以终端设备为随机接入竞争成功的终端设备为例进行说明。其中,若终端设备竞争失败,则不会执行后续流程,在此统一说明,以下不再赘述。
S408、终端设备向基站发送消息r。
相应的,基站接收来自终端设备的消息r。
示例性的,该消息r例如可以是图4中的RRC建立完成消息。
或者,示例性的,若步骤S407中的消息q是匿名RRC建立消息,则步骤S408中 的消息r可以为匿名RRC建立完成(anonymous RRC setup complete)消息,本申请实施例对此不作具体限定。
此外,步骤S408中的其余相关描述可参考图3所示的实施例中的步骤S309,区别比如在于将步骤S309中的消息f替换为步骤S408中的消息r,在此不再赘述。
S409、基站确定与终端设备之间建立匿名方式的RRC连接。
其中,步骤S409中的其余相关描述可参考图3所示的实施例中的步骤S310,在此不再赘述。
在基站确定与终端设备之间建立匿名方式的RRC连接之后,基站和终端设备之间可以进行空口的匿名传输而无需识别用户身份。其中,匿名传输的相关实现(即图4中的步骤S410-S415)可参考图3所示的实施例中的步骤S311-S316,在此不再赘述。
综上,基于本申请实施例提供的通信方法,可以实现匿名数据传输,从而可以保护数据传输过程中的安全和用户隐私问题。一种可能的实现方式中,该匿名数据例如可以是MDT数据,从而可以减轻MDT数据传输过程中的安全和用户隐私问题。
其中,上述步骤S401至S415中的基站的动作可以由图2所示的接入网设备20中的处理器201调用存储器202中存储的应用程序代码以指令该基站执行,上述步骤S401至S415中的终端设备的动作可以由图2所示的终端设备30中的处理器301调用存储器302中存储的应用程序代码以指令该终端设备执行,本实施例对此不作任何限制。
或者,可选的,以图1所示的接入网设备20与任一终端设备30进行交互,接入网设备20为基站为例,如图5所示,为本申请实施例提供的另一种通信方法,该通信方法包括如下步骤:
S501、可选的,基站向终端设备发送消息k。
相应的,终端设备接收来自基站的消息k。
其中,该消息k可以包括指示信息2,该指示信息2的相关描述可参考上述步骤S301,在此不再赘述。
其中,步骤S501中的其余相关描述可参考图4所示的实施例中的步骤S401,在此不再赘述。
S502、终端设备确定使用匿名方式建立RRC连接。
其中,步骤S502的相关描述可参考图4所示的实施例中的步骤S402,在此不再赘述。
S503、终端设备向基站发送消息m。
相应的,基站接收来自终端设备的消息m。
其中,该消息m包括终端设备使用的前导码。
其中,步骤S503的相关描述可参考图4所示的实施例中的步骤S403,在此不再赘述。
S504、基站向终端设备发送消息n。
相应的,终端设备接收来自基站的消息n。
其中,该消息n包括基站为该终端设备分配的TC-RNTI。
其中,步骤S504的相关描述可参考图4所示的实施例中的步骤S404,在此不再 赘述。
S505、终端设备向基站发送消息d。
相应的,基站接收来自终端设备的消息d。
其中,步骤S505的相关描述可参考图3所示的实施例中的步骤S307,在此不再赘述。
S506、基站向终端设备发送消息e。
相应的,终端设备接收来自基站的消息e。
其中,步骤S506的相关描述可参考图3所示的实施例中的步骤S308,在此不再赘述。
S507、终端设备向基站发送消息s。
相应的,基站接收来自终端设备的消息s。
其中,该消息s可以为图1所示的通信系统部分的第一消息的一种可能的形式。
示例性的,该消息s例如可以是图5中的RRC建立完成消息。
可选的,本申请实施例中,消息s可以携带指示信息5,该指示信息5用于指示终端设备请求使用匿名方式建立RRC连接。
此外,步骤S507中的其余相关描述可参考图3所示的实施例中的步骤S309,区别比如在于将步骤S309中的消息f替换为步骤S507中的消息s,在此不再赘述。
S508、基站根据消息s,获知终端设备请求使用匿名方式建立RRC连接。
一种可能的实现方式中,若步骤S507中的消息s中携带指示信息5,则基站根据指示信息5,获知终端设备请求使用匿名方式建立RRC连接。
或者,另一种可能的实现方式中,基站在确定消息s不携带NAS PDU信元或者消息s携带长度为0的NAS PDU信元之后,可以获知终端设备请求使用匿名方式建立RRC连接,本申请实施例对此不作具体限定。
S509、基站确定与终端设备之间建立匿名方式的RRC连接。
其中,步骤S509中的其余相关描述可参考图3所示的实施例中的步骤S310,在此不再赘述。
在基站确定与终端设备之间建立匿名方式的RRC连接之后,基站和终端设备之间可以进行空口的匿名传输而无需识别用户身份。其中,匿名传输的相关实现(即图5中的步骤S510-S515)可参考图3所示的实施例中的步骤S311-S316,在此不再赘述。
综上,基于本申请实施例提供的通信方法,可以实现匿名数据传输,从而可以保护数据传输过程中的安全和用户隐私问题。一种可能的实现方式中,该匿名数据例如可以是MDT数据,从而可以减轻MDT数据传输过程中的安全和用户隐私问题。
其中,上述步骤S501至S515中的基站的动作可以由图2所示的接入网设备20中的处理器201调用存储器202中存储的应用程序代码以指令该基站执行,上述步骤S501至S515中的终端设备的动作可以由图2所示的终端设备30中的处理器301调用存储器302中存储的应用程序代码以指令该终端设备执行,本实施例对此不作任何限制。
需要说明的是,在图3至图5所示的实施例中,上述的指示信息5也可以称之为第一指示信息,上述的指示信息1也可以称之为第二指示信息,上述的指示信息3也 可以称之为第三指示信息,上述的指示信息4也可以称之为第四指示信息,上述的指示信息2也可以称之为第五指示信息,在此统一说明,以下不再赘述。
可以理解的是,以上各个实施例中,由终端设备实现的方法和/或步骤,也可以由可用于终端设备的部件(例如芯片或者电路)实现,由基站实现的方法和/或步骤,也可以由可用于基站的部件实现。
上述主要从各个网元之间交互的角度对本申请实施例提供的方案进行了介绍。相应的,本申请实施例还提供了通信装置,该通信装置用于实现上述各种方法。该通信装置可以为上述方法实施例中的终端设备,或者包含上述终端设备的装置,或者为可用于终端设备的部件;或者,该通信装置可以为上述方法实施例中的接入网设备,或者包含上述接入网设备的装置,或者为可用于接入网设备的部件。可以理解的是,该通信装置为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法实施例中对通信装置进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
比如,以通信装置为上述方法实施例中的接入网设备为例。图6示出了一种接入网设备60的结构示意图。该接入网设备60包括处理模块601和收发模块602。所述收发模块602,也可以称为收发单元用以实现发送和/或接收功能,例如可以是收发电路,收发机,收发器或者通信接口。
其中,收发模块602,用于接收来自终端设备的第一消息,第一消息用于指示终端设备请求使用匿名方式建立RRC连接。处理模块601,用于根据第一消息,获知终端设备请求使用匿名方式建立RRC连接。处理模块601,还用于确定与终端设备之间建立匿名方式的RRC连接。
可选的,处理模块601用于确定与终端设备之间建立匿名方式的RRC连接,包括:用于不执行与核心网设备建立针对终端设备的连接的步骤。其中,处理模块601用于不执行与核心网设备建立针对终端设备的连接的步骤的相关描述可参考上述方法实施例部分,在此不再赘述。
可选的,处理模块601用于确定与终端设备之间建立匿名方式的RRC连接,包括:用于建立针对终端设备的与核心网设备连接,但是终端设备不向核心网设备发送能直接或间接识别该终端设备的身份信息,比如IMSI,SUPI,S-TMSI或者5G S-TMSI等。
一种可能的实现方式中,第一消息携带第一指示信息,第一指示信息用于指示终端设备请求使用匿名方式建立RRC连接。
另一种可能的实现方式中,第一消息是用于指示终端设备请求使用匿名方式建立 RRC连接的专用消息。
再一种可能的实现方式中,第一消息为RRC建立完成消息。相应的,处理模块601,用于根据第一消息,获知终端设备请求使用匿名方式建立RRC连接,包括:用于确定RRC建立完成消息不携带NAS PDU信元或者RRC建立完成消息携带长度为0的NAS PDU信元;获知终端设备请求使用匿名方式建立RRC连接。
再一种可能的实现方式中,收发模块602具体用于:在第一随机接入资源上接收来自终端设备的第一消息,第一随机接入资源是用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源。相应的,处理模块601,用于根据第一消息,获知终端设备请求使用匿名方式建立RRC连接,包括:用于根据第一随机接入资源,获知终端设备请求使用匿名方式建立RRC连接。
可选的,收发模块602,还用于发送第二指示信息,第二指示信息用于指示用于终端设备请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息,该配置信息是随机接入前导码信息、随机接入时域资源信息和随机接入频域资源信息的任意组合,该配置信息包括第一随机接入资源的配置信息。
可选的,收发模块602,还用于接收来自终端设备的第二消息,该第二消息携带匿名数据。示例性的,第二消息可以为RRC消息。
可选的,第二消息还携带第三指示信息,该第三指示信息用于指示数据传输完成或者匿名数据为最后一包匿名数据。相应的,处理模块601,还用于根据第三指示信息,释放终端设备对应的RRC连接。
可选的,收发模块602,还用于向终端设备发送第三消息,第三消息用于指示建立数据承载DRB。收发模块602,还用于从DRB上接收来自终端设备的匿名数据。
可选的,收发模块602,还用于从DRB上接收来自终端设备的第四指示信息,第四指示信息用于指示数据传输完成或者匿名数据为最后一包匿名数据。相应的,处理模块601,还用于根据第四指示信息,释放终端设备对应的RRC连接。
可选的,收发模块602,还用于接收来自终端设备的第四消息,第四消息用于指示数据传输完成或者匿名数据为最后一包匿名数据,或者第四消息用于请求释放终端设备对应的RRC连接。处理模块601,还用于根据第四消息,释放终端设备对应的RRC连接。
可选的,收发模块602,还用于发送第五指示信息,第五指示信息用于指示终端设备的服务小区支持传输匿名数据,或者第五指示信息用于指示终端设备的服务小区支持建立匿名方式的RRC连接。
其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。
在本实施例中,该接入网设备60以采用集成的方式划分各个功能模块的形式来呈现。这里的“模块”可以指特定ASIC,电路,执行一个或多个软件或固件程序的处理器和存储器,集成逻辑电路,和/或其他可以提供上述功能的器件。在一个简单的实施例中,本领域的技术人员可以想到该接入网设备60可以采用图2所示的接入网设备20的形式。
比如,图2所示的接入网设备20中的处理器201可以通过调用存储器202中存储 的计算机执行指令,使得接入网设备20执行上述方法实施例中的数据传输的方法。
具体的,图6中的处理模块601和收发模块602的功能/实现过程可以通过图2所示的接入网设备20中的处理器201调用存储器202中存储的计算机执行指令来实现。或者,图6中的处理模块601的功能/实现过程可以通过图2所示的接入网设备20中的处理器201调用存储器202中存储的计算机执行指令来实现,图6中的收发模块602的功能/实现过程可以通过图2中所示的接入网设备20中的收发器203来实现。
由于本实施例提供的接入网设备60可执行上述的数据传输的方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。
或者,比如,以通信装置为上述方法实施例中的终端设备为例。图7示出了一种终端设备70的结构示意图。该终端设备70包括处理模块701和收发模块702。所述收发模块702,也可以称为收发单元用以实现发送和/或接收功能,例如可以是收发电路,收发机,收发器或者通信接口。
其中,处理模块701,用于确定使用匿名方式建立RRC连接。收发模块702,用于向接入网设备发送第一消息,第一消息用于指示终端设备70请求使用匿名方式建立RRC连接。
一种可能的实现方式中,第一消息携带第一指示信息,第一指示信息用于指示终端设备70请求使用匿名方式建立RRC连接。
另一种可能的实现方式中,第一消息是用于指示终端设备70请求使用匿名方式建立RRC连接的专用消息。
再一种可能的实现方式中,第一消息为RRC建立完成消息,其中,RRC建立完成消息不携带NAS PDU信元或者RRC建立完成消息携带长度为0的NAS PDU信元。
再一种可能的实现方式中,终端设备70向接入网设备发送第一消息,包括:终端设备70在第一随机接入资源上向接入网设备发送第一消息;第一随机接入资源是用于终端设备70请求使用匿名方式建立RRC连接的随机接入的专用资源。
可选的,收发模块702,还用于接收来自接入网设备的第二指示信息,该第二指示信息用于指示用于终端设备70请求使用匿名方式建立RRC连接的随机接入的专用资源的配置信息,该配置信息是随机接入前导码信息、随机接入时域资源信息和随机接入频域资源信息的任意组合,配置信息包括第一随机接入资源的配置信息。
可选的,收发模块702,还用于向接入网设备发送第二消息,该第二消息携带匿名数据。示例性的,该第二消息可以为RRC消息。
可选的,第二消息还携带第三指示信息,第三指示信息用于指示数据传输完成或当前传输的为最后一个匿名数据包。
可选的,收发模块702,还用于接收来自接入网设备的第三消息,第三消息用于指示建立数据承载DRB。处理模块701,还用于根据第三消息建立DRB。收发模块702,还用于在DRB上向接入网设备发送匿名数据。
可选的,收发模块702,还用于在DRB上向接入网设备发送第四指示信息,第四指示信息用于指示数据传输完成或者匿名数据为最后一包匿名数据。
可选的,收发模块702,还用于向接入网设备发送第四消息,第四消息用于指示数据传输完成或者匿名数据为最后一包匿名数据,或者第四消息用于请求释放终端设 备70对应的RRC连接。
可选的,收发模块702,还用于接收来自接入网设备的第五指示信息,第五指示信息用于指示终端设备70的服务小区支持传输匿名数据,或者第五指示信息用于指示终端设备70的服务小区支持建立匿名方式的RRC连接。相应的,处理模块701,用于确定使用匿名方式建立RRC连接,包括:用于根据第五指示信息,确定使用匿名方式建立RRC连接。
其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。
在本实施例中,该终端设备70以采用集成的方式划分各个功能模块的形式来呈现。这里的“模块”可以指特定ASIC,电路,执行一个或多个软件或固件程序的处理器和存储器,集成逻辑电路,和/或其他可以提供上述功能的器件。在一个简单的实施例中,本领域的技术人员可以想到该终端设备70可以采用图2所示的终端设备30的形式。
比如,图2所示的终端设备30中的处理器301可以通过调用存储器302中存储的计算机执行指令,使得终端设备30执行上述方法实施例中的数据传输的方法。
具体的,图7中的处理模块701和收发模块702的功能/实现过程可以通过图2所示的终端设备30中的处理器301调用存储器302中存储的计算机执行指令来实现。或者,图7中的处理模块701的功能/实现过程可以通过图2所示的终端设备30中的处理器301调用存储器302中存储的计算机执行指令来实现,图7中的收发模块702的功能/实现过程可以通过图2中所示的终端设备30中的收发器303来实现。
由于本实施例提供的终端设备70可执行上述的数据传输的方法,因此其所能获得的技术效果可参考上述方法实施例,在此不再赘述。
可选的,本申请实施例还提供了一种通信装置(例如,该通信装置可以是芯片或芯片系统),该通信装置包括处理器,用于实现上述任一方法实施例中的方法。在一种可能的设计中,该通信装置还包括存储器。该存储器,用于保存必要的程序指令和数据,处理器可以调用存储器中存储的程序代码以指令该通信装置执行上述任一方法实施例中的方法。当然,存储器也可以不在该通信装置中。该通信装置是芯片系统时,可以由芯片构成,也可以包含芯片和其他分立器件,本申请实施例对此不作具体限定。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件程序实现时,可以全部或部分地以计算机程序产品的形式来实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或者数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可以用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带),光介质(例如,DVD)、或者半导体 介质(例如固态硬盘(solid state disk,SSD))等。本申请实施例中,计算机可以包括前面所述的装置。
尽管在此结合各实施例对本申请进行了描述,然而,在实施所要求保护的本申请过程中,本领域技术人员通过查看所述附图、公开内容、以及所附权利要求书,可理解并实现所述公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。
尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。

Claims (30)

  1. 一种通信方法,其特征在于,所述方法包括:
    接收来自终端设备的第一消息,所述第一消息用于指示所述终端设备请求使用匿名方式建立无线资源控制RRC连接;
    根据所述第一消息,获知所述终端设备请求使用匿名方式建立所述RRC连接;
    确定与所述终端设备之间建立匿名方式的RRC连接。
  2. 根据权利要求1所述的方法,所述确定与所述终端设备之间建立匿名方式的RRC连接,包括:
    不执行与核心网设备建立针对所述终端设备的连接的步骤。
  3. 根据权利要求1或2所述的方法,其特征在于,所述第一消息携带第一指示信息,所述第一指示信息用于指示所述终端设备请求使用匿名方式建立所述RRC连接。
  4. 根据权利要求3所述的方法,其特征在于,所述第一消息为RRC建立请求消息或者RRC建立完成消息。
  5. 根据权利要求1或2所述的方法,其特征在于,所述第一消息是用于指示所述终端设备请求使用匿名方式建立所述RRC连接的专用消息。
  6. 根据权利要求1或2所述的方法,其特征在于,所述第一消息为RRC建立完成消息;
    所述根据所述第一消息,获知所述终端设备请求使用匿名方式建立所述RRC连接,包括:
    确定所述RRC建立完成消息不携带NAS PDU信元或者所述RRC建立完成消息携带长度为0的NAS PDU信元;
    获知所述终端设备请求使用匿名方式建立所述RRC连接。
  7. 根据权利要求1或2所述的方法,其特征在于,所述接收来自所述终端设备的第一消息,包括:在第一随机接入资源上接收来自所述终端设备的所述第一消息,所述第一随机接入资源是用于所述终端设备请求使用匿名方式建立所述RRC连接的随机接入的专用资源;
    根据所述第一消息,获知所述终端设备请求使用匿名方式建立所述RRC连接,包括:根据所述第一随机接入资源,获知所述终端设备请求使用匿名方式建立所述RRC连接。
  8. 根据权利要求7所述的方法,其特征在于,在所述接收来自所述终端设备的所述第一消息之前,所述方法还包括:
    发送第二指示信息,所述第二指示信息用于指示用于终端设备请求使用匿名方式建立所述RRC连接的随机接入的专用资源的配置信息,所述配置信息是随机接入前导码信息、随机接入时域资源信息和随机接入频域资源信息的任意组合,所述配置信息包括所述第一随机接入资源的配置信息。
  9. 根据权利要求1-8任一项所述的方法,其特征在于,在所述获知所述终端设备请求使用匿名方式建立所述RRC连接之后,所述方法还包括:
    接收来自所述终端设备的第二消息,所述第二消息携带匿名数据。
  10. 根据权利要求9所述的方法,其特征在于,所述第二消息还携带第三指示信 息,所述第三指示信息用于指示数据传输完成或者所述匿名数据为最后一包匿名数据;所述方法还包括:
    根据所述第三指示信息,释放所述终端设备对应的所述RRC连接。
  11. 根据权利要求1-8任一项所述的方法,其特征在于,在所述获知所述终端设备请求使用匿名方式建立所述RRC连接之后,所述方法还包括:
    向所述终端设备发送第三消息,所述第三消息用于指示建立数据承载DRB;
    从所述DRB上接收来自所述终端设备的匿名数据。
  12. 根据权利要求11所述的方法,其特征在于,所述方法还包括:
    从所述DRB上接收来自所述终端设备的第四指示信息,所述第四指示信息用于指示数据传输完成或者所述匿名数据为最后一包匿名数据;
    根据所述第四指示信息,释放所述终端设备对应的RRC连接。
  13. 根据权利要求9-12任一项所述的方法,其特征在于,所述匿名数据包括最小化路测MDT数据。
  14. 一种通信方法,其特征在于,所述方法包括:
    确定使用匿名方式建立无线资源控制RRC连接;
    向接入网设备发送第一消息,所述第一消息用于指示终端设备请求使用匿名方式建立所述RRC连接。
  15. 根据权利要求14所述的方法,其特征在于,所述第一消息携带第一指示信息;所述第一指示信息用于指示所述终端设备请求使用匿名方式建立所述RRC连接。
  16. 根据权利要求15所述的方法,其特征在于,所述第一消息为RRC建立请求消息或者RRC建立完成消息。
  17. 根据权利要求14所述的方法,其特征在于,所述第一消息是用于指示所述终端设备请求使用匿名方式建立所述RRC连接的专用消息。
  18. 根据权利要求14所述的方法,其特征在于,所述第一消息为RRC建立完成消息,其中,所述RRC建立完成消息不携带NAS PDU信元或者所述RRC建立完成消息携带长度为0的NAS PDU信元。
  19. 根据权利要求14所述的方法,其特征在于,所述向接入网设备发送第一消息,包括:在第一随机接入资源上向所述接入网设备发送所述第一消息;所述第一随机接入资源是用于所述终端设备请求使用匿名方式建立所述RRC连接的随机接入的专用资源。
  20. 根据权利要求19所述的方法,其特征在于,在所述向接入网设备发送第一消息之前,所述方法还包括:
    接收来自所述接入网设备的第二指示信息,所述第二指示信息用于指示用于终端设备请求使用匿名方式建立所述RRC连接的随机接入的专用资源的配置信息,所述配置信息是随机接入前导码信息、随机接入时域资源信息和随机接入频域资源信息的任意组合,所述配置信息包括所述第一随机接入资源的配置信息。
  21. 根据权利要求14-20任一项所述的方法,其特征在于,在所述向接入网设备发送第一消息之后,所述方法还包括:
    向所述接入网设备发送第二消息,所述第二消息携带匿名数据。
  22. 根据权利要求21所述的方法,其特征在于,所述第二消息还携带第三指示信息,所述第三指示信息用于指示数据传输完成或当前传输的为最后一个匿名数据包。
  23. 根据权利要求14-20任一项所述的方法,其特征在于,在所述向接入网设备发送第一消息之后,所述方法还包括:
    接收来自所述接入网设备的第三消息,所述第三消息用于指示建立数据承载DRB;
    根据所述第三消息,建立所述DRB;
    在所述DRB上向所述接入网设备发送匿名数据。
  24. 根据权利要求23所述的方法,其特征在于,所述方法还包括:
    在所述DRB上向所述接入网设备发送第四指示信息,所述第四指示信息用于指示数据传输完成或者所述匿名数据为最后一包匿名数据。
  25. 根据权利要求21-24任一项所述的方法,其特征在于,所述匿名数据包括最小化路测MDT数据。
  26. 一种通信装置,其特征在于,所述通信装置包括:处理模块和收发模块;
    所述收发模块,用于接收来自终端设备的第一消息,所述第一消息用于指示所述终端设备请求使用匿名方式建立无线资源控制RRC连接;
    所述处理模块,用于根据所述第一消息,获知所述终端设备请求使用匿名方式建立所述RRC连接;
    所述处理模块,还用于确定与所述终端设备之间建立匿名方式的RRC连接。
  27. 根据权利要求26所述通信装置,其特征在于,所述通信装置用于实现权利要求1至13任一项所述的方法。
  28. 一种通信装置,其特征在于,所述通信装置包括:处理模块和收发模块;
    所述处理模块,用于确定使用匿名方式建立无线资源控制RRC连接;
    所收发模块,用于向接入网设备发送第一消息,所述第一消息用于指示终端设备请求使用匿名方式建立所述RRC连接。
  29. 根据权利要求28所述通信装置,其特征在于,所述通信装置用于实现权利要求14至25任一项所述的方法。
  30. 一种计算机可读存储介质,其特征在于,包括指令,当其在计算机上运行时,使得所述计算机执行如权利要求1-13中任意一项所述的方法,或者,使得所述计算机执行如权利要求14-25中任意一项所述的方法。
PCT/CN2019/125728 2018-12-20 2019-12-16 通信方法、装置及系统 WO2020125592A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2021535785A JP7381586B2 (ja) 2018-12-20 2019-12-16 通信方法、装置、およびシステム
EP19898306.6A EP3886473A4 (en) 2018-12-20 2019-12-16 COMMUNICATION METHOD AND APPARATUS AND SYSTEM
US17/351,324 US20210315044A1 (en) 2018-12-20 2021-06-18 Communication method, apparatus, and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811562867.0 2018-12-20
CN201811562867.0A CN111356131B (zh) 2018-12-20 2018-12-20 通信方法、装置及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/351,324 Continuation US20210315044A1 (en) 2018-12-20 2021-06-18 Communication method, apparatus, and system

Publications (1)

Publication Number Publication Date
WO2020125592A1 true WO2020125592A1 (zh) 2020-06-25

Family

ID=71100399

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/125728 WO2020125592A1 (zh) 2018-12-20 2019-12-16 通信方法、装置及系统

Country Status (5)

Country Link
US (1) US20210315044A1 (zh)
EP (1) EP3886473A4 (zh)
JP (1) JP7381586B2 (zh)
CN (1) CN111356131B (zh)
WO (1) WO2020125592A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101053221A (zh) * 2004-09-27 2007-10-10 松下电器产业株式会社 无线通信系统中用于服务质量控制的无线电链路控制层中的差错率测量
US20080056198A1 (en) * 2004-09-27 2008-03-06 Matsushita Electric Industrial Co., Ltd. Anonymous Uplink Measurement Report in a Wireless Communication System
CN107124741A (zh) * 2016-02-24 2017-09-01 大唐移动通信设备有限公司 一种rrc连接重建立的方法及装置

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101086072B1 (ko) * 2004-09-18 2011-11-22 삼성전자주식회사 Agps 정보를 이용한 단말 위치 결정 방법
CN102421136B (zh) * 2010-09-27 2014-05-07 电信科学技术研究院 一种测量结果的指示及上报方法、设备
CN103037349B (zh) * 2011-09-30 2017-07-28 北京三星通信技术研究有限公司 一种实现mdt连续性的方法
CN103200603B (zh) * 2012-01-06 2018-07-10 北京三星通信技术研究有限公司 在多个plmn下进行mdt连续测量和汇报的方法
EP2804416B1 (en) * 2012-01-09 2021-07-07 Samsung Electronics Co., Ltd. Method and apparatus for logging
CN103491643B (zh) * 2012-06-12 2018-03-27 电信科学技术研究院 组通信连接的建立方法和设备
WO2014023817A1 (en) 2012-08-10 2014-02-13 Nokia Siemens Networks Oy Radio resource control (rrc) connection establishment failure (rcef) events reporting in logged minimization of drive tests (mdt)
US9247014B1 (en) * 2013-03-13 2016-01-26 Intellectual Ventures Fund 79 Llc Methods, devices, and mediums associated with recommending user applications
CN103747522B (zh) * 2013-12-31 2019-03-08 上海华为技术有限公司 一种位置信息采集方法和设备
KR101807982B1 (ko) * 2014-01-30 2017-12-11 인텔 아이피 코포레이션 무선 링크 제어 구성을 이용하여 커버리지를 향상시키는 mtc ue 및 방법
KR102257996B1 (ko) * 2014-06-23 2021-05-28 삼성전자주식회사 무선 통신 시스템에서 기계형태통신을 지원하는 방법 및 장치
WO2016021817A1 (ko) * 2014-08-04 2016-02-11 엘지전자 주식회사 무선 통신 시스템에서 단말을 인증 하는 방법 및 이를 위한 장치
WO2016021922A1 (ko) * 2014-08-04 2016-02-11 엘지전자 주식회사 무선 통신 시스템에서 단말의 동작 방법 및 상기 방법을 이용하는 단말
WO2017018553A1 (ko) * 2015-07-27 2017-02-02 엘지전자 주식회사 무선 통신 시스템에서 단말이 다중 링크를 설정하는 방법 및 이를 위한 장치
EP3364680B1 (en) * 2015-11-06 2021-08-25 Huawei Technologies Co., Ltd. Method, apparatus and system for information transmission
WO2017076458A1 (en) * 2015-11-06 2017-05-11 Sony Mobile Communications Inc. User equipment, communication system, and method of controlling a user equipment
JP6741024B2 (ja) * 2015-12-28 2020-08-19 日本電気株式会社 無線端末、無線局、及びこれらの方法
US10609608B2 (en) * 2016-03-23 2020-03-31 Lg Electronics Inc. Method for changing connection mode in base station, and base station therefor, and method for changing connection mode in user equipment, and user equipment thereof
US11343767B2 (en) * 2017-09-29 2022-05-24 Telefonaktiebolaget Lm Ericsson (Publ) Systems and methods providing an idle early data transmission solution accommodating power-saving mode

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101053221A (zh) * 2004-09-27 2007-10-10 松下电器产业株式会社 无线通信系统中用于服务质量控制的无线电链路控制层中的差错率测量
US20080056198A1 (en) * 2004-09-27 2008-03-06 Matsushita Electric Industrial Co., Ltd. Anonymous Uplink Measurement Report in a Wireless Communication System
CN107124741A (zh) * 2016-02-24 2017-09-01 大唐移动通信设备有限公司 一种rrc连接重建立的方法及装置

Also Published As

Publication number Publication date
EP3886473A4 (en) 2022-01-19
JP7381586B2 (ja) 2023-11-15
CN111356131A (zh) 2020-06-30
US20210315044A1 (en) 2021-10-07
CN111356131B (zh) 2022-04-29
JP2022515402A (ja) 2022-02-18
EP3886473A1 (en) 2021-09-29

Similar Documents

Publication Publication Date Title
US11909652B2 (en) Method, device and storage medium for quality of service (QoS) flow management of time sensitive data for transmission of ethernet packet filter sets
WO2020135850A1 (zh) 通信方法和装置
US20230217240A1 (en) Apparatus and method of determining an operation mode on a wireless network
KR20150002521A (ko) 디바이스-투-디바이스 통신 방법 및 장치
JP2019530284A (ja) V2xメッセージ送信方法、装置、およびシステム
US20170127471A1 (en) Resource release for proximity-based communications
JP2022520960A (ja) マッピング方法、ノード、通信装置、及び記憶媒体
US9681473B2 (en) MTC service management using NFV
US11689958B2 (en) Communication method, device, and system
WO2020088601A1 (zh) 控制终端与网络连接的方法及装置
WO2021134701A1 (zh) D2d通信方法、装置及系统
US11979879B2 (en) Information transmission method, communications device, and network device
WO2021056703A1 (zh) 信息更新方法、设备及系统
US20220053558A1 (en) Random access method and apparatus
WO2020259206A1 (zh) 参数传输方法、装置及系统
WO2020125592A1 (zh) 通信方法、装置及系统
WO2021134561A1 (zh) 通信方法和通信装置
WO2021042381A1 (zh) 一种通信方法、装置及系统
WO2021032095A1 (zh) 数据传输的方法及设备
WO2024082880A1 (zh) 一种通信方法及装置
US20240056926A1 (en) Communication method and apparatus for obtaining load information
WO2024066982A1 (zh) 一种通信方法及装置
US20220039018A1 (en) Terminal device management method and apparatus
WO2024011468A1 (zh) 链路确定方法、装置、存储介质及芯片
EP4351247A1 (en) Resource selection method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19898306

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2021535785

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2019898306

Country of ref document: EP

Effective date: 20210623