WO2021056464A1 - Data safety processing method and communication apparatus - Google Patents

Data safety processing method and communication apparatus Download PDF

Info

Publication number
WO2021056464A1
WO2021056464A1 PCT/CN2019/108709 CN2019108709W WO2021056464A1 WO 2021056464 A1 WO2021056464 A1 WO 2021056464A1 CN 2019108709 W CN2019108709 W CN 2019108709W WO 2021056464 A1 WO2021056464 A1 WO 2021056464A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
transmission mode
unicast
parameter
security
Prior art date
Application number
PCT/CN2019/108709
Other languages
French (fr)
Chinese (zh)
Inventor
许斌
李秉肇
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2019/108709 priority Critical patent/WO2021056464A1/en
Priority to CN201980100287.6A priority patent/CN114365522A/en
Publication of WO2021056464A1 publication Critical patent/WO2021056464A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services

Definitions

  • This application relates to the field of communications, and more specifically, to a method and communication device for data security processing.
  • the protocol stack may include radio resource control (RRC) layer, packet data convergence protocol (PDCP) layer, radio link control (RLC) layer, media access control (media Access control, MAC) layer and physical layer (physics, PHY) and other protocol layers.
  • RRC radio resource control
  • PDCP packet data convergence protocol
  • RLC radio link control
  • media access control media Access control
  • MAC media Access control
  • physics, PHY physical layer
  • Each layer has corresponding functional entities to perform corresponding functions, for example, the PDCP layer corresponds to the PDCP entity, and the RLC layer corresponds to the RLC entity.
  • Multicast transmission technology refers to a technology in which a network device sends data and multiple terminal devices simultaneously receive the data, that is, point-to-multipoint transmission.
  • Unicast transmission technology (or called unicast transmission mode) refers to a technology in which a network device sends data and only one terminal device receives the data, that is, point-to-point transmission.
  • This application provides a method and communication device for data security processing.
  • the transmission mode corresponding to one RLC entity is a unicast transmission mode or a multicast transmission mode, and the multiple RLC entities include the RLC entity corresponding to the unicast transmission mode and the RLC entity in the multicast transmission mode.
  • unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission.
  • corresponding security processing is performed on the data according to different transmission modes. On the one hand, the security of data transmission is improved.
  • the respective security requirements of data under different transmission modes can be met, and the flexibility of security processing can be improved.
  • a method for data security processing is provided.
  • the execution subject of the method can be either the first device or the second device, or a chip applied in the first device or the second device.
  • the first device may be a network device
  • the second device may be a terminal device.
  • one PDCP entity is associated with one or more RLC entities.
  • the transmission mode of one RLC entity is a unicast transmission mode or a multicast transmission mode
  • the multiple RLC entities include the RLC entity corresponding to the unicast transmission mode and the RLC entity in the multicast transmission mode.
  • the method includes: determining a first transmission mode of first data, the first transmission mode being at least one of a unicast transmission mode, a multicast transmission mode, or a unicast and a multicast transmission mode, the unicast and multicast transmission
  • the mode is a transmission mode using unicast and multicast transmission; according to the first transmission mode, a safe processing mode for the first data is determined.
  • one or more RLC entities are associated with one PDCP configuration.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode.
  • unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission.
  • the corresponding security processing of the data is carried out. On the one hand, the security of data transmission is improved. On the other hand, different security processing procedures within the same bearer can be realized, meeting the security requirements of data in different transmission modes, and improving communication efficiency.
  • the secure processing mode of the first data is the first secure processing
  • the secure processing mode of the first data is the second secure processing
  • the secure processing method of the first data is the first secure processing
  • the secure processing method of the second data is the second secure processing
  • the second data is copied This first data is obtained.
  • the first security processing includes using the first parameter and/or the first algorithm to encrypt and/or integrity protect the data.
  • the second security process is no security process.
  • the first security processing includes using a third parameter and/or a third algorithm to encrypt data and/or integrity protection.
  • the second security process is no security process.
  • the first security processing is no security processing.
  • the second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protect the data.
  • the first security processing is no security processing.
  • the second security processing includes using a fourth parameter and/or a fourth algorithm to encrypt data and/or integrity protection.
  • the first security processing includes using a first parameter and/or a first algorithm to encrypt and/or integrity protection data, or the first security processing includes using a third The parameters and/or the third algorithm perform decryption and/or integrity verification on the data.
  • the second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protection of the data, or the second security processing includes using the fourth parameter and/or the fourth algorithm to decrypt the data and / Or integrity verification.
  • the first parameter and the second parameter are the same or different, the first algorithm and the second algorithm are the same or different, or.
  • the third parameter and the fourth parameter are the same or different, and the third algorithm and the fourth algorithm are the same or different.
  • the first parameter includes a first secret key, and/or the second parameter includes a second secret key; or, the third parameter includes a third secret key, and/ Or, the fourth parameter includes a fourth secret key.
  • the first security processing may be to use the first parameter and/or the first algorithm to encrypt data, or the first security processing may be to use the first parameter and/or the first algorithm.
  • the algorithm performs integrity protection on the data, or, the first security processing may include using the first algorithm to encrypt the data and using the first parameter to perform integrity protection on the data.
  • the second security processing may be using the second parameter and/or the second algorithm to encrypt data, or the second security processing may be using the second parameter and/or the second algorithm.
  • the algorithm performs integrity protection on the data, or the second security processing may be to use the second algorithm to encrypt the data and use the second parameter to perform integrity protection on the data.
  • the third security processing may be to use the third parameter and/or the third algorithm to decrypt the data, or the first security processing may be to use the third parameter and/or the third algorithm to decrypt the data.
  • the algorithm verifies the integrity of the data, or the third security process may be to decrypt the data using the third algorithm and use the third parameter to verify the integrity of the data.
  • the fourth security processing may be using the fourth parameter and/or the fourth algorithm to decrypt data, or the fourth security processing may be using the fourth parameter and/or the fourth algorithm.
  • the algorithm verifies the integrity of the data, or the fourth security process may be to decrypt the data using the fourth algorithm and use the fourth parameter to verify the integrity of the data.
  • not performing security processing can be understood as not performing decryption and/or integrity verification on the data, but using other methods to process the data.
  • not performing security processing can mean not performing any security processing on the data.
  • a method for data security processing can be either a first device or a chip applied to the first device.
  • the first device may be a network device, and in the protocol stack of the first device, one PDCP entity is associated with one or more RLC entities.
  • the transmission mode of one RLC entity is a unicast transmission mode or a multicast transmission mode, and the multiple RLC entities include the RLC entity corresponding to the unicast transmission mode and the RLC entity in the multicast transmission mode.
  • the method includes: performing a first security process on the first data; performing a second security process on the second data, the second data being obtained by copying the first data; and sending through the first data according to the first transmission mode of the data.
  • the first data after a security process, and/or the second data after the second security process is sent is sent, the first transmission mode is a unicast transmission mode, a multicast transmission mode, or unicast and multicast At least one of the transmission modes, and the unicast and multicast transmission modes are transmission modes that use unicast and multicast for transmission.
  • one or more RLC entities are associated with one PDCP configuration.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode.
  • the first data after the first security processing is sent, and/or the second data after the second security processing is sent Data, including:
  • the first transmission mode is a unicast transmission mode, sending the first data after the first security processing
  • the first transmission mode is a multicast transmission mode, sending the second data after the second security processing
  • the first data transmission mode is a unicast or a multicast transmission mode
  • the first data after the first security processing and the second data after the second security processing are sent.
  • the first security processing includes using the first parameter and/or the first algorithm to encrypt data and/or integrity protection; the second security processing is not performing security processing.
  • the first security processing is not performing security processing; the second security processing includes using a second parameter and/or a second algorithm to encrypt and/or integrity protect data.
  • the first security processing includes using a first parameter and/or a first algorithm to encrypt and/or integrity protection;
  • the second security processing includes using a second parameter and /Or the second algorithm performs encryption and/or integrity protection on the data;
  • the first parameter and the second parameter are the same or different, and the first algorithm and the second algorithm are the same or different.
  • the first parameter includes a first secret key
  • the second parameter includes a second secret key
  • a method for data security processing can be either a first device or a chip applied to the first device.
  • the first device may be a network device, and one PDCP entity in the protocol stack of the first device is associated with one or more RLC entities.
  • the transmission mode of one RLC entity is a unicast transmission mode or a multicast transmission mode, and the multiple RLC entities include the RLC entity corresponding to the unicast transmission mode and the RLC entity in the multicast transmission mode.
  • the method includes: performing first security processing on first data; determining a first transmission mode of the first data after the first security processing, where the first transmission mode is a unicast transmission mode, a multicast transmission mode, or At least one of unicast and multicast transmission methods, the unicast and multicast transmission methods are transmission methods that use unicast and multicast; when the first transmission method is unicast transmission, use the unicast transmission
  • the first data after the first security processing is sent in a method; when the first transmission method is a multicast transmission method, the first data after the first security processing is sent using the multicast transmission method; when the first transmission method is One transmission mode is unicast and multicast transmission.
  • the unicast transmission mode is used to send the first data after the first security processing, and the multicast transmission mode is used to send the third data.
  • the third data is copied Obtained from the first data after the first security processing.
  • the method for data security processing provided by the third aspect associates one or more RLC entities by configuring a PDCP.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode.
  • unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission.
  • the security processing methods corresponding to the unicast transmission mode and the multicast transmission mode are the same.
  • the first device first processes the data securely, and then sends the securely processed data according to the unused transmission mode of the data. Improve the security of data transmission. It can realize the data security processing process in the same bearer, meet the security requirements of data under different transmission modes, and improve communication efficiency.
  • the first security processing includes using the first parameter and/or the first algorithm to encrypt data and/or integrity protection; or, the first security processing is not performing security deal with.
  • the first parameter includes a first secret key.
  • the leaflet broadcast transmission mode, the multicast transmission mode, the unicast and the multicast transmission modes are all for the same radio bearer, and can be understood as a radio
  • the bearer supports different transmission methods, or the data in a bearer can be transmitted using different transmission methods.
  • This radio bearer can be an existing radio bearer or a new type of radio bearer.
  • a communication device may be a network device or a terminal device.
  • One PDCP in the protocol stack of the communication device is associated with one or more RLC entities.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the communication device includes:
  • the processing unit is configured to determine a first transmission mode of the first data, where the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast and a multicast transmission mode, the unicast and multicast transmissions
  • the transmission method is a transmission method that uses unicast and multicast.
  • the processing unit is further configured to determine a safe processing method for the first data according to the first transmission method.
  • the communication device provided in the fourth aspect associates one or more RLC entities by configuring one PDCP.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode.
  • unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission. And, according to the unused transmission method, the data is processed safely.
  • the security of data transmission is improved.
  • different security processing procedures within the same bearer can be realized, meeting the security requirements of data in different transmission modes, and improving communication efficiency.
  • the processing unit determines that the secure processing mode of the first data is the first secure processing
  • the processing unit determines that the secure processing mode of the first data is the second secure processing; or,
  • the processing unit determines that the security processing mode of the first data is the first security processing, and the security processing mode of the second data is the second security processing, and the second security processing mode is the second security processing mode.
  • the data is obtained by copying the first data.
  • the first security processing includes using the first parameter and/or the first algorithm to encrypt and/or integrity protect the data.
  • the second security process is no security process.
  • the first security processing includes using a third parameter and/or a third algorithm to encrypt data and/or integrity protection.
  • the second security process is no security process.
  • the first security processing is no security processing.
  • the second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protect the data.
  • the first security processing is no security processing.
  • the second security processing includes using a fourth parameter and/or a fourth algorithm to encrypt data and/or integrity protection.
  • the first security processing includes using a first parameter and/or a first algorithm to encrypt and/or integrity protection data, or the first security processing includes using a third Parameter and/or third algorithm to decrypt and/or integrity verification of data;
  • the second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protection of the data, or the second security processing includes using the fourth parameter and/or the fourth algorithm to decrypt the data and / Or integrity verification.
  • the first parameter and the second parameter are the same or different, the first algorithm and the second algorithm are the same or different, or the third parameter and the fourth parameter are the same or different, the third algorithm and the fourth algorithm Same or different.
  • the first parameter includes a first secret key
  • the second parameter includes a second secret key
  • the third parameter includes a third secret key
  • the fourth parameter includes a fourth secret key
  • a communication device may be a network device.
  • One PDCP in the protocol stack of the communication device is associated with one or more RLC entities.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the communication device includes:
  • the processing unit is configured to perform first security processing on the first data.
  • the processing unit is further configured to perform second security processing on the second data, the second data being obtained by copying the first data.
  • the transceiver unit is configured to send the first data after the first security processing and/or send the second data after the second security processing according to the first transmission mode of the data, the first transmission mode It is at least one of a unicast transmission method, a multicast transmission method, or a unicast and a multicast transmission method, and the unicast and multicast transmission methods are transmission methods that use unicast and multicast for transmission.
  • the communication device provided in the fifth aspect associates one or more RLC entities by configuring one PDCP.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode.
  • the transceiver unit is also used for;
  • the first transmission mode is a unicast transmission mode, sending the first data after the first security processing
  • the first transmission mode is a multicast transmission mode, sending the second data after the second security processing
  • the first data transmission mode is a unicast or a multicast transmission mode
  • the first data after the first security processing and the second data after the second security processing are sent.
  • the first security processing includes using the first parameter and/or the first algorithm to encrypt and/or integrity protect the data.
  • the second security process is no security process.
  • the first security processing is no security processing.
  • the second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protect the data.
  • the first security processing includes using the first parameter and/or the first algorithm to encrypt and/or integrity protect the data.
  • the second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protect the data.
  • the first parameter and the second parameter are the same or different, and the first algorithm and the second algorithm are the same or different.
  • the first parameter includes a first secret key
  • the second parameter includes a second secret key
  • a communication device may be a network device, and one PDCP in the protocol stack of the communication device is associated with one or more RLC entities.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the communication device includes:
  • the processing unit is configured to perform first security processing on the first data.
  • the processing unit is further configured to determine a first transmission mode of the first data after the first security processing, where the first transmission mode is a unicast transmission mode, a multicast transmission mode, or a unicast and multicast transmission mode At least one of the unicast and multicast transmission modes is a transmission mode using unicast and multicast for transmission.
  • the transceiver unit is configured to use the unicast transmission mode to send the first data after the first security processing when the first transmission mode is a unicast transmission mode.
  • the transceiver unit is further configured to use the multicast transmission mode to send the first data after the first security processing when the first transmission mode is a multicast transmission mode.
  • the transceiver unit is further configured to use the unicast transmission mode to send the first data after the first security processing, and use the multicast transmission mode to send the first data.
  • Three data, the third data is obtained by copying the first data after the first security processing.
  • a sixth aspect provides a communication device, which associates one or more RLC entities by configuring a PDCP.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the multiple RLC entities include the RLC entity corresponding to the unicast transmission mode and the RLC entity corresponding to the multicast transmission mode.
  • unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission.
  • the security processing methods corresponding to the unicast transmission mode and the multicast transmission mode are the same.
  • the first device first processes the data securely, and then sends the securely processed data according to the unused transmission mode of the data. Improve the security of data transmission. It can realize the data security processing process in the same bearer, meet the security requirements of data under different transmission modes, and improve communication efficiency.
  • the first security processing includes encrypting and/or integrity protection using the first parameter and/or the first algorithm; or, the first security processing is not performing security deal with.
  • the first parameter includes a first secret key.
  • a communication device in a seventh aspect, includes at least one processor and a memory, and the at least one processor is configured to execute the above first aspect or the method in any possible implementation manner of the first aspect.
  • a communication device in an eighth aspect, includes at least one processor and a memory, and the at least one processor is configured to execute the above first aspect to the third aspect, or any possible one of the first aspect to the third aspect The method in the implementation mode.
  • a communication device which includes at least one processor and an interface circuit, and the at least one processor is configured to execute the above first aspect or the method in any possible implementation of the first aspect.
  • a communication device in a tenth aspect, includes at least one processor and an interface circuit.
  • the at least one processor is configured to execute the first aspect to the third aspect, or any of the first aspect to the third aspect. The method in the implementation.
  • a terminal device in an eleventh aspect, includes the communication device provided in the foregoing fourth aspect, or the terminal device includes the communication device provided in the foregoing seventh aspect, or the terminal device includes the foregoing ninth aspect The provided communication device.
  • a network device in a twelfth aspect, includes the communication device provided in the fourth aspect to the sixth aspect, or the network device includes the communication device provided in the eighth aspect, or the network device includes The communication device provided by the above tenth aspect.
  • a computer program product includes a computer program.
  • the computer program product includes a computer program.
  • the computer program is executed by a processor, it is used to execute the method in any possible implementation manner of the first aspect to the third aspect , Or execute the method in any possible implementation manner of the first aspect to the third aspect.
  • a computer-readable storage medium stores a computer program.
  • the computer program When the computer program is executed, it is used to execute the first aspect to the third aspect, or the first to the third aspect.
  • the method in any possible implementation of the third aspect.
  • a communication system in a fifteenth aspect, includes the aforementioned terminal device and network device.
  • a chip in a sixteenth aspect, includes a processor for calling and running a computer program from a memory, so that a communication device installed with the chip executes the first aspect to the third aspect, or the first aspect To the method in any possible implementation manner of the third aspect, or execute the second aspect or the method in any possible implementation manner of the second aspect.
  • a method for acquiring system information includes: a terminal device receives first indication information from a network device, where the first indication information is used to indicate an OSI update of other system information, and the OSI includes at least one System information block SIB; the first indication information includes the content version valueTag of at least one SIB; the terminal device determines the SIB that needs to be updated.
  • the first indication information includes the valueTags of all SIBs in the OSI.
  • the first indication information includes the valueTag of a part of the SIB in the OSI.
  • the terminal device sends a request message to the network device, and the request message is used to request the SIB that needs to be updated.
  • the method may be executed by a first communication device, and the first communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip system.
  • the communication device is a terminal device.
  • a method for sending system information includes: a network device sends first indication information to a terminal device, where the first indication information is used to indicate an OSI update of other system information, and the OSI includes at least One system information block SIB; the first indication information includes the content version valueTag of at least one SIB;
  • the first indication information includes the valueTags of all SIBs in the OSI.
  • the first indication information includes the valueTag of a part of the SIB in the OSI.
  • the network device receives a request message from the terminal device, and the request message is used to request the SIB that needs to be updated.
  • the method may be executed by a second communication device, and the second communication device may be a terminal or a communication device capable of supporting the terminal to implement the functions required by the method, and of course it may also be another communication device, such as a chip system.
  • the second communication device is a network device as an example.
  • an embodiment of the present application provides a communication device, including a transceiver unit and a processing unit, wherein:
  • the transceiver unit is configured to receive first indication information from a network device, the first indication information is used to indicate other system information OSI updates, the OSI includes at least one system information block SIB; the first indication information includes at least The content version valueTag of a SIB;
  • the processing unit is used to determine the SIB that needs to be updated
  • the transceiver unit is further configured to send a request message to the network device, where the request message is used to request the SIB that needs to be updated.
  • an embodiment of the present application provides a communication device, including a transceiver unit, wherein:
  • the transceiver unit is configured to send first indication information to the terminal device, the first indication information is used to indicate other system information OSI update, the OSI includes at least one system information block SIB; the first indication information includes at least one SIB content version valueTag.
  • the first indication information includes the valueTags of all SIBs in the OSI.
  • the first indication information includes the valueTag of a part of the SIB in the OSI.
  • the transceiver unit is further configured to receive a request message from the terminal device, and the request message is used to request the SIB that needs to be updated.
  • a communication device in a twenty-first aspect, includes at least one processor and a memory, and the at least one processor is configured to execute the above seventeenth aspect or the method in any possible implementation manner of the seventeenth aspect.
  • a communication device in a twenty-second aspect, includes at least one processor and a memory, and the at least one processor is configured to execute the eighteenth aspect above, or any of the possible implementation manners in the eighteenth aspect method.
  • a communication device in a twenty-third aspect, includes at least one processor and an interface circuit, the at least one processor is configured to execute the above seventeenth aspect or the method in any possible implementation of the seventeenth aspect .
  • a communication device in a twenty-fourth aspect, includes at least one processor and an interface circuit, and the at least one processor is configured to execute the eighteenth aspect above, or any possible implementation of the eighteenth aspect Methods.
  • a terminal device in a twenty-fifth aspect, includes the communication device provided in the nineteenth aspect, or the terminal device includes the communication device provided in the twenty-first aspect, or the terminal device includes The communication device provided in the above twenty-third aspect.
  • a network device in a twenty-sixth aspect, includes the communication device provided in the aforementioned twentieth aspect, or the network device includes the communication device provided in the aforementioned twenty-second aspect, or the network device includes The communication device provided in the above twenty-fourth aspect.
  • a computer program product includes a computer program.
  • the computer program product includes a computer program.
  • the computer program is executed by a processor, the computer program is used to execute the seventeenth aspect to the eighteenth aspect, or the seventeenth aspect To any possible implementation of the eighteenth aspect.
  • a computer-readable storage medium stores a computer program.
  • the computer program When the computer program is executed, it is used to execute the seventeenth to eighteenth aspects, or The method in any possible implementation from the seventeenth aspect to the eighteenth aspect.
  • a communication system in a twenty-ninth aspect, includes the aforementioned terminal device and network device.
  • a chip in a thirtieth aspect, includes: a processor, configured to call and run a computer program from a memory, so that a communication device installed with the chip executes the seventeenth to eighteenth aspects, or the first aspect The method in any possible implementation from the seventeenth aspect to the eighteenth aspect.
  • the embodiment of the present application provides a method for data security processing.
  • one or more RLC entities are associated by configuring one PDCP.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode.
  • unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission.
  • corresponding security processing is performed on the data according to different transmission modes. On the one hand, the security of data transmission is improved.
  • the respective security requirements of data under different transmission modes can be met, and the flexibility of security processing can be improved.
  • Figure 1 is a schematic diagram of data transmission at each layer of the protocol stack.
  • Figure 2 is a schematic diagram of the protocol stack structure when the network device and the terminal device use the multicast transmission mode to transmit data.
  • FIG. 3 is a schematic diagram of an example of the architecture of a mobile communication system applicable to an embodiment of the present application.
  • FIG. 4 is a schematic interaction diagram of an example of a method for data security processing provided by an embodiment of the present application.
  • FIG. 5 is a schematic diagram of an example of the protocol stack architecture of the first device according to an embodiment of the present application.
  • FIG. 6 is a schematic diagram of another example of the protocol stack architecture of the first device according to an embodiment of the present application.
  • FIG. 7 is a schematic diagram of an example of the protocol stack architecture of a second device provided by an embodiment of the present application.
  • FIG. 8 is a schematic diagram of another example of the protocol stack architecture of the second device provided by an embodiment of the present application.
  • FIG. 9 is a schematic diagram of an example of a first device sending first data to a second device according to an embodiment of the present application.
  • FIG. 10 is a schematic diagram of another example of a first device sending first data to a second device according to an embodiment of the present application.
  • FIG. 11 is a schematic interaction diagram of another example of a method for data security processing provided by an embodiment of the present application.
  • FIG. 12 is a schematic interaction diagram of another example of a method for data security processing provided by an embodiment of the present application.
  • FIG. 13 is a schematic diagram of an example protocol stack structure provided by an embodiment of the present application.
  • FIG. 14 is a schematic diagram of another example protocol stack structure provided by an embodiment of the present application.
  • FIG. 15 is a schematic diagram of another example protocol stack structure provided by an embodiment of the present application.
  • FIG. 16 is a schematic block diagram of an example of a communication device provided by an embodiment of the present application.
  • FIG. 17 is a schematic block diagram of another example of a communication device according to an embodiment of the present application.
  • FIG. 18 is a schematic block diagram of an example of a communication device provided by an embodiment of the present application.
  • FIG. 19 is a schematic block diagram of another example of a communication device according to an embodiment of the present application.
  • FIG. 20 is a schematic block diagram of a communication device provided by an embodiment of the present application.
  • FIG. 21 is a schematic block diagram of another example of a communication device according to an embodiment of the present application.
  • FIG. 22 is a schematic block diagram of a terminal device provided by an embodiment of the present application.
  • FIG. 23 is a schematic block diagram of another example of a terminal device according to an embodiment of the present application.
  • FIG. 24 is a schematic block diagram of a network device provided by an embodiment of the present application.
  • FIG. 25 is a schematic block diagram of a BWP provided by an embodiment of the present application.
  • FIG. 26 is a schematic interaction diagram of a method for acquiring system information provided by an embodiment of the present application.
  • GSM Global System of Mobile Communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GSM Global System of Mobile Communication
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • UMTS Universal Mobile Telecommunication System
  • WiMAX Worldwide Interoperability for Microwave Access
  • 5G 5th Generation
  • 5NR New Radio
  • various aspects or features of the present application can be implemented as methods, devices, or products using standard programming and/or engineering techniques.
  • article of manufacture used in this application encompasses a computer program accessible from any computer-readable device, carrier, or medium.
  • computer-readable media may include, but are not limited to: magnetic storage devices (for example, hard disks, floppy disks, or tapes, etc.), optical disks (for example, compact discs (CD), digital versatile discs (DVD)) Etc.), smart cards and flash memory devices (for example, erasable programmable read-only memory (EPROM), cards, sticks or key drives, etc.).
  • various storage media described herein may represent one or more devices and/or other machine-readable media for storing information.
  • machine-readable medium may include, but is not limited to, wireless channels and various other media capable of storing, containing, and/or carrying instructions and/or data.
  • Network equipment a device capable of providing random access for terminal equipment or a chip that can be installed in the device, including but not limited to: evolved Node B (evolved Node B, eNB), radio network controller (radio network controller, RNC), node B (Node B, NB), base station controller (BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved NodeB, or home Node B, HNB), baseband unit (BBU), access point (AP), wireless relay node, wireless backhaul node, transmission point ( transmission and reception point, TRP or transmission point, TP, etc., and can also be 5G, such as NR, gNB in the system, or transmission point (TRP or TP), one or a group of base stations in the 5G system (including Multiple antenna panels) Antenna panels, or, may also be network nodes that constitute a gNB or transmission point, such as a baseband unit (BBU), or a distributed unit (DU,
  • Terminal also known as user equipment (UE), mobile station (MS), mobile terminal (MT), etc.
  • terminal devices include handheld devices with wireless connection functions, vehicle-mounted devices, and so on.
  • terminal devices can be: mobile phones (mobile phones), tablets, notebook computers, handheld computers, mobile Internet devices (MID), wearable devices, virtual reality (VR) devices, augmented reality (augmented reality (AR) equipment, industrial control (industrial control) wireless terminals, unmanned driving (self-driving) wireless terminals, remote medical surgery (remote medical surgery) wireless terminals, smart grid (smart grid) Wireless terminals, wireless terminals in transportation safety, wireless terminals in smart cities, or wireless terminals in smart homes, etc.
  • MID virtual reality
  • VR virtual reality
  • AR augmented reality
  • industrial control industrial control
  • unmanned driving self-driving
  • remote medical surgery remote medical surgery
  • smart grid smart grid
  • Multicast transmission technology
  • MBSFN multimedia broadcast multicast service single frequency network
  • SC-PTM single cell point to multipoint service
  • the MBSFN mode means that multiple cells (such as multiple base stations) that are synchronized with each other in the MBSFN area transmit the same information to multiple terminal devices at the same time. From the perspective of the terminal device, the received data is a single superimposed data. The strength of the received signal can be improved, and the interference between cells can be eliminated at the same time.
  • the SC-PTM mode means that the MBMS service is only transmitted through one cell (for example, a base station), and a network device performs group scheduling on multiple terminal devices at the same time.
  • Sending by multicast transmission means: when a device sends the transport block (TB) corresponding to the protocol data unit (protocol data unit, PDU), the packet radio network temporary identification (group radio) is used. network temporary identifier, G-RNTI) scrambles the PDU, or scrambles the downlink control information (DCI) corresponding to the PDU, and at the same time, one or more devices perform scrambling on the same PDU according to the same G-RNTI Receiving; or using multicast to transmit PDUs can mean telling multiple devices the location of the same PDU in a semi-static manner, and multiple devices can receive the PDU at the same time; or using multicast to transmit PDUs can mean that the PDU is It is transmitted in the radio bearer established by multicast transmission or in a channel specially designed for multicast.
  • G-RNTI network temporary identifier
  • DCI downlink control information
  • Receiving in a multicast transmission mode means that when sending in a multicast mode, one of the multiple receiving devices receives the PDU according to the G-RNTI; or one of the multiple receiving devices receives the PDU according to the G-RNTI;
  • the radio bearer established by the transmission receives or receives PDUs on the channel used for multicast transmission.
  • multicast is a specific method of multicast, therefore, multicast may also be referred to as multicast.
  • the multicast transmission method may include sending and receiving in a multicast manner.
  • Sending by unicast transmission means: when a device sends the TB corresponding to the PDU, it uses the cell network temporary identifier (C-RNTI) to scramble the PDU, or to The DCI corresponding to the PDU is scrambled, and only one device receives the same PDU according to the C-RNTI; or the unicast transmission of the PDU can mean that the PDU is transmitted in a radio bearer established for unicast transmission or in a dedicated unicast transmission. It is transmitted in the channel designed for broadcasting.
  • C-RNTI cell network temporary identifier
  • Reception by unicast transmission means that when unicast transmission is used, the one receiving device receives the PDU according to the C-RNTI; or the one device receives the PDU through the radio bearer established for unicast transmission or is used for unicast transmission. Receiving on the channel of broadcast transmission.
  • Unicast transmission methods can include unicast transmission and unicast reception.
  • the MBMS service can be sent to the terminal equipment in a unicast transmission mode by establishing a dedicated radio bearer for the terminal equipment, or it can be sent to the terminal equipment in a multicast transmission mode by establishing a dedicated MBMS radio bearer.
  • Terminal Equipment When there are multiple terminal devices that need to receive a certain MBMS service, if it is sent in unicast transmission mode, a dedicated radio bearer needs to be established for a large number of terminal devices, which consumes a lot of resources; if it is sent in multicast transmission mode, For the UE, only the MBMS dedicated multicast radio bearer needs to be established, and all terminal devices interested in the service can receive the MBMS service.
  • the network device can send to multiple terminal devices through multicast transmission, which can save network resources.
  • the radio bearer can be understood as a data transmission channel, which can include a PDCP (layer) entity and an RLC (layer) entity.
  • data When data is transmitted in the radio bearer, it needs to be processed by the corresponding PDCP entity and RLC entity.
  • a terminal device may establish multiple radio bearers for different data services. For example, the data in the multicast radio bearer is sent through multicast transmission, and the data in the unicast radio bearer is sent through unicast transmission.
  • the data in the radio bearer can be sent using a variety of transmission methods, including but not limited to unicast transmission, multicast transmission, and simultaneous unicast and multicast transmission. The different transmission modes can be switched. Unless otherwise specified, the technical solutions of this application are all for the same radio bearer.
  • the control plane protocol stack structure may include the functions of the RRC layer, the PDCP layer, the RLC layer, the MAC layer, and the physical layer.
  • the user plane protocol stack structure may include the functions of the PDCP layer, the RLC layer, the MAC layer, and the physical layer.
  • the physical layer is located at the lowest layer (layer one)
  • the MAC layer, RLC, and PDCP belong to the middle layer (layer two)
  • the RRC belongs to the higher layer (layer three).
  • SDAP service data adaptation protocol
  • the radio access network device can include a centralized unit (CU) and a distributed unit (CU).
  • DU distributed unit
  • multiple DUs can communicate with one CU.
  • the CU and the DU each have a part of the wireless communication protocol stack structure.
  • the functions of the PDCP layer and the above protocol layers are set in the CU, and the protocol layers below the PDCP, for example, the functions of the RLC layer and the MAC layer are set in the DU.
  • protocol layers is just an example, and it can also be divided in other protocol layers, for example, in the RLC layer.
  • the functions of the RLC layer and above protocol layers are set in the CU, and the protocol layers below the RLC layer
  • the functions are set in the DU; or, divided in a certain protocol layer, for example, part of the functions of the RLC layer and the functions of the protocol layer above the RLC layer are set in the CU, and the remaining functions of the RLC layer and the functions of the protocol layer below the RLC layer Set in DU.
  • it can also be divided in other ways, for example, by time delay.
  • the functions that need to meet the delay requirement for processing time are set in the DU, and the functions that do not need to meet the delay requirement are set in the CU.
  • Fig. 1 is a schematic diagram of data transmission at each layer of the protocol stack.
  • the data first goes to the PDCP layer of the terminal device, and is processed by the PDCP layer and then transmitted to the RLC layer and the MAC layer. After the RLC layer and the MAC layer are processed, they are sent to the network device through the physical layer.
  • the protocol layers that it passes through in sequence are the physical layer, the MAC layer, the RLC layer, and the PDCP layer.
  • the data in each radio bearer needs to be processed by various layers.
  • Each layer has corresponding functional entities to perform corresponding functions, for example, the PDCP layer corresponds to the PDCP entity, the RLC layer corresponds to the RLC entity, and the MAC layer corresponds to the MAC entity.
  • each radio bearer includes one or more PDCP entities and one or more RLC entities, and each RLC entity corresponds to a logical channel.
  • One MAC entity corresponds to multiple logical channels, and data in different logical channels can be multiplexed at the MAC layer, for example, multiplexed into the same MAC PDU at the MAC layer, and finally sent out through the physical layer.
  • the transmission process of downlink data is similar.
  • the PDCP entity For the data in the traditional unicast radio bearer, when passing through the PDCP layer, the PDCP entity will fully process the data.
  • Related security processing includes at least encryption/decryption and integrity protection/integrity verification processes.
  • the device that sends the data in the unicast radio bearer and the device that receives the data in the unicast radio bearer perform security processing on the unicast radio bearer at the PDCP layer.
  • the data packet is encrypted and/or integrity protected, and the device that receives the data in the unicast radio bearer (such as the terminal device) decrypts the data packet accordingly And/or integrity verification.
  • the encryption process is: the sender device uses the key and other parameters to convert the data into ciphertext through an operation through an encryption algorithm.
  • the decryption process is: the receiving end device uses the key and other parameters to transform the ciphertext into data through the inverse operation through the corresponding decryption algorithm.
  • the process of integrity protection is: the sender device calculates a parameter A through the integrity protection algorithm according to parameters such as data packets and keys, and notifies the receiver device of the parameter A.
  • the integrity verification process is: the receiving end device calculates a parameter B through the integrity verification algorithm according to parameters such as the data packet and the key. If the parameters A and B are consistent, the integrity verification passes.
  • Figure 2 is the use of multicast transmission between the network equipment and the terminal equipment.
  • the multicast data packet passes directly through the RLC layer and the MAC layer of the network device, and is finally sent out through the physical layer.
  • Multiple terminal devices (for example, terminal device 1 and terminal device 2) receive the multicast data, and send them to a higher layer through the processing of the physical layer, the MAC layer, and the RLC layer in sequence.
  • the network equipment and terminal equipment do not carry out the security processing process, which may cause security problems during the transmission of the multicast data, resulting in the multicast transmission.
  • the data is tampered with or tapped, which affects the user experience.
  • this application provides a data transmission method, which associates one or more RLC entities by configuring a PDCP.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode.
  • unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission.
  • corresponding security processing is performed on the data according to different transmission modes. On the one hand, the security of data transmission is improved.
  • the respective security requirements of data under different transmission modes can be met, and the flexibility of security processing can be improved.
  • Fig. 3 is a schematic diagram of a communication system suitable for an embodiment of the present application.
  • the mobile communication system 100 may include at least one wireless access network device 110 and at least one terminal device (terminal devices 120, 130, 140, 150, 160 as shown in FIG. 3).
  • the terminal device is connected to the wireless access network device in a wireless manner, and the wireless access network device may be the aforementioned network device.
  • At least one terminal device can send uplink data or information to the wireless access network device, and the wireless access network device 110 can also send downlink data or information to at least one terminal device.
  • the data provided in this application can be used for safe processing. method.
  • multiple terminal devices may also form a communication system.
  • the terminal devices 140, 150, and 160 may form a communication system.
  • the terminal device 140 may also use the data security processing method provided in this application in the process of sending data or information to the terminal device 150 and/or 160.
  • the terminal equipment and the wireless access network equipment can transmit uplink and downlink data and information related to the URLLC service.
  • FIG. 3 is only a schematic diagram, and the communication system may also include other network devices and/or terminal devices, which are not shown in FIG. 3.
  • the embodiments of the present application do not limit the number of wireless access network devices and terminals included in the mobile communication system.
  • the wireless access network device 110 may be the aforementioned network device.
  • the communication between network equipment and terminal equipment follows a certain protocol stack structure.
  • the network equipment can be an integrated gNB, or it can include CU and DU. CU and DU can be set separately or centrally.
  • the embodiments of the application are not limited here.
  • FIG. 4 is a schematic flowchart of a data security processing method 200 according to an embodiment of the present application.
  • the method 200 can be applied in the scenario shown in FIG. 3 , For example, in a scenario where multicast transmission is used and/or unicast transmission is used.
  • the embodiments of the application are not limited here.
  • the first device and the second device are used as an example to execute the method of each embodiment to describe the method of each embodiment.
  • the first device may be the aforementioned access network device, and the second device may be the aforementioned terminal device.
  • the execution subject of the method may also be a chip applied to the first device and the second device.
  • the method 200 shown in FIG. 4 may include step S210 to step S250.
  • each step in the method 200 will be described in detail with reference to FIG. 4.
  • the method 200 includes:
  • the first device determines a first transmission mode of the first data.
  • the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast and a multicast transmission mode.
  • the transmission method is a transmission method that uses unicast and multicast.
  • S220 The first device determines a secure processing mode for the first data according to the first transmission mode.
  • S230 The first device sends the securely processed first data to the second device according to the first transmission mode.
  • the second device receives the data sent by the first device.
  • the second device determines a first transmission mode of the received data, where the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast transmission mode and a multicast transmission mode.
  • the second device determines a safe processing mode for the received data according to the first transmission mode.
  • one PDCP entity in the protocol stack of the first device is associated with one or more RLC entities.
  • the association of one or more RLC entities with the first PDCP entity can be understood to mean that the first PDCP entity and one or more RLC entities belong to the same radio bearer, or the configuration of the first PDCP entity and the configuration of one or more RLC entities include
  • the identifiers (identify, ID) are the same, and the identifier may be a radio bearer identifier.
  • one RLC entity corresponds to one logical channel.
  • RLC entity and "logical channel” can be regarded as equivalent concepts and can be replaced with each other.
  • it can also be described as a PDCP entity associated with one or more logical channels, or the first PDCP
  • the configuration of the entity is the same as the ID contained in the configuration of the one or more logical channels.
  • Other descriptions used for RLC entities are also applicable to the concept of logical channels; in addition, the concept of logical channels can also be considered as including the concept of RLC entities, or logical channels can be considered as interfaces or channels connecting RLC entities to MAC entities.
  • the transmission mode of an RLC entity is unicast transmission or multicast transmission.
  • the multiple RLC entities associated with the first PDCP in the first device may include a first RLC entity and a second RLC entity.
  • the first RLC entity corresponds to a unicast transmission mode
  • the second RLC entity corresponds to a multicast transmission mode.
  • the unicast transmission mode corresponding to the first RLC entity can be understood as the data in the first RLC entity will be sent using the unicast transmission mode.
  • the second RLC entity corresponding to the multicast transmission mode can be understood as the data in the second RLC entity will be sent using the multicast transmission mode.
  • the unicast transmission mode corresponding to the first RLC entity may also be referred to as the type of the first RLC entity being the unicast type, or the type of the logical channel corresponding to the first RLC entity is the unicast logical channel type.
  • the unicast type of RLC entity can be understood as the data in the first RLC entity is sent in unicast mode
  • the unicast logical channel type can be understood as the data in the logical channel corresponding to the first RLC entity is sent in unicast mode.
  • FIG. 5 is a schematic diagram of an example of the protocol stack architecture of the first device according to an embodiment of the present application. As shown in FIG.
  • the first PDCP entity of the first device is associated with three RLC entities, where the first RLC entity and the third RLC entity are of unicast type, and the second RLC entity is of multicast type.
  • the arrow direction in FIG. 5 is the direction of data transmission when the first device sends data.
  • an RLC entity associated with the first PDCP in the first device may be referred to as a third RLC entity.
  • the third RLC entity corresponds to a unicast transmission mode, or the third RLC entity corresponds to a multicast transmission mode. That is, the third RLC entity uses a time division method for data transmission, adopts a unicast transmission method at some times, and uses a multicast transmission method at other times. That is, for the third RLC entity, only a unicast transmission mode or a multicast transmission mode can be used at a certain moment.
  • FIG. 6 is a schematic diagram of an example of the protocol stack architecture of the first device according to an embodiment of the present application. As shown in FIG. 6, the first PDCP entity of the first device is associated with one RLC entity (third RLC entity). The direction of the arrow in FIG. 6 is the direction of data transmission when the first device sends data.
  • one PDCP entity in the protocol stack of the second device is associated with one or more RLC entities.
  • multiple RLC entities associated with the second PDCP in the second device include a fourth RLC entity and a fifth RLC entity.
  • the fourth RLC entity corresponds to a unicast transmission mode
  • the fifth RLC entity corresponds to a multicast transmission mode.
  • the unicast transmission mode corresponding to the fourth RLC entity can be understood as the data received in the fourth RLC entity is received in unicast mode, or the data received in the logical channel corresponding to the fourth RLC entity is received in unicast mode That is, the physical layer entity and the MAC layer entity in the second device need to deliver the data received in the unicast transmission mode to the fourth RLC entity.
  • the fifth RLC entity corresponding to the multicast transmission mode can be understood as the data received in the fifth RLC entity is received in the multicast mode, or the data received in the logical channel corresponding to the fifth RLC entity is received in the multicast mode That is, the physical layer entity and the MAC layer entity in the second device need to deliver the data received in the multicast transmission mode to the fifth RLC entity.
  • FIG. 7 is a schematic diagram of an example of the protocol stack architecture of a second device provided by an embodiment of the present application.
  • the second PDCP entity of the second device is associated with three RLC entities, where the first RLC entity and the third RLC entity are of unicast type, and the second RLC entity is of multicast type.
  • the direction of the arrow in FIG. 7 is the direction of data transmission when the second device receives data.
  • an RLC entity associated with the second PDCP in the second device may be referred to as a sixth RLC entity.
  • the sixth RLC entity corresponds to a unicast transmission mode, or the sixth RLC entity corresponds to a multicast transmission mode. That is, the sixth RLC entity adopts a time division method, adopts a unicast transmission method at some times, and adopts a multicast transmission method at other times.
  • FIG. 8 is a schematic diagram of an example of the protocol stack architecture of a second device provided by an embodiment of the present application. As shown in FIG. 8, the second PDCP entity of the second device is associated with one RLC entity (sixth RLC entity). The sixth RLC entity corresponds to a unicast transmission mode, or the sixth RLC entity corresponds to a multicast transmission mode.
  • the direction of the arrow in FIG. 8 is the direction of data transmission when the second device receives data.
  • first RLC entity there may be only one first RLC entity, or there may be multiple first RLC entities. Similarly, the number of the second RLC entity, the fourth RLC entity, and the fifth RLC entity may also be one or more.
  • FIG. 5 to FIG. 8 are only exemplary, and should not limit the number of RLC entities and the number of unicast RLC entities in the embodiments of the present application, nor should it impose restrictions on the number of RLC entities in the first device and the second device.
  • the protocol stack structure imposes any restrictions.
  • the first device when the first device has data (take the first data as an example) to send to the second device, the first device can determine the first transmission mode of the first data, the first transmission mode is unicast transmission, A multicast transmission method, or at least one of unicast and multicast transmission methods.
  • the first device in the method 200 may be the CU. It is assumed that which transmission mode is adopted is determined by the PDCP layer (or CU) of the first device. For example, the PDCP layer of the first device may determine or determine the first transmission mode of the first data. That is, the PDCP layer (CU) determines the first transmission mode of the first data in unicast transmission mode, multicast transmission mode, unicast and multicast transmission mode.
  • the first type unicast transmission mode (or can be called only unicast transmission mode).
  • the first PDCP and the second PDCP are associated with multiple RLC entities, that is, the data of the first PDCP entity is only delivered to the first RLC entity, and the data in the logical channel corresponding to the first RLC entity is sent to
  • the second device receives. Specifically, after the data is packaged at the MAC layer, it is delivered to the physical layer, and the radio network temporary identity (RNTI) corresponding to the first RLC entity, such as C-RNTI, is scrambled and sent to the physical layer at the physical layer.
  • the second device receives according to the allocated or predefined RNTI corresponding to the first RLC entity or used to receive unicast data, and delivers the received unicast transmission mode data to the fourth RLC entity.
  • RNTI radio network temporary identity
  • the first PDCP and the second PDCP are respectively associated with only one RLC entity, that is, the data of the first PDCP entity is delivered to the third RLC entity, and the data in the logical channel corresponding to the third RLC entity is sent to the third RLC entity in unicast mode.
  • Two devices receive.
  • the second device receives according to the allocated or predefined C-RNTI corresponding to the third RLC entity or used to receive unicast data, and delivers the received unicast transmission mode data to the sixth RLC entity.
  • the second type multicast transmission mode (or it can be called only using multicast transmission mode).
  • the data of the first PDCP entity is only delivered to the second RLC entity.
  • the data in the logical channel corresponding to the second RLC entity is sent to multiple devices for reception in a multicast manner, and the multiple devices include the second device.
  • the RNTI corresponding to the second RLC entity such as G-RNTI, and sent to multiple devices for reception.
  • the second device receives according to the allocated or predefined RNTI corresponding to the second RLC entity or used to receive the multicast data, and delivers the received data in the multicast transmission mode to the fifth RLC entity.
  • the The plurality of devices includes the second device. Specifically, after the data is packaged at the MAC layer, it is delivered to the physical layer, and the physical layer is scrambled by the RNTI corresponding to the third RLC entity and sent to multiple devices for reception.
  • the second device receives according to the allocated or predefined RNTI corresponding to the third RLC entity or used to receive the multicast data, and delivers the received data in the multicast transmission mode to the sixth RLC entity.
  • the third type unicast and multicast transmission methods (or called unicast and multicast simultaneous transmission methods).
  • Unicast and multicast transmission methods are transmission methods that use unicast and multicast for transmission.
  • Unicast and multicast transmission modes exist in scenarios where both the first PDCP and the second PDCP are associated with multiple RLC entities. That is, the data of the first PDCP entity is delivered to the first RLC entity and the second RLC entity. The data in the logical channel corresponding to the first RLC entity is sent to the second device in unicast mode, and the data in the logical channel corresponding to the second RLC entity is sent to multiple devices in multicast mode, and the multiple devices include the first RLC entity. Two devices.
  • the data in the logical channels corresponding to the first RLC entity and the second RLC entity are packaged in the MAC layer, they will not be multiplexed into the same data packet, because different processing needs to be done subsequently.
  • the data in the physical layer is scrambled and sent through the RNTI corresponding to the first RLC entity.
  • the physical layer is scrambled and sent through the RNTI corresponding to the second RLC entity.
  • the second device may respectively receive according to the allocated or predefined RNTI corresponding to the first RLC entity and the second RLC entity, and deliver the received multicast transmission data to the fifth RLC entity, and transfer the received data to the fifth RLC entity.
  • the data in the unicast transmission mode is delivered to the fourth RLC entity.
  • the above three transmission modes are all for the same radio bearer, which can be understood as one radio bearer supporting different transmission modes and can be switched between different transmission modes.
  • This radio bearer can be an existing radio bearer or a new type of radio bearer, that is, the first PDCP entity and one or more RLC entities associated with the first PDCP entity belong to the same radio bearer (assumed to be The first radio bearer), or the second PDCP entity, one or more RLC entities associated with the second PDCP entity belong to the same radio bearer (assumed to be the first radio bearer) or the first PDCP entity is associated with the first PDCP entity One or more RLC entities belonging to the same radio bearer, and the second PDCP entity and one or more RLC entities associated with the second PDCP entity belong to the same radio bearer (assumed to be the first radio bearer).
  • the configuration information of the first radio bearer includes or is associated with the configuration information of the first PDCP entity and the configuration information of the RLC entity associated with the first PDCP entity, and the configuration information of the first radio bearer is associated with the configuration information of the second PDCP entity And the configuration information of the RLC entity associated with the second PDCP entity is also associated.
  • the association may be that the configuration information includes the same identification information, and the identification information may be a radio bearer identification.
  • the first device determines a secure processing mode for the first data according to the first transmission mode.
  • the security processing methods corresponding to different data transmission methods are different or the same. That is to say, there is a corresponding relationship between the data transmission method and the safe processing method. The corresponding relationship may be pre-configured or predetermined by agreement.
  • the security processing method for the first data by the first device includes: a first security processing corresponding to a unicast transmission mode, and a second security processing corresponding to a multicast transmission mode.
  • the first security processing may include using the first parameter and/or the first algorithm to encrypt and/or integrity protection of the first data, or the first security processing may also be no security processing.
  • the second security processing may include using the second parameter and/or the second algorithm to encrypt and/or integrity protection of the first data, or the second security processing may also be no security processing. It should be understood that the security processing method may also include other methods. This application is not restricted here.
  • not performing security processing may mean not performing encryption and/or integrity protection on the data, but using other methods to process the data.
  • not performing security processing can mean not performing any security processing on the data.
  • the first device determines the first transmission mode of the first data, and performs corresponding security processing on the first data in the PDCP layer entity.
  • the first device will copy the first data to obtain the second data at the PDCP layer entity.
  • the PDCP layer entity performs first security processing on the first data, and performs second security processing on the second data.
  • the first device sends the first data after corresponding security processing to the second device according to the first transmission mode of the first data.
  • the second device receives the data sent by the first device after corresponding security processing.
  • the first device After performing corresponding security processing on the first data in the first PDCP entity, the first device submits the securely processed first data to the corresponding RLC entity according to the first transmission mode of the first data. The entity is sent to the second device.
  • the first device delivers the first data after the first security processing to the first RLC entity or the third RLC entity.
  • the first device sends the first data after the first security processing to the second device through the first RLC entity or the third RLC entity.
  • the first device delivers the first data after the second security processing to the second RLC entity or the third RLC entity.
  • the first device sends the first data after the second security processing to the second device through the second RLC entity or the third RLC entity.
  • the first device delivers the first data after the first security processing to the first RLC entity, and delivers the second data after the second security processing to the second RLC entity .
  • the first device sends the first data after the first security processing to the second device through the first RLC entity.
  • the second data after the corresponding security processing is sent to the second device through the second RLC entity.
  • the second device determines the first transmission mode of the received data according to the received data after corresponding security processing. For example, if the second device receives data from the fourth RLC entity or the sixth RLC entity, it determines that the first transmission mode corresponding to the data is a unicast transmission mode. If the second device receives data from the fifth RLC entity or the sixth RLC entity, it determines that the first transmission mode corresponding to the data is the multicast transmission mode. If the second device receives data from the fifth RLC entity and the sixth RLC entity, it determines that the first transmission mode corresponding to the data is unicast and multicast transmission.
  • FIG. 9 shows an example of a schematic diagram of a first device sending first data to a second device.
  • the first device sends the security-processed first data to the second device through the first RLC entity and/or the second RLC entity.
  • the second device receives the data sent by the first device from the fourth RLC entity and/or the fifth RLC entity.
  • FIG. 10 shows another example of a schematic diagram of a first device sending first data to a second device.
  • the first device sends the security-processed first data to the second device through the third RLC entity.
  • the second device receives the data sent by the first device from the sixth RLC entity.
  • the second device determines a safe processing method for the received data according to the first transmission method.
  • the PDCP entity (second PDCP entity) of the second device can determine the first transmission mode of the data according to the data received from the different RLC entities associated with it, and determine the corresponding security processing according to the first transmission mode of the data Method
  • the safe processing method of the data can also be determined directly according to the RLC entity or logical channel that submitted the data.
  • the second PDCP entity performs third security processing on the received first data after the first security processing.
  • the third security processing may include decrypting and/or integrity verification of the received data using a third parameter and/or a third algorithm.
  • the third security processing may also be not performing security processing, or not performing decryption and/or integrity verification on the data. That is to say, there is a correspondence between the data transmission method or the RLC entity that submits the data and the security processing method. The corresponding relationship may be pre-configured or predetermined by agreement.
  • the second PDCP entity performs fourth security processing on the received first data after the second security processing.
  • the fourth security processing may include using a fourth parameter and/or a fourth algorithm to decrypt and/or verify the integrity of the received data.
  • the fourth security process may also be no security process.
  • not performing security processing can be understood as not performing decryption and/or integrity verification on the data, but using other methods to process the data.
  • not performing security processing can mean not performing any security processing on the data.
  • the second PDCP entity When the first transmission mode is unicast and multicast transmission, the second PDCP entity performs third security processing on the received first data after the first security processing, and performs the third security processing on the received data after the second security processing. The second data undergoes the fourth security processing.
  • the third security process may be a process corresponding to the first security process, such as encryption and decryption, integrity verification, and integrity protection.
  • the fourth security process may be a process corresponding to the second security process, such as encryption and decryption, integrity verification, and integrity protection.
  • the data security method provided in this application associates one or more RLC entities by configuring a PDCP.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode.
  • unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission. And, according to the unused transmission method, the data is processed safely.
  • the security of data transmission is improved.
  • different security processing procedures within the same bearer can be realized, meeting the security requirements of data in different transmission modes, and improving communication efficiency.
  • the security processing mode of the first data when the first transmission mode is a unicast transmission mode, the security processing mode of the first data is the first security processing.
  • the security processing mode of the first data is the second security processing.
  • the secure processing mode of the first data is the first secure processing
  • the secure processing mode of the second data is the second secure processing
  • the second data is the same as the first secure processing.
  • the data is the same.
  • the second data may be obtained by copying the first data.
  • the first device may first copy the first data to obtain the second data, and then perform the first security processing on the first data respectively, and perform the first security processing on the first data respectively. Second, the data is processed for the second security. Then, the first data and the second data after the security processing are sent to the second device through the corresponding RLC entity.
  • the first device When the first data transmission mode is unicast transmission or multicast transmission, the first device only needs to perform corresponding security processing on the first data, and then pass the security processed first data through the corresponding RLC The entity is sent to the second device.
  • the first security processing includes using the first parameter and/or the first algorithm to encrypt data and/or integrity protection.
  • the first security processing may be using the first parameter and/or the first algorithm to encrypt data, or the first security processing may be using the first parameter and/or the first algorithm to protect the integrity of the data, or, The first security processing may be to encrypt the data using the first algorithm and to protect the integrity of the data using the first parameter.
  • the second security processing means not performing secure processing on the first data can be regarded as a secure processing method, where not performing secure processing on the first data can be understood as not encrypting and unencrypting the first data. / Or integrity protection, but the first data is processed in other ways. Or, not performing security processing on the first data may mean not performing any security processing on the first data.
  • the first security processing is not performing security processing on the data.
  • the second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protect the data.
  • the second security processing may be using the second parameter and/or the second algorithm to encrypt data, or the second security processing may be using the second parameter and/or the second algorithm to protect the data integrity, or,
  • the second security processing may be using the second algorithm to encrypt the data and using the second parameter to protect the integrity of the data.
  • the first security processing includes using a first parameter and/or a first algorithm to encrypt and/or integrity protection of data
  • the second security processing includes using a second parameter and/or Or the second algorithm performs encryption and/or integrity protection on the data.
  • the first parameter and the second parameter are the same or different
  • the first algorithm and the second algorithm are the same or different. That is, the first security process and the second security process can be the same or different.
  • the first device may use the aforementioned first security processing and/or second security processing mode to perform corresponding security processing on the first data in the first PDCP entity.
  • the first parameter includes a first secret key
  • the second parameter includes a second secret key
  • the first secret key may be an encryption secret key
  • the second secret key may also be an encryption secret key.
  • the first secret key and the second secret key may be the same or different.
  • the first device encrypts the first data in the first PDCP entity with the first secret key, and then sends the first data encrypted with the first secret key to The second device. Or, use the first algorithm and the first secret key to calculate a parameter A, and send this parameter A to the second device.
  • the second device uses the third algorithm and the third secret key to calculate a parameter B. If the parameters A and B are consistent, the integrity verification is passed.
  • the first device encrypts the first data in the first PDCP entity with a second secret key, and then sends the first data encrypted with the second secret key Give the second device. Or, use the second algorithm and the second secret key to calculate a parameter C, and send this parameter C to the second device.
  • the second device uses the fourth algorithm and the fourth secret key to calculate a parameter D. If the parameters C and D are consistent, the integrity verification is passed.
  • the first parameter may also include the radio bearer identification of the data, the count value (count value) of the data packet, and the sequence number (Sequence Number) of the data packet in addition to the first secret key. SN), random numbers, etc.
  • the second parameter may also include the radio bearer identification, count value, SN, random number, etc. of the data.
  • the radio bearer identifier, count value, SN, random number, etc. included in the first parameter may be the same or different from the radio bearer identifier, count value, SN, and random number included in the second parameter, respectively.
  • the second PDCP entity of the second device may determine the first transmission mode of the data according to the data received from the different RLC entities associated with it, and determine the corresponding security processing mode according to the first transmission mode of the data.
  • the second PDCP entity performs the third security processing on the received first data after the first security processing.
  • the second PDCP entity When the first transmission mode of the received data is the multicast transmission mode, the second PDCP entity performs fourth security processing on the received first data after the second security processing.
  • the second PDCP entity When the first transmission mode of the received data is the unicast-multicast transmission mode, the second PDCP entity performs the third security process on the received first data after the first security process, and performs the third security process on the received data after the second security process.
  • the second data after the security processing undergoes the fourth security processing.
  • the third security processing includes using a third parameter and/or a third algorithm to decrypt and/or verify the integrity of the data.
  • the third security process may be to use the third parameter and/or the third algorithm to decrypt the data, or the first security process may be to use the third parameter and/or the third algorithm to verify the integrity of the data, or, The third security processing may be to decrypt the data using the third algorithm and to verify the integrity of the data using the third parameter.
  • the third security processing may also be not performing security processing on the data, wherein, not performing security processing on the data can be understood as not performing decryption and/or integrity verification on the data, or not performing any security processing on the data.
  • the fourth security processing includes using a fourth parameter and/or a fourth algorithm to decrypt and/or verify the integrity of the data.
  • the fourth security processing may be using the fourth parameter and/or the fourth algorithm to decrypt the data, or the fourth security processing may be using the fourth parameter and/or the fourth algorithm to verify the integrity of the data, or, The fourth security processing may be decrypting the data using the fourth algorithm and verifying the integrity of the data using the fourth parameter.
  • the fourth security processing may also be not performing security processing on the data.
  • the third security process is to use the third parameter and the third algorithm to decrypt the data.
  • the fourth security process is to use the fourth parameter and the fourth algorithm to decrypt the data.
  • the fourth security processing is also not performing security processing.
  • the third parameter and the fourth parameter are the same or different, and the third algorithm and the fourth algorithm are the same or different. That is, the third security process and the fourth security process may be the same or different.
  • the third parameter includes a third secret key
  • the fourth parameter includes a fourth secret key.
  • the third secret key may be a decryption secret key corresponding to the first secret key
  • the fourth secret key may be a decryption secret key corresponding to the second secret key.
  • the third secret key and the fourth secret key may be the same or different.
  • the first device encrypts the first data in the first PDCP entity with the first secret key, and then sends the first data encrypted with the first secret key to The second device. Or, use the first algorithm and the first secret key to calculate a parameter, and send this parameter A to the second device.
  • the second device uses the third key to decrypt the first data encrypted by the first key in the second PDCP entity. Or, the second device uses the third algorithm and the third secret key to calculate a parameter B. If the parameter A and the parameter B are the same, the integrity verification is passed.
  • the third parameter and the fourth parameter may include the radio bearer identification of the data, the count value (count value) of the data packet, and the sequence number of the data packet in addition to the secret key. Number, SN), random number, etc.
  • FIG. 11 is a schematic flowchart of a method 300 for data security processing according to an embodiment of the present application.
  • the method 300 can be applied in the scenario shown in FIG. 3, for example, using multicast transmission and/or using unicast transmission. Way to transfer the scene.
  • the embodiments of the application are not limited here.
  • the method 300 shown in FIG. 11 may include step S310 to step S350.
  • the steps in the method 300 are described in detail below with reference to FIG. 10.
  • the method 300 includes:
  • S310 The first device performs first security processing on the first data.
  • S320 The first device performs second security processing on the second data, and the second data is obtained by copying the first data.
  • the first device sends the first data after the first security processing to the second device according to the first data transmission mode, and/or sends the second data after the second security processing, the first
  • the transmission mode is a unicast transmission mode, a multicast transmission mode, or at least one of a unicast and a multicast transmission mode, and the unicast and multicast transmission modes are transmission modes that use unicast transmission and multicast transmission.
  • the second device receives the data sent by the first device.
  • the second device determines a first transmission mode of the received data, where the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast transmission and a multicast transmission mode.
  • S350 The second device determines a safe processing mode for the first data according to the first transmission mode.
  • the first PDCP entity in the protocol stack of the first device is associated with one or more RLC entities, and the transmission mode of one RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the second PDCP entity in the protocol stack of the second device is associated with one or more RLC entities, and the transmission mode of one RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the protocol stacks of the first device and the second device reference may be made to the description of the protocol stack of the first device in the above method 200. For brevity, details are not repeated here.
  • the structure of the protocol stack of the first device and the second device reference may be made to the description of the structure of the protocol stack of the first device and the second device in the above method 200. I won't repeat it here.
  • the transmission mode used is determined by the RLC layer, MAC layer, or physical layer of the first device. If the access network equipment adopts the CU and DU separate setting mode, it can also be understood that the transmission mode used is determined by the DU of the first device. Since the data transmission mode is determined by other layers or DUs, the first PDCP entity does not know which transmission mode is currently used, so when the first device transmits the first data, the first data is copied in the first PDCP entity. Get the second data. That is, the first data and the second data are the same.
  • the first transmission mode is: a unicast transmission mode, a multicast transmission mode, or a unicast and multicast transmission mode.
  • a unicast transmission mode a multicast transmission mode
  • a unicast and multicast transmission mode a unicast and multicast transmission mode.
  • the first device performs first security processing on the first data, that is, the security processing mode corresponding to the first data is the first security processing. Specifically, the first device or the CU performs the first security processing on the first data in the first PDCP entity. Among them, the first security processing corresponding to the unicast transmission mode.
  • the first device performs the second security processing on the second data, that is, the security processing mode corresponding to the second data is the second security processing.
  • the first device or the CU performs the second security processing on the second data in the first PDCP entity.
  • the second data is obtained by copying the first data.
  • the first data is copied to obtain the second data, and then the second data is obtained respectively.
  • the first data and the second data undergo corresponding security processing.
  • the first device or CU separately performs security processing on the first data and the second data in the first PDCP entity.
  • the first data that has undergone the first security processing is delivered to one or RLC entity associated with the first PDCP
  • the second data that has undergone the second security processing is also delivered to the one or RLC entity associated with the first PDCP.
  • one RLC entity corresponds to a unicast transmission mode or a multicast transmission mode.
  • the first device or CU delivers the first data after the first security processing to the RLC entity corresponding to the unicast transmission mode, and delivers the second data after the second security processing to the RLC entity corresponding to the multicast transmission method.
  • the corresponding relationship may be pre-configured or predetermined by agreement.
  • the first PDCP layer entity submits the first data after the first security processing to the first RLC entity, and submits the second data after the second security processing to the second RLC entity.
  • RLC entity submits the first data after the first security processing to the third RLC entity, and submits the second data after the second security processing to the third RLC entity.
  • the first device or the DU sends the first data after the first security processing to the second device according to the first transmission mode of the data, and/or sends the second data after the second security processing. That is, the RLC layer entity of the DU or the first device determines the first transmission mode among unicast transmission modes, multicast transmission modes, unicast and multicast transmission modes. Wherein, the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, a unicast transmission mode, and a multicast transmission mode.
  • the first device uses the first transmission mode to send data to the second device in the corresponding RLC entity.
  • the second device receives the data sent by the first device.
  • the second device determines the first transmission mode of the data according to the received data after corresponding security processing. For example, if the second device receives data from the fourth RLC entity or the sixth RLC entity, it is determined that the first transmission mode corresponding to the data is a unicast transmission mode. If the second device receives data from the fifth RLC entity or the sixth RLC entity, it determines that the first transmission mode corresponding to the data is a multicast transmission mode. If the second device receives data from the fourth RLC entity and the fifth RLC entity, it determines that the first transmission mode corresponding to the data is unicast and multicast transmission.
  • the second device determines a safe processing mode for the first data according to the first transmission mode.
  • the PDCP entity the second PDCP entity of the second device can determine the different transmission modes of the first data according to the data received from the different RLC entities associated with it, and determine the corresponding transmission modes according to the different transmission modes of the first data.
  • Safe handling In other words, there is a correspondence between the data transmission method or the RLC entity that submits the data and the security processing method. The corresponding relationship may be pre-configured or predetermined by agreement.
  • the second PDCP entity performs third security processing on the received first data after the first security processing.
  • the second PDCP entity performs fourth security processing on the received second data after the second security processing.
  • the second PDCP entity When the first transmission mode is unicast and multicast transmission, the second PDCP entity performs third security processing on the received first data after the first security processing, and performs the third security processing on the received data after the second security processing. The second data undergoes the fourth security processing.
  • the third security process may be a process corresponding to the first security process, such as encryption and decryption, integrity verification, and integrity protection.
  • the fourth security process may be a process corresponding to the second security process, such as encryption and decryption, integrity verification, and integrity protection.
  • the data security method provided in this application associates one or more RLC entities by configuring a PDCP.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode.
  • the first device or the CU sends data to the second device according to the first transmission mode in the following situations:
  • the first device When the first transmission mode is a unicast transmission mode, the first device (or CU) sends the first data after the first security processing to the second device through the first RLC entity or the third RLC entity. Optionally, delete the second data after the second security processing in the second RLC entity, or delete the second data after the second security processing in the third RLC entity.
  • the first device When the first transmission mode is a multicast transmission mode, the first device (or CU) sends the second data after the second security processing to the second device through the second RLC entity or the third RLC entity. Optionally, delete the first data after the first security processing in the first RLC entity, or delete the first data after the first security processing in the third RLC entity.
  • the first device When the first transmission mode is unicast and multicast transmission, the first device (or CU) sends the first data after the first security processing to the second device through the first RLC entity, and the second The RLC entity sends the second data after the second security processing to the second device.
  • the first security processing includes using the first parameter and/or the first algorithm to encrypt data and/or integrity protection
  • the second security processing is not performing security processing. That is, not performing the secure processing of the second data can be regarded as a secure processing method.
  • the first security processing is no security processing.
  • the second security processing includes using the second parameter and/or the second algorithm to perform encryption and/or integrity protection on the second data.
  • the first security processing includes using a first parameter and/or a first algorithm to encrypt and/or integrity protection of the first data
  • the second security processing includes using a second parameter And/or the second algorithm performs encryption and/or integrity protection on the second data.
  • the first parameter and the second parameter are the same or different
  • the first algorithm and the second algorithm are the same or different. That is, the first security process and the second security process can be the same or different.
  • the first device may use the foregoing first security processing and second security processing methods to perform corresponding security processing on the first data and the second data in the first PDCP entity, respectively.
  • the first parameter includes a first secret key
  • the second parameter includes a second secret key
  • the first secret key may be an encryption secret key
  • the second secret key may also be an encryption secret key.
  • the first secret key and the second secret key may be the same or different.
  • the first parameter and the second parameter may also include the radio bearer identification of the data, the count value (count value) of the data packet, and the sequence number of the data packet (Sequence Number) in addition to the secret key. Number, SN), random number, etc.
  • This application does not limit the specific content of the first parameter.
  • the radio bearer identifier, count value, SN, random number, etc. included in the first parameter may be the same or different from the radio bearer identifier, count value, SN, and random number included in the second parameter, respectively.
  • the third security processing includes using a third parameter and/or a third algorithm to decrypt and/or integrity verification of the data, or the third security processing is no security processing.
  • not performing security processing can be understood as not performing decryption and/or integrity verification on the data, but using other methods to process the data.
  • not performing security processing can mean not performing any security processing on the data.
  • the fourth security processing includes using the fourth parameter and/or the fourth algorithm to decrypt and/or verify the integrity of the data, or the fourth security processing is no security processing.
  • the third parameter and the fourth parameter may include the radio bearer identification of the data, the count value (count value) of the data packet, and the sequence number of the data packet in addition to the secret key. Number, SN), random number, etc.
  • FIG. 12 is a schematic flowchart of a method 400 for data security processing according to an embodiment of the present application.
  • the method 400 may be applied in the scenario shown in FIG. 3, for example, using multicast transmission and/or using unicast transmission. Way to transfer the scene.
  • the embodiments of the application are not limited here.
  • the method 400 shown in FIG. 12 may include step S410 to step S450.
  • the steps in the method 400 are described in detail below with reference to FIG. 11.
  • the method 400 includes:
  • S410 The first device performs first security processing on the first data.
  • the first device determines a first transmission mode of the first data after the first security processing, where the first transmission mode is a unicast transmission mode, a multicast transmission mode, or at least one of a unicast transmission mode and a multicast transmission mode.
  • the unicast and multicast transmission methods are transmission methods that use unicast and multicast for transmission.
  • the first device uses the multicast transmission mode to send the first data after the first security processing to the second device;
  • the first device uses the unicast transmission method to send the first data after the first security processing to the second device, and uses the multicast transmission method to send the first data to the second device.
  • the device sends third data, which is obtained by copying the first data after the first security processing.
  • the second device receives the data sent by the first device.
  • the second device determines a first transmission mode of the received data, where the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast transmission mode and a multicast transmission mode.
  • S450 The second device determines a safe processing mode for the received data according to the first transmission mode.
  • the first device when the first device has data (taking the first data as an example) to send to the second device, the first device first performs the first security processing on the first data at the PDCP layer. That is, the security processing method corresponding to the first data is the first security processing.
  • the first PDCP entity in the protocol stack of the first device is associated with one or more RLC entities, and the transmission mode of one RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the second PDCP entity in the protocol stack of the second device is associated with one or more RLC entities, and the transmission mode of one RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the protocol stacks of the first device and the second device reference may be made to the description of the protocol stack of the first device in the above method 200. For brevity, details are not repeated here.
  • the first device determines a first transmission mode of the first data after the first security processing.
  • the first device may be a CU. It is assumed that which transmission mode is used is determined by the PDCP layer (or CU) of the first device.
  • the PDCP layer of the first device may determine or determine the first transmission mode. That is, the PDCP layer (CU) determines the first transmission mode among unicast transmission modes, multicast transmission modes, unicast and multicast transmission modes.
  • unicast transmission mode, multicast transmission mode, unicast and multicast transmission mode reference may be made to the related description in the foregoing method 200, and for brevity, details are not repeated here.
  • the first device uses the unicast transmission mode to send the first data after the first security processing to the second device.
  • the first PDCP entity of the first device determines that the first transmission mode is the unicast transmission mode, it delivers the first data after the first security processing to the unicast type RLC entity associated with the first PDCP entity.
  • the first device may send the first data after the first security processing to the second device through the first RLC entity or the third RLC entity.
  • the first RLC entity corresponds to unicast transmission
  • the third RLC entity corresponds to unicast transmission.
  • the second device receives the first data sent by the first device after the first security processing, and delivers the received data to the corresponding RLC entity of the second device.
  • the second device receives according to the allocated or predefined RNTI corresponding to the first RLC entity or the third RLC entity, and delivers the received unicast transmission mode data to the fourth RLC entity or the sixth RLC entity.
  • the first device uses the multicast transmission mode to send the first data after the first security processing to the second device.
  • the first PDCP entity of the first device determines that the first transmission mode is the multicast transmission mode, it delivers the first data after the first security processing to the RLC entity of the multicast type associated with the first PDCP entity.
  • the first device may send the first data after the first security processing to the second device through the second RLC entity or the third RLC entity.
  • the second RLC entity corresponds to the multicast transmission mode
  • the third RLC entity corresponds to the multicast transmission mode.
  • the second device receives the first data sent by the first device after the first security processing. And submit the received data to the corresponding RLC entity of the second device. For example, the second device receives according to the allocated or predefined RNTI corresponding to the second RLC entity or the third RLC entity, and delivers the received unicast transmission mode data to the fifth RLC entity or the sixth RLC entity.
  • the first device uses the unicast transmission method to send the first data after the first security processing to the second device, and uses the multicast transmission method to send the first data to the second device.
  • the second device sends third data, and the third data is the same as the first data after the first security processing.
  • the third data may be obtained by copying the first data after the first security processing, or may be obtained by copying the first data first, and then performing the first security processing on the copied data to obtain the third data. That is, the security processing mode corresponding to the multicast transmission mode and the security processing mode corresponding to the single transmission mode are the same.
  • the first PDCP entity of the first device determines that the first transmission mode is unicast or multicast transmission, it submits the first security process to the RLC entity of the unicast type associated with the first PDCP entity.
  • the third data is delivered to the RLC entity of the multicast type.
  • the third data is the same as the first data after the first security processing.
  • the first device sends the first data number after the first security processing to the second device through the unicast type RLC entity associated with the first PDCP entity, and sends the third data to the second device through the multicast type RLC entity .
  • the first device may send the first data after the first security processing to the second device through the first RLC entity, and send the third data to the second device through the second RLC entity.
  • the first RLC entity corresponds to a unicast transmission mode
  • the second RLC entity corresponds to a multicast transmission mode.
  • the second device receives the data sent by the first device. And submit the received data to the corresponding RLC entity of the second device.
  • the second device receives the allocated or predefined RNTI corresponding to the first RLC entity and the second RLC entity, delivers the received unicast transmission mode data to the fourth RLC entity, and transfers the received data to the fourth RLC entity.
  • the data in the broadcast transmission mode is delivered to the fifth RLC entity.
  • the second device determines the first transmission mode of the received data according to the received data after the first security processing.
  • the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast transmission and a multicast transmission mode. For example, if the second device receives data from the fourth RLC entity or the sixth RLC entity, it determines that the first transmission mode corresponding to the data is a unicast transmission mode. If the second device receives data from the fifth RLC entity or the sixth RLC entity, it determines that the first transmission mode corresponding to the data is the multicast transmission mode. If the second device receives data from the fourth RLC entity and the fifth RLC entity, it determines that the first transmission mode corresponding to the data is unicast and multicast transmission.
  • the second device determines a safe processing method for the received data according to the first transmission method.
  • the PDCP entity (second PDCP entity) of the second device may determine the first transmission mode of the data according to the data received from the different RLC entities associated with it, and determine the corresponding security processing mode according to the first transmission mode.
  • the second PDCP entity performs third security processing on the received first data after the first security processing. That is to say, there is a correspondence between the data transmission method or the RLC entity that submits the data and the security processing method.
  • the corresponding relationship may be pre-configured or predetermined by agreement.
  • the second PDCP entity when the first transmission mode is a multicast transmission mode, the second PDCP entity also performs third security processing on the received first data after the first security processing. That is, the security processing mode corresponding to the multicast transmission mode and the security processing mode corresponding to the single transmission mode are the same.
  • the second PDCP entity When the first transmission mode is unicast and multicast transmission, the second PDCP entity performs third security processing on the received first data through the unicast transmission mode, and performs third security processing on the received third data through the multicast transmission mode. The data is also processed for third security.
  • the third security process may be a process corresponding to the first security process, such as encryption and decryption, integrity verification, and integrity protection.
  • the data security method provided in this application associates one or more RLC entities by configuring a PDCP.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode.
  • unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission.
  • the security processing methods corresponding to the unicast transmission mode and the multicast transmission mode are the same.
  • the first device first processes the data securely, and then sends the securely processed data according to the unused transmission mode of the data. Improve the security of data transmission. It can realize the data security processing process in the same bearer, meet the security requirements of data under different transmission modes, and improve communication efficiency.
  • the first security processing includes using the first parameter and/or the first algorithm to encrypt data and/or integrity protection, or the first security processing is no security processing, Among them, not performing security processing can be understood as not performing encryption and/or integrity protection on the data, but using other methods to process the data. Or, not performing security processing can mean not performing any security processing on the data.
  • the first parameter includes the first secret key.
  • the third security processing includes decrypting and/or integrity verification of data using a third parameter and/or a third algorithm, or the third security processing is no security processing, where, Failure to perform security processing can be understood as not decrypting and/or integrity verification of the data, but using other methods to process the data. Or, not performing security processing can mean not performing any security processing on the data.
  • the first device encrypts the first data in the first PDCP entity with the first secret key, and then sends the first data encrypted with the first secret key to The second device. Or, use the first algorithm and the first secret key to calculate a parameter, and send this parameter to the second device.
  • the second device uses the third key to decrypt the first data encrypted by the first key in the second PDCP entity. Or, the second device uses the third algorithm and the third secret key to calculate a parameter B. If the parameter A and the parameter B are the same, the integrity verification is passed.
  • the first parameter may also include the radio bearer identification of the data, the count value (count value) of the data packet, and the sequence number (Sequence Number) of the data packet in addition to the first secret key. SN), random numbers, etc.
  • the count value (count value) may include SN and Hyper Frame Number (Hyper Frame Number, HFN). This application does not limit the specific content included in the first parameter.
  • the third parameter may also include the radio bearer identification of the data, the count value (count value) of the data packet, and the sequence number (Sequence Number) of the data packet in addition to the first secret key. SN), random numbers, etc.
  • the count value (count value) can include SN and Hyper Frame Number (Hyper Frame Number, HFN)
  • the first device may send configuration information such as the aforementioned secret key (key) to the second device.
  • corresponding keys and/or encryption security algorithms can be maintained for different types of radio bearers.
  • the security processing of the data uses the existing key and/or the encryption integrity protection algorithm (encryption algorithm and integrity protection algorithm), and all orders of the same terminal device
  • the broadcast radio bearer uses the same key and/or encryption guarantee algorithm, and the unicast radio bearers of different terminal devices use different keys and/or encryption guarantee algorithms; in this application, the wireless support for multiple transmission methods is used.
  • the network device may configure a public key and/or encryption security algorithm for at least one terminal device for secure processing of the data in the first type of radio bearer,
  • the first type radio bearers used to receive the same service can use the same key and/or encryption encryption algorithm to process the data, and for the same terminal device,
  • Different types of radio bearers unicast radio bearers, multicast radio bearers, and first type radio bearers
  • the terminal device for the same terminal device, for the same type of radio bearer (unicast radio bearer, multicast radio bearer, and first type radio bearer), if the same type of bearer is used to transmit different services, the terminal device It is also possible to maintain different keys and/or encryption security algorithms for safe processing of corresponding data, which is not limited in this application.
  • radio bearer unicast radio bearer, multicast radio bearer, and first type radio bearer
  • the first device (taking the network device as an example) sends security configuration information to the second device (taking the terminal device as an example).
  • the security configuration information may include one or more sets of key configuration, algorithm configuration, etc.
  • the key can be a public key that can be used by multiple terminal devices.
  • the security configuration information may be sent to the terminal device when the bearer is established, or may be sent to the terminal device in advance, or may be sent to the terminal device based on the request of the terminal device.
  • the security configuration information may be carried in radio bearer configuration information, PDCP configuration information or other configuration information.
  • the terminal device maintains multiple sets of key information for unsuitable types of bearers.
  • one set of key information is used for ordinary bearers that only support unicast, and one set is used for bearers that support unicast and/or multicast.
  • the security configuration information can also be preset in the terminal device or derived from the information preset by the terminal device; for network devices, the security configuration information can be sent by the core network to the network device or the terminal device. For network equipment or pre-installed in network equipment or derived from network equipment based on preset information.
  • the PDCP layer of the terminal device uses corresponding types of keys and/or encryption security algorithms for security processing. For example, for bearers that support unicast and/or multicast.
  • the PDCP layer of the network device uses a public key shared by multiple terminal devices to securely process the data and then send it to one or more terminal devices. After the terminal device receives the security configuration information, the PDCP layer of the terminal device uses the corresponding public key to perform corresponding security processing for the bearer that supports unicast and/or multicast.
  • the network device (first device) side maintains multiple radio bearers for different terminal devices, including unicast radio bearers, multicast radio bearers, and first type bearers, where the first type
  • the bearer may also be a type of multicast radio bearer.
  • the unicast radio bearer it is point-to-point transmission, that is, the unicast radio bearer is only for one terminal device; for the multicast radio bearer and the first type of bearer, it is point-to-multipoint transmission, that is, for multiple Terminal Equipment.
  • the PDCP layer and the RLC layer are included to perform the functions of each layer, and on a corresponding terminal device side, the corresponding PDCP and RLC layers are included to perform the corresponding functions.
  • the execution of these functions is as good as The processing is different for different terminal devices.
  • the security processing of data in the unicast radio bearer in the same terminal device is the same, and the security processing of data in the unicast radio bearer in different terminal devices is different.
  • this kind of function can be called terminal equipment level function;
  • This kind of function corresponds to the multicast radio bearer or the first type of radio bearer.
  • the execution and processing of this function for different terminal devices can be the same, such as security processing, assuming multiple terminals
  • the device receives data in a multicast manner, that is, in point-to-multipoint transmission, the network device and the multiple terminal devices have the same security processing method for the data.
  • the security processing method is the same as that described in the previous embodiment in the specification, and will not be repeated here.
  • Figure 13 shows the first protocol stack structure.
  • the radio bearers first type radio bearers
  • the radio bearers that receive the same MBMS service for all terminal equipment share one PDCP entity for processing, and there is one PDCP entity for each unicast radio bearer of each terminal equipment. The entity is processed.
  • Figure 14 shows the second protocol stack structure.
  • the first-type radio bearers that receive the same MBMS service on the same terminal device share a PDCP entity for processing
  • the first-type radio bearers that receive the same MBMS service on different terminal devices use different PDCP entities for processing.
  • the network device decides to use the multicast transmission mode to transmit data to multiple terminal devices, the data can be processed through any one or more PDCPs, and after the processing is completed, it is handed over to the multicast type RLC entity to continue transmission.
  • the data can be processed through the corresponding PDCP, and after the processing is completed, it is handed over to the corresponding unicast type RLC entity to continue transmission.
  • Figure 15 shows the third protocol stack structure.
  • the multicast radio bearer of all terminal devices shares a PDCP entity or sub-PDCP function module for processing on the network device side.
  • Unicast radio bearers are processed respectively corresponding to different PDCP entities or sub-PDCP functional modules.
  • the PDCP entity mentioned here can be a complete PDCP entity, or a part of a complete PDCP, that is, a collection of some functional modules.
  • a public PDCP entity contains the same set of functions for multiple terminal devices, such as multicast Security handling during transmission.
  • the data can be processed through the public PDCP entity, and after the processing is completed, it is handed over to the multicast type RLC entity to continue transmission.
  • the data can be processed through a separate PDCP, and after the processing is completed, it is handed over to the corresponding unicast type RLC entity to continue transmission.
  • the data can be copied in a separate PDCP or a public PDCP, and then in a separate PDCP entity and a public PDCP entity, respectively
  • the data is processed, and after the processing is completed, it is delivered to the unicast type RLC and multicast type RLC entities to continue transmission.
  • Data can also be replicated at a higher layer, and then handed over to a separate PDCP entity and a public PDCP entity for processing.
  • first, the second, etc. are only for ease of description.
  • first RLC entity and the second RLC entity are only used to indicate different RLC entities.
  • the above-mentioned first, second, etc. should not cause any limitation to the embodiments of the present application.
  • pre-set and pre-defined can be achieved by pre-saving corresponding codes, tables, or other methods that can be used to indicate related information in devices (for example, including terminals and network devices). To achieve, this application does not limit its specific implementation.
  • FIG. 16 shows a schematic block diagram of a communication device 500 according to an embodiment of the present application.
  • the device 500 may correspond to the first device or the second device described in the above method 200, or may be applied to the first device or the second device. Chips or components, and each module or unit in the device 500 is respectively used to execute each action or process performed by the first device and the second device in the method 200 described above.
  • the device 500 may include a processing unit 510 and a transceiving unit 520.
  • the transceiving unit 520 is configured to perform specific signal transceiving under the driving of the processing unit 510.
  • the processing unit 510 is configured to determine a first transmission mode of the first data.
  • the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast and multicast transmission mode.
  • the broadcast transmission method is a transmission method that uses unicast and multicast for transmission.
  • the processing unit 510 is further configured to determine a safe processing mode for the first data according to the first transmission mode.
  • the transceiver unit 520 is used to send the first data after security processing.
  • the communication device provided in this application associates one or more RLC entities by configuring a PDCP.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode.
  • unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission. And, according to the unused transmission method, the data is processed safely.
  • the security of data transmission is improved.
  • different security processing procedures within the same bearer can be realized, meeting the security requirements of data in different transmission modes, and improving communication efficiency.
  • the processing unit 510 determines that the secure processing mode of the first data is the first secure processing.
  • the processing unit 510 determines that the secure processing mode of the first data is the second secure processing.
  • the processing unit 510 determines that the secure processing mode of the first data is the first secure processing, and the second secure processing
  • the data security processing method is the second security processing, and the second data is obtained by copying the first data.
  • the first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection.
  • the second security process is no security process.
  • the first security processing includes using a third parameter and/or a third algorithm to encrypt data and/or integrity protection.
  • the second security process is no security process.
  • the first security processing is no security processing.
  • the second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protect the data.
  • the first security processing is no security processing.
  • the second security processing includes using a fourth parameter and/or a fourth algorithm to encrypt data and/or integrity protection.
  • the first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection, or the first security processing includes using a first parameter and/or a first algorithm.
  • the three parameters and/or the third algorithm perform decryption and/or integrity verification on the data.
  • the second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protection of the data, or the second security processing includes using the fourth parameter and/or the fourth algorithm to decrypt the data and / Or integrity verification.
  • the first parameter and the second parameter are the same or different, the first algorithm and the second algorithm are the same or different, or the third parameter and the fourth parameter are the same or different, the third algorithm and the fourth algorithm Same or different.
  • the first parameter includes a first secret key
  • the second parameter includes a second secret key
  • the third parameter includes a third secret key
  • the fourth parameter includes a fourth secret key
  • the device 500 may also be the storage unit, and the transceiving unit 520 may be a transceiver, an input/output interface, or an interface circuit.
  • the storage unit is used to store instructions executed by the transceiver unit 520 and the processing unit 510.
  • the transceiving unit 520, the processing unit 510, and the storage unit are coupled to each other, the storage unit stores instructions, the processing unit 510 is used to execute the instructions stored in the storage unit, and the transceiving unit 520 is used to perform specific signal transceiving under the driving of the processing unit 510.
  • the transceiving unit 520 may include a receiving unit (module) and a sending unit (module), which are used to execute each embodiment of the aforementioned method 200 and the first device or the second device in the embodiment shown in FIG. 4 to receive information and Steps to send information.
  • a receiving unit module
  • a sending unit module
  • the transceiving unit 520 may be a transceiver, an input/output interface, or an interface circuit.
  • the storage unit may be a memory.
  • the processing unit 510 may be implemented by a processor.
  • the communication device 600 may include a processor 610, a memory 620, a transceiver 630, and a bus system 660.
  • the components of the communication device 600 are coupled together through a bus system 660, where the bus system 660 may include a power bus, a control bus, a status signal bus, etc., in addition to a data bus.
  • various buses are marked as the bus system 640 in FIG. 16.
  • FIG. 16 is only schematically drawn.
  • the communication device 500 shown in FIG. 16 or the communication device 600 shown in FIG. 17 can implement the various embodiments of the foregoing method 200 and the steps performed by the first device or the second device in the embodiment shown in FIG. 4. For similar descriptions, reference can be made to the descriptions in the aforementioned corresponding methods. To avoid repetition, I won’t repeat them here.
  • the communication device 500 shown in FIG. 16 or the communication device 600 shown in FIG. 17 may be a terminal device or a network device.
  • FIG. 18 shows a schematic block diagram of a communication device 700 according to an embodiment of the present application.
  • the device 700 may correspond to the first device described in the above method 300, or may be a chip or component applied to the first device, and the device Each module or unit in 700 is respectively used to execute each action or processing procedure executed by the first device in the above method 300.
  • the apparatus 700 may include a processing unit 710 and a transceiver unit 720.
  • the transceiving unit 720 is configured to perform specific signal transceiving under the driving of the processing unit 710.
  • the processing unit 710 is configured to perform first security processing on the first data
  • the processing unit 710 is further configured to perform second security processing on second data, where the second data is obtained by copying the first data;
  • the transceiver unit 720 is configured to send the first data after the first security processing and/or send the second data after the second security processing according to the first transmission mode of the data, and the first transmission
  • the method is a unicast transmission method, a multicast transmission method, or at least one of a unicast and a multicast transmission method, and the unicast and multicast transmission methods are transmission methods that use unicast and multicast for transmission.
  • the communication device provided in this application associates one or more RLC entities by configuring a PDCP.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode.
  • the transceiver unit 720 is also used for:
  • the first transmission mode is a unicast transmission mode, sending the first data after the first security processing
  • the first transmission mode is a multicast transmission mode, sending the second data after the second security processing
  • the first data transmission mode is a unicast or a multicast transmission mode
  • the first data after the first security processing and the second data after the second security processing are sent.
  • the first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection; the second security processing is no security processing .
  • the first security processing is no security processing; the second security processing includes using a second parameter and/or a second algorithm to encrypt data and/or integrity protection .
  • the first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection; the second security processing includes using a second parameter And/or the second algorithm performs encryption and/or integrity protection on the data.
  • the first parameter and the second parameter are the same or different, and the first algorithm and the second algorithm are the same or different.
  • the first parameter includes a first secret key
  • the second parameter includes a second secret key
  • the transceiving unit 720 may include a receiving unit (module) and a sending unit (module), which are used to execute each embodiment of the aforementioned method 300 and the steps of receiving and sending information by the second device in the embodiment shown in FIG. 11 .
  • the device 700 may also be the storage unit, and the transceiving unit 720 may be a transceiver, an input/output interface, or an interface circuit.
  • the storage unit is used to store instructions executed by the transceiver unit 720 and the processing unit 710.
  • the transceiving unit 720, the processing unit 710, and the storage unit are coupled with each other.
  • the storage unit stores instructions.
  • the processing unit 710 is used to execute the instructions stored in the storage unit.
  • the transceiving unit 720 is driven by the processing unit 710 to perform specific signal transceiving.
  • the transceiving unit 720 may be a transceiver, an input/output interface, or an interface circuit.
  • the storage unit may be a memory.
  • the processing unit 710 may be implemented by a processor.
  • the communication device 800 may include a processor 810, a memory 820, and a transceiver 830.
  • the communication device 700 shown in FIG. 18 or the communication device 800 shown in FIG. 19 can implement the embodiment in the aforementioned method 300 and the steps performed by the first device in the embodiment shown in FIG. 11.
  • the communication device 700 shown in FIG. 18 or the communication device 800 shown in FIG. 19 may be a network device.
  • FIG. 20 shows a schematic block diagram of a communication device 900 according to an embodiment of the present application.
  • the device 900 may correspond to the first device described in the above method 400, or may be a chip or component applied to the first device, and the device Each module or unit in 900 is respectively used to execute each action or processing procedure executed by the first device in the above method 400.
  • the device 900 may include a processing unit 910 and a transceiving unit 920.
  • the transceiving unit 920 is configured to perform specific signal transceiving under the driving of the processing unit 910.
  • the processing unit 910 is configured to perform first security processing on the first data.
  • the processing unit 910 is further configured to determine a first transmission mode of the first data after the first security processing, where the first transmission mode is a unicast transmission mode, a multicast transmission mode, or unicast and multicast transmission At least one of the methods, the unicast and multicast transmission methods are transmission methods that use unicast and multicast for transmission;
  • the transceiver unit 920 is configured to use the unicast transmission mode to send the first data after the first security processing when the first transmission mode is a unicast transmission mode.
  • the transceiver unit 920 is further configured to use the multicast transmission mode to send the first data after the first security processing when the first transmission mode is a multicast transmission mode.
  • the transceiving unit 920 is further configured to use the unicast transmission mode to send the first data after the first security processing when the first transmission mode is unicast and multicast transmission mode, and use the multicast transmission mode to send The third data is obtained by copying the first data after the first security processing.
  • the communication device provided in this application associates one or more RLC entities by configuring a PDCP.
  • the transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode.
  • the multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode.
  • unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission.
  • the security processing methods corresponding to the unicast transmission mode and the multicast transmission mode are the same.
  • the first device first processes the data securely, and then sends the securely processed data according to the unused transmission mode of the data. Improve the security of data transmission. It can realize the data security processing process in the same bearer, meet the security requirements of data under different transmission modes, and improve communication efficiency.
  • the first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection; or, the first security processing is not performed Safe handling.
  • the first parameter includes a first secret key.
  • the transceiving unit 920 may include a receiving unit (module) and a sending unit (module), which are used to execute each embodiment of the aforementioned method 300 and the steps of receiving and sending information by the second device in the embodiment shown in FIG. 11 .
  • the device 900 may also be the storage unit, and the transceiving unit 920 may be a transceiver, an input/output interface, or an interface circuit.
  • the storage unit is used to store instructions executed by the transceiver unit 920 and the processing unit 910.
  • the transceiving unit 920, the processing unit 910, and the storage unit are coupled to each other, the storage unit stores instructions, the processing unit 910 is used to execute the instructions stored in the storage unit, and the transceiving unit 920 is used to perform specific signal transceiving under the driving of the processing unit 910.
  • the transceiving unit 920 may be a transceiver, an input/output interface, or an interface circuit.
  • the storage unit may be a memory.
  • the processing unit 910 may be implemented by a processor.
  • the communication device 1000 may include a processor 1010, a memory 1020, and a transceiver 1030.
  • the communication device 900 shown in FIG. 20 or the communication device 1000 shown in FIG. 21 can implement the embodiment in the foregoing method 400 and the steps performed by the first device in the embodiment shown in FIG. 12. For similar descriptions, reference can be made to the descriptions in the aforementioned corresponding methods. To avoid repetition, I won’t repeat them here.
  • the communication device 900 shown in FIG. 20 or the communication device 1000 shown in FIG. 21 may be a network device.
  • each unit in the device can be all implemented in the form of software called by processing elements; they can also be all implemented in the form of hardware; part of the units can also be implemented in the form of software called by the processing elements, and some of the units can be implemented in the form of hardware.
  • each unit can be a separate processing element, or it can be integrated in a certain chip of the device for implementation.
  • it can also be stored in the memory in the form of a program, which is called and executed by a certain processing element of the device.
  • the processing element may also be called a processor, and may be an integrated circuit with signal processing capability.
  • each step of the above method or each of the above units may be implemented by an integrated logic circuit of hardware in a processor element or implemented in a form of being called by software through a processing element.
  • the unit in any of the above devices may be one or more integrated circuits configured to implement the above methods, for example: one or more application specific integrated circuits (ASIC), or, one or Multiple digital signal processors (digital signal processors, DSP), or, one or more field programmable gate arrays (FPGA), or a combination of at least two of these integrated circuits.
  • ASIC application specific integrated circuits
  • DSP digital signal processors
  • FPGA field programmable gate arrays
  • the unit in the device can be implemented in the form of a processing element scheduler
  • the processing element can be a general-purpose processor, such as a central processing unit (CPU) or other processors that can call programs.
  • CPU central processing unit
  • these units can be integrated together and implemented in the form of a system-on-a-chip (SOC).
  • FIG. 22 is a schematic structural diagram of a terminal device 1100 provided by this application.
  • the foregoing apparatuses 500 to 600 may be configured in the terminal device 1100.
  • the apparatuses 500 to 600 themselves may be the terminal equipment 1100.
  • the terminal device 1100 may execute the actions performed by the second device in the foregoing method 200 to method 400.
  • FIG. 22 only shows the main components of the terminal device.
  • the terminal device 1100 includes a processor, a memory, a control circuit, an antenna, and an input and output device.
  • the processor is mainly used to process the communication protocol and communication data, and to control the entire terminal device, execute the software program, and process the data of the software program. For example, it is used to support the terminal device to execute the above-mentioned transmission precoding matrix instruction method embodiment.
  • the memory is mainly used to store software programs and data, for example, to store the codebook described in the above embodiments.
  • the control circuit is mainly used for the conversion of baseband signals and radio frequency signals and the processing of radio frequency signals.
  • the control circuit and the antenna together can also be called a transceiver, which is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, and keyboards, are mainly used to receive data input by users and output data to users.
  • the processor can read the software program in the storage unit, interpret and execute the instructions of the software program, and process the data of the software program.
  • the processor performs baseband processing on the data to be sent, and outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
  • FIG. 22 only shows a memory and a processor. In an actual terminal device, there may be multiple processors and memories.
  • the memory may also be referred to as a storage medium or a storage device, etc., which is not limited in the embodiment of the present application.
  • the processor may include a baseband processor and a central processing unit.
  • the baseband processor is mainly used to process communication protocols and communication data.
  • the central processing unit is mainly used to control the entire terminal device, execute software programs, and process software programs. data.
  • the processor in FIG. 22 integrates the functions of the baseband processor and the central processing unit.
  • the baseband processor and the central processing unit may also be independent processors and are interconnected by technologies such as a bus.
  • the terminal device may include multiple baseband processors to adapt to different network standards, the terminal device may include multiple central processors to enhance its processing capabilities, and the various components of the terminal device may be connected through various buses.
  • the baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip.
  • the central processing unit can also be expressed as a central processing circuit or a central processing chip.
  • the function of processing the communication protocol and the communication data may be built in the processor, or stored in the storage unit in the form of a software program, and the processor executes the software program to realize the baseband processing function.
  • the antenna and the control circuit with the transceiving function can be regarded as the transceiving unit 1101 of the terminal device 1100, and the processor with the processing function can be regarded as the processing unit 1102 of the terminal device 1100.
  • the terminal device 1100 includes a transceiver unit 1101 and a processing unit 1102.
  • the transceiving unit may also be referred to as a transceiver, a transceiver, a transceiving device, and so on.
  • the device for implementing the receiving function in the transceiving unit 1101 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiving unit 1101 can be regarded as the sending unit, that is, the transceiving unit 1101 includes a receiving unit and a sending unit.
  • the receiving unit may also be called a receiver, a receiver, a receiving circuit, etc.
  • the sending unit may be called a transmitter, a transmitter, or a transmitting circuit, etc.
  • FIG. 23 is a schematic structural diagram of another terminal device 1200 provided by this application.
  • the terminal device includes a processor 1210, a data sending processor 1220, and a data receiving processor 1230.
  • the processing unit and the processing unit in the foregoing embodiment may be the processor 1210 in FIG. 13 and perform corresponding functions.
  • the transceiving unit in the foregoing embodiment may be the sending data processor 1220 and/or the receiving data processor 1230 in FIG. 23.
  • the channel encoder and the channel decoder are shown in FIG. 23, it can be understood that these modules do not constitute a restrictive description of this embodiment, and are only illustrative.
  • FIG. 24 is a schematic structural diagram of a network device 1300 provided by an embodiment of this application, which may be used to implement the functions of the network device in the foregoing method.
  • the network equipment 1300 includes one or more radio frequency units, such as a remote radio unit (RRU) 1301 and one or more baseband units (BBU) (also referred to as digital units, digital units, DU) 1302.
  • RRU 1301 may be called a transceiver unit, a transceiver, a transceiver circuit, or a transceiver, etc., and it may include at least one antenna 13011 and a radio frequency unit 13012.
  • the RRU 1301 part is mainly used for sending and receiving of radio frequency signals and conversion of radio frequency signals and baseband signals, for example, for sending the signaling messages in the above-mentioned embodiments to terminal equipment.
  • the 1302 part of the BBU is mainly used for baseband processing and control of the base station.
  • the RRU 1301 and the BBU 1302 may be physically set together, or may be physically separated, that is, a distributed base station.
  • the BBU 1302 is the control center of the base station, which can also be called a processing unit, and is mainly used to complete baseband processing functions, such as channel coding, multiplexing, modulation, and spreading.
  • the BBU (processing unit) 1302 may be used to control the base station 130 to execute the operation flow of the network device in the foregoing method embodiment.
  • the BBU 1302 can be composed of one or more single boards, and multiple single boards can jointly support a radio access network of a single access standard (such as an LTE system or a 5G system), and can also support different connections. Enter the standard wireless access network.
  • the BBU 1302 also includes a memory 13021 and a processor 13022.
  • the memory 13021 is used to store necessary instructions and data.
  • the memory 13021 stores the codebook in the above-mentioned embodiment and the like.
  • the processor 13022 is used to control the base station to perform necessary actions, for example, used to control the base station to execute the operation procedure of the network device in the foregoing method embodiment.
  • the memory 13021 and the processor 13022 may serve one or more single boards. In other words, the memory and the processor can be set separately on each board. It can also be that multiple boards share the same memory and processor. In addition, necessary circuits can be provided on each board.
  • SoC system-on-chip
  • all or part of the functions of part 1302 and part 1301 can be realized by SoC technology, for example, a base station function chip Realization, the base station function chip integrates a processor, a memory, an antenna interface and other devices, the program of the base station related functions is stored in the memory, and the processor executes the program to realize the related functions of the base station.
  • the base station function chip can also read a memory external to the chip to implement related functions of the base station.
  • FIG. 24 It should be understood that the structure of the network device illustrated in FIG. 24 is only a possible form, and should not constitute any limitation in the embodiment of the present application. This application does not exclude the possibility of other types of base station structures that may appear in the future.
  • system information includes master information block (MIB), system information block 1 (system information block 1, SIB1), and other system information blocks except SIB1.
  • MIB master information block
  • SIB1 system information block 1
  • SIB1 system information block 1
  • OSI system information block 1
  • the network device can notify the terminal device of the system information change through paging, and the terminal device then reads MIB and SIB1 again, and judges the specific OSI by the valueTag of each SIB of the OSI indicated in SIB1 Which of the SIBs is changed, and then get the corresponding SIB.
  • the terminal device in the radio resource control (Radio resource control, RRC) connection state may work on the bandwidth part (Bandwidth part, BWP) that cannot receive paging, resulting in
  • BWP Bandwidth part
  • the network device cannot notify the terminal device of system information changes in time, and the terminal device cannot update the system information, which causes the system information stored by the terminal device to be out of date, which affects the normal operation of the terminal device.
  • This application provides a method for obtaining system information, which can obtain updated system information when a terminal device cannot receive a page.
  • System information includes master information block (MIB), system information block 1 (system information block 1, SIB1), and other system information blocks except SIB1. Other system information blocks except SIB1 are also called other system information (OSI). MIB and SIB1 are necessary system information, and OSI is non-essential system information. When OSI is transmitted, it is carried on a system information message, and one system information message can carry multiple OSIs.
  • MIB master information block
  • SIB1 system information block 1
  • OSI system information block 1
  • OSI system information block 1
  • OSI system information
  • SI message used to carry SI.
  • SI message can include one SIB or multiple SIBs (not including SIB1).
  • the mapping relationship between SIB and SI messages may be included in SIB1 (for example, in scheduling information).
  • the scheduling information may include the scheduling period (SI-periodicity) and the type of SIB carried (that is, the mapping relationship between SIB and SI messages, etc.).
  • SIB cannot be split and mapped into two different SI messages. For example, one SIB can be carried by one SI message, and the base station broadcasts the SI message, and the SIB can be notified to the terminal device.
  • BWP bandwidth part
  • NR new radio
  • BWP can be a continuous resource in the frequency domain, it can also be called carrier bandwidth part, subband bandwidth, narrowband or narrowband bandwidth, or it can have other names. In this application, for the sake of simplicity, the name is BWP as an example.
  • a BWP includes continuous K (K>0) subcarriers; or, a BWP is a frequency domain resource where N non-overlapping continuous resource blocks (resource blocks, RB) are located, and the subcarrier interval of the RB may be 15KHz, 30KHz, 60KHz, 120KHz, 240KHz, 480KHz or other values; or, a BWP is a frequency domain resource where M non-overlapping contiguous resource block groups (RBG) are located, and an RBG includes P(P> 0) A continuous RB, and the subcarrier spacing (SCS) of the RB may be 15KHz, 30KHz, 60KHz, 120KHz, 240KHz, 480KHz or other values, for example, an integer multiple of 2.
  • a BWP is related to a specific system parameter (numerology), and the system parameter includes a subcarrier interval, a cyclic prefix (CP), or a subcarrier interval and CP. Further, the BWP may also be a non-contiguous multi-segment resource in the frequency domain.
  • BW bandwidth capability of the terminal device
  • carrier bandwidth carrier bandwidth
  • BW bandwidth capability of the terminal device
  • BW carrier bandwidth
  • two BWPs can also be configured for one terminal device, namely BWP1 and BWP2, and the bandwidths of BWP1 and BWP2 can overlap.
  • BWP1 and BWP2 may not overlap.
  • the system parameters of BWP1 and BWP2 may be the same system parameter, or may also be different system parameters.
  • the configuration of the BWP (for example, the configuration of the number, location, and/or system parameters of the BWP) may also be other configurations, which are not limited in the embodiment of the present application.
  • BWP can be divided into two categories, namely Initial BWP and Active BWP.
  • Initial BWP refers to the bandwidth of the location where SIB1 is indicated by the MIB broadcast in the cell-defined synchronization information block (synchronisation signal block, SSB).
  • the UE can obtain SIB1 and other system information (other system information, OSI), and can monitor paging, which is mainly used for terminal equipment to initiate random access.
  • Active BWP is mainly used for data service transmission.
  • the base station will schedule the terminal equipment from the Initial BWP to a BWP with a bandwidth matching its service.
  • Active BWP is configured with Type 0A and Type 2 physical downlink control channels (physical downlink control channel, PDCCH) common search space (CSS).
  • the terminal device can receive paging and OSI on the current Active BWP.
  • SIB1 contains the value of "Value Tag” for each SIB except SIB1 to identify the content version of the SIB. Whenever the content of SIB changes, the value indicated by “ValueTag” will be incremented by 1. Currently, “ValueTag” occupies 5 bits and can indicate 0-31 or 32 values. When the value of "ValueTag” is 31, if the content of the SIB changes later, the value indicated by “ValueTag” will be incremented by 1 and then become 0. When the terminal device stores the SIB, it will also store the value of "ValueTag” in SIB1.
  • the terminal device When the network side notifies the system information that there is a change, the terminal device will receive SIB1 again, then obtain the SIB in SIB1, and compare the value of the newly received SIB1 Whether the value of "ValueTag” is consistent with the value of "ValueTag” of the previous SIB1 is used to determine whether the content of the stored SIB has changed.
  • the terminal device determines that the value of the "ValueTag” of the newly received SIB1 is the same as the value of the previous "ValueTag” of SIB1, it is determined that the content of the SIB in SIB1 has not changed, and the terminal device does not need to reacquire the SIB; On the contrary, if the terminal device determines that the value of the "ValueTag” of the newly received SIB1 is different from the value of the previous "ValueTag” of SIB1, it is determined that the content of the SIB in SIB1 has changed, and the terminal device needs to obtain the value again. SIB.
  • the network device informs the terminal device of the system information change through paging, and the terminal device then reads MIB and SIB1 again, using the valueTag of each SIB in the OSI indicated in SIB1 To determine which SIB has changed, and then to obtain the corresponding SIB, however, the terminal device in the radio resource control (Radio resource control, RRC) connection state may work in the bandwidth part (Bandwidth part, BWP) that cannot receive paging.
  • RRC Radio resource control
  • SIB1 or OSI changes the network device sends the updated SIB1 to all connected terminal devices through dedicated signaling.
  • the content of SIB1 is very large and the number of OSIs is large. Each OSI All changes trigger the sending of SIB1, which will greatly waste communication resources.
  • the present application provides an OSI update method, which can reduce resource consumption and improve network resource utilization.
  • the method is executed by a network device and a terminal device as an example, that is, the first communication device is a terminal device and the second communication device is a network device as an example.
  • the terminal device is in the RRC connected state, and on the active BWP currently working on the terminal device, there is no public search space configured to receive paging and/or system information.
  • the network device sends first indication information to the terminal device, where the first indication information is used to indicate OSI update of other system information, the OSI includes at least one system information block SIB; the first indication information includes at least one SIB The content version valueTag.
  • OSI includes other information blocks except SIB1, including system information blocks such as SIB2 and SIB3.
  • SIBs carry different content and support different functions.
  • SIB2-SIB5 in NR is used to provide information related to cell reselection
  • SIB6-SIB8 is used to provide public warning information
  • SIB9 is used to provide timing information.
  • the terminal device selects and stores the corresponding SIB according to the required function.
  • at least one valueTag of the OSI refers to at least one valueTag of the SIB in the OSI.
  • the description of OSI in this case can refer to all SIBs except SIB1, or one SIB or multiple SIBs except SIB1.
  • the OSI includes SIB2-SIB9 as an example, but this case does not limit the number of SIBs included in the OSI.
  • the first indication information includes the valueTags corresponding to all SIBs in OSI, that is, the valueTags corresponding to SIB2-SIB9. It should be noted that some SIBs in SIB2-SIB9 need to be updated or all SIBs need to be updated here. need to be updated.
  • the first indication information includes valueTags corresponding to some SIBs in the OSI, for example, includes valueTags corresponding to SIB5 and SIB6.
  • Some SIBs may be changed and need to be updated by terminal equipment. For example, SIB5 and SIB6 need to be updated here, and other SIBs except SIB5 and SIB6 do not need to be updated; or some SIBs are targeted at Sent by the terminal device, that is, the terminal device only needs SIB5 and SIB6, and does not need other SIBs.
  • the first indication information may further include identification information of the part of the SIB.
  • the first indication information may also be a bitmap to indicate OSI change information.
  • the bitmap has 8 bits, and the information of each bit corresponds to the change information of SIB2-SIB9.
  • the first digit indicates whether SIB2 has changed
  • the second digit indicates whether SIB3 has changed
  • the bitmap information can be represented by 0 or 1.
  • 0 indicates that the system information block at the corresponding position has not changed
  • 1 indicates that the system information block at the corresponding position has changed.
  • the bitmap information is 01111000, it means that SIB3, SIB4, SIB5, and SIB6 need to be updated.
  • the network device may send the first indication information through RRC dedicated signaling, or may send the first indication information in a broadcast manner.
  • S2602 The terminal device determines the SIB that needs to be updated.
  • the terminal device updates the stored SIB1 according to the first indication information, specifically, the valueTag of the SIB in the stored SIB1 is updated to the valueTag corresponding to the SIB in the first indication information.
  • the terminal device determines whether the SIB needs to be updated according to the valueTag of the OSI carried in the first indication information.
  • the first indication information includes the corresponding valueTags of all SIBs in the OSI, and the terminal device determines whether the stored valueTag of a certain SIB is consistent with the valueTag corresponding to the SIB in the first indication information. If they are inconsistent, the SIB needs to be updated. For example, the terminal device has stored SIB2 and its valueTag before receiving the first indication information, and the value of valueTag is X. If the first indication information indicates that the valueTag of SIB2 is Y, it means that SIB2 needs to be updated, and If the first indication information indicates that the valueTag of SIB2 is still X, it means that the content of SIB2 does not need to be updated.
  • the first indication information includes the valueTag corresponding to a part of the SIB in the OSI, and the terminal device compares the stored valueTag of the SIB with the corresponding valueTag of the SIB in the first indication information. If they are different , It means that the SIB needs to be updated.
  • the first indication information includes the valueTags of SIB4 and SIB5, and the terminal device has stored SIB4 before receiving the first indication information, so the terminal device needs to update SIB4. If the terminal device does not store SIB4 and SIB5 before receiving the first indication information, the terminal device does not need to be updated.
  • S2603 Send a request message to the network device, where the request message is used to request the SIB that needs to be updated
  • the terminal device may request the SIB from the network device, or obtain the updated SIB from other channels, and there is no limitation in this case.
  • the terminal device After obtaining the updated SIB, the terminal device stores the updated SIB and the valueTag corresponding to the SIB in the first indication information together.
  • the terminal device determines whether the previously stored SIB needs to be updated according to the bitmap.
  • the bitmap is 8 bits, and the information of each bit is the same as SIB2. -SIB9 change information correspondence.
  • the first digit indicates whether SIB2 has changed
  • the second digit indicates whether SIB3 has changed
  • the bitmap information can be represented by 0 or 1.
  • 0 indicates that the system information block at the corresponding position has not changed
  • 1 indicates that the system information block at the corresponding position has changed.
  • the bitmap information is 01111000, and the terminal device stores SIB3 and SIB4 before receiving the first indication information.
  • the terminal device needs to update SIB3 and SIB4.
  • the terminal device may request the network device for the SIB that needs to be updated.
  • the processor may be a central processing unit (central processing unit, CPU), and the processor may also be other general-purpose processors, digital signal processors (digital signal processors, DSP), and dedicated integration Circuit (application specific integrated circuit, ASIC), ready-made programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the memory in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • Access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory Take memory (synchlink DRAM, SLDRAM) and direct memory bus random access memory (direct rambus RAM, DR RAM).
  • the foregoing embodiments may be implemented in whole or in part by software, hardware, firmware or any other combination.
  • the above-mentioned embodiments may be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions or computer programs.
  • the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instruction may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instruction may be transmitted from a website, a computer, a server, or a data center through a cable (For example, infrared, wireless, microwave, etc.) to transmit to another website, computer, server or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center that includes one or more sets of available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium.
  • the semiconductor medium may be a solid state drive.
  • An embodiment of the present application also provides a communication system, which includes: the above-mentioned terminal device and the above-mentioned network device.
  • the embodiment of the present application also provides a computer-readable medium for storing computer program code, and the computer program includes instructions for executing the data security processing method of the foregoing method 200 to method 400 in the embodiment of the present application.
  • the readable medium may be a read-only memory (ROM) or a random access memory (RAM), which is not limited in the embodiment of the present application.
  • the computer program product includes instructions. When the instructions are executed, the terminal device and the network device respectively perform the operations of the first device and the second device corresponding to the foregoing method.
  • An embodiment of the present application also provides a system chip, which includes a processing unit and a communication unit.
  • the processing unit may be, for example, a processor, and the communication unit may be, for example, an input/output interface, a pin, or a circuit.
  • the processing unit can execute computer instructions so that the chip in the communication device executes any of the methods for data security processing provided in the foregoing embodiments of the present application.
  • any communication device provided in the foregoing embodiments of the present application may include the system chip.
  • the computer instructions are stored in a storage unit.
  • the storage unit is a storage unit in the chip, such as a register, a cache, etc.
  • the storage unit can also be a storage unit in the terminal located outside the chip, such as a ROM or other storage units that can store static information and instructions.
  • static storage devices RAM, etc.
  • the processor mentioned in any one of the above can be a CPU, a microprocessor, an ASIC, or one or more integrated circuits used to control the program execution of the above-mentioned data security processing method.
  • the processing unit and the storage unit can be decoupled, respectively set on different physical devices, and connected in a wired or wireless manner to realize the respective functions of the processing unit and the storage unit, so as to support the system chip to implement the above-mentioned embodiments Various functions in.
  • the processing unit and the memory may also be coupled to the same device.
  • the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • Access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory Take memory (synchlink DRAM, SLDRAM) and direct memory bus random access memory (direct rambus RAM, DR RAM).
  • system and "network” in this article are often used interchangeably in this article.
  • and/or in this article is only an association relationship describing the associated objects, which means that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, exist alone B these three situations.
  • the character "/" in this text generally indicates that the associated objects before and after are in an "or” relationship.
  • uplink and downlink appearing in this application are used to describe the direction of data/information transmission in a specific scenario.
  • the "uplink” direction generally refers to the direction or distribution of data/information from the terminal to the network side.
  • the “downlink” direction generally refers to the direction in which data/information is transmitted from the network side to the terminal, or the direction in which the centralized unit transmits to the distributed unit.
  • uplink and downlink “It is only used to describe the direction of data/information transmission, and the specific start and end equipment of the data/information transmission is not limited.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the unit is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), and random access.

Abstract

The present application provides a data safety processing method and a communication apparatus. The method comprises: determining a first transmission mode of first data, the first transmission mode being at least one of a unicast transmission mode, a multicast transmission mode, or a unicast and multicast transmission mode; and determining a safety processing mode for the first data according to the first transmission mode. According to the method provided in the present application, one PDCP is associated with one or more RLC entities, the transmission mode corresponding to one RLC entity is the unicast or multicast transmission mode, and the plurality of RLC entities comprise RLC entities corresponding to the unicast transmission mode and the multicast transmission mode. During data transmission, according to different data transmission modes in the same radio bearer, corresponding safety processing is performed on the data. The safety of data transmission is improved, and by implementing different safety processing processes in the same bearer, safety requirements of data under different transmission modes are satisfied, and the flexibility of safety processing is improved.

Description

数据安全处理的方法和通信装置Method and communication device for data safety processing 技术领域Technical field
本申请涉及通信领域,更为具体的,涉及一种数据安全处理的方法和通信装置。This application relates to the field of communications, and more specifically, to a method and communication device for data security processing.
背景技术Background technique
进行无线通信的设备(例如网络设备和终端设备)具有一定的协议栈结构。该协议栈可以包括无线资源控制(radio resource control,RRC)层、分组数据汇聚协议(packet data convergence protocol,PDCP)层、无线链路控制(radio link control,RLC)层、媒体接入控制(media access control,MAC)层和物理层(physics,PHY)等协议层。每个层都有相应的功能实体来执行相应的功能,例如,PDCP层对应PDCP实体,RLC层对应RLC实体等。在网络设备和终端设备之间进行数据传输时,数据需要依次经过网络设备和终端设备上的各协议层并在各个层进行相应的处理。Devices that perform wireless communication (such as network devices and terminal devices) have a certain protocol stack structure. The protocol stack may include radio resource control (RRC) layer, packet data convergence protocol (PDCP) layer, radio link control (RLC) layer, media access control (media Access control, MAC) layer and physical layer (physics, PHY) and other protocol layers. Each layer has corresponding functional entities to perform corresponding functions, for example, the PDCP layer corresponds to the PDCP entity, and the RLC layer corresponds to the RLC entity. When data is transmitted between a network device and a terminal device, the data needs to pass through the various protocol layers on the network device and the terminal device in turn, and perform corresponding processing at each layer.
多播传输技术,是指网络设备发送数据,多个终端设备同时对该数据进行接收的技术,即点对多点传输。单播传输技术(或者称为单播传输方式),是指网络设备发送数据,只有一个终端设备对该数据进行接收的技术,即点对点传输。Multicast transmission technology refers to a technology in which a network device sends data and multiple terminal devices simultaneously receive the data, that is, point-to-multipoint transmission. Unicast transmission technology (or called unicast transmission mode) refers to a technology in which a network device sends data and only one terminal device receives the data, that is, point-to-point transmission.
在现有技术中,当网络设备和终端设备之间利用多播传输方式传输数据时,网络设备和终端设备均不会对多播数据进行安全处理。因此,在多播数据的传输过程中可能会引发安全问题,导致该多播数据被篡改或者窃听,影响用户体验。In the prior art, when data is transmitted between a network device and a terminal device in a multicast transmission manner, neither the network device nor the terminal device will perform secure processing on the multicast data. Therefore, during the transmission of the multicast data, security problems may be caused, which may result in tampering or eavesdropping of the multicast data, which affects the user experience.
发明内容Summary of the invention
本申请提供了一种数据安全处理的方法和通信装置。通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式,多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。在进行数据传输时,可以采用单播传输方式、多播传输方式、或者单播和多播传输方式进行数据的传输。并且,在判断同一无线承载内数据采用的传输方式后,根据不同的传输方式,对数据进行相应的安全处理。一方面提高了数据传输的安全性。另一方面,通过在同一个承载内实现不同的安全处理过程,可以满足不同传输方式下的数据各自的安全需求,提高安全处理的灵活性。This application provides a method and communication device for data security processing. Associate one or more RLC entities by configuring a PDCP. The transmission mode corresponding to one RLC entity is a unicast transmission mode or a multicast transmission mode, and the multiple RLC entities include the RLC entity corresponding to the unicast transmission mode and the RLC entity in the multicast transmission mode. During data transmission, unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission. Moreover, after judging the transmission mode adopted for the data in the same radio bearer, corresponding security processing is performed on the data according to different transmission modes. On the one hand, the security of data transmission is improved. On the other hand, by implementing different security processing procedures in the same bearer, the respective security requirements of data under different transmission modes can be met, and the flexibility of security processing can be improved.
第一方面,提供了一种数据安全处理的方法,该方法的执行主体既可以是第一装置或者第二装置,也可以是应用于第一装置或者第二装置中的芯片。可选的,第一装置可以为网络设备,第二装置可以为终端设备。第一装置和第二装置的协议栈中,一个PDCP实体均关联一个或者多个RLC实体。一个RLC实体的传输方式为单播传输方式或者多播传输方式,多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。该方法包括:确定第一数据的第一传输方式,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,该单播和多播传输方式为使用单播和多播 进行传输的传输方式;根据第一传输方式,确定对该第一数据的安全处理方式。In the first aspect, a method for data security processing is provided. The execution subject of the method can be either the first device or the second device, or a chip applied in the first device or the second device. Optionally, the first device may be a network device, and the second device may be a terminal device. In the protocol stacks of the first device and the second device, one PDCP entity is associated with one or more RLC entities. The transmission mode of one RLC entity is a unicast transmission mode or a multicast transmission mode, and the multiple RLC entities include the RLC entity corresponding to the unicast transmission mode and the RLC entity in the multicast transmission mode. The method includes: determining a first transmission mode of first data, the first transmission mode being at least one of a unicast transmission mode, a multicast transmission mode, or a unicast and a multicast transmission mode, the unicast and multicast transmission The mode is a transmission mode using unicast and multicast transmission; according to the first transmission mode, a safe processing mode for the first data is determined.
第一方面提供的数据安全处理的方法,通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。在进行数据传输的时,可以采用单播传输方式、多播传输方式、或者单播和多播传输方式进行数据的传输。并且,根据不用的传输方式,对数据进行相应的安全处理。一方面提高了数据传输的安全性。另一方面,能够实现同一个承载内不同的安全处理过程,满足不同传输方式下的数据的安全需求,提高通信效率。In the method for data security processing provided by the first aspect, one or more RLC entities are associated with one PDCP configuration. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode. During data transmission, unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission. And, according to the unused transmission method, the corresponding security processing of the data is carried out. On the one hand, the security of data transmission is improved. On the other hand, different security processing procedures within the same bearer can be realized, meeting the security requirements of data in different transmission modes, and improving communication efficiency.
在第一方面一种可能的实现方式中,当该第一传输方式为单播传输方式时,该第一数据的安全处理方式为第一安全处理;或,In a possible implementation of the first aspect, when the first transmission mode is a unicast transmission mode, the secure processing mode of the first data is the first secure processing; or,
当该第一传输方式为多播传输方式时,该第一数据的安全处理方式为第二安全处理;或,When the first transmission mode is a multicast transmission mode, the secure processing mode of the first data is the second secure processing; or,
当该第一传输方式为单播和多播传输方式时,该第一数据的安全处理方式为第一安全处理,第二数据的安全处理方式为第二安全处理,该第二数据为通过复制该第一数据得到的。When the first transmission method is unicast or multicast transmission, the secure processing method of the first data is the first secure processing, the secure processing method of the second data is the second secure processing, and the second data is copied This first data is obtained.
在第一方面一种可能的实现方式中,该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护。该第二安全处理为不进行安全处理。In a possible implementation of the first aspect, the first security processing includes using the first parameter and/or the first algorithm to encrypt and/or integrity protect the data. The second security process is no security process.
在第一方面一种可能的实现方式中,该第一安全处理包括利用第三参数和/或第三算法对数据进行加密和/或完整性保护。该第二安全处理为不进行安全处理。In a possible implementation of the first aspect, the first security processing includes using a third parameter and/or a third algorithm to encrypt data and/or integrity protection. The second security process is no security process.
在第一方面一种可能的实现方式中,该第一安全处理为不进行安全处理。该第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护。In a possible implementation manner of the first aspect, the first security processing is no security processing. The second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protect the data.
在第一方面一种可能的实现方式中,该第一安全处理为不进行安全处理。该第二安全处理包括利用第四参数和/或第四算法对数据进行加密和/或完整性保护。In a possible implementation manner of the first aspect, the first security processing is no security processing. The second security processing includes using a fourth parameter and/or a fourth algorithm to encrypt data and/or integrity protection.
在第一方面一种可能的实现方式中,该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护,或者,该第一安全处理包括利用第三参数和/或第三算法对数据进行解密和/或完整性验证。In a possible implementation of the first aspect, the first security processing includes using a first parameter and/or a first algorithm to encrypt and/or integrity protection data, or the first security processing includes using a third The parameters and/or the third algorithm perform decryption and/or integrity verification on the data.
该第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护,或者,该第二安全处理包括利用第四参数和/或第四算法对数据进行解密和/或完整性验证。The second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protection of the data, or the second security processing includes using the fourth parameter and/or the fourth algorithm to decrypt the data and / Or integrity verification.
该第一参数和该第二参数相同或者不同,该第一算法和该第二算法相同或者不同,或者。该第三参数和该第四参数相同或者不同,该第三算法和该第四算法相同或者不同。The first parameter and the second parameter are the same or different, the first algorithm and the second algorithm are the same or different, or. The third parameter and the fourth parameter are the same or different, and the third algorithm and the fourth algorithm are the same or different.
在第一方面一种可能的实现方式中,该第一参数包括第一秘钥,和/或,该第二参数包括第二秘钥;或,该第三参数包括第三秘钥,和/或,该第四参数包括第四秘钥。In a possible implementation of the first aspect, the first parameter includes a first secret key, and/or the second parameter includes a second secret key; or, the third parameter includes a third secret key, and/ Or, the fourth parameter includes a fourth secret key.
在第一方面一种可能的实现方式中,第一安全处理可以为利用第一参数和/或第一算法对数据进行加密,或者,第一安全处理可以为利用第一参数和/或第一算法对数据进行完整性保护,或者,第一安全处理可以为利用第一算法对数据进行加密以及利用第一参数对数据进行完整性保护。In a possible implementation of the first aspect, the first security processing may be to use the first parameter and/or the first algorithm to encrypt data, or the first security processing may be to use the first parameter and/or the first algorithm. The algorithm performs integrity protection on the data, or, the first security processing may include using the first algorithm to encrypt the data and using the first parameter to perform integrity protection on the data.
在第一方面一种可能的实现方式中,第二安全处理可以为利用第二参数和/或第二算法对数据进行加密,或者,第二安全处理可以为利用第二参数和/或第二算法对数据进行完整性保护,或者,第二安全处理可以为利用第二算法对数据进行加密以及利用第二参数 对数据进行完整性保护。In a possible implementation of the first aspect, the second security processing may be using the second parameter and/or the second algorithm to encrypt data, or the second security processing may be using the second parameter and/or the second algorithm. The algorithm performs integrity protection on the data, or the second security processing may be to use the second algorithm to encrypt the data and use the second parameter to perform integrity protection on the data.
在第一方面一种可能的实现方式中,第三安全处理可以为利用第三参数和/或第三算法对数据进行解密,或者,第一安全处理可以为利用第三参数和/或第三算法对数据进行完整性验证,或者,第三安全处理可以为利用第三算法对数据进行解密以及利用第三参数对数据进行完整性验证。In a possible implementation of the first aspect, the third security processing may be to use the third parameter and/or the third algorithm to decrypt the data, or the first security processing may be to use the third parameter and/or the third algorithm to decrypt the data. The algorithm verifies the integrity of the data, or the third security process may be to decrypt the data using the third algorithm and use the third parameter to verify the integrity of the data.
在第一方面一种可能的实现方式中,第四安全处理可以为利用第四参数和/或第四算法对数据进行解密,或者,第四安全处理可以为利用第四参数和/或第四算法对数据进行完整性验证,或者,第四安全处理可以为利用第四算法对数据进行解密以及利用第四参数对数据进行完整性验证。In a possible implementation of the first aspect, the fourth security processing may be using the fourth parameter and/or the fourth algorithm to decrypt data, or the fourth security processing may be using the fourth parameter and/or the fourth algorithm. The algorithm verifies the integrity of the data, or the fourth security process may be to decrypt the data using the fourth algorithm and use the fourth parameter to verify the integrity of the data.
在第一方面一种可能的实现方式中,不进行安全处理可以理解为不对数据进行解密和/或完整性验证,但是采用其他的方式对数据进行处理。或者,不进行安全处理可以为对数据不进行任何的安全处理。In a possible implementation of the first aspect, not performing security processing can be understood as not performing decryption and/or integrity verification on the data, but using other methods to process the data. Or, not performing security processing can mean not performing any security processing on the data.
第二方面,提供了一种数据安全处理的方法,该方法的执行主体既可以是第一装置,也可以是应用于第一装置中的芯片。可选的,第一装置可以为网络设备,第一装置的协议栈中,一个PDCP实体关联一个或者多个RLC实体。一个RLC实体的传输方式为单播传输方式或者多播传输方式,多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。该方法包括:对第一数据进行第一安全处理;对第二数据进行第二安全处理,该第二数据为通过复制该第一数据得到的;根据数据的第一传输方式,发送经过该第一安全处理后的该第一数据,和/或,发送经过该第二安全处理后的该第二数据,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,该单播和多播传输方式为使用单播和多播进行传输的传输方式。In the second aspect, a method for data security processing is provided. The execution subject of the method can be either a first device or a chip applied to the first device. Optionally, the first device may be a network device, and in the protocol stack of the first device, one PDCP entity is associated with one or more RLC entities. The transmission mode of one RLC entity is a unicast transmission mode or a multicast transmission mode, and the multiple RLC entities include the RLC entity corresponding to the unicast transmission mode and the RLC entity in the multicast transmission mode. The method includes: performing a first security process on the first data; performing a second security process on the second data, the second data being obtained by copying the first data; and sending through the first data according to the first transmission mode of the data. The first data after a security process, and/or the second data after the second security process is sent, the first transmission mode is a unicast transmission mode, a multicast transmission mode, or unicast and multicast At least one of the transmission modes, and the unicast and multicast transmission modes are transmission modes that use unicast and multicast for transmission.
第二方面提供的数据安全处理的方法,通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。在进行数据传输的时,对该数据所有可能的传输方式分别进行对应安全处理过程,将安全处理后的多份数据分别递交相应传输方式的RLC实体,最终通过RLC实体确定数据采用的传输方式,利用确定的传输方式发送数据。提高了数据传输的安全性。并且,能够实现同一个承载内不同的安全处理过程,满足不同传输方式下的数据的安全需求,提高通信效率。In the method for data security processing provided by the second aspect, one or more RLC entities are associated with one PDCP configuration. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode. When performing data transmission, all possible transmission methods of the data are respectively subjected to corresponding security processing procedures, and multiple copies of the data after the security processing are respectively submitted to the RLC entity of the corresponding transmission method, and finally the RLC entity determines the transmission method used for the data. Use a certain transmission method to send data. Improve the security of data transmission. In addition, different security processing procedures in the same bearer can be realized, meeting the security requirements of data in different transmission modes, and improving communication efficiency.
在第二方面一种可能的实现方式中,根据数据的第一传输方式,发送经过该第一安全处理后的该第一数据,和/或,发送经过该第二安全处理后的该第二数据,包括:In a possible implementation manner of the second aspect, according to the first data transmission mode, the first data after the first security processing is sent, and/or the second data after the second security processing is sent Data, including:
当该第一传输方式为单播传输方式时,发送经过该第一安全处理后的该第一数据;When the first transmission mode is a unicast transmission mode, sending the first data after the first security processing;
当该第一传输方式为多播传输方式时,发送经过该第二安全处理后的该第二数据;When the first transmission mode is a multicast transmission mode, sending the second data after the second security processing;
当该第一数据传输方式为单播和多播传输方式时,发送经过该第一安全处理后的该第一数据以及经过该第二安全处理后的该第二数据。When the first data transmission mode is a unicast or a multicast transmission mode, the first data after the first security processing and the second data after the second security processing are sent.
在第二方面一种可能的实现方式中,该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护;该第二安全处理为不进行安全处理。In a possible implementation of the second aspect, the first security processing includes using the first parameter and/or the first algorithm to encrypt data and/or integrity protection; the second security processing is not performing security processing.
在第二方面一种可能的实现方式中,该第一安全处理为不进行安全处理;该第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护。In a possible implementation of the second aspect, the first security processing is not performing security processing; the second security processing includes using a second parameter and/or a second algorithm to encrypt and/or integrity protect data.
在第二方面一种可能的实现方式中,该第一安全处理包括利用第一参数和/或第一算 法对数据进行加密和/或完整性保护;该第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护;该第一参数和该第二参数相同或者不同,该第一算法和该第二算法相同或者不同。In a possible implementation of the second aspect, the first security processing includes using a first parameter and/or a first algorithm to encrypt and/or integrity protection; the second security processing includes using a second parameter and /Or the second algorithm performs encryption and/or integrity protection on the data; the first parameter and the second parameter are the same or different, and the first algorithm and the second algorithm are the same or different.
在第二方面一种可能的实现方式中,该第一参数包括第一秘钥,和/或,该第二参数包括第二秘钥。In a possible implementation manner of the second aspect, the first parameter includes a first secret key, and/or, the second parameter includes a second secret key.
第三方面,提供了一种数据安全处理的方法,该方法的执行主体既可以是第一装置,也可以是应用于第一装置中的芯片。可选的,第一装置可以为网络设备,第一装置的协议栈中一个PDCP实体关联一个或者多个RLC实体。一个RLC实体的传输方式为单播传输方式或者多播传输方式,多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。该方法包括:对第一数据进行第一安全处理;确定经过该第一安全处理后的该第一数据的第一传输方式,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,该单播和多播传输方式为使用单播和多播进行传输的传输方式;当该第一传输方式为单播传输方式,利用该单播传输方式发送经过该第一安全处理后的该第一数据;当该第一传输方式为多播传输方式,利用该多播传输方式发送经过该第一安全处理后的该第一数据;当该第一传输方式为单播和多播传输方式,利用该单播传输方式发送经过该第一安全处理后的该第一数据,利用该多播传输方式发送第三数据,该第三数据为通过复制经过该第一安全处理后的该第一数据得到的。In a third aspect, a method for data security processing is provided. The execution subject of the method can be either a first device or a chip applied to the first device. Optionally, the first device may be a network device, and one PDCP entity in the protocol stack of the first device is associated with one or more RLC entities. The transmission mode of one RLC entity is a unicast transmission mode or a multicast transmission mode, and the multiple RLC entities include the RLC entity corresponding to the unicast transmission mode and the RLC entity in the multicast transmission mode. The method includes: performing first security processing on first data; determining a first transmission mode of the first data after the first security processing, where the first transmission mode is a unicast transmission mode, a multicast transmission mode, or At least one of unicast and multicast transmission methods, the unicast and multicast transmission methods are transmission methods that use unicast and multicast; when the first transmission method is unicast transmission, use the unicast transmission The first data after the first security processing is sent in a method; when the first transmission method is a multicast transmission method, the first data after the first security processing is sent using the multicast transmission method; when the first transmission method is One transmission mode is unicast and multicast transmission. The unicast transmission mode is used to send the first data after the first security processing, and the multicast transmission mode is used to send the third data. The third data is copied Obtained from the first data after the first security processing.
第三方面提供的数据安全处理的方法,通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。通在进行数据传输的时,可以采用单播传输方式、多播传输方式、或者单播和多播传输方式进行数据的传输。并且,由于单播传输方式和多播传输方式对应的安全处理方式是相同的。第一装置先将数据进行安全处理,然后根据数据不用的传输方式,发送经过安全处理后的数据。提高了数据传输的安全性。能够实现同一个承载内数据安全处理过程,满足不同传输方式下的数据的安全需求,提高通信效率。The method for data security processing provided by the third aspect associates one or more RLC entities by configuring a PDCP. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode. During data transmission, unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission. In addition, the security processing methods corresponding to the unicast transmission mode and the multicast transmission mode are the same. The first device first processes the data securely, and then sends the securely processed data according to the unused transmission mode of the data. Improve the security of data transmission. It can realize the data security processing process in the same bearer, meet the security requirements of data under different transmission modes, and improve communication efficiency.
在第三方面一种可能的实现方式中,该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护;或者,该第一安全处理为不进行安全处理。In a possible implementation of the third aspect, the first security processing includes using the first parameter and/or the first algorithm to encrypt data and/or integrity protection; or, the first security processing is not performing security deal with.
在第三方面一种可能的实现方式中,该第一参数包括第一秘钥。In a possible implementation manner of the third aspect, the first parameter includes a first secret key.
应该理解的是,在本申请的各个方面提供的数据安全处理方法中,传单播传输方式、多播传输方式、单播和多播传输方式均针对同一个无线承载而言,可以理解为一个无线承载支持不同的传输方式,或者一个承载中的数据可以使用不同的传输方式进行传输。这个无线承载可以是现有的无线承载,也可以是一种新的类型的无线承载。It should be understood that in the data security processing methods provided in various aspects of this application, the leaflet broadcast transmission mode, the multicast transmission mode, the unicast and the multicast transmission modes are all for the same radio bearer, and can be understood as a radio The bearer supports different transmission methods, or the data in a bearer can be transmitted using different transmission methods. This radio bearer can be an existing radio bearer or a new type of radio bearer.
第四方面,提供了一种通信装置,该通信装置可以为网络设备或者终端设备,该通信装置协议栈中一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。该通信装置包括:In a fourth aspect, a communication device is provided. The communication device may be a network device or a terminal device. One PDCP in the protocol stack of the communication device is associated with one or more RLC entities. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The communication device includes:
处理单元,用于确定第一数据的第一传输方式,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,该单播和多播传输方式为使用单播和多播进行传输的传输方式。该处理单元,还用于根据第一传输方式,确定对该第一数据的安全处理方式。The processing unit is configured to determine a first transmission mode of the first data, where the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast and a multicast transmission mode, the unicast and multicast transmissions The transmission method is a transmission method that uses unicast and multicast. The processing unit is further configured to determine a safe processing method for the first data according to the first transmission method.
第四方面提供的通信装置,通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。在进行数据传输的时,可以采用单播传输方式、多播传输方式、或者单播和多播传输方式进行数据的传输。并且,根据不用的传输方式,对数据进行相应的安全处理。一方面提高了数据传输的安全性。另一方面,能够实现同一个承载内不同的安全处理过程,满足不同传输方式下的数据的安全需求,提高通信效率。The communication device provided in the fourth aspect associates one or more RLC entities by configuring one PDCP. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode. During data transmission, unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission. And, according to the unused transmission method, the data is processed safely. On the one hand, the security of data transmission is improved. On the other hand, different security processing procedures within the same bearer can be realized, meeting the security requirements of data in different transmission modes, and improving communication efficiency.
在第四方面一种可能的实现方式中,当该第一传输方式为单播传输方式时,该处理单元确定该第一数据的安全处理方式为第一安全处理;或In a possible implementation manner of the fourth aspect, when the first transmission mode is a unicast transmission mode, the processing unit determines that the secure processing mode of the first data is the first secure processing; or
当该第一传输方式为多播传输方式时,该处理单元确定该第一数据的安全处理方式为第二安全处理;或,When the first transmission mode is a multicast transmission mode, the processing unit determines that the secure processing mode of the first data is the second secure processing; or,
当该第一传输方式为单播和多播传输方式时,该处理单元确定该第一数据的安全处理方式为第一安全处理,第二数据的安全处理方式为第二安全处理,该第二数据为通过复制该第一数据得到的。When the first transmission mode is unicast or multicast transmission, the processing unit determines that the security processing mode of the first data is the first security processing, and the security processing mode of the second data is the second security processing, and the second security processing mode is the second security processing mode. The data is obtained by copying the first data.
在第四方面一种可能的实现方式中,该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护。该第二安全处理为不进行安全处理。In a possible implementation manner of the fourth aspect, the first security processing includes using the first parameter and/or the first algorithm to encrypt and/or integrity protect the data. The second security process is no security process.
在第四方面一种可能的实现方式中,该第一安全处理包括利用第三参数和/或第三算法对数据进行加密和/或完整性保护。该第二安全处理为不进行安全处理。In a possible implementation manner of the fourth aspect, the first security processing includes using a third parameter and/or a third algorithm to encrypt data and/or integrity protection. The second security process is no security process.
在第四方面一种可能的实现方式中,该第一安全处理为不进行安全处理。该第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护。In a possible implementation manner of the fourth aspect, the first security processing is no security processing. The second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protect the data.
在第四方面一种可能的实现方式中,该第一安全处理为不进行安全处理。该第二安全处理包括利用第四参数和/或第四算法对数据进行加密和/或完整性保护。In a possible implementation manner of the fourth aspect, the first security processing is no security processing. The second security processing includes using a fourth parameter and/or a fourth algorithm to encrypt data and/or integrity protection.
在第四方面一种可能的实现方式中,该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护,或者,该第一安全处理包括利用第三参数和/或第三算法对数据进行解密和/或完整性验证;In a possible implementation of the fourth aspect, the first security processing includes using a first parameter and/or a first algorithm to encrypt and/or integrity protection data, or the first security processing includes using a third Parameter and/or third algorithm to decrypt and/or integrity verification of data;
该第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护,或者,该第二安全处理包括利用第四参数和/或第四算法对数据进行解密和/或完整性验证。The second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protection of the data, or the second security processing includes using the fourth parameter and/or the fourth algorithm to decrypt the data and / Or integrity verification.
该第一参数和该第二参数相同或者不同,该第一算法和该第二算法相同或者不同,或者,该第三参数和该第四参数相同或者不同,该第三算法和该第四算法相同或者不同。The first parameter and the second parameter are the same or different, the first algorithm and the second algorithm are the same or different, or the third parameter and the fourth parameter are the same or different, the third algorithm and the fourth algorithm Same or different.
在第四方面一种可能的实现方式中,该第一参数包括第一秘钥,和/或,该第二参数包括第二秘钥;或,述第三参数包括第三秘钥,和/或,该第四参数包括第四秘钥。In a possible implementation of the fourth aspect, the first parameter includes a first secret key, and/or the second parameter includes a second secret key; or, the third parameter includes a third secret key, and/ Or, the fourth parameter includes a fourth secret key.
第五方面,提供了一种通信装置,该通信装置可以为网络设备,该通信装置协议栈中一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。该通信装置包括:In a fifth aspect, a communication device is provided. The communication device may be a network device. One PDCP in the protocol stack of the communication device is associated with one or more RLC entities. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The communication device includes:
处理单元,用于对第一数据进行第一安全处理。The processing unit is configured to perform first security processing on the first data.
该处理单元,还用于对第二数据进行第二安全处理,该第二数据为通过复制该第一数据得到的。The processing unit is further configured to perform second security processing on the second data, the second data being obtained by copying the first data.
收发单元,用于根据数据的第一传输方式,发送经过该第一安全处理后的该第一数据,和/或,发送经过该第二安全处理后的该第二数据,该第一传输方式为单播传输方式、多 播传输方式、或者单播和多播传输方式中的至少一个,该单播和多播传输方式为使用单播和多播进行传输的传输方式。The transceiver unit is configured to send the first data after the first security processing and/or send the second data after the second security processing according to the first transmission mode of the data, the first transmission mode It is at least one of a unicast transmission method, a multicast transmission method, or a unicast and a multicast transmission method, and the unicast and multicast transmission methods are transmission methods that use unicast and multicast for transmission.
第五方面提供的通信装置,通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。在进行数据传输的时,对该数据所有可能的传输方式分别进行对应安全处理过程,将安全处理后的多份数据分别递交相应传输方式的RLC实体,最终通过RLC实体确定数据采用的传输方式,利用确定的传输方式发送数据。提高了数据传输的安全性。并且,能够实现同一个承载内不同的安全处理过程,满足不同传输方式下的数据的安全需求,提高通信效率。The communication device provided in the fifth aspect associates one or more RLC entities by configuring one PDCP. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode. When performing data transmission, all possible transmission methods of the data are respectively subjected to corresponding security processing procedures, and multiple copies of the data after the security processing are respectively submitted to the RLC entity of the corresponding transmission method, and finally the RLC entity determines the transmission method used for the data. Use a certain transmission method to send data. Improve the security of data transmission. In addition, different security processing procedures in the same bearer can be realized, meeting the security requirements of data in different transmission modes, and improving communication efficiency.
在第五方面一种可能的实现方式中,该收发单元,还用于;In a possible implementation manner of the fifth aspect, the transceiver unit is also used for;
当该第一传输方式为单播传输方式时,发送经过该第一安全处理后的该第一数据;When the first transmission mode is a unicast transmission mode, sending the first data after the first security processing;
当该第一传输方式为多播传输方式时,发送经过该第二安全处理后的该第二数据;When the first transmission mode is a multicast transmission mode, sending the second data after the second security processing;
当该第一数据传输方式为单播和多播传输方式时,发送经过该第一安全处理后的该第一数据以及经过该第二安全处理后的该第二数据。When the first data transmission mode is a unicast or a multicast transmission mode, the first data after the first security processing and the second data after the second security processing are sent.
在第五方面一种可能的实现方式中,该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护。该第二安全处理为不进行安全处理。In a possible implementation manner of the fifth aspect, the first security processing includes using the first parameter and/or the first algorithm to encrypt and/or integrity protect the data. The second security process is no security process.
在第五方面一种可能的实现方式中,该第一安全处理为不进行安全处理。该第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护。In a possible implementation manner of the fifth aspect, the first security processing is no security processing. The second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protect the data.
在第五方面一种可能的实现方式中,该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护。该第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护。该第一参数和该第二参数相同或者不同,该第一算法和该第二算法相同或者不同。In a possible implementation manner of the fifth aspect, the first security processing includes using the first parameter and/or the first algorithm to encrypt and/or integrity protect the data. The second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protect the data. The first parameter and the second parameter are the same or different, and the first algorithm and the second algorithm are the same or different.
在第五方面一种可能的实现方式中,该第一参数包括第一秘钥,和/或,该第二参数包括第二秘钥。In a possible implementation manner of the fifth aspect, the first parameter includes a first secret key, and/or, the second parameter includes a second secret key.
第六方面,提供了一种通信装置,该通信装置可以为网络设备,该通信装置协议栈中一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。该通信装置包括:In a sixth aspect, a communication device is provided. The communication device may be a network device, and one PDCP in the protocol stack of the communication device is associated with one or more RLC entities. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The communication device includes:
处理单元,用于对第一数据进行第一安全处理。该处理单元,还用于确定经过该第一安全处理后的该第一数据的第一传输方式,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,该单播和多播传输方式为使用单播和多播进行传输的传输方式。The processing unit is configured to perform first security processing on the first data. The processing unit is further configured to determine a first transmission mode of the first data after the first security processing, where the first transmission mode is a unicast transmission mode, a multicast transmission mode, or a unicast and multicast transmission mode At least one of the unicast and multicast transmission modes is a transmission mode using unicast and multicast for transmission.
收发单元,用于当该第一传输方式为单播传输方式,利用该单播传输方式发送经过该第一安全处理后的该第一数据。该收发单元,还用于当该第一传输方式为多播传输方式,利用该多播传输方式发送经过该第一安全处理后的该第一数据。The transceiver unit is configured to use the unicast transmission mode to send the first data after the first security processing when the first transmission mode is a unicast transmission mode. The transceiver unit is further configured to use the multicast transmission mode to send the first data after the first security processing when the first transmission mode is a multicast transmission mode.
该收发单元,还用于当该第一传输方式为单播和多播传输方式,利用该单播传输方式发送经过该第一安全处理后的该第一数据,利用该多播传输方式发送第三数据,该第三数据为通过复制经过该第一安全处理后的该第一数据得到的。The transceiver unit is further configured to use the unicast transmission mode to send the first data after the first security processing, and use the multicast transmission mode to send the first data. Three data, the third data is obtained by copying the first data after the first security processing.
第六方面提供通信装置,通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。多个RLC实体包括对应单播传 输方式的RLC实体和多播传输方式的RLC实体。通在进行数据传输的时,可以采用单播传输方式、多播传输方式、或者单播和多播传输方式进行数据的传输。并且,由于单播传输方式和多播传输方式对应的安全处理方式是相同的。第一装置先将数据进行安全处理,然后根据数据不用的传输方式,发送经过安全处理后的数据。提高了数据传输的安全性。能够实现同一个承载内数据安全处理过程,满足不同传输方式下的数据的安全需求,提高通信效率。A sixth aspect provides a communication device, which associates one or more RLC entities by configuring a PDCP. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The multiple RLC entities include the RLC entity corresponding to the unicast transmission mode and the RLC entity corresponding to the multicast transmission mode. During data transmission, unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission. In addition, the security processing methods corresponding to the unicast transmission mode and the multicast transmission mode are the same. The first device first processes the data securely, and then sends the securely processed data according to the unused transmission mode of the data. Improve the security of data transmission. It can realize the data security processing process in the same bearer, meet the security requirements of data under different transmission modes, and improve communication efficiency.
在第六方面一种可能的实现方式中,该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护;或者,该第一安全处理为不进行安全处理。In a possible implementation of the sixth aspect, the first security processing includes encrypting and/or integrity protection using the first parameter and/or the first algorithm; or, the first security processing is not performing security deal with.
在第六方面一种可能的实现方式中,该第一参数包括第一秘钥。In a possible implementation manner of the sixth aspect, the first parameter includes a first secret key.
第七方面,提供了一种通信装置,该装置包括至少一个处理器和存储器,该至少一个处理器用于执行以上第一方面或第一方面的任意可能的实现方式中的方法。In a seventh aspect, a communication device is provided, the device includes at least one processor and a memory, and the at least one processor is configured to execute the above first aspect or the method in any possible implementation manner of the first aspect.
第八方面,提供了一种通信装置,该装置包括至少一个处理器和存储器,该至少一个处理器用于执行以上第一方面至第三方面,或者第一方面至第三方面中的任意可能的实现方式中的方法。In an eighth aspect, a communication device is provided, the device includes at least one processor and a memory, and the at least one processor is configured to execute the above first aspect to the third aspect, or any possible one of the first aspect to the third aspect The method in the implementation mode.
第九方面,提供了一种通信装置,该装置包括至少一个处理器和接口电路,该至少一个处理器用于执行以上第一方面或第一方面的任意可能的实现方式中的方法。In a ninth aspect, a communication device is provided, which includes at least one processor and an interface circuit, and the at least one processor is configured to execute the above first aspect or the method in any possible implementation of the first aspect.
第十方面,提供了一种通信装置,该装置包括至少一个处理器和接口电路,该至少一个处理器用于执行以上第一方面至第三方面,或者第一方面至第三方面中的任意可能的实现方式中的方法。In a tenth aspect, a communication device is provided. The device includes at least one processor and an interface circuit. The at least one processor is configured to execute the first aspect to the third aspect, or any of the first aspect to the third aspect. The method in the implementation.
第十一方面,提供了一种终端设备,该终端设备包括上述第四方面提供的通信装置,或者,该终端设备包括上述第七方面提供的通信装置,或者,该终端设备包括上述第九方面提供的通信装置。In an eleventh aspect, a terminal device is provided. The terminal device includes the communication device provided in the foregoing fourth aspect, or the terminal device includes the communication device provided in the foregoing seventh aspect, or the terminal device includes the foregoing ninth aspect The provided communication device.
第十二方面,提供了一种网络设备,该网络设备包括上述第四方面至第六方面提供的通信装置,或者,该网络设备包括上述第八方面提供的通信装置,或者,该网络设备包括上述第十方面提供的通信装置。In a twelfth aspect, a network device is provided, the network device includes the communication device provided in the fourth aspect to the sixth aspect, or the network device includes the communication device provided in the eighth aspect, or the network device includes The communication device provided by the above tenth aspect.
第十三方面,提供了一种计算机程序产品,该计算机程序产品包括计算机程序,该计算机程序在被处理器执行时,用于执行第一方面至第三方面的任意可能的实现方式中的方法,或者执行第一方面至第三方面的任意可能的实现方式中的方法。In a thirteenth aspect, a computer program product is provided. The computer program product includes a computer program. When the computer program is executed by a processor, it is used to execute the method in any possible implementation manner of the first aspect to the third aspect , Or execute the method in any possible implementation manner of the first aspect to the third aspect.
第十四方面,提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序,当该计算机程序被执行时,用于执行第一方面至第三方面、或者第一方面至第三方面中的任意可能的实现方式中的方法。In a fourteenth aspect, a computer-readable storage medium is provided. The computer-readable storage medium stores a computer program. When the computer program is executed, it is used to execute the first aspect to the third aspect, or the first to the third aspect. The method in any possible implementation of the third aspect.
第十五方面,提供了一种通信系统,该通信系统包括上述的终端设备和网络设备。In a fifteenth aspect, a communication system is provided. The communication system includes the aforementioned terminal device and network device.
第十六方面,提供了一种芯片,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的通信设备执行第一方面至第三方面、或者第一方面至第三方面中的任意可能的实现方式中的方法,或者执行第二方面或第二方面的任意可能的实现方式中的方法。In a sixteenth aspect, a chip is provided. The chip includes a processor for calling and running a computer program from a memory, so that a communication device installed with the chip executes the first aspect to the third aspect, or the first aspect To the method in any possible implementation manner of the third aspect, or execute the second aspect or the method in any possible implementation manner of the second aspect.
第十七方面,提供一种系统信息的获取方法,该方法包括:终端设备从网络设备接收第一指示信息,所述第一指示信息用于指示其他系统信息OSI更新,所述OSI包括至少一个系统信息块SIB;所述第一指示信息包括至少一个SIB的内容版本valueTag;所述终 端设备确定需要更新的SIB。According to a seventeenth aspect, a method for acquiring system information is provided. The method includes: a terminal device receives first indication information from a network device, where the first indication information is used to indicate an OSI update of other system information, and the OSI includes at least one System information block SIB; the first indication information includes the content version valueTag of at least one SIB; the terminal device determines the SIB that needs to be updated.
在一种可能的实现方式中,第一指示信息包括OSI中所有SIB的valueTag。In a possible implementation manner, the first indication information includes the valueTags of all SIBs in the OSI.
在一种可能的实现方式中,第一指示信息包括OSI中部分SIB的valueTag。In a possible implementation manner, the first indication information includes the valueTag of a part of the SIB in the OSI.
在一种可能的实现方式中,所述终端设备向所述网络设备发送请求消息,所述请求消息用于请求需要更新的SIB。In a possible implementation manner, the terminal device sends a request message to the network device, and the request message is used to request the SIB that needs to be updated.
该方法可由第一通信装置执行,第一通信装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片系统。示例性地,所述通信设备为终端设备。The method may be executed by a first communication device, and the first communication device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip system. Exemplarily, the communication device is a terminal device.
第十八方面,提供了一种系统信息的发送方法,该方法包括:网络设备向终端设备发送第一指示信息,所述第一指示信息用于指示其他系统信息OSI更新,所述OSI包括至少一个系统信息块SIB;所述第一指示信息包括至少一个SIB的内容版本valueTag;In an eighteenth aspect, a method for sending system information is provided. The method includes: a network device sends first indication information to a terminal device, where the first indication information is used to indicate an OSI update of other system information, and the OSI includes at least One system information block SIB; the first indication information includes the content version valueTag of at least one SIB;
在一种可能的实现方式中,第一指示信息包括OSI中所有SIB的valueTag。In a possible implementation manner, the first indication information includes the valueTags of all SIBs in the OSI.
在一种可能的实现方式中,第一指示信息包括OSI中部分SIB的valueTag。In a possible implementation manner, the first indication information includes the valueTag of a part of the SIB in the OSI.
在一种可能的实现方式中,所述网络设备从所述终端设备接收请求消息,所述请求消息用于请求需要更新的SIB。In a possible implementation manner, the network device receives a request message from the terminal device, and the request message is used to request the SIB that needs to be updated.
该方法可由第二通信装置执行,第二通信装置可以是终端或能够支持终端实现该方法所需的功能的通信装置,当然还可以是其他通信装置,例如芯片系统。这里以第二通信装置是网络设备为例。The method may be executed by a second communication device, and the second communication device may be a terminal or a communication device capable of supporting the terminal to implement the functions required by the method, and of course it may also be another communication device, such as a chip system. Here, the second communication device is a network device as an example.
第十九方面,本申请实施例提供了一种通信装置,包括收发单元和处理单元,其中:In a nineteenth aspect, an embodiment of the present application provides a communication device, including a transceiver unit and a processing unit, wherein:
所述收发单元,用于从网络设备接收第一指示信息,所述第一指示信息用于指示其他系统信息OSI更新,所述OSI包括至少一个系统信息块SIB;所述第一指示信息包括至少一个SIB的内容版本valueTag;The transceiver unit is configured to receive first indication information from a network device, the first indication information is used to indicate other system information OSI updates, the OSI includes at least one system information block SIB; the first indication information includes at least The content version valueTag of a SIB;
所处处理单元,用于确定需要更新的SIB;The processing unit is used to determine the SIB that needs to be updated;
在一种可能的实现方式中,所述收发单元,还用于向所述网络设备发送请求消息,所述请求消息用于请求需要更新的SIB。In a possible implementation manner, the transceiver unit is further configured to send a request message to the network device, where the request message is used to request the SIB that needs to be updated.
第二十方面,本申请实施例提供了一种通信装置,包括收发单元,其中:In a twentieth aspect, an embodiment of the present application provides a communication device, including a transceiver unit, wherein:
所述收发单元用于向终端设备发送第一指示信息,所述第一指示信息用于指示其他系统信息OSI更新,所述OSI包括至少一个系统信息块SIB;所述第一指示信息包括至少一个SIB的内容版本valueTag。The transceiver unit is configured to send first indication information to the terminal device, the first indication information is used to indicate other system information OSI update, the OSI includes at least one system information block SIB; the first indication information includes at least one SIB content version valueTag.
在一种可能的实现方式中,第一指示信息包括OSI中所有SIB的valueTag。In a possible implementation manner, the first indication information includes the valueTags of all SIBs in the OSI.
在一种可能的实现方式中,第一指示信息包括OSI中部分SIB的valueTag。In a possible implementation manner, the first indication information includes the valueTag of a part of the SIB in the OSI.
在一种可能的实现方式中,所述收发单元还用于从所述终端设备接收请求消息,所述请求消息用于请求需要更新的SIB。In a possible implementation manner, the transceiver unit is further configured to receive a request message from the terminal device, and the request message is used to request the SIB that needs to be updated.
第二十一方面,提供了一种通信装置,该装置包括至少一个处理器和存储器,该至少一个处理器用于执行以上第十七方面或第十七方面的任意可能的实现方式中的方法。In a twenty-first aspect, a communication device is provided, the device includes at least one processor and a memory, and the at least one processor is configured to execute the above seventeenth aspect or the method in any possible implementation manner of the seventeenth aspect.
第二十二方面,提供了一种通信装置,该装置包括至少一个处理器和存储器,该至少一个处理器用于执行以上第十八方面,或者第十八方面中的任意可能的实现方式中的方法。In a twenty-second aspect, a communication device is provided, the device includes at least one processor and a memory, and the at least one processor is configured to execute the eighteenth aspect above, or any of the possible implementation manners in the eighteenth aspect method.
第二十三方面,提供了一种通信装置,该装置包括至少一个处理器和接口电路,该至少一个处理器用于执行以上第十七方面或第十七方面的任意可能的实现方式中的方法。In a twenty-third aspect, a communication device is provided, the device includes at least one processor and an interface circuit, the at least one processor is configured to execute the above seventeenth aspect or the method in any possible implementation of the seventeenth aspect .
第二十四方面,提供了一种通信装置,该装置包括至少一个处理器和接口电路,该至少一个处理器用于执行以上第十八方面,或者第十八方面中的任意可能的实现方式中的方法。In a twenty-fourth aspect, a communication device is provided, the device includes at least one processor and an interface circuit, and the at least one processor is configured to execute the eighteenth aspect above, or any possible implementation of the eighteenth aspect Methods.
第二十五方面,提供了一种终端设备,该终端设备包括上述第十九方面提供的通信装置,或者,该终端设备包括上述第二十一方面提供的通信装置,或者,该终端设备包括上述第二十三方面提供的通信装置。In a twenty-fifth aspect, a terminal device is provided, the terminal device includes the communication device provided in the nineteenth aspect, or the terminal device includes the communication device provided in the twenty-first aspect, or the terminal device includes The communication device provided in the above twenty-third aspect.
第二十六方面,提供了一种网络设备,该网络设备包括上述第二十方面提供的通信装置,或者,该网络设备包括上述第二十二方面提供的通信装置,或者,该网络设备包括上述第二十四方面提供的通信装置。In a twenty-sixth aspect, a network device is provided, the network device includes the communication device provided in the aforementioned twentieth aspect, or the network device includes the communication device provided in the aforementioned twenty-second aspect, or the network device includes The communication device provided in the above twenty-fourth aspect.
第二十七方面,提供了一种计算机程序产品,该计算机程序产品包括计算机程序,该计算机程序在被处理器执行时,用于执行第十七方面至第十八方面、或者第十七方面至第十八方面中的任意可能的实现方式中的方法。In a twenty-seventh aspect, a computer program product is provided. The computer program product includes a computer program. When the computer program is executed by a processor, the computer program is used to execute the seventeenth aspect to the eighteenth aspect, or the seventeenth aspect To any possible implementation of the eighteenth aspect.
第二十八方面,提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序,当该计算机程序被执行时,用于执行第十七方面至第十八方面、或者第十七方面至第十八方面中的任意可能的实现方式中的方法。In a twenty-eighth aspect, a computer-readable storage medium is provided, and the computer-readable storage medium stores a computer program. When the computer program is executed, it is used to execute the seventeenth to eighteenth aspects, or The method in any possible implementation from the seventeenth aspect to the eighteenth aspect.
第二十九方面,提供了一种通信系统,该通信系统包括上述的终端设备和网络设备。In a twenty-ninth aspect, a communication system is provided, and the communication system includes the aforementioned terminal device and network device.
第三十方面,提供了一种芯片,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的通信设备执行第十七方面至第十八方面、或者第十七方面至第十八方面中的任意可能的实现方式中的方法。In a thirtieth aspect, a chip is provided, the chip includes: a processor, configured to call and run a computer program from a memory, so that a communication device installed with the chip executes the seventeenth to eighteenth aspects, or the first aspect The method in any possible implementation from the seventeenth aspect to the eighteenth aspect.
本申请实施例提供数据安全处理的方法,对于同一无线承载而言,通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。在进行数据传输时,可以采用单播传输方式、多播传输方式、或者单播和多播传输方式进行数据的传输。并且,在判断同一无线承载内数据采用的传输方式后,根据不同的传输方式,对数据进行相应的安全处理。一方面提高了数据传输的安全性。另一方面,通过在同一个承载内实现不同的安全处理过程,可以满足不同传输方式下的数据各自的安全需求,提高安全处理的灵活性。The embodiment of the present application provides a method for data security processing. For the same radio bearer, one or more RLC entities are associated by configuring one PDCP. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode. During data transmission, unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission. Moreover, after judging the transmission mode adopted for the data in the same radio bearer, corresponding security processing is performed on the data according to different transmission modes. On the one hand, the security of data transmission is improved. On the other hand, by implementing different security processing procedures in the same bearer, the respective security requirements of data under different transmission modes can be met, and the flexibility of security processing can be improved.
附图说明Description of the drawings
图1是数据在协议栈的各层传输的示意图。Figure 1 is a schematic diagram of data transmission at each layer of the protocol stack.
图2是网络设备和终端设备之间利用多播传输方式传输数据时协议栈结构的示意图。Figure 2 is a schematic diagram of the protocol stack structure when the network device and the terminal device use the multicast transmission mode to transmit data.
图3是一例适用于本申请实施例的移动通信系统的架构示意图。FIG. 3 is a schematic diagram of an example of the architecture of a mobile communication system applicable to an embodiment of the present application.
图4是本申请实施例提供的一例数据安全处理的方法的示意性交互图。FIG. 4 is a schematic interaction diagram of an example of a method for data security processing provided by an embodiment of the present application.
[根据细则91更正 24.10.2019] 
[Corrected according to Rule 91 24.10.2019]
[根据细则91更正 24.10.2019] 
[Corrected according to Rule 91 24.10.2019]
图5是本申请实施例提供的一例第一装置的协议栈架构的示意图。FIG. 5 is a schematic diagram of an example of the protocol stack architecture of the first device according to an embodiment of the present application.
图6是本申请实施例提供的另一例第一装置的协议栈架构的示意图。FIG. 6 is a schematic diagram of another example of the protocol stack architecture of the first device according to an embodiment of the present application.
图7是本申请实施例提供的一例第二装置的协议栈架构的示意图。FIG. 7 is a schematic diagram of an example of the protocol stack architecture of a second device provided by an embodiment of the present application.
图8是本申请实施例提供的另一例第二装置的协议栈架构的示意图。FIG. 8 is a schematic diagram of another example of the protocol stack architecture of the second device provided by an embodiment of the present application.
图9是本申请实施例提供一例第一装置向第二装置发送第一数据的示意图。FIG. 9 is a schematic diagram of an example of a first device sending first data to a second device according to an embodiment of the present application.
图10是本申请实施例提供另一例第一装置向第二装置发送第一数据的示意图。FIG. 10 is a schematic diagram of another example of a first device sending first data to a second device according to an embodiment of the present application.
图11是本申请实施例提供的另一例数据安全处理的方法的示意性交互图。FIG. 11 is a schematic interaction diagram of another example of a method for data security processing provided by an embodiment of the present application.
图12是本申请实施例提供的又一例数据安全处理的方法的示意性交互图。FIG. 12 is a schematic interaction diagram of another example of a method for data security processing provided by an embodiment of the present application.
图13是本申请实施例提供的一例种协议栈结构的示意图。FIG. 13 is a schematic diagram of an example protocol stack structure provided by an embodiment of the present application.
图14是本申请实施例提供的另一例种协议栈结构的示意图。FIG. 14 is a schematic diagram of another example protocol stack structure provided by an embodiment of the present application.
图15是本申请实施例提供的又一例种协议栈结构的示意图。FIG. 15 is a schematic diagram of another example protocol stack structure provided by an embodiment of the present application.
图16是本申请实施例提供的一例通信装置的示意性框图。FIG. 16 is a schematic block diagram of an example of a communication device provided by an embodiment of the present application.
图17是本申请实施例提供的另一例通信装置的示意性框图。FIG. 17 is a schematic block diagram of another example of a communication device according to an embodiment of the present application.
图18是本申请实施例提供的一例通信装置的示意性框图。FIG. 18 is a schematic block diagram of an example of a communication device provided by an embodiment of the present application.
图19是本申请实施例提供的另一例通信装置的示意性框图。FIG. 19 is a schematic block diagram of another example of a communication device according to an embodiment of the present application.
图20是本申请实施例提供的通信装置的示意性框图。FIG. 20 is a schematic block diagram of a communication device provided by an embodiment of the present application.
图21是本申请实施例提供的另一例通信装置的示意性框图。FIG. 21 is a schematic block diagram of another example of a communication device according to an embodiment of the present application.
图22是本申请实施例提供的终端设备的示意性框图。FIG. 22 is a schematic block diagram of a terminal device provided by an embodiment of the present application.
图23是本申请实施例提供的另一例终端设备的示意性框图。FIG. 23 is a schematic block diagram of another example of a terminal device according to an embodiment of the present application.
图24是本申请实施例提供的网络设备的示意性框图。FIG. 24 is a schematic block diagram of a network device provided by an embodiment of the present application.
图25是本申请实施例提供的BWP的示意性框图。FIG. 25 is a schematic block diagram of a BWP provided by an embodiment of the present application.
图26是本申请实施例提供的系统信息获取方法的示意性交互图。FIG. 26 is a schematic interaction diagram of a method for acquiring system information provided by an embodiment of the present application.
具体实施方式detailed description
下面将结合附图,对本申请中的技术方案进行描述。The technical solution in this application will be described below in conjunction with the accompanying drawings.
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、全球互联微波接入(Worldwide Interoperability for Microwave Access,WiMAX)通信系统、未来的第五代(5th Generation,5G)系统或新无线(New Radio,NR)等。The technical solutions of the embodiments of this application can be applied to various communication systems, such as: Global System of Mobile Communication (GSM) system, Code Division Multiple Access (CDMA) system, and Wideband Code Division Multiple Access (Wideband Code Division Multiple Access, WCDMA) system, General Packet Radio Service (GPRS), Long Term Evolution (LTE) system, LTE Frequency Division Duplex (FDD) system, LTE Time Division Duplex (TDD), Universal Mobile Telecommunication System (UMTS), Worldwide Interoperability for Microwave Access (WiMAX) communication system, the future 5th Generation (5th Generation, 5G) system or New Radio (NR), etc.
另外,本申请的各个方面或特征可以实现成方法、装置或使用标准编程和/或工程技术的制品。本申请中使用的术语“制品”涵盖可从任何计算机可读器件、载体或介质访问的计算机程序。例如,计算机可读介质可以包括,但不限于:磁存储器件(例如,硬盘、软盘或磁带等),光盘(例如,压缩盘(compact disc,CD)、数字通用盘(digital versatile disc,DVD)等),智能卡和闪存器件(例如,可擦写可编程只读存储器(erasable programmable read-only memory,EPROM)、卡、棒或钥匙驱动器等)。另外,本文描述的各种存储介质可代表用于存储信息的一个或多个设备和/或其它机器可读介质。术语“机器可读介质”可包括但不限于,无线信道和能够存储、包含和/或承载指令和/或数据的各种其它介质。In addition, various aspects or features of the present application can be implemented as methods, devices, or products using standard programming and/or engineering techniques. The term "article of manufacture" used in this application encompasses a computer program accessible from any computer-readable device, carrier, or medium. For example, computer-readable media may include, but are not limited to: magnetic storage devices (for example, hard disks, floppy disks, or tapes, etc.), optical disks (for example, compact discs (CD), digital versatile discs (DVD)) Etc.), smart cards and flash memory devices (for example, erasable programmable read-only memory (EPROM), cards, sticks or key drives, etc.). In addition, various storage media described herein may represent one or more devices and/or other machine-readable media for storing information. The term "machine-readable medium" may include, but is not limited to, wireless channels and various other media capable of storing, containing, and/or carrying instructions and/or data.
为便于理解本申请实施例,以下对本申请实施例的部分用语进行解释说明,以便于本领域技术人员理解。In order to facilitate the understanding of the embodiments of the present application, some terms of the embodiments of the present application are explained below to facilitate the understanding of those skilled in the art.
1)、网络设备,具有能够为终端设备提供随机接入功能的设备或可设置于该设备的芯片,该设备包括但不限于:演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved NodeB,或home Node B,HNB)、基带单元(baseband unit,BBU),无线保真(wireless fidelity,WIFI)系统中的接入点(access point,AP)、无线中继节点、无线回传节点、传输点(transmission and reception point,TRP或者transmission point,TP)等,还可以为5G,如,NR,系统中的gNB,或,传输点(TRP或TP),5G系统中的基站的一个或一组(包括多个天线面板)天线面板,或者,还可以为构成gNB或传输点的网络节点,如基带单元(BBU),或,分布式单元(DU,distributed unit)等。1) Network equipment, a device capable of providing random access for terminal equipment or a chip that can be installed in the device, including but not limited to: evolved Node B (evolved Node B, eNB), radio network controller (radio network controller, RNC), node B (Node B, NB), base station controller (BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved NodeB, or home Node B, HNB), baseband unit (BBU), access point (AP), wireless relay node, wireless backhaul node, transmission point ( transmission and reception point, TRP or transmission point, TP, etc., and can also be 5G, such as NR, gNB in the system, or transmission point (TRP or TP), one or a group of base stations in the 5G system (including Multiple antenna panels) Antenna panels, or, may also be network nodes that constitute a gNB or transmission point, such as a baseband unit (BBU), or a distributed unit (DU, distributed unit).
2)、终端,又称之为用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal,MT)等,是一种向用户提供语音和/或数据连通性的设备。例如,终端设备包括具有无线连接功能的手持式设备、车载设备等。目前,终端设备可以是:手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端,或智慧家庭(smart home)中的无线终端等。2) Terminal, also known as user equipment (UE), mobile station (MS), mobile terminal (MT), etc., is a way to provide users with voice and/or data connectivity device of. For example, terminal devices include handheld devices with wireless connection functions, vehicle-mounted devices, and so on. At present, terminal devices can be: mobile phones (mobile phones), tablets, notebook computers, handheld computers, mobile Internet devices (MID), wearable devices, virtual reality (VR) devices, augmented reality ( augmented reality (AR) equipment, industrial control (industrial control) wireless terminals, unmanned driving (self-driving) wireless terminals, remote medical surgery (remote medical surgery) wireless terminals, smart grid (smart grid) Wireless terminals, wireless terminals in transportation safety, wireless terminals in smart cities, or wireless terminals in smart homes, etc.
3)、多播(组播)传输技术,或者也可以称为多媒体广播多播业务(multimedia broadcast multicast service,MBMS)技术,或者也可以称为多播传输方式,是指某种业务通过网络设备同时向多个终端设备发送数据的技术。在采用多播技术传输时,网络设备(例如基站)发送同一数据,有多个终端设备同时进行接收。目前多播传输技术主要分为两种:多媒体广播多播单频网络业务(multimedia broadcast multicast service single frequency network,MBSFN)和单小区点到多点业务(single cell point to multipoint,SC-PTM)。其中,MBSFN方式是指在MBSFN区域内多个互相同步的小区(例如多个基站)同时向多个终端设备传输相同的信息,在终端设备看来接收到的是单一的叠加后的数据,这样可以提高接收信号的强度,同时消除了小区间的干扰。SC-PTM方式是指MBMS业务只通过一个小区(例如一个基站)传输,一个网络设备同时对多个终端设备进行组调度。3) Multicast (multicast) transmission technology, or it can also be called multimedia broadcast multicast service (MBMS) technology, or it can also be called multicast transmission method, which refers to a certain service passing through network equipment Technology of sending data to multiple terminal devices at the same time. When using multicast technology for transmission, a network device (such as a base station) sends the same data, and multiple terminal devices receive it at the same time. Currently, multicast transmission technologies are mainly divided into two types: multimedia broadcast multicast single frequency network service (multimedia broadcast multicast service single frequency network, MBSFN) and single cell point to multipoint service (single cell point to multipoint, SC-PTM). Among them, the MBSFN mode means that multiple cells (such as multiple base stations) that are synchronized with each other in the MBSFN area transmit the same information to multiple terminal devices at the same time. From the perspective of the terminal device, the received data is a single superimposed data. The strength of the received signal can be improved, and the interference between cells can be eliminated at the same time. The SC-PTM mode means that the MBMS service is only transmitted through one cell (for example, a base station), and a network device performs group scheduling on multiple terminal devices at the same time.
4)、采用多播(multicast)传输方式发送是指:某一装置发送协议数据单元(protocol data unit,PDU)对应的传输块(transport block,TB)时,采用分组无线网络临时标识(group radio network temporary identifier,G-RNTI)对PDU进行加扰,或对PDU对应的下行控制信息(downlink control information,DCI)进行加扰,同时有一个或者多个装置根据相同的G-RNTI对同一PDU进行接收;或者采用多播的方式传输PDU可以指通过半静态方式告诉多个装置同一PDU的位置,多个装置可以同时对该PDU进行接收;或者采用多播的方式传输PDU可以指该PDU在为多播传输建立的无线承载中传输或者在专门为多播设计的信道中进行传输。4). Sending by multicast transmission means: when a device sends the transport block (TB) corresponding to the protocol data unit (protocol data unit, PDU), the packet radio network temporary identification (group radio) is used. network temporary identifier, G-RNTI) scrambles the PDU, or scrambles the downlink control information (DCI) corresponding to the PDU, and at the same time, one or more devices perform scrambling on the same PDU according to the same G-RNTI Receiving; or using multicast to transmit PDUs can mean telling multiple devices the location of the same PDU in a semi-static manner, and multiple devices can receive the PDU at the same time; or using multicast to transmit PDUs can mean that the PDU is It is transmitted in the radio bearer established by multicast transmission or in a channel specially designed for multicast.
采用多播传输方式接收是指采用多播方式发送的时候,所述多个接收装置中的一个装置根据G-RNTI对PDU进行接收;或者所述多个接收装置中的一个装置通过为多播传输 建立的无线承载接收或者在用于多播传输的信道上进行接收PDU。Receiving in a multicast transmission mode means that when sending in a multicast mode, one of the multiple receiving devices receives the PDU according to the G-RNTI; or one of the multiple receiving devices receives the PDU according to the G-RNTI; The radio bearer established by the transmission receives or receives PDUs on the channel used for multicast transmission.
在本申请中,组播为多播的一种具体方式,因此,多播也可以称为组播。In this application, multicast is a specific method of multicast, therefore, multicast may also be referred to as multicast.
多播传输方式可以包括用多播方式发送和多播方式接收。The multicast transmission method may include sending and receiving in a multicast manner.
5)、采用单播(unicast)传输的方式发送是指:某一装置发送PDU对应的TB时,采用小区无线网络临时标识(cell network temporary identifier,C-RNTI)对PDU进行加扰,或对PDU对应的DCI进行加扰,同时只有一个装置根据C-RNTI对同一PDU进行接收;或者采用单播的方式传输PDU可以指该PDU在为单播传输建立的无线承载中传输或者在专门为单播设计的信道中进行传输。5). Sending by unicast transmission means: when a device sends the TB corresponding to the PDU, it uses the cell network temporary identifier (C-RNTI) to scramble the PDU, or to The DCI corresponding to the PDU is scrambled, and only one device receives the same PDU according to the C-RNTI; or the unicast transmission of the PDU can mean that the PDU is transmitted in a radio bearer established for unicast transmission or in a dedicated unicast transmission. It is transmitted in the channel designed for broadcasting.
采用单播传输方式接收是指采用单播方式发送的时候,所述一个接收装置根据C-RNTI对PDU进行接收;或者所述一个装置通过为单播传输建立的无线承载接收或者在用于单播传输的信道上进行接收。Reception by unicast transmission means that when unicast transmission is used, the one receiving device receives the PDU according to the C-RNTI; or the one device receives the PDU through the radio bearer established for unicast transmission or is used for unicast transmission. Receiving on the channel of broadcast transmission.
单播传输方式可以包括用单播方式发送和单播方式接收。Unicast transmission methods can include unicast transmission and unicast reception.
6)、采用广播(broadcast)传输的方式发送和接收是指:某一装置在广播信道上发送PDU对应的TB,所有接收装置都可以在广播信道上对PDU进行接收。6) Sending and receiving by means of broadcast transmission means that a certain device sends the TB corresponding to the PDU on the broadcast channel, and all receiving devices can receive the PDU on the broadcast channel.
在网络设备与终端设备之间,MBMS业务可以通过建立终端设备专用的无线承载以单播的传输方式发送给终端设备,也可以通过建立MBMS专用的多播无线承载以多播的传输方式发送给终端设备。当有多个终端设备需要接收某一MBMS业务时,如果是以单播传输方式发送,则需要为大量的终端设备建立专用无线承载,消耗大量的资源;如果是以多播的传输方式发送给UE,则只需要建立MBMS专用的多播无线承载,所有对该业务感兴趣的终端设备都可以接收该MBMS业务。当多个终端设备对同一业务感兴趣的时候,网络设备可以通过多播的传输方式发送给多个终端设备,可以节省网络资源。无线承载可以理解为数据传输的通道,可以包含PDCP(层)实体和RLC(层)实体,数据在无线承载中传输的时候,需要经过相应的PDCP实体和RLC实体的处理。一个终端设备中可能针对不同的数据业务建立多个无线承载,例如多播无线承载中的数据通过多播传输方式发送,单播无线承载中的数据通过单播传输方式发送,另外本申请中的无线承载中的数据可以使用多种传输方式发送,包括但不限于单播传输方式、多播传输方式以及单播和多播同时传输的传输方式,不通传输模式之间可以进行切换。如无特殊说明,本申请的技术方案都是针对同一无线承载而言的。Between the network equipment and the terminal equipment, the MBMS service can be sent to the terminal equipment in a unicast transmission mode by establishing a dedicated radio bearer for the terminal equipment, or it can be sent to the terminal equipment in a multicast transmission mode by establishing a dedicated MBMS radio bearer. Terminal Equipment. When there are multiple terminal devices that need to receive a certain MBMS service, if it is sent in unicast transmission mode, a dedicated radio bearer needs to be established for a large number of terminal devices, which consumes a lot of resources; if it is sent in multicast transmission mode, For the UE, only the MBMS dedicated multicast radio bearer needs to be established, and all terminal devices interested in the service can receive the MBMS service. When multiple terminal devices are interested in the same service, the network device can send to multiple terminal devices through multicast transmission, which can save network resources. The radio bearer can be understood as a data transmission channel, which can include a PDCP (layer) entity and an RLC (layer) entity. When data is transmitted in the radio bearer, it needs to be processed by the corresponding PDCP entity and RLC entity. A terminal device may establish multiple radio bearers for different data services. For example, the data in the multicast radio bearer is sent through multicast transmission, and the data in the unicast radio bearer is sent through unicast transmission. The data in the radio bearer can be sent using a variety of transmission methods, including but not limited to unicast transmission, multicast transmission, and simultaneous unicast and multicast transmission. The different transmission modes can be switched. Unless otherwise specified, the technical solutions of this application are all for the same radio bearer.
相互通信的设备(例如网络设备和终端设备)具有一定的协议栈结构。例如控制面协议栈结构可以包括RRC层、PDCP层、RLC层、MAC层和物理层等协议层的功能。用户面协议栈结构可以包括PDCP层、RLC层、MAC层和物理层等协议层的功能。其中,物理层位于最低层(层一),MAC层、RLC以及PDCP属于中间层(层二),RRC属于更高层(层三)。在一种实现中,PDCP层之上,RRC层之下还可以包括业务数据适配(service data adaptation protocol,SDAP)层。Devices that communicate with each other (such as network devices and terminal devices) have a certain protocol stack structure. For example, the control plane protocol stack structure may include the functions of the RRC layer, the PDCP layer, the RLC layer, the MAC layer, and the physical layer. The user plane protocol stack structure may include the functions of the PDCP layer, the RLC layer, the MAC layer, and the physical layer. Among them, the physical layer is located at the lowest layer (layer one), the MAC layer, RLC, and PDCP belong to the middle layer (layer two), and the RRC belongs to the higher layer (layer three). In one implementation, above the PDCP layer and below the RRC layer, a service data adaptation protocol (SDAP) layer may also be included.
这些协议层的功能可以由一个节点实现,或者可以由多个节点实现;例如,在一种演进结构中,无线接入网设备可以包括集中单元(centralized unit,CU)和分布单元(distributed unit,DU),多个DU可以和一个CU通信。CU和DU上各自有一部分无线通信的协议栈结构,例如,PDCP层及以上协议层的功能设置在CU,PDCP以下的协议层,例如RLC层和MAC层等的功能设置在DU等。The functions of these protocol layers can be implemented by one node or multiple nodes; for example, in an evolution structure, the radio access network device can include a centralized unit (CU) and a distributed unit (CU). DU), multiple DUs can communicate with one CU. The CU and the DU each have a part of the wireless communication protocol stack structure. For example, the functions of the PDCP layer and the above protocol layers are set in the CU, and the protocol layers below the PDCP, for example, the functions of the RLC layer and the MAC layer are set in the DU.
应该理解的是,这种协议层的划分仅仅是一种举例,还可以在其它协议层划分,例如在RLC层划分,将RLC层及以上协议层的功能设置在CU,RLC层以下协议层的功能设置在DU;或者,在某个协议层中划分,例如将RLC层的部分功能和RLC层以上的协议层的功能设置在CU,将RLC层的剩余功能和RLC层以下的协议层的功能设置在DU。此外,也可以按其它方式划分,例如按时延划分,将处理时间需要满足时延要求的功能设置在DU,不需要满足该时延要求的功能设置在CU。It should be understood that this division of protocol layers is just an example, and it can also be divided in other protocol layers, for example, in the RLC layer. The functions of the RLC layer and above protocol layers are set in the CU, and the protocol layers below the RLC layer The functions are set in the DU; or, divided in a certain protocol layer, for example, part of the functions of the RLC layer and the functions of the protocol layer above the RLC layer are set in the CU, and the remaining functions of the RLC layer and the functions of the protocol layer below the RLC layer Set in DU. In addition, it can also be divided in other ways, for example, by time delay. The functions that need to meet the delay requirement for processing time are set in the DU, and the functions that do not need to meet the delay requirement are set in the CU.
在网络设备和终端设备进行数据传输时,以上行数据传输为例,如图1所示的,图1为数据传输在协议栈的各层传输的示意图。数据首先到终端设备的PDCP层,经过PDCP层的处理以后传输到RLC层和MAC层,在RLC层和MAC层经过处理之后,通过物理层发送给网络设备。网络设备接收数据时,依次经过的协议层为物理层、MAC层、RLC层和PDCP层。对于每个无线承载中的数据,都需要经过各个层的处理。每个层都有相应的功能实体来执行相应的功能,例如,PDCP层对应PDCP实体,RLC层对应RLC实体,MAC层对应MAC实体等。其中,每个无线承载包含一个或多个PDCP实体以及一个或者多个RLC实体,每个RLC实体对应一个逻辑信道。一个MAC实体对应多个逻辑信道,不同逻辑信道中的数据在MAC层可以进行复用,例如在MAC层复用到同一个MAC PDU中,最后通过物理层发送出去。对于下行数据的传输过程也是类似的。When network equipment and terminal equipment perform data transmission, the upstream data transmission is taken as an example, as shown in Fig. 1, which is a schematic diagram of data transmission at each layer of the protocol stack. The data first goes to the PDCP layer of the terminal device, and is processed by the PDCP layer and then transmitted to the RLC layer and the MAC layer. After the RLC layer and the MAC layer are processed, they are sent to the network device through the physical layer. When a network device receives data, the protocol layers that it passes through in sequence are the physical layer, the MAC layer, the RLC layer, and the PDCP layer. The data in each radio bearer needs to be processed by various layers. Each layer has corresponding functional entities to perform corresponding functions, for example, the PDCP layer corresponds to the PDCP entity, the RLC layer corresponds to the RLC entity, and the MAC layer corresponds to the MAC entity. Among them, each radio bearer includes one or more PDCP entities and one or more RLC entities, and each RLC entity corresponds to a logical channel. One MAC entity corresponds to multiple logical channels, and data in different logical channels can be multiplexed at the MAC layer, for example, multiplexed into the same MAC PDU at the MAC layer, and finally sent out through the physical layer. The transmission process of downlink data is similar.
对于传统单播无线承载中的数据,在经过PDCP层的时候,PDCP实体会对该其进行全处理。相关的安全处理至少包括加密/解密和完整性保护/完整性验证过程。发送单播无线承载中的数据的设备和接收单播无线承载中的数据的设备对单播无线承载中的安全处理都在PDCP层进行。对于发送单播无线承载中的设备(例如网络设备),对数据包进行加密和/或完整性保护,而接收单播无线承载中的数据的设备(例如终端设备)对数据包进行相应的解密和/或完整性验证。For the data in the traditional unicast radio bearer, when passing through the PDCP layer, the PDCP entity will fully process the data. Related security processing includes at least encryption/decryption and integrity protection/integrity verification processes. The device that sends the data in the unicast radio bearer and the device that receives the data in the unicast radio bearer perform security processing on the unicast radio bearer at the PDCP layer. For the device that sends the unicast radio bearer (such as network equipment), the data packet is encrypted and/or integrity protected, and the device that receives the data in the unicast radio bearer (such as the terminal device) decrypts the data packet accordingly And/or integrity verification.
其中,加密的过程为:发送端设备用密钥等参数通过加密算法将数据通过运算变为密文。解密的过程为:接收端设备用密钥等参数通过相应的解密算法将密文通过逆运算变为数据。Among them, the encryption process is: the sender device uses the key and other parameters to convert the data into ciphertext through an operation through an encryption algorithm. The decryption process is: the receiving end device uses the key and other parameters to transform the ciphertext into data through the inverse operation through the corresponding decryption algorithm.
完整性保护的过程为:发送端设备根据数据包以及密钥等参数,通过完整性保护算法计算出一个参数A,并将该参数A通知给接收端设备。完整性验证过程为:接收端设备根据数据包以及密钥等参数,通过完整性验证算法计算出一个参数B,如果参数A和B一致,则完整性验证通过。The process of integrity protection is: the sender device calculates a parameter A through the integrity protection algorithm according to parameters such as data packets and keys, and notifies the receiver device of the parameter A. The integrity verification process is: the receiving end device calculates a parameter B through the integrity verification algorithm according to parameters such as the data packet and the key. If the parameters A and B are consistent, the integrity verification passes.
目前,对于传统的多播无线承载中的数据或者网络设备和终端设备之间利用多播传输方式传输数据时,如图2所示的,图2是网络设备和终端设备之间利用多播传输方式传输数据时协议栈结构的示意图。可以看出,协议栈中没有PDCP层,因此,传统的传输中,多播数据不经过PDCP层,网络设备和终端设备均不会对该多播无线承载中数据或者多播传输方式传输的数据进行安全处理。At present, for the data in the traditional multicast wireless bearer or when the network equipment and the terminal equipment use the multicast transmission method to transmit data, as shown in Figure 2, Figure 2 is the use of multicast transmission between the network equipment and the terminal equipment. Schematic diagram of the protocol stack structure when transmitting data in a way. It can be seen that there is no PDCP layer in the protocol stack. Therefore, in traditional transmission, the multicast data does not pass through the PDCP layer, and neither the network equipment nor the terminal equipment will transmit the data in the multicast radio bearer or the data transmitted by the multicast transmission method. Proceed to safe handling.
多播数据包直接经过网络设备的RLC层和MAC层,最后通过物理层发送出去。多个终端设备(例如终端设备1和终端设备2)对该多播数据进行接收,依次经过物理层、MAC层、RLC层处理发送到更高层。The multicast data packet passes directly through the RLC layer and the MAC layer of the network device, and is finally sent out through the physical layer. Multiple terminal devices (for example, terminal device 1 and terminal device 2) receive the multicast data, and send them to a higher layer through the processing of the physical layer, the MAC layer, and the RLC layer in sequence.
对于传统的多播无线承载中的数据或者采用多播传输方式发送的数据,网络设备和终端设备没有进行安全处理过程,可能会在该多播数据的传输过程中引发安全问题,导致该 多播数据被篡改或者窃听,影响用户的体验。For the data in the traditional multicast radio bearer or the data sent by the multicast transmission method, the network equipment and terminal equipment do not carry out the security processing process, which may cause security problems during the transmission of the multicast data, resulting in the multicast transmission. The data is tampered with or tapped, which affects the user experience.
有鉴于此,本申请提供了一种数据传输的方法,通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。在进行数据传输时,可以采用单播传输方式、多播传输方式、或者单播和多播传输方式进行数据的传输。并且,在判断同一无线承载内数据采用的传输方式后,根据不同的传输方式,对数据进行相应的安全处理。一方面提高了数据传输的安全性。另一方面,通过在同一个承载内实现不同的安全处理过程,可以满足不同传输方式下的数据各自的安全需求,提高安全处理的灵活性。In view of this, this application provides a data transmission method, which associates one or more RLC entities by configuring a PDCP. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode. During data transmission, unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission. Moreover, after judging the transmission mode adopted for the data in the same radio bearer, corresponding security processing is performed on the data according to different transmission modes. On the one hand, the security of data transmission is improved. On the other hand, by implementing different security processing procedures in the same bearer, the respective security requirements of data under different transmission modes can be met, and the flexibility of security processing can be improved.
为便于理解本申请实施例,首先结合图3简单介绍适用于本申请实施例的通信系统。In order to facilitate the understanding of the embodiments of the present application, firstly, a communication system suitable for the embodiments of the present application is briefly introduced with reference to FIG.
图3是适用于本申请实施例的通信系统的示意图。如图3所示,该移动通信系统100可以包括至少一个无线接入网设备110和至少一个终端设备(如图3中所示的终端设备120、130、140、150,160)。终端设备通过无线的方式与无线接入网设备相连,无线接入网设备可以是上述的网络设备。至少一个终端设备可以发送上行数据或者信息给无线接入网设备,无线接入网设备110也可以将下行数据或者信息发送给至少一个终端设备的过程中,可以利用本申请提供的数据安全处理的方法。并且,多个终端设备也可以组成一个通信系统,例如,终端设备140、150,160可以组成一个通信系统。例如,终端设备140也可以将数据或者信息发送给终端设备150和/或160的过程中,可以利用本申请提供的数据安全处理的方法。终端设备和无线接入网设备之间可以传输与URLLC业务相关的上行和下行数据以及信息等。Fig. 3 is a schematic diagram of a communication system suitable for an embodiment of the present application. As shown in FIG. 3, the mobile communication system 100 may include at least one wireless access network device 110 and at least one terminal device ( terminal devices 120, 130, 140, 150, 160 as shown in FIG. 3). The terminal device is connected to the wireless access network device in a wireless manner, and the wireless access network device may be the aforementioned network device. At least one terminal device can send uplink data or information to the wireless access network device, and the wireless access network device 110 can also send downlink data or information to at least one terminal device. In the process of sending the downlink data or information to at least one terminal device, the data provided in this application can be used for safe processing. method. In addition, multiple terminal devices may also form a communication system. For example, the terminal devices 140, 150, and 160 may form a communication system. For example, the terminal device 140 may also use the data security processing method provided in this application in the process of sending data or information to the terminal device 150 and/or 160. The terminal equipment and the wireless access network equipment can transmit uplink and downlink data and information related to the URLLC service.
应理解。图3只是示意图,该通信系统中还可以包括其它网络设备和/或终端设备,在图3中未画出。本申请的实施例对该移动通信系统中包括的无线接入网设备和终端的数量不做限定。在移动通信系统100中,无线接入网设备110可以是上述的网络设备。并且,网络设备和终端设备之间的通信遵循一定的协议栈结构。网络设备可以是集成式的gNB,也可以包括CU和DU,CU和DU可以分离设置,也可以集中设置。本申请实施例在此不作限制。Should be understood. FIG. 3 is only a schematic diagram, and the communication system may also include other network devices and/or terminal devices, which are not shown in FIG. 3. The embodiments of the present application do not limit the number of wireless access network devices and terminals included in the mobile communication system. In the mobile communication system 100, the wireless access network device 110 may be the aforementioned network device. In addition, the communication between network equipment and terminal equipment follows a certain protocol stack structure. The network equipment can be an integrated gNB, or it can include CU and DU. CU and DU can be set separately or centrally. The embodiments of the application are not limited here.
下面结合图4详细说明本申请提供的数据安全处理的方法,图4是本申请一个实施例的数据安全处理的方法200的示意性流程图,该方法200可以应用在图3所示的场景中,例如,利用多播传输方式传输和/或利用单播传输方式传输的场景中。本申请实施例在此不作限制。The following describes in detail the data security processing method provided by the present application with reference to FIG. 4. FIG. 4 is a schematic flowchart of a data security processing method 200 according to an embodiment of the present application. The method 200 can be applied in the scenario shown in FIG. 3 , For example, in a scenario where multicast transmission is used and/or unicast transmission is used. The embodiments of the application are not limited here.
应理解,下文的描述中,以第一装置和第二装置作为各个实施例的执行方法的执行主体为例,对各个实施例的方法进行说明。第一装置可以为上述的接入网设备,第二装置可以为上述的终端设备,作为示例而非限定,执行方法的执行主体也可以是应用于第一装置、第二装置中的芯片。It should be understood that, in the following description, the first device and the second device are used as an example to execute the method of each embodiment to describe the method of each embodiment. The first device may be the aforementioned access network device, and the second device may be the aforementioned terminal device. As an example and not a limitation, the execution subject of the method may also be a chip applied to the first device and the second device.
如图4所示,图4中示出的方法200可以包括步骤S210至步骤S250。下面结合图4详细说明方法200中的各个步骤。该方法200包括:As shown in FIG. 4, the method 200 shown in FIG. 4 may include step S210 to step S250. Hereinafter, each step in the method 200 will be described in detail with reference to FIG. 4. The method 200 includes:
S210,第一装置确定第一数据的第一传输方式,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,该单播和多播传输方式为使用单播和多播进行传输的传输方式。S210. The first device determines a first transmission mode of the first data. The first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast and a multicast transmission mode. The transmission method is a transmission method that uses unicast and multicast.
S220,第一装置根据第一传输方式,确定对该第一数据的安全处理方式。S220: The first device determines a secure processing mode for the first data according to the first transmission mode.
S230,第一装置根据第一传输方式,向第二装置发送安全处理后的第一数据。相应的,第二装置接收第一装置发送的数据。S230: The first device sends the securely processed first data to the second device according to the first transmission mode. Correspondingly, the second device receives the data sent by the first device.
S240,第二装置确定接收到的数据的第一传输方式,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个。S240: The second device determines a first transmission mode of the received data, where the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast transmission mode and a multicast transmission mode.
S250,第二装置根据第一传输方式,确定对接收到的数据的安全处理方式。S250: The second device determines a safe processing mode for the received data according to the first transmission mode.
具体的,在本申请实施例中,第一装置的协议栈中的一个PDCP实体(下文用“第一PDCP实体”表示)关联一个或者多个RLC实体。一个或者多个RLC实体与第一PDCP实体关联可以理解为第一PDCP实体和一个或者多个RLC实体属于同一个无线承载,或者第一PDCP实体的配置和一个或者多个RLC实体的配置里面包含的标识(identify,ID)相同,该标识可以是无线承载标识。其中,一个RLC实体对应一个逻辑信道。在本申请实施例的描述中,“RLC实体”和“逻辑信道”可以视为等同的概念,可以相互替换,例如,也可以描述成一个PDCP实体关联一个或者多个逻辑信道,或者第一PDCP实体的配置和该一个或者多个逻辑信道的配置里面包含的ID相同。其他用于RLC实体的描述也适用于逻辑信道概念;另外也可以认为逻辑信道概念包含RLC实体的概念,或者逻辑信道可以认为是连接RLC实体到MAC实体的接口或者通道。一个RLC实体的传输方式为单播传输方式或者多播传输方式。Specifically, in the embodiment of the present application, one PDCP entity (referred to as the “first PDCP entity” hereinafter) in the protocol stack of the first device is associated with one or more RLC entities. The association of one or more RLC entities with the first PDCP entity can be understood to mean that the first PDCP entity and one or more RLC entities belong to the same radio bearer, or the configuration of the first PDCP entity and the configuration of one or more RLC entities include The identifiers (identify, ID) are the same, and the identifier may be a radio bearer identifier. Among them, one RLC entity corresponds to one logical channel. In the description of the embodiments of this application, "RLC entity" and "logical channel" can be regarded as equivalent concepts and can be replaced with each other. For example, it can also be described as a PDCP entity associated with one or more logical channels, or the first PDCP The configuration of the entity is the same as the ID contained in the configuration of the one or more logical channels. Other descriptions used for RLC entities are also applicable to the concept of logical channels; in addition, the concept of logical channels can also be considered as including the concept of RLC entities, or logical channels can be considered as interfaces or channels connecting RLC entities to MAC entities. The transmission mode of an RLC entity is unicast transmission or multicast transmission.
为了描述方便,在本申请实施例中,与第一装置中的第一PDCP关联的多个RLC实体可以包括第一RLC实体和第二RLC实体。其中,第一RLC实体对应单播传输方式,第二RLC实体对应多播传输方式。第一RLC实体对应单播传输方式可以理解为第一RLC实体中的数据会利用单播发送方式发送。第二RLC实体对应多播传输方式可以理解为第二RLC实体中的数据会利用多播发送方式发送。第一RLC实体对应单播传输方式也可以称为第一RLC实体的类型为单播类型,或者第一RLC实体对应的逻辑信道的类型为单播逻辑信道类型。其中,单播类型的RLC实体可以理解为第一RLC实体中的数据采用单播方式发送,单播逻辑信道类型可以理解为与第一RLC实体对应的逻辑信道中的数据采用单播方式发送。图5是本申请实施例提供的一例第一装置的协议栈架构的示意图。如图5所示的,第一装置的第一PDCP实体关联3个RLC实体,其中第一个RLC实体和第三个RLC实体为单播类型,第二个RLC实体为多播类型。图5中的箭头方向为第一装置发送数据时数据传输的方向。For the convenience of description, in this embodiment of the present application, the multiple RLC entities associated with the first PDCP in the first device may include a first RLC entity and a second RLC entity. Among them, the first RLC entity corresponds to a unicast transmission mode, and the second RLC entity corresponds to a multicast transmission mode. The unicast transmission mode corresponding to the first RLC entity can be understood as the data in the first RLC entity will be sent using the unicast transmission mode. The second RLC entity corresponding to the multicast transmission mode can be understood as the data in the second RLC entity will be sent using the multicast transmission mode. The unicast transmission mode corresponding to the first RLC entity may also be referred to as the type of the first RLC entity being the unicast type, or the type of the logical channel corresponding to the first RLC entity is the unicast logical channel type. Wherein, the unicast type of RLC entity can be understood as the data in the first RLC entity is sent in unicast mode, and the unicast logical channel type can be understood as the data in the logical channel corresponding to the first RLC entity is sent in unicast mode. FIG. 5 is a schematic diagram of an example of the protocol stack architecture of the first device according to an embodiment of the present application. As shown in FIG. 5, the first PDCP entity of the first device is associated with three RLC entities, where the first RLC entity and the third RLC entity are of unicast type, and the second RLC entity is of multicast type. The arrow direction in FIG. 5 is the direction of data transmission when the first device sends data.
为了描述方便,在本申请实施例中,与第一装置中的第一PDCP关联的一个RLC实体可以称为第三RLC实体。其中,第三RLC实体对应单播传输方式,或者,第三RLC实体对应多播传输方式。即第三RLC实体采用时分方式进行数据传输,在某些时间采用单播传输方式,在另一些时间采用多播传输方式。即对于第三RLC实体而言,某一时刻只能采用单播传输方式或者多播传输方式。图6是本申请实施例提供的一例第一装置的协议栈架构的示意图。如图6所示的,第一装置的第一PDCP实体关联1个RLC实体(第三RLC实体)。图6中的箭头方向为第一装置发送数据时数据传输的方向。For the convenience of description, in this embodiment of the present application, an RLC entity associated with the first PDCP in the first device may be referred to as a third RLC entity. Among them, the third RLC entity corresponds to a unicast transmission mode, or the third RLC entity corresponds to a multicast transmission mode. That is, the third RLC entity uses a time division method for data transmission, adopts a unicast transmission method at some times, and uses a multicast transmission method at other times. That is, for the third RLC entity, only a unicast transmission mode or a multicast transmission mode can be used at a certain moment. FIG. 6 is a schematic diagram of an example of the protocol stack architecture of the first device according to an embodiment of the present application. As shown in FIG. 6, the first PDCP entity of the first device is associated with one RLC entity (third RLC entity). The direction of the arrow in FIG. 6 is the direction of data transmission when the first device sends data.
与第一装置类似的,第二装置的协议栈中的一个PDCP实体(下文用“第二PDCP实体”表示)关联一个或者多个RLC实体。为了描述方便,在本申请实施例中,与第二装置中的第二PDCP关联多个RLC实体包括第四RLC实体和第五RLC实体。其中,第四RLC 实体对应单播传输方式,第五RLC实体对应多播传输方式。第四RLC实体对应单播传输方式可以理解为第四RLC实体中接收的数据是利用单播方式接收的,或者,第四RLC实体对应的逻辑信道中接收的数据是利用采用单播方式接收的,即第二装置中的物理层实体和MAC层实体需要将采用单播传输方式接收到的数据递交给第四RLC实体。第五RLC实体对应多播传输方式可以理解为第五RLC实体中接收的数据是利用多播方式接收的,或者,第五RLC实体对应的逻辑信道中接收的数据是利用采用多播方式接收的,即第二装置中的物理层实体和MAC层实体需要将采用多播传输方式接收到的数据递交给第五RLC实体。图7是本申请实施例提供的一例第二装置的协议栈架构的示意图。如图7所示的,第二装置的第二PDCP实体关联3个RLC实体,其中第一个RLC实体和第三个RLC实体为单播类型,第二个RLC实体为多播类型。图7中的箭头方向为第二装置接收数据时数据传输的方向。Similar to the first device, one PDCP entity in the protocol stack of the second device (referred to as "second PDCP entity" hereinafter) is associated with one or more RLC entities. For the convenience of description, in this embodiment of the present application, multiple RLC entities associated with the second PDCP in the second device include a fourth RLC entity and a fifth RLC entity. Among them, the fourth RLC entity corresponds to a unicast transmission mode, and the fifth RLC entity corresponds to a multicast transmission mode. The unicast transmission mode corresponding to the fourth RLC entity can be understood as the data received in the fourth RLC entity is received in unicast mode, or the data received in the logical channel corresponding to the fourth RLC entity is received in unicast mode That is, the physical layer entity and the MAC layer entity in the second device need to deliver the data received in the unicast transmission mode to the fourth RLC entity. The fifth RLC entity corresponding to the multicast transmission mode can be understood as the data received in the fifth RLC entity is received in the multicast mode, or the data received in the logical channel corresponding to the fifth RLC entity is received in the multicast mode That is, the physical layer entity and the MAC layer entity in the second device need to deliver the data received in the multicast transmission mode to the fifth RLC entity. FIG. 7 is a schematic diagram of an example of the protocol stack architecture of a second device provided by an embodiment of the present application. As shown in FIG. 7, the second PDCP entity of the second device is associated with three RLC entities, where the first RLC entity and the third RLC entity are of unicast type, and the second RLC entity is of multicast type. The direction of the arrow in FIG. 7 is the direction of data transmission when the second device receives data.
为了描述方便,在本申请实施例中,与第二装置中的第二PDCP关联一个RLC实体可以称为第六RLC实体。第六RLC实体对应单播传输方式,或者,第六RLC实体对应多播传输方式。即第六RLC实体采用时分方式,在某些时间采用单播传输方式,在另一些时间采用多播传输方式。图8是本申请实施例提供的一例第二装置的协议栈架构的示意图。如图8所示的,第二装置的第二PDCP实体关联1个RLC实体(第六RLC实体)。第六RLC实体对应单播传输方式,或者,第六RLC实体对应多播传输方式。图8中的箭头方向为第二装置接收数据时数据传输的方向。For the convenience of description, in this embodiment of the present application, an RLC entity associated with the second PDCP in the second device may be referred to as a sixth RLC entity. The sixth RLC entity corresponds to a unicast transmission mode, or the sixth RLC entity corresponds to a multicast transmission mode. That is, the sixth RLC entity adopts a time division method, adopts a unicast transmission method at some times, and adopts a multicast transmission method at other times. FIG. 8 is a schematic diagram of an example of the protocol stack architecture of a second device provided by an embodiment of the present application. As shown in FIG. 8, the second PDCP entity of the second device is associated with one RLC entity (sixth RLC entity). The sixth RLC entity corresponds to a unicast transmission mode, or the sixth RLC entity corresponds to a multicast transmission mode. The direction of the arrow in FIG. 8 is the direction of data transmission when the second device receives data.
应理解,第一RLC实体的个数可以只有一个,或者可以有多个第一RLC实体。类似的,对于第二RLC实体、第四RLC实体以及第五RLC实体的个数也可是一个或者多个。It should be understood that there may be only one first RLC entity, or there may be multiple first RLC entities. Similarly, the number of the second RLC entity, the fourth RLC entity, and the fifth RLC entity may also be one or more.
还应理解,图5至图8只是示例性的,不应该对本申请实施例中的RLC实体的个数和单播RLC实体的个数产生限制,也不应该对第一装置和第二装置的协议栈结构产生任何限制。It should also be understood that FIG. 5 to FIG. 8 are only exemplary, and should not limit the number of RLC entities and the number of unicast RLC entities in the embodiments of the present application, nor should it impose restrictions on the number of RLC entities in the first device and the second device. The protocol stack structure imposes any restrictions.
在S210中,当第一装置有数据(以第一数据为例)向第二装置发送时,第一装置可以确定第一数据的第一传输方式,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个。可选的,如果接入网设备采用的是CU和DU分离设置模式,则方法200中的第一装置可以为CU。假设采用何种传输方式由第一装置的PDCP层(或者CU)决定。例如,可以是第一装置的PDCP层确定或者判断第一数据的第一传输方式。即PDCP层(CU)在单播传输方式、多播传输方式、单播和多播传输方式中确定第一数据的第一传输方式。In S210, when the first device has data (take the first data as an example) to send to the second device, the first device can determine the first transmission mode of the first data, the first transmission mode is unicast transmission, A multicast transmission method, or at least one of unicast and multicast transmission methods. Optionally, if the access network equipment adopts the CU and DU separate setting mode, the first device in the method 200 may be the CU. It is assumed that which transmission mode is adopted is determined by the PDCP layer (or CU) of the first device. For example, the PDCP layer of the first device may determine or determine the first transmission mode of the first data. That is, the PDCP layer (CU) determines the first transmission mode of the first data in unicast transmission mode, multicast transmission mode, unicast and multicast transmission mode.
下面分别说明这三种数据传输方式。The three data transmission methods are described below.
第一种:单播传输方式(或者可以称为只利用单播传输方式)。对于第一PDCP和第二PDCP均关联多个RLC实体的情况下,即第一PDCP实体的数据只递交给第一RLC实体,第一RLC实体对应的逻辑信道中的数据通过单播方式发送给第二装置接收。具体的,该数据在MAC层组包以后,递交到物理层,在物理层通过与第一RLC实体对应的无线网络临时标识(radio network temporary identity,RNTI),例如C-RNTI加扰并发送给第二装置。第二装置根据分配的或者预定义的与第一RLC实体对应的或者用来接收单播数据的RNTI进行接收,将接收到的单播传输方式的数据递交给第四RLC实体。The first type: unicast transmission mode (or can be called only unicast transmission mode). In the case where the first PDCP and the second PDCP are associated with multiple RLC entities, that is, the data of the first PDCP entity is only delivered to the first RLC entity, and the data in the logical channel corresponding to the first RLC entity is sent to The second device receives. Specifically, after the data is packaged at the MAC layer, it is delivered to the physical layer, and the radio network temporary identity (RNTI) corresponding to the first RLC entity, such as C-RNTI, is scrambled and sent to the physical layer at the physical layer. The second device. The second device receives according to the allocated or predefined RNTI corresponding to the first RLC entity or used to receive unicast data, and delivers the received unicast transmission mode data to the fourth RLC entity.
对于第一PDCP和第二PDCP分别只关联一个RLC实体的情况下,即第一PDCP实体的数据递交给第三RLC实体,第三RLC实体对应的逻辑信道中的数据通过单播方式发送给第二装置接收。第二装置根据分配的或者预定义的与第三RLC实体对应的或者用来接收单播数据的C-RNTI进行接收,将接收到的单播传输方式的数据递交给第六RLC实体。In the case where the first PDCP and the second PDCP are respectively associated with only one RLC entity, that is, the data of the first PDCP entity is delivered to the third RLC entity, and the data in the logical channel corresponding to the third RLC entity is sent to the third RLC entity in unicast mode. Two devices receive. The second device receives according to the allocated or predefined C-RNTI corresponding to the third RLC entity or used to receive unicast data, and delivers the received unicast transmission mode data to the sixth RLC entity.
第二种:多播传输方式(或者可以称为只利用多播传输方式)。对于第一PDCP和第二PDCP均关联多个RLC实体的情况下,即第一PDCP实体的数据只递交给第二RLC实体。第二RLC实体对应的逻辑信道中的数据通过多播方式发送给多个装置接收,该多个装置包括该第二装置。具体的,数据在MAC层组包以后,递交到物理层,在物理层通过与第二RLC实体对应的RNTI,例如G-RNTI加扰并发送给多个装置接收。第二装置根据分配的或者预定义的与第二RLC实体对应的或者用来接收多播数据的RNTI进行接收,将接收到的多播传输方式的数据递交给第五RLC实体。The second type: multicast transmission mode (or it can be called only using multicast transmission mode). In the case where both the first PDCP and the second PDCP are associated with multiple RLC entities, that is, the data of the first PDCP entity is only delivered to the second RLC entity. The data in the logical channel corresponding to the second RLC entity is sent to multiple devices for reception in a multicast manner, and the multiple devices include the second device. Specifically, after the data is packaged at the MAC layer, it is delivered to the physical layer, and the physical layer is scrambled by the RNTI corresponding to the second RLC entity, such as G-RNTI, and sent to multiple devices for reception. The second device receives according to the allocated or predefined RNTI corresponding to the second RLC entity or used to receive the multicast data, and delivers the received data in the multicast transmission mode to the fifth RLC entity.
对于第一PDCP和第二PDCP分别只关联一个RLC实体的情况下,即第一PDCP实体的数据递交给第三RLC实体对应的逻辑信道中的数据通过多播方式发送给多个装置接收,该多个装置包括该第二装置。具体的,数据在MAC层组包以后,递交到物理层,在物理层通过与第三RLC实体对应的RNTI加扰并发送给多个装置接收。第二装置根据分配的或者预定义的与第三RLC实体对应的或者用来接收多播数据的RNTI进行接收,将接收到的多播传输方式的数据递交给第六RLC实体。In the case where the first PDCP and the second PDCP are respectively associated with only one RLC entity, that is, the data of the first PDCP entity is submitted to the third RLC entity and the data in the logical channel corresponding to the third RLC entity is sent to multiple devices to receive by multicast, the The plurality of devices includes the second device. Specifically, after the data is packaged at the MAC layer, it is delivered to the physical layer, and the physical layer is scrambled by the RNTI corresponding to the third RLC entity and sent to multiple devices for reception. The second device receives according to the allocated or predefined RNTI corresponding to the third RLC entity or used to receive the multicast data, and delivers the received data in the multicast transmission mode to the sixth RLC entity.
第三种:单播和多播传输方式(或者称为单播和多播同时传输方式)。单播和多播传输方式为使用单播和多播进行传输的传输方式。单播和多播传输方式存在于第一PDCP和第二PDCP均关联多个RLC实体的场景中。即第一PDCP实体的数据递交给第一RLC实体和第二RLC实体。其中第一RLC实体对应的逻辑信道中的数据通过单播方式发送给第二装置,第二RLC实体对应的逻辑信道中的数据通过多播方式发送给多个装置,该多个装置包括该第二装置。具体的,第一RLC实体和第二个RLC实体对应的逻辑信道中数据在MAC层组包的时候,不会复用到同一个数据包中,因为后续需要做不同的处理。单播逻辑信道中的数据经过MAC层处理并递交到物理层以后,在物理层通过与第一RLC实体对应的RNTI加扰并发送出去。多播逻辑信道中的数据经过MAC层处理并递交到物理层以后,在物理层通过与第二RLC实体对应的RNTI加扰并发送出去。第二装置可以分别根据分配的或者预定义的与第一RLC实体和第二个RLC实体对应的RNTI进行接收,将接收到的多播传输方式的数据递交给第五RLC实体,将接收到的单播传输方式的数据递交给第四RLC实体。The third type: unicast and multicast transmission methods (or called unicast and multicast simultaneous transmission methods). Unicast and multicast transmission methods are transmission methods that use unicast and multicast for transmission. Unicast and multicast transmission modes exist in scenarios where both the first PDCP and the second PDCP are associated with multiple RLC entities. That is, the data of the first PDCP entity is delivered to the first RLC entity and the second RLC entity. The data in the logical channel corresponding to the first RLC entity is sent to the second device in unicast mode, and the data in the logical channel corresponding to the second RLC entity is sent to multiple devices in multicast mode, and the multiple devices include the first RLC entity. Two devices. Specifically, when the data in the logical channels corresponding to the first RLC entity and the second RLC entity are packaged in the MAC layer, they will not be multiplexed into the same data packet, because different processing needs to be done subsequently. After the data in the unicast logical channel is processed by the MAC layer and delivered to the physical layer, the data in the physical layer is scrambled and sent through the RNTI corresponding to the first RLC entity. After the data in the multicast logical channel is processed by the MAC layer and delivered to the physical layer, the physical layer is scrambled and sent through the RNTI corresponding to the second RLC entity. The second device may respectively receive according to the allocated or predefined RNTI corresponding to the first RLC entity and the second RLC entity, and deliver the received multicast transmission data to the fifth RLC entity, and transfer the received data to the fifth RLC entity. The data in the unicast transmission mode is delivered to the fourth RLC entity.
应该理解的是,在本申请实施例中,上述的三种传输方式均针对同一个无线承载而言,可以理解为一个无线承载支持不同的传输方式,而且可以在不同传输模式间切换。这个无线承载可以是现有的无线承载,也可以是一种新的类型的无线承载,即第一PDCP实体、与第一PDCP实体关联的一个或者多个RLC实体属于同一个无线承载(假设为第一无线承载),或第二PDCP实体、与第二PDCP实体关联的一个或者多个RLC实体属于同一个无线承载(假设为第一无线承载)或第一PDCP实体、与第一PDCP实体关联的一个或者多个RLC实体属于同一个无线承载,以及第二PDCP实体、与第二PDCP实体关联的一个或者多个RLC实体属于同一个无线承载(假设为第一无线承载)。或者,第一 无线承载的配置信息中包含或者与第一PDCP实体的配置信息以及与第一PDCP实体关联的RLC实体的配置信息关联,第一无线承载的配置信息与第二PDCP实体的配置信息以及与第二PDCP实体关联的RLC实体的配置信息也关联,关联可以是配置信息中包含相同的标识信息,该标识信息可以是无线承载标识。It should be understood that in the embodiments of the present application, the above three transmission modes are all for the same radio bearer, which can be understood as one radio bearer supporting different transmission modes and can be switched between different transmission modes. This radio bearer can be an existing radio bearer or a new type of radio bearer, that is, the first PDCP entity and one or more RLC entities associated with the first PDCP entity belong to the same radio bearer (assumed to be The first radio bearer), or the second PDCP entity, one or more RLC entities associated with the second PDCP entity belong to the same radio bearer (assumed to be the first radio bearer) or the first PDCP entity is associated with the first PDCP entity One or more RLC entities belonging to the same radio bearer, and the second PDCP entity and one or more RLC entities associated with the second PDCP entity belong to the same radio bearer (assumed to be the first radio bearer). Alternatively, the configuration information of the first radio bearer includes or is associated with the configuration information of the first PDCP entity and the configuration information of the RLC entity associated with the first PDCP entity, and the configuration information of the first radio bearer is associated with the configuration information of the second PDCP entity And the configuration information of the RLC entity associated with the second PDCP entity is also associated. The association may be that the configuration information includes the same identification information, and the identification information may be a radio bearer identification.
在S220中,第一装置确定了第一数据的第一传输方式后,根据第一传输方式,确定对该第一数据的安全处理方式。其中,不同的数据传输方式对应的安全处理方式不同或者相同。也就是说数据的传输方式和安全处理方式之间存在对应关系。该对应关系可以是预配置的或者是协议预定的。其中,第一装置对第一数据的安全处理方式包括:单播传输方式时对应的第一安全处理、多播传输方式时对应的第二安全处理。第一安全处理可以包括利用第一参数和/或第一算法对第一数据进行加密和/或完整性保护,或者,第一安全处理还可以为不进行安全处理。第二安全处理可以包括利用第二参数和/或第二算法对第一数据进行加密和/或完整性保护,或者,第二安全处理还可以为不进行安全处理。应理解,安全处理方式还可以包括其他的方式。本申请在此不作限制。In S220, after determining the first transmission mode of the first data, the first device determines a secure processing mode for the first data according to the first transmission mode. Among them, the security processing methods corresponding to different data transmission methods are different or the same. That is to say, there is a corresponding relationship between the data transmission method and the safe processing method. The corresponding relationship may be pre-configured or predetermined by agreement. Wherein, the security processing method for the first data by the first device includes: a first security processing corresponding to a unicast transmission mode, and a second security processing corresponding to a multicast transmission mode. The first security processing may include using the first parameter and/or the first algorithm to encrypt and/or integrity protection of the first data, or the first security processing may also be no security processing. The second security processing may include using the second parameter and/or the second algorithm to encrypt and/or integrity protection of the first data, or the second security processing may also be no security processing. It should be understood that the security processing method may also include other methods. This application is not restricted here.
应理解,在本申请实施例中,不进行安全处理可以为不对数据进行加密和/或完整性保护,但是采用其他的方式对数据进行处理。或者,不进行安全处理可以为对数据不进行任何的安全处理。It should be understood that in the embodiments of the present application, not performing security processing may mean not performing encryption and/or integrity protection on the data, but using other methods to process the data. Or, not performing security processing can mean not performing any security processing on the data.
第一装置确定了第一数据的第一传输方式,便在PDCP层实体中对第一数据进行相应的安全处理。The first device determines the first transmission mode of the first data, and performs corresponding security processing on the first data in the PDCP layer entity.
如果第一传输方式为单播和多播传输方式,第一装置在PDCP层实体会将第一数据进行复制得到第二数据。在PDCP层实体对第一数据进行第一安全处理,对第二数据进行第二安全处理。If the first transmission mode is unicast and multicast transmission, the first device will copy the first data to obtain the second data at the PDCP layer entity. The PDCP layer entity performs first security processing on the first data, and performs second security processing on the second data.
在S230中,第一装置根据第一数据的第一传输方式,向第二装置发送经过相应安全处理后的第一数据。相应的,第二装置接收第一装置发送经过相应安全处理后的数据。In S230, the first device sends the first data after corresponding security processing to the second device according to the first transmission mode of the first data. Correspondingly, the second device receives the data sent by the first device after corresponding security processing.
具体的,第一装置在第一PDCP实体中对第一数据进行相应的安全处理后,根据第一数据的第一传输方式,将安全处理后的第一数据递交给对应的RLC实体,通过RLC实体发送给第二装置。Specifically, after performing corresponding security processing on the first data in the first PDCP entity, the first device submits the securely processed first data to the corresponding RLC entity according to the first transmission mode of the first data. The entity is sent to the second device.
如果第一传输方式为单播传输方式,第一装置将第一安全处理后的第一数据递交给第一RLC实体或者第三RLC实体。第一装置通过第一RLC实体或者第三RLC实体向第二装置发送经过第一安全处理后的第一数据。If the first transmission mode is a unicast transmission mode, the first device delivers the first data after the first security processing to the first RLC entity or the third RLC entity. The first device sends the first data after the first security processing to the second device through the first RLC entity or the third RLC entity.
如果第一传输方式为多播传输方式,第一装置将第二安全处理后的第一数据递交给第二RLC实体或者第三RLC实体。第一装置通过第二RLC实体或者第三RLC实体向第二装置发送经过第二安全处理后的第一数据。If the first transmission mode is a multicast transmission mode, the first device delivers the first data after the second security processing to the second RLC entity or the third RLC entity. The first device sends the first data after the second security processing to the second device through the second RLC entity or the third RLC entity.
如果第一传输方式为单播和多播传输方式,第一装置将第一安全处理后的第一数据递交给第一RLC实体,将第二安全处理后的第二数据递交给第二RLC实体。第一装置通过第一RLC实体向第二装置发送经过第一安全处理后的第一数据。同时通过第二RLC实体向第二装置发送经过相应安全处理后的第二数据。If the first transmission mode is unicast or multicast transmission, the first device delivers the first data after the first security processing to the first RLC entity, and delivers the second data after the second security processing to the second RLC entity . The first device sends the first data after the first security processing to the second device through the first RLC entity. At the same time, the second data after the corresponding security processing is sent to the second device through the second RLC entity.
在S240中,第二装置根据接收到的经过相应安全处理后的数据,确定接收到的数据的第一传输方式。例如,如果第二装置如果从第四RLC实体或者第六RLC实体接收到数据,则确定该数据对应的第一传输方式为单播传输方式。第二装置如果从第五RLC实体 或者第六RLC实体接收到数据,则确定该数据对应的第一传输方式为多播传输方式。第二装置如果从第五RLC实体和第六RLC实体接收到数据,则确定该数据对应的第一传输方式为单播和多播传输方式。In S240, the second device determines the first transmission mode of the received data according to the received data after corresponding security processing. For example, if the second device receives data from the fourth RLC entity or the sixth RLC entity, it determines that the first transmission mode corresponding to the data is a unicast transmission mode. If the second device receives data from the fifth RLC entity or the sixth RLC entity, it determines that the first transmission mode corresponding to the data is the multicast transmission mode. If the second device receives data from the fifth RLC entity and the sixth RLC entity, it determines that the first transmission mode corresponding to the data is unicast and multicast transmission.
图9所示的为一例第一装置向第二装置发送第一数据的示意图。如图9所示的,第一装置通过第一RLC实体和/或第二RLC实体向第二装置发送经过安全处理后的第一数据。第二装置从第四RLC实体和/或第五RLC实体接收到第一装置发送的数据。FIG. 9 shows an example of a schematic diagram of a first device sending first data to a second device. As shown in FIG. 9, the first device sends the security-processed first data to the second device through the first RLC entity and/or the second RLC entity. The second device receives the data sent by the first device from the fourth RLC entity and/or the fifth RLC entity.
图10所示的为另一例第一装置向第二装置发送第一数据的示意图。如图10所示的,第一装置通过第三RLC实体向第二装置发送经过安全处理后的第一数据。第二装置从第六RLC实体接收到第一装置发送的数据。FIG. 10 shows another example of a schematic diagram of a first device sending first data to a second device. As shown in FIG. 10, the first device sends the security-processed first data to the second device through the third RLC entity. The second device receives the data sent by the first device from the sixth RLC entity.
在S250,第二装置根据第一传输方式,确定对接收到的数据的安全处理方式。具体的,第二装置的PDCP实体(第二PDCP实体)根据从与之关联不同的RLC实体接收到数据,可以确定数据的第一传输方式,根据数据的第一传输方式,确定对应的安全处理方式,也可以直接根据递交数据的RLC实体或者逻辑信道确定对数据的安全处理方式。In S250, the second device determines a safe processing method for the received data according to the first transmission method. Specifically, the PDCP entity (second PDCP entity) of the second device can determine the first transmission mode of the data according to the data received from the different RLC entities associated with it, and determine the corresponding security processing according to the first transmission mode of the data Method, the safe processing method of the data can also be determined directly according to the RLC entity or logical channel that submitted the data.
例如,当第一传输方式为单播传输方式时,第二PDCP实体对接收到的经过第一安全处理后的第一数据进行第三安全处理。其中,第三安全处理可以包括利用第三参数和/或第三算法对接收到的数据进行解密和/或完整性验证。或者,第三安全处理还可以为不进行安全处理,或者不对数据进行解密和/或完整性验证。也就是说数据的传输方式或者递交数据的RLC实体和安全处理方式之间存在对应关系。该对应关系可以是预配置的或者是协议预定的。For example, when the first transmission mode is a unicast transmission mode, the second PDCP entity performs third security processing on the received first data after the first security processing. The third security processing may include decrypting and/or integrity verification of the received data using a third parameter and/or a third algorithm. Alternatively, the third security processing may also be not performing security processing, or not performing decryption and/or integrity verification on the data. That is to say, there is a correspondence between the data transmission method or the RLC entity that submits the data and the security processing method. The corresponding relationship may be pre-configured or predetermined by agreement.
例如,当第一传输方式为多播传输方式时,第二PDCP实体对接收到的经过第二安全处理后的第一数据进行第四安全处理。其中,第四安全处理可以包括利用第四参数和/或第四算法对接收到的数据进行解密和/或完整性验证。或者,第四安全处理还可以为不进行安全处理。其中,不进行安全处理可以理解为不对数据进行解密和/或完整性验证,但是采用其他的方式对数据进行处理。或者,不进行安全处理可以为对数据不进行任何的安全处理。For example, when the first transmission mode is a multicast transmission mode, the second PDCP entity performs fourth security processing on the received first data after the second security processing. Wherein, the fourth security processing may include using a fourth parameter and/or a fourth algorithm to decrypt and/or verify the integrity of the received data. Or, the fourth security process may also be no security process. Among them, not performing security processing can be understood as not performing decryption and/or integrity verification on the data, but using other methods to process the data. Or, not performing security processing can mean not performing any security processing on the data.
当第一传输方式为单播和多播传输方式时,第二PDCP实体对接收到的经过第一安全处理后的第一数据进行第三安全处理,对接收到的经过第二安全处理后的第二数据进行第四安全处理。When the first transmission mode is unicast and multicast transmission, the second PDCP entity performs third security processing on the received first data after the first security processing, and performs the third security processing on the received data after the second security processing. The second data undergoes the fourth security processing.
其中,第三安全处理可以是与第一安全处理相对应的过程,例如加密和解密、完整性验证和完整性保护。第四安全处理可以是与第二安全处理相对应的过程,例如加密和解密、完整性验证和完整性保护。Among them, the third security process may be a process corresponding to the first security process, such as encryption and decryption, integrity verification, and integrity protection. The fourth security process may be a process corresponding to the second security process, such as encryption and decryption, integrity verification, and integrity protection.
本申请提供的数据安全的方法,通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。在进行数据传输的时,可以采用单播传输方式、多播传输方式、或者单播和多播传输方式进行数据的传输。并且,根据不用的传输方式,对数据进行相应的安全处理。一方面提高了数据传输的安全性。另一方面,能够实现同一个承载内不同的安全处理过程,满足不同传输方式下的数据的安全需求,提高通信效率。The data security method provided in this application associates one or more RLC entities by configuring a PDCP. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode. During data transmission, unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission. And, according to the unused transmission method, the data is processed safely. On the one hand, the security of data transmission is improved. On the other hand, different security processing procedures within the same bearer can be realized, meeting the security requirements of data in different transmission modes, and improving communication efficiency.
在本申请一些可能的实现方式中:当该第一传输方式为单播传输方式时,该第一数 据的安全处理方式为第一安全处理。当该第一数据传输方式为多播传输方式时,该第一数据的安全处理方式为第二安全处理。当该第一数据传输方式为单播和多播传输方式时,该第一数据的安全处理方式为第一安全处理,第二数据的安全处理方式为第二安全处理,第二数据与第一数据相同。例如,第二数据可以是通过复制第一数据得到的。In some possible implementation manners of the present application: when the first transmission mode is a unicast transmission mode, the security processing mode of the first data is the first security processing. When the first data transmission mode is a multicast transmission mode, the security processing mode of the first data is the second security processing. When the first data transmission mode is unicast or multicast transmission, the secure processing mode of the first data is the first secure processing, the secure processing mode of the second data is the second secure processing, and the second data is the same as the first secure processing. The data is the same. For example, the second data may be obtained by copying the first data.
对于该第一数据传输方式为单播和多播传输方式的情况下,第一装置可以先将第一数据进行复制,得到第二数据,然后分别对第一数据进行第一安全处理,对第二数据进行第二安全处理。然后将经过安全处理后的第一数据和第二数据通过对应的RLC实体发送给第二装置。对于该第一数据传输方式为单播传输方式或者多播传输方式的情况下,第一装置只需要将第一数据进行相应的安全处理,然后将经过安全处理后的第一数据通过对应的RLC实体发送给第二装置。When the first data transmission mode is unicast and multicast transmission, the first device may first copy the first data to obtain the second data, and then perform the first security processing on the first data respectively, and perform the first security processing on the first data respectively. Second, the data is processed for the second security. Then, the first data and the second data after the security processing are sent to the second device through the corresponding RLC entity. When the first data transmission mode is unicast transmission or multicast transmission, the first device only needs to perform corresponding security processing on the first data, and then pass the security processed first data through the corresponding RLC The entity is sent to the second device.
在本申请一些可能的实现方式中:该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护。例如,第一安全处理可以为利用第一参数和/或第一算法对数据进行加密,或者,第一安全处理可以为利用第一参数和/或第一算法对数据进行完整性保护,或者,第一安全处理可以为利用第一算法对数据进行加密以及利用第一参数对数据进行完整性保护。In some possible implementation manners of the present application: the first security processing includes using the first parameter and/or the first algorithm to encrypt data and/or integrity protection. For example, the first security processing may be using the first parameter and/or the first algorithm to encrypt data, or the first security processing may be using the first parameter and/or the first algorithm to protect the integrity of the data, or, The first security processing may be to encrypt the data using the first algorithm and to protect the integrity of the data using the first parameter.
该第二安全处理为不对第一数据进行安全处理,即不对第一数据进行安全处理可以视为一种安全处理方式,其中,不对第一数据进行安全处理可以理解为不对第一数据进行加密和/或完整性保护,但是采用其他的方式对第一数据进行处理。或者,不对第一数据进行安全处理可以为不对第一数据进行任何的安全处理。The second security processing means not performing secure processing on the first data, that is, not performing secure processing on the first data can be regarded as a secure processing method, where not performing secure processing on the first data can be understood as not encrypting and unencrypting the first data. / Or integrity protection, but the first data is processed in other ways. Or, not performing security processing on the first data may mean not performing any security processing on the first data.
在本申请另一些可能的实现方式中:该第一安全处理为不对数据进行安全处理。该第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护。例如,第二安全处理可以为利用第二参数和/或第二算法对数据进行加密,或者,第二安全处理可以为利用第二参数和/或第二算法对数据进行完整性保护,或者,第二安全处理可以为利用第二算法对数据进行加密以及利用第二参数对数据进行完整性保护。In some other possible implementation manners of this application: the first security processing is not performing security processing on the data. The second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protect the data. For example, the second security processing may be using the second parameter and/or the second algorithm to encrypt data, or the second security processing may be using the second parameter and/or the second algorithm to protect the data integrity, or, The second security processing may be using the second algorithm to encrypt the data and using the second parameter to protect the integrity of the data.
在本申请另一些可能的实现方式中:该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护,该第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护。其中,该第一参数和该第二参数相同或者不同,该第一算法和该第二算法相同或者不同。即第一安全处理和第二安全处理可以相同,也可以不同。In some other possible implementations of the present application: the first security processing includes using a first parameter and/or a first algorithm to encrypt and/or integrity protection of data, and the second security processing includes using a second parameter and/or Or the second algorithm performs encryption and/or integrity protection on the data. Wherein, the first parameter and the second parameter are the same or different, and the first algorithm and the second algorithm are the same or different. That is, the first security process and the second security process can be the same or different.
第一装置可以利用上述的第一安全处理和/或第二安全处理方式,在第一PDCP实体中对第一数据进行相应的安全处理。The first device may use the aforementioned first security processing and/or second security processing mode to perform corresponding security processing on the first data in the first PDCP entity.
可选的,在本申请实施例中,该第一参数包括第一秘钥,该第二参数包括第二秘钥。第一秘钥可以为加密秘钥,第二秘钥也可为加密秘钥,第一秘钥和第二秘钥可以相同,也可以不同。Optionally, in this embodiment of the present application, the first parameter includes a first secret key, and the second parameter includes a second secret key. The first secret key may be an encryption secret key, and the second secret key may also be an encryption secret key. The first secret key and the second secret key may be the same or different.
例如,对于第一数据传输方式为单播传输方式,第一装置在第一PDCP实体中对第一数据利用第一秘钥进行加密,然后将利用第一秘钥加密后的第一数据发送给第二装置。或者,利用第一算法以及第一秘钥等计算出一个参数A,并将这个参数A发送给第二装置。第二装置利用第三算法以及第三秘钥,计算出一个参数B,如果参数A和B一致,则完整性验证通过。For example, for the first data transmission mode to be the unicast transmission mode, the first device encrypts the first data in the first PDCP entity with the first secret key, and then sends the first data encrypted with the first secret key to The second device. Or, use the first algorithm and the first secret key to calculate a parameter A, and send this parameter A to the second device. The second device uses the third algorithm and the third secret key to calculate a parameter B. If the parameters A and B are consistent, the integrity verification is passed.
又例如,对于第一数据传输方式为多播传输方式,第一装置在第一PDCP实体中对第一数据利用第二秘钥进行加密,然后将利用第二秘钥加密后的第一数据发送给第二装置。或者,利用第二算法以及第二秘钥等计算出一个参数C,并将这个参数C发送给第二装置。第二装置利用第四算法以及第四秘钥,计算出一个参数D,如果参数C和D一致,则完整性验证通过。For another example, if the first data transmission mode is a multicast transmission mode, the first device encrypts the first data in the first PDCP entity with a second secret key, and then sends the first data encrypted with the second secret key Give the second device. Or, use the second algorithm and the second secret key to calculate a parameter C, and send this parameter C to the second device. The second device uses the fourth algorithm and the fourth secret key to calculate a parameter D. If the parameters C and D are consistent, the integrity verification is passed.
还应理解,在本申请实施例中,第一参数除了包括第一秘钥之外还可以包括数据的无线承载标识、数据包的计数值(count值)、数据包的序列号(Sequence Number,SN)、随机数等。本申请对于第一参数具体内容不作限制。类似的,第二参数除了包括第二秘钥之外还可以包括数据的无线承载标识、count值、SN、随机数等。进一步的。第一参数包括的无线承载标识、count值、SN、随机数等可以分别和第二参数包括的无线承载标识、count值、SN、随机数相同或者不同。It should also be understood that, in the embodiment of the present application, the first parameter may also include the radio bearer identification of the data, the count value (count value) of the data packet, and the sequence number (Sequence Number) of the data packet in addition to the first secret key. SN), random numbers, etc. This application does not limit the specific content of the first parameter. Similarly, in addition to the second secret key, the second parameter may also include the radio bearer identification, count value, SN, random number, etc. of the data. further. The radio bearer identifier, count value, SN, random number, etc. included in the first parameter may be the same or different from the radio bearer identifier, count value, SN, and random number included in the second parameter, respectively.
对于S250,第二装置的第二PDCP实体根据从与之关联的不同的RLC实体接收到数据,可以确定数据的第一传输方式,根据数据的第一传输方式,确定对应的安全处理方式。For S250, the second PDCP entity of the second device may determine the first transmission mode of the data according to the data received from the different RLC entities associated with it, and determine the corresponding security processing mode according to the first transmission mode of the data.
例如,当接收到的数据的第一传输方式为单播传输方式时,第二PDCP实体对接收到的经过第一安全处理后的第一数据进行第三安全处理。For example, when the first transmission mode of the received data is the unicast transmission mode, the second PDCP entity performs the third security processing on the received first data after the first security processing.
当接收到的数据的第一传输方式为多播传输方式时,第二PDCP实体对接收到的经过第二安全处理后的第一数据进行第四安全处理。When the first transmission mode of the received data is the multicast transmission mode, the second PDCP entity performs fourth security processing on the received first data after the second security processing.
当接收到的数据的第一传输方式为单播多播传输方式时,第二PDCP实体对接收到的经过第一安全处理后的第一数据进行第三安全处理,对接收到的经过第二安全处理后的第二数据进行第四安全处理。When the first transmission mode of the received data is the unicast-multicast transmission mode, the second PDCP entity performs the third security process on the received first data after the first security process, and performs the third security process on the received data after the second security process. The second data after the security processing undergoes the fourth security processing.
在本申请一些可能的实现方式中:第三安全处理包括利用第三参数和/或第三算法对数据进行解密和/或完整性验证。例如,第三安全处理可以为利用第三参数和/或第三算法对数据进行解密,或者,第一安全处理可以为利用第三参数和/或第三算法对数据进行完整性验证,或者,第三安全处理可以为利用第三算法对数据进行解密以及利用第三参数对数据进行完整性验证。In some possible implementation manners of this application: the third security processing includes using a third parameter and/or a third algorithm to decrypt and/or verify the integrity of the data. For example, the third security process may be to use the third parameter and/or the third algorithm to decrypt the data, or the first security process may be to use the third parameter and/or the third algorithm to verify the integrity of the data, or, The third security processing may be to decrypt the data using the third algorithm and to verify the integrity of the data using the third parameter.
可选的。第三安全处理也可以为不对数据进行安全处理,其中,不对数据进行安全处理可以理解为不对数据进行解密和/或完整性验证,或者,不对数据进行任何的安全处理。Optional. The third security processing may also be not performing security processing on the data, wherein, not performing security processing on the data can be understood as not performing decryption and/or integrity verification on the data, or not performing any security processing on the data.
在本申请一些可能的实现方式中:第四安全处理包括利用第四参数和/或第四算法对数据进行解密和/或完整性验证。例如,第四安全处理可以为利用第四参数和/或第四算法对数据进行解密,或者,第四安全处理可以为利用第四参数和/或第四算法对数据进行完整性验证,或者,第四安全处理可以为利用第四算法对数据进行解密以及利用第四参数对数据进行完整性验证。In some possible implementation manners of this application: the fourth security processing includes using a fourth parameter and/or a fourth algorithm to decrypt and/or verify the integrity of the data. For example, the fourth security processing may be using the fourth parameter and/or the fourth algorithm to decrypt the data, or the fourth security processing may be using the fourth parameter and/or the fourth algorithm to verify the integrity of the data, or, The fourth security processing may be decrypting the data using the fourth algorithm and verifying the integrity of the data using the fourth parameter.
可选的,第四安全处理也可以为不对数据进行安全处理。Optionally, the fourth security processing may also be not performing security processing on the data.
例如:当该第一安全处理为利用第一参数和第一算法对数据进行加密,则该第三安全处理为利用第三参数和第三算法对数据进行解密。For example: when the first security process is to use the first parameter and the first algorithm to encrypt data, the third security process is to use the third parameter and the third algorithm to decrypt the data.
又例如:当该第二安全处理为利用第二参数和第二算法对数据进行加密,则该第四安全处理为利用第四参数和第四算法对数据进行解密。For another example: when the second security process is to use the second parameter and the second algorithm to encrypt data, the fourth security process is to use the fourth parameter and the fourth algorithm to decrypt the data.
又例如:当该第二安全处理为不进行安全处理,则该第四安全处理也为不进行安全处理。For another example: when the second security processing is not performing security processing, the fourth security processing is also not performing security processing.
其中,该第三参数和该第四参数相同或者不同,该第三算法和该第四算法相同或者不同。即第三安全处理和第四安全处理可以相同,也可以不同。Wherein, the third parameter and the fourth parameter are the same or different, and the third algorithm and the fourth algorithm are the same or different. That is, the third security process and the fourth security process may be the same or different.
可选的,在本申请实施例中,该第三参数包括第三秘钥,该第四参数包括第四秘钥。第三秘钥可以为与第一秘钥对应的解密秘钥,第四秘钥可以为与第二秘钥对应的解密秘钥,第三秘钥和第四秘钥可以相同,也可以不同。Optionally, in this embodiment of the present application, the third parameter includes a third secret key, and the fourth parameter includes a fourth secret key. The third secret key may be a decryption secret key corresponding to the first secret key, and the fourth secret key may be a decryption secret key corresponding to the second secret key. The third secret key and the fourth secret key may be the same or different.
例如,对于第一数据传输方式为单播传输方式,第一装置在第一PDCP实体中对第一数据利用第一秘钥进行加密,然后将利用第一秘钥加密后的第一数据发送给第二装置。或者,利用第一算法以及第一秘钥等计算出一个参数,并将这个参数A发送给第二装置。第二装置利用第三秘钥在第二PDCP实体中对第一秘钥加密后的第一数据进行解密。或者,第二装置利用第三算法以及第三秘钥等计算出一个参数B,如果参数A和参数B相同,则完整性验证通过。For example, for the first data transmission mode to be the unicast transmission mode, the first device encrypts the first data in the first PDCP entity with the first secret key, and then sends the first data encrypted with the first secret key to The second device. Or, use the first algorithm and the first secret key to calculate a parameter, and send this parameter A to the second device. The second device uses the third key to decrypt the first data encrypted by the first key in the second PDCP entity. Or, the second device uses the third algorithm and the third secret key to calculate a parameter B. If the parameter A and the parameter B are the same, the integrity verification is passed.
还应理解,在本申请实施例中,第三参数和第四参数除了包括秘钥之外还可以包括数据的无线承载标识、数据包的计数值(count值)、数据包的序列号(Sequence Number,SN)、随机数等。It should also be understood that, in the embodiment of the present application, the third parameter and the fourth parameter may include the radio bearer identification of the data, the count value (count value) of the data packet, and the sequence number of the data packet in addition to the secret key. Number, SN), random number, etc.
图11是本申请一个实施例的数据安全处理的方法300的示意性流程图,该方法300可以应用在图3所示的场景中,例如,利用多播传输方式传输和/或利用单播传输方式传输的场景中。本申请实施例在此不作限制。FIG. 11 is a schematic flowchart of a method 300 for data security processing according to an embodiment of the present application. The method 300 can be applied in the scenario shown in FIG. 3, for example, using multicast transmission and/or using unicast transmission. Way to transfer the scene. The embodiments of the application are not limited here.
如图11所示,图11中示出的方法300可以包括步骤S310至步骤S350。下面结合图10详细说明方法300中的各个步骤。该方法300包括:As shown in FIG. 11, the method 300 shown in FIG. 11 may include step S310 to step S350. The steps in the method 300 are described in detail below with reference to FIG. 10. The method 300 includes:
S310,第一装置对第一数据进行第一安全处理。S310: The first device performs first security processing on the first data.
S320,第一装置对第二数据进行第二安全处理,第二数据是通过复制第一数据得到的。S320: The first device performs second security processing on the second data, and the second data is obtained by copying the first data.
S330,第一装置根据数据的第一传输方式,向第二装置发送经过该第一安全处理后的第一数据,和/或,发送经过该第二安全处理后的第二数据,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,该单播和多播传输方式为使用单播传输和多播进行传输的传输方式。相应的,第二装置接收第一装置发送的数据。S330. The first device sends the first data after the first security processing to the second device according to the first data transmission mode, and/or sends the second data after the second security processing, the first The transmission mode is a unicast transmission mode, a multicast transmission mode, or at least one of a unicast and a multicast transmission mode, and the unicast and multicast transmission modes are transmission modes that use unicast transmission and multicast transmission. Correspondingly, the second device receives the data sent by the first device.
S340,第二装置确定接收到的数据的第一传输方式,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个。S340. The second device determines a first transmission mode of the received data, where the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast transmission and a multicast transmission mode.
S350,第二装置根据第一传输方式,确定对该第一数据的安全处理方式。S350: The second device determines a safe processing mode for the first data according to the first transmission mode.
具体而言,第一装置的协议栈中的第一PDCP实体关联一个或者多个RLC实体,一个RLC实体的传输方式为单播传输方式或者多播传输方式。第二装置的协议栈中的第二PDCP实体关联一个或者多个RLC实体,一个RLC实体的传输方式为单播传输方式或者多播传输方式。关于第一装置和第二装置的协议栈的具体描述可以参考上述方法200对第一装置协议栈的描述,为了简洁,这里不再赘述。第一装置和第二装置的协议栈的结构可以参考上述方法200对于第一装置和第二装置的协议栈的结构的描述。这里不再赘述。Specifically, the first PDCP entity in the protocol stack of the first device is associated with one or more RLC entities, and the transmission mode of one RLC entity is a unicast transmission mode or a multicast transmission mode. The second PDCP entity in the protocol stack of the second device is associated with one or more RLC entities, and the transmission mode of one RLC entity is a unicast transmission mode or a multicast transmission mode. For specific descriptions of the protocol stacks of the first device and the second device, reference may be made to the description of the protocol stack of the first device in the above method 200. For brevity, details are not repeated here. For the structure of the protocol stack of the first device and the second device, reference may be made to the description of the structure of the protocol stack of the first device and the second device in the above method 200. I won't repeat it here.
当第一装置有数据(以第一数据为例)向第二装置发送时,假设采用何种传输方式由第一装置的RLC层、MAC层或者物理层决定。如果接入网设备采用的是CU和DU分离设置模式,也可以理解为采用何种传输方式由第一装置的DU决定。由于数据传输方式由其它层或者DU决定,第一PDCP实体不知道当前采用的是何种传输方式,所以第一装置传输第一数据时,在第一PDCP实体中会将第一数据进行复制,得到第二数据。即第一 数据和第二数据相同。其中,第一传输方式为:单播传输方式、多播传输方式、或者单播和多播传输方式。关于单播传输方式、多播传输方式、单播和多播传输方式的相关描述,可以参考上述方法200中相关描述,为了简洁,这里不再赘述。When the first device has data (take the first data as an example) to send to the second device, it is assumed that the transmission mode used is determined by the RLC layer, MAC layer, or physical layer of the first device. If the access network equipment adopts the CU and DU separate setting mode, it can also be understood that the transmission mode used is determined by the DU of the first device. Since the data transmission mode is determined by other layers or DUs, the first PDCP entity does not know which transmission mode is currently used, so when the first device transmits the first data, the first data is copied in the first PDCP entity. Get the second data. That is, the first data and the second data are the same. Among them, the first transmission mode is: a unicast transmission mode, a multicast transmission mode, or a unicast and multicast transmission mode. For related descriptions of unicast transmission mode, multicast transmission mode, unicast and multicast transmission mode, reference may be made to the related description in the foregoing method 200, and for brevity, details are not repeated here.
在S310中,第一装置对第一数据进行第一安全处理,即第一数据对应的安全处理方式为第一安全处理。具体的,第一装置或者CU在第一PDCP实体中第一数据进行第一安全处理。其中,单播传输方式时对应的第一安全处理。In S310, the first device performs first security processing on the first data, that is, the security processing mode corresponding to the first data is the first security processing. Specifically, the first device or the CU performs the first security processing on the first data in the first PDCP entity. Among them, the first security processing corresponding to the unicast transmission mode.
在S320中,第一装置对第二数据进行第二安全处理,即第二数据对应的安全处理方式为第二安全处理。具体的,第一装置或者CU在第一PDCP实体中第二数据进行第二安全处理。其中,多播传输方式时对应的第二安全处理。这里第二数据通过对第一数据进行复制得到,具体的,当第一装置或者CU在第一PDCP实体中接收到第一数据以后,将第一数据进行复制得到第二数据,然后再分别对第一数据和第二数据进行相应的安全处理。In S320, the first device performs the second security processing on the second data, that is, the security processing mode corresponding to the second data is the second security processing. Specifically, the first device or the CU performs the second security processing on the second data in the first PDCP entity. Among them, the second security processing corresponding to the multicast transmission mode. Here, the second data is obtained by copying the first data. Specifically, after the first device or CU receives the first data in the first PDCP entity, the first data is copied to obtain the second data, and then the second data is obtained respectively. The first data and the second data undergo corresponding security processing.
在S330中,第一装置或者CU在第一PDCP实体中对第一数据和第二数据分别进行安全处理后。将经过第一安全处理的第一数据递交给与第一PDCP关联的一个或者RLC实体,同时,将经过第二安全处理的第二数据也递交给与第一PDCP关联的一个或者RLC实体。具体的,由于第一PDCP关联的一个或者RLC实体,一个RLC实体对应单播传输方式或者多播传输方式。第一装置或者CU将进行第一安全处理后的第一数据递交给对应单播传输方式的RLC实体,将进行第二安全处理后的第二数据递交给对应多播传输方式的RLC实体。也就是说,数据的传输方式或者递交数据的RLC实体和安全处理方式之间存在对应关系。该对应关系可以是预配置的或者是协议预定的。In S330, the first device or CU separately performs security processing on the first data and the second data in the first PDCP entity. The first data that has undergone the first security processing is delivered to one or RLC entity associated with the first PDCP, and the second data that has undergone the second security processing is also delivered to the one or RLC entity associated with the first PDCP. Specifically, due to one or RLC entity associated with the first PDCP, one RLC entity corresponds to a unicast transmission mode or a multicast transmission mode. The first device or CU delivers the first data after the first security processing to the RLC entity corresponding to the unicast transmission mode, and delivers the second data after the second security processing to the RLC entity corresponding to the multicast transmission method. In other words, there is a correspondence between the data transmission method or the RLC entity that submits the data and the security processing method. The corresponding relationship may be pre-configured or predetermined by agreement.
例如,结合图9所示的例子,第一PDCP层实体将进行第一安全处理后的第一数据递交给第一RLC实体,并且,将进行第二安全处理后的第二数据递交给第二RLC实体。又例如,结合图10所示的例子,第一PDCP层实体将进行第一安全处理后的第一数据递交给第三RLC实体,并且,将进行第二安全处理后的第二数据递交给第三RLC实体。For example, in conjunction with the example shown in FIG. 9, the first PDCP layer entity submits the first data after the first security processing to the first RLC entity, and submits the second data after the second security processing to the second RLC entity. RLC entity. For another example, in conjunction with the example shown in FIG. 10, the first PDCP layer entity submits the first data after the first security processing to the third RLC entity, and submits the second data after the second security processing to the third RLC entity. Three RLC entities.
第一装置或者DU根据数据的第一传输方式,向第二装置发送经过该第一安全处理后的第一数据,和/或,发送经过该第二安全处理后的第二数据。即DU或者第一装置的RLC层实体在单播传输方式、多播传输方式、单播和多播传输方式中确定出第一传输方式。其中,该第一传输方式为单播传输方式、多播传输方式、单播和多播传输方式中的至少一个。第一装置利用该第一传输方式,在相应的RLC实体中向第二装置发送数据。相应的,第二装置接收该第一装置发送的数据。The first device or the DU sends the first data after the first security processing to the second device according to the first transmission mode of the data, and/or sends the second data after the second security processing. That is, the RLC layer entity of the DU or the first device determines the first transmission mode among unicast transmission modes, multicast transmission modes, unicast and multicast transmission modes. Wherein, the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, a unicast transmission mode, and a multicast transmission mode. The first device uses the first transmission mode to send data to the second device in the corresponding RLC entity. Correspondingly, the second device receives the data sent by the first device.
在S340中,第二装置根据接收到的经过相应安全处理后的数据,确定该数据的第一传输方式。例如,如果第二装置从第四RLC实体或者第六RLC实体接收到数据,则确定该数据对应的第一传输方式为单播传输方式。如果第二装置从第五RLC实体或者第六RLC实体接收到数据,则确定该数据对应的第一传输方式为多播传输方式。如果第二装置从第四RLC实体和第五RLC实体接收到数据,则确定该数据对应的第一传输方式为单播和多播传输方式。In S340, the second device determines the first transmission mode of the data according to the received data after corresponding security processing. For example, if the second device receives data from the fourth RLC entity or the sixth RLC entity, it is determined that the first transmission mode corresponding to the data is a unicast transmission mode. If the second device receives data from the fifth RLC entity or the sixth RLC entity, it determines that the first transmission mode corresponding to the data is a multicast transmission mode. If the second device receives data from the fourth RLC entity and the fifth RLC entity, it determines that the first transmission mode corresponding to the data is unicast and multicast transmission.
在S350,第二装置根据第一传输方式,确定对该第一数据的安全处理方式。具体的,第二装置的PDCP实体(第二PDCP实体)根据从与之关联不同的RLC实体接收到数据,可以确定第一数据不同的传输方式,根据第一数据不同的传输方式,确定对应的安全处理方式。也就是说,数据的传输方式或者递交数据的RLC实体和安全处理方式之间存在对 应关系。该对应关系可以是预配置的或者是协议预定的。In S350, the second device determines a safe processing mode for the first data according to the first transmission mode. Specifically, the PDCP entity (the second PDCP entity) of the second device can determine the different transmission modes of the first data according to the data received from the different RLC entities associated with it, and determine the corresponding transmission modes according to the different transmission modes of the first data. Safe handling. In other words, there is a correspondence between the data transmission method or the RLC entity that submits the data and the security processing method. The corresponding relationship may be pre-configured or predetermined by agreement.
例如,当第一传输方式为单播传输方式时,第二PDCP实体对接收到的经过第一安全处理后的第一数据进行第三安全处理。For example, when the first transmission mode is a unicast transmission mode, the second PDCP entity performs third security processing on the received first data after the first security processing.
例如,当第一传输方式为多播传输方式时,第二PDCP实体对接收到的经过第二安全处理后的第二数据进行第四安全处理。For example, when the first transmission mode is a multicast transmission mode, the second PDCP entity performs fourth security processing on the received second data after the second security processing.
当第一传输方式为单播和多播传输方式时,第二PDCP实体对接收到的经过第一安全处理后的第一数据进行第三安全处理,对接收到的经过第二安全处理后的第二数据进行第四安全处理。When the first transmission mode is unicast and multicast transmission, the second PDCP entity performs third security processing on the received first data after the first security processing, and performs the third security processing on the received data after the second security processing. The second data undergoes the fourth security processing.
其中,第三安全处理可以是与第一安全处理相对应的过程,例如加密和解密、完整性验证和完整性保护。第四安全处理可以是与第二安全处理相对应的过程,例如加密和解密、完整性验证和完整性保护。Among them, the third security process may be a process corresponding to the first security process, such as encryption and decryption, integrity verification, and integrity protection. The fourth security process may be a process corresponding to the second security process, such as encryption and decryption, integrity verification, and integrity protection.
本申请提供的数据安全的方法,通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。在进行数据传输的时,对该数据所有可能的传输方式分别进行对应安全处理过程,将安全处理后的多份数据分别递交相应传输方式的RLC实体,最终通过RLC实体确定数据采用的传输方式,利用确定的传输方式发送数据。提高了数据传输的安全性。并且,能够实现同一个承载内不同的安全处理过程,满足不同传输方式下的数据的安全需求,提高通信效率。The data security method provided in this application associates one or more RLC entities by configuring a PDCP. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode. When performing data transmission, all possible transmission methods of the data are respectively subjected to corresponding security processing procedures, and multiple copies of the data after the security processing are respectively submitted to the RLC entity of the corresponding transmission method, and finally the RLC entity determines the transmission method used for the data. Use a certain transmission method to send data. Improve the security of data transmission. In addition, different security processing procedures in the same bearer can be realized, meeting the security requirements of data in different transmission modes, and improving communication efficiency.
在本申请一些可能的实现方式中:在上述的S330中,第一装置或者CU根据第一传输方式,向第二装置发送数据时有如下几种情况:In some possible implementation manners of this application: in the foregoing S330, the first device or the CU sends data to the second device according to the first transmission mode in the following situations:
当该第一传输方式为单播传输方式时,第一装置(或者CU)通过第一RLC实体或者第三RLC实体向第二装置发送经过该第一安全处理后的第一数据。可选的,将第二RLC实体中的第二安全处理后的第二数据删除,或者,将第三RLC实体中经过第二安全处理后的第二数据删除。When the first transmission mode is a unicast transmission mode, the first device (or CU) sends the first data after the first security processing to the second device through the first RLC entity or the third RLC entity. Optionally, delete the second data after the second security processing in the second RLC entity, or delete the second data after the second security processing in the third RLC entity.
当该第一传输方式为多播传输方式时,第一装置(或者CU)通过第二RLC实体或者第三RLC实体向第二装置发送经过该第二安全处理后的第二数据。可选的,将第一RLC实体中的第一安全处理后的第一数据删除,或者,将第三RLC实体中经过第一安全处理后的第一数据删除。When the first transmission mode is a multicast transmission mode, the first device (or CU) sends the second data after the second security processing to the second device through the second RLC entity or the third RLC entity. Optionally, delete the first data after the first security processing in the first RLC entity, or delete the first data after the first security processing in the third RLC entity.
当该第一传输方式为单播和多播传输方式时,第一装置(或者CU)通过第一RLC实体向第二装置发送经过该第一安全处理后的第一数据,并且,通过第二RLC实体向第二装置发送经过该第二安全处理后的第二数据。When the first transmission mode is unicast and multicast transmission, the first device (or CU) sends the first data after the first security processing to the second device through the first RLC entity, and the second The RLC entity sends the second data after the second security processing to the second device.
在本申请一些可能的实现方式中:该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护,该第二安全处理为不进行安全处理。即不对第二数据进行安全处理可以视为一种安全处理方式。In some possible implementation manners of this application: the first security processing includes using the first parameter and/or the first algorithm to encrypt data and/or integrity protection, and the second security processing is not performing security processing. That is, not performing the secure processing of the second data can be regarded as a secure processing method.
在本申请另一些可能的实现方式中:该第一安全处理为不进行安全处理。该第二安全处理包括利用第二参数和/或第二算法对第二数据进行加密和/或完整性保护。In some other possible implementation manners of this application: the first security processing is no security processing. The second security processing includes using the second parameter and/or the second algorithm to perform encryption and/or integrity protection on the second data.
在本申请另一些可能的实现方式中:该第一安全处理包括利用第一参数和/或第一算法对第一数据进行加密和/或完整性保护,该第二安全处理包括利用第二参数和/或第二算法对第二数据进行加密和/或完整性保护。其中,该第一参数和该第二参数相同或者不同, 该第一算法和该第二算法相同或者不同。即第一安全处理和第二安全处理可以相同,也可以不同。In some other possible implementations of the present application: the first security processing includes using a first parameter and/or a first algorithm to encrypt and/or integrity protection of the first data, and the second security processing includes using a second parameter And/or the second algorithm performs encryption and/or integrity protection on the second data. Wherein, the first parameter and the second parameter are the same or different, and the first algorithm and the second algorithm are the same or different. That is, the first security process and the second security process can be the same or different.
第一装置可以利用上述的第一安全处理和第二安全处理方式,在第一PDCP实体中对第一数据和第二数据分别进行相应的安全处理。The first device may use the foregoing first security processing and second security processing methods to perform corresponding security processing on the first data and the second data in the first PDCP entity, respectively.
可选的,在本申请实施例中,该第一参数包括第一秘钥,该第二参数包括第二秘钥。第一秘钥可以为加密秘钥,第二秘钥也可为加密秘钥,第一秘钥和第二秘钥可以相同,也可以不同。Optionally, in this embodiment of the present application, the first parameter includes a first secret key, and the second parameter includes a second secret key. The first secret key may be an encryption secret key, and the second secret key may also be an encryption secret key. The first secret key and the second secret key may be the same or different.
还应理解,在本申请实施例中,第一参数和第二参数除了包括秘钥之外还可以包括数据的无线承载标识、数据包的计数值(count值)、数据包的序列号(Sequence Number,SN)、随机数等。本申请对于第一参数具体内容不作限制。进一步的。第一参数包括的无线承载标识、count值、SN、随机数等可以分别和第二参数包括的无线承载标识、count值、SN、随机数相同或者不同。It should also be understood that, in the embodiment of the present application, the first parameter and the second parameter may also include the radio bearer identification of the data, the count value (count value) of the data packet, and the sequence number of the data packet (Sequence Number) in addition to the secret key. Number, SN), random number, etc. This application does not limit the specific content of the first parameter. further. The radio bearer identifier, count value, SN, random number, etc. included in the first parameter may be the same or different from the radio bearer identifier, count value, SN, and random number included in the second parameter, respectively.
对于S340和S350的描述,可以参考方法200中对于S240和S250的描述,为了简洁,这里不再赘述。For the description of S340 and S350, please refer to the description of S240 and S250 in the method 200. For brevity, details are not repeated here.
在本申请一些可能的实现方式中:第三安全处理包括利用第三参数和/或第三算法对数据进行解密和/或完整性验证,或者,第三安全处理为不进行安全处理。其中,不进行安全处理可以理解为不对数据进行解密和/或完整性验证,但是采用其他的方式对数据进行处理。或者,不进行安全处理可以为对数据不进行任何的安全处理。In some possible implementation manners of this application: the third security processing includes using a third parameter and/or a third algorithm to decrypt and/or integrity verification of the data, or the third security processing is no security processing. Among them, not performing security processing can be understood as not performing decryption and/or integrity verification on the data, but using other methods to process the data. Or, not performing security processing can mean not performing any security processing on the data.
在本申请一些可能的实现方式中:第四安全处理包括利用第四参数和/或第四算法对数据进行解密和/或完整性验证,或者,第四安全处理为不进行安全处理。In some possible implementation manners of the present application: the fourth security processing includes using the fourth parameter and/or the fourth algorithm to decrypt and/or verify the integrity of the data, or the fourth security processing is no security processing.
应理解,关于第一安全处理至第四安全处理的描述可以参考上述方法200中对于第一安全处理至第四安全处理的描述。为了简洁,这里不再赘述。It should be understood that, for the description of the first security processing to the fourth security processing, reference may be made to the description of the first security processing to the fourth security processing in the above method 200. For the sake of brevity, I won't repeat them here.
还应理解,在本申请实施例中,第三参数和第四参数除了包括秘钥之外还可以包括数据的无线承载标识、数据包的计数值(count值)、数据包的序列号(Sequence Number,SN)、随机数等。It should also be understood that, in the embodiment of the present application, the third parameter and the fourth parameter may include the radio bearer identification of the data, the count value (count value) of the data packet, and the sequence number of the data packet in addition to the secret key. Number, SN), random number, etc.
还应理解,上述的第一参数、第二参数、第三参数、第四参数,以及第一算法至第四算法可以是预先配置的,或者,还可以是协议定义的。图12是本申请一个实施例的数据安全处理的方法400的示意性流程图,该方法400可以应用在图3所示的场景中,例如,利用多播传输方式传输和/或利用单播传输方式传输的场景中。本申请实施例在此不作限制。It should also be understood that the above-mentioned first parameter, second parameter, third parameter, and fourth parameter, and the first to fourth algorithms may be pre-configured, or may also be defined by the protocol. FIG. 12 is a schematic flowchart of a method 400 for data security processing according to an embodiment of the present application. The method 400 may be applied in the scenario shown in FIG. 3, for example, using multicast transmission and/or using unicast transmission. Way to transfer the scene. The embodiments of the application are not limited here.
如图12所示,图12中示出的方法400可以包括步骤S410至步骤S450。下面结合图11详细说明方法400中的各个步骤。该方法400包括:As shown in FIG. 12, the method 400 shown in FIG. 12 may include step S410 to step S450. The steps in the method 400 are described in detail below with reference to FIG. 11. The method 400 includes:
S410,第一装置对第一数据进行第一安全处理。S410: The first device performs first security processing on the first data.
S420,第一装置确定经过该第一安全处理后的第一数据的第一传输方式,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,该单播和多播传输方式为使用单播和多播进行传输的传输方式。S420. The first device determines a first transmission mode of the first data after the first security processing, where the first transmission mode is a unicast transmission mode, a multicast transmission mode, or at least one of a unicast transmission mode and a multicast transmission mode. One, the unicast and multicast transmission methods are transmission methods that use unicast and multicast for transmission.
S430,当该第一传输方式为单播传输方式,第一装置利用该单播传输方式向第二装置发送经过该第一安全处理后的第一数据;S430: When the first transmission mode is a unicast transmission mode, the first device uses the unicast transmission mode to send the first data after the first security processing to the second device;
当该第一传输方式为多播传输方式,第一装置利用该多播传输方式向第二装置发送经 过该第一安全处理后的第一数据;When the first transmission mode is a multicast transmission mode, the first device uses the multicast transmission mode to send the first data after the first security processing to the second device;
当该第一传输方式为单播和多播传输方式,第一装置利用该单播传输方式向第二装置发送经过该第一安全处理后的第一数据,利用该多播传输方式向第二装置发送第三数据,该第三数据是通过复制经过第一安全处理后的第一数据得到的。When the first transmission method is unicast and multicast transmission, the first device uses the unicast transmission method to send the first data after the first security processing to the second device, and uses the multicast transmission method to send the first data to the second device. The device sends third data, which is obtained by copying the first data after the first security processing.
相应的,第二装置接收第一装置发送的数据。Correspondingly, the second device receives the data sent by the first device.
S440,第二装置确定接收到的数据的第一传输方式,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个。S440: The second device determines a first transmission mode of the received data, where the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast transmission mode and a multicast transmission mode.
S450,第二装置根据第一传输方式,确定对接收到的数据的安全处理方式。S450: The second device determines a safe processing mode for the received data according to the first transmission mode.
在S410中,当第一装置有数据(以第一数据为例)向第二装置发送时,第一装置先在PDCP层对该第一数据进行第一安全处理。即第一数据对应的安全处理方式为第一安全处理。第一装置的协议栈中的第一PDCP实体关联一个或者多个RLC实体,一个RLC实体的传输方式为单播传输方式或者多播传输方式。第二装置的协议栈中的第二PDCP实体关联一个或者多个RLC实体,一个RLC实体的传输方式为单播传输方式或者多播传输方式。关于第一装置和第二装置的协议栈的具体描述可以参考上述方法200对第一装置协议栈的描述,为了简洁,这里不再赘述。In S410, when the first device has data (taking the first data as an example) to send to the second device, the first device first performs the first security processing on the first data at the PDCP layer. That is, the security processing method corresponding to the first data is the first security processing. The first PDCP entity in the protocol stack of the first device is associated with one or more RLC entities, and the transmission mode of one RLC entity is a unicast transmission mode or a multicast transmission mode. The second PDCP entity in the protocol stack of the second device is associated with one or more RLC entities, and the transmission mode of one RLC entity is a unicast transmission mode or a multicast transmission mode. For specific descriptions of the protocol stacks of the first device and the second device, reference may be made to the description of the protocol stack of the first device in the above method 200. For brevity, details are not repeated here.
在S420中,在对第一数据进行安全处理后,第一装置确定经过该第一安全处理后的第一数据的第一传输方式。可选的,如果接入网设备采用的是CU和DU分离设置模式,则第一装置可以为CU。假设采用何种传输方式由第一装置的PDCP层(或者CU)决定,例如,可以是第一装置的PDCP层确定或者判断第一传输方式。即PDCP层(CU)在单播传输方式、多播传输方式、单播和多播传输方式中确定该第一传输方式。关于单播传输方式、多播传输方式、单播和多播传输方式的相关描述,可以参考上述方法200中相关描述,为了简洁,这里不再赘述。In S420, after performing security processing on the first data, the first device determines a first transmission mode of the first data after the first security processing. Optionally, if the access network equipment adopts the CU and DU separate setting mode, the first device may be a CU. It is assumed that which transmission mode is used is determined by the PDCP layer (or CU) of the first device. For example, the PDCP layer of the first device may determine or determine the first transmission mode. That is, the PDCP layer (CU) determines the first transmission mode among unicast transmission modes, multicast transmission modes, unicast and multicast transmission modes. For related descriptions of unicast transmission mode, multicast transmission mode, unicast and multicast transmission mode, reference may be made to the related description in the foregoing method 200, and for brevity, details are not repeated here.
在S430中,当该第一传输方式为单播传输方式,第一装置利用该单播传输方式向第二装置发送经过该第一安全处理后的第一数据。具体的,第一装置的第一PDCP实体确定第一传输方式为单播传输方式时,向与第一PDCP实体关联的单播类型的RLC实体递交经过该第一安全处理后的第一数据。并通过与第一PDCP实体关联的单播类型的RLC实体向第二装置发送经过该第一安全处理后的第一数据。例如,第一装置可以通过第一RLC实体或者第三RLC实体向第二装置发送经过第一安全处理后的第一数据,第一RLC实体对应单播传输方式,第三RLC实体对应单播传输方式。相应的,第二装置接收第一装置发送的经过该第一安全处理后的第一数据,并将接收到的数据递交给第二装置相应的RLC实体。例如,第二装置根据分配的或者预定义的与第一RLC实体或者第三RLC实体对应的RNTI进行接收,将接收到的单播传输方式的数据递交给第四RLC实体或者第六RLC实体。In S430, when the first transmission mode is a unicast transmission mode, the first device uses the unicast transmission mode to send the first data after the first security processing to the second device. Specifically, when the first PDCP entity of the first device determines that the first transmission mode is the unicast transmission mode, it delivers the first data after the first security processing to the unicast type RLC entity associated with the first PDCP entity. And send the first data after the first security processing to the second device through the unicast type RLC entity associated with the first PDCP entity. For example, the first device may send the first data after the first security processing to the second device through the first RLC entity or the third RLC entity. The first RLC entity corresponds to unicast transmission, and the third RLC entity corresponds to unicast transmission. the way. Correspondingly, the second device receives the first data sent by the first device after the first security processing, and delivers the received data to the corresponding RLC entity of the second device. For example, the second device receives according to the allocated or predefined RNTI corresponding to the first RLC entity or the third RLC entity, and delivers the received unicast transmission mode data to the fourth RLC entity or the sixth RLC entity.
当该第一传输方式为多播传输方式,第一装置利用该多播传输方式向第二装置发送经过该第一安全处理后的第一数据。具体的,第一装置的第一PDCP实体确定第一传输方式为多播传输方式时,向与第一PDCP实体关联的多播类型的RLC实体递交经过该第一安全处理后的第一数据。并通过与第一PDCP实体关联的多播类型的RLC实体向第二装置发送数据。例如,第一装置可以通过第二RLC实体或者第三RLC实体向第二装置发送经过第一安全处理后的第一数据。第二RLC实体对应多播传输方式,第三RLC实体对应多 播传输方式。相应的,第二装置接收第一装置发送的经过该第一安全处理后的第一数据。并将该接收到的数据递交给第二装置相应的RLC实体。例如,第二装置根据分配的或者预定义的与第二RLC实体或者第三RLC实体对应的RNTI进行接收,将接收到的单播传输方式的数据递交给第五RLC实体或者第六RLC实体。When the first transmission mode is a multicast transmission mode, the first device uses the multicast transmission mode to send the first data after the first security processing to the second device. Specifically, when the first PDCP entity of the first device determines that the first transmission mode is the multicast transmission mode, it delivers the first data after the first security processing to the RLC entity of the multicast type associated with the first PDCP entity. And send data to the second device through a multicast type RLC entity associated with the first PDCP entity. For example, the first device may send the first data after the first security processing to the second device through the second RLC entity or the third RLC entity. The second RLC entity corresponds to the multicast transmission mode, and the third RLC entity corresponds to the multicast transmission mode. Correspondingly, the second device receives the first data sent by the first device after the first security processing. And submit the received data to the corresponding RLC entity of the second device. For example, the second device receives according to the allocated or predefined RNTI corresponding to the second RLC entity or the third RLC entity, and delivers the received unicast transmission mode data to the fifth RLC entity or the sixth RLC entity.
当该第一传输方式为单播和多播传输方式时,第一装置利用该单播传输方式向第二装置发送经过该第一安全处理后的第一数据,利用该多播传输方式向第二装置发送第三数据,该第三数据与经过该第一安全处理后的第一数据的相同。第三数据可以是对经过该第一安全处理后的第一数据经过复制得到的,也可以是先将第一数据进行复制,然后对复制后的数据进行第一安全处理,得到第三数据。即多播传输方式对应的安全处理方式和单传输方式对应的安全处理方式是相同的。When the first transmission method is unicast or multicast transmission, the first device uses the unicast transmission method to send the first data after the first security processing to the second device, and uses the multicast transmission method to send the first data to the second device. The second device sends third data, and the third data is the same as the first data after the first security processing. The third data may be obtained by copying the first data after the first security processing, or may be obtained by copying the first data first, and then performing the first security processing on the copied data to obtain the third data. That is, the security processing mode corresponding to the multicast transmission mode and the security processing mode corresponding to the single transmission mode are the same.
具体的,第一装置的第一PDCP实体确定第一传输方式为单播和多播传输方式时,向与第一PDCP实体关联的单播类型的RLC实体递交经过该第一安全处理后的第一数据,向多播类型的RLC实体递交第三数据。其中,该第三数据与经过该第一安全处理后的第一数据的相同。第一装置通过与第一PDCP实体关联的单播类型的RLC实体向第二装置发送经过该第一安全处理后的第一数据数,通过多播类型的RLC实体向第二装置发送第三数据。例如,第一装置可以通过第一RLC实体向第二装置发送经过第一安全处理后的第一数据,通过第二RLC实体向第二装置发送第三数据。第一RLC实体对应单播传输方式,第二RLC实体对应多播传输方式。相应的,第二装置接收第一装置发送的数据。并将该接收到的数据递交给第二装置相应的RLC实体。例如,第二装置根据分配的或者预定义的与第一RLC实体和第二RLC实体对应的RNTI进行接收,将接收到的单播传输方式的数据递交给第四RLC实体,将接收到的多播传输方式的数据递交给第五RLC实体。Specifically, when the first PDCP entity of the first device determines that the first transmission mode is unicast or multicast transmission, it submits the first security process to the RLC entity of the unicast type associated with the first PDCP entity. One data, the third data is delivered to the RLC entity of the multicast type. Wherein, the third data is the same as the first data after the first security processing. The first device sends the first data number after the first security processing to the second device through the unicast type RLC entity associated with the first PDCP entity, and sends the third data to the second device through the multicast type RLC entity . For example, the first device may send the first data after the first security processing to the second device through the first RLC entity, and send the third data to the second device through the second RLC entity. The first RLC entity corresponds to a unicast transmission mode, and the second RLC entity corresponds to a multicast transmission mode. Correspondingly, the second device receives the data sent by the first device. And submit the received data to the corresponding RLC entity of the second device. For example, the second device receives the allocated or predefined RNTI corresponding to the first RLC entity and the second RLC entity, delivers the received unicast transmission mode data to the fourth RLC entity, and transfers the received data to the fourth RLC entity. The data in the broadcast transmission mode is delivered to the fifth RLC entity.
在S440,第二装置根据接收到的经过第一安全处理后的数据,确定接收到的数据的第一传输方式。其中,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个。例如,如果第二装置如果从第四RLC实体或者第六RLC实体接收到数据,则确定该数据对应的第一传输方式为单播传输方式。第二装置如果从第五RLC实体或者第六RLC实体接收到数据,则确定该数据对应的第一传输方式为多播传输方式。第二装置如果从第四RLC实体和第五RLC实体接收到数据,则确定该数据对应的第一传输方式为单播和多播传输方式。In S440, the second device determines the first transmission mode of the received data according to the received data after the first security processing. Wherein, the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast transmission and a multicast transmission mode. For example, if the second device receives data from the fourth RLC entity or the sixth RLC entity, it determines that the first transmission mode corresponding to the data is a unicast transmission mode. If the second device receives data from the fifth RLC entity or the sixth RLC entity, it determines that the first transmission mode corresponding to the data is the multicast transmission mode. If the second device receives data from the fourth RLC entity and the fifth RLC entity, it determines that the first transmission mode corresponding to the data is unicast and multicast transmission.
在S450中,第二装置根据第一传输方式,确定对接收到数据的安全处理方式。具体的,第二装置的PDCP实体(第二PDCP实体)根据从与之关联不同的RLC实体接收到数据,可以确定数据的第一传输方式,根据第一传输方式,确定对应的安全处理方式。In S450, the second device determines a safe processing method for the received data according to the first transmission method. Specifically, the PDCP entity (second PDCP entity) of the second device may determine the first transmission mode of the data according to the data received from the different RLC entities associated with it, and determine the corresponding security processing mode according to the first transmission mode.
例如,当第一传输方式为单播传输方式时,第二PDCP实体对接收到的经过第一安全处理后的第一数据进行第三安全处理。也就是说数据的传输方式或者递交数据的RLC实体和安全处理方式之间存在对应关系。该对应关系可以是预配置的或者是协议预定的。For example, when the first transmission mode is a unicast transmission mode, the second PDCP entity performs third security processing on the received first data after the first security processing. That is to say, there is a correspondence between the data transmission method or the RLC entity that submits the data and the security processing method. The corresponding relationship may be pre-configured or predetermined by agreement.
例如,当第一传输方式为多播传输方式时,第二PDCP实体对接收到的经过第一安全处理后的第一数据也进行第三安全处理。即多播传输方式对应的安全处理方式和单传输方式对应的安全处理方式是相同的。For example, when the first transmission mode is a multicast transmission mode, the second PDCP entity also performs third security processing on the received first data after the first security processing. That is, the security processing mode corresponding to the multicast transmission mode and the security processing mode corresponding to the single transmission mode are the same.
当第一传输方式为单播和多播传输方式时,第二PDCP实体对接收到的经过单播传输方式的第一数据进行第三安全处理,对接收到的经过多播传输方式的第三数据也进行第三 安全处理。When the first transmission mode is unicast and multicast transmission, the second PDCP entity performs third security processing on the received first data through the unicast transmission mode, and performs third security processing on the received third data through the multicast transmission mode. The data is also processed for third security.
其中,第三安全处理可以是与第一安全处理相对应的过程,例如加密和解密、完整性验证和完整性保护。Among them, the third security process may be a process corresponding to the first security process, such as encryption and decryption, integrity verification, and integrity protection.
对于S440和S450的描述,可以参考方法200中对于S240和S250的描述,为了简洁,这里不再赘述。For the description of S440 and S450, reference may be made to the description of S240 and S250 in the method 200. For brevity, details are not repeated here.
本申请提供的数据安全的方法,通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。通在进行数据传输的时,可以采用单播传输方式、多播传输方式、或者单播和多播传输方式进行数据的传输。并且,由于单播传输方式和多播传输方式对应的安全处理方式是相同的。第一装置先将数据进行安全处理,然后根据数据不用的传输方式,发送经过安全处理后的数据。提高了数据传输的安全性。能够实现同一个承载内数据安全处理过程,满足不同传输方式下的数据的安全需求,提高通信效率。The data security method provided in this application associates one or more RLC entities by configuring a PDCP. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode. During data transmission, unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission. In addition, the security processing methods corresponding to the unicast transmission mode and the multicast transmission mode are the same. The first device first processes the data securely, and then sends the securely processed data according to the unused transmission mode of the data. Improve the security of data transmission. It can realize the data security processing process in the same bearer, meet the security requirements of data under different transmission modes, and improve communication efficiency.
在本申请一些可能的实现方式中:该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护,或者,该第一安全处理为不进行安全处理,其中,不进行安全处理可以理解为不对数据进行加密和/或完整性保护,但是采用其他的方式对数据进行处理。或者,不进行安全处理可以为对数据不进行任何的安全处理。In some possible implementation manners of this application: the first security processing includes using the first parameter and/or the first algorithm to encrypt data and/or integrity protection, or the first security processing is no security processing, Among them, not performing security processing can be understood as not performing encryption and/or integrity protection on the data, but using other methods to process the data. Or, not performing security processing can mean not performing any security processing on the data.
可选的,在本申请实施例中,该第一参数包括第一秘钥。Optionally, in this embodiment of the present application, the first parameter includes the first secret key.
在本申请一些可能的实现方式中:第三安全处理包括利用第三参数和/或第三算法对数据进行解密和/或完整性验证,或者,第三安全处理为不进行安全处理,其中,不进行安全处理可以理解为不对数据进行解密和/或完整性验证,但是采用其他的方式对数据进行处理。或者,不进行安全处理可以为对数据不进行任何的安全处理。In some possible implementations of this application: the third security processing includes decrypting and/or integrity verification of data using a third parameter and/or a third algorithm, or the third security processing is no security processing, where, Failure to perform security processing can be understood as not decrypting and/or integrity verification of the data, but using other methods to process the data. Or, not performing security processing can mean not performing any security processing on the data.
例如,对于第一数据传输方式为单播传输方式,第一装置在第一PDCP实体中对第一数据利用第一秘钥进行加密,然后将利用第一秘钥加密后的第一数据发送给第二装置。或者,利用第一算法以及第一秘钥等计算出一个参数,并将这个参数发送给第二装置。第二装置利用第三秘钥在第二PDCP实体中对第一秘钥加密后的第一数据进行解密。或者,第二装置利用第三算法以及第三秘钥等计算出一个参数B,如果参数A和参数B相同,则完整性验证通过。For example, for the first data transmission mode to be the unicast transmission mode, the first device encrypts the first data in the first PDCP entity with the first secret key, and then sends the first data encrypted with the first secret key to The second device. Or, use the first algorithm and the first secret key to calculate a parameter, and send this parameter to the second device. The second device uses the third key to decrypt the first data encrypted by the first key in the second PDCP entity. Or, the second device uses the third algorithm and the third secret key to calculate a parameter B. If the parameter A and the parameter B are the same, the integrity verification is passed.
应理解,关于第一安全处理至第四安全处理的描述可以参考上述方法200中对于第一安全处理至第四安全处理的描述。为了简洁,这里不再赘述。It should be understood that, for the description of the first security processing to the fourth security processing, reference may be made to the description of the first security processing to the fourth security processing in the above method 200. For the sake of brevity, I won't repeat them here.
还应理解,在本申请实施例中,第一参数除了包括第一秘钥之外还可以包括数据的无线承载标识、数据包的计数值(count值)、数据包的序列号(Sequence Number,SN)、随机数等。计数值(count值)可以包括SN和超帧号(Hyper Frame Number,HFN)。本申请对于第一参数包括的具体内容不作限制。It should also be understood that, in the embodiment of the present application, the first parameter may also include the radio bearer identification of the data, the count value (count value) of the data packet, and the sequence number (Sequence Number) of the data packet in addition to the first secret key. SN), random numbers, etc. The count value (count value) may include SN and Hyper Frame Number (Hyper Frame Number, HFN). This application does not limit the specific content included in the first parameter.
还应理解,在本申请实施例中,第三参数除了包括第一秘钥之外还可以包括数据的无线承载标识、数据包的计数值(count值)、数据包的序列号(Sequence Number,SN)、随机数等。计数值(count值)可以包括SN和超帧号(Hyper Frame Number,HFN)It should also be understood that, in the embodiment of the present application, the third parameter may also include the radio bearer identification of the data, the count value (count value) of the data packet, and the sequence number (Sequence Number) of the data packet in addition to the first secret key. SN), random numbers, etc. The count value (count value) can include SN and Hyper Frame Number (Hyper Frame Number, HFN)
在本申请的实施例中,第一装置可以将上述的秘钥(密钥)等配置信息发送给第二装置。并且,可以针对不同类型的无线承载分别维护对应的密钥和/或加密完保算法。具体 的,在利用传统的单播无线承载传输数据的时候,数据的安全处理利用现有的密钥和/或加密完保算法(加密算法和完整性保护算法),同一个终端设备的所有单播无线承载使用相同的密钥和/或加密完保算法,不同终端设备的单播无线承载使用不同的密钥和/或加密完保算法;在利用本申请中的支持多种传输方式的无线承载(第一类型无线承载)进行数据传输的时候,网络设备可以为至少一个终端设备配置公共的密钥和/或加密完保算法,用于对第一类型无线承载中的数据进行安全处理,在这种情况下,不同终端设备中,用于接收相同业务的第一类型无线承载可以使用相同的密钥和/或加密完保算法对数据进行处理,而对于同一个终端设备来说,针对不同类型的无线承载(单播无线承载,多播无线承载以及第一类型无线承载)需要维护不同的密钥和/或加密完保算法,用于对相应的数据进行安全处理。进一步的,对于同一个终端设备来说,针对相同类型的无线承载(单播无线承载,多播无线承载以及第一类型无线承载),如果所述相同类型承载用于传输不同的业务,终端设备也可以维护不同的密钥和/或加密完保算法,用于对相应的数据进行安全处理,本申请不作限定。In the embodiment of the present application, the first device may send configuration information such as the aforementioned secret key (key) to the second device. In addition, corresponding keys and/or encryption security algorithms can be maintained for different types of radio bearers. Specifically, when using the traditional unicast radio bearer to transmit data, the security processing of the data uses the existing key and/or the encryption integrity protection algorithm (encryption algorithm and integrity protection algorithm), and all orders of the same terminal device The broadcast radio bearer uses the same key and/or encryption guarantee algorithm, and the unicast radio bearers of different terminal devices use different keys and/or encryption guarantee algorithms; in this application, the wireless support for multiple transmission methods is used. When the bearer (the first type of radio bearer) performs data transmission, the network device may configure a public key and/or encryption security algorithm for at least one terminal device for secure processing of the data in the first type of radio bearer, In this case, in different terminal devices, the first type radio bearers used to receive the same service can use the same key and/or encryption encryption algorithm to process the data, and for the same terminal device, Different types of radio bearers (unicast radio bearers, multicast radio bearers, and first type radio bearers) need to maintain different keys and/or encryption security algorithms for safe processing of corresponding data. Further, for the same terminal device, for the same type of radio bearer (unicast radio bearer, multicast radio bearer, and first type radio bearer), if the same type of bearer is used to transmit different services, the terminal device It is also possible to maintain different keys and/or encryption security algorithms for safe processing of corresponding data, which is not limited in this application.
例如,第一装置(以网络设备为例)将安全配置信息发送给第二装置(以终端设备为例),安全配置信息可以包括一套或者多套密钥的配置、算法的配置等,该密钥可以是多个终端设备都可以使用的公共密钥。该安全配置信息可以是在承载建立的时候发送给终端设备的也可以是提前发送给终端设备,也可以基于终端设备的请求发送给终端设备。例如,该安全配置信息可以携带在无线承载配置信息,PDCP配置信息或者其他配置信息中。终端设备针对不行类型的承载维护多套密钥信息,例如,一套密钥信息用于普通的只支持单播承载,一套用于支持单播和/或多播的承载。对于终端设备而言,安全配置信息也可以预置在终端设备中或者根据终端设备预置的信息进行推演得到;对于网络设备而言,安全配置信息可以是核心网发送给网络设备或者终端设备发送给网络设备或者网络设备中预置的或者网络设备根据预置信息推演得到的。For example, the first device (taking the network device as an example) sends security configuration information to the second device (taking the terminal device as an example). The security configuration information may include one or more sets of key configuration, algorithm configuration, etc. The key can be a public key that can be used by multiple terminal devices. The security configuration information may be sent to the terminal device when the bearer is established, or may be sent to the terminal device in advance, or may be sent to the terminal device based on the request of the terminal device. For example, the security configuration information may be carried in radio bearer configuration information, PDCP configuration information or other configuration information. The terminal device maintains multiple sets of key information for unsuitable types of bearers. For example, one set of key information is used for ordinary bearers that only support unicast, and one set is used for bearers that support unicast and/or multicast. For terminal devices, the security configuration information can also be preset in the terminal device or derived from the information preset by the terminal device; for network devices, the security configuration information can be sent by the core network to the network device or the terminal device. For network equipment or pre-installed in network equipment or derived from network equipment based on preset information.
终端设备的PDCP层针对不同类型的承载,采用对应类型的密钥和/或加密完保算法进行安全处理。例如对于支持单播和/或多播的承载。网络设备的PDCP层采用多个终端设备共用的公共密钥对数据进行安全处理以后发送给一个或者多个终端设备。终端设备收到安全配置信息以后,终端设备的PDCP层针对支持单播和/或多播的承载采用对应的公共密钥进行相应的安全处理。For different types of bearers, the PDCP layer of the terminal device uses corresponding types of keys and/or encryption security algorithms for security processing. For example, for bearers that support unicast and/or multicast. The PDCP layer of the network device uses a public key shared by multiple terminal devices to securely process the data and then send it to one or more terminal devices. After the terminal device receives the security configuration information, the PDCP layer of the terminal device uses the corresponding public key to perform corresponding security processing for the bearer that supports unicast and/or multicast.
在本申请的另外一些实施例中,网络设备(第一装置)侧针对不同的终端设备维护多个无线承载,包括单播无线承载,多播无线承载和第一类型承载,其中,第一类型承载也可以是属于多播无线承载的一种。对于单播无线承载来说,是点到点传输,即单播无线承载只针对一个终端设备;而对于多播无线承载和第一类型承载来说,是点到多点传输,即针对多个终端设备。In some other embodiments of the present application, the network device (first device) side maintains multiple radio bearers for different terminal devices, including unicast radio bearers, multicast radio bearers, and first type bearers, where the first type The bearer may also be a type of multicast radio bearer. For the unicast radio bearer, it is point-to-point transmission, that is, the unicast radio bearer is only for one terminal device; for the multicast radio bearer and the first type of bearer, it is point-to-multipoint transmission, that is, for multiple Terminal Equipment.
对于单播无线承载,在网络设备侧,包含PDCP层和RLC层来分别执行各层的功能,在一个对应的终端设备侧,包含相应的PDCP和RLC来执行相应的功能,这些功能的执行和处理对于不同的终端设备来说是不同的,例如对于同一个终端设备中单播无线承载中数据的安全处理是相同的,对于不同终端设备中的单播无线承载中数据的安全处理是不同的,换言之这类功能可以称为终端设备级的功能;For unicast radio bearers, on the network device side, the PDCP layer and the RLC layer are included to perform the functions of each layer, and on a corresponding terminal device side, the corresponding PDCP and RLC layers are included to perform the corresponding functions. The execution of these functions is as good as The processing is different for different terminal devices. For example, the security processing of data in the unicast radio bearer in the same terminal device is the same, and the security processing of data in the unicast radio bearer in different terminal devices is different. In other words, this kind of function can be called terminal equipment level function;
与之相对的是网络设备级的功能,这类功能对应多播无线承载或者第一类型无线承 载,对于不同终端设备这类功能的执行和处理可以是相同的,比如安全处理,假设多个终端设备通过多播方式接收数据,即点到多点传输中,网络设备和该多个终端设备对数据的安全处理方式是相同的。安全处理方式同说明书中之前实施例描述,在此不再赘述。The opposite is the network device-level function. This kind of function corresponds to the multicast radio bearer or the first type of radio bearer. The execution and processing of this function for different terminal devices can be the same, such as security processing, assuming multiple terminals The device receives data in a multicast manner, that is, in point-to-multipoint transmission, the network device and the multiple terminal devices have the same security processing method for the data. The security processing method is the same as that described in the previous embodiment in the specification, and will not be repeated here.
针对终端设备级别的功能和网络设备级别的功能,有三种协议栈架构来实现,图13所示的为第一种协议栈结构。如图13所示的,在网络设备侧针对所有终端设备接收相同MBMS业务的无线承载(第一类型无线承载)共用一个PDCP实体进行处理,而针对各个终端设备的单播无线承载各有一个PDCP实体进行处理。For terminal device-level functions and network device-level functions, there are three protocol stack architectures to implement. Figure 13 shows the first protocol stack structure. As shown in Figure 13, on the network equipment side, the radio bearers (first type radio bearers) that receive the same MBMS service for all terminal equipment share one PDCP entity for processing, and there is one PDCP entity for each unicast radio bearer of each terminal equipment. The entity is processed.
图14所示的为第二种协议栈结构。如图14所示的。在网络设备侧针对同一个终端设备接收相同MBMS业务的第一类型无线承载共用一个PDCP实体进行处理,针对不同终端设备接收相同MBMS业务的第一类型无线承载使用不同的PDCP实体进行处理。当网络设备决定使用多播传输方式向多个终端设备传输数据的时候,可以通过任一个或者多个PDCP对数据进行处理,处理完成后交给多播类型的RLC实体继续进行传输。当网络设备决定使用单播传输方式向某个终端设备传输数据的时候,可以通过对应的PDCP对数据进行处理,处理完成后交给对应的单播类型的RLC实体继续进行传输。Figure 14 shows the second protocol stack structure. As shown in Figure 14. On the network device side, the first-type radio bearers that receive the same MBMS service on the same terminal device share a PDCP entity for processing, and the first-type radio bearers that receive the same MBMS service on different terminal devices use different PDCP entities for processing. When the network device decides to use the multicast transmission mode to transmit data to multiple terminal devices, the data can be processed through any one or more PDCPs, and after the processing is completed, it is handed over to the multicast type RLC entity to continue transmission. When a network device decides to use unicast transmission to transmit data to a certain terminal device, the data can be processed through the corresponding PDCP, and after the processing is completed, it is handed over to the corresponding unicast type RLC entity to continue transmission.
图15所示的为第三种协议栈结构,如图15所示的,在网络设备侧针对所有终端设备的多播无线承载共用一个PDCP实体或者子PDCP功能模块进行处理,针对不同终端设备的单播无线承载分别对应不同的PDCP实体或者子PDCP功能模块进行处理,换言之针对同一个终端设备接收相同MBMS业务的第一类型无线承载,采用多播方式处理和单播方式处理的时候各有不同的PDCP实体进行处理。这里所说的PDCP实体可以是一个完整的PDCP实体,也可以是一个完整PDCP的一部分,即一部分功能模块的集合,例如公用的PDCP实体包含针对多个终端设备相同的功能集合,如采用多播传输方式传输时的安全处理。当网络设备决定使用多播传输方式向多个终端设备传输数据的时候,可以通过公用的PDCP实体对数据进行处理,处理完成后交给多播类型的RLC实体继续进行传输。当网络设备决定使用单播传输方式向某个终端设备传输数据的时候,可以通过单独的PDCP对数据进行处理,处理完成后交给对应的单播类型的RLC实体继续进行传输。当网络设备决定使用单播和多播的传输方式向某个终端设备传输数据的时候,数据可以在单独的PDCP中或者公用的PDCP中复制,然后分别在单独的PDCP实体中和公用的PDCP实体对数据进行处理,处理完成后分别交给单播类型的RLC和多播类型的RLC实体继续进行传输。数据也可以在更高层进行复制,然后分别交给单独的PDCP实体和公用的PDCP实体进行处理。Figure 15 shows the third protocol stack structure. As shown in Figure 15, the multicast radio bearer of all terminal devices shares a PDCP entity or sub-PDCP function module for processing on the network device side. Unicast radio bearers are processed respectively corresponding to different PDCP entities or sub-PDCP functional modules. In other words, for the first type of radio bearers that receive the same MBMS service from the same terminal device, there are differences between the multicast processing and the unicast processing PDCP entity for processing. The PDCP entity mentioned here can be a complete PDCP entity, or a part of a complete PDCP, that is, a collection of some functional modules. For example, a public PDCP entity contains the same set of functions for multiple terminal devices, such as multicast Security handling during transmission. When the network device decides to use the multicast transmission method to transmit data to multiple terminal devices, the data can be processed through the public PDCP entity, and after the processing is completed, it is handed over to the multicast type RLC entity to continue transmission. When a network device decides to use unicast transmission to transmit data to a terminal device, the data can be processed through a separate PDCP, and after the processing is completed, it is handed over to the corresponding unicast type RLC entity to continue transmission. When a network device decides to use unicast and multicast transmission methods to transmit data to a terminal device, the data can be copied in a separate PDCP or a public PDCP, and then in a separate PDCP entity and a public PDCP entity, respectively The data is processed, and after the processing is completed, it is delivered to the unicast type RLC and multicast type RLC entities to continue transmission. Data can also be replicated at a higher layer, and then handed over to a separate PDCP entity and a public PDCP entity for processing.
应理解,在本申请的各个实施例中,第一、第二等只是为了便于描述。例如第一RLC实体和第二RLC实体只是为了表示出不同的RLC实体。而不应该RLC实体的本身和个数产生任何影响,上述的第一、第二等不应该对本申请的实施例造成任何限制。It should be understood that, in the various embodiments of the present application, the first, the second, etc. are only for ease of description. For example, the first RLC entity and the second RLC entity are only used to indicate different RLC entities. Instead of having any influence on the RLC entity itself and the number, the above-mentioned first, second, etc. should not cause any limitation to the embodiments of the present application.
还应理解,上述只是为了帮助本领域技术人员更好地理解本申请实施例,而非要限制本申请实施例的范围。本领域技术人员根据所给出的上述示例,显然可以进行各种等价的修改或变化,例如,上述方法200至方法400中的各个实施例中某些步骤可以是不必须的,或者可以新加入某些步骤等。或者上述任意两种或者任意多种实施例的组合。这样的修改、变化或者组合后的方案也落入本申请实施例的范围内。It should also be understood that the foregoing is only to help those skilled in the art to better understand the embodiments of the present application, and is not intended to limit the scope of the embodiments of the present application. Those skilled in the art can obviously make various equivalent modifications or changes based on the above-mentioned examples. For example, some steps in the various embodiments of the above-mentioned method 200 to method 400 may be unnecessary, or may be new. Add some steps and so on. Or a combination of any two or any of the above embodiments. Such a modified, changed or combined solution also falls within the scope of the embodiments of the present application.
还应理解,上文对本申请实施例的描述着重于强调各个实施例之间的不同之处,未提 到的相同或相似之处可以互相参考,为了简洁,这里不再赘述。It should also be understood that the above description of the embodiments of the present application focuses on emphasizing the differences between the various embodiments, and the same or similarities that are not mentioned can be referred to each other. For the sake of brevity, they will not be repeated here.
还应理解,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It should also be understood that the size of the sequence numbers of the foregoing processes does not mean the order of execution, and the execution order of the processes should be determined by their functions and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
还应理解,本申请实施例中,“预先设定”、“预先定义”可以通过在设备(例如,包括终端和网络设备)中预先保存相应的代码、表格或其他可用于指示相关信息的方式来实现,本申请对于其具体的实现方式不做限定。It should also be understood that in the embodiments of the present application, "pre-set" and "pre-defined" can be achieved by pre-saving corresponding codes, tables, or other methods that can be used to indicate related information in devices (for example, including terminals and network devices). To achieve, this application does not limit its specific implementation.
还应理解,本申请实施例中的方式、情况、类别以及实施例的划分仅是为了描述的方便,不应构成特别的限定,各种方式、类别、情况以及实施例中的特征在不矛盾的情况下可以相结合。It should also be understood that the methods, situations, categories, and embodiments in the embodiments of the present application are only for convenience of description and should not constitute special limitations. The various methods, categories, situations, and features in the embodiments are not contradictory. Circumstances can be combined.
还应理解,在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。It should also be understood that, in the various embodiments of the present application, if there are no special instructions and logical conflicts, the terms and/or descriptions between the different embodiments are consistent and can be mutually cited. The technical features in the different embodiments According to its inherent logical relationship, it can be combined to form a new embodiment.
以上结合图1至图15对本申请实施例的数据安全处理的方法做了详细说明。以下,结合图16至图24对本申请实施例通信装置进行详细说明。The data security processing method of the embodiment of the present application has been described in detail above in conjunction with FIG. 1 to FIG. 15. Hereinafter, the communication device according to the embodiment of the present application will be described in detail with reference to FIGS. 16 to 24.
图16示出了本申请实施例的通信装置500的示意性框图,该装置500可以对应上述方法200中描述的第一装置或者第二装置,也可以是应用于第一装置或者第二装置的芯片或组件,并且,该装置500中各模块或单元分别用于执行上述方法200中第一装置和第二装置所执行的各动作或处理过程。FIG. 16 shows a schematic block diagram of a communication device 500 according to an embodiment of the present application. The device 500 may correspond to the first device or the second device described in the above method 200, or may be applied to the first device or the second device. Chips or components, and each module or unit in the device 500 is respectively used to execute each action or process performed by the first device and the second device in the method 200 described above.
如图16所示,该装置500可以包括处理单元510和收发单元520。收发单元520用于在处理单元510的驱动下执行具体的信号收发。As shown in FIG. 16, the device 500 may include a processing unit 510 and a transceiving unit 520. The transceiving unit 520 is configured to perform specific signal transceiving under the driving of the processing unit 510.
处理单元510,用于确定第一数据的第一传输方式,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,该单播和多播传输方式为使用单播和多播进行传输的传输方式。The processing unit 510 is configured to determine a first transmission mode of the first data. The first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast and multicast transmission mode. The broadcast transmission method is a transmission method that uses unicast and multicast for transmission.
处理单元510,还用于根据第一传输方式,确定对该第一数据的安全处理方式。The processing unit 510 is further configured to determine a safe processing mode for the first data according to the first transmission mode.
该收发单元520,用于发送经过安全处理后的第一数据。The transceiver unit 520 is used to send the first data after security processing.
本申请提供的通信装置,通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。在进行数据传输的时,可以采用单播传输方式、多播传输方式、或者单播和多播传输方式进行数据的传输。并且,根据不用的传输方式,对数据进行相应的安全处理。一方面提高了数据传输的安全性。另一方面,能够实现同一个承载内不同的安全处理过程,满足不同传输方式下的数据的安全需求,提高通信效率。The communication device provided in this application associates one or more RLC entities by configuring a PDCP. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode. During data transmission, unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission. And, according to the unused transmission method, the data is processed safely. On the one hand, the security of data transmission is improved. On the other hand, different security processing procedures within the same bearer can be realized, meeting the security requirements of data in different transmission modes, and improving communication efficiency.
可选的,在本申请的一些实施例中,当该第一传输方式为单播传输方式时,该处理单元510确定该第一数据的安全处理方式为第一安全处理。Optionally, in some embodiments of the present application, when the first transmission mode is a unicast transmission mode, the processing unit 510 determines that the secure processing mode of the first data is the first secure processing.
可选的,在本申请的一些实施例中,当该第一传输方式为多播传输方式时,该处理单元510确定该第一数据的安全处理方式为第二安全处理。Optionally, in some embodiments of the present application, when the first transmission mode is a multicast transmission mode, the processing unit 510 determines that the secure processing mode of the first data is the second secure processing.
可选的,在本申请的一些实施例中,当该第一传输方式为单播和多播传输方式时,该处理单元510确定该第一数据的安全处理方式为第一安全处理,第二数据的安全处理方式为第二安全处理,该第二数据为通过复制该第一数据得到的。Optionally, in some embodiments of the present application, when the first transmission mode is unicast or multicast transmission, the processing unit 510 determines that the secure processing mode of the first data is the first secure processing, and the second secure processing The data security processing method is the second security processing, and the second data is obtained by copying the first data.
可选的,在本申请的一些实施例中,该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护。该第二安全处理为不进行安全处理。Optionally, in some embodiments of the present application, the first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection. The second security process is no security process.
可选的,在本申请的一些实施例中,该第一安全处理包括利用第三参数和/或第三算法对数据进行加密和/或完整性保护。该第二安全处理为不进行安全处理。Optionally, in some embodiments of the present application, the first security processing includes using a third parameter and/or a third algorithm to encrypt data and/or integrity protection. The second security process is no security process.
可选的,在本申请的一些实施例中,该第一安全处理为不进行安全处理。该第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护。Optionally, in some embodiments of the present application, the first security processing is no security processing. The second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protect the data.
可选的,在本申请的一些实施例中,该第一安全处理为不进行安全处理。该第二安全处理包括利用第四参数和/或第四算法对数据进行加密和/或完整性保护。Optionally, in some embodiments of the present application, the first security processing is no security processing. The second security processing includes using a fourth parameter and/or a fourth algorithm to encrypt data and/or integrity protection.
可选的,在本申请的一些实施例中,该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护,或者,该第一安全处理包括利用第三参数和/或第三算法对数据进行解密和/或完整性验证。Optionally, in some embodiments of the present application, the first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection, or the first security processing includes using a first parameter and/or a first algorithm. The three parameters and/or the third algorithm perform decryption and/or integrity verification on the data.
该第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护,或者,该第二安全处理包括利用第四参数和/或第四算法对数据进行解密和/或完整性验证。The second security processing includes using the second parameter and/or the second algorithm to encrypt and/or integrity protection of the data, or the second security processing includes using the fourth parameter and/or the fourth algorithm to decrypt the data and / Or integrity verification.
该第一参数和该第二参数相同或者不同,该第一算法和该第二算法相同或者不同,或者,该第三参数和该第四参数相同或者不同,该第三算法和该第四算法相同或者不同。The first parameter and the second parameter are the same or different, the first algorithm and the second algorithm are the same or different, or the third parameter and the fourth parameter are the same or different, the third algorithm and the fourth algorithm Same or different.
可选的,在本申请的一些实施例中,该第一参数包括第一秘钥,和/或,该第二参数包括第二秘钥;或,第三参数包括第三秘钥,和/或,该第四参数包括第四秘钥。Optionally, in some embodiments of the present application, the first parameter includes a first secret key, and/or the second parameter includes a second secret key; or, the third parameter includes a third secret key, and/ Or, the fourth parameter includes a fourth secret key.
进一步的,该装置500还可以该存储单元,收发单元520可以是收发器、输入/输出接口或接口电路。存储单元用于存储收发单元520和处理单元510执行的指令。收发单元520、处理单元510和存储单元相互耦合,存储单元存储指令,处理单元510用于执行存储单元存储的指令,收发单元520用于在处理单元510的驱动下执行具体的信号收发。Further, the device 500 may also be the storage unit, and the transceiving unit 520 may be a transceiver, an input/output interface, or an interface circuit. The storage unit is used to store instructions executed by the transceiver unit 520 and the processing unit 510. The transceiving unit 520, the processing unit 510, and the storage unit are coupled to each other, the storage unit stores instructions, the processing unit 510 is used to execute the instructions stored in the storage unit, and the transceiving unit 520 is used to perform specific signal transceiving under the driving of the processing unit 510.
应理解,装置300中各单元执行上述相应步骤的具体过程请参照前文中结合方法200以及图4中相关实施例的第一装置或者第二装置相关的描述,为了简洁,这里不加赘述。It should be understood that, for the specific process of each unit in the device 300 performing the above-mentioned corresponding steps, please refer to the foregoing description of the first device or the second device in combination with the method 200 and the related embodiment in FIG. 4. For the sake of brevity, details are not repeated here.
可选的,收发单元520可以包括接收单元(模块)和发送单元(模块),用于执行前述方法200的各个实施例以及图4所示的实施例中第一装置或者第二装置接收信息和发送信息的步骤。Optionally, the transceiving unit 520 may include a receiving unit (module) and a sending unit (module), which are used to execute each embodiment of the aforementioned method 200 and the first device or the second device in the embodiment shown in FIG. 4 to receive information and Steps to send information.
应理解,收发单元520可以是收发器、输入/输出接口或接口电路。存储单元可以是存储器。处理单元510可由处理器实现。如图17所示,通信装置600可以包括处理器610、存储器620、收发器630和总线系统660。通信装置600的各个组件通过总线系统660耦合在一起,其中总线系统660除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图16中将各种总线都标为总线系统640。为便于表示,图16中仅是示意性画出。It should be understood that the transceiving unit 520 may be a transceiver, an input/output interface, or an interface circuit. The storage unit may be a memory. The processing unit 510 may be implemented by a processor. As shown in FIG. 17, the communication device 600 may include a processor 610, a memory 620, a transceiver 630, and a bus system 660. The components of the communication device 600 are coupled together through a bus system 660, where the bus system 660 may include a power bus, a control bus, a status signal bus, etc., in addition to a data bus. However, for the sake of clear description, various buses are marked as the bus system 640 in FIG. 16. For ease of illustration, FIG. 16 is only schematically drawn.
图16所示的通信装置500或图17所示的通信装置600能够实现前述方法200的各个实施例以及图4所示的实施例中第一装置或者第二装置执行的步骤。类似的描述可以参考前述对应的方法中的描述。为避免重复,这里不再赘述。The communication device 500 shown in FIG. 16 or the communication device 600 shown in FIG. 17 can implement the various embodiments of the foregoing method 200 and the steps performed by the first device or the second device in the embodiment shown in FIG. 4. For similar descriptions, reference can be made to the descriptions in the aforementioned corresponding methods. To avoid repetition, I won’t repeat them here.
还应理解,图16所示的通信装置500或图17所示的通信装置600可以为终端设备或者网络设备。It should also be understood that the communication device 500 shown in FIG. 16 or the communication device 600 shown in FIG. 17 may be a terminal device or a network device.
图18示出了本申请实施例的通信装置700的示意性框图,该装置700可以对应上述方法300中描述的第一装置,也可以是应用于第一装置的芯片或组件,并且,该装置700 中各模块或单元分别用于执行上述方法300中第一装置所执行的各动作或处理过程。FIG. 18 shows a schematic block diagram of a communication device 700 according to an embodiment of the present application. The device 700 may correspond to the first device described in the above method 300, or may be a chip or component applied to the first device, and the device Each module or unit in 700 is respectively used to execute each action or processing procedure executed by the first device in the above method 300.
如图18所示,该装置700可以包括处理单元710和收发单元720。收发单元720用于在处理单元710的驱动下执行具体的信号收发。As shown in FIG. 18, the apparatus 700 may include a processing unit 710 and a transceiver unit 720. The transceiving unit 720 is configured to perform specific signal transceiving under the driving of the processing unit 710.
处理单元710,用于对第一数据进行第一安全处理;The processing unit 710 is configured to perform first security processing on the first data;
该处理单元710,还用于对第二数据进行第二安全处理,该第二数据为通过复制该第一数据得到的;The processing unit 710 is further configured to perform second security processing on second data, where the second data is obtained by copying the first data;
收发单元720,用于根据数据的第一传输方式,发送经过该第一安全处理后的该第一数据,和/或,发送经过该第二安全处理后的该第二数据,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,该单播和多播传输方式为使用单播和多播进行传输的传输方式。The transceiver unit 720 is configured to send the first data after the first security processing and/or send the second data after the second security processing according to the first transmission mode of the data, and the first transmission The method is a unicast transmission method, a multicast transmission method, or at least one of a unicast and a multicast transmission method, and the unicast and multicast transmission methods are transmission methods that use unicast and multicast for transmission.
本申请提供的通信装置,通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。在进行数据传输的时,对该数据所有可能的传输方式分别进行对应安全处理过程,将安全处理后的多份数据分别递交相应传输方式的RLC实体,最终通过RLC实体确定数据采用的传输方式,利用确定的传输方式发送数据。提高了数据传输的安全性。并且,能够实现同一个承载内不同的安全处理过程,满足不同传输方式下的数据的安全需求,提高通信效率。The communication device provided in this application associates one or more RLC entities by configuring a PDCP. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode. When performing data transmission, all possible transmission methods of the data are respectively subjected to corresponding security processing procedures, and multiple copies of the data after the security processing are respectively submitted to the RLC entity of the corresponding transmission method, and finally the RLC entity determines the transmission method used for the data. Use a certain transmission method to send data. Improve the security of data transmission. In addition, different security processing procedures in the same bearer can be realized, meeting the security requirements of data in different transmission modes, and improving communication efficiency.
可选的,在本申请的一些实施例中,该收发单元720,还用于;Optionally, in some embodiments of the present application, the transceiver unit 720 is also used for:
当该第一传输方式为单播传输方式时,发送经过该第一安全处理后的该第一数据;When the first transmission mode is a unicast transmission mode, sending the first data after the first security processing;
当该第一传输方式为多播传输方式时,发送经过该第二安全处理后的该第二数据;When the first transmission mode is a multicast transmission mode, sending the second data after the second security processing;
当该第一数据传输方式为单播和多播传输方式时,发送经过该第一安全处理后的该第一数据以及经过该第二安全处理后的该第二数据。When the first data transmission mode is a unicast or a multicast transmission mode, the first data after the first security processing and the second data after the second security processing are sent.
可选的,在本申请的一些实施例中,该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护;该第二安全处理为不进行安全处理。Optionally, in some embodiments of the present application, the first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection; the second security processing is no security processing .
可选的,在本申请的一些实施例中,该第一安全处理为不进行安全处理;该第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护。Optionally, in some embodiments of the present application, the first security processing is no security processing; the second security processing includes using a second parameter and/or a second algorithm to encrypt data and/or integrity protection .
可选的,在本申请的一些实施例中,该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护;该第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护。Optionally, in some embodiments of the present application, the first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection; the second security processing includes using a second parameter And/or the second algorithm performs encryption and/or integrity protection on the data.
该第一参数和该第二参数相同或者不同,该第一算法和该第二算法相同或者不同。The first parameter and the second parameter are the same or different, and the first algorithm and the second algorithm are the same or different.
可选的,在本申请的一些实施例中,该第一参数包括第一秘钥,和/或,该第二参数包括第二秘钥。Optionally, in some embodiments of the present application, the first parameter includes a first secret key, and/or, the second parameter includes a second secret key.
应理解,装置700中各单元执行上述相应步骤的具体过程请参照前文中结合方法300、以及图11中相关实施例的第一装置相关的描述,为了简洁,这里不加赘述。It should be understood that, for the specific process of each unit in the device 700 performing the above corresponding steps, please refer to the previous description in conjunction with the method 300 and the related embodiment of the first device in FIG. 11. For the sake of brevity, details are not repeated here.
可选的,收发单元720可以包括接收单元(模块)和发送单元(模块),用于执行前述方法300的各个实施例以及图11所示的实施例中第二装置接收信息和发送信息的步骤。Optionally, the transceiving unit 720 may include a receiving unit (module) and a sending unit (module), which are used to execute each embodiment of the aforementioned method 300 and the steps of receiving and sending information by the second device in the embodiment shown in FIG. 11 .
进一步的,该装置700还可以该存储单元,收发单元720可以是收发器、输入/输出接口或接口电路。存储单元用于存储收发单元720和处理单元710执行的指令。收发单元720、处理单元710和存储单元相互耦合,存储单元存储指令,处理单元710用于执行存 储单元存储的指令,收发单元720用于在处理单元710的驱动下执行具体的信号收发。Further, the device 700 may also be the storage unit, and the transceiving unit 720 may be a transceiver, an input/output interface, or an interface circuit. The storage unit is used to store instructions executed by the transceiver unit 720 and the processing unit 710. The transceiving unit 720, the processing unit 710, and the storage unit are coupled with each other. The storage unit stores instructions. The processing unit 710 is used to execute the instructions stored in the storage unit. The transceiving unit 720 is driven by the processing unit 710 to perform specific signal transceiving.
应理解,收发单元720可以是收发器、输入/输出接口或接口电路。存储单元可以是存储器。处理单元710可由处理器实现。如图19所示,通信装置800可以包括处理器810、存储器820和收发器830。It should be understood that the transceiving unit 720 may be a transceiver, an input/output interface, or an interface circuit. The storage unit may be a memory. The processing unit 710 may be implemented by a processor. As shown in FIG. 19, the communication device 800 may include a processor 810, a memory 820, and a transceiver 830.
图18所示的通信装置700或图19所示的通信装置800能够实现前述方法300中的实施例以及图11所示的实施例中第一装置执行的步骤。类似的描述可以参考前述对应的方法中的描述。为避免重复,这里不再赘述。The communication device 700 shown in FIG. 18 or the communication device 800 shown in FIG. 19 can implement the embodiment in the aforementioned method 300 and the steps performed by the first device in the embodiment shown in FIG. 11. For similar descriptions, reference can be made to the descriptions in the aforementioned corresponding methods. To avoid repetition, I won’t repeat them here.
还应理解,图18所示的通信装置700或图19所示的通信装置800可以为网络设备。It should also be understood that the communication device 700 shown in FIG. 18 or the communication device 800 shown in FIG. 19 may be a network device.
图20示出了本申请实施例的通信装置900的示意性框图,该装置900可以对应上述方法400中描述的第一装置,也可以是应用于第一装置的芯片或组件,并且,该装置900中各模块或单元分别用于执行上述方法400中第一装置所执行的各动作或处理过程。FIG. 20 shows a schematic block diagram of a communication device 900 according to an embodiment of the present application. The device 900 may correspond to the first device described in the above method 400, or may be a chip or component applied to the first device, and the device Each module or unit in 900 is respectively used to execute each action or processing procedure executed by the first device in the above method 400.
如图20所示,该装置900可以包括处理单元910和收发单元920。收发单元920用于在处理单元910的驱动下执行具体的信号收发。As shown in FIG. 20, the device 900 may include a processing unit 910 and a transceiving unit 920. The transceiving unit 920 is configured to perform specific signal transceiving under the driving of the processing unit 910.
处理单元910,用于对第一数据进行第一安全处理。The processing unit 910 is configured to perform first security processing on the first data.
该处理单元910,还用于确定经过该第一安全处理后的该第一数据的第一传输方式,该第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,该单播和多播传输方式为使用单播和多播进行传输的传输方式;The processing unit 910 is further configured to determine a first transmission mode of the first data after the first security processing, where the first transmission mode is a unicast transmission mode, a multicast transmission mode, or unicast and multicast transmission At least one of the methods, the unicast and multicast transmission methods are transmission methods that use unicast and multicast for transmission;
收发单元920,用于当该第一传输方式为单播传输方式,利用该单播传输方式发送经过该第一安全处理后的该第一数据。The transceiver unit 920 is configured to use the unicast transmission mode to send the first data after the first security processing when the first transmission mode is a unicast transmission mode.
该收发单元920,还用于当该第一传输方式为多播传输方式,利用该多播传输方式发送经过该第一安全处理后的该第一数据。The transceiver unit 920 is further configured to use the multicast transmission mode to send the first data after the first security processing when the first transmission mode is a multicast transmission mode.
该收发单元920,还用于当该第一传输方式为单播和多播传输方式,利用该单播传输方式发送经过该第一安全处理后的该第一数据,利用该多播传输方式发送第三数据,该第三数据为通过复制经过该第一安全处理后的该第一数据得到的。The transceiving unit 920 is further configured to use the unicast transmission mode to send the first data after the first security processing when the first transmission mode is unicast and multicast transmission mode, and use the multicast transmission mode to send The third data is obtained by copying the first data after the first security processing.
本申请提供的通信装置,通过配置一个PDCP关联一个或者多个RLC实体。一个RLC实体对应的传输方式为单播传输方式或者多播传输方式。多个RLC实体包括对应单播传输方式的RLC实体和多播传输方式的RLC实体。通在进行数据传输的时,可以采用单播传输方式、多播传输方式、或者单播和多播传输方式进行数据的传输。并且,由于单播传输方式和多播传输方式对应的安全处理方式是相同的。第一装置先将数据进行安全处理,然后根据数据不用的传输方式,发送经过安全处理后的数据。提高了数据传输的安全性。能够实现同一个承载内数据安全处理过程,满足不同传输方式下的数据的安全需求,提高通信效率。The communication device provided in this application associates one or more RLC entities by configuring a PDCP. The transmission mode corresponding to an RLC entity is a unicast transmission mode or a multicast transmission mode. The multiple RLC entities include an RLC entity corresponding to a unicast transmission mode and an RLC entity corresponding to a multicast transmission mode. During data transmission, unicast transmission, multicast transmission, or unicast and multicast transmission can be used for data transmission. In addition, the security processing methods corresponding to the unicast transmission mode and the multicast transmission mode are the same. The first device first processes the data securely, and then sends the securely processed data according to the unused transmission mode of the data. Improve the security of data transmission. It can realize the data security processing process in the same bearer, meet the security requirements of data under different transmission modes, and improve communication efficiency.
可选的,在本申请的一些实施例中,该第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护;或者,该第一安全处理为不进行安全处理。Optionally, in some embodiments of the present application, the first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection; or, the first security processing is not performed Safe handling.
可选的,在本申请的一些实施例中,该第一参数包括第一秘钥。Optionally, in some embodiments of the present application, the first parameter includes a first secret key.
应理解,装置900中各单元执行上述相应步骤的具体过程请参照前文中结合方法400、以及图12中相关实施例的第一装置相关的描述,为了简洁,这里不加赘述。It should be understood that, for the specific process of each unit in the device 900 performing the above corresponding steps, please refer to the previous description in conjunction with the method 400 and the related embodiment of the first device in FIG. 12. For brevity, details are not repeated here.
可选的,收发单元920可以包括接收单元(模块)和发送单元(模块),用于执行前述方法300的各个实施例以及图11所示的实施例中第二装置接收信息和发送信息的步骤。Optionally, the transceiving unit 920 may include a receiving unit (module) and a sending unit (module), which are used to execute each embodiment of the aforementioned method 300 and the steps of receiving and sending information by the second device in the embodiment shown in FIG. 11 .
进一步的,该装置900还可以该存储单元,收发单元920可以是收发器、输入/输出接口或接口电路。存储单元用于存储收发单元920和处理单元910执行的指令。收发单元920、处理单元910和存储单元相互耦合,存储单元存储指令,处理单元910用于执行存储单元存储的指令,收发单元920用于在处理单元910的驱动下执行具体的信号收发。Further, the device 900 may also be the storage unit, and the transceiving unit 920 may be a transceiver, an input/output interface, or an interface circuit. The storage unit is used to store instructions executed by the transceiver unit 920 and the processing unit 910. The transceiving unit 920, the processing unit 910, and the storage unit are coupled to each other, the storage unit stores instructions, the processing unit 910 is used to execute the instructions stored in the storage unit, and the transceiving unit 920 is used to perform specific signal transceiving under the driving of the processing unit 910.
应理解,收发单元920可以是收发器、输入/输出接口或接口电路。存储单元可以是存储器。处理单元910可由处理器实现。如图21所示,通信装置1000可以包括处理器1010、存储器1020和收发器1030。It should be understood that the transceiving unit 920 may be a transceiver, an input/output interface, or an interface circuit. The storage unit may be a memory. The processing unit 910 may be implemented by a processor. As shown in FIG. 21, the communication device 1000 may include a processor 1010, a memory 1020, and a transceiver 1030.
图20所示的通信装置900或图21所示的通信装置1000能够实现前述方法400中的实施例以及图12所示的实施例中第一装置执行的步骤。类似的描述可以参考前述对应的方法中的描述。为避免重复,这里不再赘述。The communication device 900 shown in FIG. 20 or the communication device 1000 shown in FIG. 21 can implement the embodiment in the foregoing method 400 and the steps performed by the first device in the embodiment shown in FIG. 12. For similar descriptions, reference can be made to the descriptions in the aforementioned corresponding methods. To avoid repetition, I won’t repeat them here.
还应理解,图20所示的通信装置900或图21所示的通信装置1000可以为网络设备。It should also be understood that the communication device 900 shown in FIG. 20 or the communication device 1000 shown in FIG. 21 may be a network device.
还应理解,以上装置中单元的划分仅仅是一种逻辑功能的划分,实际实现时可以全部或部分集成到一个物理实体上,也可以物理上分开。且装置中的单元可以全部以软件通过处理元件调用的形式实现;也可以全部以硬件的形式实现;还可以部分单元以软件通过处理元件调用的形式实现,部分单元以硬件的形式实现。例如,各个单元可以为单独设立的处理元件,也可以集成在装置的某一个芯片中实现,此外,也可以以程序的形式存储于存储器中,由装置的某一个处理元件调用并执行该单元的功能。这里该处理元件又可以称为处理器,可以是一种具有信号处理能力的集成电路。在实现过程中,上述方法的各步骤或以上各个单元可以通过处理器元件中的硬件的集成逻辑电路实现或者以软件通过处理元件调用的形式实现。It should also be understood that the division of units in the above device is only a division of logical functions, and may be fully or partially integrated into one physical entity in actual implementation, or may be physically separated. In addition, the units in the device can be all implemented in the form of software called by processing elements; they can also be all implemented in the form of hardware; part of the units can also be implemented in the form of software called by the processing elements, and some of the units can be implemented in the form of hardware. For example, each unit can be a separate processing element, or it can be integrated in a certain chip of the device for implementation. In addition, it can also be stored in the memory in the form of a program, which is called and executed by a certain processing element of the device. Features. Here, the processing element may also be called a processor, and may be an integrated circuit with signal processing capability. In the implementation process, each step of the above method or each of the above units may be implemented by an integrated logic circuit of hardware in a processor element or implemented in a form of being called by software through a processing element.
在一个例子中,以上任一装置中的单元可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个专用集成电路(application specific integrated circuit,ASIC),或,一个或多个数字信号处理器(digital signal processor,DSP),或,一个或者多个现场可编程门阵列(field programmable gate array,FPGA),或这些集成电路形式中至少两种的组合。再如,当装置中的单元可以通过处理元件调度程序的形式实现时,该处理元件可以是通用处理器,例如中央处理器(central processing unit,CPU)或其它可以调用程序的处理器。再如,这些单元可以集成在一起,以片上系统(system-on-a-chip,SOC)的形式实现。In an example, the unit in any of the above devices may be one or more integrated circuits configured to implement the above methods, for example: one or more application specific integrated circuits (ASIC), or, one or Multiple digital signal processors (digital signal processors, DSP), or, one or more field programmable gate arrays (FPGA), or a combination of at least two of these integrated circuits. For another example, when the unit in the device can be implemented in the form of a processing element scheduler, the processing element can be a general-purpose processor, such as a central processing unit (CPU) or other processors that can call programs. For another example, these units can be integrated together and implemented in the form of a system-on-a-chip (SOC).
图22为本申请提供的一种终端设备1100的结构示意图。上述装置500至600可以配置在该终端设备1100中。或者,该装置500至600本身可以即为该终端设备1100。或者说,该终端设备1100可以执行上述方法200至方法400中第二装置执行的动作。FIG. 22 is a schematic structural diagram of a terminal device 1100 provided by this application. The foregoing apparatuses 500 to 600 may be configured in the terminal device 1100. Alternatively, the apparatuses 500 to 600 themselves may be the terminal equipment 1100. In other words, the terminal device 1100 may execute the actions performed by the second device in the foregoing method 200 to method 400.
为了便于说明,图22仅示出了终端设备的主要部件。如图22所示,终端设备1100包括处理器、存储器、控制电路、天线以及输入输出装置。For ease of description, FIG. 22 only shows the main components of the terminal device. As shown in FIG. 22, the terminal device 1100 includes a processor, a memory, a control circuit, an antenna, and an input and output device.
处理器主要用于对通信协议以及通信数据进行处理,以及对整个终端设备进行控制,执行软件程序,处理软件程序的数据,例如用于支持终端设备执行上述传输预编码矩阵的指示方法实施例中所描述的动作。存储器主要用于存储软件程序和数据,例如存储上述实施例中所描述的码本。控制电路主要用于基带信号与射频信号的转换以及对射频信号的处理。控制电路和天线一起也可以叫做收发器,主要用于收发电磁波形式的射频信号。输入输出装置,例如触摸屏、显示屏,键盘等主要用于接收用户输入的数据以及对用户输出数 据。The processor is mainly used to process the communication protocol and communication data, and to control the entire terminal device, execute the software program, and process the data of the software program. For example, it is used to support the terminal device to execute the above-mentioned transmission precoding matrix instruction method embodiment. The described action. The memory is mainly used to store software programs and data, for example, to store the codebook described in the above embodiments. The control circuit is mainly used for the conversion of baseband signals and radio frequency signals and the processing of radio frequency signals. The control circuit and the antenna together can also be called a transceiver, which is mainly used to send and receive radio frequency signals in the form of electromagnetic waves. Input and output devices, such as touch screens, display screens, and keyboards, are mainly used to receive data input by users and output data to users.
当终端设备开机后,处理器可以读取存储单元中的软件程序,解释并执行软件程序的指令,处理软件程序的数据。当需要通过无线发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到终端设备时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。When the terminal device is turned on, the processor can read the software program in the storage unit, interpret and execute the instructions of the software program, and process the data of the software program. When data needs to be sent wirelessly, the processor performs baseband processing on the data to be sent, and outputs the baseband signal to the radio frequency circuit. The radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna. When data is sent to the terminal device, the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
本领域技术人员可以理解,为了便于说明,图22仅示出了一个存储器和处理器。在实际的终端设备中,可以存在多个处理器和存储器。存储器也可以称为存储介质或者存储设备等,本申请实施例对此不做限制。Those skilled in the art can understand that, for ease of description, FIG. 22 only shows a memory and a processor. In an actual terminal device, there may be multiple processors and memories. The memory may also be referred to as a storage medium or a storage device, etc., which is not limited in the embodiment of the present application.
例如,处理器可以包括基带处理器和中央处理器,基带处理器主要用于对通信协议以及通信数据进行处理,中央处理器主要用于对整个终端设备进行控制,执行软件程序,处理软件程序的数据。图22中的处理器集成了基带处理器和中央处理器的功能,本领域技术人员可以理解,基带处理器和中央处理器也可以是各自独立的处理器,通过总线等技术互联。本领域技术人员可以理解,终端设备可以包括多个基带处理器以适应不同的网络制式,终端设备可以包括多个中央处理器以增强其处理能力,终端设备的各个部件可以通过各种总线连接。该基带处理器也可以表述为基带处理电路或者基带处理芯片。该中央处理器也可以表述为中央处理电路或者中央处理芯片。对通信协议以及通信数据进行处理的功能可以内置在处理器中,也可以以软件程序的形式存储在存储单元中,由处理器执行软件程序以实现基带处理功能。For example, the processor may include a baseband processor and a central processing unit. The baseband processor is mainly used to process communication protocols and communication data. The central processing unit is mainly used to control the entire terminal device, execute software programs, and process software programs. data. The processor in FIG. 22 integrates the functions of the baseband processor and the central processing unit. Those skilled in the art can understand that the baseband processor and the central processing unit may also be independent processors and are interconnected by technologies such as a bus. Those skilled in the art can understand that the terminal device may include multiple baseband processors to adapt to different network standards, the terminal device may include multiple central processors to enhance its processing capabilities, and the various components of the terminal device may be connected through various buses. The baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip. The central processing unit can also be expressed as a central processing circuit or a central processing chip. The function of processing the communication protocol and the communication data may be built in the processor, or stored in the storage unit in the form of a software program, and the processor executes the software program to realize the baseband processing function.
示例性的,在本申请实施例中,可以将具有收发功能的天线和控制电路视为终端设备1100的收发单元1101,将具有处理功能的处理器视为终端设备1100的处理单元1102。如图22所示,终端设备1100包括收发单元1101和处理单元1102。收发单元也可以称为收发器、收发机、收发装置等。可选的,可以将收发单元1101中用于实现接收功能的器件视为接收单元,将收发单元1101中用于实现发送功能的器件视为发送单元,即收发单元1101包括接收单元和发送单元。示例性的,接收单元也可以称为接收机、接收器、接收电路等,发送单元可以称为发射机、发射器或者发射电路等。Exemplarily, in the embodiment of the present application, the antenna and the control circuit with the transceiving function can be regarded as the transceiving unit 1101 of the terminal device 1100, and the processor with the processing function can be regarded as the processing unit 1102 of the terminal device 1100. As shown in FIG. 22, the terminal device 1100 includes a transceiver unit 1101 and a processing unit 1102. The transceiving unit may also be referred to as a transceiver, a transceiver, a transceiving device, and so on. Optionally, the device for implementing the receiving function in the transceiving unit 1101 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiving unit 1101 can be regarded as the sending unit, that is, the transceiving unit 1101 includes a receiving unit and a sending unit. Exemplarily, the receiving unit may also be called a receiver, a receiver, a receiving circuit, etc., and the sending unit may be called a transmitter, a transmitter, or a transmitting circuit, etc.
图23为本申请提供的另一种终端设备1200的结构示意图。在图23中,该终端设备包括处理器1210,发送数据处理器1220,接收数据处理器1230。上述实施例中的处理单元、处理单元可以是图13中的处理器1210,并完成相应的功能。上述实施例中收发单元可以是图23中的发送数据处理器1220,和/或接收数据处理器1230。虽然图23中示出了信道编码器、信道解码器,但是可以理解这些模块并不对本实施例构成限制性说明,仅是示意性的。FIG. 23 is a schematic structural diagram of another terminal device 1200 provided by this application. In FIG. 23, the terminal device includes a processor 1210, a data sending processor 1220, and a data receiving processor 1230. The processing unit and the processing unit in the foregoing embodiment may be the processor 1210 in FIG. 13 and perform corresponding functions. The transceiving unit in the foregoing embodiment may be the sending data processor 1220 and/or the receiving data processor 1230 in FIG. 23. Although the channel encoder and the channel decoder are shown in FIG. 23, it can be understood that these modules do not constitute a restrictive description of this embodiment, and are only illustrative.
图24为本申请实施例提供的一种网络设备1300的结构示意图,可以用于实现上述方法中的网络设备的功能。网络设备1300包括一个或多个射频单元,如远端射频单元(remote radio unit,RRU)1301和一个或多个基带单元(baseband unit,BBU)(也可称为数字单元,digital unit,DU)1302。该RRU 1301可以称为收发单元、收发机、收发电路、或者收发器等等,其可以包括至少一个天线13011和射频单元13012。该RRU 1301部分主要用于射频信号的收发以及射频信号与基带信号的转换,例如用于向终端设备发送上述实施 例中的信令消息。该BBU 1302部分主要用于进行基带处理,对基站进行控制等。该RRU1301与BBU 1302可以是物理上设置在一起,也可以物理上分离设置的,即分布式基站。FIG. 24 is a schematic structural diagram of a network device 1300 provided by an embodiment of this application, which may be used to implement the functions of the network device in the foregoing method. The network equipment 1300 includes one or more radio frequency units, such as a remote radio unit (RRU) 1301 and one or more baseband units (BBU) (also referred to as digital units, digital units, DU) 1302. The RRU 1301 may be called a transceiver unit, a transceiver, a transceiver circuit, or a transceiver, etc., and it may include at least one antenna 13011 and a radio frequency unit 13012. The RRU 1301 part is mainly used for sending and receiving of radio frequency signals and conversion of radio frequency signals and baseband signals, for example, for sending the signaling messages in the above-mentioned embodiments to terminal equipment. The 1302 part of the BBU is mainly used for baseband processing and control of the base station. The RRU 1301 and the BBU 1302 may be physically set together, or may be physically separated, that is, a distributed base station.
该BBU 1302为基站的控制中心,也可以称为处理单元,主要用于完成基带处理功能,如信道编码,复用,调制,扩频等等。例如该BBU(处理单元)1302可以用于控制基站130执行上述方法实施例中关于网络设备的操作流程。The BBU 1302 is the control center of the base station, which can also be called a processing unit, and is mainly used to complete baseband processing functions, such as channel coding, multiplexing, modulation, and spreading. For example, the BBU (processing unit) 1302 may be used to control the base station 130 to execute the operation flow of the network device in the foregoing method embodiment.
在一个示例中,该BBU 1302可以由一个或多个单板构成,多个单板可以共同支持单一接入制式的无线接入网(如LTE系统,或5G系统),也可以分别支持不同接入制式的无线接入网。该BBU 1302还包括存储器13021和处理器13022。该存储器13021用以存储必要的指令和数据。例如存储器13021存储上述实施例中的码本等。该处理器13022用于控制基站进行必要的动作,例如用于控制基站执行上述方法实施例中关于网络设备的操作流程。该存储器13021和处理器13022可以服务于一个或多个单板。也就是说,可以每个单板上单独设置存储器和处理器。也可以是多个单板共用相同的存储器和处理器。此外每个单板上还可以设置有必要的电路。In an example, the BBU 1302 can be composed of one or more single boards, and multiple single boards can jointly support a radio access network of a single access standard (such as an LTE system or a 5G system), and can also support different connections. Enter the standard wireless access network. The BBU 1302 also includes a memory 13021 and a processor 13022. The memory 13021 is used to store necessary instructions and data. For example, the memory 13021 stores the codebook in the above-mentioned embodiment and the like. The processor 13022 is used to control the base station to perform necessary actions, for example, used to control the base station to execute the operation procedure of the network device in the foregoing method embodiment. The memory 13021 and the processor 13022 may serve one or more single boards. In other words, the memory and the processor can be set separately on each board. It can also be that multiple boards share the same memory and processor. In addition, necessary circuits can be provided on each board.
在一种可能的实施方式中,随着片上系统(system-on-chip,SoC)技术的发展,可以将1302部分和1301部分的全部或者部分功能由SoC技术实现,例如由一颗基站功能芯片实现,该基站功能芯片集成了处理器、存储器、天线接口等器件,基站相关功能的程序存储在存储器中,由处理器执行程序以实现基站的相关功能。可选的,该基站功能芯片也能够读取该芯片外部的存储器以实现基站的相关功能。In a possible implementation manner, with the development of system-on-chip (SoC) technology, all or part of the functions of part 1302 and part 1301 can be realized by SoC technology, for example, a base station function chip Realization, the base station function chip integrates a processor, a memory, an antenna interface and other devices, the program of the base station related functions is stored in the memory, and the processor executes the program to realize the related functions of the base station. Optionally, the base station function chip can also read a memory external to the chip to implement related functions of the base station.
应理解,图24示例的网络设备的结构仅为一种可能的形态,而不应对本申请实施例构成任何限定。本申请并不排除未来可能出现的其他形态的基站结构的可能。It should be understood that the structure of the network device illustrated in FIG. 24 is only a possible form, and should not constitute any limitation in the embodiment of the present application. This application does not exclude the possibility of other types of base station structures that may appear in the future.
在新无线(new radio,NR)系统中,系统信息包括主信息块(master information block,MIB)、系统信息块1(system information block 1,SIB1),除SIB1之外的其他系统信息块。除了SIB1之外的其他系统信息块也称为其他系统信息(other system information,OSI)。当MIB,SIB1或者OSI发生改变的时候,网络设备可以通过寻呼通知终端设备系统信息变化,终端设备然后重新读取MIB和SIB1,通过SIB1中指示的OSI的各个SIB的valueTag来判断具体OSI中的哪个SIB发生了改变,然后去获取对应的SIB,然而,无线资源控制(Radio resource control,RRC)连接态的终端设备可能工作在无法接收寻呼的带宽部分(Bandwidth part,BWP)上,导致网络设备无法及时通知终端设备系统信息改变,进而终端设备无法进行系统信息的更新,导致终端设备存储的系统信息过时,进而影响终端设备的正常工作。本申请提供一种系统信息的获取方法,能够在终端设备无法接收寻呼时获取更新的系统信息。In the new radio (NR) system, system information includes master information block (MIB), system information block 1 (system information block 1, SIB1), and other system information blocks except SIB1. Other system information blocks except SIB1 are also called other system information (OSI). When the MIB, SIB1 or OSI changes, the network device can notify the terminal device of the system information change through paging, and the terminal device then reads MIB and SIB1 again, and judges the specific OSI by the valueTag of each SIB of the OSI indicated in SIB1 Which of the SIBs is changed, and then get the corresponding SIB. However, the terminal device in the radio resource control (Radio resource control, RRC) connection state may work on the bandwidth part (Bandwidth part, BWP) that cannot receive paging, resulting in The network device cannot notify the terminal device of system information changes in time, and the terminal device cannot update the system information, which causes the system information stored by the terminal device to be out of date, which affects the normal operation of the terminal device. This application provides a method for obtaining system information, which can obtain updated system information when a terminal device cannot receive a page.
为了使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施例作进一步地详细描述。In order to make the objectives, technical solutions, and advantages of the embodiments of the present application clearer, the embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
在介绍本申请之前,首先对本申请实施例中的部分用语进行简单解释说明,以便于本领域技术人员理解。Before introducing this application, first briefly explain some terms in the embodiments of this application, so as to facilitate the understanding of those skilled in the art.
1)系统信息包括主信息块(master information block,MIB),系统信息块1(system information block 1,SIB1),除SIB1之外的其他系统信息块。除了SIB1之外的其他系统信息块也称为其他系统信息(other system information,OSI)。MIB和SIB1为必要系统信息,OSI为非必要系统信息。OSI在传输时,承载在系统信息消息上,一条系统信息消息可以 承载多个OSI。1) System information includes master information block (MIB), system information block 1 (system information block 1, SIB1), and other system information blocks except SIB1. Other system information blocks except SIB1 are also called other system information (OSI). MIB and SIB1 are necessary system information, and OSI is non-essential system information. When OSI is transmitted, it is carried on a system information message, and one system information message can carry multiple OSIs.
2)SI消息(SI message),用于承载SI。一个SI消息中可以包括一个SIB或多个SIB(不包括SIB1)。SIB和SI消息之间的映射关系(即一个SI消息中包括哪些SIB)可以包括在SIB1中(例如,调度信息中)。调度信息可以包括调度周期(SI-periodicity)和承载的SIB的类型(即SIB到SI消息的映射关系等)。通常一个SIB不能分割映射到两个不同的SI消息中。例如,一个SIB可以承载到一个SI消息,基站广播SI消息,可以将SIB通知给终端设备。2) SI message (SI message), used to carry SI. One SI message can include one SIB or multiple SIBs (not including SIB1). The mapping relationship between SIB and SI messages (that is, which SIBs are included in one SI message) may be included in SIB1 (for example, in scheduling information). The scheduling information may include the scheduling period (SI-periodicity) and the type of SIB carried (that is, the mapping relationship between SIB and SI messages, etc.). Generally, one SIB cannot be split and mapped into two different SI messages. For example, one SIB can be carried by one SI message, and the base station broadcasts the SI message, and the SIB can be notified to the terminal device.
3)带宽部分(bandwidth part,BWP或BP),在新无线(new radio,NR)系统中,考虑到不同的业务类型、终端设备的带宽能力或终端设备的功耗等因素,引入了BWP的概念。基站通过为终端设备配置多种不同带宽的BWP,可以实现对终端设备的灵活调度。3) The bandwidth part (BWP or BP). In the new radio (NR) system, considering factors such as different service types, bandwidth capabilities of terminal equipment, or power consumption of terminal equipment, BWP is introduced. concept. The base station can realize flexible scheduling of the terminal equipment by configuring a variety of BWPs with different bandwidths for the terminal equipment.
BWP可以是频域上一段连续的资源,也可以称为载波带宽部分(carrier bandwidth part)、子带(subband)带宽、窄带或窄带(narrowband)带宽,或者还可以有其他的名称,在本申请实施例中,为了简便,以名称是BWP为例。例如,一个BWP包含连续的K(K>0)个子载波;或者,一个BWP为N个不重叠的连续的资源块(resource block,RB)所在的频域资源,该RB的子载波间隔可以为15KHz、30KHz、60KHz、120KHz、240KHz、480KHz或其他值;或者,一个BWP为M个不重叠的连续的资源块组(resource block group,RBG)所在的频域资源,一个RBG包括P(P>0)个连续的RB,该RB的子载波间隔(subcarrier spacing,SCS)可以为15KHz、30KHz、60KHz、120KHz、240KHz、480KHz或其他值,例如为2的整数倍。一个BWP与一个特定的系统参数(numerology)相关,所述系统参数包括子载波间隔、循环前缀(cyclic prefix,CP)、或子载波间隔和CP。进一步地,BWP还可以是频域上非连续的多段资源。BWP can be a continuous resource in the frequency domain, it can also be called carrier bandwidth part, subband bandwidth, narrowband or narrowband bandwidth, or it can have other names. In this application In the embodiment, for the sake of simplicity, the name is BWP as an example. For example, a BWP includes continuous K (K>0) subcarriers; or, a BWP is a frequency domain resource where N non-overlapping continuous resource blocks (resource blocks, RB) are located, and the subcarrier interval of the RB may be 15KHz, 30KHz, 60KHz, 120KHz, 240KHz, 480KHz or other values; or, a BWP is a frequency domain resource where M non-overlapping contiguous resource block groups (RBG) are located, and an RBG includes P(P> 0) A continuous RB, and the subcarrier spacing (SCS) of the RB may be 15KHz, 30KHz, 60KHz, 120KHz, 240KHz, 480KHz or other values, for example, an integer multiple of 2. A BWP is related to a specific system parameter (numerology), and the system parameter includes a subcarrier interval, a cyclic prefix (CP), or a subcarrier interval and CP. Further, the BWP may also be a non-contiguous multi-segment resource in the frequency domain.
在载波宽带(carrier BW)内,针对一个终端设备可仅配置一个BWP,所述BWP的带宽可以小于或等于终端设备带宽能力(UE bandwidth capability),终端设备带宽能力可以小于或等于载波带宽(carrier BW)。在载波带宽中,针对一个终端设备也可配置两个BWP,分别为BWP1和BWP2,且BWP1和BWP2的带宽可以相重叠。在载波带宽中,针对一个终端设备也可配置两个BWP,分别为BWP1和BWP2,且BWP1和BWP2可以不重叠。BWP1和BWP2的系统参数可以是相同的系统参数,或者也可以是不同的系统参数。实际中,BWP的配置(例如BWP的个数、位置、和/或系统参数等配置)还可以是其它的配置,本申请实施例不做限制。In carrier BW, only one BWP can be configured for a terminal device. The bandwidth of the BWP can be less than or equal to the bandwidth capability of the terminal device (UE bandwidth capability), and the bandwidth capability of the terminal device can be less than or equal to the carrier bandwidth (carrier bandwidth). BW). In the carrier bandwidth, two BWPs can also be configured for one terminal device, namely BWP1 and BWP2, and the bandwidths of BWP1 and BWP2 can overlap. In the carrier bandwidth, two BWPs can also be configured for one terminal device, namely BWP1 and BWP2, and BWP1 and BWP2 may not overlap. The system parameters of BWP1 and BWP2 may be the same system parameter, or may also be different system parameters. In practice, the configuration of the BWP (for example, the configuration of the number, location, and/or system parameters of the BWP) may also be other configurations, which are not limited in the embodiment of the present application.
如图25所示,BWP可以分为两类,分别为初始(Initial)BWP和激活(Active)BWP。Initial BWP指的是小区定义(cell defined)的同步信息块(synchronisation signal block,SSB)中广播的MIB所指示的SIB1所在位置的带宽。在Initial BWP上UE可以获取SIB1,以及其他系统信息(other system information,OSI),并且可以监听寻呼,主要用于终端设备发起随机接入等。Active BWP主要用于数据业务传输,一般UE有业务到达时,基站会将终端设备从Initial BWP上调度到一个带宽和其业务相匹配的BWP上。Active BWP上配置的有类型Type0A以及类型Type2的物理下行控制信道(physical downlink control channel,PDCCH)公共搜索空间(common search space,CSS)。终端设备可以在当前Active BWP上接收寻呼以及OSI。As shown in Figure 25, BWP can be divided into two categories, namely Initial BWP and Active BWP. Initial BWP refers to the bandwidth of the location where SIB1 is indicated by the MIB broadcast in the cell-defined synchronization information block (synchronisation signal block, SSB). On the Initial BWP, the UE can obtain SIB1 and other system information (other system information, OSI), and can monitor paging, which is mainly used for terminal equipment to initiate random access. Active BWP is mainly used for data service transmission. Generally, when the UE has service arrival, the base station will schedule the terminal equipment from the Initial BWP to a BWP with a bandwidth matching its service. Active BWP is configured with Type 0A and Type 2 physical downlink control channels (physical downlink control channel, PDCCH) common search space (CSS). The terminal device can receive paging and OSI on the current Active BWP.
5)ValueTag,用于标识除SIB1之外的其他SIB的内容版本(内容标签),可以理解 为是SIB的版本标签。SIB1中包含针对每个除了SIB1之外的SIB的“Value Tag”的取值,来标识SIB的内容版本。每当SIB的内容变化一次,“ValueTag”指示的取值会执行加1操作。目前“ValueTag”占用5比特,可以指示0-31即32个取值。当“ValueTag”的取值为31,之后如果SIB的内容发生变化,那么“ValueTag”指示的取值会执行加1操作之后变为0。终端设备存储SIB时,也会存储SIB1中的“ValueTag”的取值,当网络侧通知系统信息发生改变时,终端设备会重新接收SIB1,然后获取SIB1中的SIB,并对比新接收的SIB1的“ValueTag”的取值,与之前的SIB1的“ValueTag”的取值是否一致,来确定存储的SIB的内容是否发生变化。如果终端设备确定新接收的SIB1的“ValueTag”的取值,与之前的SIB1的“ValueTag”的取值相同,则确定SIB1中的SIB的内容没有发生变化,终端设备不需要重新获取该SIB;相反,如果终端设备确定新接收的SIB1的“ValueTag”的取值,与之前的SIB1的“ValueTag”的取值不相同,则确定SIB1中的SIB的内容发生了变化,终端设备需要重新获取该SIB。5) ValueTag, used to identify the content version (content tag) of other SIBs except SIB1, which can be understood as the version tag of SIB. SIB1 contains the value of "Value Tag" for each SIB except SIB1 to identify the content version of the SIB. Whenever the content of SIB changes, the value indicated by "ValueTag" will be incremented by 1. Currently, "ValueTag" occupies 5 bits and can indicate 0-31 or 32 values. When the value of "ValueTag" is 31, if the content of the SIB changes later, the value indicated by "ValueTag" will be incremented by 1 and then become 0. When the terminal device stores the SIB, it will also store the value of "ValueTag" in SIB1. When the network side notifies the system information that there is a change, the terminal device will receive SIB1 again, then obtain the SIB in SIB1, and compare the value of the newly received SIB1 Whether the value of "ValueTag" is consistent with the value of "ValueTag" of the previous SIB1 is used to determine whether the content of the stored SIB has changed. If the terminal device determines that the value of the "ValueTag" of the newly received SIB1 is the same as the value of the previous "ValueTag" of SIB1, it is determined that the content of the SIB in SIB1 has not changed, and the terminal device does not need to reacquire the SIB; On the contrary, if the terminal device determines that the value of the "ValueTag" of the newly received SIB1 is different from the value of the previous "ValueTag" of SIB1, it is determined that the content of the SIB in SIB1 has changed, and the terminal device needs to obtain the value again. SIB.
如上介绍了本申请实施例涉及的一些概念,下面介绍本申请实施例的技术特征。Some concepts related to the embodiments of the present application are introduced as above, and the technical features of the embodiments of the present application are introduced below.
在当前网络中,当MIB,SIB1或者OSI发生改变的时候,网络设备通过寻呼通知终端设备系统信息变化,终端设备然后重新读取MIB和SIB1,通过SIB1中指示的OSI中的各个SIB的valueTag来判断具体哪个SIB发生了改变,然后去获取对应的SIB,然而,无线资源控制(Radio resource control,RRC)连接态的终端设备可能工作在无法接收寻呼以的带宽部分(Bandwidth part,BWP)上,导致网络设备无法及时通知终端设备系统信息改变,进而终端设备无法进行系统信息的更新,导致终端设备存储的系统信息过时,进而影响终端设备的正常工作。一种可能的方法是,当SIB1或OSI发生变化时,网络设备通过专用信令将更新的SIB1发给所有连接态的终端设备,但是SIB1的内容很大,并且OSI的数目很多,每个OSI的改变都触发SIB1的发送,将极大的浪费通信资源。In the current network, when the MIB, SIB1 or OSI changes, the network device informs the terminal device of the system information change through paging, and the terminal device then reads MIB and SIB1 again, using the valueTag of each SIB in the OSI indicated in SIB1 To determine which SIB has changed, and then to obtain the corresponding SIB, however, the terminal device in the radio resource control (Radio resource control, RRC) connection state may work in the bandwidth part (Bandwidth part, BWP) that cannot receive paging. As a result, the network device cannot notify the terminal device of system information changes in time, and the terminal device cannot update the system information, causing the system information stored by the terminal device to be out of date, which affects the normal operation of the terminal device. One possible method is that when SIB1 or OSI changes, the network device sends the updated SIB1 to all connected terminal devices through dedicated signaling. However, the content of SIB1 is very large and the number of OSIs is large. Each OSI All changes trigger the sending of SIB1, which will greatly waste communication resources.
鉴于此,本申请提供一种OSI的更新方法,可以降低资源消耗,提高网络资源利用率。In view of this, the present application provides an OSI update method, which can reduce resource consumption and improve network resource utilization.
为了便于介绍,在下文中,以该方法由网络设备和终端设备执行为例,也就是,以第一通信装置是终端设备、第二通信装置是网络设备为例。所述终端设备处于RRC连接态,并且所述终端设备当前工作的激活BWP上,没有配置用于接收寻呼和/或系统信息的公共搜索空间。For ease of introduction, in the following, the method is executed by a network device and a terminal device as an example, that is, the first communication device is a terminal device and the second communication device is a network device as an example. The terminal device is in the RRC connected state, and on the active BWP currently working on the terminal device, there is no public search space configured to receive paging and/or system information.
该方法的流程描述如图26所示。The process description of this method is shown in Figure 26.
S2601、网络设备向终端设备发送第一指示信息,所述第一指示信息用于指示其他系统信息OSI更新,所述OSI包括至少一个系统信息块SIB;所述第一指示信息包括至少一个SIB的内容版本valueTag。S2601. The network device sends first indication information to the terminal device, where the first indication information is used to indicate OSI update of other system information, the OSI includes at least one system information block SIB; the first indication information includes at least one SIB The content version valueTag.
OSI包括除SIB1之外的其他信息块,包括SIB2,SIB3等系统信息块。其中不同SIB承载不同的内容,支撑不同功能。例如NR中SIB2-SIB5用于提供小区重选的相关信息,SIB6-SIB8用于提供公共预警信息,SIB9用于提供授时信息。终端设备根据需要的功能,选择存储对应的SIB。需要说明的是,OSI的至少一个的valueTag,是指至少一个OSI中的SIB的valueTag。本案中描述OSI,可以指除了SIB1之外的所有SIB,也可以指除SIB1之外的一个SIB或者多个SIB。这里以OSI包括SIB2-SIB9为例进行说明,但是本案对OSI包含SIB的数目并不做限制。OSI includes other information blocks except SIB1, including system information blocks such as SIB2 and SIB3. Among them, different SIBs carry different content and support different functions. For example, SIB2-SIB5 in NR is used to provide information related to cell reselection, SIB6-SIB8 is used to provide public warning information, and SIB9 is used to provide timing information. The terminal device selects and stores the corresponding SIB according to the required function. It should be noted that at least one valueTag of the OSI refers to at least one valueTag of the SIB in the OSI. The description of OSI in this case can refer to all SIBs except SIB1, or one SIB or multiple SIBs except SIB1. Here, the OSI includes SIB2-SIB9 as an example, but this case does not limit the number of SIBs included in the OSI.
一种可能的实现方式,第一指示信息中包括OSI中所有SIB对应的valueTag,即包括 SIB2-SIB9对应的valueTag,需要说明的是,这里可以是SIB2-SIB9中的部分SIB需要更新或者全部SIB需要更新。In a possible implementation, the first indication information includes the valueTags corresponding to all SIBs in OSI, that is, the valueTags corresponding to SIB2-SIB9. It should be noted that some SIBs in SIB2-SIB9 need to be updated or all SIBs need to be updated here. need to be updated.
一种可能的实现方式,第一指示信息中包括OSI中部分SIB对应的valueTag,比如包括SIB5和SIB6对应的valueTag。这里对OSI中部分SIB进行说明,部分SIB可能是发生变化,需要终端设备更新的SIB,例如这里的SIB5和SIB6需要更新,除了SIB5和SIB6之外的其他SIB不需要更新;或者部分SIB为针对所述终端设备发送的,即所述终端设备只需要SIB5和SIB6,不需要其他SIB。在这种实现方式中,第一指示信息还可包括所述部分SIB的标识信息。In a possible implementation manner, the first indication information includes valueTags corresponding to some SIBs in the OSI, for example, includes valueTags corresponding to SIB5 and SIB6. Here is an explanation of some SIBs in OSI. Some SIBs may be changed and need to be updated by terminal equipment. For example, SIB5 and SIB6 need to be updated here, and other SIBs except SIB5 and SIB6 do not need to be updated; or some SIBs are targeted at Sent by the terminal device, that is, the terminal device only needs SIB5 and SIB6, and does not need other SIBs. In this implementation manner, the first indication information may further include identification information of the part of the SIB.
至于所述网络设备如何获知所述终端设备仅需要SIB5和SIB6不在本案的讨论范围。As for how the network device knows that the terminal device only needs SIB5 and SIB6, it is beyond the scope of this case.
需要说明的是,第一指示信息也可以为位图,用于表示OSI的变化信息,例如,位图为8位,每一位的信息与SIB2-SIB9的变化信息对应。比如,第一位表示SIB2是否变化,第二位表示SIB3是否发生变化,以此类推。这里位图的信息可以用0或1表示,其中示例性的,0表示对应位置的系统信息块没有发生变化,1表示对应位置的系统信息块发生了变化。当位图的信息为01111000,表示SIB3,SIB4,SIB5,SIB6需要更新。It should be noted that the first indication information may also be a bitmap to indicate OSI change information. For example, the bitmap has 8 bits, and the information of each bit corresponds to the change information of SIB2-SIB9. For example, the first digit indicates whether SIB2 has changed, the second digit indicates whether SIB3 has changed, and so on. Here, the bitmap information can be represented by 0 or 1. For example, 0 indicates that the system information block at the corresponding position has not changed, and 1 indicates that the system information block at the corresponding position has changed. When the bitmap information is 01111000, it means that SIB3, SIB4, SIB5, and SIB6 need to be updated.
所述网络设备可以通过RRC专用信令发送第一指示信息,也可以通过广播的方式发送第一指示信息。The network device may send the first indication information through RRC dedicated signaling, or may send the first indication information in a broadcast manner.
S2602,终端设备确定需要更新的SIB。S2602: The terminal device determines the SIB that needs to be updated.
所述终端设备根据第一指示信息更新存储的SIB1,具体地,将存储的SIB1中SIB的valueTag更新为第一指示信息中对应SIB的valueTag.The terminal device updates the stored SIB1 according to the first indication information, specifically, the valueTag of the SIB in the stored SIB1 is updated to the valueTag corresponding to the SIB in the first indication information.
所述终端设备根据第一指示信息所携带的OSI的valueTag,确定SIB是否需要更新。The terminal device determines whether the SIB needs to be updated according to the valueTag of the OSI carried in the first indication information.
在一种可能的实现方式中,第一指示信息中包括OSI中所有SIB的对应的valueTag,所述终端设备判断存储的某个SIB的valueTag是否与第一指示信息中该SIB对应的valueTag一致,如果不一致,说明该SIB需要更新。比如,所述终端设备在收到第一指示信息之前,已经存储了SIB2和它的valueTag,且valueTag的值为X,如果第一指示信息指示SIB2的valueTag是Y,说明SIB2的需要更新,而如果第一指示信息指示SIB2的valueTag还是X,说明SIB2的内容不需要更新。In a possible implementation manner, the first indication information includes the corresponding valueTags of all SIBs in the OSI, and the terminal device determines whether the stored valueTag of a certain SIB is consistent with the valueTag corresponding to the SIB in the first indication information. If they are inconsistent, the SIB needs to be updated. For example, the terminal device has stored SIB2 and its valueTag before receiving the first indication information, and the value of valueTag is X. If the first indication information indicates that the valueTag of SIB2 is Y, it means that SIB2 needs to be updated, and If the first indication information indicates that the valueTag of SIB2 is still X, it means that the content of SIB2 does not need to be updated.
在一种可能的实现方式中,第一指示信息中包括OSI中部分SIB对应的valueTag,所述终端设备将存储的SIB的valueTag与第一指示信息中该SIB的对应的valueTag进行对比,如果不同,就说明该SIB需要更新。比如,第一指示信息包含SIB4,SIB5的valueTag,所述终端设备在收到第一指示信息之前,已经存储了SIB4,那么所述终端设备需要更新SIB4。而如果所述终端设备在收到第一指示信息之前,并没有存储SIB4和SIB5,所述终端设备不需要更新。In a possible implementation manner, the first indication information includes the valueTag corresponding to a part of the SIB in the OSI, and the terminal device compares the stored valueTag of the SIB with the corresponding valueTag of the SIB in the first indication information. If they are different , It means that the SIB needs to be updated. For example, the first indication information includes the valueTags of SIB4 and SIB5, and the terminal device has stored SIB4 before receiving the first indication information, so the terminal device needs to update SIB4. If the terminal device does not store SIB4 and SIB5 before receiving the first indication information, the terminal device does not need to be updated.
S2603,向所述网络设备发送请求消息,所述请求消息用于请求需要更新的SIBS2603: Send a request message to the network device, where the request message is used to request the SIB that needs to be updated
在确定需要更新的SIB之后,所述终端设备可向网络设备请求所述SIB,或者从其他途径获得更新的所述的SIB,本案不做限制。After determining the SIB that needs to be updated, the terminal device may request the SIB from the network device, or obtain the updated SIB from other channels, and there is no limitation in this case.
所述终端设备在获取到更新的SIB之后,将更新的SIB和第一指示信息中与该SIB对应的valueTag一起存储。After obtaining the updated SIB, the terminal device stores the updated SIB and the valueTag corresponding to the SIB in the first indication information together.
需要说明的是,如果第一指示信息为表示OSI变化信息的位图,所述终端设备根据位图判断之前存储的SIB是否需要更新,例如,位图为8位,每一位的信息与SIB2-SIB9 的变化信息对应。比如,第一位表示SIB2是否变化,第二位表示SIB3是否发生变化,以此类推。这里位图的信息可以用0或1表示,其中示例性的,0表示对应位置的系统信息块没有发生变化,1表示对应位置的系统信息块发生了变化。例如位图信息为01111000,而所述终端设备在接收第一指示信息之前存储了SIB3,SIB4,此时所述终端设备需要更新SIB3,SIB4。在确定完需要更新的SIB之后,所述终端设备可向所述网络设备请求所述需要更新的SIB。It should be noted that if the first indication information is a bitmap representing OSI change information, the terminal device determines whether the previously stored SIB needs to be updated according to the bitmap. For example, the bitmap is 8 bits, and the information of each bit is the same as SIB2. -SIB9 change information correspondence. For example, the first digit indicates whether SIB2 has changed, the second digit indicates whether SIB3 has changed, and so on. Here, the bitmap information can be represented by 0 or 1. For example, 0 indicates that the system information block at the corresponding position has not changed, and 1 indicates that the system information block at the corresponding position has changed. For example, the bitmap information is 01111000, and the terminal device stores SIB3 and SIB4 before receiving the first indication information. At this time, the terminal device needs to update SIB3 and SIB4. After determining the SIB that needs to be updated, the terminal device may request the network device for the SIB that needs to be updated.
应理解,本申请实施例中,该处理器可以为中央处理单元(central processing unit,CPU),该处理器还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be understood that, in this embodiment of the application, the processor may be a central processing unit (central processing unit, CPU), and the processor may also be other general-purpose processors, digital signal processors (digital signal processors, DSP), and dedicated integration Circuit (application specific integrated circuit, ASIC), ready-made programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
还应理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的随机存取存储器(random access memory,RAM)可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。It should also be understood that the memory in the embodiments of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory. The volatile memory may be random access memory (RAM), which is used as an external cache. By way of exemplary but not restrictive description, many forms of random access memory (RAM) are available, such as static random access memory (static RAM, SRAM), dynamic random access memory (DRAM), and synchronous dynamic random access memory (DRAM). Access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory Take memory (synchlink DRAM, SLDRAM) and direct memory bus random access memory (direct rambus RAM, DR RAM).
上述实施例,可以全部或部分地通过软件、硬件、固件或其他任意组合来实现。当使用软件实现时,上述实施例可以全部或部分地以计算机程序产品的形式实现。该计算机程序产品包括一个或多个计算机指令或计算机程序。在计算机上加载或执行该计算机指令或计算机程序时,全部或部分地产生按照本申请实施例的流程或功能。该计算机可以为通用计算机、专用计算机、计算机网络、或者其他可编程装置。该计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,该计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。该计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集合的服务器、数据中心等数据存储设备。该可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质。半导体介质可以是固态硬盘。The foregoing embodiments may be implemented in whole or in part by software, hardware, firmware or any other combination. When implemented by software, the above-mentioned embodiments may be implemented in the form of a computer program product in whole or in part. The computer program product includes one or more computer instructions or computer programs. When the computer instructions or computer programs are loaded or executed on the computer, the processes or functions according to the embodiments of the present application are generated in whole or in part. The computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices. The computer instruction may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instruction may be transmitted from a website, a computer, a server, or a data center through a cable (For example, infrared, wireless, microwave, etc.) to transmit to another website, computer, server or data center. The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center that includes one or more sets of available media. The usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium. The semiconductor medium may be a solid state drive.
本申请实施例还提供了一种通信系统,该通信系统包括:上述的终端设备和上述的网络设备。An embodiment of the present application also provides a communication system, which includes: the above-mentioned terminal device and the above-mentioned network device.
本申请实施例还提供了一种计算机可读介质,用于存储计算机程序代码,该计算机程序包括用于执行上述方法200至方法400中本申请实施例的数据安全处理的方法的指令。 该可读介质可以是只读存储器(read-only memory,ROM)或随机存取存储器(random access memory,RAM),本申请实施例对此不做限制。The embodiment of the present application also provides a computer-readable medium for storing computer program code, and the computer program includes instructions for executing the data security processing method of the foregoing method 200 to method 400 in the embodiment of the present application. The readable medium may be a read-only memory (ROM) or a random access memory (RAM), which is not limited in the embodiment of the present application.
本申请还提供了一种计算机程序产品,该计算机程序产品包括指令,当该指令被执行时,以使得该终端设备和网络设备分别执行对应于上述方法的第一装置和第二装置的操作。This application also provides a computer program product. The computer program product includes instructions. When the instructions are executed, the terminal device and the network device respectively perform the operations of the first device and the second device corresponding to the foregoing method.
本申请实施例还提供了一种系统芯片,该系统芯片包括:处理单元和通信单元,该处理单元,例如可以是处理器,该通信单元例如可以是输入/输出接口、管脚或电路等。该处理单元可执行计算机指令,以使该通信装置内的芯片执行上述本申请实施例提供的任一种数据安全处理的方法。An embodiment of the present application also provides a system chip, which includes a processing unit and a communication unit. The processing unit may be, for example, a processor, and the communication unit may be, for example, an input/output interface, a pin, or a circuit. The processing unit can execute computer instructions so that the chip in the communication device executes any of the methods for data security processing provided in the foregoing embodiments of the present application.
可选地,上述本申请实施例中提供的任意一种通信装置可以包括该系统芯片。Optionally, any communication device provided in the foregoing embodiments of the present application may include the system chip.
可选地,该计算机指令被存储在存储单元中。Optionally, the computer instructions are stored in a storage unit.
可选地,该存储单元为该芯片内的存储单元,如寄存器、缓存等,该存储单元还可以是该终端内的位于该芯片外部的存储单元,如ROM或可存储静态信息和指令的其他类型的静态存储设备,RAM等。其中,上述任一处提到的处理器,可以是一个CPU,微处理器,ASIC,或一个或多个用于控制上述的数据安全处理的方法的程序执行的集成电路。该处理单元和该存储单元可以解耦,分别设置在不同的物理设备上,通过有线或者无线的方式连接来实现该处理单元和该存储单元的各自的功能,以支持该系统芯片实现上述实施例中的各种功能。或者,该处理单元和该存储器也可以耦合在同一个设备上。Optionally, the storage unit is a storage unit in the chip, such as a register, a cache, etc., and the storage unit can also be a storage unit in the terminal located outside the chip, such as a ROM or other storage units that can store static information and instructions. Types of static storage devices, RAM, etc. Wherein, the processor mentioned in any one of the above can be a CPU, a microprocessor, an ASIC, or one or more integrated circuits used to control the program execution of the above-mentioned data security processing method. The processing unit and the storage unit can be decoupled, respectively set on different physical devices, and connected in a wired or wireless manner to realize the respective functions of the processing unit and the storage unit, so as to support the system chip to implement the above-mentioned embodiments Various functions in. Alternatively, the processing unit and the memory may also be coupled to the same device.
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的随机存取存储器(random access memory,RAM)可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。It can be understood that the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory. The volatile memory may be random access memory (RAM), which is used as an external cache. By way of exemplary but not restrictive description, many forms of random access memory (RAM) are available, such as static random access memory (static RAM, SRAM), dynamic random access memory (DRAM), and synchronous dynamic random access memory (DRAM). Access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory Take memory (synchlink DRAM, SLDRAM) and direct memory bus random access memory (direct rambus RAM, DR RAM).
本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。The terms "system" and "network" in this article are often used interchangeably in this article. The term "and/or" in this article is only an association relationship describing the associated objects, which means that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, exist alone B these three situations. In addition, the character "/" in this text generally indicates that the associated objects before and after are in an "or" relationship.
本申请中出现的术语“上行”和“下行”,用于在特定场景描述数据/信息传输的方向,比如,“上行”方向一般是指数据/信息从终端向网络侧传输的方向,或者分布式单元向集中式单元传输的方向,“下行”方向一般是指数据/信息从网络侧向终端传输的方向,或者集中式单元向分布式单元传输的方向,可以理解,“上行”和“下行”仅用于描述数据/信息的传输方向,该数据/信息传输的具体起止的设备都不作限定。The terms "uplink" and "downlink" appearing in this application are used to describe the direction of data/information transmission in a specific scenario. For example, the "uplink" direction generally refers to the direction or distribution of data/information from the terminal to the network side. The direction of transmission from the centralized unit to the centralized unit. The "downlink" direction generally refers to the direction in which data/information is transmitted from the network side to the terminal, or the direction in which the centralized unit transmits to the distributed unit. It can be understood that "uplink" and "downlink" "It is only used to describe the direction of data/information transmission, and the specific start and end equipment of the data/information transmission is not limited.
在本申请中可能出现的对各种消息/信息/设备/网元/系统/装置/动作/操作/流程/概念等各类客体进行了赋名,可以理解的是,这些具体的名称并不构成对相关客体的限定,所赋名称可随着场景,语境或者使用习惯等因素而变更,对本申请中技术术语的技术含义的理解,应主要从其在技术方案中所体现/执行的功能和技术效果来确定。Various messages/information/equipment/network elements/systems/devices/actions/operations/processes/concepts and other objects that may appear in this application are given names. It is understandable that these specific names are not It constitutes a limitation on related objects. The assigned name can be changed according to factors such as the scene, context or usage habits. The understanding of the technical meaning of the technical terms in this application should mainly be based on the function embodied/performed in the technical solution And technical effects to determine.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。A person of ordinary skill in the art may realize that the units and algorithm steps of the examples described in combination with the embodiments disclosed herein can be implemented by electronic hardware or a combination of computer software and electronic hardware. Whether these functions are performed by hardware or software depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and conciseness of description, the specific working process of the system, device and unit described above can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,该单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed system, device, and method may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the unit is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取。If the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium. Based on this understanding, the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), and random access.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above are only specific implementations of this application, but the protection scope of this application is not limited to this. Any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed in this application. Should be covered within the scope of protection of this application. Therefore, the protection scope of this application should be subject to the protection scope of the claims.

Claims (37)

  1. 一种数据安全处理的方法,其特征在于,包括:A method for data security processing, which is characterized in that it includes:
    确定第一数据的第一传输方式,所述第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,所述单播和多播传输方式为使用单播和多播进行传输的传输方式;Determine a first transmission mode of the first data, where the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast and multicast transmission mode, and the unicast and multicast transmission modes are Transmission methods using unicast and multicast;
    根据所述第一传输方式,确定对所述第一数据的安全处理方式。According to the first transmission mode, a secure processing mode for the first data is determined.
  2. 根据权利要求1所述的方法,其特征在于,The method of claim 1, wherein:
    当所述第一传输方式为单播传输方式时,所述第一数据的安全处理方式为第一安全处理;或When the first transmission mode is a unicast transmission mode, the secure processing mode of the first data is the first secure processing; or
    当所述第一传输方式为多播传输方式时,所述第一数据的安全处理方式为第二安全处理;或When the first transmission mode is a multicast transmission mode, the secure processing mode of the first data is the second secure processing; or
    当所述第一传输方式为单播和多播传输方式时,所述第一数据的安全处理方式为第一安全处理,第二数据的安全处理方式为第二安全处理,所述第二数据为通过复制所述第一数据得到的。When the first transmission mode is unicast and multicast transmission, the secure processing mode of the first data is the first secure processing, the secure processing mode of the second data is the second secure processing, and the second data Is obtained by copying the first data.
  3. 根据权利要求2所述的方法,其特征在于,The method of claim 2, wherein:
    所述第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护;The first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection;
    所述第二安全处理为不进行安全处理。The second security process is no security process.
  4. 根据权利要求2所述的方法,其特征在于,The method of claim 2, wherein:
    所述第一安全处理包括利用第三参数和/或第三算法对数据进行加密和/或完整性保护;The first security processing includes using a third parameter and/or a third algorithm to encrypt data and/or integrity protection;
    所述第二安全处理为不进行安全处理。The second security process is no security process.
  5. 根据权利要求2所述的方法,其特征在于,The method of claim 2, wherein:
    所述第一安全处理为不进行安全处理。所述第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护。The first security process is no security process. The second security processing includes using a second parameter and/or a second algorithm to encrypt data and/or integrity protection.
  6. 根据权利要求2所述的方法,其特征在于,The method of claim 2, wherein:
    所述第一安全处理为不进行安全处理。所述第二安全处理包括利用第四参数和/或第四算法对数据进行加密和/或完整性保护。The first security process is no security process. The second security processing includes using a fourth parameter and/or a fourth algorithm to encrypt data and/or integrity protection.
  7. 根据权利要求2所述的方法,其特征在于,The method of claim 2, wherein:
    所述第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护,或者,所述第一安全处理包括利用第三参数和/或第三算法对数据进行解密和/或完整性验证;The first security processing includes using a first parameter and/or a first algorithm to perform encryption and/or integrity protection on data, or the first security processing includes using a third parameter and/or a third algorithm to perform data encryption and/or integrity protection. Decryption and/or integrity verification;
    所述第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护,或者,所述第二安全处理包括利用第四参数和/或第四算法对数据进行解密和/或完整性验证;The second security processing includes using a second parameter and/or a second algorithm to encrypt data and/or integrity protection, or the second security processing includes using a fourth parameter and/or a fourth algorithm to perform data encryption and/or integrity protection. Decryption and/or integrity verification;
    所述第一参数和所述第二参数相同或者不同,所述第一算法和所述第二算法相同或者不同,或者,The first parameter and the second parameter are the same or different, the first algorithm and the second algorithm are the same or different, or,
    所述第三参数和所述第四参数相同或者不同,所述第三算法和所述第四算法相同或者 不同。The third parameter and the fourth parameter are the same or different, and the third algorithm and the fourth algorithm are the same or different.
  8. 根据权利要求3至7中任一项所述的方法,其特征在于,所述第一参数包括第一秘钥,和/或,所述第二参数包括第二秘钥;或,The method according to any one of claims 3 to 7, wherein the first parameter includes a first secret key, and/or, the second parameter includes a second secret key; or,
    所述述第三参数包括第三秘钥,和/或,所述第四参数包括第四秘钥。The third parameter includes a third secret key, and/or the fourth parameter includes a fourth secret key.
  9. 一种数据安全处理的方法,其特征在于,包括:A method for data security processing, which is characterized in that it includes:
    对第一数据进行第一安全处理;Perform the first security processing on the first data;
    对第二数据进行第二安全处理,所述第二数据为通过复制所述第一数据得到的;Performing second security processing on second data, where the second data is obtained by copying the first data;
    根据数据的第一传输方式,发送经过所述第一安全处理后的所述第一数据,和/或,发送经过所述第二安全处理后的所述第二数据,所述第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,所述单播和多播传输方式为使用单播和多播进行传输的传输方式。According to the first transmission mode of data, the first data after the first security process is sent, and/or the second data after the second security process is sent, the first transmission mode It is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast and multicast transmission mode, and the unicast and multicast transmission mode is a transmission mode using unicast and multicast transmission.
  10. 根据权利要求9所述的方法,其特征在于,所述根据数据的第一传输方式,发送经过所述第一安全处理后的所述第一数据,和/或,发送经过所述第二安全处理后的所述第二数据,包括:The method according to claim 9, wherein the first data after the first security processing is sent according to the first data transmission mode, and/or the first data after the second security processing is sent The processed second data includes:
    当所述第一传输方式为单播传输方式时,发送经过所述第一安全处理后的所述第一数据;When the first transmission mode is a unicast transmission mode, sending the first data after the first security processing;
    当所述第一传输方式为多播传输方式时,发送经过所述第二安全处理后的所述第二数据;When the first transmission mode is a multicast transmission mode, sending the second data after the second security processing;
    当所述第一数据传输方式为单播和多播传输方式时,发送经过所述第一安全处理后的所述第一数据以及经过所述第二安全处理后的所述第二数据。When the first data transmission mode is unicast or multicast transmission, the first data after the first security processing and the second data after the second security processing are sent.
  11. 根据权利要求9或10所述的方法,其特征在于,The method according to claim 9 or 10, wherein:
    所述第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护;The first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection;
    所述第二安全处理为不进行安全处理。The second security process is no security process.
  12. 根据权利要求9或10所述的方法,其特征在于,The method according to claim 9 or 10, wherein:
    所述第一安全处理为不进行安全处理;The first safety processing is no safety processing;
    所述第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护。The second security processing includes using a second parameter and/or a second algorithm to encrypt data and/or integrity protection.
  13. 根据权利要求9或10所述的方法,其特征在于,The method according to claim 9 or 10, wherein:
    所述第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护;The first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection;
    所述第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护;The second security processing includes using a second parameter and/or a second algorithm to encrypt data and/or integrity protection;
    所述第一参数和所述第二参数相同或者不同,所述第一算法和所述第二算法相同或者不同。The first parameter and the second parameter are the same or different, and the first algorithm and the second algorithm are the same or different.
  14. 根据权利要求9至13中任一项所述的方法,其特征在于,The method according to any one of claims 9 to 13, characterized in that,
    所述第一参数包括第一秘钥,和/或,所述第二参数包括第二秘钥。The first parameter includes a first secret key, and/or the second parameter includes a second secret key.
  15. 一种数据安全处理的方法,其特征在于,包括:A method for data security processing, which is characterized in that it includes:
    对第一数据进行第一安全处理;Perform the first security processing on the first data;
    确定经过所述第一安全处理后的所述第一数据的第一传输方式,所述第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,所述单播和多播传输方式为使用单播和多播进行传输的传输方式;Determine a first transmission mode of the first data after the first security processing, where the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast transmission mode and a multicast transmission mode , The unicast and multicast transmission modes are transmission modes that use unicast and multicast for transmission;
    当所述第一传输方式为单播传输方式,利用所述单播传输方式发送经过所述第一安全处理后的所述第一数据;When the first transmission mode is a unicast transmission mode, use the unicast transmission mode to send the first data after the first security processing;
    当所述第一传输方式为多播传输方式,利用所述多播传输方式发送经过所述第一安全处理后的所述第一数据;When the first transmission mode is a multicast transmission mode, use the multicast transmission mode to send the first data after the first security processing;
    当所述第一传输方式为单播和多播传输方式,利用所述单播传输方式发送经过所述第一安全处理后的所述第一数据,利用所述多播传输方式发送第三数据,所述第三数据为通过复制经过所述第一安全处理后的所述第一数据得到的。When the first transmission mode is unicast and multicast transmission, the unicast transmission mode is used to send the first data after the first security processing, and the multicast transmission mode is used to send the third data The third data is obtained by copying the first data after the first security processing.
  16. 根据权利要求15所述的方法,其特征在于,The method of claim 15, wherein:
    所述第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护;或者,The first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection; or,
    所述第一安全处理为不进行安全处理。The first security process is no security process.
  17. 根据权利要求16所述的方法,其特征在于,The method of claim 16, wherein:
    所述第一参数包括第一秘钥。The first parameter includes a first secret key.
  18. 一种通信装置,其特征在于,包括:A communication device, characterized in that it comprises:
    处理单元,用于确定第一数据的第一传输方式,所述第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,所述单播和多播传输方式为使用单播和多播进行传输的传输方式;The processing unit is configured to determine a first transmission mode of the first data, where the first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast and multicast transmission mode, and the unicast and The multicast transmission method is a transmission method that uses unicast and multicast transmission;
    所述处理单元,还用于根据所述第一传输方式,确定对所述第一数据的安全处理方式。The processing unit is further configured to determine a safe processing method for the first data according to the first transmission method.
  19. 根据权利要求18所述的装置,其特征在于,The device of claim 18, wherein:
    当所述第一传输方式为单播传输方式时,所述处理单元确定所述第一数据的安全处理方式为第一安全处理;或When the first transmission method is a unicast transmission method, the processing unit determines that the secure processing method of the first data is the first secure processing; or
    当所述第一传输方式为多播传输方式时,所述处理单元确定所述第一数据的安全处理方式为第二安全处理;或When the first transmission mode is a multicast transmission mode, the processing unit determines that the secure processing mode of the first data is the second secure processing; or
    当所述第一传输方式为单播和多播传输方式时,所述处理单元确定所述第一数据的安全处理方式为第一安全处理,第二数据的安全处理方式为第二安全处理,所述第二数据为通过复制所述第一数据得到的。When the first transmission mode is unicast or multicast transmission, the processing unit determines that the secure processing mode of the first data is the first secure processing, and the secure processing mode of the second data is the second secure processing, The second data is obtained by copying the first data.
  20. 根据权利要求19所述的装置,其特征在于,The device of claim 19, wherein:
    所述第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护;The first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection;
    所述第二安全处理为不进行安全处理。The second security process is no security process.
  21. 根据权利要求19所述的装置,其特征在于,The device of claim 19, wherein:
    所述第一安全处理包括利用第三参数和/或第三算法对数据进行加密和/或完整性保护;The first security processing includes using a third parameter and/or a third algorithm to encrypt data and/or integrity protection;
    所述第二安全处理为不进行安全处理。The second security process is no security process.
  22. 根据权利要求19所述的方法,其特征在于,The method of claim 19, wherein:
    所述第一安全处理为不进行安全处理。所述第二安全处理包括利用第二参数和/或第 二算法对数据进行加密和/或完整性保护。The first security process is no security process. The second security processing includes using a second parameter and/or a second algorithm to encrypt data and/or integrity protection.
  23. 根据权利要求19所述的装置,其特征在于,The device of claim 19, wherein:
    所述第一安全处理为不进行安全处理。所述第二安全处理包括利用第四参数和/或第四算法对数据进行加密和/或完整性保护。The first security process is no security process. The second security processing includes using a fourth parameter and/or a fourth algorithm to encrypt data and/or integrity protection.
  24. 根据权利要求19所述的装置,其特征在于,The device of claim 19, wherein:
    所述第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护,或者,所述第一安全处理包括利用第三参数和/或第三算法对数据进行解密和/或完整性验证;The first security processing includes using a first parameter and/or a first algorithm to perform encryption and/or integrity protection on data, or the first security processing includes using a third parameter and/or a third algorithm to perform data encryption and/or integrity protection. Decryption and/or integrity verification;
    所述第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护,或者,所述第二安全处理包括利用第四参数和/或第四算法对数据进行解密和/或完整性验证;The second security processing includes using a second parameter and/or a second algorithm to encrypt data and/or integrity protection, or the second security processing includes using a fourth parameter and/or a fourth algorithm to perform data encryption and/or integrity protection. Decryption and/or integrity verification;
    所述第一参数和所述第二参数相同或者不同,所述第一算法和所述第二算法相同或者不同,或者,The first parameter and the second parameter are the same or different, the first algorithm and the second algorithm are the same or different, or,
    所述第三参数和所述第四参数相同或者不同,所述第三算法和所述第四算法相同或者不同。The third parameter and the fourth parameter are the same or different, and the third algorithm and the fourth algorithm are the same or different.
  25. 根据权利要求20至24中任一项所述的装置,其特征在于,所述第一参数包括第一秘钥,和/或,所述第二参数包括第二秘钥;或,The device according to any one of claims 20 to 24, wherein the first parameter comprises a first secret key, and/or the second parameter comprises a second secret key; or,
    所述述第三参数包括第三秘钥,和/或,所述第四参数包括第四秘钥。The third parameter includes a third secret key, and/or the fourth parameter includes a fourth secret key.
  26. 一种通信装置,其特征在于,包括:A communication device, characterized in that it comprises:
    处理单元,用于对第一数据进行第一安全处理;The processing unit is configured to perform first security processing on the first data;
    所述处理单元,还用于对第二数据进行第二安全处理,所述第二数据为通过复制所述第一数据得到的;The processing unit is further configured to perform second security processing on second data, where the second data is obtained by copying the first data;
    收发单元,用于根据数据的第一传输方式,发送经过所述第一安全处理后的所述第一数据,和/或,发送经过所述第二安全处理后的所述第二数据,所述第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,所述单播和多播传输方式为使用单播和多播进行传输的传输方式。The transceiver unit is configured to send the first data after the first security processing according to the first data transmission mode, and/or send the second data after the second security processing, so The first transmission mode is at least one of a unicast transmission mode, a multicast transmission mode, or a unicast and multicast transmission mode, and the unicast and multicast transmission mode is a transmission mode using unicast and multicast transmission .
  27. 根据权利要求26所述的装置,其特征在于,所述收发单元,还用于;The device according to claim 26, wherein the transceiver unit is further configured to;
    当所述第一传输方式为单播传输方式时,发送经过所述第一安全处理后的所述第一数据;When the first transmission mode is a unicast transmission mode, sending the first data after the first security processing;
    当所述第一传输方式为多播传输方式时,发送经过所述第二安全处理后的所述第二数据;When the first transmission mode is a multicast transmission mode, sending the second data after the second security processing;
    当所述第一数据传输方式为单播和多播传输方式时,发送经过所述第一安全处理后的所述第一数据以及经过所述第二安全处理后的所述第二数据。When the first data transmission mode is unicast or multicast transmission, the first data after the first security processing and the second data after the second security processing are sent.
  28. 根据权利要求26或27所述的装置,其特征在于,The device according to claim 26 or 27, wherein:
    所述第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护;The first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection;
    所述第二安全处理为不进行安全处理。The second security process is no security process.
  29. 根据权利要求26或27所述的装置,其特征在于,The device according to claim 26 or 27, wherein:
    所述第一安全处理为不进行安全处理;The first safety processing is no safety processing;
    所述第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护。The second security processing includes using a second parameter and/or a second algorithm to encrypt data and/or integrity protection.
  30. 根据权利要求26或27所述的装置,其特征在于,The device according to claim 26 or 27, wherein:
    所述第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护;The first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection;
    所述第二安全处理包括利用第二参数和/或第二算法对数据进行加密和/或完整性保护;The second security processing includes using a second parameter and/or a second algorithm to encrypt data and/or integrity protection;
    所述第一参数和所述第二参数相同或者不同,所述第一算法和所述第二算法相同或者不同。The first parameter and the second parameter are the same or different, and the first algorithm and the second algorithm are the same or different.
  31. 根据权利要求26至30中任一项所述的装置,其特征在于,The device according to any one of claims 26 to 30, characterized in that:
    所述第一参数包括第一秘钥,和/或,所述第二参数包括第二秘钥。The first parameter includes a first secret key, and/or the second parameter includes a second secret key.
  32. 一种通信装置,其特征在于,包括:A communication device, characterized in that it comprises:
    处理单元,用于对第一数据进行第一安全处理;The processing unit is configured to perform first security processing on the first data;
    所述处理单元,还用于确定经过所述第一安全处理后的所述第一数据的第一传输方式,所述第一传输方式为单播传输方式、多播传输方式、或者单播和多播传输方式中的至少一个,所述单播和多播传输方式为使用单播和多播进行传输的传输方式;The processing unit is further configured to determine a first transmission mode of the first data after the first security processing, where the first transmission mode is a unicast transmission mode, a multicast transmission mode, or unicast and At least one of the multicast transmission modes, where the unicast and multicast transmission modes are transmission modes that use unicast and multicast for transmission;
    收发单元,用于当所述第一传输方式为单播传输方式,利用所述单播传输方式发送经过所述第一安全处理后的所述第一数据;A transceiving unit, configured to use the unicast transmission mode to send the first data after the first security processing when the first transmission mode is a unicast transmission mode;
    所述收发单元,还用于当所述第一传输方式为多播传输方式,利用所述多播传输方式发送经过所述第一安全处理后的所述第一数据;The transceiving unit is further configured to use the multicast transmission mode to send the first data after the first security processing when the first transmission mode is a multicast transmission mode;
    所述收发单元,还用于当所述第一传输方式为单播和多播传输方式,利用所述单播传输方式发送经过所述第一安全处理后的所述第一数据,利用所述多播传输方式发送第三数据,所述第三数据为通过复制经过所述第一安全处理后的所述第一数据得到的。The transceiving unit is further configured to use the unicast transmission mode to send the first data after the first security processing when the first transmission mode is unicast and multicast transmission mode, and use the The third data is sent in a multicast transmission mode, and the third data is obtained by copying the first data after the first security processing.
  33. 根据权利要求32所述的装置,其特征在于,The device of claim 32, wherein:
    所述第一安全处理包括利用第一参数和/或第一算法对数据进行加密和/或完整性保护;或者,The first security processing includes using a first parameter and/or a first algorithm to encrypt data and/or integrity protection; or,
    所述第一安全处理为不进行安全处理。The first security process is no security process.
  34. 根据权利要求33所述的装置,其特征在于,The device of claim 33, wherein:
    所述第一参数包括第一秘钥。The first parameter includes a first secret key.
  35. 一种通信装置,其特征在于,所述装置包括至少一个处理器,所述至少一个处理器与至少一个存储器耦合:A communication device, characterized in that the device includes at least one processor, and the at least one processor is coupled with at least one memory:
    所述至少一个处理器,用于执行所述至少一个存储器中存储的计算机程序或指令,以使得所述装置执行如权利要求1-8,9-14或15-17中任一项所述的方法。The at least one processor is configured to execute a computer program or instruction stored in the at least one memory, so that the device executes any one of claims 1-8, 9-14, or 15-17 method.
  36. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机程序或指令,当计算机读取并执行所述计算机程序或指令时,使得计算机执行如权利要求1-8,9-14或15-17中任一项所述的方法。A computer-readable storage medium, characterized in that, a computer program or instruction is stored in the computer-readable storage medium, and when the computer reads and executes the computer program or instruction, the computer executes as claimed in claims 1-8. , The method of any one of 9-14 or 15-17.
  37. 一种芯片,其特征在于,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的通信设备执行如权利要求1-8,9-14或15-17中任一项所述的方法。A chip, characterized by comprising: a processor, used to call and run a computer program from a memory, so that a communication device installed with the chip can execute any one of claims 1-8, 9-14, or 15-17 The method described in one item.
PCT/CN2019/108709 2019-09-27 2019-09-27 Data safety processing method and communication apparatus WO2021056464A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2019/108709 WO2021056464A1 (en) 2019-09-27 2019-09-27 Data safety processing method and communication apparatus
CN201980100287.6A CN114365522A (en) 2019-09-27 2019-09-27 Method and communication device for data security processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/108709 WO2021056464A1 (en) 2019-09-27 2019-09-27 Data safety processing method and communication apparatus

Publications (1)

Publication Number Publication Date
WO2021056464A1 true WO2021056464A1 (en) 2021-04-01

Family

ID=75165366

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/108709 WO2021056464A1 (en) 2019-09-27 2019-09-27 Data safety processing method and communication apparatus

Country Status (2)

Country Link
CN (1) CN114365522A (en)
WO (1) WO2021056464A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113950024A (en) * 2021-10-18 2022-01-18 中国联合网络通信集团有限公司 Data transmission method, device and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115827284B (en) * 2023-02-20 2023-07-21 北京象帝先计算技术有限公司 System on chip, electronic component, electronic device, and transmission processing method

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030046539A1 (en) * 2001-08-29 2003-03-06 Hideaki Negawa Multicast communication system
CN1852092A (en) * 2006-03-24 2006-10-25 华南理工大学 Multicast data enciphered transmission method
US20070168655A1 (en) * 2006-01-19 2007-07-19 Thomasson John K System and method for multicasting IPSec protected communications
CN101145900A (en) * 2006-09-15 2008-03-19 华为技术有限公司 Multi-cast method and multi-cast system and multi-cast device
CN101986726A (en) * 2010-10-25 2011-03-16 西安西电捷通无线网络通信股份有限公司 Method for protecting management frame based on wireless local area network authentication and privacy infrastructure (WAPI)
CN101998384A (en) * 2009-08-18 2011-03-30 中国移动通信集团公司 Method for encrypting transmission medium stream, encryption server and mobile terminal
CN102136907A (en) * 2010-01-25 2011-07-27 中兴通讯股份有限公司 Multicast service encryption method and device for passive optical network system
WO2015144196A1 (en) * 2014-03-24 2015-10-01 Nokia Solutions And Networks Oy Solution for critical communication security based on mbms security
CN106817352A (en) * 2015-11-30 2017-06-09 深圳市中兴微电子技术有限公司 Broadcasting packet encryption method and device
CN107070874A (en) * 2017-01-23 2017-08-18 济南浪潮高新科技投资发展有限公司 System, encryption method and the device of broadcast communication, decryption method and device
CN109982266A (en) * 2017-12-28 2019-07-05 华为技术有限公司 A kind of communication means and Related product
WO2019145928A1 (en) * 2018-01-29 2019-08-01 Cooper Technologies Company Simultaneous control of a subnet of nodes in a wireless network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007108651A1 (en) * 2006-03-22 2007-09-27 Lg Electronics Inc. Security considerations for the lte of umts
CN109586900B (en) * 2017-09-29 2020-08-07 华为技术有限公司 Data security processing method and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030046539A1 (en) * 2001-08-29 2003-03-06 Hideaki Negawa Multicast communication system
US20070168655A1 (en) * 2006-01-19 2007-07-19 Thomasson John K System and method for multicasting IPSec protected communications
CN1852092A (en) * 2006-03-24 2006-10-25 华南理工大学 Multicast data enciphered transmission method
CN101145900A (en) * 2006-09-15 2008-03-19 华为技术有限公司 Multi-cast method and multi-cast system and multi-cast device
CN101998384A (en) * 2009-08-18 2011-03-30 中国移动通信集团公司 Method for encrypting transmission medium stream, encryption server and mobile terminal
CN102136907A (en) * 2010-01-25 2011-07-27 中兴通讯股份有限公司 Multicast service encryption method and device for passive optical network system
CN101986726A (en) * 2010-10-25 2011-03-16 西安西电捷通无线网络通信股份有限公司 Method for protecting management frame based on wireless local area network authentication and privacy infrastructure (WAPI)
WO2015144196A1 (en) * 2014-03-24 2015-10-01 Nokia Solutions And Networks Oy Solution for critical communication security based on mbms security
CN106817352A (en) * 2015-11-30 2017-06-09 深圳市中兴微电子技术有限公司 Broadcasting packet encryption method and device
CN107070874A (en) * 2017-01-23 2017-08-18 济南浪潮高新科技投资发展有限公司 System, encryption method and the device of broadcast communication, decryption method and device
CN109982266A (en) * 2017-12-28 2019-07-05 华为技术有限公司 A kind of communication means and Related product
WO2019145928A1 (en) * 2018-01-29 2019-08-01 Cooper Technologies Company Simultaneous control of a subnet of nodes in a wireless network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113950024A (en) * 2021-10-18 2022-01-18 中国联合网络通信集团有限公司 Data transmission method, device and storage medium
CN113950024B (en) * 2021-10-18 2023-09-26 中国联合网络通信集团有限公司 Data transmission method, device and storage medium

Also Published As

Publication number Publication date
CN114365522A (en) 2022-04-15

Similar Documents

Publication Publication Date Title
TWI703850B (en) Method and apparatus for securing structured proximity service codes for restricted discovery
CN106134272B (en) Communication method, network equipment, user equipment and communication system
US11129017B2 (en) System and method for security activation with session granularity
WO2021031768A1 (en) Method and device for secure encryption
WO2018001297A1 (en) Method and device for data transmission
WO2018205874A1 (en) Transmission method, terminal, and network device
WO2021160091A1 (en) Method and apparatus for group switching
EP4114127A1 (en) Method, apparatus and system for configuring radio bearer
WO2019158117A1 (en) System and method for providing security in a wireless communications system with user plane separation
WO2021056464A1 (en) Data safety processing method and communication apparatus
WO2021196232A1 (en) Physical channel resource mapping method, terminal device, and network device
WO2021134616A1 (en) Resource configuration method and apparatus
WO2021013127A1 (en) Communication method and communication apparatus
CN110710291B (en) Data copying and transmitting method, equipment and computer storage medium
WO2021238950A1 (en) Communication method and communication apparatus
WO2022021811A1 (en) Wireless communication method, terminal device and network device
JP7401669B2 (en) Connection restart method and device
WO2021138801A1 (en) Secure service transmission method and apparatus, terminal device, and network device
US11882602B2 (en) Data transmission method, base station, and user equipment
WO2021212413A1 (en) Key transmission method and apparatus
WO2013020489A1 (en) Method, base station and ue for transmitting enhanced scheduling information
WO2020107428A1 (en) Sidelink communication method and terminal device
WO2017114156A1 (en) Method for encrypted transmission of data, base station and pdt terminal
US20210195424A1 (en) Method for early transmission of downlink data and apparatus
WO2017054509A1 (en) Media access control layer processing method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19946385

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19946385

Country of ref document: EP

Kind code of ref document: A1